sanitizer_flag_parser.cpp 5.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190
  1. //===-- sanitizer_flag_parser.cpp -----------------------------------------===//
  2. //
  3. // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
  4. // See https://llvm.org/LICENSE.txt for license information.
  5. // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
  6. //
  7. //===----------------------------------------------------------------------===//
  8. //
  9. // This file is a part of ThreadSanitizer/AddressSanitizer runtime.
  10. //
  11. //===----------------------------------------------------------------------===//
  12. #include "sanitizer_flag_parser.h"
  13. #include "sanitizer_common.h"
  14. #include "sanitizer_flag_parser.h"
  15. #include "sanitizer_flags.h"
  16. #include "sanitizer_libc.h"
  17. namespace __sanitizer {
  18. class UnknownFlags {
  19. static const int kMaxUnknownFlags = 20;
  20. const char *unknown_flags_[kMaxUnknownFlags];
  21. int n_unknown_flags_;
  22. public:
  23. void Add(const char *name) {
  24. CHECK_LT(n_unknown_flags_, kMaxUnknownFlags);
  25. unknown_flags_[n_unknown_flags_++] = name;
  26. }
  27. void Report() {
  28. if (!n_unknown_flags_) return;
  29. Printf("WARNING: found %d unrecognized flag(s):\n", n_unknown_flags_);
  30. for (int i = 0; i < n_unknown_flags_; ++i)
  31. Printf(" %s\n", unknown_flags_[i]);
  32. n_unknown_flags_ = 0;
  33. }
  34. };
  35. UnknownFlags unknown_flags;
  36. void ReportUnrecognizedFlags() {
  37. unknown_flags.Report();
  38. }
  39. char *FlagParser::ll_strndup(const char *s, uptr n) {
  40. uptr len = internal_strnlen(s, n);
  41. char *s2 = (char *)GetGlobalLowLevelAllocator().Allocate(len + 1);
  42. internal_memcpy(s2, s, len);
  43. s2[len] = 0;
  44. return s2;
  45. }
  46. void FlagParser::PrintFlagDescriptions() {
  47. char buffer[128];
  48. buffer[sizeof(buffer) - 1] = '\0';
  49. Printf("Available flags for %s:\n", SanitizerToolName);
  50. for (int i = 0; i < n_flags_; ++i) {
  51. bool truncated = !(flags_[i].handler->Format(buffer, sizeof(buffer)));
  52. CHECK_EQ(buffer[sizeof(buffer) - 1], '\0');
  53. const char *truncation_str = truncated ? " Truncated" : "";
  54. Printf("\t%s\n\t\t- %s (Current Value%s: %s)\n", flags_[i].name,
  55. flags_[i].desc, truncation_str, buffer);
  56. }
  57. }
  58. void FlagParser::fatal_error(const char *err) {
  59. Printf("%s: ERROR: %s\n", SanitizerToolName, err);
  60. Die();
  61. }
  62. bool FlagParser::is_space(char c) {
  63. return c == ' ' || c == ',' || c == ':' || c == '\n' || c == '\t' ||
  64. c == '\r';
  65. }
  66. void FlagParser::skip_whitespace() {
  67. while (is_space(buf_[pos_])) ++pos_;
  68. }
  69. void FlagParser::parse_flag(const char *env_option_name) {
  70. uptr name_start = pos_;
  71. while (buf_[pos_] != 0 && buf_[pos_] != '=' && !is_space(buf_[pos_])) ++pos_;
  72. if (buf_[pos_] != '=') {
  73. if (env_option_name) {
  74. Printf("%s: ERROR: expected '=' in %s\n", SanitizerToolName,
  75. env_option_name);
  76. Die();
  77. } else {
  78. fatal_error("expected '='");
  79. }
  80. }
  81. char *name = ll_strndup(buf_ + name_start, pos_ - name_start);
  82. uptr value_start = ++pos_;
  83. char *value;
  84. if (buf_[pos_] == '\'' || buf_[pos_] == '"') {
  85. char quote = buf_[pos_++];
  86. while (buf_[pos_] != 0 && buf_[pos_] != quote) ++pos_;
  87. if (buf_[pos_] == 0) fatal_error("unterminated string");
  88. value = ll_strndup(buf_ + value_start + 1, pos_ - value_start - 1);
  89. ++pos_; // consume the closing quote
  90. } else {
  91. while (buf_[pos_] != 0 && !is_space(buf_[pos_])) ++pos_;
  92. if (buf_[pos_] != 0 && !is_space(buf_[pos_]))
  93. fatal_error("expected separator or eol");
  94. value = ll_strndup(buf_ + value_start, pos_ - value_start);
  95. }
  96. bool res = run_handler(name, value);
  97. if (!res) fatal_error("Flag parsing failed.");
  98. }
  99. void FlagParser::parse_flags(const char *env_option_name) {
  100. while (true) {
  101. skip_whitespace();
  102. if (buf_[pos_] == 0) break;
  103. parse_flag(env_option_name);
  104. }
  105. // Do a sanity check for certain flags.
  106. if (common_flags_dont_use.malloc_context_size < 1)
  107. common_flags_dont_use.malloc_context_size = 1;
  108. }
  109. void FlagParser::ParseStringFromEnv(const char *env_name) {
  110. const char *env = GetEnv(env_name);
  111. VPrintf(1, "%s: %s\n", env_name, env ? env : "<empty>");
  112. ParseString(env, env_name);
  113. }
  114. void FlagParser::ParseString(const char *s, const char *env_option_name) {
  115. if (!s) return;
  116. // Backup current parser state to allow nested ParseString() calls.
  117. const char *old_buf_ = buf_;
  118. uptr old_pos_ = pos_;
  119. buf_ = s;
  120. pos_ = 0;
  121. parse_flags(env_option_name);
  122. buf_ = old_buf_;
  123. pos_ = old_pos_;
  124. }
  125. bool FlagParser::ParseFile(const char *path, bool ignore_missing) {
  126. static const uptr kMaxIncludeSize = 1 << 15;
  127. char *data;
  128. uptr data_mapped_size;
  129. error_t err;
  130. uptr len;
  131. if (!ReadFileToBuffer(path, &data, &data_mapped_size, &len,
  132. Max(kMaxIncludeSize, GetPageSizeCached()), &err)) {
  133. if (ignore_missing)
  134. return true;
  135. Printf("Failed to read options from '%s': error %d\n", path, err);
  136. return false;
  137. }
  138. ParseString(data, path);
  139. UnmapOrDie(data, data_mapped_size);
  140. return true;
  141. }
  142. bool FlagParser::run_handler(const char *name, const char *value) {
  143. for (int i = 0; i < n_flags_; ++i) {
  144. if (internal_strcmp(name, flags_[i].name) == 0)
  145. return flags_[i].handler->Parse(value);
  146. }
  147. // Unrecognized flag. This is not a fatal error, we may print a warning later.
  148. unknown_flags.Add(name);
  149. return true;
  150. }
  151. void FlagParser::RegisterHandler(const char *name, FlagHandlerBase *handler,
  152. const char *desc) {
  153. CHECK_LT(n_flags_, kMaxFlags);
  154. flags_[n_flags_].name = name;
  155. flags_[n_flags_].desc = desc;
  156. flags_[n_flags_].handler = handler;
  157. ++n_flags_;
  158. }
  159. FlagParser::FlagParser() : n_flags_(0), buf_(nullptr), pos_(0) {
  160. flags_ =
  161. (Flag *)GetGlobalLowLevelAllocator().Allocate(sizeof(Flag) * kMaxFlags);
  162. }
  163. } // namespace __sanitizer