Home | History | Annotate | Line # | Download | only in asan
      1  1.1  kamil //===-- asan_debugging.cc -------------------------------------------------===//
      2  1.1  kamil //
      3  1.1  kamil //                     The LLVM Compiler Infrastructure
      4  1.1  kamil //
      5  1.1  kamil // This file is distributed under the University of Illinois Open Source
      6  1.1  kamil // License. See LICENSE.TXT for details.
      7  1.1  kamil //
      8  1.1  kamil //===----------------------------------------------------------------------===//
      9  1.1  kamil //
     10  1.1  kamil // This file is a part of AddressSanitizer, an address sanity checker.
     11  1.1  kamil //
     12  1.1  kamil // This file contains various functions that are generally useful to call when
     13  1.1  kamil // using a debugger (LLDB, GDB).
     14  1.1  kamil //===----------------------------------------------------------------------===//
     15  1.1  kamil 
     16  1.1  kamil #include "asan_allocator.h"
     17  1.1  kamil #include "asan_descriptions.h"
     18  1.1  kamil #include "asan_flags.h"
     19  1.1  kamil #include "asan_internal.h"
     20  1.1  kamil #include "asan_mapping.h"
     21  1.1  kamil #include "asan_report.h"
     22  1.1  kamil #include "asan_thread.h"
     23  1.1  kamil 
     24  1.1  kamil namespace {
     25  1.1  kamil using namespace __asan;
     26  1.1  kamil 
     27  1.1  kamil static void FindInfoForStackVar(uptr addr, const char *frame_descr, uptr offset,
     28  1.1  kamil                                 char *name, uptr name_size,
     29  1.1  kamil                                 uptr &region_address, uptr &region_size) {
     30  1.1  kamil   InternalMmapVector<StackVarDescr> vars;
     31  1.1  kamil   vars.reserve(16);
     32  1.1  kamil   if (!ParseFrameDescription(frame_descr, &vars)) {
     33  1.1  kamil     return;
     34  1.1  kamil   }
     35  1.1  kamil 
     36  1.1  kamil   for (uptr i = 0; i < vars.size(); i++) {
     37  1.1  kamil     if (offset <= vars[i].beg + vars[i].size) {
     38  1.1  kamil       // We use name_len + 1 because strlcpy will guarantee a \0 at the end, so
     39  1.1  kamil       // if we're limiting the copy due to name_len, we add 1 to ensure we copy
     40  1.1  kamil       // the whole name and then terminate with '\0'.
     41  1.1  kamil       internal_strlcpy(name, vars[i].name_pos,
     42  1.1  kamil                        Min(name_size, vars[i].name_len + 1));
     43  1.1  kamil       region_address = addr - (offset - vars[i].beg);
     44  1.1  kamil       region_size = vars[i].size;
     45  1.1  kamil       return;
     46  1.1  kamil     }
     47  1.1  kamil   }
     48  1.1  kamil }
     49  1.1  kamil 
     50  1.1  kamil uptr AsanGetStack(uptr addr, uptr *trace, u32 size, u32 *thread_id,
     51  1.1  kamil                          bool alloc_stack) {
     52  1.1  kamil   AsanChunkView chunk = FindHeapChunkByAddress(addr);
     53  1.1  kamil   if (!chunk.IsValid()) return 0;
     54  1.1  kamil 
     55  1.1  kamil   StackTrace stack(nullptr, 0);
     56  1.1  kamil   if (alloc_stack) {
     57  1.1  kamil     if (chunk.AllocTid() == kInvalidTid) return 0;
     58  1.1  kamil     stack = chunk.GetAllocStack();
     59  1.1  kamil     if (thread_id) *thread_id = chunk.AllocTid();
     60  1.1  kamil   } else {
     61  1.1  kamil     if (chunk.FreeTid() == kInvalidTid) return 0;
     62  1.1  kamil     stack = chunk.GetFreeStack();
     63  1.1  kamil     if (thread_id) *thread_id = chunk.FreeTid();
     64  1.1  kamil   }
     65  1.1  kamil 
     66  1.1  kamil   if (trace && size) {
     67  1.1  kamil     size = Min(size, Min(stack.size, kStackTraceMax));
     68  1.1  kamil     for (uptr i = 0; i < size; i++)
     69  1.1  kamil       trace[i] = StackTrace::GetPreviousInstructionPc(stack.trace[i]);
     70  1.1  kamil 
