003 File Manager
Current Path:
/usr/src/contrib/llvm-project/compiler-rt/lib/scudo/standalone
usr
/
src
/
contrib
/
llvm-project
/
compiler-rt
/
lib
/
scudo
/
standalone
/
📁
..
📄
allocator_config.h
(2.57 KB)
📄
atomic_helpers.h
(4.16 KB)
📄
bytemap.h
(992 B)
📄
checksum.cpp
(2.52 KB)
📄
checksum.h
(1.67 KB)
📄
chunk.h
(5.83 KB)
📄
combined.h
(40.99 KB)
📄
common.cpp
(874 B)
📄
common.h
(5.29 KB)
📄
crc32_hw.cpp
(656 B)
📄
flags.cpp
(2.09 KB)
📄
flags.h
(975 B)
📄
flags.inc
(2.41 KB)
📄
flags_parser.cpp
(4.38 KB)
📄
flags_parser.h
(1.23 KB)
📄
fuchsia.cpp
(6.04 KB)
📄
fuchsia.h
(695 B)
📁
fuzz
📁
include
📄
internal_defs.h
(4.61 KB)
📄
linux.cpp
(6.1 KB)
📄
linux.h
(2.77 KB)
📄
list.h
(4.95 KB)
📄
local_cache.h
(5.21 KB)
📄
memtag.h
(7.21 KB)
📄
mutex.h
(1.69 KB)
📄
platform.h
(2.03 KB)
📄
primary32.h
(18.05 KB)
📄
primary64.h
(17.3 KB)
📄
quarantine.h
(9.64 KB)
📄
release.cpp
(522 B)
📄
release.h
(10.27 KB)
📄
report.cpp
(6.62 KB)
📄
report.h
(1.97 KB)
📄
secondary.h
(13.22 KB)
📄
size_class_map.h
(9.9 KB)
📄
stack_depot.h
(4.47 KB)
📄
stats.h
(2.77 KB)
📄
string_utils.cpp
(7.93 KB)
📄
string_utils.h
(1.05 KB)
📄
tsd.h
(1.84 KB)
📄
tsd_exclusive.h
(4.03 KB)
📄
tsd_shared.h
(5.53 KB)
📄
vector.h
(3.07 KB)
📄
wrappers_c.cpp
(1.19 KB)
📄
wrappers_c.h
(1.46 KB)
📄
wrappers_c.inc
(8.6 KB)
📄
wrappers_c_bionic.cpp
(2.23 KB)
📄
wrappers_c_checks.h
(1.99 KB)
📄
wrappers_cpp.cpp
(4.53 KB)
Editing: linux.cpp
//===-- linux.cpp -----------------------------------------------*- C++ -*-===// // // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. // See https://llvm.org/LICENSE.txt for license information. // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception // //===----------------------------------------------------------------------===// #include "platform.h" #if SCUDO_LINUX #include "common.h" #include "linux.h" #include "mutex.h" #include "string_utils.h" #include <errno.h> #include <fcntl.h> #include <linux/futex.h> #include <sched.h> #include <stdlib.h> #include <string.h> #include <sys/mman.h> #include <sys/stat.h> #include <sys/syscall.h> #include <sys/time.h> #include <time.h> #include <unistd.h> #if SCUDO_ANDROID #include <sys/prctl.h> // Definitions of prctl arguments to set a vma name in Android kernels. #define ANDROID_PR_SET_VMA 0x53564d41 #define ANDROID_PR_SET_VMA_ANON_NAME 0 #endif #ifdef ANDROID_EXPERIMENTAL_MTE #include <bionic/mte_kernel.h> #endif namespace scudo { uptr getPageSize() { return static_cast<uptr>(sysconf(_SC_PAGESIZE)); } void NORETURN die() { abort(); } void *map(void *Addr, uptr Size, UNUSED const char *Name, uptr Flags, UNUSED MapPlatformData *Data) { int MmapFlags = MAP_PRIVATE | MAP_ANONYMOUS; int MmapProt; if (Flags & MAP_NOACCESS) { MmapFlags |= MAP_NORESERVE; MmapProt = PROT_NONE; } else { MmapProt = PROT_READ | PROT_WRITE; #if defined(__aarch64__) && defined(ANDROID_EXPERIMENTAL_MTE) if (Flags & MAP_MEMTAG) MmapProt |= PROT_MTE; #endif } if (Addr) { // Currently no scenario for a noaccess mapping with a fixed address. DCHECK_EQ(Flags & MAP_NOACCESS, 0); MmapFlags |= MAP_FIXED; } void *P = mmap(Addr, Size, MmapProt, MmapFlags, -1, 0); if (P == MAP_FAILED) { if (!(Flags & MAP_ALLOWNOMEM) || errno != ENOMEM) dieOnMapUnmapError(errno == ENOMEM); return nullptr; } #if SCUDO_ANDROID if (!