Dan Albert | 4ae5d4b | 2014-10-31 16:23:08 -0700 | [diff] [blame] | 1 | ############################################## |
| 2 | ## Perform configuration steps for sanitizers. |
| 3 | ############################################## |
| 4 | |
Dan Albert | 27ccb75 | 2015-04-16 16:21:02 -0700 | [diff] [blame] | 5 | my_sanitize := $(strip $(LOCAL_SANITIZE)) |
Vishwath Mohan | 8dcfdce | 2017-01-18 17:50:29 -0800 | [diff] [blame] | 6 | my_sanitize_diag := $(strip $(LOCAL_SANITIZE_DIAG)) |
Dan Albert | 08cca28 | 2014-12-11 18:56:26 -0800 | [diff] [blame] | 7 | |
Dan Albert | 4c40141 | 2015-08-19 20:13:33 -0700 | [diff] [blame] | 8 | my_global_sanitize := |
Ivan Lozano | 4a36373 | 2017-06-28 09:11:26 -0700 | [diff] [blame] | 9 | my_global_sanitize_diag := |
Dan Willemsen | f063839 | 2018-09-04 22:25:22 -0700 | [diff] [blame] | 10 | ifdef LOCAL_IS_HOST_MODULE |
| 11 | ifneq ($($(my_prefix)OS),windows) |
| 12 | my_global_sanitize := $(strip $(SANITIZE_HOST)) |
Dan Albert | 4c40141 | 2015-08-19 20:13:33 -0700 | [diff] [blame] | 13 | |
Dan Willemsen | f063839 | 2018-09-04 22:25:22 -0700 | [diff] [blame] | 14 | # SANITIZE_HOST=true is a deprecated way to say SANITIZE_HOST=address. |
| 15 | my_global_sanitize := $(subst true,address,$(my_global_sanitize)) |
Dan Albert | 4c40141 | 2015-08-19 20:13:33 -0700 | [diff] [blame] | 16 | endif |
Dan Willemsen | f063839 | 2018-09-04 22:25:22 -0700 | [diff] [blame] | 17 | else |
| 18 | my_global_sanitize := $(strip $(SANITIZE_TARGET)) |
| 19 | my_global_sanitize_diag := $(strip $(SANITIZE_TARGET_DIAG)) |
Dan Albert | 4c40141 | 2015-08-19 20:13:33 -0700 | [diff] [blame] | 20 | endif |
| 21 | |
Ivan Lozano | b4749cb | 2017-07-21 10:33:32 -0700 | [diff] [blame] | 22 | # Disable global integer_overflow in excluded paths. |
| 23 | ifneq ($(filter integer_overflow, $(my_global_sanitize)),) |
| 24 | combined_exclude_paths := $(INTEGER_OVERFLOW_EXCLUDE_PATHS) \ |
| 25 | $(PRODUCT_INTEGER_OVERFLOW_EXCLUDE_PATHS) |
| 26 | |
| 27 | ifneq ($(strip $(foreach dir,$(subst $(comma),$(space),$(combined_exclude_paths)),\ |
| 28 | $(filter $(dir)%,$(LOCAL_PATH)))),) |
| 29 | my_global_sanitize := $(filter-out integer_overflow,$(my_global_sanitize)) |
| 30 | my_global_sanitize_diag := $(filter-out integer_overflow,$(my_global_sanitize_diag)) |
| 31 | endif |
| 32 | endif |
| 33 | |
Ivan Lozano | 702e8bd | 2018-03-15 14:49:20 -0700 | [diff] [blame] | 34 | # Global integer sanitization doesn't support static modules. |
| 35 | ifeq ($(filter SHARED_LIBRARIES EXECUTABLES,$(LOCAL_MODULE_CLASS)),) |
| 36 | my_global_sanitize := $(filter-out integer_overflow,$(my_global_sanitize)) |
| 37 | my_global_sanitize_diag := $(filter-out integer_overflow,$(my_global_sanitize_diag)) |
| 38 | endif |
| 39 | ifeq ($(LOCAL_FORCE_STATIC_EXECUTABLE),true) |
| 40 | my_global_sanitize := $(filter-out integer_overflow,$(my_global_sanitize)) |
| 41 | my_global_sanitize_diag := $(filter-out integer_overflow,$(my_global_sanitize_diag)) |
| 42 | endif |
| 43 | |
Vishwath Mohan | 23b2d2e | 2017-10-31 02:25:16 -0700 | [diff] [blame] | 44 | # Disable global CFI in excluded paths |
| 45 | ifneq ($(filter cfi, $(my_global_sanitize)),) |
| 46 | combined_exclude_paths := $(CFI_EXCLUDE_PATHS) \ |
| 47 | $(PRODUCT_CFI_EXCLUDE_PATHS) |
| 48 | |
| 49 | ifneq ($(strip $(foreach dir,$(subst $(comma),$(space),$(combined_exclude_paths)),\ |
| 50 | $(filter $(dir)%,$(LOCAL_PATH)))),) |
| 51 | my_global_sanitize := $(filter-out cfi,$(my_global_sanitize)) |
| 52 | my_global_sanitize_diag := $(filter-out cfi,$(my_global_sanitize_diag)) |
| 53 | endif |
| 54 | endif |
| 55 | |
Evgenii Stepanov | 3330b2f | 2021-01-13 12:14:55 -0800 | [diff] [blame] | 56 | # Disable global memtag_heap in excluded paths |
| 57 | ifneq ($(filter memtag_heap, $(my_global_sanitize)),) |
| 58 | combined_exclude_paths := $(MEMTAG_HEAP_EXCLUDE_PATHS) \ |
| 59 | $(PRODUCT_MEMTAG_HEAP_EXCLUDE_PATHS) |
| 60 | |
| 61 | ifneq ($(strip $(foreach dir,$(subst $(comma),$(space),$(combined_exclude_paths)),\ |
| 62 | $(filter $(dir)%,$(LOCAL_PATH)))),) |
| 63 | my_global_sanitize := $(filter-out memtag_heap,$(my_global_sanitize)) |
| 64 | my_global_sanitize_diag := $(filter-out memtag_heap,$(my_global_sanitize_diag)) |
| 65 | endif |
| 66 | endif |
| 67 | |
Tomislav Novak | d8febc9 | 2023-08-22 10:51:36 -0700 | [diff] [blame] | 68 | # Disable global HWASan in excluded paths |
| 69 | ifneq ($(filter hwaddress, $(my_global_sanitize)),) |
| 70 | combined_exclude_paths := $(HWASAN_EXCLUDE_PATHS) \ |
| 71 | $(PRODUCT_HWASAN_EXCLUDE_PATHS) |
| 72 | |
| 73 | ifneq ($(strip $(foreach dir,$(subst $(comma),$(space),$(combined_exclude_paths)),\ |
| 74 | $(filter $(dir)%,$(LOCAL_PATH)))),) |
| 75 | my_global_sanitize := $(filter-out hwaddress,$(my_global_sanitize)) |
| 76 | my_global_sanitize_diag := $(filter-out hwaddress,$(my_global_sanitize_diag)) |
| 77 | endif |
| 78 | endif |
| 79 | |
Dan Albert | 4c40141 | 2015-08-19 20:13:33 -0700 | [diff] [blame] | 80 | ifneq ($(my_global_sanitize),) |
Evgenii Stepanov | 71faa19 | 2016-05-19 17:45:21 -0700 | [diff] [blame] | 81 | my_sanitize := $(my_global_sanitize) $(my_sanitize) |
