2017-12-09 09:31:51 +08:00
|
|
|
include_directories(..)
|
|
|
|
|
|
|
|
# Runtime library sources and build flags.
|
|
|
|
set(HWASAN_RTL_SOURCES
|
|
|
|
hwasan.cc
|
|
|
|
hwasan_allocator.cc
|
2018-04-24 02:19:23 +08:00
|
|
|
hwasan_dynamic_shadow.cc
|
2017-12-09 09:31:51 +08:00
|
|
|
hwasan_interceptors.cc
|
|
|
|
hwasan_linux.cc
|
2018-12-20 17:10:03 +08:00
|
|
|
hwasan_memintrinsics.cc
|
2018-04-24 02:19:23 +08:00
|
|
|
hwasan_poisoning.cc
|
2017-12-09 09:31:51 +08:00
|
|
|
hwasan_report.cc
|
|
|
|
hwasan_thread.cc
|
2018-09-25 07:03:34 +08:00
|
|
|
hwasan_thread_list.cc
|
2017-12-09 09:31:51 +08:00
|
|
|
)
|
|
|
|
|
|
|
|
set(HWASAN_RTL_CXX_SOURCES
|
|
|
|
hwasan_new_delete.cc)
|
|
|
|
|
2018-07-10 21:00:17 +08:00
|
|
|
set(HWASAN_RTL_HEADERS
|
|
|
|
hwasan.h
|
|
|
|
hwasan_allocator.h
|
|
|
|
hwasan_dynamic_shadow.h
|
|
|
|
hwasan_flags.h
|
|
|
|
hwasan_flags.inc
|
|
|
|
hwasan_interface_internal.h
|
2019-02-16 02:38:14 +08:00
|
|
|
hwasan_malloc_bisect.h
|
2018-07-10 21:00:17 +08:00
|
|
|
hwasan_mapping.h
|
|
|
|
hwasan_poisoning.h
|
|
|
|
hwasan_report.h
|
2018-09-25 07:03:34 +08:00
|
|
|
hwasan_thread.h
|
|
|
|
hwasan_thread_list.h
|
|
|
|
)
|
2017-12-09 09:31:51 +08:00
|
|
|
|
[hwasan] Add a (almost) no-interceptor mode.
Summary:
The idea behind this change is to allow sanitization of libc. We are prototyping on Bionic,
but the tool interface will be general enough (or at least generalizable) to support any other libc.
When libc depends on libclang_rt.hwasan, the latter can not interpose libc functions.
In fact, majority of interceptors become unnecessary when libc code is instrumented.
This change gets rid of most hwasan interceptors and provides interface for libc to notify
hwasan about thread creation and destruction events. Some interceptors (pthread_create)
are kept under #ifdef to enable testing with uninstrumented libc. They are expressed in
terms of the new libc interface.
The new cmake switch, COMPILER_RT_HWASAN_WITH_INTERCEPTORS, ON by default, builds testing
version of the library with the aforementioned pthread_create interceptor.
With the OFF setting, the library becomes more of a libc plugin.
Reviewers: vitalybuka, kcc, jfb
Subscribers: srhines, kubamracek, mgorny, jfb, llvm-commits
Differential Revision: https://reviews.llvm.org/D50922
llvm-svn: 340216
2018-08-21 05:49:15 +08:00
|
|
|
set(HWASAN_DEFINITIONS)
|
|
|
|
append_list_if(COMPILER_RT_HWASAN_WITH_INTERCEPTORS HWASAN_WITH_INTERCEPTORS=1 HWASAN_DEFINITIONS)
|
|
|
|
|
2017-12-09 09:31:51 +08:00
|
|
|
set(HWASAN_RTL_CFLAGS ${SANITIZER_COMMON_CFLAGS})
|
|
|
|
append_rtti_flag(OFF HWASAN_RTL_CFLAGS)
|
2018-01-17 03:21:45 +08:00
|
|
|
append_list_if(COMPILER_RT_HAS_FPIC_FLAG -fPIC HWASAN_RTL_CFLAGS)
