1*68d75effSDimitry Andric //===-- asan_flags.cpp ------------------------------------------*- C++ -*-===// 2*68d75effSDimitry Andric // 3*68d75effSDimitry Andric // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. 4*68d75effSDimitry Andric // See https://llvm.org/LICENSE.txt for license information. 5*68d75effSDimitry Andric // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 6*68d75effSDimitry Andric // 7*68d75effSDimitry Andric //===----------------------------------------------------------------------===// 8*68d75effSDimitry Andric // 9*68d75effSDimitry Andric // This file is a part of AddressSanitizer, an address sanity checker. 10*68d75effSDimitry Andric // 11*68d75effSDimitry Andric // ASan flag parsing logic. 12*68d75effSDimitry Andric //===----------------------------------------------------------------------===// 13*68d75effSDimitry Andric 14*68d75effSDimitry Andric #include "asan_activation.h" 15*68d75effSDimitry Andric #include "asan_flags.h" 16*68d75effSDimitry Andric #include "asan_interface_internal.h" 17*68d75effSDimitry Andric #include "asan_stack.h" 18*68d75effSDimitry Andric #include "lsan/lsan_common.h" 19*68d75effSDimitry Andric #include "sanitizer_common/sanitizer_common.h" 20*68d75effSDimitry Andric #include "sanitizer_common/sanitizer_flags.h" 21*68d75effSDimitry Andric #include "sanitizer_common/sanitizer_flag_parser.h" 22*68d75effSDimitry Andric #include "ubsan/ubsan_flags.h" 23*68d75effSDimitry Andric #include "ubsan/ubsan_platform.h" 24*68d75effSDimitry Andric 25*68d75effSDimitry Andric namespace __asan { 26*68d75effSDimitry Andric 27*68d75effSDimitry Andric Flags asan_flags_dont_use_directly; // use via flags(). 28*68d75effSDimitry Andric 29*68d75effSDimitry Andric static const char *MaybeCallAsanDefaultOptions() { 30*68d75effSDimitry Andric return (&__asan_default_options) ? __asan_default_options() : ""; 31*68d75effSDimitry Andric } 32*68d75effSDimitry Andric 33*68d75effSDimitry Andric static const char *MaybeUseAsanDefaultOptionsCompileDefinition() { 34*68d75effSDimitry Andric #ifdef ASAN_DEFAULT_OPTIONS 35*68d75effSDimitry Andric return SANITIZER_STRINGIFY(ASAN_DEFAULT_OPTIONS); 36*68d75effSDimitry Andric #else 37*68d75effSDimitry Andric return ""; 38*68d75effSDimitry Andric #endif 39*68d75effSDimitry Andric } 40*68d75effSDimitry Andric 41*68d75effSDimitry Andric void Flags::SetDefaults() { 42*68d75effSDimitry Andric #define ASAN_FLAG(Type, Name, DefaultValue, Description) Name = DefaultValue; 43*68d75effSDimitry Andric #include "asan_flags.inc" 44*68d75effSDimitry Andric #undef ASAN_FLAG 45*68d75effSDimitry Andric } 46*68d75effSDimitry Andric 47*68d75effSDimitry Andric static void RegisterAsanFlags(FlagParser *parser, Flags *f) { 48*68d75effSDimitry Andric #define ASAN_FLAG(Type, Name, DefaultValue, Description) \ 49*68d75effSDimitry Andric RegisterFlag(parser, #Name, Description, &f->Name); 50*68d75effSDimitry Andric #include "asan_flags.inc" 51*68d75effSDimitry Andric #undef ASAN_FLAG 52*68d75effSDimitry Andric } 53*68d75effSDimitry Andric 54*68d75effSDimitry Andric void InitializeFlags() { 55*68d75effSDimitry Andric // Set the default values and prepare for parsing ASan and common flags. 