2016-01-06 23:41:07 +01:00
|
|
|
// Copyright 2016 Google Inc. All rights reserved.
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
package cc
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
2017-11-29 01:37:53 +01:00
|
|
|
"sort"
|
2016-01-06 23:41:07 +01:00
|
|
|
"strings"
|
2017-11-17 20:08:10 +01:00
|
|
|
"sync"
|
2016-01-06 23:41:07 +01:00
|
|
|
|
2018-06-21 22:03:07 +02:00
|
|
|
"github.com/google/blueprint"
|
|
|
|
|
2016-05-19 00:37:25 +02:00
|
|
|
"android/soong/android"
|
2016-08-15 23:18:24 +02:00
|
|
|
"android/soong/cc/config"
|
2016-01-06 23:41:07 +01:00
|
|
|
)
|
|
|
|
|
2017-06-15 23:45:18 +02:00
|
|
|
var (
|
|
|
|
// Any C flags added by sanitizer which libTooling tools may not
|
|
|
|
// understand also need to be added to ClangLibToolingUnknownCflags in
|
|
|
|
// cc/config/clang.go
|
|
|
|
|
2019-08-21 10:38:40 +02:00
|
|
|
asanCflags = []string{
|
|
|
|
"-fno-omit-frame-pointer",
|
|
|
|
"-fno-experimental-new-pass-manager",
|
|
|
|
}
|
2017-06-15 23:45:18 +02:00
|
|
|
asanLdflags = []string{"-Wl,-u,__asan_preinit"}
|
2017-02-14 16:59:33 +01:00
|
|
|
|
2019-03-20 05:39:54 +01:00
|
|
|
hwasanCflags = []string{"-fno-omit-frame-pointer", "-Wno-frame-larger-than=",
|
2019-06-15 03:37:33 +02:00
|
|
|
"-fsanitize-hwaddress-abi=platform",
|
2019-11-23 03:37:10 +01:00
|
|
|
"-fno-experimental-new-pass-manager",
|
|
|
|
// The following improves debug location information
|
|
|
|
// availability at the cost of its accuracy. It increases
|
|
|
|
// the likelihood of a stack variable's frame offset
|
|
|
|
// to be recorded in the debug info, which is important
|
|
|
|
// for the quality of hwasan reports. The downside is a
|
|
|
|
// higher number of "optimized out" stack variables.
|
|
|
|
// b/112437883.
|
|
|
|
"-mllvm", "-instcombine-lower-dbg-declare=0",
|
|
|
|
}
|
2018-08-03 01:19:13 +02:00
|
|
|
|
2017-11-01 10:20:21 +01:00
|
|
|
cfiCflags = []string{"-flto", "-fsanitize-cfi-cross-dso",
|
2017-06-15 23:45:18 +02:00
|
|
|
"-fsanitize-blacklist=external/compiler-rt/lib/cfi/cfi_blacklist.txt"}
|
2018-08-31 21:54:33 +02:00
|
|
|
// -flto and -fvisibility are required by clang when -fsanitize=cfi is
|
|
|
|
// used, but have no effect on assembly files
|
|
|
|
cfiAsflags = []string{"-flto", "-fvisibility=default"}
|
2017-06-15 23:45:18 +02:00
|
|
|
cfiLdflags = []string{"-flto", "-fsanitize-cfi-cross-dso", "-fsanitize=cfi",
|
2017-08-29 06:50:17 +02:00
|
|
|
"-Wl,-plugin-opt,O1"}
|
2018-08-03 01:19:13 +02:00
|
|
|
cfiExportsMapPath = "build/soong/cc/config/cfi_exports.map"
|
|
|
|
cfiStaticLibsMutex sync.Mutex
|
|
|
|
hwasanStaticLibsMutex sync.Mutex
|
2017-06-28 18:10:48 +02:00
|
|
|
|
2018-11-30 00:12:51 +01:00
|
|
|
intOverflowCflags = []string{"-fsanitize-blacklist=build/soong/cc/config/integer_overflow_blacklist.txt"}
|
2018-11-20 01:03:58 +01:00
|
|
|
|
2019-03-06 19:38:48 +01:00
|
|
|
minimalRuntimeFlags = []string{"-fsanitize-minimal-runtime", "-fno-sanitize-trap=integer,undefined",
|
2018-10-08 18:29:39 +02:00
|
|
|
"-fno-sanitize-recover=integer,undefined"}
|
2019-05-15 21:49:54 +02:00
|
|
|
hwasanGlobalOptions = []string{"heap_history_size=1023", "stack_history_size=512",
|
|
|
|
"export_memory_stats=0", "max_malloc_fill_size=0"}
|
2016-10-14 01:44:07 +02:00
|
|
|
)
|
|
|
|
|
2016-01-06 23:41:07 +01:00
|
|
|
type sanitizerType int
|
|
|
|
|
2016-07-07 19:54:07 +02:00
|
|
|
func boolPtr(v bool) *bool {
|
|
|
|
if v {
|
|
|
|
return &v
|
|
|
|
} else {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-01-06 23:41:07 +01:00
|
|
|
const (
|
|
|
|
asan sanitizerType = iota + 1
|
2018-08-03 01:19:13 +02:00
|
|
|
hwasan
|
2016-01-06 23:41:07 +01:00
|
|
|
tsan
|
2017-06-28 18:10:48 +02:00
|
|
|
intOverflow
|
2017-11-01 10:20:21 +01:00
|
|
|
cfi
|
2018-11-20 01:03:58 +01:00
|
|
|
scs
|
2019-05-01 23:42:05 +02:00
|
|
|
fuzzer
|
2016-01-06 23:41:07 +01:00
|
|
|
)
|
|
|
|
|
2019-02-01 02:50:50 +01:00
|
|
|
// Name of the sanitizer variation for this sanitizer type
|
|
|
|
func (t sanitizerType) variationName() string {
|
2016-01-06 23:41:07 +01:00
|
|
|
switch t {
|
|
|
|
case asan:
|
|
|
|
return "asan"
|
2018-08-03 01:19:13 +02:00
|
|
|
case hwasan:
|
|
|
|
return "hwasan"
|
2016-01-06 23:41:07 +01:00
|
|
|
case tsan:
|
|
|
|
return "tsan"
|
2017-06-28 18:10:48 +02:00
|
|
|
case intOverflow:
|
|
|
|
return "intOverflow"
|
2017-11-01 10:20:21 +01:00
|
|
|
case cfi:
|
|
|
|
return "cfi"
|
2018-11-20 01:03:58 +01:00
|
|
|
case scs:
|
|
|
|
return "scs"
|
2019-05-01 23:42:05 +02:00
|
|
|
case fuzzer:
|
|
|
|
return "fuzzer"
|
2016-01-06 23:41:07 +01:00
|
|
|
default:
|
|
|
|
panic(fmt.Errorf("unknown sanitizerType %d", t))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-02-01 02:50:50 +01:00
|
|
|
// This is the sanitizer names in SANITIZE_[TARGET|HOST]
|
|
|
|
func (t sanitizerType) name() string {
|
|
|
|
switch t {
|
|
|
|
case asan:
|
|
|
|
return "address"
|
|
|
|
case hwasan:
|
|
|
|
return "hwaddress"
|
|
|
|
case tsan:
|
|
|
|
return "thread"
|
|
|
|
case intOverflow:
|
|
|
|
return "integer_overflow"
|
|
|
|
case cfi:
|
|
|
|
return "cfi"
|
|
|
|
case scs:
|
|
|
|
return "shadow-call-stack"
|
2019-05-01 23:42:05 +02:00
|
|
|
case fuzzer:
|
|
|
|
return "fuzzer"
|
2019-02-01 02:50:50 +01:00
|
|
|
default:
|
|
|
|
panic(fmt.Errorf("unknown sanitizerType %d", t))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-07-29 14:27:18 +02:00
|
|
|
func (t sanitizerType) incompatibleWithCfi() bool {
|
|
|
|
return t == asan || t == fuzzer || t == hwasan
|
|
|
|
}
|
|
|
|
|
2016-01-06 23:41:07 +01:00
|
|
|
type SanitizeProperties struct {
|
|
|
|
// enable AddressSanitizer, ThreadSanitizer, or UndefinedBehaviorSanitizer
|
|
|
|
Sanitize struct {
|
2017-11-07 19:57:05 +01:00
|
|
|
Never *bool `android:"arch_variant"`
|
2016-01-06 23:41:07 +01:00
|
|
|
|
|
|
|
// main sanitizers
|
2018-08-03 01:19:13 +02:00
|
|
|
Address *bool `android:"arch_variant"`
|
|
|
|
Thread *bool `android:"arch_variant"`
|
|
|
|
Hwaddress *bool `android:"arch_variant"`
|
2016-01-06 23:41:07 +01:00
|
|
|
|
|
|
|
// local sanitizers
|
2017-06-28 18:10:48 +02:00
|
|
|
Undefined *bool `android:"arch_variant"`
|
|
|
|
All_undefined *bool `android:"arch_variant"`
|
|
|
|
Misc_undefined []string `android:"arch_variant"`
|
2019-05-01 23:42:05 +02:00
|
|
|
Fuzzer *bool `android:"arch_variant"`
|
2017-06-28 18:10:48 +02:00
|
|
|
Safestack *bool `android:"arch_variant"`
|
|
|
|
Cfi *bool `android:"arch_variant"`
|
|
|
|
Integer_overflow *bool `android:"arch_variant"`
|
2018-06-12 23:46:54 +02:00
|
|
|
Scudo *bool `android:"arch_variant"`
|
2018-11-20 01:03:58 +01:00
|
|
|
Scs *bool `android:"arch_variant"`
|
2016-08-17 00:39:54 +02:00
|
|
|
|
|
|
|
// Sanitizers to run in the diagnostic mode (as opposed to the release mode).
|
|
|
|
// Replaces abort() on error with a human-readable error message.
|
|
|
|
// Address and Thread sanitizers always run in diagnostic mode.
