1 /* Copyright (c) 2008-2009, Google Inc. 2 * All rights reserved. 3 * 4 * Redistribution and use in source and binary forms, with or without 5 * modification, are permitted provided that the following conditions are 6 * met: 7 * 8 * * Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * * Neither the name of Google Inc. nor the names of its 11 * contributors may be used to endorse or promote products derived from 12 * this software without specific prior written permission. 13 * 14 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 15 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 16 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR 17 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT 18 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 19 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT 20 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 21 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 22 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 23 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE 24 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 25 * 26 * --- 27 * Author: Kostya Serebryany 28 * Copied to CPython by Jeffrey Yasskin, with all macros renamed to 29 * start with _Py_ to avoid colliding with users embedding Python, and 30 * with deprecated macros removed. 31 */ 32 33 /* This file defines dynamic annotations for use with dynamic analysis 34 tool such as valgrind, PIN, etc. 35 36 Dynamic annotation is a source code annotation that affects 37 the generated code (that is, the annotation is not a comment). 38 Each such annotation is attached to a particular 39 instruction and/or to a particular object (address) in the program. 40 41 The annotations that should be used by users are macros in all upper-case 42 (e.g., _Py_ANNOTATE_NEW_MEMORY). 43 44 Actual implementation of these macros may differ depending on the 45 dynamic analysis tool being used. 46 47 See http://code.google.com/p/data-race-test/ for more information. 48 49 This file supports the following dynamic analysis tools: 50 - None (DYNAMIC_ANNOTATIONS_ENABLED is not defined or zero). 51 Macros are defined empty. 52 - ThreadSanitizer, Helgrind, DRD (DYNAMIC_ANNOTATIONS_ENABLED is 1). 53 Macros are defined as calls to non-inlinable empty functions 54 that are intercepted by Valgrind. */ 55 56 #ifndef __DYNAMIC_ANNOTATIONS_H__ 57 #define __DYNAMIC_ANNOTATIONS_H__ 58 59 #ifndef DYNAMIC_ANNOTATIONS_ENABLED 60 # define DYNAMIC_ANNOTATIONS_ENABLED 0 61 #endif 62 63 #if DYNAMIC_ANNOTATIONS_ENABLED != 0 64 65 /* ------------------------------------------------------------- 66 Annotations useful when implementing condition variables such as CondVar, 67 using conditional critical sections (Await/LockWhen) and when constructing 68 user-defined synchronization mechanisms. 69 70 The annotations _Py_ANNOTATE_HAPPENS_BEFORE() and 71 _Py_ANNOTATE_HAPPENS_AFTER() can be used to define happens-before arcs in 72 user-defined synchronization mechanisms: the race detector will infer an 73 arc from the former to the latter when they share the same argument 74 pointer. 