| //===-- hwasan_setjmp_aarch64.S -------------------------------------------===// |
| // |
| // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. |
| // See https://llvm.org/LICENSE.txt for license information. |
| // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception |
| // |
| //===----------------------------------------------------------------------===// |
| // |
| // This file is a part of HWAddressSanitizer. |
| // |
| // HWAddressSanitizer runtime. |
| //===----------------------------------------------------------------------===// |
| |
| #include "sanitizer_common/sanitizer_asm.h" |
| #include "builtins/assembly.h" |
| |
| #if HWASAN_WITH_INTERCEPTORS && defined(__aarch64__) |
| #include "sanitizer_common/sanitizer_platform.h" |
| |
| // We want to save the context of the calling function. |
| // That requires |
| // 1) No modification of the link register by this function. |
| // 2) No modification of the stack pointer by this function. |
| // 3) (no modification of any other saved register, but that's not really going |
| // to occur, and hence isn't as much of a worry). |
| // |
| // There's essentially no way to ensure that the compiler will not modify the |
| // stack pointer when compiling a C function. |
| // Hence we have to write this function in assembly. |
| |
| .section .text |
| .file "hwasan_setjmp_aarch64.S" |
| |
| .global ASM_WRAPPER_NAME(setjmp) |
| ASM_TYPE_FUNCTION(ASM_WRAPPER_NAME(setjmp)) |
| ASM_WRAPPER_NAME(setjmp): |
| CFI_STARTPROC |
| BTI_C |
| mov x1, #0 |
| b ASM_WRAPPER_NAME(sigsetjmp) |
| CFI_ENDPROC |
| ASM_SIZE(ASM_WRAPPER_NAME(setjmp)) |
| |
| #if SANITIZER_ANDROID |
| // Bionic also defines a function `setjmp` that calls `sigsetjmp` saving the |
| // current signal. |
| .global ASM_WRAPPER_NAME(setjmp_bionic) |
| ASM_TYPE_FUNCTION(ASM_WRAPPER_NAME(setjmp_bionic)) |
| ASM_WRAPPER_NAME(setjmp_bionic): |
| CFI_STARTPROC |
| BTI_C |
| mov x1, #1 |
| b ASM_WRAPPER_NAME(sigsetjmp) |
| CFI_ENDPROC |
| ASM_SIZE(ASM_WRAPPER_NAME(setjmp_bionic)) |
| |
| ASM_INTERCEPTOR_TRAMPOLINE(setjmp_bionic) |
| #endif |
| |
| .global ASM_WRAPPER_NAME(sigsetjmp) |
| ASM_TYPE_FUNCTION(ASM_WRAPPER_NAME(sigsetjmp)) |
| ASM_WRAPPER_NAME(sigsetjmp): |
| CFI_STARTPROC |
| BTI_C |
| stp x19, x20, [x0, #0<<3] |
| stp x21, x22, [x0, #2<<3] |
| stp x23, x24, [x0, #4<<3] |
| stp x25, x26, [x0, #6<<3] |
| stp x27, x28, [x0, #8<<3] |
| stp x29, x30, [x0, #10<<3] |
| stp d8, d9, [x0, #14<<3] |
| stp d10, d11, [x0, #16<<3] |
| stp d12, d13, [x0, #18<<3] |
| stp d14, d15, [x0, #20<<3] |
| mov x2, sp |
| str x2, [x0, #13<<3] |
| // We always have the second argument to __sigjmp_save (savemask) set, since |
| // the _setjmp function above has set it for us as `false`. |
| // This function is defined in hwasan_interceptors.cc |
| b __sigjmp_save |
| CFI_ENDPROC |
| ASM_SIZE(ASM_WRAPPER_NAME(sigsetjmp)) |
| |
| ASM_INTERCEPTOR_TRAMPOLINE(sigsetjmp) |
| |
| |
| #if SANITIZER_ANDROID |
| ASM_TRAMPOLINE_ALIAS(sigsetjmp, sigsetjmp) |
| ASM_TRAMPOLINE_ALIAS(setjmp, setjmp_bionic) |
| #else |
| ASM_TRAMPOLINE_ALIAS(__sigsetjmp, sigsetjmp) |
| #endif |
| |
| ASM_TRAMPOLINE_ALIAS(_setjmp, setjmp) |
| #endif |
| |
| // We do not need executable stack. |
| NO_EXEC_STACK_DIRECTIVE |
| |
| GNU_PROPERTY_BTI_PAC |