[compiler-rt] [ASan] Prevent ASan/LSan deadlock by preloading modules before error reporting (PR #131756)
via llvm-commits
llvm-commits at lists.llvm.org
Thu Mar 20 02:00:31 PDT 2025
github-actions[bot] wrote:
<!--LLVM CODE FORMAT COMMENT: {clang-format}-->
:warning: C/C++ code formatter, clang-format found issues in your code. :warning:
<details>
<summary>
You can test this locally with the following command:
</summary>
``````````bash
git-clang-format --diff 57dc71352c75f88e6819314b2b0e81a62bf285e9 943948f05369c333066b7f04356df82d516dc1ea --extensions cpp -- compiler-rt/test/asan/TestCases/asan_lsan_deadlock.cpp compiler-rt/lib/asan/asan_report.cpp
``````````
</details>
<details>
<summary>
View the diff from clang-format here.
</summary>
``````````diff
diff --git a/compiler-rt/lib/asan/asan_report.cpp b/compiler-rt/lib/asan/asan_report.cpp
index 8aeb938b2e..b118340d35 100644
--- a/compiler-rt/lib/asan/asan_report.cpp
+++ b/compiler-rt/lib/asan/asan_report.cpp
@@ -126,25 +126,31 @@ class ScopedInErrorReport {
public:
explicit ScopedInErrorReport(bool fatal = false)
: halt_on_error_(fatal || flags()->halt_on_error) {
- /*
- * Deadlock Prevention Between ASan and LSan
- *
- * Background:
- * - The `dl_iterate_phdr` function requires holding libdl's internal lock (Lock A).
- * - LSan acquires the ASan thread registry lock (Lock B) *after* calling `dl_iterate_phdr`.
- *
- * Problem Scenario:
- * When ASan attempts to call `dl_iterate_phdr` while holding Lock B (e.g., during
- * error reporting via `ErrorDescription::Print`), a circular lock dependency may occur:
- * 1. Thread 1: Holds Lock B → Requests Lock A (via dl_iterate_phdr)
- * 2. Thread 2: Holds Lock A → Requests Lock B (via LSan operations)
- *
- * Solution:
- * Proactively load all required modules before acquiring Lock B. This ensures:
- * 1. Any `dl_iterate_phdr` calls during module loading complete before locking
- * 2. Subsequent error reporting avoids nested lock acquisition patterns
- * 3. Eliminates the lock order inversion risk between libdl and ASan's thread registry
- */
+ /*
+ * Deadlock Prevention Between ASan and LSan
+ *
+ * Background:
+ * - The `dl_iterate_phdr` function requires holding libdl's internal lock
+ * (Lock A).
+ * - LSan acquires the ASan thread registry lock (Lock B) *after* calling
+ * `dl_iterate_phdr`.
+ *
+ * Problem Scenario:
+ * When ASan attempts to call `dl_iterate_phdr` while holding Lock B (e.g.,
+ * during error reporting via `ErrorDescription::Print`), a circular lock
+ * dependency may occur:
+ * 1. Thread 1: Holds Lock B → Requests Lock A (via dl_iterate_phdr)
+ * 2. Thread 2: Holds Lock A → Requests Lock B (via LSan operations)
+ *
+ * Solution:
+ * Proactively load all required modules before acquiring Lock B. This
+ * ensures:
+ * 1. Any `dl_iterate_phdr` calls during module loading complete before
+ * locking
+ * 2. Subsequent error reporting avoids nested lock acquisition patterns
+ * 3. Eliminates the lock order inversion risk between libdl and ASan's
+ * thread registry
+ */
Symbolizer::GetOrInit()->GetRefreshedListOfModules();
// Make sure the registry and sanitizer report mutexes are locked while
``````````
</details>
https://github.com/llvm/llvm-project/pull/131756
More information about the llvm-commits
mailing list