blob: 2e14fef5f377f551a368680a83433689907c5c3c [file] [log] [blame]
Dan Albert4ae5d4b2014-10-31 16:23:08 -07001##############################################
2## Perform configuration steps for sanitizers.
3##############################################
4
Dan Albert27ccb752015-04-16 16:21:02 -07005my_sanitize := $(strip $(LOCAL_SANITIZE))
Dan Albert08cca282014-12-11 18:56:26 -08006
Dan Albert4c401412015-08-19 20:13:33 -07007# SANITIZE_HOST is only in effect if the module is already using clang (host
8# modules that haven't set `LOCAL_CLANG := false` and device modules that
9# have set `LOCAL_CLANG := true`.
10my_global_sanitize :=
11ifeq ($(my_clang),true)
12 ifdef LOCAL_IS_HOST_MODULE
13 my_global_sanitize := $(strip $(SANITIZE_HOST))
14
15 # SANITIZE_HOST=true is a deprecated way to say SANITIZE_HOST=address.
16 my_global_sanitize := $(subst true,address,$(my_global_sanitize))
17 else
18 my_global_sanitize := $(strip $(SANITIZE_TARGET))
19 endif
20endif
21
Dan Albert4c401412015-08-19 20:13:33 -070022ifneq ($(my_global_sanitize),)
Evgenii Stepanov71faa192016-05-19 17:45:21 -070023 my_sanitize := $(my_global_sanitize) $(my_sanitize)
Dan Albert4c401412015-08-19 20:13:33 -070024endif
25
Andreas Gampe6b30d772016-06-27 15:15:31 -070026# The sanitizer specified in the product configuration wins over the previous.
27ifneq ($(SANITIZER.$(TARGET_PRODUCT).$(LOCAL_MODULE).CONFIG),)
28 my_sanitize := $(SANITIZER.$(TARGET_PRODUCT).$(LOCAL_MODULE).CONFIG)
29 ifeq ($(my_sanitize),never)
30 my_sanitize :=
31 endif
32endif
33
Andreas Gampecd257402016-06-20 17:36:49 -070034# Add a filter point for 32-bit vs 64-bit sanitization (to lighten the burden).
35SANITIZE_ARCH ?= 32 64
36ifeq ($(filter $(SANITIZE_ARCH),$(my_32_64_bit_suffix)),)
37 my_sanitize :=
38endif
39
Andreas Gampe3d3b0c92016-06-20 17:46:29 -070040# Add a filter point based on module owner (to lighten the burden). The format is a space- or
41# colon-separated list of owner names.
42ifneq (,$(SANITIZE_NEVER_BY_OWNER))
43 ifneq (,$(LOCAL_MODULE_OWNER))
44 ifneq (,$(filter $(LOCAL_MODULE_OWNER),$(subst :, ,$(SANITIZE_NEVER_BY_OWNER))))
45 $(warning Not sanitizing $(LOCAL_MODULE) based on module owner.)
46 my_sanitize :=
47 endif
48 endif
49endif
50
Dan Albert08cca282014-12-11 18:56:26 -080051# Don't apply sanitizers to NDK code.
52ifdef LOCAL_SDK_VERSION
Dan Albert4c401412015-08-19 20:13:33 -070053 my_sanitize :=
Dan Willemsenf761c0f2016-06-28 16:47:43 -070054 my_global_sanitize :=
Dan Albert27ccb752015-04-16 16:21:02 -070055endif
56
Dan Albert4c401412015-08-19 20:13:33 -070057# Never always wins.
58ifeq ($(LOCAL_SANITIZE),never)
Dan Albert08cca282014-12-11 18:56:26 -080059 my_sanitize :=
60endif
61
Evgenii Stepanov42823662016-05-12 13:07:17 -070062my_nosanitize = $(strip $(LOCAL_NOSANITIZE))
63ifneq ($(my_nosanitize),)
64 my_sanitize := $(filter-out $(my_nosanitize),$(my_sanitize))
65endif
66
Dan Alberta6311b72015-07-30 10:17:33 -070067# TSAN is not supported on 32-bit architectures. For non-multilib cases, make
68# its use an error. For multilib cases, don't use it for the 32-bit case.
69ifneq ($(filter thread,$(my_sanitize)),)
70 ifeq ($(my_32_64_bit_suffix),32)
71 ifeq ($(my_module_multilib),both)
72 my_sanitize := $(filter-out thread,$(my_sanitize))
73 else
74 $(error $(LOCAL_PATH): $(LOCAL_MODULE): TSAN cannot be used for 32-bit modules.)
