forked from OSchip/llvm-project
tsan: remove tracking of racy addresses
We used to deduplicate based on the race address to prevent lots of repeated reports about the same race. But now we clear the shadow for the racy address in DoReportRace: // This prevents trapping on this address in future. for (uptr i = 0; i < kShadowCnt; i++) StoreShadow(&shadow_mem[i], i == 0 ? Shadow::kRodata : Shadow::kEmpty); It should have the same effect of not reporting duplicates (and actually better because it's automatically reset when the memory is reallocated). So drop the address deduplication code. Both simpler and faster. Reviewed By: melver Differential Revision: https://reviews.llvm.org/D130240
This commit is contained in:
parent
acd80a29ae
commit
7505cc301f
|
@ -23,10 +23,6 @@ TSAN_FLAG(bool, enable_annotations, true,
|
|||
TSAN_FLAG(bool, suppress_equal_stacks, true,
|
||||
"Suppress a race report if we've already output another race report "
|
||||
"with the same stack.")
|
||||
TSAN_FLAG(bool, suppress_equal_addresses, true,
|
||||
"Suppress a race report if we've already output another race report "
|
||||
"on the same address.")
|
||||
|
||||
TSAN_FLAG(bool, report_bugs, true,
|
||||
"Turns off bug reporting entirely (useful for benchmarking).")
|
||||
TSAN_FLAG(bool, report_thread_leaks, true, "Report thread leaks at exit?")
|
||||
|
|
|
@ -368,7 +368,6 @@ Context::Context()
|
|||
}),
|
||||
racy_mtx(MutexTypeRacy),
|
||||
racy_stacks(),
|
||||
racy_addresses(),
|
||||
fired_suppressions_mtx(MutexTypeFired),
|
||||
slot_mtx(MutexTypeSlots),
|
||||
resetting() {
|
||||
|
|
|
@ -316,7 +316,6 @@ struct Context {
|
|||
|
||||
Mutex racy_mtx;
|
||||
Vector<RacyStacks> racy_stacks;
|
||||
Vector<RacyAddress> racy_addresses;
|
||||
// Number of fired suppressions may be large enough.
|
||||
Mutex fired_suppressions_mtx;
|
||||
InternalMmapVector<FiredSuppression> fired_suppressions;
|
||||
|
|
|
@ -629,35 +629,6 @@ static bool HandleRacyStacks(ThreadState *thr, VarSizeStackTrace traces[2]) {
|
|||
return false;
|
||||
}
|
||||
|
||||
static bool FindRacyAddress(const RacyAddress &ra0) {
|
||||
for (uptr i = 0; i < ctx->racy_addresses.Size(); i++) {
|
||||
RacyAddress ra2 = ctx->racy_addresses[i];
|
||||
uptr maxbeg = max(ra0.addr_min, ra2.addr_min);
|
||||
uptr minend = min(ra0.addr_max, ra2.addr_max);
|
||||
if (maxbeg < minend) {
|
||||
VPrintf(2, "ThreadSanitizer: suppressing report as doubled (addr)\n");
|
||||
return true;
|
||||
}
|
||||
}
|
||||
return false;
|
||||
}
|
||||
|
||||
static bool HandleRacyAddress(ThreadState *thr, uptr addr_min, uptr addr_max) {
|
||||
if (!flags()->suppress_equal_addresses)
|
||||
return false;
|
||||
RacyAddress ra0 = {addr_min, addr_max};
|
||||
{
|
||||
ReadLock lock(&ctx->racy_mtx);
|
||||
if (FindRacyAddress(ra0))
|
||||
return true;
|
||||
}
|
||||
Lock lock(&ctx->racy_mtx);
|
||||
if (FindRacyAddress(ra0))
|
||||
return true;
|
||||
ctx->racy_addresses.PushBack(ra0);
|
||||
return false;
|
||||
}
|
||||
|
||||
bool OutputReport(ThreadState *thr, const ScopedReport &srep) {
|
||||
// These should have been checked in ShouldReport.
|
||||
// It's too late to check them here, we have already taken locks.
|
||||
|
@ -761,8 +732,6 @@ void ReportRace(ThreadState *thr, RawShadow *shadow_mem, Shadow cur, Shadow old,
|
|||
uptr addr_max = max(end0, end1);
|
||||
if (IsExpectedReport(addr_min, addr_max - addr_min))
|
||||
return;
|
||||
if (HandleRacyAddress(thr, addr_min, addr_max))
|
||||
return;
|
||||
|
||||
ReportType rep_typ = ReportTypeRace;
|
||||
if ((typ0 & kAccessVptr) && (typ1 & kAccessFree))
|
||||
|
|
|
@ -34,7 +34,6 @@ TEST(Flags, DefaultValues) {
|
|||
static const char *options1 =
|
||||
" enable_annotations=0"
|
||||
" suppress_equal_stacks=0"
|
||||
" suppress_equal_addresses=0"
|
||||
" report_bugs=0"
|
||||
" report_thread_leaks=0"
|
||||
" report_destroy_locked=0"
|
||||
|
@ -58,7 +57,6 @@ static const char *options1 =
|
|||
static const char *options2 =
|
||||
" enable_annotations=true"
|
||||
" suppress_equal_stacks=true"
|
||||
" suppress_equal_addresses=true"
|
||||
" report_bugs=true"
|
||||
" report_thread_leaks=true"
|
||||
" report_destroy_locked=true"
|
||||
|
@ -82,7 +80,6 @@ static const char *options2 =
|
|||
void VerifyOptions1(Flags *f) {
|
||||
EXPECT_EQ(f->enable_annotations, 0);
|
||||
EXPECT_EQ(f->suppress_equal_stacks, 0);
|
||||
EXPECT_EQ(f->suppress_equal_addresses, 0);
|
||||
EXPECT_EQ(f->report_bugs, 0);
|
||||
EXPECT_EQ(f->report_thread_leaks, 0);
|
||||
EXPECT_EQ(f->report_destroy_locked, 0);
|
||||
|
@ -106,7 +103,6 @@ void VerifyOptions1(Flags *f) {
|
|||
void VerifyOptions2(Flags *f) {
|
||||
EXPECT_EQ(f->enable_annotations, true);
|
||||
EXPECT_EQ(f->suppress_equal_stacks, true);
|
||||
EXPECT_EQ(f->suppress_equal_addresses, true);
|
||||
EXPECT_EQ(f->report_bugs, true);
|
||||
EXPECT_EQ(f->report_thread_leaks, true);
|
||||
EXPECT_EQ(f->report_destroy_locked, true);
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
// This run stresses global reset happenning concurrently with everything else.
|
||||
// RUN: %clangxx_tsan -O1 %s -o %t && %env_tsan_opts=flush_memory_ms=1:flush_symbolizer_ms=1:memory_limit_mb=1 %run %t 2>&1 | FileCheck %s --check-prefix=CHECK-NORACE
|
||||
// This run stresses race reporting happenning concurrently with everything else.
|
||||
// RUN: %clangxx_tsan -O1 %s -DRACE=1 -o %t && %env_tsan_opts=suppress_equal_stacks=0:suppress_equal_addresses=0 %deflake %run %t | FileCheck %s --check-prefix=CHECK-RACE
|
||||
// RUN: %clangxx_tsan -O1 %s -DRACE=1 -o %t && %env_tsan_opts=suppress_equal_stacks=0 %deflake %run %t | FileCheck %s --check-prefix=CHECK-RACE
|
||||
#include "test.h"
|
||||
#include <fcntl.h>
|
||||
#include <string.h>
|
||||
|
|
Loading…
Reference in New Issue