1018981977
libsanitizer/ * All source files: Merge from upstream 285547. * configure.tgt (SANITIZER_COMMON_TARGET_DEPENDENT_OBJECTS): New variable. * configure.ac (SANITIZER_COMMON_TARGET_DEPENDENT_OBJECTS): Handle it. * asan/Makefile.am (asan_files): Add new files. * asan/Makefile.in: Regenerate. * ubsan/Makefile.in: Likewise. * lsan/Makefile.in: Likewise. * tsan/Makefile.am (tsan_files): Add new files. * tsan/Makefile.in: Regenerate. * sanitizer_common/Makefile.am (sanitizer_common_files): Add new files. (EXTRA_libsanitizer_common_la_SOURCES): Define. (libsanitizer_common_la_LIBADD): Likewise. (libsanitizer_common_la_DEPENDENCIES): Likewise. * sanitizer_common/Makefile.in: Regenerate. * interception/Makefile.in: Likewise. * libbacktace/Makefile.in: Likewise. * Makefile.in: Likewise. * configure: Likewise. * merge.sh: Handle builtins/assembly.h merging. * builtins/assembly.h: New file. * asan/libtool-version: Bump the libasan SONAME. From-SVN: r241977
252 lines
7.4 KiB
C++
252 lines
7.4 KiB
C++
//===-- asan_descriptions.h -------------------------------------*- C++ -*-===//
|
|
//
|
|
// This file is distributed under the University of Illinois Open Source
|
|
// License. See LICENSE.TXT for details.
|
|
//
|
|
//===----------------------------------------------------------------------===//
|
|
//
|
|
// This file is a part of AddressSanitizer, an address sanity checker.
|
|
//
|
|
// ASan-private header for asan_descriptions.cc.
|
|
// TODO(filcab): Most struct definitions should move to the interface headers.
|
|
//===----------------------------------------------------------------------===//
|
|
#ifndef ASAN_DESCRIPTIONS_H
|
|
#define ASAN_DESCRIPTIONS_H
|
|
|
|
#include "asan_allocator.h"
|
|
#include "asan_thread.h"
|
|
#include "sanitizer_common/sanitizer_common.h"
|
|
#include "sanitizer_common/sanitizer_report_decorator.h"
|
|
|
|
namespace __asan {
|
|
|
|
void DescribeThread(AsanThreadContext *context);
|
|
static inline void DescribeThread(AsanThread *t) {
|
|
if (t) DescribeThread(t->context());
|
|
}
|
|
const char *ThreadNameWithParenthesis(AsanThreadContext *t, char buff[],
|
|
uptr buff_len);
|
|
const char *ThreadNameWithParenthesis(u32 tid, char buff[], uptr buff_len);
|
|
|
|
class Decorator : public __sanitizer::SanitizerCommonDecorator {
|
|
public:
|
|
Decorator() : SanitizerCommonDecorator() {}
|
|
const char *Access() { return Blue(); }
|
|
const char *EndAccess() { return Default(); }
|
|
const char *Location() { return Green(); }
|
|
const char *EndLocation() { return Default(); }
|
|
const char *Allocation() { return Magenta(); }
|
|
const char *EndAllocation() { return Default(); }
|
|
|
|
const char *ShadowByte(u8 byte) {
|
|
switch (byte) {
|
|
case kAsanHeapLeftRedzoneMagic:
|
|
case kAsanArrayCookieMagic:
|
|
return Red();
|
|
case kAsanHeapFreeMagic:
|
|
return Magenta();
|
|
case kAsanStackLeftRedzoneMagic:
|
|
case kAsanStackMidRedzoneMagic:
|
|
case kAsanStackRightRedzoneMagic:
|
|
return Red();
|
|
case kAsanStackAfterReturnMagic:
|
|
return Magenta();
|
|
case kAsanInitializationOrderMagic:
|
|
return Cyan();
|
|
case kAsanUserPoisonedMemoryMagic:
|
|
case kAsanContiguousContainerOOBMagic:
|
|
case kAsanAllocaLeftMagic:
|
|
case kAsanAllocaRightMagic:
|
|
return Blue();
|
|
case kAsanStackUseAfterScopeMagic:
|
|
return Magenta();
|
|
case kAsanGlobalRedzoneMagic:
|
|
return Red();
|
|
case kAsanInternalHeapMagic:
|
|
return Yellow();
|
|
case kAsanIntraObjectRedzone:
|
|
return Yellow();
|
|
default:
|
|
return Default();
|
|
}
|
|
}
|
|
const char *EndShadowByte() { return Default(); }
|
|
const char *MemoryByte() { return Magenta(); }
|
|
const char *EndMemoryByte() { return Default(); }
|
|
};
|
|
|
|
enum ShadowKind : u8 {
|
|
kShadowKindLow,
|
|
kShadowKindGap,
|
|
kShadowKindHigh,
|
|
};
|
|
static const char *const ShadowNames[] = {"low shadow", "shadow gap",
|
|
"high shadow"};
|
|
|
|
struct ShadowAddressDescription {
|
|
uptr addr;
|
|
ShadowKind kind;
|
|
u8 shadow_byte;
|
|
|
|
void Print() const;
|
|
};
|
|
|
|
bool GetShadowAddressInformation(uptr addr, ShadowAddressDescription *descr);
|
|
bool DescribeAddressIfShadow(uptr addr);
|
|
|
|
enum AccessType {
|
|
kAccessTypeLeft,
|
|
kAccessTypeRight,
|
|
kAccessTypeInside,
|
|
kAccessTypeUnknown, // This means we have an AddressSanitizer bug!
