]> git.ipfire.org Git - thirdparty/gcc.git/blame - libsanitizer/asan/asan_report.cpp
Libsanitizer: merge from master.
[thirdparty/gcc.git] / libsanitizer / asan / asan_report.cpp
CommitLineData
b667dd70 1//===-- asan_report.cpp ---------------------------------------------------===//
f35db108 2//
b667dd70
ML
3// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4// See https://llvm.org/LICENSE.txt for license information.
5// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
f35db108
WM
6//
7//===----------------------------------------------------------------------===//
8//
9// This file is a part of AddressSanitizer, an address sanity checker.
10//
11// This file contains error reporting code.
12//===----------------------------------------------------------------------===//
696d846a 13
10189819 14#include "asan_errors.h"
f35db108 15#include "asan_flags.h"
10189819 16#include "asan_descriptions.h"
f35db108
WM
17#include "asan_internal.h"
18#include "asan_mapping.h"
19#include "asan_report.h"
10189819 20#include "asan_scariness_score.h"
f35db108
WM
21#include "asan_stack.h"
22#include "asan_thread.h"
e9772e16 23#include "sanitizer_common/sanitizer_common.h"
ef1b3fda 24#include "sanitizer_common/sanitizer_flags.h"
e9772e16 25#include "sanitizer_common/sanitizer_report_decorator.h"
df77f0e4 26#include "sanitizer_common/sanitizer_stackdepot.h"
e9772e16 27#include "sanitizer_common/sanitizer_symbolizer.h"
f35db108
WM
28
29namespace __asan {
30
31// -------------------- User-specified callbacks ----------------- {{{1
32static void (*error_report_callback)(const char*);
696d846a 33static char *error_message_buffer = nullptr;
f35db108 34static uptr error_message_buffer_pos = 0;
10189819
MO
35static BlockingMutex error_message_buf_mutex(LINKER_INITIALIZED);
36static const unsigned kAsanBuggyPcPoolSize = 25;
37static __sanitizer::atomic_uintptr_t AsanBuggyPcPool[kAsanBuggyPcPoolSize];
c5be964a 38
f35db108 39void AppendToErrorMessageBuffer(const char *buffer) {
10189819
MO
40 BlockingMutexLock l(&error_message_buf_mutex);
41 if (!error_message_buffer) {
42 error_message_buffer =
43 (char*)MmapOrDieQuietly(kErrorMessageBufferSize, __func__);
44 error_message_buffer_pos = 0;
f35db108 45 }
10189819
MO
46 uptr length = internal_strlen(buffer);
47 RAW_CHECK(kErrorMessageBufferSize >= error_message_buffer_pos);
48 uptr remaining = kErrorMessageBufferSize - error_message_buffer_pos;
49 internal_strncpy(error_message_buffer + error_message_buffer_pos,
50 buffer, remaining);
51 error_message_buffer[kErrorMessageBufferSize - 1] = '\0';
52 // FIXME: reallocate the buffer instead of truncating the message.
53 error_message_buffer_pos += Min(remaining, length);
f35db108
WM
54}
55
56// ---------------------- Helper functions ----------------------- {{{1
57
10189819
MO
58void PrintMemoryByte(InternalScopedString *str, const char *before, u8 byte,
59 bool in_shadow, const char *after) {
e9772e16 60 Decorator d;
c5be964a 61 str->append("%s%s%x%x%s%s", before,
5d3805fc
JJ
62 in_shadow ? d.ShadowByte(byte) : d.MemoryByte(), byte >> 4,
63 byte & 15, d.Default(), after);
c5be964a
KS
64}
65
f35db108
WM
66static void PrintZoneForPointer(uptr ptr, uptr zone_ptr,
67 const char *zone_name) {
68 if (zone_ptr) {
69 if (zone_name) {
70 Printf("malloc_zone_from_ptr(%p) = %p, which is %s\n",
71 ptr, zone_ptr, zone_name);
72 } else {
73 Printf("malloc_zone_from_ptr(%p) = %p, which doesn't have a name\n",
74 ptr, zone_ptr);
75 }
76 } else {
77 Printf("malloc_zone_from_ptr(%p) = 0\n", ptr);
78 }
79}
80
81// ---------------------- Address Descriptions ------------------- {{{1
82
866e32ad
KS
83bool ParseFrameDescription(const char *frame_descr,
84 InternalMmapVector<StackVarDescr> *vars) {
c5be964a 85 CHECK(frame_descr);
eac97531 86 const char *p;
c5be964a
KS
87 // This string is created by the compiler and has the following form:
88 // "n alloc_1 alloc_2 ... alloc_n"
5d3805fc
JJ
89 // where alloc_i looks like "offset size len ObjectName"
90 // or "offset size len ObjectName:line".
