Alexey Samsonov | 2c5fc3b | 2012-06-04 14:27:50 +0000 | [diff] [blame] | 1 | //===-- sanitizer_mac.cc --------------------------------------------------===// |
| 2 | // |
| 3 | // The LLVM Compiler Infrastructure |
| 4 | // |
| 5 | // This file is distributed under the University of Illinois Open Source |
| 6 | // License. See LICENSE.TXT for details. |
| 7 | // |
| 8 | //===----------------------------------------------------------------------===// |
| 9 | // |
Alexander Potapenko | 768e315 | 2014-02-03 15:32:19 +0000 | [diff] [blame] | 10 | // This file is shared between various sanitizers' runtime libraries and |
| 11 | // implements OSX-specific functions. |
Alexey Samsonov | 2c5fc3b | 2012-06-04 14:27:50 +0000 | [diff] [blame] | 12 | //===----------------------------------------------------------------------===// |
| 13 | |
Evgeniy Stepanov | 0af6723 | 2013-03-19 14:33:38 +0000 | [diff] [blame] | 14 | #include "sanitizer_platform.h" |
| 15 | #if SANITIZER_MAC |
| 16 | |
Alexander Potapenko | d895ae9 | 2013-02-06 14:41:15 +0000 | [diff] [blame] | 17 | // Use 64-bit inodes in file operations. ASan does not support OS X 10.5, so |
| 18 | // the clients will most certainly use 64-bit ones as well. |
| 19 | #ifndef _DARWIN_USE_64_BIT_INODE |
| 20 | #define _DARWIN_USE_64_BIT_INODE 1 |
| 21 | #endif |
| 22 | #include <stdio.h> |
Alexey Samsonov | 2c5fc3b | 2012-06-04 14:27:50 +0000 | [diff] [blame] | 23 | |
Alexey Samsonov | 4b1f103 | 2012-06-07 07:13:46 +0000 | [diff] [blame] | 24 | #include "sanitizer_common.h" |
Alexander Potapenko | 789e3e1 | 2014-01-31 13:10:07 +0000 | [diff] [blame] | 25 | #include "sanitizer_flags.h" |
Alexey Samsonov | 5bbf829 | 2012-06-05 14:25:27 +0000 | [diff] [blame] | 26 | #include "sanitizer_internal_defs.h" |
Alexey Samsonov | 2c5fc3b | 2012-06-04 14:27:50 +0000 | [diff] [blame] | 27 | #include "sanitizer_libc.h" |
Alexander Potapenko | 768e315 | 2014-02-03 15:32:19 +0000 | [diff] [blame] | 28 | #include "sanitizer_mac.h" |
Alexey Samsonov | 7a36e61 | 2013-09-10 14:36:16 +0000 | [diff] [blame] | 29 | #include "sanitizer_placement_new.h" |
Ismail Pazarbasi | 0da8da5 | 2015-05-12 21:30:16 +0000 | [diff] [blame] | 30 | #include "sanitizer_platform_limits_posix.h" |
Alexey Samsonov | 28a9895 | 2012-06-07 06:15:12 +0000 | [diff] [blame] | 31 | #include "sanitizer_procmaps.h" |
Alexey Samsonov | 2c5fc3b | 2012-06-04 14:27:50 +0000 | [diff] [blame] | 32 | |
Chris Bieneman | e13272a | 2015-06-23 21:39:49 +0000 | [diff] [blame] | 33 | #if !SANITIZER_IOS |
Alexey Samsonov | 0c53a38 | 2012-06-14 14:07:21 +0000 | [diff] [blame] | 34 | #include <crt_externs.h> // for _NSGetEnviron |
Chris Bieneman | e13272a | 2015-06-23 21:39:49 +0000 | [diff] [blame] | 35 | #else |
| 36 | extern char **environ; |
| 37 | #endif |
| 38 | |
Ismail Pazarbasi | b981dc8 | 2015-05-12 20:47:21 +0000 | [diff] [blame] | 39 | #include <errno.h> |
Alexey Samsonov | 4b1f103 | 2012-06-07 07:13:46 +0000 | [diff] [blame] | 40 | #include <fcntl.h> |
