asan_mapping.h 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412
  1. //===-- asan_mapping.h ------------------------------------------*- C++ -*-===//
  2. //
  3. // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
  4. // See https://llvm.org/LICENSE.txt for license information.
  5. // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
  6. //
  7. //===----------------------------------------------------------------------===//
  8. //
  9. // This file is a part of AddressSanitizer, an address sanity checker.
  10. //
  11. // Defines ASan memory mapping.
  12. //===----------------------------------------------------------------------===//
  13. #ifndef ASAN_MAPPING_H
  14. #define ASAN_MAPPING_H
  15. #include "sanitizer_common/sanitizer_platform.h"
  16. // The full explanation of the memory mapping could be found here:
  17. // https://github.com/google/sanitizers/wiki/AddressSanitizerAlgorithm
  18. //
  19. // Typical shadow mapping on Linux/x86_64 with SHADOW_OFFSET == 0x00007fff8000:
  20. // || `[0x10007fff8000, 0x7fffffffffff]` || HighMem ||
  21. // || `[0x02008fff7000, 0x10007fff7fff]` || HighShadow ||
  22. // || `[0x00008fff7000, 0x02008fff6fff]` || ShadowGap ||
  23. // || `[0x00007fff8000, 0x00008fff6fff]` || LowShadow ||
  24. // || `[0x000000000000, 0x00007fff7fff]` || LowMem ||
  25. //
  26. // When SHADOW_OFFSET is zero (-pie):
  27. // || `[0x100000000000, 0x7fffffffffff]` || HighMem ||
  28. // || `[0x020000000000, 0x0fffffffffff]` || HighShadow ||
  29. // || `[0x000000040000, 0x01ffffffffff]` || ShadowGap ||
  30. //
  31. // Special case when something is already mapped between
  32. // 0x003000000000 and 0x005000000000 (e.g. when prelink is installed):
  33. // || `[0x10007fff8000, 0x7fffffffffff]` || HighMem ||
  34. // || `[0x02008fff7000, 0x10007fff7fff]` || HighShadow ||
  35. // || `[0x005000000000, 0x02008fff6fff]` || ShadowGap3 ||
  36. // || `[0x003000000000, 0x004fffffffff]` || MidMem ||
  37. // || `[0x000a7fff8000, 0x002fffffffff]` || ShadowGap2 ||
  38. // || `[0x00067fff8000, 0x000a7fff7fff]` || MidShadow ||
  39. // || `[0x00008fff7000, 0x00067fff7fff]` || ShadowGap ||
  40. // || `[0x00007fff8000, 0x00008fff6fff]` || LowShadow ||
  41. // || `[0x000000000000, 0x00007fff7fff]` || LowMem ||
  42. //
  43. // Default Linux/i386 mapping on x86_64 machine:
  44. // || `[0x40000000, 0xffffffff]` || HighMem ||
  45. // || `[0x28000000, 0x3fffffff]` || HighShadow ||
  46. // || `[0x24000000, 0x27ffffff]` || ShadowGap ||
  47. // || `[0x20000000, 0x23ffffff]` || LowShadow ||
  48. // || `[0x00000000, 0x1fffffff]` || LowMem ||
  49. //