866e32ad 91 uptr n_objects = (uptr)internal_simple_strtoll(frame_descr, &p, 10);
c5be964a
KS
92 if (n_objects == 0)
93 return false;
866e32ad
KS
94
95 for (uptr i = 0; i < n_objects; i++) {
96 uptr beg = (uptr)internal_simple_strtoll(p, &p, 10);
97 uptr size = (uptr)internal_simple_strtoll(p, &p, 10);
98 uptr len = (uptr)internal_simple_strtoll(p, &p, 10);
99 if (beg == 0 || size == 0 || *p != ' ') {
100 return false;
101 }
102 p++;
5d3805fc
JJ
103 char *colon_pos = internal_strchr(p, ':');
104 uptr line = 0;
105 uptr name_len = len;
106 if (colon_pos != nullptr && colon_pos < p + len) {
107 name_len = colon_pos - p;
108 line = (uptr)internal_simple_strtoll(colon_pos + 1, nullptr, 10);
109 }
110 StackVarDescr var = {beg, size, p, name_len, line};
866e32ad
KS
111 vars->push_back(var);
112 p += len;
113 }
114
115 return true;
116}
ef1b3fda 117
f35db108
WM
118// -------------------- Different kinds of reports ----------------- {{{1
119
120// Use ScopedInErrorReport to run common actions just before and
121// immediately after printing error report.
122class ScopedInErrorReport {
123 public:
5d3805fc
JJ
124 explicit ScopedInErrorReport(bool fatal = false)
125 : halt_on_error_(fatal || flags()->halt_on_error) {
126 // Make sure the registry and sanitizer report mutexes are locked while
127 // we're printing an error report.
128 // We can lock them only here to avoid self-deadlock in case of
129 // recursive reports.
130 asanThreadRegistry().Lock();
131 Printf(
132 "=================================================================\n");
f35db108 133 }
55aea9f5
MO
134
135 ~ScopedInErrorReport() {
eac97531
ML
136 if (halt_on_error_ && !__sanitizer_acquire_crash_state()) {
137 asanThreadRegistry().Unlock();
138 return;
139 }
10189819
MO
140 ASAN_ON_ERROR();
141 if (current_error_.IsValid()) current_error_.Print();
142
f35db108 143 // Make sure the current thread is announced.
ef1b3fda 144 DescribeThread(GetCurrentThread());
dee5ea7a
KS
145 // We may want to grab this lock again when printing stats.
146 asanThreadRegistry().Unlock();
f35db108 147 // Print memory stats.
b4ab7d34
KS
148 if (flags()->print_stats)
149 __asan_print_accumulated_stats();
10189819
MO
150
151 if (common_flags()->print_cmdline)
152 PrintCmdline();
153
5d3805fc
JJ
154 if (common_flags()->print_module_map == 2) PrintModuleMap();
155
10189819
MO
156 // Copy the message buffer so that we could start logging without holding a
157 // lock that gets aquired during printing.
eac97531 158 InternalMmapVector<char> buffer_copy(kErrorMessageBufferSize);
10189819
MO
159 {
160 BlockingMutexLock l(&error_message_buf_mutex);
161 internal_memcpy(buffer_copy.data(),
162 error_message_buffer, kErrorMessageBufferSize);
3c6331c2
ML
163 // Clear error_message_buffer so that if we find other errors
164 // we don't re-log this error.
