696d846a56
libsanitizer/ 2015-10-20 Maxim Ostapenko <m.ostapenko@partner.samsung.com> * All source files: Merge from upstream r250806. * configure.ac (link_sanitizer_common): Add -lrt flag. * configure.tgt: Enable TSAN and LSAN for aarch64-linux targets. Set CXX_ABI_NEEDED=true for darwin. * asan/Makefile.am (asan_files): Add new files. (DEFS): Add DCAN_SANITIZE_UB=0 and remove unused and legacy DASAN_FLEXIBLE_MAPPING_AND_OFFSET=0. * asan/Makefile.in: Regenerate. * ubsan/Makefile.am (ubsan_files): Add new files. (DEFS): Add DCAN_SANITIZE_UB=1. (libubsan_la_LIBADD): Add -lc++abi if CXX_ABI_NEEDED is true. * ubsan/Makefile.in: Regenerate. * tsan/Makefile.am (tsan_files): Add new files. (DEFS): Add DCAN_SANITIZE_UB=0. * tsan/Makefile.in: Regenerate. * sanitizer_common/Makefile.am (sanitizer_common_files): Add new files. * sanitizer_common/Makefile.in: Regenerate. * asan/libtool-version: Bump the libasan SONAME. From-SVN: r229111
92 lines
2.6 KiB
C++
92 lines
2.6 KiB
C++
//===-- sanitizer_deadlock_detector_interface.h -----------------*- C++ -*-===//
|
|
//
|
|
// This file is distributed under the University of Illinois Open Source
|
|
// License. See LICENSE.TXT for details.
|
|
//
|
|
//===----------------------------------------------------------------------===//
|
|
//
|
|
// This file is a part of Sanitizer runtime.
|
|
// Abstract deadlock detector interface.
|
|
// FIXME: this is work in progress, nothing really works yet.
|
|
//
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
#ifndef SANITIZER_DEADLOCK_DETECTOR_INTERFACE_H
|
|
#define SANITIZER_DEADLOCK_DETECTOR_INTERFACE_H
|
|
|
|
#ifndef SANITIZER_DEADLOCK_DETECTOR_VERSION
|
|
# define SANITIZER_DEADLOCK_DETECTOR_VERSION 1
|
|
#endif
|
|
|
|
#include "sanitizer_internal_defs.h"
|
|
#include "sanitizer_atomic.h"
|
|
|
|
namespace __sanitizer {
|
|
|
|
// dd - deadlock detector.
|
|
// lt - logical (user) thread.
|
|
// pt - physical (OS) thread.
|
|
|
|
struct DDPhysicalThread;
|
|
struct DDLogicalThread;
|
|
|
|
struct DDMutex {
|
|
#if SANITIZER_DEADLOCK_DETECTOR_VERSION == 1
|
|
uptr id;
|
|
u32 stk; // creation stack
|
|
#elif SANITIZER_DEADLOCK_DETECTOR_VERSION == 2
|
|
u32 id;
|
|
u32 recursion;
|
|
atomic_uintptr_t owner;
|
|
#else
|
|
# error "BAD SANITIZER_DEADLOCK_DETECTOR_VERSION"
|
|
#endif
|
|
u64 ctx;
|
|
};
|
|
|
|
struct DDFlags {
|
|
bool second_deadlock_stack;
|
|
};
|
|
|
|
struct DDReport {
|
|
enum { kMaxLoopSize = 8 };
|
|
int n; // number of entries in loop
|
|
struct {
|
|
u64 thr_ctx; // user thread context
|
|
u64 mtx_ctx0; // user mutex context, start of the edge
|
|
u64 mtx_ctx1; // user mutex context, end of the edge
|
|
u32 stk[2]; // stack ids for the edge
|
|
} loop[kMaxLoopSize];
|
|
};
|
|
|
|
struct DDCallback {
|
|
DDPhysicalThread *pt;
|
|
DDLogicalThread *lt;
|
|
|
|
virtual u32 Unwind() { return 0; }
|
|
virtual int UniqueTid() { return 0; }
|
|
};
|
|
|
|
struct DDetector {
|
|
static DDetector *Create(const DDFlags *flags);
|
|
|
|
virtual DDPhysicalThread* CreatePhysicalThread() { return nullptr; }
|
|
virtual void DestroyPhysicalThread(DDPhysicalThread *pt) {}
|
|
|
|
virtual DDLogicalThread* CreateLogicalThread(u64 ctx) { return nullptr; }
|
|
virtual void DestroyLogicalThread(DDLogicalThread *lt) {}
|
|
|
|
virtual void MutexInit(DDCallback *cb, DDMutex *m) {}
|
|
virtual void MutexBeforeLock(DDCallback *cb, DDMutex *m, bool wlock) {}
|
|
virtual void MutexAfterLock(DDCallback *cb, DDMutex *m, bool wlock,
|
|
bool trylock) {}
|
|
virtual void MutexBeforeUnlock(DDCallback *cb, DDMutex *m, bool wlock) {}
|
|
virtual void MutexDestroy(DDCallback *cb, DDMutex *m) {}
|
|
|
|
virtual DDReport *GetReport(DDCallback *cb) { return nullptr; }
|
|
};
|
|
|
|
} // namespace __sanitizer
|
|
|
|
#endif // SANITIZER_DEADLOCK_DETECTOR_INTERFACE_H
|