xref: /netbsd-src/sys/external/bsd/compiler_rt/dist/lib/asan/asan_debugging.cc (revision a7c257b03e4462df2b1020128fb82716512d7856)
1*a7c257b0Skamil //===-- asan_debugging.cc -------------------------------------------------===//
2*a7c257b0Skamil //
3*a7c257b0Skamil //                     The LLVM Compiler Infrastructure
4*a7c257b0Skamil //
5*a7c257b0Skamil // This file is distributed under the University of Illinois Open Source
6*a7c257b0Skamil // License. See LICENSE.TXT for details.
7*a7c257b0Skamil //
8*a7c257b0Skamil //===----------------------------------------------------------------------===//
9*a7c257b0Skamil //
10*a7c257b0Skamil // This file is a part of AddressSanitizer, an address sanity checker.
11*a7c257b0Skamil //
12*a7c257b0Skamil // This file contains various functions that are generally useful to call when
13*a7c257b0Skamil // using a debugger (LLDB, GDB).
14*a7c257b0Skamil //===----------------------------------------------------------------------===//
15*a7c257b0Skamil 
16*a7c257b0Skamil #include "asan_allocator.h"
17*a7c257b0Skamil #include "asan_descriptions.h"
18*a7c257b0Skamil #include "asan_flags.h"
19*a7c257b0Skamil #include "asan_internal.h"
20*a7c257b0Skamil #include "asan_mapping.h"
21*a7c257b0Skamil #include "asan_report.h"
22*a7c257b0Skamil #include "asan_thread.h"
23*a7c257b0Skamil 
24*a7c257b0Skamil namespace {
25*a7c257b0Skamil using namespace __asan;
26*a7c257b0Skamil 
FindInfoForStackVar(uptr addr,const char * frame_descr,uptr offset,char * name,uptr name_size,uptr & region_address,uptr & region_size)27*a7c257b0Skamil static void FindInfoForStackVar(uptr addr, const char *frame_descr, uptr offset,
28*a7c257b0Skamil                                 char *name, uptr name_size,
29*a7c257b0Skamil                                 uptr &region_address, uptr &region_size) {
30*a7c257b0Skamil   InternalMmapVector<StackVarDescr> vars;
31*a7c257b0Skamil   vars.reserve(16);
32*a7c257b0Skamil   if (!ParseFrameDescription(frame_descr, &vars)) {
33*a7c257b0Skamil     return;
34*a7c257b0Skamil   }
35*a7c257b0Skamil 
36*a7c257b0Skamil   for (uptr i = 0; i < vars.size(); i++) {
37*a7c257b0Skamil     if (offset <= vars[i].beg + vars[i].size) {
38*a7c257b0Skamil       // We use name_len + 1 because strlcpy will guarantee a \0 at the end, so
39*a7c257b0Skamil       // if we're limiting the copy due to name_len, we add 1 to ensure we copy
40*a7c257b0Skamil       // the whole name and then terminate with '\0'.
41*a7c257b0Skamil       internal_strlcpy(name, vars[i].name_pos,
42*a7c257b0Skamil                        Min(name_size, vars[i].name_len + 1));
43*a7c257b0Skamil       region_address = addr - (offset - vars[i].beg);
44*a7c257b0Skamil       region_size = vars[i].size;
45*a7c257b0Skamil       return;
46*a7c257b0Skamil     }
47*a7c257b0Skamil   }
48*a7c257b0Skamil }
49*a7c257b0Skamil 
AsanGetStack(uptr addr,uptr * trace,u32 size,u32 * thread_id,bool alloc_stack)50*a7c257b0Skamil uptr AsanGetStack(uptr addr, uptr *trace, u32 size, u32 *thread_id,
51*a7c257b0Skamil                          bool alloc_stack) {
52*a7c257b0Skamil   AsanChunkView chunk = FindHeapChunkByAddress(addr);
53*a7c257b0Skamil   if (!chunk.IsValid()) return 0;
54*a7c257b0Skamil 
55*a7c257b0Skamil   StackTrace stack(nullptr, 0);
56*a7c257b0Skamil   if (alloc_stack) {
57*a7c257b0Skamil     if (chunk.AllocTid() == kInvalidTid) return 0;
58*a7c257b0Skamil     stack = chunk.GetAllocStack();
59*a7c257b0Skamil     if (thread_id) *thread_id = chunk.AllocTid();
60*a7c257b0Skamil   } else {
61*a7c257b0Skamil     if (chunk.FreeTid() == kInvalidTid) return 0;
62*a7c257b0Skamil     stack = chunk.GetFreeStack();
63*a7c257b0Skamil     if (thread_id) *thread_id = chunk.FreeTid();
64*a7c257b0Skamil   }
65*a7c257b0Skamil 
66*a7c257b0Skamil   if (trace && size) {
67*a7c257b0Skamil     size = Min(size, Min(stack.size, kStackTraceMax));
68*a7c257b0Skamil     for (uptr i = 0; i < size; i++)
69*a7c257b0Skamil       trace[i] = StackTrace::GetPreviousInstructionPc(stack.trace[i]);
70*a7c257b0Skamil 
71*a7c257b0Skamil     return size;