|
2017-12-09 09:31:51 +08:00
|
|
|
# Prevent clang from generating libc calls.
|
|
|
|
append_list_if(COMPILER_RT_HAS_FFREESTANDING_FLAG -ffreestanding HWASAN_RTL_CFLAGS)
|
|
|
|
|
|
|
|
set(HWASAN_DYNAMIC_LINK_FLAGS ${SANITIZER_COMMON_LINK_FLAGS})
|
|
|
|
|
[sanitizer] Use -Wl,-z,global on Android for sanitizers except UBsan
Summary:
This essentially reverts r337010 since it breaks UBSan, which is used
for a few platform libraries. The "-z global" flag is now added for
Scudo as well. The only other sanitizer shared libraries are for asan
and hwasan, which have also been reinstated to use the global flag.
Reviewers: cryptoad, eugenis
Reviewed By: cryptoad
Subscribers: kubamracek, mgorny, delcypher, #sanitizers, nickdesaulniers, chh, kongyi, pirama, llvm-commits
Differential Revision: https://reviews.llvm.org/D52770
llvm-svn: 343599
2018-10-03 00:19:42 +08:00
|
|
|
if(ANDROID)
|
|
|
|
# Put most Sanitizer shared libraries in the global group. For more details, see
|
|
|
|
# android-changes-for-ndk-developers.md#changes-to-library-search-order
|
|
|
|
if (COMPILER_RT_HAS_Z_GLOBAL)
|
|
|
|
list(APPEND HWASAN_DYNAMIC_LINK_FLAGS -Wl,-z,global)
|
|
|
|
endif()
|
|
|
|
endif()
|
|
|
|
|
2017-12-09 09:31:51 +08:00
|
|
|
set(HWASAN_DYNAMIC_CFLAGS ${HWASAN_RTL_CFLAGS})
|
|
|
|
append_list_if(COMPILER_RT_HAS_FTLS_MODEL_INITIAL_EXEC
|
|
|
|
-ftls-model=initial-exec HWASAN_DYNAMIC_CFLAGS)
|
|
|
|
append_list_if(MSVC /DEBUG HWASAN_DYNAMIC_LINK_FLAGS)
|
|
|
|
|
2019-02-16 02:25:26 +08:00
|
|
|
set(HWASAN_DYNAMIC_LIBS ${SANITIZER_CXX_ABI_LIBRARY} ${SANITIZER_COMMON_LINK_LIBS})
|
2017-12-09 09:31:51 +08:00
|
|
|
|
|
|
|
append_list_if(COMPILER_RT_HAS_LIBDL dl HWASAN_DYNAMIC_LIBS)
|
|
|
|
append_list_if(COMPILER_RT_HAS_LIBRT rt HWASAN_DYNAMIC_LIBS)
|
|
|
|
append_list_if(COMPILER_RT_HAS_LIBM m HWASAN_DYNAMIC_LIBS)
|
|
|
|
append_list_if(COMPILER_RT_HAS_LIBPTHREAD pthread HWASAN_DYNAMIC_LIBS)
|
|
|
|
|
2018-11-08 02:35:44 +08:00
|
|
|
if (TARGET cxx-headers OR HAVE_LIBCXX)
|
|
|
|
set(HWASAN_DEPS cxx-headers)
|
|
|
|
endif()
|
|
|
|
|
2017-12-09 09:31:51 +08:00
|
|
|
# Static runtime library.
|
|
|
|
add_compiler_rt_component(hwasan)
|
|
|
|
|
|
|
|
add_compiler_rt_object_libraries(RTHwasan
|
|
|
|
ARCHS ${HWASAN_SUPPORTED_ARCH}
|
2018-07-10 21:00:17 +08:00
|
|
|
SOURCES ${HWASAN_RTL_SOURCES}
|
|
|
|
ADDITIONAL_HEADERS ${HWASAN_RTL_HEADERS}
|
[hwasan] Add a (almost) no-interceptor mode.
Summary:
The idea behind this change is to allow sanitization of libc. We are prototyping on Bionic,
but the tool interface will be general enough (or at least generalizable) to support any other libc.
When libc depends on libclang_rt.hwasan, the latter can not interpose libc functions.
In fact, majority of interceptors become unnecessary when libc code is instrumented.
