SanitizerArgs.cpp 28 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701
  1. //===--- SanitizerArgs.cpp - Arguments for sanitizer tools ---------------===//
  2. //
  3. // The LLVM Compiler Infrastructure
  4. //
  5. // This file is distributed under the University of Illinois Open Source
  6. // License. See LICENSE.TXT for details.
  7. //
  8. //===----------------------------------------------------------------------===//
  9. #include "clang/Driver/SanitizerArgs.h"
  10. #include "Tools.h"
  11. #include "clang/Basic/Sanitizers.h"
  12. #include "clang/Driver/Driver.h"
  13. #include "clang/Driver/DriverDiagnostic.h"
  14. #include "clang/Driver/Options.h"
  15. #include "clang/Driver/ToolChain.h"
  16. #include "llvm/ADT/StringExtras.h"
  17. #include "llvm/ADT/StringSwitch.h"
  18. #include "llvm/Support/FileSystem.h"
  19. #include "llvm/Support/Path.h"
  20. #include "llvm/Support/SpecialCaseList.h"
  21. #include <memory>
  22. // //
  23. ///////////////////////////////////////////////////////////////////////////////
  24. using namespace clang;
  25. using namespace clang::SanitizerKind;
  26. using namespace clang::driver;
  27. using namespace llvm::opt;
  28. enum : SanitizerMask {
  29. NeedsUbsanRt = Undefined | Integer | CFI,
  30. NeedsUbsanCxxRt = Vptr | CFI,
  31. NotAllowedWithTrap = Vptr,
  32. RequiresPIE = Memory | DataFlow,
  33. NeedsUnwindTables = Address | Thread | Memory | DataFlow,
  34. SupportsCoverage = Address | Memory | Leak | Undefined | Integer | DataFlow,
  35. RecoverableByDefault = Undefined | Integer,
  36. Unrecoverable = Address | Unreachable | Return,
  37. LegacyFsanitizeRecoverMask = Undefined | Integer,
  38. NeedsLTO = CFI,
  39. TrappingSupported =
  40. (Undefined & ~Vptr) | UnsignedIntegerOverflow | LocalBounds | CFI,
  41. TrappingDefault = CFI,
  42. };
  43. enum CoverageFeature {
  44. CoverageFunc = 1 << 0,
  45. CoverageBB = 1 << 1,
  46. CoverageEdge = 1 << 2,
  47. CoverageIndirCall = 1 << 3,
  48. CoverageTraceBB = 1 << 4,
  49. CoverageTraceCmp = 1 << 5,
  50. Coverage8bitCounters = 1 << 6,
  51. };
  52. /// Parse a -fsanitize= or -fno-sanitize= argument's values, diagnosing any
  53. /// invalid components. Returns a SanitizerMask.
  54. static SanitizerMask parseArgValues(const Driver &D, const llvm::opt::Arg *A,
  55. bool DiagnoseErrors);
  56. /// Parse -f(no-)?sanitize-coverage= flag values, diagnosing any invalid
  57. /// components. Returns OR of members of \c CoverageFeature enumeration.
  58. static int parseCoverageFeatures(const Driver &D, const llvm::opt::Arg *A);
  59. /// Produce an argument string from ArgList \p Args, which shows how it
  60. /// provides some sanitizer kind from \p Mask. For example, the argument list
  61. /// "-fsanitize=thread,vptr -fsanitize=address" with mask \c NeedsUbsanRt
  62. /// would produce "-fsanitize=vptr".
  63. static std::string lastArgumentForMask(const Driver &D,
  64. const llvm::opt::ArgList &Args,
  65. SanitizerMask Mask);
  66. /// Produce an argument string from argument \p A, which shows how it provides
  67. /// a value in \p Mask. For instance, the argument
  68. /// "-fsanitize=address,alignment" with mask \c NeedsUbsanRt would produce
  69. /// "-fsanitize=alignment".
  70. static std::string describeSanitizeArg(const llvm::opt::Arg *A,
  71. SanitizerMask Mask);
  72. /// Produce a string containing comma-separated names of sanitizers in \p
  73. /// Sanitizers set.
