Home | History | Annotate | Download | only in rtl
      1 //===-- tsan_rtl_report.cc ------------------------------------------------===//
      2 //
      3 //                     The LLVM Compiler Infrastructure
      4 //
      5 // This file is distributed under the University of Illinois Open Source
      6 // License. See LICENSE.TXT for details.
      7 //
      8 //===----------------------------------------------------------------------===//
      9 //
     10 // This file is a part of ThreadSanitizer (TSan), a race detector.
     11 //
     12 //===----------------------------------------------------------------------===//
     13 
     14 #include "sanitizer_common/sanitizer_libc.h"
     15 #include "sanitizer_common/sanitizer_placement_new.h"
     16 #include "sanitizer_common/sanitizer_stackdepot.h"
     17 #include "sanitizer_common/sanitizer_common.h"
     18 #include "sanitizer_common/sanitizer_stacktrace.h"
     19 #include "tsan_platform.h"
     20 #include "tsan_rtl.h"
     21 #include "tsan_suppressions.h"
     22 #include "tsan_symbolize.h"
     23 #include "tsan_report.h"
     24 #include "tsan_sync.h"
     25 #include "tsan_mman.h"
     26 #include "tsan_flags.h"
     27 #include "tsan_fd.h"
     28 
     29 namespace __tsan {
     30 
     31 using namespace __sanitizer;  // NOLINT
     32 
     33 static ReportStack *SymbolizeStack(const StackTrace& trace);
     34 
     35 void TsanCheckFailed(const char *file, int line, const char *cond,
     36                      u64 v1, u64 v2) {
     37   // There is high probability that interceptors will check-fail as well,
     38   // on the other hand there is no sense in processing interceptors
     39   // since we are going to die soon.
     40   ScopedIgnoreInterceptors ignore;
     41   Printf("FATAL: ThreadSanitizer CHECK failed: "
     42          "%s:%d \"%s\" (0x%zx, 0x%zx)\n",
     43          file, line, cond, (uptr)v1, (uptr)v2);
     44   PrintCurrentStackSlow();
     45   Die();
     46 }
     47 
     48 // Can be overriden by an application/test to intercept reports.
     49 #ifdef TSAN_EXTERNAL_HOOKS
     50 bool OnReport(const ReportDesc *rep, bool suppressed);
     51 #else
     52 SANITIZER_INTERFACE_ATTRIBUTE
     53 bool WEAK OnReport(const ReportDesc *rep, bool suppressed) {
     54   (void)rep;
     55   return suppressed;
     56 }
     57 #endif
     58 
     59 static void StackStripMain(ReportStack *stack) {
     60   ReportStack *last_frame = 0;
     61   ReportStack *last_frame2 = 0;
     62   const char *prefix = "__interceptor_";
     63   uptr prefix_len = internal_strlen(prefix);
     64   const char *path_prefix = flags()->strip_path_prefix;
     65   uptr path_prefix_len = internal_strlen(path_prefix);
     66   char *pos;
     67   for (ReportStack *ent = stack; ent; ent = ent->next) {
     68     if (ent->func && 0 == internal_strncmp(ent->func, prefix, prefix_len))
     69       ent->func += prefix_len;
     70     if (ent->file && (pos = internal_strstr(ent->file, path_prefix)))
     71       ent->file = pos + path_prefix_len;
     72     if (ent->file && ent->file[0] == '.' && ent->file[1] == '/')
     73       ent->file += 2;
     74     last_frame2 = last_frame;
     75     last_frame = ent;
     76   }
     77 
     78   if (last_frame2 == 0)
     79     return;
     80   const char *last = last_frame->func;
     81 #ifndef TSAN_GO
     82   const char *last2 = last_frame2->func;
     83   // Strip frame above 'main'
     84   if (last2 && 0 == internal_strcmp(last2, "main")) {
     85     last_frame2->next = 0;
     86   // Strip our internal thread start routine.
     87   } else if (last && 0 == internal_strcmp(last, "__tsan_thread_start_func")) {
     88     last_frame2->next = 0;
     89   // Strip global ctors init.
     90   } else if (last && 0 == internal_strcmp(last, "__do_global_ctors_aux")) {
     91     last_frame2->next = 0;
     92   // If both are 0, then we probably just failed to symbolize.