56*68d75effSDimitry Andric SetCommonFlagsDefaults(); 57*68d75effSDimitry Andric { 58*68d75effSDimitry Andric CommonFlags cf; 59*68d75effSDimitry Andric cf.CopyFrom(*common_flags()); 60*68d75effSDimitry Andric cf.detect_leaks = cf.detect_leaks && CAN_SANITIZE_LEAKS; 61*68d75effSDimitry Andric cf.external_symbolizer_path = GetEnv("ASAN_SYMBOLIZER_PATH"); 62*68d75effSDimitry Andric cf.malloc_context_size = kDefaultMallocContextSize; 63*68d75effSDimitry Andric cf.intercept_tls_get_addr = true; 64*68d75effSDimitry Andric cf.exitcode = 1; 65*68d75effSDimitry Andric OverrideCommonFlags(cf); 66*68d75effSDimitry Andric } 67*68d75effSDimitry Andric Flags *f = flags(); 68*68d75effSDimitry Andric f->SetDefaults(); 69*68d75effSDimitry Andric 70*68d75effSDimitry Andric FlagParser asan_parser; 71*68d75effSDimitry Andric RegisterAsanFlags(&asan_parser, f); 72*68d75effSDimitry Andric RegisterCommonFlags(&asan_parser); 73*68d75effSDimitry Andric 74*68d75effSDimitry Andric // Set the default values and prepare for parsing LSan and UBSan flags 75*68d75effSDimitry Andric // (which can also overwrite common flags). 76*68d75effSDimitry Andric #if CAN_SANITIZE_LEAKS 77*68d75effSDimitry Andric __lsan::Flags *lf = __lsan::flags(); 78*68d75effSDimitry Andric lf->SetDefaults(); 79*68d75effSDimitry Andric 80*68d75effSDimitry Andric FlagParser lsan_parser; 81*68d75effSDimitry Andric __lsan::RegisterLsanFlags(&lsan_parser, lf); 82*68d75effSDimitry Andric RegisterCommonFlags(&lsan_parser); 83*68d75effSDimitry Andric #endif 84*68d75effSDimitry Andric 85*68d75effSDimitry Andric #if CAN_SANITIZE_UB 86*68d75effSDimitry Andric __ubsan::Flags *uf = __ubsan::flags(); 87*68d75effSDimitry Andric uf->SetDefaults(); 88*68d75effSDimitry Andric 89*68d75effSDimitry Andric FlagParser ubsan_parser; 90*68d75effSDimitry Andric __ubsan::RegisterUbsanFlags(&ubsan_parser, uf); 91*68d75effSDimitry Andric RegisterCommonFlags(&ubsan_parser); 92*68d75effSDimitry Andric #endif 93*68d75effSDimitry Andric 94*68d75effSDimitry Andric if (SANITIZER_MAC) { 95*68d75effSDimitry Andric // Support macOS MallocScribble and MallocPreScribble: 96*68d75effSDimitry Andric // <https://developer.apple.com/library/content/documentation/Performance/ 97*68d75effSDimitry Andric // Conceptual/ManagingMemory/Articles/MallocDebug.html> 98*68d75effSDimitry Andric if (GetEnv("MallocScribble")) { 99*68d75effSDimitry Andric f->max_free_fill_size = 0x1000; 100*68d75effSDimitry Andric } 101*68d75effSDimitry Andric if (GetEnv("MallocPreScribble")) { 102*68d75effSDimitry Andric f->malloc_fill_byte = 0xaa; 103*68d75effSDimitry Andric } 104*68d75effSDimitry Andric } 105*68d75effSDimitry Andric 106*68d75effSDimitry Andric // Override from ASan compile definition. 107*68d75effSDimitry Andric const char *asan_compile_def = MaybeUseAsanDefaultOptionsCompileDefinition(); 108*68d75effSDimitry Andric asan_parser.ParseString(asan_compile_def); 109*68d75effSDimitry Andric 110*68d75effSDimitry Andric // Override from user-specified string. 