1 //===-- sanitizer_printf.cc -----------------------------------------------===//
3 // This file is distributed under the University of Illinois Open Source
4 // License. See LICENSE.TXT for details.
6 //===----------------------------------------------------------------------===//
8 // This file is shared between AddressSanitizer and ThreadSanitizer.
10 // Internal printf function, used inside run-time libraries.
11 // We can't use libc printf because we intercept some of the functions used
13 //===----------------------------------------------------------------------===//
16 #include "sanitizer_common.h"
17 #include "sanitizer_flags.h"
18 #include "sanitizer_libc.h"
23 #if SANITIZER_WINDOWS && defined(_MSC_VER) && _MSC_VER < 1800 && \
25 # define va_copy(dst, src) ((dst) = (src))
28 namespace __sanitizer
{
30 StaticSpinMutex CommonSanitizerReportMutex
;
32 static int AppendChar(char **buff
, const char *buff_end
, char c
) {
33 if (*buff
< buff_end
) {
40 // Appends number in a given base to buffer. If its length is less than
41 // |minimal_num_length|, it is padded with leading zeroes or spaces, depending
42 // on the value of |pad_with_zero|.
43 static int AppendNumber(char **buff
, const char *buff_end
, u64 absolute_value
,
44 u8 base
, u8 minimal_num_length
, bool pad_with_zero
,
46 uptr
const kMaxLen
= 30;
47 RAW_CHECK(base
== 10 || base
== 16);
48 RAW_CHECK(base
== 10 || !negative
);
49 RAW_CHECK(absolute_value
|| !negative
);
50 RAW_CHECK(minimal_num_length
< kMaxLen
);
52 if (negative
&& minimal_num_length
)
54 if (negative
&& pad_with_zero
)
55 result
+= AppendChar(buff
, buff_end
, '-');
56 uptr num_buffer
[kMaxLen
];
59 RAW_CHECK_MSG((uptr
)pos
< kMaxLen
, "AppendNumber buffer overflow");
60 num_buffer
[pos
++] = absolute_value
% base
;
61 absolute_value
/= base
;
62 } while (absolute_value
> 0);
63 if (pos
< minimal_num_length
) {
64 // Make sure compiler doesn't insert call to memset here.
65 internal_memset(&num_buffer
[pos
], 0,
66 sizeof(num_buffer
[0]) * (minimal_num_length
- pos
));
67 pos
= minimal_num_length
;
71 for (; pos
>= 0 && num_buffer
[pos
] == 0; pos
--) {
72 char c
= (pad_with_zero
|| pos
== 0) ? '0' : ' ';
73 result
+= AppendChar(buff
, buff_end
, c
);
75 if (negative
&& !pad_with_zero
) result
+= AppendChar(buff
, buff_end
, '-');
76 for (; pos
>= 0; pos
--) {
77 char digit
= static_cast<char>(num_buffer
[pos
]);
78 result
+= AppendChar(buff
, buff_end
, (digit
< 10) ? '0' + digit
84 static int AppendUnsigned(char **buff
, const char *buff_end
, u64 num
, u8 base
,
85 u8 minimal_num_length
, bool pad_with_zero
) {
86 return AppendNumber(buff
, buff_end
, num
, base
, minimal_num_length
,
87 pad_with_zero
, false /* negative */);
90 static int AppendSignedDecimal(char **buff
, const char *buff_end
, s64 num
,
91 u8 minimal_num_length
, bool pad_with_zero
) {
92 bool negative
= (num
< 0);
93 return AppendNumber(buff
, buff_end
, (u64
)(negative
? -num
: num
), 10,
94 minimal_num_length
, pad_with_zero
, negative
);
97 static int AppendString(char **buff
, const char *buff_end
, int precision
,
103 if (precision
>= 0 && result
>= precision
)
105 result
+= AppendChar(buff
, buff_end
, *s
);
110 static int AppendPointer(char **buff
, const char *buff_end
, u64 ptr_value
) {
112 result
+= AppendString(buff
, buff_end
, -1, "0x");
113 result
+= AppendUnsigned(buff
, buff_end
, ptr_value
, 16,
114 SANITIZER_POINTER_FORMAT_LENGTH
, true);
118 int VSNPrintf(char *buff
, int buff_length
,
119 const char *format
, va_list args
) {
120 static const char *kPrintfFormatsHelp
=
121 "Supported Printf formats: %([0-9]*)?(z|ll)?{d,u,x}; %p; %(\\.\\*)?s; %c\n";
123 RAW_CHECK(buff_length
> 0);
124 const char *buff_end
= &buff
[buff_length
- 1];
125 const char *cur
= format
;
127 for (; *cur
; cur
++) {
129 result
+= AppendChar(&buff
, buff_end
, *cur
);
133 bool have_width
= (*cur
>= '0' && *cur
<= '9');
134 bool pad_with_zero
= (*cur
== '0');
137 while (*cur
>= '0' && *cur
<= '9') {
138 width
= width
* 10 + *cur
++ - '0';
141 bool have_precision
= (cur
[0] == '.' && cur
[1] == '*');
143 if (have_precision
) {
145 precision
= va_arg(args
, int);
147 bool have_z
= (*cur
== 'z');
149 bool have_ll
= !have_z
&& (cur
[0] == 'l' && cur
[1] == 'l');
153 bool have_flags
= have_width
| have_z
| have_ll
;
