mirror of
https://github.com/capstone-engine/llvm-capstone.git
synced 2025-03-04 08:27:50 +00:00
Adding the implementation of atos and dladdr symbolizers for OS X.
They are currently still *not* used, "llvm-symbolizer" is still the default symbolizer on OS X. Reviewed at http://reviews.llvm.org/D6588 llvm-svn: 232026
This commit is contained in:
parent
3c53266ca8
commit
656e184f6c
@ -27,6 +27,7 @@ set(SANITIZER_SOURCES
|
||||
sanitizer_suppressions.cc
|
||||
sanitizer_symbolizer.cc
|
||||
sanitizer_symbolizer_libbacktrace.cc
|
||||
sanitizer_symbolizer_mac.cc
|
||||
sanitizer_symbolizer_win.cc
|
||||
sanitizer_tls_get_addr.cc
|
||||
sanitizer_thread_registry.cc
|
||||
@ -94,6 +95,7 @@ set(SANITIZER_HEADERS
|
||||
sanitizer_symbolizer.h
|
||||
sanitizer_symbolizer_internal.h
|
||||
sanitizer_symbolizer_libbacktrace.h
|
||||
sanitizer_symbolizer_mac.h
|
||||
sanitizer_symbolizer_win.h
|
||||
sanitizer_syscall_generic.inc
|
||||
sanitizer_syscall_linux_x86_64.inc
|
||||
|
@ -25,6 +25,8 @@ namespace __sanitizer {
|
||||
const char *ExtractToken(const char *str, const char *delims, char **result);
|
||||
const char *ExtractInt(const char *str, const char *delims, int *result);
|
||||
const char *ExtractUptr(const char *str, const char *delims, uptr *result);
|
||||
const char *ExtractTokenUpToDelimiter(const char *str, const char *delimiter,
|
||||
char **result);
|
||||
|
||||
// SymbolizerTool is an interface that is implemented by individual "tools"
|
||||
// that can perform symbolication (external llvm-symbolizer, libbacktrace,
|
||||
@ -67,7 +69,7 @@ class SymbolizerTool {
|
||||
// SymbolizerProcess may not be used from two threads simultaneously.
|
||||
class SymbolizerProcess {
|
||||
public:
|
||||
explicit SymbolizerProcess(const char *path);
|
||||
explicit SymbolizerProcess(const char *path, bool use_forkpty = false);
|
||||
const char *SendCommand(const char *command);
|
||||
|
||||
private:
|
||||
@ -97,6 +99,7 @@ class SymbolizerProcess {
|
||||
uptr times_restarted_;
|
||||
bool failed_to_start_;
|
||||
bool reported_invalid_path_;
|
||||
bool use_forkpty_;
|
||||
};
|
||||
|
||||
} // namespace __sanitizer
|
||||
|
@ -47,6 +47,19 @@ const char *ExtractUptr(const char *str, const char *delims, uptr *result) {
|
||||
return ret;
|
||||
}
|
||||
|
||||
const char *ExtractTokenUpToDelimiter(const char *str, const char *delimiter,
|
||||
char **result) {
|
||||
const char *found_delimiter = internal_strstr(str, delimiter);
|
||||
uptr prefix_len =
|
||||
found_delimiter ? found_delimiter - str : internal_strlen(str);
|
||||
*result = (char *)InternalAlloc(prefix_len + 1);
|
||||
internal_memcpy(*result, str, prefix_len);
|
||||
(*result)[prefix_len] = '\0';
|
||||
const char *prefix_end = str + prefix_len;
|
||||
if (*prefix_end != '\0') prefix_end += internal_strlen(delimiter);
|
||||
return prefix_end;
|
||||
}
|
||||
|
||||
Symbolizer *Symbolizer::GetOrInit() {
|
||||
SpinMutexLock l(&init_mu_);
|
||||
if (symbolizer_)
|
||||
|
142
compiler-rt/lib/sanitizer_common/sanitizer_symbolizer_mac.cc
Normal file
142
compiler-rt/lib/sanitizer_common/sanitizer_symbolizer_mac.cc
Normal file
@ -0,0 +1,142 @@
|
||||
//===-- sanitizer_symbolizer_mac.cc ---------------------------------------===//
|
||||
//
|
||||
// The LLVM Compiler Infrastructure
|
||||
//
|
||||
// This file is distributed under the University of Illinois Open Source
|
||||
// License. See LICENSE.TXT for details.
