Alexey Samsonov | 7354509 | 2012-08-09 07:40:58 +0000 | [diff] [blame] | 1 | //===-- asan_report.cc ----------------------------------------------------===// |
| 2 | // |
| 3 | // The LLVM Compiler Infrastructure |
| 4 | // |
| 5 | // This file is distributed under the University of Illinois Open Source |
| 6 | // License. See LICENSE.TXT for details. |
| 7 | // |
| 8 | //===----------------------------------------------------------------------===// |
| 9 | // |
| 10 | // This file is a part of AddressSanitizer, an address sanity checker. |
| 11 | // |
| 12 | // This file contains error reporting code. |
| 13 | //===----------------------------------------------------------------------===// |
Alexey Samsonov | 9873792 | 2012-08-10 15:13:05 +0000 | [diff] [blame] | 14 | #include "asan_flags.h" |
Alexey Samsonov | 7354509 | 2012-08-09 07:40:58 +0000 | [diff] [blame] | 15 | #include "asan_internal.h" |
Alexey Samsonov | e218beb | 2012-08-09 09:06:52 +0000 | [diff] [blame] | 16 | #include "asan_mapping.h" |
Alexey Samsonov | 7354509 | 2012-08-09 07:40:58 +0000 | [diff] [blame] | 17 | #include "asan_report.h" |
| 18 | #include "asan_stack.h" |
Alexey Samsonov | e4bfca2 | 2012-08-09 09:27:24 +0000 | [diff] [blame] | 19 | #include "asan_thread.h" |
Kostya Serebryany | 58f5455 | 2012-12-18 07:32:16 +0000 | [diff] [blame] | 20 | #include "sanitizer_common/sanitizer_common.h" |
Sergey Matveev | ed20ebe | 2013-05-06 11:27:58 +0000 | [diff] [blame^] | 21 | #include "sanitizer_common/sanitizer_flags.h" |
Kostya Serebryany | 58f5455 | 2012-12-18 07:32:16 +0000 | [diff] [blame] | 22 | #include "sanitizer_common/sanitizer_report_decorator.h" |
Alexey Samsonov | 9c92748 | 2012-12-26 14:44:46 +0000 | [diff] [blame] | 23 | #include "sanitizer_common/sanitizer_symbolizer.h" |
Alexey Samsonov | 7354509 | 2012-08-09 07:40:58 +0000 | [diff] [blame] | 24 | |
| 25 | namespace __asan { |
| 26 | |
Alexey Samsonov | f657a19 | 2012-08-13 11:23:40 +0000 | [diff] [blame] | 27 | // -------------------- User-specified callbacks ----------------- {{{1 |
Alexey Samsonov | c98570b | 2012-08-09 10:56:57 +0000 | [diff] [blame] | 28 | static void (*error_report_callback)(const char*); |
| 29 | static char *error_message_buffer = 0; |
| 30 | static uptr error_message_buffer_pos = 0; |
| 31 | static uptr error_message_buffer_size = 0; |
| 32 | |
| 33 | void AppendToErrorMessageBuffer(const char *buffer) { |
| 34 | if (error_message_buffer) { |
| 35 | uptr length = internal_strlen(buffer); |
| 36 | CHECK_GE(error_message_buffer_size, error_message_buffer_pos); |
| 37 | uptr remaining = error_message_buffer_size - error_message_buffer_pos; |
| 38 | internal_strncpy(error_message_buffer + error_message_buffer_pos, |
| 39 | buffer, remaining); |
| 40 | error_message_buffer[error_message_buffer_size - 1] = '\0'; |
| 41 | // FIXME: reallocate the buffer instead of truncating the message. |
| 42 | error_message_buffer_pos += remaining > length ? length : remaining; |
| 43 | } |
| 44 | } |
| 45 | |
Kostya Serebryany | 58f5455 | 2012-12-18 07:32:16 +0000 | [diff] [blame] | 46 | // ---------------------- Decorator ------------------------------ {{{1 |
Kostya Serebryany | 9514a53 | 2012-12-19 09:53:32 +0000 | [diff] [blame] | 47 | bool PrintsToTtyCached() { |
| 48 | static int cached = 0; |
| 49 | static bool prints_to_tty; |
| 50 | if (!cached) { // Ok wrt threads since we are printing only from one thread. |
| 51 | prints_to_tty = PrintsToTty(); |
| 52 | cached = 1; |
| 53 | } |
| 54 | return prints_to_tty; |
| 55 | } |
Kostya Serebryany | 58f5455 | 2012-12-18 07:32:16 +0000 | [diff] [blame] | 56 | class Decorator: private __sanitizer::AnsiColorDecorator { |
| 57 | public: |
Kostya Serebryany | 9514a53 | 2012-12-19 09:53:32 +0000 | [diff] [blame] | 58 | Decorator() : __sanitizer::AnsiColorDecorator(PrintsToTtyCached()) { } |
Kostya Serebryany | 58f5455 | 2012-12-18 07:32:16 +0000 | [diff] [blame] | 59 | const char *Warning() { return Red(); } |
| 60 | const char *EndWarning() { return Default(); } |
| 61 | const char *Access() { return Blue(); } |
| 62 | const char *EndAccess() { return Default(); } |
| 63 | const char *Location() { return Green(); } |
| 64 | const char *EndLocation() { return Default(); } |
| 65 | const char *Allocation() { return Magenta(); } |
| 66 | const char *EndAllocation() { return Default(); } |
Kostya Serebryany | 9514a53 | 2012-12-19 09:53:32 +0000 | [diff] [blame] | 67 | |
| 68 | const char *ShadowByte(u8 byte) { |
| 69 | switch (byte) { |
| 70 | case kAsanHeapLeftRedzoneMagic: |
| 71 | case kAsanHeapRightRedzoneMagic: |
| 72 | return Red(); |
| 73 | case kAsanHeapFreeMagic: |
| 74 | return Magenta(); |
| 75 | case kAsanStackLeftRedzoneMagic: |
| 76 | case kAsanStackMidRedzoneMagic: |
| 77 | case kAsanStackRightRedzoneMagic: |
| 78 | case kAsanStackPartialRedzoneMagic: |
| 79 | return Red(); |
| 80 | case kAsanStackAfterReturnMagic: |
| 81 | return Magenta(); |
| 82 | case kAsanInitializationOrderMagic: |
| 83 | return Cyan(); |
| 84 | case kAsanUserPoisonedMemoryMagic: |
| 85 | return Blue(); |
| 86 | case kAsanStackUseAfterScopeMagic: |
| 87 | return Magenta(); |
| 88 | case kAsanGlobalRedzoneMagic: |
| 89 | return Red(); |
| 90 | case kAsanInternalHeapMagic: |
| 91 | return Yellow(); |
| 92 | default: |
| 93 | return Default(); |
| 94 | } |
| 95 | } |
| 96 | const char *EndShadowByte() { return Default(); } |
Kostya Serebryany | 58f5455 | 2012-12-18 07:32:16 +0000 | [diff] [blame] | 97 | }; |
| 98 | |
Alexey Samsonov | 9873792 | 2012-08-10 15:13:05 +0000 | [diff] [blame] | 99 | // ---------------------- Helper functions ----------------------- {{{1 |
| 100 | |
Kostya Serebryany | 9514a53 | 2012-12-19 09:53:32 +0000 | [diff] [blame] | 101 | static void PrintShadowByte(const char *before, u8 byte, |
| 102 | const char *after = "\n") { |
| 103 | Decorator d; |
| 104 | Printf("%s%s%x%x%s%s", before, |
| 105 | d.ShadowByte(byte), byte >> 4, byte & 15, d.EndShadowByte(), after); |
| 106 | } |
| 107 | |
| 108 | static void PrintShadowBytes(const char *before, u8 *bytes, |
| 109 | u8 *guilty, uptr n) { |
| 110 | Decorator d; |
| 111 | if (before) |
| 112 | Printf("%s%p:", before, bytes); |
| 113 | for (uptr i = 0; i < n; i++) { |
| 114 | u8 *p = bytes + i; |
| 115 | const char *before = p == guilty ? "[" : |
| 116 | p - 1 == guilty ? "" : " "; |
| 117 | const char *after = p == guilty ? "]" : ""; |
| 118 | PrintShadowByte(before, *p, after); |
Alexey Samsonov | 9873792 | 2012-08-10 15:13:05 +0000 | [diff] [blame] | 119 | } |
Kostya Serebryany | 283c296 | 2012-08-28 11:34:40 +0000 | [diff] [blame] | 120 | Printf("\n"); |
Alexey Samsonov | 9873792 | 2012-08-10 15:13:05 +0000 | [diff] [blame] | 121 | } |
| 122 | |