|
|
|
|
Diag struct {
|
2017-06-28 18:10:48 +02:00
|
|
|
Undefined *bool `android:"arch_variant"`
|
|
|
|
Cfi *bool `android:"arch_variant"`
|
|
|
|
Integer_overflow *bool `android:"arch_variant"`
|
|
|
|
Misc_undefined []string `android:"arch_variant"`
|
2018-12-12 18:36:31 +01:00
|
|
|
No_recover []string
|
2016-08-17 00:39:54 +02:00
|
|
|
}
|
2016-01-06 23:41:07 +01:00
|
|
|
|
2016-08-17 00:39:54 +02:00
|
|
|
// value to pass to -fsanitize-recover=
|
2016-01-06 23:41:07 +01:00
|
|
|
Recover []string
|
|
|
|
|
|
|
|
// value to pass to -fsanitize-blacklist
|
|
|
|
Blacklist *string
|
|
|
|
} `android:"arch_variant"`
|
|
|
|
|
2018-12-18 18:47:14 +01:00
|
|
|
SanitizerEnabled bool `blueprint:"mutated"`
|
|
|
|
SanitizeDep bool `blueprint:"mutated"`
|
|
|
|
MinimalRuntimeDep bool `blueprint:"mutated"`
|
2020-02-19 21:24:02 +01:00
|
|
|
BuiltinsDep bool `blueprint:"mutated"`
|
2018-12-18 18:47:14 +01:00
|
|
|
UbsanRuntimeDep bool `blueprint:"mutated"`
|
|
|
|
InSanitizerDir bool `blueprint:"mutated"`
|
|
|
|
Sanitizers []string `blueprint:"mutated"`
|
|
|
|
DiagSanitizers []string `blueprint:"mutated"`
|
2016-01-06 23:41:07 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
type sanitize struct {
|
|
|
|
Properties SanitizeProperties
|
|
|
|
}
|
|
|
|
|
2017-11-17 20:08:10 +01:00
|
|
|
func init() {
|
|
|
|
android.RegisterMakeVarsProvider(pctx, cfiMakeVarsProvider)
|
2018-08-03 01:19:13 +02:00
|
|
|
android.RegisterMakeVarsProvider(pctx, hwasanMakeVarsProvider)
|
2017-11-17 20:08:10 +01:00
|
|
|
}
|
|
|
|
|
2016-01-06 23:41:07 +01:00
|
|
|
func (sanitize *sanitize) props() []interface{} {
|
|
|
|
return []interface{}{&sanitize.Properties}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (sanitize *sanitize) begin(ctx BaseModuleContext) {
|
2016-07-07 19:54:07 +02:00
|
|
|
s := &sanitize.Properties.Sanitize
|
|
|
|
|
2016-01-06 23:41:07 +01:00
|
|
|
// Don't apply sanitizers to NDK code.
|
2017-09-28 02:01:44 +02:00
|
|
|
if ctx.useSdk() {
|
2017-11-07 19:57:05 +01:00
|
|
|
s.Never = BoolPtr(true)
|
2016-01-06 23:41:07 +01:00
|
|
|
}
|
|
|
|
|
2019-01-17 23:44:05 +01:00
|
|
|
// Sanitizers do not work on Fuchsia yet.
|
|
|
|
if ctx.Fuchsia() {
|
|
|
|
s.Never = BoolPtr(true)
|
|
|
|
}
|
|
|
|
|
2016-01-06 23:41:07 +01:00
|
|
|
// Never always wins.
|
2017-11-07 19:57:05 +01:00
|
|
|
if Bool(s.Never) {
|
2016-01-06 23:41:07 +01:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
var globalSanitizers []string
|
2017-06-28 18:10:48 +02:00
|
|
|
var globalSanitizersDiag []string
|
|
|
|
|
2018-10-08 05:54:34 +02:00
|
|
|
if ctx.Host() {
|
|
|
|
if !ctx.Windows() {
|
|
|
|
globalSanitizers = ctx.Config().SanitizeHost()
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
arches := ctx.Config().SanitizeDeviceArch()
|
|
|
|
if len(arches) == 0 || inList(ctx.Arch().ArchType.Name, arches) {
|
|
|
|
globalSanitizers = ctx.Config().SanitizeDevice()
|
|
|
|
globalSanitizersDiag = ctx.Config().SanitizeDeviceDiag()
|
2016-01-06 23:41:07 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-07-07 19:38:41 +02:00
|
|
|
if len(globalSanitizers) > 0 {
|
|
|
|
var found bool
|
2016-07-07 19:54:07 +02:00
|
|
|
if found, globalSanitizers = removeFromList("undefined", globalSanitizers); found && s.All_undefined == nil {
|
|
|
|
s.All_undefined = boolPtr(true)
|
|
|
|
}
|
|
|
|
|
|
|
|
if found, globalSanitizers = removeFromList("default-ub", globalSanitizers); found && s.Undefined == nil {
|
|
|
|
s.Undefined = boolPtr(true)
|
2016-07-07 19:38:41 +02:00
|
|
|
}
|
2016-01-06 23:41:07 +01:00
|
|
|
|
2019-05-01 23:42:05 +02:00
|
|
|
if found, globalSanitizers = removeFromList("address", globalSanitizers); found && s.Address == nil {
|
|
|
|
s.Address = boolPtr(true)
|
2016-07-07 19:38:41 +02:00
|
|
|
}
|
2016-01-06 23:41:07 +01:00
|
|
|
|
2016-07-07 19:54:07 +02:00
|
|
|
if found, globalSanitizers = removeFromList("thread", globalSanitizers); found && s.Thread == nil {
|
|
|
|
s.Thread = boolPtr(true)
|
2016-07-07 19:38:41 +02:00
|
|
|
}
|
2016-05-12 22:54:53 +02:00
|
|
|
|
2019-05-01 23:42:05 +02:00
|
|
|
if found, globalSanitizers = removeFromList("fuzzer", globalSanitizers); found && s.Fuzzer == nil {
|
|
|
|
s.Fuzzer = boolPtr(true)
|
2016-07-07 19:38:41 +02:00
|
|
|
}
|
2016-05-19 01:39:54 +02:00
|
|
|
|
2016-07-07 19:54:07 +02:00
|
|
|
if found, globalSanitizers = removeFromList("safe-stack", globalSanitizers); found && s.Safestack == nil {
|
|
|
|
s.Safestack = boolPtr(true)
|
2016-07-07 19:38:41 +02:00
|
|
|
}
|
2016-05-19 01:39:54 +02:00
|
|
|
|
2016-08-17 00:39:54 +02:00
|
|
|
if found, globalSanitizers = removeFromList("cfi", globalSanitizers); found && s.Cfi == nil {
|
2017-11-29 09:27:14 +01:00
|
|
|
if !ctx.Config().CFIDisabledForPath(ctx.ModuleDir()) {
|
2017-10-31 10:26:14 +01:00
|
|
|
s.Cfi = boolPtr(true)
|
|
|
|
}
|
2016-08-17 00:39:54 +02:00
|
|
|
}
|
|
|
|
|
2018-03-13 18:41:07 +01:00
|
|
|
// Global integer_overflow builds do not support static libraries.
|
2017-06-28 18:10:48 +02:00
|
|
|
if found, globalSanitizers = removeFromList("integer_overflow", globalSanitizers); found && s.Integer_overflow == nil {
|
2018-03-13 18:41:07 +01:00
|
|
|
if !ctx.Config().IntegerOverflowDisabledForPath(ctx.ModuleDir()) && !ctx.static() {
|
2017-07-13 23:46:05 +02:00
|
|
|
s.Integer_overflow = boolPtr(true)
|
|
|
|
}
|
2017-06-28 18:10:48 +02:00
|
|
|
}
|
|
|
|
|
2018-06-12 23:46:54 +02:00
|
|
|
if found, globalSanitizers = removeFromList("scudo", globalSanitizers); found && s.Scudo == nil {
|
|
|
|
s.Scudo = boolPtr(true)
|
|
|
|
}
|
|
|
|
|
2018-08-03 01:19:13 +02:00
|
|
|
if found, globalSanitizers = removeFromList("hwaddress", globalSanitizers); found && s.Hwaddress == nil {
|
|
|
|
s.Hwaddress = boolPtr(true)
|
|
|
|
}
|
|
|
|
|
2016-07-07 19:38:41 +02:00
|
|
|
if len(globalSanitizers) > 0 {
|
|
|
|
ctx.ModuleErrorf("unknown global sanitizer option %s", globalSanitizers[0])
|
|
|
|
}
|
2017-06-28 18:10:48 +02:00
|
|
|
|
2018-03-13 18:41:07 +01:00
|
|
|
// Global integer_overflow builds do not support static library diagnostics.
|
2017-06-28 18:10:48 +02:00
|
|
|
if found, globalSanitizersDiag = removeFromList("integer_overflow", globalSanitizersDiag); found &&
|
2018-03-13 18:41:07 +01:00
|
|
|
s.Diag.Integer_overflow == nil && Bool(s.Integer_overflow) && !ctx.static() {
|
2017-06-28 18:10:48 +02:00
|
|
|
s.Diag.Integer_overflow = boolPtr(true)
|
|
|
|
}
|
|
|
|
|
2017-10-31 10:26:14 +01:00
|
|
|
if found, globalSanitizersDiag = removeFromList("cfi", globalSanitizersDiag); found &&
|
|
|
|
s.Diag.Cfi == nil && Bool(s.Cfi) {
|
|
|
|
s.Diag.Cfi = boolPtr(true)
|
|
|
|
}
|
|
|
|
|
2017-06-28 18:10:48 +02:00
|
|
|
if len(globalSanitizersDiag) > 0 {
|
|
|
|
ctx.ModuleErrorf("unknown global sanitizer diagnostics option %s", globalSanitizersDiag[0])
|
|
|
|
}
|
2016-07-07 19:54:07 +02:00
|
|
|
}
|
2016-07-19 00:44:56 +02:00
|
|
|
|
2018-05-25 03:36:18 +02:00
|
|
|
// Enable CFI for all components in the include paths (for Aarch64 only)
|
|
|
|
if s.Cfi == nil && ctx.Config().CFIEnabledForPath(ctx.ModuleDir()) && ctx.Arch().ArchType == android.Arm64 {
|
2018-03-30 04:55:23 +02:00
|
|
|
s.Cfi = boolPtr(true)
|
|
|
|
if inList("cfi", ctx.Config().SanitizeDeviceDiag()) {
|
|
|
|
s.Diag.Cfi = boolPtr(true)
|
2017-10-31 10:26:14 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-02-01 03:37:30 +01:00
|
|
|
// CFI needs gold linker, and mips toolchain does not have one.
|
2017-11-29 09:27:14 +01:00
|
|
|
if !ctx.Config().EnableCFI() || ctx.Arch().ArchType == android.Mips || ctx.Arch().ArchType == android.Mips64 {
|
2017-01-19 22:54:55 +01:00
|
|
|
s.Cfi = nil
|
|
|
|
s.Diag.Cfi = nil
|
|
|
|
}
|
|
|
|
|
2017-02-08 05:31:41 +01:00
|
|
|
// Also disable CFI for arm32 until b/35157333 is fixed.
|
|
|
|
if ctx.Arch().ArchType == android.Arm {
|
|
|
|
s.Cfi = nil
|
|
|
|
s.Diag.Cfi = nil
|
|
|
|
}
|
|
|
|
|
2018-08-03 01:19:13 +02:00
|
|
|
// HWASan requires AArch64 hardware feature (top-byte-ignore).
|
|
|
|
if ctx.Arch().ArchType != android.Arm64 {
|
|
|
|
s.Hwaddress = nil
|
|
|
|
}
|
|
|
|
|
2018-11-20 01:03:58 +01:00
|
|
|
// SCS is only implemented on AArch64.
|
2019-03-06 19:38:48 +01:00
|
|
|
if ctx.Arch().ArchType != android.Arm64 {
|
2018-11-20 01:03:58 +01:00
|
|
|
s.Scs = nil
|
|
|
|
}
|
|
|
|
|
2017-04-20 16:42:52 +02:00
|
|
|
// Also disable CFI if ASAN is enabled.
|
2018-08-03 01:19:13 +02:00
|
|
|
if Bool(s.Address) || Bool(s.Hwaddress) {
|
2017-04-20 16:42:52 +02:00
|
|
|
s.Cfi = nil
|
|
|
|
s.Diag.Cfi = nil
|
|
|
|
}
|
|
|
|
|
2020-02-19 21:24:02 +01:00
|
|
|
// Disable sanitizers that depend on the UBSan runtime for windows/darwin builds.