This change gets rid of most hwasan interceptors and provides interface for libc to notify
hwasan about thread creation and destruction events. Some interceptors (pthread_create)
are kept under #ifdef to enable testing with uninstrumented libc. They are expressed in
terms of the new libc interface.
The new cmake switch, COMPILER_RT_HWASAN_WITH_INTERCEPTORS, ON by default, builds testing
version of the library with the aforementioned pthread_create interceptor.
With the OFF setting, the library becomes more of a libc plugin.
Reviewers: vitalybuka, kcc, jfb
Subscribers: srhines, kubamracek, mgorny, jfb, llvm-commits
Differential Revision: https://reviews.llvm.org/D50922
llvm-svn: 340216
2018-08-21 05:49:15 +08:00
|
|
|
CFLAGS ${HWASAN_RTL_CFLAGS}
|
2018-11-08 02:35:44 +08:00
|
|
|
DEFS ${HWASAN_DEFINITIONS}
|
|
|
|
DEPS ${HWASAN_DEPS})
|
2017-12-09 09:31:51 +08:00
|
|
|
add_compiler_rt_object_libraries(RTHwasan_cxx
|
|
|
|
ARCHS ${HWASAN_SUPPORTED_ARCH}
|
2018-07-10 21:00:17 +08:00
|
|
|
SOURCES ${HWASAN_RTL_CXX_SOURCES}
|
|
|
|
ADDITIONAL_HEADERS ${HWASAN_RTL_HEADERS}
|
[hwasan] Add a (almost) no-interceptor mode.
Summary:
The idea behind this change is to allow sanitization of libc. We are prototyping on Bionic,
but the tool interface will be general enough (or at least generalizable) to support any other libc.
When libc depends on libclang_rt.hwasan, the latter can not interpose libc functions.
In fact, majority of interceptors become unnecessary when libc code is instrumented.
This change gets rid of most hwasan interceptors and provides interface for libc to notify
hwasan about thread creation and destruction events. Some interceptors (pthread_create)
are kept under #ifdef to enable testing with uninstrumented libc. They are expressed in
terms of the new libc interface.
The new cmake switch, COMPILER_RT_HWASAN_WITH_INTERCEPTORS, ON by default, builds testing
version of the library with the aforementioned pthread_create interceptor.
With the OFF setting, the library becomes more of a libc plugin.
Reviewers: vitalybuka, kcc, jfb
Subscribers: srhines, kubamracek, mgorny, jfb, llvm-commits
Differential Revision: https://reviews.llvm.org/D50922
llvm-svn: 340216
2018-08-21 05:49:15 +08:00
|
|
|
CFLAGS ${HWASAN_RTL_CFLAGS}
|
2018-11-08 02:35:44 +08:00
|
|
|
DEFS ${HWASAN_DEFINITIONS}
|
|
|
|
DEPS ${HWASAN_DEPS})
|
2017-12-09 09:31:51 +08:00
|
|
|
add_compiler_rt_object_libraries(RTHwasan_dynamic
|
|
|
|
ARCHS ${HWASAN_SUPPORTED_ARCH}
|
2018-07-13 04:55:02 +08:00
|
|
|
SOURCES ${HWASAN_RTL_SOURCES} ${HWASAN_RTL_CXX_SOURCES}
|
2018-07-10 21:00:17 +08:00
|
|
|
ADDITIONAL_HEADERS ${HWASAN_RTL_HEADERS}
|
[hwasan] Add a (almost) no-interceptor mode.
Summary:
The idea behind this change is to allow sanitization of libc. We are prototyping on Bionic,
but the tool interface will be general enough (or at least generalizable) to support any other libc.
When libc depends on libclang_rt.hwasan, the latter can not interpose libc functions.
In fact, majority of interceptors become unnecessary when libc code is instrumented.
This change gets rid of most hwasan interceptors and provides interface for libc to notify
hwasan about thread creation and destruction events. Some interceptors (pthread_create)
are kept under #ifdef to enable testing with uninstrumented libc. They are expressed in
terms of the new libc interface.
