1 //===-- ubsan_diag.cpp ----------------------------------------------------===//
3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4 // See https://llvm.org/LICENSE.txt for license information.
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
7 //===----------------------------------------------------------------------===//
9 // Diagnostic reporting for the UBSan runtime.
11 //===----------------------------------------------------------------------===//
13 #include "ubsan_platform.h"
15 #include "ubsan_diag.h"
16 #include "ubsan_init.h"
17 #include "ubsan_flags.h"
18 #include "ubsan_monitor.h"
19 #include "sanitizer_common/sanitizer_placement_new.h"
20 #include "sanitizer_common/sanitizer_report_decorator.h"
21 #include "sanitizer_common/sanitizer_stacktrace.h"
22 #include "sanitizer_common/sanitizer_stacktrace_printer.h"
23 #include "sanitizer_common/sanitizer_suppressions.h"
24 #include "sanitizer_common/sanitizer_symbolizer.h"
27 using namespace __ubsan
;
29 // UBSan is combined with runtimes that already provide this functionality
30 // (e.g., ASan) as well as runtimes that lack it (e.g., scudo). Tried to use
31 // weak linkage to resolve this issue which is not portable and breaks on
33 // TODO(yln): This is a temporary workaround. GetStackTrace functions will be
34 // removed in the future.
35 void ubsan_GetStackTrace(BufferedStackTrace
*stack
, uptr max_depth
, uptr pc
,
36 uptr bp
, void *context
, bool request_fast
) {
39 GetThreadStackTopAndBottom(false, &top
, &bottom
);
40 bool fast
= StackTrace::WillUseFastUnwind(request_fast
);
41 stack
->Unwind(max_depth
, pc
, bp
, context
, top
, bottom
, fast
);
44 static void MaybePrintStackTrace(uptr pc
, uptr bp
) {
45 // We assume that flags are already parsed, as UBSan runtime
46 // will definitely be called when we print the first diagnostics message.
47 if (!flags()->print_stacktrace
)
50 BufferedStackTrace stack
;
51 ubsan_GetStackTrace(&stack
, kStackTraceMax
, pc
, bp
, nullptr,
52 common_flags()->fast_unwind_on_fatal
);
56 static const char *ConvertTypeToString(ErrorType Type
) {
58 #define UBSAN_CHECK(Name, SummaryKind, FSanitizeFlagName) \
59 case ErrorType::Name: \
61 #include "ubsan_checks.inc"
64 UNREACHABLE("unknown ErrorType!");
67 static const char *ConvertTypeToFlagName(ErrorType Type
) {
69 #define UBSAN_CHECK(Name, SummaryKind, FSanitizeFlagName) \
70 case ErrorType::Name: \
71 return FSanitizeFlagName;
72 #include "ubsan_checks.inc"
75 UNREACHABLE("unknown ErrorType!");
78 static void MaybeReportErrorSummary(Location Loc
, ErrorType Type
) {
79 if (!common_flags()->print_summary
)
81 if (!flags()->report_error_type
)
82 Type
= ErrorType::GenericUB
;
83 const char *ErrorKind
= ConvertTypeToString(Type
);
84 if (Loc
.isSourceLocation()) {
85 SourceLocation SLoc
= Loc
.getSourceLocation();
86 if (!SLoc
.isInvalid()) {
88 AI
.file
= internal_strdup(SLoc
.getFilename());
89 AI
.line
= SLoc
.getLine();
90 AI
.column
= SLoc
.getColumn();
91 AI
.function
= internal_strdup(""); // Avoid printing ?? as function name.
92 ReportErrorSummary(ErrorKind
, AI
, GetSanititizerToolName());
96 } else if (Loc
.isSymbolizedStack()) {
97 const AddressInfo
&AI
= Loc
.getSymbolizedStack()->info
;
98 ReportErrorSummary(ErrorKind
, AI
, GetSanititizerToolName());
101 ReportErrorSummary(ErrorKind
, GetSanititizerToolName());
105 class Decorator
: public SanitizerCommonDecorator
{
107 Decorator() : SanitizerCommonDecorator() {}
108 const char *Highlight() const { return Green(); }
109 const char *Note() const { return Black(); }
113 SymbolizedStack
*__ubsan::getSymbolizedLocation(uptr PC
) {
114 InitAsStandaloneIfNecessary();
115 return Symbolizer::GetOrInit()->SymbolizePC(PC
);
118 Diag
&Diag::operator<<(const TypeDescriptor
&V
) {
119 return AddArg(V
.getTypeName());
122 Diag
&Diag::operator<<(const Value
&V
) {
123 if (V
.getType().isSignedIntegerTy())
124 AddArg(V
.getSIntValue());
125 else if (V
.getType().isUnsignedIntegerTy())
126 AddArg(V
.getUIntValue());
127 else if (V
.getType().isFloatTy())
128 AddArg(V
.getFloatValue());
134 /// Hexadecimal printing for numbers too large for Printf to handle directly.
