5d3805fca3
* ubsan.c (ubsan_expand_null_ifn): Use _v1 suffixed type mismatch builtins, store max (log2 (align), 0) into uchar field instead of align into uptr field. (ubsan_expand_objsize_ifn): Use _v1 suffixed type mismatch builtins, store uchar 0 field instead of uptr 0 field. (instrument_nonnull_return): Use _v1 suffixed nonnull return builtin, instead of passing one address of struct with 2 locations pass two addresses of structs with 1 location each. * sanitizer.def (BUILT_IN_UBSAN_HANDLE_TYPE_MISMATCH, BUILT_IN_UBSAN_HANDLE_TYPE_MISMATCH_ABORT, BUILT_IN_UBSAN_HANDLE_NONNULL_RETURN, BUILT_IN_UBSAN_HANDLE_NONNULL_RETURN_ABORT): Removed. (BUILT_IN_UBSAN_HANDLE_TYPE_MISMATCH_V1, BUILT_IN_UBSAN_HANDLE_TYPE_MISMATCH_V1_ABORT, BUILT_IN_UBSAN_HANDLE_NONNULL_RETURN_V1, BUILT_IN_UBSAN_HANDLE_NONNULL_RETURN_V1_ABORT): New builtins. * c-c++-common/ubsan/float-cast-overflow-1.c: Drop value keyword from expected output regexps. * c-c++-common/ubsan/float-cast-overflow-2.c: Likewise. * c-c++-common/ubsan/float-cast-overflow-3.c: Likewise. * c-c++-common/ubsan/float-cast-overflow-4.c: Likewise. * c-c++-common/ubsan/float-cast-overflow-5.c: Likewise. * c-c++-common/ubsan/float-cast-overflow-6.c: Likewise. * c-c++-common/ubsan/float-cast-overflow-8.c: Likewise. * c-c++-common/ubsan/float-cast-overflow-9.c: Likewise. * c-c++-common/ubsan/float-cast-overflow-10.c: Likewise. * g++.dg/ubsan/float-cast-overflow-bf.C: Likewise. * gcc.dg/ubsan/float-cast-overflow-bf.c: Likewise. * g++.dg/asan/default-options-1.C (__asan_default_options): Add used attribute. * g++.dg/asan/asan_test.C: Run with ASAN_OPTIONS=handle_segv=2 in the environment. * All source files: Merge from upstream 315899. * asan/Makefile.am (nodist_saninclude_HEADERS): Add include/sanitizer/tsan_interface.h. * asan/libtool-version: Bump the libasan SONAME. * lsan/Makefile.am (sanitizer_lsan_files): Add lsan_common_mac.cc. (lsan_files): Add lsan_linux.cc, lsan_mac.cc and lsan_malloc_mac.cc. * sanitizer_common/Makefile.am (sanitizer_common_files): Add sancov_flags.cc, sanitizer_allocator_checks.cc, sanitizer_coverage_libcdep_new.cc, sanitizer_errno.cc, sanitizer_file.cc, sanitizer_mac_libcdep.cc and sanitizer_stoptheworld_mac.cc. Remove sanitizer_coverage_libcdep.cc and sanitizer_coverage_mapping_libcdep.cc. * tsan/Makefile.am (tsan_files): Add tsan_external.cc. * ubsan/Makefile.am (DEFS): Add -DUBSAN_CAN_USE_CXXABI=1. (ubsan_files): Add ubsan_init_standalone.cc and ubsan_signals_standalone.cc. * ubsan/libtool-version: Bump the libubsan SONAME. * asan/Makefile.in: Regenerate. * lsan/Makefile.in: Regenerate. * sanitizer_common/Makefile.in: Regenerate. * tsan/Makefile.in: Regenerate. * ubsan/Makefile.in: Regenerate. From-SVN: r253887
193 lines
6.0 KiB
C++
193 lines
6.0 KiB
C++
//===-- sanitizer_symbolizer.h ----------------------------------*- C++ -*-===//
|
|
//
|
|
// This file is distributed under the University of Illinois Open Source
|
|
// License. See LICENSE.TXT for details.
|
|
//
|
|
//===----------------------------------------------------------------------===//
|
|
//
|
|
// Symbolizer is used by sanitizers to map instruction address to a location in
|
|
// source code at run-time. Symbolizer either uses __sanitizer_symbolize_*
|
|
// defined in the program, or (if they are missing) tries to find and
|
|
// launch "llvm-symbolizer" commandline tool in a separate process and
|
|
// communicate with it.
|
|
//
|
|
// Generally we should try to avoid calling system library functions during
|
|
// symbolization (and use their replacements from sanitizer_libc.h instead).
|
|
//===----------------------------------------------------------------------===//
|
|
#ifndef SANITIZER_SYMBOLIZER_H
|
|
#define SANITIZER_SYMBOLIZER_H
|
|
|
|
#include "sanitizer_common.h"
|
|
#include "sanitizer_mutex.h"
|
|
|
|
namespace __sanitizer {
|
|
|
|
struct AddressInfo {
|
|
// Owns all the string members. Storage for them is
|
|
// (de)allocated using sanitizer internal allocator.
|
|
uptr address;
|
|
|
|
char *module;
|
|
uptr module_offset;
|
|
ModuleArch module_arch;
|
|
|
|
static const uptr kUnknown = ~(uptr)0;
|
|
char *function;
|
|
uptr function_offset;
|
|
|
|
char *file;
|
|
int line;
|
|
int column;
|
|
|
|
AddressInfo();
|
|
// Deletes all strings and resets all fields.
|
|
void Clear();
|
|
void FillModuleInfo(const char *mod_name, uptr mod_offset, ModuleArch arch);
|
|
};
|
|
|
|
// Linked list of symbolized frames (each frame is described by AddressInfo).
