blob: 90f30affc68ffcec9f2062d5b77b7ed24c7c23ab [file] [log] [blame]
Evgeniy Stepanov67227162012-12-25 11:53:51 +00001//===-- msan.h --------------------------------------------------*- C++ -*-===//
Evgeniy Stepanovc5033782012-12-11 12:27:27 +00002//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9//
10// This file is a part of MemorySanitizer.
11//
12// Private MSan header.
13//===----------------------------------------------------------------------===//
14
15#ifndef MSAN_H
16#define MSAN_H
17
18#include "sanitizer_common/sanitizer_internal_defs.h"
19#include "sanitizer_common/sanitizer_stacktrace.h"
Evgeniy Stepanoveac7f932013-01-29 14:33:29 +000020#include "msan_interface_internal.h"
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000021#include "msan_flags.h"
22
Evgeniy Stepanovc7af8782013-04-05 12:03:47 +000023#ifndef MSAN_REPLACE_OPERATORS_NEW_AND_DELETE
24# define MSAN_REPLACE_OPERATORS_NEW_AND_DELETE 1
25#endif
26
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000027#define MEM_TO_SHADOW(mem) (((uptr)mem) & ~0x400000000000ULL)
28#define MEM_TO_ORIGIN(mem) (MEM_TO_SHADOW(mem) + 0x200000000000ULL)
29#define MEM_IS_APP(mem) ((uptr)mem >= 0x600000000000ULL)
30#define MEM_IS_SHADOW(mem) ((uptr)mem >= 0x200000000000ULL && \
31 (uptr)mem <= 0x400000000000ULL)
32
Reid Klecknerc9d382b2013-03-11 18:07:42 +000033struct link_map; // Opaque type returned by dlopen().
34
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000035const int kMsanParamTlsSizeInWords = 100;
36const int kMsanRetvalTlsSizeInWords = 100;
37
38namespace __msan {
39extern int msan_inited;
40extern bool msan_init_is_running;
Evgeniy Stepanov9b52ce92013-01-10 11:17:55 +000041extern int msan_report_count;
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000042
43bool ProtectRange(uptr beg, uptr end);
44bool InitShadow(bool prot1, bool prot2, bool map_shadow, bool init_origins);
45char *GetProcSelfMaps();
46void InitializeInterceptors();
47
48void *MsanReallocate(StackTrace *stack, void *oldp, uptr size,
49 uptr alignment, bool zeroise);
50void MsanDeallocate(void *ptr);
51void InstallTrapHandler();
Evgeniy Stepanov9b52ce92013-01-10 11:17:55 +000052void InstallAtExitHandler();
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000053void ReplaceOperatorsNewAndDelete();
54
Kostya Serebryanyec87e782013-02-13 07:19:47 +000055void EnterSymbolizer();
56void ExitSymbolizer();
57bool IsInSymbolizer();
58
Reid Kleckner063dfe32013-03-06 16:11:58 +000059struct SymbolizerScope {
60 SymbolizerScope() { EnterSymbolizer(); }
61 ~SymbolizerScope() { ExitSymbolizer(); }
62};
63
Reid Klecknerc9d382b2013-03-11 18:07:42 +000064void EnterLoader();
65void ExitLoader();
66
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000067void MsanDie();
68void PrintWarning(uptr pc, uptr bp);
69void PrintWarningWithOrigin(uptr pc, uptr bp, u32 origin);
70
Evgeniy Stepanov76dc3a82013-02-19 12:43:18 +000071void GetStackTrace(StackTrace *stack, uptr max_s, uptr pc, uptr bp,
72 bool fast);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000073
Evgeniy Stepanov367dc642012-12-26 09:32:05 +000074void ReportUMR(StackTrace *stack, u32 origin);
75void ReportExpectedUMRNotFound(StackTrace *stack);
Evgeniy Stepanov9b52ce92013-01-10 11:17:55 +000076void ReportAtExitStatistics();
Evgeniy Stepanov367dc642012-12-26 09:32:05 +000077
Reid Klecknerc9d382b2013-03-11 18:07:42 +000078void UnpoisonMappedDSO(struct link_map *map);
79
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000080#define GET_MALLOC_STACK_TRACE \
81 StackTrace stack; \
82 stack.size = 0; \
83 if (__msan_get_track_origins() && msan_inited) \
84 GetStackTrace(&stack, flags()->num_callers, \
Evgeniy Stepanov76dc3a82013-02-19 12:43:18 +000085 StackTrace::GetCurrentPc(), GET_CURRENT_FRAME(), \
Evgeniy Stepanovfe0199e2013-03-14 11:47:03 +000086 flags()->fast_unwind_on_malloc)
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000087
88} // namespace __msan
89
90#endif // MSAN_H