(Flags & MAP_NOACCESS)) prctl(ANDROID_PR_SET_VMA, ANDROID_PR_SET_VMA_ANON_NAME, P, Size, Name); #endif return P; } void unmap(void *Addr, uptr Size, UNUSED uptr Flags, UNUSED MapPlatformData *Data) { if (munmap(Addr, Size) != 0) dieOnMapUnmapError(); } void releasePagesToOS(uptr BaseAddress, uptr Offset, uptr Size, UNUSED MapPlatformData *Data) { void *Addr = reinterpret_cast<void *>(BaseAddress + Offset); while (madvise(Addr, Size, MADV_DONTNEED) == -1 && errno == EAGAIN) { } } // Calling getenv should be fine (c)(tm) at any time. const char *getEnv(const char *Name) { return getenv(Name); } namespace { enum State : u32 { Unlocked = 0, Locked = 1, Sleeping = 2 }; } bool HybridMutex::tryLock() { return atomic_compare_exchange(&M, Unlocked, Locked) == Unlocked; } // The following is based on https://akkadia.org/drepper/futex.pdf. void HybridMutex::lockSlow() { u32 V = atomic_compare_exchange(&M, Unlocked, Locked); if (V == Unlocked) return; if (V != Sleeping) V = atomic_exchange(&M, Sleeping, memory_order_acquire); while (V != Unlocked) { syscall(SYS_futex, reinterpret_cast<uptr>(&M), FUTEX_WAIT_PRIVATE, Sleeping, nullptr, nullptr, 0); V = atomic_exchange(&M, Sleeping, memory_order_acquire); } } void HybridMutex::unlock() { if (atomic_fetch_sub(&M, 1U, memory_order_release) != Locked) { atomic_store(&M, Unlocked, memory_order_release); syscall(SYS_futex, reinterpret_cast<uptr>(&M), FUTEX_WAKE_PRIVATE, 1, nullptr, nullptr, 0); } } u64 getMonotonicTime() { timespec TS; clock_gettime(CLOCK_MONOTONIC, &TS); return static_cast<u64>(TS.tv_sec) * (1000ULL * 1000 * 1000) + static_cast<u64>(TS.tv_nsec); } u32 getNumberOfCPUs() { cpu_set_t CPUs; // sched_getaffinity can fail for a variety of legitimate reasons (lack of // CAP_SYS_NICE, syscall filtering, etc), in which case we shall return 0. if (sched_getaffinity(0, sizeof(cpu_set_t), &CPUs) != 0) return 0; return static_cast<u32>(CPU_COUNT(&CPUs)); } u32 getThreadID() { #if SCUDO_ANDROID return static_cast<u32>(gettid()); #else return static_cast<u32>(syscall(SYS_gettid)); #endif } // Blocking is possibly unused if the getrandom block is not compiled in. bool getRandom(void *Buffer, uptr Length, UNUSED bool Blocking) { if (!Buffer || !Length || Length > MaxRandomLength) return false; ssize_t ReadBytes; #if defined(SYS_getrandom) #if !defined(GRND_NONBLOCK) #define GRND_NONBLOCK 1 #endif // Up to 256 bytes, getrandom will not be interrupted. ReadBytes = syscall(SYS_getrandom, Buffer, Length, Blocking ? 0 : GRND_NONBLOCK); if (ReadBytes == static_cast<ssize_t>(Length)) return true; #endif // defined(SYS_getrandom) // Up to 256 bytes, a read off /dev/urandom will not be interrupted. // Blocking is moot here, O_NONBLOCK has no effect when opening /dev/urandom. const int FileDesc = open("/dev/urandom", O_RDONLY); if (FileDesc == -1) return false; ReadBytes = read(FileDesc, Buffer, Length); close(FileDesc); return (ReadBytes == static_cast<ssize_t>(Length)); } // Allocation free syslog-like API. extern "C" WEAK int async_safe_write_log(int pri, const char *tag, const char *msg); void outputRaw(const char *Buffer) { if (&async_safe_write_log) { constexpr s32 AndroidLogInfo = 4; constexpr uptr MaxLength = 1024U; char LocalBuffer[MaxLength]; while (strlen(Buffer) > MaxLength) { uptr P; for (P = MaxLength - 1; P > 0; P--) { if (Buffer[P] == '\n') { memcpy(LocalBuffer, Buffer, P); LocalBuffer[P] = '\0'; async_safe_write_log(AndroidLogInfo, "scudo", LocalBuffer); Buffer = &Buffer[P + 1]; break; } } // If no newline was found, just log the buffer. if (P == 0) break; } async_safe_write_log(AndroidLogInfo, "scudo", Buffer); } else { write(2, Buffer, strlen(Buffer)); } } extern "C" WEAK void android_set_abort_message(const char *); void setAbortMessage(const char *Message) { if (&android_set_abort_message) android_set_abort_message(Message); } } // namespace scudo #endif // SCUDO_LINUX
Upload File
Create Folder