xref: /openbsd-src/gnu/llvm/compiler-rt/lib/lsan/lsan.cpp (revision 810390e339a5425391477d5d41c78d7cab2424ac)
13cab2bb3Spatrick //=-- lsan.cpp ------------------------------------------------------------===//
23cab2bb3Spatrick //
33cab2bb3Spatrick // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
43cab2bb3Spatrick // See https://llvm.org/LICENSE.txt for license information.
53cab2bb3Spatrick // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
63cab2bb3Spatrick //
73cab2bb3Spatrick //===----------------------------------------------------------------------===//
83cab2bb3Spatrick //
93cab2bb3Spatrick // This file is a part of LeakSanitizer.
103cab2bb3Spatrick // Standalone LSan RTL.
113cab2bb3Spatrick //
123cab2bb3Spatrick //===----------------------------------------------------------------------===//
133cab2bb3Spatrick 
143cab2bb3Spatrick #include "lsan.h"
153cab2bb3Spatrick 
163cab2bb3Spatrick #include "lsan_allocator.h"
173cab2bb3Spatrick #include "lsan_common.h"
183cab2bb3Spatrick #include "lsan_thread.h"
19*810390e3Srobert #include "sanitizer_common/sanitizer_flag_parser.h"
20*810390e3Srobert #include "sanitizer_common/sanitizer_flags.h"
21*810390e3Srobert #include "sanitizer_common/sanitizer_interface_internal.h"
223cab2bb3Spatrick 
233cab2bb3Spatrick bool lsan_inited;
243cab2bb3Spatrick bool lsan_init_is_running;
253cab2bb3Spatrick 
263cab2bb3Spatrick namespace __lsan {
273cab2bb3Spatrick 
283cab2bb3Spatrick ///// Interface to the common LSan module. /////
WordIsPoisoned(uptr addr)293cab2bb3Spatrick bool WordIsPoisoned(uptr addr) {
303cab2bb3Spatrick   return false;
313cab2bb3Spatrick }
323cab2bb3Spatrick 
333cab2bb3Spatrick }  // namespace __lsan
343cab2bb3Spatrick 
UnwindImpl(uptr pc,uptr bp,void * context,bool request_fast,u32 max_depth)353cab2bb3Spatrick void __sanitizer::BufferedStackTrace::UnwindImpl(
363cab2bb3Spatrick     uptr pc, uptr bp, void *context, bool request_fast, u32 max_depth) {
373cab2bb3Spatrick   using namespace __lsan;
383cab2bb3Spatrick   uptr stack_top = 0, stack_bottom = 0;
39d89ec533Spatrick   if (ThreadContext *t = CurrentThreadContext()) {
403cab2bb3Spatrick     stack_top = t->stack_end();
413cab2bb3Spatrick     stack_bottom = t->stack_begin();
423cab2bb3Spatrick   }
43d89ec533Spatrick   if (SANITIZER_MIPS && !IsValidFrame(bp, stack_top, stack_bottom))
44d89ec533Spatrick     return;
45d89ec533Spatrick   bool fast = StackTrace::WillUseFastUnwind(request_fast);
46d89ec533Spatrick   Unwind(max_depth, pc, bp, context, stack_top, stack_bottom, fast);
473cab2bb3Spatrick }
483cab2bb3Spatrick 
493cab2bb3Spatrick using namespace __lsan;
503cab2bb3Spatrick 
InitializeFlags()513cab2bb3Spatrick static void InitializeFlags() {
523cab2bb3Spatrick   // Set all the default values.
533cab2bb3Spatrick   SetCommonFlagsDefaults();
543cab2bb3Spatrick   {
553cab2bb3Spatrick     CommonFlags cf;
563cab2bb3Spatrick     cf.CopyFrom(*common_flags());
573cab2bb3Spatrick     cf.external_symbolizer_path = GetEnv("LSAN_SYMBOLIZER_PATH");
583cab2bb3Spatrick     cf.malloc_context_size = 30;
593cab2bb3Spatrick     cf.intercept_tls_get_addr = true;
603cab2bb3Spatrick     cf.detect_leaks = true;
613cab2bb3Spatrick     cf.exitcode = 23;
623cab2bb3Spatrick     OverrideCommonFlags(cf);
633cab2bb3Spatrick   }
643cab2bb3Spatrick 
653cab2bb3Spatrick   Flags *f = flags();
663cab2bb3Spatrick   f->SetDefaults();
673cab2bb3Spatrick 
683cab2bb3Spatrick   FlagParser parser;
693cab2bb3Spatrick   RegisterLsanFlags(&parser, f);
703cab2bb3Spatrick   RegisterCommonFlags(&parser);
713cab2bb3Spatrick 
723cab2bb3Spatrick   // Override from user-specified string.
73d89ec533Spatrick   const char *lsan_default_options = __lsan_default_options();
743cab2bb3Spatrick   parser.ParseString(lsan_default_options);
753cab2bb3Spatrick   parser.ParseStringFromEnv("LSAN_OPTIONS");
763cab2bb3Spatrick 
77d89ec533Spatrick   InitializeCommonFlags();
783cab2bb3Spatrick 
793cab2bb3Spatrick   if (Verbosity()) ReportUnrecognizedFlags();
803cab2bb3Spatrick 
813cab2bb3Spatrick   if (common_flags()->help) parser.PrintFlagDescriptions();
823cab2bb3Spatrick 
833cab2bb3Spatrick   __sanitizer_set_report_path(common_flags()->log_path);
843cab2bb3Spatrick }
853cab2bb3Spatrick 
__lsan_init()863cab2bb3Spatrick extern "C" void __lsan_init() {
873cab2bb3Spatrick   CHECK(!lsan_init_is_running);
883cab2bb3Spatrick   if (lsan_inited)
893cab2bb3Spatrick     return;
903cab2bb3Spatrick   lsan_init_is_running = true;
913cab2bb3Spatrick   SanitizerToolName = "LeakSanitizer";
923cab2bb3Spatrick   CacheBinaryName();
933cab2bb3Spatrick   AvoidCVE_2016_2143();
943cab2bb3Spatrick   InitializeFlags();
953cab2bb3Spatrick   InitCommonLsan();
963cab2bb3Spatrick   InitializeAllocator();
973cab2bb3Spatrick   ReplaceSystemMalloc();
983cab2bb3Spatrick   InitTlsSize();
993cab2bb3Spatrick   InitializeInterceptors();
1003cab2bb3Spatrick   InitializeThreadRegistry();
1013cab2bb3Spatrick   InstallDeadlySignalHandlers(LsanOnDeadlySignal);
1021f9cb04fSpatrick   InitializeMainThread();
103*810390e3Srobert   InstallAtExitCheckLeaks();
1043cab2bb3Spatrick 
1053cab2bb3Spatrick   InitializeCoverage(common_flags()->coverage, common_flags()->coverage_dir);
1063cab2bb3Spatrick 
1073cab2bb3Spatrick   lsan_inited = true;
1083cab2bb3Spatrick   lsan_init_is_running = false;
1093cab2bb3Spatrick }
1103cab2bb3Spatrick 
1113cab2bb3Spatrick extern "C" SANITIZER_INTERFACE_ATTRIBUTE
__sanitizer_print_stack_trace()1123cab2bb3Spatrick void __sanitizer_print_stack_trace() {
1133cab2bb3Spatrick   GET_STACK_TRACE_FATAL;
1143cab2bb3Spatrick   stack.Print();
1153cab2bb3Spatrick }
116