The new cmake switch, COMPILER_RT_HWASAN_WITH_INTERCEPTORS, ON by default, builds testing
version of the library with the aforementioned pthread_create interceptor.
With the OFF setting, the library becomes more of a libc plugin.
Reviewers: vitalybuka, kcc, jfb
Subscribers: srhines, kubamracek, mgorny, jfb, llvm-commits
Differential Revision: https://reviews.llvm.org/D50922
llvm-svn: 340216
2018-08-21 05:49:15 +08:00
|
|
|
CFLAGS ${HWASAN_DYNAMIC_CFLAGS}
|
2018-11-08 02:35:44 +08:00
|
|
|
DEFS ${HWASAN_DEFINITIONS}
|
|
|
|
DEPS ${HWASAN_DEPS})
|
2017-12-09 09:31:51 +08:00
|
|
|
|
|
|
|
file(WRITE ${CMAKE_CURRENT_BINARY_DIR}/dummy.cc "")
|
|
|
|
add_compiler_rt_object_libraries(RTHwasan_dynamic_version_script_dummy
|
|
|
|
ARCHS ${HWASAN_SUPPORTED_ARCH}
|
|
|
|
SOURCES ${CMAKE_CURRENT_BINARY_DIR}/dummy.cc
|
[hwasan] Add a (almost) no-interceptor mode.
Summary:
The idea behind this change is to allow sanitization of libc. We are prototyping on Bionic,
but the tool interface will be general enough (or at least generalizable) to support any other libc.
When libc depends on libclang_rt.hwasan, the latter can not interpose libc functions.
In fact, majority of interceptors become unnecessary when libc code is instrumented.
This change gets rid of most hwasan interceptors and provides interface for libc to notify
hwasan about thread creation and destruction events. Some interceptors (pthread_create)
are kept under #ifdef to enable testing with uninstrumented libc. They are expressed in
terms of the new libc interface.
The new cmake switch, COMPILER_RT_HWASAN_WITH_INTERCEPTORS, ON by default, builds testing
version of the library with the aforementioned pthread_create interceptor.
With the OFF setting, the library becomes more of a libc plugin.
Reviewers: vitalybuka, kcc, jfb
Subscribers: srhines, kubamracek, mgorny, jfb, llvm-commits
Differential Revision: https://reviews.llvm.org/D50922
llvm-svn: 340216
2018-08-21 05:49:15 +08:00
|
|
|
CFLAGS ${HWASAN_DYNAMIC_CFLAGS}
|
2018-11-08 02:35:44 +08:00
|
|
|
DEFS ${HWASAN_DEFINITIONS}
|
|
|
|
DEPS ${HWASAN_DEPS})
|
2017-12-09 09:31:51 +08:00
|
|
|
|
|
|
|
foreach(arch ${HWASAN_SUPPORTED_ARCH})
|
|
|
|
add_compiler_rt_runtime(clang_rt.hwasan
|
|
|
|
STATIC
|
|
|
|
ARCHS ${arch}
|
|
|
|
OBJECT_LIBS RTHwasan
|
|
|
|
RTInterception
|
|
|
|
RTSanitizerCommon
|
|
|
|
RTSanitizerCommonLibc
|
[sanitizer] Split coverage into separate RT in sanitizer_common
Summary:
`sanitizer_common`'s coverage support is fairly well separated, and libcdep by
default. Several sanitizers don't make use of coverage, and as far as I can
tell do no benefit from the extra dependencies pulled in by the coverage public
interface functions.
The following sanitizers call `InitializeCoverage` explicitely: MSan, ASan,
LSan, HWAsan, UBSan. On top of this, any sanitizer bundling RTUBSan should
add the coverage RT as well: ASan, Scudo, UBSan, CFI (diag), TSan, MSan, HWAsan.
So in the end the following have no need: DFSan, ESan, CFI, SafeStack (nolibc
anyway), XRay, and the upcoming Scudo minimal runtime.
I tested this with all the sanitizers check-* with gcc & clang, and in
standalone on Linux & Android, and there was no issue. I couldn't test this on
Mac, Fuchsia, BSDs, & Windows for lack of an environment, so adding a bunch of
people for additional scrunity. I couldn't test HWAsan either.
