| Alexey Samsonov | 2c5fc3b | 2012-06-04 14:27:50 +0000 | [diff] [blame] | 1 | //===-- sanitizer_mac.cc --------------------------------------------------===// | 
|  | 2 | // | 
|  | 3 | //                     The LLVM Compiler Infrastructure | 
|  | 4 | // | 
|  | 5 | // This file is distributed under the University of Illinois Open Source | 
|  | 6 | // License. See LICENSE.TXT for details. | 
|  | 7 | // | 
|  | 8 | //===----------------------------------------------------------------------===// | 
|  | 9 | // | 
| Alexander Potapenko | 768e315 | 2014-02-03 15:32:19 +0000 | [diff] [blame] | 10 | // This file is shared between various sanitizers' runtime libraries and | 
|  | 11 | // implements OSX-specific functions. | 
| Alexey Samsonov | 2c5fc3b | 2012-06-04 14:27:50 +0000 | [diff] [blame] | 12 | //===----------------------------------------------------------------------===// | 
|  | 13 |  | 
| Evgeniy Stepanov | 0af6723 | 2013-03-19 14:33:38 +0000 | [diff] [blame] | 14 | #include "sanitizer_platform.h" | 
|  | 15 | #if SANITIZER_MAC | 
|  | 16 |  | 
| Alexander Potapenko | d895ae9 | 2013-02-06 14:41:15 +0000 | [diff] [blame] | 17 | // Use 64-bit inodes in file operations. ASan does not support OS X 10.5, so | 
|  | 18 | // the clients will most certainly use 64-bit ones as well. | 
|  | 19 | #ifndef _DARWIN_USE_64_BIT_INODE | 
|  | 20 | #define _DARWIN_USE_64_BIT_INODE 1 | 
|  | 21 | #endif | 
|  | 22 | #include <stdio.h> | 
| Alexey Samsonov | 2c5fc3b | 2012-06-04 14:27:50 +0000 | [diff] [blame] | 23 |  | 
| Alexey Samsonov | 4b1f103 | 2012-06-07 07:13:46 +0000 | [diff] [blame] | 24 | #include "sanitizer_common.h" | 
| Alexander Potapenko | 789e3e1 | 2014-01-31 13:10:07 +0000 | [diff] [blame] | 25 | #include "sanitizer_flags.h" | 
| Alexey Samsonov | 5bbf829 | 2012-06-05 14:25:27 +0000 | [diff] [blame] | 26 | #include "sanitizer_internal_defs.h" | 
| Alexey Samsonov | 2c5fc3b | 2012-06-04 14:27:50 +0000 | [diff] [blame] | 27 | #include "sanitizer_libc.h" | 
| Alexander Potapenko | 768e315 | 2014-02-03 15:32:19 +0000 | [diff] [blame] | 28 | #include "sanitizer_mac.h" | 
| Alexey Samsonov | 7a36e61 | 2013-09-10 14:36:16 +0000 | [diff] [blame] | 29 | #include "sanitizer_placement_new.h" | 
| Alexey Samsonov | 28a9895 | 2012-06-07 06:15:12 +0000 | [diff] [blame] | 30 | #include "sanitizer_procmaps.h" | 
| Alexey Samsonov | 2c5fc3b | 2012-06-04 14:27:50 +0000 | [diff] [blame] | 31 |  | 
| Alexey Samsonov | 0c53a38 | 2012-06-14 14:07:21 +0000 | [diff] [blame] | 32 | #include <crt_externs.h>  // for _NSGetEnviron | 
| Ismail Pazarbasi | b981dc8 | 2015-05-12 20:47:21 +0000 | [diff] [blame] | 33 | #include <errno.h> | 
| Alexey Samsonov | 4b1f103 | 2012-06-07 07:13:46 +0000 | [diff] [blame] | 34 | #include <fcntl.h> | 
