SanitizerArgs.cpp 61 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449
  1. //===--- SanitizerArgs.cpp - Arguments for sanitizer tools ---------------===//
  2. //
  3. // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
  4. // See https://llvm.org/LICENSE.txt for license information.
  5. // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
  6. //
  7. //===----------------------------------------------------------------------===//
  8. #include "clang/Driver/SanitizerArgs.h"
  9. #include "ToolChains/CommonArgs.h"
  10. #include "clang/Basic/Sanitizers.h"
  11. #include "clang/Driver/Driver.h"
  12. #include "clang/Driver/DriverDiagnostic.h"
  13. #include "clang/Driver/Options.h"
  14. #include "clang/Driver/ToolChain.h"
  15. #include "llvm/ADT/StringExtras.h"
  16. #include "llvm/ADT/StringSwitch.h"
  17. #include "llvm/Support/AArch64TargetParser.h"
  18. #include "llvm/Support/Path.h"
  19. #include "llvm/Support/SpecialCaseList.h"
  20. #include "llvm/Support/TargetParser.h"
  21. #include "llvm/Support/VirtualFileSystem.h"
  22. #include "llvm/TargetParser/RISCVTargetParser.h"
  23. #include "llvm/Transforms/Instrumentation/AddressSanitizerOptions.h"
  24. #include <memory>
  25. using namespace clang;
  26. using namespace clang::driver;
  27. using namespace llvm::opt;
  28. static const SanitizerMask NeedsUbsanRt =
  29. SanitizerKind::Undefined | SanitizerKind::Integer |
  30. SanitizerKind::ImplicitConversion | SanitizerKind::Nullability |
  31. SanitizerKind::CFI | SanitizerKind::FloatDivideByZero |
  32. SanitizerKind::ObjCCast;
  33. static const SanitizerMask NeedsUbsanCxxRt =
  34. SanitizerKind::Vptr | SanitizerKind::CFI;
  35. static const SanitizerMask NotAllowedWithTrap = SanitizerKind::Vptr;
  36. static const SanitizerMask NotAllowedWithMinimalRuntime =
  37. SanitizerKind::Function | SanitizerKind::Vptr;
  38. static const SanitizerMask RequiresPIE =
  39. SanitizerKind::DataFlow | SanitizerKind::HWAddress | SanitizerKind::Scudo |
  40. SanitizerKind::KCFI;
  41. static const SanitizerMask NeedsUnwindTables =
  42. SanitizerKind::Address | SanitizerKind::HWAddress | SanitizerKind::Thread |
  43. SanitizerKind::Memory | SanitizerKind::DataFlow;
  44. static const SanitizerMask SupportsCoverage =
  45. SanitizerKind::Address | SanitizerKind::HWAddress |
  46. SanitizerKind::KernelAddress | SanitizerKind::KernelHWAddress |
  47. SanitizerKind::MemtagStack | SanitizerKind::MemtagHeap |
  48. SanitizerKind::MemtagGlobals | SanitizerKind::Memory |
  49. SanitizerKind::KernelMemory | SanitizerKind::Leak |
  50. SanitizerKind::Undefined | SanitizerKind::Integer | SanitizerKind::Bounds |
  51. SanitizerKind::ImplicitConversion | SanitizerKind::Nullability |
  52. SanitizerKind::DataFlow | SanitizerKind::Fuzzer |
  53. SanitizerKind::FuzzerNoLink | SanitizerKind::FloatDivideByZero |
  54. SanitizerKind::SafeStack | SanitizerKind::ShadowCallStack |
  55. SanitizerKind::Thread | SanitizerKind::ObjCCast | SanitizerKind::KCFI;
  56. static const SanitizerMask RecoverableByDefault =
  57. SanitizerKind::Undefined | SanitizerKind::Integer |
  58. SanitizerKind::ImplicitConversion | SanitizerKind::Nullability |
  59. SanitizerKind::FloatDivideByZero | SanitizerKind::ObjCCast;
  60. static const SanitizerMask Unrecoverable =
  61. SanitizerKind::Unreachable | SanitizerKind::Return;
  62. static const SanitizerMask AlwaysRecoverable = SanitizerKind::KernelAddress |
  63. SanitizerKind::KernelHWAddress |
  64. SanitizerKind::KCFI;
  65. static const SanitizerMask NeedsLTO = SanitizerKind::CFI;
  66. static const SanitizerMask TrappingSupported =
  67. (SanitizerKind::Undefined & ~SanitizerKind::Vptr) | SanitizerKind::Integer |
  68. SanitizerKind::Nullability | SanitizerKind::LocalBounds |
  69. SanitizerKind::CFI | SanitizerKind::FloatDivideByZero |
  70. SanitizerKind::ObjCCast;
  71. static const SanitizerMask TrappingDefault = SanitizerKind::CFI;
  72. static const SanitizerMask CFIClasses =
  73. SanitizerKind::CFIVCall | SanitizerKind::CFINVCall |
  74. SanitizerKind::CFIMFCall | SanitizerKind::CFIDerivedCast |
  75. SanitizerKind::CFIUnrelatedCast;
  76. static const SanitizerMask CompatibleWithMinimalRuntime =
  77. TrappingSupported | SanitizerKind::Scudo | SanitizerKind::ShadowCallStack |
  78. SanitizerKind::MemtagStack | SanitizerKind::MemtagHeap |
  79. SanitizerKind::MemtagGlobals;
  80. enum CoverageFeature {
  81. CoverageFunc = 1 << 0,
  82. CoverageBB = 1 << 1,
  83. CoverageEdge = 1 << 2,
  84. CoverageIndirCall = 1 << 3,
  85. CoverageTraceBB = 1 << 4, // Deprecated.
  86. CoverageTraceCmp = 1 << 5,
  87. CoverageTraceDiv = 1 << 6,
  88. CoverageTraceGep = 1 << 7,
  89. Coverage8bitCounters = 1 << 8, // Deprecated.
  90. CoverageTracePC = 1 << 9,
  91. CoverageTracePCGuard = 1 << 10,
  92. CoverageNoPrune = 1 << 11,
  93. CoverageInline8bitCounters = 1 << 12,
  94. CoveragePCTable = 1 << 13,
  95. CoverageStackDepth = 1 << 14,
  96. CoverageInlineBoolFlag = 1 << 15,
  97. CoverageTraceLoads = 1 << 16,
  98. CoverageTraceStores = 1 << 17,
  99. CoverageControlFlow = 1 << 18,
  100. };
  101. enum BinaryMetadataFeature {
  102. BinaryMetadataCovered = 1 << 0,
  103. BinaryMetadataAtomics = 1 << 1,
  104. BinaryMetadataUAR = 1 << 2,
  105. };
  106. /// Parse a -fsanitize= or -fno-sanitize= argument's values, diagnosing any
  107. /// invalid components. Returns a SanitizerMask.
  108. static SanitizerMask parseArgValues(const Driver &D, const llvm::opt::Arg *A,
  109. bool DiagnoseErrors);
  110. /// Parse -f(no-)?sanitize-coverage= flag values, diagnosing any invalid
  111. /// components. Returns OR of members of \c CoverageFeature enumeration.
  112. static int parseCoverageFeatures(const Driver &D, const llvm::opt::Arg *A,
  113. bool DiagnoseErrors);
  114. /// Parse -f(no-)?sanitize-metadata= flag values, diagnosing any invalid
  115. /// components. Returns OR of members of \c BinaryMetadataFeature enumeration.
  116. static int parseBinaryMetadataFeatures(const Driver &D, const llvm::opt::Arg *A,
  117. bool DiagnoseErrors);
  118. /// Produce an argument string from ArgList \p Args, which shows how it
  119. /// provides some sanitizer kind from \p Mask. For example, the argument list
  120. /// "-fsanitize=thread,vptr -fsanitize=address" with mask \c NeedsUbsanRt
  121. /// would produce "-fsanitize=vptr".
  122. static std::string lastArgumentForMask(const Driver &D,
  123. const llvm::opt::ArgList &Args,
  124. SanitizerMask Mask);
  125. /// Produce an argument string from argument \p A, which shows how it provides
  126. /// a value in \p Mask. For instance, the argument
  127. /// "-fsanitize=address,alignment" with mask \c NeedsUbsanRt would produce
  128. /// "-fsanitize=alignment".
  129. static std::string describeSanitizeArg(const llvm::opt::Arg *A,
  130. SanitizerMask Mask);
  131. /// Produce a string containing comma-separated names of sanitizers in \p
  132. /// Sanitizers set.
  133. static std::string toString(const clang::SanitizerSet &Sanitizers);
  134. static void validateSpecialCaseListFormat(const Driver &D,
  135. std::vector<std::string> &SCLFiles,
  136. unsigned MalformedSCLErrorDiagID,
  137. bool DiagnoseErrors) {
  138. if (SCLFiles.empty())
  139. return;
  140. std::string BLError;
  141. std::unique_ptr<llvm::SpecialCaseList> SCL(
  142. llvm::SpecialCaseList::create(SCLFiles, D.getVFS(), BLError));
  143. if (!SCL.get() && DiagnoseErrors)
  144. D.Diag(MalformedSCLErrorDiagID) << BLError;
  145. }
  146. static void addDefaultIgnorelists(const Driver &D, SanitizerMask Kinds,
  147. std::vector<std::string> &IgnorelistFiles,
  148. bool DiagnoseErrors) {
  149. struct Ignorelist {
  150. const char *File;
  151. SanitizerMask Mask;
  152. } Ignorelists[] = {{"asan_ignorelist.txt", SanitizerKind::Address},
  153. {"hwasan_ignorelist.txt", SanitizerKind::HWAddress},
  154. {"memtag_ignorelist.txt", SanitizerKind::MemTag},
  155. {"msan_ignorelist.txt", SanitizerKind::Memory},
  156. {"tsan_ignorelist.txt", SanitizerKind::Thread},
  157. {"dfsan_abilist.txt", SanitizerKind::DataFlow},
  158. {"cfi_ignorelist.txt", SanitizerKind::CFI},
  159. {"ubsan_ignorelist.txt",
  160. SanitizerKind::Undefined | SanitizerKind::Integer |
  161. SanitizerKind::Nullability |
  162. SanitizerKind::FloatDivideByZero}};
  163. for (auto BL : Ignorelists) {
  164. if (!(Kinds & BL.Mask))
  165. continue;
  166. clang::SmallString<64> Path(D.ResourceDir);
  167. llvm::sys::path::append(Path, "share", BL.File);
  168. if (D.getVFS().exists(Path))
  169. IgnorelistFiles.push_back(std::string(Path.str()));
  170. else if (BL.Mask == SanitizerKind::CFI && DiagnoseErrors)
  171. // If cfi_ignorelist.txt cannot be found in the resource dir, driver
  172. // should fail.
