On Tue, 6 Sep 2016, Jakub Jelinek wrote:

> Hi!
> 
> As the PRs show, -fsanitize=thread hasn't been instrumenting __atomic_clear
> and __atomic_test_and_set builtins (i.e. those that operate on bool always),
> so we reported a data race on the testcase even when there wasn't one.
> And, as the other testcase shows, there were various ICEs with
> -fnon-call-exceptions -fsanitize=thread.
> 
> Fixed thusly, bootstrapped/regtested on x86_64-linux and i686-linux, ok for
> trunk?
> 
> 2016-09-06  Jakub Jelinek  <ja...@redhat.com>
> 
>       PR sanitizer/68260
>       * tsan.c: Include target.h and tree-eh.h.
>       (enum tsan_atomic_action): Add bool_clear and bool_test_and_set.
>       (BOOL_CLEAR, BOOL_TEST_AND_SET): Define.
>       (tsan_atomic_table): Add BUILT_IN_ATOMIC_CLEAR and
>       BUILT_IN_ATOMIC_TEST_AND_SET entries.
>       (instrument_builtin_call): Remove EH edges of replaced call stmts.
>       Handle bool_clear and bool_test_and_set.
>       (instrument_memory_accesses): Add RET argument, purge dead eh edges
>       at the end of bbs and set *RET in that case to TODO_cleanup_cfg.
>       (tsan_pass): Adjust instrument_memory_accesses caller, return ret.
> 
>       * c-c++-common/tsan/pr68260.c: New test.
>       * g++.dg/tsan/pr68260.C: New test.
> 
> --- gcc/tsan.c.jj     2016-07-11 22:18:08.000000000 +0200
> +++ gcc/tsan.c        2016-09-06 14:06:21.193642590 +0200
> @@ -40,6 +40,8 @@ along with GCC; see the file COPYING3.
>  #include "tsan.h"
>  #include "asan.h"
>  #include "builtins.h"
> +#include "target.h"
> +#include "tree-eh.h"
>  
>  /* Number of instrumented memory accesses in the current function.  */
>  
> @@ -240,7 +242,8 @@ instrument_expr (gimple_stmt_iterator gs
>  enum tsan_atomic_action
>  {
>    check_last, add_seq_cst, add_acquire, weak_cas, strong_cas,
> -  bool_cas, val_cas, lock_release, fetch_op, fetch_op_seq_cst
> +  bool_cas, val_cas, lock_release, fetch_op, fetch_op_seq_cst,
> +  bool_clear, bool_test_and_set
>  };
>  
>  /* Table how to map sync/atomic builtins to their corresponding
> @@ -274,6 +277,10 @@ static const struct tsan_map_atomic
>    TRANSFORM (fcode, tsan_fcode, fetch_op, code)
>  #define FETCH_OPS(fcode, tsan_fcode, code) \
>    TRANSFORM (fcode, tsan_fcode, fetch_op_seq_cst, code)
> +#define BOOL_CLEAR(fcode, tsan_fcode) \
> +  TRANSFORM (fcode, tsan_fcode, bool_clear, ERROR_MARK)
> +#define BOOL_TEST_AND_SET(fcode, tsan_fcode) \
> +  TRANSFORM (fcode, tsan_fcode, bool_test_and_set, ERROR_MARK)
>  
>    CHECK_LAST (ATOMIC_LOAD_1, TSAN_ATOMIC8_LOAD),
>    CHECK_LAST (ATOMIC_LOAD_2, TSAN_ATOMIC16_LOAD),
> @@ -463,7 +470,11 @@ static const struct tsan_map_atomic
>    LOCK_RELEASE (SYNC_LOCK_RELEASE_2, TSAN_ATOMIC16_STORE),
>    LOCK_RELEASE (SYNC_LOCK_RELEASE_4, TSAN_ATOMIC32_STORE),
>    LOCK_RELEASE (SYNC_LOCK_RELEASE_8, TSAN_ATOMIC64_STORE),
> -  LOCK_RELEASE (SYNC_LOCK_RELEASE_16, TSAN_ATOMIC128_STORE)
> +  LOCK_RELEASE (SYNC_LOCK_RELEASE_16, TSAN_ATOMIC128_STORE),
> +
> +  BOOL_CLEAR (ATOMIC_CLEAR, TSAN_ATOMIC8_STORE),
> +
> +  BOOL_TEST_AND_SET (ATOMIC_TEST_AND_SET, TSAN_ATOMIC8_EXCHANGE)
>  };
>  
>  /* Instrument an atomic builtin.  */
> @@ -493,6 +504,8 @@ instrument_builtin_call (gimple_stmt_ite
>           if (!tree_fits_uhwi_p (last_arg)
>               || memmodel_base (tree_to_uhwi (last_arg)) >= MEMMODEL_LAST)
>             return;
> +         if (lookup_stmt_eh_lp (stmt))
> +           remove_stmt_from_eh_lp (stmt);

