]> git.saurik.com Git - apple/xnu.git/blame - tools/lldbmacros/kasan.py
xnu-4570.51.1.tar.gz
[apple/xnu.git] / tools / lldbmacros / kasan.py
CommitLineData
5ba3f43e
A
1from xnu import *
2from utils import *
3from core.configuration import *
4
5shift = None
6
7shadow_strings = {
8 0x00: 'VALID',
9 0x01: 'PARTIAL1',
10 0x02: 'PARTIAL2',
11 0x03: 'PARTIAL3',
12 0x04: 'PARTIAL4',
13 0x05: 'PARTIAL5',
14 0x06: 'PARTIAL6',
15 0x07: 'PARTIAL7',
16 0xac: 'ARRAY_COOKIE',
17 0xf0: 'STACK_RZ',
18 0xf1: 'STACK_LEFT_RZ',
19 0xf2: 'STACK_MID_RZ',
20 0xf3: 'STACK_RIGHT_RZ',
21 0xf5: 'STACK_FREED',
22 0xf8: 'STACK_OOSCOPE',
23 0xf9: 'GLOBAL_RZ',
24 0xe9: 'HEAP_RZ',
25 0xfa: 'HEAP_LEFT_RZ',
26 0xfb: 'HEAP_RIGHT_RZ',
27 0xfd: 'HEAP_FREED'
28}
29
30def is_kasan_build():
31 try:
32 enable = kern.globals.kasan_enabled
33 return True
34 except ValueError, e:
35 return False
36
37def shadow_for_address(addr, shift):
38 return ((addr >> 3) + shift)
39
40def address_for_shadow(addr, shift):
41 return ((addr - shift) << 3)
42
43def get_shadow_byte(shadow_addr):
44 return unsigned(kern.GetValueFromAddress(shadow_addr, 'uint8_t *')[0])
45
46def print_legend():
47 for (k,v) in shadow_strings.iteritems():
48 print " {:02x}: {}".format(k,v)
49
50def print_shadow_context(addr, context):
51 addr = shadow_for_address(addr, shift)
52 base = (addr & ~0xf) - 16 * context
53 shadow = kern.GetValueFromAddress(unsigned(base), "uint8_t *")
54
55 print " "*17 + " 0 1 2 3 4 5 6 7 8 9 a b c d e f"
56 for x in range(0, 2*context+1):
57 vals = ""
58 l = " "
59 for y in xrange(x*16, (x+1)*16):
60 r = " "
61 if base+y == addr:
62 l = "["
63 r = "]"
64 elif base+y+1 == addr:
65 r = ""
66 sh = shadow[y]
67 vals += "{}{:02x}{}".format(l, sh, r)
68 l = ""
69 print("{:x}:{}".format(base + 16*x, vals))
70
71kasan_guard_size = 16
72def print_alloc_free_entry(addr, orig_ptr):
73 h = kern.GetValueFromAddress(addr, 'struct freelist_entry *')
74 asz = unsigned(h.size)
75 usz = unsigned(h.user_size)
76 pgsz = unsigned(kern.globals.page_size)
77
78 if h.zone:
79 zone = h.zone
80 if str(zone.zone_name).startswith("fakestack"):
81 alloc_type = "fakestack"
82 leftrz = 16
83 else:
84 alloc_type = "zone"
85 leftrz = unsigned(zone.kasan_redzone)
86 else:
87 alloc_type = "kalloc"
88 if asz - usz >= 2*pgsz:
89 leftrz = pgsz
90 else:
91 leftrz = kasan_guard_size
92
93 rightrz = asz - usz - leftrz
94
95 print "Freed {} object".format(alloc_type)
96 print "Valid range: 0x{:x} -- 0x{:x} ({} bytes)".format(addr + leftrz, addr + leftrz + usz - 1, usz)
97 print "Total range: 0x{:x} -- 0x{:x} ({} bytes)".format(addr, addr + asz - 1, asz)
98 print "Offset: {} bytes".format(orig_ptr - addr - leftrz)
99 print "Redzone: {} / {} bytes".format(leftrz, rightrz)
100 if h.zone:
101 print "Zone: 0x{:x} <{:s}>".format(unsigned(zone), zone.zone_name)
102
103 btframes = unsigned(h.frames)
104 if btframes > 0:
105 print "",
106 print "Free site backtrace ({} frames):".format(btframes)
107 for i in xrange(0, btframes):
108 fr = unsigned(kern.globals.vm_kernel_slid_base) + unsigned(h.backtrace[i])
