2013-02-04 Paul Thomas <pault@gcc.gnu.org>
[official-gcc.git] / libsanitizer / tsan / tsan_flags.cc
blob630bd75769bccad3c4b988c9cdf4ed114dc556a0
1 //===-- tsan_flags.cc -----------------------------------------------------===//
2 //
3 // This file is distributed under the University of Illinois Open Source
4 // License. See LICENSE.TXT for details.
5 //
6 //===----------------------------------------------------------------------===//
7 //
8 // This file is a part of ThreadSanitizer (TSan), a race detector.
9 //
10 //===----------------------------------------------------------------------===//
12 #include "sanitizer_common/sanitizer_flags.h"
13 #include "sanitizer_common/sanitizer_libc.h"
14 #include "tsan_flags.h"
15 #include "tsan_rtl.h"
16 #include "tsan_mman.h"
18 namespace __tsan {
20 Flags *flags() {
21 return &CTX()->flags;
24 // Can be overriden in frontend.
25 #ifdef TSAN_EXTERNAL_HOOKS
26 void OverrideFlags(Flags *f);
27 #else
28 SANITIZER_INTERFACE_ATTRIBUTE
29 void WEAK OverrideFlags(Flags *f) {
30 (void)f;
32 #endif
34 void InitializeFlags(Flags *f, const char *env) {
35 internal_memset(f, 0, sizeof(*f));
37 // Default values.
38 f->enable_annotations = true;
39 f->suppress_equal_stacks = true;
40 f->suppress_equal_addresses = true;
41 f->suppress_java = false;
42 f->report_bugs = true;
43 f->report_thread_leaks = true;
44 f->report_destroy_locked = true;
45 f->report_signal_unsafe = true;
46 f->force_seq_cst_atomics = false;
47 f->strip_path_prefix = "";
48 f->suppressions = "";
49 f->exitcode = 66;
50 f->log_path = "stderr";
51 f->atexit_sleep_ms = 1000;
52 f->verbosity = 0;
53 f->profile_memory = "";
54 f->flush_memory_ms = 0;
55 f->stop_on_start = false;
56 f->running_on_valgrind = false;
57 f->external_symbolizer_path = "";
58 f->history_size = kGoMode ? 1 : 2; // There are a lot of goroutines in Go.
59 f->io_sync = 1;
61 // Let a frontend override.
62 OverrideFlags(f);
64 // Override from command line.
65 ParseFlag(env, &f->enable_annotations, "enable_annotations");
66 ParseFlag(env, &f->suppress_equal_stacks, "suppress_equal_stacks");
67 ParseFlag(env, &f->suppress_equal_addresses, "suppress_equal_addresses");
68 ParseFlag(env, &f->suppress_java, "suppress_java");
69 ParseFlag(env, &f->report_bugs, "report_bugs");
70 ParseFlag(env, &f->report_thread_leaks, "report_thread_leaks");
71 ParseFlag(env, &f->report_destroy_locked, "report_destroy_locked");
72 ParseFlag(env, &f->report_signal_unsafe, "report_signal_unsafe");
73 ParseFlag(env, &f->force_seq_cst_atomics, "force_seq_cst_atomics");
74 ParseFlag(env, &f->strip_path_prefix, "strip_path_prefix");
75 ParseFlag(env, &f->suppressions, "suppressions");
76 ParseFlag(env, &f->exitcode, "exitcode");
77 ParseFlag(env, &f->log_path, "log_path");
78 ParseFlag(env, &f->atexit_sleep_ms, "atexit_sleep_ms");
79 ParseFlag(env, &f->verbosity, "verbosity");
80 ParseFlag(env, &f->profile_memory, "profile_memory");
81 ParseFlag(env, &f->flush_memory_ms, "flush_memory_ms");
82 ParseFlag(env, &f->stop_on_start, "stop_on_start");
83 ParseFlag(env, &f->external_symbolizer_path, "external_symbolizer_path");
84 ParseFlag(env, &f->history_size, "history_size");
85 ParseFlag(env, &f->io_sync, "io_sync");
87 if (!f->report_bugs) {
88 f->report_thread_leaks = false;
89 f->report_destroy_locked = false;
90 f->report_signal_unsafe = false;
93 if (f->history_size < 0 || f->history_size > 7) {
94 Printf("ThreadSanitizer: incorrect value for history_size"
95 " (must be [0..7])\n");
96 Die();
99 if (f->io_sync < 0 || f->io_sync > 2) {
100 Printf("ThreadSanitizer: incorrect value for io_sync"
101 " (must be [0..2])\n");
102 Die();
106 } // namespace __tsan