2019-08-14 10:47:11 +02:00
|
|
|
//===-- ubsan_handlers_cxx.cpp --------------------------------------------===//
|
2013-08-30 18:12:58 +02:00
|
|
|
//
|
2019-08-14 10:47:11 +02:00
|
|
|
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
|
|
|
|
// See https://llvm.org/LICENSE.txt for license information.
|
|
|
|
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
|
2013-08-30 18:12:58 +02:00
|
|
|
//
|
|
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
//
|
|
|
|
// Error logging entry points for the UBSan runtime, which are only used for C++
|
|
|
|
// compilations. This file is permitted to use language features which require
|
|
|
|
// linking against a C++ ABI library.
|
|
|
|
//
|
|
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
|
2015-10-21 09:32:45 +02:00
|
|
|
#include "ubsan_platform.h"
|
|
|
|
#if CAN_SANITIZE_UB
|
2016-11-08 23:04:09 +01:00
|
|
|
#include "ubsan_handlers.h"
|
2013-08-30 18:12:58 +02:00
|
|
|
#include "ubsan_handlers_cxx.h"
|
|
|
|
#include "ubsan_diag.h"
|
|
|
|
#include "ubsan_type_hash.h"
|
|
|
|
|
|
|
|
#include "sanitizer_common/sanitizer_common.h"
|
2014-09-23 19:59:53 +02:00
|
|
|
#include "sanitizer_common/sanitizer_suppressions.h"
|
2013-08-30 18:12:58 +02:00
|
|
|
|
|
|
|
using namespace __sanitizer;
|
|
|
|
using namespace __ubsan;
|
|
|
|
|
|
|
|
namespace __ubsan {
|
|
|
|
extern const char *TypeCheckKinds[];
|
|
|
|
}
|
|
|
|
|
2016-11-08 23:04:09 +01:00
|
|
|
// Returns true if UBSan has printed an error report.
|
|
|
|
static bool HandleDynamicTypeCacheMiss(
|
2013-08-30 18:12:58 +02:00
|
|
|
DynamicTypeCacheMissData *Data, ValueHandle Pointer, ValueHandle Hash,
|
2014-09-23 19:59:53 +02:00
|
|
|
ReportOptions Opts) {
|
2013-08-30 18:12:58 +02:00
|
|
|
if (checkDynamicType((void*)Pointer, Data->TypeInfo, Hash))
|
|
|
|
// Just a cache miss. The type matches after all.
|
2016-11-08 23:04:09 +01:00
|
|
|
return false;
|
2013-08-30 18:12:58 +02:00
|
|
|
|
2014-09-23 19:59:53 +02:00
|
|
|
// Check if error report should be suppressed.
|
2015-10-21 09:32:45 +02:00
|
|
|
DynamicTypeInfo DTI = getDynamicTypeInfoFromObject((void*)Pointer);
|
|
|
|
if (DTI.isValid() && IsVptrCheckSuppressed(DTI.getMostDerivedTypeName()))
|
2016-11-08 23:04:09 +01:00
|
|
|
return false;
|
2014-09-23 19:59:53 +02:00
|
|
|
|
2013-08-30 18:12:58 +02:00
|
|
|
SourceLocation Loc = Data->Loc.acquire();
|
2016-11-08 23:04:09 +01:00
|
|
|
ErrorType ET = ErrorType::DynamicTypeMismatch;
|
|
|
|
if (ignoreReport(Loc, Opts, ET))
|
|
|
|
return false;
|
2013-08-30 18:12:58 +02:00
|
|
|
|
2016-11-08 23:04:09 +01:00
|
|
|
ScopedReport R(Opts, Loc, ET);
|
2014-09-23 19:59:53 +02:00
|
|
|
|
2018-10-31 12:14:23 +01:00
|
|
|
Diag(Loc, DL_Error, ET,
|
2013-08-30 18:12:58 +02:00
|
|
|
"%0 address %1 which does not point to an object of type %2")
|
|
|
|
<< TypeCheckKinds[Data->TypeCheckKind] << (void*)Pointer << Data->Type;
|
|
|
|
|
|
|
|
// If possible, say what type it actually points to.
