003 File Manager
Current Path:
/usr/src/contrib/llvm-project/compiler-rt/lib/hwasan
usr
/
src
/
contrib
/
llvm-project
/
compiler-rt
/
lib
/
hwasan
/
📁
..
📄
hwasan.cpp
(15.25 KB)
📄
hwasan.h
(5.69 KB)
📄
hwasan.syms.extra
(21 B)
📄
hwasan_allocator.cpp
(13.71 KB)
📄
hwasan_allocator.h
(3.26 KB)
📄
hwasan_blacklist.txt
(282 B)
📄
hwasan_checks.h
(4.04 KB)
📄
hwasan_dynamic_shadow.cpp
(5.17 KB)
📄
hwasan_dynamic_shadow.h
(838 B)
📄
hwasan_exceptions.cpp
(2.68 KB)
📄
hwasan_flags.h
(799 B)
📄
hwasan_flags.inc
(3.27 KB)
📄
hwasan_globals.cpp
(3.03 KB)
📄
hwasan_globals.h
(1.85 KB)
📄
hwasan_interceptors.cpp
(11.1 KB)
📄
hwasan_interceptors_vfork.S
(409 B)
📄
hwasan_interface_internal.h
(6.32 KB)
📄
hwasan_linux.cpp
(15.83 KB)
📄
hwasan_malloc_bisect.h
(1.67 KB)
📄
hwasan_mapping.h
(2.01 KB)
📄
hwasan_memintrinsics.cpp
(1.6 KB)
📄
hwasan_new_delete.cpp
(2.29 KB)
📄
hwasan_poisoning.cpp
(1.89 KB)
📄
hwasan_poisoning.h
(756 B)
📄
hwasan_report.cpp
(24.11 KB)
📄
hwasan_report.h
(1.2 KB)
📄
hwasan_setjmp.S
(2.81 KB)
📄
hwasan_tag_mismatch_aarch64.S
(5.89 KB)
📄
hwasan_thread.cpp
(3.9 KB)
📄
hwasan_thread.h
(2.82 KB)
📄
hwasan_thread_list.cpp
(442 B)
📄
hwasan_thread_list.h
(6.2 KB)
📄
hwasan_type_test.cpp
(918 B)
Editing: hwasan_checks.h
//===-- hwasan_checks.h -----------------------------------------*- C++ -*-===// // // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. // See https://llvm.org/LICENSE.txt for license information. // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception // //===----------------------------------------------------------------------===// // // This file is a part of HWAddressSanitizer. // //===----------------------------------------------------------------------===// #ifndef HWASAN_CHECKS_H #define HWASAN_CHECKS_H #include "hwasan_mapping.h" #include "sanitizer_common/sanitizer_common.h" namespace __hwasan { template <unsigned X> __attribute__((always_inline)) static void SigTrap(uptr p) { #if defined(__aarch64__) (void)p; // 0x900 is added to do not interfere with the kernel use of lower values of // brk immediate. register uptr x0 asm("x0") = p; asm("brk %1\n\t" ::"r"(x0), "n"(0x900 + X)); #elif defined(__x86_64__) // INT3 + NOP DWORD ptr [EAX + X] to pass X to our signal handler, 5 bytes // total. The pointer is passed via rdi. // 0x40 is added as a safeguard, to help distinguish our trap from others and // to avoid 0 offsets in the command (otherwise it'll be reduced to a // different nop command, the three bytes one). asm volatile( "int3\n" "nopl %c0(%%rax)\n" ::"n"(0x40 + X), "D"(p)); #else // FIXME: not always sigill. __builtin_trap(); #endif // __builtin_unreachable(); } // Version with access size which is not power of 2 template <unsigned X> __attribute__((always_inline)) static void SigTrap(uptr p, uptr size) { #if defined(__aarch64__) register uptr x0 asm("x0") = p; register uptr x1 asm("x1") = size; asm("brk %2\n\t" ::"r"(x0), "r"(x1), "n"(0x900 + X)); #elif defined(__x86_64__) // Size is stored in rsi. asm volatile( "int3\n" "nopl %c0(%%rax)\n" ::"n"(0x40 + X), "D"(p), "S"(size)); #else __builtin_trap(); #endif // __builtin_unreachable(); } __attribute__((always_inline, nodebug)) static bool PossiblyShortTagMatches( tag_t mem_tag, uptr ptr, uptr sz) { tag_t ptr_tag = GetTagFromPointer(ptr); if (ptr_tag == mem_tag) return true; if (mem_tag >= kShadowAlignment) return false; if ((ptr & (kShadowAlignment - 1)) + sz > mem_tag) return false; #ifndef __aarch64__ ptr = UntagAddr(ptr); #endif return *(u8 *)(ptr | (kShadowAlignment - 1)) == ptr_tag; } enum class ErrorAction { Abort, Recover }; enum class AccessType { Load, Store }; template <ErrorAction EA, AccessType AT, unsigned LogSize> __attribute__((always_inline, nodebug)) static void CheckAddress(uptr p) { uptr ptr_raw = p & ~kAddressTagMask; tag_t mem_tag = *(tag_t *)MemToShadow(ptr_raw); if (UNLIKELY(!PossiblyShortTagMatches(mem_tag, p, 1 << LogSize))) { SigTrap<0x20 * (EA == ErrorAction::Recover) + 0x10 * (AT == AccessType::Store) + LogSize>(p); if (EA == ErrorAction::Abort) __builtin_unreachable(); } } template <ErrorAction EA, AccessType AT> __attribute__((always_inline, nodebug)) static void CheckAddressSized(uptr p, uptr sz) { if (sz == 0) return; tag_t ptr_tag = GetTagFromPointer(p); uptr ptr_raw = p & ~kAddressTagMask; tag_t *shadow_first = (tag_t *)MemToShadow(ptr_raw); tag_t *shadow_last = (tag_t *)MemToShadow(ptr_raw + sz); for (tag_t *t = shadow_first; t < shadow_last; ++t) if (UNLIKELY(ptr_tag != *t)) { SigTrap<0x20 * (EA == ErrorAction::Recover) + 0x10 * (AT == AccessType::Store) + 0xf>(p, sz); if (EA == ErrorAction::Abort) __builtin_unreachable(); } uptr end = p + sz; uptr tail_sz = end & 0xf; if (UNLIKELY(tail_sz != 0 && !PossiblyShortTagMatches( *shadow_last, end & ~(kShadowAlignment - 1), tail_sz))) { SigTrap<0x20 * (EA == ErrorAction::Recover) + 0x10 * (AT == AccessType::Store) + 0xf>(p, sz); if (EA == ErrorAction::Abort) __builtin_unreachable(); } } } // end namespace __hwasan #endif // HWASAN_CHECKS_H
Upload File
Create Folder