154 // Only %s supports precision for now
155 CHECK(!(precision
>= 0 && *cur
!= 's'));
158 dval
= have_ll
? va_arg(args
, s64
)
159 : have_z
? va_arg(args
, sptr
)
161 result
+= AppendSignedDecimal(&buff
, buff_end
, dval
, width
,
167 uval
= have_ll
? va_arg(args
, u64
)
168 : have_z
? va_arg(args
, uptr
)
169 : va_arg(args
, unsigned);
170 result
+= AppendUnsigned(&buff
, buff_end
, uval
,
171 (*cur
== 'u') ? 10 : 16, width
, pad_with_zero
);
175 RAW_CHECK_MSG(!have_flags
, kPrintfFormatsHelp
);
176 result
+= AppendPointer(&buff
, buff_end
, va_arg(args
, uptr
));
180 RAW_CHECK_MSG(!have_flags
, kPrintfFormatsHelp
);
181 result
+= AppendString(&buff
, buff_end
, precision
, va_arg(args
, char*));
185 RAW_CHECK_MSG(!have_flags
, kPrintfFormatsHelp
);
186 result
+= AppendChar(&buff
, buff_end
, va_arg(args
, int));
190 RAW_CHECK_MSG(!have_flags
, kPrintfFormatsHelp
);
191 result
+= AppendChar(&buff
, buff_end
, '%');
195 RAW_CHECK_MSG(false, kPrintfFormatsHelp
);
199 RAW_CHECK(buff
<= buff_end
);
200 AppendChar(&buff
, buff_end
+ 1, '\0');
204 static void (*PrintfAndReportCallback
)(const char *);
205 void SetPrintfAndReportCallback(void (*callback
)(const char *)) {
206 PrintfAndReportCallback
= callback
;
209 // Can be overriden in frontend.
210 #if SANITIZER_SUPPORTS_WEAK_HOOKS
211 SANITIZER_INTERFACE_ATTRIBUTE SANITIZER_WEAK_ATTRIBUTE
212 void OnPrint(const char *str
) {
215 #elif defined(SANITIZER_GO) && defined(TSAN_EXTERNAL_HOOKS)
216 void OnPrint(const char *str
);
218 void OnPrint(const char *str
) {
223 static void CallPrintfAndReportCallback(const char *str
) {
225 if (PrintfAndReportCallback
)
226 PrintfAndReportCallback(str
);
229 static void SharedPrintfCode(bool append_pid
, const char *format
,
232 va_copy(args2
, args
);
233 const int kLen
= 16 * 1024;
234 // |local_buffer| is small enough not to overflow the stack and/or violate
235 // the stack limit enforced by TSan (-Wframe-larger-than=512). On the other
236 // hand, the bigger the buffer is, the more the chance the error report will
238 char local_buffer
[400];
240 char *buffer
= local_buffer
;
241 int buffer_size
= ARRAY_SIZE(local_buffer
);
242 // First try to print a message using a local buffer, and then fall back to
244 for (int use_mmap
= 0; use_mmap
< 2; use_mmap
++) {
247 va_copy(args
, args2
);
248 buffer
= (char*)MmapOrDie(kLen
, "Report");
253 int pid
= internal_getpid();
254 needed_length
+= internal_snprintf(buffer
, buffer_size
, "==%d==", pid
);
255 if (needed_length
>= buffer_size
) {
256 // The pid doesn't fit into the current buffer.
259 RAW_CHECK_MSG(needed_length
< kLen
, "Buffer in Report is too short!\n");
262 needed_length
+= VSNPrintf(buffer
+ needed_length
,
263 buffer_size
- needed_length
, format
, args
);
264 if (needed_length
>= buffer_size
) {
265 // The message doesn't fit into the current buffer.
268 RAW_CHECK_MSG(needed_length
< kLen
, "Buffer in Report is too short!\n");
270 // If the message fit into the buffer, print it and exit.
274 AndroidLogWrite(buffer
);
275 CallPrintfAndReportCallback(buffer
);
276 // If we had mapped any memory, clean up.
277 if (buffer
!= local_buffer
)
278 UnmapOrDie((void *)buffer
, buffer_size
);
283 void Printf(const char *format
, ...) {
285 va_start(args
, format
);
286 SharedPrintfCode(false, format
, args
);
290 // Like Printf, but prints the current PID before the output string.
292 void Report(const char *format
, ...) {
294 va_start(args
, format
);
295 SharedPrintfCode(true, format
, args
);
299 // Writes at most "length" symbols to "buffer" (including trailing '\0').
300 // Returns the number of symbols that should have been written to buffer
301 // (not including trailing '\0'). Thus, the string is truncated
302 // iff return value is not less than "length".
304 int internal_snprintf(char *buffer
, uptr length
, const char *format
, ...) {
306 va_start(args
, format
);
307 int needed_length
= VSNPrintf(buffer
, length
, format
, args
);
309 return needed_length
;
313 void InternalScopedString::append(const char *format
, ...) {
314 CHECK_LT(length_
, size());
316 va_start(args
, format
);
317 VSNPrintf(data() + length_
, size() - length_
, format
, args
);
319 length_
+= internal_strlen(data() + length_
);
320 CHECK_LT(length_
, size());
323 } // namespace __sanitizer