Home | History | Annotate | Line # | Download | only in ubsan
      1  1.1  mrg //===-- ubsan_diag.cpp ----------------------------------------------------===//
      2  1.1  mrg //
      3  1.1  mrg // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
      4  1.1  mrg // See https://llvm.org/LICENSE.txt for license information.
      5  1.1  mrg // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
      6  1.1  mrg //
      7  1.1  mrg //===----------------------------------------------------------------------===//
      8  1.1  mrg //
      9  1.1  mrg // Diagnostic reporting for the UBSan runtime.
     10  1.1  mrg //
     11  1.1  mrg //===----------------------------------------------------------------------===//
     12  1.1  mrg 
     13  1.1  mrg #include "ubsan_platform.h"
     14  1.1  mrg #if CAN_SANITIZE_UB
     15  1.1  mrg #include "ubsan_diag.h"
     16  1.1  mrg #include "ubsan_init.h"
     17  1.1  mrg #include "ubsan_flags.h"
     18  1.1  mrg #include "ubsan_monitor.h"
     19  1.1  mrg #include "sanitizer_common/sanitizer_placement_new.h"
     20  1.1  mrg #include "sanitizer_common/sanitizer_report_decorator.h"
     21  1.1  mrg #include "sanitizer_common/sanitizer_stacktrace.h"
     22  1.1  mrg #include "sanitizer_common/sanitizer_stacktrace_printer.h"
     23  1.1  mrg #include "sanitizer_common/sanitizer_suppressions.h"
     24  1.1  mrg #include "sanitizer_common/sanitizer_symbolizer.h"
     25  1.1  mrg #include <stdio.h>
     26  1.1  mrg 
     27  1.1  mrg using namespace __ubsan;
     28  1.1  mrg 
     29  1.1  mrg // UBSan is combined with runtimes that already provide this functionality
     30  1.1  mrg // (e.g., ASan) as well as runtimes that lack it (e.g., scudo). Tried to use
     31  1.1  mrg // weak linkage to resolve this issue which is not portable and breaks on
     32  1.1  mrg // Windows.
     33  1.1  mrg // TODO(yln): This is a temporary workaround. GetStackTrace functions will be
     34  1.1  mrg // removed in the future.
     35  1.1  mrg void ubsan_GetStackTrace(BufferedStackTrace *stack, uptr max_depth,
     36  1.1  mrg                          uptr pc, uptr bp, void *context, bool fast) {
     37  1.1  mrg   uptr top = 0;
     38  1.1  mrg   uptr bottom = 0;
     39  1.1  mrg   if (StackTrace::WillUseFastUnwind(fast)) {
     40  1.1  mrg     GetThreadStackTopAndBottom(false, &top, &bottom);
     41  1.1  mrg     stack->Unwind(max_depth, pc, bp, nullptr, top, bottom, true);
     42  1.1  mrg   } else
     43  1.1  mrg     stack->Unwind(max_depth, pc, bp, context, 0, 0, false);
     44  1.1  mrg }
     45  1.1  mrg 
     46  1.1  mrg static void MaybePrintStackTrace(uptr pc, uptr bp) {
     47  1.1  mrg   // We assume that flags are already parsed, as UBSan runtime
     48  1.1  mrg   // will definitely be called when we print the first diagnostics message.