111*68d75effSDimitry Andric const char *asan_default_options = MaybeCallAsanDefaultOptions(); 112*68d75effSDimitry Andric asan_parser.ParseString(asan_default_options); 113*68d75effSDimitry Andric #if CAN_SANITIZE_UB 114*68d75effSDimitry Andric const char *ubsan_default_options = __ubsan::MaybeCallUbsanDefaultOptions(); 115*68d75effSDimitry Andric ubsan_parser.ParseString(ubsan_default_options); 116*68d75effSDimitry Andric #endif 117*68d75effSDimitry Andric #if CAN_SANITIZE_LEAKS 118*68d75effSDimitry Andric const char *lsan_default_options = __lsan::MaybeCallLsanDefaultOptions(); 119*68d75effSDimitry Andric lsan_parser.ParseString(lsan_default_options); 120*68d75effSDimitry Andric #endif 121*68d75effSDimitry Andric 122*68d75effSDimitry Andric // Override from command line. 123*68d75effSDimitry Andric asan_parser.ParseStringFromEnv("ASAN_OPTIONS"); 124*68d75effSDimitry Andric #if CAN_SANITIZE_LEAKS 125*68d75effSDimitry Andric lsan_parser.ParseStringFromEnv("LSAN_OPTIONS"); 126*68d75effSDimitry Andric #endif 127*68d75effSDimitry Andric #if CAN_SANITIZE_UB 128*68d75effSDimitry Andric ubsan_parser.ParseStringFromEnv("UBSAN_OPTIONS"); 129*68d75effSDimitry Andric #endif 130*68d75effSDimitry Andric 131*68d75effSDimitry Andric InitializeCommonFlags(); 132*68d75effSDimitry Andric 133*68d75effSDimitry Andric // TODO(eugenis): dump all flags at verbosity>=2? 134*68d75effSDimitry Andric if (Verbosity()) ReportUnrecognizedFlags(); 135*68d75effSDimitry Andric 136*68d75effSDimitry Andric if (common_flags()->help) { 137*68d75effSDimitry Andric // TODO(samsonov): print all of the flags (ASan, LSan, common). 138*68d75effSDimitry Andric asan_parser.PrintFlagDescriptions(); 139*68d75effSDimitry Andric } 140*68d75effSDimitry Andric 141*68d75effSDimitry Andric // Flag validation: 142*68d75effSDimitry Andric if (!CAN_SANITIZE_LEAKS && common_flags()->detect_leaks) { 143*68d75effSDimitry Andric Report("%s: detect_leaks is not supported on this platform.\n", 144*68d75effSDimitry Andric SanitizerToolName); 145*68d75effSDimitry Andric Die(); 146*68d75effSDimitry Andric } 147*68d75effSDimitry Andric // Ensure that redzone is at least SHADOW_GRANULARITY. 148*68d75effSDimitry Andric if (f->redzone < (int)SHADOW_GRANULARITY) 149*68d75effSDimitry Andric f->redzone = SHADOW_GRANULARITY; 150*68d75effSDimitry Andric // Make "strict_init_order" imply "check_initialization_order". 151*68d75effSDimitry Andric // TODO(samsonov): Use a single runtime flag for an init-order checker. 152*68d75effSDimitry Andric if (f->strict_init_order) { 153*68d75effSDimitry Andric f->check_initialization_order = true; 154*68d75effSDimitry Andric } 155*68d75effSDimitry Andric CHECK_LE((uptr)common_flags()->malloc_context_size, kStackTraceMax); 156*68d75effSDimitry Andric CHECK_LE(f->min_uar_stack_size_log, f->max_uar_stack_size_log); 157*68d75effSDimitry Andric CHECK_GE(f->redzone, 16); 158*68d75effSDimitry Andric CHECK_GE(f->max_redzone, f->redzone); 159*68d75effSDimitry Andric CHECK_LE(f->max_redzone, 2048); 160*68d75effSDimitry Andric CHECK(IsPowerOfTwo(f->redzone)); 161*68d75effSDimitry Andric CHECK(IsPowerOfTwo(f->max_redzone)); 162*68d75effSDimitry Andric if (SANITIZER_RTEMS) { 163*68d75effSDimitry Andric CHECK(!f->unmap_shadow_on_exit); 164*68d75effSDimitry Andric CHECK(!f->protect_shadow_gap); 165*68d75effSDimitry Andric } 166*68d75effSDimitry Andric 167*68d75effSDimitry Andric // quarantine_size is deprecated but we still honor it. 168*68d75effSDimitry Andric // quarantine_size can not be used together with quarantine_size_mb. 169*68d75effSDimitry Andric if (f->quarantine_size >= 0 && f->quarantine_size_mb >= 0) { 170*68d75effSDimitry Andric Report("%s: please use either 'quarantine_size' (deprecated) or " 171*68d75effSDimitry Andric "quarantine_size_mb, but not both\n", SanitizerToolName); 172*68d75effSDimitry Andric Die(); 173*68d75effSDimitry Andric } 174*68d75effSDimitry Andric if (f->quarantine_size >= 0) 175*68d75effSDimitry Andric f->quarantine_size_mb = f->quarantine_size >> 20; 176*68d75effSDimitry Andric if (f->quarantine_size_mb < 0) { 177*68d75effSDimitry Andric const int kDefaultQuarantineSizeMb = 178*68d75effSDimitry Andric (ASAN_LOW_MEMORY) ? 1UL << 4 : 1UL << 8; 179*68d75effSDimitry Andric f->quarantine_size_mb = kDefaultQuarantineSizeMb; 180*68d75effSDimitry Andric } 181*68d75effSDimitry Andric if (f->thread_local_quarantine_size_kb < 0) { 182*68d75effSDimitry Andric const u32 kDefaultThreadLocalQuarantineSizeKb = 183*68d75effSDimitry Andric // It is not advised to go lower than 64Kb, otherwise quarantine batches 184*68d75effSDimitry Andric // pushed from thread local quarantine to global one will create too 185*68d75effSDimitry Andric // much overhead. One quarantine batch size is 8Kb and it holds up to 186*68d75effSDimitry Andric // 1021 chunk, which amounts to 1/8 memory overhead per batch when 187*68d75effSDimitry Andric // thread local quarantine is set to 64Kb. 188*68d75effSDimitry Andric (ASAN_LOW_MEMORY) ? 1 << 6 : FIRST_32_SECOND_64(1 << 8, 1 << 10); 189*68d75effSDimitry Andric f->thread_local_quarantine_size_kb = kDefaultThreadLocalQuarantineSizeKb; 190*68d75effSDimitry Andric } 191*68d75effSDimitry Andric if (f->thread_local_quarantine_size_kb == 0 && f->quarantine_size_mb > 0) { 192*68d75effSDimitry Andric Report("%s: thread_local_quarantine_size_kb can be set to 0 only when " 193*68d75effSDimitry Andric "quarantine_size_mb is set to 0\n", SanitizerToolName); 194*68d75effSDimitry Andric Die(); 195*68d75effSDimitry Andric } 196*68d75effSDimitry Andric if (!f->replace_str && common_flags()->intercept_strlen) { 197*68d75effSDimitry Andric Report("WARNING: strlen interceptor is enabled even though replace_str=0. " 198*68d75effSDimitry Andric "Use intercept_strlen=0 to disable it."); 199*68d75effSDimitry Andric } 200*68d75effSDimitry Andric if (!f->replace_str && common_flags()->intercept_strchr) { 201*68d75effSDimitry Andric Report("WARNING: strchr* interceptors are enabled even though " 202*68d75effSDimitry Andric "replace_str=0. Use intercept_strchr=0 to disable them."); 203*68d75effSDimitry Andric } 204*68d75effSDimitry Andric if (!f->replace_str && common_flags()->intercept_strndup) { 205*68d75effSDimitry Andric Report("WARNING: strndup* interceptors are enabled even though " 206*68d75effSDimitry Andric "replace_str=0. Use intercept_strndup=0 to disable them."); 207*68d75effSDimitry Andric } 208*68d75effSDimitry Andric } 209*68d75effSDimitry Andric 210*68d75effSDimitry Andric } // namespace __asan 211*68d75effSDimitry Andric 212*68d75effSDimitry Andric SANITIZER_INTERFACE_WEAK_DEF(const char*, __asan_default_options, void) { 213*68d75effSDimitry Andric return ""; 214*68d75effSDimitry Andric } 215