xref: /openbsd-src/gnu/llvm/compiler-rt/lib/asan/asan_debugging.cpp (revision 810390e339a5425391477d5d41c78d7cab2424ac)
13cab2bb3Spatrick //===-- asan_debugging.cpp ------------------------------------------------===//
23cab2bb3Spatrick //
33cab2bb3Spatrick // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
43cab2bb3Spatrick // See https://llvm.org/LICENSE.txt for license information.
53cab2bb3Spatrick // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
63cab2bb3Spatrick //
73cab2bb3Spatrick //===----------------------------------------------------------------------===//
83cab2bb3Spatrick //
93cab2bb3Spatrick // This file is a part of AddressSanitizer, an address sanity checker.
103cab2bb3Spatrick //
113cab2bb3Spatrick // This file contains various functions that are generally useful to call when
123cab2bb3Spatrick // using a debugger (LLDB, GDB).
133cab2bb3Spatrick //===----------------------------------------------------------------------===//
143cab2bb3Spatrick 
153cab2bb3Spatrick #include "asan_allocator.h"
163cab2bb3Spatrick #include "asan_descriptions.h"
173cab2bb3Spatrick #include "asan_flags.h"
183cab2bb3Spatrick #include "asan_internal.h"
193cab2bb3Spatrick #include "asan_mapping.h"
203cab2bb3Spatrick #include "asan_report.h"
213cab2bb3Spatrick #include "asan_thread.h"
22*810390e3Srobert #include "sanitizer_common/sanitizer_stackdepot.h"
233cab2bb3Spatrick 
243cab2bb3Spatrick namespace {
253cab2bb3Spatrick using namespace __asan;
263cab2bb3Spatrick 
FindInfoForStackVar(uptr addr,const char * frame_descr,uptr offset,char * name,uptr name_size,uptr * region_address,uptr * region_size)273cab2bb3Spatrick static void FindInfoForStackVar(uptr addr, const char *frame_descr, uptr offset,
283cab2bb3Spatrick                                 char *name, uptr name_size,
293cab2bb3Spatrick                                 uptr *region_address, uptr *region_size) {
303cab2bb3Spatrick   InternalMmapVector<StackVarDescr> vars;
313cab2bb3Spatrick   vars.reserve(16);
323cab2bb3Spatrick   if (!ParseFrameDescription(frame_descr, &vars)) {
333cab2bb3Spatrick     return;
343cab2bb3Spatrick   }
353cab2bb3Spatrick 
363cab2bb3Spatrick   for (uptr i = 0; i < vars.size(); i++) {
373cab2bb3Spatrick     if (offset <= vars[i].beg + vars[i].size) {
383cab2bb3Spatrick       // We use name_len + 1 because strlcpy will guarantee a \0 at the end, so
393cab2bb3Spatrick       // if we're limiting the copy due to name_len, we add 1 to ensure we copy
403cab2bb3Spatrick       // the whole name and then terminate with '\0'.
413cab2bb3Spatrick       internal_strlcpy(name, vars[i].name_pos,
423cab2bb3Spatrick                        Min(name_size, vars[i].name_len + 1));
433cab2bb3Spatrick       *region_address = addr - (offset - vars[i].beg);
443cab2bb3Spatrick       *region_size = vars[i].size;
453cab2bb3Spatrick       return;
463cab2bb3Spatrick     }
473cab2bb3Spatrick   }
483cab2bb3Spatrick }
493cab2bb3Spatrick 
AsanGetStack(uptr addr,uptr * trace,u32 size,u32 * thread_id,bool alloc_stack)503cab2bb3Spatrick uptr AsanGetStack(uptr addr, uptr *trace, u32 size, u32 *thread_id,
513cab2bb3Spatrick                          bool alloc_stack) {
523cab2bb3Spatrick   AsanChunkView chunk = FindHeapChunkByAddress(addr);
533cab2bb3Spatrick   if (!chunk.IsValid()) return 0;
543cab2bb3Spatrick 
553cab2bb3Spatrick   StackTrace stack(nullptr, 0);
563cab2bb3Spatrick   if (alloc_stack) {
573cab2bb3Spatrick     if (chunk.AllocTid() == kInvalidTid) return 0;
58*810390e3Srobert     stack = StackDepotGet(chunk.GetAllocStackId());
593cab2bb3Spatrick     if (thread_id) *thread_id = chunk.AllocTid();
603cab2bb3Spatrick   } else {
613cab2bb3Spatrick     if (chunk.FreeTid() == kInvalidTid) return 0;
62*810390e3Srobert     stack = StackDepotGet(chunk.GetFreeStackId());
633cab2bb3Spatrick     if (thread_id) *thread_id = chunk.FreeTid();
643cab2bb3Spatrick   }
653cab2bb3Spatrick 
663cab2bb3Spatrick   if (trace && size) {
673cab2bb3Spatrick     size = Min(size, Min(stack.size, kStackTraceMax));
683cab2bb3Spatrick     for (uptr i = 0; i < size; i++)
693cab2bb3Spatrick       trace[i] = StackTrace::GetPreviousInstructionPc(stack.trace[i]);
703cab2bb3Spatrick 