Kostya Serebryany | 95f630a | 2013-01-28 07:34:22 +0000 | [diff] [blame] | 123 | static void PrintLegend() { |
Kostya Serebryany | 9514a53 | 2012-12-19 09:53:32 +0000 | [diff] [blame] | 124 | Printf("Shadow byte legend (one shadow byte represents %d " |
| 125 | "application bytes):\n", (int)SHADOW_GRANULARITY); |
| 126 | PrintShadowByte(" Addressable: ", 0); |
| 127 | Printf(" Partially addressable: "); |
| 128 | for (uptr i = 1; i < SHADOW_GRANULARITY; i++) |
| 129 | PrintShadowByte("", i, " "); |
| 130 | Printf("\n"); |
| 131 | PrintShadowByte(" Heap left redzone: ", kAsanHeapLeftRedzoneMagic); |
Alexey Samsonov | f3f2f5c | 2013-04-10 07:00:25 +0000 | [diff] [blame] | 132 | PrintShadowByte(" Heap right redzone: ", kAsanHeapRightRedzoneMagic); |
| 133 | PrintShadowByte(" Freed heap region: ", kAsanHeapFreeMagic); |
Kostya Serebryany | 9514a53 | 2012-12-19 09:53:32 +0000 | [diff] [blame] | 134 | PrintShadowByte(" Stack left redzone: ", kAsanStackLeftRedzoneMagic); |
| 135 | PrintShadowByte(" Stack mid redzone: ", kAsanStackMidRedzoneMagic); |
| 136 | PrintShadowByte(" Stack right redzone: ", kAsanStackRightRedzoneMagic); |
| 137 | PrintShadowByte(" Stack partial redzone: ", kAsanStackPartialRedzoneMagic); |
Kostya Serebryany | 9514a53 | 2012-12-19 09:53:32 +0000 | [diff] [blame] | 138 | PrintShadowByte(" Stack after return: ", kAsanStackAfterReturnMagic); |
| 139 | PrintShadowByte(" Stack use after scope: ", kAsanStackUseAfterScopeMagic); |
| 140 | PrintShadowByte(" Global redzone: ", kAsanGlobalRedzoneMagic); |
| 141 | PrintShadowByte(" Global init order: ", kAsanInitializationOrderMagic); |
| 142 | PrintShadowByte(" Poisoned by user: ", kAsanUserPoisonedMemoryMagic); |
| 143 | PrintShadowByte(" ASan internal: ", kAsanInternalHeapMagic); |
Alexey Samsonov | 9873792 | 2012-08-10 15:13:05 +0000 | [diff] [blame] | 144 | } |
| 145 | |
Kostya Serebryany | 95f630a | 2013-01-28 07:34:22 +0000 | [diff] [blame] | 146 | static void PrintShadowMemoryForAddress(uptr addr) { |
| 147 | if (!AddrIsInMem(addr)) |
| 148 | return; |
| 149 | uptr shadow_addr = MemToShadow(addr); |
| 150 | const uptr n_bytes_per_row = 16; |
| 151 | uptr aligned_shadow = shadow_addr & ~(n_bytes_per_row - 1); |
| 152 | Printf("Shadow bytes around the buggy address:\n"); |
| 153 | for (int i = -5; i <= 5; i++) { |
| 154 | const char *prefix = (i == 0) ? "=>" : " "; |
| 155 | PrintShadowBytes(prefix, |
| 156 | (u8*)(aligned_shadow + i * n_bytes_per_row), |
| 157 | (u8*)shadow_addr, n_bytes_per_row); |
| 158 | } |
| 159 | if (flags()->print_legend) |
| 160 | PrintLegend(); |
| 161 | } |
| 162 | |
Alexey Samsonov | 9873792 | 2012-08-10 15:13:05 +0000 | [diff] [blame] | 163 | static void PrintZoneForPointer(uptr ptr, uptr zone_ptr, |
| 164 | const char *zone_name) { |
| 165 | if (zone_ptr) { |
| 166 | if (zone_name) { |
Kostya Serebryany | 283c296 | 2012-08-28 11:34:40 +0000 | [diff] [blame] | 167 | Printf("malloc_zone_from_ptr(%p) = %p, which is %s\n", |
Alexey Samsonov | 9873792 | 2012-08-10 15:13:05 +0000 | [diff] [blame] | 168 | ptr, zone_ptr, zone_name); |
| 169 | } else { |
Kostya Serebryany | 283c296 | 2012-08-28 11:34:40 +0000 | [diff] [blame] | 170 | Printf("malloc_zone_from_ptr(%p) = %p, which doesn't have a name\n", |
Alexey Samsonov | 9873792 | 2012-08-10 15:13:05 +0000 | [diff] [blame] | 171 | ptr, zone_ptr); |
| 172 | } |
| 173 | } else { |
Kostya Serebryany | 283c296 | 2012-08-28 11:34:40 +0000 | [diff] [blame] | 174 | Printf("malloc_zone_from_ptr(%p) = 0\n", ptr); |
Alexey Samsonov | 9873792 | 2012-08-10 15:13:05 +0000 | [diff] [blame] | 175 | } |
| 176 | } |
| 177 | |
Alexey Samsonov | e218beb | 2012-08-09 09:06:52 +0000 | [diff] [blame] | 178 | // ---------------------- Address Descriptions ------------------- {{{1 |
| 179 | |
Alexey Samsonov | e4bfca2 | 2012-08-09 09:27:24 +0000 | [diff] [blame] | 180 | static bool IsASCII(unsigned char c) { |
Alexey Samsonov | 9873792 | 2012-08-10 15:13:05 +0000 | [diff] [blame] | 181 | return /*0x00 <= c &&*/ c <= 0x7F; |
Alexey Samsonov | e4bfca2 | 2012-08-09 09:27:24 +0000 | [diff] [blame] | 182 | } |
| 183 | |
Alexey Samsonov | c942427 | 2013-03-27 10:41:22 +0000 | [diff] [blame] | 184 | static const char *MaybeDemangleGlobalName(const char *name) { |
| 185 | // We can spoil names of globals with C linkage, so use an heuristic |
| 186 | // approach to check if the name should be demangled. |
| 187 | return (name[0] == '_' && name[1] == 'Z') ? Demangle(name) : name; |
| 188 | } |
| 189 | |
Alexey Samsonov | 939316c | 2013-04-01 08:57:38 +0000 | [diff] [blame] | 190 | // Check if the global is a zero-terminated ASCII string. If so, print it. |
| 191 | static void PrintGlobalNameIfASCII(const __asan_global &g) { |
| 192 | for (uptr p = g.beg; p < g.beg + g.size - 1; p++) { |
| 193 | unsigned char c = *(unsigned char*)p; |
| 194 | if (c == '\0' || !IsASCII(c)) return; |
| 195 | } |
| 196 | if (*(char*)(g.beg + g.size - 1) != '\0') return; |
| 197 | Printf(" '%s' is ascii string '%s'\n", |
| 198 | MaybeDemangleGlobalName(g.name), (char*)g.beg); |
| 199 | } |
| 200 | |
Evgeniy Stepanov | 589dcda | 2013-02-05 14:32:03 +0000 | [diff] [blame] | 201 | bool DescribeAddressRelativeToGlobal(uptr addr, uptr size, |
| 202 | const __asan_global &g) { |
Kostya Serebryany | a3b0e5e | 2013-01-23 11:14:21 +0000 | [diff] [blame] | 203 | static const uptr kMinimalDistanceFromAnotherGlobal = 64; |
| 204 | if (addr <= g.beg - kMinimalDistanceFromAnotherGlobal) return false; |
Alexey Samsonov | e4bfca2 | 2012-08-09 09:27:24 +0000 | [diff] [blame] | 205 | if (addr >= g.beg + g.size_with_redzone) return false; |
Kostya Serebryany | 58f5455 | 2012-12-18 07:32:16 +0000 | [diff] [blame] | 206 | Decorator d; |
| 207 | Printf("%s", d.Location()); |
Alexey Samsonov | e4bfca2 | 2012-08-09 09:27:24 +0000 | [diff] [blame] | 208 | if (addr < g.beg) { |
Evgeniy Stepanov | 589dcda | 2013-02-05 14:32:03 +0000 | [diff] [blame] | 209 | Printf("%p is located %zd bytes to the left", (void*)addr, g.beg - addr); |
| 210 | } else if (addr + size > g.beg + g.size) { |
| 211 | if (addr < g.beg + g.size) |
| 212 | addr = g.beg + g.size; |
| 213 | Printf("%p is located %zd bytes to the right", (void*)addr, |
| 214 | addr - (g.beg + g.size)); |
Alexey Samsonov | e4bfca2 | 2012-08-09 09:27:24 +0000 | [diff] [blame] | 215 | } else { |
Evgeniy Stepanov | 589dcda | 2013-02-05 14:32:03 +0000 | [diff] [blame] | 216 | // Can it happen? |
| 217 | Printf("%p is located %zd bytes inside", (void*)addr, addr - g.beg); |
Alexey Samsonov | e4bfca2 | 2012-08-09 09:27:24 +0000 | [diff] [blame] | 218 | } |
Kostya Serebryany | 60c9f44 | 2013-03-18 08:04:55 +0000 | [diff] [blame] | 219 | Printf(" of global variable '%s' from '%s' (0x%zx) of size %zu\n", |
