Alexey Samsonov | c70fa28 | 2013-01-31 13:46:14 +0000 | [diff] [blame] | 1 | //===-- asan_interface_internal.h -------------------------------*- C++ -*-===// |
| 2 | // |
| 3 | // The LLVM Compiler Infrastructure |
| 4 | // |
| 5 | // This file is distributed under the University of Illinois Open Source |
| 6 | // License. See LICENSE.TXT for details. |
| 7 | // |
| 8 | //===----------------------------------------------------------------------===// |
| 9 | // |
| 10 | // This file is a part of AddressSanitizer, an address sanity checker. |
| 11 | // |
| 12 | // This header can be included by the instrumented program to fetch |
| 13 | // data (mostly allocator statistics) from ASan runtime library. |
| 14 | //===----------------------------------------------------------------------===// |
| 15 | #ifndef ASAN_INTERFACE_INTERNAL_H |
| 16 | #define ASAN_INTERFACE_INTERNAL_H |
| 17 | |
| 18 | #include "sanitizer_common/sanitizer_internal_defs.h" |
| 19 | |
| 20 | using __sanitizer::uptr; |
| 21 | |
| 22 | extern "C" { |
| 23 | // This function should be called at the very beginning of the process, |
| 24 | // before any instrumented code is executed and before any call to malloc. |
Kostya Serebryany | ea0fd3c | 2013-02-12 11:11:58 +0000 | [diff] [blame] | 25 | // Everytime the asan ABI changes we also change the version number in this |
Kostya Serebryany | 867ac63 | 2013-02-13 06:07:50 +0000 | [diff] [blame] | 26 | // name. Objects build with incompatible asan ABI version |
Kostya Serebryany | ea0fd3c | 2013-02-12 11:11:58 +0000 | [diff] [blame] | 27 | // will not link with run-time. |
Kostya Serebryany | 50f3daa | 2013-03-22 10:36:24 +0000 | [diff] [blame] | 28 | // Changes between ABI versions: |
| 29 | // v1=>v2: added 'module_name' to __asan_global |
| 30 | // v2=>v3: stack frame description (created by the compiler) |
| 31 | // contains the function PC as the 3-rd field (see |
| 32 | // DescribeAddressIfStack). |
Timur Iskhodzhanov | 3c80c6c | 2013-08-13 11:42:45 +0000 | [diff] [blame] | 33 | SANITIZER_INTERFACE_ATTRIBUTE void __asan_init_v3(); |
Kostya Serebryany | 50f3daa | 2013-03-22 10:36:24 +0000 | [diff] [blame] | 34 | #define __asan_init __asan_init_v3 |
Alexey Samsonov | c70fa28 | 2013-01-31 13:46:14 +0000 | [diff] [blame] | 35 | |
| 36 | // This structure describes an instrumented global variable. |
| 37 | struct __asan_global { |
| 38 | uptr beg; // The address of the global. |
| 39 | uptr size; // The original size of the global. |
| 40 | uptr size_with_redzone; // The size with the redzone. |
| 41 | const char *name; // Name as a C string. |
Alexey Samsonov | 05e16a0 | 2013-03-26 13:06:12 +0000 | [diff] [blame] | 42 | const char *module_name; // Module name as a C string. This pointer is a |
| 43 | // unique identifier of a module. |
Alexey Samsonov | c70fa28 | 2013-01-31 13:46:14 +0000 | [diff] [blame] | 44 | uptr has_dynamic_init; // Non-zero if the global has dynamic initializer. |
| 45 | }; |
| 46 | |
| 47 | // These two functions should be called by the instrumented code. |
| 48 | // 'globals' is an array of structures describing 'n' globals. |
Timur Iskhodzhanov | 3c80c6c | 2013-08-13 11:42:45 +0000 | [diff] [blame] | 49 | SANITIZER_INTERFACE_ATTRIBUTE |
