Home | History | Annotate | Download | only in symbolize
      1 // Copyright (c) 2006, Google Inc.
      2 // All rights reserved.
      3 //
      4 // Redistribution and use in source and binary forms, with or without
      5 // modification, are permitted provided that the following conditions are
      6 // met:
      7 //
      8 //     * Redistributions of source code must retain the above copyright
      9 // notice, this list of conditions and the following disclaimer.
     10 //     * Redistributions in binary form must reproduce the above
     11 // copyright notice, this list of conditions and the following disclaimer
     12 // in the documentation and/or other materials provided with the
     13 // distribution.
     14 //     * Neither the name of Google Inc. nor the names of its
     15 // contributors may be used to endorse or promote products derived from
     16 // this software without specific prior written permission.
     17 //
     18 // THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
     19 // "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
     20 // LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
     21 // A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
     22 // OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
     23 // SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
     24 // LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
     25 // DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
     26 // THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
     27 // (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
     28 // OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
     29 //
     30 // Author: Satoru Takabayashi
     31 // Stack-footprint reduction work done by Raksit Ashok
     32 //
     33 // Implementation note:
     34 //
     35 // We don't use heaps but only use stacks.  We want to reduce the
     36 // stack consumption so that the symbolizer can run on small stacks.
     37 //
     38 // Here are some numbers collected with GCC 4.1.0 on x86:
     39 // - sizeof(Elf32_Sym)  = 16
     40 // - sizeof(Elf32_Shdr) = 40
     41 // - sizeof(Elf64_Sym)  = 24
     42 // - sizeof(Elf64_Shdr) = 64
     43 //
     44 // This implementation is intended to be async-signal-safe but uses
     45 // some functions which are not guaranteed to be so, such as memchr()
     46 // and memmove().  We assume they are async-signal-safe.
     47 //
     48 // Additional header can be specified by the GLOG_BUILD_CONFIG_INCLUDE
     49 // macro to add platform specific defines (e.g. OS_OPENBSD).
     50 
     51 #ifdef GLOG_BUILD_CONFIG_INCLUDE
     52 #include GLOG_BUILD_CONFIG_INCLUDE
     53 #endif  // GLOG_BUILD_CONFIG_INCLUDE
     54 
     55 #include "utilities.h"
     56 
     57 #if defined(HAVE_SYMBOLIZE)
     58 
     59 #include <limits>
     60 
     61 #include "symbolize.h"
     62 #include "demangle.h"
     63 
     64 _START_GOOGLE_NAMESPACE_
     65 
     66 // We don't use assert() since it's not guaranteed to be
     67 // async-signal-safe.  Instead we define a minimal assertion
     68 // macro. So far, we don't need pretty printing for __FILE__, etc.
     69 
     70 // A wrapper for abort() to make it callable in ? :.
     71 static int AssertFail() {
     72   abort();
     73   return 0;  // Should not reach.
     74 }
     75 
     76 #define SAFE_ASSERT(expr) ((expr) ? 0 : AssertFail())
     77 
     78 static SymbolizeCallback g_symbolize_callback = NULL;
     79 void InstallSymbolizeCallback(SymbolizeCallback callback) {
     80   g_symbolize_callback = callback;
     81 }
     82 
     83 static SymbolizeOpenObjectFileCallback g_symbolize_open_object_file_callback =
     84     NULL;
     85 void InstallSymbolizeOpenObjectFileCallback(
     86     SymbolizeOpenObjectFileCallback callback) {
     87   g_symbolize_open_object_file_callback = callback;
     88 }
     89 
     90 // This function wraps the Demangle function to provide an interface
     91 // where the input symbol is demangled in-place.
     92 // To keep stack consumption low, we would like this function to not
     93 // get inlined.
     94 static ATTRIBUTE_NOINLINE void DemangleInplace(char *out, int out_size) {
     95   char demangled[256];  // Big enough for sane demangled symbols.
     96   if (Demangle(out, demangled, sizeof(demangled))) {
     97     // Demangling succeeded. Copy to out if the space allows.
     98     size_t len = strlen(demangled);
     99     if (len + 1 <= (size_t)out_size) {  // +1 for '\0'.