| Ismail Pazarbasi | b981dc8 | 2015-05-12 20:47:21 +0000 | [diff] [blame] | 35 | #include <libkern/OSAtomic.h> | 
| Anna Zaks | 2249049 | 2015-02-27 03:12:19 +0000 | [diff] [blame] | 36 | #include <mach-o/dyld.h> | 
| Ismail Pazarbasi | b981dc8 | 2015-05-12 20:47:21 +0000 | [diff] [blame] | 37 | #include <mach/mach.h> | 
| Alexey Samsonov | 4b1f103 | 2012-06-07 07:13:46 +0000 | [diff] [blame] | 38 | #include <pthread.h> | 
| Alexey Samsonov | 58a3c58 | 2012-06-18 08:44:30 +0000 | [diff] [blame] | 39 | #include <sched.h> | 
| Alexander Potapenko | 789e3e1 | 2014-01-31 13:10:07 +0000 | [diff] [blame] | 40 | #include <signal.h> | 
| Anna Zaks | 2249049 | 2015-02-27 03:12:19 +0000 | [diff] [blame] | 41 | #include <stdlib.h> | 
| Alexey Samsonov | 2c5fc3b | 2012-06-04 14:27:50 +0000 | [diff] [blame] | 42 | #include <sys/mman.h> | 
| Alexey Samsonov | 4b1f103 | 2012-06-07 07:13:46 +0000 | [diff] [blame] | 43 | #include <sys/resource.h> | 
| Alexey Samsonov | dde1f11 | 2012-06-05 07:05:10 +0000 | [diff] [blame] | 44 | #include <sys/stat.h> | 
| Alexander Potapenko | 768e315 | 2014-02-03 15:32:19 +0000 | [diff] [blame] | 45 | #include <sys/sysctl.h> | 
| Alexey Samsonov | dde1f11 | 2012-06-05 07:05:10 +0000 | [diff] [blame] | 46 | #include <sys/types.h> | 
| Alexey Samsonov | 03c8b84 | 2012-06-05 08:32:53 +0000 | [diff] [blame] | 47 | #include <unistd.h> | 
| Alexey Samsonov | 2c5fc3b | 2012-06-04 14:27:50 +0000 | [diff] [blame] | 48 |  | 
|  | 49 | namespace __sanitizer { | 
|  | 50 |  | 
| Peter Collingbourne | 6f4be19 | 2013-05-08 14:43:49 +0000 | [diff] [blame] | 51 | #include "sanitizer_syscall_generic.inc" | 
|  | 52 |  | 
| Alexey Samsonov | 4b1f103 | 2012-06-07 07:13:46 +0000 | [diff] [blame] | 53 | // ---------------------- sanitizer_libc.h | 
| Peter Collingbourne | 8e110ce | 2013-05-08 15:07:12 +0000 | [diff] [blame] | 54 | uptr internal_mmap(void *addr, size_t length, int prot, int flags, | 
|  | 55 | int fd, u64 offset) { | 
|  | 56 | return (uptr)mmap(addr, length, prot, flags, fd, offset); | 
| Alexey Samsonov | 2c5fc3b | 2012-06-04 14:27:50 +0000 | [diff] [blame] | 57 | } | 
|  | 58 |  | 
| Peter Collingbourne | 8e110ce | 2013-05-08 15:07:12 +0000 | [diff] [blame] | 59 | uptr internal_munmap(void *addr, uptr length) { | 
| Alexey Samsonov | 7ac77d6 | 2012-06-05 09:49:25 +0000 | [diff] [blame] | 60 | return munmap(addr, length); | 
|  | 61 | } | 
|  | 62 |  | 
| Timur Iskhodzhanov | ea1f332 | 2015-04-10 15:02:19 +0000 | [diff] [blame] | 63 | int internal_mprotect(void *addr, uptr length, int prot) { | 
|  | 64 | return mprotect(addr, length, prot); | 
|  | 65 | } | 
|  | 66 |  | 
| Peter Collingbourne | 6f4be19 | 2013-05-08 14:43:49 +0000 | [diff] [blame] | 67 | uptr internal_close(fd_t fd) { | 
| Alexey Samsonov | 03c8b84 | 2012-06-05 08:32:53 +0000 | [diff] [blame] | 68 | return close(fd); | 
