xref: /openbsd-src/gnu/llvm/compiler-rt/lib/tsan/rtl/tsan_flags.cpp (revision 810390e339a5425391477d5d41c78d7cab2424ac)
13cab2bb3Spatrick //===-- tsan_flags.cpp ----------------------------------------------------===//
23cab2bb3Spatrick //
33cab2bb3Spatrick // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
43cab2bb3Spatrick // See https://llvm.org/LICENSE.txt for license information.
53cab2bb3Spatrick // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
63cab2bb3Spatrick //
73cab2bb3Spatrick //===----------------------------------------------------------------------===//
83cab2bb3Spatrick //
93cab2bb3Spatrick // This file is a part of ThreadSanitizer (TSan), a race detector.
103cab2bb3Spatrick //
113cab2bb3Spatrick //===----------------------------------------------------------------------===//
123cab2bb3Spatrick 
133cab2bb3Spatrick #include "sanitizer_common/sanitizer_flags.h"
143cab2bb3Spatrick #include "sanitizer_common/sanitizer_flag_parser.h"
153cab2bb3Spatrick #include "sanitizer_common/sanitizer_libc.h"
163cab2bb3Spatrick #include "tsan_flags.h"
173cab2bb3Spatrick #include "tsan_rtl.h"
183cab2bb3Spatrick #include "tsan_mman.h"
193cab2bb3Spatrick #include "ubsan/ubsan_flags.h"
203cab2bb3Spatrick 
213cab2bb3Spatrick namespace __tsan {
223cab2bb3Spatrick 
233cab2bb3Spatrick // Can be overriden in frontend.
243cab2bb3Spatrick #ifdef TSAN_EXTERNAL_HOOKS
253cab2bb3Spatrick extern "C" const char* __tsan_default_options();
263cab2bb3Spatrick #else
273cab2bb3Spatrick SANITIZER_WEAK_DEFAULT_IMPL
283cab2bb3Spatrick const char *__tsan_default_options() {
293cab2bb3Spatrick   return "";
303cab2bb3Spatrick }
313cab2bb3Spatrick #endif
323cab2bb3Spatrick 
SetDefaults()333cab2bb3Spatrick void Flags::SetDefaults() {
343cab2bb3Spatrick #define TSAN_FLAG(Type, Name, DefaultValue, Description) Name = DefaultValue;
353cab2bb3Spatrick #include "tsan_flags.inc"
363cab2bb3Spatrick #undef TSAN_FLAG
373cab2bb3Spatrick   // DDFlags
383cab2bb3Spatrick   second_deadlock_stack = false;
393cab2bb3Spatrick }
403cab2bb3Spatrick 
RegisterTsanFlags(FlagParser * parser,Flags * f)413cab2bb3Spatrick void RegisterTsanFlags(FlagParser *parser, Flags *f) {
423cab2bb3Spatrick #define TSAN_FLAG(Type, Name, DefaultValue, Description) \
433cab2bb3Spatrick   RegisterFlag(parser, #Name, Description, &f->Name);
443cab2bb3Spatrick #include "tsan_flags.inc"
453cab2bb3Spatrick #undef TSAN_FLAG
463cab2bb3Spatrick   // DDFlags
473cab2bb3Spatrick   RegisterFlag(parser, "second_deadlock_stack",
483cab2bb3Spatrick       "Report where each mutex is locked in deadlock reports",
493cab2bb3Spatrick       &f->second_deadlock_stack);
503cab2bb3Spatrick }
513cab2bb3Spatrick 
InitializeFlags(Flags * f,const char * env,const char * env_option_name)523cab2bb3Spatrick void InitializeFlags(Flags *f, const char *env, const char *env_option_name) {
533cab2bb3Spatrick   SetCommonFlagsDefaults();
543cab2bb3Spatrick   {
553cab2bb3Spatrick     // Override some common flags defaults.