| 50 | void __asan_register_globals(__asan_global *globals, uptr n); |
| 51 | SANITIZER_INTERFACE_ATTRIBUTE |
| 52 | void __asan_unregister_globals(__asan_global *globals, uptr n); |
Alexey Samsonov | c70fa28 | 2013-01-31 13:46:14 +0000 | [diff] [blame] | 53 | |
| 54 | // These two functions should be called before and after dynamic initializers |
Alexey Samsonov | 05e16a0 | 2013-03-26 13:06:12 +0000 | [diff] [blame] | 55 | // of a single module run, respectively. |
Timur Iskhodzhanov | 3c80c6c | 2013-08-13 11:42:45 +0000 | [diff] [blame] | 56 | SANITIZER_INTERFACE_ATTRIBUTE |
| 57 | void __asan_before_dynamic_init(const char *module_name); |
| 58 | SANITIZER_INTERFACE_ATTRIBUTE |
| 59 | void __asan_after_dynamic_init(); |
Alexey Samsonov | c70fa28 | 2013-01-31 13:46:14 +0000 | [diff] [blame] | 60 | |
Alexey Samsonov | c70fa28 | 2013-01-31 13:46:14 +0000 | [diff] [blame] | 61 | // These two functions are used by instrumented code in the |
| 62 | // use-after-scope mode. They mark memory for local variables as |
| 63 | // unaddressable when they leave scope and addressable before the |
| 64 | // function exits. |
Timur Iskhodzhanov | 3c80c6c | 2013-08-13 11:42:45 +0000 | [diff] [blame] | 65 | SANITIZER_INTERFACE_ATTRIBUTE |
| 66 | void __asan_poison_stack_memory(uptr addr, uptr size); |
| 67 | SANITIZER_INTERFACE_ATTRIBUTE |
| 68 | void __asan_unpoison_stack_memory(uptr addr, uptr size); |
Alexey Samsonov | c70fa28 | 2013-01-31 13:46:14 +0000 | [diff] [blame] | 69 | |
| 70 | // Performs cleanup before a NoReturn function. Must be called before things |
| 71 | // like _exit and execl to avoid false positives on stack. |
Timur Iskhodzhanov | 3c80c6c | 2013-08-13 11:42:45 +0000 | [diff] [blame] | 72 | SANITIZER_INTERFACE_ATTRIBUTE void __asan_handle_no_return(); |
Alexey Samsonov | c70fa28 | 2013-01-31 13:46:14 +0000 | [diff] [blame] | 73 | |
Timur Iskhodzhanov | 3c80c6c | 2013-08-13 11:42:45 +0000 | [diff] [blame] | 74 | SANITIZER_INTERFACE_ATTRIBUTE |
| 75 | void __asan_poison_memory_region(void const volatile *addr, uptr size); |
| 76 | SANITIZER_INTERFACE_ATTRIBUTE |
| 77 | void __asan_unpoison_memory_region(void const volatile *addr, uptr size); |
Alexey Samsonov | c70fa28 | 2013-01-31 13:46:14 +0000 | [diff] [blame] | 78 | |
Timur Iskhodzhanov | 3c80c6c | 2013-08-13 11:42:45 +0000 | [diff] [blame] | 79 | SANITIZER_INTERFACE_ATTRIBUTE |
| 80 | bool __asan_address_is_poisoned(void const volatile *addr); |
Alexey Samsonov | c70fa28 | 2013-01-31 13:46:14 +0000 | [diff] [blame] | 81 | |
Timur Iskhodzhanov | 3c80c6c | 2013-08-13 11:42:45 +0000 | [diff] [blame] | 82 | SANITIZER_INTERFACE_ATTRIBUTE |
| 83 | uptr __asan_region_is_poisoned(uptr beg, uptr size); |
Alexey Samsonov | c70fa28 | 2013-01-31 13:46:14 +0000 | [diff] [blame] | 84 | |
Timur Iskhodzhanov | 3c80c6c | 2013-08-13 11:42:45 +0000 | [diff] [blame] | 85 | SANITIZER_INTERFACE_ATTRIBUTE |
| 86 | void __asan_describe_address(uptr addr); |
Alexey Samsonov | c70fa28 | 2013-01-31 13:46:14 +0000 | [diff] [blame] | 87 | |
Timur Iskhodzhanov | 3c80c6c | 2013-08-13 11:42:45 +0000 | [diff] [blame] | 88 | SANITIZER_INTERFACE_ATTRIBUTE |
Alexey Samsonov | c70fa28 | 2013-01-31 13:46:14 +0000 | [diff] [blame] | 89 | void __asan_report_error(uptr pc, uptr bp, uptr sp, |