    100       SAFE_ASSERT(len < sizeof(demangled));
    101       memmove(out, demangled, len + 1);
    102     }
    103   }
    104 }
    105 
    106 _END_GOOGLE_NAMESPACE_
    107 
    108 #if defined(__ELF__)
    109 
    110 #include <dlfcn.h>
    111 #if defined(OS_OPENBSD)
    112 #include <sys/exec_elf.h>
    113 #else
    114 #include <elf.h>
    115 #endif
    116 #include <errno.h>
    117 #include <fcntl.h>
    118 #include <limits.h>
    119 #include <stdint.h>
    120 #include <stdio.h>
    121 #include <stdlib.h>
    122 #include <stddef.h>
    123 #include <string.h>
    124 #include <sys/stat.h>
    125 #include <sys/types.h>
    126 #include <unistd.h>
    127 
    128 #include "symbolize.h"
    129 #include "config.h"
    130 #include "glog/raw_logging.h"
    131 
    132 // Re-runs fn until it doesn't cause EINTR.
    133 #define NO_INTR(fn)   do {} while ((fn) < 0 && errno == EINTR)
    134 
    135 _START_GOOGLE_NAMESPACE_
    136 
    137 // Read up to "count" bytes from file descriptor "fd" into the buffer
    138 // starting at "buf" while handling short reads and EINTR.  On
    139 // success, return the number of bytes read.  Otherwise, return -1.
    140 static ssize_t ReadPersistent(const int fd, void *buf, const size_t count) {
    141   SAFE_ASSERT(fd >= 0);
    142   SAFE_ASSERT(count <= std::numeric_limits<ssize_t>::max());
    143   char *buf0 = reinterpret_cast<char *>(buf);
    144   ssize_t num_bytes = 0;
    145   while (num_bytes < count) {
    146     ssize_t len;
    147     NO_INTR(len = read(fd, buf0 + num_bytes, count - num_bytes));
    148     if (len < 0) {  // There was an error other than EINTR.
    149       return -1;
    150     }
    151     if (len == 0) {  // Reached EOF.
    152       break;
    153     }
    154     num_bytes += len;
    155   }
    156   SAFE_ASSERT(num_bytes <= count);
    157   return num_bytes;
    158 }
    159 
    160 // Read up to "count" bytes from "offset" in the file pointed by file
    161 // descriptor "fd" into the buffer starting at "buf".  On success,
    162 // return the number of bytes read.  Otherwise, return -1.
    163 static ssize_t ReadFromOffset(const int fd, void *buf,
    164                               const size_t count, const off_t offset) {
    165   off_t off = lseek(fd, offset, SEEK_SET);
    166   if (off == (off_t)-1) {
    167     return -1;
    168   }
    169   return ReadPersistent(fd, buf, count);
    170 }
    171 
    172 // Try reading exactly "count" bytes from "offset" bytes in a file
    173 // pointed by "fd" into the buffer starting at "buf" while handling
    174 // short reads and EINTR.  On success, return true. Otherwise, return
    175 // false.
    176 static bool ReadFromOffsetExact(const int fd, void *buf,
    177                                 const size_t count, const off_t offset) {
    178   ssize_t len = ReadFromOffset(fd, buf, count, offset);
    179   return len == count;
    180 }
    181 
    182 // Returns elf_header.e_type if the file pointed by fd is an ELF binary.
    183 static int FileGetElfType(const int fd) {
    184   ElfW(Ehdr) elf_header;
    185   if (!ReadFromOffsetExact(fd, &elf_header, sizeof(elf_header), 0)) {
    186     return -1;
    187   }
    188   if (memcmp(elf_header.e_ident, ELFMAG, SELFMAG) != 0) {
    189     return -1;
    190   }
    191   return elf_header.e_type;
    192 }
    193 
    194 // Read the section headers in the given ELF binary, and if a section
    195 // of the specified type is found, set the output to this section header
    196 // and return true.  Otherwise, return false.
    197 // To keep stack consumption low, we would like this function to not get
    198 // inlined.
    199 static ATTRIBUTE_NOINLINE bool
    200 GetSectionHeaderByType(const int fd, ElfW(Half) sh_num, const off_t sh_offset,
    201                        ElfW(Word) type, ElfW(Shdr) *out) {
    202   // Read at most 16 section headers at a time to save read calls.
