5d3805fca3
* ubsan.c (ubsan_expand_null_ifn): Use _v1 suffixed type mismatch builtins, store max (log2 (align), 0) into uchar field instead of align into uptr field. (ubsan_expand_objsize_ifn): Use _v1 suffixed type mismatch builtins, store uchar 0 field instead of uptr 0 field. (instrument_nonnull_return): Use _v1 suffixed nonnull return builtin, instead of passing one address of struct with 2 locations pass two addresses of structs with 1 location each. * sanitizer.def (BUILT_IN_UBSAN_HANDLE_TYPE_MISMATCH, BUILT_IN_UBSAN_HANDLE_TYPE_MISMATCH_ABORT, BUILT_IN_UBSAN_HANDLE_NONNULL_RETURN, BUILT_IN_UBSAN_HANDLE_NONNULL_RETURN_ABORT): Removed. (BUILT_IN_UBSAN_HANDLE_TYPE_MISMATCH_V1, BUILT_IN_UBSAN_HANDLE_TYPE_MISMATCH_V1_ABORT, BUILT_IN_UBSAN_HANDLE_NONNULL_RETURN_V1, BUILT_IN_UBSAN_HANDLE_NONNULL_RETURN_V1_ABORT): New builtins. * c-c++-common/ubsan/float-cast-overflow-1.c: Drop value keyword from expected output regexps. * c-c++-common/ubsan/float-cast-overflow-2.c: Likewise. * c-c++-common/ubsan/float-cast-overflow-3.c: Likewise. * c-c++-common/ubsan/float-cast-overflow-4.c: Likewise. * c-c++-common/ubsan/float-cast-overflow-5.c: Likewise. * c-c++-common/ubsan/float-cast-overflow-6.c: Likewise. * c-c++-common/ubsan/float-cast-overflow-8.c: Likewise. * c-c++-common/ubsan/float-cast-overflow-9.c: Likewise. * c-c++-common/ubsan/float-cast-overflow-10.c: Likewise. * g++.dg/ubsan/float-cast-overflow-bf.C: Likewise. * gcc.dg/ubsan/float-cast-overflow-bf.c: Likewise. * g++.dg/asan/default-options-1.C (__asan_default_options): Add used attribute. * g++.dg/asan/asan_test.C: Run with ASAN_OPTIONS=handle_segv=2 in the environment. * All source files: Merge from upstream 315899. * asan/Makefile.am (nodist_saninclude_HEADERS): Add include/sanitizer/tsan_interface.h. * asan/libtool-version: Bump the libasan SONAME. * lsan/Makefile.am (sanitizer_lsan_files): Add lsan_common_mac.cc. (lsan_files): Add lsan_linux.cc, lsan_mac.cc and lsan_malloc_mac.cc. * sanitizer_common/Makefile.am (sanitizer_common_files): Add sancov_flags.cc, sanitizer_allocator_checks.cc, sanitizer_coverage_libcdep_new.cc, sanitizer_errno.cc, sanitizer_file.cc, sanitizer_mac_libcdep.cc and sanitizer_stoptheworld_mac.cc. Remove sanitizer_coverage_libcdep.cc and sanitizer_coverage_mapping_libcdep.cc. * tsan/Makefile.am (tsan_files): Add tsan_external.cc. * ubsan/Makefile.am (DEFS): Add -DUBSAN_CAN_USE_CXXABI=1. (ubsan_files): Add ubsan_init_standalone.cc and ubsan_signals_standalone.cc. * ubsan/libtool-version: Bump the libubsan SONAME. * asan/Makefile.in: Regenerate. * lsan/Makefile.in: Regenerate. * sanitizer_common/Makefile.in: Regenerate. * tsan/Makefile.in: Regenerate. * ubsan/Makefile.in: Regenerate. From-SVN: r253887
119 lines
3.3 KiB
C++
119 lines
3.3 KiB
C++
//===-- sanitizer_symbolizer.cc -------------------------------------------===//
|
|
//
|
|
// This file is distributed under the University of Illinois Open Source
|
|
// License. See LICENSE.TXT for details.
|
|
//
|
|
//===----------------------------------------------------------------------===//
|
|
//
|
|
// This file is shared between AddressSanitizer and ThreadSanitizer
|
|
// run-time libraries.