     93   } else if (last || last2) {
     94     // Ensure that we recovered stack completely. Trimmed stack
     95     // can actually happen if we do not instrument some code,
     96     // so it's only a debug print. However we must try hard to not miss it
     97     // due to our fault.
     98     DPrintf("Bottom stack frame of stack %zx is missed\n", stack->pc);
     99   }
    100 #else
    101   // The last frame always point into runtime (gosched0, goexit0, runtime.main).
    102   last_frame2->next = 0;
    103   (void)last;
    104 #endif
    105 }
    106 
    107 ReportStack *SymbolizeStackId(u32 stack_id) {
    108   if (stack_id == 0)
    109     return 0;
    110   uptr ssz = 0;
    111   const uptr *stack = StackDepotGet(stack_id, &ssz);
    112   if (stack == 0)
    113     return 0;
    114   StackTrace trace;
    115   trace.Init(stack, ssz);
    116   return SymbolizeStack(trace);
    117 }
    118 
    119 static ReportStack *SymbolizeStack(const StackTrace& trace) {
    120   if (trace.IsEmpty())
    121     return 0;
    122   ReportStack *stack = 0;
    123   for (uptr si = 0; si < trace.Size(); si++) {
    124     const uptr pc = trace.Get(si);
    125 #ifndef TSAN_GO
    126     // We obtain the return address, that is, address of the next instruction,
    127     // so offset it by 1 byte.
    128     const uptr pc1 = __sanitizer::StackTrace::GetPreviousInstructionPc(pc);
    129 #else
    130     // FIXME(dvyukov): Go sometimes uses address of a function as top pc.
    131     uptr pc1 = pc;
    132     if (si != trace.Size() - 1)
    133       pc1 -= 1;
    134 #endif
    135     ReportStack *ent = SymbolizeCode(pc1);
    136     CHECK_NE(ent, 0);
    137     ReportStack *last = ent;
    138     while (last->next) {
    139       last->pc = pc;  // restore original pc for report
    140       last = last->next;
    141     }
    142     last->pc = pc;  // restore original pc for report
    143     last->next = stack;
    144     stack = ent;
    145   }
    146   StackStripMain(stack);
    147   return stack;
    148 }
    149 
    150 ScopedReport::ScopedReport(ReportType typ) {
    151   ctx->thread_registry->CheckLocked();
    152   void *mem = internal_alloc(MBlockReport, sizeof(ReportDesc));
    153   rep_ = new(mem) ReportDesc;
    154   rep_->typ = typ;
    155   ctx->report_mtx.Lock();
    156   CommonSanitizerReportMutex.Lock();
    157 }
    158 
    159 ScopedReport::~ScopedReport() {
    160   CommonSanitizerReportMutex.Unlock();
    161   ctx->report_mtx.Unlock();
    162   DestroyAndFree(rep_);
    163 }
    164 
    165 void ScopedReport::AddStack(const StackTrace *stack, bool suppressable) {
    166   ReportStack **rs = rep_->stacks.PushBack();
    167   *rs = SymbolizeStack(*stack);
    168   (*rs)->suppressable = suppressable;
    169 }
    170 
    171 void ScopedReport::AddMemoryAccess(uptr addr, Shadow s,
    172     const StackTrace *stack, const MutexSet *mset) {
    173   void *mem = internal_alloc(MBlockReportMop, sizeof(ReportMop));
    174   ReportMop *mop = new(mem) ReportMop;
    175   rep_->mops.PushBack(mop);
    176   mop->tid = s.tid();
    177   mop->addr = addr + s.addr0();
    178   mop->size = s.size();
    179   mop->write = s.IsWrite();
    180   mop->atomic = s.IsAtomic();
    181   mop->stack = SymbolizeStack(*stack);
    182   if (mop->stack)
    183     mop->stack->suppressable = true;
    184   for (uptr i = 0; i < mset->Size(); i++) {
    185     MutexSet::Desc d = mset->Get(i);
    186     u64 mid = this->AddMutex(d.id);
    187     ReportMopMutex mtx = {mid, d.write};
    188     mop->mset.PushBack(mtx);
    189   }
    190 }
    191 
