• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 //===-- esan.cpp ----------------------------------------------------------===//
2 //
3 //                     The LLVM Compiler Infrastructure
4 //
5 // This file is distributed under the University of Illinois Open Source
6 // License. See LICENSE.TXT for details.
7 //
8 //===----------------------------------------------------------------------===//
9 //
10 // This file is a part of EfficiencySanitizer, a family of performance tuners.
11 //
12 // Linux-specific code for the Esan run-time.
13 //===----------------------------------------------------------------------===//
14 
15 #include "sanitizer_common/sanitizer_platform.h"
16 #if SANITIZER_FREEBSD || SANITIZER_LINUX
17 
18 #include "esan.h"
19 #include "esan_shadow.h"
20 #include "interception/interception.h"
21 #include "sanitizer_common/sanitizer_common.h"
22 #include <sys/mman.h>
23 #include <errno.h>
24 
25 namespace __esan {
26 
verifyAddressSpace()27 void verifyAddressSpace() {
28 #if SANITIZER_LINUX && defined(__x86_64__)
29   // The kernel determines its mmap base from the stack size limit.
30   // Our Linux 64-bit shadow mapping assumes the stack limit is less than a
31   // terabyte, which keeps the mmap region above 0x7e00'.
32   uptr StackLimit = GetStackSizeLimitInBytes();
33   if (StackSizeIsUnlimited() || StackLimit > MaxStackSize) {
34     VReport(1, "The stack size limit is beyond the maximum supported.\n"
35             "Re-execing with a stack size below 1TB.\n");
36     SetStackSizeLimitInBytes(MaxStackSize);
37     ReExec();
38   }
39 #endif
40 }
41 
liesWithinSingleAppRegion(uptr Start,SIZE_T Size)42 static bool liesWithinSingleAppRegion(uptr Start, SIZE_T Size) {
43   uptr AppStart, AppEnd;
44   for (int i = 0; getAppRegion(i, &AppStart, &AppEnd); ++i) {
45     if (Start >= AppStart && Start + Size - 1 <= AppEnd) {
46       return true;
47     }
48   }
49   return false;
50 }
51 
fixMmapAddr(void ** Addr,SIZE_T Size,int Flags)52 bool fixMmapAddr(void **Addr, SIZE_T Size, int Flags) {
53   if (*Addr) {
54     if (!liesWithinSingleAppRegion((uptr)*Addr, Size)) {
55       VPrintf(1, "mmap conflict: [%p-%p) is not in an app region\n",
56               *Addr, (uptr)*Addr + Size);
57       if (Flags & MAP_FIXED) {
58         errno = EINVAL;
59         return false;
60       } else {
61         *Addr = 0;
62       }
63     }
64   }
65   return true;
66 }
67 
checkMmapResult(uptr Addr,SIZE_T Size)68 uptr checkMmapResult(uptr Addr, SIZE_T Size) {
69   if ((void *)Addr == MAP_FAILED)
70     return Addr;
71   if (!liesWithinSingleAppRegion(Addr, Size)) {
72     // FIXME: attempt to dynamically add this as an app region if it
73     // fits our shadow criteria.
74     // We could also try to remap somewhere else.
75     Printf("ERROR: unsupported mapping at [%p-%p)\n", Addr, Addr+Size);
76     Die();
77   }
78   return Addr;
79 }
80 
81 } // namespace __esan
82 
83 #endif // SANITIZER_FREEBSD || SANITIZER_LINUX
84