mirror of
https://github.com/llvm/llvm-project.git
synced 2025-04-16 15:26:47 +00:00

MemoryAccessRangeT overestimates the size of the shadow region by 8x, occasionally leading to assertion failure: ``` RawShadow* shadow_mem = MemToShadow(addr); ... // Check that end of shadow is valid if (!IsShadowMem(shadow_mem + size * kShadowCnt - 1)) { DCHECK(IsShadowMem(shadow_mem + size * kShadowCnt - 1)); ``` It is erroneous for two separate reasons: - it uses kShadowCnt (== 4) instead of kShadowMultiplier (== 2) - since shadow_mem is a RawShadow*, pointer arithmetic is multiplied by sizeof(RawShadow) == 4 This patch fixes the calculation, and also improves the debugging information. The assertion error was observed on a buildbot (https://lab.llvm.org/staging/#/builders/89/builds/656/steps/13/logs/stdio): ``` Bad shadow addr 0x3000000190bc (7fffffffe85f) ThreadSanitizer: CHECK failed: tsan_rtl_access.cpp:690 "((IsShadowMem(shadow_mem + size * kShadowCnt - 1))) != (0)" (0x0, 0x0) (tid=2202676) ``` Notice that 0x3000000190bc is not the correct shadow for the end address 0x7fffffffe85f. This error is more commonly observed on high-entropy ASLR systems, since ASLR may be disabled (if the randomized memory layout is incompatible), leading to an allocation near the boundaries of the high app memory region (and therefore a shadow end that may be erroneously calculated to be past the end of the shadow region). Also note that the assertion is guarded by SANITIZER_DEBUG. --------- Co-authored-by: Vitaly Buka <vitalybuka@gmail.com>