Home | History | Annotate | Line # | Download | only in asan
      1 //===-- asan_debugging.cc -------------------------------------------------===//
      2 //
      3 //                     The LLVM Compiler Infrastructure
      4 //
      5 // This file is distributed under the University of Illinois Open Source
      6 // License. See LICENSE.TXT for details.
      7 //
      8 //===----------------------------------------------------------------------===//
      9 //
     10 // This file is a part of AddressSanitizer, an address sanity checker.
     11 //
     12 // This file contains various functions that are generally useful to call when
     13 // using a debugger (LLDB, GDB).
     14 //===----------------------------------------------------------------------===//
     15 
     16 #include "asan_allocator.h"
     17 #include "asan_descriptions.h"
     18 #include "asan_flags.h"
     19 #include "asan_internal.h"
     20 #include "asan_mapping.h"
     21 #include "asan_report.h"
     22 #include "asan_thread.h"
     23 
     24 namespace {
     25 using namespace __asan;
     26 
     27 static void FindInfoForStackVar(uptr addr, const char *frame_descr, uptr offset,
     28                                 char *name, uptr name_size,
     29                                 uptr &region_address, uptr &region_size) {
     30   InternalMmapVector<StackVarDescr> vars;
     31   vars.reserve(16);
     32   if (!ParseFrameDescription(frame_descr, &vars)) {
     33     return;
     34   }
     35 
     36   for (uptr i = 0; i < vars.size(); i++) {
     37     if (offset <= vars[i].beg + vars[i].size) {
     38       // We use name_len + 1 because strlcpy will guarantee a \0 at the end, so
     39       // if we're limiting the copy due to name_len, we add 1 to ensure we copy
     40       // the whole name and then terminate with '\0'.
     41       internal_strlcpy(name, vars[i].name_pos,
     42                        Min(name_size, vars[i].name_len + 1));
     43       region_address = addr - (offset - vars[i].beg);
     44       region_size = vars[i].size;
     45       return;
     46     }
     47   }
     48 }
     49 
     50 uptr AsanGetStack(uptr addr, uptr *trace, u32 size, u32 *thread_id,
     51                          bool alloc_stack) {
     52   AsanChunkView chunk = FindHeapChunkByAddress(addr);
     53   if (!chunk.IsValid()) return 0;
     54 
     55   StackTrace stack(nullptr, 0);
     56   if (alloc_stack) {
     57     if (chunk.AllocTid() == kInvalidTid) return 0;
     58     stack = chunk.GetAllocStack();
     59     if (thread_id) *thread_id = chunk.AllocTid();
     60   } else {
     61     if (chunk.FreeTid() == kInvalidTid) return 0;
     62     stack = chunk.GetFreeStack();
     63     if (thread_id) *thread_id = chunk.FreeTid();
     64   }
     65 
     66   if (trace && size) {
     67     size = Min(size, Min(stack.size, kStackTraceMax));
     68     for (uptr i = 0; i < size; i++)
     69       trace[i] = StackTrace::GetPreviousInstructionPc(stack.trace[i]);
     70 
     71     return size;
     72   }
     73 
     74   return 0;
     75 }
     76 
     77 }  // namespace
     78 
     79 SANITIZER_INTERFACE_ATTRIBUTE
     80 const char *__asan_locate_address(uptr addr, char *name, uptr name_size,
     81                                   uptr *region_address_ptr,
     82                                   uptr *region_size_ptr) {
     83   AddressDescription descr(addr);
     84   uptr region_address = 0;
     85   uptr region_size = 0;
     86   const char *region_kind = nullptr;
     87   if (name && name_size > 0) name[0] = 0;
     88 
     89   if (auto shadow = descr.AsShadow()) {
     90     // region_{address,size} are already 0
     91     switch (shadow->kind) {
     92       case kShadowKindLow:
     93         region_kind = "low shadow";
     94         break;
     95       case kShadowKindGap:
     96         region_kind = "shadow gap";
     97         break;
     98       case kShadowKindHigh:
     99         region_kind = "high shadow";
    100         break;
    101     }
    102   } else if (auto heap = descr.AsHeap()) {
    103     region_kind = "heap";
    104     region_address = heap->chunk_access.chunk_begin;
    105     region_size = heap->chunk_access.chunk_size;
    106   } else if (auto stack = descr.AsStack()) {
    107     region_kind = "stack";
    108     if (!stack->frame_descr) {
    109       // region_{address,size} are already 0
    110     } else {
    111       FindInfoForStackVar(addr, stack->frame_descr, stack->offset, name,
    112                           name_size, region_address, region_size);
    113     }
    114   } else if (auto global = descr.AsGlobal()) {
    115     region_kind = "global";
    116     auto &g = global->globals[0];
    117     internal_strlcpy(name, g.name, name_size);
    118     region_address = g.beg;
    119     region_size = g.size;
    120   } else {
    121     // region_{address,size} are already 0
    122     region_kind = "heap-invalid";
    123   }
    124 
    125   CHECK(region_kind);
    126   if (region_address_ptr) *region_address_ptr = region_address;
    127   if (region_size_ptr) *region_size_ptr = region_size;
    128   return region_kind;
    129 }
    130 
    131 SANITIZER_INTERFACE_ATTRIBUTE
    132 uptr __asan_get_alloc_stack(uptr addr, uptr *trace, uptr size, u32 *thread_id) {
    133   return AsanGetStack(addr, trace, size, thread_id, /* alloc_stack */ true);
    134 }
    135 
    136 SANITIZER_INTERFACE_ATTRIBUTE
    137 uptr __asan_get_free_stack(uptr addr, uptr *trace, uptr size, u32 *thread_id) {
    138   return AsanGetStack(addr, trace, size, thread_id, /* alloc_stack */ false);
    139 }
    140 
    141 SANITIZER_INTERFACE_ATTRIBUTE
    142 void __asan_get_shadow_mapping(uptr *shadow_scale, uptr *shadow_offset) {
    143   if (shadow_scale)
    144     *shadow_scale = SHADOW_SCALE;
    145   if (shadow_offset)
    146     *shadow_offset = SHADOW_OFFSET;
    147 }
    148