1 // Copyright 2017 The Abseil Authors.
2 //
3 // Licensed under the Apache License, Version 2.0 (the "License");
4 // you may not use this file except in compliance with the License.
5 // You may obtain a copy of the License at
6 //
7 // https://www.apache.org/licenses/LICENSE-2.0
8 //
9 // Unless required by applicable law or agreed to in writing, software
10 // distributed under the License is distributed on an "AS IS" BASIS,
11 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 // See the License for the specific language governing permissions and
13 // limitations under the License.
14
15 // This file defines dynamic annotations for use with dynamic analysis tool
16 // such as valgrind, PIN, etc.
17 //
18 // Dynamic annotation is a source code annotation that affects the generated
19 // code (that is, the annotation is not a comment). Each such annotation is
20 // attached to a particular instruction and/or to a particular object (address)
21 // in the program.
22 //
23 // The annotations that should be used by users are macros in all upper-case
24 // (e.g., ABSL_ANNOTATE_THREAD_NAME).
25 //
26 // Actual implementation of these macros may differ depending on the dynamic
27 // analysis tool being used.
28 //
29 // This file supports the following configurations:
30 // - Dynamic Annotations enabled (with static thread-safety warnings disabled).
31 // In this case, macros expand to functions implemented by Thread Sanitizer,
32 // when building with TSan. When not provided an external implementation,
33 // dynamic_annotations.cc provides no-op implementations.
34 //
35 // - Static Clang thread-safety warnings enabled.
36 // When building with a Clang compiler that supports thread-safety warnings,
37 // a subset of annotations can be statically-checked at compile-time. We
38 // expand these macros to static-inline functions that can be analyzed for
39 // thread-safety, but afterwards elided when building the final binary.
40 //
41 // - All annotations are disabled.
42 // If neither Dynamic Annotations nor Clang thread-safety warnings are
43 // enabled, then all annotation-macros expand to empty.
44
45 #ifndef ABSL_BASE_DYNAMIC_ANNOTATIONS_H_
46 #define ABSL_BASE_DYNAMIC_ANNOTATIONS_H_
47
48 #include <stddef.h>
49 #include <stdint.h>
50
51 #include "absl/base/attributes.h"
52 #include "absl/base/config.h"
53 #ifdef __cplusplus
54 #include "absl/base/macros.h"
55 #endif
56
57 #ifdef ABSL_HAVE_HWADDRESS_SANITIZER
58 #include <sanitizer/hwasan_interface.h>
59 #endif
60
61 // -------------------------------------------------------------------------
62 // Decide which features are enabled.
63
64 #ifdef ABSL_HAVE_THREAD_SANITIZER
65
66 #define ABSL_INTERNAL_RACE_ANNOTATIONS_ENABLED 1
67 #define ABSL_INTERNAL_READS_ANNOTATIONS_ENABLED 1
68 #define ABSL_INTERNAL_WRITES_ANNOTATIONS_ENABLED 1
69 #define ABSL_INTERNAL_ANNOTALYSIS_ENABLED 0
70 #define ABSL_INTERNAL_READS_WRITES_ANNOTATIONS_ENABLED 1
71
72 #else
73
74 #define ABSL_INTERNAL_RACE_ANNOTATIONS_ENABLED 0
75 #define ABSL_INTERNAL_READS_ANNOTATIONS_ENABLED 0
76 #define ABSL_INTERNAL_WRITES_ANNOTATIONS_ENABLED 0
77
78 // Clang provides limited support for static thread-safety analysis through a
79 // feature called Annotalysis. We configure macro-definitions according to
80 // whether Annotalysis support is available. When running in opt-mode, GCC
81 // will issue a warning, if these attributes are compiled. Only include them
82 // when compiling using Clang.
83
84 #if defined(__clang__)
85 #define ABSL_INTERNAL_ANNOTALYSIS_ENABLED 1
86 #if !defined(SWIG)
87 #define ABSL_INTERNAL_IGNORE_READS_ATTRIBUTE_ENABLED 1
88 #endif
89 #else
90 #define ABSL_INTERNAL_ANNOTALYSIS_ENABLED 0
91 #endif
92
93 // Read/write annotations are enabled in Annotalysis mode; disabled otherwise.