Reviewers: eugenis, vitalybuka, alekseyshl, flowerhack, kubamracek, dberris, rnk, krytarowski
Reviewed By: vitalybuka, alekseyshl, flowerhack, dberris
Subscribers: mgorny, delcypher, #sanitizers, llvm-commits
Differential Revision: https://reviews.llvm.org/D44701
llvm-svn: 328204
2018-03-22 23:04:31 +08:00
|
|
|
RTSanitizerCommonCoverage
|
[sanitizer] Split Symbolizer/StackTraces from core RTSanitizerCommon
Summary:
Host symbolizer & stacktraces related code in their own RT:
`RTSanitizerCommonSymbolizer`, which is "libcdep" by nature. Symbolizer &
stacktraces specific code that used to live in common files is moved to a new
file `sanitizer_symbolizer_report.cc` as is.
The purpose of this is the enforce a separation between code that relies on
symbolization and code that doesn't. This saves the inclusion of spurious code
due to the interface functions with default visibility, and the extra data
associated.
The following sanitizers makefiles were modified & tested locally:
- dfsan: doesn't require the new symbolizer RT
- esan: requires it
- hwasan: requires it
- lsan: requires it
- msan: requires it
- safestack: doesn't require it
- xray: doesn't require it
- tsan: requires it
- ubsan: requires it
- ubsan_minimal: doesn't require it
- scudo: requires it (but not for Fuchsia that has a minimal runtime)
This was tested locally on Linux, Android, Fuchsia.
Reviewers: alekseyshl, eugenis, dberris, kubamracek, vitalybuka, dvyukov, mcgrathr
Reviewed By: alekseyshl, vitalybuka
Subscribers: srhines, kubamracek, mgorny, krytarowski, delcypher, llvm-commits, #sanitizers
Differential Revision: https://reviews.llvm.org/D45457
llvm-svn: 330131
2018-04-17 00:32:19 +08:00
|
|
|
RTSanitizerCommonSymbolizer
|
[sanitizer] Split coverage into separate RT in sanitizer_common
Summary:
`sanitizer_common`'s coverage support is fairly well separated, and libcdep by
default. Several sanitizers don't make use of coverage, and as far as I can
tell do no benefit from the extra dependencies pulled in by the coverage public
interface functions.
The following sanitizers call `InitializeCoverage` explicitely: MSan, ASan,
LSan, HWAsan, UBSan. On top of this, any sanitizer bundling RTUBSan should
add the coverage RT as well: ASan, Scudo, UBSan, CFI (diag), TSan, MSan, HWAsan.
So in the end the following have no need: DFSan, ESan, CFI, SafeStack (nolibc
anyway), XRay, and the upcoming Scudo minimal runtime.
I tested this with all the sanitizers check-* with gcc & clang, and in
standalone on Linux & Android, and there was no issue. I couldn't test this on
Mac, Fuchsia, BSDs, & Windows for lack of an environment, so adding a bunch of
people for additional scrunity. I couldn't test HWAsan either.