     49  1.1  mrg   if (!flags()->print_stacktrace)
     50  1.1  mrg     return;
     51  1.1  mrg 
     52  1.1  mrg   BufferedStackTrace stack;
     53  1.1  mrg   ubsan_GetStackTrace(&stack, kStackTraceMax, pc, bp, nullptr,
     54  1.1  mrg                 common_flags()->fast_unwind_on_fatal);
     55  1.1  mrg   stack.Print();
     56  1.1  mrg }
     57  1.1  mrg 
     58  1.1  mrg static const char *ConvertTypeToString(ErrorType Type) {
     59  1.1  mrg   switch (Type) {
     60  1.1  mrg #define UBSAN_CHECK(Name, SummaryKind, FSanitizeFlagName)                      \
     61  1.1  mrg   case ErrorType::Name:                                                        \
     62  1.1  mrg     return SummaryKind;
     63  1.1  mrg #include "ubsan_checks.inc"
     64  1.1  mrg #undef UBSAN_CHECK
     65  1.1  mrg   }
     66  1.1  mrg   UNREACHABLE("unknown ErrorType!");
     67  1.1  mrg }
     68  1.1  mrg 
     69  1.1  mrg static const char *ConvertTypeToFlagName(ErrorType Type) {
     70  1.1  mrg   switch (Type) {
     71  1.1  mrg #define UBSAN_CHECK(Name, SummaryKind, FSanitizeFlagName)                      \
     72  1.1  mrg   case ErrorType::Name:                                                        \
     73  1.1  mrg     return FSanitizeFlagName;
     74  1.1  mrg #include "ubsan_checks.inc"
     75  1.1  mrg #undef UBSAN_CHECK
     76  1.1  mrg   }
     77  1.1  mrg   UNREACHABLE("unknown ErrorType!");
     78  1.1  mrg }
     79  1.1  mrg 
     80  1.1  mrg static void MaybeReportErrorSummary(Location Loc, ErrorType Type) {
     81  1.1  mrg   if (!common_flags()->print_summary)
     82  1.1  mrg     return;
     83  1.1  mrg   if (!flags()->report_error_type)
     84  1.1  mrg     Type = ErrorType::GenericUB;
     85  1.1  mrg   const char *ErrorKind = ConvertTypeToString(Type);
     86  1.1  mrg   if (Loc.isSourceLocation()) {
     87  1.1  mrg     SourceLocation SLoc = Loc.getSourceLocation();
     88  1.1  mrg     if (!SLoc.isInvalid()) {
     89  1.1  mrg       AddressInfo AI;
     90  1.1  mrg       AI.file = internal_strdup(SLoc.getFilename());
     91  1.1  mrg       AI.line = SLoc.getLine();
     92  1.1  mrg       AI.column = SLoc.getColumn();
     93  1.1  mrg       AI.function = internal_strdup("");  // Avoid printing ?? as function name.
     94  1.1  mrg       ReportErrorSummary(ErrorKind, AI, GetSanititizerToolName());
     95  1.1  mrg       AI.Clear();
     96  1.1  mrg       return;
     97  1.1  mrg     }
     98  1.1  mrg   } else if (Loc.isSymbolizedStack()) {
     99  1.1  mrg     const AddressInfo &AI = Loc.getSymbolizedStack()->info;
    100  1.1  mrg     ReportErrorSummary(ErrorKind, AI, GetSanititizerToolName());
    101  1.1  mrg     return;
    102  1.1  mrg   }
    103  1.1  mrg   ReportErrorSummary(ErrorKind, GetSanititizerToolName());
    104  1.1  mrg }
    105  1.1  mrg 
    106  1.1  mrg namespace {
    107  1.1  mrg class Decorator : public SanitizerCommonDecorator {
    108  1.1  mrg  public:
    109  1.1  mrg   Decorator() : SanitizerCommonDecorator() {}
    110  1.1  mrg   const char *Highlight() const { return Green(); }
    111  1.1  mrg   const char *Note() const { return Black(); }
    112  1.1  mrg };
    113  1.1  mrg }
    114  1.1  mrg 
    115  1.1  mrg SymbolizedStack *__ubsan::getSymbolizedLocation(uptr PC) {
    116  1.1  mrg   InitAsStandaloneIfNecessary();
    117  1.1  mrg   return Symbolizer::GetOrInit()->SymbolizePC(PC);
    118  1.1  mrg }
    119  1.1  mrg 
    120  1.1  mrg Diag &Diag::operator<<(const TypeDescriptor &V) {
    121  1.1  mrg   return AddArg(V.getTypeName());
    122  1.1  mrg }
    123  1.1  mrg 
    124  1.1  mrg Diag &Diag::operator<<(const Value &V) {
    125  1.1  mrg   if (V.getType().isSignedIntegerTy())
    126  1.1  mrg     AddArg(V.getSIntValue());
    127  1.1  mrg   else if (V.getType().isUnsignedIntegerTy())
    128  1.1  mrg     AddArg(V.getUIntValue());
    129  1.1  mrg   else if (V.getType().isFloatTy())
    130  1.1  mrg     AddArg(V.getFloatValue());
    131  1.1  mrg   else
    132  1.1  mrg     AddArg("<unknown>");
    133  1.1  mrg   return *this;
    134  1.1  mrg }
    135  1.1  mrg 
    136  1.1  mrg /// Hexadecimal printing for numbers too large for Printf to handle directly.