165 error_message_buffer_pos = 0;
10189819
MO
166 }
167
168 LogFullErrorReport(buffer_copy.data());
169
f35db108 170 if (error_report_callback) {
10189819 171 error_report_callback(buffer_copy.data());
f35db108 172 }
10189819 173
5d3805fc
JJ
174 if (halt_on_error_ && common_flags()->abort_on_error) {
175 // On Android the message is truncated to 512 characters.
176 // FIXME: implement "compact" error format, possibly without, or with
177 // highly compressed stack traces?
178 // FIXME: or just use the summary line as abort message?
179 SetAbortMessage(buffer_copy.data());
180 }
181
10189819
MO
182 // In halt_on_error = false mode, reset the current error object (before
183 // unlocking).
184 if (!halt_on_error_)
185 internal_memset(&current_error_, 0, sizeof(current_error_));
186
55aea9f5
MO
187 if (halt_on_error_) {
188 Report("ABORTING\n");
189 Die();
190 }
191 }
192
10189819
MO
193 void ReportError(const ErrorDescription &description) {
194 // Can only report one error per ScopedInErrorReport.
195 CHECK_EQ(current_error_.kind, kErrorKindInvalid);
b667dd70 196 internal_memcpy(&current_error_, &description, sizeof(current_error_));
10189819
MO
197 }
198
199 static ErrorDescription &CurrentError() {
200 return current_error_;
201 }
202
55aea9f5 203 private:
5d3805fc 204 ScopedErrorReportLock error_report_lock_;
10189819
MO
205 // Error currently being reported. This enables the destructor to interact
206 // with the debugger and point it to an error description.
207 static ErrorDescription current_error_;
55aea9f5 208 bool halt_on_error_;
f35db108
WM
209};
210
eac97531 211ErrorDescription ScopedInErrorReport::current_error_(LINKER_INITIALIZED);
55aea9f5 212
5d3805fc 213void ReportDeadlySignal(const SignalContext &sig) {
10189819 214 ScopedInErrorReport in_report(/*fatal*/ true);
5d3805fc 215 ErrorDeadlySignal error(GetCurrentTidOrInvalid(), sig);
10189819 216 in_report.ReportError(error);
f35db108
WM
217}
218
c5be964a 219void ReportDoubleFree(uptr addr, BufferedStackTrace *free_stack) {
f35db108 220 ScopedInErrorReport in_report;
10189819
MO
221 ErrorDoubleFree error(GetCurrentTidOrInvalid(), free_stack, addr);
222 in_report.ReportError(error);
f35db108
WM
223}
224
eac97531
ML
225void ReportNewDeleteTypeMismatch(uptr addr, uptr delete_size,
226 uptr delete_alignment,
c5be964a 227 BufferedStackTrace *free_stack) {
866e32ad 228 ScopedInErrorReport in_report;
eac97531
ML
229 ErrorNewDeleteTypeMismatch error(GetCurrentTidOrInvalid(), free_stack, addr,
230 delete_size, delete_alignment);
10189819 231 in_report.ReportError(error);
866e32ad
KS
232}
233
c5be964a 234void ReportFreeNotMalloced(uptr addr, BufferedStackTrace *free_stack) {
f35db108 235 ScopedInErrorReport in_report;
10189819
MO
236 ErrorFreeNotMalloced error(GetCurrentTidOrInvalid(), free_stack, addr);
237 in_report.ReportError(error);
f35db108
WM
238}
239
c5be964a 240void ReportAllocTypeMismatch(uptr addr, BufferedStackTrace *free_stack,
e9772e16
KS
241 AllocType alloc_type,
242 AllocType dealloc_type) {
e9772e16 243 ScopedInErrorReport in_report;
10189819
MO
244 ErrorAllocTypeMismatch error(GetCurrentTidOrInvalid(), free_stack, addr,
245 alloc_type, dealloc_type);
246 in_report.ReportError(error);
e9772e16
KS
247}
248