  74. static std::string toString(const clang::SanitizerSet &Sanitizers);
  75. static bool getDefaultBlacklist(const Driver &D, SanitizerMask Kinds,
  76. std::string &BLPath) {
  77. const char *BlacklistFile = nullptr;
  78. if (Kinds & Address)
  79. BlacklistFile = "asan_blacklist.txt";
  80. else if (Kinds & Memory)
  81. BlacklistFile = "msan_blacklist.txt";
  82. else if (Kinds & Thread)
  83. BlacklistFile = "tsan_blacklist.txt";
  84. else if (Kinds & DataFlow)
  85. BlacklistFile = "dfsan_abilist.txt";
  86. if (BlacklistFile) {
  87. clang::SmallString<64> Path(D.ResourceDir);
  88. llvm::sys::path::append(Path, BlacklistFile);
  89. BLPath = Path.str();
  90. return true;
  91. }
  92. return false;
  93. }
  94. /// Sets group bits for every group that has at least one representative already
  95. /// enabled in \p Kinds.
  96. static SanitizerMask setGroupBits(SanitizerMask Kinds) {
  97. #define SANITIZER(NAME, ID)
  98. #define SANITIZER_GROUP(NAME, ID, ALIAS) \
  99. if (Kinds & SanitizerKind::ID) \
  100. Kinds |= SanitizerKind::ID##Group;
  101. #include "clang/Basic/Sanitizers.def"
  102. return Kinds;
  103. }
  104. static SanitizerMask parseSanitizeTrapArgs(const Driver &D,
  105. const llvm::opt::ArgList &Args) {
  106. SanitizerMask TrapRemove = 0; // During the loop below, the accumulated set of
  107. // sanitizers disabled by the current sanitizer
  108. // argument or any argument after it.
  109. SanitizerMask TrappingKinds = 0;
  110. SanitizerMask TrappingSupportedWithGroups = setGroupBits(TrappingSupported);
  111. for (ArgList::const_reverse_iterator I = Args.rbegin(), E = Args.rend();
  112. I != E; ++I) {
  113. const auto *Arg = *I;
  114. if (Arg->getOption().matches(options::OPT_fsanitize_trap_EQ)) {
  115. Arg->claim();
  116. SanitizerMask Add = parseArgValues(D, Arg, true);
  117. Add &= ~TrapRemove;
  118. if (SanitizerMask InvalidValues = Add & ~TrappingSupportedWithGroups) {
  119. SanitizerSet S;
  120. S.Mask = InvalidValues;
  121. D.Diag(diag::err_drv_unsupported_option_argument) << "-fsanitize-trap"
  122. << toString(S);
  123. }
  124. TrappingKinds |= expandSanitizerGroups(Add) & ~TrapRemove;
  125. } else if (Arg->getOption().matches(options::OPT_fno_sanitize_trap_EQ)) {
  126. Arg->claim();
  127. TrapRemove |= expandSanitizerGroups(parseArgValues(D, Arg, true));
  128. } else if (Arg->getOption().matches(
  129. options::OPT_fsanitize_undefined_trap_on_error)) {
  130. Arg->claim();
  131. TrappingKinds |=
  132. expandSanitizerGroups(UndefinedGroup & ~TrapRemove) & ~TrapRemove;
  133. } else if (Arg->getOption().matches(
  134. options::OPT_fno_sanitize_undefined_trap_on_error)) {
  135. Arg->claim();
  136. TrapRemove |= expandSanitizerGroups(UndefinedGroup);
  137. }
  138. }
  139. // Apply default trapping behavior.
  140. TrappingKinds |= TrappingDefault & ~TrapRemove;
  141. return TrappingKinds;
  142. }
  143. bool SanitizerArgs::needsUbsanRt() const {
  144. return (Sanitizers.Mask & NeedsUbsanRt & ~TrapSanitizers.Mask) &&
  145. !Sanitizers.has(Address) &&
  146. !Sanitizers.has(Memory) &&
  147. !Sanitizers.has(Thread);
  148. }
  149. bool SanitizerArgs::requiresPIE() const {
  150. return AsanZeroBaseShadow || (Sanitizers.Mask & RequiresPIE);
  151. }
  152. bool SanitizerArgs::needsUnwindTables() const {
  153. return Sanitizers.Mask & NeedsUnwindTables;
  154. }
  155. void SanitizerArgs::clear() {
  156. Sanitizers.clear();
  157. RecoverableSanitizers.clear();
  158. TrapSanitizers.clear();
  159. BlacklistFiles.clear();
  160. CoverageFeatures = 0;
  161. MsanTrackOrigins = 0;
  162. MsanUseAfterDtor = false;
  163. AsanFieldPadding = 0;
  164. AsanZeroBaseShadow = false;
  165. AsanSharedRuntime = false;
  166. LinkCXXRuntimes = false;
  167. }
  168. SanitizerArgs::SanitizerArgs(const ToolChain &TC,
  169. const llvm::opt::ArgList &Args) {
  170. clear();
  171. SanitizerMask AllRemove = 0; // During the loop below, the accumulated set of
  172. // sanitizers disabled by the current sanitizer
  173. // argument or any argument after it.
