blob: 1a01718a6b7ed37f3ab444bb4af12a6bbb1ff79a [file] [log] [blame]
Alexey Samsonovee072902012-06-06 09:26:25 +00001//===-- sanitizer_common.cc -----------------------------------------------===//
2//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9//
10// This file is shared between AddressSanitizer and ThreadSanitizer
11// run-time libraries.
12//===----------------------------------------------------------------------===//
13
14#include "sanitizer_common.h"
Alexey Samsonovf2b811a2013-10-04 08:55:03 +000015#include "sanitizer_flags.h"
Alexey Samsonovee072902012-06-06 09:26:25 +000016#include "sanitizer_libc.h"
Alexey Samsonov5dc6cff2013-11-01 17:02:14 +000017#include "sanitizer_stacktrace.h"
18#include "sanitizer_symbolizer.h"
Alexey Samsonove4a88982012-06-15 07:00:31 +000019
Alexey Samsonovee072902012-06-06 09:26:25 +000020namespace __sanitizer {
21
Kostya Serebryanybda64b42013-01-31 14:11:21 +000022const char *SanitizerToolName = "SanitizerTool";
23
Kostya Serebryanyf22c6972012-11-23 15:38:49 +000024uptr GetPageSizeCached() {
25 static uptr PageSize;
26 if (!PageSize)
27 PageSize = GetPageSize();
28 return PageSize;
29}
30
Alexander Potapenkob4ba9952013-01-18 16:44:27 +000031
32// By default, dump to stderr. If |log_to_file| is true and |report_fd_pid|
33// isn't equal to the current PID, try to obtain file descriptor by opening
34// file "report_path_prefix.<PID>".
Peter Collingbourne6d4a7d372013-05-17 16:17:19 +000035fd_t report_fd = kStderrFd;
Reid Klecknerd483c072013-09-05 03:19:57 +000036
37// Set via __sanitizer_set_report_path.
38bool log_to_file = false;
39char report_path_prefix[sizeof(report_path_prefix)];
40
Alexander Potapenkob4ba9952013-01-18 16:44:27 +000041// PID of process that opened |report_fd|. If a fork() occurs, the PID of the
42// child thread will be different from |report_fd_pid|.
Reid Klecknerd483c072013-09-05 03:19:57 +000043uptr report_fd_pid = 0;
Kostya Serebryany45d849c2012-09-14 04:35:14 +000044
Sergey Matveevef7db732013-08-26 13:20:31 +000045static DieCallbackType DieCallback;
46void SetDieCallback(DieCallbackType callback) {
Alexey Samsonov5c6b93b2012-09-11 09:44:48 +000047 DieCallback = callback;
48}
49
Sergey Matveevef7db732013-08-26 13:20:31 +000050DieCallbackType GetDieCallback() {
51 return DieCallback;
52}
53
Alexey Samsonov5c6b93b2012-09-11 09:44:48 +000054void NORETURN Die() {
55 if (DieCallback) {
56 DieCallback();
57 }
Alexey Samsonovaadd1f22013-02-20 13:54:32 +000058 internal__exit(1);
Alexey Samsonov5c6b93b2012-09-11 09:44:48 +000059}
60
61static CheckFailedCallbackType CheckFailedCallback;
62void SetCheckFailedCallback(CheckFailedCallbackType callback) {
63 CheckFailedCallback = callback;
64}
65
66void NORETURN CheckFailed(const char *file, int line, const char *cond,
67 u64 v1, u64 v2) {
68 if (CheckFailedCallback) {
69 CheckFailedCallback(file, line, cond, v1, v2);
70 }
Dmitry Vyukovaf96edb2013-01-11 15:07:49 +000071 Report("Sanitizer CHECK failed: %s:%d %s (%lld, %lld)\n", file, line, cond,
72 v1, v2);
Alexey Samsonov5c6b93b2012-09-11 09:44:48 +000073 Die();
74}
75
Alexey Samsonovfe44fbd2012-06-07 05:38:26 +000076uptr ReadFileToBuffer(const char *file_name, char **buff,
77 uptr *buff_size, uptr max_len) {
Kostya Serebryanyf22c6972012-11-23 15:38:49 +000078 uptr PageSize = GetPageSizeCached();
79 uptr kMinFileLen = PageSize;
Alexey Samsonovfe44fbd2012-06-07 05:38:26 +000080 uptr read_len = 0;
81 *buff = 0;
82 *buff_size = 0;
83 // The files we usually open are not seekable, so try different buffer sizes.
