xref: /freebsd/contrib/llvm-project/compiler-rt/lib/lsan/lsan.cpp (revision 5f757f3ff9144b609b3c433dfd370cc6bdc191ad)
1 //=-- lsan.cpp ------------------------------------------------------------===//
2 //
3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4 // See https://llvm.org/LICENSE.txt for license information.
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6 //
7 //===----------------------------------------------------------------------===//
8 //
9 // This file is a part of LeakSanitizer.
10 // Standalone LSan RTL.
11 //
12 //===----------------------------------------------------------------------===//
13 
14 #include "lsan.h"
15 
16 #include "lsan_allocator.h"
17 #include "lsan_common.h"
18 #include "lsan_thread.h"
19 #include "sanitizer_common/sanitizer_flag_parser.h"
20 #include "sanitizer_common/sanitizer_flags.h"
21 #include "sanitizer_common/sanitizer_interface_internal.h"
22 
23 bool lsan_inited;
24 bool lsan_init_is_running;
25 
26 namespace __lsan {
27 
28 ///// Interface to the common LSan module. /////
29 bool WordIsPoisoned(uptr addr) {
30   return false;
31 }
32 
33 }  // namespace __lsan
34 
35 void __sanitizer::BufferedStackTrace::UnwindImpl(
36     uptr pc, uptr bp, void *context, bool request_fast, u32 max_depth) {
37   using namespace __lsan;
38   uptr stack_top = 0, stack_bottom = 0;
39   if (ThreadContextLsanBase *t = GetCurrentThread()) {
40     stack_top = t->stack_end();
41     stack_bottom = t->stack_begin();
42   }
43   if (SANITIZER_MIPS && !IsValidFrame(bp, stack_top, stack_bottom))
44     return;
45   bool fast = StackTrace::WillUseFastUnwind(request_fast);
46   Unwind(max_depth, pc, bp, context, stack_top, stack_bottom, fast);
47 }
48 
49 using namespace __lsan;
50 
51 static void InitializeFlags() {
52   // Set all the default values.
53   SetCommonFlagsDefaults();
54   {
55     CommonFlags cf;
56     cf.CopyFrom(*common_flags());
57     cf.external_symbolizer_path = GetEnv("LSAN_SYMBOLIZER_PATH");
58     cf.malloc_context_size = 30;
59     cf.intercept_tls_get_addr = true;
60     cf.detect_leaks = true;
61     cf.exitcode = 23;
62     OverrideCommonFlags(cf);
63   }
64 
65   Flags *f = flags();
66   f->SetDefaults();
67 
68   FlagParser parser;
69   RegisterLsanFlags(&parser, f);
70   RegisterCommonFlags(&parser);
71 
72   // Override from user-specified string.
73   const char *lsan_default_options = __lsan_default_options();
74   parser.ParseString(lsan_default_options);
75   parser.ParseStringFromEnv("LSAN_OPTIONS");
76 
77   InitializeCommonFlags();
78 
79   if (Verbosity()) ReportUnrecognizedFlags();
80 
81   if (common_flags()->help) parser.PrintFlagDescriptions();
82 
83   __sanitizer_set_report_path(common_flags()->log_path);
84 }
85 
86 extern "C" void __lsan_init() {
87   CHECK(!lsan_init_is_running);
88   if (lsan_inited)
89     return;
90   lsan_init_is_running = true;
91   SanitizerToolName = "LeakSanitizer";
92   CacheBinaryName();
93   AvoidCVE_2016_2143();
94   InitializeFlags();
95   InitCommonLsan();
96   InitializeAllocator();
97   ReplaceSystemMalloc();
98   InitTlsSize();
99   InitializeInterceptors();
100   InitializeThreads();
101   InstallDeadlySignalHandlers(LsanOnDeadlySignal);
102   InitializeMainThread();
103   InstallAtExitCheckLeaks();
104   InstallAtForkHandler();
105 
106   InitializeCoverage(common_flags()->coverage, common_flags()->coverage_dir);
107 
108   lsan_inited = true;
109   lsan_init_is_running = false;
110 }
111 
112 extern "C" SANITIZER_INTERFACE_ATTRIBUTE
113 void __sanitizer_print_stack_trace() {
114   GET_STACK_TRACE_FATAL;
115   stack.Print();
116 }
117