  173. D.Diag(clang::diag::err_drv_missing_sanitizer_ignorelist) << Path;
  174. }
  175. validateSpecialCaseListFormat(
  176. D, IgnorelistFiles, clang::diag::err_drv_malformed_sanitizer_ignorelist,
  177. DiagnoseErrors);
  178. }
  179. /// Parse -f(no-)?sanitize-(coverage-)?(allow|ignore)list argument's values,
  180. /// diagnosing any invalid file paths and validating special case list format.
  181. static void parseSpecialCaseListArg(const Driver &D,
  182. const llvm::opt::ArgList &Args,
  183. std::vector<std::string> &SCLFiles,
  184. llvm::opt::OptSpecifier SCLOptionID,
  185. llvm::opt::OptSpecifier NoSCLOptionID,
  186. unsigned MalformedSCLErrorDiagID,
  187. bool DiagnoseErrors) {
  188. for (const auto *Arg : Args) {
  189. // Match -fsanitize-(coverage-)?(allow|ignore)list.
  190. if (Arg->getOption().matches(SCLOptionID)) {
  191. Arg->claim();
  192. std::string SCLPath = Arg->getValue();
  193. if (D.getVFS().exists(SCLPath)) {
  194. SCLFiles.push_back(SCLPath);
  195. } else if (DiagnoseErrors) {
  196. D.Diag(clang::diag::err_drv_no_such_file) << SCLPath;
  197. }
  198. // Match -fno-sanitize-ignorelist.
  199. } else if (Arg->getOption().matches(NoSCLOptionID)) {
  200. Arg->claim();
  201. SCLFiles.clear();
  202. }
  203. }
  204. validateSpecialCaseListFormat(D, SCLFiles, MalformedSCLErrorDiagID,
  205. DiagnoseErrors);
  206. }
  207. /// Sets group bits for every group that has at least one representative already
  208. /// enabled in \p Kinds.
  209. static SanitizerMask setGroupBits(SanitizerMask Kinds) {
  210. #define SANITIZER(NAME, ID)
  211. #define SANITIZER_GROUP(NAME, ID, ALIAS) \
  212. if (Kinds & SanitizerKind::ID) \
  213. Kinds |= SanitizerKind::ID##Group;
  214. #include "clang/Basic/Sanitizers.def"
  215. return Kinds;
  216. }
  217. static SanitizerMask parseSanitizeTrapArgs(const Driver &D,
  218. const llvm::opt::ArgList &Args,
  219. bool DiagnoseErrors) {
  220. SanitizerMask TrapRemove; // During the loop below, the accumulated set of
  221. // sanitizers disabled by the current sanitizer
  222. // argument or any argument after it.
  223. SanitizerMask TrappingKinds;
  224. SanitizerMask TrappingSupportedWithGroups = setGroupBits(TrappingSupported);
  225. for (const llvm::opt::Arg *Arg : llvm::reverse(Args)) {
  226. if (Arg->getOption().matches(options::OPT_fsanitize_trap_EQ)) {
  227. Arg->claim();
  228. SanitizerMask Add = parseArgValues(D, Arg, true);
  229. Add &= ~TrapRemove;
  230. SanitizerMask InvalidValues = Add & ~TrappingSupportedWithGroups;
  231. if (InvalidValues && DiagnoseErrors) {
  232. SanitizerSet S;
  233. S.Mask = InvalidValues;
  234. D.Diag(diag::err_drv_unsupported_option_argument)
  235. << Arg->getSpelling() << toString(S);
  236. }
  237. TrappingKinds |= expandSanitizerGroups(Add) & ~TrapRemove;
  238. } else if (Arg->getOption().matches(options::OPT_fno_sanitize_trap_EQ)) {
  239. Arg->claim();
  240. TrapRemove |=
  241. expandSanitizerGroups(parseArgValues(D, Arg, DiagnoseErrors));
  242. }
  243. }
  244. // Apply default trapping behavior.
  245. TrappingKinds |= TrappingDefault & ~TrapRemove;
  246. return TrappingKinds;
  247. }
  248. bool SanitizerArgs::needsFuzzerInterceptors() const {
  249. return needsFuzzer() && !needsAsanRt() && !needsTsanRt() && !needsMsanRt();
  250. }
  251. bool SanitizerArgs::needsUbsanRt() const {
  252. // All of these include ubsan.
  253. if (needsAsanRt() || needsMsanRt() || needsHwasanRt() || needsTsanRt() ||
  254. needsDfsanRt() || needsLsanRt() || needsCfiDiagRt() ||
  255. (needsScudoRt() && !requiresMinimalRuntime()))
  256. return false;
  257. return (Sanitizers.Mask & NeedsUbsanRt & ~TrapSanitizers.Mask) ||
  258. CoverageFeatures;
  259. }
  260. bool SanitizerArgs::needsCfiRt() const {
  261. return !(Sanitizers.Mask & SanitizerKind::CFI & ~TrapSanitizers.Mask) &&
  262. CfiCrossDso && !ImplicitCfiRuntime;
  263. }
  264. bool SanitizerArgs::needsCfiDiagRt() const {
  265. return (Sanitizers.Mask & SanitizerKind::CFI & ~TrapSanitizers.Mask) &&
  266. CfiCrossDso && !ImplicitCfiRuntime;
  267. }
  268. bool SanitizerArgs::requiresPIE() const {
  269. return NeedPIE || (Sanitizers.Mask & RequiresPIE);
  270. }
  271. bool SanitizerArgs::needsUnwindTables() const {
  272. return static_cast<bool>(Sanitizers.Mask & NeedsUnwindTables);
  273. }
  274. bool SanitizerArgs::needsLTO() const {
  275. return static_cast<bool>(Sanitizers.Mask & NeedsLTO);
  276. }
  277. SanitizerArgs::SanitizerArgs(const ToolChain &TC,
  278. const llvm::opt::ArgList &Args,
  279. bool DiagnoseErrors) {
  280. SanitizerMask AllRemove; // During the loop below, the accumulated set of
  281. // sanitizers disabled by the current sanitizer
  282. // argument or any argument after it.
  283. SanitizerMask AllAddedKinds; // Mask of all sanitizers ever enabled by
  284. // -fsanitize= flags (directly or via group
  285. // expansion), some of which may be disabled
  286. // later. Used to carefully prune
  287. // unused-argument diagnostics.
  288. SanitizerMask DiagnosedKinds; // All Kinds we have diagnosed up to now.
  289. // Used to deduplicate diagnostics.
  290. SanitizerMask Kinds;
  291. const SanitizerMask Supported = setGroupBits(TC.getSupportedSanitizers());
  292. CfiCrossDso = Args.hasFlag(options::OPT_fsanitize_cfi_cross_dso,
  293. options::OPT_fno_sanitize_cfi_cross_dso, false);
  294. ToolChain::RTTIMode RTTIMode = TC.getRTTIMode();
  295. const Driver &D = TC.getDriver();
  296. SanitizerMask TrappingKinds = parseSanitizeTrapArgs(D, Args, DiagnoseErrors);
  297. SanitizerMask InvalidTrappingKinds = TrappingKinds & NotAllowedWithTrap;
  298. MinimalRuntime =
  299. Args.hasFlag(options::OPT_fsanitize_minimal_runtime,
  300. options::OPT_fno_sanitize_minimal_runtime, MinimalRuntime);
  301. // The object size sanitizer should not be enabled at -O0.
  302. Arg *OptLevel = Args.getLastArg(options::OPT_O_Group);
  303. bool RemoveObjectSizeAtO0 =
  304. !OptLevel || OptLevel->getOption().matches(options::OPT_O0);
  305. for (const llvm::opt::Arg *Arg : llvm::reverse(Args)) {
  306. if (Arg->getOption().matches(options::OPT_fsanitize_EQ)) {
  307. Arg->claim();
  308. SanitizerMask Add = parseArgValues(D, Arg, DiagnoseErrors);
  309. if (RemoveObjectSizeAtO0) {
  310. AllRemove |= SanitizerKind::ObjectSize;
  311. // The user explicitly enabled the object size sanitizer. Warn
  312. // that this does nothing at -O0.
  313. if ((Add & SanitizerKind::ObjectSize) && DiagnoseErrors)
  314. D.Diag(diag::warn_drv_object_size_disabled_O0)
  315. << Arg->getAsString(Args);
  316. }
  317. AllAddedKinds |= expandSanitizerGroups(Add);
  318. // Avoid diagnosing any sanitizer which is disabled later.
