From ccf6a360fb5c80e3f1586f093eb44757d3592745 Mon Sep 17 00:00:00 2001 From: Dmitry Vyukov Date: Thu, 27 Feb 2014 14:36:16 +0000 Subject: [PATCH] tsan: intercept vfork this fixes obscure false positives see the comments and the test for details git-svn-id: https://llvm.org/svn/llvm-project/compiler-rt/trunk@202400 91177308-0d34-0410-b5e6-96231b3b80d8 --- lib/tsan/rtl/tsan_interceptors.cc | 18 ++++++++++++++ test/tsan/vfork.cc | 51 +++++++++++++++++++++++++++++++++++++++ 2 files changed, 69 insertions(+) create mode 100644 test/tsan/vfork.cc diff --git a/lib/tsan/rtl/tsan_interceptors.cc b/lib/tsan/rtl/tsan_interceptors.cc index c87ad2d90..1d35003e2 100644 --- a/lib/tsan/rtl/tsan_interceptors.cc +++ b/lib/tsan/rtl/tsan_interceptors.cc @@ -1903,6 +1903,23 @@ TSAN_INTERCEPTOR(int, fork, int fake) { return pid; } +TSAN_INTERCEPTOR(int, vfork, int fake) { + // Some programs (e.g. openjdk) call close for all file descriptors + // in the child process. Under tsan it leads to false positives, because + // address space is shared, so the parent process also thinks that + // the descriptors are closed (while they are actually not). + // This leads to false positives due to missed synchronization. + // Strictly saying this is undefined behavior, because vfork child is not + // allowed to call any functions other than exec/exit. But this is what + // openjdk does, so we want to handle it. + // We could disable interceptors in the child process. But it's not possible + // to simply intercept and wrap vfork, because vfork child is not allowed + // to return from the function that calls vfork, and that's exactly what + // we would do. So this would require some assembly trickery as well. + // Instead we simply turn vfork into fork. + return WRAP(fork)(fake); +} + static int OnExit(ThreadState *thr) { int status = Finalize(thr); REAL(fflush)(0); @@ -2289,6 +2306,7 @@ void InitializeInterceptors() { TSAN_INTERCEPT(munlockall); TSAN_INTERCEPT(fork); + TSAN_INTERCEPT(vfork); TSAN_INTERCEPT(dlopen); TSAN_INTERCEPT(dlclose); TSAN_INTERCEPT(on_exit); diff --git a/test/tsan/vfork.cc b/test/tsan/vfork.cc new file mode 100644 index 000000000..b9d50a37e --- /dev/null +++ b/test/tsan/vfork.cc @@ -0,0 +1,51 @@ +// RUN: %clangxx_tsan -O1 %s -o %t && %t 2>&1 | FileCheck %s +#include +#include +#include +#include +#include + +int fds[2]; +int X; + +void *Thread1(void *x) { + X = 42; + write(fds[1], "a", 1); + return NULL; +} + +void *Thread2(void *x) { + char buf; + while (read(fds[0], &buf, 1) != 1) { + } + X = 43; + return NULL; +} + +int main() { + pipe(fds); + int pid = vfork(); + if (pid < 0) { + printf("FAIL to vfork\n"); + exit(1); + } + if (pid == 0) { // child + // Closing of fds must not affect parent process. + // Strictly saying this is undefined behavior, because vfork child is not + // allowed to call any functions other than exec/exit. But this is what + // openjdk does. + close(fds[0]); + close(fds[1]); + _exit(0); + } + pthread_t t[2]; + pthread_create(&t[0], NULL, Thread1, NULL); + pthread_create(&t[1], NULL, Thread2, NULL); + pthread_join(t[0], NULL); + pthread_join(t[1], NULL); + printf("DONE\n"); +} + +// CHECK-NOT: WARNING: ThreadSanitizer: data race +// CHECK-NOT: FAIL to vfork +// CHECK: DONE -- 2.11.4.GIT