84 for (uptr size = kMinFileLen; size <= max_len; size *= 2) {
Peter Collingbourne6f4be192013-05-08 14:43:49 +000085 uptr openrv = OpenFile(file_name, /*write*/ false);
86 if (internal_iserror(openrv)) return 0;
87 fd_t fd = openrv;
Alexey Samsonovfe44fbd2012-06-07 05:38:26 +000088 UnmapOrDie(*buff, *buff_size);
89 *buff = (char*)MmapOrDie(size, __FUNCTION__);
90 *buff_size = size;
91 // Read up to one page at a time.
92 read_len = 0;
93 bool reached_eof = false;
Kostya Serebryanyf22c6972012-11-23 15:38:49 +000094 while (read_len + PageSize <= size) {
95 uptr just_read = internal_read(fd, *buff + read_len, PageSize);
Alexey Samsonovfe44fbd2012-06-07 05:38:26 +000096 if (just_read == 0) {
97 reached_eof = true;
98 break;
99 }
100 read_len += just_read;
101 }
102 internal_close(fd);
103 if (reached_eof) // We've read the whole file.
104 break;
105 }
106 return read_len;
107}
108
Sergey Matveevd9da20f2013-05-13 11:58:48 +0000109typedef bool UptrComparisonFunction(const uptr &a, const uptr &b);
110
111template<class T>
112static inline bool CompareLess(const T &a, const T &b) {
113 return a < b;
114}
115
Alexey Samsonove4a88982012-06-15 07:00:31 +0000116void SortArray(uptr *array, uptr size) {
Sergey Matveevd9da20f2013-05-13 11:58:48 +0000117 InternalSort<uptr*, UptrComparisonFunction>(&array, size, CompareLess);
Alexey Samsonove4a88982012-06-15 07:00:31 +0000118}
119
Kostya Serebryany1e3d3872012-12-06 06:10:31 +0000120// We want to map a chunk of address space aligned to 'alignment'.
121// We do it by maping a bit more and then unmaping redundant pieces.
122// We probably can do it with fewer syscalls in some OS-dependent way.
123void *MmapAlignedOrDie(uptr size, uptr alignment, const char *mem_type) {
Bill Wendlingf9528842012-12-06 07:43:17 +0000124// uptr PageSize = GetPageSizeCached();
Kostya Serebryany1e3d3872012-12-06 06:10:31 +0000125 CHECK(IsPowerOfTwo(size));
126 CHECK(IsPowerOfTwo(alignment));
127 uptr map_size = size + alignment;
128 uptr map_res = (uptr)MmapOrDie(map_size, mem_type);
129 uptr map_end = map_res + map_size;
130 uptr res = map_res;
131 if (res & (alignment - 1)) // Not aligned.
Dmitry Vyukove3e05572012-12-06 15:42:54 +0000132 res = (map_res + alignment) & ~(alignment - 1);
Kostya Serebryany1e3d3872012-12-06 06:10:31 +0000133 uptr end = res + size;
134 if (res != map_res)
135 UnmapOrDie((void*)map_res, res - map_res);
136 if (end != map_end)
137 UnmapOrDie((void*)end, map_end - end);
138 return (void*)res;
139}
140
Alexey Samsonovf2b811a2013-10-04 08:55:03 +0000141const char *StripPathPrefix(const char *filepath,
142 const char *strip_path_prefix) {
143 if (filepath == 0) return 0;
144 if (strip_path_prefix == 0) return filepath;
145 const char *pos = internal_strstr(filepath, strip_path_prefix);
146 if (pos == 0) return filepath;
147 pos += internal_strlen(strip_path_prefix);
148 if (pos[0] == '.' && pos[1] == '/')
149 pos += 2;
150 return pos;
151}
152
153void PrintSourceLocation(const char *file, int line, int column) {
154 CHECK(file);
155 Printf("%s", StripPathPrefix(file, common_flags()->strip_path_prefix));
156 if (line > 0) {
157 Printf(":%d", line);
158 if (column > 0)
159 Printf(":%d", column);
160 }
161}
162
163void PrintModuleAndOffset(const char *module, uptr offset) {
164 Printf("(%s+0x%zx)",
165 StripPathPrefix(module, common_flags()->strip_path_prefix), offset);
166}
167
Alexey Samsonov5dc6cff2013-11-01 17:02:14 +0000168void ReportErrorSummary(const char *error_message) {
169 InternalScopedBuffer<char> buff(kMaxSummaryLength);
170 internal_snprintf(buff.data(), buff.size(),
171 "SUMMARY: %s: %s", SanitizerToolName, error_message);
172 __sanitizer_report_error_summary(buff.data());
173}
174
Kostya Serebryanyb4c2c5c2013-02-06 12:36:49 +0000175void ReportErrorSummary(const char *error_type, const char *file,
176 int line, const char *function) {
Alexey Samsonov5dc6cff2013-11-01 17:02:14 +0000177 InternalScopedBuffer<char> buff(kMaxSummaryLength);
Alexey Samsonovf2b811a2013-10-04 08:55:03 +0000178 internal_snprintf(
Alexey Samsonov5dc6cff2013-11-01 17:02:14 +0000179 buff.data(), buff.size(), "%s %s:%d %s", error_type,
Alexey Samsonovf2b811a2013-10-04 08:55:03 +0000180 file ? StripPathPrefix(file, common_flags()->strip_path_prefix) : "??",
181 line, function ? function : "??");
Alexey Samsonov5dc6cff2013-11-01 17:02:14 +0000182 ReportErrorSummary(buff.data());
183}
184
185void ReportErrorSummary(const char *error_type, StackTrace *stack) {
186 AddressInfo ai;
187 if (stack->size > 0 && Symbolizer::Get()->IsAvailable()) {
188 // Currently, we include the first stack frame into the report summary.
