2017-03-26 23:27:04 +08:00
|
|
|
//===-- tsan_interface.h ----------------------------------------*- C++ -*-===//
|
|
|
|
//
|
2019-01-19 16:50:56 +08:00
|
|
|
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
|
|
|
|
// See https://llvm.org/LICENSE.txt for license information.
|
|
|
|
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
|
2017-03-26 23:27:04 +08:00
|
|
|
//
|
|
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
//
|
|
|
|
// This file is a part of ThreadSanitizer (TSan), a race detector.
|
|
|
|
//
|
|
|
|
// Public interface header for TSan.
|
|
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
#ifndef SANITIZER_TSAN_INTERFACE_H
|
|
|
|
#define SANITIZER_TSAN_INTERFACE_H
|
|
|
|
|
|
|
|
#include <sanitizer/common_interface_defs.h>
|
|
|
|
|
|
|
|
#ifdef __cplusplus
|
|
|
|
extern "C" {
|
|
|
|
#endif
|
|
|
|
|
|
|
|
// __tsan_release establishes a happens-before relation with a preceding
|
|
|
|
// __tsan_acquire on the same address.
|
|
|
|
void __tsan_acquire(void *addr);
|
|
|
|
void __tsan_release(void *addr);
|
|
|
|
|
|
|
|
// Annotations for custom mutexes.
|
|
|
|
// The annotations allow to get better reports (with sets of locked mutexes),
|
|
|
|
// detect more types of bugs (e.g. mutex misuses, races between lock/unlock and
|
|
|
|
// destruction and potential deadlocks) and improve precision and performance
|
|
|
|
// (by ignoring individual atomic operations in mutex code). However, the
|
|
|
|
// downside is that annotated mutex code itself is not checked for correctness.
|
|
|
|
|
|
|
|
// Mutex creation flags are passed to __tsan_mutex_create annotation.
|
|
|
|
// If mutex has no constructor and __tsan_mutex_create is not called,
|
|
|
|
// the flags may be passed to __tsan_mutex_pre_lock/__tsan_mutex_post_lock
|
|
|
|
// annotations.
|
|
|
|
|
|
|
|
// Mutex has static storage duration and no-op constructor and destructor.
|
|
|
|
// This effectively makes tsan ignore destroy annotation.
|
2020-03-10 16:12:28 +08:00
|
|
|
static const unsigned __tsan_mutex_linker_init = 1 << 0;
|
2017-03-26 23:27:04 +08:00
|
|
|
// Mutex is write reentrant.
|
2020-03-10 16:12:28 +08:00
|
|
|
static const unsigned __tsan_mutex_write_reentrant = 1 << 1;
|
2017-03-26 23:27:04 +08:00
|
|
|
// Mutex is read reentrant.
|
2020-03-10 16:12:28 +08:00
|
|
|
static const unsigned __tsan_mutex_read_reentrant = 1 << 2;
|
[tsan] Add Mutex annotation flag for constant-initialized __tsan_mutex_linker_init behavior
Add a new flag, __tsan_mutex_not_static, which has the opposite sense
of __tsan_mutex_linker_init. When the new __tsan_mutex_not_static flag
is passed to __tsan_mutex_destroy, tsan ignores the destruction unless
the mutex was also created with the __tsan_mutex_not_static flag.
This is useful for constructors that otherwise woud set
__tsan_mutex_linker_init but cannot, because they are declared constexpr.
Google has a custom mutex with two constructors, a "linker initialized"
constructor that relies on zero-initialization and sets
__tsan_mutex_linker_init, and a normal one which sets no tsan flags.
The "linker initialized" constructor is morally constexpr, but we can't
declare it constexpr because of the need to call into tsan as a side effect.
With this new flag, the normal c'tor can set __tsan_mutex_not_static,
the "linker initialized" constructor can rely on tsan's lazy initialization,
and __tsan_mutex_destroy can still handle both cases correctly.
Author: Greg Falcon (gfalcon)
Reviewed in: https://reviews.llvm.org/D39095
llvm-svn: 316209
2017-10-20 20:08:53 +08:00
|
|
|
// Mutex does not have static storage duration, and must not be used after
|
|
|
|
// its destructor runs. The opposite of __tsan_mutex_linker_init.
|
|
|
|
// If this flag is passed to __tsan_mutex_destroy, then the destruction
|
|
|
|
// is ignored unless this flag was previously set on the mutex.
|
2020-03-10 16:12:28 +08:00
|
|
|
static const unsigned __tsan_mutex_not_static = 1 << 8;
|
2017-03-26 23:27:04 +08:00
|
|
|
|
|
|
|
// Mutex operation flags:
|
|
|
|
|
|
|
|
// Denotes read lock operation.
|
2020-03-10 16:12:28 +08:00
|
|
|
static const unsigned __tsan_mutex_read_lock = 1 << 3;
|
2017-03-26 23:27:04 +08:00
|
|
|
// Denotes try lock operation.