|  | 69 | } | 
|  | 70 |  | 
| Peter Collingbourne | 6f4be19 | 2013-05-08 14:43:49 +0000 | [diff] [blame] | 71 | uptr internal_open(const char *filename, int flags) { | 
| Alexey Samsonov | 39313b7 | 2013-02-01 15:58:46 +0000 | [diff] [blame] | 72 | return open(filename, flags); | 
|  | 73 | } | 
|  | 74 |  | 
| Peter Collingbourne | 6f4be19 | 2013-05-08 14:43:49 +0000 | [diff] [blame] | 75 | uptr internal_open(const char *filename, int flags, u32 mode) { | 
| Alexey Samsonov | 39313b7 | 2013-02-01 15:58:46 +0000 | [diff] [blame] | 76 | return open(filename, flags, mode); | 
|  | 77 | } | 
|  | 78 |  | 
| Alexey Samsonov | 03c8b84 | 2012-06-05 08:32:53 +0000 | [diff] [blame] | 79 | uptr internal_read(fd_t fd, void *buf, uptr count) { | 
|  | 80 | return read(fd, buf, count); | 
|  | 81 | } | 
|  | 82 |  | 
|  | 83 | uptr internal_write(fd_t fd, const void *buf, uptr count) { | 
|  | 84 | return write(fd, buf, count); | 
|  | 85 | } | 
|  | 86 |  | 
| Peter Collingbourne | 6f4be19 | 2013-05-08 14:43:49 +0000 | [diff] [blame] | 87 | uptr internal_stat(const char *path, void *buf) { | 
| Alexey Samsonov | 576e270 | 2013-02-04 10:31:39 +0000 | [diff] [blame] | 88 | return stat(path, (struct stat *)buf); | 
| Alexey Samsonov | 2c5cbd2 | 2013-02-04 10:16:50 +0000 | [diff] [blame] | 89 | } | 
|  | 90 |  | 
| Peter Collingbourne | 6f4be19 | 2013-05-08 14:43:49 +0000 | [diff] [blame] | 91 | uptr internal_lstat(const char *path, void *buf) { | 
| Alexey Samsonov | 576e270 | 2013-02-04 10:31:39 +0000 | [diff] [blame] | 92 | return lstat(path, (struct stat *)buf); | 
| Alexey Samsonov | 2c5cbd2 | 2013-02-04 10:16:50 +0000 | [diff] [blame] | 93 | } | 
|  | 94 |  | 
| Peter Collingbourne | 6f4be19 | 2013-05-08 14:43:49 +0000 | [diff] [blame] | 95 | uptr internal_fstat(fd_t fd, void *buf) { | 
| Alexey Samsonov | 576e270 | 2013-02-04 10:31:39 +0000 | [diff] [blame] | 96 | return fstat(fd, (struct stat *)buf); | 
| Alexey Samsonov | 2c5cbd2 | 2013-02-04 10:16:50 +0000 | [diff] [blame] | 97 | } | 
|  | 98 |  | 
| Alexey Samsonov | ca2b5d7 | 2012-06-06 07:30:33 +0000 | [diff] [blame] | 99 | uptr internal_filesize(fd_t fd) { | 
| Alexey Samsonov | ce8d497 | 2012-08-02 10:09:31 +0000 | [diff] [blame] | 100 | struct stat st; | 
| Alexey Samsonov | 2c5cbd2 | 2013-02-04 10:16:50 +0000 | [diff] [blame] | 101 | if (internal_fstat(fd, &st)) | 
| Alexey Samsonov | ca2b5d7 | 2012-06-06 07:30:33 +0000 | [diff] [blame] | 102 | return -1; | 
|  | 103 | return (uptr)st.st_size; | 
|  | 104 | } | 
|  | 105 |  | 
| Peter Collingbourne | 6f4be19 | 2013-05-08 14:43:49 +0000 | [diff] [blame] | 106 | uptr internal_dup2(int oldfd, int newfd) { | 
| Alexey Samsonov | ca2b5d7 | 2012-06-06 07:30:33 +0000 | [diff] [blame] | 107 | return dup2(oldfd, newfd); | 
|  | 108 | } | 
|  | 109 |  | 