72*a7c257b0Skamil   }
73*a7c257b0Skamil 
74*a7c257b0Skamil   return 0;
75*a7c257b0Skamil }
76*a7c257b0Skamil 
77*a7c257b0Skamil }  // namespace
78*a7c257b0Skamil 
79*a7c257b0Skamil SANITIZER_INTERFACE_ATTRIBUTE
__asan_locate_address(uptr addr,char * name,uptr name_size,uptr * region_address_ptr,uptr * region_size_ptr)80*a7c257b0Skamil const char *__asan_locate_address(uptr addr, char *name, uptr name_size,
81*a7c257b0Skamil                                   uptr *region_address_ptr,
82*a7c257b0Skamil                                   uptr *region_size_ptr) {
83*a7c257b0Skamil   AddressDescription descr(addr);
84*a7c257b0Skamil   uptr region_address = 0;
85*a7c257b0Skamil   uptr region_size = 0;
86*a7c257b0Skamil   const char *region_kind = nullptr;
87*a7c257b0Skamil   if (name && name_size > 0) name[0] = 0;
88*a7c257b0Skamil 
89*a7c257b0Skamil   if (auto shadow = descr.AsShadow()) {
90*a7c257b0Skamil     // region_{address,size} are already 0
91*a7c257b0Skamil     switch (shadow->kind) {
92*a7c257b0Skamil       case kShadowKindLow:
93*a7c257b0Skamil         region_kind = "low shadow";
94*a7c257b0Skamil         break;
95*a7c257b0Skamil       case kShadowKindGap:
96*a7c257b0Skamil         region_kind = "shadow gap";
97*a7c257b0Skamil         break;
98*a7c257b0Skamil       case kShadowKindHigh:
99*a7c257b0Skamil         region_kind = "high shadow";
100*a7c257b0Skamil         break;
101*a7c257b0Skamil     }
102*a7c257b0Skamil   } else if (auto heap = descr.AsHeap()) {
103*a7c257b0Skamil     region_kind = "heap";
104*a7c257b0Skamil     region_address = heap->chunk_access.chunk_begin;
105*a7c257b0Skamil     region_size = heap->chunk_access.chunk_size;
106*a7c257b0Skamil   } else if (auto stack = descr.AsStack()) {
107*a7c257b0Skamil     region_kind = "stack";
108*a7c257b0Skamil     if (!stack->frame_descr) {
109*a7c257b0Skamil       // region_{address,size} are already 0
110*a7c257b0Skamil     } else {
111*a7c257b0Skamil       FindInfoForStackVar(addr, stack->frame_descr, stack->offset, name,
112*a7c257b0Skamil                           name_size, region_address, region_size);
113*a7c257b0Skamil     }
114*a7c257b0Skamil   } else if (auto global = descr.AsGlobal()) {
115*a7c257b0Skamil     region_kind = "global";
116*a7c257b0Skamil     auto &g = global->globals[0];
117*a7c257b0Skamil     internal_strlcpy(name, g.name, name_size);
118*a7c257b0Skamil     region_address = g.beg;
119*a7c257b0Skamil     region_size = g.size;
120*a7c257b0Skamil   } else {
121*a7c257b0Skamil     // region_{address,size} are already 0
122*a7c257b0Skamil     region_kind = "heap-invalid";
123*a7c257b0Skamil   }
124*a7c257b0Skamil 
125*a7c257b0Skamil   CHECK(region_kind);
126*a7c257b0Skamil   if (region_address_ptr) *region_address_ptr = region_address;
127*a7c257b0Skamil   if (region_size_ptr) *region_size_ptr = region_size;
128*a7c257b0Skamil   return region_kind;
129*a7c257b0Skamil }
130*a7c257b0Skamil 
131*a7c257b0Skamil SANITIZER_INTERFACE_ATTRIBUTE
__asan_get_alloc_stack(uptr addr,uptr * trace,uptr size,u32 * thread_id)132*a7c257b0Skamil uptr __asan_get_alloc_stack(uptr addr, uptr *trace, uptr size, u32 *thread_id) {
133*a7c257b0Skamil   return AsanGetStack(addr, trace, size, thread_id, /* alloc_stack */ true);
134*a7c257b0Skamil }
135*a7c257b0Skamil 
136*a7c257b0Skamil SANITIZER_INTERFACE_ATTRIBUTE
__asan_get_free_stack(uptr addr,uptr * trace,uptr size,u32 * thread_id)137*a7c257b0Skamil uptr __asan_get_free_stack(uptr addr, uptr *trace, uptr size, u32 *thread_id) {
138*a7c257b0Skamil   return AsanGetStack(addr, trace, size, thread_id, /* alloc_stack */ false);
139*a7c257b0Skamil }
140*a7c257b0Skamil 
141*a7c257b0Skamil SANITIZER_INTERFACE_ATTRIBUTE
__asan_get_shadow_mapping(uptr * shadow_scale,uptr * shadow_offset)142*a7c257b0Skamil void __asan_get_shadow_mapping(uptr *shadow_scale, uptr *shadow_offset) {
143*a7c257b0Skamil   if (shadow_scale)
144*a7c257b0Skamil     *shadow_scale = SHADOW_SCALE;
145*a7c257b0Skamil   if (shadow_offset)
146*a7c257b0Skamil     *shadow_offset = SHADOW_OFFSET;
147*a7c257b0Skamil }
148