135 static void RenderHex(InternalScopedString
*Buffer
, UIntMax Val
) {
137 Buffer
->AppendF("0x%08x%08x%08x%08x", (unsigned int)(Val
>> 96),
138 (unsigned int)(Val
>> 64), (unsigned int)(Val
>> 32),
139 (unsigned int)(Val
));
141 UNREACHABLE("long long smaller than 64 bits?");
145 static void RenderLocation(InternalScopedString
*Buffer
, Location Loc
) {
146 switch (Loc
.getKind()) {
147 case Location::LK_Source
: {
148 SourceLocation SLoc
= Loc
.getSourceLocation();
149 if (SLoc
.isInvalid())
150 Buffer
->AppendF("<unknown>");
152 StackTracePrinter::GetOrInit()->RenderSourceLocation(
153 Buffer
, SLoc
.getFilename(), SLoc
.getLine(), SLoc
.getColumn(),
154 common_flags()->symbolize_vs_style
,
155 common_flags()->strip_path_prefix
);
158 case Location::LK_Memory
:
159 Buffer
->AppendF("%p", reinterpret_cast<void *>(Loc
.getMemoryLocation()));
161 case Location::LK_Symbolized
: {
162 const AddressInfo
&Info
= Loc
.getSymbolizedStack()->info
;
164 StackTracePrinter::GetOrInit()->RenderSourceLocation(
165 Buffer
, Info
.file
, Info
.line
, Info
.column
,
166 common_flags()->symbolize_vs_style
,
167 common_flags()->strip_path_prefix
);
168 else if (Info
.module
)
169 StackTracePrinter::GetOrInit()->RenderModuleLocation(
170 Buffer
, Info
.module
, Info
.module_offset
, Info
.module_arch
,
171 common_flags()->strip_path_prefix
);
173 Buffer
->AppendF("%p", reinterpret_cast<void *>(Info
.address
));
176 case Location::LK_Null
:
177 Buffer
->AppendF("<unknown>");
182 static void RenderText(InternalScopedString
*Buffer
, const char *Message
,
183 const Diag::Arg
*Args
) {
184 for (const char *Msg
= Message
; *Msg
; ++Msg
) {
186 Buffer
->AppendF("%c", *Msg
);
189 const Diag::Arg
&A
= Args
[*++Msg
- '0'];
191 case Diag::AK_String
:
192 Buffer
->AppendF("%s", A
.String
);
194 case Diag::AK_TypeName
: {
195 if (SANITIZER_WINDOWS
)
196 // The Windows implementation demangles names early.
197 Buffer
->AppendF("'%s'", A
.String
);
199 Buffer
->AppendF("'%s'", Symbolizer::GetOrInit()->Demangle(A
.String
));
203 // 'long long' is guaranteed to be at least 64 bits wide.
204 if (A
.SInt
>= INT64_MIN
&& A
.SInt
<= INT64_MAX
)
205 Buffer
->AppendF("%lld", (long long)A
.SInt
);
207 RenderHex(Buffer
, A
.SInt
);
210 if (A
.UInt
<= UINT64_MAX
)
211 Buffer
->AppendF("%llu", (unsigned long long)A
.UInt
);
213 RenderHex(Buffer
, A
.UInt
);
215 case Diag::AK_Float
: {
216 // FIXME: Support floating-point formatting in sanitizer_common's
217 // printf, and stop using snprintf here.
218 char FloatBuffer
[32];
219 #if SANITIZER_WINDOWS
220 // On MSVC platforms, long doubles are equal to regular doubles.
221 // In MinGW environments on x86, long doubles are 80 bit, but here,
222 // we're calling an MS CRT provided printf function which considers
223 // long doubles to be 64 bit. Just cast the float value to a regular
224 // double to avoid the potential ambiguity in MinGW mode.