|
2016-11-08 23:04:09 +01:00
|
|
|
if (!DTI.isValid()) {
|
|
|
|
if (DTI.getOffset() < -VptrMaxOffsetToTop || DTI.getOffset() > VptrMaxOffsetToTop) {
|
2018-10-31 12:14:23 +01:00
|
|
|
Diag(Pointer, DL_Note, ET,
|
|
|
|
"object has a possibly invalid vptr: abs(offset to top) too big")
|
2016-11-08 23:04:09 +01:00
|
|
|
<< TypeName(DTI.getMostDerivedTypeName())
|
|
|
|
<< Range(Pointer, Pointer + sizeof(uptr), "possibly invalid vptr");
|
|
|
|
} else {
|
2018-10-31 12:14:23 +01:00
|
|
|
Diag(Pointer, DL_Note, ET, "object has invalid vptr")
|
2016-11-08 23:04:09 +01:00
|
|
|
<< TypeName(DTI.getMostDerivedTypeName())
|
|
|
|
<< Range(Pointer, Pointer + sizeof(uptr), "invalid vptr");
|
|
|
|
}
|
|
|
|
} else if (!DTI.getOffset())
|
2018-10-31 12:14:23 +01:00
|
|
|
Diag(Pointer, DL_Note, ET, "object is of type %0")
|
2015-10-21 09:32:45 +02:00
|
|
|
<< TypeName(DTI.getMostDerivedTypeName())
|
2014-09-23 19:59:53 +02:00
|
|
|
<< Range(Pointer, Pointer + sizeof(uptr), "vptr for %0");
|
2013-08-30 18:12:58 +02:00
|
|
|
else
|
|
|
|
// FIXME: Find the type at the specified offset, and include that
|
|
|
|
// in the note.
|
2018-10-31 12:14:23 +01:00
|
|
|
Diag(Pointer - DTI.getOffset(), DL_Note, ET,
|
2013-08-30 18:12:58 +02:00
|
|
|
"object is base class subobject at offset %0 within object of type %1")
|
2015-10-21 09:32:45 +02:00
|
|
|
<< DTI.getOffset() << TypeName(DTI.getMostDerivedTypeName())
|
|
|
|
<< TypeName(DTI.getSubobjectTypeName())
|
2014-09-23 19:59:53 +02:00
|
|
|
<< Range(Pointer, Pointer + sizeof(uptr),
|
|
|
|
"vptr for %2 base class of %1");
|
2016-11-08 23:04:09 +01:00
|
|
|
return true;
|
2013-08-30 18:12:58 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
void __ubsan::__ubsan_handle_dynamic_type_cache_miss(
|
|
|
|
DynamicTypeCacheMissData *Data, ValueHandle Pointer, ValueHandle Hash) {
|
2014-09-23 19:59:53 +02:00
|
|
|
GET_REPORT_OPTIONS(false);
|
|
|
|
HandleDynamicTypeCacheMiss(Data, Pointer, Hash, Opts);
|
2013-08-30 18:12:58 +02:00
|
|
|
}
|
|
|
|
void __ubsan::__ubsan_handle_dynamic_type_cache_miss_abort(
|
|
|
|
DynamicTypeCacheMissData *Data, ValueHandle Pointer, ValueHandle Hash) {
|
2016-11-08 23:04:09 +01:00
|
|
|
// Note: -fsanitize=vptr is always recoverable.
|
|
|
|
GET_REPORT_OPTIONS(false);
|
|
|
|
if (HandleDynamicTypeCacheMiss(Data, Pointer, Hash, Opts))
|
|
|
|
Die();
|
2013-08-30 18:12:58 +02:00
|
|
|
}
|
2015-10-21 09:32:45 +02:00
|
|
|
|
2016-11-08 23:04:09 +01:00
|
|
|
namespace __ubsan {
|
ubsan.c (ubsan_expand_null_ifn): Use _v1 suffixed type mismatch builtins...
* ubsan.c (ubsan_expand_null_ifn): Use _v1 suffixed type mismatch
builtins, store max (log2 (align), 0) into uchar field instead of
align into uptr field.
(ubsan_expand_objsize_ifn): Use _v1 suffixed type mismatch builtins,
store uchar 0 field instead of uptr 0 field.
(instrument_nonnull_return): Use _v1 suffixed nonnull return builtin,
instead of passing one address of struct with 2 locations pass
two addresses of structs with 1 location each.
* sanitizer.def (BUILT_IN_UBSAN_HANDLE_TYPE_MISMATCH,
BUILT_IN_UBSAN_HANDLE_TYPE_MISMATCH_ABORT,
BUILT_IN_UBSAN_HANDLE_NONNULL_RETURN,
BUILT_IN_UBSAN_HANDLE_NONNULL_RETURN_ABORT): Removed.
(BUILT_IN_UBSAN_HANDLE_TYPE_MISMATCH_V1,
BUILT_IN_UBSAN_HANDLE_TYPE_MISMATCH_V1_ABORT,
BUILT_IN_UBSAN_HANDLE_NONNULL_RETURN_V1,
BUILT_IN_UBSAN_HANDLE_NONNULL_RETURN_V1_ABORT): New builtins.
* c-c++-common/ubsan/float-cast-overflow-1.c: Drop value keyword
from expected output regexps.
* c-c++-common/ubsan/float-cast-overflow-2.c: Likewise.
