blob: 51fa2ebbcf34ca0189f0bccd2a97f1bb7e9679e2 [file] [log] [blame]
Evgeniy Stepanov97edeb32012-12-25 11:53:51 +00001//===-- msan.h --------------------------------------------------*- C++ -*-===//
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +00002//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9//
10// This file is a part of MemorySanitizer.
11//
12// Private MSan header.
13//===----------------------------------------------------------------------===//
14
15#ifndef MSAN_H
16#define MSAN_H
17
Sergey Matveev0b4bf4d2013-05-06 13:15:14 +000018#include "sanitizer_common/sanitizer_flags.h"
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +000019#include "sanitizer_common/sanitizer_internal_defs.h"
20#include "sanitizer_common/sanitizer_stacktrace.h"
Evgeniy Stepanov12c46932013-01-29 14:33:29 +000021#include "msan_interface_internal.h"
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +000022#include "msan_flags.h"
23
Evgeniy Stepanova8974002013-04-05 12:03:47 +000024#ifndef MSAN_REPLACE_OPERATORS_NEW_AND_DELETE
25# define MSAN_REPLACE_OPERATORS_NEW_AND_DELETE 1
26#endif
27
Evgeniy Stepanov450eee62013-10-24 11:56:03 +000028#define MEM_TO_SHADOW(mem) (((uptr)mem) & ~0x400000000000ULL)
29#define SHADOW_TO_ORIGIN(shadow) (((uptr)shadow) + 0x200000000000ULL)
30#define MEM_TO_ORIGIN(mem) (SHADOW_TO_ORIGIN(MEM_TO_SHADOW(mem)))
31#define MEM_IS_APP(mem) ((uptr)mem >= 0x600000000000ULL)
32#define MEM_IS_SHADOW(mem) \
33 ((uptr)mem >= 0x200000000000ULL && (uptr)mem <= 0x400000000000ULL)
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +000034
35const int kMsanParamTlsSizeInWords = 100;
36const int kMsanRetvalTlsSizeInWords = 100;
37
38namespace __msan {
39extern int msan_inited;
40extern bool msan_init_is_running;
Evgeniy Stepanov99bf1d72013-01-10 11:17:55 +000041extern int msan_report_count;
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +000042
43bool ProtectRange(uptr beg, uptr end);
44bool InitShadow(bool prot1, bool prot2, bool map_shadow, bool init_origins);
45char *GetProcSelfMaps();
46void InitializeInterceptors();
47
Evgeniy Stepanov7c6bd402013-10-22 14:31:30 +000048void MsanAllocatorThreadFinish();
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +000049void *MsanReallocate(StackTrace *stack, void *oldp, uptr size,
50 uptr alignment, bool zeroise);
Evgeniy Stepanoveffdc7e2013-09-16 11:03:31 +000051void MsanDeallocate(StackTrace *stack, void *ptr);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +000052void InstallTrapHandler();
Evgeniy Stepanov99bf1d72013-01-10 11:17:55 +000053void InstallAtExitHandler();
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +000054void ReplaceOperatorsNewAndDelete();
55
Evgeniy Stepanov6f346052013-09-13 12:49:13 +000056const char *GetOriginDescrIfStack(u32 id, uptr *pc);
57
Kostya Serebryany70c6e3f2013-02-13 07:19:47 +000058void EnterSymbolizer();
59void ExitSymbolizer();
60bool IsInSymbolizer();
61
Reid Kleckner93c26022013-03-06 16:11:58 +000062struct SymbolizerScope {
63 SymbolizerScope() { EnterSymbolizer(); }
64 ~SymbolizerScope() { ExitSymbolizer(); }
65};
66
Reid Kleckner0f92deb2013-03-11 18:07:42 +000067void EnterLoader();
68void ExitLoader();
69
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +000070void MsanDie();
71void PrintWarning(uptr pc, uptr bp);
72void PrintWarningWithOrigin(uptr pc, uptr bp, u32 origin);
73
Evgeniy Stepanovefbc4352013-02-19 12:43:18 +000074void GetStackTrace(StackTrace *stack, uptr max_s, uptr pc, uptr bp,
75 bool fast);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +000076
Evgeniy Stepanovdb010da2012-12-26 09:32:05 +000077void ReportUMR(StackTrace *stack, u32 origin);
78void ReportExpectedUMRNotFound(StackTrace *stack);
Evgeniy Stepanov99bf1d72013-01-10 11:17:55 +000079void ReportAtExitStatistics();
Evgeniy Stepanovdb010da2012-12-26 09:32:05 +000080
Alexey Samsonovc2918bf2013-06-27 07:50:56 +000081// Unpoison first n function arguments.
82void UnpoisonParam(uptr n);
Evgeniy Stepanov91659d52013-08-27 12:59:39 +000083void UnpoisonThreadLocalState();
Reid Kleckner0f92deb2013-03-11 18:07:42 +000084
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +000085#define GET_MALLOC_STACK_TRACE \
86 StackTrace stack; \
87 stack.size = 0; \
88 if (__msan_get_track_origins() && msan_inited) \
Sergey Matveev0b4bf4d2013-05-06 13:15:14 +000089 GetStackTrace(&stack, common_flags()->malloc_context_size, \
Evgeniy Stepanovefbc4352013-02-19 12:43:18 +000090 StackTrace::GetCurrentPc(), GET_CURRENT_FRAME(), \
Sergey Matveev0b4bf4d2013-05-06 13:15:14 +000091 common_flags()->fast_unwind_on_malloc)
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +000092
Evgeniy Stepanov0e38a672013-08-27 14:08:15 +000093class ScopedThreadLocalStateBackup {
Alexey Samsonovc1548202013-08-28 11:26:09 +000094 public:
Evgeniy Stepanov0e38a672013-08-27 14:08:15 +000095 ScopedThreadLocalStateBackup() { Backup(); }
96 ~ScopedThreadLocalStateBackup() { Restore(); }
97 void Backup();
98 void Restore();
Alexey Samsonovc1548202013-08-28 11:26:09 +000099 private:
Evgeniy Stepanov0e38a672013-08-27 14:08:15 +0000100 u64 va_arg_overflow_size_tls;
101};
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000102} // namespace __msan
103
Evgeniy Stepanov5c48a8c2013-08-02 14:26:58 +0000104#define MSAN_MALLOC_HOOK(ptr, size) \
105 if (&__msan_malloc_hook) __msan_malloc_hook(ptr, size)
106#define MSAN_FREE_HOOK(ptr) \
107 if (&__msan_free_hook) __msan_free_hook(ptr)
108
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000109#endif // MSAN_H