5d3805fca3
* ubsan.c (ubsan_expand_null_ifn): Use _v1 suffixed type mismatch builtins, store max (log2 (align), 0) into uchar field instead of align into uptr field. (ubsan_expand_objsize_ifn): Use _v1 suffixed type mismatch builtins, store uchar 0 field instead of uptr 0 field. (instrument_nonnull_return): Use _v1 suffixed nonnull return builtin, instead of passing one address of struct with 2 locations pass two addresses of structs with 1 location each. * sanitizer.def (BUILT_IN_UBSAN_HANDLE_TYPE_MISMATCH, BUILT_IN_UBSAN_HANDLE_TYPE_MISMATCH_ABORT, BUILT_IN_UBSAN_HANDLE_NONNULL_RETURN, BUILT_IN_UBSAN_HANDLE_NONNULL_RETURN_ABORT): Removed. (BUILT_IN_UBSAN_HANDLE_TYPE_MISMATCH_V1, BUILT_IN_UBSAN_HANDLE_TYPE_MISMATCH_V1_ABORT, BUILT_IN_UBSAN_HANDLE_NONNULL_RETURN_V1, BUILT_IN_UBSAN_HANDLE_NONNULL_RETURN_V1_ABORT): New builtins. * c-c++-common/ubsan/float-cast-overflow-1.c: Drop value keyword from expected output regexps. * c-c++-common/ubsan/float-cast-overflow-2.c: Likewise. * c-c++-common/ubsan/float-cast-overflow-3.c: Likewise. * c-c++-common/ubsan/float-cast-overflow-4.c: Likewise. * c-c++-common/ubsan/float-cast-overflow-5.c: Likewise. * c-c++-common/ubsan/float-cast-overflow-6.c: Likewise. * c-c++-common/ubsan/float-cast-overflow-8.c: Likewise. * c-c++-common/ubsan/float-cast-overflow-9.c: Likewise. * c-c++-common/ubsan/float-cast-overflow-10.c: Likewise. * g++.dg/ubsan/float-cast-overflow-bf.C: Likewise. * gcc.dg/ubsan/float-cast-overflow-bf.c: Likewise. * g++.dg/asan/default-options-1.C (__asan_default_options): Add used attribute. * g++.dg/asan/asan_test.C: Run with ASAN_OPTIONS=handle_segv=2 in the environment. * All source files: Merge from upstream 315899. * asan/Makefile.am (nodist_saninclude_HEADERS): Add include/sanitizer/tsan_interface.h. * asan/libtool-version: Bump the libasan SONAME. * lsan/Makefile.am (sanitizer_lsan_files): Add lsan_common_mac.cc. (lsan_files): Add lsan_linux.cc, lsan_mac.cc and lsan_malloc_mac.cc. * sanitizer_common/Makefile.am (sanitizer_common_files): Add sancov_flags.cc, sanitizer_allocator_checks.cc, sanitizer_coverage_libcdep_new.cc, sanitizer_errno.cc, sanitizer_file.cc, sanitizer_mac_libcdep.cc and sanitizer_stoptheworld_mac.cc. Remove sanitizer_coverage_libcdep.cc and sanitizer_coverage_mapping_libcdep.cc. * tsan/Makefile.am (tsan_files): Add tsan_external.cc. * ubsan/Makefile.am (DEFS): Add -DUBSAN_CAN_USE_CXXABI=1. (ubsan_files): Add ubsan_init_standalone.cc and ubsan_signals_standalone.cc. * ubsan/libtool-version: Bump the libubsan SONAME. * asan/Makefile.in: Regenerate. * lsan/Makefile.in: Regenerate. * sanitizer_common/Makefile.in: Regenerate. * tsan/Makefile.in: Regenerate. * ubsan/Makefile.in: Regenerate. From-SVN: r253887
249 lines
8.9 KiB
C++
249 lines
8.9 KiB
C++
//===-- tsan_debugging.cc -------------------------------------------------===//
|
|
//
|
|
// This file is distributed under the University of Illinois Open Source
|
|
// License. See LICENSE.TXT for details.
|
|
//
|
|
//===----------------------------------------------------------------------===//
|
|
//
|
|
// This file is a part of ThreadSanitizer (TSan), a race detector.
|
|
//
|
|
// TSan debugging API implementation.