    137  1.1  mrg static void RenderHex(InternalScopedString *Buffer, UIntMax Val) {
    138  1.1  mrg #if HAVE_INT128_T
    139  1.1  mrg   Buffer->append("0x%08x%08x%08x%08x", (unsigned int)(Val >> 96),
    140  1.1  mrg                  (unsigned int)(Val >> 64), (unsigned int)(Val >> 32),
    141  1.1  mrg                  (unsigned int)(Val));
    142  1.1  mrg #else
    143  1.1  mrg   UNREACHABLE("long long smaller than 64 bits?");
    144  1.1  mrg #endif
    145  1.1  mrg }
    146  1.1  mrg 
    147  1.1  mrg static void RenderLocation(InternalScopedString *Buffer, Location Loc) {
    148  1.1  mrg   switch (Loc.getKind()) {
    149  1.1  mrg   case Location::LK_Source: {
    150  1.1  mrg     SourceLocation SLoc = Loc.getSourceLocation();
    151  1.1  mrg     if (SLoc.isInvalid())
    152  1.1  mrg       Buffer->append("<unknown>");
    153  1.1  mrg     else
    154  1.1  mrg       RenderSourceLocation(Buffer, SLoc.getFilename(), SLoc.getLine(),
    155  1.1  mrg                            SLoc.getColumn(), common_flags()->symbolize_vs_style,
    156  1.1  mrg                            common_flags()->strip_path_prefix);
    157  1.1  mrg     return;
    158  1.1  mrg   }
    159  1.1  mrg   case Location::LK_Memory:
    160  1.1  mrg     Buffer->append("%p", reinterpret_cast<void *>(Loc.getMemoryLocation()));
    161  1.1  mrg     return;
    162  1.1  mrg   case Location::LK_Symbolized: {
    163  1.1  mrg     const AddressInfo &Info = Loc.getSymbolizedStack()->info;
    164  1.1  mrg     if (Info.file)
    165  1.1  mrg       RenderSourceLocation(Buffer, Info.file, Info.line, Info.column,
    166  1.1  mrg                            common_flags()->symbolize_vs_style,
    167  1.1  mrg                            common_flags()->strip_path_prefix);
    168  1.1  mrg     else if (Info.module)
    169  1.1  mrg       RenderModuleLocation(Buffer, Info.module, Info.module_offset,
    170  1.1  mrg                            Info.module_arch, common_flags()->strip_path_prefix);
    171  1.1  mrg     else
    172  1.1  mrg       Buffer->append("%p", reinterpret_cast<void *>(Info.address));
    173  1.1  mrg     return;
    174  1.1  mrg   }
    175  1.1  mrg   case Location::LK_Null:
    176  1.1  mrg     Buffer->append("<unknown>");
    177  1.1  mrg     return;
    178  1.1  mrg   }
    179  1.1  mrg }
    180  1.1  mrg 
    181  1.1  mrg static void RenderText(InternalScopedString *Buffer, const char *Message,
    182  1.1  mrg                        const Diag::Arg *Args) {
    183  1.1  mrg   for (const char *Msg = Message; *Msg; ++Msg) {
    184  1.1  mrg     if (*Msg != '%') {
    185  1.1  mrg       Buffer->append("%c", *Msg);
    186  1.1  mrg       continue;
    187  1.1  mrg     }
    188  1.1  mrg     const Diag::Arg &A = Args[*++Msg - '0'];
    189  1.1  mrg     switch (A.Kind) {
    190  1.1  mrg     case Diag::AK_String:
    191  1.1  mrg       Buffer->append("%s", A.String);
    192  1.1  mrg       break;
    193  1.1  mrg     case Diag::AK_TypeName: {
    194  1.1  mrg       if (SANITIZER_WINDOWS)
    195  1.1  mrg         // The Windows implementation demangles names early.
