13cab2bb3Spatrick //===-- asan_report.h -------------------------------------------*- C++ -*-===// 23cab2bb3Spatrick // 33cab2bb3Spatrick // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. 43cab2bb3Spatrick // See https://llvm.org/LICENSE.txt for license information. 53cab2bb3Spatrick // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 63cab2bb3Spatrick // 73cab2bb3Spatrick //===----------------------------------------------------------------------===// 83cab2bb3Spatrick // 93cab2bb3Spatrick // This file is a part of AddressSanitizer, an address sanity checker. 103cab2bb3Spatrick // 113cab2bb3Spatrick // ASan-private header for error reporting functions. 123cab2bb3Spatrick //===----------------------------------------------------------------------===// 133cab2bb3Spatrick 143cab2bb3Spatrick #ifndef ASAN_REPORT_H 153cab2bb3Spatrick #define ASAN_REPORT_H 163cab2bb3Spatrick 173cab2bb3Spatrick #include "asan_allocator.h" 183cab2bb3Spatrick #include "asan_internal.h" 193cab2bb3Spatrick #include "asan_thread.h" 203cab2bb3Spatrick 213cab2bb3Spatrick namespace __asan { 223cab2bb3Spatrick 233cab2bb3Spatrick struct StackVarDescr { 243cab2bb3Spatrick uptr beg; 253cab2bb3Spatrick uptr size; 263cab2bb3Spatrick const char *name_pos; 273cab2bb3Spatrick uptr name_len; 283cab2bb3Spatrick uptr line; 293cab2bb3Spatrick }; 303cab2bb3Spatrick 313cab2bb3Spatrick // Returns the number of globals close to the provided address and copies 323cab2bb3Spatrick // them to "globals" array. 333cab2bb3Spatrick int GetGlobalsForAddress(uptr addr, __asan_global *globals, u32 *reg_sites, 343cab2bb3Spatrick int max_globals); 353cab2bb3Spatrick 363cab2bb3Spatrick const char *MaybeDemangleGlobalName(const char *name); 373cab2bb3Spatrick void PrintGlobalNameIfASCII(InternalScopedString *str, const __asan_global &g); 383cab2bb3Spatrick void PrintGlobalLocation(InternalScopedString *str, const __asan_global &g); 393cab2bb3Spatrick 403cab2bb3Spatrick void PrintMemoryByte(InternalScopedString *str, const char *before, u8 byte, 413cab2bb3Spatrick bool in_shadow, const char *after = "\n"); 423cab2bb3Spatrick 433cab2bb3Spatrick // The following functions prints address description depending 443cab2bb3Spatrick // on the memory type (shadow/heap/stack/global). 453cab2bb3Spatrick bool ParseFrameDescription(const char *frame_descr, 463cab2bb3Spatrick InternalMmapVector<StackVarDescr> *vars); 473cab2bb3Spatrick 483cab2bb3Spatrick // Different kinds of error reports. 493cab2bb3Spatrick void ReportGenericError(uptr pc, uptr bp, uptr sp, uptr addr, bool is_write, 503cab2bb3Spatrick uptr access_size, u32 exp, bool fatal); 513cab2bb3Spatrick void ReportDeadlySignal(const SignalContext &sig); 523cab2bb3Spatrick void ReportNewDeleteTypeMismatch(uptr addr, uptr delete_size, 533cab2bb3Spatrick uptr delete_alignment, 543cab2bb3Spatrick BufferedStackTrace *free_stack); 553cab2bb3Spatrick void ReportDoubleFree(uptr addr, BufferedStackTrace *free_stack); 563cab2bb3Spatrick void ReportFreeNotMalloced(uptr addr, BufferedStackTrace *free_stack); 573cab2bb3Spatrick void ReportAllocTypeMismatch(uptr addr, BufferedStackTrace *free_stack, 583cab2bb3Spatrick AllocType alloc_type, 593cab2bb3Spatrick AllocType dealloc_type); 603cab2bb3Spatrick void ReportMallocUsableSizeNotOwned(uptr addr, BufferedStackTrace *stack); 613cab2bb3Spatrick void ReportSanitizerGetAllocatedSizeNotOwned(uptr addr, 623cab2bb3Spatrick BufferedStackTrace *stack); 633cab2bb3Spatrick void ReportCallocOverflow(uptr count, uptr size, BufferedStackTrace *stack); 643cab2bb3Spatrick void ReportReallocArrayOverflow(uptr count, uptr size, 653cab2bb3Spatrick BufferedStackTrace *stack); 663cab2bb3Spatrick void ReportPvallocOverflow(uptr size, BufferedStackTrace *stack); 673cab2bb3Spatrick void ReportInvalidAllocationAlignment(uptr alignment, 683cab2bb3Spatrick BufferedStackTrace *stack); 693cab2bb3Spatrick void ReportInvalidAlignedAllocAlignment(uptr size, uptr alignment, 703cab2bb3Spatrick BufferedStackTrace *stack); 713cab2bb3Spatrick void ReportInvalidPosixMemalignAlignment(uptr alignment, 723cab2bb3Spatrick BufferedStackTrace *stack); 733cab2bb3Spatrick void ReportAllocationSizeTooBig(uptr user_size, uptr total_size, uptr max_size, 743cab2bb3Spatrick BufferedStackTrace *stack); 753cab2bb3Spatrick void ReportRssLimitExceeded(BufferedStackTrace *stack); 763cab2bb3Spatrick void ReportOutOfMemory(uptr requested_size, BufferedStackTrace *stack); 773cab2bb3Spatrick void ReportStringFunctionMemoryRangesOverlap(const char *function, 783cab2bb3Spatrick const char *offset1, uptr length1, 793cab2bb3Spatrick const char *offset2, uptr length2, 803cab2bb3Spatrick BufferedStackTrace *stack); 813cab2bb3Spatrick void ReportStringFunctionSizeOverflow(uptr offset, uptr size, 823cab2bb3Spatrick BufferedStackTrace *stack); 833cab2bb3Spatrick void ReportBadParamsToAnnotateContiguousContainer(uptr beg, uptr end, 843cab2bb3Spatrick uptr old_mid, uptr new_mid, 853cab2bb3Spatrick BufferedStackTrace *stack); 86*810390e3Srobert void ReportBadParamsToAnnotateDoubleEndedContiguousContainer( 87*810390e3Srobert uptr storage_beg, uptr storage_end, uptr old_container_beg, 88*810390e3Srobert uptr old_container_end, uptr new_container_beg, uptr new_container_end, 89*810390e3Srobert BufferedStackTrace *stack); 903cab2bb3Spatrick 913cab2bb3Spatrick void ReportODRViolation(const __asan_global *g1, u32 stack_id1, 923cab2bb3Spatrick const __asan_global *g2, u32 stack_id2); 933cab2bb3Spatrick 943cab2bb3Spatrick // Mac-specific errors and warnings. 953cab2bb3Spatrick void ReportMacMzReallocUnknown(uptr addr, uptr zone_ptr, 963cab2bb3Spatrick const char *zone_name, 973cab2bb3Spatrick BufferedStackTrace *stack); 983cab2bb3Spatrick void ReportMacCfReallocUnknown(uptr addr, uptr zone_ptr, 993cab2bb3Spatrick const char *zone_name, 1003cab2bb3Spatrick BufferedStackTrace *stack); 1013cab2bb3Spatrick 1023cab2bb3Spatrick } // namespace __asan 1033cab2bb3Spatrick #endif // ASAN_REPORT_H 104