Details | Last modification | View Log | RSS feed
| Rev | Author | Line No. | Line | 
|---|---|---|---|
| 14 | pmbaty | 1 | //===--- SanitizerArgs.h - Arguments for sanitizer tools  -------*- C++ -*-===// | 
| 2 | // | ||
| 3 | // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. | ||
| 4 | // See https://llvm.org/LICENSE.txt for license information. | ||
| 5 | // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception | ||
| 6 | // | ||
| 7 | //===----------------------------------------------------------------------===// | ||
| 8 | #ifndef LLVM_CLANG_DRIVER_SANITIZERARGS_H | ||
| 9 | #define LLVM_CLANG_DRIVER_SANITIZERARGS_H | ||
| 10 | |||
| 11 | #include "clang/Basic/Sanitizers.h" | ||
| 12 | #include "clang/Driver/Types.h" | ||
| 13 | #include "llvm/Option/Arg.h" | ||
| 14 | #include "llvm/Option/ArgList.h" | ||
| 15 | #include "llvm/Transforms/Instrumentation/AddressSanitizerOptions.h" | ||
| 16 | #include <string> | ||
| 17 | #include <vector> | ||
| 18 | |||
| 19 | namespace clang { | ||
| 20 | namespace driver { | ||
| 21 | |||
| 22 | class ToolChain; | ||
| 23 | |||
| 24 | class SanitizerArgs { | ||
| 25 |   SanitizerSet Sanitizers; | ||
| 26 |   SanitizerSet RecoverableSanitizers; | ||
| 27 |   SanitizerSet TrapSanitizers; | ||
| 28 | |||
| 29 | std::vector<std::string> UserIgnorelistFiles; | ||
| 30 | std::vector<std::string> SystemIgnorelistFiles; | ||
| 31 | std::vector<std::string> CoverageAllowlistFiles; | ||
| 32 | std::vector<std::string> CoverageIgnorelistFiles; | ||
| 33 | int CoverageFeatures = 0; | ||
| 34 | int BinaryMetadataFeatures = 0; | ||
| 35 | int MsanTrackOrigins = 0; | ||
| 36 | bool MsanUseAfterDtor = true; | ||
| 37 | bool MsanParamRetval = true; | ||
| 38 | bool CfiCrossDso = false; | ||
| 39 | bool CfiICallGeneralizePointers = false; | ||
| 40 | bool CfiCanonicalJumpTables = false; | ||
| 41 | int AsanFieldPadding = 0; | ||
| 42 | bool SharedRuntime = false; | ||
| 43 | bool AsanUseAfterScope = true; | ||
| 44 | bool AsanPoisonCustomArrayCookie = false; | ||
| 45 | bool AsanGlobalsDeadStripping = false; | ||
| 46 | bool AsanUseOdrIndicator = false; | ||
| 47 | bool AsanInvalidPointerCmp = false; | ||
| 48 | bool AsanInvalidPointerSub = false; | ||
| 49 | bool AsanOutlineInstrumentation = false; | ||
| 50 | llvm::AsanDtorKind AsanDtorKind = llvm::AsanDtorKind::Invalid; | ||
| 51 | std::string HwasanAbi; | ||
| 52 | bool LinkRuntimes = true; | ||
| 53 | bool LinkCXXRuntimes = false; | ||
| 54 | bool NeedPIE = false; | ||
| 55 | bool SafeStackRuntime = false; | ||
| 56 | bool Stats = false; | ||
| 57 | bool TsanMemoryAccess = true; | ||
| 58 | bool TsanFuncEntryExit = true; | ||
| 59 | bool TsanAtomics = true; | ||
| 60 | bool MinimalRuntime = false; | ||
| 61 |   // True if cross-dso CFI support if provided by the system (i.e. Android). | ||
| 62 | bool ImplicitCfiRuntime = false; | ||
| 63 | bool NeedsMemProfRt = false; | ||
| 64 | bool HwasanUseAliases = false; | ||
| 65 | llvm::AsanDetectStackUseAfterReturnMode AsanUseAfterReturn = | ||
| 66 | llvm::AsanDetectStackUseAfterReturnMode::Invalid; | ||
| 67 | |||