    196  1.1  mrg         Buffer->append("'%s'", A.String);
    197  1.1  mrg       else
    198  1.1  mrg         Buffer->append("'%s'", Symbolizer::GetOrInit()->Demangle(A.String));
    199  1.1  mrg       break;
    200  1.1  mrg     }
    201  1.1  mrg     case Diag::AK_SInt:
    202  1.1  mrg       // 'long long' is guaranteed to be at least 64 bits wide.
    203  1.1  mrg       if (A.SInt >= INT64_MIN && A.SInt <= INT64_MAX)
    204  1.1  mrg         Buffer->append("%lld", (long long)A.SInt);
    205  1.1  mrg       else
    206  1.1  mrg         RenderHex(Buffer, A.SInt);
    207  1.1  mrg       break;
    208  1.1  mrg     case Diag::AK_UInt:
    209  1.1  mrg       if (A.UInt <= UINT64_MAX)
    210  1.1  mrg         Buffer->append("%llu", (unsigned long long)A.UInt);
    211  1.1  mrg       else
    212  1.1  mrg         RenderHex(Buffer, A.UInt);
    213  1.1  mrg       break;
    214  1.1  mrg     case Diag::AK_Float: {
    215  1.1  mrg       // FIXME: Support floating-point formatting in sanitizer_common's
    216  1.1  mrg       //        printf, and stop using snprintf here.
    217  1.1  mrg       char FloatBuffer[32];
    218  1.1  mrg #if SANITIZER_WINDOWS
    219  1.1  mrg       sprintf_s(FloatBuffer, sizeof(FloatBuffer), "%Lg", (long double)A.Float);
    220  1.1  mrg #else
    221  1.1  mrg       snprintf(FloatBuffer, sizeof(FloatBuffer), "%Lg", (long double)A.Float);
    222  1.1  mrg #endif
    223  1.1  mrg       Buffer->append("%s", FloatBuffer);
    224  1.1  mrg       break;
    225  1.1  mrg     }
    226  1.1  mrg     case Diag::AK_Pointer:
    227  1.1  mrg       Buffer->append("%p", A.Pointer);
    228  1.1  mrg       break;
    229  1.1  mrg     }
    230  1.1  mrg   }
    231  1.1  mrg }
    232  1.1  mrg 
    233  1.1  mrg /// Find the earliest-starting range in Ranges which ends after Loc.
    234  1.1  mrg static Range *upperBound(MemoryLocation Loc, Range *Ranges,
    235  1.1  mrg                          unsigned NumRanges) {
    236  1.1  mrg   Range *Best = 0;
    237  1.1  mrg   for (unsigned I = 0; I != NumRanges; ++I)
    238  1.1  mrg     if (Ranges[I].getEnd().getMemoryLocation() > Loc &&
    239  1.1  mrg         (!Best ||
    240  1.1  mrg          Best->getStart().getMemoryLocation() >
    241  1.1  mrg          Ranges[I].getStart().getMemoryLocation()))
    242  1.1  mrg       Best = &Ranges[I];
    243  1.1  mrg   return Best;
    244  1.1  mrg }
    245  1.1  mrg 
    246  1.1  mrg static inline uptr subtractNoOverflow(uptr LHS, uptr RHS) {
    247  1.1  mrg   return (LHS < RHS) ? 0 : LHS - RHS;
    248  1.1  mrg }
    249  1.1  mrg 
    250  1.1  mrg static inline uptr addNoOverflow(uptr LHS, uptr RHS) {
    251  1.1  mrg   const uptr Limit = (uptr)-1;
    252  1.1  mrg   return (LHS > Limit - RHS) ? Limit : LHS + RHS;
    253  1.1  mrg }
    254  1.1  mrg 
    255  1.1  mrg /// Render a snippet of the address space near a location.
    256  1.1  mrg static void PrintMemorySnippet(const Decorator &Decor, MemoryLocation Loc,
    257  1.1  mrg                                Range *Ranges, unsigned NumRanges,
    258  1.1  mrg                                const Diag::Arg *Args) {
    259  1.1  mrg   // Show at least the 8 bytes surrounding Loc.