Ismail Pazarbasi | b981dc8 | 2015-05-12 20:47:21 +0000 | [diff] [blame] | 41 | #include <libkern/OSAtomic.h> |
Anna Zaks | 2249049 | 2015-02-27 03:12:19 +0000 | [diff] [blame] | 42 | #include <mach-o/dyld.h> |
Ismail Pazarbasi | b981dc8 | 2015-05-12 20:47:21 +0000 | [diff] [blame] | 43 | #include <mach/mach.h> |
Alexey Samsonov | 4b1f103 | 2012-06-07 07:13:46 +0000 | [diff] [blame] | 44 | #include <pthread.h> |
Alexey Samsonov | 58a3c58 | 2012-06-18 08:44:30 +0000 | [diff] [blame] | 45 | #include <sched.h> |
Alexander Potapenko | 789e3e1 | 2014-01-31 13:10:07 +0000 | [diff] [blame] | 46 | #include <signal.h> |
Anna Zaks | 2249049 | 2015-02-27 03:12:19 +0000 | [diff] [blame] | 47 | #include <stdlib.h> |
Alexey Samsonov | 2c5fc3b | 2012-06-04 14:27:50 +0000 | [diff] [blame] | 48 | #include <sys/mman.h> |
Alexey Samsonov | 4b1f103 | 2012-06-07 07:13:46 +0000 | [diff] [blame] | 49 | #include <sys/resource.h> |
Alexey Samsonov | dde1f11 | 2012-06-05 07:05:10 +0000 | [diff] [blame] | 50 | #include <sys/stat.h> |
Alexander Potapenko | 768e315 | 2014-02-03 15:32:19 +0000 | [diff] [blame] | 51 | #include <sys/sysctl.h> |
Alexey Samsonov | dde1f11 | 2012-06-05 07:05:10 +0000 | [diff] [blame] | 52 | #include <sys/types.h> |
Alexey Samsonov | 03c8b84 | 2012-06-05 08:32:53 +0000 | [diff] [blame] | 53 | #include <unistd.h> |
Alexey Samsonov | 2c5fc3b | 2012-06-04 14:27:50 +0000 | [diff] [blame] | 54 | |
| 55 | namespace __sanitizer { |
| 56 | |
Peter Collingbourne | 6f4be19 | 2013-05-08 14:43:49 +0000 | [diff] [blame] | 57 | #include "sanitizer_syscall_generic.inc" |
| 58 | |
Alexey Samsonov | 4b1f103 | 2012-06-07 07:13:46 +0000 | [diff] [blame] | 59 | // ---------------------- sanitizer_libc.h |
Peter Collingbourne | 8e110ce | 2013-05-08 15:07:12 +0000 | [diff] [blame] | 60 | uptr internal_mmap(void *addr, size_t length, int prot, int flags, |
| 61 | int fd, u64 offset) { |
| 62 | return (uptr)mmap(addr, length, prot, flags, fd, offset); |
Alexey Samsonov | 2c5fc3b | 2012-06-04 14:27:50 +0000 | [diff] [blame] | 63 | } |
| 64 | |
Peter Collingbourne | 8e110ce | 2013-05-08 15:07:12 +0000 | [diff] [blame] | 65 | uptr internal_munmap(void *addr, uptr length) { |
Alexey Samsonov | 7ac77d6 | 2012-06-05 09:49:25 +0000 | [diff] [blame] | 66 | return munmap(addr, length); |
| 67 | } |
| 68 | |
Timur Iskhodzhanov | ea1f332 | 2015-04-10 15:02:19 +0000 | [diff] [blame] | 69 | int internal_mprotect(void *addr, uptr length, int prot) { |
| 70 | return mprotect(addr, length, prot); |
| 71 | } |
| 72 | |
Peter Collingbourne | 6f4be19 | 2013-05-08 14:43:49 +0000 | [diff] [blame] | 73 | uptr internal_close(fd_t fd) { |
Alexey Samsonov | 03c8b84 | 2012-06-05 08:32:53 +0000 | [diff] [blame] | 74 | return close(fd); |
| 75 | } |
| 76 | |
Peter Collingbourne | 6f4be19 | 2013-05-08 14:43:49 +0000 | [diff] [blame] | 77 | uptr internal_open(const char *filename, int flags) { |
Alexey Samsonov | 39313b7 | 2013-02-01 15:58:46 +0000 | [diff] [blame] | 78 | return open(filename, flags); |
| 79 | } |
| 80 | |
