1*ff6d591cSmrg //===-- asan_debugging.cpp ------------------------------------------------===//
2*ff6d591cSmrg //
3*ff6d591cSmrg // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4*ff6d591cSmrg // See https://llvm.org/LICENSE.txt for license information.
5*ff6d591cSmrg // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6*ff6d591cSmrg //
7*ff6d591cSmrg //===----------------------------------------------------------------------===//
8*ff6d591cSmrg //
9*ff6d591cSmrg // This file is a part of AddressSanitizer, an address sanity checker.
10*ff6d591cSmrg //
11*ff6d591cSmrg // This file contains various functions that are generally useful to call when
12*ff6d591cSmrg // using a debugger (LLDB, GDB).
13*ff6d591cSmrg //===----------------------------------------------------------------------===//
14*ff6d591cSmrg
15*ff6d591cSmrg #include "asan_allocator.h"
16*ff6d591cSmrg #include "asan_descriptions.h"
17*ff6d591cSmrg #include "asan_flags.h"
18*ff6d591cSmrg #include "asan_internal.h"
19*ff6d591cSmrg #include "asan_mapping.h"
20*ff6d591cSmrg #include "asan_report.h"
21*ff6d591cSmrg #include "asan_thread.h"
22*ff6d591cSmrg #include "sanitizer_common/sanitizer_stackdepot.h"
23*ff6d591cSmrg
24*ff6d591cSmrg namespace {
25*ff6d591cSmrg using namespace __asan;
26*ff6d591cSmrg
FindInfoForStackVar(uptr addr,const char * frame_descr,uptr offset,char * name,uptr name_size,uptr * region_address,uptr * region_size)27*ff6d591cSmrg static void FindInfoForStackVar(uptr addr, const char *frame_descr, uptr offset,
28*ff6d591cSmrg char *name, uptr name_size,
29*ff6d591cSmrg uptr *region_address, uptr *region_size) {
30*ff6d591cSmrg InternalMmapVector<StackVarDescr> vars;
31*ff6d591cSmrg vars.reserve(16);
32*ff6d591cSmrg if (!ParseFrameDescription(frame_descr, &vars)) {
33*ff6d591cSmrg return;
34*ff6d591cSmrg }
35*ff6d591cSmrg
36*ff6d591cSmrg for (uptr i = 0; i < vars.size(); i++) {
37*ff6d591cSmrg if (offset <= vars[i].beg + vars[i].size) {
38*ff6d591cSmrg // We use name_len + 1 because strlcpy will guarantee a \0 at the end, so
39*ff6d591cSmrg // if we're limiting the copy due to name_len, we add 1 to ensure we copy
40*ff6d591cSmrg // the whole name and then terminate with '\0'.
41*ff6d591cSmrg internal_strlcpy(name, vars[i].name_pos,
42*ff6d591cSmrg Min(name_size, vars[i].name_len + 1));
43*ff6d591cSmrg *region_address = addr - (offset - vars[i].beg);
44*ff6d591cSmrg *region_size = vars[i].size;
45*ff6d591cSmrg return;
46*ff6d591cSmrg }
47*ff6d591cSmrg }
48*ff6d591cSmrg }
49*ff6d591cSmrg
AsanGetStack(uptr addr,uptr * trace,u32 size,u32 * thread_id,bool alloc_stack)50*ff6d591cSmrg uptr AsanGetStack(uptr addr, uptr *trace, u32 size, u32 *thread_id,
51*ff6d591cSmrg bool alloc_stack) {
52*ff6d591cSmrg AsanChunkView chunk = FindHeapChunkByAddress(addr);
53*ff6d591cSmrg if (!chunk.IsValid()) return 0;
54*ff6d591cSmrg
55*ff6d591cSmrg StackTrace stack(nullptr, 0);
56*ff6d591cSmrg if (alloc_stack) {
57*ff6d591cSmrg if (chunk.AllocTid() == kInvalidTid) return 0;
58*ff6d591cSmrg stack = StackDepotGet(chunk.GetAllocStackId());
59*ff6d591cSmrg if (thread_id) *thread_id = chunk.AllocTid();
60*ff6d591cSmrg } else {
61*ff6d591cSmrg if (chunk.FreeTid() == kInvalidTid) return 0;
62*ff6d591cSmrg stack = StackDepotGet(chunk.GetFreeStackId());
63*ff6d591cSmrg if (thread_id) *thread_id = chunk.FreeTid();
64*ff6d591cSmrg }
65*ff6d591cSmrg
66*ff6d591cSmrg if (trace && size) {
67*ff6d591cSmrg size = Min(size, Min(stack.size, kStackTraceMax));
68*ff6d591cSmrg for (uptr i = 0; i < size; i++)
69*ff6d591cSmrg trace[i] = StackTrace::GetPreviousInstructionPc(stack.trace[i]);
70*ff6d591cSmrg