    203   ElfW(Shdr) buf[16];
    204   for (int i = 0; i < sh_num;) {
    205     const ssize_t num_bytes_left = (sh_num - i) * sizeof(buf[0]);
    206     const ssize_t num_bytes_to_read =
    207         (sizeof(buf) > num_bytes_left) ? num_bytes_left : sizeof(buf);
    208     const ssize_t len = ReadFromOffset(fd, buf, num_bytes_to_read,
    209                                        sh_offset + i * sizeof(buf[0]));
    210     SAFE_ASSERT(len % sizeof(buf[0]) == 0);
    211     const ssize_t num_headers_in_buf = len / sizeof(buf[0]);
    212     SAFE_ASSERT(num_headers_in_buf <= sizeof(buf) / sizeof(buf[0]));
    213     for (int j = 0; j < num_headers_in_buf; ++j) {
    214       if (buf[j].sh_type == type) {
    215         *out = buf[j];
    216         return true;
    217       }
    218     }
    219     i += num_headers_in_buf;
    220   }
    221   return false;
    222 }
    223 
    224 // There is no particular reason to limit section name to 63 characters,
    225 // but there has (as yet) been no need for anything longer either.
    226 const int kMaxSectionNameLen = 64;
    227 
    228 // name_len should include terminating '\0'.
    229 bool GetSectionHeaderByName(int fd, const char *name, size_t name_len,
    230                             ElfW(Shdr) *out) {
    231   ElfW(Ehdr) elf_header;
    232   if (!ReadFromOffsetExact(fd, &elf_header, sizeof(elf_header), 0)) {
    233     return false;
    234   }
    235 
    236   ElfW(Shdr) shstrtab;
    237   off_t shstrtab_offset = (elf_header.e_shoff +
    238                            elf_header.e_shentsize * elf_header.e_shstrndx);
    239   if (!ReadFromOffsetExact(fd, &shstrtab, sizeof(shstrtab), shstrtab_offset)) {
    240     return false;
    241   }
    242 
    243   for (int i = 0; i < elf_header.e_shnum; ++i) {
    244     off_t section_header_offset = (elf_header.e_shoff +
    245                                    elf_header.e_shentsize * i);
    246     if (!ReadFromOffsetExact(fd, out, sizeof(*out), section_header_offset)) {
    247       return false;
    248     }
    249     char header_name[kMaxSectionNameLen];
    250     if (sizeof(header_name) < name_len) {
    251       RAW_LOG(WARNING, "Section name '%s' is too long (%" PRIuS "); "
    252               "section will not be found (even if present).", name, name_len);
    253       // No point in even trying.
    254       return false;
    255     }
    256     off_t name_offset = shstrtab.sh_offset + out->sh_name;
    257     ssize_t n_read = ReadFromOffset(fd, &header_name, name_len, name_offset);
    258     if (n_read == -1) {
    259       return false;
    260     } else if (n_read != name_len) {
    261       // Short read -- name could be at end of file.
    262       continue;
    263     }
    264     if (memcmp(header_name, name, name_len) == 0) {
    265       return true;
    266     }
    267   }
    268   return false;
    269 }
    270 
    271 // Read a symbol table and look for the symbol containing the
    272 // pc. Iterate over symbols in a symbol table and look for the symbol
    273 // containing "pc".  On success, return true and write the symbol name
    274 // to out.  Otherwise, return false.
    275 // To keep stack consumption low, we would like this function to not get
    276 // inlined.
    277 static ATTRIBUTE_NOINLINE bool
    278 FindSymbol(uint64_t pc, const int fd, char *out, int out_size,
    279            uint64_t symbol_offset, const ElfW(Shdr) *strtab,
    280            const ElfW(Shdr) *symtab) {
    281   if (symtab == NULL) {
    282     return false;
    283   }
    284   const int num_symbols = symtab->sh_size / symtab->sh_entsize;
    285   for (int i = 0; i < num_symbols;) {
    286     off_t offset = symtab->sh_offset + i * symtab->sh_entsize;
    287 
    288     // If we are reading Elf64_Sym's, we want to limit this array to
    289     // 32 elements (to keep stack consumption low), otherwise we can
    290     // have a 64 element Elf32_Sym array.
    291 #if __WORDSIZE == 64
    292 #define NUM_SYMBOLS 32
    293 #else
    294 #define NUM_SYMBOLS 64
    295 #endif
    296 
    297     // Read at most NUM_SYMBOLS symbols at once to save read() calls.