  50. // Default Linux/i386 mapping on i386 machine
  51. // (addresses starting with 0xc0000000 are reserved
  52. // for kernel and thus not sanitized):
  53. // || `[0x38000000, 0xbfffffff]` || HighMem ||
  54. // || `[0x27000000, 0x37ffffff]` || HighShadow ||
  55. // || `[0x24000000, 0x26ffffff]` || ShadowGap ||
  56. // || `[0x20000000, 0x23ffffff]` || LowShadow ||
  57. // || `[0x00000000, 0x1fffffff]` || LowMem ||
  58. //
  59. // Default Linux/MIPS32 mapping:
  60. // || `[0x2aaa0000, 0xffffffff]` || HighMem ||
  61. // || `[0x0fff4000, 0x2aa9ffff]` || HighShadow ||
  62. // || `[0x0bff4000, 0x0fff3fff]` || ShadowGap ||
  63. // || `[0x0aaa0000, 0x0bff3fff]` || LowShadow ||
  64. // || `[0x00000000, 0x0aa9ffff]` || LowMem ||
  65. //
  66. // Default Linux/MIPS64 mapping:
  67. // || `[0x4000000000, 0xffffffffff]` || HighMem ||
  68. // || `[0x2800000000, 0x3fffffffff]` || HighShadow ||
  69. // || `[0x2400000000, 0x27ffffffff]` || ShadowGap ||
  70. // || `[0x2000000000, 0x23ffffffff]` || LowShadow ||
  71. // || `[0x0000000000, 0x1fffffffff]` || LowMem ||
  72. //
  73. // Default Linux/RISCV64 Sv39 mapping:
  74. // || `[0x1555550000, 0x3fffffffff]` || HighMem ||
  75. // || `[0x0fffffa000, 0x1555555fff]` || HighShadow ||
  76. // || `[0x0effffa000, 0x0fffff9fff]` || ShadowGap ||
  77. // || `[0x0d55550000, 0x0effff9fff]` || LowShadow ||
  78. // || `[0x0000000000, 0x0d5554ffff]` || LowMem ||
  79. //
  80. // Default Linux/AArch64 (39-bit VMA) mapping:
  81. // || `[0x2000000000, 0x7fffffffff]` || highmem ||
  82. // || `[0x1400000000, 0x1fffffffff]` || highshadow ||
  83. // || `[0x1200000000, 0x13ffffffff]` || shadowgap ||
  84. // || `[0x1000000000, 0x11ffffffff]` || lowshadow ||
  85. // || `[0x0000000000, 0x0fffffffff]` || lowmem ||
  86. //
  87. // Default Linux/AArch64 (42-bit VMA) mapping:
  88. // || `[0x10000000000, 0x3ffffffffff]` || highmem ||
  89. // || `[0x0a000000000, 0x0ffffffffff]` || highshadow ||
  90. // || `[0x09000000000, 0x09fffffffff]` || shadowgap ||
  91. // || `[0x08000000000, 0x08fffffffff]` || lowshadow ||
  92. // || `[0x00000000000, 0x07fffffffff]` || lowmem ||
  93. //
  94. // Default Linux/S390 mapping:
  95. // || `[0x30000000, 0x7fffffff]` || HighMem ||
  96. // || `[0x26000000, 0x2fffffff]` || HighShadow ||
  97. // || `[0x24000000, 0x25ffffff]` || ShadowGap ||
  98. // || `[0x20000000, 0x23ffffff]` || LowShadow ||
  99. // || `[0x00000000, 0x1fffffff]` || LowMem ||
  100. //
  101. // Default Linux/SystemZ mapping:
  102. // || `[0x14000000000000, 0x1fffffffffffff]` || HighMem ||
  103. // || `[0x12800000000000, 0x13ffffffffffff]` || HighShadow ||
