1 //===-- sanitizer_printf.cpp ----------------------------------------------===//
2 //
3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4 // See https://llvm.org/LICENSE.txt for license information.
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6 //
7 //===----------------------------------------------------------------------===//
8 //
9 // This file is shared between AddressSanitizer and ThreadSanitizer.
10 //
11 // Internal printf function, used inside run-time libraries.
12 // We can't use libc printf because we intercept some of the functions used
13 // inside it.
14 //===----------------------------------------------------------------------===//
15 
16 #include "sanitizer_common.h"
17 #include "sanitizer_flags.h"
18 #include "sanitizer_libc.h"
19 
20 #include <stdio.h>
21 #include <stdarg.h>
22 
23 #if SANITIZER_WINDOWS && defined(_MSC_VER) && _MSC_VER < 1800 &&               \
24       !defined(va_copy)
25 # define va_copy(dst, src) ((dst) = (src))
26 #endif
27 
28 namespace __sanitizer {
29 
30 static int AppendChar(char **buff, const char *buff_end, char c) {
31   if (*buff < buff_end) {
32     **buff = c;
33     (*buff)++;
34   }
35   return 1;
36 }
37 
38 // Appends number in a given base to buffer. If its length is less than
39 // |minimal_num_length|, it is padded with leading zeroes or spaces, depending
40 // on the value of |pad_with_zero|.
41 static int AppendNumber(char **buff, const char *buff_end, u64 absolute_value,
42                         u8 base, u8 minimal_num_length, bool pad_with_zero,
43                         bool negative, bool uppercase) {
44   uptr const kMaxLen = 30;
45   RAW_CHECK(base == 10 || base == 16);
46   RAW_CHECK(base == 10 || !negative);
47   RAW_CHECK(absolute_value || !negative);
48   RAW_CHECK(minimal_num_length < kMaxLen);
49   int result = 0;
50   if (negative && minimal_num_length)
51     --minimal_num_length;
52   if (negative && pad_with_zero)
53     result += AppendChar(buff, buff_end, '-');
54   uptr num_buffer[kMaxLen];
55   int pos = 0;
56   do {
57     RAW_CHECK_MSG((uptr)pos < kMaxLen, "AppendNumber buffer overflow");
58     num_buffer[pos++] = absolute_value % base;
59     absolute_value /= base;
60   } while (absolute_value > 0);
61   if (pos < minimal_num_length) {
62     // Make sure compiler doesn't insert call to memset here.
63     internal_memset(&num_buffer[pos], 0,
64                     sizeof(num_buffer[0]) * (minimal_num_length - pos));
65     pos = minimal_num_length;
66   }
67   RAW_CHECK(pos > 0);
68   pos--;
69   for (; pos >= 0 && num_buffer[pos] == 0; pos--) {
70     char c = (pad_with_zero || pos == 0) ? '0' : ' ';
71     result += AppendChar(buff, buff_end, c);
72   }
73   if (negative && !pad_with_zero) result += AppendChar(buff, buff_end, '-');
74   for (; pos >= 0; pos--) {
75     char digit = static_cast<char>(num_buffer[pos]);
76     digit = (digit < 10) ? '0' + digit : (uppercase ? 'A' : 'a') + digit - 10;
77     result += AppendChar(buff, buff_end, digit);
78   }
79   return result;
80 }
81 
82 static int AppendUnsigned(char **buff, const char *buff_end, u64 num, u8 base,
83                           u8 minimal_num_length, bool pad_with_zero,
84                           bool uppercase) {
85   return AppendNumber(buff, buff_end, num, base, minimal_num_length,
86                       pad_with_zero, false /* negative */, uppercase);
87 }
88 
89 static int AppendSignedDecimal(char **buff, const char *buff_end, s64 num,
90                                u8 minimal_num_length, bool pad_with_zero) {
91   bool negative = (num < 0);
92   return AppendNumber(buff, buff_end, (u64)(negative ? -num : num), 10,
93                       minimal_num_length, pad_with_zero, negative,
94                       false /* uppercase */);
95 }
96 
97 
98 // Use the fact that explicitly requesting 0 width (%0s) results in UB and
99 // interpret width == 0 as "no width requested":
100 // width == 0 - no width requested
101 // width  < 0 - left-justify s within and pad it to -width chars, if necessary
102 // width  > 0 - right-justify s, not implemented yet
103 static int AppendString(char **buff, const char *buff_end, int width,
104                         int max_chars, const char *s) {
105   if (!s)
106     s = "<null>";
107   int result = 0;
108   for (; *s; s++) {
109     if (max_chars >= 0 && result >= max_chars)
110       break;
111     result += AppendChar(buff, buff_end, *s);
112   }
113   // Only the left justified strings are supported.