94 #define ABSL_INTERNAL_READS_WRITES_ANNOTATIONS_ENABLED \
95 ABSL_INTERNAL_ANNOTALYSIS_ENABLED
96
97 #endif // ABSL_HAVE_THREAD_SANITIZER
98
99 #ifdef __cplusplus
100 #define ABSL_INTERNAL_BEGIN_EXTERN_C extern "C" {
101 #define ABSL_INTERNAL_END_EXTERN_C } // extern "C"
102 #define ABSL_INTERNAL_GLOBAL_SCOPED(F) ::F
103 #define ABSL_INTERNAL_STATIC_INLINE inline
104 #else
105 #define ABSL_INTERNAL_BEGIN_EXTERN_C // empty
106 #define ABSL_INTERNAL_END_EXTERN_C // empty
107 #define ABSL_INTERNAL_GLOBAL_SCOPED(F) F
108 #define ABSL_INTERNAL_STATIC_INLINE static inline
109 #endif
110
111 // -------------------------------------------------------------------------
112 // Define race annotations.
113
114 #if ABSL_INTERNAL_RACE_ANNOTATIONS_ENABLED == 1
115 // Some of the symbols used in this section (e.g. AnnotateBenignRaceSized) are
116 // defined by the compiler-based sanitizer implementation, not by the Abseil
117 // library. Therefore they do not use ABSL_INTERNAL_C_SYMBOL.
118
119 // -------------------------------------------------------------
120 // Annotations that suppress errors. It is usually better to express the
121 // program's synchronization using the other annotations, but these can be used
122 // when all else fails.
123
124 // Report that we may have a benign race at `pointer`, with size
125 // "sizeof(*(pointer))". `pointer` must be a non-void* pointer. Insert at the
126 // point where `pointer` has been allocated, preferably close to the point
127 // where the race happens. See also ABSL_ANNOTATE_BENIGN_RACE_STATIC.
128 #define ABSL_ANNOTATE_BENIGN_RACE(pointer, description) \
129 ABSL_INTERNAL_GLOBAL_SCOPED(AnnotateBenignRaceSized) \
130 (__FILE__, __LINE__, pointer, sizeof(*(pointer)), description)
131
132 // Same as ABSL_ANNOTATE_BENIGN_RACE(`address`, `description`), but applies to
133 // the memory range [`address`, `address`+`size`).
134 #define ABSL_ANNOTATE_BENIGN_RACE_SIZED(address, size, description) \
135 ABSL_INTERNAL_GLOBAL_SCOPED(AnnotateBenignRaceSized) \
136 (__FILE__, __LINE__, address, size, description)
137
138 // Enable (`enable`!=0) or disable (`enable`==0) race detection for all threads.
139 // This annotation could be useful if you want to skip expensive race analysis
140 // during some period of program execution, e.g. during initialization.
141 #define ABSL_ANNOTATE_ENABLE_RACE_DETECTION(enable) \
142 ABSL_INTERNAL_GLOBAL_SCOPED(AnnotateEnableRaceDetection) \
143 (__FILE__, __LINE__, enable)
144
145 // -------------------------------------------------------------
146 // Annotations useful for debugging.
147
148 // Report the current thread `name` to a race detector.
149 #define ABSL_ANNOTATE_THREAD_NAME(name) \
150 ABSL_INTERNAL_GLOBAL_SCOPED(AnnotateThreadName)(__FILE__, __LINE__, name)
151
152 // -------------------------------------------------------------
153 // Annotations useful when implementing locks. They are not normally needed by
154 // modules that merely use locks. The `lock` argument is a pointer to the lock
155 // object.
156
157 // Report that a lock has been created at address `lock`.
158 #define ABSL_ANNOTATE_RWLOCK_CREATE(lock) \
159 ABSL_INTERNAL_GLOBAL_SCOPED(AnnotateRWLockCreate)(__FILE__, __LINE__, lock)
160
161 // Report that a linker initialized lock has been created at address `lock`.