|
2020-03-10 16:12:28 +08:00
|
|
|
static const unsigned __tsan_mutex_try_lock = 1 << 4;
|
2017-03-26 23:27:04 +08:00
|
|
|
// Denotes that a try lock operation has failed to acquire the mutex.
|
2020-03-10 16:12:28 +08:00
|
|
|
static const unsigned __tsan_mutex_try_lock_failed = 1 << 5;
|
2017-03-26 23:27:04 +08:00
|
|
|
// Denotes that the lock operation acquires multiple recursion levels.
|
|
|
|
// Number of levels is passed in recursion parameter.
|
|
|
|
// This is useful for annotation of e.g. Java builtin monitors,
|
|
|
|
// for which wait operation releases all recursive acquisitions of the mutex.
|
2020-03-10 16:12:28 +08:00
|
|
|
static const unsigned __tsan_mutex_recursive_lock = 1 << 6;
|
2017-03-26 23:27:04 +08:00
|
|
|
// Denotes that the unlock operation releases all recursion levels.
|
|
|
|
// Number of released levels is returned and later must be passed to
|
|
|
|
// the corresponding __tsan_mutex_post_lock annotation.
|
2020-03-10 16:12:28 +08:00
|
|
|
static const unsigned __tsan_mutex_recursive_unlock = 1 << 7;
|
2017-03-26 23:27:04 +08:00
|
|
|
|
2021-04-15 15:03:05 +08:00
|
|
|
// Convenient composed constants.
|
|
|
|
static const unsigned __tsan_mutex_try_read_lock =
|
|
|
|
__tsan_mutex_read_lock | __tsan_mutex_try_lock;
|
|
|
|
static const unsigned __tsan_mutex_try_read_lock_failed =
|
|
|
|
__tsan_mutex_try_read_lock | __tsan_mutex_try_lock_failed;
|
|
|
|
|
2017-03-26 23:27:04 +08:00
|
|
|
// Annotate creation of a mutex.
|
|
|
|
// Supported flags: mutex creation flags.
|
|
|
|
void __tsan_mutex_create(void *addr, unsigned flags);
|
|
|
|
|
|
|
|
// Annotate destruction of a mutex.
|
2017-05-01 18:01:13 +08:00
|
|
|
// Supported flags:
|
|
|
|
// - __tsan_mutex_linker_init
|
[tsan] Add Mutex annotation flag for constant-initialized __tsan_mutex_linker_init behavior
Add a new flag, __tsan_mutex_not_static, which has the opposite sense
of __tsan_mutex_linker_init. When the new __tsan_mutex_not_static flag
is passed to __tsan_mutex_destroy, tsan ignores the destruction unless
the mutex was also created with the __tsan_mutex_not_static flag.
This is useful for constructors that otherwise woud set
__tsan_mutex_linker_init but cannot, because they are declared constexpr.
Google has a custom mutex with two constructors, a "linker initialized"
constructor that relies on zero-initialization and sets
__tsan_mutex_linker_init, and a normal one which sets no tsan flags.
The "linker initialized" constructor is morally constexpr, but we can't
declare it constexpr because of the need to call into tsan as a side effect.
With this new flag, the normal c'tor can set __tsan_mutex_not_static,
the "linker initialized" constructor can rely on tsan's lazy initialization,
and __tsan_mutex_destroy can still handle both cases correctly.
Author: Greg Falcon (gfalcon)
Reviewed in: https://reviews.llvm.org/D39095
llvm-svn: 316209
2017-10-20 20:08:53 +08:00
|
|
|
// - __tsan_mutex_not_static
|
2017-03-26 23:27:04 +08:00
|
|
|
void __tsan_mutex_destroy(void *addr, unsigned flags);
|
|
|
|
|
|
|
|
// Annotate start of lock operation.
|
|
|
|
// Supported flags:
|
|
|
|
// - __tsan_mutex_read_lock
|
|
|
|
// - __tsan_mutex_try_lock
|
|
|
|
// - all mutex creation flags
|
|
|
|
void __tsan_mutex_pre_lock(void *addr, unsigned flags);
|
|
|
|
|
|
|
|
// Annotate end of lock operation.
|
|
|
|
// Supported flags:
|
|
|
|
// - __tsan_mutex_read_lock (must match __tsan_mutex_pre_lock)
|
|
|
|
// - __tsan_mutex_try_lock (must match __tsan_mutex_pre_lock)
|
|
|
|
// - __tsan_mutex_try_lock_failed
|
|
|
|
// - __tsan_mutex_recursive_lock
|
|
|
|
// - all mutex creation flags
|
|
|
|
void __tsan_mutex_post_lock(void *addr, unsigned flags, int recursion);
|
|
|
|
|
|
|
|
// Annotate start of unlock operation.
|
|
|
|
// Supported flags:
|
|
|
|
// - __tsan_mutex_read_lock
|
|
|
|
// - __tsan_mutex_recursive_unlock
|
|
|
|
int __tsan_mutex_pre_unlock(void *addr, unsigned flags);
|
|
|
|
|
|
|
|
// Annotate end of unlock operation.