|
|
|
|
if !ctx.Os().Linux() {
|
2017-11-17 20:08:10 +01:00
|
|
|
s.Cfi = nil
|
|
|
|
s.Diag.Cfi = nil
|
2018-03-13 18:41:07 +01:00
|
|
|
s.Misc_undefined = nil
|
|
|
|
s.Undefined = nil
|
|
|
|
s.All_undefined = nil
|
|
|
|
s.Integer_overflow = nil
|
2017-11-17 20:08:10 +01:00
|
|
|
}
|
|
|
|
|
2018-05-28 22:54:48 +02:00
|
|
|
// Also disable CFI for VNDK variants of components
|
|
|
|
if ctx.isVndk() && ctx.useVndk() {
|
2018-05-24 04:29:55 +02:00
|
|
|
s.Cfi = nil
|
|
|
|
s.Diag.Cfi = nil
|
|
|
|
}
|
|
|
|
|
2020-01-22 03:11:29 +01:00
|
|
|
// Also disable CFI if building against snapshot.
|
|
|
|
vndkVersion := ctx.DeviceConfig().VndkVersion()
|
|
|
|
if ctx.useVndk() && vndkVersion != "current" && vndkVersion != "" {
|
|
|
|
s.Cfi = nil
|
|
|
|
}
|
|
|
|
|
2018-08-03 01:19:13 +02:00
|
|
|
// HWASan ramdisk (which is built from recovery) goes over some bootloader limit.
|
2020-01-22 00:53:22 +01:00
|
|
|
// Keep libc instrumented so that ramdisk / recovery can run hwasan-instrumented code if necessary.
|
|
|
|
if (ctx.inRamdisk() || ctx.inRecovery()) && !strings.HasPrefix(ctx.ModuleDir(), "bionic/libc") {
|
2018-08-03 01:19:13 +02:00
|
|
|
s.Hwaddress = nil
|
|
|
|
}
|
|
|
|
|
2016-07-19 00:44:56 +02:00
|
|
|
if ctx.staticBinary() {
|
|
|
|
s.Address = nil
|
2019-05-01 23:42:05 +02:00
|
|
|
s.Fuzzer = nil
|
2016-07-19 00:44:56 +02:00
|
|
|
s.Thread = nil
|
2016-01-06 23:41:07 +01:00
|
|
|
}
|
|
|
|
|
2016-07-07 19:54:07 +02:00
|
|
|
if Bool(s.All_undefined) {
|
|
|
|
s.Undefined = nil
|
|
|
|
}
|
|
|
|
|
2016-05-12 22:54:53 +02:00
|
|
|
if !ctx.toolchain().Is64Bit() {
|
|
|
|
// TSAN and SafeStack are not supported on 32-bit architectures
|
2016-07-07 19:54:07 +02:00
|
|
|
s.Thread = nil
|
|
|
|
s.Safestack = nil
|
2016-01-06 23:41:07 +01:00
|
|
|
// TODO(ccross): error for compile_multilib = "32"?
|
|
|
|
}
|
|
|
|
|
2017-01-28 00:44:44 +01:00
|
|
|
if ctx.Os() != android.Windows && (Bool(s.All_undefined) || Bool(s.Undefined) || Bool(s.Address) || Bool(s.Thread) ||
|
2019-05-01 23:42:05 +02:00
|
|
|
Bool(s.Fuzzer) || Bool(s.Safestack) || Bool(s.Cfi) || Bool(s.Integer_overflow) || len(s.Misc_undefined) > 0 ||
|
2018-11-20 01:03:58 +01:00
|
|
|
Bool(s.Scudo) || Bool(s.Hwaddress) || Bool(s.Scs)) {
|
2016-07-19 00:44:56 +02:00
|
|
|
sanitize.Properties.SanitizerEnabled = true
|
|
|
|
}
|
|
|
|
|
2019-02-01 17:42:56 +01:00
|
|
|
// Disable Scudo if ASan or TSan is enabled, or if it's disabled globally.
|
|
|
|
if Bool(s.Address) || Bool(s.Thread) || Bool(s.Hwaddress) || ctx.Config().DisableScudo() {
|
2018-06-12 23:46:54 +02:00
|
|
|
s.Scudo = nil
|
|
|
|
}
|
|
|
|
|
2018-08-03 01:19:13 +02:00
|
|
|
if Bool(s.Hwaddress) {
|
|
|
|
s.Address = nil
|
|
|
|
s.Thread = nil
|
|
|
|
}
|
|
|
|
|
2019-05-01 23:42:05 +02:00
|
|
|
// TODO(b/131771163): CFI transiently depends on LTO, and thus Fuzzer is
|
|
|
|
// mutually incompatible.
|
|
|
|
if Bool(s.Fuzzer) {
|
|
|
|
s.Cfi = nil
|
2016-01-06 23:41:07 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (sanitize *sanitize) deps(ctx BaseModuleContext, deps Deps) Deps {
|
|
|
|
if !sanitize.Properties.SanitizerEnabled { // || c.static() {
|
|
|
|
return deps
|
|
|
|
}
|
|
|
|
|
|
|
|
if ctx.Device() {
|
2016-07-07 19:54:07 +02:00
|
|
|
if Bool(sanitize.Properties.Sanitize.Address) {
|
2019-05-09 22:27:02 +02:00
|
|
|
// Compiling asan and having libc_scudo in the same
|
|
|
|
// executable will cause the executable to crash.
|
|
|
|
// Remove libc_scudo since it is only used to override
|
|
|
|
// allocation functions which asan already overrides.
|
|
|
|
_, deps.SharedLibs = removeFromList("libc_scudo", deps.SharedLibs)
|
2016-01-06 23:41:07 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return deps
|
|
|
|
}
|
|
|
|
|
2018-11-15 23:01:36 +01:00
|
|
|
func toDisableImplicitIntegerChange(flags []string) bool {
|
|
|
|
// Returns true if any flag is fsanitize*integer, and there is
|
|
|
|
// no explicit flag about sanitize=implicit-integer-sign-change.
|
|
|
|
for _, f := range flags {
|
|
|
|
if strings.Contains(f, "sanitize=implicit-integer-sign-change") {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
for _, f := range flags {
|
|
|
|
if strings.HasPrefix(f, "-fsanitize") && strings.Contains(f, "integer") {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2016-01-06 23:41:07 +01:00
|
|
|
func (sanitize *sanitize) flags(ctx ModuleContext, flags Flags) Flags {
|
2018-05-10 23:17:22 +02:00
|
|
|
minimalRuntimeLib := config.UndefinedBehaviorSanitizerMinimalRuntimeLibrary(ctx.toolchain()) + ".a"
|
|
|
|
minimalRuntimePath := "${config.ClangAsanLibDir}/" + minimalRuntimeLib
|
2020-02-19 21:24:02 +01:00
|
|
|
builtinsRuntimeLib := config.BuiltinsRuntimeLibrary(ctx.toolchain()) + ".a"
|
|
|
|
builtinsRuntimePath := "${config.ClangAsanLibDir}/" + builtinsRuntimeLib
|
2018-02-22 00:49:20 +01:00
|
|
|
|
2020-02-19 21:24:02 +01:00
|
|
|
if sanitize.Properties.MinimalRuntimeDep {
|
2019-11-04 18:37:55 +01:00
|
|
|
flags.Local.LdFlags = append(flags.Local.LdFlags,
|
|
|
|
minimalRuntimePath,
|
|
|
|
"-Wl,--exclude-libs,"+minimalRuntimeLib)
|
2018-02-22 00:49:20 +01:00
|
|
|
}
|
2020-02-19 21:24:02 +01:00
|
|
|
|
|
|
|
if sanitize.Properties.BuiltinsDep {
|
|
|
|
flags.libFlags = append([]string{builtinsRuntimePath}, flags.libFlags...)
|
|
|
|
}
|
|
|
|
|
2018-03-13 18:41:07 +01:00
|
|
|
if !sanitize.Properties.SanitizerEnabled && !sanitize.Properties.UbsanRuntimeDep {
|
2016-01-06 23:41:07 +01:00
|
|
|
return flags
|
|
|
|
}
|
|
|
|
|
2016-07-07 19:54:07 +02:00
|
|
|
if Bool(sanitize.Properties.Sanitize.Address) {
|
2016-05-19 00:37:25 +02:00
|
|
|
if ctx.Arch().ArchType == android.Arm {
|
2016-01-06 23:41:07 +01:00
|
|
|
// Frame pointer based unwinder in ASan requires ARM frame setup.
|
|
|
|
// TODO: put in flags?
|
|
|
|
flags.RequiredInstructionSet = "arm"
|
|
|
|
}
|
2019-11-04 18:37:55 +01:00
|
|
|
flags.Local.CFlags = append(flags.Local.CFlags, asanCflags...)
|
|
|
|
flags.Local.LdFlags = append(flags.Local.LdFlags, asanLdflags...)
|
2016-01-06 23:41:07 +01:00
|
|
|
|
|
|
|
if ctx.Host() {
|
|
|
|
// -nodefaultlibs (provided with libc++) prevents the driver from linking
|
|
|
|
// libraries needed with -fsanitize=address. http://b/18650275 (WAI)
|
2019-11-04 18:37:55 +01:00
|
|
|
flags.Local.LdFlags = append(flags.Local.LdFlags, "-Wl,--no-as-needed")
|
2016-01-06 23:41:07 +01:00
|
|
|
} else {
|
2019-11-04 18:37:55 +01:00
|
|
|
flags.Local.CFlags = append(flags.Local.CFlags, "-mllvm", "-asan-globals=0")
|
2019-02-02 05:13:38 +01:00
|
|
|
if ctx.bootstrap() {
|
|
|
|
flags.DynamicLinker = "/system/bin/bootstrap/linker_asan"
|
|
|
|
} else {
|
|
|
|
flags.DynamicLinker = "/system/bin/linker_asan"
|
|
|
|
}
|
2016-01-06 23:41:07 +01:00
|
|
|
if flags.Toolchain.Is64Bit() {
|
|
|
|
flags.DynamicLinker += "64"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-08-03 01:19:13 +02:00
|
|
|
if Bool(sanitize.Properties.Sanitize.Hwaddress) {
|
2019-11-04 18:37:55 +01:00
|
|
|
flags.Local.CFlags = append(flags.Local.CFlags, hwasanCflags...)
|
2017-10-20 00:52:11 +02:00
|
|
|
}
|
|
|
|
|
2019-05-01 23:42:05 +02:00
|
|
|
if Bool(sanitize.Properties.Sanitize.Fuzzer) {
|
2019-11-04 18:37:55 +01:00
|
|
|
flags.Local.CFlags = append(flags.Local.CFlags, "-fsanitize=fuzzer-no-link")
|
2019-05-01 23:42:05 +02:00
|
|
|
|
|
|
|
// TODO(b/131771163): LTO and Fuzzer support is mutually incompatible.
|
2019-11-04 18:37:55 +01:00
|
|
|
_, flags.Local.LdFlags = removeFromList("-flto", flags.Local.LdFlags)
|
|
|
|
_, flags.Local.CFlags = removeFromList("-flto", flags.Local.CFlags)
|
|
|
|
flags.Local.LdFlags = append(flags.Local.LdFlags, "-fno-lto")
|
|
|
|
flags.Local.CFlags = append(flags.Local.CFlags, "-fno-lto")
|
2019-06-17 19:33:52 +02:00
|
|
|
|
Workaround unexported sancov symbols. Fix multiple sanitizer RT deps.