    260  1.1  mrg   const unsigned MinBytesNearLoc = 4;
    261  1.1  mrg   MemoryLocation Min = subtractNoOverflow(Loc, MinBytesNearLoc);
    262  1.1  mrg   MemoryLocation Max = addNoOverflow(Loc, MinBytesNearLoc);
    263  1.1  mrg   MemoryLocation OrigMin = Min;
    264  1.1  mrg   for (unsigned I = 0; I < NumRanges; ++I) {
    265  1.1  mrg     Min = __sanitizer::Min(Ranges[I].getStart().getMemoryLocation(), Min);
    266  1.1  mrg     Max = __sanitizer::Max(Ranges[I].getEnd().getMemoryLocation(), Max);
    267  1.1  mrg   }
    268  1.1  mrg 
    269  1.1  mrg   // If we have too many interesting bytes, prefer to show bytes after Loc.
    270  1.1  mrg   const unsigned BytesToShow = 32;
    271  1.1  mrg   if (Max - Min > BytesToShow)
    272  1.1  mrg     Min = __sanitizer::Min(Max - BytesToShow, OrigMin);
    273  1.1  mrg   Max = addNoOverflow(Min, BytesToShow);
    274  1.1  mrg 
    275  1.1  mrg   if (!IsAccessibleMemoryRange(Min, Max - Min)) {
    276  1.1  mrg     Printf("<memory cannot be printed>\n");
    277  1.1  mrg     return;
    278  1.1  mrg   }
    279  1.1  mrg 
    280  1.1  mrg   // Emit data.
    281  1.1  mrg   InternalScopedString Buffer;
    282  1.1  mrg   for (uptr P = Min; P != Max; ++P) {
    283  1.1  mrg     unsigned char C = *reinterpret_cast<const unsigned char*>(P);
    284  1.1  mrg     Buffer.append("%s%02x", (P % 8 == 0) ? "  " : " ", C);
    285  1.1  mrg   }
    286  1.1  mrg   Buffer.append("\n");
    287  1.1  mrg 
    288  1.1  mrg   // Emit highlights.
    289  1.1  mrg   Buffer.append("%s", Decor.Highlight());
    290  1.1  mrg   Range *InRange = upperBound(Min, Ranges, NumRanges);
    291  1.1  mrg   for (uptr P = Min; P != Max; ++P) {
    292  1.1  mrg     char Pad = ' ', Byte = ' ';
    293  1.1  mrg     if (InRange && InRange->getEnd().getMemoryLocation() == P)
    294  1.1  mrg       InRange = upperBound(P, Ranges, NumRanges);
    295  1.1  mrg     if (!InRange && P > Loc)
    296  1.1  mrg       break;
    297  1.1  mrg     if (InRange && InRange->getStart().getMemoryLocation() < P)
    298  1.1  mrg       Pad = '~';
    299  1.1  mrg     if (InRange && InRange->getStart().getMemoryLocation() <= P)
    300  1.1  mrg       Byte = '~';
    301  1.1  mrg     if (P % 8 == 0)
    302  1.1  mrg       Buffer.append("%c", Pad);
    303  1.1  mrg     Buffer.append("%c", Pad);
    304  1.1  mrg     Buffer.append("%c", P == Loc ? '^' : Byte);
    305  1.1  mrg     Buffer.append("%c", Byte);
    306  1.1  mrg   }
    307  1.1  mrg   Buffer.append("%s\n", Decor.Default());
    308  1.1  mrg 
    309  1.1  mrg   // Go over the line again, and print names for the ranges.
    310  1.1  mrg   InRange = 0;
    311  1.1  mrg   unsigned Spaces = 0;
    312  1.1  mrg   for (uptr P = Min; P != Max; ++P) {
    313  1.1  mrg     if (!InRange || InRange->getEnd().getMemoryLocation() == P)
    314  1.1  mrg       InRange = upperBound(P, Ranges, NumRanges);
    315  1.1  mrg     if (!InRange)
    316  1.1  mrg       break;
    317  1.1  mrg 
    318  1.1  mrg     Spaces += (P % 8) == 0 ? 2 : 1;
    319  1.1  mrg 
    320  1.1  mrg     if (InRange && InRange->getStart().getMemoryLocation() == P) {
    321  1.1  mrg       while (Spaces--)
    322  1.1  mrg         Buffer.append(" ");
    323  1.1  mrg       RenderText(&Buffer, InRange->getText(), Args);
    324  1.1  mrg       Buffer.append("\n");
    325  1.1  mrg       // FIXME: We only support naming one range for now!