Peter Collingbourne | 6f4be19 | 2013-05-08 14:43:49 +0000 | [diff] [blame] | 81 | uptr internal_open(const char *filename, int flags, u32 mode) { |
Alexey Samsonov | 39313b7 | 2013-02-01 15:58:46 +0000 | [diff] [blame] | 82 | return open(filename, flags, mode); |
| 83 | } |
| 84 | |
Alexey Samsonov | 03c8b84 | 2012-06-05 08:32:53 +0000 | [diff] [blame] | 85 | uptr internal_read(fd_t fd, void *buf, uptr count) { |
| 86 | return read(fd, buf, count); |
| 87 | } |
| 88 | |
| 89 | uptr internal_write(fd_t fd, const void *buf, uptr count) { |
| 90 | return write(fd, buf, count); |
| 91 | } |
| 92 | |
Peter Collingbourne | 6f4be19 | 2013-05-08 14:43:49 +0000 | [diff] [blame] | 93 | uptr internal_stat(const char *path, void *buf) { |
Alexey Samsonov | 576e270 | 2013-02-04 10:31:39 +0000 | [diff] [blame] | 94 | return stat(path, (struct stat *)buf); |
Alexey Samsonov | 2c5cbd2 | 2013-02-04 10:16:50 +0000 | [diff] [blame] | 95 | } |
| 96 | |
Peter Collingbourne | 6f4be19 | 2013-05-08 14:43:49 +0000 | [diff] [blame] | 97 | uptr internal_lstat(const char *path, void *buf) { |
Alexey Samsonov | 576e270 | 2013-02-04 10:31:39 +0000 | [diff] [blame] | 98 | return lstat(path, (struct stat *)buf); |
Alexey Samsonov | 2c5cbd2 | 2013-02-04 10:16:50 +0000 | [diff] [blame] | 99 | } |
| 100 | |
Peter Collingbourne | 6f4be19 | 2013-05-08 14:43:49 +0000 | [diff] [blame] | 101 | uptr internal_fstat(fd_t fd, void *buf) { |
Alexey Samsonov | 576e270 | 2013-02-04 10:31:39 +0000 | [diff] [blame] | 102 | return fstat(fd, (struct stat *)buf); |
Alexey Samsonov | 2c5cbd2 | 2013-02-04 10:16:50 +0000 | [diff] [blame] | 103 | } |
| 104 | |
Alexey Samsonov | ca2b5d7 | 2012-06-06 07:30:33 +0000 | [diff] [blame] | 105 | uptr internal_filesize(fd_t fd) { |
Alexey Samsonov | ce8d497 | 2012-08-02 10:09:31 +0000 | [diff] [blame] | 106 | struct stat st; |
Alexey Samsonov | 2c5cbd2 | 2013-02-04 10:16:50 +0000 | [diff] [blame] | 107 | if (internal_fstat(fd, &st)) |
Alexey Samsonov | ca2b5d7 | 2012-06-06 07:30:33 +0000 | [diff] [blame] | 108 | return -1; |
| 109 | return (uptr)st.st_size; |
| 110 | } |
| 111 | |
Peter Collingbourne | 6f4be19 | 2013-05-08 14:43:49 +0000 | [diff] [blame] | 112 | uptr internal_dup2(int oldfd, int newfd) { |
Alexey Samsonov | ca2b5d7 | 2012-06-06 07:30:33 +0000 | [diff] [blame] | 113 | return dup2(oldfd, newfd); |
| 114 | } |
| 115 | |
Alexey Samsonov | f6d2125 | 2012-09-05 14:48:24 +0000 | [diff] [blame] | 116 | uptr internal_readlink(const char *path, char *buf, uptr bufsize) { |
| 117 | return readlink(path, buf, bufsize); |
| 118 | } |
| 119 | |
Kuba Brecka | c52f300 | 2014-12-29 02:18:59 +0000 | [diff] [blame] | 120 | uptr internal_unlink(const char *path) { |
| 121 | return unlink(path); |
| 122 | } |
| 123 | |
Peter Collingbourne | 6f4be19 | 2013-05-08 14:43:49 +0000 | [diff] [blame] | 124 | uptr internal_sched_yield() { |
Alexey Samsonov | 58a3c58 | 2012-06-18 08:44:30 +0000 | [diff] [blame] | 125 | return sched_yield(); |
| 126 | } |
| 127 | |