|
||||
//
|
||||
//===----------------------------------------------------------------------===//
|
||||
//
|
||||
// This file is shared between various sanitizers' runtime libraries.
|
||||
//
|
||||
// Implementation of Mac-specific "atos" symbolizer.
|
||||
//===----------------------------------------------------------------------===//
|
||||
|
||||
#include "sanitizer_platform.h"
|
||||
#if SANITIZER_MAC
|
||||
|
||||
#include "sanitizer_allocator_internal.h"
|
||||
#include "sanitizer_symbolizer_mac.h"
|
||||
|
||||
namespace __sanitizer {
|
||||
|
||||
#include <dlfcn.h>
|
||||
#include <errno.h>
|
||||
#include <stdlib.h>
|
||||
#include <sys/wait.h>
|
||||
#include <unistd.h>
|
||||
#include <util.h>
|
||||
|
||||
bool DlAddrSymbolizer::SymbolizePC(uptr addr, SymbolizedStack *stack) {
|
||||
Dl_info info;
|
||||
int result = dladdr((const void *)addr, &info);
|
||||
if (!result) return false;
|
||||
stack->info.function = internal_strdup(info.dli_sname);
|
||||
return true;
|
||||
}
|
||||
|
||||
bool DlAddrSymbolizer::SymbolizeData(uptr addr, DataInfo *info) {
|
||||
return false;
|
||||
}
|
||||
|
||||
class AtosSymbolizerProcess : public SymbolizerProcess {
|
||||
public:
|
||||
explicit AtosSymbolizerProcess(const char *path, pid_t parent_pid)
|
||||
: SymbolizerProcess(path, /*use_forkpty*/ true),
|
||||
parent_pid_(parent_pid) {}
|
||||
|
||||
private:
|
||||
bool ReachedEndOfOutput(const char *buffer, uptr length) const override {
|
||||
return (length >= 1 && buffer[length - 1] == '\n');
|
||||
}
|
||||
|
||||
void ExecuteWithDefaultArgs(const char *path_to_binary) const override {
|
||||
// The `atos` binary has some issues with DYLD_ROOT_PATH on i386.
|
||||
unsetenv("DYLD_ROOT_PATH");
|
||||
|
||||
char pid_str[16];
|
||||
internal_snprintf(pid_str, sizeof(pid_str), "%d", parent_pid_);
|
||||
execl(path_to_binary, path_to_binary, "-p", pid_str, (char *)0);
|
||||
}
|
||||
|
||||
pid_t parent_pid_;
|
||||
};
|
||||
|
||||
static const char *kAtosErrorMessages[] = {
|
||||
"atos cannot examine process",
|
||||
"unable to get permission to examine process",
|
||||
"An admin user name and password is required",
|
||||
"could not load inserted library",
|
||||
"architecture mismatch between analysis process",
|
||||
};
|
||||
|
||||
static bool IsAtosErrorMessage(const char *str) {
|
||||
for (uptr i = 0; i < ARRAY_SIZE(kAtosErrorMessages); i++) {
|
||||
if (internal_strstr(str, kAtosErrorMessages[i])) {
|
||||
return true;
|
||||
}
|
||||
}
|
||||
return false;
|
||||
}
|
||||
|
||||
static bool ParseCommandOutput(const char *str, SymbolizedStack *res) {
|
||||
// Trim ending newlines.