c5be964a 249void ReportMallocUsableSizeNotOwned(uptr addr, BufferedStackTrace *stack) {
f35db108 250 ScopedInErrorReport in_report;
10189819
MO
251 ErrorMallocUsableSizeNotOwned error(GetCurrentTidOrInvalid(), stack, addr);
252 in_report.ReportError(error);
f35db108
WM
253}
254
c5be964a
KS
255void ReportSanitizerGetAllocatedSizeNotOwned(uptr addr,
256 BufferedStackTrace *stack) {
f35db108 257 ScopedInErrorReport in_report;
10189819
MO
258 ErrorSanitizerGetAllocatedSizeNotOwned error(GetCurrentTidOrInvalid(), stack,
259 addr);
260 in_report.ReportError(error);
f35db108
WM
261}
262
eac97531
ML
263void ReportCallocOverflow(uptr count, uptr size, BufferedStackTrace *stack) {
264 ScopedInErrorReport in_report(/*fatal*/ true);
265 ErrorCallocOverflow error(GetCurrentTidOrInvalid(), stack, count, size);
266 in_report.ReportError(error);
267}
268
b667dd70
ML
269void ReportReallocArrayOverflow(uptr count, uptr size,
270 BufferedStackTrace *stack) {
271 ScopedInErrorReport in_report(/*fatal*/ true);
272 ErrorReallocArrayOverflow error(GetCurrentTidOrInvalid(), stack, count, size);
273 in_report.ReportError(error);
274}
275
eac97531
ML
276void ReportPvallocOverflow(uptr size, BufferedStackTrace *stack) {
277 ScopedInErrorReport in_report(/*fatal*/ true);
278 ErrorPvallocOverflow error(GetCurrentTidOrInvalid(), stack, size);
279 in_report.ReportError(error);
280}
281
282void ReportInvalidAllocationAlignment(uptr alignment,
283 BufferedStackTrace *stack) {
284 ScopedInErrorReport in_report(/*fatal*/ true);
285 ErrorInvalidAllocationAlignment error(GetCurrentTidOrInvalid(), stack,
286 alignment);
287 in_report.ReportError(error);
288}
289
290void ReportInvalidAlignedAllocAlignment(uptr size, uptr alignment,
291 BufferedStackTrace *stack) {
292 ScopedInErrorReport in_report(/*fatal*/ true);
293 ErrorInvalidAlignedAllocAlignment error(GetCurrentTidOrInvalid(), stack,
294 size, alignment);
295 in_report.ReportError(error);
296}
297
298void ReportInvalidPosixMemalignAlignment(uptr alignment,
299 BufferedStackTrace *stack) {
300 ScopedInErrorReport in_report(/*fatal*/ true);
301 ErrorInvalidPosixMemalignAlignment error(GetCurrentTidOrInvalid(), stack,
302 alignment);
303 in_report.ReportError(error);
304}
305
306void ReportAllocationSizeTooBig(uptr user_size, uptr total_size, uptr max_size,
307 BufferedStackTrace *stack) {
308 ScopedInErrorReport in_report(/*fatal*/ true);
309 ErrorAllocationSizeTooBig error(GetCurrentTidOrInvalid(), stack, user_size,
310 total_size, max_size);
311 in_report.ReportError(error);
312}
313
314void ReportRssLimitExceeded(BufferedStackTrace *stack) {
315 ScopedInErrorReport in_report(/*fatal*/ true);
316 ErrorRssLimitExceeded error(GetCurrentTidOrInvalid(), stack);
317 in_report.ReportError(error);
318}
319
320void ReportOutOfMemory(uptr requested_size, BufferedStackTrace *stack) {
321 ScopedInErrorReport in_report(/*fatal*/ true);
322 ErrorOutOfMemory error(GetCurrentTidOrInvalid(), stack, requested_size);
323 in_report.ReportError(error);
324}
325
c5be964a
KS
326void ReportStringFunctionMemoryRangesOverlap(const char *function,
327 const char *offset1, uptr length1,
328 const char *offset2, uptr length2,
329 BufferedStackTrace *stack) {
f35db108 330 ScopedInErrorReport in_report;
10189819