162 #ifdef ABSL_HAVE_THREAD_SANITIZER
163 #define ABSL_ANNOTATE_RWLOCK_CREATE_STATIC(lock) \
164 ABSL_INTERNAL_GLOBAL_SCOPED(AnnotateRWLockCreateStatic) \
165 (__FILE__, __LINE__, lock)
166 #else
167 #define ABSL_ANNOTATE_RWLOCK_CREATE_STATIC(lock) \
168 ABSL_ANNOTATE_RWLOCK_CREATE(lock)
169 #endif
170
171 // Report that the lock at address `lock` is about to be destroyed.
172 #define ABSL_ANNOTATE_RWLOCK_DESTROY(lock) \
173 ABSL_INTERNAL_GLOBAL_SCOPED(AnnotateRWLockDestroy)(__FILE__, __LINE__, lock)
174
175 // Report that the lock at address `lock` has been acquired.
176 // `is_w`=1 for writer lock, `is_w`=0 for reader lock.
177 #define ABSL_ANNOTATE_RWLOCK_ACQUIRED(lock, is_w) \
178 ABSL_INTERNAL_GLOBAL_SCOPED(AnnotateRWLockAcquired) \
179 (__FILE__, __LINE__, lock, is_w)
180
181 // Report that the lock at address `lock` is about to be released.
182 // `is_w`=1 for writer lock, `is_w`=0 for reader lock.
183 #define ABSL_ANNOTATE_RWLOCK_RELEASED(lock, is_w) \
184 ABSL_INTERNAL_GLOBAL_SCOPED(AnnotateRWLockReleased) \
185 (__FILE__, __LINE__, lock, is_w)
186
187 // Apply ABSL_ANNOTATE_BENIGN_RACE_SIZED to a static variable `static_var`.
188 #define ABSL_ANNOTATE_BENIGN_RACE_STATIC(static_var, description) \
189 namespace { \
190 class static_var##_annotator { \
191 public: \
192 static_var##_annotator() { \
193 ABSL_ANNOTATE_BENIGN_RACE_SIZED(&static_var, sizeof(static_var), \
194 #static_var ": " description); \
195 } \
196 }; \
197 static static_var##_annotator the##static_var##_annotator; \
198 } // namespace
199
200 // Function prototypes of annotations provided by the compiler-based sanitizer
201 // implementation.
202 ABSL_INTERNAL_BEGIN_EXTERN_C
203 void AnnotateRWLockCreate(const char* file, int line,
204 const volatile void* lock);
205 void AnnotateRWLockCreateStatic(const char* file, int line,
206 const volatile void* lock);
207 void AnnotateRWLockDestroy(const char* file, int line,
208 const volatile void* lock);
209 void AnnotateRWLockAcquired(const char* file, int line,
210 const volatile void* lock, long is_w); // NOLINT
211 void AnnotateRWLockReleased(const char* file, int line,
212 const volatile void* lock, long is_w); // NOLINT
213 void AnnotateBenignRace(const char* file, int line,
214 const volatile void* address, const char* description);
215 void AnnotateBenignRaceSized(const char* file, int line,
216 const volatile void* address, size_t size,
217 const char* description);
218 void AnnotateThreadName(const char* file, int line, const char* name);
219 void AnnotateEnableRaceDetection(const char* file, int line, int enable);
220 ABSL_INTERNAL_END_EXTERN_C
221
222 #else // ABSL_INTERNAL_RACE_ANNOTATIONS_ENABLED == 0
223
224 #define ABSL_ANNOTATE_RWLOCK_CREATE(lock) // empty
225 #define ABSL_ANNOTATE_RWLOCK_CREATE_STATIC(lock) // empty
226 #define ABSL_ANNOTATE_RWLOCK_DESTROY(lock) // empty
227 #define ABSL_ANNOTATE_RWLOCK_ACQUIRED(lock, is_w) // empty
228 #define ABSL_ANNOTATE_RWLOCK_RELEASED(lock, is_w) // empty
229 #define ABSL_ANNOTATE_BENIGN_RACE(address, description) // empty
230 #define ABSL_ANNOTATE_BENIGN_RACE_SIZED(address, size, description) // empty
231 #define ABSL_ANNOTATE_THREAD_NAME(name) // empty
232 #define ABSL_ANNOTATE_ENABLE_RACE_DETECTION(enable) // empty
233 #define ABSL_ANNOTATE_BENIGN_RACE_STATIC(static_var, description) // empty
234
235 #endif // ABSL_INTERNAL_RACE_ANNOTATIONS_ENABLED
236
237 // -------------------------------------------------------------------------
238 // Define memory annotations.