    192 void ScopedReport::AddUniqueTid(int unique_tid) {
    193   rep_->unique_tids.PushBack(unique_tid);
    194 }
    195 
    196 void ScopedReport::AddThread(const ThreadContext *tctx, bool suppressable) {
    197   for (uptr i = 0; i < rep_->threads.Size(); i++) {
    198     if ((u32)rep_->threads[i]->id == tctx->tid)
    199       return;
    200   }
    201   void *mem = internal_alloc(MBlockReportThread, sizeof(ReportThread));
    202   ReportThread *rt = new(mem) ReportThread();
    203   rep_->threads.PushBack(rt);
    204   rt->id = tctx->tid;
    205   rt->pid = tctx->os_id;
    206   rt->running = (tctx->status == ThreadStatusRunning);
    207   rt->name = internal_strdup(tctx->name);
    208   rt->parent_tid = tctx->parent_tid;
    209   rt->stack = 0;
    210   rt->stack = SymbolizeStackId(tctx->creation_stack_id);
    211   if (rt->stack)
    212     rt->stack->suppressable = suppressable;
    213 }
    214 
    215 #ifndef TSAN_GO
    216 static ThreadContext *FindThreadByUidLocked(int unique_id) {
    217   ctx->thread_registry->CheckLocked();
    218   for (unsigned i = 0; i < kMaxTid; i++) {
    219     ThreadContext *tctx = static_cast<ThreadContext*>(
    220         ctx->thread_registry->GetThreadLocked(i));
    221     if (tctx && tctx->unique_id == (u32)unique_id) {
    222       return tctx;
    223     }
    224   }
    225   return 0;
    226 }
    227 
    228 static ThreadContext *FindThreadByTidLocked(int tid) {
    229   ctx->thread_registry->CheckLocked();
    230   return static_cast<ThreadContext*>(
    231       ctx->thread_registry->GetThreadLocked(tid));
    232 }
    233 
    234 static bool IsInStackOrTls(ThreadContextBase *tctx_base, void *arg) {
    235   uptr addr = (uptr)arg;
    236   ThreadContext *tctx = static_cast<ThreadContext*>(tctx_base);
    237   if (tctx->status != ThreadStatusRunning)
    238     return false;
    239   ThreadState *thr = tctx->thr;
    240   CHECK(thr);
    241   return ((addr >= thr->stk_addr && addr < thr->stk_addr + thr->stk_size) ||
    242           (addr >= thr->tls_addr && addr < thr->tls_addr + thr->tls_size));
    243 }
    244 
    245 ThreadContext *IsThreadStackOrTls(uptr addr, bool *is_stack) {
    246   ctx->thread_registry->CheckLocked();
    247   ThreadContext *tctx = static_cast<ThreadContext*>(
    248       ctx->thread_registry->FindThreadContextLocked(IsInStackOrTls,
    249                                                     (void*)addr));
    250   if (!tctx)
    251     return 0;
    252   ThreadState *thr = tctx->thr;
    253   CHECK(thr);
    254   *is_stack = (addr >= thr->stk_addr && addr < thr->stk_addr + thr->stk_size);
    255   return tctx;
    256 }
    257 #endif
    258 
    259 void ScopedReport::AddThread(int unique_tid, bool suppressable) {
    260 #ifndef TSAN_GO
    261   AddThread(FindThreadByUidLocked(unique_tid), suppressable);
    262 #endif
    263 }
    264 
    265 void ScopedReport::AddMutex(const SyncVar *s) {
    266   for (uptr i = 0; i < rep_->mutexes.Size(); i++) {
    267     if (rep_->mutexes[i]->id == s->uid)
    268       return;
    269   }
    270   void *mem = internal_alloc(MBlockReportMutex, sizeof(ReportMutex));
    271   ReportMutex *rm = new(mem) ReportMutex();
    272   rep_->mutexes.PushBack(rm);
    273   rm->id = s->uid;
    274   rm->addr = s->addr;
    275   rm->destroyed = false;
    276   rm->stack = SymbolizeStackId(s->creation_stack_id);
    277 }
    278 
    279 u64 ScopedReport::AddMutex(u64 id) {
    280   u64 uid = 0;
    281   u64 mid = id;
    282   uptr addr = SyncVar::SplitId(id, &uid);
    283   SyncVar *s = ctx->metamap.GetIfExistsAndLock(addr);
    284   // Check that the mutex is still alive.
