Home | History | Annotate | Line # | Download | only in ubsan
      1  1.1  mrg //===-- ubsan_diag.cpp ----------------------------------------------------===//
      2  1.1  mrg //
      3  1.1  mrg // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
      4  1.1  mrg // See https://llvm.org/LICENSE.txt for license information.
      5  1.1  mrg // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
      6  1.1  mrg //
      7  1.1  mrg //===----------------------------------------------------------------------===//
      8  1.1  mrg //
      9  1.1  mrg // Diagnostic reporting for the UBSan runtime.
     10  1.1  mrg //
     11  1.1  mrg //===----------------------------------------------------------------------===//
     12  1.1  mrg 
     13  1.1  mrg #include "ubsan_platform.h"
     14  1.1  mrg #if CAN_SANITIZE_UB
     15  1.1  mrg #include "ubsan_diag.h"
     16  1.1  mrg #include "ubsan_init.h"
     17  1.1  mrg #include "ubsan_flags.h"
     18  1.1  mrg #include "ubsan_monitor.h"
     19  1.1  mrg #include "sanitizer_common/sanitizer_placement_new.h"
     20  1.1  mrg #include "sanitizer_common/sanitizer_report_decorator.h"
     21  1.1  mrg #include "sanitizer_common/sanitizer_stacktrace.h"
     22  1.1  mrg #include "sanitizer_common/sanitizer_stacktrace_printer.h"
     23  1.1  mrg #include "sanitizer_common/sanitizer_suppressions.h"
     24  1.1  mrg #include "sanitizer_common/sanitizer_symbolizer.h"
     25  1.1  mrg #include <stdio.h>
     26  1.1  mrg 
     27  1.1  mrg using namespace __ubsan;
     28  1.1  mrg 
     29  1.1  mrg // UBSan is combined with runtimes that already provide this functionality
     30  1.1  mrg // (e.g., ASan) as well as runtimes that lack it (e.g., scudo). Tried to use
     31  1.1  mrg // weak linkage to resolve this issue which is not portable and breaks on
     32  1.1  mrg // Windows.
     33  1.1  mrg // TODO(yln): This is a temporary workaround. GetStackTrace functions will be
     34  1.1  mrg // removed in the future.
     35  1.4  mrg void ubsan_GetStackTrace(BufferedStackTrace *stack, uptr max_depth, uptr pc,
     36  1.4  mrg                          uptr bp, void *context, bool request_fast) {
     37  1.1  mrg   uptr top = 0;
     38  1.1  mrg   uptr bottom = 0;
     39  1.4  mrg   GetThreadStackTopAndBottom(false, &top, &bottom);
     40  1.4  mrg   bool fast = StackTrace::WillUseFastUnwind(request_fast);
     41  1.4  mrg   stack->Unwind(max_depth, pc, bp, context, top, bottom, fast);
     42  1.1  mrg }
     43  1.1  mrg 
     44  1.1  mrg static void MaybePrintStackTrace(uptr pc, uptr bp) {
     45  1.1  mrg   // We assume that flags are already parsed, as UBSan runtime
     46  1.1  mrg   // will definitely be called when we print the first diagnostics message.