|
|
};
|
|
|
|
struct ChunkAccess {
|
|
uptr bad_addr;
|
|
sptr offset;
|
|
uptr chunk_begin;
|
|
uptr chunk_size;
|
|
u32 access_type : 2;
|
|
u32 alloc_type : 2;
|
|
};
|
|
|
|
struct HeapAddressDescription {
|
|
uptr addr;
|
|
uptr alloc_tid;
|
|
uptr free_tid;
|
|
u32 alloc_stack_id;
|
|
u32 free_stack_id;
|
|
ChunkAccess chunk_access;
|
|
|
|
void Print() const;
|
|
};
|
|
|
|
bool GetHeapAddressInformation(uptr addr, uptr access_size,
|
|
HeapAddressDescription *descr);
|
|
bool DescribeAddressIfHeap(uptr addr, uptr access_size = 1);
|
|
|
|
struct StackAddressDescription {
|
|
uptr addr;
|
|
uptr tid;
|
|
uptr offset;
|
|
uptr frame_pc;
|
|
uptr access_size;
|
|
const char *frame_descr;
|
|
|
|
void Print() const;
|
|
};
|
|
|
|
bool GetStackAddressInformation(uptr addr, uptr access_size,
|
|
StackAddressDescription *descr);
|
|
|
|
struct GlobalAddressDescription {
|
|
uptr addr;
|
|
// Assume address is close to at most four globals.
|
|
static const int kMaxGlobals = 4;
|
|
__asan_global globals[kMaxGlobals];
|
|
u32 reg_sites[kMaxGlobals];
|
|
uptr access_size;
|
|
u8 size;
|
|
|
|
void Print(const char *bug_type = "") const;
|
|
};
|
|
|
|
bool GetGlobalAddressInformation(uptr addr, uptr access_size,
|
|
GlobalAddressDescription *descr);
|
|
bool DescribeAddressIfGlobal(uptr addr, uptr access_size, const char *bug_type);
|
|
|
|
// General function to describe an address. Will try to describe the address as
|
|
// a shadow, global (variable), stack, or heap address.
|
|
// bug_type is optional and is used for checking if we're reporting an
|
|
// initialization-order-fiasco
|
|
// The proper access_size should be passed for stack, global, and heap
|
|
// addresses. Defaults to 1.
|
|
// Each of the *AddressDescription functions has its own Print() member, which
|
|
// may take access_size and bug_type parameters if needed.
|
|
void PrintAddressDescription(uptr addr, uptr access_size = 1,
|
|
const char *bug_type = "");
|
|
|
|
enum AddressKind {
|
|
kAddressKindWild,
|
|
kAddressKindShadow,
|
|
kAddressKindHeap,
|
|
kAddressKindStack,
|
|
kAddressKindGlobal,
|
|
};
|
|
|
|
class AddressDescription {
|
|
struct AddressDescriptionData {
|
|
AddressKind kind;
|
|
union {
|
|
ShadowAddressDescription shadow;
|
|
HeapAddressDescription heap;
|
|
StackAddressDescription stack;
|
|
GlobalAddressDescription global;
|
|
uptr addr;
|
|
};
|
|
};
|
|
|
|
AddressDescriptionData data;
|
|
|
|
public:
|
|
AddressDescription() = default;
|
|
// shouldLockThreadRegistry allows us to skip locking if we're sure we already
|
|
// have done it.
|
|
AddressDescription(uptr addr, bool shouldLockThreadRegistry = true)
|
|
: AddressDescription(addr, 1, shouldLockThreadRegistry) {}
|
|
AddressDescription(uptr addr, uptr access_size,
|
|
bool shouldLockThreadRegistry = true);
|
|
|
|
uptr Address() const {
|
|
switch (data.kind) {
|
|
case kAddressKindWild:
|
|
return data.addr;
|
|
case kAddressKindShadow:
|
|
return data.shadow.addr;
|
|
case kAddressKindHeap:
|
|
return data.heap.addr;
|
|
case kAddressKindStack:
|
|
return data.stack.addr;
|
|
case kAddressKindGlobal:
|
|
return data.global.addr;
|
|
}
|
|
UNREACHABLE("AddressInformation kind is invalid");
|
|
}
|
|
void Print(const char *bug_descr = nullptr) const {
|
|
switch (data.kind) {
|
|
case kAddressKindWild:
|
|
Printf("Address %p is a wild pointer.\n", data.addr);
|
|
return;
|
|
case kAddressKindShadow:
|
|
return data.shadow.Print();
|
|
case kAddressKindHeap:
|
|
return data.heap.Print();
|
|
case kAddressKindStack:
|
|
return data.stack.Print();
|
|
case kAddressKindGlobal:
|
|
// initialization-order-fiasco has a special Print()
|
|
return data.global.Print(bug_descr);
|
|
}
|
|
UNREACHABLE("AddressInformation kind is invalid");
|
|
}
|
|
|
|
void StoreTo(AddressDescriptionData *dst) const { *dst = data; }
|
|
|
|
const ShadowAddressDescription *AsShadow() const {
|
|
return data.kind == kAddressKindShadow ? &data.shadow : nullptr;
|
|
}
|
|
const HeapAddressDescription *AsHeap() const {
|
|
return data.kind == kAddressKindHeap ? &data.heap : nullptr;
|
|
}
|
|
const StackAddressDescription *AsStack() const {
|
|
return data.kind == kAddressKindStack ? &data.stack : nullptr;
|
|
}
|
|
const GlobalAddressDescription *AsGlobal() const {
|
|
return data.kind == kAddressKindGlobal ? &data.global : nullptr;
|
|
}
|
|
};
|
|
|
|
} // namespace __asan
|
|
|
|
#endif // ASAN_DESCRIPTIONS_H
|