239
240 #ifdef ABSL_HAVE_MEMORY_SANITIZER
241
242 #include <sanitizer/msan_interface.h>
243
244 #define ABSL_ANNOTATE_MEMORY_IS_INITIALIZED(address, size) \
245 __msan_unpoison(address, size)
246
247 #define ABSL_ANNOTATE_MEMORY_IS_UNINITIALIZED(address, size) \
248 __msan_allocated_memory(address, size)
249
250 #else // !defined(ABSL_HAVE_MEMORY_SANITIZER)
251
252 #define ABSL_ANNOTATE_MEMORY_IS_INITIALIZED(address, size) // empty
253 #define ABSL_ANNOTATE_MEMORY_IS_UNINITIALIZED(address, size) // empty
254
255 #endif // ABSL_HAVE_MEMORY_SANITIZER
256
257 // -------------------------------------------------------------------------
258 // Define IGNORE_READS_BEGIN/_END attributes.
259
260 #if defined(ABSL_INTERNAL_IGNORE_READS_ATTRIBUTE_ENABLED)
261
262 #define ABSL_INTERNAL_IGNORE_READS_BEGIN_ATTRIBUTE \
263 __attribute((exclusive_lock_function("*")))
264 #define ABSL_INTERNAL_IGNORE_READS_END_ATTRIBUTE \
265 __attribute((unlock_function("*")))
266
267 #else // !defined(ABSL_INTERNAL_IGNORE_READS_ATTRIBUTE_ENABLED)
268
269 #define ABSL_INTERNAL_IGNORE_READS_BEGIN_ATTRIBUTE // empty
270 #define ABSL_INTERNAL_IGNORE_READS_END_ATTRIBUTE // empty
271
272 #endif // defined(ABSL_INTERNAL_IGNORE_READS_ATTRIBUTE_ENABLED)
273
274 // -------------------------------------------------------------------------
275 // Define IGNORE_READS_BEGIN/_END annotations.
276
277 #if ABSL_INTERNAL_READS_ANNOTATIONS_ENABLED == 1
278 // Some of the symbols used in this section (e.g. AnnotateIgnoreReadsBegin) are
279 // defined by the compiler-based implementation, not by the Abseil
280 // library. Therefore they do not use ABSL_INTERNAL_C_SYMBOL.
281
282 // Request the analysis tool to ignore all reads in the current thread until
283 // ABSL_ANNOTATE_IGNORE_READS_END is called. Useful to ignore intentional racey
284 // reads, while still checking other reads and all writes.
285 // See also ABSL_ANNOTATE_UNPROTECTED_READ.
286 #define ABSL_ANNOTATE_IGNORE_READS_BEGIN() \
287 ABSL_INTERNAL_GLOBAL_SCOPED(AnnotateIgnoreReadsBegin) \
288 (__FILE__, __LINE__)
289
290 // Stop ignoring reads.
291 #define ABSL_ANNOTATE_IGNORE_READS_END() \
292 ABSL_INTERNAL_GLOBAL_SCOPED(AnnotateIgnoreReadsEnd) \
293 (__FILE__, __LINE__)
294
295 // Function prototypes of annotations provided by the compiler-based sanitizer
296 // implementation.
297 ABSL_INTERNAL_BEGIN_EXTERN_C
298 void AnnotateIgnoreReadsBegin(const char* file, int line)
299 ABSL_INTERNAL_IGNORE_READS_BEGIN_ATTRIBUTE;
300 void AnnotateIgnoreReadsEnd(const char* file,
301 int line) ABSL_INTERNAL_IGNORE_READS_END_ATTRIBUTE;
302 ABSL_INTERNAL_END_EXTERN_C
303
304 #elif defined(ABSL_INTERNAL_ANNOTALYSIS_ENABLED)
305
306 // When Annotalysis is enabled without Dynamic Annotations, the use of
307 // static-inline functions allows the annotations to be read at compile-time,
308 // while still letting the compiler elide the functions from the final build.