  319. Add &= ~AllRemove;
  320. // At this point we have not expanded groups, so any unsupported
  321. // sanitizers in Add are those which have been explicitly enabled.
  322. // Diagnose them.
  323. if (SanitizerMask KindsToDiagnose =
  324. Add & InvalidTrappingKinds & ~DiagnosedKinds) {
  325. if (DiagnoseErrors) {
  326. std::string Desc = describeSanitizeArg(Arg, KindsToDiagnose);
  327. D.Diag(diag::err_drv_argument_not_allowed_with)
  328. << Desc << "-fsanitize-trap=undefined";
  329. }
  330. DiagnosedKinds |= KindsToDiagnose;
  331. }
  332. Add &= ~InvalidTrappingKinds;
  333. if (MinimalRuntime) {
  334. if (SanitizerMask KindsToDiagnose =
  335. Add & NotAllowedWithMinimalRuntime & ~DiagnosedKinds) {
  336. if (DiagnoseErrors) {
  337. std::string Desc = describeSanitizeArg(Arg, KindsToDiagnose);
  338. D.Diag(diag::err_drv_argument_not_allowed_with)
  339. << Desc << "-fsanitize-minimal-runtime";
  340. }
  341. DiagnosedKinds |= KindsToDiagnose;
  342. }
  343. Add &= ~NotAllowedWithMinimalRuntime;
  344. }
  345. if (llvm::opt::Arg *A = Args.getLastArg(options::OPT_mcmodel_EQ)) {
  346. StringRef CM = A->getValue();
  347. if (CM != "small" &&
  348. (Add & SanitizerKind::Function & ~DiagnosedKinds)) {
  349. if (DiagnoseErrors)
  350. D.Diag(diag::err_drv_argument_only_allowed_with)
  351. << "-fsanitize=function"
  352. << "-mcmodel=small";
  353. Add &= ~SanitizerKind::Function;
  354. DiagnosedKinds |= SanitizerKind::Function;
  355. }
  356. }
  357. // FIXME: Make CFI on member function calls compatible with cross-DSO CFI.
  358. // There are currently two problems:
  359. // - Virtual function call checks need to pass a pointer to the function
  360. // address to llvm.type.test and a pointer to the address point to the
  361. // diagnostic function. Currently we pass the same pointer to both
  362. // places.
  363. // - Non-virtual function call checks may need to check multiple type
  364. // identifiers.
  365. // Fixing both of those may require changes to the cross-DSO CFI
  366. // interface.
  367. if (CfiCrossDso && (Add & SanitizerKind::CFIMFCall & ~DiagnosedKinds)) {
  368. if (DiagnoseErrors)
  369. D.Diag(diag::err_drv_argument_not_allowed_with)
  370. << "-fsanitize=cfi-mfcall"
  371. << "-fsanitize-cfi-cross-dso";
  372. Add &= ~SanitizerKind::CFIMFCall;
  373. DiagnosedKinds |= SanitizerKind::CFIMFCall;
  374. }
  375. if (SanitizerMask KindsToDiagnose = Add & ~Supported & ~DiagnosedKinds) {
  376. if (DiagnoseErrors) {
  377. std::string Desc = describeSanitizeArg(Arg, KindsToDiagnose);
  378. D.Diag(diag::err_drv_unsupported_opt_for_target)
  379. << Desc << TC.getTriple().str();
  380. }
  381. DiagnosedKinds |= KindsToDiagnose;
  382. }
  383. Add &= Supported;
  384. // Test for -fno-rtti + explicit -fsanitizer=vptr before expanding groups
  385. // so we don't error out if -fno-rtti and -fsanitize=undefined were
  386. // passed.
  387. if ((Add & SanitizerKind::Vptr) && (RTTIMode == ToolChain::RM_Disabled)) {
  388. if (const llvm::opt::Arg *NoRTTIArg = TC.getRTTIArg()) {
  389. assert(NoRTTIArg->getOption().matches(options::OPT_fno_rtti) &&
  390. "RTTI disabled without -fno-rtti option?");
  391. // The user explicitly passed -fno-rtti with -fsanitize=vptr, but
  392. // the vptr sanitizer requires RTTI, so this is a user error.
  393. if (DiagnoseErrors)
  394. D.Diag(diag::err_drv_argument_not_allowed_with)
  395. << "-fsanitize=vptr" << NoRTTIArg->getAsString(Args);
  396. } else {
  397. // The vptr sanitizer requires RTTI, but RTTI is disabled (by
  398. // default). Warn that the vptr sanitizer is being disabled.
  399. if (DiagnoseErrors)
  400. D.Diag(diag::warn_drv_disabling_vptr_no_rtti_default);
  401. }
  402. // Take out the Vptr sanitizer from the enabled sanitizers
  403. AllRemove |= SanitizerKind::Vptr;
  404. }
  405. Add = expandSanitizerGroups(Add);
  406. // Group expansion may have enabled a sanitizer which is disabled later.
  407. Add &= ~AllRemove;
  408. // Silently discard any unsupported sanitizers implicitly enabled through
  409. // group expansion.
  410. Add &= ~InvalidTrappingKinds;
  411. if (MinimalRuntime) {
  412. Add &= ~NotAllowedWithMinimalRuntime;
  413. }
  414. if (CfiCrossDso)
  415. Add &= ~SanitizerKind::CFIMFCall;
  416. Add &= Supported;
  417. if (Add & SanitizerKind::Fuzzer)
  418. Add |= SanitizerKind::FuzzerNoLink;
  419. // Enable coverage if the fuzzing flag is set.
  420. if (Add & SanitizerKind::FuzzerNoLink) {
  421. CoverageFeatures |= CoverageInline8bitCounters | CoverageIndirCall |
  422. CoverageTraceCmp | CoveragePCTable;
  423. // Due to TLS differences, stack depth tracking is only enabled on Linux
  424. if (TC.getTriple().isOSLinux())
  425. CoverageFeatures |= CoverageStackDepth;
  426. }
  427. Kinds |= Add;
  428. } else if (Arg->getOption().matches(options::OPT_fno_sanitize_EQ)) {
  429. Arg->claim();
  430. SanitizerMask Remove = parseArgValues(D, Arg, DiagnoseErrors);
  431. AllRemove |= expandSanitizerGroups(Remove);
  432. }
  433. }
  434. std::pair<SanitizerMask, SanitizerMask> IncompatibleGroups[] = {
  435. std::make_pair(SanitizerKind::Address,
  436. SanitizerKind::Thread | SanitizerKind::Memory),
  437. std::make_pair(SanitizerKind::Thread, SanitizerKind::Memory),
  438. std::make_pair(SanitizerKind::Leak,
  439. SanitizerKind::Thread | SanitizerKind::Memory),
  440. std::make_pair(SanitizerKind::KernelAddress,
  441. SanitizerKind::Address | SanitizerKind::Leak |
  442. SanitizerKind::Thread | SanitizerKind::Memory),
  443. std::make_pair(SanitizerKind::HWAddress,
  444. SanitizerKind::Address | SanitizerKind::Thread |
  445. SanitizerKind::Memory | SanitizerKind::KernelAddress),
  446. std::make_pair(SanitizerKind::Scudo,
  447. SanitizerKind::Address | SanitizerKind::HWAddress |
  448. SanitizerKind::Leak | SanitizerKind::Thread |
  449. SanitizerKind::Memory | SanitizerKind::KernelAddress),
  450. std::make_pair(SanitizerKind::SafeStack,
  451. (TC.getTriple().isOSFuchsia() ? SanitizerMask()
  452. : SanitizerKind::Leak) |
  453. SanitizerKind::Address | SanitizerKind::HWAddress |
  454. SanitizerKind::Thread | SanitizerKind::Memory |
  455. SanitizerKind::KernelAddress),
  456. std::make_pair(SanitizerKind::KernelHWAddress,
  457. SanitizerKind::Address | SanitizerKind::HWAddress |
  458. SanitizerKind::Leak | SanitizerKind::Thread |
  459. SanitizerKind::Memory | SanitizerKind::KernelAddress |
  460. SanitizerKind::SafeStack),
  461. std::make_pair(SanitizerKind::KernelMemory,
  462. SanitizerKind::Address | SanitizerKind::HWAddress |
  463. SanitizerKind::Leak | SanitizerKind::Thread |
  464. SanitizerKind::Memory | SanitizerKind::KernelAddress |
  465. SanitizerKind::Scudo | SanitizerKind::SafeStack),
  466. std::make_pair(SanitizerKind::MemTag,
  467. SanitizerKind::Address | SanitizerKind::KernelAddress |
  468. SanitizerKind::HWAddress |
  469. SanitizerKind::KernelHWAddress)};
  470. // Enable toolchain specific default sanitizers if not explicitly disabled.
  471. SanitizerMask Default = TC.getDefaultSanitizers() & ~AllRemove;
  472. // Disable default sanitizers that are incompatible with explicitly requested
  473. // ones.
  474. for (auto G : IncompatibleGroups) {
  475. SanitizerMask Group = G.first;
  476. if ((Default & Group) && (Kinds & G.second))
  477. Default &= ~Group;
  478. }
  479. Kinds |= Default;
  480. // We disable the vptr sanitizer if it was enabled by group expansion but RTTI
  481. // is disabled.
  482. if ((Kinds & SanitizerKind::Vptr) && (RTTIMode == ToolChain::RM_Disabled)) {
  483. Kinds &= ~SanitizerKind::Vptr;
  484. }
  485. // Check that LTO is enabled if we need it.
