<div dir="ltr">Thanks for the explanation, Vangelis.<div><br></div><div>It sounds like binary instrumentation would be the best approach for this, as this is pretty much exactly what msan does. If recompilation is not an option, then you might be able to get something to work via lldb, but I expect this to be _incredibly_ slow (like 1000x, or more). One thing I might consider in your place is some kind of a in-process solution. For instance, if you intercept mmap (via LD_PRELOAD or something) then you could set it map all anonymous memory (aka heap) as read-only. This way you'll get a SIGSEGV everytime somebody tries to write to that address. You could intercept that signal and do your analysis there. Assuming heap writes are not very common, this might even give you a reasonable performance.</div><div><br></div><div>But this is not going to be super easy either. The trickiest part here will be resuming the program -- you'll need to remap the page read-write, do a single step, and then set it to read-only again.</div><div><br></div><div>pl</div></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Fri, 7 Feb 2020 at 01:40, Vangelis Tsiatsianas <<a href="mailto:vangelists@icloud.com">vangelists@icloud.com</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div style="overflow-wrap: break-word;">Thank you for your thorough and timely response, Pavel! 🙂<div><br></div><div>Your suggestions might actually cover completely what I am attempting to achieve. </div><div><br></div><div>Unfortunately, I am not able to disclose the exact reason I need it, but I want to track all heap writes, in order to detect modifications in the heap and save both the old and the newly written value.</div><div><br></div><div>For now, this translates to tracking common x86 assembly instructions (<font face="FiraCode-Regular"><span style="font-style:normal">mov{l, w, d, q}</span></font>) for a single thread ―supporting more “exotic” instructions like SIMD, multiple architectures or threads is not currently a goal.</div><div><br></div><div>Another method could also be an <span style="color:rgb(0,0,0)">LLVM</span> instrumentation <span style="color:rgb(0,0,0)">pass,</span> however I would like to avoid recompiling and modifying the binary, thus I focus on LLDB, even if I end up missing a few writes that way.</div><div><br></div><div>I was initially looking for a more complete, cross-platform solution (see: <a href="http://lists.llvm.org/pipermail/llvm-dev/2019-November/136876.html" target="_blank">http://lists.llvm.org/pipermail/llvm-dev/2019-November/136876.html</a>), but the solution proved to be too time consuming for the timeframe I have available for my master’s (ending in March).</div><div><br></div><div><br></div><div>― Vangelis</div><div><br></div><div><div><br><blockquote type="cite"><div>On 7 Feb 2020, at 01:20, Pavel Labath <<a href="mailto:labath@google.com" target="_blank">labath@google.com</a>> wrote:</div><br><div><div dir="ltr">In general, getting this kind of information is pretty hard, so lldb does not offer you an out-of-the-box solution for it, but it does give you tools which you can use to approximate that.<div><br></div><div>If I wanted to do something like this, the first thing I'd try to do is run "image lookup -a 0xaddr". If this doesn't return anything then the address does not correspond to any known module. This rules out code, global variables, and similar. Then you can run through all of the threads and do a "memory region $SP", which will give you bounds of the memory allocation around the stack pointer. If your address is in one of these ranges, then it's a stack address. Otherwise, it's probably heap (though you can never be 100% sure of that).</div><div><br></div><div>However, it's not fully clear to me what it is that you're trying to do here. Maybe if you explain the higher level problem that you're trying to solve, we can come up with a better solution.</div><div><br></div><div>pl</div></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Thu, 6 Feb 2020 at 07:40, Vangelis Tsiatsianas via lldb-dev <<a href="mailto:lldb-dev@lists.llvm.org" target="_blank">lldb-dev@lists.llvm.org</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">Hi everyone,<br>
<br>
I am looking for a way to tell whether a memory address belongs to the heap or not.<br>
<br>
In other words, I would like to make sure that the address does not reside within any stack frame (even if the stack of the thread has been allocated in the heap) and that it’s not a global variable or instruction.<br>
<br>
Checking whether it is a valid or correctly allocated address or a memory-mapped file or register is not a goal, so accessing it in order to decide, at the risk of causing a segmentation fault, is an accepted solution.<br>
<br>
I have been thinking of manually checking the address against the boundaries of each active stack frame, the start and end of the instruction segment and the locations of all global variables.<br>
<br>
However, I would like to ask where there are better ways to approach this problem in LLDB.<br>
<br>
Thank you very much, advance! 🙂<br>
<br>
<br>
― Vangelis<br>
<br>
_______________________________________________<br>
lldb-dev mailing list<br>
<a href="mailto:lldb-dev@lists.llvm.org" target="_blank">lldb-dev@lists.llvm.org</a><br>
<a href="https://lists.llvm.org/cgi-bin/mailman/listinfo/lldb-dev" rel="noreferrer" target="_blank">https://lists.llvm.org/cgi-bin/mailman/listinfo/lldb-dev</a><br>
</blockquote></div>
</div></blockquote></div><br></div></div></blockquote></div>