* c-c++-common/ubsan/float-cast-overflow-3.c: Likewise.
* c-c++-common/ubsan/float-cast-overflow-4.c: Likewise.
* c-c++-common/ubsan/float-cast-overflow-5.c: Likewise.
* c-c++-common/ubsan/float-cast-overflow-6.c: Likewise.
* c-c++-common/ubsan/float-cast-overflow-8.c: Likewise.
* c-c++-common/ubsan/float-cast-overflow-9.c: Likewise.
* c-c++-common/ubsan/float-cast-overflow-10.c: Likewise.
* g++.dg/ubsan/float-cast-overflow-bf.C: Likewise.
* gcc.dg/ubsan/float-cast-overflow-bf.c: Likewise.
* g++.dg/asan/default-options-1.C (__asan_default_options): Add
used attribute.
* g++.dg/asan/asan_test.C: Run with ASAN_OPTIONS=handle_segv=2
in the environment.
* All source files: Merge from upstream 315899.
* asan/Makefile.am (nodist_saninclude_HEADERS): Add
include/sanitizer/tsan_interface.h.
* asan/libtool-version: Bump the libasan SONAME.
* lsan/Makefile.am (sanitizer_lsan_files): Add lsan_common_mac.cc.
(lsan_files): Add lsan_linux.cc, lsan_mac.cc and lsan_malloc_mac.cc.
* sanitizer_common/Makefile.am (sanitizer_common_files): Add
sancov_flags.cc, sanitizer_allocator_checks.cc,
sanitizer_coverage_libcdep_new.cc, sanitizer_errno.cc,
sanitizer_file.cc, sanitizer_mac_libcdep.cc and
sanitizer_stoptheworld_mac.cc. Remove sanitizer_coverage_libcdep.cc
and sanitizer_coverage_mapping_libcdep.cc.
* tsan/Makefile.am (tsan_files): Add tsan_external.cc.
* ubsan/Makefile.am (DEFS): Add -DUBSAN_CAN_USE_CXXABI=1.
(ubsan_files): Add ubsan_init_standalone.cc and
ubsan_signals_standalone.cc.
* ubsan/libtool-version: Bump the libubsan SONAME.
* asan/Makefile.in: Regenerate.
* lsan/Makefile.in: Regenerate.
* sanitizer_common/Makefile.in: Regenerate.
* tsan/Makefile.in: Regenerate.
* ubsan/Makefile.in: Regenerate.
From-SVN: r253887
2017-10-19 13:23:59 +02:00
|
|
|
void __ubsan_handle_cfi_bad_type(CFICheckFailData *Data, ValueHandle Vtable,
|
|
|
|
bool ValidVtable, ReportOptions Opts) {
|
2015-10-21 09:32:45 +02:00
|
|
|
SourceLocation Loc = Data->Loc.acquire();
|
2016-11-08 23:04:09 +01:00
|
|
|
ErrorType ET = ErrorType::CFIBadType;
|
2015-10-21 09:32:45 +02:00
|
|
|
|
2016-11-08 23:04:09 +01:00
|
|
|
if (ignoreReport(Loc, Opts, ET))
|
|
|
|
return;
|
|
|
|
|
|
|
|
ScopedReport R(Opts, Loc, ET);
|
|
|
|
DynamicTypeInfo DTI = ValidVtable
|
|
|
|
? getDynamicTypeInfoFromVtable((void *)Vtable)
|
|
|
|
: DynamicTypeInfo(0, 0, 0);
|
|
|
|
|
|
|
|
const char *CheckKindStr;
|
|
|
|
switch (Data->CheckKind) {
|
|
|
|
case CFITCK_VCall:
|
|
|
|
CheckKindStr = "virtual call";
|
|
|
|
break;
|
|
|
|
case CFITCK_NVCall:
|
|
|
|
CheckKindStr = "non-virtual call";
|
|
|
|
break;
|
|
|
|
case CFITCK_DerivedCast:
|
|
|
|
CheckKindStr = "base-to-derived cast";
|
|
|
|
break;
|
|
|
|
case CFITCK_UnrelatedCast:
|
|
|
|
CheckKindStr = "cast to unrelated type";
|
|
|
|
break;
|
2018-10-31 12:14:23 +01:00
|
|
|
case CFITCK_VMFCall:
|
|
|
|
CheckKindStr = "virtual pointer to member function call";
|
|
|
|
break;
|
2016-11-08 23:04:09 +01:00
|
|
|
case CFITCK_ICall:
|
2018-10-31 12:14:23 +01:00
|
|
|
case CFITCK_NVMFCall:
|
2016-11-08 23:04:09 +01:00
|
|
|
Die();
|
|
|
|
}
|
2015-10-21 09:32:45 +02:00
|
|
|
|
2018-10-31 12:14:23 +01:00
|
|
|
Diag(Loc, DL_Error, ET,
|
|
|
|
"control flow integrity check for type %0 failed during "
|
|
|
|
"%1 (vtable address %2)")
|
2016-11-08 23:04:09 +01:00
|
|
|
<< Data->Type << CheckKindStr << (void *)Vtable;
|
2015-10-21 09:32:45 +02:00
|
|
|
|
|
|
|
// If possible, say what type it actually points to.
