mirror of
https://github.com/golang/go.git
synced 2025-12-08 06:10:04 +00:00
runtime/coverage: apis to emit counter data under user control
Add hooks/apis to support writing of coverage counter data and meta-data under user control (from within an executing "-cover" binary), so as to provide a way to obtain coverage data from programs that do not terminate. This patch also adds a hook for clearing the coverage counter data for a running program, something that can be helpful when the intent is to capture coverage info from a specific window of program execution. Updates #51430. Change-Id: I34ee6cee52e5597fa3698b8b04f1b34a2a2a418f Reviewed-on: https://go-review.googlesource.com/c/go/+/401236 Reviewed-by: David Chase <drchase@google.com>
This commit is contained in:
parent
f2ee341468
commit
ecd112c0d1
5 changed files with 887 additions and 1 deletions
176
src/runtime/coverage/apis.go
Normal file
176
src/runtime/coverage/apis.go
Normal file
|
|
@ -0,0 +1,176 @@
|
|||
// Copyright 2022 The Go Authors. All rights reserved.
|
||||
// Use of this source code is governed by a BSD-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
package coverage
|
||||
|
||||
import (
|
||||
"fmt"
|
||||
"internal/coverage"
|
||||
"io"
|
||||
"reflect"
|
||||
"unsafe"
|
||||
)
|
||||
|
||||
// EmitMetaDataToDir writes a coverage meta-data file for the
|
||||
// currently running program to the directory specified in 'dir'. An
|
||||
// error will be returned if the operation can't be completed
|
||||
// successfully (for example, if the currently running program was not
|
||||
// built with "-cover", or if the directory does not exist).
|
||||
func EmitMetaDataToDir(dir string) error {
|
||||
if !finalHashComputed {
|
||||
return fmt.Errorf("error: no meta-data available (binary not built with -cover?)")
|
||||
}
|
||||
return emitMetaDataToDirectory(dir, getCovMetaList())
|
||||
}
|
||||
|
||||
// EmitMetaDataToWriter writes the meta-data content (the payload that
|
||||
// would normally be emitted to a meta-data file) for currently
|
||||
// running program to the the writer 'w'. An error will be returned if
|
||||
// the operation can't be completed successfully (for example, if the
|
||||
// currently running program was not built with "-cover", or if a
|
||||
// write fails).
|
||||
func EmitMetaDataToWriter(w io.Writer) error {
|
||||
if w == nil {
|
||||
return fmt.Errorf("error: nil writer in EmitMetaDataToWriter")
|
||||
}
|
||||
if !finalHashComputed {
|
||||
return fmt.Errorf("error: no meta-data available (binary not built with -cover?)")
|
||||
}
|
||||
ml := getCovMetaList()
|
||||
return writeMetaData(w, ml, cmode, cgran, finalHash)
|
||||
}
|
||||
|
||||
// EmitCounterDataToDir writes a coverage counter-data file for the
|
||||
// currently running program to the directory specified in 'dir'. An
|
||||
// error will be returned if the operation can't be completed
|
||||
// successfully (for example, if the currently running program was not
|
||||
// built with "-cover", or if the directory does not exist). The
|
||||
// counter data written will be a snapshot taken at the point of the
|
||||
// call.
|
||||
func EmitCounterDataToDir(dir string) error {
|
||||
return emitCounterDataToDirectory(dir)
|
||||
}
|
||||
|
||||
// EmitCounterDataToWriter writes coverage counter-data content for
|
||||
// the currently running program to the writer 'w'. An error will be
|
||||
// returned if the operation can't be completed successfully (for
|
||||
// example, if the currently running program was not built with
|
||||
// "-cover", or if a write fails). The counter data written will be a
|
||||
// snapshot taken at the point of the invocation.
|
||||
func EmitCounterDataToWriter(w io.Writer) error {
|
||||
if w == nil {
|
||||
return fmt.Errorf("error: nil writer in EmitCounterDataToWriter")
|
||||
}
|
||||
// Ask the runtime for the list of coverage counter symbols.
|
||||
cl := getCovCounterList()
|
||||
if len(cl) == 0 {
|
||||
return fmt.Errorf("program not built with -cover")
|
||||
}
|
||||
if !finalHashComputed {
|
||||
return fmt.Errorf("meta-data not written yet, unable to write counter data")
|
||||
}
|
||||
|
||||
pm := getCovPkgMap()
|
||||
s := &emitState{
|
||||
counterlist: cl,
|
||||
pkgmap: pm,
|
||||
}
|
||||
return s.emitCounterDataToWriter(w)
|
||||
}
|
||||
|
||||
// ClearCoverageCounters clears/resets all coverage counter variables
|
||||
// in the currently running program. It returns an error if the
|
||||
// program in question was not built with the "-cover" flag. Clearing
|
||||
// of coverage counters is also not supported for programs not using
|
||||
// atomic counter mode (see more detailed comments below for the
|
||||
// rationale here).
