asan_mapping.h revision 606d3bc68a071c35acd0490678ce9ebc4c7e6332
1//===-- asan_mapping.h ------------------------------------------*- C++ -*-===// 2// 3// The LLVM Compiler Infrastructure 4// 5// This file is distributed under the University of Illinois Open Source 6// License. See LICENSE.TXT for details. 7// 8//===----------------------------------------------------------------------===// 9// 10// This file is a part of AddressSanitizer, an address sanity checker. 11// 12// Defines ASan memory mapping. 13//===----------------------------------------------------------------------===// 14#ifndef ASAN_MAPPING_H 15#define ASAN_MAPPING_H 16 17#include "asan_internal.h" 18 19// The full explanation of the memory mapping could be found here: 20// http://code.google.com/p/address-sanitizer/wiki/AddressSanitizerAlgorithm 21 22#if ASAN_FLEXIBLE_MAPPING_AND_OFFSET == 1 23extern SANITIZER_INTERFACE_ATTRIBUTE uptr __asan_mapping_scale; 24extern SANITIZER_INTERFACE_ATTRIBUTE uptr __asan_mapping_offset; 25# define SHADOW_SCALE (__asan_mapping_scale) 26# define SHADOW_OFFSET (__asan_mapping_offset) 27#else 28# if ASAN_ANDROID 29# define SHADOW_SCALE (3) 30# define SHADOW_OFFSET (0) 31# else 32# define SHADOW_SCALE (3) 33# if SANITIZER_WORDSIZE == 32 34# define SHADOW_OFFSET (1 << 29) 35# else 36# if defined(__powerpc64__) 37# define SHADOW_OFFSET (1ULL << 41) 38# else 39# if ASAN_MAC 40# define SHADOW_OFFSET (1ULL << 44) 41# else 42# define SHADOW_OFFSET 0x7fff8000ULL 43# endif 44# endif 45# endif 46# endif 47#endif // ASAN_FLEXIBLE_MAPPING_AND_OFFSET 48 49#define SHADOW_GRANULARITY (1ULL << SHADOW_SCALE) 50#define MEM_TO_SHADOW(mem) (((mem) >> SHADOW_SCALE) + (SHADOW_OFFSET)) 51#define SHADOW_TO_MEM(shadow) (((shadow) - SHADOW_OFFSET) << SHADOW_SCALE) 52 53#define kLowMemBeg 0 54#define kLowMemEnd (SHADOW_OFFSET ? SHADOW_OFFSET - 1 : 0) 55 56#define kLowShadowBeg SHADOW_OFFSET 57#define kLowShadowEnd MEM_TO_SHADOW(kLowMemEnd) 58 59#define kHighMemBeg (MEM_TO_SHADOW(kHighMemEnd) + 1) 60 61#define kHighShadowBeg MEM_TO_SHADOW(kHighMemBeg) 62#define kHighShadowEnd MEM_TO_SHADOW(kHighMemEnd) 63 64// With the zero shadow base we can not actually map pages starting from 0. 65// This constant is somewhat arbitrary. 66#define kZeroBaseShadowStart (1 << 18) 67 68#define kShadowGapBeg (kLowShadowEnd ? kLowShadowEnd + 1 \ 69 : kZeroBaseShadowStart) 70#define kShadowGapEnd (kHighShadowBeg - 1) 71 72namespace __asan { 73 74SANITIZER_INTERFACE_ATTRIBUTE 75extern uptr kHighMemEnd; // Initialized in __asan_init. 76 77static inline bool AddrIsInLowMem(uptr a) { 78 return a < kLowMemEnd; 79} 80 81static inline bool AddrIsInLowShadow(uptr a) { 82 return a >= kLowShadowBeg && a <= kLowShadowEnd; 83} 84 85static inline bool AddrIsInHighMem(uptr a) { 86 return a >= kHighMemBeg && a <= kHighMemEnd; 87} 88 89static inline bool AddrIsInMem(uptr a) { 90 return AddrIsInLowMem(a) || AddrIsInHighMem(a); 91} 92 93static inline uptr MemToShadow(uptr p) { 94 CHECK(AddrIsInMem(p)); 95 return MEM_TO_SHADOW(p); 96} 97 98static inline bool AddrIsInHighShadow(uptr a) { 99 return a >= kHighShadowBeg && a <= kHighMemEnd; 100} 101 102static inline bool AddrIsInShadow(uptr a) { 103 return AddrIsInLowShadow(a) || AddrIsInHighShadow(a); 104} 105 106static inline bool AddrIsInShadowGap(uptr a) { 107 // In zero-based shadow mode we treat addresses near zero as addresses 108 // in shadow gap as well. 109 if (SHADOW_OFFSET == 0) 110 return a <= kShadowGapEnd; 111 return a >= kShadowGapBeg && a <= kShadowGapEnd; 112} 113 114static inline bool AddrIsAlignedByGranularity(uptr a) { 115 return (a & (SHADOW_GRANULARITY - 1)) == 0; 116} 117 118static inline bool AddressIsPoisoned(uptr a) { 119 const uptr kAccessSize = 1; 120 u8 *shadow_address = (u8*)MemToShadow(a); 121 s8 shadow_value = *shadow_address; 122 if (shadow_value) { 123 u8 last_accessed_byte = (a & (SHADOW_GRANULARITY - 1)) 124 + kAccessSize - 1; 125 return (last_accessed_byte >= shadow_value); 126 } 127 return false; 128} 129 130} // namespace __asan 131 132#endif // ASAN_MAPPING_H 133