    298     ElfW(Sym) buf[NUM_SYMBOLS];
    299     const ssize_t len = ReadFromOffset(fd, &buf, sizeof(buf), offset);
    300     SAFE_ASSERT(len % sizeof(buf[0]) == 0);
    301     const ssize_t num_symbols_in_buf = len / sizeof(buf[0]);
    302     SAFE_ASSERT(num_symbols_in_buf <= sizeof(buf)/sizeof(buf[0]));
    303     for (int j = 0; j < num_symbols_in_buf; ++j) {
    304       const ElfW(Sym)& symbol = buf[j];
    305       uint64_t start_address = symbol.st_value;
    306       start_address += symbol_offset;
    307       uint64_t end_address = start_address + symbol.st_size;
    308       if (symbol.st_value != 0 &&  // Skip null value symbols.
    309           symbol.st_shndx != 0 &&  // Skip undefined symbols.
    310           start_address <= pc && pc < end_address) {
    311         ssize_t len1 = ReadFromOffset(fd, out, out_size,
    312                                       strtab->sh_offset + symbol.st_name);
    313         if (len1 <= 0 || memchr(out, '\0', out_size) == NULL) {
    314           return false;
    315         }
    316         return true;  // Obtained the symbol name.
    317       }
    318     }
    319     i += num_symbols_in_buf;
    320   }
    321   return false;
    322 }
    323 
    324 // Get the symbol name of "pc" from the file pointed by "fd".  Process
    325 // both regular and dynamic symbol tables if necessary.  On success,
    326 // write the symbol name to "out" and return true.  Otherwise, return
    327 // false.
    328 static bool GetSymbolFromObjectFile(const int fd, uint64_t pc,
    329                                     char *out, int out_size,
    330                                     uint64_t map_start_address) {
    331   // Read the ELF header.
    332   ElfW(Ehdr) elf_header;
    333   if (!ReadFromOffsetExact(fd, &elf_header, sizeof(elf_header), 0)) {
    334     return false;
    335   }
    336 
    337   uint64_t symbol_offset = 0;
    338   if (elf_header.e_type == ET_DYN) {  // DSO needs offset adjustment.
    339     symbol_offset = map_start_address;
    340   }
    341 
    342   ElfW(Shdr) symtab, strtab;
    343 
    344   // Consult a regular symbol table first.
    345   if (GetSectionHeaderByType(fd, elf_header.e_shnum, elf_header.e_shoff,
    346                              SHT_SYMTAB, &symtab)) {
    347     if (!ReadFromOffsetExact(fd, &strtab, sizeof(strtab), elf_header.e_shoff +
    348                              symtab.sh_link * sizeof(symtab))) {
    349       return false;
    350     }
    351     if (FindSymbol(pc, fd, out, out_size, symbol_offset,
    352                    &strtab, &symtab)) {
    353       return true;  // Found the symbol in a regular symbol table.
    354     }
    355   }
    356 
    357   // If the symbol is not found, then consult a dynamic symbol table.
    358   if (GetSectionHeaderByType(fd, elf_header.e_shnum, elf_header.e_shoff,
    359                              SHT_DYNSYM, &symtab)) {
    360     if (!ReadFromOffsetExact(fd, &strtab, sizeof(strtab), elf_header.e_shoff +
    361                              symtab.sh_link * sizeof(symtab))) {
    362       return false;
    363     }
    364     if (FindSymbol(pc, fd, out, out_size, symbol_offset,
    365                    &strtab, &symtab)) {
    366       return true;  // Found the symbol in a dynamic symbol table.
    367     }
    368   }
    369 
    370   return false;
    371 }
    372 
    373 namespace {
    374 // Thin wrapper around a file descriptor so that the file descriptor
    375 // gets closed for sure.
    376 struct FileDescriptor {
    377   const int fd_;
    378   explicit FileDescriptor(int fd) : fd_(fd) {}
    379   ~FileDescriptor() {
    380     if (fd_ >= 0) {
    381       NO_INTR(close(fd_));
    382     }
    383   }
    384   int get() { return fd_; }
    385 
    386  private:
    387   explicit FileDescriptor(const FileDescriptor&);
    388   void operator=(const FileDescriptor&);
    389 };
    390 
    391 // Helper class for reading lines from file.
    392 //
    393 // Note: we don't use ProcMapsIterator since the object is big (it has
    394 // a 5k array member) and uses async-unsafe functions such as sscanf()
    395 // and snprintf().
    396 class LineReader {
    397  public:
    398   explicit LineReader(int fd, char *buf, int buf_len) : fd_(fd),
    399     buf_(buf), buf_len_(buf_len), bol_(buf), eol_(buf), eod_(buf) {
    400   }
    401 
    402   // Read '\n'-terminated line from file.  On success, modify "bol"
    403   // and "eol", then return true.  Otherwise, return false.
