head 1.4; access; symbols netbsd-11-0-RC4:1.3 netbsd-11-0-RC3:1.3 netbsd-11-0-RC2:1.3 netbsd-11-0-RC1:1.3 gcc-14-3-0:1.1.1.3 perseant-exfatfs-base-20250801:1.3 netbsd-11:1.3.0.4 netbsd-11-base:1.3 gcc-12-5-0:1.1.1.2 perseant-exfatfs-base-20240630:1.3 gcc-12-4-0:1.1.1.2 perseant-exfatfs:1.3.0.2 perseant-exfatfs-base:1.3 gcc-12-3-0:1.1.1.2 gcc-10-5-0:1.1.1.1 gcc-10-4-0:1.1.1.1 cjep_sun2x:1.2.0.4 cjep_sun2x-base:1.2 cjep_staticlib_x-base1:1.2 cjep_staticlib_x:1.2.0.2 cjep_staticlib_x-base:1.2 gcc-10-3-0:1.1.1.1 FSF:1.1.1; locks; strict; comment @// @; 1.4 date 2025.09.14.00.08.56; author mrg; state Exp; branches; next 1.3; commitid x9D5QEnvbeMI4CaG; 1.3 date 2023.07.31.01.44.55; author mrg; state Exp; branches; next 1.2; commitid q79F5Opf0FLsyTyE; 1.2 date 2021.04.11.23.54.26; author mrg; state dead; branches; next 1.1; commitid wJn7ggfUTEMOWVOC; 1.1 date 2021.04.10.22.09.22; author mrg; state Exp; branches 1.1.1.1; next ; commitid eC4g0MRpqTvEkNOC; 1.1.1.1 date 2021.04.10.22.09.22; author mrg; state Exp; branches; next 1.1.1.2; commitid eC4g0MRpqTvEkNOC; 1.1.1.2 date 2023.07.30.05.20.41; author mrg; state Exp; branches; next 1.1.1.3; commitid tk6nV4mbc9nVEMyE; 1.1.1.3 date 2025.09.13.23.45.04; author mrg; state Exp; branches; next ; commitid KwhwN4krNWa6XBaG; desc @@ 1.4 log @merge GCC 14.3.0. @ text @//=-- lsan_common_mac.cpp -------------------------------------------------===// // // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. // See https://llvm.org/LICENSE.txt for license information. // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception // //===----------------------------------------------------------------------===// // // This file is a part of LeakSanitizer. // Implementation of common leak checking functionality. Darwin-specific code. // //===----------------------------------------------------------------------===// #include "sanitizer_common/sanitizer_platform.h" #include "sanitizer_common/sanitizer_libc.h" #include "lsan_common.h" #if CAN_SANITIZE_LEAKS && SANITIZER_APPLE # include # include # include # include "lsan_allocator.h" # include "sanitizer_common/sanitizer_allocator_internal.h" namespace __lsan { class ThreadContextLsanBase; enum class SeenRegion { None = 0, AllocOnce = 1 << 0, LibDispatch = 1 << 1, Foundation = 1 << 2, All = AllocOnce | LibDispatch | Foundation }; inline SeenRegion operator|(SeenRegion left, SeenRegion right) { return static_cast(static_cast(left) | static_cast(right)); } inline SeenRegion &operator|=(SeenRegion &left, const SeenRegion &right) { left = left | right; return left; } struct RegionScanState { SeenRegion seen_regions = SeenRegion::None; bool in_libdispatch = false; }; typedef struct { int disable_counter; ThreadContextLsanBase *current_thread; AllocatorCache cache; } thread_local_data_t; static pthread_key_t key; static pthread_once_t key_once = PTHREAD_ONCE_INIT; // The main thread destructor requires the current thread, // so we can't destroy it until it's been used and reset. void restore_tid_data(void *ptr) { thread_local_data_t *data = (thread_local_data_t *)ptr; if (data->current_thread) pthread_setspecific(key, data); } static void make_tls_key() { CHECK_EQ(pthread_key_create(&key, restore_tid_data), 0); } static thread_local_data_t *get_tls_val(bool alloc) { pthread_once(&key_once, make_tls_key); thread_local_data_t *ptr = (thread_local_data_t *)pthread_getspecific(key); if (ptr == NULL && alloc) { ptr = (thread_local_data_t *)InternalAlloc(sizeof(*ptr)); ptr->disable_counter = 0; ptr->current_thread = nullptr; ptr->cache = AllocatorCache(); pthread_setspecific(key, ptr); } return ptr; } bool DisabledInThisThread() { thread_local_data_t *data = get_tls_val(false); return data ? data->disable_counter > 0 : false; } void DisableInThisThread() { ++get_tls_val(true)->disable_counter; } void EnableInThisThread() { int *disable_counter = &get_tls_val(true)->disable_counter; if (*disable_counter == 0) { DisableCounterUnderflow(); } --*disable_counter; } ThreadContextLsanBase *GetCurrentThread() { thread_local_data_t *data = get_tls_val(false); return data ? data->current_thread : nullptr; } void SetCurrentThread(ThreadContextLsanBase *tctx) { get_tls_val(true)->current_thread = tctx; } AllocatorCache *GetAllocatorCache() { return &get_tls_val(true)->cache; } LoadedModule *GetLinker() { return nullptr; } // Required on Linux for initialization of TLS behavior, but should not be // required on Darwin. void InitializePlatformSpecificModules() {} // Sections which can't contain contain global pointers. This list errs on the // side of caution to avoid false positives, at the expense of performance. // // Other potentially safe sections include: // __all_image_info, __crash_info, __const, __got, __interpose, __objc_msg_break // // Sections which definitely cannot be included here are: // __objc_data, __objc_const, __data, __bss, __common, __thread_data, // __thread_bss, __thread_vars, __objc_opt_rw, __objc_opt_ptrs static const char *kSkippedSecNames[] = { "__cfstring", "__la_symbol_ptr", "__mod_init_func", "__mod_term_func", "__nl_symbol_ptr", "__objc_classlist", "__objc_classrefs", "__objc_imageinfo", "__objc_nlclslist", "__objc_protolist", "__objc_selrefs", "__objc_superrefs"}; // Scans global variables for heap pointers. void ProcessGlobalRegions(Frontier *frontier) { for (auto name : kSkippedSecNames) CHECK(internal_strnlen(name, kMaxSegName + 1) <= kMaxSegName); MemoryMappingLayout memory_mapping(false); InternalMmapVector modules; modules.reserve(128); memory_mapping.DumpListOfModules(&modules); for (uptr i = 0; i < modules.size(); ++i) { // Even when global scanning is disabled, we still need to scan // system libraries for stashed pointers if (!flags()->use_globals && modules[i].instrumented()) continue; for (const __sanitizer::LoadedModule::AddressRange &range : modules[i].ranges()) { // Sections storing global variables are writable and non-executable if (range.executable || !range.writable) continue; for (auto name : kSkippedSecNames) { if (!internal_strcmp(range.name, name)) continue; } ScanGlobalRange(range.beg, range.end, frontier); } } } void ProcessPlatformSpecificAllocations(Frontier *frontier) { vm_address_t address = 0; kern_return_t err = KERN_SUCCESS; InternalMmapVector mapped_regions; bool use_root_regions = flags()->use_root_regions && HasRootRegions(); RegionScanState scan_state; while (err == KERN_SUCCESS) { vm_size_t size = 0; unsigned depth = 1; struct vm_region_submap_info_64 info; mach_msg_type_number_t count = VM_REGION_SUBMAP_INFO_COUNT_64; err = vm_region_recurse_64(mach_task_self(), &address, &size, &depth, (vm_region_info_t)&info, &count); uptr end_address = address + size; if (info.user_tag == VM_MEMORY_OS_ALLOC_ONCE) { // libxpc stashes some pointers in the Kernel Alloc Once page, // make sure not to report those as leaks. scan_state.seen_regions |= SeenRegion::AllocOnce; ScanRangeForPointers(address, end_address, frontier, "GLOBAL", kReachable); } else if (info.user_tag == VM_MEMORY_FOUNDATION) { // Objective-C block trampolines use the Foundation region. scan_state.seen_regions |= SeenRegion::Foundation; ScanRangeForPointers(address, end_address, frontier, "GLOBAL", kReachable); } else if (info.user_tag == VM_MEMORY_LIBDISPATCH) { // Dispatch continuations use the libdispatch region. Empirically, there // can be more than one region with this tag, so we'll optimistically // assume that they're continguous. Otherwise, we would need to scan every // region to ensure we find them all. scan_state.in_libdispatch = true; ScanRangeForPointers(address, end_address, frontier, "GLOBAL", kReachable); } else if (scan_state.in_libdispatch) { scan_state.seen_regions |= SeenRegion::LibDispatch; scan_state.in_libdispatch = false; } // Recursing over the full memory map is very slow, break out // early if we don't need the full iteration. if (scan_state.seen_regions == SeenRegion::All && !use_root_regions) { break; } // This additional root region scan is required on Darwin in order to // detect root regions contained within mmap'd memory regions, because // the Darwin implementation of sanitizer_procmaps traverses images // as loaded by dyld, and not the complete set of all memory regions. // // TODO(fjricci) - remove this once sanitizer_procmaps_mac has the same // behavior as sanitizer_procmaps_linux and traverses all