mirror of
https://github.com/llvm/llvm-project.git
synced 2025-04-25 09:16:05 +00:00

See RFC for background: http://lists.llvm.org/pipermail/llvm-dev/2020-June/142744.html Follow on companion to the clang/llvm instrumentation support in D85948 and committed earlier. This patch adds the compiler-rt runtime support for the memory profiling. Note that much of this support was cloned from asan (and then greatly simplified and renamed). For example the interactions with the sanitizer_common allocators, error handling, interception, etc. The bulk of the memory profiling specific code can be found in the MemInfoBlock, MemInfoBlockCache, and related classes defined and used in memprof_allocator.cpp. For now, the memory profile is dumped to text (stderr by default, but honors the sanitizer_common log_path flag). It is dumped in either a default verbose format, or an optional terse format. This patch also adds a set of tests for the core functionality. Differential Revision: https://reviews.llvm.org/D87120
63 lines
2.2 KiB
C++
63 lines
2.2 KiB
C++
//===-- memprof_shadow_setup.cpp -----------------------------------------===//
|
|
//
|
|
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
|
|
// See https://llvm.org/LICENSE.txt for license information.
|
|
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
|
|
//
|
|
//===----------------------------------------------------------------------===//
|
|
//
|
|
// This file is a part of MemProfiler, a memory profiler.
|
|
//
|
|
// Set up the shadow memory.
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
#include "sanitizer_common/sanitizer_platform.h"
|
|
|
|
#include "memprof_internal.h"
|
|
#include "memprof_mapping.h"
|
|
|
|
namespace __memprof {
|
|
|
|
static void ProtectGap(uptr addr, uptr size) {
|
|
if (!flags()->protect_shadow_gap) {
|
|
// The shadow gap is unprotected, so there is a chance that someone
|
|
// is actually using this memory. Which means it needs a shadow...
|
|
uptr GapShadowBeg = RoundDownTo(MEM_TO_SHADOW(addr), GetPageSizeCached());
|
|
uptr GapShadowEnd =
|
|
RoundUpTo(MEM_TO_SHADOW(addr + size), GetPageSizeCached()) - 1;
|
|
if (Verbosity())
|
|
Printf("protect_shadow_gap=0:"
|
|
" not protecting shadow gap, allocating gap's shadow\n"
|
|
"|| `[%p, %p]` || ShadowGap's shadow ||\n",
|
|
GapShadowBeg, GapShadowEnd);
|
|
ReserveShadowMemoryRange(GapShadowBeg, GapShadowEnd,
|
|
"unprotected gap shadow");
|
|
return;
|
|
}
|
|
__sanitizer::ProtectGap(addr, size, kZeroBaseShadowStart,
|
|
kZeroBaseMaxShadowStart);
|
|
}
|
|
|
|
void InitializeShadowMemory() {
|
|
uptr shadow_start = FindDynamicShadowStart();
|
|
// Update the shadow memory address (potentially) used by instrumentation.
|
|
__memprof_shadow_memory_dynamic_address = shadow_start;
|
|
|
|
if (kLowShadowBeg)
|
|
shadow_start -= GetMmapGranularity();
|
|
|
|
if (Verbosity())
|
|
PrintAddressSpaceLayout();
|
|
|
|
// mmap the low shadow plus at least one page at the left.
|
|
if (kLowShadowBeg)
|
|
ReserveShadowMemoryRange(shadow_start, kLowShadowEnd, "low shadow");
|
|
// mmap the high shadow.
|
|
ReserveShadowMemoryRange(kHighShadowBeg, kHighShadowEnd, "high shadow");
|
|
// protect the gap.
|
|
ProtectGap(kShadowGapBeg, kShadowGapEnd - kShadowGapBeg + 1);
|
|
CHECK_EQ(kShadowGapEnd, kHighShadowBeg - 1);
|
|
}
|
|
|
|
} // namespace __memprof
|