Daily bump.
[official-gcc.git] / libsanitizer / sanitizer_common / sanitizer_libignore.cc
blobe20c7559b8e1490ae05fe478a53a760e41998633
1 //===-- sanitizer_libignore.cc --------------------------------------------===//
2 //
3 // This file is distributed under the University of Illinois Open Source
4 // License. See LICENSE.TXT for details.
5 //
6 //===----------------------------------------------------------------------===//
8 #include "sanitizer_platform.h"
10 #if SANITIZER_FREEBSD || SANITIZER_LINUX || SANITIZER_MAC || SANITIZER_NETBSD
12 #include "sanitizer_libignore.h"
13 #include "sanitizer_flags.h"
14 #include "sanitizer_posix.h"
15 #include "sanitizer_procmaps.h"
17 namespace __sanitizer {
19 LibIgnore::LibIgnore(LinkerInitialized) {
22 void LibIgnore::AddIgnoredLibrary(const char *name_templ) {
23 BlockingMutexLock lock(&mutex_);
24 if (count_ >= kMaxLibs) {
25 Report("%s: too many ignored libraries (max: %d)\n", SanitizerToolName,
26 kMaxLibs);
27 Die();
29 Lib *lib = &libs_[count_++];
30 lib->templ = internal_strdup(name_templ);
31 lib->name = nullptr;
32 lib->real_name = nullptr;
33 lib->loaded = false;
36 void LibIgnore::OnLibraryLoaded(const char *name) {
37 BlockingMutexLock lock(&mutex_);
38 // Try to match suppressions with symlink target.
39 InternalScopedString buf(kMaxPathLength);
40 if (name && internal_readlink(name, buf.data(), buf.size() - 1) > 0 &&
41 buf[0]) {
42 for (uptr i = 0; i < count_; i++) {
43 Lib *lib = &libs_[i];
44 if (!lib->loaded && (!lib->real_name) &&
45 TemplateMatch(lib->templ, name))
46 lib->real_name = internal_strdup(buf.data());
50 // Scan suppressions list and find newly loaded and unloaded libraries.
51 ListOfModules modules;
52 modules.init();
53 for (uptr i = 0; i < count_; i++) {
54 Lib *lib = &libs_[i];
55 bool loaded = false;
56 for (const auto &mod : modules) {
57 for (const auto &range : mod.ranges()) {
58 if (!range.executable)
59 continue;
60 if (!TemplateMatch(lib->templ, mod.full_name()) &&
61 !(lib->real_name &&
62 internal_strcmp(lib->real_name, mod.full_name()) == 0))
63 continue;
64 if (loaded) {
65 Report("%s: called_from_lib suppression '%s' is matched against"
66 " 2 libraries: '%s' and '%s'\n",
67 SanitizerToolName, lib->templ, lib->name, mod.full_name());
68 Die();
70 loaded = true;
71 if (lib->loaded)
72 continue;
73 VReport(1,
74 "Matched called_from_lib suppression '%s' against library"
75 " '%s'\n",
76 lib->templ, mod.full_name());
77 lib->loaded = true;
78 lib->name = internal_strdup(mod.full_name());
79 const uptr idx =
80 atomic_load(&ignored_ranges_count_, memory_order_relaxed);
81 CHECK_LT(idx, kMaxLibs);
82 ignored_code_ranges_[idx].begin = range.beg;
83 ignored_code_ranges_[idx].end = range.end;
84 atomic_store(&ignored_ranges_count_, idx + 1, memory_order_release);
85 break;
88 if (lib->loaded && !loaded) {
89 Report("%s: library '%s' that was matched against called_from_lib"
90 " suppression '%s' is unloaded\n",
91 SanitizerToolName, lib->name, lib->templ);
92 Die();
96 // Track instrumented ranges.
97 if (track_instrumented_libs_) {
98 for (const auto &mod : modules) {
99 if (!mod.instrumented())
100 continue;
101 for (const auto &range : mod.ranges()) {
102 if (!range.executable)
103 continue;
104 if (IsPcInstrumented(range.beg) && IsPcInstrumented(range.end - 1))
105 continue;
106 VReport(1, "Adding instrumented range %p-%p from library '%s'\n",
107 range.beg, range.end, mod.full_name());
108 const uptr idx =
109 atomic_load(&instrumented_ranges_count_, memory_order_relaxed);
110 CHECK_LT(idx, kMaxLibs);
111 instrumented_code_ranges_[idx].begin = range.beg;
112 instrumented_code_ranges_[idx].end = range.end;
113 atomic_store(&instrumented_ranges_count_, idx + 1,
114 memory_order_release);
120 void LibIgnore::OnLibraryUnloaded() {
121 OnLibraryLoaded(nullptr);
124 } // namespace __sanitizer
126 #endif // SANITIZER_FREEBSD || SANITIZER_LINUX || SANITIZER_MAC ||
127 // SANITIZER_NETBSD