     47  1.1  mrg   if (!flags()->print_stacktrace)
     48  1.1  mrg     return;
     49  1.1  mrg 
     50  1.1  mrg   BufferedStackTrace stack;
     51  1.1  mrg   ubsan_GetStackTrace(&stack, kStackTraceMax, pc, bp, nullptr,
     52  1.1  mrg                 common_flags()->fast_unwind_on_fatal);
     53  1.1  mrg   stack.Print();
     54  1.1  mrg }
     55  1.1  mrg 
     56  1.1  mrg static const char *ConvertTypeToString(ErrorType Type) {
     57  1.1  mrg   switch (Type) {
     58  1.1  mrg #define UBSAN_CHECK(Name, SummaryKind, FSanitizeFlagName)                      \
     59  1.1  mrg   case ErrorType::Name:                                                        \
     60  1.1  mrg     return SummaryKind;
     61  1.1  mrg #include "ubsan_checks.inc"
     62  1.1  mrg #undef UBSAN_CHECK
     63  1.1  mrg   }
     64  1.1  mrg   UNREACHABLE("unknown ErrorType!");
     65  1.1  mrg }
     66  1.1  mrg 
     67  1.1  mrg static const char *ConvertTypeToFlagName(ErrorType Type) {
     68  1.1  mrg   switch (Type) {
     69  1.1  mrg #define UBSAN_CHECK(Name, SummaryKind, FSanitizeFlagName)                      \
     70  1.1  mrg   case ErrorType::Name:                                                        \
     71  1.1  mrg     return FSanitizeFlagName;
     72  1.1  mrg #include "ubsan_checks.inc"
     73  1.1  mrg #undef UBSAN_CHECK
     74  1.1  mrg   }
     75  1.1  mrg   UNREACHABLE("unknown ErrorType!");
     76  1.1  mrg }
     77  1.1  mrg 
     78  1.1  mrg static void MaybeReportErrorSummary(Location Loc, ErrorType Type) {
     79  1.1  mrg   if (!common_flags()->print_summary)
     80  1.1  mrg     return;
     81  1.1  mrg   if (!flags()->report_error_type)
     82  1.1  mrg     Type = ErrorType::GenericUB;
     83  1.1  mrg   const char *ErrorKind = ConvertTypeToString(Type);
     84  1.1  mrg   if (Loc.isSourceLocation()) {
     85  1.1  mrg     SourceLocation SLoc = Loc.getSourceLocation();
     86  1.1  mrg     if (!SLoc.isInvalid()) {
     87  1.1  mrg       AddressInfo AI;
     88  1.1  mrg       AI.file = internal_strdup(SLoc.getFilename());
     89  1.1  mrg       AI.line = SLoc.getLine();
     90  1.1  mrg       AI.column = SLoc.getColumn();
     91  1.1  mrg       AI.function = internal_strdup("");  // Avoid printing ?? as function name.
     92  1.1  mrg       ReportErrorSummary(ErrorKind, AI, GetSanititizerToolName());
     93  1.1  mrg       AI.Clear();
     94  1.1  mrg       return;
     95  1.1  mrg     }
     96  1.1  mrg   } else if (Loc.isSymbolizedStack()) {
     97  1.1  mrg     const AddressInfo &AI = Loc.getSymbolizedStack()->info;
     98  1.1  mrg     ReportErrorSummary(ErrorKind, AI, GetSanititizerToolName());
     99  1.1  mrg     return;
    100  1.1  mrg   }
    101  1.1  mrg   ReportErrorSummary(ErrorKind, GetSanititizerToolName());
    102  1.1  mrg }
    103  1.1  mrg 
    104  1.1  mrg namespace {
    105  1.1  mrg class Decorator : public SanitizerCommonDecorator {
    106  1.1  mrg  public:
    107  1.1  mrg   Decorator() : SanitizerCommonDecorator() {}
    108  1.1  mrg   const char *Highlight() const { return Green(); }
    109  1.1  mrg   const char *Note() const { return Black(); }
    110  1.1  mrg };
    111  1.1  mrg }
    112  1.1  mrg 
    113  1.1  mrg SymbolizedStack *__ubsan::getSymbolizedLocation(uptr PC) {
    114  1.1  mrg   InitAsStandaloneIfNecessary();
    115  1.1  mrg   return Symbolizer::GetOrInit()->SymbolizePC(PC);
    116  1.1  mrg }
    117  1.1  mrg 
    118  1.1  mrg Diag &Diag::operator<<(const TypeDescriptor &V) {
    119  1.1  mrg   return AddArg(V.getTypeName());
    120  1.1  mrg }
    121  1.1  mrg 
    122  1.1  mrg Diag &Diag::operator<<(const Value &V) {
    123  1.1  mrg   if (V.getType().isSignedIntegerTy())
    124  1.1  mrg     AddArg(V.getSIntValue());
    125  1.1  mrg   else if (V.getType().isUnsignedIntegerTy())
    126  1.1  mrg     AddArg(V.getUIntValue());
    127  1.1  mrg   else if (V.getType().isFloatTy())
    128  1.1  mrg     AddArg(V.getFloatValue());
    129  1.1  mrg   else
    130  1.1  mrg     AddArg("<unknown>");
    131  1.1  mrg   return *this;
    132  1.1  mrg }
    133  1.1  mrg 
    134  1.1  mrg /// Hexadecimal printing for numbers too large for Printf to handle directly.
