1 1.1 mrg //===-- asan_descriptions.cpp -----------------------------------*- C++ -*-===// 2 1.1 mrg // 3 1.1 mrg // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. 4 1.1 mrg // See https://llvm.org/LICENSE.txt for license information. 5 1.1 mrg // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 6 1.1 mrg // 7 1.1 mrg //===----------------------------------------------------------------------===// 8 1.1 mrg // 9 1.1 mrg // This file is a part of AddressSanitizer, an address sanity checker. 10 1.1 mrg // 11 1.1 mrg // ASan functions for getting information about an address and/or printing it. 12 1.1 mrg //===----------------------------------------------------------------------===// 13 1.1 mrg 14 1.1 mrg #include "asan_descriptions.h" 15 1.1 mrg #include "asan_mapping.h" 16 1.1 mrg #include "asan_report.h" 17 1.1 mrg #include "asan_stack.h" 18 1.1 mrg #include "sanitizer_common/sanitizer_stackdepot.h" 19 1.1 mrg 20 1.1 mrg namespace __asan { 21 1.1 mrg 22 1.1 mrg AsanThreadIdAndName::AsanThreadIdAndName(AsanThreadContext *t) { 23 1.1 mrg Init(t->tid, t->name); 24 1.1 mrg } 25 1.1 mrg 26 1.1 mrg AsanThreadIdAndName::AsanThreadIdAndName(u32 tid) { 27 1.1 mrg if (tid == kInvalidTid) { 28 1.1 mrg Init(tid, ""); 29 1.1 mrg } else { 30 1.1 mrg asanThreadRegistry().CheckLocked(); 31 1.1 mrg AsanThreadContext *t = GetThreadContextByTidLocked(tid); 32 1.1 mrg Init(tid, t->name); 33 1.1 mrg } 34 1.1 mrg } 35 1.1 mrg 36 1.1 mrg void AsanThreadIdAndName::Init(u32 tid, const char *tname) { 37 1.1 mrg int len = internal_snprintf(name, sizeof(name), "T%d", tid); 38 1.1 mrg CHECK(((unsigned int)len) < sizeof(name)); 39 1.1 mrg if (tname[0] != '\0') 40 1.1 mrg internal_snprintf(&name[len], sizeof(name) - len, " (%s)", tname); 41 1.1 mrg } 42 1.1 mrg 43 1.1 mrg void DescribeThread(AsanThreadContext *context) { 44 1.1 mrg CHECK(context); 45 1.1 mrg asanThreadRegistry().CheckLocked(); 46 1.1 mrg // No need to announce the main thread. 47 1.3 mrg if (context->tid == kMainTid || context->announced) { 48 1.1 mrg return; 49 1.1 mrg } 50 1.1 mrg context->announced = true; 51 1.3 mrg InternalScopedString str; 52 1.4 mrg str.AppendF("Thread %s", AsanThreadIdAndName(context).c_str()); 53 1.1 mrg if (context->parent_tid == kInvalidTid) { 54 1.4 mrg str.Append(" created by unknown thread\n"); 55 1.1 mrg Printf("%s", str.data()); 56 1.1 mrg return; 57 1.1 mrg } 58 1.4 mrg str.AppendF(" created by %s here:\n", 59 1.4 mrg AsanThreadIdAndName(context->parent_tid).c_str()); 60 1.1 mrg Printf("%s", str.data()); 61 1.1 mrg StackDepotGet(context->stack_id).Print(); 62 1.1 mrg // Recursively described parent thread if needed. 