    404   //
    405   // Note: if the last line doesn't end with '\n', the line will be
    406   // dropped.  It's an intentional behavior to make the code simple.
    407   bool ReadLine(const char **bol, const char **eol) {
    408     if (BufferIsEmpty()) {  // First time.
    409       const ssize_t num_bytes = ReadPersistent(fd_, buf_, buf_len_);
    410       if (num_bytes <= 0) {  // EOF or error.
    411         return false;
    412       }
    413       eod_ = buf_ + num_bytes;
    414       bol_ = buf_;
    415     } else {
    416       bol_ = eol_ + 1;  // Advance to the next line in the buffer.
    417       SAFE_ASSERT(bol_ <= eod_);  // "bol_" can point to "eod_".
    418       if (!HasCompleteLine()) {
    419         const int incomplete_line_length = eod_ - bol_;
    420         // Move the trailing incomplete line to the beginning.
    421         memmove(buf_, bol_, incomplete_line_length);
    422         // Read text from file and append it.
    423         char * const append_pos = buf_ + incomplete_line_length;
    424         const int capacity_left = buf_len_ - incomplete_line_length;
    425         const ssize_t num_bytes = ReadPersistent(fd_, append_pos,
    426                                                  capacity_left);
    427         if (num_bytes <= 0) {  // EOF or error.
    428           return false;
    429         }
    430         eod_ = append_pos + num_bytes;
    431         bol_ = buf_;
    432       }
    433     }
    434     eol_ = FindLineFeed();
    435     if (eol_ == NULL) {  // '\n' not found.  Malformed line.
    436       return false;
    437     }
    438     *eol_ = '\0';  // Replace '\n' with '\0'.
    439 
    440     *bol = bol_;
    441     *eol = eol_;
    442     return true;
    443   }
    444 
    445   // Beginning of line.
    446   const char *bol() {
    447     return bol_;
    448   }
    449 
    450   // End of line.
    451   const char *eol() {
    452     return eol_;
    453   }
    454 
    455  private:
    456   explicit LineReader(const LineReader&);
    457   void operator=(const LineReader&);
    458 
    459   char *FindLineFeed() {
    460     return reinterpret_cast<char *>(memchr(bol_, '\n', eod_ - bol_));
    461   }
    462 
    463   bool BufferIsEmpty() {
    464     return buf_ == eod_;
    465   }
    466 
    467   bool HasCompleteLine() {
    468     return !BufferIsEmpty() && FindLineFeed() != NULL;
    469   }
    470 
    471   const int fd_;
    472   char * const buf_;
    473   const int buf_len_;
    474   char *bol_;
    475   char *eol_;
    476   const char *eod_;  // End of data in "buf_".
    477 };
    478 }  // namespace
    479 
    480 // Place the hex number read from "start" into "*hex".  The pointer to
    481 // the first non-hex character or "end" is returned.
    482 static char *GetHex(const char *start, const char *end, uint64_t *hex) {
    483   *hex = 0;
    484   const char *p;
    485   for (p = start; p < end; ++p) {
    486     int ch = *p;
    487     if ((ch >= '0' && ch <= '9') ||
    488         (ch >= 'A' && ch <= 'F') || (ch >= 'a' && ch <= 'f')) {
    489       *hex = (*hex << 4) | (ch < 'A' ? ch - '0' : (ch & 0xF) + 9);
    490     } else {  // Encountered the first non-hex character.
    491       break;
    492     }
    493   }
    494   SAFE_ASSERT(p <= end);
    495   return const_cast<char *>(p);
    496 }
    497 
    498 // Searches for the object file (from /proc/self/maps) that contains
    499 // the specified pc.  If found, sets |start_address| to the start address
    500 // of where this object file is mapped in memory, sets the module base
    501 // address into |base_address|, copies the object file name into
    502 // |out_file_name|, and attempts to open the object file.  If the object
    503 // file is opened successfully, returns the file descriptor.  Otherwise,
    504 // returns -1.  |out_file_name_size| is the size of the file name buffer
    505 // (including the null-terminator).
    506 static ATTRIBUTE_NOINLINE int
    507 OpenObjectFileContainingPcAndGetStartAddress(uint64_t pc,
    508                                              uint64_t &start_address,
    509                                              uint64_t &base_address,
    510                                              char *out_file_name,
    511                                              int out_file_name_size) {
    512   int object_fd;
    513 
    514   // Open /proc/self/maps.