MO
331 ErrorStringFunctionMemoryRangesOverlap error(
332 GetCurrentTidOrInvalid(), stack, (uptr)offset1, length1, (uptr)offset2,
333 length2, function);
334 in_report.ReportError(error);
f35db108
WM
335}
336
dee5ea7a 337void ReportStringFunctionSizeOverflow(uptr offset, uptr size,
c5be964a 338 BufferedStackTrace *stack) {
dee5ea7a 339 ScopedInErrorReport in_report;
10189819
MO
340 ErrorStringFunctionSizeOverflow error(GetCurrentTidOrInvalid(), stack, offset,
341 size);
342 in_report.ReportError(error);
dee5ea7a
KS
343}
344
345void ReportBadParamsToAnnotateContiguousContainer(uptr beg, uptr end,
346 uptr old_mid, uptr new_mid,
c5be964a 347 BufferedStackTrace *stack) {
dee5ea7a 348 ScopedInErrorReport in_report;
10189819
MO
349 ErrorBadParamsToAnnotateContiguousContainer error(
350 GetCurrentTidOrInvalid(), stack, beg, end, old_mid, new_mid);
351 in_report.ReportError(error);
dee5ea7a
KS
352}
353
866e32ad
KS
354void ReportODRViolation(const __asan_global *g1, u32 stack_id1,
355 const __asan_global *g2, u32 stack_id2) {
dee5ea7a 356 ScopedInErrorReport in_report;
10189819
MO
357 ErrorODRViolation error(GetCurrentTidOrInvalid(), g1, stack_id1, g2,
358 stack_id2);
359 in_report.ReportError(error);
dee5ea7a
KS
360}
361
362// ----------------------- CheckForInvalidPointerPair ----------- {{{1
10189819
MO
363static NOINLINE void ReportInvalidPointerPair(uptr pc, uptr bp, uptr sp,
364 uptr a1, uptr a2) {
dee5ea7a 365 ScopedInErrorReport in_report;
10189819
MO
366 ErrorInvalidPointerPair error(GetCurrentTidOrInvalid(), pc, bp, sp, a1, a2);
367 in_report.ReportError(error);
dee5ea7a
KS
368}
369
05abad4c
ML
370static bool IsInvalidPointerPair(uptr a1, uptr a2) {
371 if (a1 == a2)
372 return false;
373
374 // 256B in shadow memory can be iterated quite fast
375 static const uptr kMaxOffset = 2048;
376
377 uptr left = a1 < a2 ? a1 : a2;
378 uptr right = a1 < a2 ? a2 : a1;
379 uptr offset = right - left;
380 if (offset <= kMaxOffset)
381 return __asan_region_is_poisoned(left, offset);
382
383 AsanThread *t = GetCurrentThread();
384
385 // check whether left is a stack memory pointer
386 if (uptr shadow_offset1 = t->GetStackVariableShadowStart(left)) {
387 uptr shadow_offset2 = t->GetStackVariableShadowStart(right);
388 return shadow_offset2 == 0 || shadow_offset1 != shadow_offset2;
389 }
390
391 // check whether left is a heap memory address
392 HeapAddressDescription hdesc1, hdesc2;
393 if (GetHeapAddressInformation(left, 0, &hdesc1) &&
394 hdesc1.chunk_access.access_type == kAccessTypeInside)
395 return !GetHeapAddressInformation(right, 0, &hdesc2) ||
396 hdesc2.chunk_access.access_type != kAccessTypeInside ||
397 hdesc1.chunk_access.chunk_begin != hdesc2.chunk_access.chunk_begin;
398
399 // check whether left is an address of a global variable
400 GlobalAddressDescription gdesc1, gdesc2;
401 if (GetGlobalAddressInformation(left, 0, &gdesc1))
402 return !GetGlobalAddressInformation(right - 1, 0, &gdesc2) ||
403 !gdesc1.PointsInsideTheSameVariable(gdesc2);
404
405 if (t->GetStackVariableShadowStart(right) ||
406 GetHeapAddressInformation(right, 0, &hdesc2) ||
407 GetGlobalAddressInformation(right - 1, 0, &gdesc2))
408 return true;
409
410 // At this point we know nothing about both a1 and a2 addresses.
