[llvm-dev] call_once and TSan
Kuba Brecka via llvm-dev
llvm-dev at lists.llvm.org
Fri Sep 2 03:16:08 PDT 2016
> On 2 Sep 2016, at 12:11, Dmitry Vyukov <dvyukov at google.com> wrote:
>
> On Fri, Sep 2, 2016 at 12:09 PM, Kuba Brecka <kuba.brecka at gmail.com> wrote:
>>
>>> On 2 Sep 2016, at 11:18, Dmitry Vyukov via llvm-dev <llvm-dev at lists.llvm.org> wrote:
>>>
>>> On Thu, Sep 1, 2016 at 2:30 PM, Kuba Brecka <kuba.brecka at gmail.com> wrote:
>>>> Hi,
>>>>
>>>> I'm trying to write a TSan interceptor for the C++11 call_once function. There are currently false positive reports, because the inner __call_once function is located in the (non-instrumented) libcxx library, and on macOS we can't expect the users to build their own instrumented libcxx.
>>>>
>>>> TSan already supports pthread_once and dispatch_once by having interceptors that re-implement the logic. However, doing the same for call_once/__call_once doesn't work, because call_once is explicitly supposed to be exception-safe, but the sanitizer runtime libraries disallow exception handling.
>>>>
>>>> Any ideas how to handle call_once in TSan?
>>>
>>> Does anybody remember exact reasons we disable exceptions in sanitizer
>>> runtimes? One is that it won't link with C programs. Are there any
>>> other?
>>> If C is the only reason: there is already a part of tsan runtime is
>>> linked only to C++ programs (it contains operator new/delete
>>> interceptors). We could add additional files to the cxx part of
>>> runtime and build them with exceptions.
>>>
>>> Alternatively, the interceptor can handle only synchronization but
>>> forward actual logic to the real function. Along the lines of:
>>>
>>> INTERCEPTOR(call_once, o) {
>>> __tsan_acquire_release(o);
>>> REAL(call_once)(o);
>>> }
>>>
>>> That will have some performance impact. If we hardcode the "fully
>>> initialized" value, then we can eliminate the additional overhead:
>>>
>>> INTERCEPTOR(call_once, o) {
>>> if (__atomic_load(o, acquire) == FULLY_INITIALIZED) {
>>> __tsan_acquire(o);
>>> return;
>>> }
>>> __tsan_acquire_release(o);
>>> REAL(call_once)(o);
>>> }
>>
>> Unfortunately, the first fast-path check is inlined and cannot be intercepted. We can only intercept the inner call to __call_once. But how would __tsan_acquire_release help here? The issue is that we need to perform the release *after* user code has run, but before the "o" flag is changed. Otherwise, TSan will still see a false positive where one thread has already run user code, and another thread already sees that call_once is finished, but the acquire has no release to pair with.
>
>
>
> Will then the following work?
>
> INTERCEPTOR(call_once, o) {
> REAL(call_once)(o);
> __tsan_release_merge(o);
> __tsan_acquire(o);
> }
Still racy. Suppose thread A is still inside REAL(call_once), but already after it has run user code and updated "o" to ~0. Thread B load-acquires "o", finds ~0, assumes it's fully initialized, keeps going, but user code stores hasn't been properly published.
Kuba
More information about the llvm-dev
mailing list