  104. // || `[0x12000000000000, 0x127fffffffffff]` || ShadowGap ||
  105. // || `[0x10000000000000, 0x11ffffffffffff]` || LowShadow ||
  106. // || `[0x00000000000000, 0x0fffffffffffff]` || LowMem ||
  107. //
  108. // Default Linux/SPARC64 (52-bit VMA) mapping:
  109. // || `[0x8000000000000, 0xfffffffffffff]` || HighMem ||
  110. // || `[0x1080000000000, 0x207ffffffffff]` || HighShadow ||
  111. // || `[0x0090000000000, 0x107ffffffffff]` || ShadowGap ||
  112. // || `[0x0080000000000, 0x008ffffffffff]` || LowShadow ||
  113. // || `[0x0000000000000, 0x007ffffffffff]` || LowMem ||
  114. //
  115. // Default Linux/LoongArch64 (47-bit VMA) mapping:
  116. // || `[0x500000000000, 0x7fffffffffff]` || HighMem ||
  117. // || `[0x4a0000000000, 0x4fffffffffff]` || HighShadow ||
  118. // || `[0x480000000000, 0x49ffffffffff]` || ShadowGap ||
  119. // || `[0x400000000000, 0x47ffffffffff]` || LowShadow ||
  120. // || `[0x000000000000, 0x3fffffffffff]` || LowMem ||
  121. //
  122. // Shadow mapping on FreeBSD/x86-64 with SHADOW_OFFSET == 0x400000000000:
  123. // || `[0x500000000000, 0x7fffffffffff]` || HighMem ||
  124. // || `[0x4a0000000000, 0x4fffffffffff]` || HighShadow ||
  125. // || `[0x480000000000, 0x49ffffffffff]` || ShadowGap ||
  126. // || `[0x400000000000, 0x47ffffffffff]` || LowShadow ||
  127. // || `[0x000000000000, 0x3fffffffffff]` || LowMem ||
  128. //
  129. // Shadow mapping on FreeBSD/i386 with SHADOW_OFFSET == 0x40000000:
  130. // || `[0x60000000, 0xffffffff]` || HighMem ||
  131. // || `[0x4c000000, 0x5fffffff]` || HighShadow ||
  132. // || `[0x48000000, 0x4bffffff]` || ShadowGap ||
  133. // || `[0x40000000, 0x47ffffff]` || LowShadow ||
  134. // || `[0x00000000, 0x3fffffff]` || LowMem ||
  135. //
  136. // Shadow mapping on NetBSD/x86-64 with SHADOW_OFFSET == 0x400000000000:
  137. // || `[0x4feffffffe01, 0x7f7ffffff000]` || HighMem ||
  138. // || `[0x49fdffffffc0, 0x4feffffffe00]` || HighShadow ||
  139. // || `[0x480000000000, 0x49fdffffffbf]` || ShadowGap ||
  140. // || `[0x400000000000, 0x47ffffffffff]` || LowShadow ||
  141. // || `[0x000000000000, 0x3fffffffffff]` || LowMem ||
  142. //
  143. // Shadow mapping on NetBSD/i386 with SHADOW_OFFSET == 0x40000000:
  144. // || `[0x60000000, 0xfffff000]` || HighMem ||
  145. // || `[0x4c000000, 0x5fffffff]` || HighShadow ||
  146. // || `[0x48000000, 0x4bffffff]` || ShadowGap ||
  147. // || `[0x40000000, 0x47ffffff]` || LowShadow ||
  148. // || `[0x00000000, 0x3fffffff]` || LowMem ||
  149. //
  150. // Default Windows/i386 mapping:
  151. // (the exact location of HighShadow/HighMem may vary depending
  152. // on WoW64, /LARGEADDRESSAWARE, etc).
