You've already forked linux-packaging-mono
							
							
		
			
				
	
	
		
			84 lines
		
	
	
		
			2.5 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
			
		
		
	
	
			84 lines
		
	
	
		
			2.5 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
| //===-- esan.cpp ----------------------------------------------------------===//
 | |
| //
 | |
| //                     The LLVM Compiler Infrastructure
 | |
| //
 | |
| // This file is distributed under the University of Illinois Open Source
 | |
| // License. See LICENSE.TXT for details.
 | |
| //
 | |
| //===----------------------------------------------------------------------===//
 | |
| //
 | |
| // This file is a part of EfficiencySanitizer, a family of performance tuners.
 | |
| //
 | |
| // Linux-specific code for the Esan run-time.
 | |
| //===----------------------------------------------------------------------===//
 | |
| 
 | |
| #include "sanitizer_common/sanitizer_platform.h"
 | |
| #if SANITIZER_FREEBSD || SANITIZER_LINUX
 | |
| 
 | |
| #include "esan.h"
 | |
| #include "esan_shadow.h"
 | |
| #include "interception/interception.h"
 | |
| #include "sanitizer_common/sanitizer_common.h"
 | |
| #include <sys/mman.h>
 | |
| #include <errno.h>
 | |
| 
 | |
| namespace __esan {
 | |
| 
 | |
| void verifyAddressSpace() {
 | |
| #if SANITIZER_LINUX && (defined(__x86_64__) || SANITIZER_MIPS64)
 | |
|   // The kernel determines its mmap base from the stack size limit.
 | |
|   // Our Linux 64-bit shadow mapping assumes the stack limit is less than a
 | |
|   // terabyte, which keeps the mmap region above 0x7e00'.
 | |
|   uptr StackLimit = GetStackSizeLimitInBytes();
 | |
|   if (StackSizeIsUnlimited() || StackLimit > MaxStackSize) {
 | |
|     VReport(1, "The stack size limit is beyond the maximum supported.\n"
 | |
|             "Re-execing with a stack size below 1TB.\n");
 | |
|     SetStackSizeLimitInBytes(MaxStackSize);
 | |
|     ReExec();
 | |
|   }
 | |
| #endif
 | |
| }
 | |
| 
 | |
| static bool liesWithinSingleAppRegion(uptr Start, SIZE_T Size) {
 | |
|   uptr AppStart, AppEnd;
 | |
|   for (int i = 0; getAppRegion(i, &AppStart, &AppEnd); ++i) {
 | |
|     if (Start >= AppStart && Start + Size - 1 <= AppEnd) {
 | |
|       return true;
 | |
|     }
 | |
|   }
 | |
|   return false;
 | |
| }
 | |
| 
 | |
| bool fixMmapAddr(void **Addr, SIZE_T Size, int Flags) {
 | |
|   if (*Addr) {
 | |
|     if (!liesWithinSingleAppRegion((uptr)*Addr, Size)) {
 | |
|       VPrintf(1, "mmap conflict: [%p-%p) is not in an app region\n",
 | |
|               *Addr, (uptr)*Addr + Size);
 | |
|       if (Flags & MAP_FIXED) {
 | |
|         errno = EINVAL;
 | |
|         return false;
 | |
|       } else {
 | |
|         *Addr = 0;
 | |
|       }
 | |
|     }
 | |
|   }
 | |
|   return true;
 | |
| }
 | |
| 
 | |
| uptr checkMmapResult(uptr Addr, SIZE_T Size) {
 | |
|   if ((void *)Addr == MAP_FAILED)
 | |
|     return Addr;
 | |
|   if (!liesWithinSingleAppRegion(Addr, Size)) {
 | |
|     // FIXME: attempt to dynamically add this as an app region if it
 | |
|     // fits our shadow criteria.
 | |
|     // We could also try to remap somewhere else.
 | |
|     Printf("ERROR: unsupported mapping at [%p-%p)\n", Addr, Addr+Size);
 | |
|     Die();
 | |
|   }
 | |
|   return Addr;
 | |
| }
 | |
| 
 | |
| } // namespace __esan
 | |
| 
 | |
| #endif // SANITIZER_FREEBSD || SANITIZER_LINUX
 |