  174. SanitizerMask AllAddedKinds = 0; // Mask of all sanitizers ever enabled by
  175. // -fsanitize= flags (directly or via group
  176. // expansion), some of which may be disabled
  177. // later. Used to carefully prune
  178. // unused-argument diagnostics.
  179. SanitizerMask DiagnosedKinds = 0; // All Kinds we have diagnosed up to now.
  180. // Used to deduplicate diagnostics.
  181. SanitizerMask Kinds = 0;
  182. const SanitizerMask Supported = setGroupBits(TC.getSupportedSanitizers());
  183. ToolChain::RTTIMode RTTIMode = TC.getRTTIMode();
  184. const Driver &D = TC.getDriver();
  185. SanitizerMask TrappingKinds = parseSanitizeTrapArgs(D, Args);
  186. SanitizerMask InvalidTrappingKinds = TrappingKinds & NotAllowedWithTrap;
  187. for (ArgList::const_reverse_iterator I = Args.rbegin(), E = Args.rend();
  188. I != E; ++I) {
  189. const auto *Arg = *I;
  190. if (Arg->getOption().matches(options::OPT_fsanitize_EQ)) {
  191. Arg->claim();
  192. SanitizerMask Add = parseArgValues(D, Arg, true);
  193. AllAddedKinds |= expandSanitizerGroups(Add);
  194. // Avoid diagnosing any sanitizer which is disabled later.
  195. Add &= ~AllRemove;
  196. // At this point we have not expanded groups, so any unsupported
  197. // sanitizers in Add are those which have been explicitly enabled.
  198. // Diagnose them.
  199. if (SanitizerMask KindsToDiagnose =
  200. Add & InvalidTrappingKinds & ~DiagnosedKinds) {
  201. std::string Desc = describeSanitizeArg(*I, KindsToDiagnose);
  202. D.Diag(diag::err_drv_argument_not_allowed_with)
  203. << Desc << "-fsanitize-trap=undefined";
  204. DiagnosedKinds |= KindsToDiagnose;
  205. }
  206. Add &= ~InvalidTrappingKinds;
  207. if (SanitizerMask KindsToDiagnose = Add & ~Supported & ~DiagnosedKinds) {
  208. std::string Desc = describeSanitizeArg(*I, KindsToDiagnose);
  209. D.Diag(diag::err_drv_unsupported_opt_for_target)
  210. << Desc << TC.getTriple().str();
  211. DiagnosedKinds |= KindsToDiagnose;
  212. }
  213. Add &= Supported;
  214. // Test for -fno-rtti + explicit -fsanitizer=vptr before expanding groups
  215. // so we don't error out if -fno-rtti and -fsanitize=undefined were
  216. // passed.
  217. if (Add & Vptr &&
  218. (RTTIMode == ToolChain::RM_DisabledImplicitly ||
  219. RTTIMode == ToolChain::RM_DisabledExplicitly)) {
  220. if (RTTIMode == ToolChain::RM_DisabledImplicitly)
  221. // Warn about not having rtti enabled if the vptr sanitizer is
  222. // explicitly enabled
  223. D.Diag(diag::warn_drv_disabling_vptr_no_rtti_default);
  224. else {
  225. const llvm::opt::Arg *NoRTTIArg = TC.getRTTIArg();
  226. assert(NoRTTIArg &&
  227. "RTTI disabled explicitly but we have no argument!");
  228. D.Diag(diag::err_drv_argument_not_allowed_with)
  229. << "-fsanitize=vptr" << NoRTTIArg->getAsString(Args);
  230. }
  231. // Take out the Vptr sanitizer from the enabled sanitizers
  232. AllRemove |= Vptr;
  233. }
  234. Add = expandSanitizerGroups(Add);
  235. // Group expansion may have enabled a sanitizer which is disabled later.
  236. Add &= ~AllRemove;
  237. // Silently discard any unsupported sanitizers implicitly enabled through
  238. // group expansion.