Alexey Samsonov | c942427 | 2013-03-27 10:41:22 +0000 | [diff] [blame] | 220 | MaybeDemangleGlobalName(g.name), g.module_name, g.beg, g.size); |
Kostya Serebryany | 58f5455 | 2012-12-18 07:32:16 +0000 | [diff] [blame] | 221 | Printf("%s", d.EndLocation()); |
Alexey Samsonov | e4bfca2 | 2012-08-09 09:27:24 +0000 | [diff] [blame] | 222 | PrintGlobalNameIfASCII(g); |
| 223 | return true; |
| 224 | } |
| 225 | |
Alexey Samsonov | e218beb | 2012-08-09 09:06:52 +0000 | [diff] [blame] | 226 | bool DescribeAddressIfShadow(uptr addr) { |
| 227 | if (AddrIsInMem(addr)) |
| 228 | return false; |
| 229 | static const char kAddrInShadowReport[] = |
| 230 | "Address %p is located in the %s.\n"; |
| 231 | if (AddrIsInShadowGap(addr)) { |
Kostya Serebryany | 283c296 | 2012-08-28 11:34:40 +0000 | [diff] [blame] | 232 | Printf(kAddrInShadowReport, addr, "shadow gap area"); |
Alexey Samsonov | e218beb | 2012-08-09 09:06:52 +0000 | [diff] [blame] | 233 | return true; |
| 234 | } |
| 235 | if (AddrIsInHighShadow(addr)) { |
Kostya Serebryany | 283c296 | 2012-08-28 11:34:40 +0000 | [diff] [blame] | 236 | Printf(kAddrInShadowReport, addr, "high shadow area"); |
Alexey Samsonov | e218beb | 2012-08-09 09:06:52 +0000 | [diff] [blame] | 237 | return true; |
| 238 | } |
| 239 | if (AddrIsInLowShadow(addr)) { |
Kostya Serebryany | 283c296 | 2012-08-28 11:34:40 +0000 | [diff] [blame] | 240 | Printf(kAddrInShadowReport, addr, "low shadow area"); |
Alexey Samsonov | e218beb | 2012-08-09 09:06:52 +0000 | [diff] [blame] | 241 | return true; |
| 242 | } |
| 243 | CHECK(0 && "Address is not in memory and not in shadow?"); |
| 244 | return false; |
| 245 | } |
| 246 | |
Kostya Serebryany | 50f3daa | 2013-03-22 10:36:24 +0000 | [diff] [blame] | 247 | // Return " (thread_name) " or an empty string if the name is empty. |
| 248 | const char *ThreadNameWithParenthesis(AsanThreadContext *t, char buff[], |
| 249 | uptr buff_len) { |
| 250 | const char *name = t->name; |
| 251 | if (name[0] == '\0') return ""; |
| 252 | buff[0] = 0; |
| 253 | internal_strncat(buff, " (", 3); |
| 254 | internal_strncat(buff, name, buff_len - 4); |
| 255 | internal_strncat(buff, ")", 2); |
| 256 | return buff; |
| 257 | } |
| 258 | |
| 259 | const char *ThreadNameWithParenthesis(u32 tid, char buff[], |
| 260 | uptr buff_len) { |
| 261 | if (tid == kInvalidTid) return ""; |
| 262 | asanThreadRegistry().CheckLocked(); |
| 263 | AsanThreadContext *t = GetThreadContextByTidLocked(tid); |
| 264 | return ThreadNameWithParenthesis(t, buff, buff_len); |
| 265 | } |
| 266 | |
Alexey Samsonov | e218beb | 2012-08-09 09:06:52 +0000 | [diff] [blame] | 267 | bool DescribeAddressIfStack(uptr addr, uptr access_size) { |
Alexey Samsonov | def1be9 | 2013-03-21 11:23:41 +0000 | [diff] [blame] | 268 | AsanThread *t = FindThreadByStackAddress(addr); |
Alexey Samsonov | e218beb | 2012-08-09 09:06:52 +0000 | [diff] [blame] | 269 | if (!t) return false; |
| 270 | const sptr kBufSize = 4095; |
| 271 | char buf[kBufSize]; |
| 272 | uptr offset = 0; |
Kostya Serebryany | 50f3daa | 2013-03-22 10:36:24 +0000 | [diff] [blame] | 273 | uptr frame_pc = 0; |
| 274 | char tname[128]; |
| 275 | const char *frame_descr = t->GetFrameNameByAddr(addr, &offset, &frame_pc); |
Alexey Samsonov | e218beb | 2012-08-09 09:06:52 +0000 | [diff] [blame] | 276 | // This string is created by the compiler and has the following form: |
Kostya Serebryany | 50f3daa | 2013-03-22 10:36:24 +0000 | [diff] [blame] | 277 | // "n alloc_1 alloc_2 ... alloc_n" |
Alexey Samsonov | e218beb | 2012-08-09 09:06:52 +0000 | [diff] [blame] | 278 | // where alloc_i looks like "offset size len ObjectName ". |
| 279 | CHECK(frame_descr); |
Kostya Serebryany | 58f5455 | 2012-12-18 07:32:16 +0000 | [diff] [blame] | 280 | Decorator d; |
| 281 | Printf("%s", d.Location()); |
Kostya Serebryany | 50f3daa | 2013-03-22 10:36:24 +0000 | [diff] [blame] | 282 | Printf("Address %p is located in stack of thread T%d%s " |
| 283 | "at offset %zu in frame\n", |
| 284 | addr, t->tid(), |
| 285 | ThreadNameWithParenthesis(t->tid(), tname, sizeof(tname)), |
| 286 | offset); |
| 287 | // Now we print the frame where the alloca has happened. |
| 288 | // We print this frame as a stack trace with one element. |
| 289 | // The symbolizer may print more than one frame if inlining was involved. |
| 290 | // The frame numbers may be different than those in the stack trace printed |
| 291 | // previously. That's unfortunate, but I have no better solution, |
| 292 | // especially given that the alloca may be from entirely different place |
| 293 | // (e.g. use-after-scope, or different thread's stack). |
| 294 | StackTrace alloca_stack; |
| 295 | alloca_stack.trace[0] = frame_pc + 16; |
| 296 | alloca_stack.size = 1; |
Kostya Serebryany | 58f5455 | 2012-12-18 07:32:16 +0000 | [diff] [blame] | 297 | Printf("%s", d.EndLocation()); |
Kostya Serebryany | 50f3daa | 2013-03-22 10:36:24 +0000 | [diff] [blame] | 298 | PrintStack(&alloca_stack); |
Alexey Samsonov | e218beb | 2012-08-09 09:06:52 +0000 | [diff] [blame] | 299 | // Report the number of stack objects. |
| 300 | char *p; |
Kostya Serebryany | 50f3daa | 2013-03-22 10:36:24 +0000 | [diff] [blame] | 301 | uptr n_objects = internal_simple_strtoll(frame_descr, &p, 10); |
Kostya Serebryany | a27bdf7 | 2013-04-05 14:40:25 +0000 | [diff] [blame] | 302 | CHECK_GT(n_objects, 0); |
Kostya Serebryany | 283c296 | 2012-08-28 11:34:40 +0000 | [diff] [blame] | 303 | Printf(" This frame has %zu object(s):\n", n_objects); |
Alexey Samsonov | e218beb | 2012-08-09 09:06:52 +0000 | [diff] [blame] | 304 | // Report all objects in this frame. |
| 305 | for (uptr i = 0; i < n_objects; i++) { |
| 306 | uptr beg, size; |
| 307 | sptr len; |
| 308 | beg = internal_simple_strtoll(p, &p, 10); |
| 309 | size = internal_simple_strtoll(p, &p, 10); |
| 310 | len = internal_simple_strtoll(p, &p, 10); |
| 311 | if (beg <= 0 || size <= 0 || len < 0 || *p != ' ') { |
Kostya Serebryany | 283c296 | 2012-08-28 11:34:40 +0000 | [diff] [blame] | 312 | Printf("AddressSanitizer can't parse the stack frame " |
Alexey Samsonov | e218beb | 2012-08-09 09:06:52 +0000 | [diff] [blame] | 313 | "descriptor: |%s|\n", frame_descr); |
| 314 | break; |
| 315 | } |
| 316 | p++; |
| 317 | buf[0] = 0; |
| 318 | internal_strncat(buf, p, Min(kBufSize, len)); |
| 319 | p += len; |
Kostya Serebryany | 283c296 | 2012-08-28 11:34:40 +0000 | [diff] [blame] | 320 | Printf(" [%zu, %zu) '%s'\n", beg, beg + size, buf); |
Alexey Samsonov | e218beb | 2012-08-09 09:06:52 +0000 | [diff] [blame] | 321 | } |
Kostya Serebryany | 283c296 | 2012-08-28 11:34:40 +0000 | [diff] [blame] | 322 | Printf("HINT: this may be a false positive if your program uses " |
