123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101 |
- //===-- hwasan_setjmp_aarch64.S -------------------------------------------===//
- //
- // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
- // See https://llvm.org/LICENSE.txt for license information.
- // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
- //
- //===----------------------------------------------------------------------===//
- //
- // This file is a part of HWAddressSanitizer.
- //
- // HWAddressSanitizer runtime.
- //===----------------------------------------------------------------------===//
- #include "sanitizer_common/sanitizer_asm.h"
- #include "builtins/assembly.h"
- #if HWASAN_WITH_INTERCEPTORS && defined(__aarch64__)
- #include "sanitizer_common/sanitizer_platform.h"
- // We want to save the context of the calling function.
- // That requires
- // 1) No modification of the link register by this function.
- // 2) No modification of the stack pointer by this function.
- // 3) (no modification of any other saved register, but that's not really going
- // to occur, and hence isn't as much of a worry).
- //
- // There's essentially no way to ensure that the compiler will not modify the
- // stack pointer when compiling a C function.
- // Hence we have to write this function in assembly.
- .section .text
- .file "hwasan_setjmp_aarch64.S"
- .global __interceptor_setjmp
- ASM_TYPE_FUNCTION(__interceptor_setjmp)
- __interceptor_setjmp:
- CFI_STARTPROC
- BTI_C
- mov x1, #0
- b __interceptor_sigsetjmp
- CFI_ENDPROC
- ASM_SIZE(__interceptor_setjmp)
- #if SANITIZER_ANDROID
- // Bionic also defines a function `setjmp` that calls `sigsetjmp` saving the
- // current signal.
- .global __interceptor_setjmp_bionic
- ASM_TYPE_FUNCTION(__interceptor_setjmp_bionic)
- __interceptor_setjmp_bionic:
- CFI_STARTPROC
- BTI_C
- mov x1, #1
- b __interceptor_sigsetjmp
- CFI_ENDPROC
- ASM_SIZE(__interceptor_setjmp_bionic)
- #endif
- .global __interceptor_sigsetjmp
- ASM_TYPE_FUNCTION(__interceptor_sigsetjmp)
- __interceptor_sigsetjmp:
- CFI_STARTPROC
- BTI_C
- stp x19, x20, [x0, #0<<3]
- stp x21, x22, [x0, #2<<3]
- stp x23, x24, [x0, #4<<3]
- stp x25, x26, [x0, #6<<3]
- stp x27, x28, [x0, #8<<3]
- stp x29, x30, [x0, #10<<3]
- stp d8, d9, [x0, #14<<3]
- stp d10, d11, [x0, #16<<3]
- stp d12, d13, [x0, #18<<3]
- stp d14, d15, [x0, #20<<3]
- mov x2, sp
- str x2, [x0, #13<<3]
- // We always have the second argument to __sigjmp_save (savemask) set, since
- // the _setjmp function above has set it for us as `false`.
- // This function is defined in hwasan_interceptors.cc
- b __sigjmp_save
- CFI_ENDPROC
- ASM_SIZE(__interceptor_sigsetjmp)
- .macro WEAK_ALIAS first second
- .weak \second
- .equ \second\(), \first
- .endm
- #if SANITIZER_ANDROID
- WEAK_ALIAS __interceptor_sigsetjmp, sigsetjmp
- WEAK_ALIAS __interceptor_setjmp_bionic, setjmp
- #else
- WEAK_ALIAS __interceptor_sigsetjmp, __sigsetjmp
- #endif
- WEAK_ALIAS __interceptor_setjmp, _setjmp
- #endif
- // We do not need executable stack.
- NO_EXEC_STACK_DIRECTIVE
- GNU_PROPERTY_BTI_PAC
|