Reviewers: eugenis, vitalybuka, alekseyshl, flowerhack, kubamracek, dberris, rnk, krytarowski
Reviewed By: vitalybuka, alekseyshl, flowerhack, dberris
Subscribers: mgorny, delcypher, #sanitizers, llvm-commits
Differential Revision: https://reviews.llvm.org/D44701
llvm-svn: 328204
2018-03-22 23:04:31 +08:00
|
|
|
RTUbsan
|
2017-12-09 09:31:51 +08:00
|
|
|
CFLAGS ${HWASAN_RTL_CFLAGS}
|
|
|
|
PARENT_TARGET hwasan)
|
|
|
|
add_compiler_rt_runtime(clang_rt.hwasan_cxx
|
|
|
|
STATIC
|
|
|
|
ARCHS ${arch}
|
|
|
|
OBJECT_LIBS RTHwasan_cxx
|
|
|
|
RTUbsan_cxx
|
|
|
|
CFLAGS ${HWASAN_RTL_CFLAGS}
|
|
|
|
PARENT_TARGET hwasan)
|
|
|
|
|
|
|
|
if (UNIX)
|
|
|
|
add_sanitizer_rt_version_list(clang_rt.hwasan-dynamic-${arch}
|
|
|
|
LIBS clang_rt.hwasan-${arch} clang_rt.hwasan_cxx-${arch}
|
|
|
|
EXTRA hwasan.syms.extra)
|
|
|
|
set(VERSION_SCRIPT_FLAG
|
|
|
|
-Wl,--version-script,${CMAKE_CURRENT_BINARY_DIR}/clang_rt.hwasan-dynamic-${arch}.vers)
|
|
|
|
set_property(SOURCE
|
|
|
|
${CMAKE_CURRENT_BINARY_DIR}/dummy.cc
|
|
|
|
APPEND PROPERTY
|
|
|
|
OBJECT_DEPENDS ${CMAKE_CURRENT_BINARY_DIR}/clang_rt.hwasan-dynamic-${arch}.vers)
|
|
|
|
else()
|
|
|
|
set(VERSION_SCRIPT_FLAG)
|
|
|
|
endif()
|
|
|
|
|
|
|
|
|
|
|
|
add_compiler_rt_runtime(clang_rt.hwasan
|
|
|
|
SHARED
|
|
|
|
ARCHS ${arch}
|
|
|
|
OBJECT_LIBS
|
|
|
|
RTHwasan_dynamic
|
|
|
|
RTInterception
|
|
|
|
RTSanitizerCommon
|
|
|
|
RTSanitizerCommonLibc
|
[sanitizer] Split coverage into separate RT in sanitizer_common
Summary:
`sanitizer_common`'s coverage support is fairly well separated, and libcdep by
default. Several sanitizers don't make use of coverage, and as far as I can
tell do no benefit from the extra dependencies pulled in by the coverage public
interface functions.
The following sanitizers call `InitializeCoverage` explicitely: MSan, ASan,
LSan, HWAsan, UBSan. On top of this, any sanitizer bundling RTUBSan should
add the coverage RT as well: ASan, Scudo, UBSan, CFI (diag), TSan, MSan, HWAsan.
So in the end the following have no need: DFSan, ESan, CFI, SafeStack (nolibc
anyway), XRay, and the upcoming Scudo minimal runtime.
I tested this with all the sanitizers check-* with gcc & clang, and in
standalone on Linux & Android, and there was no issue. I couldn't test this on
Mac, Fuchsia, BSDs, & Windows for lack of an environment, so adding a bunch of
people for additional scrunity. I couldn't test HWAsan either.
Reviewers: eugenis, vitalybuka, alekseyshl, flowerhack, kubamracek, dberris, rnk, krytarowski
Reviewed By: vitalybuka, alekseyshl, flowerhack, dberris
Subscribers: mgorny, delcypher, #sanitizers, llvm-commits
Differential Revision: https://reviews.llvm.org/D44701
llvm-svn: 328204
2018-03-22 23:04:31 +08:00
|
|
|
RTSanitizerCommonCoverage
|
[sanitizer] Split Symbolizer/StackTraces from core RTSanitizerCommon
Summary:
Host symbolizer & stacktraces related code in their own RT:
`RTSanitizerCommonSymbolizer`, which is "libcdep" by nature. Symbolizer &
stacktraces specific code that used to live in common files is moved to a new
file `sanitizer_symbolizer_report.cc` as is.
The purpose of this is the enforce a separation between code that relies on
symbolization and code that doesn't. This saves the inclusion of spurious code
due to the interface functions with default visibility, and the extra data
associated.
The following sanitizers makefiles were modified & tested locally:
- dfsan: doesn't require the new symbolizer RT
- esan: requires it
- hwasan: requires it
- lsan: requires it
- msan: requires it
- safestack: doesn't require it
- xray: doesn't require it
- tsan: requires it
- ubsan: requires it
- ubsan_minimal: doesn't require it
- scudo: requires it (but not for Fuchsia that has a minimal runtime)
This was tested locally on Linux, Android, Fuchsia.