  153. // || `[0x50000000, 0xffffffff]` || HighMem ||
  154. // || `[0x3a000000, 0x4fffffff]` || HighShadow ||
  155. // || `[0x36000000, 0x39ffffff]` || ShadowGap ||
  156. // || `[0x30000000, 0x35ffffff]` || LowShadow ||
  157. // || `[0x00000000, 0x2fffffff]` || LowMem ||
  158. #define ASAN_SHADOW_SCALE 3
  159. #if SANITIZER_FUCHSIA
  160. # define ASAN_SHADOW_OFFSET_CONST (0)
  161. #elif SANITIZER_WORDSIZE == 32
  162. # if SANITIZER_ANDROID
  163. # define ASAN_SHADOW_OFFSET_DYNAMIC
  164. # elif defined(__mips__)
  165. # define ASAN_SHADOW_OFFSET_CONST 0x0aaa0000
  166. # elif SANITIZER_FREEBSD
  167. # define ASAN_SHADOW_OFFSET_CONST 0x40000000
  168. # elif SANITIZER_NETBSD
  169. # define ASAN_SHADOW_OFFSET_CONST 0x40000000
  170. # elif SANITIZER_WINDOWS
  171. # define ASAN_SHADOW_OFFSET_CONST 0x30000000
  172. # elif SANITIZER_IOS
  173. # define ASAN_SHADOW_OFFSET_DYNAMIC
  174. # else
  175. # define ASAN_SHADOW_OFFSET_CONST 0x20000000
  176. # endif
  177. #else
  178. # if SANITIZER_IOS
  179. # define ASAN_SHADOW_OFFSET_DYNAMIC
  180. # elif SANITIZER_APPLE && defined(__aarch64__)
  181. # define ASAN_SHADOW_OFFSET_DYNAMIC
  182. # elif SANITIZER_FREEBSD && defined(__aarch64__)
  183. # define ASAN_SHADOW_OFFSET_CONST 0x0000800000000000
  184. # elif SANITIZER_RISCV64
  185. # define ASAN_SHADOW_OFFSET_CONST 0x0000000d55550000
  186. # elif defined(__aarch64__)
  187. # define ASAN_SHADOW_OFFSET_CONST 0x0000001000000000
  188. # elif defined(__powerpc64__)
  189. # define ASAN_SHADOW_OFFSET_CONST 0x0000100000000000
  190. # elif defined(__s390x__)
  191. # define ASAN_SHADOW_OFFSET_CONST 0x0010000000000000
  192. # elif SANITIZER_FREEBSD
  193. # define ASAN_SHADOW_OFFSET_CONST 0x0000400000000000
  194. # elif SANITIZER_NETBSD
  195. # define ASAN_SHADOW_OFFSET_CONST 0x0000400000000000
  196. # elif SANITIZER_APPLE
  197. # define ASAN_SHADOW_OFFSET_CONST 0x0000100000000000
  198. # elif defined(__mips64)
  199. # define ASAN_SHADOW_OFFSET_CONST 0x0000002000000000
  200. # elif defined(__sparc__)
  201. # define ASAN_SHADOW_OFFSET_CONST 0x0000080000000000
  202. # elif SANITIZER_LOONGARCH64
  203. # define ASAN_SHADOW_OFFSET_CONST 0x0000400000000000
  204. # elif SANITIZER_WINDOWS64
  205. # define ASAN_SHADOW_OFFSET_DYNAMIC
  206. # else
  207. # if ASAN_SHADOW_SCALE != 3
  208. # error "Value below is based on shadow scale = 3."
  209. # error "Original formula was: 0x7FFFFFFF & (~0xFFFULL << SHADOW_SCALE)."
  210. # endif
  211. # define ASAN_SHADOW_OFFSET_CONST 0x000000007fff8000
  212. # endif
  213. #endif
  214. #if defined(__cplusplus)
  215. # include "asan_internal.h"
  216. static const u64 kDefaultShadowSentinel = ~(uptr)0;
  217. # if defined(ASAN_SHADOW_OFFSET_CONST)
  218. static const u64 kConstShadowOffset = ASAN_SHADOW_OFFSET_CONST;
  219. # define ASAN_SHADOW_OFFSET kConstShadowOffset
  220. # elif defined(ASAN_SHADOW_OFFSET_DYNAMIC)
  221. # define ASAN_SHADOW_OFFSET __asan_shadow_memory_dynamic_address
  222. # else
  223. # error "ASAN_SHADOW_OFFSET can't be determined."
  224. # endif
  225. # if SANITIZER_ANDROID && defined(__arm__)
  226. # define ASAN_PREMAP_SHADOW 1
  227. # else
  228. # define ASAN_PREMAP_SHADOW 0
  229. # endif
  230. # define ASAN_SHADOW_GRANULARITY (1ULL << ASAN_SHADOW_SCALE)
  231. # define DO_ASAN_MAPPING_PROFILE 0 // Set to 1 to profile the functions below.