|
2018-10-31 12:14:23 +01:00
|
|
|
if (!DTI.isValid())
|
|
|
|
Diag(Vtable, DL_Note, ET, "invalid vtable");
|
|
|
|
else
|
|
|
|
Diag(Vtable, DL_Note, ET, "vtable is of type %0")
|
2015-10-21 09:32:45 +02:00
|
|
|
<< TypeName(DTI.getMostDerivedTypeName());
|
2018-10-31 12:14:23 +01:00
|
|
|
|
|
|
|
// If the failure involved different DSOs for the check location and vtable,
|
|
|
|
// report the DSO names.
|
|
|
|
const char *DstModule = Symbolizer::GetOrInit()->GetModuleNameForPc(Vtable);
|
|
|
|
if (!DstModule)
|
|
|
|
DstModule = "(unknown)";
|
|
|
|
|
|
|
|
const char *SrcModule = Symbolizer::GetOrInit()->GetModuleNameForPc(Opts.pc);
|
|
|
|
if (!SrcModule)
|
|
|
|
SrcModule = "(unknown)";
|
|
|
|
|
|
|
|
if (internal_strcmp(SrcModule, DstModule))
|
|
|
|
Diag(Loc, DL_Note, ET, "check failed in %0, vtable located in %1")
|
|
|
|
<< SrcModule << DstModule;
|
2015-10-21 09:32:45 +02:00
|
|
|
}
|
2019-08-14 10:47:11 +02:00
|
|
|
|
|
|
|
static bool handleFunctionTypeMismatch(FunctionTypeMismatchData *Data,
|
|
|
|
ValueHandle Function,
|
|
|
|
ValueHandle calleeRTTI,
|
|
|
|
ValueHandle fnRTTI, ReportOptions Opts) {
|
|
|
|
if (checkTypeInfoEquality(reinterpret_cast<void *>(calleeRTTI),
|
|
|
|
reinterpret_cast<void *>(fnRTTI)))
|
|
|
|
return false;
|
|
|
|
|
|
|
|
SourceLocation CallLoc = Data->Loc.acquire();
|
|
|
|
ErrorType ET = ErrorType::FunctionTypeMismatch;
|
|
|
|
|
|
|
|
if (ignoreReport(CallLoc, Opts, ET))
|
|
|
|
return true;
|
|
|
|
|
|
|
|
ScopedReport R(Opts, CallLoc, ET);
|
|
|
|
|
|
|
|
SymbolizedStackHolder FLoc(getSymbolizedLocation(Function));
|
|
|
|
const char *FName = FLoc.get()->info.function;
|
|
|
|
if (!FName)
|
|
|
|
FName = "(unknown)";
|
|
|
|
|
|
|
|
Diag(CallLoc, DL_Error, ET,
|
|
|
|
"call to function %0 through pointer to incorrect function type %1")
|
|
|
|
<< FName << Data->Type;
|
|
|
|
Diag(FLoc, DL_Note, ET, "%0 defined here") << FName;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
void __ubsan_handle_function_type_mismatch_v1(FunctionTypeMismatchData *Data,
|
|
|
|
ValueHandle Function,
|
|
|
|
ValueHandle calleeRTTI,
|
|
|
|
ValueHandle fnRTTI) {
|
|
|
|
GET_REPORT_OPTIONS(false);
|
|
|
|
handleFunctionTypeMismatch(Data, Function, calleeRTTI, fnRTTI, Opts);
|
|
|
|
}
|
|
|
|
|
|
|
|
void __ubsan_handle_function_type_mismatch_v1_abort(
|
|
|
|
FunctionTypeMismatchData *Data, ValueHandle Function,
|
|
|
|
ValueHandle calleeRTTI, ValueHandle fnRTTI) {
|
|
|
|
GET_REPORT_OPTIONS(true);
|
|
|
|
if (handleFunctionTypeMismatch(Data, Function, calleeRTTI, fnRTTI, Opts))
|
|
|
|
Die();
|
|
|
|
}
|
2016-11-08 23:04:09 +01:00
|
|
|
} // namespace __ubsan
|
2015-10-21 09:32:45 +02:00
|
|
|
|
2016-11-08 23:04:09 +01:00
|
|
|
#endif // CAN_SANITIZE_UB
|