summaryrefslogtreecommitdiffstats
path: root/compiler-rt/lib/asan/asan_flags.h
Commit message (Collapse)AuthorAgeFilesLines
...
* Relocate the external headers provided by ASan and the common sanitizerChandler Carruth2012-08-291-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | library. These headers are intended to be available to user code when built with AddressSanitizer (or one of the other sanitizer's in the future) to interface with the runtime library. As such, they form stable external C interfaces, and the headers shouldn't be located within the implementation. I've pulled them out into what seem like fairly obvious locations and names, but I'm wide open to further bikeshedding of these names and locations. I've updated the code and the build system to cope with the new locations, both CMake and Makefile. Please let me know if this breaks anyone's build. The eventual goal is to install these headers along side the Clang builtin headers when we build the ASan runtime and install it. My current thinking is to locate them at: <prefix>/lib/clang/X.Y/include/sanitizer/common_interface_defs.h <prefix>/lib/clang/X.Y/include/sanitizer/asan_interface.h <prefix>/lib/clang/X.Y/include/sanitizer/... But maybe others have different suggestions? Fixing the style of the #include between these headers at least unblocks experimentation with installing them as they now should work when installed in these locations. llvm-svn: 162822
* If the program is linked to a dynamic ASan runtime which is not present in ↵Alexander Potapenko2012-08-241-0/+3
| | | | | | | | | DYLD_INSERT_LIBRARIES (which, in turn, is required for our interceptors to take effect), re-exec the program with DYLD_INSERT_LIBRARIES set. llvm-svn: 162547
* [asan] run-time part of the initialization order checker. Patch by Reid ↵Kostya Serebryany2012-08-211-0/+2
| | | | | | Watson with some bits from kcc. The sub-pass is off by default for now. On simple tests it works fine. llvm-svn: 162278
* [ASan] move declaration of __asan_default_options to interface headerAlexey Samsonov2012-08-151-6/+0
| | | | llvm-svn: 161932
* [ASan] make sure __asan_default_options gets default visibility, port ↵Alexey Samsonov2012-08-141-1/+2
| | | | | | corresponding test to lit llvm-svn: 161869
* [ASan] add new ASan option 'strip_path_prefix' to remove useless prefices ↵Alexey Samsonov2012-08-061-0/+2
| | | | | | from filenames in stack traces llvm-svn: 161321
* [ASan] fixup for r160712: provide a default definition for weak ↵Alexey Samsonov2012-07-251-6/+5
| | | | | | __asan_default_options() llvm-svn: 160718
* Make __asan_default_options a weak function that returns a const char*.Alexander Potapenko2012-07-251-1/+2
| | | | | | | | | Users may define it to override the default ASan options. This function has to be marked with __attribute__((no_address_safety_analysis)), because it is called before ASan is fully initialized. Add an output test checking the __asan_default_options functionality. llvm-svn: 160712
* [ASan] move flags description to separate header, add comments about them.Alexey Samsonov2012-07-101-0/+97
llvm-svn: 159985
OpenPOWER on IntegriCloud