blob: 892cf047ab5d67955a909b64182b549f89292880 [file] [log] [blame]
Evgeniy Stepanov67227162012-12-25 11:53:51 +00001//===-- msan.h --------------------------------------------------*- C++ -*-===//
Evgeniy Stepanovc5033782012-12-11 12:27:27 +00002//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9//
10// This file is a part of MemorySanitizer.
11//
12// Private MSan header.
13//===----------------------------------------------------------------------===//
14
15#ifndef MSAN_H
16#define MSAN_H
17
Sergey Matveev6eff11e2013-05-06 13:15:14 +000018#include "sanitizer_common/sanitizer_flags.h"
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000019#include "sanitizer_common/sanitizer_internal_defs.h"
20#include "sanitizer_common/sanitizer_stacktrace.h"
Evgeniy Stepanoveac7f932013-01-29 14:33:29 +000021#include "msan_interface_internal.h"
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000022#include "msan_flags.h"
23
Evgeniy Stepanovc7af8782013-04-05 12:03:47 +000024#ifndef MSAN_REPLACE_OPERATORS_NEW_AND_DELETE
25# define MSAN_REPLACE_OPERATORS_NEW_AND_DELETE 1
26#endif
27
Evgeniy Stepanovd280ee42013-10-24 11:56:03 +000028#define MEM_TO_SHADOW(mem) (((uptr)mem) & ~0x400000000000ULL)
29#define SHADOW_TO_ORIGIN(shadow) (((uptr)shadow) + 0x200000000000ULL)
30#define MEM_TO_ORIGIN(mem) (SHADOW_TO_ORIGIN(MEM_TO_SHADOW(mem)))
31#define MEM_IS_APP(mem) ((uptr)mem >= 0x600000000000ULL)
32#define MEM_IS_SHADOW(mem) \
33 ((uptr)mem >= 0x200000000000ULL && (uptr)mem <= 0x400000000000ULL)
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000034
Evgeniy Stepanov35eb2652014-10-22 00:12:40 +000035// These constants must be kept in sync with the ones in MemorySanitizer.cc.
36const int kMsanParamTlsSize = 800;
37const int kMsanRetvalTlsSize = 800;
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000038
39namespace __msan {
40extern int msan_inited;
41extern bool msan_init_is_running;
Evgeniy Stepanov9b52ce92013-01-10 11:17:55 +000042extern int msan_report_count;
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000043
44bool ProtectRange(uptr beg, uptr end);
45bool InitShadow(bool prot1, bool prot2, bool map_shadow, bool init_origins);
46char *GetProcSelfMaps();
47void InitializeInterceptors();
48
Evgeniy Stepanov2794c472013-10-22 14:31:30 +000049void MsanAllocatorThreadFinish();
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000050void *MsanReallocate(StackTrace *stack, void *oldp, uptr size,
51 uptr alignment, bool zeroise);
Evgeniy Stepanov65562f52013-09-16 11:03:31 +000052void MsanDeallocate(StackTrace *stack, void *ptr);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000053void InstallTrapHandler();
Evgeniy Stepanov9b52ce92013-01-10 11:17:55 +000054void InstallAtExitHandler();
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000055void ReplaceOperatorsNewAndDelete();
56
Evgeniy Stepanov208aae82014-05-21 09:02:13 +000057const char *GetStackOriginDescr(u32 id, uptr *pc);
Evgeniy Stepanovac5ac342013-09-13 12:49:13 +000058
Kostya Serebryanyec87e782013-02-13 07:19:47 +000059void EnterSymbolizer();
60void ExitSymbolizer();
61bool IsInSymbolizer();
62
Reid Kleckner063dfe32013-03-06 16:11:58 +000063struct SymbolizerScope {
64 SymbolizerScope() { EnterSymbolizer(); }
65 ~SymbolizerScope() { ExitSymbolizer(); }
66};
67
Reid Klecknerc9d382b2013-03-11 18:07:42 +000068void EnterLoader();
69void ExitLoader();
70
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000071void MsanDie();
72void PrintWarning(uptr pc, uptr bp);
73void PrintWarningWithOrigin(uptr pc, uptr bp, u32 origin);
74
Alexey Samsonov9c859272014-10-26 03:35:14 +000075void GetStackTrace(BufferedStackTrace *stack, uptr max_s, uptr pc, uptr bp,
Alexey Samsonovb3d93992013-11-07 07:28:33 +000076 bool request_fast_unwind);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000077
Evgeniy Stepanov367dc642012-12-26 09:32:05 +000078void ReportUMR(StackTrace *stack, u32 origin);
79void ReportExpectedUMRNotFound(StackTrace *stack);
Evgeniy Stepanovbce21ac2014-05-21 09:56:28 +000080void ReportStats();
Evgeniy Stepanov9b52ce92013-01-10 11:17:55 +000081void ReportAtExitStatistics();
Evgeniy Stepanovfe250b02014-04-30 09:50:30 +000082void DescribeMemoryRange(const void *x, uptr size);
Evgeniy Stepanov8dd62dc2014-05-07 11:50:14 +000083void ReportUMRInsideAddressRange(const char *what, const void *start, uptr size,
84 uptr offset);
Evgeniy Stepanov367dc642012-12-26 09:32:05 +000085
Alexey Samsonoved4594b2013-06-27 07:50:56 +000086// Unpoison first n function arguments.