Alexey Samsonov | aadd1f2 | 2013-02-20 13:54:32 +0000 | [diff] [blame] | 128 | void internal__exit(int exitcode) { |
| 129 | _exit(exitcode); |
| 130 | } |
| 131 | |
Peter Collingbourne | ffaf2ea | 2013-05-17 16:56:53 +0000 | [diff] [blame] | 132 | uptr internal_getpid() { |
| 133 | return getpid(); |
| 134 | } |
| 135 | |
Alexander Potapenko | 789e3e1 | 2014-01-31 13:10:07 +0000 | [diff] [blame] | 136 | int internal_sigaction(int signum, const void *act, void *oldact) { |
| 137 | return sigaction(signum, |
| 138 | (struct sigaction *)act, (struct sigaction *)oldact); |
| 139 | } |
| 140 | |
Ismail Pazarbasi | 6fb3b4b | 2015-05-12 20:56:44 +0000 | [diff] [blame] | 141 | void internal_sigfillset(__sanitizer_sigset_t *set) { sigfillset(set); } |
| 142 | |
| 143 | uptr internal_sigprocmask(int how, __sanitizer_sigset_t *set, |
| 144 | __sanitizer_sigset_t *oldset) { |
| 145 | return sigprocmask(how, set, oldset); |
| 146 | } |
| 147 | |
Alexander Potapenko | 4a6cac4 | 2014-05-13 16:17:54 +0000 | [diff] [blame] | 148 | int internal_fork() { |
| 149 | // TODO(glider): this may call user's pthread_atfork() handlers which is bad. |
| 150 | return fork(); |
| 151 | } |
| 152 | |
Evgeniy Stepanov | 567e516 | 2014-05-27 12:37:52 +0000 | [diff] [blame] | 153 | uptr internal_rename(const char *oldpath, const char *newpath) { |
| 154 | return rename(oldpath, newpath); |
| 155 | } |
| 156 | |
| 157 | uptr internal_ftruncate(fd_t fd, uptr size) { |
| 158 | return ftruncate(fd, size); |
| 159 | } |
| 160 | |
Alexey Samsonov | 4b1f103 | 2012-06-07 07:13:46 +0000 | [diff] [blame] | 161 | // ----------------- sanitizer_common.h |
Alexey Samsonov | ae9b18b | 2012-11-09 14:45:30 +0000 | [diff] [blame] | 162 | bool FileExists(const char *filename) { |
| 163 | struct stat st; |
| 164 | if (stat(filename, &st)) |
| 165 | return false; |
| 166 | // Sanity check: filename is a regular file. |
| 167 | return S_ISREG(st.st_mode); |
| 168 | } |
| 169 | |
Dmitry Vyukov | 56faa55 | 2012-10-02 12:58:14 +0000 | [diff] [blame] | 170 | uptr GetTid() { |
| 171 | return reinterpret_cast<uptr>(pthread_self()); |
| 172 | } |
| 173 | |
Alexey Samsonov | cf4d3a0 | 2012-06-07 07:32:00 +0000 | [diff] [blame] | 174 | void GetThreadStackTopAndBottom(bool at_initialization, uptr *stack_top, |
Alexey Samsonov | 4b1f103 | 2012-06-07 07:13:46 +0000 | [diff] [blame] | 175 | uptr *stack_bottom) { |
| 176 | CHECK(stack_top); |
| 177 | CHECK(stack_bottom); |
| 178 | uptr stacksize = pthread_get_stacksize_np(pthread_self()); |
Alexander Potapenko | f6ff6b0 | 2014-02-03 16:42:29 +0000 | [diff] [blame] | 179 | // pthread_get_stacksize_np() returns an incorrect stack size for the main |
| 180 | // thread on Mavericks. See |
| 181 | // https://code.google.com/p/address-sanitizer/issues/detail?id=261 |
Kuba Brecka | 0078cea7 | 2014-11-05 18:55:38 +0000 | [diff] [blame] | 182 | if ((GetMacosVersion() >= MACOS_VERSION_MAVERICKS) && at_initialization && |
Alexander Potapenko | f6ff6b0 | 2014-02-03 16:42:29 +0000 | [diff] [blame] | 183 | stacksize == (1 << 19)) { |