    285   // Another mutex can be created at the same address,
    286   // so check uid as well.
    287   if (s && s->CheckId(uid)) {
    288     mid = s->uid;
    289     AddMutex(s);
    290   } else {
    291     AddDeadMutex(id);
    292   }
    293   if (s)
    294     s->mtx.Unlock();
    295   return mid;
    296 }
    297 
    298 void ScopedReport::AddDeadMutex(u64 id) {
    299   for (uptr i = 0; i < rep_->mutexes.Size(); i++) {
    300     if (rep_->mutexes[i]->id == id)
    301       return;
    302   }
    303   void *mem = internal_alloc(MBlockReportMutex, sizeof(ReportMutex));
    304   ReportMutex *rm = new(mem) ReportMutex();
    305   rep_->mutexes.PushBack(rm);
    306   rm->id = id;
    307   rm->addr = 0;
    308   rm->destroyed = true;
    309   rm->stack = 0;
    310 }
    311 
    312 void ScopedReport::AddLocation(uptr addr, uptr size) {
    313   if (addr == 0)
    314     return;
    315 #ifndef TSAN_GO
    316   int fd = -1;
    317   int creat_tid = -1;
    318   u32 creat_stack = 0;
    319   if (FdLocation(addr, &fd, &creat_tid, &creat_stack)
    320       || FdLocation(AlternativeAddress(addr), &fd, &creat_tid, &creat_stack)) {
    321     void *mem = internal_alloc(MBlockReportLoc, sizeof(ReportLocation));
    322     ReportLocation *loc = new(mem) ReportLocation();
    323     rep_->locs.PushBack(loc);
    324     loc->type = ReportLocationFD;
    325     loc->fd = fd;
    326     loc->tid = creat_tid;
    327     loc->stack = SymbolizeStackId(creat_stack);
    328     ThreadContext *tctx = FindThreadByUidLocked(creat_tid);
    329     if (tctx)
    330       AddThread(tctx);
    331     return;
    332   }
    333   MBlock *b = 0;
    334   Allocator *a = allocator();
    335   if (a->PointerIsMine((void*)addr)) {
    336     void *block_begin = a->GetBlockBegin((void*)addr);
    337     if (block_begin)
    338       b = ctx->metamap.GetBlock((uptr)block_begin);
    339   }
    340   if (b != 0) {
    341     ThreadContext *tctx = FindThreadByTidLocked(b->tid);
    342     void *mem = internal_alloc(MBlockReportLoc, sizeof(ReportLocation));
    343     ReportLocation *loc = new(mem) ReportLocation();
    344     rep_->locs.PushBack(loc);
    345     loc->type = ReportLocationHeap;
    346     loc->addr = (uptr)allocator()->GetBlockBegin((void*)addr);
    347     loc->size = b->siz;
    348     loc->tid = tctx ? tctx->tid : b->tid;
    349     loc->name = 0;
    350     loc->file = 0;
    351     loc->line = 0;
    352     loc->stack = 0;
    353     loc->stack = SymbolizeStackId(b->stk);
    354     if (tctx)
    355       AddThread(tctx);
    356     return;
    357   }
    358   bool is_stack = false;
    359   if (ThreadContext *tctx = IsThreadStackOrTls(addr, &is_stack)) {
    360     void *mem = internal_alloc(MBlockReportLoc, sizeof(ReportLocation));
    361     ReportLocation *loc = new(mem) ReportLocation();
    362     rep_->locs.PushBack(loc);
    363     loc->type = is_stack ? ReportLocationStack : ReportLocationTLS;
    364     loc->tid = tctx->tid;
    365     AddThread(tctx);
    366   }
    367   ReportLocation *loc = SymbolizeData(addr);
    368   if (loc) {
    369     loc->suppressable = true;
    370     rep_->locs.PushBack(loc);
    371     return;
    372   }
    373 #endif
    374 }
    375 
    376 #ifndef TSAN_GO
    377 void ScopedReport::AddSleep(u32 stack_id) {
    378   rep_->sleep = SymbolizeStackId(stack_id);
    379 }
    380 #endif
    381 
    382 void ScopedReport::SetCount(int count) {
    383   rep_->count = count;
    384 }
    385 
    386 const ReportDesc *ScopedReport::GetReport() const {
    387   return rep_;
    388 }
    389 
    390 void RestoreStack(int tid, const u64 epoch, StackTrace *stk, MutexSet *mset) {
    391   // This function restores stack trace and mutex set for the thread/epoch.