|
||||
char *trim;
|
||||
ExtractTokenUpToDelimiter(str, "\n", &trim);
|
||||
|
||||
// The line from `atos` is in one of these formats:
|
||||
// myfunction (in library.dylib) (sourcefile.c:17)
|
||||
// myfunction (in library.dylib) + 0x1fe
|
||||
// 0xdeadbeef (in library.dylib) + 0x1fe
|
||||
// 0xdeadbeef (in library.dylib)
|
||||
// 0xdeadbeef
|
||||
|
||||
if (IsAtosErrorMessage(trim)) {
|
||||
Report("atos returned an error: %s\n", trim);
|
||||
InternalFree(trim);
|
||||
return false;
|
||||
}
|
||||
|
||||
const char *rest = trim;
|
||||
char *function_name;
|
||||
rest = ExtractTokenUpToDelimiter(rest, " (in ", &function_name);
|
||||
if (internal_strncmp(function_name, "0x", 2) != 0)
|
||||
res->info.function = function_name;
|
||||
else
|
||||
InternalFree(function_name);
|
||||
rest = ExtractTokenUpToDelimiter(rest, ") ", &res->info.module);
|
||||
|
||||
if (rest[0] == '(') {
|
||||
rest++;
|
||||
rest = ExtractTokenUpToDelimiter(rest, ":", &res->info.file);
|
||||
char *extracted_line_number;
|
||||
rest = ExtractTokenUpToDelimiter(rest, ")", &extracted_line_number);
|
||||
res->info.line = internal_atoll(extracted_line_number);
|
||||
InternalFree(extracted_line_number);
|
||||
}
|
||||
|
||||
InternalFree(trim);
|
||||
return true;
|
||||
}
|
||||
|
||||
AtosSymbolizer::AtosSymbolizer(const char *path, LowLevelAllocator *allocator)
|
||||
: process_(new(*allocator) AtosSymbolizerProcess(path, getpid())) {}
|
||||
|
||||
bool AtosSymbolizer::SymbolizePC(uptr addr, SymbolizedStack *stack) {
|
||||
if (!process_) return false;
|
||||
char command[32];
|
||||
internal_snprintf(command, sizeof(command), "0x%zx\n", addr);
|
||||
const char *buf = process_->SendCommand(command);
|
||||
if (!buf) return false;
|
||||
if (!ParseCommandOutput(buf, stack)) {
|
||||
process_ = nullptr;
|
||||
return false;
|
||||
}
|
||||
return true;
|
||||
}
|
||||
|
||||
bool AtosSymbolizer::SymbolizeData(uptr addr, DataInfo *info) { return false; }
|
||||
|
||||
} // namespace __sanitizer
|
||||
|
||||
#endif // SANITIZER_MAC
|
48
compiler-rt/lib/sanitizer_common/sanitizer_symbolizer_mac.h
Normal file
48
compiler-rt/lib/sanitizer_common/sanitizer_symbolizer_mac.h
Normal file
@ -0,0 +1,48 @@
|
||||
//===-- sanitizer_symbolizer_mac.h ------------------------------*- C++ -*-===//
|
||||
//
|
||||
// The LLVM Compiler Infrastructure
|
||||
//
|
||||
// This file is distributed under the University of Illinois Open Source
|
||||
// License. See LICENSE.TXT for details.
|
||||
//
|
||||
//===----------------------------------------------------------------------===//
|
||||
//
|
||||
// This file is shared between various sanitizers' runtime libraries.
|
||||
//
|
||||
// Header for Mac-specific "atos" symbolizer.
|
||||
//===----------------------------------------------------------------------===//
|
||||
|
||||
#ifndef SANITIZER_SYMBOLIZER_MAC_H
|
||||
#define SANITIZER_SYMBOLIZER_MAC_H
|
||||
|
||||
#include "sanitizer_platform.h"
|
||||
#if SANITIZER_MAC
|
||||
|
||||
#include "sanitizer_symbolizer_internal.h"
|
||||
|
||||
namespace __sanitizer {
|
||||
|
||||
class DlAddrSymbolizer : public SymbolizerTool {
|
||||
public:
|
||||
bool SymbolizePC(uptr addr, SymbolizedStack *stack) override;
|
||||
bool SymbolizeData(uptr addr, DataInfo *info) override;
|
||||
};
|
||||
|
||||
class AtosSymbolizerProcess;
|
||||
|
||||
class AtosSymbolizer : public SymbolizerTool {
|
||||
public:
|
||||
explicit AtosSymbolizer(const char *path, LowLevelAllocator *allocator);
|
||||
|
||||
bool SymbolizePC(uptr addr, SymbolizedStack *stack) override;
|
||||
bool SymbolizeData(uptr addr, DataInfo *info) override;
|
||||
|
||||
private:
|
||||
AtosSymbolizerProcess *process_;
|
||||
};
|
||||
|
||||
} // namespace __sanitizer
|
||||
|
||||
#endif // SANITIZER_MAC
|
||||
|
||||
#endif // SANITIZER_SYMBOLIZER_MAC_H
|
@ -20,15 +20,20 @@
|
||||
#include <sys/wait.h>
|
||||
#include <unistd.h>
|
||||
|
||||
#if SANITIZER_MAC
|
||||
#include <util.h> // for forkpty()
|
||||
#endif // SANITIZER_MAC
|
||||
|
||||
namespace __sanitizer {
|
||||
|
||||
SymbolizerProcess::SymbolizerProcess(const char *path)
|
||||
SymbolizerProcess::SymbolizerProcess(const char *path, bool use_forkpty)
|
||||
: path_(path),
|
||||
input_fd_(kInvalidFd),
|
||||
output_fd_(kInvalidFd),
|
||||
times_restarted_(0),
|
||||
failed_to_start_(false),
|
||||
reported_invalid_path_(false) {
|
||||
reported_invalid_path_(false),
|
||||
use_forkpty_(use_forkpty) {
|
||||
CHECK(path_);
|
||||
CHECK_NE(path_[0], '\0');
|
||||
}
|
||||
@ -106,73 +111,104 @@ bool SymbolizerProcess::StartSymbolizerSubprocess() {
|
||||
return false;
|
||||
}
|
||||
|
||||
int *infd = NULL;
|
||||
int *outfd = NULL;
|
||||
// The client program may close its stdin and/or stdout and/or stderr
|
||||
// thus allowing socketpair to reuse file descriptors 0, 1 or 2.