    135  1.1  mrg static void RenderHex(InternalScopedString *Buffer, UIntMax Val) {
    136  1.1  mrg #if HAVE_INT128_T
    137  1.4  mrg   Buffer->AppendF("0x%08x%08x%08x%08x", (unsigned int)(Val >> 96),
    138  1.4  mrg                   (unsigned int)(Val >> 64), (unsigned int)(Val >> 32),
    139  1.4  mrg                   (unsigned int)(Val));
    140  1.1  mrg #else
    141  1.1  mrg   UNREACHABLE("long long smaller than 64 bits?");
    142  1.1  mrg #endif
    143  1.1  mrg }
    144  1.1  mrg 
    145  1.1  mrg static void RenderLocation(InternalScopedString *Buffer, Location Loc) {
    146  1.1  mrg   switch (Loc.getKind()) {
    147  1.1  mrg   case Location::LK_Source: {
    148  1.1  mrg     SourceLocation SLoc = Loc.getSourceLocation();
    149  1.1  mrg     if (SLoc.isInvalid())
    150  1.4  mrg       Buffer->AppendF("<unknown>");
    151  1.1  mrg     else
    152  1.4  mrg       StackTracePrinter::GetOrInit()->RenderSourceLocation(
    153  1.4  mrg           Buffer, SLoc.getFilename(), SLoc.getLine(), SLoc.getColumn(),
    154  1.4  mrg           common_flags()->symbolize_vs_style,
    155  1.4  mrg           common_flags()->strip_path_prefix);
    156  1.1  mrg     return;
    157  1.1  mrg   }
    158  1.1  mrg   case Location::LK_Memory:
    159  1.4  mrg     Buffer->AppendF("%p", reinterpret_cast<void *>(Loc.getMemoryLocation()));
    160  1.1  mrg     return;
    161  1.1  mrg   case Location::LK_Symbolized: {
    162  1.1  mrg     const AddressInfo &Info = Loc.getSymbolizedStack()->info;
    163  1.1  mrg     if (Info.file)
    164  1.4  mrg       StackTracePrinter::GetOrInit()->RenderSourceLocation(
    165  1.4  mrg           Buffer, Info.file, Info.line, Info.column,
    166  1.4  mrg           common_flags()->symbolize_vs_style,
    167  1.4  mrg           common_flags()->strip_path_prefix);
    168  1.1  mrg     else if (Info.module)
    169  1.4  mrg       StackTracePrinter::GetOrInit()->RenderModuleLocation(
    170  1.4  mrg           Buffer, Info.module, Info.module_offset, Info.module_arch,
    171  1.4  mrg           common_flags()->strip_path_prefix);
    172  1.1  mrg     else
    173  1.4  mrg       Buffer->AppendF("%p", reinterpret_cast<void *>(Info.address));
    174  1.1  mrg     return;
    175  1.1  mrg   }
    176  1.1  mrg   case Location::LK_Null:
    177  1.4  mrg     Buffer->AppendF("<unknown>");
    178  1.1  mrg     return;
    179  1.1  mrg   }
    180  1.1  mrg }
    181  1.1  mrg 
    182  1.1  mrg static void RenderText(InternalScopedString *Buffer, const char *Message,
    183  1.1  mrg                        const Diag::Arg *Args) {
    184  1.1  mrg   for (const char *Msg = Message; *Msg; ++Msg) {
    185  1.1  mrg     if (*Msg != '%') {
    186  1.4  mrg       Buffer->AppendF("%c", *Msg);
    187  1.1  mrg       continue;
    188  1.1  mrg     }
    189  1.1  mrg     const Diag::Arg &A = Args[*++Msg - '0'];
    190  1.1  mrg     switch (A.Kind) {
    191  1.1  mrg     case Diag::AK_String:
    192  1.4  mrg       Buffer->AppendF("%s", A.String);
    193  1.1  mrg       break;
    194  1.1  mrg     case Diag::AK_TypeName: {
    195  1.1  mrg       if (SANITIZER_WINDOWS)
    196  1.1  mrg         // The Windows implementation demangles names early.
