summaryrefslogtreecommitdiff
path: root/lib
diff options
context:
space:
mode:
authorKostya Serebryany <kcc@google.com>2014-03-13 13:21:30 +0000
committerKostya Serebryany <kcc@google.com>2014-03-13 13:21:30 +0000
commit9cdcf37ef1c7cf59dea0fecb1938f77d60324d70 (patch)
treef19d71e2ab53ddca818194f85bdef0c58a1f6dc9 /lib
parentc5dc470eacfb0aab04b6737573e099b46f033e1b (diff)
[sanitizer] in bitvector-based deadlock detector split onLock into onLockBefore and onLockAfter hooks
git-svn-id: https://llvm.org/svn/llvm-project/compiler-rt/trunk@203796 91177308-0d34-0410-b5e6-96231b3b80d8
Diffstat (limited to 'lib')
-rw-r--r--lib/sanitizer_common/sanitizer_deadlock_detector.h38
-rw-r--r--lib/sanitizer_common/sanitizer_deadlock_detector1.cc38
-rw-r--r--lib/sanitizer_common/tests/sanitizer_deadlock_detector_test.cc10
-rw-r--r--lib/tsan/rtl/tsan_rtl_mutex.cc6
4 files changed, 58 insertions, 34 deletions
diff --git a/lib/sanitizer_common/sanitizer_deadlock_detector.h b/lib/sanitizer_common/sanitizer_deadlock_detector.h
index d2f7b5d70..14762be4a 100644
--- a/lib/sanitizer_common/sanitizer_deadlock_detector.h
+++ b/lib/sanitizer_common/sanitizer_deadlock_detector.h
@@ -67,7 +67,6 @@ class DeadlockDetectorTLS {
}
void removeLock(uptr lock_id) {
- // Printf("remLock: %zx %zx\n", lock_id, current_epoch);
if (n_recursive_locks) {
for (sptr i = n_recursive_locks - 1; i >= 0; i--) {
if (recursive_locks[i] == lock_id) {
@@ -77,6 +76,7 @@ class DeadlockDetectorTLS {
}
}
}
+ // Printf("remLock: %zx %zx\n", lock_id, epoch_);
CHECK(bv_.clearBit(lock_id));
}
@@ -155,14 +155,30 @@ class DeadlockDetector {
dtls->ensureCurrentEpoch(current_epoch_);
}
- // Handles the lock event, returns true if there is a cycle.
- // FIXME: handle RW locks, recursive locks, etc.
- bool onLock(DeadlockDetectorTLS<BV> *dtls, uptr cur_node) {
+ // Returns true if there is a cycle in the graph after this lock event.
+ // Ideally should be called before the lock is acquired so that we can
+ // report a deadlock before a real deadlock happens.
+ bool onLockBefore(DeadlockDetectorTLS<BV> *dtls, uptr cur_node) {
+ ensureCurrentEpoch(dtls);
+ uptr cur_idx = nodeToIndex(cur_node);
+ return g_.isReachable(cur_idx, dtls->getLocks(current_epoch_));
+ }
+
+ // Returns true if a new edge has been added to the graph.
+ // Should be called before after the lock is acquired.
+ bool onLockAfter(DeadlockDetectorTLS<BV> *dtls, uptr cur_node) {
ensureCurrentEpoch(dtls);
uptr cur_idx = nodeToIndex(cur_node);
- bool is_reachable = g_.isReachable(cur_idx, dtls->getLocks(current_epoch_));
g_.addEdges(dtls->getLocks(current_epoch_), cur_idx);
- return dtls->addLock(cur_idx, current_epoch_) && is_reachable;
+ return dtls->addLock(cur_idx, current_epoch_);
+ }
+
+ // Test-only function. Handles the before/after lock events,
+ // returns true if there is a cycle.
+ bool onLock(DeadlockDetectorTLS<BV> *dtls, uptr cur_node) {
+ ensureCurrentEpoch(dtls);
+ bool is_reachable = onLockBefore(dtls, cur_node);
+ return onLockAfter(dtls, cur_node) && is_reachable;
}
// Handles the try_lock event, returns false.