|
||||
func ClearCoverageCounters() error {
|
||||
cl := getCovCounterList()
|
||||
if len(cl) == 0 {
|
||||
return fmt.Errorf("program not built with -cover")
|
||||
}
|
||||
if cmode != coverage.CtrModeAtomic {
|
||||
return fmt.Errorf("ClearCoverageCounters invoked for program build with -covermode=%s (please use -covermode=atomic)", cmode.String())
|
||||
}
|
||||
|
||||
// Implementation note: this function would be faster and simpler
|
||||
// if we could just zero out the entire counter array, but for the
|
||||
// moment we go through and zero out just the slots in the array
|
||||
// corresponding to the counter values. We do this to avoid the
|
||||
// following bad scenario: suppose that a user builds their Go
|
||||
// program with "-cover", and that program has a function (call it
|
||||
// main.XYZ) that invokes ClearCoverageCounters:
|
||||
//
|
||||
// func XYZ() {
|
||||
// ... do some stuff ...
|
||||
// coverage.ClearCoverageCounters()
|
||||
// if someCondition { <<--- HERE
|
||||
// ...
|
||||
// }
|
||||
// }
|
||||
//
|
||||
// At the point where ClearCoverageCounters executes, main.XYZ has
|
||||
// not yet finished running, thus as soon as the call returns the
|
||||
// line marked "HERE" above will trigger the writing of a non-zero
|
||||
// value into main.XYZ's counter slab. However since we've just
|
||||
// finished clearing the entire counter segment, we will have lost
|
||||
// the values in the prolog portion of main.XYZ's counter slab
|
||||
// (nctrs, pkgid, funcid). This means that later on at the end of
|
||||
// program execution as we walk through the entire counter array
|
||||
// for the program looking for executed functions, we'll zoom past
|
||||
// main.XYZ's prolog (which was zero'd) and hit the non-zero
|
||||
// counter value corresponding to the "HERE" block, which will then
|
||||
// be interpreted as the start of another live function. Things
|
||||
// will go downhill from there.
|
||||
//
|
||||
// This same scenario is also a potential risk if the program is
|
||||
// running on an architecture that permits reordering of writes/stores,
|
||||
// since the inconsistency described above could arise here. Example
|
||||
// scenario:
|
||||
//
|
||||
// func ABC() {
|
||||
// ... // prolog
|
||||
// if alwaysTrue() {
|
||||
// XYZ() // counter update here
|
||||
// }
|
||||
// }
|
||||
//
|
||||
// In the instrumented version of ABC, the prolog of the function
|
||||
// will contain a series of stores to the initial portion of the
|
||||
// counter array to write number-of-counters, pkgid, funcid. Later
|
||||
// in the function there is also a store to increment a counter
|
||||
// for the block containing the call to XYZ(). If the CPU is
|
||||
// allowed to reorder stores and decides to issue the XYZ store
|
||||
// before the prolog stores, this could be observable as an
|
||||
// inconsistency similar to the one above. Hence the requirement
|
||||
// for atomic counter mode: according to package atomic docs,
|
||||
// "...operations that happen in a specific order on one thread,
|
||||
// will always be observed to happen in exactly that order by
|
||||
// another thread". Thus we can be sure that there will be no
|
||||
// inconsistency when reading the counter array from the thread
|
||||
// running ClearCoverageCounters.
|
||||
|
||||
var sd []uint32
|
||||
|
||||
bufHdr := (*reflect.SliceHeader)(unsafe.Pointer(&sd))
|
||||
for _, c := range cl {
|
||||
bufHdr.Data = uintptr(unsafe.Pointer(c.Counters))
|
||||
bufHdr.Len = int(c.Len)
|
||||
bufHdr.Cap = int(c.Len)
|
||||
for i := 0; i < len(sd); i++ {
|
||||
// Skip ahead until the next non-zero value.
|
||||
if sd[i] == 0 {
|
||||
continue
|
||||
}
|
||||
// We found a function that was executed; clear its counters.
|
||||
nCtrs := sd[i]
|
||||
for j := 0; j < int(nCtrs); j++ {
|
||||
sd[i+coverage.FirstCtrOffset+j] = 0
|
||||
}
|
||||
// Move to next function.
|
||||
i += coverage.FirstCtrOffset + int(nCtrs) - 1
|
||||
}
|
||||
}
|
||||
return nil
|
||||
}
|
||||
Loading…
Add table
Add a link
Reference in a new issue