|
|
//===----------------------------------------------------------------------===//
|
|
#include "tsan_interface.h"
|
|
#include "tsan_report.h"
|
|
#include "tsan_rtl.h"
|
|
|
|
#include "sanitizer_common/sanitizer_stackdepot.h"
|
|
|
|
using namespace __tsan;
|
|
|
|
static const char *ReportTypeDescription(ReportType typ) {
|
|
if (typ == ReportTypeRace) return "data-race";
|
|
if (typ == ReportTypeVptrRace) return "data-race-vptr";
|
|
if (typ == ReportTypeUseAfterFree) return "heap-use-after-free";
|
|
if (typ == ReportTypeVptrUseAfterFree) return "heap-use-after-free-vptr";
|
|
if (typ == ReportTypeExternalRace) return "external-race";
|
|
if (typ == ReportTypeThreadLeak) return "thread-leak";
|
|
if (typ == ReportTypeMutexDestroyLocked) return "locked-mutex-destroy";
|
|
if (typ == ReportTypeMutexDoubleLock) return "mutex-double-lock";
|
|
if (typ == ReportTypeMutexInvalidAccess) return "mutex-invalid-access";
|
|
if (typ == ReportTypeMutexBadUnlock) return "mutex-bad-unlock";
|
|
if (typ == ReportTypeMutexBadReadLock) return "mutex-bad-read-lock";
|
|
if (typ == ReportTypeMutexBadReadUnlock) return "mutex-bad-read-unlock";
|
|
if (typ == ReportTypeSignalUnsafe) return "signal-unsafe-call";
|
|
if (typ == ReportTypeErrnoInSignal) return "errno-in-signal-handler";
|
|
if (typ == ReportTypeDeadlock) return "lock-order-inversion";
|
|
return "";
|
|
}
|
|
|
|
static const char *ReportLocationTypeDescription(ReportLocationType typ) {
|
|
if (typ == ReportLocationGlobal) return "global";
|
|
if (typ == ReportLocationHeap) return "heap";
|
|
if (typ == ReportLocationStack) return "stack";
|
|
if (typ == ReportLocationTLS) return "tls";
|
|
if (typ == ReportLocationFD) return "fd";
|
|
return "";
|
|
}
|
|
|
|
static void CopyTrace(SymbolizedStack *first_frame, void **trace,
|
|
uptr trace_size) {
|
|
uptr i = 0;
|
|
for (SymbolizedStack *frame = first_frame; frame != nullptr;
|
|
frame = frame->next) {
|
|
trace[i++] = (void *)frame->info.address;
|
|
if (i >= trace_size) break;
|
|
}
|
|
}
|
|
|
|
// Meant to be called by the debugger.
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
void *__tsan_get_current_report() {
|
|
return const_cast<ReportDesc*>(cur_thread()->current_report);
|
|
}
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
int __tsan_get_report_data(void *report, const char **description, int *count,
|
|
int *stack_count, int *mop_count, int *loc_count,
|
|
int *mutex_count, int *thread_count,
|
|
int *unique_tid_count, void **sleep_trace,
|
|
uptr trace_size) {
|
|
const ReportDesc *rep = (ReportDesc *)report;
|
|
*description = ReportTypeDescription(rep->typ);
|
|
*count = rep->count;
|
|
*stack_count = rep->stacks.Size();
|
|
*mop_count = rep->mops.Size();
|
|
*loc_count = rep->locs.Size();
|
|
*mutex_count = rep->mutexes.Size();
|
|
*thread_count = rep->threads.Size();
|
|
*unique_tid_count = rep->unique_tids.Size();
|
|
if (rep->sleep) CopyTrace(rep->sleep->frames, sleep_trace, trace_size);
|
|
return 1;
|
|
}
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
int __tsan_get_report_stack(void *report, uptr idx, void **trace,
|
|
uptr trace_size) {
|
|
const ReportDesc *rep = (ReportDesc *)report;
|
|
CHECK_LT(idx, rep->stacks.Size());
|
|
ReportStack *stack = rep->stacks[idx];
|
|
if (stack) CopyTrace(stack->frames, trace, trace_size);
|
|
return stack ? 1 : 0;
|
|
}
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
int __tsan_get_report_mop(void *report, uptr idx, int *tid, void **addr,
|
|
int *size, int *write, int *atomic, void **trace,
|
|
uptr trace_size) {
|
|
const ReportDesc *rep = (ReportDesc *)report;
|
|
CHECK_LT(idx, rep->mops.Size());
|
|
ReportMop *mop = rep->mops[idx];
|
|
*tid = mop->tid;
|
|
*addr = (void *)mop->addr;
|
|
*size = mop->size;
|
|
*write = mop->write ? 1 : 0;
|
|
*atomic = mop->atomic ? 1 : 0;
|
|
if (mop->stack) CopyTrace(mop->stack->frames, trace, trace_size);
|
|
return 1;
|
|
}
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
int __tsan_get_report_loc(void *report, uptr idx, const char **type,
|
|
void **addr, uptr *start, uptr *size, int *tid,
|
|
int *fd, int *suppressable, void **trace,
|
|
uptr trace_size) {
|
|
const ReportDesc *rep = (ReportDesc *)report;
|
|
CHECK_LT(idx, rep->locs.Size());
|
|
ReportLocation *loc = rep->locs[idx];
|
|
*type = ReportLocationTypeDescription(loc->type);
|
|
*addr = (void *)loc->global.start;
|
|
*start = loc->heap_chunk_start;
|
|