Fuzz targets currently have dependencies on multiple libclang_rt runtime
libraries when building with ASan/HWAsan on device. This is an error.
This happens as Soong adds the dependency on the ASan/HWASan shared
runtime library. These libraries should provide the required UBSan
components. The clang driver was previously being passed
-fsanitize=fuzzer-no-link at link time, and as it doesn't know about the
already-established dependency on ASan/HWASan, it mistakenly thinks that
there is not runtime providing the UBSan components.
This patch fixes that problem by not adding -fsanitize=fuzzer-no-link to
the link-time flags.
This revealed a underlying issue in the upstream runtime compilation.
Android uses emulated TLS, which changes the symbol names from
<my_symbol_name> to __emutls_v._<my_symbol_name>. In particular, this
fails to account for the '__sancov_lowest_stack' symbol, as it no longer
matches the linker script rule for '__sancov*', and the symbol is no
longer exported in the shared library variant of ASan/HWASan.
This patch works around the discovered issue, which is being tracked in
the linked bug. It disables stack depth instrumentation, and we no
longer depend on this symbol. This means we get a missing sanitizer
coverage feature when fuzzing, but shouldn't be too detrimental.
Bug: 142430592
Test: SANITIZE_TARGET=hwaddress m example_fuzzer && \
readelf -d example_fuzzer # ensure only ONE libclang_rt dep (in this
case, hwasan)
Change-Id: Iea6df55d592a801732511c9b690134367429d62a
2019-10-10 02:18:59 +02:00
|
|
|
// TODO(b/142430592): Upstream linker scripts for sanitizer runtime libraries
|
|
|
|
// discard the sancov_lowest_stack symbol, because it's emulated TLS (and thus
|
|
|
|
// doesn't match the linker script due to the "__emutls_v." prefix).
|
2019-11-04 18:37:55 +01:00
|
|
|
flags.Local.LdFlags = append(flags.Local.LdFlags, "-fno-sanitize-coverage=stack-depth")
|
|
|
|
flags.Local.CFlags = append(flags.Local.CFlags, "-fno-sanitize-coverage=stack-depth")
|
Workaround unexported sancov symbols. Fix multiple sanitizer RT deps.
Fuzz targets currently have dependencies on multiple libclang_rt runtime
libraries when building with ASan/HWAsan on device. This is an error.
This happens as Soong adds the dependency on the ASan/HWASan shared
runtime library. These libraries should provide the required UBSan
components. The clang driver was previously being passed
-fsanitize=fuzzer-no-link at link time, and as it doesn't know about the
already-established dependency on ASan/HWASan, it mistakenly thinks that
there is not runtime providing the UBSan components.
This patch fixes that problem by not adding -fsanitize=fuzzer-no-link to
the link-time flags.
This revealed a underlying issue in the upstream runtime compilation.
Android uses emulated TLS, which changes the symbol names from
<my_symbol_name> to __emutls_v._<my_symbol_name>. In particular, this
fails to account for the '__sancov_lowest_stack' symbol, as it no longer
matches the linker script rule for '__sancov*', and the symbol is no
longer exported in the shared library variant of ASan/HWASan.
This patch works around the discovered issue, which is being tracked in
the linked bug. It disables stack depth instrumentation, and we no
longer depend on this symbol. This means we get a missing sanitizer
coverage feature when fuzzing, but shouldn't be too detrimental.
Bug: 142430592
Test: SANITIZE_TARGET=hwaddress m example_fuzzer && \
readelf -d example_fuzzer # ensure only ONE libclang_rt dep (in this
case, hwasan)
Change-Id: Iea6df55d592a801732511c9b690134367429d62a
2019-10-10 02:18:59 +02:00
|
|
|
|
2019-06-17 19:33:52 +02:00
|
|
|
// TODO(b/133876586): Experimental PM breaks sanitizer coverage.
|
2019-11-04 18:37:55 +01:00
|
|
|
flags.Local.CFlags = append(flags.Local.CFlags, "-fno-experimental-new-pass-manager")
|
2019-08-28 21:41:07 +02:00
|
|
|
|
|
|
|
// Disable fortify for fuzzing builds. Generally, we'll be building with
|
|
|
|
// UBSan or ASan here and the fortify checks pollute the stack traces.
|
2019-11-04 18:37:55 +01:00
|
|
|
flags.Local.CFlags = append(flags.Local.CFlags, "-U_FORTIFY_SOURCE")
|
2019-12-10 17:44:52 +01:00
|
|
|
|
|
|
|
// Build fuzzer-sanitized libraries with an $ORIGIN DT_RUNPATH. Android's
|
|
|
|
// linker uses DT_RUNPATH, not DT_RPATH. When we deploy cc_fuzz targets and
|
|
|
|
// their libraries to /data/fuzz/<arch>/lib, any transient shared library gets
|
|
|
|
// the DT_RUNPATH from the shared library above it, and not the executable,
|
|
|
|
// meaning that the lookup falls back to the system. Adding the $ORIGIN to the
|
|
|
|
// DT_RUNPATH here means that transient shared libraries can be found
|
|
|
|
// colocated with their parents.
|
|
|
|
flags.Local.LdFlags = append(flags.Local.LdFlags, `-Wl,-rpath,\$$ORIGIN`)
|
2016-01-06 23:41:07 +01:00
|
|
|
}
|
|
|
|
|
2016-08-17 00:39:54 +02:00
|
|
|
if Bool(sanitize.Properties.Sanitize.Cfi) {
|
2017-01-20 23:13:06 +01:00
|
|
|
if ctx.Arch().ArchType == android.Arm {
|
|
|
|
// __cfi_check needs to be built as Thumb (see the code in linker_cfi.cpp). LLVM is not set up
|
|
|
|
// to do this on a function basis, so force Thumb on the entire module.
|
|
|
|
flags.RequiredInstructionSet = "thumb"
|
|
|
|
}
|
2017-11-01 10:20:21 +01:00
|
|
|
|
2019-11-04 18:37:55 +01:00
|
|
|
flags.Local.CFlags = append(flags.Local.CFlags, cfiCflags...)
|
|
|
|
flags.Local.AsFlags = append(flags.Local.AsFlags, cfiAsflags...)
|
2017-11-01 10:20:21 +01:00
|
|
|
// Only append the default visibility flag if -fvisibility has not already been set
|
|
|
|
// to hidden.
|
2019-11-04 18:37:55 +01:00
|
|
|
if !inList("-fvisibility=hidden", flags.Local.CFlags) {
|
|
|
|
flags.Local.CFlags = append(flags.Local.CFlags, "-fvisibility=default")
|
2017-11-01 10:20:21 +01:00
|
|
|
}
|
2019-11-04 18:37:55 +01:00
|
|
|
flags.Local.LdFlags = append(flags.Local.LdFlags, cfiLdflags...)
|
2017-11-01 10:20:21 +01:00
|
|
|
|
|
|
|
if ctx.staticBinary() {
|
2019-11-04 18:37:55 +01:00
|
|
|
_, flags.Local.CFlags = removeFromList("-fsanitize-cfi-cross-dso", flags.Local.CFlags)
|
|
|
|
_, flags.Local.LdFlags = removeFromList("-fsanitize-cfi-cross-dso", flags.Local.LdFlags)
|
2017-11-01 10:20:21 +01:00
|
|
|
}
|
2016-08-17 00:39:54 +02:00
|
|
|
}
|
|
|
|
|
2017-06-28 18:10:48 +02:00
|
|
|
if Bool(sanitize.Properties.Sanitize.Integer_overflow) {
|
2019-11-04 18:37:55 +01:00
|
|
|
flags.Local.CFlags = append(flags.Local.CFlags, intOverflowCflags...)
|
2017-06-28 18:10:48 +02:00
|
|
|
}
|
|
|
|
|
2018-12-18 18:47:14 +01:00
|
|
|
if len(sanitize.Properties.Sanitizers) > 0 {
|
|
|
|
sanitizeArg := "-fsanitize=" + strings.Join(sanitize.Properties.Sanitizers, ",")
|
2018-02-22 00:49:20 +01:00
|
|
|
|
2019-11-04 18:37:55 +01:00
|
|
|
flags.Local.CFlags = append(flags.Local.CFlags, sanitizeArg)
|
|
|
|
flags.Local.AsFlags = append(flags.Local.AsFlags, sanitizeArg)
|
2016-01-06 23:41:07 +01:00
|
|
|
if ctx.Host() {
|
2017-01-28 00:44:44 +01:00
|
|
|
// Host sanitizers only link symbols in the final executable, so
|
|
|
|
// there will always be undefined symbols in intermediate libraries.
|
2019-11-04 18:37:55 +01:00
|
|
|
_, flags.Global.LdFlags = removeFromList("-Wl,--no-undefined", flags.Global.LdFlags)
|
|
|
|
flags.Local.LdFlags = append(flags.Local.LdFlags, sanitizeArg)
|
2020-02-19 21:24:02 +01:00
|
|
|
|
|
|
|
// non-Bionic toolchain prebuilts are missing UBSan's vptr and function sanitizers
|
|
|
|
if !ctx.toolchain().Bionic() {
|
|
|
|
flags.Local.CFlags = append(flags.Local.CFlags, "-fno-sanitize=vptr,function")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if enableMinimalRuntime(sanitize) {
|
|
|
|
flags.Local.CFlags = append(flags.Local.CFlags, strings.Join(minimalRuntimeFlags, " "))
|
|
|
|
flags.libFlags = append([]string{minimalRuntimePath}, flags.libFlags...)
|
|
|
|
flags.Local.LdFlags = append(flags.Local.LdFlags, "-Wl,--exclude-libs,"+minimalRuntimeLib)
|
|
|
|
if !ctx.toolchain().Bionic() {
|
|
|
|
flags.libFlags = append([]string{builtinsRuntimePath}, flags.libFlags...)
|
2018-02-22 00:49:20 +01:00
|
|
|
}
|
2016-01-06 23:41:07 +01:00
|
|
|
}
|
2019-05-01 23:42:05 +02:00
|
|
|
|
|
|
|
if Bool(sanitize.Properties.Sanitize.Fuzzer) {
|
|
|
|
// When fuzzing, we wish to crash with diagnostics on any bug.
|
2019-11-04 18:37:55 +01:00
|
|
|
flags.Local.CFlags = append(flags.Local.CFlags, "-fno-sanitize-trap=all", "-fno-sanitize-recover=all")
|
2019-05-01 23:42:05 +02:00
|
|
|
} else if ctx.Host() {
|
2019-11-04 18:37:55 +01:00
|
|
|
flags.Local.CFlags = append(flags.Local.CFlags, "-fno-sanitize-recover=all")
|
2019-05-01 23:42:05 +02:00
|
|
|
} else {
|
2019-11-04 18:37:55 +01:00
|
|
|
flags.Local.CFlags = append(flags.Local.CFlags, "-fsanitize-trap=all", "-ftrap-function=abort")
|
2019-05-01 23:42:05 +02:00
|
|
|
}
|
2018-11-15 23:01:36 +01:00
|
|
|
// http://b/119329758, Android core does not boot up with this sanitizer yet.