Alexey Samsonov | 0870028 | 2012-11-23 09:46:34 +0000 | [diff] [blame] | 323 | "some custom stack unwind mechanism or swapcontext\n" |
Alexey Samsonov | e218beb | 2012-08-09 09:06:52 +0000 | [diff] [blame] | 324 | " (longjmp and C++ exceptions *are* supported)\n"); |
Alexey Samsonov | def1be9 | 2013-03-21 11:23:41 +0000 | [diff] [blame] | 325 | DescribeThread(t->context()); |
Alexey Samsonov | e218beb | 2012-08-09 09:06:52 +0000 | [diff] [blame] | 326 | return true; |
| 327 | } |
| 328 | |
Alexey Samsonov | 5c153fa | 2012-09-18 07:38:10 +0000 | [diff] [blame] | 329 | static void DescribeAccessToHeapChunk(AsanChunkView chunk, uptr addr, |
| 330 | uptr access_size) { |
Evgeniy Stepanov | 589dcda | 2013-02-05 14:32:03 +0000 | [diff] [blame] | 331 | sptr offset; |
Kostya Serebryany | 58f5455 | 2012-12-18 07:32:16 +0000 | [diff] [blame] | 332 | Decorator d; |
| 333 | Printf("%s", d.Location()); |
Evgeniy Stepanov | 589dcda | 2013-02-05 14:32:03 +0000 | [diff] [blame] | 334 | if (chunk.AddrIsAtLeft(addr, access_size, &offset)) { |
| 335 | Printf("%p is located %zd bytes to the left of", (void*)addr, offset); |
Alexey Samsonov | 5c153fa | 2012-09-18 07:38:10 +0000 | [diff] [blame] | 336 | } else if (chunk.AddrIsAtRight(addr, access_size, &offset)) { |
Evgeniy Stepanov | 589dcda | 2013-02-05 14:32:03 +0000 | [diff] [blame] | 337 | if (offset < 0) { |
| 338 | addr -= offset; |
| 339 | offset = 0; |
| 340 | } |
| 341 | Printf("%p is located %zd bytes to the right of", (void*)addr, offset); |
| 342 | } else if (chunk.AddrIsInside(addr, access_size, &offset)) { |
| 343 | Printf("%p is located %zd bytes inside of", (void*)addr, offset); |
Alexey Samsonov | 5c153fa | 2012-09-18 07:38:10 +0000 | [diff] [blame] | 344 | } else { |
Evgeniy Stepanov | 589dcda | 2013-02-05 14:32:03 +0000 | [diff] [blame] | 345 | Printf("%p is located somewhere around (this is AddressSanitizer bug!)", |
| 346 | (void*)addr); |
Alexey Samsonov | 5c153fa | 2012-09-18 07:38:10 +0000 | [diff] [blame] | 347 | } |
| 348 | Printf(" %zu-byte region [%p,%p)\n", chunk.UsedSize(), |
| 349 | (void*)(chunk.Beg()), (void*)(chunk.End())); |
Kostya Serebryany | 58f5455 | 2012-12-18 07:32:16 +0000 | [diff] [blame] | 350 | Printf("%s", d.EndLocation()); |
Alexey Samsonov | 5c153fa | 2012-09-18 07:38:10 +0000 | [diff] [blame] | 351 | } |
| 352 | |
| 353 | void DescribeHeapAddress(uptr addr, uptr access_size) { |
| 354 | AsanChunkView chunk = FindHeapChunkByAddress(addr); |
| 355 | if (!chunk.IsValid()) return; |
| 356 | DescribeAccessToHeapChunk(chunk, addr, access_size); |
| 357 | CHECK(chunk.AllocTid() != kInvalidTid); |
Alexey Samsonov | def1be9 | 2013-03-21 11:23:41 +0000 | [diff] [blame] | 358 | asanThreadRegistry().CheckLocked(); |
| 359 | AsanThreadContext *alloc_thread = |
| 360 | GetThreadContextByTidLocked(chunk.AllocTid()); |
Alexey Samsonov | 5c153fa | 2012-09-18 07:38:10 +0000 | [diff] [blame] | 361 | StackTrace alloc_stack; |
| 362 | chunk.GetAllocStack(&alloc_stack); |
Alexey Samsonov | 89c1384 | 2013-03-20 09:23:28 +0000 | [diff] [blame] | 363 | AsanThread *t = GetCurrentThread(); |
Alexey Samsonov | 5c153fa | 2012-09-18 07:38:10 +0000 | [diff] [blame] | 364 | CHECK(t); |
Kostya Serebryany | 716e2f2 | 2012-12-07 15:15:01 +0000 | [diff] [blame] | 365 | char tname[128]; |
Kostya Serebryany | 58f5455 | 2012-12-18 07:32:16 +0000 | [diff] [blame] | 366 | Decorator d; |
Alexey Samsonov | 5c153fa | 2012-09-18 07:38:10 +0000 | [diff] [blame] | 367 | if (chunk.FreeTid() != kInvalidTid) { |
Alexey Samsonov | def1be9 | 2013-03-21 11:23:41 +0000 | [diff] [blame] | 368 | AsanThreadContext *free_thread = |
| 369 | GetThreadContextByTidLocked(chunk.FreeTid()); |
Kostya Serebryany | 58f5455 | 2012-12-18 07:32:16 +0000 | [diff] [blame] | 370 | Printf("%sfreed by thread T%d%s here:%s\n", d.Allocation(), |
Alexey Samsonov | def1be9 | 2013-03-21 11:23:41 +0000 | [diff] [blame] | 371 | free_thread->tid, |
Kostya Serebryany | 58f5455 | 2012-12-18 07:32:16 +0000 | [diff] [blame] | 372 | ThreadNameWithParenthesis(free_thread, tname, sizeof(tname)), |
| 373 | d.EndAllocation()); |
Alexey Samsonov | 5c153fa | 2012-09-18 07:38:10 +0000 | [diff] [blame] | 374 | StackTrace free_stack; |
| 375 | chunk.GetFreeStack(&free_stack); |
| 376 | PrintStack(&free_stack); |
Kostya Serebryany | 58f5455 | 2012-12-18 07:32:16 +0000 | [diff] [blame] | 377 | Printf("%spreviously allocated by thread T%d%s here:%s\n", |
Alexey Samsonov | def1be9 | 2013-03-21 11:23:41 +0000 | [diff] [blame] | 378 | d.Allocation(), alloc_thread->tid, |
Kostya Serebryany | 58f5455 | 2012-12-18 07:32:16 +0000 | [diff] [blame] | 379 | ThreadNameWithParenthesis(alloc_thread, tname, sizeof(tname)), |
| 380 | d.EndAllocation()); |
Alexey Samsonov | 5c153fa | 2012-09-18 07:38:10 +0000 | [diff] [blame] | 381 | PrintStack(&alloc_stack); |
Alexey Samsonov | def1be9 | 2013-03-21 11:23:41 +0000 | [diff] [blame] | 382 | DescribeThread(t->context()); |
Alexey Samsonov | 5c153fa | 2012-09-18 07:38:10 +0000 | [diff] [blame] | 383 | DescribeThread(free_thread); |
| 384 | DescribeThread(alloc_thread); |
| 385 | } else { |
Kostya Serebryany | 58f5455 | 2012-12-18 07:32:16 +0000 | [diff] [blame] | 386 | Printf("%sallocated by thread T%d%s here:%s\n", d.Allocation(), |
Alexey Samsonov | def1be9 | 2013-03-21 11:23:41 +0000 | [diff] [blame] | 387 | alloc_thread->tid, |
Kostya Serebryany | 58f5455 | 2012-12-18 07:32:16 +0000 | [diff] [blame] | 388 | ThreadNameWithParenthesis(alloc_thread, tname, sizeof(tname)), |
| 389 | d.EndAllocation()); |
Alexey Samsonov | 5c153fa | 2012-09-18 07:38:10 +0000 | [diff] [blame] | 390 | PrintStack(&alloc_stack); |
Alexey Samsonov | def1be9 | 2013-03-21 11:23:41 +0000 | [diff] [blame] | 391 | DescribeThread(t->context()); |
Alexey Samsonov | 5c153fa | 2012-09-18 07:38:10 +0000 | [diff] [blame] | 392 | DescribeThread(alloc_thread); |
| 393 | } |
| 394 | } |
| 395 | |
Alexey Samsonov | e218beb | 2012-08-09 09:06:52 +0000 | [diff] [blame] | 396 | void DescribeAddress(uptr addr, uptr access_size) { |
| 397 | // Check if this is shadow or shadow gap. |
| 398 | if (DescribeAddressIfShadow(addr)) |
| 399 | return; |
| 400 | CHECK(AddrIsInMem(addr)); |
Evgeniy Stepanov | 589dcda | 2013-02-05 14:32:03 +0000 | [diff] [blame] | 401 | if (DescribeAddressIfGlobal(addr, access_size)) |
Alexey Samsonov | e218beb | 2012-08-09 09:06:52 +0000 | [diff] [blame] | 402 | return; |
| 403 | if (DescribeAddressIfStack(addr, access_size)) |
| 404 | return; |
| 405 | // Assume it is a heap address. |
| 406 | DescribeHeapAddress(addr, access_size); |
| 407 | } |
| 408 | |
Alexey Samsonov | 71b42c9 | 2012-09-05 07:37:15 +0000 | [diff] [blame] | 409 | // ------------------- Thread description -------------------- {{{1 |
| 410 | |
