================
@@ -242,6 +255,43 @@ AddressSanitizer also supports
 works similar to ``__attribute__((no_sanitize("address")))``, but it also
 prevents instrumentation performed by other sanitizers.
 
+Disabling container overflow checks
+-----------------------------------
+
+Runtime suppression
+^^^^^^^^^^^^^^^^^^^
+
+Container overflow checks can be disabled at runtime using
+``ASAN_OPTIONS=detect_container_overflow=0``
+
+Compile time suppression
+^^^^^^^^^^^^^^^^^^^^^^^^
+
+``-D__ASAN_DISABLE_CONTAINER_OVERFLOW__`` can be used at compile time to
+disable container overflow checks if the container library has added support
+for this define.
----------------
padriff wrote:

The `__sanitizer_annotate_*` functions are controllable at runtime using 
`ASAN_OPTIONS=detect_container_overflow=0`.  

The issue we hit was where users were unable to recompile the entire set of 
dylibs / dlls to have uniformity of sanitized binaries and were unable to 
control the runtime environment to disable there.   

The request was to allow this instrumentation to be disabled at compile time 
for the template library code that is instantiated into their application code 
to simplify the workflows.



https://github.com/llvm/llvm-project/pull/163468
_______________________________________________
cfe-commits mailing list
[email protected]
https://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits

Reply via email to