    197  1.4  mrg         Buffer->AppendF("'%s'", A.String);
    198  1.1  mrg       else
    199  1.4  mrg         Buffer->AppendF("'%s'", Symbolizer::GetOrInit()->Demangle(A.String));
    200  1.1  mrg       break;
    201  1.1  mrg     }
    202  1.1  mrg     case Diag::AK_SInt:
    203  1.1  mrg       // 'long long' is guaranteed to be at least 64 bits wide.
    204  1.1  mrg       if (A.SInt >= INT64_MIN && A.SInt <= INT64_MAX)
    205  1.4  mrg         Buffer->AppendF("%lld", (long long)A.SInt);
    206  1.1  mrg       else
    207  1.1  mrg         RenderHex(Buffer, A.SInt);
    208  1.1  mrg       break;
    209  1.1  mrg     case Diag::AK_UInt:
    210  1.1  mrg       if (A.UInt <= UINT64_MAX)
    211  1.4  mrg         Buffer->AppendF("%llu", (unsigned long long)A.UInt);
    212  1.1  mrg       else
    213  1.1  mrg         RenderHex(Buffer, A.UInt);
    214  1.1  mrg       break;
    215  1.1  mrg     case Diag::AK_Float: {
    216  1.1  mrg       // FIXME: Support floating-point formatting in sanitizer_common's
    217  1.1  mrg       //        printf, and stop using snprintf here.
    218  1.1  mrg       char FloatBuffer[32];
    219  1.1  mrg #if SANITIZER_WINDOWS
    220  1.4  mrg       // On MSVC platforms, long doubles are equal to regular doubles.
    221  1.4  mrg       // In MinGW environments on x86, long doubles are 80 bit, but here,
    222  1.4  mrg       // we're calling an MS CRT provided printf function which considers
    223  1.4  mrg       // long doubles to be 64 bit. Just cast the float value to a regular
    224  1.4  mrg       // double to avoid the potential ambiguity in MinGW mode.
    225  1.4  mrg       sprintf_s(FloatBuffer, sizeof(FloatBuffer), "%g", (double)A.Float);
    226  1.1  mrg #else
    227  1.1  mrg       snprintf(FloatBuffer, sizeof(FloatBuffer), "%Lg", (long double)A.Float);
    228  1.1  mrg #endif
    229  1.4  mrg       Buffer->Append(FloatBuffer);
    230  1.1  mrg       break;
    231  1.1  mrg     }
    232  1.1  mrg     case Diag::AK_Pointer:
    233  1.4  mrg       Buffer->AppendF("%p", A.Pointer);
    234  1.1  mrg       break;
    235  1.1  mrg     }
    236  1.1  mrg   }
    237  1.1  mrg }
    238  1.1  mrg 
    239  1.1  mrg /// Find the earliest-starting range in Ranges which ends after Loc.
    240  1.1  mrg static Range *upperBound(MemoryLocation Loc, Range *Ranges,
    241  1.1  mrg                          unsigned NumRanges) {
    242  1.1  mrg   Range *Best = 0;
    243  1.1  mrg   for (unsigned I = 0; I != NumRanges; ++I)
    244  1.1  mrg     if (Ranges[I].getEnd().getMemoryLocation() > Loc &&
    245  1.1  mrg         (!Best ||
    246  1.1  mrg          Best->getStart().getMemoryLocation() >
    247  1.1  mrg          Ranges[I].getStart().getMemoryLocation()))
    248  1.1  mrg       Best = &Ranges[I];
    249  1.1  mrg   return Best;
    250  1.1  mrg }
    251  1.1  mrg 
    252  1.1  mrg static inline uptr subtractNoOverflow(uptr LHS, uptr RHS) {
    253  1.1  mrg   return (LHS < RHS) ? 0 : LHS - RHS;
    254  1.1  mrg }
    255  1.1  mrg 
    256  1.1  mrg static inline uptr addNoOverflow(uptr LHS, uptr RHS) {
    257  1.1  mrg   const uptr Limit = (uptr)-1;
    258  1.1  mrg   return (LHS > Limit - RHS) ? Limit : LHS + RHS;
    259  1.1  mrg }
    260  1.1  mrg 
    261  1.1  mrg /// Render a snippet of the address space near a location.