87void UnpoisonParam(uptr n);
Evgeniy Stepanovc4179812013-08-27 12:59:39 +000088void UnpoisonThreadLocalState();
Reid Klecknerc9d382b2013-03-11 18:07:42 +000089
Evgeniy Stepanova55fcd32014-04-02 11:06:35 +000090u32 GetOriginIfPoisoned(uptr a, uptr size);
91void SetOriginIfPoisoned(uptr addr, uptr src_shadow, uptr size, u32 src_origin);
Evgeniy Stepanov412d9732014-03-18 13:45:19 +000092void CopyOrigin(void *dst, const void *src, uptr size, StackTrace *stack);
93void MovePoison(void *dst, const void *src, uptr size, StackTrace *stack);
94void CopyPoison(void *dst, const void *src, uptr size, StackTrace *stack);
95
96// Returns a "chained" origin id, pointing to the given stack trace followed by
97// the previous origin id.
98u32 ChainOrigin(u32 id, StackTrace *stack);
99
Alexey Samsonov9c859272014-10-26 03:35:14 +0000100#define GET_MALLOC_STACK_TRACE \
101 BufferedStackTrace stack; \
102 if (__msan_get_track_origins() && msan_inited) \
103 GetStackTrace(&stack, common_flags()->malloc_context_size, \
104 StackTrace::GetCurrentPc(), GET_CURRENT_FRAME(), \
Evgeniy Stepanovc935ca82014-06-27 12:48:01 +0000105 common_flags()->fast_unwind_on_malloc)
Evgeniy Stepanov3c957442014-03-31 14:18:55 +0000106
Alexey Samsonov9c859272014-10-26 03:35:14 +0000107#define GET_STORE_STACK_TRACE_PC_BP(pc, bp) \
108 BufferedStackTrace stack; \
109 if (__msan_get_track_origins() > 1 && msan_inited) \
110 GetStackTrace(&stack, flags()->store_context_size, pc, bp, \
111 common_flags()->fast_unwind_on_malloc)
112
113#define GET_FATAL_STACK_TRACE_PC_BP(pc, bp) \
114 BufferedStackTrace stack; \
115 if (msan_inited) \
116 GetStackTrace(&stack, kStackTraceMax, pc, bp, \
117 common_flags()->fast_unwind_on_fatal)
Sergey Matveeva5310582014-05-26 13:08:08 +0000118
Evgeniy Stepanov3c957442014-03-31 14:18:55 +0000119#define GET_STORE_STACK_TRACE \
120 GET_STORE_STACK_TRACE_PC_BP(StackTrace::GetCurrentPc(), GET_CURRENT_FRAME())
Evgeniy Stepanov412d9732014-03-18 13:45:19 +0000121
Evgeniy Stepanovcb22c672013-08-27 14:08:15 +0000122class ScopedThreadLocalStateBackup {
Alexey Samsonovef643ce2013-08-28 11:26:09 +0000123 public:
Evgeniy Stepanovcb22c672013-08-27 14:08:15 +0000124 ScopedThreadLocalStateBackup() { Backup(); }
125 ~ScopedThreadLocalStateBackup() { Restore(); }
126 void Backup();
127 void Restore();
Alexey Samsonovef643ce2013-08-28 11:26:09 +0000128 private:
Evgeniy Stepanovcb22c672013-08-27 14:08:15 +0000129 u64 va_arg_overflow_size_tls;
130};
Evgeniy Stepanov89602652014-03-27 14:04:58 +0000131
132extern void (*death_callback)(void);
133
Evgeniy Stepanovf653cda2014-04-04 09:47:41 +0000134void MsanTSDInit(void (*destructor)(void *tsd));
135void *MsanTSDGet();
136void MsanTSDSet(void *tsd);
137void MsanTSDDtor(void *tsd);
138
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000139} // namespace __msan
140
Evgeniy Stepanov44b77c22013-08-02 14:26:58 +0000141#define MSAN_MALLOC_HOOK(ptr, size) \
Alexey Samsonov91bb8e02014-07-07 17:39:31 +0000142 if (&__sanitizer_malloc_hook) __sanitizer_malloc_hook(ptr, size)
Evgeniy Stepanov44b77c22013-08-02 14:26:58 +0000143#define MSAN_FREE_HOOK(ptr) \
Alexey Samsonov91bb8e02014-07-07 17:39:31 +0000144 if (&__sanitizer_free_hook) __sanitizer_free_hook(ptr)
Evgeniy Stepanov44b77c22013-08-02 14:26:58 +0000145
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000146#endif // MSAN_H