Retro68/gcc/libsanitizer/ubsan/ubsan_handlers_cxx.cc

164 lines
5.8 KiB
C++
Raw Normal View History

2014-09-21 17:33:12 +00:00
//===-- ubsan_handlers_cxx.cc ---------------------------------------------===//
//
// This file is distributed under the University of Illinois Open Source
// License. See LICENSE.TXT for details.
//
//===----------------------------------------------------------------------===//
//
// Error logging entry points for the UBSan runtime, which are only used for C++
// compilations. This file is permitted to use language features which require
// linking against a C++ ABI library.
//
//===----------------------------------------------------------------------===//
2017-04-10 11:32:00 +00:00
#include "ubsan_platform.h"
#if CAN_SANITIZE_UB
#include "ubsan_handlers.h"
2014-09-21 17:33:12 +00:00
#include "ubsan_handlers_cxx.h"
#include "ubsan_diag.h"
#include "ubsan_type_hash.h"
#include "sanitizer_common/sanitizer_common.h"
2015-08-28 15:33:40 +00:00
#include "sanitizer_common/sanitizer_suppressions.h"
2014-09-21 17:33:12 +00:00
using namespace __sanitizer;
using namespace __ubsan;
namespace __ubsan {
extern const char *TypeCheckKinds[];
}
// Returns true if UBSan has printed an error report.
static bool HandleDynamicTypeCacheMiss(
2014-09-21 17:33:12 +00:00
DynamicTypeCacheMissData *Data, ValueHandle Pointer, ValueHandle Hash,
2015-08-28 15:33:40 +00:00
ReportOptions Opts) {
2014-09-21 17:33:12 +00:00
if (checkDynamicType((void*)Pointer, Data->TypeInfo, Hash))
// Just a cache miss. The type matches after all.
return false;
2014-09-21 17:33:12 +00:00
2015-08-28 15:33:40 +00:00
// Check if error report should be suppressed.
2017-04-10 11:32:00 +00:00
DynamicTypeInfo DTI = getDynamicTypeInfoFromObject((void*)Pointer);
if (DTI.isValid() && IsVptrCheckSuppressed(DTI.getMostDerivedTypeName()))
return false;
2015-08-28 15:33:40 +00:00
2014-09-21 17:33:12 +00:00
SourceLocation Loc = Data->Loc.acquire();
ErrorType ET = ErrorType::DynamicTypeMismatch;
if (ignoreReport(Loc, Opts, ET))
return false;
2014-09-21 17:33:12 +00:00
ScopedReport R(Opts, Loc, ET);
2015-08-28 15:33:40 +00:00
2014-09-21 17:33:12 +00:00
Diag(Loc, DL_Error,
"%0 address %1 which does not point to an object of type %2")
<< TypeCheckKinds[Data->TypeCheckKind] << (void*)Pointer << Data->Type;
// If possible, say what type it actually points to.
if (!DTI.isValid()) {
if (DTI.getOffset() < -VptrMaxOffsetToTop || DTI.getOffset() > VptrMaxOffsetToTop) {
Diag(Pointer, DL_Note, "object has a possibly invalid vptr: abs(offset to top) too big")
<< TypeName(DTI.getMostDerivedTypeName())
<< Range(Pointer, Pointer + sizeof(uptr), "possibly invalid vptr");
} else {
Diag(Pointer, DL_Note, "object has invalid vptr")
<< TypeName(DTI.getMostDerivedTypeName())
<< Range(Pointer, Pointer + sizeof(uptr), "invalid vptr");
}
} else if (!DTI.getOffset())
2014-09-21 17:33:12 +00:00
Diag(Pointer, DL_Note, "object is of type %0")
2017-04-10 11:32:00 +00:00
<< TypeName(DTI.getMostDerivedTypeName())
2015-08-28 15:33:40 +00:00
<< Range(Pointer, Pointer + sizeof(uptr), "vptr for %0");
2014-09-21 17:33:12 +00:00
else
// FIXME: Find the type at the specified offset, and include that
// in the note.