Dan Albert | 4c40141 | 2015-08-19 20:13:33 -0700 | [diff] [blame] | 82 | endif |
Ivan Lozano | 4a36373 | 2017-06-28 09:11:26 -0700 | [diff] [blame] | 83 | ifneq ($(my_global_sanitize_diag),) |
| 84 | my_sanitize_diag := $(my_global_sanitize_diag) $(my_sanitize_diag) |
| 85 | endif |
Dan Albert | 4c40141 | 2015-08-19 20:13:33 -0700 | [diff] [blame] | 86 | |
Andreas Gampe | 6b30d77 | 2016-06-27 15:15:31 -0700 | [diff] [blame] | 87 | # The sanitizer specified in the product configuration wins over the previous. |
| 88 | ifneq ($(SANITIZER.$(TARGET_PRODUCT).$(LOCAL_MODULE).CONFIG),) |
| 89 | my_sanitize := $(SANITIZER.$(TARGET_PRODUCT).$(LOCAL_MODULE).CONFIG) |
| 90 | ifeq ($(my_sanitize),never) |
| 91 | my_sanitize := |
Ivan Lozano | 4a36373 | 2017-06-28 09:11:26 -0700 | [diff] [blame] | 92 | my_sanitize_diag := |
Andreas Gampe | 6b30d77 | 2016-06-27 15:15:31 -0700 | [diff] [blame] | 93 | endif |
| 94 | endif |
| 95 | |
Colin Cross | 2361842 | 2016-11-02 15:05:21 -0700 | [diff] [blame] | 96 | ifndef LOCAL_IS_HOST_MODULE |
| 97 | # Add a filter point for 32-bit vs 64-bit sanitization (to lighten the burden) |
| 98 | SANITIZE_TARGET_ARCH ?= $(TARGET_ARCH) $(TARGET_2ND_ARCH) |
| 99 | ifeq ($(filter $(SANITIZE_TARGET_ARCH),$(TARGET_$(LOCAL_2ND_ARCH_VAR_PREFIX)ARCH)),) |
| 100 | my_sanitize := |
Ivan Lozano | 4a36373 | 2017-06-28 09:11:26 -0700 | [diff] [blame] | 101 | my_sanitize_diag := |
Colin Cross | 2361842 | 2016-11-02 15:05:21 -0700 | [diff] [blame] | 102 | endif |
Andreas Gampe | cd25740 | 2016-06-20 17:36:49 -0700 | [diff] [blame] | 103 | endif |
| 104 | |
Andreas Gampe | 3d3b0c9 | 2016-06-20 17:46:29 -0700 | [diff] [blame] | 105 | # Add a filter point based on module owner (to lighten the burden). The format is a space- or |
| 106 | # colon-separated list of owner names. |
| 107 | ifneq (,$(SANITIZE_NEVER_BY_OWNER)) |
| 108 | ifneq (,$(LOCAL_MODULE_OWNER)) |
| 109 | ifneq (,$(filter $(LOCAL_MODULE_OWNER),$(subst :, ,$(SANITIZE_NEVER_BY_OWNER)))) |
| 110 | $(warning Not sanitizing $(LOCAL_MODULE) based on module owner.) |
| 111 | my_sanitize := |
Ivan Lozano | 4a36373 | 2017-06-28 09:11:26 -0700 | [diff] [blame] | 112 | my_sanitize_diag := |
Andreas Gampe | 3d3b0c9 | 2016-06-20 17:46:29 -0700 | [diff] [blame] | 113 | endif |
| 114 | endif |
| 115 | endif |
| 116 | |
Dan Albert | 08cca28 | 2014-12-11 18:56:26 -0800 | [diff] [blame] | 117 | # Don't apply sanitizers to NDK code. |
| 118 | ifdef LOCAL_SDK_VERSION |
Dan Albert | 4c40141 | 2015-08-19 20:13:33 -0700 | [diff] [blame] | 119 | my_sanitize := |
Dan Willemsen | f761c0f | 2016-06-28 16:47:43 -0700 | [diff] [blame] | 120 | my_global_sanitize := |
Ivan Lozano | 4a36373 | 2017-06-28 09:11:26 -0700 | [diff] [blame] | 121 | my_sanitize_diag := |
Dan Albert | 27ccb75 | 2015-04-16 16:21:02 -0700 | [diff] [blame] | 122 | endif |
| 123 | |
Dan Albert | 4c40141 | 2015-08-19 20:13:33 -0700 | [diff] [blame] | 124 | # Never always wins. |
| 125 | ifeq ($(LOCAL_SANITIZE),never) |
Dan Albert | 08cca28 | 2014-12-11 18:56:26 -0800 | [diff] [blame] | 126 | my_sanitize := |
Ivan Lozano | 4a36373 | 2017-06-28 09:11:26 -0700 | [diff] [blame] | 127 | my_sanitize_diag := |
Dan Albert | 08cca28 | 2014-12-11 18:56:26 -0800 | [diff] [blame] | 128 | endif |
| 129 | |
Elvis Chien | 064d91c | 2021-04-14 17:02:29 +0800 | [diff] [blame] | 130 | # Enable CFI in included paths. |
Vishwath Mohan | 23b2d2e | 2017-10-31 02:25:16 -0700 | [diff] [blame] | 131 | ifeq ($(filter cfi, $(my_sanitize)),) |
Elvis Chien | 064d91c | 2021-04-14 17:02:29 +0800 | [diff] [blame] | 132 | combined_include_paths := $(CFI_INCLUDE_PATHS) \ |
| 133 | $(PRODUCT_CFI_INCLUDE_PATHS) |
| 134 | combined_exclude_paths := $(CFI_EXCLUDE_PATHS) \ |
| 135 | $(PRODUCT_CFI_EXCLUDE_PATHS) |
Vishwath Mohan | 23b2d2e | 2017-10-31 02:25:16 -0700 | [diff] [blame] | 136 | |
Elvis Chien | 064d91c | 2021-04-14 17:02:29 +0800 | [diff] [blame] | 137 | ifneq ($(strip $(foreach dir,$(subst $(comma),$(space),$(combined_include_paths)),\ |
| 138 | $(filter $(dir)%,$(LOCAL_PATH)))),) |
| 139 | ifeq ($(strip $(foreach dir,$(subst $(comma),$(space),$(combined_exclude_paths)),\ |
| 140 | $(filter $(dir)%,$(LOCAL_PATH)))),) |
| 141 | my_sanitize := cfi $(my_sanitize) |
Vishwath Mohan | 6106a4e | 2018-05-24 18:04:25 -0700 | [diff] [blame] | 142 | endif |
Vishwath Mohan | 23b2d2e | 2017-10-31 02:25:16 -0700 | [diff] [blame] | 143 | endif |
| 144 | endif |
| 145 | |
Evgenii Stepanov | 3330b2f | 2021-01-13 12:14:55 -0800 | [diff] [blame] | 146 | # Enable memtag_heap in included paths (for Arm64 only). |
| 147 | ifeq ($(filter memtag_heap, $(my_sanitize)),) |
| 148 | ifneq ($(filter arm64,$(TARGET_$(LOCAL_2ND_ARCH_VAR_PREFIX)ARCH)),) |
| 149 | combined_sync_include_paths := $(MEMTAG_HEAP_SYNC_INCLUDE_PATHS) \ |
| 150 | $(PRODUCT_MEMTAG_HEAP_SYNC_INCLUDE_PATHS) |
| 151 | combined_async_include_paths := $(MEMTAG_HEAP_ASYNC_INCLUDE_PATHS) \ |
| 152 | $(PRODUCT_MEMTAG_HEAP_ASYNC_INCLUDE_PATHS) |