  239. Add &= ~InvalidTrappingKinds;
  240. Add &= Supported;
  241. Kinds |= Add;
  242. } else if (Arg->getOption().matches(options::OPT_fno_sanitize_EQ)) {
  243. Arg->claim();
  244. SanitizerMask Remove = parseArgValues(D, Arg, true);
  245. AllRemove |= expandSanitizerGroups(Remove);
  246. }
  247. }
  248. // We disable the vptr sanitizer if it was enabled by group expansion but RTTI
  249. // is disabled.
  250. if ((Kinds & Vptr) &&
  251. (RTTIMode == ToolChain::RM_DisabledImplicitly ||
  252. RTTIMode == ToolChain::RM_DisabledExplicitly)) {
  253. Kinds &= ~Vptr;
  254. }
  255. // Check that LTO is enabled if we need it.
  256. if ((Kinds & NeedsLTO) && !D.IsUsingLTO(Args)) {
  257. D.Diag(diag::err_drv_argument_only_allowed_with)
  258. << lastArgumentForMask(D, Args, Kinds & NeedsLTO) << "-flto";
  259. }
  260. // Report error if there are non-trapping sanitizers that require
  261. // c++abi-specific parts of UBSan runtime, and they are not provided by the
  262. // toolchain. We don't have a good way to check the latter, so we just
  263. // check if the toolchan supports vptr.
  264. if (~Supported & Vptr) {
  265. SanitizerMask KindsToDiagnose = Kinds & ~TrappingKinds & NeedsUbsanCxxRt;
  266. // The runtime library supports the Microsoft C++ ABI, but only well enough
  267. // for CFI. FIXME: Remove this once we support vptr on Windows.
  268. if (TC.getTriple().isOSWindows())
  269. KindsToDiagnose &= ~CFI;
  270. if (KindsToDiagnose) {
  271. SanitizerSet S;
  272. S.Mask = KindsToDiagnose;
  273. D.Diag(diag::err_drv_unsupported_opt_for_target)
  274. << ("-fno-sanitize-trap=" + toString(S)) << TC.getTriple().str();
  275. Kinds &= ~KindsToDiagnose;
  276. }
  277. }
  278. // Warn about incompatible groups of sanitizers.
  279. std::pair<SanitizerMask, SanitizerMask> IncompatibleGroups[] = {
  280. std::make_pair(Address, Thread), std::make_pair(Address, Memory),
  281. std::make_pair(Thread, Memory), std::make_pair(Leak, Thread),
  282. std::make_pair(Leak, Memory), std::make_pair(KernelAddress, Address),
  283. std::make_pair(KernelAddress, Leak),
  284. std::make_pair(KernelAddress, Thread),
  285. std::make_pair(KernelAddress, Memory)};
  286. for (auto G : IncompatibleGroups) {
  287. SanitizerMask Group = G.first;
  288. if (Kinds & Group) {
  289. if (SanitizerMask Incompatible = Kinds & G.second) {
  290. D.Diag(clang::diag::err_drv_argument_not_allowed_with)
  291. << lastArgumentForMask(D, Args, Group)
  292. << lastArgumentForMask(D, Args, Incompatible);
  293. Kinds &= ~Incompatible;
  294. }
  295. }
  296. }
  297. // FIXME: Currently -fsanitize=leak is silently ignored in the presence of
  298. // -fsanitize=address. Perhaps it should print an error, or perhaps
  299. // -f(-no)sanitize=leak should change whether leak detection is enabled by
  300. // default in ASan?
  301. // Parse -f(no-)?sanitize-recover flags.
  302. SanitizerMask RecoverableKinds = RecoverableByDefault;
  303. SanitizerMask DiagnosedUnrecoverableKinds = 0;
  304. for (const auto *Arg : Args) {
  305. const char *DeprecatedReplacement = nullptr;
  306. if (Arg->getOption().matches(options::OPT_fsanitize_recover)) {
  307. DeprecatedReplacement = "-fsanitize-recover=undefined,integer";
  308. RecoverableKinds |= expandSanitizerGroups(LegacyFsanitizeRecoverMask);
  309. Arg->claim();
  310. } else if (Arg->getOption().matches(options::OPT_fno_sanitize_recover)) {
  311. DeprecatedReplacement = "-fno-sanitize-recover=undefined,integer";
  312. RecoverableKinds &= ~expandSanitizerGroups(LegacyFsanitizeRecoverMask);
  313. Arg->claim();
  314. } else if (Arg->getOption().matches(options::OPT_fsanitize_recover_EQ)) {
  315. SanitizerMask Add = parseArgValues(D, Arg, true);
  316. // Report error if user explicitly tries to recover from unrecoverable
  317. // sanitizer.