    392   // It does so by getting stack trace and mutex set at the beginning of
    393   // trace part, and then replaying the trace till the given epoch.
    394   ctx->thread_registry->CheckLocked();
    395   ThreadContext *tctx = static_cast<ThreadContext*>(
    396       ctx->thread_registry->GetThreadLocked(tid));
    397   if (tctx == 0)
    398     return;
    399   if (tctx->status != ThreadStatusRunning
    400       && tctx->status != ThreadStatusFinished
    401       && tctx->status != ThreadStatusDead)
    402     return;
    403   Trace* trace = ThreadTrace(tctx->tid);
    404   Lock l(&trace->mtx);
    405   const int partidx = (epoch / kTracePartSize) % TraceParts();
    406   TraceHeader* hdr = &trace->headers[partidx];
    407   if (epoch < hdr->epoch0)
    408     return;
    409   const u64 epoch0 = RoundDown(epoch, TraceSize());
    410   const u64 eend = epoch % TraceSize();
    411   const u64 ebegin = RoundDown(eend, kTracePartSize);
    412   DPrintf("#%d: RestoreStack epoch=%zu ebegin=%zu eend=%zu partidx=%d\n",
    413           tid, (uptr)epoch, (uptr)ebegin, (uptr)eend, partidx);
    414   InternalScopedBuffer<uptr> stack(kShadowStackSize);
    415   for (uptr i = 0; i < hdr->stack0.Size(); i++) {
    416     stack[i] = hdr->stack0.Get(i);
    417     DPrintf2("  #%02lu: pc=%zx\n", i, stack[i]);
    418   }
    419   if (mset)
    420     *mset = hdr->mset0;
    421   uptr pos = hdr->stack0.Size();
    422   Event *events = (Event*)GetThreadTrace(tid);
    423   for (uptr i = ebegin; i <= eend; i++) {
    424     Event ev = events[i];
    425     EventType typ = (EventType)(ev >> 61);
    426     uptr pc = (uptr)(ev & ((1ull << 61) - 1));
    427     DPrintf2("  %zu typ=%d pc=%zx\n", i, typ, pc);
    428     if (typ == EventTypeMop) {
    429       stack[pos] = pc;
    430     } else if (typ == EventTypeFuncEnter) {
    431       stack[pos++] = pc;
    432     } else if (typ == EventTypeFuncExit) {
    433       if (pos > 0)
    434         pos--;
    435     }
    436     if (mset) {
    437       if (typ == EventTypeLock) {
    438         mset->Add(pc, true, epoch0 + i);
    439       } else if (typ == EventTypeUnlock) {
    440         mset->Del(pc, true);
    441       } else if (typ == EventTypeRLock) {
    442         mset->Add(pc, false, epoch0 + i);
    443       } else if (typ == EventTypeRUnlock) {
    444         mset->Del(pc, false);
    445       }
    446     }
    447     for (uptr j = 0; j <= pos; j++)
    448       DPrintf2("      #%zu: %zx\n", j, stack[j]);
    449   }
    450   if (pos == 0 && stack[0] == 0)
    451     return;
    452   pos++;
    453   stk->Init(stack.data(), pos);
    454 }
    455 
    456 static bool HandleRacyStacks(ThreadState *thr, const StackTrace (&traces)[2],
    457     uptr addr_min, uptr addr_max) {
    458   bool equal_stack = false;
    459   RacyStacks hash;
    460   if (flags()->suppress_equal_stacks) {
    461     hash.hash[0] = md5_hash(traces[0].Begin(), traces[0].Size() * sizeof(uptr));
    462     hash.hash[1] = md5_hash(traces[1].Begin(), traces[1].Size() * sizeof(uptr));
    463     for (uptr i = 0; i < ctx->racy_stacks.Size(); i++) {
    464       if (hash == ctx->racy_stacks[i]) {
    465         DPrintf("ThreadSanitizer: suppressing report as doubled (stack)\n");
    466         equal_stack = true;
    467         break;
    468       }
    469     }