Diag(Pointer - DTI.getOffset(), DL_Note,
"object is base class subobject at offset %0 within object of type %1")
2017-04-10 11:32:00 +00:00
<< DTI.getOffset() << TypeName(DTI.getMostDerivedTypeName())
<< TypeName(DTI.getSubobjectTypeName())
2015-08-28 15:33:40 +00:00
<< Range(Pointer, Pointer + sizeof(uptr),
"vptr for %2 base class of %1");
return true;
2014-09-21 17:33:12 +00:00
}
void __ubsan::__ubsan_handle_dynamic_type_cache_miss(
DynamicTypeCacheMissData *Data, ValueHandle Pointer, ValueHandle Hash) {
2015-08-28 15:33:40 +00:00
GET_REPORT_OPTIONS(false);
HandleDynamicTypeCacheMiss(Data, Pointer, Hash, Opts);
2014-09-21 17:33:12 +00:00
}
void __ubsan::__ubsan_handle_dynamic_type_cache_miss_abort(
DynamicTypeCacheMissData *Data, ValueHandle Pointer, ValueHandle Hash) {
// Note: -fsanitize=vptr is always recoverable.
GET_REPORT_OPTIONS(false);
if (HandleDynamicTypeCacheMiss(Data, Pointer, Hash, Opts))
Die();
2014-09-21 17:33:12 +00:00
}
2017-04-10 11:32:00 +00:00
namespace __ubsan {
void HandleCFIBadType(CFICheckFailData *Data, ValueHandle Vtable,
bool ValidVtable, ReportOptions Opts) {
2017-04-10 11:32:00 +00:00
SourceLocation Loc = Data->Loc.acquire();
ErrorType ET = ErrorType::CFIBadType;
2017-04-10 11:32:00 +00:00
if (ignoreReport(Loc, Opts, ET))
return;
ScopedReport R(Opts, Loc, ET);
DynamicTypeInfo DTI = ValidVtable
? getDynamicTypeInfoFromVtable((void *)Vtable)
: DynamicTypeInfo(0, 0, 0);
const char *CheckKindStr;
switch (Data->CheckKind) {
case CFITCK_VCall:
CheckKindStr = "virtual call";
break;
case CFITCK_NVCall:
CheckKindStr = "non-virtual call";
break;
case CFITCK_DerivedCast:
CheckKindStr = "base-to-derived cast";
break;
case CFITCK_UnrelatedCast:
CheckKindStr = "cast to unrelated type";
break;
case CFITCK_ICall:
Die();
}
2017-04-10 11:32:00 +00:00
Diag(Loc, DL_Error, "control flow integrity check for type %0 failed during "
"%1 (vtable address %2)")
<< Data->Type << CheckKindStr << (void *)Vtable;
2017-04-10 11:32:00 +00:00
// If possible, say what type it actually points to.
if (!DTI.isValid()) {
const char *module = Symbolizer::GetOrInit()->GetModuleNameForPc(Vtable);
if (module)
Diag(Vtable, DL_Note, "invalid vtable in module %0") << module;
else
Diag(Vtable, DL_Note, "invalid vtable");
} else {
2017-04-10 11:32:00 +00:00
Diag(Vtable, DL_Note, "vtable is of type %0")
<< TypeName(DTI.getMostDerivedTypeName());
}
2017-04-10 11:32:00 +00:00
}
} // namespace __ubsan
2017-04-10 11:32:00 +00:00
void __ubsan::__ubsan_handle_cfi_bad_type(CFIBadTypeData *TypeData,
2017-04-10 11:32:00 +00:00
ValueHandle Vtable) {
GET_REPORT_OPTIONS(false);
CFITypeCheckKind TypeCheckKind
= static_cast<CFITypeCheckKind> (TypeData->TypeCheckKind);
CFICheckFailData Data = {TypeCheckKind, TypeData->Loc, TypeData->Type};
HandleCFIBadType(&Data, Vtable, false, Opts);
2017-04-10 11:32:00 +00:00
}
void __ubsan::__ubsan_handle_cfi_bad_type_abort(CFIBadTypeData *TypeData,
2017-04-10 11:32:00 +00:00
ValueHandle Vtable) {
GET_REPORT_OPTIONS(true);
CFITypeCheckKind TypeCheckKind
= static_cast<CFITypeCheckKind> (TypeData->TypeCheckKind);
CFICheckFailData Data = {TypeCheckKind, TypeData->Loc, TypeData->Type};
HandleCFIBadType(&Data, Vtable, false, Opts);
2017-04-10 11:32:00 +00:00
}
#endif // CAN_SANITIZE_UB