memory regions if (use_root_regions && (info.protection & kProtectionRead)) mapped_regions.push_back({address, end_address}); address = end_address; } ScanRootRegions(frontier, mapped_regions); } // On darwin, we can intercept _exit gracefully, and return a failing exit code // if required at that point. Calling Die() here is undefined behavior and // causes rare race conditions. void HandleLeaks() {} void LockStuffAndStopTheWorld(StopTheWorldCallback callback, CheckForLeaksParam *argument) { ScopedStopTheWorldLock lock; StopTheWorld(callback, argument); } } // namespace __lsan #endif // CAN_SANITIZE_LEAKS && SANITIZER_APPLE @ 1.3 log @make this actually be GCC 12.3.0's libsanitizer. the libsanitizer we used with GCC 9 and GCC 10 was significantly ahead of the GCC 9 and GCC 10 provided versions. @ text @d18 1 a18 1 #if CAN_SANITIZE_LEAKS && SANITIZER_MAC d20 3 a22 2 #include "sanitizer_common/sanitizer_allocator_internal.h" #include "lsan_allocator.h" d24 3 a26 3 #include #include d28 1 a28 6 // Only introduced in Mac OS X 10.9. #ifdef VM_MEMORY_OS_ALLOC_ONCE static const int kSanitizerVmMemoryOsAllocOnce = VM_MEMORY_OS_ALLOC_ONCE; #else static const int kSanitizerVmMemoryOsAllocOnce = 73; #endif d30 22 a51 1 namespace __lsan { d55 1 a55 1 u32 current_thread_id; d62 2 a63 2 // The main thread destructor requires the current thread id, // so we can't destroy it until it's been used and reset to invalid tid d66 1 a66 1 if (data->current_thread_id != kInvalidTid) d81 1 a81 1 ptr->current_thread_id = kInvalidTid; d104 1 a104 1 u32 GetCurrentThread() { d106 1 a106 1 return data ? data->current_thread_id : kInvalidTid; d109 3 a111 1 void SetCurrentThread(u32 tid) { get_tls_val(true)->current_thread_id = tid; } a164 2 unsigned depth = 1; vm_size_t size = 0; a166 1 mach_msg_type_number_t count = VM_REGION_SUBMAP_INFO_COUNT_64; d168 2 a169 1 InternalMmapVectorNoCtor const *root_regions = GetRootRegions(); d171 1 d173 2 d176 1 d181 17 a197 4 // libxpc stashes some pointers in the Kernel Alloc Once page, // make sure not to report those as leaks. if (info.user_tag == kSanitizerVmMemoryOsAllocOnce) { d200 4 d205 4 a208 4 // Recursing over the full memory map is very slow, break out // early if we don't need the full iteration. if (!flags()->use_root_regions || !root_regions->size()) break; d218 2 a219 6 if (flags()->use_root_regions) { for (uptr i = 0; i < root_regions->size(); i++) { ScanRootRegion(frontier, (*root_regions)[i], address, end_address, info.protection & kProtectionRead); } } d223 1 d233 1 a233 2 LockThreadRegistry(); LockAllocator(); a234 2 UnlockAllocator(); UnlockThreadRegistry(); d237 1 a237 1 } // namespace __lsan d239 1 a239 1 #endif // CAN_SANITIZE_LEAKS && SANITIZER_MAC @ 1.2 log @revert sanitizer back to the version we were using with GCC 9, since that one was already newer than the GCC 10 version. @ text @d152 1 a152 1 InternalMmapVector const *root_regions = GetRootRegions(); d196 2 a197 1 void LockStuffAndStopTheWorld(StopTheWorldCallback callback, void *argument) { @ 1.1 log @Initial revision @ text @@ 1.1.1.1 log @initial import of GCC 10.3.0. main changes include: caveats: - ABI issue between c++14 and c++17 fixed - profile mode is removed from libstdc++ - -fno-common is now the default new features: - new flags -fallocation-dce, -fprofile-partial-training, -fprofile-reproducible, -fprofile-prefix-path, and -fanalyzer - many new compile and link time optimisations - enhanced drive optimisations - openacc 2.6 support - openmp 5.0 features - new warnings: -Wstring-compare and -Wzero-length-bounds - extended warnings: -Warray-bounds, -Wformat-overflow, -Wrestrict, -Wreturn-local-addr, -Wstringop-overflow, -Warith-conversion, -Wmismatched-tags, and -Wredundant-tags - some likely C2X features implemented - more C++20 implemented - many new arm & intel CPUs known hundreds of reported bugs are fixed. full list of changes can be found at: https://gcc.gnu.org/gcc-10/changes.html @ text @@ 1.1.1.2 log @initial import of GCC 12.3.0. major changes in GCC 11 included: - The default mode for C++ is now -std=gnu++17 instead of -std=gnu++14. - When building GCC itself, the host compiler must now support