    515   int maps_fd;
    516   NO_INTR(maps_fd = open("/proc/self/maps", O_RDONLY));
    517   FileDescriptor wrapped_maps_fd(maps_fd);
    518   if (wrapped_maps_fd.get() < 0) {
    519     return -1;
    520   }
    521 
    522   // Iterate over maps and look for the map containing the pc.  Then
    523   // look into the symbol tables inside.
    524   char buf[1024];  // Big enough for line of sane /proc/self/maps
    525   int num_maps = 0;
    526   LineReader reader(wrapped_maps_fd.get(), buf, sizeof(buf));
    527   while (true) {
    528     num_maps++;
    529     const char *cursor;
    530     const char *eol;
    531     if (!reader.ReadLine(&cursor, &eol)) {  // EOF or malformed line.
    532       return -1;
    533     }
    534 
    535     // Start parsing line in /proc/self/maps.  Here is an example:
    536     //
    537     // 08048000-0804c000 r-xp 00000000 08:01 2142121    /bin/cat
    538     //
    539     // We want start address (08048000), end address (0804c000), flags
    540     // (r-xp) and file name (/bin/cat).
    541 
    542     // Read start address.
    543     cursor = GetHex(cursor, eol, &start_address);
    544     if (cursor == eol || *cursor != '-') {
    545       return -1;  // Malformed line.
    546     }
    547     ++cursor;  // Skip '-'.
    548 
    549     // Read end address.
    550     uint64_t end_address;
    551     cursor = GetHex(cursor, eol, &end_address);
    552     if (cursor == eol || *cursor != ' ') {
    553       return -1;  // Malformed line.
    554     }
    555     ++cursor;  // Skip ' '.
    556 
    557     // Check start and end addresses.
    558     if (!(start_address <= pc && pc < end_address)) {
    559       continue;  // We skip this map.  PC isn't in this map.
    560     }
    561 
    562     // Read flags.  Skip flags until we encounter a space or eol.
    563     const char * const flags_start = cursor;
    564     while (cursor < eol && *cursor != ' ') {
    565       ++cursor;
    566     }
    567     // We expect at least four letters for flags (ex. "r-xp").
    568     if (cursor == eol || cursor < flags_start + 4) {
    569       return -1;  // Malformed line.
    570     }
    571 
    572     // Check flags.  We are only interested in "r-x" maps.
    573     if (memcmp(flags_start, "r-x", 3) != 0) {  // Not a "r-x" map.
    574       continue;  // We skip this map.
    575     }
    576     ++cursor;  // Skip ' '.
    577 
    578     // Read file offset.
    579     uint64_t file_offset;
    580     cursor = GetHex(cursor, eol, &file_offset);
    581     if (cursor == eol || *cursor != ' ') {
    582       return -1;  // Malformed line.
    583     }
    584     ++cursor;  // Skip ' '.
    585 
    586     // Don't subtract 'start_address' from the first entry:
    587     // * If a binary is compiled w/o -pie, then the first entry in
    588     //   process maps is likely the binary itself (all dynamic libs
    589     //   are mapped higher in address space). For such a binary,
    590     //   instruction offset in binary coincides with the actual
    591     //   instruction address in virtual memory (as code section
    592     //   is mapped to a fixed memory range).
    593     // * If a binary is compiled with -pie, all the modules are
    594     //   mapped high at address space (in particular, higher than
    595     //   shadow memory of the tool), so the module can't be the
    596     //   first entry.
    597     base_address = ((num_maps == 1) ? 0U : start_address) - file_offset;
    598 
    599     // Skip to file name.  "cursor" now points to dev.  We need to
    600     // skip at least two spaces for dev and inode.
    601     int num_spaces = 0;
    602     while (cursor < eol) {
    603       if (*cursor == ' ') {
    604         ++num_spaces;
    605       } else if (num_spaces >= 2) {
    606         // The first non-space character after skipping two spaces
    607         // is the beginning of the file name.
    608         break;
    609       }
    610       ++cursor;
    611     }
    612     if (cursor == eol) {
    613       return -1;  // Malformed line.
    614     }
    615 
    616     // Finally, "cursor" now points to file name of our interest.
    617     NO_INTR(object_fd = open(cursor, O_RDONLY));
    618     if (object_fd < 0) {
    619       // Failed to open object file.  Copy the object file name to
    620       // |out_file_name|.