225 sprintf_s(FloatBuffer
, sizeof(FloatBuffer
), "%g", (double)A
.Float
);
227 snprintf(FloatBuffer
, sizeof(FloatBuffer
), "%Lg", (long double)A
.Float
);
229 Buffer
->Append(FloatBuffer
);
232 case Diag::AK_Pointer
:
233 Buffer
->AppendF("%p", A
.Pointer
);
239 /// Find the earliest-starting range in Ranges which ends after Loc.
240 static Range
*upperBound(MemoryLocation Loc
, Range
*Ranges
,
241 unsigned NumRanges
) {
243 for (unsigned I
= 0; I
!= NumRanges
; ++I
)
244 if (Ranges
[I
].getEnd().getMemoryLocation() > Loc
&&
246 Best
->getStart().getMemoryLocation() >
247 Ranges
[I
].getStart().getMemoryLocation()))
252 static inline uptr
subtractNoOverflow(uptr LHS
, uptr RHS
) {
253 return (LHS
< RHS
) ? 0 : LHS
- RHS
;
256 static inline uptr
addNoOverflow(uptr LHS
, uptr RHS
) {
257 const uptr Limit
= (uptr
)-1;
258 return (LHS
> Limit
- RHS
) ? Limit
: LHS
+ RHS
;
261 /// Render a snippet of the address space near a location.
262 static void PrintMemorySnippet(const Decorator
&Decor
, MemoryLocation Loc
,
263 Range
*Ranges
, unsigned NumRanges
,
264 const Diag::Arg
*Args
) {
265 // Show at least the 8 bytes surrounding Loc.
266 const unsigned MinBytesNearLoc
= 4;
267 MemoryLocation Min
= subtractNoOverflow(Loc
, MinBytesNearLoc
);
268 MemoryLocation Max
= addNoOverflow(Loc
, MinBytesNearLoc
);
269 MemoryLocation OrigMin
= Min
;
270 for (unsigned I
= 0; I
< NumRanges
; ++I
) {
271 Min
= __sanitizer::Min(Ranges
[I
].getStart().getMemoryLocation(), Min
);
272 Max
= __sanitizer::Max(Ranges
[I
].getEnd().getMemoryLocation(), Max
);
275 // If we have too many interesting bytes, prefer to show bytes after Loc.
276 const unsigned BytesToShow
= 32;
277 if (Max
- Min
> BytesToShow
)
278 Min
= __sanitizer::Min(Max
- BytesToShow
, OrigMin
);
279 Max
= addNoOverflow(Min
, BytesToShow
);
281 if (!IsAccessibleMemoryRange(Min
, Max
- Min
)) {
282 Printf("<memory cannot be printed>\n");
287 InternalScopedString Buffer
;
288 for (uptr P
= Min
; P
!= Max
; ++P
) {
289 unsigned char C
= *reinterpret_cast<const unsigned char*>(P
);
290 Buffer
.AppendF("%s%02x", (P
% 8 == 0) ? " " : " ", C
);
292 Buffer
.AppendF("\n");
295 Buffer
.Append(Decor
.Highlight());
296 Range
*InRange
= upperBound(Min
, Ranges
, NumRanges
);
297 for (uptr P
= Min
; P
!= Max
; ++P
) {
298 char Pad
= ' ', Byte
= ' ';
299 if (InRange
&& InRange
->getEnd().getMemoryLocation() == P
)
300 InRange
= upperBound(P
, Ranges
, NumRanges
);
301 if (!InRange
&& P
> Loc
)
303 if (InRange
&& InRange
->getStart().getMemoryLocation() < P
)
305 if (InRange
&& InRange
->getStart().getMemoryLocation() <= P
)
308 Buffer
.AppendF("%c", Pad
);
309 Buffer
.AppendF("%c", Pad
);
310 Buffer
.AppendF("%c", P
== Loc
? '^' : Byte
);
311 Buffer
.AppendF("%c", Byte
);
313 Buffer
.AppendF("%s\n", Decor
.Default());
315 // Go over the line again, and print names for the ranges.
318 for (uptr P
= Min
; P
!= Max
; ++P
) {
319 if (!InRange
|| InRange
->getEnd().getMemoryLocation() == P
)
320 InRange
= upperBound(P
, Ranges
, NumRanges
);
324 Spaces
+= (P
% 8) == 0 ? 2 : 1;
326 if (InRange
&& InRange
->getStart().getMemoryLocation() == P
) {
329 RenderText(&Buffer
, InRange
->getText(), Args
);
330 Buffer
.AppendF("\n");
331 // FIXME: We only support naming one range for now!