C++11, rather than C++98. - Some short options of the gcov tool have been renamed: -i to -j and -j to -H. - ThreadSanitizer improvements. - Introduce Hardware-assisted AddressSanitizer support. - For targets that produce DWARF debugging information GCC now defaults to DWARF version 5. This can produce up to 25% more compact debug information compared to earlier versions. - Many optimisations. - The existing malloc attribute has been extended so that it can be used to identify allocator/deallocator API pairs. A pair of new -Wmismatched-dealloc and -Wmismatched-new-delete warnings are added. - Other new warnings: -Wsizeof-array-div, enabled by -Wall, warns about divisions of two sizeof operators when the first one is applied to an array and the divisor does not equal the size of the array element. -Wstringop-overread, enabled by default, warns about calls to string functions reading past the end of the arrays passed to them as arguments. -Wtsan, enabled by default, warns about unsupported features in ThreadSanitizer (currently std::atomic_thread_fence). - Enchanced warnings: -Wfree-nonheap-object detects many more instances of calls to deallocation functions with pointers not returned from a dynamic memory allocation function. -Wmaybe-uninitialized diagnoses passing pointers or references to uninitialized memory to functions taking const-qualified arguments. -Wuninitialized detects reads from uninitialized dynamically allocated memory. -Warray-parameter warns about functions with inconsistent array forms. -Wvla-parameter warns about functions with inconsistent VLA forms. - Several new features from the upcoming C2X revision of the ISO C standard are supported with -std=c2x and -std=gnu2x. - Several C++20 features have been implemented. - The C++ front end has experimental support for some of the upcoming C++23 draft. - Several new C++ warnings. - Enhanced Arm, AArch64, x86, and RISC-V CPU support. - The implementation of how program state is tracked within -fanalyzer has been completely rewritten with many enhancements. see https://gcc.gnu.org/gcc-11/changes.html for a full list. major changes in GCC 12 include: - An ABI incompatibility between C and C++ when passing or returning by value certain aggregates containing zero width bit-fields has been discovered on various targets. x86-64, ARM and AArch64 will always ignore them (so there is a C ABI incompatibility between GCC 11 and earlier with GCC 12 or later), PowerPC64 ELFv2 always take them into account (so there is a C++ ABI incompatibility, GCC 4.4 and earlier compatible with GCC 12 or later, incompatible with GCC 4.5 through GCC 11). RISC-V has changed the handling of these already starting with GCC 10. As the ABI requires, MIPS takes them into account handling function return values so there is a C++ ABI incompatibility with GCC 4.5 through 11. - STABS: Support for emitting the STABS debugging format is deprecated and will be removed in the next release. All ports now default to emit DWARF (version 2 or later) debugging info or are obsoleted. - Vectorization is enabled at -O2 which is now equivalent to the original -O2 -ftree-vectorize -fvect-cost-model=very-cheap. - GCC now supports the ShadowCallStack sanitizer. - Support for __builtin_shufflevector compatible with the clang language extension was added. - Support for attribute unavailable was added. - Support for __builtin_dynamic_object_size compatible with the clang language extension was added. - New warnings: -Wbidi-chars warns about potentially misleading UTF-8 bidirectional control characters. -Warray-compare warns about comparisons between two operands of array type. - Some new features from the upcoming C2X revision of the ISO C standard are supported with -std=c2x and -std=gnu2x. - Several C++23 features have been implemented. - Many C++ enhancements across warnings and -f options. see https://gcc.gnu.org/gcc-12/changes.html for a full list. @ text @d152 1 a152 1 InternalMmapVectorNoCtor const *root_regions = GetRootRegions(); d196 1 a196 2 void LockStuffAndStopTheWorld(StopTheWorldCallback callback, CheckForLeaksParam *argument) { @ 1.1.1.3 log @initial import of GCC 14.3.0. major changes