  232. # if DO_ASAN_MAPPING_PROFILE
  233. # define PROFILE_ASAN_MAPPING() AsanMappingProfile[__LINE__]++;
  234. # else
  235. # define PROFILE_ASAN_MAPPING()
  236. # endif
  237. // If 1, all shadow boundaries are constants.
  238. // Don't set to 1 other than for testing.
  239. # define ASAN_FIXED_MAPPING 0
  240. namespace __asan {
  241. extern uptr AsanMappingProfile[];
  242. # if ASAN_FIXED_MAPPING
  243. // Fixed mapping for 64-bit Linux. Mostly used for performance comparison
  244. // with non-fixed mapping. As of r175253 (Feb 2013) the performance
  245. // difference between fixed and non-fixed mapping is below the noise level.
  246. static uptr kHighMemEnd = 0x7fffffffffffULL;
  247. static uptr kMidMemBeg = 0x3000000000ULL;
  248. static uptr kMidMemEnd = 0x4fffffffffULL;
  249. # else
  250. extern uptr kHighMemEnd, kMidMemBeg, kMidMemEnd; // Initialized in __asan_init.
  251. # endif
  252. } // namespace __asan
  253. # if defined(__sparc__) && SANITIZER_WORDSIZE == 64
  254. # include "asan_mapping_sparc64.h"
  255. # else
  256. # define MEM_TO_SHADOW(mem) \
  257. (((mem) >> ASAN_SHADOW_SCALE) + (ASAN_SHADOW_OFFSET))
  258. # define SHADOW_TO_MEM(mem) \
  259. (((mem) - (ASAN_SHADOW_OFFSET)) << (ASAN_SHADOW_SCALE))
  260. # define kLowMemBeg 0
  261. # define kLowMemEnd (ASAN_SHADOW_OFFSET ? ASAN_SHADOW_OFFSET - 1 : 0)
  262. # define kLowShadowBeg ASAN_SHADOW_OFFSET
  263. # define kLowShadowEnd MEM_TO_SHADOW(kLowMemEnd)
  264. # define kHighMemBeg (MEM_TO_SHADOW(kHighMemEnd) + 1)
  265. # define kHighShadowBeg MEM_TO_SHADOW(kHighMemBeg)
  266. # define kHighShadowEnd MEM_TO_SHADOW(kHighMemEnd)
  267. # define kMidShadowBeg MEM_TO_SHADOW(kMidMemBeg)
  268. # define kMidShadowEnd MEM_TO_SHADOW(kMidMemEnd)
  269. // With the zero shadow base we can not actually map pages starting from 0.
  270. // This constant is somewhat arbitrary.
  271. # define kZeroBaseShadowStart 0
  272. # define kZeroBaseMaxShadowStart (1 << 18)
  273. # define kShadowGapBeg \
  274. (kLowShadowEnd ? kLowShadowEnd + 1 : kZeroBaseShadowStart)
  275. # define kShadowGapEnd ((kMidMemBeg ? kMidShadowBeg : kHighShadowBeg) - 1)
  276. # define kShadowGap2Beg (kMidMemBeg ? kMidShadowEnd + 1 : 0)
  277. # define kShadowGap2End (kMidMemBeg ? kMidMemBeg - 1 : 0)
  278. # define kShadowGap3Beg (kMidMemBeg ? kMidMemEnd + 1 : 0)
  279. # define kShadowGap3End (kMidMemBeg ? kHighShadowBeg - 1 : 0)
  280. namespace __asan {
  281. static inline bool AddrIsInLowMem(uptr a) {
  282. PROFILE_ASAN_MAPPING();
  283. return a <= kLowMemEnd;
  284. }
  285. static inline bool AddrIsInLowShadow(uptr a) {
  286. PROFILE_ASAN_MAPPING();
  287. return a >= kLowShadowBeg && a <= kLowShadowEnd;
  288. }
  289. static inline bool AddrIsInMidMem(uptr a) {
  290. PROFILE_ASAN_MAPPING();
