2013-05-20 19:04:43 +08:00
|
|
|
//=-- lsan.cc -------------------------------------------------------------===//
|
|
|
|
//
|
|
|
|
// The LLVM Compiler Infrastructure
|
|
|
|
//
|
|
|
|
// This file is distributed under the University of Illinois Open Source
|
|
|
|
// License. See LICENSE.TXT for details.
|
|
|
|
//
|
|
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
//
|
|
|
|
// This file is a part of LeakSanitizer.
|
|
|
|
// Standalone LSan RTL.
|
|
|
|
//
|
|
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
|
|
|
|
#include "lsan.h"
|
|
|
|
|
|
|
|
#include "sanitizer_common/sanitizer_flags.h"
|
2015-02-18 02:50:30 +08:00
|
|
|
#include "sanitizer_common/sanitizer_flag_parser.h"
|
2013-05-20 19:04:43 +08:00
|
|
|
#include "sanitizer_common/sanitizer_stacktrace.h"
|
|
|
|
#include "lsan_allocator.h"
|
|
|
|
#include "lsan_common.h"
|
|
|
|
#include "lsan_thread.h"
|
|
|
|
|
2013-11-25 22:25:36 +08:00
|
|
|
bool lsan_inited;
|
|
|
|
bool lsan_init_is_running;
|
|
|
|
|
2013-05-20 19:04:43 +08:00
|
|
|
namespace __lsan {
|
|
|
|
|
2013-12-09 21:12:10 +08:00
|
|
|
///// Interface to the common LSan module. /////
|
|
|
|
bool WordIsPoisoned(uptr addr) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2013-11-25 22:25:36 +08:00
|
|
|
} // namespace __lsan
|
|
|
|
|
|
|
|
using namespace __lsan; // NOLINT
|
|
|
|
|
2015-02-18 02:50:30 +08:00
|
|
|
static void InitializeFlags() {
|
|
|
|
// Set all the default values.
|
|
|
|
SetCommonFlagsDefaults();
|
|
|
|
{
|
|
|
|
CommonFlags cf;
|
|
|
|
cf.CopyFrom(*common_flags());
|
|
|
|
cf.external_symbolizer_path = GetEnv("LSAN_SYMBOLIZER_PATH");
|
|
|
|
cf.malloc_context_size = 30;
|
2016-01-15 02:50:09 +08:00
|
|
|
cf.intercept_tls_get_addr = true;
|
2015-02-18 02:50:30 +08:00
|
|
|
cf.detect_leaks = true;
|
2015-08-22 04:49:37 +08:00
|
|
|
cf.exitcode = 23;
|
2015-02-18 02:50:30 +08:00
|
|
|
OverrideCommonFlags(cf);
|
|
|
|
}
|
|
|
|
|
|
|
|
Flags *f = flags();
|
|
|
|
f->SetDefaults();
|
|
|
|
|
|
|
|
FlagParser parser;
|
|
|
|
RegisterLsanFlags(&parser, f);
|
|
|
|
RegisterCommonFlags(&parser);
|
|
|
|
|
|
|
|
parser.ParseString(GetEnv("LSAN_OPTIONS"));
|
|
|
|
|
|
|
|
SetVerbosity(common_flags()->verbosity);
|
|
|
|
|
|
|
|
if (Verbosity()) ReportUnrecognizedFlags();
|
|
|
|
|
|
|
|
if (common_flags()->help) parser.PrintFlagDescriptions();
|
|
|
|
}
|
|
|
|
|
2013-11-25 22:25:36 +08:00
|
|
|
extern "C" void __lsan_init() {
|
|
|
|
CHECK(!lsan_init_is_running);
|
|
|
|
if (lsan_inited)
|
2013-05-20 19:04:43 +08:00
|
|
|
return;
|
2013-11-25 22:25:36 +08:00
|
|
|
lsan_init_is_running = true;
|
2013-05-20 19:04:43 +08:00
|
|
|
SanitizerToolName = "LeakSanitizer";
|
2015-07-22 07:03:13 +08:00
|
|
|
CacheBinaryName();
|
[sanitizer] [SystemZ] Abort if the kernel might be vulnerable to CVE-2016-2143.
In short, CVE-2016-2143 will crash the machine if a process uses both >4TB
virtual addresses and fork(). ASan, TSan, and MSan will, by necessity, map
a sizable chunk of virtual address space, which is much larger than 4TB.
Even worse, sanitizers will always use fork() for llvm-symbolizer when a bug
is detected. Disable all three by aborting on process initialization if
the running kernel version is not known to contain a fix.
Unfortunately, there's no reliable way to detect the fix without crashing
the kernel. So, we rely on whitelisting - I've included a list of upstream
kernel versions that will work. In case someone uses a distribution kernel
or applied the fix themselves, an override switch is also included.
Differential Revision: http://reviews.llvm.org/D19576
llvm-svn: 267747
2016-04-28 01:42:00 +08:00
|
|
|
AvoidCVE_2016_2143();
|
2015-02-18 02:50:30 +08:00
|
|
|
InitializeFlags();
|
|
|
|
InitCommonLsan();
|
2013-05-20 19:04:43 +08:00
|
|
|
InitializeAllocator();
|
|
|
|
InitTlsSize();
|
|
|
|
InitializeInterceptors();
|
|
|
|
InitializeThreadRegistry();
|
|
|
|
u32 tid = ThreadCreate(0, 0, true);
|
|
|
|
CHECK_EQ(tid, 0);
|
|
|
|
ThreadStart(tid, GetTid());
|
2013-06-18 22:44:45 +08:00
|
|
|
SetCurrentThread(tid);
|
2013-05-20 19:04:43 +08:00
|
|
|
|
2013-08-01 22:57:07 +08:00
|
|
|
if (common_flags()->detect_leaks && common_flags()->leak_check_at_exit)
|
|
|
|
Atexit(DoLeakCheck);
|
2014-12-18 05:51:07 +08:00
|
|
|
|
2014-12-26 20:32:32 +08:00
|
|
|
InitializeCoverage(common_flags()->coverage, common_flags()->coverage_dir);
|
2014-12-18 05:51:07 +08:00
|
|
|
|
2013-11-25 22:25:36 +08:00
|
|
|
lsan_inited = true;
|
|
|
|
lsan_init_is_running = false;
|
2013-05-20 19:04:43 +08:00
|
|
|
}
|
|
|
|
|
2014-08-26 20:52:41 +08:00
|
|
|
extern "C" SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
void __sanitizer_print_stack_trace() {
|
|
|
|
GET_STACK_TRACE_FATAL;
|
|
|
|
stack.Print();
|
|
|
|
}
|