@@ -189,14 +205,14 @@ class DeadlockDetector {
return false;
}
- // Finds a path between the lock 'cur_node' (which is currently held in dtls)
- // and some other currently held lock, returns the length of the path
+ // Finds a path between the lock 'cur_node' (currently not held in dtls)
+ // and some currently held lock, returns the length of the path
// or 0 on failure.
- uptr findPathToHeldLock(DeadlockDetectorTLS<BV> *dtls, uptr cur_node,
- uptr *path, uptr path_size) {
+ uptr findPathToLock(DeadlockDetectorTLS<BV> *dtls, uptr cur_node, uptr *path,
+ uptr path_size) {
tmp_bv_.copyFrom(dtls->getLocks(current_epoch_));
uptr idx = nodeToIndex(cur_node);
- CHECK(tmp_bv_.clearBit(idx));
+ CHECK(!tmp_bv_.getBit(idx));
uptr res = g_.findShortestPath(idx, tmp_bv_, path, path_size);
for (uptr i = 0; i < res; i++)
path[i] = indexToNode(path[i]);
diff --git a/lib/sanitizer_common/sanitizer_deadlock_detector1.cc b/lib/sanitizer_common/sanitizer_deadlock_detector1.cc
index adf6bd336..2f27b3cc5 100644
--- a/lib/sanitizer_common/sanitizer_deadlock_detector1.cc
+++ b/lib/sanitizer_common/sanitizer_deadlock_detector1.cc
@@ -98,24 +98,15 @@ void DD::MutexEnsureID(DDLogicalThread *lt, DDMutex *m) {
void DD::MutexBeforeLock(DDCallback *cb,
DDMutex *m, bool wlock) {
-}
-
-void DD::MutexAfterLock(DDCallback *cb, DDMutex *m, bool wlock, bool trylock) {
DDLogicalThread *lt = cb->lt;
- if (dd.onFirstLock(&lt->dd, m->id))
- return;
+ if (lt->dd.empty()) return; // This will be the first lock held by lt.
SpinMutexLock lk(&mtx);
MutexEnsureID(lt, m);
- if (wlock) // Only a recursive rlock may be held.
- CHECK(!dd.isHeld(&lt->dd, m->id));
- // Printf("T%d MutexLock: %zx\n", thr->tid, s->deadlock_detector_id);
- bool has_deadlock = trylock
- ? dd.onTryLock(&lt->dd, m->id)
- : dd.onLock(&lt->dd, m->id);
- if (has_deadlock) {
+ if (dd.isHeld(&lt->dd, m->id))
+ return; // FIXME: allow this only for recursive locks.
+ if (dd.onLockBefore(&lt->dd, m->id)) {
uptr path[10];
- uptr len = dd.findPathToHeldLock(&lt->dd, m->id,
- path, ARRAY_SIZE(path));
+ uptr len = dd.findPathToLock(&lt->dd, m->id, path, ARRAY_SIZE(path));
CHECK_GT(len, 0U); // Hm.. cycle of 10 locks? I'd like to see that.
lt->report_pending = true;
DDReport *rep = &lt->rep;
@@ -131,9 +122,24 @@ void DD::MutexAfterLock(DDCallback *cb, DDMutex *m, bool wlock, bool trylock) {
}
}
+void DD::MutexAfterLock(DDCallback *cb, DDMutex *m, bool wlock, bool trylock) {
+ DDLogicalThread *lt = cb->lt;
+ // Printf("T%p MutexLock: %zx\n", lt, m->id);
+ if (dd.onFirstLock(&lt->dd, m->id))
+ return;
+ SpinMutexLock lk(&mtx);
+ MutexEnsureID(lt, m);
+ if (wlock) // Only a recursive rlock may be held.