    326  1.1  mrg       break;
    327  1.1  mrg     }
    328  1.1  mrg 
    329  1.1  mrg     Spaces += 2;
    330  1.1  mrg   }
    331  1.1  mrg 
    332  1.1  mrg   Printf("%s", Buffer.data());
    333  1.1  mrg   // FIXME: Print names for anything we can identify within the line:
    334  1.1  mrg   //
    335  1.1  mrg   //  * If we can identify the memory itself as belonging to a particular
    336  1.1  mrg   //    global, stack variable, or dynamic allocation, then do so.
    337  1.1  mrg   //
    338  1.1  mrg   //  * If we have a pointer-size, pointer-aligned range highlighted,
    339  1.1  mrg   //    determine whether the value of that range is a pointer to an
    340  1.1  mrg   //    entity which we can name, and if so, print that name.
    341  1.1  mrg   //
    342  1.1  mrg   // This needs an external symbolizer, or (preferably) ASan instrumentation.
    343  1.1  mrg }
    344  1.1  mrg 
    345  1.1  mrg Diag::~Diag() {
    346  1.1  mrg   // All diagnostics should be printed under report mutex.
    347  1.1  mrg   ScopedReport::CheckLocked();
    348  1.1  mrg   Decorator Decor;
    349  1.1  mrg   InternalScopedString Buffer;
    350  1.1  mrg 
    351  1.1  mrg   // Prepare a report that a monitor process can inspect.
    352  1.1  mrg   if (Level == DL_Error) {
    353  1.1  mrg     RenderText(&Buffer, Message, Args);
    354  1.1  mrg     UndefinedBehaviorReport UBR{ConvertTypeToString(ET), Loc, Buffer};
    355  1.1  mrg     Buffer.clear();
    356  1.1  mrg   }
    357  1.1  mrg 
    358  1.1  mrg   Buffer.append("%s", Decor.Bold());
    359  1.1  mrg   RenderLocation(&Buffer, Loc);
    360  1.1  mrg   Buffer.append(":");
    361  1.1  mrg 
    362  1.1  mrg   switch (Level) {
    363  1.1  mrg   case DL_Error:
    364  1.1  mrg     Buffer.append("%s runtime error: %s%s", Decor.Warning(), Decor.Default(),
    365  1.1  mrg                   Decor.Bold());
    366  1.1  mrg     break;
    367  1.1  mrg 
    368  1.1  mrg   case DL_Note:
    369  1.1  mrg     Buffer.append("%s note: %s", Decor.Note(), Decor.Default());
    370  1.1  mrg     break;
    371  1.1  mrg   }
    372  1.1  mrg 
    373  1.1  mrg   RenderText(&Buffer, Message, Args);
    374  1.1  mrg 
    375  1.1  mrg   Buffer.append("%s\n", Decor.Default());
    376  1.1  mrg   Printf("%s", Buffer.data());
    377  1.1  mrg 
    378  1.1  mrg   if (Loc.isMemoryLocation())
    379  1.1  mrg     PrintMemorySnippet(Decor, Loc.getMemoryLocation(), Ranges, NumRanges, Args);
    380  1.1  mrg }
    381  1.1  mrg 
    382  1.1  mrg ScopedReport::Initializer::Initializer() { InitAsStandaloneIfNecessary(); }
    383  1.1  mrg 
    384  1.1  mrg ScopedReport::ScopedReport(ReportOptions Opts, Location SummaryLoc,
    385  1.1  mrg                            ErrorType Type)
    386  1.1  mrg     : Opts(Opts), SummaryLoc(SummaryLoc), Type(Type) {}
    387  1.1  mrg 
    388  1.1  mrg ScopedReport::~ScopedReport() {
    389  1.1  mrg   MaybePrintStackTrace(Opts.pc, Opts.bp);