  486. if ((Kinds & NeedsLTO) && !D.isUsingLTO() && DiagnoseErrors) {
  487. D.Diag(diag::err_drv_argument_only_allowed_with)
  488. << lastArgumentForMask(D, Args, Kinds & NeedsLTO) << "-flto";
  489. }
  490. if ((Kinds & SanitizerKind::ShadowCallStack) &&
  491. ((TC.getTriple().isAArch64() &&
  492. !llvm::AArch64::isX18ReservedByDefault(TC.getTriple())) ||
  493. (TC.getTriple().isRISCV() &&
  494. !llvm::RISCV::isX18ReservedByDefault(TC.getTriple()))) &&
  495. !Args.hasArg(options::OPT_ffixed_x18) && DiagnoseErrors) {
  496. D.Diag(diag::err_drv_argument_only_allowed_with)
  497. << lastArgumentForMask(D, Args, Kinds & SanitizerKind::ShadowCallStack)
  498. << "-ffixed-x18";
  499. }
  500. // Report error if there are non-trapping sanitizers that require
  501. // c++abi-specific parts of UBSan runtime, and they are not provided by the
  502. // toolchain. We don't have a good way to check the latter, so we just
  503. // check if the toolchan supports vptr.
  504. if (~Supported & SanitizerKind::Vptr) {
  505. SanitizerMask KindsToDiagnose = Kinds & ~TrappingKinds & NeedsUbsanCxxRt;
  506. // The runtime library supports the Microsoft C++ ABI, but only well enough
  507. // for CFI. FIXME: Remove this once we support vptr on Windows.
  508. if (TC.getTriple().isOSWindows())
  509. KindsToDiagnose &= ~SanitizerKind::CFI;
  510. if (KindsToDiagnose) {
  511. SanitizerSet S;
  512. S.Mask = KindsToDiagnose;
  513. if (DiagnoseErrors)
  514. D.Diag(diag::err_drv_unsupported_opt_for_target)
  515. << ("-fno-sanitize-trap=" + toString(S)) << TC.getTriple().str();
  516. Kinds &= ~KindsToDiagnose;
  517. }
  518. }
  519. // Warn about incompatible groups of sanitizers.
  520. for (auto G : IncompatibleGroups) {
  521. SanitizerMask Group = G.first;
  522. if (Kinds & Group) {
  523. if (SanitizerMask Incompatible = Kinds & G.second) {
  524. if (DiagnoseErrors)
  525. D.Diag(clang::diag::err_drv_argument_not_allowed_with)
  526. << lastArgumentForMask(D, Args, Group)
  527. << lastArgumentForMask(D, Args, Incompatible);
  528. Kinds &= ~Incompatible;
  529. }
  530. }
  531. }
  532. // FIXME: Currently -fsanitize=leak is silently ignored in the presence of
  533. // -fsanitize=address. Perhaps it should print an error, or perhaps
  534. // -f(-no)sanitize=leak should change whether leak detection is enabled by
  535. // default in ASan?
  536. // Parse -f(no-)?sanitize-recover flags.
  537. SanitizerMask RecoverableKinds = RecoverableByDefault | AlwaysRecoverable;
  538. SanitizerMask DiagnosedUnrecoverableKinds;
  539. SanitizerMask DiagnosedAlwaysRecoverableKinds;
  540. for (const auto *Arg : Args) {
  541. if (Arg->getOption().matches(options::OPT_fsanitize_recover_EQ)) {
  542. SanitizerMask Add = parseArgValues(D, Arg, DiagnoseErrors);
  543. // Report error if user explicitly tries to recover from unrecoverable
  544. // sanitizer.
  545. if (SanitizerMask KindsToDiagnose =
  546. Add & Unrecoverable & ~DiagnosedUnrecoverableKinds) {
  547. SanitizerSet SetToDiagnose;
  548. SetToDiagnose.Mask |= KindsToDiagnose;
  549. if (DiagnoseErrors)
  550. D.Diag(diag::err_drv_unsupported_option_argument)
  551. << Arg->getSpelling() << toString(SetToDiagnose);
  552. DiagnosedUnrecoverableKinds |= KindsToDiagnose;
  553. }
  554. RecoverableKinds |= expandSanitizerGroups(Add);
  555. Arg->claim();
  556. } else if (Arg->getOption().matches(options::OPT_fno_sanitize_recover_EQ)) {
  557. SanitizerMask Remove = parseArgValues(D, Arg, DiagnoseErrors);
  558. // Report error if user explicitly tries to disable recovery from
  559. // always recoverable sanitizer.
  560. if (SanitizerMask KindsToDiagnose =
  561. Remove & AlwaysRecoverable & ~DiagnosedAlwaysRecoverableKinds) {
  562. SanitizerSet SetToDiagnose;
  563. SetToDiagnose.Mask |= KindsToDiagnose;
  564. if (DiagnoseErrors)
  565. D.Diag(diag::err_drv_unsupported_option_argument)
  566. << Arg->getSpelling() << toString(SetToDiagnose);
  567. DiagnosedAlwaysRecoverableKinds |= KindsToDiagnose;
  568. }
  569. RecoverableKinds &= ~expandSanitizerGroups(Remove);
  570. Arg->claim();
  571. }
  572. }
  573. RecoverableKinds &= Kinds;
  574. RecoverableKinds &= ~Unrecoverable;
  575. TrappingKinds &= Kinds;
  576. RecoverableKinds &= ~TrappingKinds;
  577. // Setup ignorelist files.
  578. // Add default ignorelist from resource directory for activated sanitizers,
  579. // and validate special case lists format.
  580. if (!Args.hasArgNoClaim(options::OPT_fno_sanitize_ignorelist))
  581. addDefaultIgnorelists(D, Kinds, SystemIgnorelistFiles, DiagnoseErrors);
  582. // Parse -f(no-)?sanitize-ignorelist options.
  583. // This also validates special case lists format.
  584. parseSpecialCaseListArg(
  585. D, Args, UserIgnorelistFiles, options::OPT_fsanitize_ignorelist_EQ,
  586. options::OPT_fno_sanitize_ignorelist,
  587. clang::diag::err_drv_malformed_sanitizer_ignorelist, DiagnoseErrors);
  588. // Parse -f[no-]sanitize-memory-track-origins[=level] options.
  589. if (AllAddedKinds & SanitizerKind::Memory) {
  590. if (Arg *A =
  591. Args.getLastArg(options::OPT_fsanitize_memory_track_origins_EQ,
  592. options::OPT_fno_sanitize_memory_track_origins)) {
  593. if (!A->getOption().matches(
  594. options::OPT_fno_sanitize_memory_track_origins)) {
  595. StringRef S = A->getValue();
  596. if (S.getAsInteger(0, MsanTrackOrigins) || MsanTrackOrigins < 0 ||
  597. MsanTrackOrigins > 2) {
  598. if (DiagnoseErrors)
  599. D.Diag(clang::diag::err_drv_invalid_value)
  600. << A->getAsString(Args) << S;
  601. }
  602. }
  603. }
  604. MsanUseAfterDtor = Args.hasFlag(
  605. options::OPT_fsanitize_memory_use_after_dtor,
  606. options::OPT_fno_sanitize_memory_use_after_dtor, MsanUseAfterDtor);
  607. MsanParamRetval = Args.hasFlag(
  608. options::OPT_fsanitize_memory_param_retval,
  609. options::OPT_fno_sanitize_memory_param_retval, MsanParamRetval);
  610. NeedPIE |= !(TC.getTriple().isOSLinux() &&
  611. TC.getTriple().getArch() == llvm::Triple::x86_64);
  612. } else if (AllAddedKinds & SanitizerKind::KernelMemory) {
  613. MsanUseAfterDtor = false;
  614. MsanParamRetval = Args.hasFlag(
  615. options::OPT_fsanitize_memory_param_retval,
  616. options::OPT_fno_sanitize_memory_param_retval, MsanParamRetval);
  617. } else {
  618. MsanUseAfterDtor = false;
  619. MsanParamRetval = false;
  620. }
  621. if (AllAddedKinds & SanitizerKind::MemTag) {
  622. StringRef S =
  623. Args.getLastArgValue(options::OPT_fsanitize_memtag_mode_EQ, "sync");
  624. if (S == "async" || S == "sync") {
  625. MemtagMode = S.str();
  626. } else {
  627. D.Diag(clang::diag::err_drv_invalid_value_with_suggestion)
  628. << "-fsanitize-memtag-mode=" << S << "{async, sync}";
  629. MemtagMode = "sync";
  630. }
  631. }
  632. if (AllAddedKinds & SanitizerKind::Thread) {
  633. TsanMemoryAccess = Args.hasFlag(
  634. options::OPT_fsanitize_thread_memory_access,
  635. options::OPT_fno_sanitize_thread_memory_access, TsanMemoryAccess);
  636. TsanFuncEntryExit = Args.hasFlag(
  637. options::OPT_fsanitize_thread_func_entry_exit,
  638. options::OPT_fno_sanitize_thread_func_entry_exit, TsanFuncEntryExit);
  639. TsanAtomics =
  640. Args.hasFlag(options::OPT_fsanitize_thread_atomics,
  641. options::OPT_fno_sanitize_thread_atomics, TsanAtomics);
  642. }
  643. if (AllAddedKinds & SanitizerKind::CFI) {
  644. // Without PIE, external function address may resolve to a PLT record, which
  645. // can not be verified by the target module.