    621       strncpy(out_file_name, cursor, out_file_name_size);
    622       // Making sure |out_file_name| is always null-terminated.
    623       out_file_name[out_file_name_size - 1] = '\0';
    624       return -1;
    625     }
    626     return object_fd;
    627   }
    628 }
    629 
    630 // POSIX doesn't define any async-signal safe function for converting
    631 // an integer to ASCII. We'll have to define our own version.
    632 // itoa_r() converts a (signed) integer to ASCII. It returns "buf", if the
    633 // conversion was successful or NULL otherwise. It never writes more than "sz"
    634 // bytes. Output will be truncated as needed, and a NUL character is always
    635 // appended.
    636 // NOTE: code from sandbox/linux/seccomp-bpf/demo.cc.
    637 char *itoa_r(intptr_t i, char *buf, size_t sz, int base, size_t padding) {
    638   // Make sure we can write at least one NUL byte.
    639   size_t n = 1;
    640   if (n > sz)
    641     return NULL;
    642 
    643   if (base < 2 || base > 16) {
    644     buf[0] = '\000';
    645     return NULL;
    646   }
    647 
    648   char *start = buf;
    649 
    650   uintptr_t j = i;
    651 
    652   // Handle negative numbers (only for base 10).
    653   if (i < 0 && base == 10) {
    654     j = -i;
    655 
    656     // Make sure we can write the '-' character.
    657     if (++n > sz) {
    658       buf[0] = '\000';
    659       return NULL;
    660     }
    661     *start++ = '-';
    662   }
    663 
    664   // Loop until we have converted the entire number. Output at least one
    665   // character (i.e. '0').
    666   char *ptr = start;
    667   do {
    668     // Make sure there is still enough space left in our output buffer.
    669     if (++n > sz) {
    670       buf[0] = '\000';
    671       return NULL;
    672     }
    673 
    674     // Output the next digit.
    675     *ptr++ = "0123456789abcdef"[j % base];
    676     j /= base;
    677 
    678     if (padding > 0)
    679       padding--;
    680   } while (j > 0 || padding > 0);
    681 
    682   // Terminate the output with a NUL character.
    683   *ptr = '\000';
    684 
    685   // Conversion to ASCII actually resulted in the digits being in reverse
    686   // order. We can't easily generate them in forward order, as we can't tell
    687   // the number of characters needed until we are done converting.
    688   // So, now, we reverse the string (except for the possible "-" sign).
    689   while (--ptr > start) {
    690     char ch = *ptr;
    691     *ptr = *start;
    692     *start++ = ch;
    693   }
    694   return buf;
    695 }
    696 
    697 // Safely appends string |source| to string |dest|.  Never writes past the
    698 // buffer size |dest_size| and guarantees that |dest| is null-terminated.
    699 void SafeAppendString(const char* source, char* dest, int dest_size) {
    700   int dest_string_length = strlen(dest);
    701   SAFE_ASSERT(dest_string_length < dest_size);
    702   dest += dest_string_length;
    703   dest_size -= dest_string_length;
    704   strncpy(dest, source, dest_size);
    705   // Making sure |dest| is always null-terminated.
    706   dest[dest_size - 1] = '\0';
    707 }
    708 
    709 // Converts a 64-bit value into a hex string, and safely appends it to |dest|.
    710 // Never writes past the buffer size |dest_size| and guarantees that |dest| is
    711 // null-terminated.
    712 void SafeAppendHexNumber(uint64_t value, char* dest, int dest_size) {
    713   // 64-bit numbers in hex can have up to 16 digits.
    714   char buf[17] = {'\0'};
    715   SafeAppendString(itoa_r(value, buf, sizeof(buf), 16, 0), dest, dest_size);
    716 }
    717 
    718 // The implementation of our symbolization routine.  If it
    719 // successfully finds the symbol containing "pc" and obtains the
    720 // symbol name, returns true and write the symbol name to "out".
    721 // Otherwise, returns false. If Callback function is installed via
    722 // InstallSymbolizeCallback(), the function is also called in this function,
    723 // and "out" is used as its output.
    724 // To keep stack consumption low, we would like this function to not
    725 // get inlined.