Alexey Samsonov | def1be9 | 2013-03-21 11:23:41 +0000 | [diff] [blame] | 411 | void DescribeThread(AsanThreadContext *context) { |
| 412 | CHECK(context); |
| 413 | asanThreadRegistry().CheckLocked(); |
Alexey Samsonov | 71b42c9 | 2012-09-05 07:37:15 +0000 | [diff] [blame] | 414 | // No need to announce the main thread. |
Alexey Samsonov | def1be9 | 2013-03-21 11:23:41 +0000 | [diff] [blame] | 415 | if (context->tid == 0 || context->announced) { |
Alexey Samsonov | 71b42c9 | 2012-09-05 07:37:15 +0000 | [diff] [blame] | 416 | return; |
| 417 | } |
Alexey Samsonov | def1be9 | 2013-03-21 11:23:41 +0000 | [diff] [blame] | 418 | context->announced = true; |
Kostya Serebryany | 716e2f2 | 2012-12-07 15:15:01 +0000 | [diff] [blame] | 419 | char tname[128]; |
Alexey Samsonov | def1be9 | 2013-03-21 11:23:41 +0000 | [diff] [blame] | 420 | Printf("Thread T%d%s", context->tid, |
| 421 | ThreadNameWithParenthesis(context->tid, tname, sizeof(tname))); |
Kostya Serebryany | 716e2f2 | 2012-12-07 15:15:01 +0000 | [diff] [blame] | 422 | Printf(" created by T%d%s here:\n", |
Alexey Samsonov | def1be9 | 2013-03-21 11:23:41 +0000 | [diff] [blame] | 423 | context->parent_tid, |
| 424 | ThreadNameWithParenthesis(context->parent_tid, |
Kostya Serebryany | 716e2f2 | 2012-12-07 15:15:01 +0000 | [diff] [blame] | 425 | tname, sizeof(tname))); |
Alexey Samsonov | def1be9 | 2013-03-21 11:23:41 +0000 | [diff] [blame] | 426 | PrintStack(&context->stack); |
Alexey Samsonov | 71b42c9 | 2012-09-05 07:37:15 +0000 | [diff] [blame] | 427 | // Recursively described parent thread if needed. |
| 428 | if (flags()->print_full_thread_history) { |
Alexey Samsonov | def1be9 | 2013-03-21 11:23:41 +0000 | [diff] [blame] | 429 | AsanThreadContext *parent_context = |
| 430 | GetThreadContextByTidLocked(context->parent_tid); |
| 431 | DescribeThread(parent_context); |
Alexey Samsonov | 71b42c9 | 2012-09-05 07:37:15 +0000 | [diff] [blame] | 432 | } |
| 433 | } |
| 434 | |
Alexey Samsonov | e218beb | 2012-08-09 09:06:52 +0000 | [diff] [blame] | 435 | // -------------------- Different kinds of reports ----------------- {{{1 |
| 436 | |
Alexey Samsonov | 9873792 | 2012-08-10 15:13:05 +0000 | [diff] [blame] | 437 | // Use ScopedInErrorReport to run common actions just before and |
| 438 | // immediately after printing error report. |
| 439 | class ScopedInErrorReport { |
| 440 | public: |
| 441 | ScopedInErrorReport() { |
| 442 | static atomic_uint32_t num_calls; |
Alexey Samsonov | 62e2709 | 2012-09-17 08:02:19 +0000 | [diff] [blame] | 443 | static u32 reporting_thread_tid; |
Alexey Samsonov | 9873792 | 2012-08-10 15:13:05 +0000 | [diff] [blame] | 444 | if (atomic_fetch_add(&num_calls, 1, memory_order_relaxed) != 0) { |
| 445 | // Do not print more than one report, otherwise they will mix up. |
| 446 | // Error reporting functions shouldn't return at this situation, as |
| 447 | // they are defined as no-return. |
Kostya Serebryany | 283c296 | 2012-08-28 11:34:40 +0000 | [diff] [blame] | 448 | Report("AddressSanitizer: while reporting a bug found another one." |
Alexey Samsonov | 9873792 | 2012-08-10 15:13:05 +0000 | [diff] [blame] | 449 | "Ignoring.\n"); |
Alexey Samsonov | 89c1384 | 2013-03-20 09:23:28 +0000 | [diff] [blame] | 450 | u32 current_tid = GetCurrentTidOrInvalid(); |
Alexey Samsonov | 62e2709 | 2012-09-17 08:02:19 +0000 | [diff] [blame] | 451 | if (current_tid != reporting_thread_tid) { |
| 452 | // ASan found two bugs in different threads simultaneously. Sleep |
| 453 | // long enough to make sure that the thread which started to print |
| 454 | // an error report will finish doing it. |
| 455 | SleepForSeconds(Max(100, flags()->sleep_before_dying + 1)); |
| 456 | } |
Alexey Samsonov | f882247 | 2013-02-20 13:54:32 +0000 | [diff] [blame] | 457 | // If we're still not dead for some reason, use raw _exit() instead of |
Alexey Samsonov | 031633b | 2012-11-19 11:22:22 +0000 | [diff] [blame] | 458 | // Die() to bypass any additional checks. |
Alexey Samsonov | f882247 | 2013-02-20 13:54:32 +0000 | [diff] [blame] | 459 | internal__exit(flags()->exitcode); |
Alexey Samsonov | 9873792 | 2012-08-10 15:13:05 +0000 | [diff] [blame] | 460 | } |
Alexey Samsonov | 6a08d29 | 2012-12-07 22:01:28 +0000 | [diff] [blame] | 461 | ASAN_ON_ERROR(); |
Alexey Samsonov | 7ed46ff | 2013-04-05 07:30:29 +0000 | [diff] [blame] | 462 | // Make sure the registry and sanitizer report mutexes are locked while |
| 463 | // we're printing an error report. |
| 464 | // We can lock them only here to avoid self-deadlock in case of |
Alexey Samsonov | def1be9 | 2013-03-21 11:23:41 +0000 | [diff] [blame] | 465 | // recursive reports. |
| 466 | asanThreadRegistry().Lock(); |
Alexey Samsonov | 7ed46ff | 2013-04-05 07:30:29 +0000 | [diff] [blame] | 467 | CommonSanitizerReportMutex.Lock(); |
Alexey Samsonov | 89c1384 | 2013-03-20 09:23:28 +0000 | [diff] [blame] | 468 | reporting_thread_tid = GetCurrentTidOrInvalid(); |
Kostya Serebryany | 283c296 | 2012-08-28 11:34:40 +0000 | [diff] [blame] | 469 | Printf("====================================================" |
Alexey Samsonov | 62e2709 | 2012-09-17 08:02:19 +0000 | [diff] [blame] | 470 | "=============\n"); |
| 471 | if (reporting_thread_tid != kInvalidTid) { |
Alexey Samsonov | 9873792 | 2012-08-10 15:13:05 +0000 | [diff] [blame] | 472 | // We started reporting an error message. Stop using the fake stack |
| 473 | // in case we call an instrumented function from a symbolizer. |
Alexey Samsonov | 89c1384 | 2013-03-20 09:23:28 +0000 | [diff] [blame] | 474 | AsanThread *curr_thread = GetCurrentThread(); |
Alexey Samsonov | 62e2709 | 2012-09-17 08:02:19 +0000 | [diff] [blame] | 475 | CHECK(curr_thread); |
Alexey Samsonov | 9873792 | 2012-08-10 15:13:05 +0000 | [diff] [blame] | 476 | curr_thread->fake_stack().StopUsingFakeStack(); |
| 477 | } |
| 478 | } |
| 479 | // Destructor is NORETURN, as functions that report errors are. |
| 480 | NORETURN ~ScopedInErrorReport() { |
| 481 | // Make sure the current thread is announced. |
Alexey Samsonov | 89c1384 | 2013-03-20 09:23:28 +0000 | [diff] [blame] | 482 | AsanThread *curr_thread = GetCurrentThread(); |
Alexey Samsonov | 9873792 | 2012-08-10 15:13:05 +0000 | [diff] [blame] | 483 | if (curr_thread) { |
Alexey Samsonov | def1be9 | 2013-03-21 11:23:41 +0000 | [diff] [blame] | 484 | DescribeThread(curr_thread->context()); |
Alexey Samsonov | 9873792 | 2012-08-10 15:13:05 +0000 | [diff] [blame] | 485 | } |
| 486 | // Print memory stats. |
Kostya Serebryany | 95f630a | 2013-01-28 07:34:22 +0000 | [diff] [blame] | 487 | if (flags()->print_stats) |
| 488 | __asan_print_accumulated_stats(); |
Alexey Samsonov | 9873792 | 2012-08-10 15:13:05 +0000 | [diff] [blame] | 489 | if (error_report_callback) { |
| 490 | error_report_callback(error_message_buffer); |