|
2019-11-04 18:37:55 +01:00
|
|
|
if toDisableImplicitIntegerChange(flags.Local.CFlags) {
|
|
|
|
flags.Local.CFlags = append(flags.Local.CFlags, "-fno-sanitize=implicit-integer-sign-change")
|
2018-11-15 23:01:36 +01:00
|
|
|
}
|
2016-01-06 23:41:07 +01:00
|
|
|
}
|
|
|
|
|
2018-12-18 18:47:14 +01:00
|
|
|
if len(sanitize.Properties.DiagSanitizers) > 0 {
|
2019-11-04 18:37:55 +01:00
|
|
|
flags.Local.CFlags = append(flags.Local.CFlags, "-fno-sanitize-trap="+strings.Join(sanitize.Properties.DiagSanitizers, ","))
|
2016-08-17 00:39:54 +02:00
|
|
|
}
|
|
|
|
// FIXME: enable RTTI if diag + (cfi or vptr)
|
|
|
|
|
2017-05-08 22:15:23 +02:00
|
|
|
if sanitize.Properties.Sanitize.Recover != nil {
|
2019-11-04 18:37:55 +01:00
|
|
|
flags.Local.CFlags = append(flags.Local.CFlags, "-fsanitize-recover="+
|
2017-05-08 22:15:23 +02:00
|
|
|
strings.Join(sanitize.Properties.Sanitize.Recover, ","))
|
|
|
|
}
|
|
|
|
|
2018-12-12 18:36:31 +01:00
|
|
|
if sanitize.Properties.Sanitize.Diag.No_recover != nil {
|
2019-11-04 18:37:55 +01:00
|
|
|
flags.Local.CFlags = append(flags.Local.CFlags, "-fno-sanitize-recover="+
|
2018-12-12 18:36:31 +01:00
|
|
|
strings.Join(sanitize.Properties.Sanitize.Diag.No_recover, ","))
|
|
|
|
}
|
|
|
|
|
2016-05-19 00:37:25 +02:00
|
|
|
blacklist := android.OptionalPathForModuleSrc(ctx, sanitize.Properties.Sanitize.Blacklist)
|
2016-01-06 23:41:07 +01:00
|
|
|
if blacklist.Valid() {
|
2019-11-04 18:37:55 +01:00
|
|
|
flags.Local.CFlags = append(flags.Local.CFlags, "-fsanitize-blacklist="+blacklist.String())
|
2016-01-06 23:41:07 +01:00
|
|
|
flags.CFlagsDeps = append(flags.CFlagsDeps, blacklist.Path())
|
|
|
|
}
|
|
|
|
|
|
|
|
return flags
|
|
|
|
}
|
|
|
|
|
2020-02-24 21:01:37 +01:00
|
|
|
func (sanitize *sanitize) AndroidMkEntries(ctx AndroidMkContext, entries *android.AndroidMkEntries) {
|
2019-07-29 14:27:18 +02:00
|
|
|
// Add a suffix for cfi/hwasan/scs-enabled static/header libraries to allow surfacing
|
|
|
|
// both the sanitized and non-sanitized variants to make without a name conflict.
|
2020-02-24 21:01:37 +01:00
|
|
|
if entries.Class == "STATIC_LIBRARIES" || entries.Class == "HEADER_LIBRARIES" {
|
2019-07-29 14:27:18 +02:00
|
|
|
if Bool(sanitize.Properties.Sanitize.Cfi) {
|
2020-02-24 21:01:37 +01:00
|
|
|
entries.SubName += ".cfi"
|
2019-07-29 14:27:18 +02:00
|
|
|
}
|
|
|
|
if Bool(sanitize.Properties.Sanitize.Hwaddress) {
|
2020-02-24 21:01:37 +01:00
|
|
|
entries.SubName += ".hwasan"
|
2019-07-29 14:27:18 +02:00
|
|
|
}
|
|
|
|
if Bool(sanitize.Properties.Sanitize.Scs) {
|
2020-02-24 21:01:37 +01:00
|
|
|
entries.SubName += ".scs"
|
2019-07-29 14:27:18 +02:00
|
|
|
}
|
2018-11-20 01:03:58 +01:00
|
|
|
}
|
2017-05-08 22:44:11 +02:00
|
|
|
}
|
|
|
|
|
2017-03-30 07:00:18 +02:00
|
|
|
func (sanitize *sanitize) inSanitizerDir() bool {
|
|
|
|
return sanitize.Properties.InSanitizerDir
|
2016-05-04 03:02:42 +02:00
|
|
|
}
|
|
|
|
|
2017-11-01 10:20:21 +01:00
|
|
|
func (sanitize *sanitize) getSanitizerBoolPtr(t sanitizerType) *bool {
|
2016-01-06 23:41:07 +01:00
|
|
|
switch t {
|
|
|
|
case asan:
|
2017-11-01 10:20:21 +01:00
|
|
|
return sanitize.Properties.Sanitize.Address
|
2018-08-03 01:19:13 +02:00
|
|
|
case hwasan:
|
|
|
|
return sanitize.Properties.Sanitize.Hwaddress
|
2016-01-06 23:41:07 +01:00
|
|
|
case tsan:
|
2017-11-01 10:20:21 +01:00
|
|
|
return sanitize.Properties.Sanitize.Thread
|
2017-06-28 18:10:48 +02:00
|
|
|
case intOverflow:
|
2017-11-01 10:20:21 +01:00
|
|
|
return sanitize.Properties.Sanitize.Integer_overflow
|
|
|
|
case cfi:
|
|
|
|
return sanitize.Properties.Sanitize.Cfi
|
2018-11-20 01:03:58 +01:00
|
|
|
case scs:
|
|
|
|
return sanitize.Properties.Sanitize.Scs
|
2019-05-01 23:42:05 +02:00
|
|
|
case fuzzer:
|
|
|
|
return sanitize.Properties.Sanitize.Fuzzer
|
2016-01-06 23:41:07 +01:00
|
|
|
default:
|
|
|
|
panic(fmt.Errorf("unknown sanitizerType %d", t))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-01-19 21:30:45 +01:00
|
|
|
func (sanitize *sanitize) isUnsanitizedVariant() bool {
|
|
|
|
return !sanitize.isSanitizerEnabled(asan) &&
|
2018-08-03 01:19:13 +02:00
|
|
|
!sanitize.isSanitizerEnabled(hwasan) &&
|
2018-01-19 21:30:45 +01:00
|
|
|
!sanitize.isSanitizerEnabled(tsan) &&
|
2018-11-20 01:03:58 +01:00
|
|
|
!sanitize.isSanitizerEnabled(cfi) &&
|
2019-05-01 23:42:05 +02:00
|
|
|
!sanitize.isSanitizerEnabled(scs) &&
|
|
|
|
!sanitize.isSanitizerEnabled(fuzzer)
|
2018-01-19 21:30:45 +01:00
|
|
|
}
|
|
|
|
|
2018-05-11 00:29:24 +02:00
|
|
|
func (sanitize *sanitize) isVariantOnProductionDevice() bool {
|
|
|
|
return !sanitize.isSanitizerEnabled(asan) &&
|
2018-08-03 01:19:13 +02:00
|
|
|
!sanitize.isSanitizerEnabled(hwasan) &&
|
2019-05-01 23:42:05 +02:00
|
|
|
!sanitize.isSanitizerEnabled(tsan) &&
|
|
|
|
!sanitize.isSanitizerEnabled(fuzzer)
|
2018-05-11 00:29:24 +02:00
|
|
|
}
|
|
|
|
|
2017-08-11 02:53:16 +02:00
|
|
|
func (sanitize *sanitize) SetSanitizer(t sanitizerType, b bool) {
|
2017-08-02 23:18:08 +02:00
|
|
|
switch t {
|
|
|
|
case asan:
|
2017-08-11 02:53:16 +02:00
|
|
|
sanitize.Properties.Sanitize.Address = boolPtr(b)
|
2018-08-03 01:19:13 +02:00
|
|
|
case hwasan:
|
|
|
|
sanitize.Properties.Sanitize.Hwaddress = boolPtr(b)
|
2017-08-02 23:18:08 +02:00
|
|
|
case tsan:
|
2017-08-11 02:53:16 +02:00
|
|
|
sanitize.Properties.Sanitize.Thread = boolPtr(b)
|
2017-08-02 23:18:08 +02:00
|
|
|
case intOverflow:
|
2017-08-11 02:53:16 +02:00
|
|
|
sanitize.Properties.Sanitize.Integer_overflow = boolPtr(b)
|
2017-11-01 10:20:21 +01:00
|
|
|
case cfi:
|
|
|
|
sanitize.Properties.Sanitize.Cfi = boolPtr(b)
|
2018-11-20 01:03:58 +01:00
|
|
|
case scs:
|
|
|
|
sanitize.Properties.Sanitize.Scs = boolPtr(b)
|
2019-05-01 23:42:05 +02:00
|
|
|
case fuzzer:
|
|
|
|
sanitize.Properties.Sanitize.Fuzzer = boolPtr(b)
|
2017-08-02 23:18:08 +02:00
|
|
|
default:
|
|
|
|
panic(fmt.Errorf("unknown sanitizerType %d", t))
|
|
|
|
}
|
2017-08-11 02:53:16 +02:00
|
|
|
if b {
|
|
|
|
sanitize.Properties.SanitizerEnabled = true
|
2017-08-02 23:18:08 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-11-01 10:20:21 +01:00
|
|
|
// Check if the sanitizer is explicitly disabled (as opposed to nil by
|
|
|
|
// virtue of not being set).
|
|
|
|
func (sanitize *sanitize) isSanitizerExplicitlyDisabled(t sanitizerType) bool {
|
|
|
|
if sanitize == nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
sanitizerVal := sanitize.getSanitizerBoolPtr(t)
|
|
|
|
return sanitizerVal != nil && *sanitizerVal == false
|
|
|
|
}
|
|
|
|
|
|
|
|
// There isn't an analog of the method above (ie:isSanitizerExplicitlyEnabled)
|
|
|
|
// because enabling a sanitizer either directly (via the blueprint) or
|
|
|
|
// indirectly (via a mutator) sets the bool ptr to true, and you can't
|
|
|
|
// distinguish between the cases. It isn't needed though - both cases can be
|
|
|
|
// treated identically.