  646. NeedPIE |= CfiCrossDso;
  647. CfiICallGeneralizePointers =
  648. Args.hasArg(options::OPT_fsanitize_cfi_icall_generalize_pointers);
  649. if (CfiCrossDso && CfiICallGeneralizePointers && DiagnoseErrors)
  650. D.Diag(diag::err_drv_argument_not_allowed_with)
  651. << "-fsanitize-cfi-cross-dso"
  652. << "-fsanitize-cfi-icall-generalize-pointers";
  653. CfiCanonicalJumpTables =
  654. Args.hasFlag(options::OPT_fsanitize_cfi_canonical_jump_tables,
  655. options::OPT_fno_sanitize_cfi_canonical_jump_tables, true);
  656. }
  657. if (AllAddedKinds & SanitizerKind::KCFI && DiagnoseErrors) {
  658. if (AllAddedKinds & SanitizerKind::CFI)
  659. D.Diag(diag::err_drv_argument_not_allowed_with)
  660. << "-fsanitize=kcfi"
  661. << lastArgumentForMask(D, Args, SanitizerKind::CFI);
  662. }
  663. Stats = Args.hasFlag(options::OPT_fsanitize_stats,
  664. options::OPT_fno_sanitize_stats, false);
  665. if (MinimalRuntime) {
  666. SanitizerMask IncompatibleMask =
  667. Kinds & ~setGroupBits(CompatibleWithMinimalRuntime);
  668. if (IncompatibleMask && DiagnoseErrors)
  669. D.Diag(clang::diag::err_drv_argument_not_allowed_with)
  670. << "-fsanitize-minimal-runtime"
  671. << lastArgumentForMask(D, Args, IncompatibleMask);
  672. SanitizerMask NonTrappingCfi = Kinds & SanitizerKind::CFI & ~TrappingKinds;
  673. if (NonTrappingCfi && DiagnoseErrors)
  674. D.Diag(clang::diag::err_drv_argument_only_allowed_with)
  675. << "fsanitize-minimal-runtime"
  676. << "fsanitize-trap=cfi";
  677. }
  678. // Parse -f(no-)?sanitize-coverage flags if coverage is supported by the
  679. // enabled sanitizers.
  680. for (const auto *Arg : Args) {
  681. if (Arg->getOption().matches(options::OPT_fsanitize_coverage)) {
  682. int LegacySanitizeCoverage;
  683. if (Arg->getNumValues() == 1 &&
  684. !StringRef(Arg->getValue(0))
  685. .getAsInteger(0, LegacySanitizeCoverage)) {
  686. CoverageFeatures = 0;
  687. Arg->claim();
  688. if (LegacySanitizeCoverage != 0 && DiagnoseErrors) {
  689. D.Diag(diag::warn_drv_deprecated_arg)
  690. << Arg->getAsString(Args) << "-fsanitize-coverage=trace-pc-guard";
  691. }
  692. continue;
  693. }
  694. CoverageFeatures |= parseCoverageFeatures(D, Arg, DiagnoseErrors);
  695. // Disable coverage and not claim the flags if there is at least one
  696. // non-supporting sanitizer.
  697. if (!(AllAddedKinds & ~AllRemove & ~setGroupBits(SupportsCoverage))) {
  698. Arg->claim();
  699. } else {
  700. CoverageFeatures = 0;
  701. }
  702. } else if (Arg->getOption().matches(options::OPT_fno_sanitize_coverage)) {
  703. Arg->claim();
  704. CoverageFeatures &= ~parseCoverageFeatures(D, Arg, DiagnoseErrors);
  705. }
  706. }
  707. // Choose at most one coverage type: function, bb, or edge.
  708. if (DiagnoseErrors) {
  709. if ((CoverageFeatures & CoverageFunc) && (CoverageFeatures & CoverageBB))
  710. D.Diag(clang::diag::err_drv_argument_not_allowed_with)
  711. << "-fsanitize-coverage=func"
  712. << "-fsanitize-coverage=bb";
  713. if ((CoverageFeatures & CoverageFunc) && (CoverageFeatures & CoverageEdge))
  714. D.Diag(clang::diag::err_drv_argument_not_allowed_with)
  715. << "-fsanitize-coverage=func"
  716. << "-fsanitize-coverage=edge";
  717. if ((CoverageFeatures & CoverageBB) && (CoverageFeatures & CoverageEdge))
  718. D.Diag(clang::diag::err_drv_argument_not_allowed_with)
  719. << "-fsanitize-coverage=bb"
  720. << "-fsanitize-coverage=edge";
  721. // Basic block tracing and 8-bit counters require some type of coverage
  722. // enabled.
  723. if (CoverageFeatures & CoverageTraceBB)
  724. D.Diag(clang::diag::warn_drv_deprecated_arg)
  725. << "-fsanitize-coverage=trace-bb"
  726. << "-fsanitize-coverage=trace-pc-guard";
  727. if (CoverageFeatures & Coverage8bitCounters)
  728. D.Diag(clang::diag::warn_drv_deprecated_arg)
  729. << "-fsanitize-coverage=8bit-counters"
  730. << "-fsanitize-coverage=trace-pc-guard";
  731. }
  732. int InsertionPointTypes = CoverageFunc | CoverageBB | CoverageEdge;
  733. int InstrumentationTypes = CoverageTracePC | CoverageTracePCGuard |
  734. CoverageInline8bitCounters | CoverageTraceLoads |
  735. CoverageTraceStores | CoverageInlineBoolFlag |
  736. CoverageControlFlow;
  737. if ((CoverageFeatures & InsertionPointTypes) &&
  738. !(CoverageFeatures & InstrumentationTypes) && DiagnoseErrors) {
  739. D.Diag(clang::diag::warn_drv_deprecated_arg)
  740. << "-fsanitize-coverage=[func|bb|edge]"
  741. << "-fsanitize-coverage=[func|bb|edge],[trace-pc-guard|trace-pc],["
  742. "control-flow]";
  743. }
  744. // trace-pc w/o func/bb/edge implies edge.
  745. if (!(CoverageFeatures & InsertionPointTypes)) {
  746. if (CoverageFeatures &
  747. (CoverageTracePC | CoverageTracePCGuard | CoverageInline8bitCounters |
  748. CoverageInlineBoolFlag | CoverageControlFlow))
  749. CoverageFeatures |= CoverageEdge;
  750. if (CoverageFeatures & CoverageStackDepth)
  751. CoverageFeatures |= CoverageFunc;
  752. }
  753. // Parse -fsanitize-coverage-(allow|ignore)list options if coverage enabled.
  754. // This also validates special case lists format.
  755. // Here, OptSpecifier() acts as a never-matching command-line argument.
  756. // So, there is no way to clear coverage lists but you can append to them.
  757. if (CoverageFeatures) {
  758. parseSpecialCaseListArg(
  759. D, Args, CoverageAllowlistFiles,
  760. options::OPT_fsanitize_coverage_allowlist, OptSpecifier(),
  761. clang::diag::err_drv_malformed_sanitizer_coverage_allowlist,
  762. DiagnoseErrors);
  763. parseSpecialCaseListArg(
  764. D, Args, CoverageIgnorelistFiles,
  765. options::OPT_fsanitize_coverage_ignorelist, OptSpecifier(),
  766. clang::diag::err_drv_malformed_sanitizer_coverage_ignorelist,
  767. DiagnoseErrors);
  768. }
  769. // Parse -f(no-)?sanitize-metadata.
  770. for (const auto *Arg :
  771. Args.filtered(options::OPT_fexperimental_sanitize_metadata_EQ,
  772. options::OPT_fno_experimental_sanitize_metadata_EQ)) {
  773. if (Arg->getOption().matches(
  774. options::OPT_fexperimental_sanitize_metadata_EQ)) {
  775. Arg->claim();
  776. BinaryMetadataFeatures |=
  777. parseBinaryMetadataFeatures(D, Arg, DiagnoseErrors);
  778. } else {
  779. Arg->claim();
  780. BinaryMetadataFeatures &=
  781. ~parseBinaryMetadataFeatures(D, Arg, DiagnoseErrors);
  782. }
  783. }
  784. SharedRuntime =
  785. Args.hasFlag(options::OPT_shared_libsan, options::OPT_static_libsan,
  786. TC.getTriple().isAndroid() || TC.getTriple().isOSFuchsia() ||
  787. TC.getTriple().isOSDarwin());
  788. ImplicitCfiRuntime = TC.getTriple().isAndroid();
  789. if (AllAddedKinds & SanitizerKind::Address) {
  790. NeedPIE |= TC.getTriple().isOSFuchsia();
  791. if (Arg *A =
  792. Args.getLastArg(options::OPT_fsanitize_address_field_padding)) {
  793. StringRef S = A->getValue();
  794. // Legal values are 0 and 1, 2, but in future we may add more levels.
  795. if ((S.getAsInteger(0, AsanFieldPadding) || AsanFieldPadding < 0 ||
  796. AsanFieldPadding > 2) &&
  797. DiagnoseErrors) {
  798. D.Diag(clang::diag::err_drv_invalid_value) << A->getAsString(Args) << S;
  799. }
  800. }
  801. if (Arg *WindowsDebugRTArg =
  802. Args.getLastArg(options::OPT__SLASH_MTd, options::OPT__SLASH_MT,
  803. options::OPT__SLASH_MDd, options::OPT__SLASH_MD,
  804. options::OPT__SLASH_LDd, options::OPT__SLASH_LD)) {
  805. switch (WindowsDebugRTArg->getOption().getID()) {
  806. case options::OPT__SLASH_MTd:
  807. case options::OPT__SLASH_MDd:
  808. case options::OPT__SLASH_LDd:
  809. if (DiagnoseErrors) {
  810. D.Diag(clang::diag::err_drv_argument_not_allowed_with)
  811. << WindowsDebugRTArg->getAsString(Args)
  812. << lastArgumentForMask(D, Args, SanitizerKind::Address);
  813. D.Diag(clang::diag::note_drv_address_sanitizer_debug_runtime);
  814. }
  815. }
  816. }
  817. AsanUseAfterScope = Args.hasFlag(
  818. options::OPT_fsanitize_address_use_after_scope,
  819. options::OPT_fno_sanitize_address_use_after_scope, AsanUseAfterScope);
  820. AsanPoisonCustomArrayCookie = Args.hasFlag(
  821. options::OPT_fsanitize_address_poison_custom_array_cookie,
  822. options::OPT_fno_sanitize_address_poison_custom_array_cookie,
  823. AsanPoisonCustomArrayCookie);
  824. AsanOutlineInstrumentation =
  825. Args.hasFlag(options::OPT_fsanitize_address_outline_instrumentation,
  826. options::OPT_fno_sanitize_address_outline_instrumentation,
  827. AsanOutlineInstrumentation);
  828. // As a workaround for a bug in gold 2.26 and earlier, dead stripping of
  829. // globals in ASan is disabled by default on most ELF targets.