| 184 | struct rlimit rl; |
| 185 | CHECK_EQ(getrlimit(RLIMIT_STACK, &rl), 0); |
| 186 | // Most often rl.rlim_cur will be the desired 8M. |
| 187 | if (rl.rlim_cur < kMaxThreadStackSize) { |
| 188 | stacksize = rl.rlim_cur; |
| 189 | } else { |
| 190 | stacksize = kMaxThreadStackSize; |
| 191 | } |
| 192 | } |
Alexey Samsonov | 4b1f103 | 2012-06-07 07:13:46 +0000 | [diff] [blame] | 193 | void *stackaddr = pthread_get_stackaddr_np(pthread_self()); |
| 194 | *stack_top = (uptr)stackaddr; |
Alexey Samsonov | cf4d3a0 | 2012-06-07 07:32:00 +0000 | [diff] [blame] | 195 | *stack_bottom = *stack_top - stacksize; |
Alexey Samsonov | 4b1f103 | 2012-06-07 07:13:46 +0000 | [diff] [blame] | 196 | } |
| 197 | |
Chris Bieneman | e13272a | 2015-06-23 21:39:49 +0000 | [diff] [blame] | 198 | char **GetEnviron() { |
| 199 | #if !SANITIZER_IOS |
Alexey Samsonov | 0c53a38 | 2012-06-14 14:07:21 +0000 | [diff] [blame] | 200 | char ***env_ptr = _NSGetEnviron(); |
Alexander Potapenko | fa82ba9 | 2013-11-13 13:34:53 +0000 | [diff] [blame] | 201 | if (!env_ptr) { |
| 202 | Report("_NSGetEnviron() returned NULL. Please make sure __asan_init() is " |
| 203 | "called after libSystem_initializer().\n"); |
| 204 | CHECK(env_ptr); |
| 205 | } |
Alexey Samsonov | 0c53a38 | 2012-06-14 14:07:21 +0000 | [diff] [blame] | 206 | char **environ = *env_ptr; |
Chris Bieneman | e13272a | 2015-06-23 21:39:49 +0000 | [diff] [blame] | 207 | #endif |
Alexey Samsonov | 0c53a38 | 2012-06-14 14:07:21 +0000 | [diff] [blame] | 208 | CHECK(environ); |
Chris Bieneman | e13272a | 2015-06-23 21:39:49 +0000 | [diff] [blame] | 209 | return environ; |
| 210 | } |
| 211 | |
| 212 | const char *GetEnv(const char *name) { |
| 213 | char **env = GetEnviron(); |
Alexey Samsonov | 0c53a38 | 2012-06-14 14:07:21 +0000 | [diff] [blame] | 214 | uptr name_len = internal_strlen(name); |
Chris Bieneman | e13272a | 2015-06-23 21:39:49 +0000 | [diff] [blame] | 215 | while (*env != 0) { |
| 216 | uptr len = internal_strlen(*env); |
Alexey Samsonov | 0c53a38 | 2012-06-14 14:07:21 +0000 | [diff] [blame] | 217 | if (len > name_len) { |
Chris Bieneman | e13272a | 2015-06-23 21:39:49 +0000 | [diff] [blame] | 218 | const char *p = *env; |
Alexey Samsonov | 0c53a38 | 2012-06-14 14:07:21 +0000 | [diff] [blame] | 219 | if (!internal_memcmp(p, name, name_len) && |
| 220 | p[name_len] == '=') { // Match. |
Chris Bieneman | e13272a | 2015-06-23 21:39:49 +0000 | [diff] [blame] | 221 | return *env + name_len + 1; // String starting after =. |
Alexey Samsonov | 0c53a38 | 2012-06-14 14:07:21 +0000 | [diff] [blame] | 222 | } |
| 223 | } |
Chris Bieneman | e13272a | 2015-06-23 21:39:49 +0000 | [diff] [blame] | 224 | env++; |
Alexey Samsonov | 0c53a38 | 2012-06-14 14:07:21 +0000 | [diff] [blame] | 225 | } |
| 226 | return 0; |
| 227 | } |
Alexey Samsonov | 4b1f103 | 2012-06-07 07:13:46 +0000 | [diff] [blame] | 228 | |
Anna Zaks | 2249049 | 2015-02-27 03:12:19 +0000 | [diff] [blame] | 229 | uptr ReadBinaryName(/*out*/char *buf, uptr buf_len) { |
