[PATCH] D26028: [asan/lsan] Avoid possible deadlock in dynamic ASan runtime thread initialization.

Phabricator via llvm-commits llvm-commits at lists.llvm.org
Thu Oct 27 23:59:16 PDT 2016


This revision was automatically updated to reflect the committed changes.
Closed by commit rL285385: [asan/lsan] Avoid possible deadlock in dynamic ASan runtime thread… (authored by chefmax).

Changed prior to commit:
  https://reviews.llvm.org/D26028?vs=76006&id=76168#toc

Repository:
  rL LLVM

https://reviews.llvm.org/D26028

Files:
  compiler-rt/trunk/lib/lsan/lsan_common.cc
  compiler-rt/trunk/test/asan/TestCases/Linux/pthread_create_from_constructor.cc


Index: compiler-rt/trunk/test/asan/TestCases/Linux/pthread_create_from_constructor.cc
===================================================================
--- compiler-rt/trunk/test/asan/TestCases/Linux/pthread_create_from_constructor.cc
+++ compiler-rt/trunk/test/asan/TestCases/Linux/pthread_create_from_constructor.cc
@@ -0,0 +1,48 @@
+// Test that ASan doesn't deadlock in __interceptor_pthread_create called
+// from dlopened shared library constructor. The deadlock happens only in shared
+// ASan runtime with recent Glibc (2.23 fits) when __interceptor_pthread_create
+// grabs global Glibc's GL(dl_load_lock) and waits for tls_get_addr_tail that
+// also tries to acquire it.
+//
+// RUN: %clangxx_asan -DBUILD_SO=1 -fPIC -shared %s -o %t-so.so
+// RUN: %clangxx_asan %s -o %t
+// RUN: %run %t 2>&1
+
+// dlopen() can not be intercepted on Android
+// UNSUPPORTED: android
+
+#ifdef BUILD_SO
+
+#include <stdio.h>
+#include <pthread.h>
+#include <unistd.h>
+
+void *threadFn(void *) {
+  fprintf(stderr, "thread started\n");
+  while (true) {
+    usleep(100000);
+  }
+  return 0;
+}
+
+void __attribute__((constructor)) startPolling() {
+  fprintf(stderr, "initializing library\n");
+  pthread_t t;
+  pthread_create(&t, 0, &threadFn, 0);
+  fprintf(stderr, "done\n");
+}
+
+#else
+
+#include <dlfcn.h>
+#include <stdlib.h>
+#include <string>
+
+int main(int argc, char **argv) {
+  std::string path = std::string(argv[0]) + "-so.so";
+  void *handle = dlopen(path.c_str(), RTLD_LAZY);
+  if (!handle)
+    abort();
+  return 0;
+}
+#endif
Index: compiler-rt/trunk/lib/lsan/lsan_common.cc
===================================================================
--- compiler-rt/trunk/lib/lsan/lsan_common.cc
+++ compiler-rt/trunk/lib/lsan/lsan_common.cc
@@ -32,6 +32,7 @@
 // also to protect the global list of root regions.
 BlockingMutex global_mutex(LINKER_INITIALIZED);
 
+__attribute__((tls_model("initial-exec")))
 THREADLOCAL int disable_counter;
 bool DisabledInThisThread() { return disable_counter > 0; }
 void DisableInThisThread() { disable_counter++; }


-------------- next part --------------
A non-text attachment was scrubbed...
Name: D26028.76168.patch
Type: text/x-patch
Size: 2071 bytes
Desc: not available
URL: <http://lists.llvm.org/pipermail/llvm-commits/attachments/20161028/bff99891/attachment.bin>


More information about the llvm-commits mailing list