    390  1.1  mrg   MaybeReportErrorSummary(SummaryLoc, Type);
    391  1.1  mrg 
    392  1.1  mrg   if (common_flags()->print_module_map >= 2)
    393  1.1  mrg     DumpProcessMap();
    394  1.1  mrg 
    395  1.1  mrg   if (flags()->halt_on_error)
    396  1.1  mrg     Die();
    397  1.1  mrg }
    398  1.1  mrg 
    399  1.1  mrg ALIGNED(64) static char suppression_placeholder[sizeof(SuppressionContext)];
    400  1.1  mrg static SuppressionContext *suppression_ctx = nullptr;
    401  1.1  mrg static const char kVptrCheck[] = "vptr_check";
    402  1.1  mrg static const char *kSuppressionTypes[] = {
    403  1.1  mrg #define UBSAN_CHECK(Name, SummaryKind, FSanitizeFlagName) FSanitizeFlagName,
    404  1.1  mrg #include "ubsan_checks.inc"
    405  1.1  mrg #undef UBSAN_CHECK
    406  1.1  mrg     kVptrCheck,
    407  1.1  mrg };
    408  1.1  mrg 
    409  1.1  mrg void __ubsan::InitializeSuppressions() {
    410  1.1  mrg   CHECK_EQ(nullptr, suppression_ctx);
    411  1.1  mrg   suppression_ctx = new (suppression_placeholder)
    412  1.1  mrg       SuppressionContext(kSuppressionTypes, ARRAY_SIZE(kSuppressionTypes));
    413  1.1  mrg   suppression_ctx->ParseFromFile(flags()->suppressions);
    414  1.1  mrg }
    415  1.1  mrg 
    416  1.1  mrg bool __ubsan::IsVptrCheckSuppressed(const char *TypeName) {
    417  1.1  mrg   InitAsStandaloneIfNecessary();
    418  1.1  mrg   CHECK(suppression_ctx);
    419  1.1  mrg   Suppression *s;
    420  1.1  mrg   return suppression_ctx->Match(TypeName, kVptrCheck, &s);
    421  1.1  mrg }
    422  1.1  mrg 
    423  1.1  mrg bool __ubsan::IsPCSuppressed(ErrorType ET, uptr PC, const char *Filename) {
    424  1.1  mrg   InitAsStandaloneIfNecessary();
    425  1.1  mrg   CHECK(suppression_ctx);
    426  1.1  mrg   const char *SuppType = ConvertTypeToFlagName(ET);
    427  1.1  mrg   // Fast path: don't symbolize PC if there is no suppressions for given UB
    428  1.1  mrg   // type.
    429  1.1  mrg   if (!suppression_ctx->HasSuppressionType(SuppType))
    430  1.1  mrg     return false;
    431  1.1  mrg   Suppression *s = nullptr;
    432  1.1  mrg   // Suppress by file name known to runtime.
    433  1.1  mrg   if (Filename != nullptr && suppression_ctx->Match(Filename, SuppType, &s))
    434  1.1  mrg     return true;
    435  1.1  mrg   // Suppress by module name.
    436  1.1  mrg   if (const char *Module = Symbolizer::GetOrInit()->GetModuleNameForPc(PC)) {
    437  1.1  mrg     if (suppression_ctx->Match(Module, SuppType, &s))
    438  1.1  mrg       return true;
    439  1.1  mrg   }
    440  1.1  mrg   // Suppress by function or source file name from debug info.
    441  1.1  mrg   SymbolizedStackHolder Stack(Symbolizer::GetOrInit()->SymbolizePC(PC));
    442  1.1  mrg   const AddressInfo &AI = Stack.get()->info;
    443  1.1  mrg   return suppression_ctx->Match(AI.function, SuppType, &s) ||
    444  1.1  mrg          suppression_ctx->Match(AI.file, SuppType, &s);
    445  1.1  mrg }
    446  1.1  mrg 
    447  1.1  mrg #endif  // CAN_SANITIZE_UB
    448