Add -gno-strict-dwarf to dg-options in various btf enum tests
[official-gcc.git] / libsanitizer / ubsan / ubsan_handlers_cxx.cpp
blob0317a3d1428c8c52e79d2b4842048c8bfdb14b5d
1 //===-- ubsan_handlers_cxx.cpp --------------------------------------------===//
2 //
3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4 // See https://llvm.org/LICENSE.txt for license information.
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6 //
7 //===----------------------------------------------------------------------===//
8 //
9 // Error logging entry points for the UBSan runtime, which are only used for C++
10 // compilations. This file is permitted to use language features which require
11 // linking against a C++ ABI library.
13 //===----------------------------------------------------------------------===//
15 #include "ubsan_platform.h"
16 #if CAN_SANITIZE_UB
17 #include "ubsan_handlers.h"
18 #include "ubsan_handlers_cxx.h"
19 #include "ubsan_diag.h"
20 #include "ubsan_type_hash.h"
22 #include "sanitizer_common/sanitizer_common.h"
23 #include "sanitizer_common/sanitizer_suppressions.h"
25 using namespace __sanitizer;
26 using namespace __ubsan;
28 namespace __ubsan {
29 extern const char *const TypeCheckKinds[];
32 // Returns true if UBSan has printed an error report.
33 static bool HandleDynamicTypeCacheMiss(
34 DynamicTypeCacheMissData *Data, ValueHandle Pointer, ValueHandle Hash,
35 ReportOptions Opts) {
36 if (checkDynamicType((void*)Pointer, Data->TypeInfo, Hash))
37 // Just a cache miss. The type matches after all.
38 return false;
40 // Check if error report should be suppressed.
41 DynamicTypeInfo DTI = getDynamicTypeInfoFromObject((void*)Pointer);
42 if (DTI.isValid() && IsVptrCheckSuppressed(DTI.getMostDerivedTypeName()))
43 return false;
45 SourceLocation Loc = Data->Loc.acquire();
46 ErrorType ET = ErrorType::DynamicTypeMismatch;
47 if (ignoreReport(Loc, Opts, ET))
48 return false;
50 ScopedReport R(Opts, Loc, ET);
52 Diag(Loc, DL_Error, ET,
53 "%0 address %1 which does not point to an object of type %2")
54 << TypeCheckKinds[Data->TypeCheckKind] << (void*)Pointer << Data->Type;
56 // If possible, say what type it actually points to.
57 if (!DTI.isValid()) {
58 if (DTI.getOffset() < -VptrMaxOffsetToTop || DTI.getOffset() > VptrMaxOffsetToTop) {
59 Diag(Pointer, DL_Note, ET,
60 "object has a possibly invalid vptr: abs(offset to top) too big")
61 << TypeName(DTI.getMostDerivedTypeName())
62 << Range(Pointer, Pointer + sizeof(uptr), "possibly invalid vptr");
63 } else {
64 Diag(Pointer, DL_Note, ET, "object has invalid vptr")
65 << TypeName(DTI.getMostDerivedTypeName())
66 << Range(Pointer, Pointer + sizeof(uptr), "invalid vptr");
68 } else if (!DTI.getOffset())
69 Diag(Pointer, DL_Note, ET, "object is of type %0")
70 << TypeName(DTI.getMostDerivedTypeName())
71 << Range(Pointer, Pointer + sizeof(uptr), "vptr for %0");
72 else
73 // FIXME: Find the type at the specified offset, and include that
74 // in the note.
75 Diag(Pointer - DTI.getOffset(), DL_Note, ET,
76 "object is base class subobject at offset %0 within object of type %1")
77 << DTI.getOffset() << TypeName(DTI.getMostDerivedTypeName())
78 << TypeName(DTI.getSubobjectTypeName())
79 << Range(Pointer, Pointer + sizeof(uptr),
80 "vptr for %2 base class of %1");
81 return true;
84 void __ubsan::__ubsan_handle_dynamic_type_cache_miss(
85 DynamicTypeCacheMissData *Data, ValueHandle Pointer, ValueHandle Hash) {
86 GET_REPORT_OPTIONS(false);
87 HandleDynamicTypeCacheMiss(Data, Pointer, Hash, Opts);
89 void __ubsan::__ubsan_handle_dynamic_type_cache_miss_abort(
90 DynamicTypeCacheMissData *Data, ValueHandle Pointer, ValueHandle Hash) {
91 // Note: -fsanitize=vptr is always recoverable.