63 1.1 mrg if (flags()->print_full_thread_history) { 64 1.1 mrg AsanThreadContext *parent_context = 65 1.1 mrg GetThreadContextByTidLocked(context->parent_tid); 66 1.1 mrg DescribeThread(parent_context); 67 1.1 mrg } 68 1.1 mrg } 69 1.1 mrg 70 1.1 mrg // Shadow descriptions 71 1.1 mrg static bool GetShadowKind(uptr addr, ShadowKind *shadow_kind) { 72 1.1 mrg CHECK(!AddrIsInMem(addr)); 73 1.1 mrg if (AddrIsInShadowGap(addr)) { 74 1.1 mrg *shadow_kind = kShadowKindGap; 75 1.1 mrg } else if (AddrIsInHighShadow(addr)) { 76 1.1 mrg *shadow_kind = kShadowKindHigh; 77 1.1 mrg } else if (AddrIsInLowShadow(addr)) { 78 1.1 mrg *shadow_kind = kShadowKindLow; 79 1.1 mrg } else { 80 1.1 mrg return false; 81 1.1 mrg } 82 1.1 mrg return true; 83 1.1 mrg } 84 1.1 mrg 85 1.1 mrg bool DescribeAddressIfShadow(uptr addr) { 86 1.1 mrg ShadowAddressDescription descr; 87 1.1 mrg if (!GetShadowAddressInformation(addr, &descr)) return false; 88 1.1 mrg descr.Print(); 89 1.1 mrg return true; 90 1.1 mrg } 91 1.1 mrg 92 1.1 mrg bool GetShadowAddressInformation(uptr addr, ShadowAddressDescription *descr) { 93 1.1 mrg if (AddrIsInMem(addr)) return false; 94 1.1 mrg ShadowKind shadow_kind; 95 1.1 mrg if (!GetShadowKind(addr, &shadow_kind)) return false; 96 1.1 mrg if (shadow_kind != kShadowKindGap) descr->shadow_byte = *(u8 *)addr; 97 1.1 mrg descr->addr = addr; 98 1.1 mrg descr->kind = shadow_kind; 99 1.1 mrg return true; 100 1.1 mrg } 101 1.1 mrg 102 1.1 mrg // Heap descriptions 103 1.1 mrg static void GetAccessToHeapChunkInformation(ChunkAccess *descr, 104 1.1 mrg AsanChunkView chunk, uptr addr, 105 1.1 mrg uptr access_size) { 106 1.1 mrg descr->bad_addr = addr; 107 1.1 mrg if (chunk.AddrIsAtLeft(addr, access_size, &descr->offset)) { 108 1.1 mrg descr->access_type = kAccessTypeLeft; 109 1.1 mrg } else if (chunk.AddrIsAtRight(addr, access_size, &descr->offset)) { 110 1.1 mrg descr->access_type = kAccessTypeRight; 111 1.1 mrg if (descr->offset < 0) { 112 1.1 mrg descr->bad_addr -= descr->offset; 113 1.1 mrg descr->offset = 0; 114 1.1 mrg } 115 1.1 mrg } else if (chunk.AddrIsInside(addr, access_size, &descr->offset)) { 116 1.1 mrg descr->access_type = kAccessTypeInside; 117 1.1 mrg } else { 118 1.1 mrg descr->access_type = kAccessTypeUnknown; 119 1.1 mrg } 120 1.1 mrg descr->chunk_begin = chunk.Beg(); 121 1.1 mrg descr->chunk_size = chunk.UsedSize(); 122 1.1 mrg descr->user_requested_alignment = chunk.UserRequestedAlignment(); 123 1.1 mrg descr->alloc_type = chunk.GetAllocType(); 124 1.1 mrg } 125 1.1 mrg 126 1.1 mrg static void PrintHeapChunkAccess(uptr addr, const ChunkAccess &descr) { 127 1.1 mrg Decorator d; 128 1.3 mrg InternalScopedString str; 129 1.4 mrg str.Append(d.Location()); 130 1.1 mrg switch (descr.access_type) { 131 1.1 mrg case kAccessTypeLeft: 132 1.4 mrg str.AppendF("%p is located %zd bytes before", (void *)descr.bad_addr, 133 1.4 mrg descr.offset); 134 1.1 mrg break; 135 1.1 mrg case kAccessTypeRight: 136 1.4 mrg str.AppendF("%p is located %zd bytes after", (void *)descr.bad_addr, 137 1.4 mrg descr.offset); 138 1.1 mrg break; 139 1.1 mrg case kAccessTypeInside: 140 1.4 mrg str.AppendF("%p is located %zd bytes inside of", (void *)descr.bad_addr, 141 1.4 mrg descr.offset); 142 1.1 mrg break; 143 1.1 mrg case kAccessTypeUnknown: 144 1.4 mrg str.AppendF( 145 1.1 mrg "%p is located somewhere around (this is AddressSanitizer bug!)", 