Evgenii Stepanov | 13bc227 | 2021-04-09 14:52:33 -0700 | [diff] [blame] | 153 | combined_exclude_paths := $(MEMTAG_HEAP_EXCLUDE_PATHS) \ |
| 154 | $(PRODUCT_MEMTAG_HEAP_EXCLUDE_PATHS) |
Evgenii Stepanov | 80b53b8 | 2023-06-08 15:40:39 -0700 | [diff] [blame] | 155 | ifneq ($(PRODUCT_MEMTAG_HEAP_SKIP_DEFAULT_PATHS),true) |
| 156 | combined_sync_include_paths += $(PRODUCT_MEMTAG_HEAP_SYNC_DEFAULT_INCLUDE_PATHS) |
| 157 | combined_async_include_paths += $(PRODUCT_MEMTAG_HEAP_ASYNC_DEFAULT_INCLUDE_PATHS) |
| 158 | endif |
Evgenii Stepanov | 3330b2f | 2021-01-13 12:14:55 -0800 | [diff] [blame] | 159 | |
Evgenii Stepanov | 13bc227 | 2021-04-09 14:52:33 -0700 | [diff] [blame] | 160 | ifeq ($(strip $(foreach dir,$(subst $(comma),$(space),$(combined_exclude_paths)),\ |
| 161 | $(filter $(dir)%,$(LOCAL_PATH)))),) |
| 162 | ifneq ($(strip $(foreach dir,$(subst $(comma),$(space),$(combined_sync_include_paths)),\ |
| 163 | $(filter $(dir)%,$(LOCAL_PATH)))),) |
| 164 | my_sanitize := memtag_heap $(my_sanitize) |
| 165 | my_sanitize_diag := memtag_heap $(my_sanitize_diag) |
| 166 | else ifneq ($(strip $(foreach dir,$(subst $(comma),$(space),$(combined_async_include_paths)),\ |
| 167 | $(filter $(dir)%,$(LOCAL_PATH)))),) |
| 168 | my_sanitize := memtag_heap $(my_sanitize) |
| 169 | endif |
Evgenii Stepanov | 3330b2f | 2021-01-13 12:14:55 -0800 | [diff] [blame] | 170 | endif |
| 171 | endif |
| 172 | endif |
| 173 | |
Hang Lu | e235ded | 2022-08-29 14:42:34 +0800 | [diff] [blame] | 174 | # Enable HWASan in included paths. |
| 175 | ifeq ($(filter hwaddress, $(my_sanitize)),) |
| 176 | combined_include_paths := $(HWASAN_INCLUDE_PATHS) \ |
| 177 | $(PRODUCT_HWASAN_INCLUDE_PATHS) |
| 178 | |
| 179 | ifneq ($(strip $(foreach dir,$(subst $(comma),$(space),$(combined_include_paths)),\ |
| 180 | $(filter $(dir)%,$(LOCAL_PATH)))),) |
| 181 | my_sanitize := hwaddress $(my_sanitize) |
| 182 | endif |
| 183 | endif |
| 184 | |
Vishwath Mohan | 8dcfdce | 2017-01-18 17:50:29 -0800 | [diff] [blame] | 185 | # If CFI is disabled globally, remove it from my_sanitize. |
Vishwath Mohan | 45665b4 | 2017-01-24 13:20:28 -0800 | [diff] [blame] | 186 | ifeq ($(strip $(ENABLE_CFI)),false) |
Vishwath Mohan | 8dcfdce | 2017-01-18 17:50:29 -0800 | [diff] [blame] | 187 | my_sanitize := $(filter-out cfi,$(my_sanitize)) |
| 188 | my_sanitize_diag := $(filter-out cfi,$(my_sanitize_diag)) |
| 189 | endif |
| 190 | |
Florian Mayer | 548a2ad | 2022-08-31 22:25:55 +0000 | [diff] [blame] | 191 | # Also disable CFI and MTE if ASAN is enabled. |
Vishwath Mohan | c026f6d | 2017-04-20 07:39:13 -0700 | [diff] [blame] | 192 | ifneq ($(filter address,$(my_sanitize)),) |
| 193 | my_sanitize := $(filter-out cfi,$(my_sanitize)) |
Florian Mayer | 548a2ad | 2022-08-31 22:25:55 +0000 | [diff] [blame] | 194 | my_sanitize := $(filter-out memtag_stack,$(my_sanitize)) |
Mitch Phillips | 8520f4b | 2023-06-01 14:22:32 +0200 | [diff] [blame] | 195 | my_sanitize := $(filter-out memtag_globals,$(my_sanitize)) |
Florian Mayer | 548a2ad | 2022-08-31 22:25:55 +0000 | [diff] [blame] | 196 | my_sanitize := $(filter-out memtag_heap,$(my_sanitize)) |
Vishwath Mohan | c026f6d | 2017-04-20 07:39:13 -0700 | [diff] [blame] | 197 | my_sanitize_diag := $(filter-out cfi,$(my_sanitize_diag)) |
| 198 | endif |
| 199 | |
Mitch Phillips | b71a875 | 2021-05-19 11:29:02 -0700 | [diff] [blame] | 200 | # Disable memtag for host targets. Host executables in AndroidMk files are |
| 201 | # deprecated, but some partners still have them floating around. |
| 202 | ifdef LOCAL_IS_HOST_MODULE |
Mitch Phillips | 8520f4b | 2023-06-01 14:22:32 +0200 | [diff] [blame] | 203 | my_sanitize := $(filter-out memtag_heap memtag_stack memtag_globals,$(my_sanitize)) |
| 204 | my_sanitize_diag := $(filter-out memtag_heap memtag_stack memtag_globals,$(my_sanitize_diag)) |
Mitch Phillips | b71a875 | 2021-05-19 11:29:02 -0700 | [diff] [blame] | 205 | endif |
| 206 | |
Ivan Lozano | 702e8bd | 2018-03-15 14:49:20 -0700 | [diff] [blame] | 207 | # Disable sanitizers which need the UBSan runtime for host targets. |
Vishwath Mohan | 96a130b | 2017-11-17 11:19:36 -0800 | [diff] [blame] | 208 | ifdef LOCAL_IS_HOST_MODULE |
| 209 | my_sanitize := $(filter-out cfi,$(my_sanitize)) |
| 210 | my_sanitize_diag := $(filter-out cfi,$(my_sanitize_diag)) |
Ivan Lozano | 702e8bd | 2018-03-15 14:49:20 -0700 | [diff] [blame] | 211 | my_sanitize := $(filter-out signed-integer-overflow unsigned-integer-overflow integer_overflow,$(my_sanitize)) |
| 212 | my_sanitize_diag := $(filter-out signed-integer-overflow unsigned-integer-overflow integer_overflow,$(my_sanitize_diag)) |
Vishwath Mohan | 96a130b | 2017-11-17 11:19:36 -0800 | [diff] [blame] | 213 | endif |
| 214 | |
Ivan Lozano | 4a36373 | 2017-06-28 09:11:26 -0700 | [diff] [blame] | 215 | # Support for local sanitize blacklist paths. |
| 216 | ifneq ($(my_sanitize)$(my_global_sanitize),) |
Pirama Arumuga Nainar | 5655833 | 2020-07-30 15:18:07 -0700 | [diff] [blame] | 217 | ifneq ($(LOCAL_SANITIZE_BLOCKLIST),) |
| 218 | my_cflags += -fsanitize-blacklist=$(LOCAL_PATH)/$(LOCAL_SANITIZE_BLOCKLIST) |
| 219 | endif |