    470   }
    471   bool equal_address = false;
    472   RacyAddress ra0 = {addr_min, addr_max};
    473   if (flags()->suppress_equal_addresses) {
    474     for (uptr i = 0; i < ctx->racy_addresses.Size(); i++) {
    475       RacyAddress ra2 = ctx->racy_addresses[i];
    476       uptr maxbeg = max(ra0.addr_min, ra2.addr_min);
    477       uptr minend = min(ra0.addr_max, ra2.addr_max);
    478       if (maxbeg < minend) {
    479         DPrintf("ThreadSanitizer: suppressing report as doubled (addr)\n");
    480         equal_address = true;
    481         break;
    482       }
    483     }
    484   }
    485   if (equal_stack || equal_address) {
    486     if (!equal_stack)
    487       ctx->racy_stacks.PushBack(hash);
    488     if (!equal_address)
    489       ctx->racy_addresses.PushBack(ra0);
    490     return true;
    491   }
    492   return false;
    493 }
    494 
    495 static void AddRacyStacks(ThreadState *thr, const StackTrace (&traces)[2],
    496     uptr addr_min, uptr addr_max) {
    497   if (flags()->suppress_equal_stacks) {
    498     RacyStacks hash;
    499     hash.hash[0] = md5_hash(traces[0].Begin(), traces[0].Size() * sizeof(uptr));
    500     hash.hash[1] = md5_hash(traces[1].Begin(), traces[1].Size() * sizeof(uptr));
    501     ctx->racy_stacks.PushBack(hash);
    502   }
    503   if (flags()->suppress_equal_addresses) {
    504     RacyAddress ra0 = {addr_min, addr_max};
    505     ctx->racy_addresses.PushBack(ra0);
    506   }
    507 }
    508 
    509 bool OutputReport(ThreadState *thr, const ScopedReport &srep) {
    510   atomic_store(&ctx->last_symbolize_time_ns, NanoTime(), memory_order_relaxed);
    511   const ReportDesc *rep = srep.GetReport();
    512   Suppression *supp = 0;
    513   uptr suppress_pc = 0;
    514   for (uptr i = 0; suppress_pc == 0 && i < rep->mops.Size(); i++)
    515     suppress_pc = IsSuppressed(rep->typ, rep->mops[i]->stack, &supp);
    516   for (uptr i = 0; suppress_pc == 0 && i < rep->stacks.Size(); i++)
    517     suppress_pc = IsSuppressed(rep->typ, rep->stacks[i], &supp);
    518   for (uptr i = 0; suppress_pc == 0 && i < rep->threads.Size(); i++)
    519     suppress_pc = IsSuppressed(rep->typ, rep->threads[i]->stack, &supp);
    520   for (uptr i = 0; suppress_pc == 0 && i < rep->locs.Size(); i++)
    521     suppress_pc = IsSuppressed(rep->typ, rep->locs[i], &supp);
    522   if (suppress_pc != 0) {
    523     FiredSuppression s = {srep.GetReport()->typ, suppress_pc, supp};
    524     ctx->fired_suppressions.push_back(s);
    525   }
    526   {
    527     bool old_is_freeing = thr->is_freeing;
    528     thr->is_freeing = false;
    529     bool suppressed = OnReport(rep, suppress_pc != 0);
    530     thr->is_freeing = old_is_freeing;
    531     if (suppressed)
    532       return false;
    533   }
    534   PrintReport(rep);
    535   ctx->nreported++;
    536   if (flags()->halt_on_error)
    537     internal__exit(flags()->exitcode);
    538   return true;
    539 }
    540 
    541 bool IsFiredSuppression(Context *ctx,
    542                         const ScopedReport &srep,
    543                         const StackTrace &trace) {
    544   for (uptr k = 0; k < ctx->fired_suppressions.size(); k++) {
    545     if (ctx->fired_suppressions[k].type != srep.GetReport()->typ)
    546       continue;
    547     for (uptr j = 0; j < trace.Size(); j++) {
