asan_flags.h revision 7f80655d8283dbdf77bfee4a849eed4d59e95c7a
1//===-- asan_flags.h -------------------------------------------*- C++ -*-===//
2//
3//                     The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9//
10// This file is a part of AddressSanitizer, an address sanity checker.
11//
12// ASan runtime flags.
13//===----------------------------------------------------------------------===//
14
15#ifndef ASAN_FLAGS_H
16#define ASAN_FLAGS_H
17
18#include "sanitizer_common/sanitizer_internal_defs.h"
19
20// ASan flag values can be defined in four ways:
21// 1) initialized with default values at startup.
22// 2) overriden during compilation of ASan runtime by providing
23//    compile definition ASAN_DEFAULT_OPTIONS.
24// 3) overriden from string returned by user-specified function
25//    __asan_default_options().
26// 4) overriden from env variable ASAN_OPTIONS.
27
28namespace __asan {
29
30struct Flags {
31  // Size (in bytes) of quarantine used to detect use-after-free errors.
32  // Lower value may reduce memory usage but increase the chance of
33  // false negatives.
34  int  quarantine_size;
35  // Size (in bytes) of redzones around heap objects.
36  // Requirement: redzone >= 32, is a power of two.
37  int  redzone;
38  // If set, prints some debugging information and does additional checks.
39  bool debug;
40  // Controls the way to handle globals (0 - don't detect buffer overflow
41  // on globals, 1 - detect buffer overflow, 2 - print data about registered
42  // globals).
43  int  report_globals;
44  // If set, attempts to catch initialization order issues.
45  bool check_initialization_order;
46  // If set, uses custom wrappers and replacements for libc string functions
47  // to find more errors.
48  bool replace_str;
49  // If set, uses custom wrappers for memset/memcpy/memmove intinsics.
50  bool replace_intrin;
51  // Used on Mac only.
52  bool mac_ignore_invalid_free;
53  // Enables stack-use-after-return checking at run-time.
54  bool detect_stack_use_after_return;
55  // The minimal fake stack size log.
56  int uar_stack_size_log;
57  // ASan allocator flag. max_malloc_fill_size is the maximal amount of bytes
58  // that will be filled with malloc_fill_byte on malloc.
59  int max_malloc_fill_size, malloc_fill_byte;
60  // Override exit status if something was reported.
61  int  exitcode;
62  // If set, user may manually mark memory regions as poisoned or unpoisoned.
63  bool allow_user_poisoning;
64  // Number of seconds to sleep between printing an error report and
65  // terminating application. Useful for debug purposes (when one needs
66  // to attach gdb, for example).
67  int  sleep_before_dying;
68  // If set, registers ASan custom segv handler.
69  bool handle_segv;
70  // If set, allows user register segv handler even if ASan registers one.
71  bool allow_user_segv_handler;
72  // If set, uses alternate stack for signal handling.
73  bool use_sigaltstack;
74  // Allow the users to work around the bug in Nvidia drivers prior to 295.*.
75  bool check_malloc_usable_size;
76  // If set, explicitly unmaps (huge) shadow at exit.
77  bool unmap_shadow_on_exit;
78  // If set, calls abort() instead of _exit() after printing an error report.
79  bool abort_on_error;
80  // Print various statistics after printing an error message or if atexit=1.
81  bool print_stats;
82  // Print the legend for the shadow bytes.
83  bool print_legend;
84  // If set, prints ASan exit stats even after program terminates successfully.
85  bool atexit;
86  // By default, disable core dumper on 64-bit - it makes little sense
87  // to dump 16T+ core.
88  bool disable_core;
89  // Allow the tool to re-exec the program. This may interfere badly with the
90  // debugger.
91  bool allow_reexec;
92  // If set, prints not only thread creation stacks for threads in error report,
93  // but also thread creation stacks for threads that created those threads,
94  // etc. up to main thread.
95  bool print_full_thread_history;
96  // Poison (or not) the heap memory on [de]allocation. Zero value is useful
97  // for benchmarking the allocator or instrumentator.
98  bool poison_heap;
99  // If true, poison partially addressable 8-byte aligned words (default=true).
100  // This flag affects heap and global buffers, but not stack buffers.
101  bool poison_partial;
102  // Report errors on malloc/delete, new/free, new/delete[], etc.
103  bool alloc_dealloc_mismatch;
104  // If true, assume that memcmp(p1, p2, n) always reads n bytes before
105  // comparing p1 and p2.
106  bool strict_memcmp;
107  // If true, assume that dynamic initializers can never access globals from
108  // other modules, even if the latter are already initialized.
109  bool strict_init_order;
110};
111
112extern Flags asan_flags_dont_use_directly;
113inline Flags *flags() {
114  return &asan_flags_dont_use_directly;
115}
116void InitializeFlags(Flags *f, const char *env);
117
118}  // namespace __asan
119
120#endif  // ASAN_FLAGS_H
121