|
|
|
|
func (sanitize *sanitize) isSanitizerEnabled(t sanitizerType) bool {
|
|
|
|
if sanitize == nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
sanitizerVal := sanitize.getSanitizerBoolPtr(t)
|
|
|
|
return sanitizerVal != nil && *sanitizerVal == true
|
|
|
|
}
|
|
|
|
|
2018-06-21 22:03:07 +02:00
|
|
|
func isSanitizableDependencyTag(tag blueprint.DependencyTag) bool {
|
2019-10-18 23:18:45 +02:00
|
|
|
t, ok := tag.(DependencyTag)
|
|
|
|
return ok && t.Library || t == reuseObjTag || t == objDepTag
|
2018-06-21 22:03:07 +02:00
|
|
|
}
|
|
|
|
|
2018-08-03 01:19:13 +02:00
|
|
|
// Propagate sanitizer requirements down from binaries
|
2016-05-19 00:37:25 +02:00
|
|
|
func sanitizerDepsMutator(t sanitizerType) func(android.TopDownMutatorContext) {
|
|
|
|
return func(mctx android.TopDownMutatorContext) {
|
2017-11-01 10:20:21 +01:00
|
|
|
if c, ok := mctx.Module().(*Module); ok && c.sanitize.isSanitizerEnabled(t) {
|
2018-06-21 22:03:07 +02:00
|
|
|
mctx.WalkDeps(func(child, parent android.Module) bool {
|
|
|
|
if !isSanitizableDependencyTag(mctx.OtherModuleDependencyTag(child)) {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
if d, ok := child.(*Module); ok && d.sanitize != nil &&
|
2017-11-07 19:57:05 +01:00
|
|
|
!Bool(d.sanitize.Properties.Sanitize.Never) &&
|
2017-11-01 10:20:21 +01:00
|
|
|
!d.sanitize.isSanitizerExplicitlyDisabled(t) {
|
2018-11-20 01:03:58 +01:00
|
|
|
if t == cfi || t == hwasan || t == scs {
|
2018-08-03 01:19:13 +02:00
|
|
|
if d.static() {
|
|
|
|
d.sanitize.Properties.SanitizeDep = true
|
|
|
|
}
|
|
|
|
} else {
|
2017-11-01 10:20:21 +01:00
|
|
|
d.sanitize.Properties.SanitizeDep = true
|
|
|
|
}
|
2016-01-06 23:41:07 +01:00
|
|
|
}
|
2018-06-21 22:03:07 +02:00
|
|
|
return true
|
2016-01-06 23:41:07 +01:00
|
|
|
})
|
2019-02-13 12:28:58 +01:00
|
|
|
} else if sanitizeable, ok := mctx.Module().(Sanitizeable); ok {
|
|
|
|
// If an APEX module includes a lib which is enabled for a sanitizer T, then
|
|
|
|
// the APEX module is also enabled for the same sanitizer type.
|
|
|
|
mctx.VisitDirectDeps(func(child android.Module) {
|
|
|
|
if c, ok := child.(*Module); ok && c.sanitize.isSanitizerEnabled(t) {
|
|
|
|
sanitizeable.EnableSanitizer(t.name())
|
|
|
|
}
|
|
|
|
})
|
2016-01-06 23:41:07 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-02-22 00:49:20 +01:00
|
|
|
// Propagate the ubsan minimal runtime dependency when there are integer overflow sanitized static dependencies.
|
2018-06-21 22:03:07 +02:00
|
|
|
func sanitizerRuntimeDepsMutator(mctx android.TopDownMutatorContext) {
|
|
|
|
if c, ok := mctx.Module().(*Module); ok && c.sanitize != nil {
|
|
|
|
mctx.WalkDeps(func(child, parent android.Module) bool {
|
|
|
|
if !isSanitizableDependencyTag(mctx.OtherModuleDependencyTag(child)) {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2020-01-22 03:11:29 +01:00
|
|
|
d, ok := child.(*Module)
|
|
|
|
if !ok || !d.static() {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
if d.sanitize != nil {
|
2018-06-21 22:03:07 +02:00
|
|
|
if enableMinimalRuntime(d.sanitize) {
|
|
|
|
// If a static dependency is built with the minimal runtime,
|
|
|
|
// make sure we include the ubsan minimal runtime.
|
|
|
|
c.sanitize.Properties.MinimalRuntimeDep = true
|
2019-11-15 01:59:12 +01:00
|
|
|
} else if enableUbsanRuntime(d.sanitize) {
|
2018-06-21 22:03:07 +02:00
|
|
|
// If a static dependency runs with full ubsan diagnostics,
|
|
|
|
// make sure we include the ubsan runtime.
|
|
|
|
c.sanitize.Properties.UbsanRuntimeDep = true
|
2018-02-22 00:49:20 +01:00
|
|
|
}
|
2019-06-20 08:00:20 +02:00
|
|
|
|
|
|
|
if c.sanitize.Properties.MinimalRuntimeDep &&
|
|
|
|
c.sanitize.Properties.UbsanRuntimeDep {
|
|
|
|
// both flags that this mutator might set are true, so don't bother recursing
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2020-02-19 21:24:02 +01:00
|
|
|
if c.Os() == android.Linux {
|
|
|
|
c.sanitize.Properties.BuiltinsDep = true
|
|
|
|
}
|
|
|
|
|
2019-06-20 08:00:20 +02:00
|
|
|
return true
|
2018-06-21 22:03:07 +02:00
|
|
|
}
|
2020-01-22 03:11:29 +01:00
|
|
|
|
|
|
|
if p, ok := d.linker.(*vendorSnapshotLibraryDecorator); ok {
|
|
|
|
if Bool(p.properties.Sanitize_minimal_dep) {
|
|
|
|
c.sanitize.Properties.MinimalRuntimeDep = true
|
|
|
|
}
|
|
|
|
if Bool(p.properties.Sanitize_ubsan_dep) {
|
|
|
|
c.sanitize.Properties.UbsanRuntimeDep = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false
|
2018-06-21 22:03:07 +02:00
|
|
|
})
|
2018-02-22 00:49:20 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-12-18 18:47:14 +01:00
|
|
|
// Add the dependency to the runtime library for each of the sanitizer variants
|
|
|
|
func sanitizerRuntimeMutator(mctx android.BottomUpMutatorContext) {
|
|
|
|
if c, ok := mctx.Module().(*Module); ok && c.sanitize != nil {
|
2019-01-25 01:20:35 +01:00
|
|
|
if !c.Enabled() {
|
|
|
|
return
|
|
|
|
}
|
2018-12-18 18:47:14 +01:00
|
|
|
var sanitizers []string
|
|
|
|
var diagSanitizers []string
|
|
|
|
|
|
|
|
if Bool(c.sanitize.Properties.Sanitize.All_undefined) {
|
|
|
|
sanitizers = append(sanitizers, "undefined")
|
|
|
|
} else {
|
|
|
|
if Bool(c.sanitize.Properties.Sanitize.Undefined) {
|
|
|
|
sanitizers = append(sanitizers,
|
|
|
|
"bool",
|
|
|
|
"integer-divide-by-zero",
|
|
|
|
"return",
|
|
|
|
"returns-nonnull-attribute",
|
|
|
|
"shift-exponent",
|
|
|
|
"unreachable",
|
|
|
|
"vla-bound",
|
|
|
|
// TODO(danalbert): The following checks currently have compiler performance issues.
|
|
|
|
//"alignment",
|
|
|
|
//"bounds",
|
|
|
|
//"enum",
|
|
|
|
//"float-cast-overflow",
|
|
|
|
//"float-divide-by-zero",
|
|
|
|
//"nonnull-attribute",
|
|
|
|
//"null",
|
|
|
|
//"shift-base",
|
|
|
|
//"signed-integer-overflow",
|
|
|
|
// TODO(danalbert): Fix UB in libc++'s __tree so we can turn this on.
|
|
|
|
// https://llvm.org/PR19302
|
|
|
|
// http://reviews.llvm.org/D6974
|
|
|
|
// "object-size",
|
|
|
|
)
|
|
|
|
}
|
|
|
|
sanitizers = append(sanitizers, c.sanitize.Properties.Sanitize.Misc_undefined...)
|
|
|
|
}
|
|
|
|
|
|
|
|
if Bool(c.sanitize.Properties.Sanitize.Diag.Undefined) {
|
|
|
|
diagSanitizers = append(diagSanitizers, "undefined")
|
|
|
|
}
|
|
|
|
|
|
|
|
diagSanitizers = append(diagSanitizers, c.sanitize.Properties.Sanitize.Diag.Misc_undefined...)
|
|
|
|
|
|
|
|
if Bool(c.sanitize.Properties.Sanitize.Address) {
|
|
|
|
sanitizers = append(sanitizers, "address")
|
|
|
|
diagSanitizers = append(diagSanitizers, "address")
|
|
|
|
}
|
|
|
|
|
|
|
|
if Bool(c.sanitize.Properties.Sanitize.Hwaddress) {
|
|
|
|
sanitizers = append(sanitizers, "hwaddress")
|
|
|
|
}
|
|
|
|
|
|
|
|
if Bool(c.sanitize.Properties.Sanitize.Thread) {
|
|
|
|
sanitizers = append(sanitizers, "thread")
|
|
|
|
}
|
|
|
|
|
|
|
|
if Bool(c.sanitize.Properties.Sanitize.Safestack) {
|
|
|
|
sanitizers = append(sanitizers, "safe-stack")
|
|
|
|
}
|
|
|
|
|
|
|
|
if Bool(c.sanitize.Properties.Sanitize.Cfi) {
|
|
|
|
sanitizers = append(sanitizers, "cfi")
|
|
|
|
|
|
|
|
if Bool(c.sanitize.Properties.Sanitize.Diag.Cfi) {
|
|
|
|
diagSanitizers = append(diagSanitizers, "cfi")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if Bool(c.sanitize.Properties.Sanitize.Integer_overflow) {
|
|
|
|
sanitizers = append(sanitizers, "unsigned-integer-overflow")
|
|
|
|
sanitizers = append(sanitizers, "signed-integer-overflow")
|
|
|
|
if Bool(c.sanitize.Properties.Sanitize.Diag.Integer_overflow) {
|
|
|
|
diagSanitizers = append(diagSanitizers, "unsigned-integer-overflow")
|
|
|
|
diagSanitizers = append(diagSanitizers, "signed-integer-overflow")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if Bool(c.sanitize.Properties.Sanitize.Scudo) {
|
|
|
|
sanitizers = append(sanitizers, "scudo")
|
|
|
|
}
|
|
|
|
|
|
|
|
if Bool(c.sanitize.Properties.Sanitize.Scs) {
|
|
|
|
sanitizers = append(sanitizers, "shadow-call-stack")
|
|
|
|
}
|
|
|
|
|
2019-05-01 23:42:05 +02:00
|
|
|
if Bool(c.sanitize.Properties.Sanitize.Fuzzer) {
|
|
|
|
sanitizers = append(sanitizers, "fuzzer-no-link")
|
|
|
|
}
|
|
|
|
|
2018-12-18 18:47:14 +01:00
|
|
|
// Save the list of sanitizers. These will be used again when generating
|
|
|
|
// the build rules (for Cflags, etc.)
|
|
|
|
c.sanitize.Properties.Sanitizers = sanitizers
|
|
|
|
c.sanitize.Properties.DiagSanitizers = diagSanitizers
|
|
|
|
|
2020-03-06 18:01:21 +01:00
|
|
|
// TODO(b/150822854) Hosts have a different default behavior and assume the runtime library is used.
|
|
|
|
if c.Host() {
|
|
|
|
diagSanitizers = sanitizers
|
|
|
|
}
|
|
|
|
|
2018-12-18 18:47:14 +01:00
|
|
|
// Determine the runtime library required
|
|
|
|
runtimeLibrary := ""
|
Stop linking libdl.a into static bins
libdl.a has a no-op dlopen, which breaks static libraries that need a real
dlopen. Instead of automatically linking libdl.a into static executables,
make it optional.