114   while (width < -result)
115     result += AppendChar(buff, buff_end, ' ');
116   return result;
117 }
118 
119 static int AppendPointer(char **buff, const char *buff_end, u64 ptr_value) {
120   int result = 0;
121   result += AppendString(buff, buff_end, 0, -1, "0x");
122   result += AppendUnsigned(buff, buff_end, ptr_value, 16,
123                            SANITIZER_POINTER_FORMAT_LENGTH,
124                            true /* pad_with_zero */, false /* uppercase */);
125   return result;
126 }
127 
128 int VSNPrintf(char *buff, int buff_length,
129               const char *format, va_list args) {
130   static const char *kPrintfFormatsHelp =
131       "Supported Printf formats: %([0-9]*)?(z|ll)?{d,u,x,X}; %p; "
132       "%[-]([0-9]*)?(\\.\\*)?s; %c\n";
133   RAW_CHECK(format);
134   RAW_CHECK(buff_length > 0);
135   const char *buff_end = &buff[buff_length - 1];
136   const char *cur = format;
137   int result = 0;
138   for (; *cur; cur++) {
139     if (*cur != '%') {
140       result += AppendChar(&buff, buff_end, *cur);
141       continue;
142     }
143     cur++;
144     bool left_justified = *cur == '-';
145     if (left_justified)
146       cur++;
147     bool have_width = (*cur >= '0' && *cur <= '9');
148     bool pad_with_zero = (*cur == '0');
149     int width = 0;
150     if (have_width) {
151       while (*cur >= '0' && *cur <= '9') {
152         width = width * 10 + *cur++ - '0';
153       }
154     }
155     bool have_precision = (cur[0] == '.' && cur[1] == '*');
156     int precision = -1;
157     if (have_precision) {
158       cur += 2;
159       precision = va_arg(args, int);
160     }
161     bool have_z = (*cur == 'z');
162     cur += have_z;
163     bool have_ll = !have_z && (cur[0] == 'l' && cur[1] == 'l');
164     cur += have_ll * 2;
165     s64 dval;
166     u64 uval;
167     const bool have_length = have_z || have_ll;
168     const bool have_flags = have_width || have_length;
169     // At the moment only %s supports precision and left-justification.
170     CHECK(!((precision >= 0 || left_justified) && *cur != 's'));
171     switch (*cur) {
172       case 'd': {
173         dval = have_ll ? va_arg(args, s64)
174              : have_z ? va_arg(args, sptr)
175              : va_arg(args, int);
176         result += AppendSignedDecimal(&buff, buff_end, dval, width,
177                                       pad_with_zero);
178         break;
179       }
180       case 'u':
181       case 'x':
182       case 'X': {
183         uval = have_ll ? va_arg(args, u64)
184              : have_z ? va_arg(args, uptr)
185              : va_arg(args, unsigned);
186         bool uppercase = (*cur == 'X');
187         result += AppendUnsigned(&buff, buff_end, uval, (*cur == 'u') ? 10 : 16,
188                                  width, pad_with_zero, uppercase);
189         break;
190       }
191       case 'p': {
192         RAW_CHECK_MSG(!have_flags, kPrintfFormatsHelp);
193         result += AppendPointer(&buff, buff_end, va_arg(args, uptr));
194         break;
195       }
196       case 's': {
197         RAW_CHECK_MSG(!have_length, kPrintfFormatsHelp);
198         // Only left-justified width is supported.
199         CHECK(!have_width || left_justified);
200         result += AppendString(&buff, buff_end, left_justified ? -width : width,
201                                precision, va_arg(args, char*));
202         break;
203       }
204       case 'c': {
205         RAW_CHECK_MSG(!have_flags, kPrintfFormatsHelp);
206         result += AppendChar(&buff, buff_end, va_arg(args, int));
207         break;
208       }
209       case '%' : {
210         RAW_CHECK_MSG(!have_flags, kPrintfFormatsHelp);
211         result += AppendChar(&buff, buff_end, '%');
212         break;
213       }
214       default: {
215         RAW_CHECK_MSG(false, kPrintfFormatsHelp);
216       }
217     }
218   }
219   RAW_CHECK(buff <= buff_end);
220   AppendChar(&buff, buff_end + 1, '\0');
221   return result;
222 }
223 
224 static void (*PrintfAndReportCallback)(const char *);
225 void SetPrintfAndReportCallback(void (*callback)(const char *)) {
226   PrintfAndReportCallback = callback;
227 }
228 
229 // Can be overriden in frontend.
230 #if SANITIZER_GO && defined(TSAN_EXTERNAL_HOOKS)
231 // Implementation must be defined in frontend.