75 76 Example 1 (reference counting): 77 78 void Unref() { 79 _Py_ANNOTATE_HAPPENS_BEFORE(&refcount_); 80 if (AtomicDecrementByOne(&refcount_) == 0) { 81 _Py_ANNOTATE_HAPPENS_AFTER(&refcount_); 82 delete this; 83 } 84 } 85 86 Example 2 (message queue): 87 88 void MyQueue::Put(Type *e) { 89 MutexLock lock(&mu_); 90 _Py_ANNOTATE_HAPPENS_BEFORE(e); 91 PutElementIntoMyQueue(e); 92 } 93 94 Type *MyQueue::Get() { 95 MutexLock lock(&mu_); 96 Type *e = GetElementFromMyQueue(); 97 _Py_ANNOTATE_HAPPENS_AFTER(e); 98 return e; 99 } 100 101 Note: when possible, please use the existing reference counting and message 102 queue implementations instead of inventing new ones. */ 103 104 /* Report that wait on the condition variable at address "cv" has succeeded 105 and the lock at address "lock" is held. */ 106 #define _Py_ANNOTATE_CONDVAR_LOCK_WAIT(cv, lock) \ 107 AnnotateCondVarWait(__FILE__, __LINE__, cv, lock) 108 109 /* Report that wait on the condition variable at "cv" has succeeded. Variant 110 w/o lock. */ 111 #define _Py_ANNOTATE_CONDVAR_WAIT(cv) \ 112 AnnotateCondVarWait(__FILE__, __LINE__, cv, NULL) 113 114 /* Report that we are about to signal on the condition variable at address 115 "cv". */ 116 #define _Py_ANNOTATE_CONDVAR_SIGNAL(cv) \ 117 AnnotateCondVarSignal(__FILE__, __LINE__, cv) 118 119 /* Report that we are about to signal_all on the condition variable at "cv". */ 120 #define _Py_ANNOTATE_CONDVAR_SIGNAL_ALL(cv) \ 121 AnnotateCondVarSignalAll(__FILE__, __LINE__, cv) 122 123 /* Annotations for user-defined synchronization mechanisms. */ 124 #define _Py_ANNOTATE_HAPPENS_BEFORE(obj) _Py_ANNOTATE_CONDVAR_SIGNAL(obj) 125 #define _Py_ANNOTATE_HAPPENS_AFTER(obj) _Py_ANNOTATE_CONDVAR_WAIT(obj) 126 127 /* Report that the bytes in the range [pointer, pointer+size) are about 128 to be published safely. The race checker will create a happens-before 129 arc from the call _Py_ANNOTATE_PUBLISH_MEMORY_RANGE(pointer, size) to 130 subsequent accesses to this memory. 131 Note: this annotation may not work properly if the race detector uses 132 sampling, i.e. does not observe all memory accesses. 133 */ 134 #define _Py_ANNOTATE_PUBLISH_MEMORY_RANGE(pointer, size) \ 135 AnnotatePublishMemoryRange(__FILE__, __LINE__, pointer, size) 136 137 /* Instruct the tool to create a happens-before arc between mu->Unlock() and 138 mu->Lock(). This annotation may slow down the race detector and hide real 139 races. Normally it is used only when it would be difficult to annotate each 140 of the mutex's critical sections individually using the annotations above. 141 This annotation makes sense only for hybrid race detectors. For pure 142 happens-before detectors this is a no-op. For more details see 143 http://code.google.com/p/data-race-test/wiki/PureHappensBeforeVsHybrid . */ 144 #define _Py_ANNOTATE_PURE_HAPPENS_BEFORE_MUTEX(mu) \ 145 AnnotateMutexIsUsedAsCondVar(__FILE__, __LINE__, mu) 146 147 /* ------------------------------------------------------------- 148 Annotations useful when defining memory allocators, or when memory that 149 was protected in one way starts to be protected in another. */ 150 151 /* Report that a new memory at "address" of size "size" has been allocated. 152 This might be used when the memory has been retrieved from a free list and 153 is about to be reused, or when the locking discipline for a variable 154 changes. */ 155 #define _Py_ANNOTATE_NEW_MEMORY(address, size) \ 156 AnnotateNewMemory(__FILE__, __LINE__, address, size) 157 158 /* ------------------------------------------------------------- 159 Annotations useful when defining FIFO queues that transfer data between 160 threads. */ 161 162 /* Report that the producer-consumer queue (such as ProducerConsumerQueue) at 163 address "pcq" has been created. The _Py_ANNOTATE_PCQ_* annotations should 164 be used only for FIFO queues. For non-FIFO queues use 165 _Py_ANNOTATE_HAPPENS_BEFORE (for put) and _Py_ANNOTATE_HAPPENS_AFTER (for 166 get). */ 167 #define _Py_ANNOTATE_PCQ_CREATE(pcq) \ 168 AnnotatePCQCreate(__FILE__, __LINE__, pcq) 169 170 /* Report that the queue at address "pcq" is about