109 print " #{:}: {}".format(btframes-i-1, GetSourceInformationForAddress(fr))
110
111 print "",
112 print_hexdump(addr, asz, 0)
113
114alloc_header_sz = 16
115
a39ff7e2
A
116def magic_for_addr(addr, xor):
117 magic = addr & 0xffff
118 magic ^= (addr >> 16) & 0xffff
119 magic ^= (addr >> 32) & 0xffff
120 magic ^= (addr >> 48) & 0xffff
121 magic ^= xor
122 return magic
123
5ba3f43e
A
124def print_alloc_info(_addr):
125 addr = (_addr & ~0x7)
126
127 _shp = shadow_for_address(_addr, shift)
128 _shbyte = get_shadow_byte(_shp)
129 _shstr = shadow_byte_to_string(_shbyte)
130
131 # If we're in a left redzone, scan to the start of the real allocation, where
132 # the header should live
133 shbyte = _shbyte
134 while shbyte == 0xfa:
135 addr += 8
136 shbyte = get_shadow_byte(shadow_for_address(addr, shift))
137
138 # Search backwards for an allocation
139 searchbytes = 0
140 while searchbytes < 8*4096:
141
142 shp = shadow_for_address(addr, shift)
143 shbyte = get_shadow_byte(shp)
144 shstr = shadow_byte_to_string(shbyte)
145
146 headerp = addr - alloc_header_sz
147 liveh = kern.GetValueFromAddress(headerp, 'struct kasan_alloc_header *')
148 freeh = kern.GetValueFromAddress(addr, 'struct freelist_entry *')
149
150 # heap allocations should only ever have these shadow values
151 if shbyte not in (0,1,2,3,4,5,6,7, 0xfa, 0xfb, 0xfd, 0xf5):
152 print "No allocation found at 0x{:x} (found shadow {:x})".format(_addr, shbyte)
153 return
154
a39ff7e2 155 if magic_for_addr(addr, 0x3a65) == unsigned(liveh.magic):
5ba3f43e
A
156 usz = unsigned(liveh.user_size)
157 asz = unsigned(liveh.alloc_size)
158 leftrz = unsigned(liveh.left_rz)
159 base = headerp + alloc_header_sz - leftrz
160
161 if _addr >= base and _addr < base + asz:
162 footer = kern.GetValueFromAddress(addr + usz, 'struct kasan_alloc_footer *')
163 rightrz = asz - usz - leftrz
a39ff7e2 164 offset = _addr - addr
5ba3f43e
A
165
166 print "Live heap object"
167 print "Valid range: 0x{:x} -- 0x{:x} ({} bytes)".format(addr, addr + usz - 1, usz)
168 print "Total range: 0x{:x} -- 0x{:x} ({} bytes)".format(base, base + asz - 1, asz)
a39ff7e2 169 print "Offset: {} bytes (shadow: 0x{:02x} {}, remaining: {} bytes)".format(offset, _shbyte, _shstr, usz - offset)
5ba3f43e
A
170 print "Redzone: {} / {} bytes".format(leftrz, rightrz)
171
172 btframes = unsigned(liveh.frames)
173 print "",
174 print "Alloc site backtrace ({} frames):".format(btframes)
175 for i in xrange(0, btframes):
176 fr = unsigned(kern.globals.vm_kernel_slid_base) + unsigned(footer.backtrace[i])
177 print " #{:}: {}".format(btframes-i-1, GetSourceInformationForAddress(fr))
178
179 print "",
180 print_hexdump(base, asz, 0)
181 return
182
a39ff7e2 183 elif magic_for_addr(addr, 0xf233) == unsigned(freeh.magic):
5ba3f43e
A
184 asz = unsigned(freeh.size)
185 if _addr >= addr and _addr < addr + asz:
186 print_alloc_free_entry(addr, _addr)
187 return
188
189 searchbytes += 8
190 addr -= 8
191
192 print "No allocation found at 0x{:x}".format(_addr)
193
194def shadow_byte_to_string(sb):
195 return shadow_strings.get(sb, '??')
