tsan_flags.cc revision 543b94a5cd102c0795b44d78234d5458eed2c75e
1//===-- tsan_flags.cc -----------------------------------------------------===// 2// 3// The LLVM Compiler Infrastructure 4// 5// This file is distributed under the University of Illinois Open Source 6// License. See LICENSE.TXT for details. 7// 8//===----------------------------------------------------------------------===// 9// 10// This file is a part of ThreadSanitizer (TSan), a race detector. 11// 12//===----------------------------------------------------------------------===// 13 14#include "sanitizer_common/sanitizer_flags.h" 15#include "sanitizer_common/sanitizer_libc.h" 16#include "tsan_flags.h" 17#include "tsan_rtl.h" 18#include "tsan_mman.h" 19 20namespace __tsan { 21 22Flags *flags() { 23 return &CTX()->flags; 24} 25 26// Can be overriden in frontend. 27#ifdef TSAN_EXTERNAL_HOOKS 28void OverrideFlags(Flags *f); 29#else 30SANITIZER_INTERFACE_ATTRIBUTE 31void WEAK OverrideFlags(Flags *f) { 32 (void)f; 33} 34#endif 35 36void InitializeFlags(Flags *f, const char *env) { 37 internal_memset(f, 0, sizeof(*f)); 38 39 // Default values. 40 f->enable_annotations = true; 41 f->suppress_equal_stacks = true; 42 f->suppress_equal_addresses = true; 43 f->suppress_java = false; 44 f->report_bugs = true; 45 f->report_thread_leaks = true; 46 f->report_destroy_locked = true; 47 f->report_signal_unsafe = true; 48 f->force_seq_cst_atomics = false; 49 f->strip_path_prefix = ""; 50 f->suppressions = ""; 51 f->exitcode = 66; 52 f->log_path = "stderr"; 53 f->atexit_sleep_ms = 1000; 54 f->verbosity = 0; 55 f->profile_memory = ""; 56 f->flush_memory_ms = 0; 57 f->stop_on_start = false; 58 f->running_on_valgrind = false; 59 f->external_symbolizer_path = ""; 60 f->history_size = kGoMode ? 1 : 2; // There are a lot of goroutines in Go. 61 62 // Let a frontend override. 63 OverrideFlags(f); 64 65 // Override from command line. 66 ParseFlag(env, &f->enable_annotations, "enable_annotations"); 67 ParseFlag(env, &f->suppress_equal_stacks, "suppress_equal_stacks"); 68 ParseFlag(env, &f->suppress_equal_addresses, "suppress_equal_addresses"); 69 ParseFlag(env, &f->suppress_java, "suppress_java"); 70 ParseFlag(env, &f->report_bugs, "report_bugs"); 71 ParseFlag(env, &f->report_thread_leaks, "report_thread_leaks"); 72 ParseFlag(env, &f->report_destroy_locked, "report_destroy_locked"); 73 ParseFlag(env, &f->report_signal_unsafe, "report_signal_unsafe"); 74 ParseFlag(env, &f->force_seq_cst_atomics, "force_seq_cst_atomics"); 75 ParseFlag(env, &f->strip_path_prefix, "strip_path_prefix"); 76 ParseFlag(env, &f->suppressions, "suppressions"); 77 ParseFlag(env, &f->exitcode, "exitcode"); 78 ParseFlag(env, &f->log_path, "log_path"); 79 ParseFlag(env, &f->atexit_sleep_ms, "atexit_sleep_ms"); 80 ParseFlag(env, &f->verbosity, "verbosity"); 81 ParseFlag(env, &f->profile_memory, "profile_memory"); 82 ParseFlag(env, &f->flush_memory_ms, "flush_memory_ms"); 83 ParseFlag(env, &f->stop_on_start, "stop_on_start"); 84 ParseFlag(env, &f->external_symbolizer_path, "external_symbolizer_path"); 85 ParseFlag(env, &f->history_size, "history_size"); 86 87 if (!f->report_bugs) { 88 f->report_thread_leaks = false; 89 f->report_destroy_locked = false; 90 f->report_signal_unsafe = false; 91 } 92 93 if (f->history_size < 0 || f->history_size > 7) { 94 Printf("ThreadSanitizer: incorrect value for history_size" 95 " (must be [0..7])\n"); 96 Die(); 97 } 98} 99 100} // namespace __tsan 101