Until recently, the libunwind_llvm.a unwinder, used on arm32, needed the
no-op dladdr, but it's now built using -D_LIBUNWIND_USE_DLADDR=0.
The HWASan run-time uses dlsym and dladdr, so add a libdl dependency for
HWASan-built static binaries. We could also remove the dependency from
libclang_rt.hwasan_static-*.a, but this is also easy to do.
Bug: http://b/141485154
Test: bionic unit tests, device boots, verify that static and dynamic
executables can throw/catch an exception
Test: verify that a static executable using dlopen doesn't link (unless it
adds an explicit dependency on libdl)
Change-Id: Ic52c3f336b671b4ed335e99c94a64dfe8614b618
2019-10-12 00:03:34 +02:00
|
|
|
var extraStaticDeps []string
|
2018-12-18 18:47:14 +01:00
|
|
|
toolchain := c.toolchain(mctx)
|
|
|
|
if Bool(c.sanitize.Properties.Sanitize.Address) {
|
|
|
|
runtimeLibrary = config.AddressSanitizerRuntimeLibrary(toolchain)
|
|
|
|
} else if Bool(c.sanitize.Properties.Sanitize.Hwaddress) {
|
|
|
|
if c.staticBinary() {
|
|
|
|
runtimeLibrary = config.HWAddressSanitizerStaticLibrary(toolchain)
|
Stop linking libdl.a into static bins
libdl.a has a no-op dlopen, which breaks static libraries that need a real
dlopen. Instead of automatically linking libdl.a into static executables,
make it optional.
Until recently, the libunwind_llvm.a unwinder, used on arm32, needed the
no-op dladdr, but it's now built using -D_LIBUNWIND_USE_DLADDR=0.
The HWASan run-time uses dlsym and dladdr, so add a libdl dependency for
HWASan-built static binaries. We could also remove the dependency from
libclang_rt.hwasan_static-*.a, but this is also easy to do.
Bug: http://b/141485154
Test: bionic unit tests, device boots, verify that static and dynamic
executables can throw/catch an exception
Test: verify that a static executable using dlopen doesn't link (unless it
adds an explicit dependency on libdl)
Change-Id: Ic52c3f336b671b4ed335e99c94a64dfe8614b618
2019-10-12 00:03:34 +02:00
|
|
|
extraStaticDeps = []string{"libdl"}
|
2018-12-18 18:47:14 +01:00
|
|
|
} else {
|
|
|
|
runtimeLibrary = config.HWAddressSanitizerRuntimeLibrary(toolchain)
|
|
|
|
}
|
|
|
|
} else if Bool(c.sanitize.Properties.Sanitize.Thread) {
|
|
|
|
runtimeLibrary = config.ThreadSanitizerRuntimeLibrary(toolchain)
|
|
|
|
} else if Bool(c.sanitize.Properties.Sanitize.Scudo) {
|
|
|
|
if len(diagSanitizers) == 0 && !c.sanitize.Properties.UbsanRuntimeDep {
|
|
|
|
runtimeLibrary = config.ScudoMinimalRuntimeLibrary(toolchain)
|
|
|
|
} else {
|
|
|
|
runtimeLibrary = config.ScudoRuntimeLibrary(toolchain)
|
|
|
|
}
|
Workaround unexported sancov symbols. Fix multiple sanitizer RT deps.
Fuzz targets currently have dependencies on multiple libclang_rt runtime
libraries when building with ASan/HWAsan on device. This is an error.
This happens as Soong adds the dependency on the ASan/HWASan shared
runtime library. These libraries should provide the required UBSan
components. The clang driver was previously being passed
-fsanitize=fuzzer-no-link at link time, and as it doesn't know about the
already-established dependency on ASan/HWASan, it mistakenly thinks that
there is not runtime providing the UBSan components.
This patch fixes that problem by not adding -fsanitize=fuzzer-no-link to
the link-time flags.
This revealed a underlying issue in the upstream runtime compilation.
Android uses emulated TLS, which changes the symbol names from
<my_symbol_name> to __emutls_v._<my_symbol_name>. In particular, this
fails to account for the '__sancov_lowest_stack' symbol, as it no longer
matches the linker script rule for '__sancov*', and the symbol is no
longer exported in the shared library variant of ASan/HWASan.
This patch works around the discovered issue, which is being tracked in
the linked bug. It disables stack depth instrumentation, and we no
longer depend on this symbol. This means we get a missing sanitizer
coverage feature when fuzzing, but shouldn't be too detrimental.
Bug: 142430592
Test: SANITIZE_TARGET=hwaddress m example_fuzzer && \
readelf -d example_fuzzer # ensure only ONE libclang_rt dep (in this
case, hwasan)
Change-Id: Iea6df55d592a801732511c9b690134367429d62a
2019-10-10 02:18:59 +02:00
|
|
|
} else if len(diagSanitizers) > 0 || c.sanitize.Properties.UbsanRuntimeDep ||
|
2020-02-19 21:24:02 +01:00
|
|
|
Bool(c.sanitize.Properties.Sanitize.Fuzzer) ||
|
|
|
|
Bool(c.sanitize.Properties.Sanitize.Undefined) ||
|
|
|
|
Bool(c.sanitize.Properties.Sanitize.All_undefined) {
|
2018-12-18 18:47:14 +01:00
|
|
|
runtimeLibrary = config.UndefinedBehaviorSanitizerRuntimeLibrary(toolchain)
|
|
|
|
}
|
|
|
|
|
2020-02-19 21:24:02 +01:00
|
|
|
if runtimeLibrary != "" && (toolchain.Bionic() || c.sanitize.Properties.UbsanRuntimeDep) {
|
|
|
|
// UBSan is supported on non-bionic linux host builds as well
|
2019-10-30 10:43:49 +01:00
|
|
|
if isLlndkLibrary(runtimeLibrary, mctx.Config()) && !c.static() && c.UseVndk() {
|
2018-12-18 18:47:14 +01:00
|
|
|
runtimeLibrary = runtimeLibrary + llndkLibrarySuffix
|
|
|
|
}
|
|
|
|
|
|
|
|
// Adding dependency to the runtime library. We are using *FarVariation*
|
|
|
|
// because the runtime libraries themselves are not mutated by sanitizer
|
|
|
|
// mutators and thus don't have sanitizer variants whereas this module
|
|
|
|
// has been already mutated.
|
|
|
|
//
|
|
|
|
// Note that by adding dependency with {static|shared}DepTag, the lib is
|
|
|
|
// added to libFlags and LOCAL_SHARED_LIBRARIES by cc.Module
|
|
|
|
if c.staticBinary() {
|
2020-01-22 03:11:29 +01:00
|
|
|
deps := append(extraStaticDeps, runtimeLibrary)
|
|
|
|
// If we're using snapshots and in vendor, redirect to snapshot whenever possible
|
|
|
|
if c.VndkVersion() == mctx.DeviceConfig().VndkVersion() {
|
|
|
|
snapshots := vendorSnapshotStaticLibs(mctx.Config())
|
|
|
|
for idx, dep := range deps {
|
|
|
|
if lib, ok := snapshots.get(dep, mctx.Arch().ArchType); ok {
|
|
|
|
deps[idx] = lib
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-12-18 18:47:14 +01:00
|
|
|
// static executable gets static runtime libs
|
2019-10-16 20:03:10 +02:00
|
|
|
mctx.AddFarVariationDependencies(append(mctx.Target().Variations(), []blueprint.Variation{
|
2018-12-18 18:47:14 +01:00
|
|
|
{Mutator: "link", Variation: "static"},
|
2019-11-19 01:00:16 +01:00
|
|
|
c.ImageVariation(),
|
2020-01-22 03:11:29 +01:00
|
|
|
}...), StaticDepTag, deps...)
|
2019-07-29 14:27:18 +02:00
|
|
|
} else if !c.static() && !c.header() {
|
2020-01-22 03:11:29 +01:00
|
|
|
// If we're using snapshots and in vendor, redirect to snapshot whenever possible
|
|
|
|
if c.VndkVersion() == mctx.DeviceConfig().VndkVersion() {
|
|
|
|
snapshots := vendorSnapshotSharedLibs(mctx.Config())
|
|
|
|
if lib, ok := snapshots.get(runtimeLibrary, mctx.Arch().ArchType); ok {
|
|
|
|
runtimeLibrary = lib
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-01-29 03:15:04 +01:00
|
|
|
// dynamic executable and shared libs get shared runtime libs
|
2019-10-16 20:03:10 +02:00
|
|
|
mctx.AddFarVariationDependencies(append(mctx.Target().Variations(), []blueprint.Variation{
|
2018-12-18 18:47:14 +01:00
|
|
|
{Mutator: "link", Variation: "shared"},
|
2019-11-19 01:00:16 +01:00
|
|
|
c.ImageVariation(),
|
2019-10-16 20:03:10 +02:00
|
|
|
}...), earlySharedDepTag, runtimeLibrary)
|
2018-12-18 18:47:14 +01:00
|
|
|
}
|
|
|
|
// static lib does not have dependency to the runtime library. The
|
|
|
|
// dependency will be added to the executables or shared libs using
|
|
|
|
// the static lib.
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
type Sanitizeable interface {
|
|
|
|
android.Module
|
2019-01-28 11:47:32 +01:00
|
|
|
IsSanitizerEnabled(ctx android.BaseModuleContext, sanitizerName string) bool
|
2019-02-13 12:28:58 +01:00
|
|
|
EnableSanitizer(sanitizerName string)
|
2018-12-18 18:47:14 +01:00
|
|
|
}
|
|
|
|
|
2017-11-01 10:20:21 +01:00
|
|
|
// Create sanitized variants for modules that need them
|
2016-05-19 00:37:25 +02:00
|
|
|
func sanitizerMutator(t sanitizerType) func(android.BottomUpMutatorContext) {
|
|
|
|
return func(mctx android.BottomUpMutatorContext) {
|
2017-08-11 02:52:44 +02:00
|
|
|
if c, ok := mctx.Module().(*Module); ok && c.sanitize != nil {
|
2017-11-01 10:20:21 +01:00
|
|
|
if c.isDependencyRoot() && c.sanitize.isSanitizerEnabled(t) {
|
2019-02-01 02:50:50 +01:00
|
|
|
modules := mctx.CreateVariations(t.variationName())
|
2016-05-04 03:02:42 +02:00
|
|
|
modules[0].(*Module).sanitize.SetSanitizer(t, true)
|
2017-11-01 10:20:21 +01:00
|
|
|
} else if c.sanitize.isSanitizerEnabled(t) || c.sanitize.Properties.SanitizeDep {
|
|
|
|
isSanitizerEnabled := c.sanitize.isSanitizerEnabled(t)
|
2019-07-29 14:27:18 +02:00
|
|
|
if c.static() || c.header() || t == asan || t == fuzzer {
|
|
|
|
// Static and header libs are split into non-sanitized and sanitized variants.
|
|
|
|
// Shared libs are not split. However, for asan and fuzzer, we split even for shared
|
|
|
|
// libs because a library sanitized for asan/fuzzer can't be linked from a library
|
|
|
|
// that isn't sanitized for asan/fuzzer.