| 230 | CHECK_LE(kMaxPathLength, buf_len); |
| 231 | |
| 232 | // On OS X the executable path is saved to the stack by dyld. Reading it |
| 233 | // from there is much faster than calling dladdr, especially for large |
| 234 | // binaries with symbols. |
| 235 | InternalScopedString exe_path(kMaxPathLength); |
| 236 | uint32_t size = exe_path.size(); |
| 237 | if (_NSGetExecutablePath(exe_path.data(), &size) == 0 && |
| 238 | realpath(exe_path.data(), buf) != 0) { |
| 239 | return internal_strlen(buf); |
| 240 | } |
| 241 | return 0; |
| 242 | } |
| 243 | |
Evgeniy Stepanov | 3025717 | 2015-07-28 21:01:42 +0000 | [diff] [blame] | 244 | uptr ReadLongProcessName(/*out*/char *buf, uptr buf_len) { |
| 245 | return ReadBinaryName(buf, buf_len); |
| 246 | } |
| 247 | |
Alexey Samsonov | 97ca306 | 2012-09-17 09:12:39 +0000 | [diff] [blame] | 248 | void ReExec() { |
| 249 | UNIMPLEMENTED(); |
| 250 | } |
| 251 | |
Peter Collingbourne | b69b8a4 | 2013-05-20 17:05:29 +0000 | [diff] [blame] | 252 | uptr GetPageSize() { |
| 253 | return sysconf(_SC_PAGESIZE); |
| 254 | } |
| 255 | |
Alexey Samsonov | a097f7b | 2013-03-14 13:30:56 +0000 | [diff] [blame] | 256 | BlockingMutex::BlockingMutex() { |
| 257 | internal_memset(this, 0, sizeof(*this)); |
| 258 | } |
| 259 | |
Dmitry Vyukov | f22982b | 2013-01-14 07:51:39 +0000 | [diff] [blame] | 260 | void BlockingMutex::Lock() { |
| 261 | CHECK(sizeof(OSSpinLock) <= sizeof(opaque_storage_)); |
Kostya Serebryany | 459df6f | 2013-02-26 12:59:06 +0000 | [diff] [blame] | 262 | CHECK_EQ(OS_SPINLOCK_INIT, 0); |
| 263 | CHECK_NE(owner_, (uptr)pthread_self()); |
Dmitry Vyukov | f22982b | 2013-01-14 07:51:39 +0000 | [diff] [blame] | 264 | OSSpinLockLock((OSSpinLock*)&opaque_storage_); |
| 265 | CHECK(!owner_); |
| 266 | owner_ = (uptr)pthread_self(); |
| 267 | } |
| 268 | |
| 269 | void BlockingMutex::Unlock() { |
| 270 | CHECK(owner_ == (uptr)pthread_self()); |
| 271 | owner_ = 0; |
| 272 | OSSpinLockUnlock((OSSpinLock*)&opaque_storage_); |
| 273 | } |
| 274 | |
Alexey Samsonov | db7d965 | 2013-03-11 15:45:20 +0000 | [diff] [blame] | 275 | void BlockingMutex::CheckLocked() { |
| 276 | CHECK_EQ((uptr)pthread_self(), owner_); |
| 277 | } |
| 278 | |
Dmitry Vyukov | c9e304a | 2013-06-06 13:00:32 +0000 | [diff] [blame] | 279 | u64 NanoTime() { |
| 280 | return 0; |
| 281 | } |
| 282 | |
Evgeniy Stepanov | 5697b58 | 2013-03-13 08:19:53 +0000 | [diff] [blame] | 283 | uptr GetTlsSize() { |
| 284 | return 0; |
| 285 | } |
| 286 | |
| 287 | void InitTlsSize() { |
| 288 | } |
| 289 | |
Sergey Matveev | 954c6ef1 | 2013-05-07 14:41:43 +0000 | [diff] [blame] | 290 | void GetThreadStackAndTls(bool main, uptr *stk_addr, uptr *stk_size, |
| 291 | uptr *tls_addr, uptr *tls_size) { |
Dmitry Vyukov | ce0247c | 2013-06-06 13:20:40 +0000 | [diff] [blame] | 292 | #ifndef SANITIZER_GO |
Sergey Matveev | 954c6ef1 | 2013-05-07 14:41:43 +0000 | [diff] [blame] | 293 | uptr stack_top, stack_bottom; |
