Path: blob/main/contrib/llvm-project/compiler-rt/lib/asan/asan_debugging.cpp
35234 views
//===-- asan_debugging.cpp ------------------------------------------------===//1//2// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.3// See https://llvm.org/LICENSE.txt for license information.4// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception5//6//===----------------------------------------------------------------------===//7//8// This file is a part of AddressSanitizer, an address sanity checker.9//10// This file contains various functions that are generally useful to call when11// using a debugger (LLDB, GDB).12//===----------------------------------------------------------------------===//1314#include "asan_allocator.h"15#include "asan_descriptions.h"16#include "asan_flags.h"17#include "asan_internal.h"18#include "asan_mapping.h"19#include "asan_report.h"20#include "asan_thread.h"21#include "sanitizer_common/sanitizer_stackdepot.h"2223namespace {24using namespace __asan;2526static void FindInfoForStackVar(uptr addr, const char *frame_descr, uptr offset,27char *name, uptr name_size,28uptr *region_address, uptr *region_size) {29InternalMmapVector<StackVarDescr> vars;30vars.reserve(16);31if (!ParseFrameDescription(frame_descr, &vars)) {32return;33}3435for (uptr i = 0; i < vars.size(); i++) {36if (offset <= vars[i].beg + vars[i].size) {37// We use name_len + 1 because strlcpy will guarantee a \0 at the end, so38// if we're limiting the copy due to name_len, we add 1 to ensure we copy39// the whole name and then terminate with '\0'.40internal_strlcpy(name, vars[i].name_pos,41Min(name_size, vars[i].name_len + 1));42*region_address = addr - (offset - vars[i].beg);43*region_size = vars[i].size;44return;45}46}47}4849uptr AsanGetStack(uptr addr, uptr *trace, u32 size, u32 *thread_id,50bool alloc_stack) {51AsanChunkView chunk = FindHeapChunkByAddress(addr);52if (!chunk.IsValid()) return 0;5354StackTrace stack(nullptr, 0);55if (alloc_stack) {56if (chunk.AllocTid() == kInvalidTid) return 0;57stack = StackDepotGet(chunk.GetAllocStackId());58if (thread_id) *thread_id = chunk.AllocTid();59} else {60if (chunk.FreeTid() == kInvalidTid) return 0;61stack = StackDepotGet(chunk.GetFreeStackId());62if (thread_id) *thread_id = chunk.FreeTid();63}6465if (trace && size) {66size = Min(size, Min(stack.size, kStackTraceMax));67for (uptr i = 0; i < size; i++)68trace[i] = StackTrace::GetPreviousInstructionPc(stack.trace[i]);6970return size;71}7273return 0;74}7576} // namespace7778SANITIZER_INTERFACE_ATTRIBUTE79const char *__asan_locate_address(uptr addr, char *name, uptr name_size,80uptr *region_address_ptr,81uptr *region_size_ptr) {82AddressDescription descr(addr);83uptr region_address = 0;84uptr region_size = 0;85const char *region_kind = nullptr;86if (name && name_size > 0) name[0] = 0;8788if (auto shadow = descr.AsShadow()) {89// region_{address,size} are already 090switch (shadow->kind) {91case kShadowKindLow:92region_kind = "low shadow";93break;94case kShadowKindGap:95region_kind = "shadow gap";96break;97case kShadowKindHigh:98region_kind = "high shadow";99break;100}101} else if (auto heap = descr.AsHeap()) {102region_kind = "heap";103region_address = heap->chunk_access.chunk_begin;104region_size = heap->chunk_access.chunk_size;105} else if (auto stack = descr.AsStack()) {106region_kind = "stack";107if (!stack->frame_descr) {108// region_{address,size} are already 0109} else {110FindInfoForStackVar(addr, stack->frame_descr, stack->offset, name,111name_size, ®ion_address, ®ion_size);112}113} else if (auto global = descr.AsGlobal()) {114region_kind = "global";115auto &g = global->globals[0];116internal_strlcpy(name, g.name, name_size);117region_address = g.beg;118region_size = g.size;119} else {120// region_{address,size} are already 0121region_kind = "heap-invalid";122}123124CHECK(region_kind);125if (region_address_ptr) *region_address_ptr = region_address;126if (region_size_ptr) *region_size_ptr = region_size;127return region_kind;128}129130SANITIZER_INTERFACE_ATTRIBUTE131uptr __asan_get_alloc_stack(uptr addr, uptr *trace, uptr size, u32 *thread_id) {132return AsanGetStack(addr, trace, size, thread_id, /* alloc_stack */ true);133}134135SANITIZER_INTERFACE_ATTRIBUTE136uptr __asan_get_free_stack(uptr addr, uptr *trace, uptr size, u32 *thread_id) {137return AsanGetStack(addr, trace, size, thread_id, /* alloc_stack */ false);138}139140SANITIZER_INTERFACE_ATTRIBUTE141void __asan_get_shadow_mapping(uptr *shadow_scale, uptr *shadow_offset) {142if (shadow_scale)143*shadow_scale = ASAN_SHADOW_SCALE;144if (shadow_offset)145*shadow_offset = ASAN_SHADOW_OFFSET;146}147148149