    262  1.1  mrg static void PrintMemorySnippet(const Decorator &Decor, MemoryLocation Loc,
    263  1.1  mrg                                Range *Ranges, unsigned NumRanges,
    264  1.1  mrg                                const Diag::Arg *Args) {
    265  1.1  mrg   // Show at least the 8 bytes surrounding Loc.
    266  1.1  mrg   const unsigned MinBytesNearLoc = 4;
    267  1.1  mrg   MemoryLocation Min = subtractNoOverflow(Loc, MinBytesNearLoc);
    268  1.1  mrg   MemoryLocation Max = addNoOverflow(Loc, MinBytesNearLoc);
    269  1.1  mrg   MemoryLocation OrigMin = Min;
    270  1.1  mrg   for (unsigned I = 0; I < NumRanges; ++I) {
    271  1.1  mrg     Min = __sanitizer::Min(Ranges[I].getStart().getMemoryLocation(), Min);
    272  1.1  mrg     Max = __sanitizer::Max(Ranges[I].getEnd().getMemoryLocation(), Max);
    273  1.1  mrg   }
    274  1.1  mrg 
    275  1.1  mrg   // If we have too many interesting bytes, prefer to show bytes after Loc.
    276  1.1  mrg   const unsigned BytesToShow = 32;
    277  1.1  mrg   if (Max - Min > BytesToShow)
    278  1.1  mrg     Min = __sanitizer::Min(Max - BytesToShow, OrigMin);
    279  1.1  mrg   Max = addNoOverflow(Min, BytesToShow);
    280  1.1  mrg 
    281  1.1  mrg   if (!IsAccessibleMemoryRange(Min, Max - Min)) {
    282  1.1  mrg     Printf("<memory cannot be printed>\n");
    283  1.1  mrg     return;
    284  1.1  mrg   }
    285  1.1  mrg 
    286  1.1  mrg   // Emit data.
    287  1.3  mrg   InternalScopedString Buffer;
    288  1.1  mrg   for (uptr P = Min; P != Max; ++P) {
    289  1.1  mrg     unsigned char C = *reinterpret_cast<const unsigned char*>(P);
    290  1.4  mrg     Buffer.AppendF("%s%02x", (P % 8 == 0) ? "  " : " ", C);
    291  1.1  mrg   }
    292  1.4  mrg   Buffer.AppendF("\n");
    293  1.1  mrg 
    294  1.1  mrg   // Emit highlights.
    295  1.4  mrg   Buffer.Append(Decor.Highlight());
    296  1.1  mrg   Range *InRange = upperBound(Min, Ranges, NumRanges);
    297  1.1  mrg   for (uptr P = Min; P != Max; ++P) {
    298  1.1  mrg     char Pad = ' ', Byte = ' ';
    299  1.1  mrg     if (InRange && InRange->getEnd().getMemoryLocation() == P)
    300  1.1  mrg       InRange = upperBound(P, Ranges, NumRanges);
    301  1.1  mrg     if (!InRange && P > Loc)
    302  1.1  mrg       break;
    303  1.1  mrg     if (InRange && InRange->getStart().getMemoryLocation() < P)
    304  1.1  mrg       Pad = '~';
    305  1.1  mrg     if (InRange && InRange->getStart().getMemoryLocation() <= P)
    306  1.1  mrg       Byte = '~';
    307  1.1  mrg     if (P % 8 == 0)
    308  1.4  mrg       Buffer.AppendF("%c", Pad);
    309  1.4  mrg     Buffer.AppendF("%c", Pad);
    310  1.4  mrg     Buffer.AppendF("%c", P == Loc ? '^' : Byte);
    311  1.4  mrg     Buffer.AppendF("%c", Byte);
    312  1.1  mrg   }
    313  1.4  mrg   Buffer.AppendF("%s\n", Decor.Default());
    314  1.1  mrg 
    315  1.1  mrg   // Go over the line again, and print names for the ranges.