     71  1.1  kamil     return size;
     72  1.1  kamil   }
     73  1.1  kamil 
     74  1.1  kamil   return 0;
     75  1.1  kamil }
     76  1.1  kamil 
     77  1.1  kamil }  // namespace
     78  1.1  kamil 
     79  1.1  kamil SANITIZER_INTERFACE_ATTRIBUTE
     80  1.1  kamil const char *__asan_locate_address(uptr addr, char *name, uptr name_size,
     81  1.1  kamil                                   uptr *region_address_ptr,
     82  1.1  kamil                                   uptr *region_size_ptr) {
     83  1.1  kamil   AddressDescription descr(addr);
     84  1.1  kamil   uptr region_address = 0;
     85  1.1  kamil   uptr region_size = 0;
     86  1.1  kamil   const char *region_kind = nullptr;
     87  1.1  kamil   if (name && name_size > 0) name[0] = 0;
     88  1.1  kamil 
     89  1.1  kamil   if (auto shadow = descr.AsShadow()) {
     90  1.1  kamil     // region_{address,size} are already 0
     91  1.1  kamil     switch (shadow->kind) {
     92  1.1  kamil       case kShadowKindLow:
     93  1.1  kamil         region_kind = "low shadow";
     94  1.1  kamil         break;
     95  1.1  kamil       case kShadowKindGap:
     96  1.1  kamil         region_kind = "shadow gap";
     97  1.1  kamil         break;
     98  1.1  kamil       case kShadowKindHigh:
     99  1.1  kamil         region_kind = "high shadow";
    100  1.1  kamil         break;
    101  1.1  kamil     }
    102  1.1  kamil   } else if (auto heap = descr.AsHeap()) {
    103  1.1  kamil     region_kind = "heap";
    104  1.1  kamil     region_address = heap->chunk_access.chunk_begin;
    105  1.1  kamil     region_size = heap->chunk_access.chunk_size;
    106  1.1  kamil   } else if (auto stack = descr.AsStack()) {
    107  1.1  kamil     region_kind = "stack";
    108  1.1  kamil     if (!stack->frame_descr) {
    109  1.1  kamil       // region_{address,size} are already 0
    110  1.1  kamil     } else {
    111  1.1  kamil       FindInfoForStackVar(addr, stack->frame_descr, stack->offset, name,
    112  1.1  kamil                           name_size, region_address, region_size);
    113  1.1  kamil     }
    114  1.1  kamil   } else if (auto global = descr.AsGlobal()) {
    115  1.1  kamil     region_kind = "global";
    116  1.1  kamil     auto &g = global->globals[0];
    117  1.1  kamil     internal_strlcpy(name, g.name, name_size);
    118  1.1  kamil     region_address = g.beg;
    119  1.1  kamil     region_size = g.size;
    120  1.1  kamil   } else {
    121  1.1  kamil     // region_{address,size} are already 0
    122  1.1  kamil     region_kind = "heap-invalid";
    123  1.1  kamil   }
    124  1.1  kamil 
    125  1.1  kamil   CHECK(region_kind);
    126  1.1  kamil   if (region_address_ptr) *region_address_ptr = region_address;
    127  1.1  kamil   if (region_size_ptr) *region_size_ptr = region_size;
    128  1.1  kamil   return region_kind;
    129  1.1  kamil }
    130  1.1  kamil 
    131  1.1  kamil SANITIZER_INTERFACE_ATTRIBUTE
    132  1.1  kamil uptr __asan_get_alloc_stack(uptr addr, uptr *trace, uptr size, u32 *thread_id) {
    133  1.1  kamil   return AsanGetStack(addr, trace, size, thread_id, /* alloc_stack */ true);
    134  1.1  kamil }
    135  1.1  kamil 
    136  1.1  kamil SANITIZER_INTERFACE_ATTRIBUTE
    137  1.1  kamil uptr __asan_get_free_stack(uptr addr, uptr *trace, uptr size, u32 *thread_id) {
    138  1.1  kamil   return AsanGetStack(addr, trace, size, thread_id, /* alloc_stack */ false);
    139  1.1  kamil }
    140  1.1  kamil 
    141  1.1  kamil SANITIZER_INTERFACE_ATTRIBUTE
    142  1.1  kamil void __asan_get_shadow_mapping(uptr *shadow_scale, uptr *shadow_offset) {
    143  1.1  kamil   if (shadow_scale)
    144  1.1  kamil     *shadow_scale = SHADOW_SCALE;
    145  1.1  kamil   if (shadow_offset)
    146  1.1  kamil     *shadow_offset = SHADOW_OFFSET;
    147  1.1  kamil }
    148