summaryrefslogtreecommitdiffstats
path: root/gnu/llvm/compiler-rt/lib/fuzzer/dataflow/DataFlowCallbacks.cpp
diff options
context:
space:
mode:
authorpatrick <patrick@openbsd.org>2020-08-10 21:03:40 +0000
committerpatrick <patrick@openbsd.org>2020-08-10 21:03:40 +0000
commit3cab2bb3f667058bece8e38b12449a63a9d73c4b (patch)
tree732ebd68e507f798225d97f4f2dd7ff8468d3e17 /gnu/llvm/compiler-rt/lib/fuzzer/dataflow/DataFlowCallbacks.cpp
parentReduce log spam. (diff)
downloadwireguard-openbsd-3cab2bb3f667058bece8e38b12449a63a9d73c4b.tar.xz
wireguard-openbsd-3cab2bb3f667058bece8e38b12449a63a9d73c4b.zip
Import compiler-rt 10.0.1 release.
ok kettenis@
Diffstat (limited to 'gnu/llvm/compiler-rt/lib/fuzzer/dataflow/DataFlowCallbacks.cpp')
-rw-r--r--gnu/llvm/compiler-rt/lib/fuzzer/dataflow/DataFlowCallbacks.cpp86
1 files changed, 86 insertions, 0 deletions
diff --git a/gnu/llvm/compiler-rt/lib/fuzzer/dataflow/DataFlowCallbacks.cpp b/gnu/llvm/compiler-rt/lib/fuzzer/dataflow/DataFlowCallbacks.cpp
new file mode 100644
index 00000000000..170b4d891d7
--- /dev/null
+++ b/gnu/llvm/compiler-rt/lib/fuzzer/dataflow/DataFlowCallbacks.cpp
@@ -0,0 +1,86 @@
+/*===- DataFlowCallbacks.cpp - a standalone DataFlow trace -------===//
+//
+// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
+// See https://llvm.org/LICENSE.txt for license information.
+// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
+//
+//===----------------------------------------------------------------------===//
+// Instrumentation callbacks for DataFlow.cpp.
+// These functions should not be instrumented by DFSan, so we
+// keep them in a separate file and compile it w/o DFSan.
+//===----------------------------------------------------------------------===*/
+#include "DataFlow.h"
+
+#include <cassert>
+#include <cstdio>
+#include <cstdlib>
+
+static __thread size_t CurrentFunc;
+static uint32_t *GuardsBeg, *GuardsEnd;
+static inline bool BlockIsEntry(size_t BlockIdx) {
+ return __dft.PCsBeg[BlockIdx * 2 + 1] & PCFLAG_FUNC_ENTRY;
+}
+
+extern "C" {
+
+void __sanitizer_cov_trace_pc_guard_init(uint32_t *start,
+ uint32_t *stop) {
+ assert(__dft.NumFuncs == 0 && "This tool does not support DSOs");
+ assert(start < stop && "The code is not instrumented for coverage");
+ if (start == stop || *start) return; // Initialize only once.
+ GuardsBeg = start;
+ GuardsEnd = stop;
+}
+
+void __sanitizer_cov_pcs_init(const uintptr_t *pcs_beg,
+ const uintptr_t *pcs_end) {
+ if (__dft.NumGuards) return; // Initialize only once.
+ __dft.NumGuards = GuardsEnd - GuardsBeg;
+ __dft.PCsBeg = pcs_beg;
+ __dft.PCsEnd = pcs_end;
+ assert(__dft.NumGuards == (__dft.PCsEnd - __dft.PCsBeg) / 2);
+ for (size_t i = 0; i < __dft.NumGuards; i++) {
+ if (BlockIsEntry(i)) {
+ __dft.NumFuncs++;
+ GuardsBeg[i] = __dft.NumFuncs;
+ }
+ }
+ __dft.BBExecuted = (bool*)calloc(__dft.NumGuards, sizeof(bool));
+ fprintf(stderr, "INFO: %zd instrumented function(s) observed "
+ "and %zd basic blocks\n", __dft.NumFuncs, __dft.NumGuards);
+}
+
+void __sanitizer_cov_trace_pc_indir(uint64_t x){} // unused.
+
+void __sanitizer_cov_trace_pc_guard(uint32_t *guard) {
+ size_t GuardIdx = guard - GuardsBeg;
+ // assert(GuardIdx < __dft.NumGuards);
+ __dft.BBExecuted[GuardIdx] = true;
+ if (!*guard) return; // not a function entry.
+ uint32_t FuncNum = *guard - 1; // Guards start from 1.
+ // assert(FuncNum < __dft.NumFuncs);
+ CurrentFunc = FuncNum;
+}
+
+void __dfsw___sanitizer_cov_trace_switch(uint64_t Val, uint64_t *Cases,
+ dfsan_label L1, dfsan_label UnusedL) {
+ assert(CurrentFunc < __dft.NumFuncs);
+ __dft.FuncLabels[CurrentFunc] |= L1;
+}
+
+#define HOOK(Name, Type) \
+ void Name(Type Arg1, Type Arg2, dfsan_label L1, dfsan_label L2) { \
+ __dft.FuncLabels[CurrentFunc] |= L1 | L2; \
+ }
+ //assert(CurrentFunc < __dft.NumFuncs);
+
+HOOK(__dfsw___sanitizer_cov_trace_const_cmp1, uint8_t)
+HOOK(__dfsw___sanitizer_cov_trace_const_cmp2, uint16_t)
+HOOK(__dfsw___sanitizer_cov_trace_const_cmp4, uint32_t)
+HOOK(__dfsw___sanitizer_cov_trace_const_cmp8, uint64_t)
+HOOK(__dfsw___sanitizer_cov_trace_cmp1, uint8_t)
+HOOK(__dfsw___sanitizer_cov_trace_cmp2, uint16_t)
+HOOK(__dfsw___sanitizer_cov_trace_cmp4, uint32_t)
+HOOK(__dfsw___sanitizer_cov_trace_cmp8, uint64_t)
+
+} // extern "C"