|
|
|
|
// Supported flags:
|
|
|
|
// - __tsan_mutex_read_lock (must match __tsan_mutex_pre_unlock)
|
|
|
|
void __tsan_mutex_post_unlock(void *addr, unsigned flags);
|
|
|
|
|
|
|
|
// Annotate start/end of notify/signal/broadcast operation.
|
|
|
|
// Supported flags: none.
|
|
|
|
void __tsan_mutex_pre_signal(void *addr, unsigned flags);
|
|
|
|
void __tsan_mutex_post_signal(void *addr, unsigned flags);
|
|
|
|
|
|
|
|
// Annotate start/end of a region of code where lock/unlock/signal operation
|
|
|
|
// diverts to do something else unrelated to the mutex. This can be used to
|
|
|
|
// annotate, for example, calls into cooperative scheduler or contention
|
|
|
|
// profiling code.
|
|
|
|
// These annotations must be called only from within
|
|
|
|
// __tsan_mutex_pre/post_lock, __tsan_mutex_pre/post_unlock,
|
|
|
|
// __tsan_mutex_pre/post_signal regions.
|
|
|
|
// Supported flags: none.
|
|
|
|
void __tsan_mutex_pre_divert(void *addr, unsigned flags);
|
|
|
|
void __tsan_mutex_post_divert(void *addr, unsigned flags);
|
|
|
|
|
2017-04-22 01:25:47 +08:00
|
|
|
// External race detection API.
|
|
|
|
// Can be used by non-instrumented libraries to detect when their objects are
|
|
|
|
// being used in an unsafe manner.
|
|
|
|
// - __tsan_external_read/__tsan_external_write annotates the logical reads
|
|
|
|
// and writes of the object at the specified address. 'caller_pc' should
|
|
|
|
// be the PC of the library user, which the library can obtain with e.g.
|
|
|
|
// `__builtin_return_address(0)`.
|
|
|
|
// - __tsan_external_register_tag registers a 'tag' with the specified name,
|
|
|
|
// which is later used in read/write annotations to denote the object type
|
|
|
|
// - __tsan_external_assign_tag can optionally mark a heap object with a tag
|
|
|
|
void *__tsan_external_register_tag(const char *object_type);
|
2017-05-04 00:51:01 +08:00
|
|
|
void __tsan_external_register_header(void *tag, const char *header);
|
2017-04-22 01:25:47 +08:00
|
|
|
void __tsan_external_assign_tag(void *addr, void *tag);
|
|
|
|
void __tsan_external_read(void *addr, void *caller_pc, void *tag);
|
|
|
|
void __tsan_external_write(void *addr, void *caller_pc, void *tag);
|
|
|
|
|
2019-02-13 21:21:24 +08:00
|
|
|
// Fiber switching API.
|
|
|
|
// - TSAN context for fiber can be created by __tsan_create_fiber
|
|
|
|
// and freed by __tsan_destroy_fiber.
|
|
|
|
// - TSAN context of current fiber or thread can be obtained
|
|
|
|
// by calling __tsan_get_current_fiber.
|
2021-03-24 10:22:12 +08:00
|
|
|
// - __tsan_switch_to_fiber should be called immediately before switch
|
2019-02-13 21:21:24 +08:00
|
|
|
// to fiber, such as call of swapcontext.
|
|
|
|
// - Fiber name can be set by __tsan_set_fiber_name.
|
|
|
|
void *__tsan_get_current_fiber(void);
|
|
|
|
void *__tsan_create_fiber(unsigned flags);
|
|
|
|
void __tsan_destroy_fiber(void *fiber);
|
|
|
|
void __tsan_switch_to_fiber(void *fiber, unsigned flags);
|
|
|
|
void __tsan_set_fiber_name(void *fiber, const char *name);
|
|
|
|
|
|
|
|
// Flags for __tsan_switch_to_fiber:
|
|
|
|
// Do not establish a happens-before relation between fibers
|
2020-03-10 16:12:28 +08:00
|
|
|
static const unsigned __tsan_switch_to_fiber_no_sync = 1 << 0;
|
2019-02-13 21:21:24 +08:00
|
|
|
|
2021-03-24 10:22:12 +08:00
|
|
|
// User-provided callback invoked on TSan initialization.
|
|
|
|
void __tsan_on_initialize();
|
|
|
|
|
|
|
|
// User-provided callback invoked on TSan shutdown.
|
|
|
|
// `failed` - Nonzero if TSan did detect issues, zero otherwise.
|
|
|
|
// Return `0` if TSan should exit as if no issues were detected. Return nonzero
|
|
|
|
// if TSan should exit as if issues were detected.
|
|
|
|
int __tsan_on_finalize(int failed);
|
|
|
|
|
2017-03-26 23:27:04 +08:00
|
|
|
#ifdef __cplusplus
|
|
|
|
} // extern "C"
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#endif // SANITIZER_TSAN_INTERFACE_H
|