  318. if (SanitizerMask KindsToDiagnose =
  319. Add & Unrecoverable & ~DiagnosedUnrecoverableKinds) {
  320. SanitizerSet SetToDiagnose;
  321. SetToDiagnose.Mask |= KindsToDiagnose;
  322. D.Diag(diag::err_drv_unsupported_option_argument)
  323. << Arg->getOption().getName() << toString(SetToDiagnose);
  324. DiagnosedUnrecoverableKinds |= KindsToDiagnose;
  325. }
  326. RecoverableKinds |= expandSanitizerGroups(Add);
  327. Arg->claim();
  328. } else if (Arg->getOption().matches(options::OPT_fno_sanitize_recover_EQ)) {
  329. RecoverableKinds &= ~expandSanitizerGroups(parseArgValues(D, Arg, true));
  330. Arg->claim();
  331. }
  332. if (DeprecatedReplacement) {
  333. D.Diag(diag::warn_drv_deprecated_arg) << Arg->getAsString(Args)
  334. << DeprecatedReplacement;
  335. }
  336. }
  337. RecoverableKinds &= Kinds;
  338. RecoverableKinds &= ~Unrecoverable;
  339. TrappingKinds &= Kinds;
  340. // Setup blacklist files.
  341. // Add default blacklist from resource directory.
  342. {
  343. std::string BLPath;
  344. if (getDefaultBlacklist(D, Kinds, BLPath) && llvm::sys::fs::exists(BLPath))
  345. BlacklistFiles.push_back(BLPath);
  346. }
  347. // Parse -f(no-)sanitize-blacklist options.
  348. for (const auto *Arg : Args) {
  349. if (Arg->getOption().matches(options::OPT_fsanitize_blacklist)) {
  350. Arg->claim();
  351. std::string BLPath = Arg->getValue();
  352. if (llvm::sys::fs::exists(BLPath))
  353. BlacklistFiles.push_back(BLPath);
  354. else
  355. D.Diag(clang::diag::err_drv_no_such_file) << BLPath;
  356. } else if (Arg->getOption().matches(options::OPT_fno_sanitize_blacklist)) {
  357. Arg->claim();
  358. BlacklistFiles.clear();
  359. }
  360. }
  361. // Validate blacklists format.
  362. {
  363. std::string BLError;
  364. std::unique_ptr<llvm::SpecialCaseList> SCL(
  365. llvm::SpecialCaseList::create(BlacklistFiles, BLError));
  366. if (!SCL.get())
  367. D.Diag(clang::diag::err_drv_malformed_sanitizer_blacklist) << BLError;
  368. }
  369. // Parse -f[no-]sanitize-memory-track-origins[=level] options.
  370. if (AllAddedKinds & Memory) {
  371. if (Arg *A =
  372. Args.getLastArg(options::OPT_fsanitize_memory_track_origins_EQ,
  373. options::OPT_fsanitize_memory_track_origins,
  374. options::OPT_fno_sanitize_memory_track_origins)) {
  375. if (A->getOption().matches(options::OPT_fsanitize_memory_track_origins)) {
  376. MsanTrackOrigins = 2;
  377. } else if (A->getOption().matches(
  378. options::OPT_fno_sanitize_memory_track_origins)) {
  379. MsanTrackOrigins = 0;
  380. } else {
  381. StringRef S = A->getValue();
  382. if (S.getAsInteger(0, MsanTrackOrigins) || MsanTrackOrigins < 0 ||
  383. MsanTrackOrigins > 2) {
  384. D.Diag(clang::diag::err_drv_invalid_value) << A->getAsString(Args) << S;
  385. }
  386. }
  387. }
  388. MsanUseAfterDtor =
  389. Args.hasArg(options::OPT_fsanitize_memory_use_after_dtor);
  390. }
  391. // Parse -f(no-)?sanitize-coverage flags if coverage is supported by the
  392. // enabled sanitizers.
  393. if (AllAddedKinds & SupportsCoverage) {
  394. for (const auto *Arg : Args) {
  395. if (Arg->getOption().matches(options::OPT_fsanitize_coverage)) {
  396. Arg->claim();
  397. int LegacySanitizeCoverage;
  398. if (Arg->getNumValues() == 1 &&
  399. !StringRef(Arg->getValue(0))
  400. .getAsInteger(0, LegacySanitizeCoverage) &&
  401. LegacySanitizeCoverage >= 0 && LegacySanitizeCoverage <= 4) {
  402. // TODO: Add deprecation notice for this form.
