123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147 |
- //===-- asan_debugging.cpp ------------------------------------------------===//
- //
- // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
- // See https://llvm.org/LICENSE.txt for license information.
- // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
- //
- //===----------------------------------------------------------------------===//
- //
- // This file is a part of AddressSanitizer, an address sanity checker.
- //
- // This file contains various functions that are generally useful to call when
- // using a debugger (LLDB, GDB).
- //===----------------------------------------------------------------------===//
- #include "asan_allocator.h"
- #include "asan_descriptions.h"
- #include "asan_flags.h"
- #include "asan_internal.h"
- #include "asan_mapping.h"
- #include "asan_report.h"
- #include "asan_thread.h"
- #include "sanitizer_common/sanitizer_stackdepot.h"
- namespace {
- using namespace __asan;
- static void FindInfoForStackVar(uptr addr, const char *frame_descr, uptr offset,
- char *name, uptr name_size,
- uptr *region_address, uptr *region_size) {
- InternalMmapVector<StackVarDescr> vars;
- vars.reserve(16);
- if (!ParseFrameDescription(frame_descr, &vars)) {
- return;
- }
- for (uptr i = 0; i < vars.size(); i++) {
- if (offset <= vars[i].beg + vars[i].size) {
- // We use name_len + 1 because strlcpy will guarantee a \0 at the end, so
- // if we're limiting the copy due to name_len, we add 1 to ensure we copy
- // the whole name and then terminate with '\0'.
- internal_strlcpy(name, vars[i].name_pos,
- Min(name_size, vars[i].name_len + 1));
- *region_address = addr - (offset - vars[i].beg);
- *region_size = vars[i].size;
- return;
- }
- }
- }
- uptr AsanGetStack(uptr addr, uptr *trace, u32 size, u32 *thread_id,
- bool alloc_stack) {
- AsanChunkView chunk = FindHeapChunkByAddress(addr);
- if (!chunk.IsValid()) return 0;
- StackTrace stack(nullptr, 0);
- if (alloc_stack) {
- if (chunk.AllocTid() == kInvalidTid) return 0;
- stack = StackDepotGet(chunk.GetAllocStackId());
- if (thread_id) *thread_id = chunk.AllocTid();
- } else {
- if (chunk.FreeTid() == kInvalidTid) return 0;
- stack = StackDepotGet(chunk.GetFreeStackId());
- if (thread_id) *thread_id = chunk.FreeTid();
- }
- if (trace && size) {
- size = Min(size, Min(stack.size, kStackTraceMax));
- for (uptr i = 0; i < size; i++)
- trace[i] = StackTrace::GetPreviousInstructionPc(stack.trace[i]);
- return size;
- }
- return 0;
- }
- } // namespace
- SANITIZER_INTERFACE_ATTRIBUTE
- const char *__asan_locate_address(uptr addr, char *name, uptr name_size,
- uptr *region_address_ptr,
- uptr *region_size_ptr) {
- AddressDescription descr(addr);
- uptr region_address = 0;
- uptr region_size = 0;
- const char *region_kind = nullptr;
- if (name && name_size > 0) name[0] = 0;
- if (auto shadow = descr.AsShadow()) {
- // region_{address,size} are already 0
- switch (shadow->kind) {
- case kShadowKindLow:
- region_kind = "low shadow";
- break;
- case kShadowKindGap:
- region_kind = "shadow gap";
- break;
- case kShadowKindHigh:
- region_kind = "high shadow";
- break;
- }
- } else if (auto heap = descr.AsHeap()) {
- region_kind = "heap";
- region_address = heap->chunk_access.chunk_begin;
- region_size = heap->chunk_access.chunk_size;
- } else if (auto stack = descr.AsStack()) {
- region_kind = "stack";
- if (!stack->frame_descr) {
- // region_{address,size} are already 0
- } else {
- FindInfoForStackVar(addr, stack->frame_descr, stack->offset, name,
- name_size, ®ion_address, ®ion_size);
- }
- } else if (auto global = descr.AsGlobal()) {
- region_kind = "global";
- auto &g = global->globals[0];
- internal_strlcpy(name, g.name, name_size);
- region_address = g.beg;
- region_size = g.size;
- } else {
- // region_{address,size} are already 0
- region_kind = "heap-invalid";
- }
- CHECK(region_kind);
- if (region_address_ptr) *region_address_ptr = region_address;
- if (region_size_ptr) *region_size_ptr = region_size;
- return region_kind;
- }
- SANITIZER_INTERFACE_ATTRIBUTE
- uptr __asan_get_alloc_stack(uptr addr, uptr *trace, uptr size, u32 *thread_id) {
- return AsanGetStack(addr, trace, size, thread_id, /* alloc_stack */ true);
- }
- SANITIZER_INTERFACE_ATTRIBUTE
- uptr __asan_get_free_stack(uptr addr, uptr *trace, uptr size, u32 *thread_id) {
- return AsanGetStack(addr, trace, size, thread_id, /* alloc_stack */ false);
- }
- SANITIZER_INTERFACE_ATTRIBUTE
- void __asan_get_shadow_mapping(uptr *shadow_scale, uptr *shadow_offset) {
- if (shadow_scale)
- *shadow_scale = ASAN_SHADOW_SCALE;
- if (shadow_offset)
- *shadow_offset = ASAN_SHADOW_OFFSET;
- }
|