*size = loc->heap_chunk_size;
|
|
*tid = loc->tid;
|
|
*fd = loc->fd;
|
|
*suppressable = loc->suppressable;
|
|
if (loc->stack) CopyTrace(loc->stack->frames, trace, trace_size);
|
|
return 1;
|
|
}
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
int __tsan_get_report_loc_object_type(void *report, uptr idx,
|
|
const char **object_type) {
|
|
const ReportDesc *rep = (ReportDesc *)report;
|
|
CHECK_LT(idx, rep->locs.Size());
|
|
ReportLocation *loc = rep->locs[idx];
|
|
*object_type = GetObjectTypeFromTag(loc->external_tag);
|
|
return 1;
|
|
}
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
int __tsan_get_report_mutex(void *report, uptr idx, uptr *mutex_id, void **addr,
|
|
int *destroyed, void **trace, uptr trace_size) {
|
|
const ReportDesc *rep = (ReportDesc *)report;
|
|
CHECK_LT(idx, rep->mutexes.Size());
|
|
ReportMutex *mutex = rep->mutexes[idx];
|
|
*mutex_id = mutex->id;
|
|
*addr = (void *)mutex->addr;
|
|
*destroyed = mutex->destroyed;
|
|
if (mutex->stack) CopyTrace(mutex->stack->frames, trace, trace_size);
|
|
return 1;
|
|
}
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
int __tsan_get_report_thread(void *report, uptr idx, int *tid, tid_t *os_id,
|
|
int *running, const char **name, int *parent_tid,
|
|
void **trace, uptr trace_size) {
|
|
const ReportDesc *rep = (ReportDesc *)report;
|
|
CHECK_LT(idx, rep->threads.Size());
|
|
ReportThread *thread = rep->threads[idx];
|
|
*tid = thread->id;
|
|
*os_id = thread->os_id;
|
|
*running = thread->running;
|
|
*name = thread->name;
|
|
*parent_tid = thread->parent_tid;
|
|
if (thread->stack) CopyTrace(thread->stack->frames, trace, trace_size);
|
|
return 1;
|
|
}
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
int __tsan_get_report_unique_tid(void *report, uptr idx, int *tid) {
|
|
const ReportDesc *rep = (ReportDesc *)report;
|
|
CHECK_LT(idx, rep->unique_tids.Size());
|
|
*tid = rep->unique_tids[idx];
|
|
return 1;
|
|
}
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
const char *__tsan_locate_address(uptr addr, char *name, uptr name_size,
|
|
uptr *region_address_ptr,
|
|
uptr *region_size_ptr) {
|
|
uptr region_address = 0;
|
|
uptr region_size = 0;
|
|
const char *region_kind = nullptr;
|
|
if (name && name_size > 0) name[0] = 0;
|
|
|
|
if (IsMetaMem(addr)) {
|
|
region_kind = "meta shadow";
|
|
} else if (IsShadowMem(addr)) {
|
|
region_kind = "shadow";
|
|
} else {
|
|
bool is_stack = false;
|
|
MBlock *b = 0;
|
|
Allocator *a = allocator();
|
|
if (a->PointerIsMine((void *)addr)) {
|
|
void *block_begin = a->GetBlockBegin((void *)addr);
|
|
if (block_begin) b = ctx->metamap.GetBlock((uptr)block_begin);
|
|
}
|
|
|
|
if (b != 0) {
|
|
region_address = (uptr)allocator()->GetBlockBegin((void *)addr);
|
|
region_size = b->siz;
|
|
region_kind = "heap";
|
|
} else {
|
|
// TODO(kuba.brecka): We should not lock. This is supposed to be called
|
|
// from within the debugger when other threads are stopped.
|
|
ctx->thread_registry->Lock();
|
|
ThreadContext *tctx = IsThreadStackOrTls(addr, &is_stack);
|
|
ctx->thread_registry->Unlock();
|
|
if (tctx) {
|
|
region_kind = is_stack ? "stack" : "tls";
|
|
} else {
|
|
region_kind = "global";
|
|
DataInfo info;
|
|
if (Symbolizer::GetOrInit()->SymbolizeData(addr, &info)) {
|
|
internal_strncpy(name, info.name, name_size);
|
|
region_address = info.start;
|
|
region_size = info.size;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
CHECK(region_kind);
|
|
if (region_address_ptr) *region_address_ptr = region_address;
|
|
if (region_size_ptr) *region_size_ptr = region_size;
|
|
return region_kind;
|
|
}
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
int __tsan_get_alloc_stack(uptr addr, uptr *trace, uptr size, int *thread_id,
|
|
tid_t *os_id) {
|
|
MBlock *b = 0;
|
|
Allocator *a = allocator();
|
|
if (a->PointerIsMine((void *)addr)) {
|
|
void *block_begin = a->GetBlockBegin((void *)addr);
|
|
if (block_begin) b = ctx->metamap.GetBlock((uptr)block_begin);
|
|
}
|
|
if (b == 0) return 0;
|
|
|
|
*thread_id = b->tid;
|
|
// No locking. This is supposed to be called from within the debugger when
|
|
// other threads are stopped.
|
|
ThreadContextBase *tctx = ctx->thread_registry->GetThreadLocked(b->tid);
|
|
*os_id = tctx->os_id;
|
|
|
|
StackTrace stack = StackDepotGet(b->stk);
|
|
size = Min(size, (uptr)stack.size);
|
|
for (uptr i = 0; i < size; i++) trace[i] = stack.trace[stack.size - i - 1];
|
|
return size;
|
|
}
|