2012-10-29 Wei Mi <wmi@google.com>
[official-gcc.git] / libasan / asan_flags.h
bloba0dcf3e8a571fb11c925fff0344aac6580a30f27
1 //===-- asan_flags.h -------------------------------------------*- C++ -*-===//
2 //
3 // This file is distributed under the University of Illinois Open Source
4 // License. See LICENSE.TXT for details.
5 //
6 //===----------------------------------------------------------------------===//
7 //
8 // This file is a part of AddressSanitizer, an address sanity checker.
9 //
10 // ASan runtime flags.
11 //===----------------------------------------------------------------------===//
13 #ifndef ASAN_FLAGS_H
14 #define ASAN_FLAGS_H
16 #include "sanitizer/common_interface_defs.h"
18 // ASan flag values can be defined in three ways:
19 // 1) initialized with default values at startup.
20 // 2) overriden from string returned by user-specified function
21 // __asan_default_options().
22 // 3) overriden from env variable ASAN_OPTIONS.
24 namespace __asan {
26 struct Flags {
27 // Size (in bytes) of quarantine used to detect use-after-free errors.
28 // Lower value may reduce memory usage but increase the chance of
29 // false negatives.
30 int quarantine_size;
31 // If set, uses in-process symbolizer from common sanitizer runtime.
32 bool symbolize;
33 // Verbosity level (0 - silent, 1 - a bit of output, 2+ - more output).
34 int verbosity;
35 // Size (in bytes) of redzones around heap objects.
36 // Requirement: redzone >= 32, is a power of two.
37 int redzone;
38 // If set, prints some debugging information and does additional checks.
39 bool debug;
40 // Controls the way to handle globals (0 - don't detect buffer overflow
41 // on globals, 1 - detect buffer overflow, 2 - print data about registered
42 // globals).
43 int report_globals;
44 // If set, attempts to catch initialization order issues.
45 bool check_initialization_order;
46 // Max number of stack frames kept for each allocation.
47 int malloc_context_size;
48 // If set, uses custom wrappers and replacements for libc string functions
49 // to find more errors.
50 bool replace_str;
51 // If set, uses custom wrappers for memset/memcpy/memmove intinsics.
52 bool replace_intrin;
53 // Used on Mac only. See comments in asan_mac.cc and asan_malloc_mac.cc.
54 bool replace_cfallocator;
55 // Used on Mac only.
56 bool mac_ignore_invalid_free;
57 // ASan allocator flag. See asan_allocator.cc.
58 bool use_fake_stack;
59 // ASan allocator flag. Sets the maximal size of allocation request
60 // that would return memory filled with zero bytes.
61 int max_malloc_fill_size;
62 // Override exit status if something was reported.
63 int exitcode;
64 // If set, user may manually mark memory regions as poisoned or unpoisoned.
65 bool allow_user_poisoning;
66 // Number of seconds to sleep between printing an error report and
67 // terminating application. Useful for debug purposes (when one needs
68 // to attach gdb, for example).
69 int sleep_before_dying;
70 // If set, registers ASan custom segv handler.
71 bool handle_segv;
72 // If set, uses alternate stack for signal handling.
73 bool use_sigaltstack;
74 // Allow the users to work around the bug in Nvidia drivers prior to 295.*.
75 bool check_malloc_usable_size;
76 // If set, explicitly unmaps (huge) shadow at exit.
77 bool unmap_shadow_on_exit;
78 // If set, calls abort() instead of _exit() after printing an error report.
79 bool abort_on_error;
80 // If set, prints ASan exit stats even after program terminates successfully.
81 bool atexit;
82 // By default, disable core dumper on 64-bit - it makes little sense
83 // to dump 16T+ core.
84 bool disable_core;
85 // Allow the tool to re-exec the program. This may interfere badly with the
86 // debugger.
87 bool allow_reexec;
88 // Strips this prefix from file paths in error reports.
89 const char *strip_path_prefix;
90 // If set, prints not only thread creation stacks for threads in error report,
91 // but also thread creation stacks for threads that created those threads,
92 // etc. up to main thread.
93 bool print_full_thread_history;
94 // ASan will write logs to "log_path.pid" instead of stderr.
95 const char *log_path;
98 Flags *flags();
99 void InitializeFlags(Flags *f, const char *env);
101 } // namespace __asan
103 #endif // ASAN_FLAGS_H