| 1 | //===-- tsan_defs.h ---------------------------------------------*- C++ -*-===// |
| 2 | // |
| 3 | // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. |
| 4 | // See https://llvm.org/LICENSE.txt for license information. |
| 5 | // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception |
| 6 | // |
| 7 | //===----------------------------------------------------------------------===// |
| 8 | // |
| 9 | // This file is a part of ThreadSanitizer (TSan), a race detector. |
| 10 | // |
| 11 | //===----------------------------------------------------------------------===// |
| 12 | |
| 13 | #ifndef TSAN_DEFS_H |
| 14 | #define TSAN_DEFS_H |
| 15 | |
| 16 | #include "sanitizer_common/sanitizer_internal_defs.h" |
| 17 | #include "sanitizer_common/sanitizer_libc.h" |
| 18 | #include "sanitizer_common/sanitizer_mutex.h" |
| 19 | #include "ubsan/ubsan_platform.h" |
| 20 | |
| 21 | #ifndef TSAN_VECTORIZE |
| 22 | # define TSAN_VECTORIZE __SSE4_2__ |
| 23 | #endif |
| 24 | |
| 25 | #if TSAN_VECTORIZE |
| 26 | // <emmintrin.h> transitively includes <stdlib.h>, |
| 27 | // and it's prohibited to include std headers into tsan runtime. |
| 28 | // So we do this dirty trick. |
| 29 | # define _MM_MALLOC_H_INCLUDED |
| 30 | # define __MM_MALLOC_H |
| 31 | # include <emmintrin.h> |
| 32 | # include <smmintrin.h> |
| 33 | # define VECTOR_ALIGNED alignas(16) |
| 34 | typedef __m128i m128; |
| 35 | #else |
| 36 | # define VECTOR_ALIGNED |
| 37 | #endif |
| 38 | |
| 39 | // Setup defaults for compile definitions. |
| 40 | #ifndef TSAN_NO_HISTORY |
| 41 | # define TSAN_NO_HISTORY 0 |
| 42 | #endif |
| 43 | |
| 44 | #ifndef TSAN_CONTAINS_UBSAN |
| 45 | # if CAN_SANITIZE_UB && !SANITIZER_GO |
| 46 | # define TSAN_CONTAINS_UBSAN 1 |
| 47 | # else |
| 48 | # define TSAN_CONTAINS_UBSAN 0 |
| 49 | # endif |
| 50 | #endif |
| 51 | |
| 52 | namespace __tsan { |
| 53 | |
| 54 | constexpr uptr kByteBits = 8; |
| 55 | |
| 56 | // Thread slot ID. |
| 57 | enum class Sid : u8 {}; |
| 58 | constexpr uptr kThreadSlotCount = 256; |
| 59 | constexpr Sid kFreeSid = static_cast<Sid>(255); |
| 60 | |
| 61 | // Abstract time unit, vector clock element. |
| 62 | enum class Epoch : u16 {}; |
| 63 | constexpr uptr kEpochBits = 14; |
| 64 | constexpr Epoch kEpochZero = static_cast<Epoch>(0); |
| 65 | constexpr Epoch kEpochOver = static_cast<Epoch>(1 << kEpochBits); |
| 66 | constexpr Epoch kEpochLast = static_cast<Epoch>((1 << kEpochBits) - 1); |
| 67 | |
| 68 | inline Epoch EpochInc(Epoch epoch) { |
| 69 | return static_cast<Epoch>(static_cast<u16>(epoch) + 1); |
| 70 | } |
| 71 | |
| 72 | inline bool EpochOverflow(Epoch epoch) { return epoch == kEpochOver; } |
| 73 | |
| 74 | const uptr kShadowStackSize = 64 * 1024; |
| 75 | |
| 76 | // Count of shadow values in a shadow cell. |
| 77 | const uptr kShadowCnt = 4; |
| 78 | |
| 79 | // That many user bytes are mapped onto a single shadow cell. |
| 80 | const uptr kShadowCell = 8; |
| 81 | |
| 82 | // Single shadow value. |
| 83 | enum class RawShadow : u32 {}; |
| 84 | const uptr kShadowSize = sizeof(RawShadow); |
| 85 | |
| 86 | // Shadow memory is kShadowMultiplier times larger than user memory. |
| 87 | const uptr kShadowMultiplier = kShadowSize * kShadowCnt / kShadowCell; |
| 88 | |
| 89 | // That many user bytes are mapped onto a single meta shadow cell. |
| 90 | // Must be less or equal to minimal memory allocator alignment. |
| 91 | const uptr kMetaShadowCell = 8; |
| 92 | |
| 93 | // Size of a single meta shadow value (u32). |
| 94 | const uptr kMetaShadowSize = 4; |
| 95 | |
| 96 | // All addresses and PCs are assumed to be compressable to that many bits. |
| 97 | const uptr kCompressedAddrBits = 44; |
| 98 | |