    726 static ATTRIBUTE_NOINLINE bool SymbolizeAndDemangle(void *pc, char *out,
    727                                                     int out_size) {
    728   uint64_t pc0 = reinterpret_cast<uintptr_t>(pc);
    729   uint64_t start_address = 0;
    730   uint64_t base_address = 0;
    731   int object_fd = -1;
    732 
    733   if (out_size < 1) {
    734     return false;
    735   }
    736   out[0] = '\0';
    737   SafeAppendString("(", out, out_size);
    738 
    739   if (g_symbolize_open_object_file_callback) {
    740     object_fd = g_symbolize_open_object_file_callback(pc0, start_address,
    741                                                       base_address, out + 1,
    742                                                       out_size - 1);
    743   } else {
    744     object_fd = OpenObjectFileContainingPcAndGetStartAddress(pc0, start_address,
    745                                                              base_address,
    746                                                              out + 1,
    747                                                              out_size - 1);
    748   }
    749 
    750   // Check whether a file name was returned.
    751   if (object_fd < 0) {
    752     if (out[1]) {
    753       // The object file containing PC was determined successfully however the
    754       // object file was not opened successfully.  This is still considered
    755       // success because the object file name and offset are known and tools
    756       // like asan_symbolize.py can be used for the symbolization.
    757       out[out_size - 1] = '\0';  // Making sure |out| is always null-terminated.
    758       SafeAppendString("+0x", out, out_size);
    759       SafeAppendHexNumber(pc0 - base_address, out, out_size);
    760       SafeAppendString(")", out, out_size);
    761       return true;
    762     }
    763     // Failed to determine the object file containing PC.  Bail out.
    764     return false;
    765   }
    766   FileDescriptor wrapped_object_fd(object_fd);
    767   int elf_type = FileGetElfType(wrapped_object_fd.get());
    768   if (elf_type == -1) {
    769     return false;
    770   }
    771   if (g_symbolize_callback) {
    772     // Run the call back if it's installed.
    773     // Note: relocation (and much of the rest of this code) will be
    774     // wrong for prelinked shared libraries and PIE executables.
    775     uint64 relocation = (elf_type == ET_DYN) ? start_address : 0;
    776     int num_bytes_written = g_symbolize_callback(wrapped_object_fd.get(),
    777                                                  pc, out, out_size,
    778                                                  relocation);
    779     if (num_bytes_written > 0) {
    780       out += num_bytes_written;
    781       out_size -= num_bytes_written;
    782     }
    783   }
    784   if (!GetSymbolFromObjectFile(wrapped_object_fd.get(), pc0,
    785                                out, out_size, start_address)) {
    786     return false;
    787   }
    788 
    789   // Symbolization succeeded.  Now we try to demangle the symbol.
    790   DemangleInplace(out, out_size);
    791   return true;
    792 }
    793 
    794 _END_GOOGLE_NAMESPACE_
    795 
    796 #elif defined(OS_MACOSX) && defined(HAVE_DLADDR)
    797 
    798 #include <dlfcn.h>
    799 #include <string.h>
    800 
    801 _START_GOOGLE_NAMESPACE_
    802 
    803 static ATTRIBUTE_NOINLINE bool SymbolizeAndDemangle(void *pc, char *out,
    804                                                     int out_size) {
    805   Dl_info info;
    806   if (dladdr(pc, &info)) {
    807     if ((int)strlen(info.dli_sname) < out_size) {
    808       strcpy(out, info.dli_sname);
    809       // Symbolization succeeded.  Now we try to demangle the symbol.
    810       DemangleInplace(out, out_size);
    811       return true;
    812     }
    813   }
    814   return false;
    815 }
    816 
    817 _END_GOOGLE_NAMESPACE_
    818 
    819 #else
    820 # error BUG: HAVE_SYMBOLIZE was wrongly set
    821 #endif
    822 
    823 _START_GOOGLE_NAMESPACE_
    824 
    825 bool Symbolize(void *pc, char *out, int out_size) {
    826   SAFE_ASSERT(out_size >= 0);
    827   return SymbolizeAndDemangle(pc, out, out_size);
    828 }
    829 
    830 _END_GOOGLE_NAMESPACE_
    831 
    832 #else  /* HAVE_SYMBOLIZE */
    833 
    834 #include <assert.h>
    835 
    836 #include "config.h"
    837 
    838 _START_GOOGLE_NAMESPACE_
    839 
    840 // TODO: Support other environments.
    841 bool Symbolize(void *pc, char *out, int out_size) {
    842   assert(0);
    843   return false;
    844 }
    845 
    846 _END_GOOGLE_NAMESPACE_
    847 
    848 #endif
    849