13cab2bb3Spatrick //=-- lsan.cpp ------------------------------------------------------------===//
23cab2bb3Spatrick //
33cab2bb3Spatrick // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
43cab2bb3Spatrick // See https://llvm.org/LICENSE.txt for license information.
53cab2bb3Spatrick // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
63cab2bb3Spatrick //
73cab2bb3Spatrick //===----------------------------------------------------------------------===//
83cab2bb3Spatrick //
93cab2bb3Spatrick // This file is a part of LeakSanitizer.
103cab2bb3Spatrick // Standalone LSan RTL.
113cab2bb3Spatrick //
123cab2bb3Spatrick //===----------------------------------------------------------------------===//
133cab2bb3Spatrick
143cab2bb3Spatrick #include "lsan.h"
153cab2bb3Spatrick
163cab2bb3Spatrick #include "lsan_allocator.h"
173cab2bb3Spatrick #include "lsan_common.h"
183cab2bb3Spatrick #include "lsan_thread.h"
19*810390e3Srobert #include "sanitizer_common/sanitizer_flag_parser.h"
20*810390e3Srobert #include "sanitizer_common/sanitizer_flags.h"
21*810390e3Srobert #include "sanitizer_common/sanitizer_interface_internal.h"
223cab2bb3Spatrick
233cab2bb3Spatrick bool lsan_inited;
243cab2bb3Spatrick bool lsan_init_is_running;
253cab2bb3Spatrick
263cab2bb3Spatrick namespace __lsan {
273cab2bb3Spatrick
283cab2bb3Spatrick ///// Interface to the common LSan module. /////
WordIsPoisoned(uptr addr)293cab2bb3Spatrick bool WordIsPoisoned(uptr addr) {
303cab2bb3Spatrick return false;
313cab2bb3Spatrick }
323cab2bb3Spatrick
333cab2bb3Spatrick } // namespace __lsan
343cab2bb3Spatrick
UnwindImpl(uptr pc,uptr bp,void * context,bool request_fast,u32 max_depth)353cab2bb3Spatrick void __sanitizer::BufferedStackTrace::UnwindImpl(
363cab2bb3Spatrick uptr pc, uptr bp, void *context, bool request_fast, u32 max_depth) {
373cab2bb3Spatrick using namespace __lsan;
383cab2bb3Spatrick uptr stack_top = 0, stack_bottom = 0;
39d89ec533Spatrick if (ThreadContext *t = CurrentThreadContext()) {
403cab2bb3Spatrick stack_top = t->stack_end();
413cab2bb3Spatrick stack_bottom = t->stack_begin();
423cab2bb3Spatrick }
43d89ec533Spatrick if (SANITIZER_MIPS && !IsValidFrame(bp, stack_top, stack_bottom))
44d89ec533Spatrick return;
45d89ec533Spatrick bool fast = StackTrace::WillUseFastUnwind(request_fast);
46d89ec533Spatrick Unwind(max_depth, pc, bp, context, stack_top, stack_bottom, fast);
473cab2bb3Spatrick }
483cab2bb3Spatrick
493cab2bb3Spatrick using namespace __lsan;
503cab2bb3Spatrick
InitializeFlags()513cab2bb3Spatrick static void InitializeFlags() {
523cab2bb3Spatrick // Set all the default values.
533cab2bb3Spatrick SetCommonFlagsDefaults();
543cab2bb3Spatrick {
553cab2bb3Spatrick CommonFlags cf;
563cab2bb3Spatrick cf.CopyFrom(*common_flags());
573cab2bb3Spatrick cf.external_symbolizer_path = GetEnv("LSAN_SYMBOLIZER_PATH");
583cab2bb3Spatrick cf.malloc_context_size = 30;
593cab2bb3Spatrick cf.intercept_tls_get_addr = true;
603cab2bb3Spatrick cf.detect_leaks = true;
613cab2bb3Spatrick cf.exitcode = 23;
623cab2bb3Spatrick OverrideCommonFlags(cf);
633cab2bb3Spatrick }
643cab2bb3Spatrick
653cab2bb3Spatrick Flags *f = flags();
663cab2bb3Spatrick f->SetDefaults();
673cab2bb3Spatrick
683cab2bb3Spatrick FlagParser parser;
693cab2bb3Spatrick RegisterLsanFlags(&parser, f);
703cab2bb3Spatrick RegisterCommonFlags(&parser);
713cab2bb3Spatrick
723cab2bb3Spatrick // Override from user-specified string.
73d89ec533Spatrick const char *lsan_default_options = __lsan_default_options();
743cab2bb3Spatrick parser.ParseString(lsan_default_options);
753cab2bb3Spatrick parser.ParseStringFromEnv("LSAN_OPTIONS");
763cab2bb3Spatrick
77d89ec533Spatrick InitializeCommonFlags();
783cab2bb3Spatrick
793cab2bb3Spatrick if (Verbosity()) ReportUnrecognizedFlags();
803cab2bb3Spatrick
813cab2bb3Spatrick if (common_flags()->help) parser.PrintFlagDescriptions();
823cab2bb3Spatrick
833cab2bb3Spatrick __sanitizer_set_report_path(common_flags()->log_path);
843cab2bb3Spatrick }
853cab2bb3Spatrick
__lsan_init()863cab2bb3Spatrick extern "C" void __lsan_init() {
873cab2bb3Spatrick CHECK(!lsan_init_is_running);
883cab2bb3Spatrick if (lsan_inited)
893cab2bb3Spatrick return;
903cab2bb3Spatrick lsan_init_is_running = true;
913cab2bb3Spatrick SanitizerToolName = "LeakSanitizer";
923cab2bb3Spatrick CacheBinaryName();
933cab2bb3Spatrick AvoidCVE_2016_2143();
943cab2bb3Spatrick InitializeFlags();
953cab2bb3Spatrick InitCommonLsan();
963cab2bb3Spatrick InitializeAllocator();
973cab2bb3Spatrick ReplaceSystemMalloc();
983cab2bb3Spatrick InitTlsSize();
993cab2bb3Spatrick InitializeInterceptors();
1003cab2bb3Spatrick InitializeThreadRegistry();
1013cab2bb3Spatrick InstallDeadlySignalHandlers(LsanOnDeadlySignal);
1021f9cb04fSpatrick InitializeMainThread();
103*810390e3Srobert InstallAtExitCheckLeaks();
1043cab2bb3Spatrick
1053cab2bb3Spatrick InitializeCoverage(common_flags()->coverage, common_flags()->coverage_dir);
1063cab2bb3Spatrick
1073cab2bb3Spatrick lsan_inited = true;
1083cab2bb3Spatrick lsan_init_is_running = false;
1093cab2bb3Spatrick }
1103cab2bb3Spatrick
1113cab2bb3Spatrick extern "C" SANITIZER_INTERFACE_ATTRIBUTE
__sanitizer_print_stack_trace()1123cab2bb3Spatrick void __sanitizer_print_stack_trace() {
1133cab2bb3Spatrick GET_STACK_TRACE_FATAL;
1143cab2bb3Spatrick stack.Print();
1153cab2bb3Spatrick }
116