196
197def print_whatis(_addr, ctx):
198 addr = _addr & ~0x7
199 total_size = 0
200 base = None
201 leftrz = None
202 rightrz = None
203 extra = "Live"
204
205 shbyte = get_shadow_byte(shadow_for_address(addr, shift))
206 maxsearch = 4096 * 2
207
208 if shbyte in [0xfa, 0xfb, 0xfd, 0xf5]:
209 print_alloc_info(_addr)
210 return
211
212 if shbyte not in [0,1,2,3,4,5,6,7,0xf8]:
213 print "Poisoned memory, shadow {:x} [{}]".format(shbyte, shadow_byte_to_string(shbyte))
214 return
215
216 if shbyte is 0xf8:
217 extra = "Out-of-scope"
218
219 # look for the base of the object
220 while shbyte in [0,1,2,3,4,5,6,7,0xf8]:
221 sz = 8 - shbyte
222 if shbyte is 0xf8:
223 sz = 8
224 total_size += sz
225 addr -= 8
226 shbyte = get_shadow_byte(shadow_for_address(addr, shift))
227 maxsearch -= 8
228 if maxsearch <= 0:
229 print "No object found"
230 return
231 base = addr + 8
232 leftrz = shbyte
233
234 # If we did not find a left/mid redzone, we aren't in an object
235 if leftrz not in [0xf1, 0xf2, 0xfa, 0xf9]:
236 print "No object found"
237 return
238
239 # now size the object
240 addr = (_addr & ~0x7) + 8
241 shbyte = get_shadow_byte(shadow_for_address(addr, shift))
242 while shbyte in [0,1,2,3,4,5,6,7,0xf8]:
243 sz = 8 - shbyte
244 if shbyte is 0xf8:
245 sz = 8
246 total_size += sz
247 addr += 8
248 shbyte = get_shadow_byte(shadow_for_address(addr, shift))
249 maxsearch -= 8
250 if maxsearch <= 0:
251 print "No object found"
252 return
253 rightrz = shbyte
254
255 # work out the type of the object from its redzone
256 objtype = "Unknown"
257 if leftrz == 0xf1 or leftrz == 0xf2:
258 objtype = "stack"
259 elif leftrz == 0xf9 and rightrz == 0xf9:
260 objtype = "global"
261 elif leftrz == 0xfa and rightrz == 0xfb:
262 print_alloc_info(_addr)
263 return
264
265 print "{} {} object".format(extra, objtype)
266 print "Valid range: 0x{:x} -- 0x{:x} ({} bytes)".format(base, base+total_size-1, total_size)
267 print "Offset: {} bytes".format(_addr - base)
268 print "",
269 print_hexdump(base, total_size, 0)
270
271def print_hexdump(base, size, ctx):
272 start = base - 16*ctx
273 size += size % 16
274 size = min(size + 16*2*ctx, 256)
275
276 try:
277 data_array = kern.GetValueFromAddress(start, "uint8_t *")
278 print_hex_data(data_array[0:size], start, "Hexdump")
279 except:
280 pass
281
282def kasan_subcommand(cmd, args, opts):
283 addr = None
284 if len(args) > 0:
285 addr = long(args[0], 0)
286
287 if cmd in ['a2s', 'toshadow', 'fromaddr', 'fromaddress']:
288 print "0x{:016x}".format(shadow_for_address(addr, shift))
289 elif cmd in ['s2a', 'toaddr', 'toaddress', 'fromshadow']:
290 print "0x{:016x}".format(address_for_shadow(addr, shift))
291 elif cmd == 'shadow':
292 shadow = shadow_for_address(addr, shift)
293 sb = get_shadow_byte(shadow)
294 print("0x{:02x} @ 0x{:016x} [{}]\n\n".format(sb, shadow, shadow_byte_to_string(sb)))
295 ctx = long(opts.get("-C", 5))
296 print_shadow_context(addr, ctx)
297 elif cmd == 'legend':
298 print_legend()
299 elif cmd == 'info':
300 pages_used = unsigned(kern.globals.shadow_pages_used)
301 pages_total = unsigned(kern.globals.shadow_pages_total)
302 nkexts = unsigned(kern.globals.kexts_loaded)
303 print "Offset: 0x{:016x}".format(shift)
304 print "Shadow used: {} / {} ({:.1f}%)".format(pages_used, pages_total, 100.0*pages_used/pages_total)
305 print "Kexts loaded: {}".format(nkexts)
306 elif cmd == 'whatis':
307 ctx = long(opts.get("-C", 1))
308 print_whatis(addr, ctx)
309 elif cmd == 'alloc' or cmd == 'heap':
310 print_alloc_info(addr)
311
312@lldb_command('kasan', 'C:')
313def Kasan(cmd_args=None, cmd_options={}):
314 """kasan <cmd> [opts..]
315
316 Commands:
317
318 info basic KASan information
319 shadow <addr> print shadow around 'addr'
320 heap <addr> show info about heap object at 'addr'
321 whatis <addr> print whatever KASan knows about address
322 toshadow <addr> convert address to shadow pointer
323 toaddr <shdw> convert shadow pointer to address
324 legend print a shadow byte table
325
326 -C <num> : num lines of context to show"""
327
328 if not is_kasan_build():
329 print "KASan not enabled in build"
330 return
331
332 if len(cmd_args) == 0:
333 print Kasan.__doc__
334 return
335
336 global shift
337 shift = unsigned(kern.globals.__asan_shadow_memory_dynamic_address)
338
339 # Since the VM is not aware of the KASan shadow mapping, accesses to it will
340 # fail. Setting kdp_read_io=1 avoids this check.
341 if GetConnectionProtocol() == "kdp" and unsigned(kern.globals.kdp_read_io) == 0:
342 print "Setting kdp_read_io=1 to allow KASan shadow reads"
343 if sizeof(kern.globals.kdp_read_io) == 4:
344 WriteInt32ToMemoryAddress(1, addressof(kern.globals.kdp_read_io))
345 elif sizeof(kern.globals.kdp_read_io) == 8:
346 WriteInt64ToMemoryAddress(1, addressof(kern.globals.kdp_read_io))
347 readio = unsigned(kern.globals.kdp_read_io)
348 assert readio == 1
349
350 return kasan_subcommand(cmd_args[0], cmd_args[1:], cmd_options)
351