| 491 | } |
Kostya Serebryany | 283c296 | 2012-08-28 11:34:40 +0000 | [diff] [blame] | 492 | Report("ABORTING\n"); |
Alexey Samsonov | 9873792 | 2012-08-10 15:13:05 +0000 | [diff] [blame] | 493 | Die(); |
| 494 | } |
| 495 | }; |
| 496 | |
Kostya Serebryany | 2673fd8 | 2013-02-06 12:36:49 +0000 | [diff] [blame] | 497 | static void ReportSummary(const char *error_type, StackTrace *stack) { |
| 498 | if (!stack->size) return; |
| 499 | if (IsSymbolizerAvailable()) { |
| 500 | AddressInfo ai; |
| 501 | // Currently, we include the first stack frame into the report summary. |
| 502 | // Maybe sometimes we need to choose another frame (e.g. skip memcpy/etc). |
Alexey Samsonov | 22c1c18 | 2013-04-11 11:45:04 +0000 | [diff] [blame] | 503 | uptr pc = StackTrace::GetPreviousInstructionPc(stack->trace[0]); |
| 504 | SymbolizeCode(pc, &ai, 1); |
Kostya Serebryany | 2673fd8 | 2013-02-06 12:36:49 +0000 | [diff] [blame] | 505 | ReportErrorSummary(error_type, |
Sergey Matveev | ed20ebe | 2013-05-06 11:27:58 +0000 | [diff] [blame^] | 506 | StripPathPrefix(ai.file, |
| 507 | common_flags()->strip_path_prefix), |
Kostya Serebryany | 2673fd8 | 2013-02-06 12:36:49 +0000 | [diff] [blame] | 508 | ai.line, ai.function); |
| 509 | } |
| 510 | // FIXME: do we need to print anything at all if there is no symbolizer? |
| 511 | } |
| 512 | |
Alexey Samsonov | 7354509 | 2012-08-09 07:40:58 +0000 | [diff] [blame] | 513 | void ReportSIGSEGV(uptr pc, uptr sp, uptr bp, uptr addr) { |
Alexey Samsonov | 9873792 | 2012-08-10 15:13:05 +0000 | [diff] [blame] | 514 | ScopedInErrorReport in_report; |
Kostya Serebryany | 58f5455 | 2012-12-18 07:32:16 +0000 | [diff] [blame] | 515 | Decorator d; |
| 516 | Printf("%s", d.Warning()); |
Kostya Serebryany | 69d8ede | 2012-10-15 13:04:58 +0000 | [diff] [blame] | 517 | Report("ERROR: AddressSanitizer: SEGV on unknown address %p" |
Alexey Samsonov | 7354509 | 2012-08-09 07:40:58 +0000 | [diff] [blame] | 518 | " (pc %p sp %p bp %p T%d)\n", |
| 519 | (void*)addr, (void*)pc, (void*)sp, (void*)bp, |
Alexey Samsonov | 89c1384 | 2013-03-20 09:23:28 +0000 | [diff] [blame] | 520 | GetCurrentTidOrInvalid()); |
Kostya Serebryany | 58f5455 | 2012-12-18 07:32:16 +0000 | [diff] [blame] | 521 | Printf("%s", d.EndWarning()); |
Kostya Serebryany | 283c296 | 2012-08-28 11:34:40 +0000 | [diff] [blame] | 522 | Printf("AddressSanitizer can not provide additional info.\n"); |
Kostya Serebryany | a30c8f9 | 2012-12-13 09:34:23 +0000 | [diff] [blame] | 523 | GET_STACK_TRACE_FATAL(pc, bp); |
Kostya Serebryany | cc34722 | 2012-08-28 13:49:49 +0000 | [diff] [blame] | 524 | PrintStack(&stack); |
Kostya Serebryany | 2673fd8 | 2013-02-06 12:36:49 +0000 | [diff] [blame] | 525 | ReportSummary("SEGV", &stack); |
Alexey Samsonov | 7354509 | 2012-08-09 07:40:58 +0000 | [diff] [blame] | 526 | } |
| 527 | |
Kostya Serebryany | c3390df | 2012-08-28 11:54:30 +0000 | [diff] [blame] | 528 | void ReportDoubleFree(uptr addr, StackTrace *stack) { |
Alexey Samsonov | 9873792 | 2012-08-10 15:13:05 +0000 | [diff] [blame] | 529 | ScopedInErrorReport in_report; |
Kostya Serebryany | 58f5455 | 2012-12-18 07:32:16 +0000 | [diff] [blame] | 530 | Decorator d; |
| 531 | Printf("%s", d.Warning()); |
Kostya Serebryany | a89a35a | 2013-03-26 08:01:37 +0000 | [diff] [blame] | 532 | char tname[128]; |
| 533 | u32 curr_tid = GetCurrentTidOrInvalid(); |
| 534 | Report("ERROR: AddressSanitizer: attempting double-free on %p in " |
| 535 | "thread T%d%s:\n", |
| 536 | addr, curr_tid, |
| 537 | ThreadNameWithParenthesis(curr_tid, tname, sizeof(tname))); |
| 538 | |
Kostya Serebryany | 58f5455 | 2012-12-18 07:32:16 +0000 | [diff] [blame] | 539 | Printf("%s", d.EndWarning()); |
Kostya Serebryany | cc34722 | 2012-08-28 13:49:49 +0000 | [diff] [blame] | 540 | PrintStack(stack); |
Alexey Samsonov | f7c1d18 | 2012-08-09 08:15:46 +0000 | [diff] [blame] | 541 | DescribeHeapAddress(addr, 1); |
Kostya Serebryany | 2673fd8 | 2013-02-06 12:36:49 +0000 | [diff] [blame] | 542 | ReportSummary("double-free", stack); |
Alexey Samsonov | f7c1d18 | 2012-08-09 08:15:46 +0000 | [diff] [blame] | 543 | } |
| 544 | |
Kostya Serebryany | c3390df | 2012-08-28 11:54:30 +0000 | [diff] [blame] | 545 | void ReportFreeNotMalloced(uptr addr, StackTrace *stack) { |
Alexey Samsonov | 9873792 | 2012-08-10 15:13:05 +0000 | [diff] [blame] | 546 | ScopedInErrorReport in_report; |
Kostya Serebryany | 58f5455 | 2012-12-18 07:32:16 +0000 | [diff] [blame] | 547 | Decorator d; |
| 548 | Printf("%s", d.Warning()); |
Kostya Serebryany | a89a35a | 2013-03-26 08:01:37 +0000 | [diff] [blame] | 549 | char tname[128]; |
| 550 | u32 curr_tid = GetCurrentTidOrInvalid(); |
Kostya Serebryany | 69d8ede | 2012-10-15 13:04:58 +0000 | [diff] [blame] | 551 | Report("ERROR: AddressSanitizer: attempting free on address " |
Kostya Serebryany | a89a35a | 2013-03-26 08:01:37 +0000 | [diff] [blame] | 552 | "which was not malloc()-ed: %p in thread T%d%s\n", addr, |
| 553 | curr_tid, ThreadNameWithParenthesis(curr_tid, tname, sizeof(tname))); |
Kostya Serebryany | 58f5455 | 2012-12-18 07:32:16 +0000 | [diff] [blame] | 554 | Printf("%s", d.EndWarning()); |
Kostya Serebryany | cc34722 | 2012-08-28 13:49:49 +0000 | [diff] [blame] | 555 | PrintStack(stack); |
Alexey Samsonov | 9873792 | 2012-08-10 15:13:05 +0000 | [diff] [blame] | 556 | DescribeHeapAddress(addr, 1); |
Kostya Serebryany | 2673fd8 | 2013-02-06 12:36:49 +0000 | [diff] [blame] | 557 | ReportSummary("bad-free", stack); |
Alexey Samsonov | f7c1d18 | 2012-08-09 08:15:46 +0000 | [diff] [blame] | 558 | } |
| 559 | |
Kostya Serebryany | fe6d916 | 2012-12-21 08:53:59 +0000 | [diff] [blame] | 560 | void ReportAllocTypeMismatch(uptr addr, StackTrace *stack, |
| 561 | AllocType alloc_type, |
| 562 | AllocType dealloc_type) { |
| 563 | static const char *alloc_names[] = |
| 564 | {"INVALID", "malloc", "operator new", "operator new []"}; |
| 565 | static const char *dealloc_names[] = |
| 566 | {"INVALID", "free", "operator delete", "operator delete []"}; |
| 567 | CHECK_NE(alloc_type, dealloc_type); |
| 568 | ScopedInErrorReport in_report; |
| 569 | Decorator d; |
| 570 | Printf("%s", d.Warning()); |
| 571 | Report("ERROR: AddressSanitizer: alloc-dealloc-mismatch (%s vs %s) on %p\n", |
| 572 | alloc_names[alloc_type], dealloc_names[dealloc_type], addr); |
| 573 | Printf("%s", d.EndWarning()); |
| 574 | PrintStack(stack); |
| 575 | DescribeHeapAddress(addr, 1); |
Kostya Serebryany | 2673fd8 | 2013-02-06 12:36:49 +0000 | [diff] [blame] | 576 | ReportSummary("alloc-dealloc-mismatch", stack); |
Kostya Serebryany | fe6d916 | 2012-12-21 08:53:59 +0000 | [diff] [blame] | 577 | Report("HINT: if you don't care about these warnings you may set " |