    316  1.1  mrg   InRange = 0;
    317  1.1  mrg   unsigned Spaces = 0;
    318  1.1  mrg   for (uptr P = Min; P != Max; ++P) {
    319  1.1  mrg     if (!InRange || InRange->getEnd().getMemoryLocation() == P)
    320  1.1  mrg       InRange = upperBound(P, Ranges, NumRanges);
    321  1.1  mrg     if (!InRange)
    322  1.1  mrg       break;
    323  1.1  mrg 
    324  1.1  mrg     Spaces += (P % 8) == 0 ? 2 : 1;
    325  1.1  mrg 
    326  1.1  mrg     if (InRange && InRange->getStart().getMemoryLocation() == P) {
    327  1.1  mrg       while (Spaces--)
    328  1.4  mrg         Buffer.AppendF(" ");
    329  1.1  mrg       RenderText(&Buffer, InRange->getText(), Args);
    330  1.4  mrg       Buffer.AppendF("\n");
    331  1.1  mrg       // FIXME: We only support naming one range for now!
    332  1.1  mrg       break;
    333  1.1  mrg     }
    334  1.1  mrg 
    335  1.1  mrg     Spaces += 2;
    336  1.1  mrg   }
    337  1.1  mrg 
    338  1.1  mrg   Printf("%s", Buffer.data());
    339  1.1  mrg   // FIXME: Print names for anything we can identify within the line:
    340  1.1  mrg   //
    341  1.1  mrg   //  * If we can identify the memory itself as belonging to a particular
    342  1.1  mrg   //    global, stack variable, or dynamic allocation, then do so.
    343  1.1  mrg   //
    344  1.1  mrg   //  * If we have a pointer-size, pointer-aligned range highlighted,
    345  1.1  mrg   //    determine whether the value of that range is a pointer to an
    346  1.1  mrg   //    entity which we can name, and if so, print that name.
    347  1.1  mrg   //
    348  1.1  mrg   // This needs an external symbolizer, or (preferably) ASan instrumentation.
    349  1.1  mrg }
    350  1.1  mrg 
    351  1.1  mrg Diag::~Diag() {
    352  1.1  mrg   // All diagnostics should be printed under report mutex.
    353  1.1  mrg   ScopedReport::CheckLocked();
    354  1.1  mrg   Decorator Decor;
    355  1.3  mrg   InternalScopedString Buffer;
    356  1.1  mrg 
    357  1.1  mrg   // Prepare a report that a monitor process can inspect.
    358  1.1  mrg   if (Level == DL_Error) {
    359  1.1  mrg     RenderText(&Buffer, Message, Args);
    360  1.1  mrg     UndefinedBehaviorReport UBR{ConvertTypeToString(ET), Loc, Buffer};
    361  1.1  mrg     Buffer.clear();
    362  1.1  mrg   }
    363  1.1  mrg 
    364  1.4  mrg   Buffer.Append(Decor.Bold());
    365  1.1  mrg   RenderLocation(&Buffer, Loc);
    366  1.4  mrg   Buffer.AppendF(":");
    367  1.1  mrg 
    368  1.1  mrg   switch (Level) {
    369  1.1  mrg   case DL_Error:
    370  1.4  mrg     Buffer.AppendF("%s runtime error: %s%s", Decor.Warning(), Decor.Default(),
    371  1.4  mrg                    Decor.Bold());
    372  1.1  mrg     break;
    373  1.1  mrg 
    374  1.1  mrg   case DL_Note:
    375  1.4  mrg     Buffer.AppendF("%s note: %s", Decor.Note(), Decor.Default());
    376  1.1  mrg     break;
    377  1.1  mrg   }
    378  1.1  mrg 
    379  1.1  mrg   RenderText(&Buffer, Message, Args);
    380  1.1  mrg 
    381  1.4  mrg   Buffer.AppendF("%s\n", Decor.Default());
    382  1.1  mrg   Printf("%s", Buffer.data());
    383  1.1  mrg 
    384  1.1  mrg   if (Loc.isMemoryLocation())
    385  1.1  mrg     PrintMemorySnippet(Decor, Loc.getMemoryLocation(), Ranges, NumRanges, Args);
    386  1.1  mrg }
    387  1.1  mrg 
    388  1.1  mrg ScopedReport::Initializer::Initializer() { InitAsStandaloneIfNecessary(); }