146 1.1 mrg (void *)descr.bad_addr); 147 1.1 mrg } 148 1.4 mrg str.AppendF(" %zu-byte region [%p,%p)\n", descr.chunk_size, 149 1.4 mrg (void *)descr.chunk_begin, 150 1.4 mrg (void *)(descr.chunk_begin + descr.chunk_size)); 151 1.4 mrg str.Append(d.Default()); 152 1.1 mrg Printf("%s", str.data()); 153 1.1 mrg } 154 1.1 mrg 155 1.1 mrg bool GetHeapAddressInformation(uptr addr, uptr access_size, 156 1.1 mrg HeapAddressDescription *descr) { 157 1.1 mrg AsanChunkView chunk = FindHeapChunkByAddress(addr); 158 1.1 mrg if (!chunk.IsValid()) { 159 1.1 mrg return false; 160 1.1 mrg } 161 1.1 mrg descr->addr = addr; 162 1.1 mrg GetAccessToHeapChunkInformation(&descr->chunk_access, chunk, addr, 163 1.1 mrg access_size); 164 1.1 mrg CHECK_NE(chunk.AllocTid(), kInvalidTid); 165 1.1 mrg descr->alloc_tid = chunk.AllocTid(); 166 1.1 mrg descr->alloc_stack_id = chunk.GetAllocStackId(); 167 1.1 mrg descr->free_tid = chunk.FreeTid(); 168 1.1 mrg if (descr->free_tid != kInvalidTid) 169 1.1 mrg descr->free_stack_id = chunk.GetFreeStackId(); 170 1.1 mrg return true; 171 1.1 mrg } 172 1.1 mrg 173 1.1 mrg static StackTrace GetStackTraceFromId(u32 id) { 174 1.1 mrg CHECK(id); 175 1.1 mrg StackTrace res = StackDepotGet(id); 176 1.1 mrg CHECK(res.trace); 177 1.1 mrg return res; 178 1.1 mrg } 179 1.1 mrg 180 1.1 mrg bool DescribeAddressIfHeap(uptr addr, uptr access_size) { 181 1.1 mrg HeapAddressDescription descr; 182 1.1 mrg if (!GetHeapAddressInformation(addr, access_size, &descr)) { 183 1.1 mrg Printf( 184 1.1 mrg "AddressSanitizer can not describe address in more detail " 185 1.1 mrg "(wild memory access suspected).\n"); 186 1.1 mrg return false; 187 1.1 mrg } 188 1.1 mrg descr.Print(); 189 1.1 mrg return true; 190 1.1 mrg } 191 1.1 mrg 192 1.1 mrg // Stack descriptions 193 1.1 mrg bool GetStackAddressInformation(uptr addr, uptr access_size, 194 1.1 mrg StackAddressDescription *descr) { 195 1.1 mrg AsanThread *t = FindThreadByStackAddress(addr); 196 1.1 mrg if (!t) return false; 197 1.1 mrg 198 1.1 mrg descr->addr = addr; 199 1.1 mrg descr->tid = t->tid(); 200 1.1 mrg // Try to fetch precise stack frame for this access. 201 1.1 mrg AsanThread::StackFrameAccess access; 202 1.1 mrg if (!t->GetStackFrameAccessByAddr(addr, &access)) { 203 1.1 mrg descr->frame_descr = nullptr; 204 1.1 mrg return true; 205 1.1 mrg } 206 1.1 mrg 207 1.1 mrg descr->offset = access.offset; 208 1.1 mrg descr->access_size = access_size; 209 1.1 mrg descr->frame_pc = access.frame_pc; 210 1.1 mrg descr->frame_descr = access.frame_descr; 211 1.1 mrg 212 1.1 mrg #if SANITIZER_PPC64V1 213 1.1 mrg // On PowerPC64 ELFv1, the address of a function actually points to a 214 1.1 mrg // three-doubleword data structure with the first field containing 215 1.1 mrg // the address of the function's code. 216 1.1 mrg descr->frame_pc = *reinterpret_cast<uptr *>(descr->frame_pc); 217 1.1 mrg #endif 218 1.1 mrg descr->frame_pc += 16; 219 1.1 mrg 220 1.1 mrg return true; 221 1.1 mrg } 222 1.1 mrg 223 1.1 mrg static void