Ivan Lozano | 4a36373 | 2017-06-28 09:11:26 -0700 | [diff] [blame] | 220 | endif |
| 221 | |
Ivan Lozano | b4749cb | 2017-07-21 10:33:32 -0700 | [diff] [blame] | 222 | # Disable integer_overflow if LOCAL_NOSANITIZE=integer. |
Ivan Lozano | 4a36373 | 2017-06-28 09:11:26 -0700 | [diff] [blame] | 223 | ifneq ($(filter integer_overflow, $(my_global_sanitize) $(my_sanitize)),) |
| 224 | ifneq ($(filter integer, $(strip $(LOCAL_NOSANITIZE))),) |
| 225 | my_sanitize := $(filter-out integer_overflow,$(my_sanitize)) |
| 226 | my_sanitize_diag := $(filter-out integer_overflow,$(my_sanitize_diag)) |
| 227 | endif |
| 228 | endif |
| 229 | |
Evgenii Stepanov | 4282366 | 2016-05-12 13:07:17 -0700 | [diff] [blame] | 230 | my_nosanitize = $(strip $(LOCAL_NOSANITIZE)) |
| 231 | ifneq ($(my_nosanitize),) |
| 232 | my_sanitize := $(filter-out $(my_nosanitize),$(my_sanitize)) |
| 233 | endif |
| 234 | |
Evgenii Stepanov | 8841a7f | 2018-07-27 11:54:32 -0700 | [diff] [blame] | 235 | ifneq ($(filter arm x86 x86_64,$(TARGET_$(LOCAL_2ND_ARCH_VAR_PREFIX)ARCH)),) |
| 236 | my_sanitize := $(filter-out hwaddress,$(my_sanitize)) |
Evgenii Stepanov | 3330b2f | 2021-01-13 12:14:55 -0800 | [diff] [blame] | 237 | my_sanitize := $(filter-out memtag_heap,$(my_sanitize)) |
Florian Mayer | 548a2ad | 2022-08-31 22:25:55 +0000 | [diff] [blame] | 238 | my_sanitize := $(filter-out memtag_stack,$(my_sanitize)) |
Mitch Phillips | 8520f4b | 2023-06-01 14:22:32 +0200 | [diff] [blame] | 239 | my_sanitize := $(filter-out memtag_globals,$(my_sanitize)) |
Evgenii Stepanov | 8841a7f | 2018-07-27 11:54:32 -0700 | [diff] [blame] | 240 | endif |
| 241 | |
| 242 | ifneq ($(filter hwaddress,$(my_sanitize)),) |
| 243 | my_sanitize := $(filter-out address,$(my_sanitize)) |
Florian Mayer | 548a2ad | 2022-08-31 22:25:55 +0000 | [diff] [blame] | 244 | my_sanitize := $(filter-out memtag_stack,$(my_sanitize)) |
Mitch Phillips | 8520f4b | 2023-06-01 14:22:32 +0200 | [diff] [blame] | 245 | my_sanitize := $(filter-out memtag_globals,$(my_sanitize)) |
Florian Mayer | 548a2ad | 2022-08-31 22:25:55 +0000 | [diff] [blame] | 246 | my_sanitize := $(filter-out memtag_heap,$(my_sanitize)) |
Evgenii Stepanov | 8841a7f | 2018-07-27 11:54:32 -0700 | [diff] [blame] | 247 | my_sanitize := $(filter-out thread,$(my_sanitize)) |
Evgenii Stepanov | 88a95a3 | 2018-12-04 17:06:45 -0800 | [diff] [blame] | 248 | my_sanitize := $(filter-out cfi,$(my_sanitize)) |
Evgenii Stepanov | 8841a7f | 2018-07-27 11:54:32 -0700 | [diff] [blame] | 249 | endif |
| 250 | |
| 251 | ifneq ($(filter hwaddress,$(my_sanitize)),) |
| 252 | my_shared_libraries += $($(LOCAL_2ND_ARCH_VAR_PREFIX)HWADDRESS_SANITIZER_RUNTIME_LIBRARY) |
Evgenii Stepanov | ed90746 | 2018-11-01 15:43:14 -0700 | [diff] [blame] | 253 | ifneq ($(filter EXECUTABLES NATIVE_TESTS,$(LOCAL_MODULE_CLASS)),) |
Evgenii Stepanov | 8841a7f | 2018-07-27 11:54:32 -0700 | [diff] [blame] | 254 | ifeq ($(LOCAL_FORCE_STATIC_EXECUTABLE),true) |
Ryan Prichard | acf8b0f | 2019-10-21 20:47:53 -0700 | [diff] [blame] | 255 | my_static_libraries := $(my_static_libraries) \ |
| 256 | $($(LOCAL_2ND_ARCH_VAR_PREFIX)HWADDRESS_SANITIZER_STATIC_LIBRARY) \ |
| 257 | libdl |
Evgenii Stepanov | 8841a7f | 2018-07-27 11:54:32 -0700 | [diff] [blame] | 258 | endif |
| 259 | endif |
| 260 | endif |
| 261 | |
Mitch Phillips | 8520f4b | 2023-06-01 14:22:32 +0200 | [diff] [blame] | 262 | ifneq ($(filter memtag_heap memtag_stack memtag_globals,$(my_sanitize)),) |
Florian Mayer | 548a2ad | 2022-08-31 22:25:55 +0000 | [diff] [blame] | 263 | ifneq ($(filter memtag_heap,$(my_sanitize_diag)),) |
Evgenii Stepanov | 8566eb0 | 2024-02-01 11:34:59 -0800 | [diff] [blame] | 264 | my_ldflags += -fsanitize-memtag-mode=sync |
Florian Mayer | 548a2ad | 2022-08-31 22:25:55 +0000 | [diff] [blame] | 265 | my_sanitize_diag := $(filter-out memtag_heap,$(my_sanitize_diag)) |
| 266 | else |
Evgenii Stepanov | 8566eb0 | 2024-02-01 11:34:59 -0800 | [diff] [blame] | 267 | my_ldflags += -fsanitize-memtag-mode=async |
Florian Mayer | fe3e537 | 2022-08-31 18:37:51 +0000 | [diff] [blame] | 268 | endif |
Florian Mayer | 548a2ad | 2022-08-31 22:25:55 +0000 | [diff] [blame] | 269 | endif |
| 270 | |
Florian Mayer | 2a67626 | 2023-06-07 15:02:22 -0700 | [diff] [blame] | 271 | # Ignore SANITIZE_TARGET_DIAG=memtag_heap without SANITIZE_TARGET=memtag_heap |
| 272 | # This can happen if a condition above filters out memtag_heap from |
| 273 | # my_sanitize. It is easier to handle all of these cases here centrally. |
| 274 | ifneq ($(filter memtag_heap,$(my_sanitize_diag)),) |
| 275 | my_sanitize_diag := $(filter-out memtag_heap,$(my_sanitize_diag)) |
| 276 | endif |
| 277 | |
Florian Mayer | 548a2ad | 2022-08-31 22:25:55 +0000 | [diff] [blame] | 278 | ifneq ($(filter memtag_heap,$(my_sanitize)),) |
| 279 | my_cflags += -fsanitize=memtag-heap |
Evgenii Stepanov | 8566eb0 | 2024-02-01 11:34:59 -0800 | [diff] [blame] | 280 | my_ldflags += -fsanitize=memtag-heap |
Evgenii Stepanov | 3330b2f | 2021-01-13 12:14:55 -0800 | [diff] [blame] | 281 | my_sanitize := $(filter-out memtag_heap,$(my_sanitize)) |
| 282 | endif |
