|  | //===-- sanitizer/asan_interface.h ------------------------------*- C++ -*-===// | 
|  | // | 
|  | // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. | 
|  | // See https://llvm.org/LICENSE.txt for license information. | 
|  | // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception | 
|  | // | 
|  | //===----------------------------------------------------------------------===// | 
|  | // | 
|  | // This file is a part of AddressSanitizer (ASan). | 
|  | // | 
|  | // Public interface header. | 
|  | //===----------------------------------------------------------------------===// | 
|  | #ifndef SANITIZER_ASAN_INTERFACE_H | 
|  | #define SANITIZER_ASAN_INTERFACE_H | 
|  |  | 
|  | #include <sanitizer/common_interface_defs.h> | 
|  |  | 
|  | #ifdef __cplusplus | 
|  | extern "C" { | 
|  | #endif | 
|  | /// Marks a memory region (<c>[addr, addr+size)</c>) as unaddressable. | 
|  | /// | 
|  | /// This memory must be previously allocated by your program. Instrumented | 
|  | /// code is forbidden from accessing addresses in this region until it is | 
|  | /// unpoisoned. This function is not guaranteed to poison the entire region - | 
|  | /// it could poison only a subregion of <c>[addr, addr+size)</c> due to ASan | 
|  | /// alignment restrictions. | 
|  | /// | 
|  | /// \note This function is not thread-safe because no two threads can poison or | 
|  | /// unpoison memory in the same memory region simultaneously. | 
|  | /// | 
|  | /// \param addr Start of memory region. | 
|  | /// \param size Size of memory region. | 
|  | void __asan_poison_memory_region(void const volatile *addr, size_t size); | 
|  |  | 
|  | /// Marks a memory region (<c>[addr, addr+size)</c>) as addressable. | 
|  | /// | 
|  | /// This memory must be previously allocated by your program. Accessing | 
|  | /// addresses in this region is allowed until this region is poisoned again. | 
|  | /// This function could unpoison a super-region of <c>[addr, addr+size)</c> due | 
|  | /// to ASan alignment restrictions. | 
|  | /// | 
|  | /// \note This function is not thread-safe because no two threads can | 
|  | /// poison or unpoison memory in the same memory region simultaneously. | 
|  | /// | 
|  | /// \param addr Start of memory region. | 
|  | /// \param size Size of memory region. | 
|  | void __asan_unpoison_memory_region(void const volatile *addr, size_t size); | 
|  |  | 
|  | // Macros provided for convenience. | 
|  | #if __has_feature(address_sanitizer) || defined(__SANITIZE_ADDRESS__) | 
|  | /// Marks a memory region as unaddressable. | 
|  | /// | 
|  | /// \note Macro provided for convenience; defined as a no-op if ASan is not | 
|  | /// enabled. | 
|  | /// | 
|  | /// \param addr Start of memory region. | 
|  | /// \param size Size of memory region. | 
|  | #define ASAN_POISON_MEMORY_REGION(addr, size) \ | 
|  | __asan_poison_memory_region((addr), (size)) | 
|  |  | 
|  | /// Marks a memory region as addressable. | 
|  | /// | 
|  | /// \note Macro provided for convenience; defined as a no-op if ASan is not | 
|  | /// enabled. | 
|  | /// | 
|  | /// \param addr Start of memory region. | 
|  | /// \param size Size of memory region. | 
|  | #define ASAN_UNPOISON_MEMORY_REGION(addr, size) \ | 
|  | __asan_unpoison_memory_region((addr), (size)) | 
|  | #else | 
|  | #define ASAN_POISON_MEMORY_REGION(addr, size) \ | 
|  | ((void)(addr), (void)(size)) | 
|  | #define ASAN_UNPOISON_MEMORY_REGION(addr, size) \ | 
|  | ((void)(addr), (void)(size)) | 
|  | #endif | 
|  |  | 
|  | /// Checks if an address is poisoned. | 
|  | /// | 
|  | /// Returns 1 if <c><i>addr</i></c> is poisoned (that is, 1-byte read/write | 
|  | /// access to this address would result in an error report from ASan). | 