411 return false;
412}
413
dee5ea7a 414static INLINE void CheckForInvalidPointerPair(void *p1, void *p2) {
4c4f3c3f 415 switch (flags()->detect_invalid_pointer_pairs) {
3ca75cd5
ML
416 case 0:
417 return;
418 case 1:
419 if (p1 == nullptr || p2 == nullptr)
420 return;
421 break;
4c4f3c3f
ML
422 }
423
dee5ea7a
KS
424 uptr a1 = reinterpret_cast<uptr>(p1);
425 uptr a2 = reinterpret_cast<uptr>(p2);
05abad4c
ML
426
427 if (IsInvalidPointerPair(a1, a2)) {
10189819 428 GET_CALLER_PC_BP_SP;
05abad4c 429 ReportInvalidPointerPair(pc, bp, sp, a1, a2);
dee5ea7a
KS
430 }
431}
f35db108
WM
432// ----------------------- Mac-specific reports ----------------- {{{1
433
c5be964a
KS
434void ReportMacMzReallocUnknown(uptr addr, uptr zone_ptr, const char *zone_name,
435 BufferedStackTrace *stack) {
f35db108
WM
436 ScopedInErrorReport in_report;
437 Printf("mz_realloc(%p) -- attempting to realloc unallocated memory.\n"
438 "This is an unrecoverable problem, exiting now.\n",
439 addr);
440 PrintZoneForPointer(addr, zone_ptr, zone_name);
dee5ea7a 441 stack->Print();
10189819 442 DescribeAddressIfHeap(addr);
f35db108
WM
443}
444
10189819
MO
445// -------------- SuppressErrorReport -------------- {{{1
446// Avoid error reports duplicating for ASan recover mode.
447static bool SuppressErrorReport(uptr pc) {
448 if (!common_flags()->suppress_equal_pcs) return false;
449 for (unsigned i = 0; i < kAsanBuggyPcPoolSize; i++) {
450 uptr cmp = atomic_load_relaxed(&AsanBuggyPcPool[i]);
451 if (cmp == 0 && atomic_compare_exchange_strong(&AsanBuggyPcPool[i], &cmp,
452 pc, memory_order_relaxed))
453 return false;
454 if (cmp == pc) return true;
455 }
456 Die();
f35db108
WM
457}
458
55aea9f5
MO
459void ReportGenericError(uptr pc, uptr bp, uptr sp, uptr addr, bool is_write,
460 uptr access_size, u32 exp, bool fatal) {
10189819 461 if (!fatal && SuppressErrorReport(pc)) return;
696d846a
MO
462 ENABLE_FRAME_POINTER;
463
464 // Optimization experiments.
465 // The experiments can be used to evaluate potential optimizations that remove
466 // instrumentation (assess false negatives). Instead of completely removing
467 // some instrumentation, compiler can emit special calls into runtime
468 // (e.g. __asan_report_exp_load1 instead of __asan_report_load1) and pass
469 // mask of experiments (exp).
470 // The reaction to a non-zero value of exp is to be defined.