Timur Iskhodzhanov | 3c80c6c | 2013-08-13 11:42:45 +0000 | [diff] [blame] | 90 | uptr addr, bool is_write, uptr access_size); |
Alexey Samsonov | c70fa28 | 2013-01-31 13:46:14 +0000 | [diff] [blame] | 91 | |
Timur Iskhodzhanov | 3c80c6c | 2013-08-13 11:42:45 +0000 | [diff] [blame] | 92 | SANITIZER_INTERFACE_ATTRIBUTE |
| 93 | int __asan_set_error_exit_code(int exit_code); |
| 94 | SANITIZER_INTERFACE_ATTRIBUTE |
| 95 | void __asan_set_death_callback(void (*callback)(void)); |
| 96 | SANITIZER_INTERFACE_ATTRIBUTE |
| 97 | void __asan_set_error_report_callback(void (*callback)(const char*)); |
Alexey Samsonov | c70fa28 | 2013-01-31 13:46:14 +0000 | [diff] [blame] | 98 | |
Timur Iskhodzhanov | 3c80c6c | 2013-08-13 11:42:45 +0000 | [diff] [blame] | 99 | SANITIZER_INTERFACE_ATTRIBUTE SANITIZER_WEAK_ATTRIBUTE |
| 100 | /* OPTIONAL */ void __asan_on_error(); |
Alexey Samsonov | c70fa28 | 2013-01-31 13:46:14 +0000 | [diff] [blame] | 101 | |
Timur Iskhodzhanov | 3c80c6c | 2013-08-13 11:42:45 +0000 | [diff] [blame] | 102 | SANITIZER_INTERFACE_ATTRIBUTE SANITIZER_WEAK_ATTRIBUTE |
Alexey Samsonov | c70fa28 | 2013-01-31 13:46:14 +0000 | [diff] [blame] | 103 | /* OPTIONAL */ bool __asan_symbolize(const void *pc, char *out_buffer, |
Timur Iskhodzhanov | 3c80c6c | 2013-08-13 11:42:45 +0000 | [diff] [blame] | 104 | int out_size); |
Alexey Samsonov | c70fa28 | 2013-01-31 13:46:14 +0000 | [diff] [blame] | 105 | |
Timur Iskhodzhanov | 3c80c6c | 2013-08-13 11:42:45 +0000 | [diff] [blame] | 106 | SANITIZER_INTERFACE_ATTRIBUTE |
| 107 | uptr __asan_get_estimated_allocated_size(uptr size); |
Alexey Samsonov | c70fa28 | 2013-01-31 13:46:14 +0000 | [diff] [blame] | 108 | |
Timur Iskhodzhanov | 3c80c6c | 2013-08-13 11:42:45 +0000 | [diff] [blame] | 109 | SANITIZER_INTERFACE_ATTRIBUTE bool __asan_get_ownership(const void *p); |
| 110 | SANITIZER_INTERFACE_ATTRIBUTE uptr __asan_get_allocated_size(const void *p); |
| 111 | SANITIZER_INTERFACE_ATTRIBUTE uptr __asan_get_current_allocated_bytes(); |
| 112 | SANITIZER_INTERFACE_ATTRIBUTE uptr __asan_get_heap_size(); |
| 113 | SANITIZER_INTERFACE_ATTRIBUTE uptr __asan_get_free_bytes(); |
| 114 | SANITIZER_INTERFACE_ATTRIBUTE uptr __asan_get_unmapped_bytes(); |
| 115 | SANITIZER_INTERFACE_ATTRIBUTE void __asan_print_accumulated_stats(); |
Alexey Samsonov | c70fa28 | 2013-01-31 13:46:14 +0000 | [diff] [blame] | 116 | |
Timur Iskhodzhanov | 3c80c6c | 2013-08-13 11:42:45 +0000 | [diff] [blame] | 117 | SANITIZER_INTERFACE_ATTRIBUTE SANITIZER_WEAK_ATTRIBUTE |
| 118 | /* OPTIONAL */ const char* __asan_default_options(); |
| 119 | |
| 120 | SANITIZER_INTERFACE_ATTRIBUTE SANITIZER_WEAK_ATTRIBUTE |
| 121 | /* OPTIONAL */ void __asan_malloc_hook(void *ptr, uptr size); |
| 122 | SANITIZER_INTERFACE_ATTRIBUTE SANITIZER_WEAK_ATTRIBUTE |
| 123 | /* OPTIONAL */ void __asan_free_hook(void *ptr); |
Kostya Serebryany | 230e52f | 2013-09-18 10:35:12 +0000 | [diff] [blame] | 124 | |
| 125 | // Global flag, copy of ASAN_OPTIONS=detect_stack_use_after_return |
| 126 | SANITIZER_INTERFACE_ATTRIBUTE |
| 127 | extern int __asan_option_detect_stack_use_after_return; |
Alexey Samsonov | c70fa28 | 2013-01-31 13:46:14 +0000 | [diff] [blame] | 128 | } // extern "C" |
| 129 | |
| 130 | #endif // ASAN_INTERFACE_INTERNAL_H |