|
||||
// In this case the communication between the forked processes may be
|
||||
// broken if either the parent or the child tries to close or duplicate
|
||||
// these descriptors. The loop below produces two pairs of file
|
||||
// descriptors, each greater than 2 (stderr).
|
||||
int sock_pair[5][2];
|
||||
for (int i = 0; i < 5; i++) {
|
||||
if (pipe(sock_pair[i]) == -1) {
|
||||
for (int j = 0; j < i; j++) {
|
||||
internal_close(sock_pair[j][0]);
|
||||
internal_close(sock_pair[j][1]);
|
||||
}
|
||||
Report("WARNING: Can't create a socket pair to start "
|
||||
"external symbolizer (errno: %d)\n", errno);
|
||||
int pid;
|
||||
if (use_forkpty_) {
|
||||
#if SANITIZER_MAC
|
||||
fd_t fd = kInvalidFd;
|
||||
// Use forkpty to disable buffering in the new terminal.
|
||||
pid = forkpty(&fd, 0, 0, 0);
|
||||
if (pid == -1) {
|
||||
// forkpty() failed.
|
||||
Report("WARNING: failed to fork external symbolizer (errno: %d)\n",
|
||||
errno);
|
||||
return false;
|
||||
} else if (sock_pair[i][0] > 2 && sock_pair[i][1] > 2) {
|
||||
if (infd == NULL) {
|
||||
infd = sock_pair[i];
|
||||
} else {
|
||||
outfd = sock_pair[i];
|
||||
} else if (pid == 0) {
|
||||
// Child subprocess.
|
||||
ExecuteWithDefaultArgs(path_);
|
||||
internal__exit(1);
|
||||
}
|
||||
|
||||
// Continue execution in parent process.
|
||||
input_fd_ = output_fd_ = fd;
|
||||
|
||||
// Disable echo in the new terminal, disable CR.
|
||||
struct termios termflags;
|
||||
tcgetattr(fd, &termflags);
|
||||
termflags.c_oflag &= ~ONLCR;
|
||||
termflags.c_lflag &= ~ECHO;
|
||||
tcsetattr(fd, TCSANOW, &termflags);
|
||||
#else // SANITIZER_MAC
|
||||
UNIMPLEMENTED();
|
||||
#endif // SANITIZER_MAC
|
||||
} else {
|
||||
int *infd = NULL;
|
||||
int *outfd = NULL;
|
||||
// The client program may close its stdin and/or stdout and/or stderr
|
||||
// thus allowing socketpair to reuse file descriptors 0, 1 or 2.
|
||||
// In this case the communication between the forked processes may be
|
||||
// broken if either the parent or the child tries to close or duplicate
|
||||
// these descriptors. The loop below produces two pairs of file
|
||||
// descriptors, each greater than 2 (stderr).
|
||||
int sock_pair[5][2];
|
||||
for (int i = 0; i < 5; i++) {
|
||||
if (pipe(sock_pair[i]) == -1) {
|
||||
for (int j = 0; j < i; j++) {
|
||||
if (sock_pair[j] == infd) continue;
|
||||
internal_close(sock_pair[j][0]);
|
||||
internal_close(sock_pair[j][1]);
|
||||
}
|
||||
break;
|
||||
Report("WARNING: Can't create a socket pair to start "
|
||||
"external symbolizer (errno: %d)\n", errno);
|
||||
return false;
|
||||
} else if (sock_pair[i][0] > 2 && sock_pair[i][1] > 2) {
|
||||
if (infd == NULL) {
|
||||
infd = sock_pair[i];
|
||||
} else {
|
||||
outfd = sock_pair[i];
|
||||
for (int j = 0; j < i; j++) {
|
||||
if (sock_pair[j] == infd) continue;
|
||||
internal_close(sock_pair[j][0]);
|
||||
internal_close(sock_pair[j][1]);
|
||||
}
|
||||
break;
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
CHECK(infd);
|
||||
CHECK(outfd);
|
||||
CHECK(infd);
|
||||
CHECK(outfd);
|
||||
|
||||
// Real fork() may call user callbacks registered with pthread_atfork().
