mirror of
https://github.com/gcc-mirror/gcc.git
synced 2024-11-21 13:40:47 +00:00
28219f7f99
The following patch is result of libsanitizer/merge.sh from c425db2eb558c263 (yesterday evening). Bootstrapped/regtested on x86_64-linux and i686-linux (together with the follow-up 3 patches I'm about to post). BTW, seems upstream has added riscv64 support for I think lsan/tsan, so if anyone is willing to try it there, it would be a matter of copying e.g. the s390*-*-linux* libsanitizer/configure.tgt entry to riscv64-*-linux* with the obvious s/s390x/riscv64/ change in it.
103 lines
2.9 KiB
ArmAsm
103 lines
2.9 KiB
ArmAsm
//===-- hwasan_setjmp_aarch64.S -------------------------------------------===//
|
|
//
|
|
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
|
|
// See https://llvm.org/LICENSE.txt for license information.
|
|
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
|
|
//
|
|
//===----------------------------------------------------------------------===//
|
|
//
|
|
// This file is a part of HWAddressSanitizer.
|
|
//
|
|
// HWAddressSanitizer runtime.
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
#include "sanitizer_common/sanitizer_asm.h"
|
|
#include "builtins/assembly.h"
|
|
|
|
#if HWASAN_WITH_INTERCEPTORS && defined(__aarch64__)
|
|
#include "sanitizer_common/sanitizer_platform.h"
|
|
|
|
// We want to save the context of the calling function.
|
|
// That requires
|
|
// 1) No modification of the link register by this function.
|
|
// 2) No modification of the stack pointer by this function.
|
|
// 3) (no modification of any other saved register, but that's not really going
|
|
// to occur, and hence isn't as much of a worry).
|
|
//
|
|
// There's essentially no way to ensure that the compiler will not modify the
|
|
// stack pointer when compiling a C function.
|
|
// Hence we have to write this function in assembly.
|
|
|
|
.section .text
|
|
.file "hwasan_setjmp_aarch64.S"
|
|
|
|
.global ASM_WRAPPER_NAME(setjmp)
|
|
ASM_TYPE_FUNCTION(ASM_WRAPPER_NAME(setjmp))
|
|
ASM_WRAPPER_NAME(setjmp):
|
|
CFI_STARTPROC
|
|
BTI_C
|
|
mov x1, #0
|
|
b ASM_WRAPPER_NAME(sigsetjmp)
|
|
CFI_ENDPROC
|
|
ASM_SIZE(ASM_WRAPPER_NAME(setjmp))
|
|
|
|
ASM_INTERCEPTOR_TRAMPOLINE(setjmp)
|
|
|
|
#if SANITIZER_ANDROID
|
|
// Bionic also defines a function `setjmp` that calls `sigsetjmp` saving the
|
|
// current signal.
|
|
.global ASM_WRAPPER_NAME(setjmp_bionic)
|
|
ASM_TYPE_FUNCTION(ASM_WRAPPER_NAME(setjmp_bionic))
|
|
ASM_WRAPPER_NAME(setjmp_bionic):
|
|
CFI_STARTPROC
|
|
BTI_C
|
|
mov x1, #1
|
|
b ASM_WRAPPER_NAME(sigsetjmp)
|
|
CFI_ENDPROC
|
|
ASM_SIZE(ASM_WRAPPER_NAME(setjmp_bionic))
|
|
|
|
ASM_INTERCEPTOR_TRAMPOLINE(setjmp_bionic)
|
|
#endif
|
|
|
|
.global ASM_WRAPPER_NAME(sigsetjmp)
|
|
ASM_TYPE_FUNCTION(ASM_WRAPPER_NAME(sigsetjmp))
|
|
ASM_WRAPPER_NAME(sigsetjmp):
|
|
CFI_STARTPROC
|
|
BTI_C
|
|
stp x19, x20, [x0, #0<<3]
|
|
stp x21, x22, [x0, #2<<3]
|
|
stp x23, x24, [x0, #4<<3]
|
|
stp x25, x26, [x0, #6<<3]
|
|
stp x27, x28, [x0, #8<<3]
|
|
stp x29, x30, [x0, #10<<3]
|
|
stp d8, d9, [x0, #14<<3]
|
|
stp d10, d11, [x0, #16<<3]
|
|
stp d12, d13, [x0, #18<<3]
|
|
stp d14, d15, [x0, #20<<3]
|
|
mov x2, sp
|
|
str x2, [x0, #13<<3]
|
|
// We always have the second argument to __sigjmp_save (savemask) set, since
|
|
// the _setjmp function above has set it for us as `false`.
|
|
// This function is defined in hwasan_interceptors.cc
|
|
b __sigjmp_save
|
|
CFI_ENDPROC
|
|
ASM_SIZE(ASM_WRAPPER_NAME(sigsetjmp))
|
|
|
|
ASM_INTERCEPTOR_TRAMPOLINE(sigsetjmp)
|
|
|
|
|
|
#if SANITIZER_ANDROID
|
|
ASM_TRAMPOLINE_ALIAS(sigsetjmp, sigsetjmp)
|
|
ASM_TRAMPOLINE_ALIAS(setjmp, setjmp_bionic)
|
|
#else
|
|
ASM_TRAMPOLINE_ALIAS(__sigsetjmp, sigsetjmp)
|
|
#endif
|
|
|
|
ASM_TRAMPOLINE_ALIAS(_setjmp, setjmp)
|
|
#endif
|
|
|
|
// We do not need executable stack.
|
|
NO_EXEC_STACK_DIRECTIVE
|
|
|
|
GNU_PROPERTY_BTI_PAC
|