Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(855)

Unified Diff: nacl_bindings/mojo_syscall_internal.h

Issue 1086743002: Support pointers in the NaCl bindings generator. (Closed) Base URL: git@github.com:domokit/mojo.git@master
Patch Set: Tweaks Created 5 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « no previous file | nacl_bindings_generator/generate_nacl_bindings.py » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: nacl_bindings/mojo_syscall_internal.h
diff --git a/nacl_bindings/mojo_syscall_internal.h b/nacl_bindings/mojo_syscall_internal.h
index 9200c1a1b3f37256a9e77220573cff47e035232b..2f67e3a669bc3a7d73239c74f80df41679fcc6cb 100644
--- a/nacl_bindings/mojo_syscall_internal.h
+++ b/nacl_bindings/mojo_syscall_internal.h
@@ -5,6 +5,8 @@
#ifndef MOJO_NACL_MOJO_SYSCALL_INTERNAL_H_
#define MOJO_NACL_MOJO_SYSCALL_INTERNAL_H_
+#include <type_traits>
+
#include "native_client/src/trusted/service_runtime/nacl_copy.h"
#include "native_client/src/trusted/service_runtime/sel_ldr.h"
@@ -51,7 +53,70 @@ static inline void memcpy_volatile_out(void volatile* dst,
}
template <typename T>
+bool ConvertPointerInput(struct NaClApp* nap, uint32_t user_ptr, T** value) {
+ if (user_ptr) {
+ uintptr_t temp = NaClUserToSysAddr(nap, user_ptr);
+ if (temp != kNaClBadAddress) {
+ *value = reinterpret_cast<T*>(temp);
+ return true;
+ }
+ } else {
+ *value = nullptr;
+ return true;
+ }
+ *value = nullptr; // Paranoia.
+ return false;
+}
+
+template <typename T>
+bool ConvertPointerInOut(struct NaClApp* nap,
+ uint32_t user_ptr,
+ bool optional,
+ T** value,
+ uint32_t volatile** sys_ptr) {
+ if (user_ptr) {
+ uintptr_t temp = NaClUserToSysAddrRange(nap, user_ptr, sizeof(uint32_t));
+ if (temp != kNaClBadAddress) {
+ uint32_t volatile* converted_ptr =
+ reinterpret_cast<uint32_t volatile*>(temp);
+ uint32_t raw_value = *converted_ptr;
+ if (!raw_value) {
+ *sys_ptr = converted_ptr;
+ *value = nullptr;
+ return true;
+ }
+ uintptr_t temp = NaClUserToSysAddr(nap, raw_value);
+ if (temp != kNaClBadAddress) {
+ *sys_ptr = converted_ptr;
+ *value = reinterpret_cast<T*>(temp);
+ return true;
+ }
+ }
+ } else if (optional) {
+ *sys_ptr = nullptr;
+ *value = nullptr; // Paranoia.
+ return true;
+ }
+ *sys_ptr = nullptr; // Paranoia.
+ *value = nullptr; // Paranoia.
+ return false;
+}
+
+template <typename T>
+void CopyOutPointer(struct NaClApp* nap, T* value, uint32_t volatile* sys_ptr) {
+ if (value) {
+ // Will kill the process if value if the pointer does not lie in the
+ // sandbox.
+ uintptr_t temp = NaClSysToUser(nap, reinterpret_cast<uintptr_t>(value));
+ *sys_ptr = static_cast<uint32_t>(temp);
+ } else {
+ *sys_ptr = 0;
+ }
+}
+
+template <typename T>
bool ConvertScalarInput(struct NaClApp* nap, uint32_t user_ptr, T* value) {
+ static_assert(!std::is_pointer<T>::value, "do not use for pointer types");
if (user_ptr) {
uintptr_t temp = NaClUserToSysAddrRange(nap, user_ptr, sizeof(T));
if (temp != kNaClBadAddress) {
@@ -67,6 +132,7 @@ bool ConvertScalarOutput(struct NaClApp* nap,
uint32_t user_ptr,
bool optional,
T volatile** sys_ptr) {
+ static_assert(!std::is_pointer<T>::value, "do not use for pointer types");
if (user_ptr) {
uintptr_t temp = NaClUserToSysAddrRange(nap, user_ptr, sizeof(T));
if (temp != kNaClBadAddress) {
@@ -87,6 +153,7 @@ bool ConvertScalarInOut(struct NaClApp* nap,
bool optional,
T* value,
T volatile** sys_ptr) {
+ static_assert(!std::is_pointer<T>::value, "do not use for pointer types");
if (user_ptr) {
uintptr_t temp = NaClUserToSysAddrRange(nap, user_ptr, sizeof(T));
if (temp != kNaClBadAddress) {
@@ -152,6 +219,7 @@ bool ConvertExtensibleStructInput(struct NaClApp* nap,
uint32_t user_ptr,
bool optional,
T** sys_ptr) {
+ static_assert(!std::is_pointer<T>::value, "do not use for pointer types");
if (user_ptr) {
uintptr_t temp = NaClUserToSysAddrRange(nap, user_ptr, sizeof(T));
if (temp != kNaClBadAddress) {
« no previous file with comments | « no previous file | nacl_bindings_generator/generate_nacl_bindings.py » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698