75 endif
76 endif
77endif
78
Evgenii Stepanov7dcb8b82016-05-06 18:15:57 -070079ifneq ($(filter safe-stack,$(my_sanitize)),)
80 ifeq ($(my_32_64_bit_suffix),32)
81 my_sanitize := $(filter-out safe-stack,$(my_sanitize))
82 endif
83endif
84
Evgenii Stepanov5adfcb12015-06-25 16:38:25 -070085# Undefined symbols can occur if a non-sanitized library links
86# sanitized static libraries. That's OK, because the executable
87# always depends on the ASan runtime library, which defines these
88# symbols.
Evgenii Stepanov912b51f2016-05-19 17:49:51 -070089ifneq ($(filter address thread,$(strip $(SANITIZE_TARGET))),)
Evgenii Stepanov5adfcb12015-06-25 16:38:25 -070090 ifndef LOCAL_IS_HOST_MODULE
91 ifeq ($(LOCAL_MODULE_CLASS),SHARED_LIBRARIES)
92 ifeq ($(my_sanitize),)
93 my_allow_undefined_symbols := true
94 endif
95 endif
96 endif
97endif
98
Dan Albert94b57912015-04-17 09:48:33 -070099# Sanitizers can only be used with clang.
100ifneq ($(my_clang),true)
101 ifneq ($(my_sanitize),)
102 $(error $(LOCAL_PATH): $(LOCAL_MODULE): Use of sanitizers requires LOCAL_CLANG := true)
103 endif
104endif
105
Dan Albertb5b2ffe2015-04-16 18:07:07 -0700106ifneq ($(filter default-ub,$(my_sanitize)),)
107 my_sanitize := $(CLANG_DEFAULT_UB_CHECKS)
Dan Albert08cca282014-12-11 18:56:26 -0800108endif
109
Ivan Krasin74b32b82015-09-18 11:54:43 -0700110ifneq ($(filter coverage,$(my_sanitize)),)
111 ifeq ($(filter address,$(my_sanitize)),)
112 $(error $(LOCAL_PATH): $(LOCAL_MODULE): Use of 'coverage' also requires 'address')
113 endif
114 my_cflags += -fsanitize-coverage=edge,indirect-calls,8bit-counters,trace-cmp
115 my_sanitize := $(filter-out coverage,$(my_sanitize))
116endif
117
Dan Albert08cca282014-12-11 18:56:26 -0800118ifneq ($(my_sanitize),)
Stephen Hinese8119e92015-11-09 16:32:11 -0800119 fsanitize_arg := $(subst $(space),$(comma),$(my_sanitize))
Dan Albert08cca282014-12-11 18:56:26 -0800120 my_cflags += -fsanitize=$(fsanitize_arg)
121
122 ifdef LOCAL_IS_HOST_MODULE
Dan Albertabf4bc92015-06-16 23:27:34 -0700123 my_cflags += -fno-sanitize-recover=all
Dan Albert08cca282014-12-11 18:56:26 -0800124 my_ldflags += -fsanitize=$(fsanitize_arg)
Dan Albert29224112015-08-13 17:25:10 -0700125 my_ldlibs += -lrt -ldl
Dan Albertabf4bc92015-06-16 23:27:34 -0700126 else
Evgenii Stepanov71faa192016-05-19 17:45:21 -0700127 my_cflags += -fsanitize-trap=all
128 my_cflags += -ftrap-function=abort
Evgenii Stepanov55f73e62016-05-12 13:07:36 -0700129 ifneq ($(filter address thread,$(my_sanitize)),)
Evgenii Stepanov71faa192016-05-19 17:45:21 -0700130 my_cflags += -fno-sanitize-trap=address,thread
Evgenii Stepanov55f73e62016-05-12 13:07:36 -0700131 my_shared_libraries += libdl
132 endif
Dan Albert08cca282014-12-11 18:56:26 -0800133 endif
134endif
135
Evgenii Stepanov202c7a72016-07-07 10:56:39 -0700136ifneq ($(filter cfi,$(my_sanitize)),)
137 my_cflags += -flto -fsanitize-cfi-cross-dso -fvisibility=default
138 my_ldflags += -flto -fsanitize-cfi-cross-dso -fsanitize=cfi -Wl,-plugin-opt,O1 -Wl,-export-dynamic-symbol=__cfi_check
139endif
140
Chih-Hung Hsiehad741e62016-03-09 14:54:55 -0800141# If local or global modules need ASAN, add linker flags.