|
|
struct SymbolizedStack {
|
|
SymbolizedStack *next;
|
|
AddressInfo info;
|
|
static SymbolizedStack *New(uptr addr);
|
|
// Deletes current, and all subsequent frames in the linked list.
|
|
// The object cannot be accessed after the call to this function.
|
|
void ClearAll();
|
|
|
|
private:
|
|
SymbolizedStack();
|
|
};
|
|
|
|
// For now, DataInfo is used to describe global variable.
|
|
struct DataInfo {
|
|
// Owns all the string members. Storage for them is
|
|
// (de)allocated using sanitizer internal allocator.
|
|
char *module;
|
|
uptr module_offset;
|
|
ModuleArch module_arch;
|
|
|
|
char *file;
|
|
uptr line;
|
|
char *name;
|
|
uptr start;
|
|
uptr size;
|
|
|
|
DataInfo();
|
|
void Clear();
|
|
};
|
|
|
|
class SymbolizerTool;
|
|
|
|
class Symbolizer final {
|
|
public:
|
|
/// Initialize and return platform-specific implementation of symbolizer
|
|
/// (if it wasn't already initialized).
|
|
static Symbolizer *GetOrInit();
|
|
static void LateInitialize();
|
|
// Returns a list of symbolized frames for a given address (containing
|
|
// all inlined functions, if necessary).
|
|
SymbolizedStack *SymbolizePC(uptr address);
|
|
bool SymbolizeData(uptr address, DataInfo *info);
|
|
|
|
// The module names Symbolizer returns are stable and unique for every given
|
|
// module. It is safe to store and compare them as pointers.
|
|
bool GetModuleNameAndOffsetForPC(uptr pc, const char **module_name,
|
|
uptr *module_address);
|
|
const char *GetModuleNameForPc(uptr pc) {
|
|
const char *module_name = nullptr;
|
|
uptr unused;
|
|
if (GetModuleNameAndOffsetForPC(pc, &module_name, &unused))
|
|
return module_name;
|
|
return nullptr;
|
|
}
|
|
|
|
// Release internal caches (if any).
|
|
void Flush();
|
|
// Attempts to demangle the provided C++ mangled name.
|
|
const char *Demangle(const char *name);
|
|
void PrepareForSandboxing();
|
|
|
|
// Allow user to install hooks that would be called before/after Symbolizer
|
|
// does the actual file/line info fetching. Specific sanitizers may need this
|
|
// to distinguish system library calls made in user code from calls made
|
|
// during in-process symbolization.
|
|
typedef void (*StartSymbolizationHook)();
|
|
typedef void (*EndSymbolizationHook)();
|
|
// May be called at most once.
|
|
void AddHooks(StartSymbolizationHook start_hook,
|
|
EndSymbolizationHook end_hook);
|
|
|
|
void RefreshModules();
|
|
const LoadedModule *FindModuleForAddress(uptr address);
|
|
|
|
void InvalidateModuleList();
|
|
|
|
private:
|
|
// GetModuleNameAndOffsetForPC has to return a string to the caller.
|
|
// Since the corresponding module might get unloaded later, we should create
|
|
// our owned copies of the strings that we can safely return.
|
|
// ModuleNameOwner does not provide any synchronization, thus calls to
|
|
// its method should be protected by |mu_|.
|
|
class ModuleNameOwner {
|
|
public:
|
|
explicit ModuleNameOwner(BlockingMutex *synchronized_by)
|
|
: storage_(kInitialCapacity), last_match_(nullptr),
|
|
mu_(synchronized_by) {}
|
|
const char *GetOwnedCopy(const char *str);
|
|
|
|
private:
|
|
static const uptr kInitialCapacity = 1000;
|
|
InternalMmapVector<const char*> storage_;
|
|
const char *last_match_;
|
|
|
|
BlockingMutex *mu_;
|
|
} module_names_;
|
|
|
|
/// Platform-specific function for creating a Symbolizer object.
|
|
static Symbolizer *PlatformInit();
|
|
|
|
bool FindModuleNameAndOffsetForAddress(uptr address, const char **module_name,
|
|
uptr *module_offset,
|
|
ModuleArch *module_arch);
|
|
ListOfModules modules_;
|
|
ListOfModules fallback_modules_;
|
|
// If stale, need to reload the modules before looking up addresses.
|
|
bool modules_fresh_;
|
|
|
|
// Platform-specific default demangler, must not return nullptr.
|
|
const char *PlatformDemangle(const char *name);
|
|
void PlatformPrepareForSandboxing();
|
|
|
|
static Symbolizer *symbolizer_;
|
|
static StaticSpinMutex init_mu_;
|
|
|
|
// Mutex locked from public methods of |Symbolizer|, so that the internals
|
|
// (including individual symbolizer tools and platform-specific methods) are
|
|
// always synchronized.
|
|
BlockingMutex mu_;
|
|
|
|
IntrusiveList<SymbolizerTool> tools_;
|
|
|
|
explicit Symbolizer(IntrusiveList<SymbolizerTool> tools);
|
|
|
|
static LowLevelAllocator symbolizer_allocator_;
|
|
|
|
StartSymbolizationHook start_hook_;
|
|
EndSymbolizationHook end_hook_;
|
|
class SymbolizerScope {
|
|
public:
|
|
explicit SymbolizerScope(const Symbolizer *sym);
|
|
~SymbolizerScope();
|
|
private:
|
|
const Symbolizer *sym_;
|
|
};
|
|
};
|
|
|
|
#ifdef SANITIZER_WINDOWS
|
|
void InitializeDbgHelpIfNeeded();
|
|
#endif
|
|
|
|
} // namespace __sanitizer
|
|
|
|
#endif // SANITIZER_SYMBOLIZER_H
|