| 294 | GetThreadStackTopAndBottom(main, &stack_top, &stack_bottom); |
| 295 | *stk_addr = stack_bottom; |
| 296 | *stk_size = stack_top - stack_bottom; |
| 297 | *tls_addr = 0; |
| 298 | *tls_size = 0; |
Dmitry Vyukov | ce0247c | 2013-06-06 13:20:40 +0000 | [diff] [blame] | 299 | #else |
| 300 | *stk_addr = 0; |
| 301 | *stk_size = 0; |
| 302 | *tls_addr = 0; |
| 303 | *tls_size = 0; |
| 304 | #endif |
Sergey Matveev | 954c6ef1 | 2013-05-07 14:41:43 +0000 | [diff] [blame] | 305 | } |
| 306 | |
Alexey Samsonov | 7a36e61 | 2013-09-10 14:36:16 +0000 | [diff] [blame] | 307 | uptr GetListOfModules(LoadedModule *modules, uptr max_modules, |
| 308 | string_predicate_t filter) { |
| 309 | MemoryMappingLayout memory_mapping(false); |
Alexey Samsonov | 64ffa59 | 2013-12-25 08:39:38 +0000 | [diff] [blame] | 310 | return memory_mapping.DumpListOfModules(modules, max_modules, filter); |
Alexey Samsonov | 7a36e61 | 2013-09-10 14:36:16 +0000 | [diff] [blame] | 311 | } |
| 312 | |
Alexander Potapenko | 789e3e1 | 2014-01-31 13:10:07 +0000 | [diff] [blame] | 313 | bool IsDeadlySignal(int signum) { |
| 314 | return (signum == SIGSEGV || signum == SIGBUS) && common_flags()->handle_segv; |
| 315 | } |
| 316 | |
Alexander Potapenko | 768e315 | 2014-02-03 15:32:19 +0000 | [diff] [blame] | 317 | MacosVersion cached_macos_version = MACOS_VERSION_UNINITIALIZED; |
| 318 | |
| 319 | MacosVersion GetMacosVersionInternal() { |
| 320 | int mib[2] = { CTL_KERN, KERN_OSRELEASE }; |
| 321 | char version[100]; |
| 322 | uptr len = 0, maxlen = sizeof(version) / sizeof(version[0]); |
| 323 | for (uptr i = 0; i < maxlen; i++) version[i] = '\0'; |
| 324 | // Get the version length. |
| 325 | CHECK_NE(sysctl(mib, 2, 0, &len, 0, 0), -1); |
| 326 | CHECK_LT(len, maxlen); |
| 327 | CHECK_NE(sysctl(mib, 2, version, &len, 0, 0), -1); |
| 328 | switch (version[0]) { |
| 329 | case '9': return MACOS_VERSION_LEOPARD; |
| 330 | case '1': { |
| 331 | switch (version[1]) { |
| 332 | case '0': return MACOS_VERSION_SNOW_LEOPARD; |
| 333 | case '1': return MACOS_VERSION_LION; |
| 334 | case '2': return MACOS_VERSION_MOUNTAIN_LION; |
| 335 | case '3': return MACOS_VERSION_MAVERICKS; |
Kuba Brecka | f4bdbde | 2014-11-05 18:53:22 +0000 | [diff] [blame] | 336 | case '4': return MACOS_VERSION_YOSEMITE; |
Kuba Brecka | 731089b | 2014-12-16 04:46:15 +0000 | [diff] [blame] | 337 | default: |
| 338 | if (IsDigit(version[1])) |
| 339 | return MACOS_VERSION_UNKNOWN_NEWER; |
| 340 | else |
| 341 | return MACOS_VERSION_UNKNOWN; |
Alexander Potapenko | 768e315 | 2014-02-03 15:32:19 +0000 | [diff] [blame] | 342 | } |
| 343 | } |
| 344 | default: return MACOS_VERSION_UNKNOWN; |
| 345 | } |
| 346 | } |
| 347 | |
| 348 | MacosVersion GetMacosVersion() { |
| 349 | atomic_uint32_t *cache = |
| 350 | reinterpret_cast<atomic_uint32_t*>(&cached_macos_version); |
| 351 | MacosVersion result = |
| 352 | static_cast<MacosVersion>(atomic_load(cache, memory_order_acquire)); |
| 353 | if (result == MACOS_VERSION_UNINITIALIZED) { |
| 354 | result = GetMacosVersionInternal(); |