  403. switch (LegacySanitizeCoverage) {
  404. case 0:
  405. CoverageFeatures = 0;
  406. break;
  407. case 1:
  408. CoverageFeatures = CoverageFunc;
  409. break;
  410. case 2:
  411. CoverageFeatures = CoverageBB;
  412. break;
  413. case 3:
  414. CoverageFeatures = CoverageEdge;
  415. break;
  416. case 4:
  417. CoverageFeatures = CoverageEdge | CoverageIndirCall;
  418. break;
  419. }
  420. continue;
  421. }
  422. CoverageFeatures |= parseCoverageFeatures(D, Arg);
  423. } else if (Arg->getOption().matches(options::OPT_fno_sanitize_coverage)) {
  424. Arg->claim();
  425. CoverageFeatures &= ~parseCoverageFeatures(D, Arg);
  426. }
  427. }
  428. }
  429. // Choose at most one coverage type: function, bb, or edge.
  430. if ((CoverageFeatures & CoverageFunc) && (CoverageFeatures & CoverageBB))
  431. D.Diag(clang::diag::err_drv_argument_not_allowed_with)
  432. << "-fsanitize-coverage=func"
  433. << "-fsanitize-coverage=bb";
  434. if ((CoverageFeatures & CoverageFunc) && (CoverageFeatures & CoverageEdge))
  435. D.Diag(clang::diag::err_drv_argument_not_allowed_with)
  436. << "-fsanitize-coverage=func"
  437. << "-fsanitize-coverage=edge";
  438. if ((CoverageFeatures & CoverageBB) && (CoverageFeatures & CoverageEdge))
  439. D.Diag(clang::diag::err_drv_argument_not_allowed_with)
  440. << "-fsanitize-coverage=bb"
  441. << "-fsanitize-coverage=edge";
  442. // Basic block tracing and 8-bit counters require some type of coverage
  443. // enabled.
  444. int CoverageTypes = CoverageFunc | CoverageBB | CoverageEdge;
  445. if ((CoverageFeatures & CoverageTraceBB) &&
  446. !(CoverageFeatures & CoverageTypes))
  447. D.Diag(clang::diag::err_drv_argument_only_allowed_with)
  448. << "-fsanitize-coverage=trace-bb"
  449. << "-fsanitize-coverage=(func|bb|edge)";
  450. if ((CoverageFeatures & Coverage8bitCounters) &&
  451. !(CoverageFeatures & CoverageTypes))
  452. D.Diag(clang::diag::err_drv_argument_only_allowed_with)
  453. << "-fsanitize-coverage=8bit-counters"
  454. << "-fsanitize-coverage=(func|bb|edge)";
  455. if (AllAddedKinds & Address) {
  456. AsanSharedRuntime =
  457. Args.hasArg(options::OPT_shared_libasan) ||
  458. (TC.getTriple().getEnvironment() == llvm::Triple::Android);
  459. AsanZeroBaseShadow =
  460. (TC.getTriple().getEnvironment() == llvm::Triple::Android);
  461. if (Arg *A =
  462. Args.getLastArg(options::OPT_fsanitize_address_field_padding)) {
  463. StringRef S = A->getValue();
  464. // Legal values are 0 and 1, 2, but in future we may add more levels.
  465. if (S.getAsInteger(0, AsanFieldPadding) || AsanFieldPadding < 0 ||
  466. AsanFieldPadding > 2) {
  467. D.Diag(clang::diag::err_drv_invalid_value) << A->getAsString(Args) << S;
  468. }
  469. }
  470. if (Arg *WindowsDebugRTArg =
  471. Args.getLastArg(options::OPT__SLASH_MTd, options::OPT__SLASH_MT,
  472. options::OPT__SLASH_MDd, options::OPT__SLASH_MD,
  473. options::OPT__SLASH_LDd, options::OPT__SLASH_LD)) {
  474. switch (WindowsDebugRTArg->getOption().getID()) {
  475. case options::OPT__SLASH_MTd:
  476. case options::OPT__SLASH_MDd:
  477. case options::OPT__SLASH_LDd:
  478. D.Diag(clang::diag::err_drv_argument_not_allowed_with)
  479. << WindowsDebugRTArg->getAsString(Args)
  480. << lastArgumentForMask(D, Args, Address);
  481. D.Diag(clang::diag::note_drv_address_sanitizer_debug_runtime);
  482. }
  483. }
  484. }
  485. // Parse -link-cxx-sanitizer flag.