338 Printf("%s", Buffer
.data());
339 // FIXME: Print names for anything we can identify within the line:
341 // * If we can identify the memory itself as belonging to a particular
342 // global, stack variable, or dynamic allocation, then do so.
344 // * If we have a pointer-size, pointer-aligned range highlighted,
345 // determine whether the value of that range is a pointer to an
346 // entity which we can name, and if so, print that name.
348 // This needs an external symbolizer, or (preferably) ASan instrumentation.
352 // All diagnostics should be printed under report mutex.
353 ScopedReport::CheckLocked();
355 InternalScopedString Buffer
;
357 // Prepare a report that a monitor process can inspect.
358 if (Level
== DL_Error
) {
359 RenderText(&Buffer
, Message
, Args
);
360 UndefinedBehaviorReport UBR
{ConvertTypeToString(ET
), Loc
, Buffer
};
364 Buffer
.Append(Decor
.Bold());
365 RenderLocation(&Buffer
, Loc
);
370 Buffer
.AppendF("%s runtime error: %s%s", Decor
.Warning(), Decor
.Default(),
375 Buffer
.AppendF("%s note: %s", Decor
.Note(), Decor
.Default());
379 RenderText(&Buffer
, Message
, Args
);
381 Buffer
.AppendF("%s\n", Decor
.Default());
382 Printf("%s", Buffer
.data());
384 if (Loc
.isMemoryLocation())
385 PrintMemorySnippet(Decor
, Loc
.getMemoryLocation(), Ranges
, NumRanges
, Args
);
388 ScopedReport::Initializer::Initializer() { InitAsStandaloneIfNecessary(); }
390 ScopedReport::ScopedReport(ReportOptions Opts
, Location SummaryLoc
,
392 : Opts(Opts
), SummaryLoc(SummaryLoc
), Type(Type
) {}
394 ScopedReport::~ScopedReport() {
395 MaybePrintStackTrace(Opts
.pc
, Opts
.bp
);
396 MaybeReportErrorSummary(SummaryLoc
, Type
);
398 if (common_flags()->print_module_map
>= 2)
401 if (flags()->halt_on_error
)
405 ALIGNED(64) static char suppression_placeholder
[sizeof(SuppressionContext
)];
406 static SuppressionContext
*suppression_ctx
= nullptr;
407 static const char kVptrCheck
[] = "vptr_check";
408 static const char *kSuppressionTypes
[] = {
409 #define UBSAN_CHECK(Name, SummaryKind, FSanitizeFlagName) FSanitizeFlagName,
410 #include "ubsan_checks.inc"
415 void __ubsan::InitializeSuppressions() {
416 CHECK_EQ(nullptr, suppression_ctx
);
417 suppression_ctx
= new (suppression_placeholder
)
418 SuppressionContext(kSuppressionTypes
, ARRAY_SIZE(kSuppressionTypes
));
419 suppression_ctx
->ParseFromFile(flags()->suppressions
);
422 bool __ubsan::IsVptrCheckSuppressed(const char *TypeName
) {
423 InitAsStandaloneIfNecessary();
424 CHECK(suppression_ctx
);
426 return suppression_ctx
->Match(TypeName
, kVptrCheck
, &s
);
429 bool __ubsan::IsPCSuppressed(ErrorType ET
, uptr PC
, const char *Filename
) {
430 InitAsStandaloneIfNecessary();
431 CHECK(suppression_ctx
);
432 const char *SuppType
= ConvertTypeToFlagName(ET
);
433 // Fast path: don't symbolize PC if there is no suppressions for given UB
435 if (!suppression_ctx
->HasSuppressionType(SuppType
))
437 Suppression
*s
= nullptr;
438 // Suppress by file name known to runtime.
439 if (Filename
!= nullptr && suppression_ctx
->Match(Filename
, SuppType
, &s
))
441 // Suppress by module name.
442 if (const char *Module
= Symbolizer::GetOrInit()->GetModuleNameForPc(PC
)) {
443 if (suppression_ctx
->Match(Module
, SuppType
, &s
))
446 // Suppress by function or source file name from debug info.
447 SymbolizedStackHolder
Stack(Symbolizer::GetOrInit()->SymbolizePC(PC
));
448 const AddressInfo
&AI
= Stack
.get()->info
;
449 return suppression_ctx
->Match(AI
.function
, SuppType
, &s
) ||
450 suppression_ctx
->Match(AI
.file
, SuppType
, &s
);
453 #endif // CAN_SANITIZE_UB