PrintAccessAndVarIntersection(const StackVarDescr &var, uptr addr, 224 1.1 mrg uptr access_size, uptr prev_var_end, 225 1.1 mrg uptr next_var_beg) { 226 1.1 mrg uptr var_end = var.beg + var.size; 227 1.1 mrg uptr addr_end = addr + access_size; 228 1.1 mrg const char *pos_descr = nullptr; 229 1.1 mrg // If the variable [var.beg, var_end) is the nearest variable to the 230 1.1 mrg // current memory access, indicate it in the log. 231 1.1 mrg if (addr >= var.beg) { 232 1.1 mrg if (addr_end <= var_end) 233 1.1 mrg pos_descr = "is inside"; // May happen if this is a use-after-return. 234 1.1 mrg else if (addr < var_end) 235 1.1 mrg pos_descr = "partially overflows"; 236 1.1 mrg else if (addr_end <= next_var_beg && 237 1.1 mrg next_var_beg - addr_end >= addr - var_end) 238 1.1 mrg pos_descr = "overflows"; 239 1.1 mrg } else { 240 1.1 mrg if (addr_end > var.beg) 241 1.1 mrg pos_descr = "partially underflows"; 242 1.1 mrg else if (addr >= prev_var_end && addr - prev_var_end >= var.beg - addr_end) 243 1.1 mrg pos_descr = "underflows"; 244 1.1 mrg } 245 1.3 mrg InternalScopedString str; 246 1.4 mrg str.AppendF(" [%zd, %zd)", var.beg, var_end); 247 1.1 mrg // Render variable name. 248 1.4 mrg str.AppendF(" '"); 249 1.1 mrg for (uptr i = 0; i < var.name_len; ++i) { 250 1.4 mrg str.AppendF("%c", var.name_pos[i]); 251 1.1 mrg } 252 1.4 mrg str.AppendF("'"); 253 1.1 mrg if (var.line > 0) { 254 1.4 mrg str.AppendF(" (line %zd)", var.line); 255 1.1 mrg } 256 1.1 mrg if (pos_descr) { 257 1.1 mrg Decorator d; 258 1.1 mrg // FIXME: we may want to also print the size of the access here, 259 1.1 mrg // but in case of accesses generated by memset it may be confusing. 260 1.4 mrg str.AppendF("%s <== Memory access at offset %zd %s this variable%s\n", 261 1.4 mrg d.Location(), addr, pos_descr, d.Default()); 262 1.1 mrg } else { 263 1.4 mrg str.AppendF("\n"); 264 1.1 mrg } 265 1.1 mrg Printf("%s", str.data()); 266 1.1 mrg } 267 1.1 mrg 268 1.1 mrg bool DescribeAddressIfStack(uptr addr, uptr access_size) { 269 1.1 mrg StackAddressDescription descr; 270 1.1 mrg if (!GetStackAddressInformation(addr, access_size, &descr)) return false; 271 1.1 mrg descr.Print(); 272 1.1 mrg return true; 273 1.1 mrg } 274 1.1 mrg 275 1.1 mrg // Global descriptions 276 1.1 mrg static void DescribeAddressRelativeToGlobal(uptr addr, uptr access_size, 277 1.1 mrg const __asan_global &g) { 278 1.3 mrg InternalScopedString str; 279 1.1 mrg Decorator d; 280 1.4 mrg str.Append(d.Location()); 281 1.1 mrg if (addr < g.beg) { 282 1.4 mrg str.AppendF("%p is located %zd bytes before", (void *)addr, g.beg - addr); 283 1.1 mrg } else if (addr + access_size > g.beg + g.size) { 284 1.1 mrg if (addr < g.beg + g.size) addr = g.beg + g.size; 285 1.4 mrg str.AppendF("%p is located %zd bytes after", (void *)addr, 286 1.4 mrg addr - (g.beg + g.size)); 287 1.1 mrg } else { 288 1.1 mrg // Can it happen? 