mirror of
https://github.com/python/cpython.git
synced 2024-11-24 02:15:30 +08:00
gh-112536: Add support for thread sanitizer (TSAN) (gh-112648)
This commit is contained in:
parent
f46987b828
commit
88cb972000
@ -745,6 +745,13 @@ Debug options
|
||||
|
||||
.. versionadded:: 3.6
|
||||
|
||||
.. option:: --with-thread-sanitizer
|
||||
|
||||
Enable ThreadSanitizer data race detector, ``tsan``
|
||||
(default is no).
|
||||
|
||||
.. versionadded:: 3.13
|
||||
|
||||
|
||||
Linker options
|
||||
--------------
|
||||
|
@ -563,6 +563,11 @@ extern "C" {
|
||||
# define _Py_ADDRESS_SANITIZER
|
||||
# endif
|
||||
# endif
|
||||
# if __has_feature(thread_sanitizer)
|
||||
# if !defined(_Py_THREAD_SANITIZER)
|
||||
# define _Py_THREAD_SANITIZER
|
||||
# endif
|
||||
# endif
|
||||
#elif defined(__GNUC__)
|
||||
# if defined(__SANITIZE_ADDRESS__)
|
||||
# define _Py_ADDRESS_SANITIZER
|
||||
|
@ -340,6 +340,9 @@ def get_build_info():
|
||||
# --with-undefined-behavior-sanitizer
|
||||
if support.check_sanitizer(ub=True):
|
||||
sanitizers.append("UBSAN")
|
||||
# --with-thread-sanitizer
|
||||
if support.check_sanitizer(thread=True):
|
||||
sanitizers.append("TSAN")
|
||||
if sanitizers:
|
||||
build.append('+'.join(sanitizers))
|
||||
|
||||
@ -634,6 +637,7 @@ def display_header(use_resources: tuple[str, ...],
|
||||
asan = support.check_sanitizer(address=True)
|
||||
msan = support.check_sanitizer(memory=True)
|
||||
ubsan = support.check_sanitizer(ub=True)
|
||||
tsan = support.check_sanitizer(thread=True)
|
||||
sanitizers = []
|
||||
if asan:
|
||||
sanitizers.append("address")
|
||||
@ -641,12 +645,15 @@ def display_header(use_resources: tuple[str, ...],
|
||||
sanitizers.append("memory")
|
||||
if ubsan:
|
||||
sanitizers.append("undefined behavior")
|
||||
if tsan:
|
||||
sanitizers.append("thread")
|
||||
if sanitizers:
|
||||
print(f"== sanitizers: {', '.join(sanitizers)}")
|
||||
for sanitizer, env_var in (
|
||||
(asan, "ASAN_OPTIONS"),
|
||||
(msan, "MSAN_OPTIONS"),
|
||||
(ubsan, "UBSAN_OPTIONS"),
|
||||
(tsan, "TSAN_OPTIONS"),
|
||||
):
|
||||
options= os.environ.get(env_var)
|
||||
if sanitizer and options is not None:
|
||||
|
@ -392,10 +392,10 @@ def skip_if_buildbot(reason=None):
|
||||
isbuildbot = False
|
||||
return unittest.skipIf(isbuildbot, reason)
|
||||
|
||||
def check_sanitizer(*, address=False, memory=False, ub=False):
|
||||
def check_sanitizer(*, address=False, memory=False, ub=False, thread=False):
|
||||
"""Returns True if Python is compiled with sanitizer support"""
|
||||
if not (address or memory or ub):
|
||||
raise ValueError('At least one of address, memory, or ub must be True')
|
||||
if not (address or memory or ub or thread):
|
||||
raise ValueError('At least one of address, memory, ub or thread must be True')
|
||||
|
||||
|
||||
cflags = sysconfig.get_config_var('CFLAGS') or ''
|
||||
@ -412,18 +412,23 @@ def check_sanitizer(*, address=False, memory=False, ub=False):
|
||||
'-fsanitize=undefined' in cflags or
|
||||
'--with-undefined-behavior-sanitizer' in config_args
|
||||
)
|
||||
thread_sanitizer = (
|
||||
'-fsanitize=thread' in cflags or
|
||||
'--with-thread-sanitizer' in config_args
|
||||
)
|
||||
return (
|
||||
(memory and memory_sanitizer) or
|
||||
(address and address_sanitizer) or
|
||||
(ub and ub_sanitizer)
|
||||
(ub and ub_sanitizer) or
|
||||
(thread and thread_sanitizer)
|
||||
)
|
||||
|
||||
|
||||
def skip_if_sanitizer(reason=None, *, address=False, memory=False, ub=False):
|
||||
def skip_if_sanitizer(reason=None, *, address=False, memory=False, ub=False, thread=False):
|
||||
"""Decorator raising SkipTest if running with a sanitizer active."""
|
||||
if not reason:
|
||||
reason = 'not working with sanitizers active'
|
||||
skip = check_sanitizer(address=address, memory=memory, ub=ub)
|
||||
skip = check_sanitizer(address=address, memory=memory, ub=ub, thread=thread)
|
||||
return unittest.skipIf(skip, reason)
|
||||
|
||||
# gh-89363: True if fork() can hang if Python is built with Address Sanitizer
|
||||
@ -432,7 +437,7 @@ HAVE_ASAN_FORK_BUG = check_sanitizer(address=True)
|
||||
|
||||
|
||||
def set_sanitizer_env_var(env, option):
|
||||
for name in ('ASAN_OPTIONS', 'MSAN_OPTIONS', 'UBSAN_OPTIONS'):
|
||||
for name in ('ASAN_OPTIONS', 'MSAN_OPTIONS', 'UBSAN_OPTIONS', 'TSAN_OPTIONS'):
|
||||
if name in env:
|
||||
env[name] += f':{option}'
|
||||
else:
|
||||
|
@ -1654,7 +1654,8 @@ class BufferedReaderTest(unittest.TestCase, CommonBufferedTests):
|
||||
class CBufferedReaderTest(BufferedReaderTest, SizeofTest):
|
||||
tp = io.BufferedReader
|
||||
|
||||
@skip_if_sanitizer(memory=True, address=True, reason= "sanitizer defaults to crashing "
|
||||
@skip_if_sanitizer(memory=True, address=True, thread=True,
|
||||
reason="sanitizer defaults to crashing "
|
||||
"instead of returning NULL for malloc failure.")