309 //
310 // TODO(delesley) -- The exclusive lock here ignores writes as well, but
311 // allows IGNORE_READS_AND_WRITES to work properly.
312
313 #define ABSL_ANNOTATE_IGNORE_READS_BEGIN() \
314 ABSL_INTERNAL_GLOBAL_SCOPED( \
315 ABSL_INTERNAL_C_SYMBOL(AbslInternalAnnotateIgnoreReadsBegin)) \
316 ()
317
318 #define ABSL_ANNOTATE_IGNORE_READS_END() \
319 ABSL_INTERNAL_GLOBAL_SCOPED( \
320 ABSL_INTERNAL_C_SYMBOL(AbslInternalAnnotateIgnoreReadsEnd)) \
321 ()
322
323 ABSL_INTERNAL_STATIC_INLINE void ABSL_INTERNAL_C_SYMBOL(
324 AbslInternalAnnotateIgnoreReadsBegin)()
325 ABSL_INTERNAL_IGNORE_READS_BEGIN_ATTRIBUTE {}
326
327 ABSL_INTERNAL_STATIC_INLINE void ABSL_INTERNAL_C_SYMBOL(
328 AbslInternalAnnotateIgnoreReadsEnd)()
329 ABSL_INTERNAL_IGNORE_READS_END_ATTRIBUTE {}
330
331 #else
332
333 #define ABSL_ANNOTATE_IGNORE_READS_BEGIN() // empty
334 #define ABSL_ANNOTATE_IGNORE_READS_END() // empty
335
336 #endif
337
338 // -------------------------------------------------------------------------
339 // Define IGNORE_WRITES_BEGIN/_END annotations.
340
341 #if ABSL_INTERNAL_WRITES_ANNOTATIONS_ENABLED == 1
342
343 // Similar to ABSL_ANNOTATE_IGNORE_READS_BEGIN, but ignore writes instead.
344 #define ABSL_ANNOTATE_IGNORE_WRITES_BEGIN() \
345 ABSL_INTERNAL_GLOBAL_SCOPED(AnnotateIgnoreWritesBegin)(__FILE__, __LINE__)
346
347 // Stop ignoring writes.
348 #define ABSL_ANNOTATE_IGNORE_WRITES_END() \
349 ABSL_INTERNAL_GLOBAL_SCOPED(AnnotateIgnoreWritesEnd)(__FILE__, __LINE__)
350
351 // Function prototypes of annotations provided by the compiler-based sanitizer
352 // implementation.
353 ABSL_INTERNAL_BEGIN_EXTERN_C
354 void AnnotateIgnoreWritesBegin(const char* file, int line);
355 void AnnotateIgnoreWritesEnd(const char* file, int line);
356 ABSL_INTERNAL_END_EXTERN_C
357
358 #else
359
360 #define ABSL_ANNOTATE_IGNORE_WRITES_BEGIN() // empty
361 #define ABSL_ANNOTATE_IGNORE_WRITES_END() // empty
362
363 #endif
364
365 // -------------------------------------------------------------------------
366 // Define the ABSL_ANNOTATE_IGNORE_READS_AND_WRITES_* annotations using the more
367 // primitive annotations defined above.
368 //
369 // Instead of doing
370 // ABSL_ANNOTATE_IGNORE_READS_BEGIN();
371 // ... = x;
372 // ABSL_ANNOTATE_IGNORE_READS_END();
373 // one can use
374 // ... = ABSL_ANNOTATE_UNPROTECTED_READ(x);
375
376 #if defined(ABSL_INTERNAL_READS_WRITES_ANNOTATIONS_ENABLED)
377
378 // Start ignoring all memory accesses (both reads and writes).
379 #define ABSL_ANNOTATE_IGNORE_READS_AND_WRITES_BEGIN() \
380 do { \
381 ABSL_ANNOTATE_IGNORE_READS_BEGIN(); \
382 ABSL_ANNOTATE_IGNORE_WRITES_BEGIN(); \
383 } while (0)
384
385 // Stop ignoring both reads and writes.
