asan_flags.h revision dbd69cc9ccda50efd0305cd0ce9bad50defe4b42
1//===-- asan_flags.h -------------------------------------------*- C++ -*-===//
2//
3//                     The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9//
10// This file is a part of AddressSanitizer, an address sanity checker.
11//
12// ASan runtime flags.
13//===----------------------------------------------------------------------===//
14
15#ifndef ASAN_FLAGS_H
16#define ASAN_FLAGS_H
17
18#include "sanitizer_common/sanitizer_internal_defs.h"
19
20// ASan flag values can be defined in four ways:
21// 1) initialized with default values at startup.
22// 2) overriden during compilation of ASan runtime by providing
23//    compile definition ASAN_DEFAULT_OPTIONS.
24// 3) overriden from string returned by user-specified function
25//    __asan_default_options().
26// 4) overriden from env variable ASAN_OPTIONS.
27
28namespace __asan {
29
30struct Flags {
31  // Size (in bytes) of quarantine used to detect use-after-free errors.
32  // Lower value may reduce memory usage but increase the chance of
33  // false negatives.
34  int  quarantine_size;
35  // Size (in bytes) of redzones around heap objects.
36  // Requirement: redzone >= 32, is a power of two.
37  int  redzone;
38  // If set, prints some debugging information and does additional checks.
39  bool debug;
40  // Controls the way to handle globals (0 - don't detect buffer overflow
41  // on globals, 1 - detect buffer overflow, 2 - print data about registered
42  // globals).
43  int  report_globals;
44  // If set, attempts to catch initialization order issues.
45  bool check_initialization_order;
46  // If set, uses custom wrappers and replacements for libc string functions
47  // to find more errors.
48  bool replace_str;
49  // If set, uses custom wrappers for memset/memcpy/memmove intinsics.
50  bool replace_intrin;
51  // Used on Mac only.
52  bool mac_ignore_invalid_free;
53  // Enables stack-use-after-return checking at run-time.
54  bool detect_stack_use_after_return;
55  // The minimal fake stack size log.
56  int uar_stack_size_log;
57  // ASan allocator flag. max_malloc_fill_size is the maximal amount of bytes
58  // that will be filled with malloc_fill_byte on malloc.
59  int max_malloc_fill_size, malloc_fill_byte;
60  // Override exit status if something was reported.
61  int  exitcode;
62  // If set, user may manually mark memory regions as poisoned or unpoisoned.
63  bool allow_user_poisoning;
64  // Number of seconds to sleep between printing an error report and
65  // terminating application. Useful for debug purposes (when one needs
66  // to attach gdb, for example).
67  int  sleep_before_dying;
68  // If set, registers ASan custom segv handler.
69  bool handle_segv;
70  // If set, allows user register segv handler even if ASan registers one.
71  bool allow_user_segv_handler;
72  // If set, uses alternate stack for signal handling.
73  bool use_sigaltstack;
74  // Allow the users to work around the bug in Nvidia drivers prior to 295.*.
75  bool check_malloc_usable_size;
76  // If set, explicitly unmaps (huge) shadow at exit.
77  bool unmap_shadow_on_exit;
78  // If set, calls abort() instead of _exit() after printing an error report.
79  bool abort_on_error;
80  // Print various statistics after printing an error message or if atexit=1.
81  bool print_stats;
82  // Print the legend for the shadow bytes.
83  bool print_legend;
84  // If set, prints ASan exit stats even after program terminates successfully.
85  bool atexit;
86  // If set, coverage information will be dumped at shutdown time if the
87  // appropriate instrumentation was enabled.
88  bool coverage;
89  // By default, disable core dumper on 64-bit - it makes little sense
90  // to dump 16T+ core.
91  bool disable_core;
92  // Allow the tool to re-exec the program. This may interfere badly with the
93  // debugger.
94  bool allow_reexec;
95  // If set, prints not only thread creation stacks for threads in error report,
96  // but also thread creation stacks for threads that created those threads,
97  // etc. up to main thread.
98  bool print_full_thread_history;
99  // Poison (or not) the heap memory on [de]allocation. Zero value is useful
100  // for benchmarking the allocator or instrumentator.
101  bool poison_heap;
102  // If true, poison partially addressable 8-byte aligned words (default=true).
103  // This flag affects heap and global buffers, but not stack buffers.
104  bool poison_partial;
105  // Report errors on malloc/delete, new/free, new/delete[], etc.
106  bool alloc_dealloc_mismatch;
107  // If true, assume that memcmp(p1, p2, n) always reads n bytes before
108  // comparing p1 and p2.
109  bool strict_memcmp;
110  // If true, assume that dynamic initializers can never access globals from
111  // other modules, even if the latter are already initialized.
112  bool strict_init_order;
113};
114
115extern Flags asan_flags_dont_use_directly;
116inline Flags *flags() {
117  return &asan_flags_dont_use_directly;
118}
119void InitializeFlags(Flags *f, const char *env);
120
121}  // namespace __asan
122
123#endif  // ASAN_FLAGS_H
124