92 GET_REPORT_OPTIONS(false);
93 if (HandleDynamicTypeCacheMiss(Data, Pointer, Hash, Opts))
94 Die();
97 namespace __ubsan {
98 void __ubsan_handle_cfi_bad_type(CFICheckFailData *Data, ValueHandle Vtable,
99 bool ValidVtable, ReportOptions Opts) {
100 SourceLocation Loc = Data->Loc.acquire();
101 ErrorType ET = ErrorType::CFIBadType;
103 if (ignoreReport(Loc, Opts, ET))
104 return;
106 ScopedReport R(Opts, Loc, ET);
107 DynamicTypeInfo DTI = ValidVtable
108 ? getDynamicTypeInfoFromVtable((void *)Vtable)
109 : DynamicTypeInfo(0, 0, 0);
111 const char *CheckKindStr;
112 switch (Data->CheckKind) {
113 case CFITCK_VCall:
114 CheckKindStr = "virtual call";
115 break;
116 case CFITCK_NVCall:
117 CheckKindStr = "non-virtual call";
118 break;
119 case CFITCK_DerivedCast:
120 CheckKindStr = "base-to-derived cast";
121 break;
122 case CFITCK_UnrelatedCast:
123 CheckKindStr = "cast to unrelated type";
124 break;
125 case CFITCK_VMFCall:
126 CheckKindStr = "virtual pointer to member function call";
127 break;
128 case CFITCK_ICall:
129 case CFITCK_NVMFCall:
130 Die();
133 Diag(Loc, DL_Error, ET,
134 "control flow integrity check for type %0 failed during "
135 "%1 (vtable address %2)")
136 << Data->Type << CheckKindStr << (void *)Vtable;
138 // If possible, say what type it actually points to.
139 if (!DTI.isValid())
140 Diag(Vtable, DL_Note, ET, "invalid vtable");
141 else
142 Diag(Vtable, DL_Note, ET, "vtable is of type %0")
143 << TypeName(DTI.getMostDerivedTypeName());
145 // If the failure involved different DSOs for the check location and vtable,
146 // report the DSO names.
147 const char *DstModule = Symbolizer::GetOrInit()->GetModuleNameForPc(Vtable);
148 if (!DstModule)
149 DstModule = "(unknown)";
151 const char *SrcModule = Symbolizer::GetOrInit()->GetModuleNameForPc(Opts.pc);
152 if (!SrcModule)
153 SrcModule = "(unknown)";
155 if (internal_strcmp(SrcModule, DstModule))
156 Diag(Loc, DL_Note, ET, "check failed in %0, vtable located in %1")
157 << SrcModule << DstModule;
160 static bool handleFunctionTypeMismatch(FunctionTypeMismatchData *Data,
161 ValueHandle Function,
162 ValueHandle calleeRTTI,
163 ValueHandle fnRTTI, ReportOptions Opts) {
164 if (checkTypeInfoEquality(reinterpret_cast<void *>(calleeRTTI),
165 reinterpret_cast<void *>(fnRTTI)))
166 return false;
168 SourceLocation CallLoc = Data->Loc.acquire();
169 ErrorType ET = ErrorType::FunctionTypeMismatch;
171 if (ignoreReport(CallLoc, Opts, ET))
172 return true;
174 ScopedReport R(Opts, CallLoc, ET);
176 SymbolizedStackHolder FLoc(getSymbolizedLocation(Function));
177 const char *FName = FLoc.get()->info.function;
178 if (!FName)
179 FName = "(unknown)";
181 Diag(CallLoc, DL_Error, ET,
182 "call to function %0 through pointer to incorrect function type %1")
183 << FName << Data->Type;
184 Diag(FLoc, DL_Note, ET, "%0 defined here") << FName;
185 return true;
188 void __ubsan_handle_function_type_mismatch_v1(FunctionTypeMismatchData *Data,
189 ValueHandle Function,
190 ValueHandle calleeRTTI,
191 ValueHandle fnRTTI) {
192 GET_REPORT_OPTIONS(false);
193 handleFunctionTypeMismatch(Data, Function, calleeRTTI, fnRTTI, Opts);
196 void __ubsan_handle_function_type_mismatch_v1_abort(
197 FunctionTypeMismatchData *Data, ValueHandle Function,
198 ValueHandle calleeRTTI, ValueHandle fnRTTI) {
199 GET_REPORT_OPTIONS(true);
200 if (handleFunctionTypeMismatch(Data, Function, calleeRTTI, fnRTTI, Opts))
201 Die();
203 } // namespace __ubsan
205 #endif // CAN_SANITIZE_UB