diff options
author | Alexey Samsonov <samsonov@google.com> | 2012-11-29 22:36:21 +0000 |
---|---|---|
committer | Alexey Samsonov <samsonov@google.com> | 2012-11-29 22:36:21 +0000 |
commit | 4d1a6e41e1eaeaf5a4672c802519f15c8fb91e91 (patch) | |
tree | 7c55765b4b0f845e8b0c51db5eb510dc6fce42ef /lib/Driver | |
parent | 2ec5f551cc455df30183e796a91498c5325b17f2 (diff) |
This patch exposes to Clang users three more sanitizers are experimental features of ASan:
1) init-order sanitizer: initialization-order checker.
Status: usable, but may produce false positives w/o proper blacklisting.
2) use-after-return sanitizer
Status: implemented, but heavily understed.
Should be optional, as it significanlty slows program down.
3) use-after-scope sanitizer
Status: in progress.
git-svn-id: https://llvm.org/svn/llvm-project/cfe/trunk@168950 91177308-0d34-0410-b5e6-96231b3b80d8
Diffstat (limited to 'lib/Driver')
-rw-r--r-- | lib/Driver/SanitizerArgs.h | 4 | ||||
-rw-r--r-- | lib/Driver/Tools.cpp | 7 |
2 files changed, 9 insertions, 2 deletions
diff --git a/lib/Driver/SanitizerArgs.h b/lib/Driver/SanitizerArgs.h index 52a6c2ec4b..af92fa070c 100644 --- a/lib/Driver/SanitizerArgs.h +++ b/lib/Driver/SanitizerArgs.h @@ -28,7 +28,7 @@ class SanitizerArgs { #define SANITIZER(NAME, ID) ID = 1 << SO_##ID, #define SANITIZER_GROUP(NAME, ID, ALIAS) ID = ALIAS, #include "clang/Basic/Sanitizers.def" - NeedsAsanRt = Address, + NeedsAsanRt = AddressFull, NeedsTsanRt = Thread, NeedsUbsanRt = (Undefined & ~Bounds) | Integer }; @@ -44,7 +44,7 @@ class SanitizerArgs { bool needsUbsanRt() const { return Kind & NeedsUbsanRt; } bool sanitizesVptr() const { return Kind & Vptr; } - + void addArgs(const ArgList &Args, ArgStringList &CmdArgs) const { if (!Kind) return; diff --git a/lib/Driver/Tools.cpp b/lib/Driver/Tools.cpp index f9cb5eff53..f2c1a03caf 100644 --- a/lib/Driver/Tools.cpp +++ b/lib/Driver/Tools.cpp @@ -1474,6 +1474,13 @@ SanitizerArgs::SanitizerArgs(const Driver &D, const ArgList &Args) { D.Diag(diag::err_drv_argument_not_allowed_with) << lastArgumentForKind(D, Args, NeedsAsan ? NeedsAsanRt : NeedsTsanRt) << lastArgumentForKind(D, Args, NeedsUbsan ? NeedsUbsanRt : NeedsTsanRt); + + // If -fsanitize contains extra features of ASan, it should also + // explicitly contain -fsanitize=address. + if (NeedsAsan && ((Kind & Address) == 0)) + D.Diag(diag::err_drv_argument_only_allowed_with) + << lastArgumentForKind(D, Args, NeedsAsanRt) + << "-fsanitize=address"; } /// If AddressSanitizer is enabled, add appropriate linker flags (Linux). |