471 (void)exp;
472
10189819
MO
473 ScopedInErrorReport in_report(fatal);
474 ErrorGeneric error(GetCurrentTidOrInvalid(), pc, bp, sp, addr, is_write,
475 access_size);
476 in_report.ReportError(error);
f35db108
WM
477}
478
55aea9f5
MO
479} // namespace __asan
480
481// --------------------------- Interface --------------------- {{{1
3ca75cd5 482using namespace __asan;
55aea9f5
MO
483
484void __asan_report_error(uptr pc, uptr bp, uptr sp, uptr addr, int is_write,
485 uptr access_size, u32 exp) {
486 ENABLE_FRAME_POINTER;
487 bool fatal = flags()->halt_on_error;
488 ReportGenericError(pc, bp, sp, addr, is_write, access_size, exp, fatal);
489}
490
f35db108 491void NOINLINE __asan_set_error_report_callback(void (*callback)(const char*)) {
10189819 492 BlockingMutexLock l(&error_message_buf_mutex);
f35db108 493 error_report_callback = callback;
f35db108
WM
494}
495
e9772e16 496void __asan_describe_address(uptr addr) {
866e32ad
KS
497 // Thread registry must be locked while we're describing an address.
498 asanThreadRegistry().Lock();
10189819 499 PrintAddressDescription(addr, 1, "");
866e32ad 500 asanThreadRegistry().Unlock();
e9772e16
KS
501}
502
c5be964a 503int __asan_report_present() {
5d3805fc 504 return ScopedInErrorReport::CurrentError().kind != kErrorKindInvalid;
c5be964a
KS
505}
506
507uptr __asan_get_report_pc() {
10189819
MO
508 if (ScopedInErrorReport::CurrentError().kind == kErrorKindGeneric)
509 return ScopedInErrorReport::CurrentError().Generic.pc;
510 return 0;
c5be964a
KS
511}
512
513uptr __asan_get_report_bp() {
10189819
MO
514 if (ScopedInErrorReport::CurrentError().kind == kErrorKindGeneric)
515 return ScopedInErrorReport::CurrentError().Generic.bp;
516 return 0;
c5be964a
KS
517}
518
519uptr __asan_get_report_sp() {
10189819
MO
520 if (ScopedInErrorReport::CurrentError().kind == kErrorKindGeneric)
521 return ScopedInErrorReport::CurrentError().Generic.sp;
522 return 0;
c5be964a
KS
523}
524
525uptr __asan_get_report_address() {
5d3805fc
JJ
526 ErrorDescription &err = ScopedInErrorReport::CurrentError();
527 if (err.kind == kErrorKindGeneric)
528 return err.Generic.addr_description.Address();
529 else if (err.kind == kErrorKindDoubleFree)
530 return err.DoubleFree.addr_description.addr;
10189819 531 return 0;
c5be964a
KS
532}
533
534int __asan_get_report_access_type() {
10189819
MO
535 if (ScopedInErrorReport::CurrentError().kind == kErrorKindGeneric)
536 return ScopedInErrorReport::CurrentError().Generic.is_write;
537 return 0;
c5be964a
KS
538}
539
540uptr __asan_get_report_access_size() {
10189819
MO
541 if (ScopedInErrorReport::CurrentError().kind == kErrorKindGeneric)
542 return ScopedInErrorReport::CurrentError().Generic.access_size;
543 return 0;
c5be964a
KS
544}
545
546const char *__asan_get_report_description() {
10189819
MO
547 if (ScopedInErrorReport::CurrentError().kind == kErrorKindGeneric)
548 return ScopedInErrorReport::CurrentError().Generic.bug_descr;
5d3805fc 549 return ScopedInErrorReport::CurrentError().Base.scariness.GetDescription();
c5be964a
KS
550}
551
dee5ea7a
KS
552extern "C" {
553SANITIZER_INTERFACE_ATTRIBUTE
554void __sanitizer_ptr_sub(void *a, void *b) {
555 CheckForInvalidPointerPair(a, b);
556}
557SANITIZER_INTERFACE_ATTRIBUTE
558void __sanitizer_ptr_cmp(void *a, void *b) {
559 CheckForInvalidPointerPair(a, b);
560}
696d846a 561} // extern "C"
dee5ea7a 562
f35db108
WM
563// Provide default implementation of __asan_on_error that does nothing
564// and may be overriden by user.
5d3805fc 565SANITIZER_INTERFACE_WEAK_DEF(void, __asan_on_error, void) {}