232 extern "C" void __sanitizer_on_print(const char *str);
233 #else
234 SANITIZER_INTERFACE_WEAK_DEF(void, __sanitizer_on_print, const char *str) {
235   (void)str;
236 }
237 #endif
238 
239 static void CallPrintfAndReportCallback(const char *str) {
240   __sanitizer_on_print(str);
241   if (PrintfAndReportCallback)
242     PrintfAndReportCallback(str);
243 }
244 
245 static void NOINLINE SharedPrintfCodeNoBuffer(bool append_pid,
246                                               char *local_buffer,
247                                               int buffer_size,
248                                               const char *format,
249                                               va_list args) {
250   va_list args2;
251   va_copy(args2, args);
252   const int kLen = 16 * 1024;
253   int needed_length;
254   char *buffer = local_buffer;
255   // First try to print a message using a local buffer, and then fall back to
256   // mmaped buffer.
257   for (int use_mmap = 0; use_mmap < 2; use_mmap++) {
258     if (use_mmap) {
259       va_end(args);
260       va_copy(args, args2);
261       buffer = (char*)MmapOrDie(kLen, "Report");
262       buffer_size = kLen;
263     }
264     needed_length = 0;
265     // Check that data fits into the current buffer.
266 #   define CHECK_NEEDED_LENGTH \
267       if (needed_length >= buffer_size) { \
268         if (!use_mmap) continue; \
269         RAW_CHECK_MSG(needed_length < kLen, \
270                       "Buffer in Report is too short!\n"); \
271       }
272     // Fuchsia's logging infrastructure always keeps track of the logging
273     // process, thread, and timestamp, so never prepend such information.
274     if (!SANITIZER_FUCHSIA && append_pid) {
275       int pid = internal_getpid();
276       const char *exe_name = GetProcessName();
277       if (common_flags()->log_exe_name && exe_name) {
278         needed_length += internal_snprintf(buffer, buffer_size,
279                                            "==%s", exe_name);
280         CHECK_NEEDED_LENGTH
281       }
282       needed_length += internal_snprintf(
283           buffer + needed_length, buffer_size - needed_length, "==%d==", pid);
284       CHECK_NEEDED_LENGTH
285     }
286     needed_length += VSNPrintf(buffer + needed_length,
287                                buffer_size - needed_length, format, args);
288     CHECK_NEEDED_LENGTH
289     // If the message fit into the buffer, print it and exit.
290     break;
291 #   undef CHECK_NEEDED_LENGTH
292   }
293   RawWrite(buffer);
294 
295   // Remove color sequences from the message.
296   RemoveANSIEscapeSequencesFromString(buffer);
297   CallPrintfAndReportCallback(buffer);
298   LogMessageOnPrintf(buffer);
299 
300   // If we had mapped any memory, clean up.
301   if (buffer != local_buffer)
302     UnmapOrDie((void *)buffer, buffer_size);
303   va_end(args2);
304 }
305 
306 static void NOINLINE SharedPrintfCode(bool append_pid, const char *format,
307                                       va_list args) {
308   // |local_buffer| is small enough not to overflow the stack and/or violate
309   // the stack limit enforced by TSan (-Wframe-larger-than=512). On the other
310   // hand, the bigger the buffer is, the more the chance the error report will
311   // fit into it.
312   char local_buffer[400];
313   SharedPrintfCodeNoBuffer(append_pid, local_buffer, ARRAY_SIZE(local_buffer),
314                            format, args);
315 }
316 
317 FORMAT(1, 2)
318 void Printf(const char *format, ...) {
319   va_list args;
320   va_start(args, format);
321   SharedPrintfCode(false, format, args);
322   va_end(args);
323 }
324 
325 // Like Printf, but prints the current PID before the output string.
326 FORMAT(1, 2)
327 void Report(const char *format, ...) {
328   va_list args;
329   va_start(args, format);
330   SharedPrintfCode(true, format, args);
331   va_end(args);
332 }
333 
334 // Writes at most "length" symbols to "buffer" (including trailing '\0').
335 // Returns the number of symbols that should have been written to buffer
336 // (not including trailing '\0'). Thus, the string is truncated
337 // iff return value is not less than "length".
338 FORMAT(3, 4)
339 int internal_snprintf(char *buffer, uptr length, const char *format, ...) {
340   va_list args;
341   va_start(args, format);
342   int needed_length = VSNPrintf(buffer, length, format, args);
343   va_end(args);
344   return needed_length;
345 }
346 
347 FORMAT(2, 3)
348 void InternalScopedString::append(const char *format, ...) {
349   CHECK_LT(length_, size());
350   va_list args;
351   va_start(args, format);
352   VSNPrintf(data() + length_, size() - length_, format, args);
353   va_end(args);
354   length_ += internal_strlen(data() + length_);
355   CHECK_LT(length_, size());
356 }
357 
358 } // namespace __sanitizer
359