| Alexey Samsonov | f6d2125 | 2012-09-05 14:48:24 +0000 | [diff] [blame] | 110 | uptr internal_readlink(const char *path, char *buf, uptr bufsize) { | 
|  | 111 | return readlink(path, buf, bufsize); | 
|  | 112 | } | 
|  | 113 |  | 
| Kuba Brecka | c52f300 | 2014-12-29 02:18:59 +0000 | [diff] [blame] | 114 | uptr internal_unlink(const char *path) { | 
|  | 115 | return unlink(path); | 
|  | 116 | } | 
|  | 117 |  | 
| Peter Collingbourne | 6f4be19 | 2013-05-08 14:43:49 +0000 | [diff] [blame] | 118 | uptr internal_sched_yield() { | 
| Alexey Samsonov | 58a3c58 | 2012-06-18 08:44:30 +0000 | [diff] [blame] | 119 | return sched_yield(); | 
|  | 120 | } | 
|  | 121 |  | 
| Alexey Samsonov | aadd1f2 | 2013-02-20 13:54:32 +0000 | [diff] [blame] | 122 | void internal__exit(int exitcode) { | 
|  | 123 | _exit(exitcode); | 
|  | 124 | } | 
|  | 125 |  | 
| Peter Collingbourne | ffaf2ea | 2013-05-17 16:56:53 +0000 | [diff] [blame] | 126 | uptr internal_getpid() { | 
|  | 127 | return getpid(); | 
|  | 128 | } | 
|  | 129 |  | 
| Alexander Potapenko | 789e3e1 | 2014-01-31 13:10:07 +0000 | [diff] [blame] | 130 | int internal_sigaction(int signum, const void *act, void *oldact) { | 
|  | 131 | return sigaction(signum, | 
|  | 132 | (struct sigaction *)act, (struct sigaction *)oldact); | 
|  | 133 | } | 
|  | 134 |  | 
| Alexander Potapenko | 4a6cac4 | 2014-05-13 16:17:54 +0000 | [diff] [blame] | 135 | int internal_fork() { | 
|  | 136 | // TODO(glider): this may call user's pthread_atfork() handlers which is bad. | 
|  | 137 | return fork(); | 
|  | 138 | } | 
|  | 139 |  | 
| Evgeniy Stepanov | 567e516 | 2014-05-27 12:37:52 +0000 | [diff] [blame] | 140 | uptr internal_rename(const char *oldpath, const char *newpath) { | 
|  | 141 | return rename(oldpath, newpath); | 
|  | 142 | } | 
|  | 143 |  | 
|  | 144 | uptr internal_ftruncate(fd_t fd, uptr size) { | 
|  | 145 | return ftruncate(fd, size); | 
|  | 146 | } | 
|  | 147 |  | 
| Alexey Samsonov | 4b1f103 | 2012-06-07 07:13:46 +0000 | [diff] [blame] | 148 | // ----------------- sanitizer_common.h | 
| Alexey Samsonov | ae9b18b | 2012-11-09 14:45:30 +0000 | [diff] [blame] | 149 | bool FileExists(const char *filename) { | 
|  | 150 | struct stat st; | 
|  | 151 | if (stat(filename, &st)) | 
|  | 152 | return false; | 
|  | 153 | // Sanity check: filename is a regular file. | 
|  | 154 | return S_ISREG(st.st_mode); | 
|  | 155 | } | 
|  | 156 |  | 
| Dmitry Vyukov | 56faa55 | 2012-10-02 12:58:14 +0000 | [diff] [blame] | 157 | uptr GetTid() { | 
|  | 158 | return reinterpret_cast<uptr>(pthread_self()); | 
|  | 159 | } | 
|  | 160 |  | 
| Alexey Samsonov | cf4d3a0 | 2012-06-07 07:32:00 +0000 | [diff] [blame] | 161 | void GetThreadStackTopAndBottom(bool at_initialization, uptr *stack_top, | 