| 283 | |
Florian Mayer | 548a2ad | 2022-08-31 22:25:55 +0000 | [diff] [blame] | 284 | ifneq ($(filter memtag_stack,$(my_sanitize)),) |
| 285 | my_cflags += -fsanitize=memtag-stack |
Evgenii Stepanov | 8566eb0 | 2024-02-01 11:34:59 -0800 | [diff] [blame] | 286 | my_ldflags += -fsanitize=memtag-stack |
Florian Mayer | 548a2ad | 2022-08-31 22:25:55 +0000 | [diff] [blame] | 287 | my_cflags += -march=armv8a+memtag |
| 288 | my_ldflags += -march=armv8a+memtag |
| 289 | my_asflags += -march=armv8a+memtag |
| 290 | my_sanitize := $(filter-out memtag_stack,$(my_sanitize)) |
| 291 | endif |
Evgenii Stepanov | 3330b2f | 2021-01-13 12:14:55 -0800 | [diff] [blame] | 292 | |
Mitch Phillips | 8520f4b | 2023-06-01 14:22:32 +0200 | [diff] [blame] | 293 | ifneq ($(filter memtag_globals,$(my_sanitize)),) |
| 294 | my_cflags += -fsanitize=memtag-globals |
Evgenii Stepanov | 8566eb0 | 2024-02-01 11:34:59 -0800 | [diff] [blame] | 295 | my_ldflags += -fsanitize=memtag-globals |
Mitch Phillips | 8520f4b | 2023-06-01 14:22:32 +0200 | [diff] [blame] | 296 | # TODO(mitchp): For now, enable memtag-heap with memtag-globals because the |
| 297 | # linker isn't new enough |
| 298 | # (https://reviews.llvm.org/differential/changeset/?ref=4243566). |
| 299 | my_sanitize := $(filter-out memtag_globals,$(my_sanitize)) |
| 300 | endif |
| 301 | |
Dan Albert | a6311b7 | 2015-07-30 10:17:33 -0700 | [diff] [blame] | 302 | # TSAN is not supported on 32-bit architectures. For non-multilib cases, make |
| 303 | # its use an error. For multilib cases, don't use it for the 32-bit case. |
| 304 | ifneq ($(filter thread,$(my_sanitize)),) |
| 305 | ifeq ($(my_32_64_bit_suffix),32) |
| 306 | ifeq ($(my_module_multilib),both) |
| 307 | my_sanitize := $(filter-out thread,$(my_sanitize)) |
| 308 | else |
| 309 | $(error $(LOCAL_PATH): $(LOCAL_MODULE): TSAN cannot be used for 32-bit modules.) |
| 310 | endif |
Yabin Cui | e77c32e | 2017-10-19 14:33:58 -0700 | [diff] [blame] | 311 | else |
| 312 | my_shared_libraries += $(TSAN_RUNTIME_LIBRARY) |
Dan Albert | a6311b7 | 2015-07-30 10:17:33 -0700 | [diff] [blame] | 313 | endif |
| 314 | endif |
| 315 | |
Evgenii Stepanov | 7dcb8b8 | 2016-05-06 18:15:57 -0700 | [diff] [blame] | 316 | ifneq ($(filter safe-stack,$(my_sanitize)),) |
| 317 | ifeq ($(my_32_64_bit_suffix),32) |
| 318 | my_sanitize := $(filter-out safe-stack,$(my_sanitize)) |
| 319 | endif |
| 320 | endif |
| 321 | |
Kostya Kortchinsky | 2cfa997 | 2018-06-14 11:02:15 -0700 | [diff] [blame] | 322 | # Disable Scudo if ASan or TSan is enabled. |
Evgenii Stepanov | 8841a7f | 2018-07-27 11:54:32 -0700 | [diff] [blame] | 323 | ifneq ($(filter address thread hwaddress,$(my_sanitize)),) |
Kostya Kortchinsky | 2cfa997 | 2018-06-14 11:02:15 -0700 | [diff] [blame] | 324 | my_sanitize := $(filter-out scudo,$(my_sanitize)) |
| 325 | endif |
| 326 | |
Kostya Kortchinsky | 0273240 | 2019-02-01 09:06:42 -0800 | [diff] [blame] | 327 | # Or if disabled globally. |
Anton Hansson | 8dab0a6 | 2019-03-28 15:45:40 +0000 | [diff] [blame] | 328 | ifeq ($(PRODUCT_DISABLE_SCUDO),true) |
Kostya Kortchinsky | 0273240 | 2019-02-01 09:06:42 -0800 | [diff] [blame] | 329 | my_sanitize := $(filter-out scudo,$(my_sanitize)) |
| 330 | endif |
| 331 | |
Evgenii Stepanov | 5adfcb1 | 2015-06-25 16:38:25 -0700 | [diff] [blame] | 332 | # Undefined symbols can occur if a non-sanitized library links |
| 333 | # sanitized static libraries. That's OK, because the executable |
| 334 | # always depends on the ASan runtime library, which defines these |
| 335 | # symbols. |
Evgenii Stepanov | 912b51f | 2016-05-19 17:49:51 -0700 | [diff] [blame] | 336 | ifneq ($(filter address thread,$(strip $(SANITIZE_TARGET))),) |
Evgenii Stepanov | 5adfcb1 | 2015-06-25 16:38:25 -0700 | [diff] [blame] | 337 | ifndef LOCAL_IS_HOST_MODULE |
| 338 | ifeq ($(LOCAL_MODULE_CLASS),SHARED_LIBRARIES) |
| 339 | ifeq ($(my_sanitize),) |
| 340 | my_allow_undefined_symbols := true |
| 341 | endif |
| 342 | endif |
| 343 | endif |
| 344 | endif |
| 345 | |
Dan Albert | b5b2ffe | 2015-04-16 18:07:07 -0700 | [diff] [blame] | 346 | ifneq ($(filter default-ub,$(my_sanitize)),) |
| 347 | my_sanitize := $(CLANG_DEFAULT_UB_CHECKS) |
Dan Albert | 08cca28 | 2014-12-11 18:56:26 -0800 | [diff] [blame] | 348 | endif |
| 349 | |
Mitch Phillips | ee8f4a0 | 2019-05-01 14:37:33 -0700 | [diff] [blame] | 350 | ifneq ($(filter fuzzer,$(my_sanitize)),) |
| 351 | # SANITIZE_TARGET='fuzzer' actually means to create the fuzzer coverage |
| 352 | # information, not to link against the fuzzer main(). |
| 353 | my_sanitize := $(filter-out fuzzer,$(my_sanitize)) |
| 354 | my_sanitize += fuzzer-no-link |
Mitch Phillips | d51048a | 2022-03-02 01:25:22 +0000 | [diff] [blame] | 355 | |
| 356 | # TODO(b/131771163): Disable LTO for fuzzer builds. Note that Cfi causes |
| 357 | # dependency on LTO. |
| 358 | my_sanitize := $(filter-out cfi,$(my_sanitize)) |
| 359 | my_cflags += -fno-lto |
| 360 | my_ldflags += -fno-lto |
Joey Jiao | 0e6d1c9 | 2023-11-30 07:34:18 +0530 | [diff] [blame] | 361 | |