289 1.4 mrg str.AppendF("%p is located %zd bytes inside of", (void *)addr, 290 1.4 mrg addr - g.beg); 291 1.1 mrg } 292 1.4 mrg str.AppendF(" global variable '%s' defined in '", 293 1.4 mrg MaybeDemangleGlobalName(g.name)); 294 1.4 mrg PrintGlobalLocation(&str, g, /*print_module_name=*/false); 295 1.4 mrg str.AppendF("' (0x%zx) of size %zu\n", g.beg, g.size); 296 1.4 mrg str.Append(d.Default()); 297 1.1 mrg PrintGlobalNameIfASCII(&str, g); 298 1.1 mrg Printf("%s", str.data()); 299 1.1 mrg } 300 1.1 mrg 301 1.1 mrg bool GetGlobalAddressInformation(uptr addr, uptr access_size, 302 1.1 mrg GlobalAddressDescription *descr) { 303 1.1 mrg descr->addr = addr; 304 1.1 mrg int globals_num = GetGlobalsForAddress(addr, descr->globals, descr->reg_sites, 305 1.1 mrg ARRAY_SIZE(descr->globals)); 306 1.1 mrg descr->size = globals_num; 307 1.1 mrg descr->access_size = access_size; 308 1.1 mrg return globals_num != 0; 309 1.1 mrg } 310 1.1 mrg 311 1.1 mrg bool DescribeAddressIfGlobal(uptr addr, uptr access_size, 312 1.1 mrg const char *bug_type) { 313 1.1 mrg GlobalAddressDescription descr; 314 1.1 mrg if (!GetGlobalAddressInformation(addr, access_size, &descr)) return false; 315 1.1 mrg 316 1.1 mrg descr.Print(bug_type); 317 1.1 mrg return true; 318 1.1 mrg } 319 1.1 mrg 320 1.1 mrg void ShadowAddressDescription::Print() const { 321 1.3 mrg Printf("Address %p is located in the %s area.\n", (void *)addr, 322 1.3 mrg ShadowNames[kind]); 323 1.1 mrg } 324 1.1 mrg 325 1.1 mrg void GlobalAddressDescription::Print(const char *bug_type) const { 326 1.1 mrg for (int i = 0; i < size; i++) { 327 1.1 mrg DescribeAddressRelativeToGlobal(addr, access_size, globals[i]); 328 1.1 mrg if (bug_type && 329 1.1 mrg 0 == internal_strcmp(bug_type, "initialization-order-fiasco") && 330 1.1 mrg reg_sites[i]) { 331 1.1 mrg Printf(" registered at:\n"); 332 1.1 mrg StackDepotGet(reg_sites[i]).Print(); 333 1.1 mrg } 334 1.1 mrg } 335 1.1 mrg } 336 1.1 mrg 337 1.1 mrg bool GlobalAddressDescription::PointsInsideTheSameVariable( 338 1.1 mrg const GlobalAddressDescription &other) const { 339 1.1 mrg if (size == 0 || other.size == 0) return false; 340 1.1 mrg 341 1.1 mrg for (uptr i = 0; i < size; i++) { 342 1.1 mrg const __asan_global &a = globals[i]; 343 1.1 mrg for (uptr j = 0; j < other.size; j++) { 344 1.1 mrg const __asan_global &b = other.globals[j]; 345 1.1 mrg if (a.beg == b.beg && 346 1.1 mrg a.beg <= addr && 347 1.1 mrg b.beg <= other.addr && 348 1.1 mrg (addr + access_size) < (a.beg + a.size) && 349 1.1 mrg (other.addr + other.access_size) < (b.beg + b.size)) 350 1.1 mrg return true; 351 1.1 mrg } 352 1.1 mrg } 353 1.1 mrg 354 1.1 mrg return false; 355 1.1 mrg } 356 1.1 mrg 357 1.1 mrg void StackAddressDescription::Print() const { 358 1.1 mrg Decorator d; 359 1.1 mrg Printf("%s", d.Location()); 360 1.3 mrg Printf("Address %p is located in stack of thread %s", (void *)addr, 361 1.1 mrg AsanThreadIdAndName(tid).c_str()); 362 1.1 mrg 363 1.1 mrg if (!frame_descr) { 364 1.1 mrg Printf("%s\n", d.Default()); 365 1.1 mrg return; 366 1.1 mrg } 367 1.1 mrg Printf(" at offset %zu in frame%s\n", offset, d.Default()); 368 1.1 mrg 369 1.1 mrg // Now we print the frame where the alloca has happened. 