| Alexey Samsonov | 4b1f103 | 2012-06-07 07:13:46 +0000 | [diff] [blame] | 162 | uptr *stack_bottom) { | 
|  | 163 | CHECK(stack_top); | 
|  | 164 | CHECK(stack_bottom); | 
|  | 165 | uptr stacksize = pthread_get_stacksize_np(pthread_self()); | 
| Alexander Potapenko | f6ff6b0 | 2014-02-03 16:42:29 +0000 | [diff] [blame] | 166 | // pthread_get_stacksize_np() returns an incorrect stack size for the main | 
|  | 167 | // thread on Mavericks. See | 
|  | 168 | // https://code.google.com/p/address-sanitizer/issues/detail?id=261 | 
| Kuba Brecka | 0078cea7 | 2014-11-05 18:55:38 +0000 | [diff] [blame] | 169 | if ((GetMacosVersion() >= MACOS_VERSION_MAVERICKS) && at_initialization && | 
| Alexander Potapenko | f6ff6b0 | 2014-02-03 16:42:29 +0000 | [diff] [blame] | 170 | stacksize == (1 << 19))  { | 
|  | 171 | struct rlimit rl; | 
|  | 172 | CHECK_EQ(getrlimit(RLIMIT_STACK, &rl), 0); | 
|  | 173 | // Most often rl.rlim_cur will be the desired 8M. | 
|  | 174 | if (rl.rlim_cur < kMaxThreadStackSize) { | 
|  | 175 | stacksize = rl.rlim_cur; | 
|  | 176 | } else { | 
|  | 177 | stacksize = kMaxThreadStackSize; | 
|  | 178 | } | 
|  | 179 | } | 
| Alexey Samsonov | 4b1f103 | 2012-06-07 07:13:46 +0000 | [diff] [blame] | 180 | void *stackaddr = pthread_get_stackaddr_np(pthread_self()); | 
|  | 181 | *stack_top = (uptr)stackaddr; | 
| Alexey Samsonov | cf4d3a0 | 2012-06-07 07:32:00 +0000 | [diff] [blame] | 182 | *stack_bottom = *stack_top - stacksize; | 
| Alexey Samsonov | 4b1f103 | 2012-06-07 07:13:46 +0000 | [diff] [blame] | 183 | } | 
|  | 184 |  | 
| Alexey Samsonov | 0c53a38 | 2012-06-14 14:07:21 +0000 | [diff] [blame] | 185 | const char *GetEnv(const char *name) { | 
|  | 186 | char ***env_ptr = _NSGetEnviron(); | 
| Alexander Potapenko | fa82ba9 | 2013-11-13 13:34:53 +0000 | [diff] [blame] | 187 | if (!env_ptr) { | 
|  | 188 | Report("_NSGetEnviron() returned NULL. Please make sure __asan_init() is " | 
|  | 189 | "called after libSystem_initializer().\n"); | 
|  | 190 | CHECK(env_ptr); | 
|  | 191 | } | 
| Alexey Samsonov | 0c53a38 | 2012-06-14 14:07:21 +0000 | [diff] [blame] | 192 | char **environ = *env_ptr; | 
|  | 193 | CHECK(environ); | 
|  | 194 | uptr name_len = internal_strlen(name); | 
|  | 195 | while (*environ != 0) { | 
|  | 196 | uptr len = internal_strlen(*environ); | 
|  | 197 | if (len > name_len) { | 
|  | 198 | const char *p = *environ; | 
|  | 199 | if (!internal_memcmp(p, name, name_len) && | 
|  | 200 | p[name_len] == '=') {  // Match. | 
|  | 201 | return *environ + name_len + 1;  // String starting after =. | 
|  | 202 | } | 
|  | 203 | } | 
|  | 204 | environ++; | 
|  | 205 | } | 
|  | 206 | return 0; | 
|  | 207 | } | 
| Alexey Samsonov | 4b1f103 | 2012-06-07 07:13:46 +0000 | [diff] [blame] | 208 |  | 
| Anna Zaks | 2249049 | 2015-02-27 03:12:19 +0000 | [diff] [blame] | 209 | uptr ReadBinaryName(/*out*/char *buf, uptr buf_len) { | 