|  | /// Otherwise returns 0. | 
|  | /// | 
|  | /// \param addr Address to check. | 
|  | /// | 
|  | /// \retval 1 Address is poisoned. | 
|  | /// \retval 0 Address is not poisoned. | 
|  | int __asan_address_is_poisoned(void const volatile *addr); | 
|  |  | 
|  | /// Checks if a region is poisoned. | 
|  | /// | 
|  | /// If at least one byte in <c>[beg, beg+size)</c> is poisoned, returns the | 
|  | /// address of the first such byte. Otherwise returns 0. | 
|  | /// | 
|  | /// \param beg Start of memory region. | 
|  | /// \param size Start of memory region. | 
|  | /// \returns Address of first poisoned byte. | 
|  | void *__asan_region_is_poisoned(void *beg, size_t size); | 
|  |  | 
|  | /// Describes an address (useful for calling from the debugger). | 
|  | /// | 
|  | /// Prints the description of <c><i>addr</i></c>. | 
|  | /// | 
|  | /// \param addr Address to describe. | 
|  | void __asan_describe_address(void *addr); | 
|  |  | 
|  | /// Checks if an error has been or is being reported (useful for calling from | 
|  | /// the debugger to get information about an ASan error). | 
|  | /// | 
|  | /// Returns 1 if an error has been (or is being) reported. Otherwise returns 0. | 
|  | /// | 
|  | /// \returns 1 if an error has been (or is being) reported. Otherwise returns | 
|  | /// 0. | 
|  | int __asan_report_present(void); | 
|  |  | 
|  | /// Gets the PC (program counter) register value of an ASan error (useful for | 
|  | /// calling from the debugger). | 
|  | /// | 
|  | /// Returns PC if an error has been (or is being) reported. | 
|  | /// Otherwise returns 0. | 
|  | /// | 
|  | /// \returns PC value. | 
|  | void *__asan_get_report_pc(void); | 
|  |  | 
|  | /// Gets the BP (base pointer) register value of an ASan error (useful for | 
|  | /// calling from the debugger). | 
|  | /// | 
|  | /// Returns BP if an error has been (or is being) reported. | 
|  | /// Otherwise returns 0. | 
|  | /// | 
|  | /// \returns BP value. | 
|  | void *__asan_get_report_bp(void); | 
|  |  | 
|  | /// Gets the SP (stack pointer) register value of an ASan error (useful for | 
|  | /// calling from the debugger). | 
|  | /// | 
|  | /// If an error has been (or is being) reported, returns SP. | 
|  | /// Otherwise returns 0. | 
|  | /// | 
|  | /// \returns SP value. | 
|  | void *__asan_get_report_sp(void); | 
|  |  | 
|  | /// Gets the address of the report buffer of an ASan error (useful for calling | 
|  | /// from the debugger). | 
|  | /// | 
|  | /// Returns the address of the report buffer if an error has been (or is being) | 
|  | /// reported. Otherwise returns 0. | 
|  | /// | 
|  | /// \returns Address of report buffer. | 
|  | void *__asan_get_report_address(void); | 
|  |  | 
|  | /// Gets access type of an ASan error (useful for calling from the debugger). | 
|  | /// | 
|  | /// Returns access type (read or write) if an error has been (or is being) | 
|  | /// reported. Otherwise returns 0. | 
|  | /// | 
|  | /// \returns Access type (0 = read, 1 = write). | 
|  | int __asan_get_report_access_type(void); | 
|  |  | 
|  | /// Gets access size of an ASan error (useful for calling from the debugger). | 
|  | /// | 
|  | /// Returns access size if an error has been (or is being) reported. Otherwise | 
|  | /// returns 0. | 
|  | /// | 
|  | /// \returns Access size in bytes. | 
|  | size_t __asan_get_report_access_size(void); | 
|  |  | 
|  | /// Gets the bug description of an ASan error (useful for calling from a | 
|  | /// debugger). | 
|  | /// | 
|  | /// \returns Returns a bug description if an error has been (or is being) | 
|  | /// reported - for example, "heap-use-after-free". Otherwise returns an empty | 
|  | /// string. | 
|  | const char *__asan_get_report_description(void); | 
