003 File Manager
Current Path:
/usr/src/contrib/llvm-project/compiler-rt/lib/hwasan
usr
/
src
/
contrib
/
llvm-project
/
compiler-rt
/
lib
/
hwasan
/
📁
..
📄
hwasan.cpp
(15.25 KB)
📄
hwasan.h
(5.69 KB)
📄
hwasan.syms.extra
(21 B)
📄
hwasan_allocator.cpp
(13.71 KB)
📄
hwasan_allocator.h
(3.26 KB)
📄
hwasan_blacklist.txt
(282 B)
📄
hwasan_checks.h
(4.04 KB)
📄
hwasan_dynamic_shadow.cpp
(5.17 KB)
📄
hwasan_dynamic_shadow.h
(838 B)
📄
hwasan_exceptions.cpp
(2.68 KB)
📄
hwasan_flags.h
(799 B)
📄
hwasan_flags.inc
(3.27 KB)
📄
hwasan_globals.cpp
(3.03 KB)
📄
hwasan_globals.h
(1.85 KB)
📄
hwasan_interceptors.cpp
(11.1 KB)
📄
hwasan_interceptors_vfork.S
(409 B)
📄
hwasan_interface_internal.h
(6.32 KB)
📄
hwasan_linux.cpp
(15.83 KB)
📄
hwasan_malloc_bisect.h
(1.67 KB)
📄
hwasan_mapping.h
(2.01 KB)
📄
hwasan_memintrinsics.cpp
(1.6 KB)
📄
hwasan_new_delete.cpp
(2.29 KB)
📄
hwasan_poisoning.cpp
(1.89 KB)
📄
hwasan_poisoning.h
(756 B)
📄
hwasan_report.cpp
(24.11 KB)
📄
hwasan_report.h
(1.2 KB)
📄
hwasan_setjmp.S
(2.81 KB)
📄
hwasan_tag_mismatch_aarch64.S
(5.89 KB)
📄
hwasan_thread.cpp
(3.9 KB)
📄
hwasan_thread.h
(2.82 KB)
📄
hwasan_thread_list.cpp
(442 B)
📄
hwasan_thread_list.h
(6.2 KB)
📄
hwasan_type_test.cpp
(918 B)
Editing: hwasan_dynamic_shadow.cpp
//===-- hwasan_dynamic_shadow.cpp -------------------------------*- C++ -*-===// // // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. // See https://llvm.org/LICENSE.txt for license information. // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception // //===----------------------------------------------------------------------===// /// /// \file /// This file is a part of HWAddressSanitizer. It reserves dynamic shadow memory /// region and handles ifunc resolver case, when necessary. /// //===----------------------------------------------------------------------===// #include "hwasan.h" #include "hwasan_dynamic_shadow.h" #include "hwasan_mapping.h" #include "sanitizer_common/sanitizer_common.h" #include "sanitizer_common/sanitizer_posix.h" #include <elf.h> #include <link.h> // The code in this file needs to run in an unrelocated binary. It should not // access any external symbol, including its own non-hidden globals. namespace __hwasan { static void UnmapFromTo(uptr from, uptr to) { if (to == from) return; CHECK(to >= from); uptr res = internal_munmap(reinterpret_cast<void *>(from), to - from); if (UNLIKELY(internal_iserror(res))) { Report("ERROR: %s failed to unmap 0x%zx (%zd) bytes at address %p\n", SanitizerToolName, to - from, to - from, from); CHECK("unable to unmap" && 0); } } // Returns an address aligned to kShadowBaseAlignment, such that // 2**kShadowBaseAlingment on the left and shadow_size_bytes bytes on the right // of it are mapped no access. static uptr MapDynamicShadow(uptr shadow_size_bytes) { const uptr granularity = GetMmapGranularity(); const uptr min_alignment = granularity << kShadowScale; const uptr alignment = 1ULL << kShadowBaseAlignment; CHECK_GE(alignment, min_alignment); const uptr left_padding = 1ULL << kShadowBaseAlignment; const uptr shadow_size = RoundUpTo(shadow_size_bytes, granularity); const uptr map_size = shadow_size + left_padding + alignment; const uptr map_start = (uptr)MmapNoAccess(map_size); CHECK_NE(map_start, ~(uptr)0); const uptr shadow_start = RoundUpTo(map_start + left_padding, alignment); UnmapFromTo(map_start, shadow_start - left_padding); UnmapFromTo(shadow_start + shadow_size, map_start + map_size); return shadow_start; } } // namespace __hwasan #if SANITIZER_ANDROID extern "C" { INTERFACE_ATTRIBUTE void __hwasan_shadow(); decltype(__hwasan_shadow)* __hwasan_premap_shadow(); } // extern "C" namespace __hwasan { // Conservative upper limit. static uptr PremapShadowSize() { return RoundUpTo(GetMaxVirtualAddress() >> kShadowScale, GetMmapGranularity()); } static uptr PremapShadow() { return MapDynamicShadow(PremapShadowSize()); } static bool IsPremapShadowAvailable() { const uptr shadow = reinterpret_cast<uptr>(&__hwasan_shadow); const uptr resolver = reinterpret_cast<uptr>(&__hwasan_premap_shadow); // shadow == resolver is how Android KitKat and older handles ifunc. // shadow == 0 just in case. return shadow != 0 && shadow != resolver; } static uptr FindPremappedShadowStart(uptr shadow_size_bytes) { const uptr granularity = GetMmapGranularity(); const uptr shadow_start = reinterpret_cast<uptr>(&__hwasan_shadow); const uptr premap_shadow_size = PremapShadowSize(); const uptr shadow_size = RoundUpTo(shadow_size_bytes, granularity); // We may have mapped too much. Release extra memory. UnmapFromTo(shadow_start + shadow_size, shadow_start + premap_shadow_size); return shadow_start; } } // namespace __hwasan extern "C" { decltype(__hwasan_shadow)* __hwasan_premap_shadow() { // The resolver might be called multiple times. Map the shadow just once. static __sanitizer::uptr shadow = 0; if (!shadow) shadow = __hwasan::PremapShadow(); return reinterpret_cast<decltype(__hwasan_shadow)*>(shadow); } // __hwasan_shadow is a "function" that has the same address as the first byte // of the shadow mapping. INTERFACE_ATTRIBUTE __attribute__((ifunc("__hwasan_premap_shadow"))) void __hwasan_shadow(); extern __attribute((weak, visibility("hidden"))) ElfW(Rela) __rela_iplt_start[], __rela_iplt_end[]; } // extern "C" namespace __hwasan { void InitShadowGOT() { // Call the ifunc resolver for __hwasan_shadow and fill in its GOT entry. This // needs to be done before other ifunc resolvers (which are handled by libc) // because a resolver might read __hwasan_shadow. typedef ElfW(Addr) (*ifunc_resolver_t)(void); for (ElfW(Rela) *r = __rela_iplt_start; r != __rela_iplt_end; ++r) { ElfW(Addr)* offset = reinterpret_cast<ElfW(Addr)*>(r->r_offset); ElfW(Addr) resolver = r->r_addend; if (resolver == reinterpret_cast<ElfW(Addr)>(&__hwasan_premap_shadow)) { *offset = reinterpret_cast<ifunc_resolver_t>(resolver)(); break; } } } uptr FindDynamicShadowStart(uptr shadow_size_bytes) { if (IsPremapShadowAvailable()) return FindPremappedShadowStart(shadow_size_bytes); return MapDynamicShadow(shadow_size_bytes); } } // namespace __hwasan #else namespace __hwasan { void InitShadowGOT() {} uptr FindDynamicShadowStart(uptr shadow_size_bytes) { return MapDynamicShadow(shadow_size_bytes); } } // namespace __hwasan #endif // SANITIZER_ANDROID
Upload File
Create Folder