# define _Py_ADDRESS_SANITIZER
# endif
# endif
+# if __has_feature(thread_sanitizer)
+# if !defined(_Py_THREAD_SANITIZER)
+# define _Py_THREAD_SANITIZER
+# endif
+# endif
#elif defined(__GNUC__)
# if defined(__SANITIZE_ADDRESS__)
# define _Py_ADDRESS_SANITIZER
# --with-undefined-behavior-sanitizer
if support.check_sanitizer(ub=True):
sanitizers.append("UBSAN")
+ # --with-thread-sanitizer
+ if support.check_sanitizer(thread=True):
+ sanitizers.append("TSAN")
if sanitizers:
build.append('+'.join(sanitizers))
asan = support.check_sanitizer(address=True)
msan = support.check_sanitizer(memory=True)
ubsan = support.check_sanitizer(ub=True)
+ tsan = support.check_sanitizer(thread=True)
sanitizers = []
if asan:
sanitizers.append("address")
sanitizers.append("memory")
if ubsan:
sanitizers.append("undefined behavior")
+ if tsan:
+ sanitizers.append("thread")
if sanitizers:
print(f"== sanitizers: {', '.join(sanitizers)}")
for sanitizer, env_var in (
(asan, "ASAN_OPTIONS"),
(msan, "MSAN_OPTIONS"),
(ubsan, "UBSAN_OPTIONS"),
+ (tsan, "TSAN_OPTIONS"),
):
options= os.environ.get(env_var)
if sanitizer and options is not None:
isbuildbot = False
return unittest.skipIf(isbuildbot, reason)
-def check_sanitizer(*, address=False, memory=False, ub=False):
+def check_sanitizer(*, address=False, memory=False, ub=False, thread=False):
"""Returns True if Python is compiled with sanitizer support"""
- if not (address or memory or ub):
- raise ValueError('At least one of address, memory, or ub must be True')
+ if not (address or memory or ub or thread):
+ raise ValueError('At least one of address, memory, ub or thread must be True')
cflags = sysconfig.get_config_var('CFLAGS') or ''
'-fsanitize=undefined' in cflags or
'--with-undefined-behavior-sanitizer' in config_args
)
+ thread_sanitizer = (
+ '-fsanitize=thread' in cflags or
+ '--with-thread-sanitizer' in config_args
+ )
return (
(memory and memory_sanitizer) or
(address and address_sanitizer) or
- (ub and ub_sanitizer)
+ (ub and ub_sanitizer) or
+ (thread and thread_sanitizer)
)
-def skip_if_sanitizer(reason=None, *, address=False, memory=False, ub=False):
+def skip_if_sanitizer(reason=None, *, address=False, memory=False, ub=False, thread=False):
"""Decorator raising SkipTest if running with a sanitizer active."""
if not reason:
reason = 'not working with sanitizers active'
- skip = check_sanitizer(address=address, memory=memory, ub=ub)
+ skip = check_sanitizer(address=address, memory=memory, ub=ub, thread=thread)
return unittest.skipIf(skip, reason)
# gh-89363: True if fork() can hang if Python is built with Address Sanitizer
def set_sanitizer_env_var(env, option):
- for name in ('ASAN_OPTIONS', 'MSAN_OPTIONS', 'UBSAN_OPTIONS'):
+ for name in ('ASAN_OPTIONS', 'MSAN_OPTIONS', 'UBSAN_OPTIONS', 'TSAN_OPTIONS'):
if name in env:
env[name] += f':{option}'
else:
class CBufferedReaderTest(BufferedReaderTest, SizeofTest):
tp = io.BufferedReader
- @skip_if_sanitizer(memory=True, address=True, reason= "sanitizer defaults to crashing "
+ @skip_if_sanitizer(memory=True, address=True, thread=True,
+ reason="sanitizer defaults to crashing "
"instead of returning NULL for malloc failure.")
def test_constructor(self):
BufferedReaderTest.test_constructor(self)
class CBufferedWriterTest(BufferedWriterTest, SizeofTest):
tp = io.BufferedWriter
- @skip_if_sanitizer(memory=True, address=True, reason= "sanitizer defaults to crashing "
+ @skip_if_sanitizer(memory=True, address=True, thread=True,
+ reason="sanitizer defaults to crashing "
"instead of returning NULL for malloc failure.")
def test_constructor(self):
BufferedWriterTest.test_constructor(self)
class CBufferedRandomTest(BufferedRandomTest, SizeofTest):
tp = io.BufferedRandom
- @skip_if_sanitizer(memory=True, address=True, reason= "sanitizer defaults to crashing "
+ @skip_if_sanitizer(memory=True, address=True, thread=True,
+ reason="sanitizer defaults to crashing "
"instead of returning NULL for malloc failure.")
def test_constructor(self):
BufferedRandomTest.test_constructor(self)
--- /dev/null
+Add support for thread sanitizer (TSAN)
with_address_sanitizer
with_memory_sanitizer
with_undefined_behavior_sanitizer
+with_thread_sanitizer
with_hash_algorithm
with_tzpath
with_libs
--with-undefined-behavior-sanitizer
enable UndefinedBehaviorSanitizer undefined
behaviour detector, 'ubsan' (default is no)
+ --with-thread-sanitizer enable ThreadSanitizer data race detector, 'tsan'
+ (default is no)
--with-hash-algorithm=[fnv|siphash13|siphash24]
select hash algorithm for use in Python/pyhash.c
(default is SipHash13)
fi
+{ printf "%s\n" "$as_me:${as_lineno-$LINENO}: checking for --with-thread-sanitizer" >&5
+printf %s "checking for --with-thread-sanitizer... " >&6; }
+
+# Check whether --with-thread_sanitizer was given.
+if test ${with_thread_sanitizer+y}
+then :
+ withval=$with_thread_sanitizer;
+{ printf "%s\n" "$as_me:${as_lineno-$LINENO}: result: $withval" >&5
+printf "%s\n" "$withval" >&6; }
+BASECFLAGS="-fsanitize=thread $BASECFLAGS"
+LDFLAGS="-fsanitize=thread $LDFLAGS"
+with_tsan="yes"
+
+else $as_nop
+
+{ printf "%s\n" "$as_me:${as_lineno-$LINENO}: result: no" >&5
+printf "%s\n" "no" >&6; }
+with_tsan="no"
+
+fi
+
+
# Set info about shared libraries.
with_ubsan="no"
])
+AC_MSG_CHECKING([for --with-thread-sanitizer])
+AC_ARG_WITH(
+ [thread_sanitizer],
+ [AS_HELP_STRING(
+ [--with-thread-sanitizer],
+ [enable ThreadSanitizer data race detector, 'tsan' (default is no)]
+ )],
+[
+AC_MSG_RESULT([$withval])
+BASECFLAGS="-fsanitize=thread $BASECFLAGS"
+LDFLAGS="-fsanitize=thread $LDFLAGS"
+with_tsan="yes"
+],
+[
+AC_MSG_RESULT([no])
+with_tsan="no"
+])
+
# Set info about shared libraries.
AC_SUBST([SHLIB_SUFFIX])
AC_SUBST([LDSHARED])