forked from OSchip/llvm-project
				
			
		
			
				
	
	
		
			123 lines
		
	
	
		
			3.9 KiB
		
	
	
	
		
			C++
		
	
	
	
			
		
		
	
	
			123 lines
		
	
	
		
			3.9 KiB
		
	
	
	
		
			C++
		
	
	
	
| //===-- sanitizer_coverage_mapping.cc -------------------------------------===//
 | |
| //
 | |
| //                     The LLVM Compiler Infrastructure
 | |
| //
 | |
| // This file is distributed under the University of Illinois Open Source
 | |
| // License. See LICENSE.TXT for details.
 | |
| //
 | |
| //===----------------------------------------------------------------------===//
 | |
| //
 | |
| // Mmap-based implementation of sanitizer coverage.
 | |
| //
 | |
| // This is part of the implementation of code coverage that does not require
 | |
| // __sanitizer_cov_dump() call. Data is stored in 2 files per process.
 | |
| //
 | |
| // $pid.sancov.map describes process memory layout in the following text-based
 | |
| // format:
 | |
| // <pointer size in bits>  // 1 line, 32 or 64
 | |
| // <mapping start> <mapping end> <base address> <dso name> // repeated
 | |
| // ...
 | |
| // Mapping lines are NOT sorted. This file is updated every time memory layout
 | |
| // is changed (i.e. in dlopen() and dlclose() interceptors).
 | |
| //
 | |
| // $pid.sancov.raw is a binary dump of PC values, sizeof(uptr) each. Again, not
 | |
| // sorted. This file is extended by 64Kb at a time and mapped into memory. It
 | |
| // contains one or more 0 words at the end, up to the next 64Kb aligned offset.
 | |
| //
 | |
| // To convert these 2 files to the usual .sancov format, run sancov.py rawunpack
 | |
| // $pid.sancov.raw.
 | |
| //
 | |
| //===----------------------------------------------------------------------===//
 | |
| 
 | |
| #include "sanitizer_allocator_internal.h"
 | |
| #include "sanitizer_libc.h"
 | |
| #include "sanitizer_procmaps.h"
 | |
| 
 | |
| namespace __sanitizer {
 | |
| 
 | |
| static const uptr kMaxTextSize = 64 * 1024;
 | |
| 
 | |
| struct CachedMapping {
 | |
|  public:
 | |
|   bool NeedsUpdate(uptr pc) {
 | |
|     int new_pid = internal_getpid();
 | |
|     if (last_pid == new_pid && pc && pc >= last_range_start &&
 | |
|         pc < last_range_end)
 | |
|       return false;
 | |
|     last_pid = new_pid;
 | |
|     return true;
 | |
|   }
 | |
| 
 | |
|   void SetModuleRange(uptr start, uptr end) {
 | |
|     last_range_start = start;
 | |
|     last_range_end = end;
 | |
|   }
 | |
| 
 | |
|  private:
 | |
|   uptr last_range_start, last_range_end;
 | |
|   int last_pid;
 | |
| };
 | |
| 
 | |
| static CachedMapping cached_mapping;
 | |
| static StaticSpinMutex mapping_mu;
 | |
| 
 | |
| void CovUpdateMapping(const char *coverage_dir, uptr caller_pc) {
 | |
|   if (!common_flags()->coverage_direct) return;
 | |
| 
 | |
|   SpinMutexLock l(&mapping_mu);
 | |
| 
 | |
|   if (!cached_mapping.NeedsUpdate(caller_pc))
 | |
|     return;
 | |
| 
 | |
|   InternalScopedString text(kMaxTextSize);
 | |
| 
 | |
|   {
 | |
|     text.append("%d\n", sizeof(uptr) * 8);
 | |
|     ListOfModules modules;
 | |
|     modules.init();
 | |
|     for (const LoadedModule &module : modules) {
 | |
|       const char *module_name = StripModuleName(module.full_name());
 | |
|       uptr base = module.base_address();
 | |
|       for (const auto &range : module.ranges()) {
 | |
|         if (range.executable) {
 | |
|           uptr start = range.beg;
 | |
|           uptr end = range.end;
 | |
|           text.append("%zx %zx %zx %s\n", start, end, base, module_name);
 | |
|           if (caller_pc && caller_pc >= start && caller_pc < end)
 | |
|             cached_mapping.SetModuleRange(start, end);
 | |
|         }
 | |
|       }
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   error_t err;
 | |
|   InternalScopedString tmp_path(64 + internal_strlen(coverage_dir));
 | |
|   uptr res = internal_snprintf((char *)tmp_path.data(), tmp_path.size(),
 | |
|                                "%s/%zd.sancov.map.tmp", coverage_dir,
 | |
|                                internal_getpid());
 | |
|   CHECK_LE(res, tmp_path.size());
 | |
|   fd_t map_fd = OpenFile(tmp_path.data(), WrOnly, &err);
 | |
|   if (map_fd == kInvalidFd) {
 | |
|     Report("Coverage: failed to open %s for writing: %d\n", tmp_path.data(),
 | |
|            err);
 | |
|     Die();
 | |
|   }
 | |
| 
 | |
|   if (!WriteToFile(map_fd, text.data(), text.length(), nullptr, &err)) {
 | |
|     Printf("sancov.map write failed: %d\n", err);
 | |
|     Die();
 | |
|   }
 | |
|   CloseFile(map_fd);
 | |
| 
 | |
|   InternalScopedString path(64 + internal_strlen(coverage_dir));
 | |
|   res = internal_snprintf((char *)path.data(), path.size(), "%s/%zd.sancov.map",
 | |
|                           coverage_dir, internal_getpid());
 | |
|   CHECK_LE(res, path.size());
 | |
|   if (!RenameFile(tmp_path.data(), path.data(), &err)) {
 | |
|     Printf("sancov.map rename failed: %d\n", err);
 | |
|     Die();
 | |
|   }
 | |
| }
 | |
| 
 | |
| } // namespace __sanitizer
 |