File: msan_dl.cpp

package info (click to toggle)
llvm-toolchain-19 1%3A19.1.7-10.1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 1,999,140 kB
  • sloc: cpp: 6,951,711; ansic: 1,486,157; asm: 913,598; python: 232,024; f90: 80,126; objc: 75,281; lisp: 37,276; pascal: 16,990; sh: 10,033; ml: 5,058; perl: 4,724; awk: 3,523; makefile: 3,252; javascript: 2,504; xml: 892; fortran: 664; cs: 573
file content (65 lines) | stat: -rw-r--r-- 1,944 bytes parent folder | download | duplicates (28)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
//===-- msan_dl.cpp -------------------------------------------------------===//
//
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
// See https://llvm.org/LICENSE.txt for license information.
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
//
//===----------------------------------------------------------------------===//
//
// This file is a part of MemorySanitizer.
//
// Helper functions for unpoisoning results of dladdr and dladdr1.
//===----------------------------------------------------------------------===//

#include "msan_dl.h"

#include <dlfcn.h>
#include <elf.h>
#include <link.h>

#include "msan_poisoning.h"

namespace __msan {

void UnpoisonDllAddrInfo(void *info) {
  Dl_info *ptr = (Dl_info *)(info);
  __msan_unpoison(ptr, sizeof(*ptr));
  if (ptr->dli_fname)
    __msan_unpoison(ptr->dli_fname, internal_strlen(ptr->dli_fname) + 1);
  if (ptr->dli_sname)
    __msan_unpoison(ptr->dli_sname, internal_strlen(ptr->dli_sname) + 1);
}

#if SANITIZER_GLIBC
void UnpoisonDllAddr1ExtraInfo(void **extra_info, int flags) {
  if (flags == RTLD_DL_SYMENT) {
    __msan_unpoison(extra_info, sizeof(void *));

    ElfW(Sym) *s = *((ElfW(Sym) **)(extra_info));
    __msan_unpoison(s, sizeof(ElfW(Sym)));
  } else if (flags == RTLD_DL_LINKMAP) {
    __msan_unpoison(extra_info, sizeof(void *));

    struct link_map *map = *((struct link_map **)(extra_info));

    // Walk forward
    for (auto *ptr = map; ptr; ptr = ptr->l_next) {
      __msan_unpoison(ptr, sizeof(struct link_map));
      if (ptr->l_name)
        __msan_unpoison(ptr->l_name, internal_strlen(ptr->l_name) + 1);
    }

    if (!map)
      return;

    // Walk backward
    for (auto *ptr = map->l_prev; ptr; ptr = ptr->l_prev) {
      __msan_unpoison(ptr, sizeof(struct link_map));
      if (ptr->l_name)
        __msan_unpoison(ptr->l_name, internal_strlen(ptr->l_name) + 1);
    }
  }
}
#endif

}  // namespace __msan