|  |  | 
|  | /// Gets information about a pointer (useful for calling from the debugger). | 
|  | /// | 
|  | /// Returns the category of the given pointer as a constant string. | 
|  | /// Possible return values are <c>global</c>, <c>stack</c>, <c>stack-fake</c>, | 
|  | /// <c>heap</c>, <c>heap-invalid</c>, <c>shadow-low</c>, <c>shadow-gap</c>, | 
|  | /// <c>shadow-high</c>, and <c>unknown</c>. | 
|  | /// | 
|  | /// If the return value is <c>global</c> or <c>stack</c>, tries to also return | 
|  | /// the variable name, address, and size. If the return value is <c>heap</c>, | 
|  | /// tries to return the chunk address and size. <c><i>name</i></c> should point | 
|  | /// to an allocated buffer of size <c><i>name_size</i></c>. | 
|  | /// | 
|  | /// \param addr Address to locate. | 
|  | /// \param name Buffer to store the variable's name. | 
|  | /// \param name_size Size in bytes of the variable's name buffer. | 
|  | /// \param[out] region_address Address of the region. | 
|  | /// \param[out] region_size Size of the region in bytes. | 
|  | /// | 
|  | /// \returns Returns the category of the given pointer as a constant string. | 
|  | const char *__asan_locate_address(void *addr, char *name, size_t name_size, | 
|  | void **region_address, size_t *region_size); | 
|  |  | 
|  | /// Gets the allocation stack trace and thread ID for a heap address (useful | 
|  | /// for calling from the debugger). | 
|  | /// | 
|  | /// Stores up to <c><i>size</i></c> frames in <c><i>trace</i></c>. Returns | 
|  | /// the number of stored frames or 0 on error. | 
|  | /// | 
|  | /// \param addr A heap address. | 
|  | /// \param trace A buffer to store the stack trace. | 
|  | /// \param size Size in bytes of the trace buffer. | 
|  | /// \param[out] thread_id The thread ID of the address. | 
|  | /// | 
|  | /// \returns Returns the number of stored frames or 0 on error. | 
|  | size_t __asan_get_alloc_stack(void *addr, void **trace, size_t size, | 
|  | int *thread_id); | 
|  |  | 
|  | /// Gets the free stack trace and thread ID for a heap address (useful for | 
|  | /// calling from the debugger). | 
|  | /// | 
|  | /// Stores up to <c><i>size</i></c> frames in <c><i>trace</i></c>. Returns | 
|  | /// the number of stored frames or 0 on error. | 
|  | /// | 
|  | /// \param addr A heap address. | 
|  | /// \param trace A buffer to store the stack trace. | 
|  | /// \param size Size in bytes of the trace buffer. | 
|  | /// \param[out] thread_id The thread ID of the address. | 
|  | /// | 
|  | /// \returns Returns the number of stored frames or 0 on error. | 
|  | size_t __asan_get_free_stack(void *addr, void **trace, size_t size, | 
|  | int *thread_id); | 
|  |  | 
|  | /// Gets the current shadow memory mapping (useful for calling from the | 
|  | /// debugger). | 
|  | /// | 
|  | /// \param[out] shadow_scale Shadow scale value. | 
|  | /// \param[out] shadow_offset Offset value. | 
|  | void __asan_get_shadow_mapping(size_t *shadow_scale, size_t *shadow_offset); | 
|  |  | 
|  | /// This is an internal function that is called to report an error. However, | 
|  | /// it is still a part of the interface because you might want to set a | 
|  | /// breakpoint on this function in the debugger. | 
|  | /// | 
|  | /// \param pc <c><i>pc</i></c> value of the ASan error. | 
|  | /// \param bp <c><i>bp</i></c> value of the ASan error. | 
|  | /// \param sp <c><i>sp</i></c> value of the ASan error. | 
|  | /// \param addr Address of the ASan error. | 
|  | /// \param is_write True if the error is a write error; false otherwise. | 
|  | /// \param access_size Size of the memory access of the ASan error. | 
|  | void __asan_report_error(void *pc, void *bp, void *sp, | 