| 355 | atomic_store(cache, result, memory_order_release); |
| 356 | } |
| 357 | return result; |
| 358 | } |
| 359 | |
Kostya Serebryany | 6c54a6b | 2014-12-09 01:22:59 +0000 | [diff] [blame] | 360 | uptr GetRSS() { |
Ismail Pazarbasi | b981dc8 | 2015-05-12 20:47:21 +0000 | [diff] [blame] | 361 | struct task_basic_info info; |
| 362 | unsigned count = TASK_BASIC_INFO_COUNT; |
| 363 | kern_return_t result = |
| 364 | task_info(mach_task_self(), TASK_BASIC_INFO, (task_info_t)&info, &count); |
| 365 | if (UNLIKELY(result != KERN_SUCCESS)) { |
| 366 | Report("Cannot get task info. Error: %d\n", result); |
| 367 | Die(); |
| 368 | } |
| 369 | return info.resident_size; |
Kostya Serebryany | 6c54a6b | 2014-12-09 01:22:59 +0000 | [diff] [blame] | 370 | } |
| 371 | |
Kostya Serebryany | 43eb773 | 2014-12-16 19:13:01 +0000 | [diff] [blame] | 372 | void *internal_start_thread(void (*func)(void *arg), void *arg) { return 0; } |
Kostya Serebryany | 5f5bc4a | 2014-12-16 21:06:07 +0000 | [diff] [blame] | 373 | void internal_join_thread(void *th) { } |
Kostya Serebryany | 43eb773 | 2014-12-16 19:13:01 +0000 | [diff] [blame] | 374 | |
Dmitry Vyukov | b79ac88 | 2015-03-02 17:36:02 +0000 | [diff] [blame] | 375 | void GetPcSpBp(void *context, uptr *pc, uptr *sp, uptr *bp) { |
| 376 | ucontext_t *ucontext = (ucontext_t*)context; |
Chris Bieneman | e13272a | 2015-06-23 21:39:49 +0000 | [diff] [blame] | 377 | # if defined(__aarch64__) |
| 378 | *pc = ucontext->uc_mcontext->__ss.__pc; |
| 379 | # if defined(__IPHONE_8_0) && __IPHONE_OS_VERSION_MAX_ALLOWED >= __IPHONE_8_0 |
| 380 | *bp = ucontext->uc_mcontext->__ss.__fp; |
| 381 | # else |
| 382 | *bp = ucontext->uc_mcontext->__ss.__lr; |
| 383 | # endif |
| 384 | *sp = ucontext->uc_mcontext->__ss.__sp; |
| 385 | # elif defined(__x86_64__) |
Dmitry Vyukov | b79ac88 | 2015-03-02 17:36:02 +0000 | [diff] [blame] | 386 | *pc = ucontext->uc_mcontext->__ss.__rip; |
| 387 | *bp = ucontext->uc_mcontext->__ss.__rbp; |
| 388 | *sp = ucontext->uc_mcontext->__ss.__rsp; |
Chris Bieneman | e13272a | 2015-06-23 21:39:49 +0000 | [diff] [blame] | 389 | # elif defined(__arm__) |
| 390 | *pc = ucontext->uc_mcontext->__ss.__pc; |
| 391 | *bp = ucontext->uc_mcontext->__ss.__r[7]; |
| 392 | *sp = ucontext->uc_mcontext->__ss.__sp; |
| 393 | # elif defined(__i386__) |
Dmitry Vyukov | b79ac88 | 2015-03-02 17:36:02 +0000 | [diff] [blame] | 394 | *pc = ucontext->uc_mcontext->__ss.__eip; |
| 395 | *bp = ucontext->uc_mcontext->__ss.__ebp; |
| 396 | *sp = ucontext->uc_mcontext->__ss.__esp; |
Chris Bieneman | e13272a | 2015-06-23 21:39:49 +0000 | [diff] [blame] | 397 | # else |
| 398 | # error "Unknown architecture" |
| 399 | # endif |
Dmitry Vyukov | b79ac88 | 2015-03-02 17:36:02 +0000 | [diff] [blame] | 400 | } |
| 401 | |
Alexey Samsonov | 2c5fc3b | 2012-06-04 14:27:50 +0000 | [diff] [blame] | 402 | } // namespace __sanitizer |
| 403 | |
Alexey Samsonov | a0e28a7 | 2013-04-03 07:24:35 +0000 | [diff] [blame] | 404 | #endif // SANITIZER_MAC |