| 362 | # TODO(b/142430592): Upstream linker scripts for sanitizer runtime libraries |
| 363 | # discard the sancov_lowest_stack symbol, because it's emulated TLS (and thus |
| 364 | # doesn't match the linker script due to the "__emutls_v." prefix). |
| 365 | my_cflags += -fno-sanitize-coverage=stack-depth |
| 366 | my_ldflags += -fno-sanitize-coverage=stack-depth |
Ivan Krasin | 74b32b8 | 2015-09-18 11:54:43 -0700 | [diff] [blame] | 367 | endif |
| 368 | |
Ivan Lozano | 4a36373 | 2017-06-28 09:11:26 -0700 | [diff] [blame] | 369 | ifneq ($(filter integer_overflow,$(my_sanitize)),) |
Ivan Lozano | 702e8bd | 2018-03-15 14:49:20 -0700 | [diff] [blame] | 370 | # Respect LOCAL_NOSANITIZE for integer-overflow flags. |
| 371 | ifeq ($(filter signed-integer-overflow, $(strip $(LOCAL_NOSANITIZE))),) |
| 372 | my_sanitize += signed-integer-overflow |
| 373 | endif |
| 374 | ifeq ($(filter unsigned-integer-overflow, $(strip $(LOCAL_NOSANITIZE))),) |
| 375 | my_sanitize += unsigned-integer-overflow |
| 376 | endif |
| 377 | my_cflags += $(INTEGER_OVERFLOW_EXTRA_CFLAGS) |
Ivan Lozano | 4a36373 | 2017-06-28 09:11:26 -0700 | [diff] [blame] | 378 | |
Ivan Lozano | 702e8bd | 2018-03-15 14:49:20 -0700 | [diff] [blame] | 379 | # Check for diagnostics mode. |
| 380 | ifneq ($(filter integer_overflow,$(my_sanitize_diag)),) |
| 381 | ifneq ($(filter SHARED_LIBRARIES EXECUTABLES,$(LOCAL_MODULE_CLASS)),) |
| 382 | ifneq ($(LOCAL_FORCE_STATIC_EXECUTABLE),true) |
Ivan Lozano | 911cb99 | 2018-02-21 13:41:05 -0800 | [diff] [blame] | 383 | my_sanitize_diag += signed-integer-overflow |
| 384 | my_sanitize_diag += unsigned-integer-overflow |
Ivan Lozano | 702e8bd | 2018-03-15 14:49:20 -0700 | [diff] [blame] | 385 | else |
| 386 | $(call pretty-error,Make cannot apply integer overflow diagnostics to static binary.) |
Ivan Lozano | 4a36373 | 2017-06-28 09:11:26 -0700 | [diff] [blame] | 387 | endif |
Ivan Lozano | 702e8bd | 2018-03-15 14:49:20 -0700 | [diff] [blame] | 388 | else |
| 389 | $(call pretty-error,Make cannot apply integer overflow diagnostics to static library.) |
Ivan Lozano | 4a36373 | 2017-06-28 09:11:26 -0700 | [diff] [blame] | 390 | endif |
| 391 | endif |
| 392 | my_sanitize := $(filter-out integer_overflow,$(my_sanitize)) |
| 393 | endif |
| 394 | |
| 395 | # Makes sure integer_overflow diagnostics is removed from the diagnostics list |
| 396 | # even if integer_overflow is not set for some reason. |
| 397 | ifneq ($(filter integer_overflow,$(my_sanitize_diag)),) |
| 398 | my_sanitize_diag := $(filter-out integer_overflow,$(my_sanitize_diag)) |
| 399 | endif |
| 400 | |
Dan Albert | 08cca28 | 2014-12-11 18:56:26 -0800 | [diff] [blame] | 401 | ifneq ($(my_sanitize),) |
Stephen Hines | e8119e9 | 2015-11-09 16:32:11 -0800 | [diff] [blame] | 402 | fsanitize_arg := $(subst $(space),$(comma),$(my_sanitize)) |
Dan Albert | 08cca28 | 2014-12-11 18:56:26 -0800 | [diff] [blame] | 403 | my_cflags += -fsanitize=$(fsanitize_arg) |
Evgenii Stepanov | 9b82b3f | 2018-08-31 12:57:26 -0700 | [diff] [blame] | 404 | my_asflags += -fsanitize=$(fsanitize_arg) |
Dan Albert | 08cca28 | 2014-12-11 18:56:26 -0800 | [diff] [blame] | 405 | |
Mitch Phillips | ee8f4a0 | 2019-05-01 14:37:33 -0700 | [diff] [blame] | 406 | # When fuzzing, we wish to crash with diagnostics on any bug. |
| 407 | ifneq ($(filter fuzzer-no-link,$(my_sanitize)),) |
| 408 | my_cflags += -fno-sanitize-trap=all |
| 409 | my_cflags += -fno-sanitize-recover=all |
| 410 | my_ldflags += -fsanitize=fuzzer-no-link |
| 411 | else ifdef LOCAL_IS_HOST_MODULE |
Dan Albert | abf4bc9 | 2015-06-16 23:27:34 -0700 | [diff] [blame] | 412 | my_cflags += -fno-sanitize-recover=all |
Dan Albert | 08cca28 | 2014-12-11 18:56:26 -0800 | [diff] [blame] | 413 | my_ldflags += -fsanitize=$(fsanitize_arg) |
Dan Albert | abf4bc9 | 2015-06-16 23:27:34 -0700 | [diff] [blame] | 414 | else |
Evgenii Stepanov | 71faa19 | 2016-05-19 17:45:21 -0700 | [diff] [blame] | 415 | my_cflags += -fsanitize-trap=all |
Evgenii Stepanov | 55f73e6 | 2016-05-12 13:07:36 -0700 | [diff] [blame] | 416 | ifneq ($(filter address thread,$(my_sanitize)),) |
Evgenii Stepanov | 71faa19 | 2016-05-19 17:45:21 -0700 | [diff] [blame] | 417 | my_cflags += -fno-sanitize-trap=address,thread |
Evgenii Stepanov | 55f73e6 | 2016-05-12 13:07:36 -0700 | [diff] [blame] | 418 | my_shared_libraries += libdl |
| 419 | endif |
Dan Albert | 08cca28 | 2014-12-11 18:56:26 -0800 | [diff] [blame] | 420 | endif |
| 421 | endif |
| 422 | |
Evgenii Stepanov | 202c7a7 | 2016-07-07 10:56:39 -0700 | [diff] [blame] | 423 | ifneq ($(filter cfi,$(my_sanitize)),) |
Evgenii Stepanov | 81bea1b | 2017-01-20 14:12:08 -0800 | [diff] [blame] | 424 | # __cfi_check needs to be built as Thumb (see the code in linker_cfi.cpp). |
| 425 | # LLVM is not set up to do this on a function basis, so force Thumb on the |
| 426 | # entire module. |
| 427 | LOCAL_ARM_MODE := thumb |
Vishwath Mohan | 5b69c06 | 2017-02-14 07:55:37 -0800 | [diff] [blame] | 428 | my_cflags += $(CFI_EXTRA_CFLAGS) |
Evgenii Stepanov | 9b82b3f | 2018-08-31 12:57:26 -0700 | [diff] [blame] | 429 | my_asflags += $(CFI_EXTRA_ASFLAGS) |