+ CHECK(!dd.isHeld(&lt->dd, m->id));
+ bool edge_added =
+ trylock ? dd.onTryLock(&lt->dd, m->id) : dd.onLockAfter(&lt->dd, m->id);
+ if (edge_added) {
+ // Printf("Edge added\n");
+ }
+}
+
void DD::MutexBeforeUnlock(DDCallback *cb, DDMutex *m, bool wlock) {
- // Printf("T%d MutexUnlock: %zx; recursion %d\n", thr->tid,
- // s->deadlock_detector_id, s->recursion);
+ // Printf("T%p MutexUnLock: %zx\n", cb->lt, m->id);
dd.onUnlock(&cb->lt->dd, m->id);
}
diff --git a/lib/sanitizer_common/tests/sanitizer_deadlock_detector_test.cc b/lib/sanitizer_common/tests/sanitizer_deadlock_detector_test.cc
index b7a925d1f..36d384531 100644
--- a/lib/sanitizer_common/tests/sanitizer_deadlock_detector_test.cc
+++ b/lib/sanitizer_common/tests/sanitizer_deadlock_detector_test.cc
@@ -82,10 +82,10 @@ void RunBasicTest() {
d.onUnlock(&dtls, n1);
EXPECT_FALSE(d.onLock(&dtls, n2));
+ EXPECT_EQ(0U, d.findPathToLock(&dtls, n1, path, 1));
+ EXPECT_EQ(2U, d.findPathToLock(&dtls, n1, path, 10));
+ EXPECT_EQ(2U, d.findPathToLock(&dtls, n1, path, 2));
EXPECT_TRUE(d.onLock(&dtls, n1));
- EXPECT_EQ(0U, d.findPathToHeldLock(&dtls, n1, path, 1));
- EXPECT_EQ(2U, d.findPathToHeldLock(&dtls, n1, path, 10));
- EXPECT_EQ(2U, d.findPathToHeldLock(&dtls, n1, path, 2));
EXPECT_EQ(path[0], n1);
EXPECT_EQ(path[1], n2);
EXPECT_EQ(d.getData(n1), 1U);
@@ -113,9 +113,9 @@ void RunBasicTest() {
d.onUnlock(&dtls, n2);
EXPECT_FALSE(d.onLock(&dtls, n3));
+ EXPECT_EQ(0U, d.findPathToLock(&dtls, n1, path, 2));
+ EXPECT_EQ(3U, d.findPathToLock(&dtls, n1, path, 10));
EXPECT_TRUE(d.onLock(&dtls, n1));
- EXPECT_EQ(0U, d.findPathToHeldLock(&dtls, n1, path, 2));
- EXPECT_EQ(3U, d.findPathToHeldLock(&dtls, n1, path, 10));
EXPECT_EQ(path[0], n1);
EXPECT_EQ(path[1], n2);
EXPECT_EQ(path[2], n3);
diff --git a/lib/tsan/rtl/tsan_rtl_mutex.cc b/lib/tsan/rtl/tsan_rtl_mutex.cc
index 87c847cce..185c163a8 100644
--- a/lib/tsan/rtl/tsan_rtl_mutex.cc
+++ b/lib/tsan/rtl/tsan_rtl_mutex.cc
@@ -141,7 +141,8 @@ void MutexLock(ThreadState *thr, uptr pc, uptr addr, int rec, bool try_lock) {
thr->mset.Add(s->GetId(), true, thr->fast_state.epoch());
if (flags()->detect_deadlocks && s->recursion == 1) {
Callback cb(thr, pc);
- ctx->dd->MutexBeforeLock(&cb, &s->dd, true);
+ if (!try_lock)
+ ctx->dd->MutexBeforeLock(&cb, &s->dd, true);
ctx->dd->MutexAfterLock(&cb, &s->dd, true, try_lock);
}
s->mtx.Unlock();
@@ -216,7 +217,8 @@ void MutexReadLock(ThreadState *thr, uptr pc, uptr addr, bool trylock) {
thr->mset.Add(s->GetId(), false, thr->fast_state.epoch());
if (flags()->detect_deadlocks && s->recursion == 0) {
Callback cb(thr, pc);
- ctx->dd->MutexBeforeLock(&cb, &s->dd, false);
+ if (!trylock)
+ ctx->dd->MutexBeforeLock(&cb, &s->dd, false);
ctx->dd->MutexAfterLock(&cb, &s->dd, false, trylock);
}
s->mtx.ReadUnlock();