| 68 | std::string MemtagMode; | ||
| 69 | |||
| 70 | public: | ||
| 71 |   /// Parses the sanitizer arguments from an argument list. | ||
| 72 | SanitizerArgs(const ToolChain &TC, const llvm::opt::ArgList &Args, | ||
| 73 | bool DiagnoseErrors = true); | ||
| 74 | |||
| 75 | bool needsSharedRt() const { return SharedRuntime; } | ||
| 76 | |||
| 77 | bool needsMemProfRt() const { return NeedsMemProfRt; } | ||
| 78 | bool needsAsanRt() const { return Sanitizers.has(SanitizerKind::Address); } | ||
| 79 | bool needsHwasanRt() const { | ||
| 80 | return Sanitizers.has(SanitizerKind::HWAddress); | ||
| 81 |   } | ||
| 82 | bool needsHwasanAliasesRt() const { | ||
| 83 | return needsHwasanRt() && HwasanUseAliases; | ||
| 84 |   } | ||
| 85 | bool needsTsanRt() const { return Sanitizers.has(SanitizerKind::Thread); } | ||
| 86 | bool needsMsanRt() const { return Sanitizers.has(SanitizerKind::Memory); } | ||
| 87 | bool needsFuzzer() const { return Sanitizers.has(SanitizerKind::Fuzzer); } | ||
| 88 | bool needsLsanRt() const { | ||
| 89 | return Sanitizers.has(SanitizerKind::Leak) && | ||
| 90 | !Sanitizers.has(SanitizerKind::Address) && | ||
| 91 | !Sanitizers.has(SanitizerKind::HWAddress); | ||
| 92 |   } | ||
| 93 | bool needsFuzzerInterceptors() const; | ||
| 94 | bool needsUbsanRt() const; | ||
| 95 | bool requiresMinimalRuntime() const { return MinimalRuntime; } | ||
| 96 | bool needsDfsanRt() const { return Sanitizers.has(SanitizerKind::DataFlow); } | ||
| 97 | bool needsSafeStackRt() const { return SafeStackRuntime; } | ||
| 98 | bool needsCfiRt() const; | ||
| 99 | bool needsCfiDiagRt() const; | ||
| 100 | bool needsStatsRt() const { return Stats; } | ||
| 101 | bool needsScudoRt() const { return Sanitizers.has(SanitizerKind::Scudo); } | ||
| 102 | |||
| 103 | bool hasMemTag() const { | ||
| 104 | return hasMemtagHeap() || hasMemtagStack() || hasMemtagGlobals(); | ||
| 105 |   } | ||
| 106 | bool hasMemtagHeap() const { | ||
| 107 | return Sanitizers.has(SanitizerKind::MemtagHeap); | ||
| 108 |   } | ||
| 109 | bool hasMemtagStack() const { | ||
| 110 | return Sanitizers.has(SanitizerKind::MemtagStack); | ||
| 111 |   } | ||
| 112 | bool hasMemtagGlobals() const { | ||
| 113 | return Sanitizers.has(SanitizerKind::MemtagGlobals); | ||
| 114 |   } | ||
| 115 | const std::string &getMemtagMode() const { | ||
| 116 | assert(!MemtagMode.empty()); | ||
| 117 | return MemtagMode; | ||
| 118 |   } | ||
| 119 | |||
| 120 | bool requiresPIE() const; | ||
| 121 | bool needsUnwindTables() const; | ||
| 122 | bool needsLTO() const; | ||
| 123 | bool linkRuntimes() const { return LinkRuntimes; } | ||
| 124 | bool linkCXXRuntimes() const { return LinkCXXRuntimes; } | ||
| 125 | bool hasCrossDsoCfi() const { return CfiCrossDso; } | ||
| 126 | bool hasAnySanitizer() const { return !Sanitizers.empty(); } | ||
| 127 | void addArgs(const ToolChain &TC, const llvm::opt::ArgList &Args, | ||
| 128 | llvm::opt::ArgStringList &CmdArgs, types::ID InputType) const; | ||
| 129 | }; | ||
| 130 | |||
| 131 | } // namespace driver | ||
| 132 | } // namespace clang | ||
| 133 | |||
| 134 | #endif |