Vishwath Mohan | 85f7244 | 2017-11-01 09:21:20 +0000 | [diff] [blame] | 430 | # Only append the default visibility flag if -fvisibility has not already been |
| 431 | # set to hidden. |
| 432 | ifeq ($(filter -fvisibility=hidden,$(LOCAL_CFLAGS)),) |
| 433 | my_cflags += -fvisibility=default |
| 434 | endif |
Vishwath Mohan | 5b69c06 | 2017-02-14 07:55:37 -0800 | [diff] [blame] | 435 | my_ldflags += $(CFI_EXTRA_LDFLAGS) |
Vishwath Mohan | 85f7244 | 2017-11-01 09:21:20 +0000 | [diff] [blame] | 436 | |
| 437 | ifeq ($(LOCAL_FORCE_STATIC_EXECUTABLE),true) |
| 438 | my_ldflags := $(filter-out -fsanitize-cfi-cross-dso,$(my_ldflags)) |
| 439 | my_cflags := $(filter-out -fsanitize-cfi-cross-dso,$(my_cflags)) |
| 440 | else |
| 441 | # Apply the version script to non-static executables |
| 442 | my_ldflags += -Wl,--version-script,build/soong/cc/config/cfi_exports.map |
| 443 | LOCAL_ADDITIONAL_DEPENDENCIES += build/soong/cc/config/cfi_exports.map |
| 444 | endif |
Evgenii Stepanov | 202c7a7 | 2016-07-07 10:56:39 -0700 | [diff] [blame] | 445 | endif |
| 446 | |
Chih-Hung Hsieh | ad741e6 | 2016-03-09 14:54:55 -0800 | [diff] [blame] | 447 | # If local or global modules need ASAN, add linker flags. |
| 448 | ifneq ($(filter address,$(my_global_sanitize) $(my_sanitize)),) |
Dan Albert | 4ae5d4b | 2014-10-31 16:23:08 -0700 | [diff] [blame] | 449 | my_ldflags += $(ADDRESS_SANITIZER_CONFIG_EXTRA_LDFLAGS) |
| 450 | ifdef LOCAL_IS_HOST_MODULE |
Dan Albert | 08cca28 | 2014-12-11 18:56:26 -0800 | [diff] [blame] | 451 | # -nodefaultlibs (provided with libc++) prevents the driver from linking |
| 452 | # libraries needed with -fsanitize=address. http://b/18650275 (WAI) |
Dan Albert | 1f0d530 | 2015-04-28 14:55:50 -0700 | [diff] [blame] | 453 | my_ldflags += -Wl,--no-as-needed |
Dan Albert | 4ae5d4b | 2014-10-31 16:23:08 -0700 | [diff] [blame] | 454 | else |
Chih-Hung Hsieh | ad741e6 | 2016-03-09 14:54:55 -0800 | [diff] [blame] | 455 | # Add asan libraries unless LOCAL_MODULE is the asan library. |
Evgenii Stepanov | f0b15e1 | 2015-04-24 16:34:47 -0700 | [diff] [blame] | 456 | # ASan runtime library must be the first in the link order. |
Chih-Hung Hsieh | ad741e6 | 2016-03-09 14:54:55 -0800 | [diff] [blame] | 457 | ifeq (,$(filter $(LOCAL_MODULE),$($(LOCAL_2ND_ARCH_VAR_PREFIX)ADDRESS_SANITIZER_RUNTIME_LIBRARY))) |
| 458 | my_shared_libraries := $($(LOCAL_2ND_ARCH_VAR_PREFIX)ADDRESS_SANITIZER_RUNTIME_LIBRARY) \ |
| 459 | $(my_shared_libraries) |
| 460 | endif |
Chih-Hung Hsieh | ad741e6 | 2016-03-09 14:54:55 -0800 | [diff] [blame] | 461 | |
| 462 | # Do not add unnecessary dependency in shared libraries. |
| 463 | ifeq ($(LOCAL_MODULE_CLASS),SHARED_LIBRARIES) |
| 464 | my_ldflags += -Wl,--as-needed |
| 465 | endif |
Ying Wang | a05e222 | 2015-08-17 16:13:24 -0700 | [diff] [blame] | 466 | |
Mikhail Naganov | aa73cef | 2018-12-20 15:55:08 -0800 | [diff] [blame] | 467 | ifneq ($(filter EXECUTABLES NATIVE_TESTS,$(LOCAL_MODULE_CLASS)),) |
Colin Cross | d08699e | 2016-07-17 15:28:07 -0700 | [diff] [blame] | 468 | ifneq ($(LOCAL_FORCE_STATIC_EXECUTABLE),true) |
| 469 | my_linker := $($(LOCAL_2ND_ARCH_VAR_PREFIX)ADDRESS_SANITIZER_LINKER) |
| 470 | # Make sure linker_asan get installed. |
Logan Chien | c6d2cf8 | 2019-01-31 17:07:50 +0800 | [diff] [blame] | 471 | $(LOCAL_INSTALLED_MODULE) : | $(PRODUCT_OUT)$($(LOCAL_2ND_ARCH_VAR_PREFIX)ADDRESS_SANITIZER_LINKER_FILE) |
Colin Cross | d08699e | 2016-07-17 15:28:07 -0700 | [diff] [blame] | 472 | endif |
| 473 | endif |
Dan Albert | 08cca28 | 2014-12-11 18:56:26 -0800 | [diff] [blame] | 474 | endif |
| 475 | endif |
| 476 | |
Chih-Hung Hsieh | ad741e6 | 2016-03-09 14:54:55 -0800 | [diff] [blame] | 477 | # If local module needs ASAN, add compiler flags. |
| 478 | ifneq ($(filter address,$(my_sanitize)),) |
| 479 | # Frame pointer based unwinder in ASan requires ARM frame setup. |
| 480 | LOCAL_ARM_MODE := arm |
| 481 | my_cflags += $(ADDRESS_SANITIZER_CONFIG_EXTRA_CFLAGS) |
| 482 | ifndef LOCAL_IS_HOST_MODULE |
| 483 | my_cflags += -mllvm -asan-globals=0 |
| 484 | endif |
| 485 | endif |
| 486 | |
Evgenii Stepanov | aec1ffc | 2018-08-28 13:52:08 -0700 | [diff] [blame] | 487 | # If local module needs HWASAN, add compiler flags. |
| 488 | ifneq ($(filter hwaddress,$(my_sanitize)),) |
| 489 | my_cflags += $(HWADDRESS_SANITIZER_CONFIG_EXTRA_CFLAGS) |
Florian Mayer | 97222e1 | 2023-06-01 14:16:28 -0700 | [diff] [blame] | 490 | |
| 491 | ifneq ($(filter EXECUTABLES NATIVE_TESTS,$(LOCAL_MODULE_CLASS)),) |
| 492 | ifneq ($(LOCAL_FORCE_STATIC_EXECUTABLE),true) |
| 493 | my_linker := /system/bin/linker_hwasan64 |
| 494 | endif |
| 495 | endif |
| 496 | |
Evgenii Stepanov | aec1ffc | 2018-08-28 13:52:08 -0700 | [diff] [blame] | 497 | endif |
| 498 | |
Dan Willemsen | 58634e1 | 2020-03-06 18:09:06 -0800 | [diff] [blame] | 499 | # Use minimal diagnostics when integer overflow is enabled; never do it for HOST modules |
| 500 | ifeq ($(LOCAL_IS_HOST_MODULE),) |
Ivan Lozano | 911cb99 | 2018-02-21 13:41:05 -0800 | [diff] [blame] | 501 | # Pre-emptively add UBSAN minimal runtime incase a static library dependency requires it |