    548       FiredSuppression *s = &ctx->fired_suppressions[k];
    549       if (trace.Get(j) == s->pc) {
    550         if (s->supp)
    551           s->supp->hit_count++;
    552         return true;
    553       }
    554     }
    555   }
    556   return false;
    557 }
    558 
    559 static bool IsFiredSuppression(Context *ctx,
    560                                const ScopedReport &srep,
    561                                uptr addr) {
    562   for (uptr k = 0; k < ctx->fired_suppressions.size(); k++) {
    563     if (ctx->fired_suppressions[k].type != srep.GetReport()->typ)
    564       continue;
    565     FiredSuppression *s = &ctx->fired_suppressions[k];
    566     if (addr == s->pc) {
    567       if (s->supp)
    568         s->supp->hit_count++;
    569       return true;
    570     }
    571   }
    572   return false;
    573 }
    574 
    575 bool FrameIsInternal(const ReportStack *frame) {
    576   return frame != 0 && frame->file != 0
    577       && (internal_strstr(frame->file, "tsan_interceptors.cc") ||
    578           internal_strstr(frame->file, "sanitizer_common_interceptors.inc") ||
    579           internal_strstr(frame->file, "tsan_interface_"));
    580 }
    581 
    582 // On programs that use Java we see weird reports like:
    583 // WARNING: ThreadSanitizer: data race (pid=22512)
    584 //   Read of size 8 at 0x7d2b00084318 by thread 100:
    585 //     #0 memcpy tsan_interceptors.cc:406 (foo+0x00000d8dfae3)
    586 //     #1 <null> <null>:0 (0x7f7ad9b40193)
    587 //   Previous write of size 8 at 0x7d2b00084318 by thread 105:
    588 //     #0 strncpy tsan_interceptors.cc:501 (foo+0x00000d8e0919)
    589 //     #1 <null> <null>:0 (0x7f7ad9b42707)
    590 static bool IsJavaNonsense(const ReportDesc *rep) {
    591 #ifndef TSAN_GO
    592   for (uptr i = 0; i < rep->mops.Size(); i++) {
    593     ReportMop *mop = rep->mops[i];
    594     ReportStack *frame = mop->stack;
    595     if (frame == 0
    596         || (frame->func == 0 && frame->file == 0 && frame->line == 0
    597           && frame->module == 0)) {
    598       return true;
    599     }
    600     if (FrameIsInternal(frame)) {
    601       frame = frame->next;
    602       if (frame == 0
    603           || (frame->func == 0 && frame->file == 0 && frame->line == 0
    604           && frame->module == 0)) {
    605         if (frame) {
    606           FiredSuppression supp = {rep->typ, frame->pc, 0};
    607           ctx->fired_suppressions.push_back(supp);
    608         }
    609         return true;
    610       }
    611     }
    612   }
    613 #endif
    614   return false;
    615 }
    616 
    617 static bool RaceBetweenAtomicAndFree(ThreadState *thr) {
    618   Shadow s0(thr->racy_state[0]);
    619   Shadow s1(thr->racy_state[1]);
    620   CHECK(!(s0.IsAtomic() && s1.IsAtomic()));
    621   if (!s0.IsAtomic() && !s1.IsAtomic())
    622     return true;
    623   if (s0.IsAtomic() && s1.IsFreed())
    624     return true;
    625   if (s1.IsAtomic() && thr->is_freeing)
    626     return true;
    627   return false;
    628 }
    629 
    630 void ReportRace(ThreadState *thr) {
    631   CheckNoLocks(thr);
    632 
    633   // Symbolizer makes lots of intercepted calls. If we try to process them,
    634   // at best it will cause deadlocks on internal mutexes.