to be destroyed. */ 171 #define _Py_ANNOTATE_PCQ_DESTROY(pcq) \ 172 AnnotatePCQDestroy(__FILE__, __LINE__, pcq) 173 174 /* Report that we are about to put an element into a FIFO queue at address 175 "pcq". */ 176 #define _Py_ANNOTATE_PCQ_PUT(pcq) \ 177 AnnotatePCQPut(__FILE__, __LINE__, pcq) 178 179 /* Report that we've just got an element from a FIFO queue at address "pcq". */ 180 #define _Py_ANNOTATE_PCQ_GET(pcq) \ 181 AnnotatePCQGet(__FILE__, __LINE__, pcq) 182 183 /* ------------------------------------------------------------- 184 Annotations that suppress errors. It is usually better to express the 185 program's synchronization using the other annotations, but these can 186 be used when all else fails. */ 187 188 /* Report that we may have a benign race at "pointer", with size 189 "sizeof(*(pointer))". "pointer" must be a non-void* pointer. Insert at the 190 point where "pointer" has been allocated, preferably close to the point 191 where the race happens. See also _Py_ANNOTATE_BENIGN_RACE_STATIC. */ 192 #define _Py_ANNOTATE_BENIGN_RACE(pointer, description) \ 193 AnnotateBenignRaceSized(__FILE__, __LINE__, pointer, \ 194 sizeof(*(pointer)), description) 195 196 /* Same as _Py_ANNOTATE_BENIGN_RACE(address, description), but applies to 197 the memory range [address, address+size). */ 198 #define _Py_ANNOTATE_BENIGN_RACE_SIZED(address, size, description) \ 199 AnnotateBenignRaceSized(__FILE__, __LINE__, address, size, description) 200 201 /* Request the analysis tool to ignore all reads in the current thread 202 until _Py_ANNOTATE_IGNORE_READS_END is called. 203 Useful to ignore intentional racey reads, while still checking 204 other reads and all writes. 205 See also _Py_ANNOTATE_UNPROTECTED_READ. */ 206 #define _Py_ANNOTATE_IGNORE_READS_BEGIN() \ 207 AnnotateIgnoreReadsBegin(__FILE__, __LINE__) 208 209 /* Stop ignoring reads. */ 210 #define _Py_ANNOTATE_IGNORE_READS_END() \ 211 AnnotateIgnoreReadsEnd(__FILE__, __LINE__) 212 213 /* Similar to _Py_ANNOTATE_IGNORE_READS_BEGIN, but ignore writes. */ 214 #define _Py_ANNOTATE_IGNORE_WRITES_BEGIN() \ 215 AnnotateIgnoreWritesBegin(__FILE__, __LINE__) 216 217 /* Stop ignoring writes. */ 218 #define _Py_ANNOTATE_IGNORE_WRITES_END() \ 219 AnnotateIgnoreWritesEnd(__FILE__, __LINE__) 220 221 /* Start ignoring all memory accesses (reads and writes). */ 222 #define _Py_ANNOTATE_IGNORE_READS_AND_WRITES_BEGIN() \ 223 do {\ 224 _Py_ANNOTATE_IGNORE_READS_BEGIN();\ 225 _Py_ANNOTATE_IGNORE_WRITES_BEGIN();\ 226 }while(0)\ 227 228 /* Stop ignoring all memory accesses. */ 229 #define _Py_ANNOTATE_IGNORE_READS_AND_WRITES_END() \ 230 do {\ 231 _Py_ANNOTATE_IGNORE_WRITES_END();\ 232 _Py_ANNOTATE_IGNORE_READS_END();\ 233 }while(0)\ 234 235 /* Similar to _Py_ANNOTATE_IGNORE_READS_BEGIN, but ignore synchronization events: 236 RWLOCK* and CONDVAR*. */ 237 #define _Py_ANNOTATE_IGNORE_SYNC_BEGIN() \ 238 AnnotateIgnoreSyncBegin(__FILE__, __LINE__) 239 240 /* Stop ignoring sync events. */ 241 #define _Py_ANNOTATE_IGNORE_SYNC_END() \ 242 AnnotateIgnoreSyncEnd(__FILE__, __LINE__) 243 244 245 /* Enable (enable!=0) or disable (enable==0) race detection for all threads. 246 This annotation could be useful if you want to skip expensive race analysis 247 during some period of program execution, e.g. during initialization. */ 248 #define _Py_ANNOTATE_ENABLE_RACE_DETECTION(enable) \ 249 AnnotateEnableRaceDetection(__FILE__, __LINE__, enable) 250 251 /* ------------------------------------------------------------- 252 Annotations useful for debugging. */ 253 254 /* Request to trace every access to "address". */ 255 #define _Py_ANNOTATE_TRACE_MEMORY(address) \ 256 AnnotateTraceMemory(__FILE__, __LINE__, address) 257 258 /* Report the current thread name to a race detector. */ 259 #define _Py_ANNOTATE_THREAD_NAME(name) \ 260 AnnotateThreadName(__FILE__, __LINE__, name) 261 262 /* ------------------------------------------------------------- 263 Annotations useful when implementing locks. They are not 264 normally needed by modules that merely use locks. 