  486. LinkCXXRuntimes =
  487. Args.hasArg(options::OPT_fsanitize_link_cxx_runtime) || D.CCCIsCXX();
  488. // Finally, initialize the set of available and recoverable sanitizers.
  489. Sanitizers.Mask |= Kinds;
  490. RecoverableSanitizers.Mask |= RecoverableKinds;
  491. TrapSanitizers.Mask |= TrappingKinds;
  492. }
  493. static std::string toString(const clang::SanitizerSet &Sanitizers) {
  494. std::string Res;
  495. #define SANITIZER(NAME, ID) \
  496. if (Sanitizers.has(ID)) { \
  497. if (!Res.empty()) \
  498. Res += ","; \
  499. Res += NAME; \
  500. }
  501. #include "clang/Basic/Sanitizers.def"
  502. return Res;
  503. }
  504. void SanitizerArgs::addArgs(const ToolChain &TC, const llvm::opt::ArgList &Args,
  505. llvm::opt::ArgStringList &CmdArgs,
  506. types::ID InputType) const {
  507. if (Sanitizers.empty())
  508. return;
  509. CmdArgs.push_back(Args.MakeArgString("-fsanitize=" + toString(Sanitizers)));
  510. if (!RecoverableSanitizers.empty())
  511. CmdArgs.push_back(Args.MakeArgString("-fsanitize-recover=" +
  512. toString(RecoverableSanitizers)));
  513. if (!TrapSanitizers.empty())
  514. CmdArgs.push_back(
  515. Args.MakeArgString("-fsanitize-trap=" + toString(TrapSanitizers)));
  516. for (const auto &BLPath : BlacklistFiles) {
  517. SmallString<64> BlacklistOpt("-fsanitize-blacklist=");
  518. BlacklistOpt += BLPath;
  519. CmdArgs.push_back(Args.MakeArgString(BlacklistOpt));
  520. }
  521. if (MsanTrackOrigins)
  522. CmdArgs.push_back(Args.MakeArgString("-fsanitize-memory-track-origins=" +
  523. llvm::utostr(MsanTrackOrigins)));
  524. if (MsanUseAfterDtor)
  525. CmdArgs.push_back(Args.MakeArgString("-fsanitize-memory-use-after-dtor"));
  526. if (AsanFieldPadding)
  527. CmdArgs.push_back(Args.MakeArgString("-fsanitize-address-field-padding=" +
  528. llvm::utostr(AsanFieldPadding)));
  529. // Translate available CoverageFeatures to corresponding clang-cc1 flags.
  530. std::pair<int, const char *> CoverageFlags[] = {
  531. std::make_pair(CoverageFunc, "-fsanitize-coverage-type=1"),
  532. std::make_pair(CoverageBB, "-fsanitize-coverage-type=2"),
  533. std::make_pair(CoverageEdge, "-fsanitize-coverage-type=3"),
  534. std::make_pair(CoverageIndirCall, "-fsanitize-coverage-indirect-calls"),
  535. std::make_pair(CoverageTraceBB, "-fsanitize-coverage-trace-bb"),
  536. std::make_pair(CoverageTraceCmp, "-fsanitize-coverage-trace-cmp"),
  537. std::make_pair(Coverage8bitCounters, "-fsanitize-coverage-8bit-counters")};
  538. for (auto F : CoverageFlags) {
  539. if (CoverageFeatures & F.first)
  540. CmdArgs.push_back(Args.MakeArgString(F.second));
  541. }
  542. // MSan: Workaround for PR16386.
  543. // ASan: This is mainly to help LSan with cases such as
  544. // https://code.google.com/p/address-sanitizer/issues/detail?id=373
  545. // We can't make this conditional on -fsanitize=leak, as that flag shouldn't
  546. // affect compilation.
  547. if (Sanitizers.has(Memory) || Sanitizers.has(Address))
  548. CmdArgs.push_back(Args.MakeArgString("-fno-assume-sane-operator-new"));
  549. if (TC.getTriple().isOSWindows() && needsUbsanRt()) {
  550. // Instruct the code generator to embed linker directives in the object file
  551. // that cause the required runtime libraries to be linked.
