Retro68/gcc/libsanitizer/lsan/lsan.cc

117 lines
3.1 KiB
C++
Raw Normal View History

2014-09-21 17:33:12 +00:00
//=-- lsan.cc -------------------------------------------------------------===//
//
// This file is distributed under the University of Illinois Open Source
// License. See LICENSE.TXT for details.
//
//===----------------------------------------------------------------------===//
//
// This file is a part of LeakSanitizer.
// Standalone LSan RTL.
//
//===----------------------------------------------------------------------===//
#include "lsan.h"
#include "sanitizer_common/sanitizer_flags.h"
2017-04-10 11:32:00 +00:00
#include "sanitizer_common/sanitizer_flag_parser.h"
2014-09-21 17:33:12 +00:00
#include "sanitizer_common/sanitizer_stacktrace.h"
#include "lsan_allocator.h"
#include "lsan_common.h"
#include "lsan_thread.h"
bool lsan_inited;
bool lsan_init_is_running;
namespace __lsan {
2015-08-28 15:33:40 +00:00
///// Interface to the common LSan module. /////
bool WordIsPoisoned(uptr addr) {
return false;
2014-09-21 17:33:12 +00:00
}
} // namespace __lsan
using namespace __lsan; // NOLINT
2017-04-10 11:32:00 +00:00
static void InitializeFlags() {
// Set all the default values.
SetCommonFlagsDefaults();
{
CommonFlags cf;
cf.CopyFrom(*common_flags());
cf.external_symbolizer_path = GetEnv("LSAN_SYMBOLIZER_PATH");
cf.malloc_context_size = 30;
cf.intercept_tls_get_addr = true;
2017-04-10 11:32:00 +00:00
cf.detect_leaks = true;
cf.exitcode = 23;
OverrideCommonFlags(cf);
}
Flags *f = flags();
f->SetDefaults();
FlagParser parser;
RegisterLsanFlags(&parser, f);
RegisterCommonFlags(&parser);
2018-12-28 15:30:48 +00:00
// Override from user-specified string.
const char *lsan_default_options = MaybeCallLsanDefaultOptions();
parser.ParseString(lsan_default_options);
2017-04-10 11:32:00 +00:00
parser.ParseString(GetEnv("LSAN_OPTIONS"));
SetVerbosity(common_flags()->verbosity);
if (Verbosity()) ReportUnrecognizedFlags();
if (common_flags()->help) parser.PrintFlagDescriptions();
2019-06-02 15:48:37 +00:00
__sanitizer_set_report_path(common_flags()->log_path);
2017-04-10 11:32:00 +00:00
}
2018-12-28 15:30:48 +00:00
static void OnStackUnwind(const SignalContext &sig, const void *,
BufferedStackTrace *stack) {
2019-06-02 15:48:37 +00:00
GetStackTrace(stack, kStackTraceMax, sig.pc, sig.bp, sig.context,
common_flags()->fast_unwind_on_fatal);
2018-12-28 15:30:48 +00:00
}
2019-06-02 15:48:37 +00:00
static void LsanOnDeadlySignal(int signo, void *siginfo, void *context) {
2018-12-28 15:30:48 +00:00
HandleDeadlySignal(siginfo, context, GetCurrentThread(), &OnStackUnwind,
nullptr);
}
2014-09-21 17:33:12 +00:00
extern "C" void __lsan_init() {
CHECK(!lsan_init_is_running);
if (lsan_inited)
return;
lsan_init_is_running = true;
SanitizerToolName = "LeakSanitizer";
2017-04-10 11:32:00 +00:00
CacheBinaryName();
AvoidCVE_2016_2143();
2017-04-10 11:32:00 +00:00
InitializeFlags();
InitCommonLsan();
2014-09-21 17:33:12 +00:00
InitializeAllocator();
2018-12-28 15:30:48 +00:00
ReplaceSystemMalloc();
2014-09-21 17:33:12 +00:00
InitTlsSize();
InitializeInterceptors();
InitializeThreadRegistry();
2018-12-28 15:30:48 +00:00
InstallDeadlySignalHandlers(LsanOnDeadlySignal);
2014-09-21 17:33:12 +00:00
u32 tid = ThreadCreate(0, 0, true);
CHECK_EQ(tid, 0);
ThreadStart(tid, GetTid());
SetCurrentThread(tid);
if (common_flags()->detect_leaks && common_flags()->leak_check_at_exit)
Atexit(DoLeakCheck);
2017-04-10 11:32:00 +00:00
InitializeCoverage(common_flags()->coverage, common_flags()->coverage_dir);
2014-09-21 17:33:12 +00:00
lsan_inited = true;
lsan_init_is_running = false;
}
2015-08-28 15:33:40 +00:00
extern "C" SANITIZER_INTERFACE_ATTRIBUTE
void __sanitizer_print_stack_trace() {
GET_STACK_TRACE_FATAL;
stack.Print();
}