370 1.1 mrg // We print this frame as a stack trace with one element. 371 1.1 mrg // The symbolizer may print more than one frame if inlining was involved. 372 1.1 mrg // The frame numbers may be different than those in the stack trace printed 373 1.1 mrg // previously. That's unfortunate, but I have no better solution, 374 1.1 mrg // especially given that the alloca may be from entirely different place 375 1.1 mrg // (e.g. use-after-scope, or different thread's stack). 376 1.1 mrg Printf("%s", d.Default()); 377 1.1 mrg StackTrace alloca_stack(&frame_pc, 1); 378 1.1 mrg alloca_stack.Print(); 379 1.1 mrg 380 1.1 mrg InternalMmapVector<StackVarDescr> vars; 381 1.1 mrg vars.reserve(16); 382 1.1 mrg if (!ParseFrameDescription(frame_descr, &vars)) { 383 1.1 mrg Printf( 384 1.1 mrg "AddressSanitizer can't parse the stack frame " 385 1.1 mrg "descriptor: |%s|\n", 386 1.1 mrg frame_descr); 387 1.1 mrg // 'addr' is a stack address, so return true even if we can't parse frame 388 1.1 mrg return; 389 1.1 mrg } 390 1.1 mrg uptr n_objects = vars.size(); 391 1.1 mrg // Report the number of stack objects. 392 1.1 mrg Printf(" This frame has %zu object(s):\n", n_objects); 393 1.1 mrg 394 1.1 mrg // Report all objects in this frame. 395 1.1 mrg for (uptr i = 0; i < n_objects; i++) { 396 1.1 mrg uptr prev_var_end = i ? vars[i - 1].beg + vars[i - 1].size : 0; 397 1.1 mrg uptr next_var_beg = i + 1 < n_objects ? vars[i + 1].beg : ~(0UL); 398 1.1 mrg PrintAccessAndVarIntersection(vars[i], offset, access_size, prev_var_end, 399 1.1 mrg next_var_beg); 400 1.1 mrg } 401 1.1 mrg Printf( 402 1.1 mrg "HINT: this may be a false positive if your program uses " 403 1.1 mrg "some custom stack unwind mechanism, swapcontext or vfork\n"); 404 1.1 mrg if (SANITIZER_WINDOWS) 405 1.1 mrg Printf(" (longjmp, SEH and C++ exceptions *are* supported)\n"); 406 1.1 mrg else 407 1.1 mrg Printf(" (longjmp and C++ exceptions *are* supported)\n"); 408 1.1 mrg 409 1.1 mrg DescribeThread(GetThreadContextByTidLocked(tid)); 410 1.1 mrg } 411 1.1 mrg 412 1.1 mrg void HeapAddressDescription::Print() const { 413 1.1 mrg PrintHeapChunkAccess(addr, chunk_access); 414 1.1 mrg 415 1.1 mrg asanThreadRegistry().CheckLocked(); 416 1.1 mrg AsanThreadContext *alloc_thread = GetThreadContextByTidLocked(alloc_tid); 417 1.1 mrg StackTrace alloc_stack = GetStackTraceFromId(alloc_stack_id); 418 1.1 mrg 419 1.1 mrg Decorator d; 420 1.1 mrg AsanThreadContext *free_thread = nullptr; 421 1.1 mrg if (free_tid != kInvalidTid) { 422 1.1 mrg free_thread = GetThreadContextByTidLocked(free_tid); 423 1.1 mrg Printf("%sfreed by thread %s here:%s\n", d.Allocation(), 424 1.1 mrg AsanThreadIdAndName(free_thread).c_str(), d.Default()); 425 1.1 mrg StackTrace free_stack = GetStackTraceFromId(free_stack_id); 426 1.1 mrg free_stack.Print(); 427 1.1 mrg Printf("%spreviously allocated by thread %s here:%s\n", d.Allocation(), 428 1.1 mrg AsanThreadIdAndName(alloc_thread).c_str(), d.Default()); 