71*ff6d591cSmrg return size;
72*ff6d591cSmrg }
73*ff6d591cSmrg
74*ff6d591cSmrg return 0;
75*ff6d591cSmrg }
76*ff6d591cSmrg
77*ff6d591cSmrg } // namespace
78*ff6d591cSmrg
79*ff6d591cSmrg SANITIZER_INTERFACE_ATTRIBUTE
__asan_locate_address(uptr addr,char * name,uptr name_size,uptr * region_address_ptr,uptr * region_size_ptr)80*ff6d591cSmrg const char *__asan_locate_address(uptr addr, char *name, uptr name_size,
81*ff6d591cSmrg uptr *region_address_ptr,
82*ff6d591cSmrg uptr *region_size_ptr) {
83*ff6d591cSmrg AddressDescription descr(addr);
84*ff6d591cSmrg uptr region_address = 0;
85*ff6d591cSmrg uptr region_size = 0;
86*ff6d591cSmrg const char *region_kind = nullptr;
87*ff6d591cSmrg if (name && name_size > 0) name[0] = 0;
88*ff6d591cSmrg
89*ff6d591cSmrg if (auto shadow = descr.AsShadow()) {
90*ff6d591cSmrg // region_{address,size} are already 0
91*ff6d591cSmrg switch (shadow->kind) {
92*ff6d591cSmrg case kShadowKindLow:
93*ff6d591cSmrg region_kind = "low shadow";
94*ff6d591cSmrg break;
95*ff6d591cSmrg case kShadowKindGap:
96*ff6d591cSmrg region_kind = "shadow gap";
97*ff6d591cSmrg break;
98*ff6d591cSmrg case kShadowKindHigh:
99*ff6d591cSmrg region_kind = "high shadow";
100*ff6d591cSmrg break;
101*ff6d591cSmrg }
102*ff6d591cSmrg } else if (auto heap = descr.AsHeap()) {
103*ff6d591cSmrg region_kind = "heap";
104*ff6d591cSmrg region_address = heap->chunk_access.chunk_begin;
105*ff6d591cSmrg region_size = heap->chunk_access.chunk_size;
106*ff6d591cSmrg } else if (auto stack = descr.AsStack()) {
107*ff6d591cSmrg region_kind = "stack";
108*ff6d591cSmrg if (!stack->frame_descr) {
109*ff6d591cSmrg // region_{address,size} are already 0
110*ff6d591cSmrg } else {
111*ff6d591cSmrg FindInfoForStackVar(addr, stack->frame_descr, stack->offset, name,
112*ff6d591cSmrg name_size, ®ion_address, ®ion_size);
113*ff6d591cSmrg }
114*ff6d591cSmrg } else if (auto global = descr.AsGlobal()) {
115*ff6d591cSmrg region_kind = "global";
116*ff6d591cSmrg auto &g = global->globals[0];
117*ff6d591cSmrg internal_strlcpy(name, g.name, name_size);
118*ff6d591cSmrg region_address = g.beg;
119*ff6d591cSmrg region_size = g.size;
120*ff6d591cSmrg } else {
121*ff6d591cSmrg // region_{address,size} are already 0
122*ff6d591cSmrg region_kind = "heap-invalid";
123*ff6d591cSmrg }
124*ff6d591cSmrg
125*ff6d591cSmrg CHECK(region_kind);
126*ff6d591cSmrg if (region_address_ptr) *region_address_ptr = region_address;
127*ff6d591cSmrg if (region_size_ptr) *region_size_ptr = region_size;
128*ff6d591cSmrg return region_kind;
129*ff6d591cSmrg }
130*ff6d591cSmrg
131*ff6d591cSmrg SANITIZER_INTERFACE_ATTRIBUTE
__asan_get_alloc_stack(uptr addr,uptr * trace,uptr size,u32 * thread_id)132*ff6d591cSmrg uptr __asan_get_alloc_stack(uptr addr, uptr *trace, uptr size, u32 *thread_id) {
133*ff6d591cSmrg return AsanGetStack(addr, trace, size, thread_id, /* alloc_stack */ true);
134*ff6d591cSmrg }
135*ff6d591cSmrg
136*ff6d591cSmrg SANITIZER_INTERFACE_ATTRIBUTE
__asan_get_free_stack(uptr addr,uptr * trace,uptr size,u32 * thread_id)137*ff6d591cSmrg uptr __asan_get_free_stack(uptr addr, uptr *trace, uptr size, u32 *thread_id) {
138*ff6d591cSmrg return AsanGetStack(addr, trace, size, thread_id, /* alloc_stack */ false);
139*ff6d591cSmrg }
140*ff6d591cSmrg
141*ff6d591cSmrg SANITIZER_INTERFACE_ATTRIBUTE
__asan_get_shadow_mapping(uptr * shadow_scale,uptr * shadow_offset)142*ff6d591cSmrg void __asan_get_shadow_mapping(uptr *shadow_scale, uptr *shadow_offset) {
143*ff6d591cSmrg if (shadow_scale)
144*ff6d591cSmrg *shadow_scale = SHADOW_SCALE;
145*ff6d591cSmrg if (shadow_offset)
146*ff6d591cSmrg *shadow_offset = SHADOW_OFFSET;
147*ff6d591cSmrg }
148