    389  1.1  mrg 
    390  1.1  mrg ScopedReport::ScopedReport(ReportOptions Opts, Location SummaryLoc,
    391  1.1  mrg                            ErrorType Type)
    392  1.1  mrg     : Opts(Opts), SummaryLoc(SummaryLoc), Type(Type) {}
    393  1.1  mrg 
    394  1.1  mrg ScopedReport::~ScopedReport() {
    395  1.1  mrg   MaybePrintStackTrace(Opts.pc, Opts.bp);
    396  1.1  mrg   MaybeReportErrorSummary(SummaryLoc, Type);
    397  1.3  mrg 
    398  1.3  mrg   if (common_flags()->print_module_map >= 2)
    399  1.3  mrg     DumpProcessMap();
    400  1.3  mrg 
    401  1.1  mrg   if (flags()->halt_on_error)
    402  1.1  mrg     Die();
    403  1.1  mrg }
    404  1.1  mrg 
    405  1.1  mrg ALIGNED(64) static char suppression_placeholder[sizeof(SuppressionContext)];
    406  1.1  mrg static SuppressionContext *suppression_ctx = nullptr;
    407  1.1  mrg static const char kVptrCheck[] = "vptr_check";
    408  1.1  mrg static const char *kSuppressionTypes[] = {
    409  1.1  mrg #define UBSAN_CHECK(Name, SummaryKind, FSanitizeFlagName) FSanitizeFlagName,
    410  1.1  mrg #include "ubsan_checks.inc"
    411  1.1  mrg #undef UBSAN_CHECK
    412  1.1  mrg     kVptrCheck,
    413  1.1  mrg };
    414  1.1  mrg 
    415  1.1  mrg void __ubsan::InitializeSuppressions() {
    416  1.1  mrg   CHECK_EQ(nullptr, suppression_ctx);
    417  1.1  mrg   suppression_ctx = new (suppression_placeholder)
    418  1.1  mrg       SuppressionContext(kSuppressionTypes, ARRAY_SIZE(kSuppressionTypes));
    419  1.1  mrg   suppression_ctx->ParseFromFile(flags()->suppressions);
    420  1.1  mrg }
    421  1.1  mrg 
    422  1.1  mrg bool __ubsan::IsVptrCheckSuppressed(const char *TypeName) {
    423  1.1  mrg   InitAsStandaloneIfNecessary();
    424  1.1  mrg   CHECK(suppression_ctx);
    425  1.1  mrg   Suppression *s;
    426  1.1  mrg   return suppression_ctx->Match(TypeName, kVptrCheck, &s);
    427  1.1  mrg }
    428  1.1  mrg 
    429  1.1  mrg bool __ubsan::IsPCSuppressed(ErrorType ET, uptr PC, const char *Filename) {
    430  1.1  mrg   InitAsStandaloneIfNecessary();
    431  1.1  mrg   CHECK(suppression_ctx);
    432  1.1  mrg   const char *SuppType = ConvertTypeToFlagName(ET);
    433  1.1  mrg   // Fast path: don't symbolize PC if there is no suppressions for given UB
    434  1.1  mrg   // type.
    435  1.1  mrg   if (!suppression_ctx->HasSuppressionType(SuppType))
    436  1.1  mrg     return false;
    437  1.1  mrg   Suppression *s = nullptr;
    438  1.1  mrg   // Suppress by file name known to runtime.
    439  1.1  mrg   if (Filename != nullptr && suppression_ctx->Match(Filename, SuppType, &s))
    440  1.1  mrg     return true;
    441  1.1  mrg   // Suppress by module name.
    442  1.1  mrg   if (const char *Module = Symbolizer::GetOrInit()->GetModuleNameForPc(PC)) {
    443  1.1  mrg     if (suppression_ctx->Match(Module, SuppType, &s))
    444  1.1  mrg       return true;
    445  1.1  mrg   }
    446  1.1  mrg   // Suppress by function or source file name from debug info.
    447  1.1  mrg   SymbolizedStackHolder Stack(Symbolizer::GetOrInit()->SymbolizePC(PC));
    448  1.1  mrg   const AddressInfo &AI = Stack.get()->info;
    449  1.1  mrg   return suppression_ctx->Match(AI.function, SuppType, &s) ||
    450  1.1  mrg          suppression_ctx->Match(AI.file, SuppType, &s);
    451  1.1  mrg }
    452  1.1  mrg 
    453  1.1  mrg #endif  // CAN_SANITIZE_UB
    454