2019-08-01 21:43:28 +08:00
|
|
|
//===-- asan_premap_shadow.cpp --------------------------------------------===//
|
2017-11-21 01:41:57 +08:00
|
|
|
//
|
2019-01-19 16:50:56 +08:00
|
|
|
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
|
|
|
|
// See https://llvm.org/LICENSE.txt for license information.
|
|
|
|
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
|
2017-11-21 01:41:57 +08:00
|
|
|
//
|
|
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
//
|
|
|
|
// This file is a part of AddressSanitizer, an address sanity checker.
|
|
|
|
//
|
|
|
|
// Reserve shadow memory with an ifunc resolver.
|
|
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
|
|
|
|
#include "asan_mapping.h"
|
|
|
|
|
|
|
|
#if ASAN_PREMAP_SHADOW
|
|
|
|
|
|
|
|
#include "asan_premap_shadow.h"
|
|
|
|
#include "sanitizer_common/sanitizer_posix.h"
|
|
|
|
|
|
|
|
namespace __asan {
|
|
|
|
|
|
|
|
// The code in this file needs to run in an unrelocated binary. It may not
|
|
|
|
// access any external symbol, including its own non-hidden globals.
|
|
|
|
|
|
|
|
// Conservative upper limit.
|
|
|
|
uptr PremapShadowSize() {
|
|
|
|
uptr granularity = GetMmapGranularity();
|
|
|
|
return RoundUpTo(GetMaxVirtualAddress() >> SHADOW_SCALE, granularity);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Returns an address aligned to 8 pages, such that one page on the left and
|
|
|
|
// PremapShadowSize() bytes on the right of it are mapped r/o.
|
|
|
|
uptr PremapShadow() {
|
[compiler-rt][asan][hwasan] Refactor shadow setup into sanitizer_common (NFCI)
Summary:
This refactors some common support related to shadow memory setup from
asan and hwasan into sanitizer_common. This should not only reduce code
duplication but also make these facilities available for new compiler-rt
uses (e.g. heap profiling).
In most cases the separate copies of the code were either identical, or
at least functionally identical. A few notes:
In ProtectGap, the asan version checked the address against an upper
bound (kZeroBaseMaxShadowStart, which is (2^18). I have created a copy
of kZeroBaseMaxShadowStart in hwasan_mapping.h, with the same value, as
it isn't clear why that code should not do the same check. If it
shouldn't, I can remove this and guard this check so that it only
happens for asan.
In asan's InitializeShadowMemory, in the dynamic shadow case it was
setting __asan_shadow_memory_dynamic_address to 0 (which then sets both
macro SHADOW_OFFSET as well as macro kLowShadowBeg to 0) before calling
FindDynamicShadowStart(). AFAICT this is only needed because
FindDynamicShadowStart utilizes kHighShadowEnd to
get the shadow size, and kHighShadowEnd is a macro invoking
MEM_TO_SHADOW(kHighMemEnd) which in turn invokes:
(((kHighMemEnd) >> SHADOW_SCALE) + (SHADOW_OFFSET))
I.e. it computes the shadow space needed by kHighMemEnd (the shift), and
adds the offset. Since we only want the shadow space here, the earlier
setting of SHADOW_OFFSET to 0 via __asan_shadow_memory_dynamic_address
accomplishes this. In the hwasan version, it simply gets the shadow
space via "MemToShadowSize(kHighMemEnd)", where MemToShadowSize just
does the shift. I've simplified the asan handling to do the same
thing, and therefore was able to remove the setting of the SHADOW_OFFSET
via __asan_shadow_memory_dynamic_address to 0.
Reviewers: vitalybuka, kcc, eugenis
Subscribers: dberris, #sanitizers, llvm-commits, davidxl
Tags: #sanitizers
Differential Revision: https://reviews.llvm.org/D83247
2020-07-07 02:05:12 +08:00
|
|
|
return MapDynamicShadow(PremapShadowSize(), /*mmap_alignment_scale*/ 3,
|
|
|
|
/*min_shadow_base_alignment*/ 0, kHighMemEnd);
|
2017-11-21 01:41:57 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
bool PremapShadowFailed() {
|
|
|
|
uptr shadow = reinterpret_cast<uptr>(&__asan_shadow);
|
|
|
|
uptr resolver = reinterpret_cast<uptr>(&__asan_premap_shadow);
|
|
|
|
// shadow == resolver is how Android KitKat and older handles ifunc.
|
|
|
|
// shadow == 0 just in case.
|
|
|
|
if (shadow == 0 || shadow == resolver)
|
|
|
|
return true;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
} // namespace __asan
|
|
|
|
|
|
|
|
extern "C" {
|
|
|
|
decltype(__asan_shadow)* __asan_premap_shadow() {
|
|
|
|
// The resolver may be called multiple times. Map the shadow just once.
|
|
|
|
static uptr premapped_shadow = 0;
|
|
|
|
if (!premapped_shadow) premapped_shadow = __asan::PremapShadow();
|
|
|
|
return reinterpret_cast<decltype(__asan_shadow)*>(premapped_shadow);
|
|
|
|
}
|
|
|
|
|
|
|
|
// __asan_shadow is a "function" that has the same address as the first byte of
|
|
|
|
// the shadow mapping.
|
|
|
|
INTERFACE_ATTRIBUTE __attribute__((ifunc("__asan_premap_shadow"))) void
|
|
|
|
__asan_shadow();
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif // ASAN_PREMAP_SHADOW
|