|  | void *addr, int is_write, size_t access_size); | 
|  |  | 
|  | // Deprecated. Call __sanitizer_set_death_callback instead. | 
|  | void __asan_set_death_callback(void (*callback)(void)); | 
|  |  | 
|  | /// Sets the callback function to be called during ASan error reporting. | 
|  | /// | 
|  | /// The callback provides a string pointer to the report. | 
|  | /// | 
|  | /// \param callback User-provided function. | 
|  | void __asan_set_error_report_callback(void (*callback)(const char *)); | 
|  |  | 
|  | /// User-provided callback on ASan errors. | 
|  | /// | 
|  | /// You can provide a function that would be called immediately when ASan | 
|  | /// detects an error. This is useful in cases when ASan detects an error but | 
|  | /// your program crashes before the ASan report is printed. | 
|  | void __asan_on_error(void); | 
|  |  | 
|  | /// Prints accumulated statistics to <c>stderr</c> (useful for calling from the | 
|  | /// debugger). | 
|  | void __asan_print_accumulated_stats(void); | 
|  |  | 
|  | /// User-provided default option settings. | 
|  | /// | 
|  | /// You can provide your own implementation of this function to return a string | 
|  | /// containing ASan runtime options (for example, | 
|  | /// <c>verbosity=1:halt_on_error=0</c>). | 
|  | /// | 
|  | /// \returns Default options string. | 
|  | const char* __asan_default_options(void); | 
|  |  | 
|  | // The following two functions facilitate garbage collection in presence of | 
|  | // ASan's fake stack. | 
|  |  | 
|  | /// Gets an opaque handler to the current thread's fake stack. | 
|  | /// | 
|  | /// Returns an opaque handler to be used by | 
|  | /// <c>__asan_addr_is_in_fake_stack()</c>. Returns NULL if the current thread | 
|  | /// does not have a fake stack. | 
|  | /// | 
|  | /// \returns An opaque handler to the fake stack or NULL. | 
|  | void *__asan_get_current_fake_stack(void); | 
|  |  | 
|  | /// Checks if an address belongs to a given fake stack. | 
|  | /// | 
|  | /// If <c><i>fake_stack</i></c> is non-NULL and <c><i>addr</i></c> belongs to a | 
|  | /// fake frame in <c><i>fake_stack</i></c>, returns the address of the real | 
|  | /// stack that corresponds to the fake frame and sets <c><i>beg</i></c> and | 
|  | /// <c><i>end</i></c> to the boundaries of this fake frame. Otherwise returns | 
|  | /// NULL and does not touch <c><i>beg</i></c> and <c><i>end</i></c>. | 
|  | /// | 
|  | /// If <c><i>beg</i></c> or <c><i>end</i></c> are NULL, they are not touched. | 
|  | /// | 
|  | /// \note This function can be called from a thread other than the owner of | 
|  | /// <c><i>fake_stack</i></c>, but the owner thread needs to be alive. | 
|  | /// | 
|  | /// \param fake_stack An opaque handler to a fake stack. | 
|  | /// \param addr Address to test. | 
|  | /// \param[out] beg Beginning of fake frame. | 
|  | /// \param[out] end End of fake frame. | 
|  | /// \returns Stack address or NULL. | 
|  | void *__asan_addr_is_in_fake_stack(void *fake_stack, void *addr, void **beg, | 
|  | void **end); | 
|  |  | 
|  | /// Performs shadow memory cleanup of the current thread's stack before a | 
|  | /// function marked with the <c>[[noreturn]]</c> attribute is called. | 
|  | /// | 
|  | /// To avoid false positives on the stack, must be called before no-return | 
|  | /// functions like <c>_exit()</c> and <c>execl()</c>. | 
|  | void __asan_handle_no_return(void); | 
|  |  | 
|  | /// Update allocation stack trace for the given allocation to the current stack | 
|  | /// trace. Returns 1 if successful, 0 if not. | 
|  | int __asan_update_allocation_context(void* addr); | 
|  |  | 
|  | #ifdef __cplusplus | 
|  | }  // extern "C" | 
|  | #endif | 
|  |  | 
|  | #endif  // SANITIZER_ASAN_INTERFACE_H |