|
||||
def test_constructor(self):
|
||||
BufferedReaderTest.test_constructor(self)
|
||||
@ -2021,7 +2022,8 @@ class BufferedWriterTest(unittest.TestCase, CommonBufferedTests):
|
||||
class CBufferedWriterTest(BufferedWriterTest, SizeofTest):
|
||||
tp = io.BufferedWriter
|
||||
|
||||
@skip_if_sanitizer(memory=True, address=True, reason= "sanitizer defaults to crashing "
|
||||
@skip_if_sanitizer(memory=True, address=True, thread=True,
|
||||
reason="sanitizer defaults to crashing "
|
||||
"instead of returning NULL for malloc failure.")
|
||||
def test_constructor(self):
|
||||
BufferedWriterTest.test_constructor(self)
|
||||
@ -2520,7 +2522,8 @@ class BufferedRandomTest(BufferedReaderTest, BufferedWriterTest):
|
||||
class CBufferedRandomTest(BufferedRandomTest, SizeofTest):
|
||||
tp = io.BufferedRandom
|
||||
|
||||
@skip_if_sanitizer(memory=True, address=True, reason= "sanitizer defaults to crashing "
|
||||
@skip_if_sanitizer(memory=True, address=True, thread=True,
|
||||
reason="sanitizer defaults to crashing "
|
||||
"instead of returning NULL for malloc failure.")
|
||||
def test_constructor(self):
|
||||
BufferedRandomTest.test_constructor(self)
|
||||
|
@ -0,0 +1 @@
|
||||
Add support for thread sanitizer (TSAN)
|
25
configure
generated
vendored
25
configure
generated
vendored
@ -1082,6 +1082,7 @@ with_dsymutil
|
||||
with_address_sanitizer
|
||||
with_memory_sanitizer
|
||||
with_undefined_behavior_sanitizer
|
||||
with_thread_sanitizer
|
||||
with_hash_algorithm
|
||||
with_tzpath
|
||||
with_libs
|
||||
@ -1860,6 +1861,8 @@ Optional Packages:
|
||||
--with-undefined-behavior-sanitizer
|
||||
enable UndefinedBehaviorSanitizer undefined
|
||||
behaviour detector, 'ubsan' (default is no)
|
||||
--with-thread-sanitizer enable ThreadSanitizer data race detector, 'tsan'
|
||||
(default is no)
|
||||
--with-hash-algorithm=[fnv|siphash13|siphash24]
|
||||
select hash algorithm for use in Python/pyhash.c
|
||||
(default is SipHash13)
|
||||
@ -12506,6 +12509,28 @@ with_ubsan="no"
|
||||
fi
|
||||
|
||||
|
||||
{ printf "%s\n" "$as_me:${as_lineno-$LINENO}: checking for --with-thread-sanitizer" >&5
|
||||
printf %s "checking for --with-thread-sanitizer... " >&6; }
|
||||
|
||||
# Check whether --with-thread_sanitizer was given.
|
||||
if test ${with_thread_sanitizer+y}
|
||||
then :
|
||||
withval=$with_thread_sanitizer;
|
||||
{ printf "%s\n" "$as_me:${as_lineno-$LINENO}: result: $withval" >&5
|
||||
printf "%s\n" "$withval" >&6; }
|
||||
BASECFLAGS="-fsanitize=thread $BASECFLAGS"
|
||||
LDFLAGS="-fsanitize=thread $LDFLAGS"
|
||||
with_tsan="yes"
|
||||
|
||||
else $as_nop
|
||||
|
||||
{ printf "%s\n" "$as_me:${as_lineno-$LINENO}: result: no" >&5
|
||||
printf "%s\n" "no" >&6; }
|
||||
with_tsan="no"
|
||||
|
||||
fi
|
||||
|
||||
|
||||
# Set info about shared libraries.
|
||||
|
||||
|
||||
|
18
configure.ac
18
configure.ac
@ -3067,6 +3067,24 @@ AC_MSG_RESULT([no])
|
||||
with_ubsan="no"
|
||||
])
|
||||
|
||||
AC_MSG_CHECKING([for --with-thread-sanitizer])
|
||||
AC_ARG_WITH(
|
||||
[thread_sanitizer],
|
||||
[AS_HELP_STRING(
|
||||
[--with-thread-sanitizer],
|
||||
[enable ThreadSanitizer data race detector, 'tsan' (default is no)]
|
||||
)],
|
||||
[
|
||||
AC_MSG_RESULT([$withval])
|
||||
BASECFLAGS="-fsanitize=thread $BASECFLAGS"
|
||||
LDFLAGS="-fsanitize=thread $LDFLAGS"
|
||||
with_tsan="yes"
|
||||
],
|
||||
[
|
||||
AC_MSG_RESULT([no])
|
||||
with_tsan="no"
|
||||
])
|
||||
|
||||
# Set info about shared libraries.
|
||||
AC_SUBST([SHLIB_SUFFIX])
|
||||
AC_SUBST([LDSHARED])
|
||||
|
Loading…
Reference in New Issue
Block a user