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
#include "sanitizer_allocator_internal.h"
|
|
#include "sanitizer_platform.h"
|
|
#include "sanitizer_internal_defs.h"
|
|
#include "sanitizer_libc.h"
|
|
#include "sanitizer_placement_new.h"
|
|
#include "sanitizer_symbolizer_internal.h"
|
|
|
|
namespace __sanitizer {
|
|
|
|
AddressInfo::AddressInfo() {
|
|
internal_memset(this, 0, sizeof(AddressInfo));
|
|
function_offset = kUnknown;
|
|
}
|
|
|
|
void AddressInfo::Clear() {
|
|
InternalFree(module);
|
|
InternalFree(function);
|
|
InternalFree(file);
|
|
internal_memset(this, 0, sizeof(AddressInfo));
|
|
function_offset = kUnknown;
|
|
}
|
|
|
|
void AddressInfo::FillModuleInfo(const char *mod_name, uptr mod_offset,
|
|
ModuleArch mod_arch) {
|
|
module = internal_strdup(mod_name);
|
|
module_offset = mod_offset;
|
|
module_arch = mod_arch;
|
|
}
|
|
|
|
SymbolizedStack::SymbolizedStack() : next(nullptr), info() {}
|
|
|
|
SymbolizedStack *SymbolizedStack::New(uptr addr) {
|
|
void *mem = InternalAlloc(sizeof(SymbolizedStack));
|
|
SymbolizedStack *res = new(mem) SymbolizedStack();
|
|
res->info.address = addr;
|
|
return res;
|
|
}
|
|
|
|
void SymbolizedStack::ClearAll() {
|
|
info.Clear();
|
|
if (next)
|
|
next->ClearAll();
|
|
InternalFree(this);
|
|
}
|
|
|
|
DataInfo::DataInfo() {
|
|
internal_memset(this, 0, sizeof(DataInfo));
|
|
}
|
|
|
|
void DataInfo::Clear() {
|
|
InternalFree(module);
|
|
InternalFree(file);
|
|
InternalFree(name);
|
|
internal_memset(this, 0, sizeof(DataInfo));
|
|
}
|
|
|
|
Symbolizer *Symbolizer::symbolizer_;
|
|
StaticSpinMutex Symbolizer::init_mu_;
|
|
LowLevelAllocator Symbolizer::symbolizer_allocator_;
|
|
|
|
void Symbolizer::InvalidateModuleList() {
|
|
modules_fresh_ = false;
|
|
}
|
|
|
|
void Symbolizer::AddHooks(Symbolizer::StartSymbolizationHook start_hook,
|
|
Symbolizer::EndSymbolizationHook end_hook) {
|
|
CHECK(start_hook_ == 0 && end_hook_ == 0);
|
|
start_hook_ = start_hook;
|
|
end_hook_ = end_hook;
|
|
}
|
|
|
|
const char *Symbolizer::ModuleNameOwner::GetOwnedCopy(const char *str) {
|
|
mu_->CheckLocked();
|
|
|
|
// 'str' will be the same string multiple times in a row, optimize this case.
|
|
if (last_match_ && !internal_strcmp(last_match_, str))
|
|
return last_match_;
|
|
|
|
// FIXME: this is linear search.
|
|
// We should optimize this further if this turns out to be a bottleneck later.
|
|
for (uptr i = 0; i < storage_.size(); ++i) {
|
|
if (!internal_strcmp(storage_[i], str)) {
|
|
last_match_ = storage_[i];
|
|
return last_match_;
|
|
}
|
|
}
|
|
last_match_ = internal_strdup(str);
|
|
storage_.push_back(last_match_);
|
|
return last_match_;
|
|
}
|
|
|
|
Symbolizer::Symbolizer(IntrusiveList<SymbolizerTool> tools)
|
|
: module_names_(&mu_), modules_(), modules_fresh_(false), tools_(tools),
|
|
start_hook_(0), end_hook_(0) {}
|
|
|
|
Symbolizer::SymbolizerScope::SymbolizerScope(const Symbolizer *sym)
|
|
: sym_(sym) {
|
|
if (sym_->start_hook_)
|
|
sym_->start_hook_();
|
|
}
|
|
|
|
Symbolizer::SymbolizerScope::~SymbolizerScope() {
|
|
if (sym_->end_hook_)
|
|
sym_->end_hook_();
|
|
}
|
|
|
|
} // namespace __sanitizer
|