  830. // See https://sourceware.org/bugzilla/show_bug.cgi?id=19002
  831. AsanGlobalsDeadStripping = Args.hasFlag(
  832. options::OPT_fsanitize_address_globals_dead_stripping,
  833. options::OPT_fno_sanitize_address_globals_dead_stripping,
  834. !TC.getTriple().isOSBinFormatELF() || TC.getTriple().isOSFuchsia() ||
  835. TC.getTriple().isPS());
  836. // Enable ODR indicators which allow better handling of mixed instrumented
  837. // and uninstrumented globals. Disable them for Windows where weak odr
  838. // indicators (.weak.__odr_asan_gen*) may cause multiple definition linker
  839. // errors in the absence of -lldmingw.
  840. AsanUseOdrIndicator =
  841. Args.hasFlag(options::OPT_fsanitize_address_use_odr_indicator,
  842. options::OPT_fno_sanitize_address_use_odr_indicator,
  843. !TC.getTriple().isOSWindows());
  844. if (AllAddedKinds & SanitizerKind::PointerCompare & ~AllRemove) {
  845. AsanInvalidPointerCmp = true;
  846. }
  847. if (AllAddedKinds & SanitizerKind::PointerSubtract & ~AllRemove) {
  848. AsanInvalidPointerSub = true;
  849. }
  850. if (TC.getTriple().isOSDarwin() &&
  851. (Args.hasArg(options::OPT_mkernel) ||
  852. Args.hasArg(options::OPT_fapple_kext))) {
  853. AsanDtorKind = llvm::AsanDtorKind::None;
  854. }
  855. if (const auto *Arg =
  856. Args.getLastArg(options::OPT_sanitize_address_destructor_EQ)) {
  857. auto parsedAsanDtorKind = AsanDtorKindFromString(Arg->getValue());
  858. if (parsedAsanDtorKind == llvm::AsanDtorKind::Invalid && DiagnoseErrors) {
  859. TC.getDriver().Diag(clang::diag::err_drv_unsupported_option_argument)
  860. << Arg->getSpelling() << Arg->getValue();
  861. }
  862. AsanDtorKind = parsedAsanDtorKind;
  863. }
  864. if (const auto *Arg = Args.getLastArg(
  865. options::OPT_sanitize_address_use_after_return_EQ)) {
  866. auto parsedAsanUseAfterReturn =
  867. AsanDetectStackUseAfterReturnModeFromString(Arg->getValue());
  868. if (parsedAsanUseAfterReturn ==
  869. llvm::AsanDetectStackUseAfterReturnMode::Invalid &&
  870. DiagnoseErrors) {
  871. TC.getDriver().Diag(clang::diag::err_drv_unsupported_option_argument)
  872. << Arg->getSpelling() << Arg->getValue();
  873. }
  874. AsanUseAfterReturn = parsedAsanUseAfterReturn;
  875. }
  876. } else {
  877. AsanUseAfterScope = false;
  878. // -fsanitize=pointer-compare/pointer-subtract requires -fsanitize=address.
  879. SanitizerMask DetectInvalidPointerPairs =
  880. SanitizerKind::PointerCompare | SanitizerKind::PointerSubtract;
  881. if ((AllAddedKinds & DetectInvalidPointerPairs & ~AllRemove) &&
  882. DiagnoseErrors) {
  883. TC.getDriver().Diag(clang::diag::err_drv_argument_only_allowed_with)
  884. << lastArgumentForMask(D, Args,
  885. SanitizerKind::PointerCompare |
  886. SanitizerKind::PointerSubtract)
  887. << "-fsanitize=address";
  888. }
  889. }
  890. if (AllAddedKinds & SanitizerKind::HWAddress) {
  891. if (Arg *HwasanAbiArg =
  892. Args.getLastArg(options::OPT_fsanitize_hwaddress_abi_EQ)) {
  893. HwasanAbi = HwasanAbiArg->getValue();
  894. if (HwasanAbi != "platform" && HwasanAbi != "interceptor" &&
  895. DiagnoseErrors)
  896. D.Diag(clang::diag::err_drv_invalid_value)
  897. << HwasanAbiArg->getAsString(Args) << HwasanAbi;
  898. } else {
  899. HwasanAbi = "interceptor";
  900. }
  901. if (TC.getTriple().getArch() == llvm::Triple::x86_64)
  902. HwasanUseAliases = Args.hasFlag(
  903. options::OPT_fsanitize_hwaddress_experimental_aliasing,
  904. options::OPT_fno_sanitize_hwaddress_experimental_aliasing,
  905. HwasanUseAliases);
  906. }
  907. if (AllAddedKinds & SanitizerKind::SafeStack) {
  908. // SafeStack runtime is built into the system on Android and Fuchsia.
  909. SafeStackRuntime =
  910. !TC.getTriple().isAndroid() && !TC.getTriple().isOSFuchsia();
  911. }
  912. LinkRuntimes =
  913. Args.hasFlag(options::OPT_fsanitize_link_runtime,
  914. options::OPT_fno_sanitize_link_runtime, LinkRuntimes);
  915. // Parse -link-cxx-sanitizer flag.
  916. LinkCXXRuntimes = Args.hasArg(options::OPT_fsanitize_link_cxx_runtime,
  917. options::OPT_fno_sanitize_link_cxx_runtime,
  918. LinkCXXRuntimes) ||
  919. D.CCCIsCXX();
  920. NeedsMemProfRt = Args.hasFlag(options::OPT_fmemory_profile,
  921. options::OPT_fmemory_profile_EQ,
  922. options::OPT_fno_memory_profile, false);
  923. // Finally, initialize the set of available and recoverable sanitizers.
  924. Sanitizers.Mask |= Kinds;
  925. RecoverableSanitizers.Mask |= RecoverableKinds;
  926. TrapSanitizers.Mask |= TrappingKinds;
  927. assert(!(RecoverableKinds & TrappingKinds) &&
  928. "Overlap between recoverable and trapping sanitizers");
  929. }
  930. static std::string toString(const clang::SanitizerSet &Sanitizers) {
  931. std::string Res;
  932. #define SANITIZER(NAME, ID) \
  933. if (Sanitizers.has(SanitizerKind::ID)) { \
  934. if (!Res.empty()) \
  935. Res += ","; \
  936. Res += NAME; \
  937. }
  938. #include "clang/Basic/Sanitizers.def"
  939. return Res;
  940. }
  941. static void addSpecialCaseListOpt(const llvm::opt::ArgList &Args,
  942. llvm::opt::ArgStringList &CmdArgs,
  943. const char *SCLOptFlag,
  944. const std::vector<std::string> &SCLFiles) {
  945. for (const auto &SCLPath : SCLFiles) {
  946. SmallString<64> SCLOpt(SCLOptFlag);
  947. SCLOpt += SCLPath;
  948. CmdArgs.push_back(Args.MakeArgString(SCLOpt));
  949. }
  950. }
  951. static void addIncludeLinkerOption(const ToolChain &TC,
  952. const llvm::opt::ArgList &Args,
  953. llvm::opt::ArgStringList &CmdArgs,
  954. StringRef SymbolName) {
  955. SmallString<64> LinkerOptionFlag;
  956. LinkerOptionFlag = "--linker-option=/include:";
  957. if (TC.getTriple().getArch() == llvm::Triple::x86) {
  958. // Win32 mangles C function names with a '_' prefix.
  959. LinkerOptionFlag += '_';
  960. }
  961. LinkerOptionFlag += SymbolName;
  962. CmdArgs.push_back(Args.MakeArgString(LinkerOptionFlag));
  963. }
  964. static bool hasTargetFeatureMTE(const llvm::opt::ArgStringList &CmdArgs) {
  965. for (auto Start = CmdArgs.begin(), End = CmdArgs.end(); Start != End;
  966. ++Start) {
  967. auto It = std::find(Start, End, StringRef("+mte"));
  968. if (It == End)
  969. break;
  970. if (It > Start && *std::prev(It) == StringRef("-target-feature"))
  971. return true;
  972. Start = It;
  973. }
  974. return false;
  975. }
  976. void SanitizerArgs::addArgs(const ToolChain &TC, const llvm::opt::ArgList &Args,
  977. llvm::opt::ArgStringList &CmdArgs,
  978. types::ID InputType) const {
  979. // NVPTX doesn't currently support sanitizers. Bailing out here means
  980. // that e.g. -fsanitize=address applies only to host code, which is what we
  981. // want for now.
  982. //
  983. // AMDGPU sanitizer support is experimental and controlled by -fgpu-sanitize.
  984. if (TC.getTriple().isNVPTX() ||
  985. (TC.getTriple().isAMDGPU() &&
  986. !Args.hasFlag(options::OPT_fgpu_sanitize, options::OPT_fno_gpu_sanitize,
  987. true)))
  988. return;
  989. // Translate available CoverageFeatures to corresponding clang-cc1 flags.