563cab2bb3Spatrick     CommonFlags cf;
573cab2bb3Spatrick     cf.CopyFrom(*common_flags());
58*810390e3Srobert     cf.external_symbolizer_path = GetEnv("TSAN_SYMBOLIZER_PATH");
593cab2bb3Spatrick     cf.allow_addr2line = true;
603cab2bb3Spatrick     if (SANITIZER_GO) {
613cab2bb3Spatrick       // Does not work as expected for Go: runtime handles SIGABRT and crashes.
623cab2bb3Spatrick       cf.abort_on_error = false;
633cab2bb3Spatrick       // Go does not have mutexes.
643cab2bb3Spatrick       cf.detect_deadlocks = false;
653cab2bb3Spatrick     }
663cab2bb3Spatrick     cf.print_suppressions = false;
673cab2bb3Spatrick     cf.stack_trace_format = "    #%n %f %S %M";
683cab2bb3Spatrick     cf.exitcode = 66;
693cab2bb3Spatrick     cf.intercept_tls_get_addr = true;
703cab2bb3Spatrick     OverrideCommonFlags(cf);
713cab2bb3Spatrick   }
723cab2bb3Spatrick 
733cab2bb3Spatrick   f->SetDefaults();
743cab2bb3Spatrick 
753cab2bb3Spatrick   FlagParser parser;
763cab2bb3Spatrick   RegisterTsanFlags(&parser, f);
773cab2bb3Spatrick   RegisterCommonFlags(&parser);
783cab2bb3Spatrick 
793cab2bb3Spatrick #if TSAN_CONTAINS_UBSAN
803cab2bb3Spatrick   __ubsan::Flags *uf = __ubsan::flags();
813cab2bb3Spatrick   uf->SetDefaults();
823cab2bb3Spatrick 
833cab2bb3Spatrick   FlagParser ubsan_parser;
843cab2bb3Spatrick   __ubsan::RegisterUbsanFlags(&ubsan_parser, uf);
853cab2bb3Spatrick   RegisterCommonFlags(&ubsan_parser);
863cab2bb3Spatrick #endif
873cab2bb3Spatrick 
883cab2bb3Spatrick   // Let a frontend override.
893cab2bb3Spatrick   parser.ParseString(__tsan_default_options());
903cab2bb3Spatrick #if TSAN_CONTAINS_UBSAN
91d89ec533Spatrick   const char *ubsan_default_options = __ubsan_default_options();
923cab2bb3Spatrick   ubsan_parser.ParseString(ubsan_default_options);
933cab2bb3Spatrick #endif
943cab2bb3Spatrick   // Override from command line.
953cab2bb3Spatrick   parser.ParseString(env, env_option_name);
963cab2bb3Spatrick #if TSAN_CONTAINS_UBSAN
973cab2bb3Spatrick   ubsan_parser.ParseStringFromEnv("UBSAN_OPTIONS");
983cab2bb3Spatrick #endif
993cab2bb3Spatrick 
100*810390e3Srobert   // Check flags.
1013cab2bb3Spatrick   if (!f->report_bugs) {
1023cab2bb3Spatrick     f->report_thread_leaks = false;
1033cab2bb3Spatrick     f->report_destroy_locked = false;
1043cab2bb3Spatrick     f->report_signal_unsafe = false;
1053cab2bb3Spatrick   }
1063cab2bb3Spatrick 
1073cab2bb3Spatrick   InitializeCommonFlags();
1083cab2bb3Spatrick 
1093cab2bb3Spatrick   if (Verbosity()) ReportUnrecognizedFlags();
1103cab2bb3Spatrick 
1113cab2bb3Spatrick   if (common_flags()->help) parser.PrintFlagDescriptions();
1123cab2bb3Spatrick 
1133cab2bb3Spatrick   if (f->io_sync < 0 || f->io_sync > 2) {
1143cab2bb3Spatrick     Printf("ThreadSanitizer: incorrect value for io_sync"
1153cab2bb3Spatrick            " (must be [0..2])\n");
1163cab2bb3Spatrick     Die();
1173cab2bb3Spatrick   }
1183cab2bb3Spatrick }
1193cab2bb3Spatrick 
1203cab2bb3Spatrick }  // namespace __tsan
121