//===--- rtsan_suppressions.cpp - Realtime Sanitizer ------------*- C++ -*-===// // // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. // See https://llvm.org/LICENSE.txt for license information. // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception // //===----------------------------------------------------------------------===// // // This file is a part of the RTSan runtime, providing support for suppressions // //===----------------------------------------------------------------------===// #include "rtsan/rtsan_suppressions.h" #include "rtsan/rtsan_flags.h" #include "sanitizer_common/sanitizer_common.h" #include "sanitizer_common/sanitizer_internal_defs.h" #include "sanitizer_common/sanitizer_suppressions.h" #include "sanitizer_common/sanitizer_symbolizer.h" #include using namespace __sanitizer; using namespace __rtsan; namespace { enum class ErrorType { #define RTSAN_CHECK(Name, FSanitizeFlagName) Name, #include "rtsan_checks.inc" #undef RTSAN_CHECK }; } // namespace alignas(64) static char suppression_placeholder[sizeof(SuppressionContext)]; static SuppressionContext *suppression_ctx = nullptr; static const char *kSuppressionTypes[] = { #define RTSAN_CHECK(Name, FSanitizeFlagName) FSanitizeFlagName, #include "rtsan_checks.inc" #undef RTSAN_CHECK }; static const char *ConvertTypeToFlagName(ErrorType Type) { switch (Type) { #define RTSAN_CHECK(Name, FSanitizeFlagName) \ case ErrorType::Name: \ return FSanitizeFlagName; #include "rtsan_checks.inc" #undef RTSAN_CHECK } UNREACHABLE("unknown ErrorType!"); } void __rtsan::InitializeSuppressions() { CHECK_EQ(nullptr, suppression_ctx); // We will use suppression_ctx == nullptr as an early out if (!flags().ContainsSuppresionFile()) return; suppression_ctx = new (suppression_placeholder) SuppressionContext(kSuppressionTypes, ARRAY_SIZE(kSuppressionTypes)); suppression_ctx->ParseFromFile(flags().suppressions); } bool __rtsan::IsStackTraceSuppressed(const StackTrace &stack) { if (suppression_ctx == nullptr) return false; const char *call_stack_flag = ConvertTypeToFlagName(ErrorType::CallStackContains); if (!suppression_ctx->HasSuppressionType(call_stack_flag)) return false; Symbolizer *symbolizer = Symbolizer::GetOrInit(); for (uptr i = 0; i < stack.size && stack.trace[i]; i++) { const uptr addr = stack.trace[i]; SymbolizedStackHolder symbolized_stack(symbolizer->SymbolizePC(addr)); const SymbolizedStack *frames = symbolized_stack.get(); CHECK(frames); for (const SymbolizedStack *cur = frames; cur; cur = cur->next) { const char *function_name = cur->info.function; if (!function_name) continue; Suppression *s; if (suppression_ctx->Match(function_name, call_stack_flag, &s)) return true; } } return false; } bool __rtsan::IsFunctionSuppressed(const char *function_name) { if (suppression_ctx == nullptr) return false; const char *flag_name = ConvertTypeToFlagName(ErrorType::FunctionNameMatches); if (!suppression_ctx->HasSuppressionType(flag_name)) return false; Suppression *s; return suppression_ctx->Match(function_name, flag_name, &s); }