|  | 210 | CHECK_LE(kMaxPathLength, buf_len); | 
|  | 211 |  | 
|  | 212 | // On OS X the executable path is saved to the stack by dyld. Reading it | 
|  | 213 | // from there is much faster than calling dladdr, especially for large | 
|  | 214 | // binaries with symbols. | 
|  | 215 | InternalScopedString exe_path(kMaxPathLength); | 
|  | 216 | uint32_t size = exe_path.size(); | 
|  | 217 | if (_NSGetExecutablePath(exe_path.data(), &size) == 0 && | 
|  | 218 | realpath(exe_path.data(), buf) != 0) { | 
|  | 219 | return internal_strlen(buf); | 
|  | 220 | } | 
|  | 221 | return 0; | 
|  | 222 | } | 
|  | 223 |  | 
| Alexey Samsonov | 97ca306 | 2012-09-17 09:12:39 +0000 | [diff] [blame] | 224 | void ReExec() { | 
|  | 225 | UNIMPLEMENTED(); | 
|  | 226 | } | 
|  | 227 |  | 
| Peter Collingbourne | b69b8a4 | 2013-05-20 17:05:29 +0000 | [diff] [blame] | 228 | uptr GetPageSize() { | 
|  | 229 | return sysconf(_SC_PAGESIZE); | 
|  | 230 | } | 
|  | 231 |  | 
| Alexey Samsonov | a097f7b | 2013-03-14 13:30:56 +0000 | [diff] [blame] | 232 | BlockingMutex::BlockingMutex() { | 
|  | 233 | internal_memset(this, 0, sizeof(*this)); | 
|  | 234 | } | 
|  | 235 |  | 
| Dmitry Vyukov | f22982b | 2013-01-14 07:51:39 +0000 | [diff] [blame] | 236 | void BlockingMutex::Lock() { | 
|  | 237 | CHECK(sizeof(OSSpinLock) <= sizeof(opaque_storage_)); | 
| Kostya Serebryany | 459df6f | 2013-02-26 12:59:06 +0000 | [diff] [blame] | 238 | CHECK_EQ(OS_SPINLOCK_INIT, 0); | 
|  | 239 | CHECK_NE(owner_, (uptr)pthread_self()); | 
| Dmitry Vyukov | f22982b | 2013-01-14 07:51:39 +0000 | [diff] [blame] | 240 | OSSpinLockLock((OSSpinLock*)&opaque_storage_); | 
|  | 241 | CHECK(!owner_); | 
|  | 242 | owner_ = (uptr)pthread_self(); | 
|  | 243 | } | 
|  | 244 |  | 
|  | 245 | void BlockingMutex::Unlock() { | 
|  | 246 | CHECK(owner_ == (uptr)pthread_self()); | 
|  | 247 | owner_ = 0; | 
|  | 248 | OSSpinLockUnlock((OSSpinLock*)&opaque_storage_); | 
|  | 249 | } | 
|  | 250 |  | 
| Alexey Samsonov | db7d965 | 2013-03-11 15:45:20 +0000 | [diff] [blame] | 251 | void BlockingMutex::CheckLocked() { | 
|  | 252 | CHECK_EQ((uptr)pthread_self(), owner_); | 
|  | 253 | } | 
|  | 254 |  | 
| Dmitry Vyukov | c9e304a | 2013-06-06 13:00:32 +0000 | [diff] [blame] | 255 | u64 NanoTime() { | 
|  | 256 | return 0; | 
|  | 257 | } | 
|  | 258 |  | 
| Evgeniy Stepanov | 5697b58 | 2013-03-13 08:19:53 +0000 | [diff] [blame] | 259 | uptr GetTlsSize() { | 
|  | 260 | return 0; | 
|  | 261 | } | 
|  | 262 |  | 
|  | 263 | void InitTlsSize() { | 
|  | 264 | } | 
|  | 265 |  | 
| Sergey Matveev | 954c6ef1 | 2013-05-07 14:41:43 +0000 | [diff] [blame] | 266 | void GetThreadStackAndTls(bool main, uptr *stk_addr, uptr *stk_size, | 
|  | 267 | uptr *tls_addr, uptr *tls_size) { | 