429 1.1 mrg } else { 430 1.1 mrg Printf("%sallocated by thread %s here:%s\n", d.Allocation(), 431 1.1 mrg AsanThreadIdAndName(alloc_thread).c_str(), d.Default()); 432 1.1 mrg } 433 1.1 mrg alloc_stack.Print(); 434 1.1 mrg DescribeThread(GetCurrentThread()); 435 1.1 mrg if (free_thread) DescribeThread(free_thread); 436 1.1 mrg DescribeThread(alloc_thread); 437 1.1 mrg } 438 1.1 mrg 439 1.1 mrg AddressDescription::AddressDescription(uptr addr, uptr access_size, 440 1.1 mrg bool shouldLockThreadRegistry) { 441 1.1 mrg if (GetShadowAddressInformation(addr, &data.shadow)) { 442 1.1 mrg data.kind = kAddressKindShadow; 443 1.1 mrg return; 444 1.1 mrg } 445 1.1 mrg if (GetHeapAddressInformation(addr, access_size, &data.heap)) { 446 1.1 mrg data.kind = kAddressKindHeap; 447 1.1 mrg return; 448 1.1 mrg } 449 1.1 mrg 450 1.1 mrg bool isStackMemory = false; 451 1.1 mrg if (shouldLockThreadRegistry) { 452 1.1 mrg ThreadRegistryLock l(&asanThreadRegistry()); 453 1.1 mrg isStackMemory = GetStackAddressInformation(addr, access_size, &data.stack); 454 1.1 mrg } else { 455 1.1 mrg isStackMemory = GetStackAddressInformation(addr, access_size, &data.stack); 456 1.1 mrg } 457 1.1 mrg if (isStackMemory) { 458 1.1 mrg data.kind = kAddressKindStack; 459 1.1 mrg return; 460 1.1 mrg } 461 1.1 mrg 462 1.1 mrg if (GetGlobalAddressInformation(addr, access_size, &data.global)) { 463 1.1 mrg data.kind = kAddressKindGlobal; 464 1.1 mrg return; 465 1.1 mrg } 466 1.1 mrg data.kind = kAddressKindWild; 467 1.3 mrg data.wild.addr = addr; 468 1.3 mrg data.wild.access_size = access_size; 469 1.3 mrg } 470 1.3 mrg 471 1.3 mrg void WildAddressDescription::Print() const { 472 1.3 mrg Printf("Address %p is a wild pointer inside of access range of size %p.\n", 473 1.3 mrg (void *)addr, (void *)access_size); 474 1.1 mrg } 475 1.1 mrg 476 1.1 mrg void PrintAddressDescription(uptr addr, uptr access_size, 477 1.1 mrg const char *bug_type) { 478 1.1 mrg ShadowAddressDescription shadow_descr; 479 1.1 mrg if (GetShadowAddressInformation(addr, &shadow_descr)) { 480 1.1 mrg shadow_descr.Print(); 481 1.1 mrg return; 482 1.1 mrg } 483 1.1 mrg 484 1.1 mrg GlobalAddressDescription global_descr; 485 1.1 mrg if (GetGlobalAddressInformation(addr, access_size, &global_descr)) { 486 1.1 mrg global_descr.Print(bug_type); 487 1.1 mrg return; 488 1.1 mrg } 489 1.1 mrg 490 1.1 mrg StackAddressDescription stack_descr; 491 1.1 mrg if (GetStackAddressInformation(addr, access_size, &stack_descr)) { 492 1.1 mrg stack_descr.Print(); 493 1.1 mrg return; 494 1.1 mrg } 495 1.1 mrg 496 1.1 mrg HeapAddressDescription heap_descr; 497 1.1 mrg if (GetHeapAddressInformation(addr, access_size, &heap_descr)) { 498 1.1 mrg heap_descr.Print(); 499 1.1 mrg return; 500 1.1 mrg } 501 1.1 mrg 502 1.1 mrg // We exhausted our possibilities. Bail out. 503 1.1 mrg Printf( 504 1.1 mrg "AddressSanitizer can not describe address in more detail " 505 1.1 mrg "(wild memory access suspected).\n"); 506 1.1 mrg } 507 1.1 mrg } // namespace __asan 508