386 #define ABSL_ANNOTATE_IGNORE_READS_AND_WRITES_END() \
387 do { \
388 ABSL_ANNOTATE_IGNORE_WRITES_END(); \
389 ABSL_ANNOTATE_IGNORE_READS_END(); \
390 } while (0)
391
392 #ifdef __cplusplus
393 // ABSL_ANNOTATE_UNPROTECTED_READ is the preferred way to annotate racey reads.
394 #define ABSL_ANNOTATE_UNPROTECTED_READ(x) \
395 absl::base_internal::AnnotateUnprotectedRead(x)
396
397 namespace absl {
398 ABSL_NAMESPACE_BEGIN
399 namespace base_internal {
400
401 template <typename T>
AnnotateUnprotectedRead(const volatile T & x)402 inline T AnnotateUnprotectedRead(const volatile T& x) { // NOLINT
403 ABSL_ANNOTATE_IGNORE_READS_BEGIN();
404 T res = x;
405 ABSL_ANNOTATE_IGNORE_READS_END();
406 return res;
407 }
408
409 } // namespace base_internal
410 ABSL_NAMESPACE_END
411 } // namespace absl
412 #endif
413
414 #else
415
416 #define ABSL_ANNOTATE_IGNORE_READS_AND_WRITES_BEGIN() // empty
417 #define ABSL_ANNOTATE_IGNORE_READS_AND_WRITES_END() // empty
418 #define ABSL_ANNOTATE_UNPROTECTED_READ(x) (x)
419
420 #endif
421
422 // -------------------------------------------------------------------------
423 // Address sanitizer annotations
424
425 #ifdef ABSL_HAVE_ADDRESS_SANITIZER
426 // Describe the current state of a contiguous container such as e.g.
427 // std::vector or std::string. For more details see
428 // sanitizer/common_interface_defs.h, which is provided by the compiler.
429 #include <sanitizer/common_interface_defs.h>
430
431 #define ABSL_ANNOTATE_CONTIGUOUS_CONTAINER(beg, end, old_mid, new_mid) \
432 __sanitizer_annotate_contiguous_container(beg, end, old_mid, new_mid)
433 #define ABSL_ADDRESS_SANITIZER_REDZONE(name) \
434 struct { \
435 alignas(8) char x[8]; \
436 } name
437
438 #else
439
440 #define ABSL_ANNOTATE_CONTIGUOUS_CONTAINER(beg, end, old_mid, new_mid) // empty
441 #define ABSL_ADDRESS_SANITIZER_REDZONE(name) static_assert(true, "")
442
443 #endif // ABSL_HAVE_ADDRESS_SANITIZER
444
445 // -------------------------------------------------------------------------
446 // HWAddress sanitizer annotations
447
448 #ifdef __cplusplus
449 namespace absl {
450 #ifdef ABSL_HAVE_HWADDRESS_SANITIZER
451 // Under HWASAN changes the tag of the pointer.
452 template <typename T>
HwasanTagPointer(T * ptr,uintptr_t tag)453 T* HwasanTagPointer(T* ptr, uintptr_t tag) {
454 return reinterpret_cast<T*>(__hwasan_tag_pointer(ptr, tag));
455 }
456 #else
457 template <typename T>
458 T* HwasanTagPointer(T* ptr, uintptr_t) {
459 return ptr;
460 }
461 #endif
462 } // namespace absl
463 #endif
464
465 // -------------------------------------------------------------------------
466 // Undefine the macros intended only for this file.
467
468 #undef ABSL_INTERNAL_RACE_ANNOTATIONS_ENABLED
469 #undef ABSL_INTERNAL_READS_ANNOTATIONS_ENABLED
470 #undef ABSL_INTERNAL_WRITES_ANNOTATIONS_ENABLED
471 #undef ABSL_INTERNAL_ANNOTALYSIS_ENABLED
472 #undef ABSL_INTERNAL_READS_WRITES_ANNOTATIONS_ENABLED
473 #undef ABSL_INTERNAL_BEGIN_EXTERN_C
474 #undef ABSL_INTERNAL_END_EXTERN_C
475 #undef ABSL_INTERNAL_STATIC_INLINE
476
477 #endif // ABSL_BASE_DYNAMIC_ANNOTATIONS_H_
478