| Dmitry Vyukov | ce0247c | 2013-06-06 13:20:40 +0000 | [diff] [blame] | 268 | #ifndef SANITIZER_GO | 
| Sergey Matveev | 954c6ef1 | 2013-05-07 14:41:43 +0000 | [diff] [blame] | 269 | uptr stack_top, stack_bottom; | 
|  | 270 | GetThreadStackTopAndBottom(main, &stack_top, &stack_bottom); | 
|  | 271 | *stk_addr = stack_bottom; | 
|  | 272 | *stk_size = stack_top - stack_bottom; | 
|  | 273 | *tls_addr = 0; | 
|  | 274 | *tls_size = 0; | 
| Dmitry Vyukov | ce0247c | 2013-06-06 13:20:40 +0000 | [diff] [blame] | 275 | #else | 
|  | 276 | *stk_addr = 0; | 
|  | 277 | *stk_size = 0; | 
|  | 278 | *tls_addr = 0; | 
|  | 279 | *tls_size = 0; | 
|  | 280 | #endif | 
| Sergey Matveev | 954c6ef1 | 2013-05-07 14:41:43 +0000 | [diff] [blame] | 281 | } | 
|  | 282 |  | 
| Alexey Samsonov | 7a36e61 | 2013-09-10 14:36:16 +0000 | [diff] [blame] | 283 | uptr GetListOfModules(LoadedModule *modules, uptr max_modules, | 
|  | 284 | string_predicate_t filter) { | 
|  | 285 | MemoryMappingLayout memory_mapping(false); | 
| Alexey Samsonov | 64ffa59 | 2013-12-25 08:39:38 +0000 | [diff] [blame] | 286 | return memory_mapping.DumpListOfModules(modules, max_modules, filter); | 
| Alexey Samsonov | 7a36e61 | 2013-09-10 14:36:16 +0000 | [diff] [blame] | 287 | } | 
|  | 288 |  | 
| Alexander Potapenko | 789e3e1 | 2014-01-31 13:10:07 +0000 | [diff] [blame] | 289 | bool IsDeadlySignal(int signum) { | 
|  | 290 | return (signum == SIGSEGV || signum == SIGBUS) && common_flags()->handle_segv; | 
|  | 291 | } | 
|  | 292 |  | 
| Alexander Potapenko | 768e315 | 2014-02-03 15:32:19 +0000 | [diff] [blame] | 293 | MacosVersion cached_macos_version = MACOS_VERSION_UNINITIALIZED; | 
|  | 294 |  | 
|  | 295 | MacosVersion GetMacosVersionInternal() { | 
|  | 296 | int mib[2] = { CTL_KERN, KERN_OSRELEASE }; | 
|  | 297 | char version[100]; | 
|  | 298 | uptr len = 0, maxlen = sizeof(version) / sizeof(version[0]); | 
|  | 299 | for (uptr i = 0; i < maxlen; i++) version[i] = '\0'; | 
|  | 300 | // Get the version length. | 
|  | 301 | CHECK_NE(sysctl(mib, 2, 0, &len, 0, 0), -1); | 
|  | 302 | CHECK_LT(len, maxlen); | 
|  | 303 | CHECK_NE(sysctl(mib, 2, version, &len, 0, 0), -1); | 
|  | 304 | switch (version[0]) { | 
|  | 305 | case '9': return MACOS_VERSION_LEOPARD; | 
|  | 306 | case '1': { | 
|  | 307 | switch (version[1]) { | 
|  | 308 | case '0': return MACOS_VERSION_SNOW_LEOPARD; | 
|  | 309 | case '1': return MACOS_VERSION_LION; | 
|  | 310 | case '2': return MACOS_VERSION_MOUNTAIN_LION; | 
|  | 311 | case '3': return MACOS_VERSION_MAVERICKS; | 
| Kuba Brecka | f4bdbde | 2014-11-05 18:53:22 +0000 | [diff] [blame] | 312 | case '4': return MACOS_VERSION_YOSEMITE; | 
| Kuba Brecka | 731089b | 2014-12-16 04:46:15 +0000 | [diff] [blame] | 313 | default: | 
|  | 314 | if (IsDigit(version[1])) | 
