summaryrefslogtreecommitdiff
path: root/neozip/zsanitizer.h
blob: 2c55f9dacf3b677342c061b3ca90fe6345b4edf2 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
/* zsanitizer.h -- sanitizer instrumentation for deliberate OOB and uninitialized memory access.
 * For conditions of distribution and use, see copyright notice in zlib.h
 */

#ifndef ZSANITIZER_H
#define ZSANITIZER_H

/* Detect sanitizer availability */
#if defined(__has_feature)
#  if __has_feature(address_sanitizer)
#    define Z_ADDRESS_SANITIZER 1
#  endif
#  if __has_feature(memory_sanitizer)
#    define Z_MEMORY_SANITIZER 1
#  endif
#elif defined(__SANITIZE_ADDRESS__)  /* GCC supports ASAN only */
#  define Z_ADDRESS_SANITIZER 1
#endif

/* Include sanitizer headers */
#ifdef Z_MEMORY_SANITIZER
#  include <sanitizer/msan_interface.h>
#endif

/*
 * __asan_loadN() and __asan_storeN() calls are inserted by compilers in order to check memory accesses.
 * They can be called manually too, with the following caveats:
 * gcc says: "warning: implicit declaration of function '...'"
 * g++ says: "error: new declaration '...' ambiguates built-in declaration '...'"
 * Accommodate both.
 */
#ifdef Z_ADDRESS_SANITIZER
#  ifndef __cplusplus
void __asan_loadN(uintptr_t, uintptr_t);
void __asan_storeN(uintptr_t, uintptr_t);
#  endif
#else
#  define __asan_loadN(a, size) do { Z_UNUSED(a); Z_UNUSED(size); } while (0)
#  define __asan_storeN(a, size) do { Z_UNUSED(a); Z_UNUSED(size); } while (0)
#endif

/* Handle intentional uninitialized memory access */
#ifndef Z_MEMORY_SANITIZER
#  define __msan_check_mem_is_initialized(a, size) do { Z_UNUSED(a); Z_UNUSED(size); } while (0)
#  define __msan_unpoison(a, size) do { Z_UNUSED(a); Z_UNUSED(size); } while (0)
#endif

/* Notify sanitizer runtime about an upcoming read access. */
#define instrument_read(a, size) do {                     \
    uintptr_t __a = (uintptr_t)(a);                       \
    uintptr_t __size = size;                              \
    __asan_loadN(__a, __size);                            \
    __msan_check_mem_is_initialized((void *)__a, __size); \
} while (0)

/* Notify sanitizer runtime about an upcoming write access. */
#define instrument_write(a, size) do {  \
    uintptr_t __a = (uintptr_t)(a);     \
    uintptr_t __size = size;            \
    __asan_storeN(__a, __size);         \
} while (0)

/* Notify sanitizer runtime about an upcoming read/write access. */
#define instrument_read_write(a, size) do {               \
    uintptr_t __a = (uintptr_t)(a);                       \
    uintptr_t __size = size;                              \
    __asan_storeN(__a, __size);                           \
    __msan_check_mem_is_initialized((void *)__a, __size); \
} while (0)

#endif