  552. CmdArgs.push_back(Args.MakeArgString(
  553. "--dependent-lib=" + tools::getCompilerRT(TC, "ubsan_standalone")));
  554. if (types::isCXX(InputType))
  555. CmdArgs.push_back(
  556. Args.MakeArgString("--dependent-lib=" +
  557. tools::getCompilerRT(TC, "ubsan_standalone_cxx")));
  558. }
  559. }
  560. SanitizerMask parseArgValues(const Driver &D, const llvm::opt::Arg *A,
  561. bool DiagnoseErrors) {
  562. assert((A->getOption().matches(options::OPT_fsanitize_EQ) ||
  563. A->getOption().matches(options::OPT_fno_sanitize_EQ) ||
  564. A->getOption().matches(options::OPT_fsanitize_recover_EQ) ||
  565. A->getOption().matches(options::OPT_fno_sanitize_recover_EQ) ||
  566. A->getOption().matches(options::OPT_fsanitize_trap_EQ) ||
  567. A->getOption().matches(options::OPT_fno_sanitize_trap_EQ)) &&
  568. "Invalid argument in parseArgValues!");
  569. SanitizerMask Kinds = 0;
  570. for (int i = 0, n = A->getNumValues(); i != n; ++i) {
  571. const char *Value = A->getValue(i);
  572. SanitizerMask Kind;
  573. // Special case: don't accept -fsanitize=all.
  574. if (A->getOption().matches(options::OPT_fsanitize_EQ) &&
  575. 0 == strcmp("all", Value))
  576. Kind = 0;
  577. else
  578. Kind = parseSanitizerValue(Value, /*AllowGroups=*/true);
  579. if (Kind)
  580. Kinds |= Kind;
  581. else if (DiagnoseErrors)
  582. D.Diag(clang::diag::err_drv_unsupported_option_argument)
  583. << A->getOption().getName() << Value;
  584. }
  585. return Kinds;
  586. }
  587. int parseCoverageFeatures(const Driver &D, const llvm::opt::Arg *A) {
  588. assert(A->getOption().matches(options::OPT_fsanitize_coverage) ||
  589. A->getOption().matches(options::OPT_fno_sanitize_coverage));
  590. int Features = 0;
  591. for (int i = 0, n = A->getNumValues(); i != n; ++i) {
  592. const char *Value = A->getValue(i);
  593. int F = llvm::StringSwitch<int>(Value)
  594. .Case("func", CoverageFunc)
  595. .Case("bb", CoverageBB)
  596. .Case("edge", CoverageEdge)
  597. .Case("indirect-calls", CoverageIndirCall)
  598. .Case("trace-bb", CoverageTraceBB)
  599. .Case("trace-cmp", CoverageTraceCmp)
  600. .Case("8bit-counters", Coverage8bitCounters)
  601. .Default(0);
  602. if (F == 0)
  603. D.Diag(clang::diag::err_drv_unsupported_option_argument)
  604. << A->getOption().getName() << Value;
  605. Features |= F;
  606. }
  607. return Features;
  608. }
  609. std::string lastArgumentForMask(const Driver &D, const llvm::opt::ArgList &Args,
  610. SanitizerMask Mask) {
  611. for (llvm::opt::ArgList::const_reverse_iterator I = Args.rbegin(),
  612. E = Args.rend();
  613. I != E; ++I) {
  614. const auto *Arg = *I;
  615. if (Arg->getOption().matches(options::OPT_fsanitize_EQ)) {
  616. SanitizerMask AddKinds =
  617. expandSanitizerGroups(parseArgValues(D, Arg, false));
  618. if (AddKinds & Mask)
  619. return describeSanitizeArg(Arg, Mask);
  620. } else if (Arg->getOption().matches(options::OPT_fno_sanitize_EQ)) {
  621. SanitizerMask RemoveKinds =
  622. expandSanitizerGroups(parseArgValues(D, Arg, false));
  623. Mask &= ~RemoveKinds;
  624. }
  625. }
  626. llvm_unreachable("arg list didn't provide expected value");
  627. }
  628. std::string describeSanitizeArg(const llvm::opt::Arg *A, SanitizerMask Mask) {
  629. assert(A->getOption().matches(options::OPT_fsanitize_EQ)
  630. && "Invalid argument in describeSanitizerArg!");
  631. std::string Sanitizers;
  632. for (int i = 0, n = A->getNumValues(); i != n; ++i) {
  633. if (expandSanitizerGroups(
  634. parseSanitizerValue(A->getValue(i), /*AllowGroups=*/true)) &
  635. Mask) {
  636. if (!Sanitizers.empty())
  637. Sanitizers += ",";
  638. Sanitizers += A->getValue(i);
  639. }
  640. }
  641. assert(!Sanitizers.empty() && "arg didn't provide expected value");
  642. return "-fsanitize=" + Sanitizers;
  643. }