in GCC 13: - improved sanitizer - zstd debug info compression - LTO improvements - SARIF based diagnostic support - new warnings: -Wxor-used-as-pow, -Wenum-int-mismatch, -Wself-move, -Wdangling-reference - many new -Wanalyzer* specific warnings - enhanced warnings: -Wpessimizing-move, -Wredundant-move - new attributes to mark file descriptors, c++23 "assume" - several C23 features added - several C++23 features added - many new features for Arm, x86, RISC-V major changes in GCC 14: - more strict C99 or newer support - ia64* marked deprecated (but seemingly still in GCC 15.) - several new hardening features - support for "hardbool", which can have user supplied values of true/false - explicit support for stack scrubbing upon function exit - better auto-vectorisation support - added clang-compatible __has_feature and __has_extension - more C23, including -std=c23 - several C++26 features added - better diagnostics in C++ templates - new warnings: -Wnrvo, Welaborated-enum-base - many new features for Arm, x86, RISC-V - possible ABI breaking change for SPARC64 and small structures with arrays of floats. @ text @d18 1 a18 1 #if CAN_SANITIZE_LEAKS && SANITIZER_APPLE d20 2 a21 3 # include # include # include d23 3 a25 3 # include "lsan_allocator.h" # include "sanitizer_common/sanitizer_allocator_internal.h" namespace __lsan { d27 6 a32 1 class ThreadContextLsanBase; d34 1 a34 22 enum class SeenRegion { None = 0, AllocOnce = 1 << 0, LibDispatch = 1 << 1, Foundation = 1 << 2, All = AllocOnce | LibDispatch | Foundation }; inline SeenRegion operator|(SeenRegion left, SeenRegion right) { return static_cast(static_cast(left) | static_cast(right)); } inline SeenRegion &operator|=(SeenRegion &left, const SeenRegion &right) { left = left | right; return left; } struct RegionScanState { SeenRegion seen_regions = SeenRegion::None; bool in_libdispatch = false; }; d38 1 a38 1 ThreadContextLsanBase *current_thread; d45 2 a46 2 // The main thread destructor requires the current thread, // so we can't destroy it until it's been used and reset. d49 1 a49 1 if (data->current_thread) d64 1 a64 1 ptr->current_thread = nullptr; d87 1 a87 1 ThreadContextLsanBase *GetCurrentThread() { d89 1 a89 1 return data ? data->current_thread : nullptr; d92 1 a92 3 void SetCurrentThread(ThreadContextLsanBase *tctx) { get_tls_val(true)->current_thread = tctx; } d146 2 d150 1 d152 1 a152 2 InternalMmapVector mapped_regions; bool use_root_regions = flags()->use_root_regions && HasRootRegions(); a153 1 RegionScanState scan_state; a154 2 vm_size_t size = 0; unsigned depth = 1; a155 1 mach_msg_type_number_t count = VM_REGION_SUBMAP_INFO_COUNT_64; d160 4 a163 17 if (info.user_tag == VM_MEMORY_OS_ALLOC_ONCE) { // libxpc stashes some pointers in the Kernel Alloc Once page, // make sure not to report those as leaks. scan_state.seen_regions |= SeenRegion::AllocOnce; ScanRangeForPointers(address, end_address, frontier, "GLOBAL", kReachable); } else if (info.user_tag == VM_MEMORY_FOUNDATION) { // Objective-C block trampolines use the Foundation region. scan_state.seen_regions |= SeenRegion::Foundation; ScanRangeForPointers(address, end_address, frontier, "GLOBAL", kReachable); } else if (info.user_tag == VM_MEMORY_LIBDISPATCH) { // Dispatch continuations use the libdispatch region. Empirically, there // can be more than one region with this tag, so we'll optimistically // assume that they're continguous. Otherwise, we would need to scan every // region to ensure we find them all. scan_state.in_libdispatch = true; a165 4 } else if (scan_state.in_libdispatch) { scan_state.seen_regions |= SeenRegion::LibDispatch; scan_state.in_libdispatch = false; } d167 4 a170 4 // Recursing over the full memory map is very slow, break out // early if we don't need the full iteration. if (scan_state.seen_regions == SeenRegion::All && !use_root_regions) { break; d180 6 a185 2 if (use_root_regions && (info.protection & kProtectionRead)) mapped_regions.push_back({address, end_address}); a188 1 ScanRootRegions(frontier, mapped_regions); d198 2 a199 1 ScopedStopTheWorldLock lock; d201 2 d205 1 a205 1 } // namespace __lsan d207 1 a207 1 #endif // CAN_SANITIZE_LEAKS && SANITIZER_APPLE @