blob: fe7f20ae272af8bd90b1083b816525d149bf9ad3 [file] [log] [blame]
Evgeniy Stepanov67227162012-12-25 11:53:51 +00001//===-- msan.h --------------------------------------------------*- C++ -*-===//
Evgeniy Stepanovc5033782012-12-11 12:27:27 +00002//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9//
10// This file is a part of MemorySanitizer.
11//
12// Private MSan header.
13//===----------------------------------------------------------------------===//
14
15#ifndef MSAN_H
16#define MSAN_H
17
Sergey Matveev6eff11e2013-05-06 13:15:14 +000018#include "sanitizer_common/sanitizer_flags.h"
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000019#include "sanitizer_common/sanitizer_internal_defs.h"
20#include "sanitizer_common/sanitizer_stacktrace.h"
Evgeniy Stepanoveac7f932013-01-29 14:33:29 +000021#include "msan_interface_internal.h"
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000022#include "msan_flags.h"
23
Evgeniy Stepanovc7af8782013-04-05 12:03:47 +000024#ifndef MSAN_REPLACE_OPERATORS_NEW_AND_DELETE
25# define MSAN_REPLACE_OPERATORS_NEW_AND_DELETE 1
26#endif
27
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000028#define MEM_TO_SHADOW(mem) (((uptr)mem) & ~0x400000000000ULL)
29#define MEM_TO_ORIGIN(mem) (MEM_TO_SHADOW(mem) + 0x200000000000ULL)
30#define MEM_IS_APP(mem) ((uptr)mem >= 0x600000000000ULL)
31#define MEM_IS_SHADOW(mem) ((uptr)mem >= 0x200000000000ULL && \
32 (uptr)mem <= 0x400000000000ULL)
33
34const int kMsanParamTlsSizeInWords = 100;
35const int kMsanRetvalTlsSizeInWords = 100;
36
37namespace __msan {
38extern int msan_inited;
39extern bool msan_init_is_running;
Evgeniy Stepanov9b52ce92013-01-10 11:17:55 +000040extern int msan_report_count;
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000041
42bool ProtectRange(uptr beg, uptr end);
43bool InitShadow(bool prot1, bool prot2, bool map_shadow, bool init_origins);
44char *GetProcSelfMaps();
45void InitializeInterceptors();
46
Evgeniy Stepanov2794c472013-10-22 14:31:30 +000047void MsanAllocatorThreadFinish();
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000048void *MsanReallocate(StackTrace *stack, void *oldp, uptr size,
49 uptr alignment, bool zeroise);
Evgeniy Stepanov65562f52013-09-16 11:03:31 +000050void MsanDeallocate(StackTrace *stack, void *ptr);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000051void InstallTrapHandler();
Evgeniy Stepanov9b52ce92013-01-10 11:17:55 +000052void InstallAtExitHandler();
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000053void ReplaceOperatorsNewAndDelete();
54
Evgeniy Stepanovac5ac342013-09-13 12:49:13 +000055const char *GetOriginDescrIfStack(u32 id, uptr *pc);
56
Kostya Serebryanyec87e782013-02-13 07:19:47 +000057void EnterSymbolizer();
58void ExitSymbolizer();
59bool IsInSymbolizer();
60
Reid Kleckner063dfe32013-03-06 16:11:58 +000061struct SymbolizerScope {
62 SymbolizerScope() { EnterSymbolizer(); }
63 ~SymbolizerScope() { ExitSymbolizer(); }
64};
65
Reid Klecknerc9d382b2013-03-11 18:07:42 +000066void EnterLoader();
67void ExitLoader();
68
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000069void MsanDie();
70void PrintWarning(uptr pc, uptr bp);
71void PrintWarningWithOrigin(uptr pc, uptr bp, u32 origin);
72
Evgeniy Stepanov76dc3a82013-02-19 12:43:18 +000073void GetStackTrace(StackTrace *stack, uptr max_s, uptr pc, uptr bp,
74 bool fast);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000075
Evgeniy Stepanov367dc642012-12-26 09:32:05 +000076void ReportUMR(StackTrace *stack, u32 origin);
77void ReportExpectedUMRNotFound(StackTrace *stack);
Evgeniy Stepanov9b52ce92013-01-10 11:17:55 +000078void ReportAtExitStatistics();
Evgeniy Stepanov367dc642012-12-26 09:32:05 +000079
Alexey Samsonoved4594b2013-06-27 07:50:56 +000080// Unpoison first n function arguments.
81void UnpoisonParam(uptr n);
Evgeniy Stepanovc4179812013-08-27 12:59:39 +000082void UnpoisonThreadLocalState();
Reid Klecknerc9d382b2013-03-11 18:07:42 +000083
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000084#define GET_MALLOC_STACK_TRACE \
85 StackTrace stack; \
86 stack.size = 0; \
87 if (__msan_get_track_origins() && msan_inited) \
Sergey Matveev6eff11e2013-05-06 13:15:14 +000088 GetStackTrace(&stack, common_flags()->malloc_context_size, \
Evgeniy Stepanov76dc3a82013-02-19 12:43:18 +000089 StackTrace::GetCurrentPc(), GET_CURRENT_FRAME(), \
Sergey Matveev6eff11e2013-05-06 13:15:14 +000090 common_flags()->fast_unwind_on_malloc)
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000091
Evgeniy Stepanovcb22c672013-08-27 14:08:15 +000092class ScopedThreadLocalStateBackup {
Alexey Samsonovef643ce2013-08-28 11:26:09 +000093 public:
Evgeniy Stepanovcb22c672013-08-27 14:08:15 +000094 ScopedThreadLocalStateBackup() { Backup(); }
95 ~ScopedThreadLocalStateBackup() { Restore(); }
96 void Backup();
97 void Restore();
Alexey Samsonovef643ce2013-08-28 11:26:09 +000098 private:
Evgeniy Stepanovcb22c672013-08-27 14:08:15 +000099 u64 va_arg_overflow_size_tls;
100};
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000101} // namespace __msan
102
Evgeniy Stepanov44b77c22013-08-02 14:26:58 +0000103#define MSAN_MALLOC_HOOK(ptr, size) \
104 if (&__msan_malloc_hook) __msan_malloc_hook(ptr, size)
105#define MSAN_FREE_HOOK(ptr) \
106 if (&__msan_free_hook) __msan_free_hook(ptr)
107
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000108#endif // MSAN_H