| //===-- tsan_flags.cpp ----------------------------------------------------===// |
| // |
| // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. |
| // See https://llvm.org/LICENSE.txt for license information. |
| // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception |
| // |
| //===----------------------------------------------------------------------===// |
| // |
| // This file is a part of ThreadSanitizer (TSan), a race detector. |
| // |
| //===----------------------------------------------------------------------===// |
| |
| #include "sanitizer_common/sanitizer_flags.h" |
| #include "sanitizer_common/sanitizer_flag_parser.h" |
| #include "sanitizer_common/sanitizer_libc.h" |
| #include "tsan_flags.h" |
| #include "tsan_rtl.h" |
| #include "tsan_mman.h" |
| #include "ubsan/ubsan_flags.h" |
| |
| namespace __tsan { |
| |
| // Can be overriden in frontend. |
| #ifdef TSAN_EXTERNAL_HOOKS |
| extern "C" const char* __tsan_default_options(); |
| #else |
| SANITIZER_WEAK_DEFAULT_IMPL |
| const char *__tsan_default_options() { |
| return ""; |
| } |
| #endif |
| |
| void Flags::SetDefaults() { |
| #define TSAN_FLAG(Type, Name, DefaultValue, Description) Name = DefaultValue; |
| #include "tsan_flags.inc" |
| #undef TSAN_FLAG |
| // DDFlags |
| second_deadlock_stack = false; |
| } |
| |
| void RegisterTsanFlags(FlagParser *parser, Flags *f) { |
| #define TSAN_FLAG(Type, Name, DefaultValue, Description) \ |
| RegisterFlag(parser, #Name, Description, &f->Name); |
| #include "tsan_flags.inc" |
| #undef TSAN_FLAG |
| // DDFlags |
| RegisterFlag(parser, "second_deadlock_stack", |
| "Report where each mutex is locked in deadlock reports", |
| &f->second_deadlock_stack); |
| } |
| |
| void InitializeFlags(Flags *f, const char *env, const char *env_option_name) { |
| SetCommonFlagsDefaults(); |
| { |
| // Override some common flags defaults. |
| CommonFlags cf; |
| cf.CopyFrom(*common_flags()); |
| cf.external_symbolizer_path = GetEnv("TSAN_SYMBOLIZER_PATH"); |
| cf.allow_addr2line = true; |
| if (SANITIZER_GO) { |
| // Does not work as expected for Go: runtime handles SIGABRT and crashes. |
| cf.abort_on_error = false; |
| // Go does not have mutexes. |
| cf.detect_deadlocks = false; |
| } |
| cf.print_suppressions = false; |
| cf.stack_trace_format = " #%n %f %S %M"; |
| cf.exitcode = 66; |
| cf.intercept_tls_get_addr = true; |
| OverrideCommonFlags(cf); |
| } |
| |
| f->SetDefaults(); |
| |
| FlagParser parser; |
| RegisterTsanFlags(&parser, f); |
| RegisterCommonFlags(&parser); |
| |
| #if TSAN_CONTAINS_UBSAN |
| __ubsan::Flags *uf = __ubsan::flags(); |
| uf->SetDefaults(); |
| |
| FlagParser ubsan_parser; |
| __ubsan::RegisterUbsanFlags(&ubsan_parser, uf); |
| RegisterCommonFlags(&ubsan_parser); |
| #endif |
| |
| // Let a frontend override. |
| parser.ParseString(__tsan_default_options()); |
| #if TSAN_CONTAINS_UBSAN |
| const char *ubsan_default_options = __ubsan_default_options(); |
| ubsan_parser.ParseString(ubsan_default_options); |
| #endif |
| // Override from command line. |
| parser.ParseString(env, env_option_name); |
| #if TSAN_CONTAINS_UBSAN |
| ubsan_parser.ParseStringFromEnv("UBSAN_OPTIONS"); |
| #endif |
| |
| // Sanity check. |
| if (!f->report_bugs) { |
| f->report_thread_leaks = false; |
| f->report_destroy_locked = false; |
| f->report_signal_unsafe = false; |
| } |
| |
| InitializeCommonFlags(); |
| |
| if (Verbosity()) ReportUnrecognizedFlags(); |
| |
| if (common_flags()->help) parser.PrintFlagDescriptions(); |
| |
| if (f->history_size < 0 || f->history_size > 7) { |
| Printf("ThreadSanitizer: incorrect value for history_size" |
| " (must be [0..7])\n"); |
| Die(); |
| } |
| |
| if (f->io_sync < 0 || f->io_sync > 2) { |
| Printf("ThreadSanitizer: incorrect value for io_sync" |
| " (must be [0..2])\n"); |
| Die(); |
| } |
| } |
| |
| } // namespace __tsan |