blob: 1880b8ef39485eacc4bbba56f5fef9bdd9b8bcfc [file] [log] [blame]
Evgeniy Stepanov67227162012-12-25 11:53:51 +00001//===-- msan.h --------------------------------------------------*- C++ -*-===//
Evgeniy Stepanovc5033782012-12-11 12:27:27 +00002//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9//
10// This file is a part of MemorySanitizer.
11//
12// Private MSan header.
13//===----------------------------------------------------------------------===//
14
15#ifndef MSAN_H
16#define MSAN_H
17
18#include "sanitizer_common/sanitizer_internal_defs.h"
19#include "sanitizer_common/sanitizer_stacktrace.h"
Evgeniy Stepanoveac7f932013-01-29 14:33:29 +000020#include "msan_interface_internal.h"
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000021#include "msan_flags.h"
22
23#define MEM_TO_SHADOW(mem) (((uptr)mem) & ~0x400000000000ULL)
24#define MEM_TO_ORIGIN(mem) (MEM_TO_SHADOW(mem) + 0x200000000000ULL)
25#define MEM_IS_APP(mem) ((uptr)mem >= 0x600000000000ULL)
26#define MEM_IS_SHADOW(mem) ((uptr)mem >= 0x200000000000ULL && \
27 (uptr)mem <= 0x400000000000ULL)
28
Reid Klecknerc9d382b2013-03-11 18:07:42 +000029struct link_map; // Opaque type returned by dlopen().
30
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000031const int kMsanParamTlsSizeInWords = 100;
32const int kMsanRetvalTlsSizeInWords = 100;
33
34namespace __msan {
35extern int msan_inited;
36extern bool msan_init_is_running;
Evgeniy Stepanov9b52ce92013-01-10 11:17:55 +000037extern int msan_report_count;
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000038
39bool ProtectRange(uptr beg, uptr end);
40bool InitShadow(bool prot1, bool prot2, bool map_shadow, bool init_origins);
41char *GetProcSelfMaps();
42void InitializeInterceptors();
43
44void *MsanReallocate(StackTrace *stack, void *oldp, uptr size,
45 uptr alignment, bool zeroise);
46void MsanDeallocate(void *ptr);
47void InstallTrapHandler();
Evgeniy Stepanov9b52ce92013-01-10 11:17:55 +000048void InstallAtExitHandler();
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000049void ReplaceOperatorsNewAndDelete();
50
Kostya Serebryanyec87e782013-02-13 07:19:47 +000051void EnterSymbolizer();
52void ExitSymbolizer();
53bool IsInSymbolizer();
54
Reid Kleckner063dfe32013-03-06 16:11:58 +000055struct SymbolizerScope {
56 SymbolizerScope() { EnterSymbolizer(); }
57 ~SymbolizerScope() { ExitSymbolizer(); }
58};
59
Reid Klecknerc9d382b2013-03-11 18:07:42 +000060void EnterLoader();
61void ExitLoader();
62
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000063void MsanDie();
64void PrintWarning(uptr pc, uptr bp);
65void PrintWarningWithOrigin(uptr pc, uptr bp, u32 origin);
66
Evgeniy Stepanov76dc3a82013-02-19 12:43:18 +000067void GetStackTrace(StackTrace *stack, uptr max_s, uptr pc, uptr bp,
68 bool fast);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000069
Evgeniy Stepanov367dc642012-12-26 09:32:05 +000070void ReportUMR(StackTrace *stack, u32 origin);
71void ReportExpectedUMRNotFound(StackTrace *stack);
Evgeniy Stepanov9b52ce92013-01-10 11:17:55 +000072void ReportAtExitStatistics();
Evgeniy Stepanov367dc642012-12-26 09:32:05 +000073
Reid Klecknerc9d382b2013-03-11 18:07:42 +000074void UnpoisonMappedDSO(struct link_map *map);
75
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000076#define GET_MALLOC_STACK_TRACE \
77 StackTrace stack; \
78 stack.size = 0; \
79 if (__msan_get_track_origins() && msan_inited) \
80 GetStackTrace(&stack, flags()->num_callers, \
Evgeniy Stepanov76dc3a82013-02-19 12:43:18 +000081 StackTrace::GetCurrentPc(), GET_CURRENT_FRAME(), \
Evgeniy Stepanovfe0199e2013-03-14 11:47:03 +000082 flags()->fast_unwind_on_malloc)
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000083
84} // namespace __msan
85
86#endif // MSAN_H