142ifneq ($(filter address,$(my_global_sanitize) $(my_sanitize)),)
Dan Albert4ae5d4b2014-10-31 16:23:08 -0700143 my_ldflags += $(ADDRESS_SANITIZER_CONFIG_EXTRA_LDFLAGS)
144 ifdef LOCAL_IS_HOST_MODULE
Dan Albert08cca282014-12-11 18:56:26 -0800145 # -nodefaultlibs (provided with libc++) prevents the driver from linking
146 # libraries needed with -fsanitize=address. http://b/18650275 (WAI)
Dan Albertabf4bc92015-06-16 23:27:34 -0700147 my_ldlibs += -lm -lpthread
Dan Albert1f0d5302015-04-28 14:55:50 -0700148 my_ldflags += -Wl,--no-as-needed
Dan Albert4ae5d4b2014-10-31 16:23:08 -0700149 else
Chih-Hung Hsiehad741e62016-03-09 14:54:55 -0800150 # Add asan libraries unless LOCAL_MODULE is the asan library.
Evgenii Stepanovf0b15e12015-04-24 16:34:47 -0700151 # ASan runtime library must be the first in the link order.
Chih-Hung Hsiehad741e62016-03-09 14:54:55 -0800152 ifeq (,$(filter $(LOCAL_MODULE),$($(LOCAL_2ND_ARCH_VAR_PREFIX)ADDRESS_SANITIZER_RUNTIME_LIBRARY)))
153 my_shared_libraries := $($(LOCAL_2ND_ARCH_VAR_PREFIX)ADDRESS_SANITIZER_RUNTIME_LIBRARY) \
154 $(my_shared_libraries)
155 endif
156 ifeq (,$(filter $(LOCAL_MODULE),$(ADDRESS_SANITIZER_CONFIG_EXTRA_STATIC_LIBRARIES)))
157 my_static_libraries += $(ADDRESS_SANITIZER_CONFIG_EXTRA_STATIC_LIBRARIES)
158 endif
159
160 # Do not add unnecessary dependency in shared libraries.
161 ifeq ($(LOCAL_MODULE_CLASS),SHARED_LIBRARIES)
162 my_ldflags += -Wl,--as-needed
163 endif
Ying Wanga05e2222015-08-17 16:13:24 -0700164
Colin Crossd08699e2016-07-17 15:28:07 -0700165 ifeq ($(LOCAL_MODULE_CLASS),EXECUTABLES)
166 ifneq ($(LOCAL_FORCE_STATIC_EXECUTABLE),true)
167 my_linker := $($(LOCAL_2ND_ARCH_VAR_PREFIX)ADDRESS_SANITIZER_LINKER)
168 # Make sure linker_asan get installed.
169 $(LOCAL_INSTALLED_MODULE) : | $(PRODUCT_OUT)$($(LOCAL_2ND_ARCH_VAR_PREFIX)ADDRESS_SANITIZER_LINKER)
170 endif
171 endif
Dan Albert08cca282014-12-11 18:56:26 -0800172 endif
173endif
174
Chih-Hung Hsiehad741e62016-03-09 14:54:55 -0800175# If local module needs ASAN, add compiler flags.
176ifneq ($(filter address,$(my_sanitize)),)
177 # Frame pointer based unwinder in ASan requires ARM frame setup.
178 LOCAL_ARM_MODE := arm
179 my_cflags += $(ADDRESS_SANITIZER_CONFIG_EXTRA_CFLAGS)
180 ifndef LOCAL_IS_HOST_MODULE
181 my_cflags += -mllvm -asan-globals=0
182 endif
183endif
184
Dan Albert08cca282014-12-11 18:56:26 -0800185ifneq ($(filter undefined,$(my_sanitize)),)
Dan Albertabf4bc92015-06-16 23:27:34 -0700186 ifndef LOCAL_IS_HOST_MODULE
Dan Albert08cca282014-12-11 18:56:26 -0800187 $(error ubsan is not yet supported on the target)
Dan Albert4ae5d4b2014-10-31 16:23:08 -0700188 endif
189endif
Dan Albert4111d482015-04-16 18:08:44 -0700190
Dan Albert9f176552015-04-28 11:26:45 -0700191ifneq ($(strip $(LOCAL_SANITIZE_RECOVER)),)
192 recover_arg := $(subst $(space),$(comma),$(LOCAL_SANITIZE_RECOVER)),
Dan Albert4111d482015-04-16 18:08:44 -0700193 my_cflags += -fsanitize-recover=$(recover_arg)
194endif
Evgenii Stepanov202c7a72016-07-07 10:56:39 -0700195
196ifneq ($(strip $(LOCAL_SANITIZE_DIAG)),)
197 notrap_arg := $(subst $(space),$(comma),$(LOCAL_SANITIZE_DIAG)),
198 my_cflags += -fno-sanitize-trap=$(notrap_arg)
199 # Diagnostic requires a runtime library, unless ASan or TSan are also enabled.
200 ifeq ($(filter address thread,$(my_sanitize)),)
201 # Does not have to be the first DT_NEEDED unlike ASan.
202 my_shared_libraries += $($(LOCAL_2ND_ARCH_VAR_PREFIX)UBSAN_RUNTIME_LIBRARY)
203 endif
204endif