  990. // Do it even if Sanitizers.empty() since some forms of coverage don't require
  991. // sanitizers.
  992. std::pair<int, const char *> CoverageFlags[] = {
  993. std::make_pair(CoverageFunc, "-fsanitize-coverage-type=1"),
  994. std::make_pair(CoverageBB, "-fsanitize-coverage-type=2"),
  995. std::make_pair(CoverageEdge, "-fsanitize-coverage-type=3"),
  996. std::make_pair(CoverageIndirCall, "-fsanitize-coverage-indirect-calls"),
  997. std::make_pair(CoverageTraceBB, "-fsanitize-coverage-trace-bb"),
  998. std::make_pair(CoverageTraceCmp, "-fsanitize-coverage-trace-cmp"),
  999. std::make_pair(CoverageTraceDiv, "-fsanitize-coverage-trace-div"),
  1000. std::make_pair(CoverageTraceGep, "-fsanitize-coverage-trace-gep"),
  1001. std::make_pair(Coverage8bitCounters, "-fsanitize-coverage-8bit-counters"),
  1002. std::make_pair(CoverageTracePC, "-fsanitize-coverage-trace-pc"),
  1003. std::make_pair(CoverageTracePCGuard,
  1004. "-fsanitize-coverage-trace-pc-guard"),
  1005. std::make_pair(CoverageInline8bitCounters,
  1006. "-fsanitize-coverage-inline-8bit-counters"),
  1007. std::make_pair(CoverageInlineBoolFlag,
  1008. "-fsanitize-coverage-inline-bool-flag"),
  1009. std::make_pair(CoveragePCTable, "-fsanitize-coverage-pc-table"),
  1010. std::make_pair(CoverageNoPrune, "-fsanitize-coverage-no-prune"),
  1011. std::make_pair(CoverageStackDepth, "-fsanitize-coverage-stack-depth"),
  1012. std::make_pair(CoverageTraceLoads, "-fsanitize-coverage-trace-loads"),
  1013. std::make_pair(CoverageTraceStores, "-fsanitize-coverage-trace-stores"),
  1014. std::make_pair(CoverageControlFlow, "-fsanitize-coverage-control-flow")};
  1015. for (auto F : CoverageFlags) {
  1016. if (CoverageFeatures & F.first)
  1017. CmdArgs.push_back(F.second);
  1018. }
  1019. addSpecialCaseListOpt(
  1020. Args, CmdArgs, "-fsanitize-coverage-allowlist=", CoverageAllowlistFiles);
  1021. addSpecialCaseListOpt(Args, CmdArgs, "-fsanitize-coverage-ignorelist=",
  1022. CoverageIgnorelistFiles);
  1023. // Translate available BinaryMetadataFeatures to corresponding clang-cc1
  1024. // flags. Does not depend on any other sanitizers.
  1025. const std::pair<int, std::string> BinaryMetadataFlags[] = {
  1026. std::make_pair(BinaryMetadataCovered, "covered"),
  1027. std::make_pair(BinaryMetadataAtomics, "atomics"),
  1028. std::make_pair(BinaryMetadataUAR, "uar")};
  1029. for (const auto &F : BinaryMetadataFlags) {
  1030. if (BinaryMetadataFeatures & F.first)
  1031. CmdArgs.push_back(
  1032. Args.MakeArgString("-fexperimental-sanitize-metadata=" + F.second));
  1033. }
  1034. if (TC.getTriple().isOSWindows() && needsUbsanRt()) {
  1035. // Instruct the code generator to embed linker directives in the object file
  1036. // that cause the required runtime libraries to be linked.
  1037. CmdArgs.push_back(
  1038. Args.MakeArgString("--dependent-lib=" +
  1039. TC.getCompilerRTBasename(Args, "ubsan_standalone")));
  1040. if (types::isCXX(InputType))
  1041. CmdArgs.push_back(Args.MakeArgString(
  1042. "--dependent-lib=" +
  1043. TC.getCompilerRTBasename(Args, "ubsan_standalone_cxx")));
  1044. }
  1045. if (TC.getTriple().isOSWindows() && needsStatsRt()) {
  1046. CmdArgs.push_back(Args.MakeArgString(
  1047. "--dependent-lib=" + TC.getCompilerRTBasename(Args, "stats_client")));
  1048. // The main executable must export the stats runtime.
  1049. // FIXME: Only exporting from the main executable (e.g. based on whether the
  1050. // translation unit defines main()) would save a little space, but having
  1051. // multiple copies of the runtime shouldn't hurt.
  1052. CmdArgs.push_back(Args.MakeArgString(
  1053. "--dependent-lib=" + TC.getCompilerRTBasename(Args, "stats")));
  1054. addIncludeLinkerOption(TC, Args, CmdArgs, "__sanitizer_stats_register");
  1055. }
  1056. if (Sanitizers.empty())
  1057. return;
  1058. CmdArgs.push_back(Args.MakeArgString("-fsanitize=" + toString(Sanitizers)));
  1059. if (!RecoverableSanitizers.empty())
  1060. CmdArgs.push_back(Args.MakeArgString("-fsanitize-recover=" +
  1061. toString(RecoverableSanitizers)));
  1062. if (!TrapSanitizers.empty())
  1063. CmdArgs.push_back(
  1064. Args.MakeArgString("-fsanitize-trap=" + toString(TrapSanitizers)));
  1065. addSpecialCaseListOpt(Args, CmdArgs,
  1066. "-fsanitize-ignorelist=", UserIgnorelistFiles);
  1067. addSpecialCaseListOpt(Args, CmdArgs,
  1068. "-fsanitize-system-ignorelist=", SystemIgnorelistFiles);
  1069. if (MsanTrackOrigins)
  1070. CmdArgs.push_back(Args.MakeArgString("-fsanitize-memory-track-origins=" +
  1071. Twine(MsanTrackOrigins)));
  1072. if (MsanUseAfterDtor)
  1073. CmdArgs.push_back("-fsanitize-memory-use-after-dtor");
  1074. if (!MsanParamRetval)
  1075. CmdArgs.push_back("-fno-sanitize-memory-param-retval");
  1076. // FIXME: Pass these parameters as function attributes, not as -llvm flags.
  1077. if (!TsanMemoryAccess) {
  1078. CmdArgs.push_back("-mllvm");
  1079. CmdArgs.push_back("-tsan-instrument-memory-accesses=0");
  1080. CmdArgs.push_back("-mllvm");
  1081. CmdArgs.push_back("-tsan-instrument-memintrinsics=0");
  1082. }
  1083. if (!TsanFuncEntryExit) {
  1084. CmdArgs.push_back("-mllvm");
  1085. CmdArgs.push_back("-tsan-instrument-func-entry-exit=0");
  1086. }
  1087. if (!TsanAtomics) {
  1088. CmdArgs.push_back("-mllvm");
  1089. CmdArgs.push_back("-tsan-instrument-atomics=0");
  1090. }
  1091. if (HwasanUseAliases) {
  1092. CmdArgs.push_back("-mllvm");
  1093. CmdArgs.push_back("-hwasan-experimental-use-page-aliases=1");
  1094. }
  1095. if (CfiCrossDso)
  1096. CmdArgs.push_back("-fsanitize-cfi-cross-dso");
  1097. if (CfiICallGeneralizePointers)
  1098. CmdArgs.push_back("-fsanitize-cfi-icall-generalize-pointers");
  1099. if (CfiCanonicalJumpTables)
  1100. CmdArgs.push_back("-fsanitize-cfi-canonical-jump-tables");
  1101. if (Stats)
  1102. CmdArgs.push_back("-fsanitize-stats");
  1103. if (MinimalRuntime)
  1104. CmdArgs.push_back("-fsanitize-minimal-runtime");
  1105. if (AsanFieldPadding)
  1106. CmdArgs.push_back(Args.MakeArgString("-fsanitize-address-field-padding=" +
  1107. Twine(AsanFieldPadding)));
  1108. if (AsanUseAfterScope)
  1109. CmdArgs.push_back("-fsanitize-address-use-after-scope");
  1110. if (AsanPoisonCustomArrayCookie)
  1111. CmdArgs.push_back("-fsanitize-address-poison-custom-array-cookie");
  1112. if (AsanGlobalsDeadStripping)
  1113. CmdArgs.push_back("-fsanitize-address-globals-dead-stripping");
  1114. if (!AsanUseOdrIndicator)
  1115. CmdArgs.push_back("-fno-sanitize-address-use-odr-indicator");
  1116. if (AsanInvalidPointerCmp) {
  1117. CmdArgs.push_back("-mllvm");
  1118. CmdArgs.push_back("-asan-detect-invalid-pointer-cmp");
  1119. }
  1120. if (AsanInvalidPointerSub) {
  1121. CmdArgs.push_back("-mllvm");
  1122. CmdArgs.push_back("-asan-detect-invalid-pointer-sub");
  1123. }
  1124. if (AsanOutlineInstrumentation) {
  1125. CmdArgs.push_back("-mllvm");
  1126. CmdArgs.push_back("-asan-instrumentation-with-call-threshold=0");
  1127. }
  1128. // Only pass the option to the frontend if the user requested,
  1129. // otherwise the frontend will just use the codegen default.
