b4ab7d34f5
From-SVN: r196009
109 lines
3.5 KiB
C++
109 lines
3.5 KiB
C++
//===-- tsan_flags.cc -----------------------------------------------------===//
|
|
//
|
|
// This file is distributed under the University of Illinois Open Source
|
|
// License. See LICENSE.TXT for details.
|
|
//
|
|
//===----------------------------------------------------------------------===//
|
|
//
|
|
// This file is a part of ThreadSanitizer (TSan), a race detector.
|
|
//
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
#include "sanitizer_common/sanitizer_flags.h"
|
|
#include "sanitizer_common/sanitizer_libc.h"
|
|
#include "tsan_flags.h"
|
|
#include "tsan_rtl.h"
|
|
#include "tsan_mman.h"
|
|
|
|
namespace __tsan {
|
|
|
|
Flags *flags() {
|
|
return &CTX()->flags;
|
|
}
|
|
|
|
// Can be overriden in frontend.
|
|
#ifdef TSAN_EXTERNAL_HOOKS
|
|
void OverrideFlags(Flags *f);
|
|
#else
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
void WEAK OverrideFlags(Flags *f) {
|
|
(void)f;
|
|
}
|
|
#endif
|
|
|
|
void InitializeFlags(Flags *f, const char *env) {
|
|
internal_memset(f, 0, sizeof(*f));
|
|
|
|
// Default values.
|
|
f->enable_annotations = true;
|
|
f->suppress_equal_stacks = true;
|
|
f->suppress_equal_addresses = true;
|
|
f->suppress_java = false;
|
|
f->report_bugs = true;
|
|
f->report_thread_leaks = true;
|
|
f->report_destroy_locked = true;
|
|
f->report_signal_unsafe = true;
|
|
f->report_atomic_races = true;
|
|
f->force_seq_cst_atomics = false;
|
|
f->strip_path_prefix = "";
|
|
f->suppressions = "";
|
|
f->exitcode = 66;
|
|
f->log_path = "stderr";
|
|
f->atexit_sleep_ms = 1000;
|
|
f->verbosity = 0;
|
|
f->profile_memory = "";
|
|
f->flush_memory_ms = 0;
|
|
f->stop_on_start = false;
|
|
f->running_on_valgrind = false;
|
|
f->external_symbolizer_path = "";
|
|
f->history_size = kGoMode ? 1 : 2; // There are a lot of goroutines in Go.
|
|
f->io_sync = 1;
|
|
|
|
// Let a frontend override.
|
|
OverrideFlags(f);
|
|
|
|
// Override from command line.
|
|
ParseFlag(env, &f->enable_annotations, "enable_annotations");
|
|
ParseFlag(env, &f->suppress_equal_stacks, "suppress_equal_stacks");
|
|
ParseFlag(env, &f->suppress_equal_addresses, "suppress_equal_addresses");
|
|
ParseFlag(env, &f->suppress_java, "suppress_java");
|
|
ParseFlag(env, &f->report_bugs, "report_bugs");
|
|
ParseFlag(env, &f->report_thread_leaks, "report_thread_leaks");
|
|
ParseFlag(env, &f->report_destroy_locked, "report_destroy_locked");
|
|
ParseFlag(env, &f->report_signal_unsafe, "report_signal_unsafe");
|
|
ParseFlag(env, &f->report_atomic_races, "report_atomic_races");
|
|
ParseFlag(env, &f->force_seq_cst_atomics, "force_seq_cst_atomics");
|
|
ParseFlag(env, &f->strip_path_prefix, "strip_path_prefix");
|
|
ParseFlag(env, &f->suppressions, "suppressions");
|
|
ParseFlag(env, &f->exitcode, "exitcode");
|
|
ParseFlag(env, &f->log_path, "log_path");
|
|
ParseFlag(env, &f->atexit_sleep_ms, "atexit_sleep_ms");
|
|
ParseFlag(env, &f->verbosity, "verbosity");
|
|
ParseFlag(env, &f->profile_memory, "profile_memory");
|
|
ParseFlag(env, &f->flush_memory_ms, "flush_memory_ms");
|
|
ParseFlag(env, &f->stop_on_start, "stop_on_start");
|
|
ParseFlag(env, &f->external_symbolizer_path, "external_symbolizer_path");
|
|
ParseFlag(env, &f->history_size, "history_size");
|
|
ParseFlag(env, &f->io_sync, "io_sync");
|
|
|
|
if (!f->report_bugs) {
|
|
f->report_thread_leaks = false;
|
|
f->report_destroy_locked = false;
|
|
f->report_signal_unsafe = false;
|
|
}
|
|
|
|
if (f->history_size < 0 || f->history_size > 7) {
|
|
Printf("ThreadSanitizer: incorrect value for history_size"
|
|
" (must be [0..7])\n");
|
|
Die();
|
|
}
|
|
|
|
if (f->io_sync < 0 || f->io_sync > 2) {
|
|
Printf("ThreadSanitizer: incorrect value for io_sync"
|
|
" (must be [0..2])\n");
|
|
Die();
|
|
}
|
|
}
|
|
|
|
} // namespace __tsan
|