Reviewers: alekseyshl, eugenis, dberris, kubamracek, vitalybuka, dvyukov, mcgrathr
Reviewed By: alekseyshl, vitalybuka
Subscribers: srhines, kubamracek, mgorny, krytarowski, delcypher, llvm-commits, #sanitizers
Differential Revision: https://reviews.llvm.org/D45457
llvm-svn: 330131
2018-04-17 00:32:19 +08:00
|
|
|
RTSanitizerCommonSymbolizer
|
[sanitizer] Split coverage into separate RT in sanitizer_common
Summary:
`sanitizer_common`'s coverage support is fairly well separated, and libcdep by
default. Several sanitizers don't make use of coverage, and as far as I can
tell do no benefit from the extra dependencies pulled in by the coverage public
interface functions.
The following sanitizers call `InitializeCoverage` explicitely: MSan, ASan,
LSan, HWAsan, UBSan. On top of this, any sanitizer bundling RTUBSan should
add the coverage RT as well: ASan, Scudo, UBSan, CFI (diag), TSan, MSan, HWAsan.
So in the end the following have no need: DFSan, ESan, CFI, SafeStack (nolibc
anyway), XRay, and the upcoming Scudo minimal runtime.
I tested this with all the sanitizers check-* with gcc & clang, and in
standalone on Linux & Android, and there was no issue. I couldn't test this on
Mac, Fuchsia, BSDs, & Windows for lack of an environment, so adding a bunch of
people for additional scrunity. I couldn't test HWAsan either.
Reviewers: eugenis, vitalybuka, alekseyshl, flowerhack, kubamracek, dberris, rnk, krytarowski
Reviewed By: vitalybuka, alekseyshl, flowerhack, dberris
Subscribers: mgorny, delcypher, #sanitizers, llvm-commits
Differential Revision: https://reviews.llvm.org/D44701
llvm-svn: 328204
2018-03-22 23:04:31 +08:00
|
|
|
RTUbsan
|
2018-12-13 06:56:00 +08:00
|
|
|
RTUbsan_cxx
|
2017-12-09 09:31:51 +08:00
|
|
|
# The only purpose of RTHWAsan_dynamic_version_script_dummy is to
|
|
|
|
# carry a dependency of the shared runtime on the version script.
|
|
|
|
# Replacing it with a straightforward
|
|
|
|
# add_dependencies(clang_rt.asan-dynamic-${arch} clang_rt.asan-dynamic-${arch}-version-list)
|
|
|
|
# generates an order-only dependency in ninja.
|
|
|
|
RTHwasan_dynamic_version_script_dummy
|
|
|
|
CFLAGS ${HWASAN_DYNAMIC_CFLAGS}
|
|
|
|
LINK_FLAGS ${HWASAN_DYNAMIC_LINK_FLAGS}
|
|
|
|
${VERSION_SCRIPT_FLAG}
|
|
|
|
LINK_LIBS ${HWASAN_DYNAMIC_LIBS}
|
|
|
|
DEFS ${ASAN_DYNAMIC_DEFINITIONS}
|
|
|
|
PARENT_TARGET hwasan)
|
|
|
|
|
2018-05-10 05:24:06 +08:00
|
|
|
if(SANITIZER_USE_SYMBOLS)
|
2017-12-09 09:31:51 +08:00
|
|
|
add_sanitizer_rt_symbols(clang_rt.hwasan
|
|
|
|
ARCHS ${arch}
|
|
|
|
EXTRA hwasan.syms.extra)
|
|
|
|
add_sanitizer_rt_symbols(clang_rt.hwasan_cxx
|
|
|
|
ARCHS ${arch}
|
|
|
|
EXTRA hwasan.syms.extra)
|
|
|
|
add_dependencies(hwasan clang_rt.hwasan-${arch}-symbols
|
|
|
|
clang_rt.hwasan_cxx-${arch}-symbols)
|
|
|
|
endif()
|
|
|
|
endforeach()
|
|
|
|
|
|
|
|
add_compiler_rt_resource_file(hwasan_blacklist hwasan_blacklist.txt hwasan)
|
|
|
|
|
|
|
|
# if(COMPILER_RT_INCLUDE_TESTS)
|
|
|
|
# add_subdirectory(tests)
|
|
|
|
# endif()
|