| 578 | "ASAN_OPTIONS=alloc_dealloc_mismatch=0\n"); |
| 579 | } |
| 580 | |
Kostya Serebryany | c3390df | 2012-08-28 11:54:30 +0000 | [diff] [blame] | 581 | void ReportMallocUsableSizeNotOwned(uptr addr, StackTrace *stack) { |
Alexey Samsonov | 9873792 | 2012-08-10 15:13:05 +0000 | [diff] [blame] | 582 | ScopedInErrorReport in_report; |
Kostya Serebryany | 58f5455 | 2012-12-18 07:32:16 +0000 | [diff] [blame] | 583 | Decorator d; |
| 584 | Printf("%s", d.Warning()); |
Kostya Serebryany | 69d8ede | 2012-10-15 13:04:58 +0000 | [diff] [blame] | 585 | Report("ERROR: AddressSanitizer: attempting to call " |
Alexey Samsonov | f7c1d18 | 2012-08-09 08:15:46 +0000 | [diff] [blame] | 586 | "malloc_usable_size() for pointer which is " |
| 587 | "not owned: %p\n", addr); |
Kostya Serebryany | 58f5455 | 2012-12-18 07:32:16 +0000 | [diff] [blame] | 588 | Printf("%s", d.EndWarning()); |
Kostya Serebryany | cc34722 | 2012-08-28 13:49:49 +0000 | [diff] [blame] | 589 | PrintStack(stack); |
Alexey Samsonov | f7c1d18 | 2012-08-09 08:15:46 +0000 | [diff] [blame] | 590 | DescribeHeapAddress(addr, 1); |
Kostya Serebryany | 2673fd8 | 2013-02-06 12:36:49 +0000 | [diff] [blame] | 591 | ReportSummary("bad-malloc_usable_size", stack); |
Alexey Samsonov | f7c1d18 | 2012-08-09 08:15:46 +0000 | [diff] [blame] | 592 | } |
| 593 | |
Kostya Serebryany | c3390df | 2012-08-28 11:54:30 +0000 | [diff] [blame] | 594 | void ReportAsanGetAllocatedSizeNotOwned(uptr addr, StackTrace *stack) { |
Alexey Samsonov | 9873792 | 2012-08-10 15:13:05 +0000 | [diff] [blame] | 595 | ScopedInErrorReport in_report; |
Kostya Serebryany | 58f5455 | 2012-12-18 07:32:16 +0000 | [diff] [blame] | 596 | Decorator d; |
| 597 | Printf("%s", d.Warning()); |
Kostya Serebryany | 69d8ede | 2012-10-15 13:04:58 +0000 | [diff] [blame] | 598 | Report("ERROR: AddressSanitizer: attempting to call " |
Alexey Samsonov | f7c1d18 | 2012-08-09 08:15:46 +0000 | [diff] [blame] | 599 | "__asan_get_allocated_size() for pointer which is " |
| 600 | "not owned: %p\n", addr); |
Kostya Serebryany | 58f5455 | 2012-12-18 07:32:16 +0000 | [diff] [blame] | 601 | Printf("%s", d.EndWarning()); |
Kostya Serebryany | cc34722 | 2012-08-28 13:49:49 +0000 | [diff] [blame] | 602 | PrintStack(stack); |
Alexey Samsonov | f7c1d18 | 2012-08-09 08:15:46 +0000 | [diff] [blame] | 603 | DescribeHeapAddress(addr, 1); |
Kostya Serebryany | 2673fd8 | 2013-02-06 12:36:49 +0000 | [diff] [blame] | 604 | ReportSummary("bad-__asan_get_allocated_size", stack); |
Alexey Samsonov | f7c1d18 | 2012-08-09 08:15:46 +0000 | [diff] [blame] | 605 | } |
| 606 | |
Alexey Samsonov | 487fee7 | 2012-08-09 08:32:33 +0000 | [diff] [blame] | 607 | void ReportStringFunctionMemoryRangesOverlap( |
| 608 | const char *function, const char *offset1, uptr length1, |
Kostya Serebryany | c3390df | 2012-08-28 11:54:30 +0000 | [diff] [blame] | 609 | const char *offset2, uptr length2, StackTrace *stack) { |
Alexey Samsonov | 9873792 | 2012-08-10 15:13:05 +0000 | [diff] [blame] | 610 | ScopedInErrorReport in_report; |
Kostya Serebryany | 58f5455 | 2012-12-18 07:32:16 +0000 | [diff] [blame] | 611 | Decorator d; |
Kostya Serebryany | 2673fd8 | 2013-02-06 12:36:49 +0000 | [diff] [blame] | 612 | char bug_type[100]; |
| 613 | internal_snprintf(bug_type, sizeof(bug_type), "%s-param-overlap", function); |
Kostya Serebryany | 58f5455 | 2012-12-18 07:32:16 +0000 | [diff] [blame] | 614 | Printf("%s", d.Warning()); |
Kostya Serebryany | 2673fd8 | 2013-02-06 12:36:49 +0000 | [diff] [blame] | 615 | Report("ERROR: AddressSanitizer: %s: " |
Alexey Samsonov | 487fee7 | 2012-08-09 08:32:33 +0000 | [diff] [blame] | 616 | "memory ranges [%p,%p) and [%p, %p) overlap\n", \ |
Kostya Serebryany | 2673fd8 | 2013-02-06 12:36:49 +0000 | [diff] [blame] | 617 | bug_type, offset1, offset1 + length1, offset2, offset2 + length2); |
Kostya Serebryany | 58f5455 | 2012-12-18 07:32:16 +0000 | [diff] [blame] | 618 | Printf("%s", d.EndWarning()); |
Kostya Serebryany | cc34722 | 2012-08-28 13:49:49 +0000 | [diff] [blame] | 619 | PrintStack(stack); |
Alexey Samsonov | 9873792 | 2012-08-10 15:13:05 +0000 | [diff] [blame] | 620 | DescribeAddress((uptr)offset1, length1); |
| 621 | DescribeAddress((uptr)offset2, length2); |
Kostya Serebryany | 2673fd8 | 2013-02-06 12:36:49 +0000 | [diff] [blame] | 622 | ReportSummary(bug_type, stack); |
Alexey Samsonov | 487fee7 | 2012-08-09 08:32:33 +0000 | [diff] [blame] | 623 | } |
Alexey Samsonov | f7c1d18 | 2012-08-09 08:15:46 +0000 | [diff] [blame] | 624 | |
Alexey Samsonov | 663c501 | 2012-08-09 12:15:40 +0000 | [diff] [blame] | 625 | // ----------------------- Mac-specific reports ----------------- {{{1 |
| 626 | |
Alexey Samsonov | 663c501 | 2012-08-09 12:15:40 +0000 | [diff] [blame] | 627 | void WarnMacFreeUnallocated( |
Kostya Serebryany | c3390df | 2012-08-28 11:54:30 +0000 | [diff] [blame] | 628 | uptr addr, uptr zone_ptr, const char *zone_name, StackTrace *stack) { |
Alexey Samsonov | 9873792 | 2012-08-10 15:13:05 +0000 | [diff] [blame] | 629 | // Just print a warning here. |
Kostya Serebryany | 283c296 | 2012-08-28 11:34:40 +0000 | [diff] [blame] | 630 | Printf("free_common(%p) -- attempting to free unallocated memory.\n" |
Alexey Samsonov | 663c501 | 2012-08-09 12:15:40 +0000 | [diff] [blame] | 631 | "AddressSanitizer is ignoring this error on Mac OS now.\n", |
| 632 | addr); |
| 633 | PrintZoneForPointer(addr, zone_ptr, zone_name); |
Kostya Serebryany | cc34722 | 2012-08-28 13:49:49 +0000 | [diff] [blame] | 634 | PrintStack(stack); |
Alexey Samsonov | 9873792 | 2012-08-10 15:13:05 +0000 | [diff] [blame] | 635 | DescribeHeapAddress(addr, 1); |
Alexey Samsonov | 663c501 | 2012-08-09 12:15:40 +0000 | [diff] [blame] | 636 | } |
| 637 | |
| 638 | void ReportMacMzReallocUnknown( |
Kostya Serebryany | c3390df | 2012-08-28 11:54:30 +0000 | [diff] [blame] | 639 | uptr addr, uptr zone_ptr, const char *zone_name, StackTrace *stack) { |
Alexey Samsonov | 9873792 | 2012-08-10 15:13:05 +0000 | [diff] [blame] | 640 | ScopedInErrorReport in_report; |
Kostya Serebryany | 283c296 | 2012-08-28 11:34:40 +0000 | [diff] [blame] | 641 | Printf("mz_realloc(%p) -- attempting to realloc unallocated memory.\n" |
Alexey Samsonov | 663c501 | 2012-08-09 12:15:40 +0000 | [diff] [blame] | 642 | "This is an unrecoverable problem, exiting now.\n", |
| 643 | addr); |
| 644 | PrintZoneForPointer(addr, zone_ptr, zone_name); |
Kostya Serebryany | cc34722 | 2012-08-28 13:49:49 +0000 | [diff] [blame] | 645 | PrintStack(stack); |
Alexey Samsonov | 9873792 | 2012-08-10 15:13:05 +0000 | [diff] [blame] | 646 | DescribeHeapAddress(addr, 1); |
Alexey Samsonov | 663c501 | 2012-08-09 12:15:40 +0000 | [diff] [blame] | 647 | } |
| 648 | |
| 649 | void ReportMacCfReallocUnknown( |