|
|
|
|
//
|
|
|
|
// Note for defaultVariation: since we don't split for shared libs but for static/header
|
|
|
|
// libs, it is possible for the sanitized variant of a static/header lib to depend
|
|
|
|
// on non-sanitized variant of a shared lib. Such unfulfilled variation causes an
|
|
|
|
// error when the module is split. defaultVariation is the name of the variation that
|
|
|
|
// will be used when such a dangling dependency occurs during the split of the current
|
|
|
|
// module. By setting it to the name of the sanitized variation, the dangling dependency
|
|
|
|
// is redirected to the sanitized variant of the dependent module.
|
|
|
|
defaultVariation := t.variationName()
|
|
|
|
mctx.SetDefaultDependencyVariation(&defaultVariation)
|
|
|
|
modules := mctx.CreateVariations("", t.variationName())
|
|
|
|
modules[0].(*Module).sanitize.SetSanitizer(t, false)
|
|
|
|
modules[1].(*Module).sanitize.SetSanitizer(t, true)
|
|
|
|
modules[0].(*Module).sanitize.Properties.SanitizeDep = false
|
|
|
|
modules[1].(*Module).sanitize.Properties.SanitizeDep = false
|
|
|
|
|
2020-03-10 21:23:57 +01:00
|
|
|
if mctx.Device() && t.incompatibleWithCfi() {
|
|
|
|
// TODO: Make sure that cfi mutator runs "after" any of the sanitizers that
|
|
|
|
// are incompatible with cfi
|
|
|
|
modules[1].(*Module).sanitize.SetSanitizer(cfi, false)
|
|
|
|
}
|
|
|
|
|
2019-07-29 14:27:18 +02:00
|
|
|
// For cfi/scs/hwasan, we can export both sanitized and un-sanitized variants
|
|
|
|
// to Make, because the sanitized version has a different suffix in name.
|
|
|
|
// For other types of sanitizers, suppress the variation that is disabled.
|
|
|
|
if t != cfi && t != scs && t != hwasan {
|
2018-11-20 01:03:58 +01:00
|
|
|
if isSanitizerEnabled {
|
|
|
|
modules[0].(*Module).Properties.PreventInstall = true
|
|
|
|
modules[0].(*Module).Properties.HideFromMake = true
|
|
|
|
} else {
|
|
|
|
modules[1].(*Module).Properties.PreventInstall = true
|
|
|
|
modules[1].(*Module).Properties.HideFromMake = true
|
|
|
|
}
|
|
|
|
}
|
2018-08-03 01:19:13 +02:00
|
|
|
|
2019-07-29 14:27:18 +02:00
|
|
|
// Export the static lib name to make
|
2018-08-03 01:19:13 +02:00
|
|
|
if c.static() {
|
2019-07-29 14:27:18 +02:00
|
|
|
if t == cfi {
|
|
|
|
appendStringSync(c.Name(), cfiStaticLibs(mctx.Config()), &cfiStaticLibsMutex)
|
|
|
|
} else if t == hwasan {
|
2019-10-18 23:49:46 +02:00
|
|
|
if c.UseVndk() {
|
2019-07-29 14:27:18 +02:00
|
|
|
appendStringSync(c.Name(), hwasanVendorStaticLibs(mctx.Config()),
|
|
|
|
&hwasanStaticLibsMutex)
|
|
|
|
} else {
|
|
|
|
appendStringSync(c.Name(), hwasanStaticLibs(mctx.Config()),
|
|
|
|
&hwasanStaticLibsMutex)
|
|
|
|
}
|
2018-08-03 01:19:13 +02:00
|
|
|
}
|
|
|
|
}
|
2019-07-29 14:27:18 +02:00
|
|
|
} else {
|
|
|
|
// Shared libs are not split. Only the sanitized variant is created.
|
|
|
|
modules := mctx.CreateVariations(t.variationName())
|
|
|
|
modules[0].(*Module).sanitize.SetSanitizer(t, true)
|
|
|
|
modules[0].(*Module).sanitize.Properties.SanitizeDep = false
|
|
|
|
|
|
|
|
// locate the asan libraries under /data/asan
|
|
|
|
if mctx.Device() && t == asan && isSanitizerEnabled {
|
|
|
|
modules[0].(*Module).sanitize.Properties.InSanitizerDir = true
|
|
|
|
}
|
2020-03-10 21:23:57 +01:00
|
|
|
|
|
|
|
if mctx.Device() && t.incompatibleWithCfi() {
|
|
|
|
// TODO: Make sure that cfi mutator runs "after" any of the sanitizers that
|
|
|
|
// are incompatible with cfi
|
|
|
|
modules[0].(*Module).sanitize.SetSanitizer(cfi, false)
|
|
|
|
}
|
2017-11-02 03:42:45 +01:00
|
|
|
}
|
2016-01-06 23:41:07 +01:00
|
|
|
}
|
|
|
|
c.sanitize.Properties.SanitizeDep = false
|
2019-02-01 02:50:50 +01:00
|
|
|
} else if sanitizeable, ok := mctx.Module().(Sanitizeable); ok && sanitizeable.IsSanitizerEnabled(mctx, t.name()) {
|
2018-12-18 18:47:14 +01:00
|
|
|
// APEX modules fall here
|
2019-02-01 02:50:50 +01:00
|
|
|
mctx.CreateVariations(t.variationName())
|
2016-01-06 23:41:07 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2017-11-17 20:08:10 +01:00
|
|
|
|
2019-02-04 20:22:08 +01:00
|
|
|
var cfiStaticLibsKey = android.NewOnceKey("cfiStaticLibs")
|
|
|
|
|
2017-11-17 20:08:10 +01:00
|
|
|
func cfiStaticLibs(config android.Config) *[]string {
|
2019-02-04 20:22:08 +01:00
|
|
|
return config.Once(cfiStaticLibsKey, func() interface{} {
|
2017-11-17 20:08:10 +01:00
|
|
|
return &[]string{}
|
|
|
|
}).(*[]string)
|
|
|
|
}
|
|
|
|
|
2019-02-04 20:22:08 +01:00
|
|
|
var hwasanStaticLibsKey = android.NewOnceKey("hwasanStaticLibs")
|
|
|
|
|
2018-08-03 01:19:13 +02:00
|
|
|
func hwasanStaticLibs(config android.Config) *[]string {
|
2019-02-04 20:22:08 +01:00
|
|
|
return config.Once(hwasanStaticLibsKey, func() interface{} {
|
2018-08-03 01:19:13 +02:00
|
|
|
return &[]string{}
|
|
|
|
}).(*[]string)
|
|
|
|
}
|
|
|
|
|
2019-02-04 20:22:08 +01:00
|
|
|
var hwasanVendorStaticLibsKey = android.NewOnceKey("hwasanVendorStaticLibs")
|
|
|
|
|
2018-08-03 01:19:13 +02:00
|
|
|
func hwasanVendorStaticLibs(config android.Config) *[]string {
|
2019-02-04 20:22:08 +01:00
|
|
|
return config.Once(hwasanVendorStaticLibsKey, func() interface{} {
|
2018-08-03 01:19:13 +02:00
|
|
|
return &[]string{}
|
|
|
|
}).(*[]string)
|
|
|
|
}
|
|
|
|
|
2019-07-29 14:27:18 +02:00
|
|
|
func appendStringSync(item string, list *[]string, mutex *sync.Mutex) {
|
|
|
|
mutex.Lock()
|
|
|
|
*list = append(*list, item)
|
|
|
|
mutex.Unlock()
|
|
|
|
}
|
|
|
|
|
2018-02-22 00:49:20 +01:00
|
|
|
func enableMinimalRuntime(sanitize *sanitize) bool {
|
|
|
|
if !Bool(sanitize.Properties.Sanitize.Address) &&
|
2018-08-03 01:19:13 +02:00
|
|
|
!Bool(sanitize.Properties.Sanitize.Hwaddress) &&
|
2019-05-01 23:42:05 +02:00
|
|
|
!Bool(sanitize.Properties.Sanitize.Fuzzer) &&
|
2020-02-19 21:24:02 +01:00
|
|
|
|
2018-02-22 00:49:20 +01:00
|
|
|
(Bool(sanitize.Properties.Sanitize.Integer_overflow) ||
|
2020-02-19 21:24:02 +01:00
|
|
|
len(sanitize.Properties.Sanitize.Misc_undefined) > 0 ||
|
|
|
|
Bool(sanitize.Properties.Sanitize.Undefined) ||
|
|
|
|
Bool(sanitize.Properties.Sanitize.All_undefined)) &&
|
|
|
|
|
2018-02-22 00:49:20 +01:00
|
|
|
!(Bool(sanitize.Properties.Sanitize.Diag.Integer_overflow) ||
|
|
|
|
Bool(sanitize.Properties.Sanitize.Diag.Cfi) ||
|
2020-02-19 21:24:02 +01:00
|
|
|
Bool(sanitize.Properties.Sanitize.Diag.Undefined) ||
|
2018-02-22 00:49:20 +01:00
|
|
|
len(sanitize.Properties.Sanitize.Diag.Misc_undefined) > 0) {
|
2020-02-19 21:24:02 +01:00
|
|
|
|
2018-02-22 00:49:20 +01:00
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2019-11-15 01:59:12 +01:00
|
|
|
func enableUbsanRuntime(sanitize *sanitize) bool {
|
|
|
|
return Bool(sanitize.Properties.Sanitize.Diag.Integer_overflow) ||
|
2020-02-19 21:24:02 +01:00
|
|
|
Bool(sanitize.Properties.Sanitize.Diag.Undefined) ||
|
2019-11-15 01:59:12 +01:00
|
|
|
len(sanitize.Properties.Sanitize.Diag.Misc_undefined) > 0
|
|
|
|
}
|
|
|
|
|
2017-11-17 20:08:10 +01:00
|
|
|
func cfiMakeVarsProvider(ctx android.MakeVarsContext) {
|
|
|
|
cfiStaticLibs := cfiStaticLibs(ctx.Config())
|
2017-11-29 01:37:53 +01:00
|
|
|
sort.Strings(*cfiStaticLibs)
|
2017-11-17 20:08:10 +01:00
|
|
|
ctx.Strict("SOONG_CFI_STATIC_LIBRARIES", strings.Join(*cfiStaticLibs, " "))
|
|
|
|
}
|
2018-08-03 01:19:13 +02:00
|
|
|
|
|
|
|
func hwasanMakeVarsProvider(ctx android.MakeVarsContext) {
|
|
|
|
hwasanStaticLibs := hwasanStaticLibs(ctx.Config())
|
|
|
|
sort.Strings(*hwasanStaticLibs)
|
|
|
|
ctx.Strict("SOONG_HWASAN_STATIC_LIBRARIES", strings.Join(*hwasanStaticLibs, " "))
|
|
|
|
|
|
|
|
hwasanVendorStaticLibs := hwasanVendorStaticLibs(ctx.Config())
|
|
|
|
sort.Strings(*hwasanVendorStaticLibs)
|
|
|
|
ctx.Strict("SOONG_HWASAN_VENDOR_STATIC_LIBRARIES", strings.Join(*hwasanVendorStaticLibs, " "))
|
|
|
|
}
|