265 The "lock" argument is a pointer to the lock object. */ 266 267 /* Report that a lock has been created at address "lock". */ 268 #define _Py_ANNOTATE_RWLOCK_CREATE(lock) \ 269 AnnotateRWLockCreate(__FILE__, __LINE__, lock) 270 271 /* Report that the lock at address "lock" is about to be destroyed. */ 272 #define _Py_ANNOTATE_RWLOCK_DESTROY(lock) \ 273 AnnotateRWLockDestroy(__FILE__, __LINE__, lock) 274 275 /* Report that the lock at address "lock" has been acquired. 276 is_w=1 for writer lock, is_w=0 for reader lock. */ 277 #define _Py_ANNOTATE_RWLOCK_ACQUIRED(lock, is_w) \ 278 AnnotateRWLockAcquired(__FILE__, __LINE__, lock, is_w) 279 280 /* Report that the lock at address "lock" is about to be released. */ 281 #define _Py_ANNOTATE_RWLOCK_RELEASED(lock, is_w) \ 282 AnnotateRWLockReleased(__FILE__, __LINE__, lock, is_w) 283 284 /* ------------------------------------------------------------- 285 Annotations useful when implementing barriers. They are not 286 normally needed by modules that merely use barriers. 287 The "barrier" argument is a pointer to the barrier object. */ 288 289 /* Report that the "barrier" has been initialized with initial "count". 290 If 'reinitialization_allowed' is true, initialization is allowed to happen 291 multiple times w/o calling barrier_destroy() */ 292 #define _Py_ANNOTATE_BARRIER_INIT(barrier, count, reinitialization_allowed) \ 293 AnnotateBarrierInit(__FILE__, __LINE__, barrier, count, \ 294 reinitialization_allowed) 295 296 /* Report that we are about to enter barrier_wait("barrier"). */ 297 #define _Py_ANNOTATE_BARRIER_WAIT_BEFORE(barrier) \ 298 AnnotateBarrierWaitBefore(__FILE__, __LINE__, barrier) 299 300 /* Report that we just exited barrier_wait("barrier"). */ 301 #define _Py_ANNOTATE_BARRIER_WAIT_AFTER(barrier) \ 302 AnnotateBarrierWaitAfter(__FILE__, __LINE__, barrier) 303 304 /* Report that the "barrier" has been destroyed. */ 305 #define _Py_ANNOTATE_BARRIER_DESTROY(barrier) \ 306 AnnotateBarrierDestroy(__FILE__, __LINE__, barrier) 307 308 /* ------------------------------------------------------------- 309 Annotations useful for testing race detectors. */ 310 311 /* Report that we expect a race on the variable at "address". 312 Use only in unit tests for a race detector. */ 313 #define _Py_ANNOTATE_EXPECT_RACE(address, description) \ 314 AnnotateExpectRace(__FILE__, __LINE__, address, description) 315 316 /* A no-op. Insert where you like to test the interceptors. */ 317 #define _Py_ANNOTATE_NO_OP(arg) \ 318 AnnotateNoOp(__FILE__, __LINE__, arg) 319 320 /* Force the race detector to flush its state. The actual effect depends on 321 * the implementation of the detector. */ 322 #define _Py_ANNOTATE_FLUSH_STATE() \ 323 AnnotateFlushState(__FILE__, __LINE__) 324 325 326 #else /* DYNAMIC_ANNOTATIONS_ENABLED == 0 */ 327 328 #define _Py_ANNOTATE_RWLOCK_CREATE(lock) /* empty */ 329 #define _Py_ANNOTATE_RWLOCK_DESTROY(lock) /* empty */ 330 #define _Py_ANNOTATE_RWLOCK_ACQUIRED(lock, is_w) /* empty */ 331 #define _Py_ANNOTATE_RWLOCK_RELEASED(lock, is_w) /* empty */ 332 #define _Py_ANNOTATE_BARRIER_INIT(barrier, count, reinitialization_allowed) /* */ 333 #define _Py_ANNOTATE_BARRIER_WAIT_BEFORE(barrier) /* empty */ 334 #define _Py_ANNOTATE_BARRIER_WAIT_AFTER(barrier) /* empty */ 335 #define _Py_ANNOTATE_BARRIER_DESTROY(barrier) /* empty */ 336 #define _Py_ANNOTATE_CONDVAR_LOCK_WAIT(cv, lock) /* empty */ 337 #define _Py_ANNOTATE_CONDVAR_WAIT(cv) /* empty */ 338 #define _Py_ANNOTATE_CONDVAR_SIGNAL(cv) /* empty */ 339 #define _Py_ANNOTATE_CONDVAR_SIGNAL_ALL(cv) /* empty */ 340 #define _Py_ANNOTATE_HAPPENS_BEFORE(obj) /* empty */ 341 #define _Py_ANNOTATE_HAPPENS_AFTER(obj) /* empty */ 342 #define _Py_ANNOTATE_PUBLISH_MEMORY_RANGE(address, size) /* empty */ 343 #define _Py_ANNOTATE_UNPUBLISH_MEMORY_RANGE(address, size) /* empty */ 344 #define _Py_ANNOTATE_SWAP_MEMORY_RANGE(address, size) /* empty */ 345 #define _Py_ANNOTATE_PCQ_CREATE(pcq) /* empty */ 346 #define _Py_ANNOTATE_PCQ_DESTROY(pcq) /* empty */ 347 #define _Py_ANNOTATE_PCQ_PUT(pcq) /* empty */ 348 #define _Py_ANNOTATE_PCQ_GET(pcq) /* empty */ 349 #define _Py_ANNOTATE_NEW_MEMORY(address, size) /* empty */ 350 #define _Py_ANNOTATE_EXPECT_RACE(address, description) /* empty */ 351 #define _Py_ANNOTATE_BENIGN_RACE(address, description) /* empty */ 352 #define _Py_ANNOTATE_BENIGN_RACE_SIZED(address, size, description) /* empty */ 353 #define _Py_ANNOTATE_PURE_HAPPENS_BEFORE_MUTEX(mu) /* empty */ 354 #define _Py_ANNOTATE_MUTEX_IS_USED_AS_CONDVAR(mu) /* empty */ 355 #define _Py_ANNOTATE_TRACE_MEMORY(arg) /* empty */ 356 #define _Py_ANNOTATE_THREAD_NAME(name) /* empty */ 357 #define _Py_ANNOTATE_IGNORE_READS_BEGIN() /* empty */ 358 #define _Py_ANNOTATE_IGNORE_READS_END() /* empty */ 359 #define _Py_ANNOTATE_IGNORE_WRITES_BEGIN() /* empty */ 360 #define _Py_ANNOTATE_IGNORE_WRITES_END() /* empty */ 361 #define _Py_ANNOTATE_IGNORE_READS_AND_WRITES_BEGIN() /* empty */ 362 #define _Py_ANNOTATE_IGNORE_READS_AND_WRITES_END() /* empty */ 363 #define _Py_ANNOTATE_IGNORE_SYNC_BEGIN() /* empty */ 364 #define _Py_ANNOTATE_IGNORE_SYNC_END() /* empty */ 365 #define _Py_ANNOTATE_ENABLE_RACE_DETECTION(enable) /* empty */ 366 #define _Py_ANNOTATE_NO_OP(arg) /* empty */ 367 #define _Py_ANNOTATE_FLUSH_STATE() /* empty */ 368 369 #endif /* DYNAMIC_ANNOTATIONS_ENABLED */ 370 371 /* Use the macros above rather than using these functions directly. */ 372 #ifdef __cplusplus 373 extern "C" { 374 #endif 375 void AnnotateRWLockCreate(const char *file, int line, 376 const volatile void *lock); 377 void AnnotateRWLockDestroy(const char *file, int line, 378 const volatile void *lock); 379 void AnnotateRWLockAcquired(const char *file, int line, 380 const volatile void *lock, long is_w); 381 void AnnotateRWLockReleased(const char *file, int line, 382 const volatile void *lock, long is_w); 383 void AnnotateBarrierInit(const char *file, int line, 384 const volatile void *barrier, long count, 385 long reinitialization_allowed); 386 void AnnotateBarrierWaitBefore(const char *file, int line, 387 const volatile void *barrier); 388 void AnnotateBarrierWaitAfter(const char *file, int line, 389 const volatile void *barrier); 390 void AnnotateBarrierDestroy(const char *file, int line, 391 const volatile void *barrier); 392 void AnnotateCondVarWait(const char *file, int line, 393 const volatile void *cv, 394 const volatile void *lock); 395 void AnnotateCondVarSignal(const char *file, int line, 396 const volatile void *cv); 397 void AnnotateCondVarSignalAll(const char *file, int line, 398 const volatile void *cv); 399 void AnnotatePublishMemoryRange(const char *file, int line, 400 const volatile void *address, 401 long size); 402 void AnnotateUnpublishMemoryRange(const char *file, int line, 403 const volatile void *address, 404 long size); 