| 99 | #if TSAN_NO_HISTORY |
| 100 | const bool kCollectHistory = false; |
| 101 | #else |
| 102 | const bool kCollectHistory = true; |
| 103 | #endif |
| 104 | |
| 105 | // The following "build consistency" machinery ensures that all source files |
| 106 | // are built in the same configuration. Inconsistent builds lead to |
| 107 | // hard to debug crashes. |
| 108 | #if SANITIZER_DEBUG |
| 109 | void build_consistency_debug(); |
| 110 | #else |
| 111 | void build_consistency_release(); |
| 112 | #endif |
| 113 | |
| 114 | static inline void USED build_consistency() { |
| 115 | #if SANITIZER_DEBUG |
| 116 | build_consistency_debug(); |
| 117 | #else |
| 118 | build_consistency_release(); |
| 119 | #endif |
| 120 | } |
| 121 | |
| 122 | template<typename T> |
| 123 | T min(T a, T b) { |
| 124 | return a < b ? a : b; |
| 125 | } |
| 126 | |
| 127 | template<typename T> |
| 128 | T max(T a, T b) { |
| 129 | return a > b ? a : b; |
| 130 | } |
| 131 | |
| 132 | template<typename T> |
| 133 | T RoundUp(T p, u64 align) { |
| 134 | DCHECK_EQ(align & (align - 1), 0); |
| 135 | return (T)(((u64)p + align - 1) & ~(align - 1)); |
| 136 | } |
| 137 | |
| 138 | template<typename T> |
| 139 | T RoundDown(T p, u64 align) { |
| 140 | DCHECK_EQ(align & (align - 1), 0); |
| 141 | return (T)((u64)p & ~(align - 1)); |
| 142 | } |
| 143 | |
| 144 | // Zeroizes high part, returns 'bits' lsb bits. |
| 145 | template<typename T> |
| 146 | T GetLsb(T v, int bits) { |
| 147 | return (T)((u64)v & ((1ull << bits) - 1)); |
| 148 | } |
| 149 | |
| 150 | struct MD5Hash { |
| 151 | u64 hash[2]; |
| 152 | bool operator==(const MD5Hash &other) const; |
| 153 | }; |
| 154 | |
| 155 | MD5Hash md5_hash(const void *data, uptr size); |
| 156 | |
| 157 | struct Processor; |
| 158 | struct ThreadState; |
| 159 | class ThreadContext; |
| 160 | struct TidSlot; |
| 161 | struct Context; |
| 162 | struct ReportStack; |
| 163 | class ReportDesc; |
| 164 | class RegionAlloc; |
| 165 | struct Trace; |
| 166 | struct TracePart; |
| 167 | |
| 168 | typedef uptr AccessType; |
| 169 | |
| 170 | enum : AccessType { |
| 171 | kAccessWrite = 0, |
| 172 | kAccessRead = 1 << 0, |
| 173 | kAccessAtomic = 1 << 1, |
| 174 | kAccessVptr = 1 << 2, // read or write of an object virtual table pointer |
| 175 | kAccessFree = 1 << 3, // synthetic memory access during memory freeing |
| 176 | kAccessExternalPC = 1 << 4, // access PC can have kExternalPCBit set |
| 177 | kAccessCheckOnly = 1 << 5, // check for races, but don't store |
| 178 | kAccessNoRodata = 1 << 6, // don't check for .rodata marker |
| 179 | kAccessSlotLocked = 1 << 7, // memory access with TidSlot locked |
| 180 | }; |
| 181 | |
| 182 | // Descriptor of user's memory block. |
| 183 | struct MBlock { |
| 184 | u64 siz : 48; |
| 185 | u64 tag : 16; |
| 186 | StackID stk; |
| 187 | Tid tid; |
| 188 | }; |
| 189 | |
| 190 | COMPILER_CHECK(sizeof(MBlock) == 16); |
| 191 | |
| 192 | enum ExternalTag : uptr { |
| 193 | kExternalTagNone = 0, |
| 194 | kExternalTagSwiftModifyingAccess = 1, |
| 195 | kExternalTagFirstUserAvailable = 2, |
| 196 | kExternalTagMax = 1024, |
| 197 | // Don't set kExternalTagMax over 65,536, since MBlock only stores tags |
| 198 | // as 16-bit values, see tsan_defs.h. |
| 199 | }; |
| 200 | |
| 201 | enum { |
| 202 | MutexTypeReport = MutexLastCommon, |
| 203 | MutexTypeSyncVar, |
| 204 | MutexTypeAnnotations, |
| 205 | MutexTypeAtExit, |
| 206 | MutexTypeFired, |
| 207 | MutexTypeRacy, |
| 208 | MutexTypeGlobalProc, |
| 209 | MutexTypeInternalAlloc, |
| 210 | MutexTypeTrace, |
| 211 | MutexTypeSlot, |
| 212 | MutexTypeSlots, |
| 213 | }; |
| 214 | |
| 215 | } // namespace __tsan |
| 216 | |
| 217 | #endif // TSAN_DEFS_H |
| 218 | |