713cab2bb3Spatrick     return size;
723cab2bb3Spatrick   }
733cab2bb3Spatrick 
743cab2bb3Spatrick   return 0;
753cab2bb3Spatrick }
763cab2bb3Spatrick 
773cab2bb3Spatrick }  // namespace
783cab2bb3Spatrick 
793cab2bb3Spatrick SANITIZER_INTERFACE_ATTRIBUTE
__asan_locate_address(uptr addr,char * name,uptr name_size,uptr * region_address_ptr,uptr * region_size_ptr)803cab2bb3Spatrick const char *__asan_locate_address(uptr addr, char *name, uptr name_size,
813cab2bb3Spatrick                                   uptr *region_address_ptr,
823cab2bb3Spatrick                                   uptr *region_size_ptr) {
833cab2bb3Spatrick   AddressDescription descr(addr);
843cab2bb3Spatrick   uptr region_address = 0;
853cab2bb3Spatrick   uptr region_size = 0;
863cab2bb3Spatrick   const char *region_kind = nullptr;
873cab2bb3Spatrick   if (name && name_size > 0) name[0] = 0;
883cab2bb3Spatrick 
893cab2bb3Spatrick   if (auto shadow = descr.AsShadow()) {
903cab2bb3Spatrick     // region_{address,size} are already 0
913cab2bb3Spatrick     switch (shadow->kind) {
923cab2bb3Spatrick       case kShadowKindLow:
933cab2bb3Spatrick         region_kind = "low shadow";
943cab2bb3Spatrick         break;
953cab2bb3Spatrick       case kShadowKindGap:
963cab2bb3Spatrick         region_kind = "shadow gap";
973cab2bb3Spatrick         break;
983cab2bb3Spatrick       case kShadowKindHigh:
993cab2bb3Spatrick         region_kind = "high shadow";
1003cab2bb3Spatrick         break;
1013cab2bb3Spatrick     }
1023cab2bb3Spatrick   } else if (auto heap = descr.AsHeap()) {
1033cab2bb3Spatrick     region_kind = "heap";
1043cab2bb3Spatrick     region_address = heap->chunk_access.chunk_begin;
1053cab2bb3Spatrick     region_size = heap->chunk_access.chunk_size;
1063cab2bb3Spatrick   } else if (auto stack = descr.AsStack()) {
1073cab2bb3Spatrick     region_kind = "stack";
1083cab2bb3Spatrick     if (!stack->frame_descr) {
1093cab2bb3Spatrick       // region_{address,size} are already 0
1103cab2bb3Spatrick     } else {
1113cab2bb3Spatrick       FindInfoForStackVar(addr, stack->frame_descr, stack->offset, name,
1123cab2bb3Spatrick                           name_size, &region_address, &region_size);
1133cab2bb3Spatrick     }
1143cab2bb3Spatrick   } else if (auto global = descr.AsGlobal()) {
1153cab2bb3Spatrick     region_kind = "global";
1163cab2bb3Spatrick     auto &g = global->globals[0];
1173cab2bb3Spatrick     internal_strlcpy(name, g.name, name_size);
1183cab2bb3Spatrick     region_address = g.beg;
1193cab2bb3Spatrick     region_size = g.size;
1203cab2bb3Spatrick   } else {
1213cab2bb3Spatrick     // region_{address,size} are already 0
1223cab2bb3Spatrick     region_kind = "heap-invalid";
1233cab2bb3Spatrick   }
1243cab2bb3Spatrick 
1253cab2bb3Spatrick   CHECK(region_kind);
1263cab2bb3Spatrick   if (region_address_ptr) *region_address_ptr = region_address;
1273cab2bb3Spatrick   if (region_size_ptr) *region_size_ptr = region_size;
1283cab2bb3Spatrick   return region_kind;
1293cab2bb3Spatrick }
1303cab2bb3Spatrick 
1313cab2bb3Spatrick SANITIZER_INTERFACE_ATTRIBUTE
__asan_get_alloc_stack(uptr addr,uptr * trace,uptr size,u32 * thread_id)1323cab2bb3Spatrick uptr __asan_get_alloc_stack(uptr addr, uptr *trace, uptr size, u32 *thread_id) {
1333cab2bb3Spatrick   return AsanGetStack(addr, trace, size, thread_id, /* alloc_stack */ true);
1343cab2bb3Spatrick }
1353cab2bb3Spatrick 
1363cab2bb3Spatrick SANITIZER_INTERFACE_ATTRIBUTE
__asan_get_free_stack(uptr addr,uptr * trace,uptr size,u32 * thread_id)1373cab2bb3Spatrick uptr __asan_get_free_stack(uptr addr, uptr *trace, uptr size, u32 *thread_id) {
1383cab2bb3Spatrick   return AsanGetStack(addr, trace, size, thread_id, /* alloc_stack */ false);
1393cab2bb3Spatrick }
1403cab2bb3Spatrick 
1413cab2bb3Spatrick SANITIZER_INTERFACE_ATTRIBUTE
__asan_get_shadow_mapping(uptr * shadow_scale,uptr * shadow_offset)1423cab2bb3Spatrick void __asan_get_shadow_mapping(uptr *shadow_scale, uptr *shadow_offset) {
1433cab2bb3Spatrick   if (shadow_scale)
144*810390e3Srobert     *shadow_scale = ASAN_SHADOW_SCALE;
1453cab2bb3Spatrick   if (shadow_offset)
146*810390e3Srobert     *shadow_offset = ASAN_SHADOW_OFFSET;
1473cab2bb3Spatrick }
148