blob: 123dd36bf35263a0b835a1e4c7a6a086e26cc2bb [file] [log] [blame]
Evgeniy Stepanov97edeb32012-12-25 11:53:51 +00001//===-- msan.h --------------------------------------------------*- C++ -*-===//
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +00002//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9//
10// This file is a part of MemorySanitizer.
11//
12// Private MSan header.
13//===----------------------------------------------------------------------===//
14
15#ifndef MSAN_H
16#define MSAN_H
17
18#include "sanitizer_common/sanitizer_internal_defs.h"
19#include "sanitizer_common/sanitizer_stacktrace.h"
Evgeniy Stepanov12c46932013-01-29 14:33:29 +000020#include "msan_interface_internal.h"
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +000021#include "msan_flags.h"
22
23#define MEM_TO_SHADOW(mem) (((uptr)mem) & ~0x400000000000ULL)
24#define MEM_TO_ORIGIN(mem) (MEM_TO_SHADOW(mem) + 0x200000000000ULL)
25#define MEM_IS_APP(mem) ((uptr)mem >= 0x600000000000ULL)
26#define MEM_IS_SHADOW(mem) ((uptr)mem >= 0x200000000000ULL && \
27 (uptr)mem <= 0x400000000000ULL)
28
Reid Kleckner0f92deb2013-03-11 18:07:42 +000029struct link_map; // Opaque type returned by dlopen().
30
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +000031const int kMsanParamTlsSizeInWords = 100;
32const int kMsanRetvalTlsSizeInWords = 100;
33
34namespace __msan {
35extern int msan_inited;
36extern bool msan_init_is_running;
Evgeniy Stepanov99bf1d72013-01-10 11:17:55 +000037extern int msan_report_count;
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +000038
39bool ProtectRange(uptr beg, uptr end);
40bool InitShadow(bool prot1, bool prot2, bool map_shadow, bool init_origins);
41char *GetProcSelfMaps();
42void InitializeInterceptors();
43
44void *MsanReallocate(StackTrace *stack, void *oldp, uptr size,
45 uptr alignment, bool zeroise);
46void MsanDeallocate(void *ptr);
47void InstallTrapHandler();
Evgeniy Stepanov99bf1d72013-01-10 11:17:55 +000048void InstallAtExitHandler();
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +000049void ReplaceOperatorsNewAndDelete();
50
Kostya Serebryany70c6e3f2013-02-13 07:19:47 +000051void EnterSymbolizer();
52void ExitSymbolizer();
53bool IsInSymbolizer();
54
Reid Kleckner93c26022013-03-06 16:11:58 +000055struct SymbolizerScope {
56 SymbolizerScope() { EnterSymbolizer(); }
57 ~SymbolizerScope() { ExitSymbolizer(); }
58};
59
Reid Kleckner0f92deb2013-03-11 18:07:42 +000060void EnterLoader();
61void ExitLoader();
62
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +000063void MsanDie();
64void PrintWarning(uptr pc, uptr bp);
65void PrintWarningWithOrigin(uptr pc, uptr bp, u32 origin);
66
Evgeniy Stepanovefbc4352013-02-19 12:43:18 +000067void GetStackTrace(StackTrace *stack, uptr max_s, uptr pc, uptr bp,
68 bool fast);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +000069
Evgeniy Stepanovdb010da2012-12-26 09:32:05 +000070void ReportUMR(StackTrace *stack, u32 origin);
71void ReportExpectedUMRNotFound(StackTrace *stack);
Evgeniy Stepanov99bf1d72013-01-10 11:17:55 +000072void ReportAtExitStatistics();
Evgeniy Stepanovdb010da2012-12-26 09:32:05 +000073
Reid Kleckner0f92deb2013-03-11 18:07:42 +000074void UnpoisonMappedDSO(struct link_map *map);
75
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +000076#define GET_MALLOC_STACK_TRACE \
77 StackTrace stack; \
78 stack.size = 0; \
79 if (__msan_get_track_origins() && msan_inited) \
80 GetStackTrace(&stack, flags()->num_callers, \
Evgeniy Stepanovefbc4352013-02-19 12:43:18 +000081 StackTrace::GetCurrentPc(), GET_CURRENT_FRAME(), \
82 /* fast */ true)
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +000083
84} // namespace __msan
85
86#endif // MSAN_H