  291. return kMidMemBeg && a >= kMidMemBeg && a <= kMidMemEnd;
  292. }
  293. static inline bool AddrIsInMidShadow(uptr a) {
  294. PROFILE_ASAN_MAPPING();
  295. return kMidMemBeg && a >= kMidShadowBeg && a <= kMidShadowEnd;
  296. }
  297. static inline bool AddrIsInHighMem(uptr a) {
  298. PROFILE_ASAN_MAPPING();
  299. return kHighMemBeg && a >= kHighMemBeg && a <= kHighMemEnd;
  300. }
  301. static inline bool AddrIsInHighShadow(uptr a) {
  302. PROFILE_ASAN_MAPPING();
  303. return kHighMemBeg && a >= kHighShadowBeg && a <= kHighShadowEnd;
  304. }
  305. static inline bool AddrIsInShadowGap(uptr a) {
  306. PROFILE_ASAN_MAPPING();
  307. if (kMidMemBeg) {
  308. if (a <= kShadowGapEnd)
  309. return ASAN_SHADOW_OFFSET == 0 || a >= kShadowGapBeg;
  310. return (a >= kShadowGap2Beg && a <= kShadowGap2End) ||
  311. (a >= kShadowGap3Beg && a <= kShadowGap3End);
  312. }
  313. // In zero-based shadow mode we treat addresses near zero as addresses
  314. // in shadow gap as well.
  315. if (ASAN_SHADOW_OFFSET == 0)
  316. return a <= kShadowGapEnd;
  317. return a >= kShadowGapBeg && a <= kShadowGapEnd;
  318. }
  319. } // namespace __asan
  320. # endif
  321. namespace __asan {
  322. static inline uptr MemToShadowSize(uptr size) {
  323. return size >> ASAN_SHADOW_SCALE;
  324. }
  325. static inline bool AddrIsInMem(uptr a) {
  326. PROFILE_ASAN_MAPPING();
  327. return AddrIsInLowMem(a) || AddrIsInMidMem(a) || AddrIsInHighMem(a) ||
  328. (flags()->protect_shadow_gap == 0 && AddrIsInShadowGap(a));
  329. }
  330. static inline uptr MemToShadow(uptr p) {
  331. PROFILE_ASAN_MAPPING();
  332. CHECK(AddrIsInMem(p));
  333. return MEM_TO_SHADOW(p);
  334. }
  335. static inline bool AddrIsInShadow(uptr a) {
  336. PROFILE_ASAN_MAPPING();
  337. return AddrIsInLowShadow(a) || AddrIsInMidShadow(a) || AddrIsInHighShadow(a);
  338. }
  339. static inline uptr ShadowToMem(uptr p) {
  340. PROFILE_ASAN_MAPPING();
  341. CHECK(AddrIsInShadow(p));
  342. return SHADOW_TO_MEM(p);
  343. }
  344. static inline bool AddrIsAlignedByGranularity(uptr a) {
  345. PROFILE_ASAN_MAPPING();
  346. return (a & (ASAN_SHADOW_GRANULARITY - 1)) == 0;
  347. }
  348. static inline bool AddressIsPoisoned(uptr a) {
  349. PROFILE_ASAN_MAPPING();
  350. const uptr kAccessSize = 1;
  351. u8 *shadow_address = (u8 *)MEM_TO_SHADOW(a);
  352. s8 shadow_value = *shadow_address;
  353. if (shadow_value) {
  354. u8 last_accessed_byte =
  355. (a & (ASAN_SHADOW_GRANULARITY - 1)) + kAccessSize - 1;
  356. return (last_accessed_byte >= shadow_value);
  357. }
  358. return false;
  359. }
  360. // Must be after all calls to PROFILE_ASAN_MAPPING().
  361. static const uptr kAsanMappingProfileSize = __LINE__;
  362. } // namespace __asan
  363. #endif // __cplusplus
  364. #endif // ASAN_MAPPING_H