  1130. if (AsanDtorKind != llvm::AsanDtorKind::Invalid) {
  1131. CmdArgs.push_back(Args.MakeArgString("-fsanitize-address-destructor=" +
  1132. AsanDtorKindToString(AsanDtorKind)));
  1133. }
  1134. if (AsanUseAfterReturn != llvm::AsanDetectStackUseAfterReturnMode::Invalid) {
  1135. CmdArgs.push_back(Args.MakeArgString(
  1136. "-fsanitize-address-use-after-return=" +
  1137. AsanDetectStackUseAfterReturnModeToString(AsanUseAfterReturn)));
  1138. }
  1139. if (!HwasanAbi.empty()) {
  1140. CmdArgs.push_back("-default-function-attr");
  1141. CmdArgs.push_back(Args.MakeArgString("hwasan-abi=" + HwasanAbi));
  1142. }
  1143. if (Sanitizers.has(SanitizerKind::HWAddress) && !HwasanUseAliases) {
  1144. CmdArgs.push_back("-target-feature");
  1145. CmdArgs.push_back("+tagged-globals");
  1146. }
  1147. // MSan: Workaround for PR16386.
  1148. // ASan: This is mainly to help LSan with cases such as
  1149. // https://github.com/google/sanitizers/issues/373
  1150. // We can't make this conditional on -fsanitize=leak, as that flag shouldn't
  1151. // affect compilation.
  1152. if (Sanitizers.has(SanitizerKind::Memory) ||
  1153. Sanitizers.has(SanitizerKind::Address))
  1154. CmdArgs.push_back("-fno-assume-sane-operator-new");
  1155. // libFuzzer wants to intercept calls to certain library functions, so the
  1156. // following -fno-builtin-* flags force the compiler to emit interposable
  1157. // libcalls to these functions. Other sanitizers effectively do the same thing
  1158. // by marking all library call sites with NoBuiltin attribute in their LLVM
  1159. // pass. (see llvm::maybeMarkSanitizerLibraryCallNoBuiltin)
  1160. if (Sanitizers.has(SanitizerKind::FuzzerNoLink)) {
  1161. CmdArgs.push_back("-fno-builtin-bcmp");
  1162. CmdArgs.push_back("-fno-builtin-memcmp");
  1163. CmdArgs.push_back("-fno-builtin-strncmp");
  1164. CmdArgs.push_back("-fno-builtin-strcmp");
  1165. CmdArgs.push_back("-fno-builtin-strncasecmp");
  1166. CmdArgs.push_back("-fno-builtin-strcasecmp");
  1167. CmdArgs.push_back("-fno-builtin-strstr");
  1168. CmdArgs.push_back("-fno-builtin-strcasestr");
  1169. CmdArgs.push_back("-fno-builtin-memmem");
  1170. }
  1171. // Require -fvisibility= flag on non-Windows when compiling if vptr CFI is
  1172. // enabled.
  1173. if (Sanitizers.hasOneOf(CFIClasses) && !TC.getTriple().isOSWindows() &&
  1174. !Args.hasArg(options::OPT_fvisibility_EQ)) {
  1175. TC.getDriver().Diag(clang::diag::err_drv_argument_only_allowed_with)
  1176. << lastArgumentForMask(TC.getDriver(), Args,
  1177. Sanitizers.Mask & CFIClasses)
  1178. << "-fvisibility=";
  1179. }
  1180. if (Sanitizers.has(SanitizerKind::MemtagStack) &&
  1181. !hasTargetFeatureMTE(CmdArgs))
  1182. TC.getDriver().Diag(diag::err_stack_tagging_requires_hardware_feature);
  1183. }
  1184. SanitizerMask parseArgValues(const Driver &D, const llvm::opt::Arg *A,
  1185. bool DiagnoseErrors) {
  1186. assert((A->getOption().matches(options::OPT_fsanitize_EQ) ||
  1187. A->getOption().matches(options::OPT_fno_sanitize_EQ) ||
  1188. A->getOption().matches(options::OPT_fsanitize_recover_EQ) ||
  1189. A->getOption().matches(options::OPT_fno_sanitize_recover_EQ) ||
  1190. A->getOption().matches(options::OPT_fsanitize_trap_EQ) ||
  1191. A->getOption().matches(options::OPT_fno_sanitize_trap_EQ)) &&
  1192. "Invalid argument in parseArgValues!");
  1193. SanitizerMask Kinds;
  1194. for (int i = 0, n = A->getNumValues(); i != n; ++i) {
  1195. const char *Value = A->getValue(i);
  1196. SanitizerMask Kind;
  1197. // Special case: don't accept -fsanitize=all.
  1198. if (A->getOption().matches(options::OPT_fsanitize_EQ) &&
  1199. 0 == strcmp("all", Value))
  1200. Kind = SanitizerMask();
  1201. else
  1202. Kind = parseSanitizerValue(Value, /*AllowGroups=*/true);
  1203. if (Kind)
  1204. Kinds |= Kind;
  1205. else if (DiagnoseErrors)
  1206. D.Diag(clang::diag::err_drv_unsupported_option_argument)
  1207. << A->getSpelling() << Value;
  1208. }
  1209. return Kinds;
  1210. }
  1211. int parseCoverageFeatures(const Driver &D, const llvm::opt::Arg *A,
  1212. bool DiagnoseErrors) {
  1213. assert(A->getOption().matches(options::OPT_fsanitize_coverage) ||
  1214. A->getOption().matches(options::OPT_fno_sanitize_coverage));
  1215. int Features = 0;
  1216. for (int i = 0, n = A->getNumValues(); i != n; ++i) {
  1217. const char *Value = A->getValue(i);
  1218. int F = llvm::StringSwitch<int>(Value)
  1219. .Case("func", CoverageFunc)
  1220. .Case("bb", CoverageBB)
  1221. .Case("edge", CoverageEdge)
  1222. .Case("indirect-calls", CoverageIndirCall)
  1223. .Case("trace-bb", CoverageTraceBB)
  1224. .Case("trace-cmp", CoverageTraceCmp)
  1225. .Case("trace-div", CoverageTraceDiv)
  1226. .Case("trace-gep", CoverageTraceGep)
  1227. .Case("8bit-counters", Coverage8bitCounters)
  1228. .Case("trace-pc", CoverageTracePC)
  1229. .Case("trace-pc-guard", CoverageTracePCGuard)
  1230. .Case("no-prune", CoverageNoPrune)
  1231. .Case("inline-8bit-counters", CoverageInline8bitCounters)
  1232. .Case("inline-bool-flag", CoverageInlineBoolFlag)
  1233. .Case("pc-table", CoveragePCTable)
  1234. .Case("stack-depth", CoverageStackDepth)
  1235. .Case("trace-loads", CoverageTraceLoads)
  1236. .Case("trace-stores", CoverageTraceStores)
  1237. .Case("control-flow", CoverageControlFlow)
  1238. .Default(0);
  1239. if (F == 0 && DiagnoseErrors)
  1240. D.Diag(clang::diag::err_drv_unsupported_option_argument)
  1241. << A->getSpelling() << Value;
  1242. Features |= F;
  1243. }
  1244. return Features;
  1245. }
  1246. int parseBinaryMetadataFeatures(const Driver &D, const llvm::opt::Arg *A,
  1247. bool DiagnoseErrors) {
  1248. assert(
  1249. A->getOption().matches(options::OPT_fexperimental_sanitize_metadata_EQ) ||
  1250. A->getOption().matches(
  1251. options::OPT_fno_experimental_sanitize_metadata_EQ));
  1252. int Features = 0;
  1253. for (int i = 0, n = A->getNumValues(); i != n; ++i) {
  1254. const char *Value = A->getValue(i);
  1255. int F = llvm::StringSwitch<int>(Value)
  1256. .Case("covered", BinaryMetadataCovered)
  1257. .Case("atomics", BinaryMetadataAtomics)
  1258. .Case("uar", BinaryMetadataUAR)
  1259. .Case("all", ~0)
  1260. .Default(0);
  1261. if (F == 0 && DiagnoseErrors)
  1262. D.Diag(clang::diag::err_drv_unsupported_option_argument)
  1263. << A->getSpelling() << Value;
  1264. Features |= F;
  1265. }
  1266. return Features;
  1267. }
  1268. std::string lastArgumentForMask(const Driver &D, const llvm::opt::ArgList &Args,
  1269. SanitizerMask Mask) {
  1270. for (llvm::opt::ArgList::const_reverse_iterator I = Args.rbegin(),
  1271. E = Args.rend();
  1272. I != E; ++I) {
  1273. const auto *Arg = *I;
  1274. if (Arg->getOption().matches(options::OPT_fsanitize_EQ)) {
  1275. SanitizerMask AddKinds =
  1276. expandSanitizerGroups(parseArgValues(D, Arg, false));
  1277. if (AddKinds & Mask)
  1278. return describeSanitizeArg(Arg, Mask);
  1279. } else if (Arg->getOption().matches(options::OPT_fno_sanitize_EQ)) {
  1280. SanitizerMask RemoveKinds =
  1281. expandSanitizerGroups(parseArgValues(D, Arg, false));
  1282. Mask &= ~RemoveKinds;
  1283. }
  1284. }
  1285. llvm_unreachable("arg list didn't provide expected value");
  1286. }
  1287. std::string describeSanitizeArg(const llvm::opt::Arg *A, SanitizerMask Mask) {
  1288. assert(A->getOption().matches(options::OPT_fsanitize_EQ) &&
  1289. "Invalid argument in describeSanitizerArg!");
  1290. std::string Sanitizers;
  1291. for (int i = 0, n = A->getNumValues(); i != n; ++i) {
  1292. if (expandSanitizerGroups(
  1293. parseSanitizerValue(A->getValue(i), /*AllowGroups=*/true)) &
  1294. Mask) {
  1295. if (!Sanitizers.empty())
  1296. Sanitizers += ",";
  1297. Sanitizers += A->getValue(i);
  1298. }
  1299. }
  1300. assert(!Sanitizers.empty() && "arg didn't provide expected value");
  1301. return "-fsanitize=" + Sanitizers;
  1302. }