| 502 | ifeq ($(filter STATIC_LIBRARIES,$(LOCAL_MODULE_CLASS)),) |
| 503 | ifndef LOCAL_SDK_VERSION |
| 504 | my_static_libraries += $($(LOCAL_2ND_ARCH_VAR_PREFIX)UBSAN_MINIMAL_RUNTIME_LIBRARY) |
Ivan Lozano | e508169 | 2018-05-11 14:09:36 -0700 | [diff] [blame] | 505 | my_ldflags += -Wl,--exclude-libs,$($(LOCAL_2ND_ARCH_VAR_PREFIX)UBSAN_MINIMAL_RUNTIME_LIBRARY).a |
Ivan Lozano | 911cb99 | 2018-02-21 13:41:05 -0800 | [diff] [blame] | 506 | endif |
| 507 | endif |
| 508 | ifneq ($(filter unsigned-integer-overflow signed-integer-overflow integer,$(my_sanitize)),) |
Kostya Kortchinsky | 47c10eb | 2018-10-11 08:56:12 -0700 | [diff] [blame] | 509 | ifeq ($(filter unsigned-integer-overflow signed-integer-overflow integer,$(my_sanitize_diag)),) |
Ivan Lozano | 911cb99 | 2018-02-21 13:41:05 -0800 | [diff] [blame] | 510 | ifeq ($(filter cfi,$(my_sanitize_diag)),) |
Mitch Phillips | ee8f4a0 | 2019-05-01 14:37:33 -0700 | [diff] [blame] | 511 | ifeq ($(filter address hwaddress fuzzer-no-link,$(my_sanitize)),) |
Ivan Lozano | 911cb99 | 2018-02-21 13:41:05 -0800 | [diff] [blame] | 512 | my_cflags += -fsanitize-minimal-runtime |
| 513 | my_cflags += -fno-sanitize-trap=integer |
| 514 | my_cflags += -fno-sanitize-recover=integer |
| 515 | endif |
| 516 | endif |
| 517 | endif |
| 518 | endif |
| 519 | endif |
| 520 | |
Kostya Kortchinsky | 47c10eb | 2018-10-11 08:56:12 -0700 | [diff] [blame] | 521 | # For Scudo, we opt for the minimal runtime, unless some diagnostics are enabled. |
| 522 | ifneq ($(filter scudo,$(my_sanitize)),) |
| 523 | ifeq ($(filter unsigned-integer-overflow signed-integer-overflow integer cfi,$(my_sanitize_diag)),) |
| 524 | my_cflags += -fsanitize-minimal-runtime |
| 525 | endif |
| 526 | ifneq ($(filter -fsanitize-minimal-runtime,$(my_cflags)),) |
| 527 | my_shared_libraries += $($(LOCAL_2ND_ARCH_VAR_PREFIX)SCUDO_MINIMAL_RUNTIME_LIBRARY) |
| 528 | else |
| 529 | my_shared_libraries += $($(LOCAL_2ND_ARCH_VAR_PREFIX)SCUDO_RUNTIME_LIBRARY) |
| 530 | endif |
| 531 | endif |
| 532 | |
Dan Albert | 9f17655 | 2015-04-28 11:26:45 -0700 | [diff] [blame] | 533 | ifneq ($(strip $(LOCAL_SANITIZE_RECOVER)),) |
| 534 | recover_arg := $(subst $(space),$(comma),$(LOCAL_SANITIZE_RECOVER)), |
Dan Albert | 4111d48 | 2015-04-16 18:08:44 -0700 | [diff] [blame] | 535 | my_cflags += -fsanitize-recover=$(recover_arg) |
| 536 | endif |
Evgenii Stepanov | 202c7a7 | 2016-07-07 10:56:39 -0700 | [diff] [blame] | 537 | |
Ivan Lozano | 5fb2de7 | 2018-12-12 10:04:34 -0800 | [diff] [blame] | 538 | ifneq ($(strip $(LOCAL_SANITIZE_NO_RECOVER)),) |
| 539 | no_recover_arg := $(subst $(space),$(comma),$(LOCAL_SANITIZE_NO_RECOVER)), |
| 540 | my_cflags += -fno-sanitize-recover=$(no_recover_arg) |
| 541 | endif |
| 542 | |
Vishwath Mohan | 8dcfdce | 2017-01-18 17:50:29 -0800 | [diff] [blame] | 543 | ifneq ($(my_sanitize_diag),) |
Vishwath Mohan | 85f7244 | 2017-11-01 09:21:20 +0000 | [diff] [blame] | 544 | # TODO(vishwath): Add diagnostic support for static executables once |
| 545 | # we switch to clang-4393122 (which adds the static ubsan runtime |
| 546 | # that this depends on) |
| 547 | ifneq ($(LOCAL_FORCE_STATIC_EXECUTABLE),true) |
| 548 | notrap_arg := $(subst $(space),$(comma),$(my_sanitize_diag)), |
| 549 | my_cflags += -fno-sanitize-trap=$(notrap_arg) |
| 550 | # Diagnostic requires a runtime library, unless ASan or TSan are also enabled. |
Evgenii Stepanov | 8841a7f | 2018-07-27 11:54:32 -0700 | [diff] [blame] | 551 | ifeq ($(filter address thread scudo hwaddress,$(my_sanitize)),) |
Vishwath Mohan | 85f7244 | 2017-11-01 09:21:20 +0000 | [diff] [blame] | 552 | # Does not have to be the first DT_NEEDED unlike ASan. |
| 553 | my_shared_libraries += $($(LOCAL_2ND_ARCH_VAR_PREFIX)UBSAN_RUNTIME_LIBRARY) |
| 554 | endif |
Evgenii Stepanov | 202c7a7 | 2016-07-07 10:56:39 -0700 | [diff] [blame] | 555 | endif |
| 556 | endif |
Chih-Hung Hsieh | 1871062 | 2018-11-17 20:18:08 -0800 | [diff] [blame] | 557 | |
| 558 | # http://b/119329758, Android core does not boot up with this sanitizer yet. |
| 559 | # Previously sanitized modules might not pass new implicit-integer-sign-change check. |
| 560 | # Disable this check unless it has been explicitly specified. |
| 561 | ifneq ($(findstring fsanitize,$(my_cflags)),) |
| 562 | ifneq ($(findstring integer,$(my_cflags)),) |
| 563 | ifeq ($(findstring sanitize=implicit-integer-sign-change,$(my_cflags)),) |
| 564 | my_cflags += -fno-sanitize=implicit-integer-sign-change |
| 565 | endif |
| 566 | endif |
| 567 | endif |
Yabin Cui | 462c12d | 2021-01-14 14:05:54 -0800 | [diff] [blame] | 568 | |
| 569 | # http://b/177566116, libc++ may crash with this sanitizer. |
| 570 | # Disable this check unless it has been explicitly specified. |
| 571 | ifneq ($(findstring fsanitize,$(my_cflags)),) |
| 572 | ifneq ($(findstring integer,$(my_cflags)),) |
| 573 | ifeq ($(findstring sanitize=unsigned-shift-base,$(my_cflags)),) |
| 574 | my_cflags += -fno-sanitize=unsigned-shift-base |
| 575 | endif |
| 576 | endif |
| 577 | endif |