]> git.proxmox.com Git - rustc.git/blob - src/libcompiler_builtins/compiler-rt/lib/asan/asan_debugging.cc
New upstream version 1.20.0+dfsg1
[rustc.git] / src / libcompiler_builtins / compiler-rt / lib / asan / asan_debugging.cc
1 //===-- asan_debugging.cc -------------------------------------------------===//
2 //
3 // The LLVM Compiler Infrastructure
4 //
5 // This file is distributed under the University of Illinois Open Source
6 // License. See LICENSE.TXT for details.
7 //
8 //===----------------------------------------------------------------------===//
9 //
10 // This file is a part of AddressSanitizer, an address sanity checker.
11 //
12 // This file contains various functions that are generally useful to call when
13 // using a debugger (LLDB, GDB).
14 //===----------------------------------------------------------------------===//
15
16 #include "asan_allocator.h"
17 #include "asan_descriptions.h"
18 #include "asan_flags.h"
19 #include "asan_internal.h"
20 #include "asan_mapping.h"
21 #include "asan_report.h"
22 #include "asan_thread.h"
23
24 namespace {
25 using namespace __asan;
26
27 static void FindInfoForStackVar(uptr addr, const char *frame_descr, uptr offset,
28 char *name, uptr name_size,
29 uptr &region_address, uptr &region_size) {
30 InternalMmapVector<StackVarDescr> vars(16);
31 if (!ParseFrameDescription(frame_descr, &vars)) {
32 return;
33 }
34
35 for (uptr i = 0; i < vars.size(); i++) {
36 if (offset <= vars[i].beg + vars[i].size) {
37 // We use name_len + 1 because strlcpy will guarantee a \0 at the end, so
38 // if we're limiting the copy due to name_len, we add 1 to ensure we copy
39 // the whole name and then terminate with '\0'.
40 internal_strlcpy(name, vars[i].name_pos,
41 Min(name_size, vars[i].name_len + 1));
42 region_address = addr - (offset - vars[i].beg);
43 region_size = vars[i].size;
44 return;
45 }
46 }
47 }
48
49 uptr AsanGetStack(uptr addr, uptr *trace, u32 size, u32 *thread_id,
50 bool alloc_stack) {
51 AsanChunkView chunk = FindHeapChunkByAddress(addr);
52 if (!chunk.IsValid()) return 0;
53
54 StackTrace stack(nullptr, 0);
55 if (alloc_stack) {
56 if (chunk.AllocTid() == kInvalidTid) return 0;
57 stack = chunk.GetAllocStack();
58 if (thread_id) *thread_id = chunk.AllocTid();
59 } else {
60 if (chunk.FreeTid() == kInvalidTid) return 0;
61 stack = chunk.GetFreeStack();
62 if (thread_id) *thread_id = chunk.FreeTid();
63 }
64
65 if (trace && size) {
66 size = Min(size, Min(stack.size, kStackTraceMax));
67 for (uptr i = 0; i < size; i++)
68 trace[i] = StackTrace::GetPreviousInstructionPc(stack.trace[i]);
69
70 return size;
71 }
72
73 return 0;
74 }
75
76 } // namespace
77
78 SANITIZER_INTERFACE_ATTRIBUTE
79 const char *__asan_locate_address(uptr addr, char *name, uptr name_size,
80 uptr *region_address_ptr,
81 uptr *region_size_ptr) {
82 AddressDescription descr(addr);
83 uptr region_address = 0;
84 uptr region_size = 0;
85 const char *region_kind = nullptr;
86 if (name && name_size > 0) name[0] = 0;
87
88 if (auto shadow = descr.AsShadow()) {
89 // region_{address,size} are already 0
90 switch (shadow->kind) {
91 case kShadowKindLow:
92 region_kind = "low shadow";
93 break;
94 case kShadowKindGap:
95 region_kind = "shadow gap";
96 break;
97 case kShadowKindHigh:
98 region_kind = "high shadow";
99 break;
100 }
101 } else if (auto heap = descr.AsHeap()) {
102 region_kind = "heap";
103 region_address = heap->chunk_access.chunk_begin;
104 region_size = heap->chunk_access.chunk_size;
105 } else if (auto stack = descr.AsStack()) {
106 region_kind = "stack";
107 if (!stack->frame_descr) {
108 // region_{address,size} are already 0
109 } else {
110 FindInfoForStackVar(addr, stack->frame_descr, stack->offset, name,
111 name_size, region_address, region_size);
112 }
113 } else if (auto global = descr.AsGlobal()) {
114 region_kind = "global";
115 auto &g = global->globals[0];
116 internal_strlcpy(name, g.name, name_size);
117 region_address = g.beg;
118 region_size = g.size;
119 } else {
120 // region_{address,size} are already 0
121 region_kind = "heap-invalid";
122 }
123
124 CHECK(region_kind);
125 if (region_address_ptr) *region_address_ptr = region_address;
126 if (region_size_ptr) *region_size_ptr = region_size;
127 return region_kind;
128 }
129
130 SANITIZER_INTERFACE_ATTRIBUTE
131 uptr __asan_get_alloc_stack(uptr addr, uptr *trace, uptr size, u32 *thread_id) {
132 return AsanGetStack(addr, trace, size, thread_id, /* alloc_stack */ true);
133 }
134
135 SANITIZER_INTERFACE_ATTRIBUTE
136 uptr __asan_get_free_stack(uptr addr, uptr *trace, uptr size, u32 *thread_id) {
137 return AsanGetStack(addr, trace, size, thread_id, /* alloc_stack */ false);
138 }
139
140 SANITIZER_INTERFACE_ATTRIBUTE
141 void __asan_get_shadow_mapping(uptr *shadow_scale, uptr *shadow_offset) {
142 if (shadow_scale)
143 *shadow_scale = SHADOW_SCALE;
144 if (shadow_offset)
145 *shadow_offset = SHADOW_OFFSET;
146 }