File: rlbox_range.hpp

package info (click to toggle)
firefox 147.0.3-1
  • links: PTS, VCS
  • area: main
  • in suites: sid
  • size: 4,683,320 kB
  • sloc: cpp: 7,607,359; javascript: 6,533,295; ansic: 3,775,223; python: 1,415,500; xml: 634,561; asm: 438,949; java: 186,241; sh: 62,752; makefile: 18,079; objc: 13,092; perl: 12,808; yacc: 4,583; cs: 3,846; pascal: 3,448; lex: 1,720; ruby: 1,003; php: 436; lisp: 258; awk: 247; sql: 66; sed: 54; csh: 10; exp: 6
file content (32 lines) | stat: -rw-r--r-- 894 bytes parent folder | download | duplicates (24)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32

#pragma once
// IWYU pragma: private, include "rlbox.hpp"
// IWYU pragma: friend "rlbox_.*\.hpp"

#include <cstdint>

#include "rlbox_types.hpp"

namespace rlbox::detail {

// Checks that a given range is either entirely in a sandbox or entirely
// outside
template<typename T_Sbx>
inline void check_range_doesnt_cross_app_sbx_boundary(const void* ptr,
                                                      size_t size)
{
  auto ptr_start_val = reinterpret_cast<uintptr_t>(ptr);
  detail::dynamic_check(
    ptr_start_val,
    "Performing memory operation memset/memcpy on a null pointer");
  auto ptr_end_val = ptr_start_val + size - 1;

  auto ptr_start = reinterpret_cast<void*>(ptr_start_val);
  auto ptr_end = reinterpret_cast<void*>(ptr_end_val);

  detail::dynamic_check(
    rlbox_sandbox<T_Sbx>::is_in_same_sandbox(ptr_start, ptr_end),
    "range has overflowed sandbox bounds");
}

}