• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 //===--- SanitizerArgs.h - Arguments for sanitizer tools  -------*- C++ -*-===//
2 //
3 //                     The LLVM Compiler Infrastructure
4 //
5 // This file is distributed under the University of Illinois Open Source
6 // License. See LICENSE.TXT for details.
7 //
8 //===----------------------------------------------------------------------===//
9 #ifndef CLANG_LIB_DRIVER_SANITIZERARGS_H_
10 #define CLANG_LIB_DRIVER_SANITIZERARGS_H_
11 
12 #include "llvm/Option/Arg.h"
13 #include "llvm/Option/ArgList.h"
14 #include <string>
15 
16 namespace clang {
17 namespace driver {
18 
19 class Driver;
20 class ToolChain;
21 
22 class SanitizerArgs {
23   /// Assign ordinals to sanitizer flags. We'll use the ordinal values as
24   /// bit positions within \c Kind.
25   enum SanitizeOrdinal {
26 #define SANITIZER(NAME, ID) SO_##ID,
27 #define SANITIZER_GROUP(NAME, ID, ALIAS) SO_##ID##Group,
28 #include "clang/Basic/Sanitizers.def"
29     SO_Count
30   };
31 
32   /// Bugs to catch at runtime.
33   enum SanitizeKind {
34 #define SANITIZER(NAME, ID) ID = 1 << SO_##ID,
35 #define SANITIZER_GROUP(NAME, ID, ALIAS)                                       \
36   ID = ALIAS, ID##Group = 1 << SO_##ID##Group,
37 #include "clang/Basic/Sanitizers.def"
38     NeedsAsanRt = Address,
39     NeedsTsanRt = Thread,
40     NeedsMsanRt = Memory,
41     NeedsDfsanRt = DataFlow,
42     NeedsLeakDetection = Leak,
43     NeedsUbsanRt = Undefined | Integer,
44     NotAllowedWithTrap = Vptr,
45     HasZeroBaseShadow = Thread | Memory | DataFlow,
46     NeedsUnwindTables = Address | Thread | Memory | DataFlow
47   };
48   unsigned Kind;
49 
50   std::string BlacklistFile;
51   int MsanTrackOrigins;
52   bool AsanZeroBaseShadow;
53   bool UbsanTrapOnError;
54   bool AsanSharedRuntime;
55 
56  public:
57   SanitizerArgs();
58   /// Parses the sanitizer arguments from an argument list.
59   SanitizerArgs(const ToolChain &TC, const llvm::opt::ArgList &Args);
60 
needsAsanRt()61   bool needsAsanRt() const { return Kind & NeedsAsanRt; }
needsSharedAsanRt()62   bool needsSharedAsanRt() const { return AsanSharedRuntime; }
needsTsanRt()63   bool needsTsanRt() const { return Kind & NeedsTsanRt; }
needsMsanRt()64   bool needsMsanRt() const { return Kind & NeedsMsanRt; }
needsLeakDetection()65   bool needsLeakDetection() const { return Kind & NeedsLeakDetection; }
needsLsanRt()66   bool needsLsanRt() const {
67     return needsLeakDetection() && !needsAsanRt();
68   }
needsUbsanRt()69   bool needsUbsanRt() const {
70     return !UbsanTrapOnError && (Kind & NeedsUbsanRt);
71   }
needsDfsanRt()72   bool needsDfsanRt() const { return Kind & NeedsDfsanRt; }
73 
sanitizesVptr()74   bool sanitizesVptr() const { return Kind & Vptr; }
notAllowedWithTrap()75   bool notAllowedWithTrap() const { return Kind & NotAllowedWithTrap; }
hasZeroBaseShadow()76   bool hasZeroBaseShadow() const {
77     return (Kind & HasZeroBaseShadow) || AsanZeroBaseShadow;
78   }
needsUnwindTables()79   bool needsUnwindTables() const { return Kind & NeedsUnwindTables; }
80   void addArgs(const llvm::opt::ArgList &Args,
81                llvm::opt::ArgStringList &CmdArgs) const;
82 
83  private:
84   void clear();
85 
86   /// Parse a single value from a -fsanitize= or -fno-sanitize= value list.
87   /// Returns OR of members of the \c SanitizeKind enumeration, or \c 0
88   /// if \p Value is not known.
89   static unsigned parse(const char *Value);
90 
91   /// Parse a -fsanitize= or -fno-sanitize= argument's values, diagnosing any
92   /// invalid components.
93   static unsigned parse(const Driver &D, const llvm::opt::Arg *A,
94                         bool DiagnoseErrors);
95 
96   /// Parse a single flag of the form -f[no]sanitize=, or
97   /// -f*-sanitizer. Sets the masks defining required change of Kind value.
98   /// Returns true if the flag was parsed successfully.
99   static bool parse(const Driver &D, const llvm::opt::ArgList &Args,
100                     const llvm::opt::Arg *A, unsigned &Add, unsigned &Remove,
101                     bool DiagnoseErrors);
102 
103   /// Produce an argument string from ArgList \p Args, which shows how it
104   /// provides a sanitizer kind in \p Mask. For example, the argument list
105   /// "-fsanitize=thread,vptr -fsanitize=address" with mask \c NeedsUbsanRt
106   /// would produce "-fsanitize=vptr".
107   static std::string lastArgumentForKind(const Driver &D,
108                                          const llvm::opt::ArgList &Args,
109                                          unsigned Kind);
110 
111   /// Produce an argument string from argument \p A, which shows how it provides
112   /// a value in \p Mask. For instance, the argument
113   /// "-fsanitize=address,alignment" with mask \c NeedsUbsanRt would produce
114   /// "-fsanitize=alignment".
115   static std::string describeSanitizeArg(const llvm::opt::ArgList &Args,
116                                          const llvm::opt::Arg *A,
117                                          unsigned Mask);
118 
119   static bool getDefaultBlacklistForKind(const Driver &D, unsigned Kind,
120                                          std::string &BLPath);
121 
122   /// Return the smallest superset of sanitizer set \p Kinds such that each
123   /// member of each group whose flag is set in \p Kinds has its flag set in the
124   /// result.
125   static unsigned expandGroups(unsigned Kinds);
126 
127   /// Return the subset of \p Kinds supported by toolchain \p TC.  If
128   /// \p DiagnoseErrors is true, produce an error diagnostic for each sanitizer
129   /// removed from \p Kinds.
130   static unsigned filterUnsupportedKinds(const ToolChain &TC, unsigned Kinds,
131                                          const llvm::opt::ArgList &Args,
132                                          const llvm::opt::Arg *A,
133                                          bool DiagnoseErrors,
134                                          unsigned &DiagnosedKinds);
135 
136   /// The flags in \p Mask are unsupported by \p TC.  If present in \p Kinds,
137   /// remove them and produce an error diagnostic referring to \p A if
138   /// \p DiagnoseErrors is true.
139   static void filterUnsupportedMask(const ToolChain &TC, unsigned &Kinds,
140                                     unsigned Mask,
141                                     const llvm::opt::ArgList &Args,
142                                     const llvm::opt::Arg *A,
143                                     bool DiagnoseErrors,
144                                     unsigned &DiagnosedKinds);
145 };
146 
147 }  // namespace driver
148 }  // namespace clang
149 
150 #endif // CLANG_LIB_DRIVER_SANITIZERARGS_H_
151