forked from OSchip/llvm-project
70 lines
3.3 KiB
C++
70 lines
3.3 KiB
C++
//===-- options.inc ---------------------------------------------*- C++ -*-===//
|
|
//
|
|
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
|
|
// See https://llvm.org/LICENSE.txt for license information.
|
|
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
|
|
//
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
#ifndef GWP_ASAN_OPTION
|
|
#error "Define GWP_ASAN_OPTION prior to including this file!"
|
|
#endif
|
|
|
|
#ifndef GWP_ASAN_DEFAULT_ENABLED
|
|
#define GWP_ASAN_DEFAULT_ENABLED true
|
|
#endif
|
|
|
|
#ifndef GWP_ASAN_STRINGIFY
|
|
#define GWP_ASAN_STRINGIFY(S) GWP_ASAN_STRINGIFY_(S)
|
|
#define GWP_ASAN_STRINGIFY_(S) #S
|
|
#endif
|
|
|
|
GWP_ASAN_OPTION(bool, Enabled, GWP_ASAN_DEFAULT_ENABLED,
|
|
"Is GWP-ASan enabled? Defaults to " GWP_ASAN_STRINGIFY(
|
|
GWP_ASAN_DEFAULT_ENABLED) ".")
|
|
|
|
GWP_ASAN_OPTION(int, MaxSimultaneousAllocations, 16,
|
|
"Number of simultaneously-guarded allocations available in the "
|
|
"pool. Defaults to 16.")
|
|
|
|
GWP_ASAN_OPTION(int, SampleRate, 5000,
|
|
"The probability (1 / SampleRate) that an allocation is "
|
|
"selected for GWP-ASan sampling. Default is 5000. Sample rates "
|
|
"up to (2^30 - 1) are supported.")
|
|
|
|
// Developer note - This option is not actually processed by GWP-ASan itself. It
|
|
// is included here so that a user can specify whether they want signal handlers
|
|
// or not. The supporting allocator should inspect this value to see whether
|
|
// signal handlers need to be installed, and then use
|
|
// crash_handler::installSignalHandlers() in order to install the handlers. Note
|
|
// that in order to support signal handlers, you will need to link against the
|
|
// optional crash_handler component.
|
|
GWP_ASAN_OPTION(
|
|
bool, InstallSignalHandlers, true,
|
|
"Install GWP-ASan signal handlers for SIGSEGV during dynamic loading. This "
|
|
"allows better error reports by providing stack traces for allocation and "
|
|
"deallocation when reporting a memory error. GWP-ASan's signal handler "
|
|
"will forward the signal to any previously-installed handler, and user "
|
|
"programs that install further signal handlers should make sure they do "
|
|
"the same. Note, if the previously installed SIGSEGV handler is SIG_IGN, "
|
|
"we terminate the process after dumping the error report.")
|
|
|
|
GWP_ASAN_OPTION(bool, InstallForkHandlers, true,
|
|
"Install GWP-ASan atfork handlers to acquire internal locks "
|
|
"before fork and release them after.")
|
|
|
|
GWP_ASAN_OPTION(bool, help, false, "Print a summary of the available options.")
|
|
|
|
// =============================================================================
|
|
// ==== WARNING
|
|
// =============================================================================
|
|
// If you are adding flags to GWP-ASan, please note that GWP-ASan flag strings
|
|
// may be parsed by trusted system components (on Android, GWP-ASan flag strings
|
|
// are parsed by libc during the dynamic loader). This means that GWP-ASan
|
|
// should never feature flags like log paths on disk, because this can lead to
|
|
// arbitrary file write and thus privilege escalation. For an example, see the
|
|
// setuid ASan log_path exploits: https://www.exploit-db.com/exploits/46241.
|
|
//
|
|
// Please place all new flags above this warning, so that the warning always
|
|
// stays at the bottom.
|