Kostya Serebryany | c3390df | 2012-08-28 11:54:30 +0000 | [diff] [blame] | 650 | uptr addr, uptr zone_ptr, const char *zone_name, StackTrace *stack) { |
Alexey Samsonov | 9873792 | 2012-08-10 15:13:05 +0000 | [diff] [blame] | 651 | ScopedInErrorReport in_report; |
Kostya Serebryany | 283c296 | 2012-08-28 11:34:40 +0000 | [diff] [blame] | 652 | Printf("cf_realloc(%p) -- attempting to realloc unallocated memory.\n" |
Alexey Samsonov | 663c501 | 2012-08-09 12:15:40 +0000 | [diff] [blame] | 653 | "This is an unrecoverable problem, exiting now.\n", |
| 654 | addr); |
| 655 | PrintZoneForPointer(addr, zone_ptr, zone_name); |
Kostya Serebryany | cc34722 | 2012-08-28 13:49:49 +0000 | [diff] [blame] | 656 | PrintStack(stack); |
Alexey Samsonov | 9873792 | 2012-08-10 15:13:05 +0000 | [diff] [blame] | 657 | DescribeHeapAddress(addr, 1); |
Alexey Samsonov | c98570b | 2012-08-09 10:56:57 +0000 | [diff] [blame] | 658 | } |
| 659 | |
Alexey Samsonov | 812ff90 | 2012-08-09 11:29:13 +0000 | [diff] [blame] | 660 | } // namespace __asan |
| 661 | |
| 662 | // --------------------------- Interface --------------------- {{{1 |
| 663 | using namespace __asan; // NOLINT |
| 664 | |
| 665 | void __asan_report_error(uptr pc, uptr bp, uptr sp, |
| 666 | uptr addr, bool is_write, uptr access_size) { |
Alexey Samsonov | 9873792 | 2012-08-10 15:13:05 +0000 | [diff] [blame] | 667 | ScopedInErrorReport in_report; |
Alexey Samsonov | c98570b | 2012-08-09 10:56:57 +0000 | [diff] [blame] | 668 | |
Alexey Samsonov | 9873792 | 2012-08-10 15:13:05 +0000 | [diff] [blame] | 669 | // Determine the error type. |
Alexey Samsonov | c98570b | 2012-08-09 10:56:57 +0000 | [diff] [blame] | 670 | const char *bug_descr = "unknown-crash"; |
| 671 | if (AddrIsInMem(addr)) { |
| 672 | u8 *shadow_addr = (u8*)MemToShadow(addr); |
| 673 | // If we are accessing 16 bytes, look at the second shadow byte. |
| 674 | if (*shadow_addr == 0 && access_size > SHADOW_GRANULARITY) |
| 675 | shadow_addr++; |
| 676 | // If we are in the partial right redzone, look at the next shadow byte. |
| 677 | if (*shadow_addr > 0 && *shadow_addr < 128) |
| 678 | shadow_addr++; |
| 679 | switch (*shadow_addr) { |
| 680 | case kAsanHeapLeftRedzoneMagic: |
| 681 | case kAsanHeapRightRedzoneMagic: |
| 682 | bug_descr = "heap-buffer-overflow"; |
| 683 | break; |
| 684 | case kAsanHeapFreeMagic: |
| 685 | bug_descr = "heap-use-after-free"; |
| 686 | break; |
| 687 | case kAsanStackLeftRedzoneMagic: |
| 688 | bug_descr = "stack-buffer-underflow"; |
| 689 | break; |
Kostya Serebryany | 3945c58 | 2012-08-21 14:10:25 +0000 | [diff] [blame] | 690 | case kAsanInitializationOrderMagic: |
| 691 | bug_descr = "initialization-order-fiasco"; |
| 692 | break; |
Alexey Samsonov | c98570b | 2012-08-09 10:56:57 +0000 | [diff] [blame] | 693 | case kAsanStackMidRedzoneMagic: |
| 694 | case kAsanStackRightRedzoneMagic: |
| 695 | case kAsanStackPartialRedzoneMagic: |
| 696 | bug_descr = "stack-buffer-overflow"; |
| 697 | break; |
| 698 | case kAsanStackAfterReturnMagic: |
| 699 | bug_descr = "stack-use-after-return"; |
| 700 | break; |
| 701 | case kAsanUserPoisonedMemoryMagic: |
| 702 | bug_descr = "use-after-poison"; |
| 703 | break; |
Alexey Samsonov | d4b5db8 | 2012-12-04 01:38:15 +0000 | [diff] [blame] | 704 | case kAsanStackUseAfterScopeMagic: |
| 705 | bug_descr = "stack-use-after-scope"; |
| 706 | break; |
Alexey Samsonov | c98570b | 2012-08-09 10:56:57 +0000 | [diff] [blame] | 707 | case kAsanGlobalRedzoneMagic: |
| 708 | bug_descr = "global-buffer-overflow"; |
| 709 | break; |
| 710 | } |
| 711 | } |
Kostya Serebryany | 58f5455 | 2012-12-18 07:32:16 +0000 | [diff] [blame] | 712 | Decorator d; |
| 713 | Printf("%s", d.Warning()); |
Kostya Serebryany | 69d8ede | 2012-10-15 13:04:58 +0000 | [diff] [blame] | 714 | Report("ERROR: AddressSanitizer: %s on address " |
Alexey Samsonov | c98570b | 2012-08-09 10:56:57 +0000 | [diff] [blame] | 715 | "%p at pc 0x%zx bp 0x%zx sp 0x%zx\n", |
| 716 | bug_descr, (void*)addr, pc, bp, sp); |
Kostya Serebryany | 58f5455 | 2012-12-18 07:32:16 +0000 | [diff] [blame] | 717 | Printf("%s", d.EndWarning()); |
Alexey Samsonov | c98570b | 2012-08-09 10:56:57 +0000 | [diff] [blame] | 718 | |
Alexey Samsonov | 89c1384 | 2013-03-20 09:23:28 +0000 | [diff] [blame] | 719 | u32 curr_tid = GetCurrentTidOrInvalid(); |
Kostya Serebryany | 716e2f2 | 2012-12-07 15:15:01 +0000 | [diff] [blame] | 720 | char tname[128]; |
Kostya Serebryany | 58f5455 | 2012-12-18 07:32:16 +0000 | [diff] [blame] | 721 | Printf("%s%s of size %zu at %p thread T%d%s%s\n", |
| 722 | d.Access(), |
| 723 | access_size ? (is_write ? "WRITE" : "READ") : "ACCESS", |
| 724 | access_size, (void*)addr, curr_tid, |
| 725 | ThreadNameWithParenthesis(curr_tid, tname, sizeof(tname)), |
| 726 | d.EndAccess()); |
Alexey Samsonov | c98570b | 2012-08-09 10:56:57 +0000 | [diff] [blame] | 727 | |
Kostya Serebryany | a30c8f9 | 2012-12-13 09:34:23 +0000 | [diff] [blame] | 728 | GET_STACK_TRACE_FATAL(pc, bp); |
Kostya Serebryany | cc34722 | 2012-08-28 13:49:49 +0000 | [diff] [blame] | 729 | PrintStack(&stack); |
Alexey Samsonov | c98570b | 2012-08-09 10:56:57 +0000 | [diff] [blame] | 730 | |
| 731 | DescribeAddress(addr, access_size); |
Kostya Serebryany | 2673fd8 | 2013-02-06 12:36:49 +0000 | [diff] [blame] | 732 | ReportSummary(bug_descr, &stack); |
Alexey Samsonov | 9873792 | 2012-08-10 15:13:05 +0000 | [diff] [blame] | 733 | PrintShadowMemoryForAddress(addr); |
Alexey Samsonov | c98570b | 2012-08-09 10:56:57 +0000 | [diff] [blame] | 734 | } |
| 735 | |
Alexey Samsonov | c98570b | 2012-08-09 10:56:57 +0000 | [diff] [blame] | 736 | void NOINLINE __asan_set_error_report_callback(void (*callback)(const char*)) { |
| 737 | error_report_callback = callback; |
| 738 | if (callback) { |
| 739 | error_message_buffer_size = 1 << 16; |
| 740 | error_message_buffer = |
| 741 | (char*)MmapOrDie(error_message_buffer_size, __FUNCTION__); |
| 742 | error_message_buffer_pos = 0; |
| 743 | } |
| 744 | } |
Alexey Samsonov | f657a19 | 2012-08-13 11:23:40 +0000 | [diff] [blame] | 745 | |
Kostya Serebryany | 17a7c67 | 2012-12-29 10:18:31 +0000 | [diff] [blame] | 746 | void __asan_describe_address(uptr addr) { |
| 747 | DescribeAddress(addr, 1); |
| 748 | } |
| 749 | |
Alexey Samsonov | 6a08d29 | 2012-12-07 22:01:28 +0000 | [diff] [blame] | 750 | #if !SANITIZER_SUPPORTS_WEAK_HOOKS |
Alexey Samsonov | 8663343 | 2012-10-02 14:06:39 +0000 | [diff] [blame] | 751 | // Provide default implementation of __asan_on_error that does nothing |
| 752 | // and may be overriden by user. |
| 753 | SANITIZER_WEAK_ATTRIBUTE SANITIZER_INTERFACE_ATTRIBUTE NOINLINE |
| 754 | void __asan_on_error() {} |
Alexey Samsonov | 6a08d29 | 2012-12-07 22:01:28 +0000 | [diff] [blame] | 755 | #endif |