blob: 67eaaf041250576215eddec58cb710be211c0269 [file] [log] [blame]
#
# Copyright (c) 2019, Google, Inc. All rights reserved
#
# Permission is hereby granted, free of charge, to any person obtaining
# a copy of this software and associated documentation files
# (the "Software"), to deal in the Software without restriction,
# including without limitation the rights to use, copy, modify, merge,
# publish, distribute, sublicense, and/or sell copies of the Software,
# and to permit persons to whom the Software is furnished to do so,
# subject to the following conditions:
#
# The above copyright notice and this permission notice shall be
# included in all copies or substantial portions of the Software.
#
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
# EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
# MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
# IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
# CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
# TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
# SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
#
# Entries in this section disable sanitizers listed in enable.mk.
[alignment|bool|builtin|bounds|enum|float-cast-overflow|float-divide-by-zero|implicit-unsigned-integer-truncation|implicit-signed-integer-truncation|implicit-integer-sign-change|integer-divide-by-zero|pointer-overflow|return|shift|signed-integer-overflow|unreachable|unsigned-integer-overflow|vla-bound]
# dlmalloc is fragile enough that it isn't worth the risk to try to make it
# UBSan clean
src:*/dlmalloc.c
# Fixing errors in boringssl is more likely to cause problems than fix them
src:external/boringssl/*
# ocb.c implements pseudo-bignum math, and so plays fast and loose with signs
# We would either need to annotate many of the functions in here, or rewrite
# it dangerously to avoid this exemption.
src:*/system/keymaster/key_blob_utils/ocb.c
# test-runner is missing important facilities for error reporting (e.g. printf)
# and is not a actual product, just testing infrastructure.
src:external/trusty/bootloader/*
# If we are inside Musl's ldso or crt components, we're too early in process
# start for a lot of information to be correct, and our error reporting
# facilities won't work yet.
src:external/trusty/musl/crt/*
src:external/trusty/musl/ldso/*
# Musl is fond of negating unsigned integers to round values up.
# There are also a few not-quite-buggy unsigned overflows and signed constants
# being coerced to unsigned values.
[unsigned-integer-overflow|implicit-integer-sign-change]
src:external/trusty/musl/src/*
# Signature of memset is void* memset(void *s, int c, size_t n);
# i.e. it has to convert its second argument to a 8-bit type, which can result
# in a truncation.
[implicit-signed-integer-truncation]
src:external/trusty/musl/src/string/memset.c
# Allow unsigned overflow in keymaster until keymaster's checks are reworked.
# The cases we know can overflow *are* overflow checks.
[unsigned-integer-overflow|pointer-overflow]
src:*/system/keymaster/android_keymaster/authorization_set.cpp
src:*/system/keymaster/android_keymaster/serializable.cpp
# Exempt libfreetype from overflow sanitization.
[unsigned-integer-overflow|implicit-integer-sign-change|pointer-overflow|cfi]
src:*/external/freetype/*
# Exempt libfdt from implicit integer sign changes
[implicit-integer-sign-change]
src:external/dtc/libfdt/*
# Exempt some libbinder functions from CFI because they make indirect
# calls from C++ into Rust and the latter does not support CFI.
# TODO(b/181755948): Remove these lines when that changes.
[cfi-icall]
# This is the file path as seen by clang
src:frameworks/native/libs/binder/trusty/binder_rpc_unstable/../../libbinder_rpc_unstable.cpp
src:frameworks/native/libs/binder/ndk/ibinder.cpp
src:frameworks/native/libs/binder/ndk/parcel.cpp
src:frameworks/native/libs/binder/trusty/rust/binder_rpc_server_bindgen/cpp/ARpcServerTrusty.cpp