405 void AnnotatePCQCreate(const char *file, int line, 406 const volatile void *pcq); 407 void AnnotatePCQDestroy(const char *file, int line, 408 const volatile void *pcq); 409 void AnnotatePCQPut(const char *file, int line, 410 const volatile void *pcq); 411 void AnnotatePCQGet(const char *file, int line, 412 const volatile void *pcq); 413 void AnnotateNewMemory(const char *file, int line, 414 const volatile void *address, 415 long size); 416 void AnnotateExpectRace(const char *file, int line, 417 const volatile void *address, 418 const char *description); 419 void AnnotateBenignRace(const char *file, int line, 420 const volatile void *address, 421 const char *description); 422 void AnnotateBenignRaceSized(const char *file, int line, 423 const volatile void *address, 424 long size, 425 const char *description); 426 void AnnotateMutexIsUsedAsCondVar(const char *file, int line, 427 const volatile void *mu); 428 void AnnotateTraceMemory(const char *file, int line, 429 const volatile void *arg); 430 void AnnotateThreadName(const char *file, int line, 431 const char *name); 432 void AnnotateIgnoreReadsBegin(const char *file, int line); 433 void AnnotateIgnoreReadsEnd(const char *file, int line); 434 void AnnotateIgnoreWritesBegin(const char *file, int line); 435 void AnnotateIgnoreWritesEnd(const char *file, int line); 436 void AnnotateEnableRaceDetection(const char *file, int line, int enable); 437 void AnnotateNoOp(const char *file, int line, 438 const volatile void *arg); 439 void AnnotateFlushState(const char *file, int line); 440 441 /* Return non-zero value if running under valgrind. 442 443 If "valgrind.h" is included into dynamic_annotations.c, 444 the regular valgrind mechanism will be used. 445 See http://valgrind.org/docs/manual/manual-core-adv.html about 446 RUNNING_ON_VALGRIND and other valgrind "client requests". 447 The file "valgrind.h" may be obtained by doing 448 svn co svn://svn.valgrind.org/valgrind/trunk/include 449 450 If for some reason you can't use "valgrind.h" or want to fake valgrind, 451 there are two ways to make this function return non-zero: 452 - Use environment variable: export RUNNING_ON_VALGRIND=1 453 - Make your tool intercept the function RunningOnValgrind() and 454 change its return value. 455 */ 456 int RunningOnValgrind(void); 457 458 #ifdef __cplusplus 459 } 460 #endif 461 462 #if DYNAMIC_ANNOTATIONS_ENABLED != 0 && defined(__cplusplus) 463 464 /* _Py_ANNOTATE_UNPROTECTED_READ is the preferred way to annotate racey reads. 465 466 Instead of doing 467 _Py_ANNOTATE_IGNORE_READS_BEGIN(); 468 ... = x; 469 _Py_ANNOTATE_IGNORE_READS_END(); 470 one can use 471 ... = _Py_ANNOTATE_UNPROTECTED_READ(x); */ 472 template <class T> 473 inline T _Py_ANNOTATE_UNPROTECTED_READ(const volatile T &x) { 474 _Py_ANNOTATE_IGNORE_READS_BEGIN(); 475 T res = x; 476 _Py_ANNOTATE_IGNORE_READS_END(); 477 return res; 478 } 479 /* Apply _Py_ANNOTATE_BENIGN_RACE_SIZED to a static variable. */ 480 #define _Py_ANNOTATE_BENIGN_RACE_STATIC(static_var, description) \ 481 namespace { \ 482 class static_var ## _annotator { \ 483 public: \ 484 static_var ## _annotator() { \ 485 _Py_ANNOTATE_BENIGN_RACE_SIZED(&static_var, \ 486 sizeof(static_var), \ 487 # static_var ": " description); \ 488 } \ 489 }; \ 490 static static_var ## _annotator the ## static_var ## _annotator;\ 491 } 492 #else /* DYNAMIC_ANNOTATIONS_ENABLED == 0 */ 493 494 #define _Py_ANNOTATE_UNPROTECTED_READ(x) (x) 495 #define _Py_ANNOTATE_BENIGN_RACE_STATIC(static_var, description) /* empty */ 496 497 #endif /* DYNAMIC_ANNOTATIONS_ENABLED */ 498 499 #endif /* __DYNAMIC_ANNOTATIONS_H__ */ 500