|  | 315 | return MACOS_VERSION_UNKNOWN_NEWER; | 
|  | 316 | else | 
|  | 317 | return MACOS_VERSION_UNKNOWN; | 
| Alexander Potapenko | 768e315 | 2014-02-03 15:32:19 +0000 | [diff] [blame] | 318 | } | 
|  | 319 | } | 
|  | 320 | default: return MACOS_VERSION_UNKNOWN; | 
|  | 321 | } | 
|  | 322 | } | 
|  | 323 |  | 
|  | 324 | MacosVersion GetMacosVersion() { | 
|  | 325 | atomic_uint32_t *cache = | 
|  | 326 | reinterpret_cast<atomic_uint32_t*>(&cached_macos_version); | 
|  | 327 | MacosVersion result = | 
|  | 328 | static_cast<MacosVersion>(atomic_load(cache, memory_order_acquire)); | 
|  | 329 | if (result == MACOS_VERSION_UNINITIALIZED) { | 
|  | 330 | result = GetMacosVersionInternal(); | 
|  | 331 | atomic_store(cache, result, memory_order_release); | 
|  | 332 | } | 
|  | 333 | return result; | 
|  | 334 | } | 
|  | 335 |  | 
| Kostya Serebryany | 6c54a6b | 2014-12-09 01:22:59 +0000 | [diff] [blame] | 336 | uptr GetRSS() { | 
| Ismail Pazarbasi | b981dc8 | 2015-05-12 20:47:21 +0000 | [diff] [blame] | 337 | struct task_basic_info info; | 
|  | 338 | unsigned count = TASK_BASIC_INFO_COUNT; | 
|  | 339 | kern_return_t result = | 
|  | 340 | task_info(mach_task_self(), TASK_BASIC_INFO, (task_info_t)&info, &count); | 
|  | 341 | if (UNLIKELY(result != KERN_SUCCESS)) { | 
|  | 342 | Report("Cannot get task info. Error: %d\n", result); | 
|  | 343 | Die(); | 
|  | 344 | } | 
|  | 345 | return info.resident_size; | 
| Kostya Serebryany | 6c54a6b | 2014-12-09 01:22:59 +0000 | [diff] [blame] | 346 | } | 
|  | 347 |  | 
| Kostya Serebryany | 43eb773 | 2014-12-16 19:13:01 +0000 | [diff] [blame] | 348 | void *internal_start_thread(void (*func)(void *arg), void *arg) { return 0; } | 
| Kostya Serebryany | 5f5bc4a | 2014-12-16 21:06:07 +0000 | [diff] [blame] | 349 | void internal_join_thread(void *th) { } | 
| Kostya Serebryany | 43eb773 | 2014-12-16 19:13:01 +0000 | [diff] [blame] | 350 |  | 
| Dmitry Vyukov | b79ac88 | 2015-03-02 17:36:02 +0000 | [diff] [blame] | 351 | void GetPcSpBp(void *context, uptr *pc, uptr *sp, uptr *bp) { | 
|  | 352 | ucontext_t *ucontext = (ucontext_t*)context; | 
|  | 353 | # if SANITIZER_WORDSIZE == 64 | 
|  | 354 | *pc = ucontext->uc_mcontext->__ss.__rip; | 
|  | 355 | *bp = ucontext->uc_mcontext->__ss.__rbp; | 
|  | 356 | *sp = ucontext->uc_mcontext->__ss.__rsp; | 
|  | 357 | # else | 
|  | 358 | *pc = ucontext->uc_mcontext->__ss.__eip; | 
|  | 359 | *bp = ucontext->uc_mcontext->__ss.__ebp; | 
|  | 360 | *sp = ucontext->uc_mcontext->__ss.__esp; | 
|  | 361 | # endif  // SANITIZER_WORDSIZE | 
|  | 362 | } | 
|  | 363 |  | 
| Alexey Samsonov | 2c5fc3b | 2012-06-04 14:27:50 +0000 | [diff] [blame] | 364 | }  // namespace __sanitizer | 
|  | 365 |  | 
| Alexey Samsonov | a0e28a7 | 2013-04-03 07:24:35 +0000 | [diff] [blame] | 366 | #endif  // SANITIZER_MAC |