    635   ScopedIgnoreInterceptors ignore;
    636 
    637   if (!flags()->report_bugs)
    638     return;
    639   if (!flags()->report_atomic_races && !RaceBetweenAtomicAndFree(thr))
    640     return;
    641 
    642   bool freed = false;
    643   {
    644     Shadow s(thr->racy_state[1]);
    645     freed = s.GetFreedAndReset();
    646     thr->racy_state[1] = s.raw();
    647   }
    648 
    649   uptr addr = ShadowToMem((uptr)thr->racy_shadow_addr);
    650   uptr addr_min = 0;
    651   uptr addr_max = 0;
    652   {
    653     uptr a0 = addr + Shadow(thr->racy_state[0]).addr0();
    654     uptr a1 = addr + Shadow(thr->racy_state[1]).addr0();
    655     uptr e0 = a0 + Shadow(thr->racy_state[0]).size();
    656     uptr e1 = a1 + Shadow(thr->racy_state[1]).size();
    657     addr_min = min(a0, a1);
    658     addr_max = max(e0, e1);
    659     if (IsExpectedReport(addr_min, addr_max - addr_min))
    660       return;
    661   }
    662 
    663   ThreadRegistryLock l0(ctx->thread_registry);
    664 
    665   ReportType typ = ReportTypeRace;
    666   if (thr->is_vptr_access)
    667     typ = ReportTypeVptrRace;
    668   else if (freed)
    669     typ = ReportTypeUseAfterFree;
    670   ScopedReport rep(typ);
    671   if (IsFiredSuppression(ctx, rep, addr))
    672     return;
    673   const uptr kMop = 2;
    674   StackTrace traces[kMop];
    675   const uptr toppc = TraceTopPC(thr);
    676   traces[0].ObtainCurrent(thr, toppc);
    677   if (IsFiredSuppression(ctx, rep, traces[0]))
    678     return;
    679   InternalScopedBuffer<MutexSet> mset2(1);
    680   new(mset2.data()) MutexSet();
    681   Shadow s2(thr->racy_state[1]);
    682   RestoreStack(s2.tid(), s2.epoch(), &traces[1], mset2.data());
    683   if (IsFiredSuppression(ctx, rep, traces[1]))
    684     return;
    685 
    686   if (HandleRacyStacks(thr, traces, addr_min, addr_max))
    687     return;
    688 
    689   for (uptr i = 0; i < kMop; i++) {
    690     Shadow s(thr->racy_state[i]);
    691     rep.AddMemoryAccess(addr, s, &traces[i],
    692                         i == 0 ? &thr->mset : mset2.data());
    693   }
    694 
    695   if (flags()->suppress_java && IsJavaNonsense(rep.GetReport()))
    696     return;
    697 
    698   for (uptr i = 0; i < kMop; i++) {
    699     FastState s(thr->racy_state[i]);
    700     ThreadContext *tctx = static_cast<ThreadContext*>(
    701         ctx->thread_registry->GetThreadLocked(s.tid()));
    702     if (s.epoch() < tctx->epoch0 || s.epoch() > tctx->epoch1)
    703       continue;
    704     rep.AddThread(tctx);
    705   }
    706 
    707   rep.AddLocation(addr_min, addr_max - addr_min);
    708 
    709 #ifndef TSAN_GO
    710   {  // NOLINT
    711     Shadow s(thr->racy_state[1]);
    712     if (s.epoch() <= thr->last_sleep_clock.get(s.tid()))
    713       rep.AddSleep(thr->last_sleep_stack_id);
    714   }
    715 #endif
    716 
    717   if (!OutputReport(thr, rep))
    718     return;
    719 
    720   AddRacyStacks(thr, traces, addr_min, addr_max);
    721 }
    722 
    723 void PrintCurrentStack(ThreadState *thr, uptr pc) {
    724   StackTrace trace;
    725   trace.ObtainCurrent(thr, pc);
    726   PrintStack(SymbolizeStack(trace));
    727 }
    728 
    729 void PrintCurrentStackSlow() {
    730 #ifndef TSAN_GO
    731   __sanitizer::StackTrace *ptrace = new(internal_alloc(MBlockStackTrace,
    732       sizeof(__sanitizer::StackTrace))) __sanitizer::StackTrace;
    733   ptrace->Unwind(kStackTraceMax, __sanitizer::StackTrace::GetCurrentPc(), 0, 0,
    734                  0, 0, false);
    735   for (uptr i = 0; i < ptrace->size / 2; i++) {
    736     uptr tmp = ptrace->trace[i];
    737     ptrace->trace[i] = ptrace->trace[ptrace->size - i - 1];
    738     ptrace->trace[ptrace->size - i - 1] = tmp;
    739   }
    740   StackTrace trace;
    741   trace.Init(ptrace->trace, ptrace->size);
    742   PrintStack(SymbolizeStack(trace));
    743 #endif
    744 }
    745 
    746 }  // namespace __tsan
    747