189 // Maybe sometimes we need to choose another frame (e.g. skip memcpy/etc).
190 uptr pc = StackTrace::GetPreviousInstructionPc(stack->trace[0]);
191 Symbolizer::Get()->SymbolizeCode(pc, &ai, 1);
192 }
193 ReportErrorSummary(error_type, ai.file, ai.line, ai.function);
Kostya Serebryanyb4c2c5c2013-02-06 12:36:49 +0000194}
195
Alexey Samsonov7a36e612013-09-10 14:36:16 +0000196LoadedModule::LoadedModule(const char *module_name, uptr base_address) {
197 full_name_ = internal_strdup(module_name);
198 base_address_ = base_address;
199 n_ranges_ = 0;
200}
201
202void LoadedModule::addAddressRange(uptr beg, uptr end) {
203 CHECK_LT(n_ranges_, kMaxNumberOfAddressRanges);
204 ranges_[n_ranges_].beg = beg;
205 ranges_[n_ranges_].end = end;
206 n_ranges_++;
207}
208
209bool LoadedModule::containsAddress(uptr address) const {
210 for (uptr i = 0; i < n_ranges_; i++) {
211 if (ranges_[i].beg <= address && address < ranges_[i].end)
212 return true;
213 }
214 return false;
215}
216
Alexey Samsonovee072902012-06-06 09:26:25 +0000217} // namespace __sanitizer
Kostya Serebryany45d849c2012-09-14 04:35:14 +0000218
Alexey Samsonovfd67c832012-11-02 09:23:36 +0000219using namespace __sanitizer; // NOLINT
220
221extern "C" {
Kostya Serebryany45d849c2012-09-14 04:35:14 +0000222void __sanitizer_set_report_path(const char *path) {
Dmitry Vyukov7ac0b2b2013-10-15 12:25:29 +0000223 if (!path)
224 return;
Kostya Serebryany45d849c2012-09-14 04:35:14 +0000225 uptr len = internal_strlen(path);
Alexander Potapenkob4ba9952013-01-18 16:44:27 +0000226 if (len > sizeof(report_path_prefix) - 100) {
Kostya Serebryany45d849c2012-09-14 04:35:14 +0000227 Report("ERROR: Path is too long: %c%c%c%c%c%c%c%c...\n",
228 path[0], path[1], path[2], path[3],
229 path[4], path[5], path[6], path[7]);
230 Die();
231 }
Alexey Samsonov20ba98f2012-11-02 09:38:47 +0000232 if (report_fd != kStdoutFd &&
233 report_fd != kStderrFd &&
234 report_fd != kInvalidFd)
235 internal_close(report_fd);
Dmitry Vyukov7ac0b2b2013-10-15 12:25:29 +0000236 report_fd = kInvalidFd;
237 log_to_file = false;
238 if (internal_strcmp(path, "stdout") == 0) {
239 report_fd = kStdoutFd;
240 } else if (internal_strcmp(path, "stderr") == 0) {
241 report_fd = kStderrFd;
242 } else {
243 internal_strncpy(report_path_prefix, path, sizeof(report_path_prefix));
244 report_path_prefix[len] = '\0';
245 log_to_file = true;
246 }
Alexey Samsonovfd67c832012-11-02 09:23:36 +0000247}
Alexander Potapenko1746f552012-12-10 13:10:40 +0000248
249void NOINLINE __sanitizer_sandbox_on_notify(void *reserved) {
250 (void)reserved;
251 PrepareForSandboxing();
252}
Kostya Serebryanyb4c2c5c2013-02-06 12:36:49 +0000253
254void __sanitizer_report_error_summary(const char *error_summary) {
Nick Lewycky622348e2013-10-23 07:45:53 +0000255 Printf("%s\n", error_summary);
Kostya Serebryanyb4c2c5c2013-02-06 12:36:49 +0000256}
Alexey Samsonovfd67c832012-11-02 09:23:36 +0000257} // extern "C"