|
||||
int pid = internal_fork();
|
||||
if (pid == -1) {
|
||||
// Fork() failed.
|
||||
internal_close(infd[0]);
|
||||
internal_close(infd[1]);
|
||||
internal_close(outfd[0]);
|
||||
internal_close(outfd[1]);
|
||||
Report("WARNING: failed to fork external symbolizer "
|
||||
" (errno: %d)\n", errno);
|
||||
return false;
|
||||
} else if (pid == 0) {
|
||||
// Child subprocess.
|
||||
internal_close(STDOUT_FILENO);
|
||||
internal_close(STDIN_FILENO);
|
||||
internal_dup2(outfd[0], STDIN_FILENO);
|
||||
internal_dup2(infd[1], STDOUT_FILENO);
|
||||
internal_close(outfd[0]);
|
||||
internal_close(outfd[1]);
|
||||
internal_close(infd[0]);
|
||||
internal_close(infd[1]);
|
||||
for (int fd = sysconf(_SC_OPEN_MAX); fd > 2; fd--)
|
||||
internal_close(fd);
|
||||
ExecuteWithDefaultArgs(path_);
|
||||
internal__exit(1);
|
||||
}
|
||||
// Real fork() may call user callbacks registered with pthread_atfork().
|
||||
pid = internal_fork();
|
||||
if (pid == -1) {
|
||||
// Fork() failed.
|
||||
internal_close(infd[0]);
|
||||
internal_close(infd[1]);
|
||||
internal_close(outfd[0]);
|
||||
internal_close(outfd[1]);
|
||||
Report("WARNING: failed to fork external symbolizer "
|
||||
" (errno: %d)\n", errno);
|
||||
return false;
|
||||
} else if (pid == 0) {
|
||||
// Child subprocess.
|
||||
internal_close(STDOUT_FILENO);
|
||||
internal_close(STDIN_FILENO);
|
||||
internal_dup2(outfd[0], STDIN_FILENO);
|
||||
internal_dup2(infd[1], STDOUT_FILENO);
|
||||
internal_close(outfd[0]);
|
||||
internal_close(outfd[1]);
|
||||
internal_close(infd[0]);
|
||||
internal_close(infd[1]);
|
||||
for (int fd = sysconf(_SC_OPEN_MAX); fd > 2; fd--)
|
||||
internal_close(fd);
|
||||
ExecuteWithDefaultArgs(path_);
|
||||
internal__exit(1);
|
||||
}
|
||||
|
||||
// Continue execution in parent process.
|
||||
internal_close(outfd[0]);
|
||||
internal_close(infd[1]);
|
||||
input_fd_ = infd[0];
|
||||
output_fd_ = outfd[1];
|
||||
// Continue execution in parent process.
|
||||
internal_close(outfd[0]);
|
||||
internal_close(infd[1]);
|
||||
input_fd_ = infd[0];
|
||||
output_fd_ = outfd[1];
|
||||
}
|
||||
|
||||
// Check that symbolizer subprocess started successfully.
|
||||
int pid_status;
|
||||
|
@ -46,4 +46,13 @@ TEST(Symbolizer, ExtractUptr) {
|
||||
EXPECT_STREQ("456;789", rest);
|
||||
}
|
||||
|
||||
TEST(Symbolizer, ExtractTokenUpToDelimiter) {
|
||||
char *token;
|
||||
const char *rest =
|
||||
ExtractTokenUpToDelimiter("aaa-+-bbb-+-ccc", "-+-", &token);
|
||||
EXPECT_STREQ("aaa", token);
|
||||
EXPECT_STREQ("bbb-+-ccc", rest);
|
||||
InternalFree(token);
|
||||
}
|
||||
|
||||
} // namespace __sanitizer
|
||||
|
Loading…
x
Reference in New Issue
Block a user