These changes look bogus to me -- how can the tsan instrumentation
function _not_ throw when the original function we replace it can?

It seems you are just avoiding the ICEs for now "wrong-code".  (and
how does this relate to -fnon-call-exceptions as both are calls?)

The instrument_expr case seems to leave the original stmt in-place
(and thus the EH).

Richard.

>           gimple_call_set_fndecl (stmt, decl);
>           update_stmt (stmt);
>           if (tsan_atomic_table[i].action == fetch_op)
> @@ -514,6 +527,8 @@ instrument_builtin_call (gimple_stmt_ite
>                                      != add_acquire
>                                      ? MEMMODEL_SEQ_CST
>                                      : MEMMODEL_ACQUIRE);
> +         if (lookup_stmt_eh_lp (stmt))
> +           remove_stmt_from_eh_lp (stmt);
>           update_gimple_call (gsi, decl, num + 1, args[0], args[1], args[2]);
>           stmt = gsi_stmt (*gsi);
>           if (tsan_atomic_table[i].action == fetch_op_seq_cst)
> @@ -561,6 +576,8 @@ instrument_builtin_call (gimple_stmt_ite
>           if (!tree_fits_uhwi_p (args[5])
>               || memmodel_base (tree_to_uhwi (args[5])) >= MEMMODEL_LAST)
>             return;
> +         if (lookup_stmt_eh_lp (stmt))
> +           remove_stmt_from_eh_lp (stmt);
>           update_gimple_call (gsi, decl, 5, args[0], args[1], args[2],
>                               args[4], args[5]);
>           return;
> @@ -584,6 +601,8 @@ instrument_builtin_call (gimple_stmt_ite
>           g = gimple_build_assign (t, args[1]);
>           gsi_insert_before (gsi, g, GSI_SAME_STMT);
>           lhs = gimple_call_lhs (stmt);
> +         if (lookup_stmt_eh_lp (stmt))
> +           remove_stmt_from_eh_lp (stmt);
>           update_gimple_call (gsi, decl, 5, args[0],
>                               build_fold_addr_expr (t), args[2],
>                               build_int_cst (NULL_TREE,
> @@ -610,11 +629,66 @@ instrument_builtin_call (gimple_stmt_ite
>           gcc_assert (num == 1);
>           t = TYPE_ARG_TYPES (TREE_TYPE (decl));
>           t = TREE_VALUE (TREE_CHAIN (t));
> +         if (lookup_stmt_eh_lp (stmt))
> +           remove_stmt_from_eh_lp (stmt);
>           update_gimple_call (gsi, decl, 3, gimple_call_arg (stmt, 0),
>                               build_int_cst (t, 0),
>                               build_int_cst (NULL_TREE,
>                                              MEMMODEL_RELEASE));
>           return;
> +       case bool_clear:
> +       case bool_test_and_set:
> +         if (BOOL_TYPE_SIZE != 8)
> +           {
> +             decl = NULL_TREE;
> +             for (j = 1; j < 5; j++)
> +               if (BOOL_TYPE_SIZE == (8 << j))
> +                 {
> +                   enum built_in_function tsan_fcode
> +                     = (enum built_in_function)
> +                       (tsan_atomic_table[i].tsan_fcode + j);
> +                   decl = builtin_decl_implicit (tsan_fcode);
> +                   break;
> +                 }
> +             if (decl == NULL_TREE)
> +               return;
> +           }
> +         last_arg = gimple_call_arg (stmt, num - 1);
> +         if (!tree_fits_uhwi_p (last_arg)
> +             || memmodel_base (tree_to_uhwi (last_arg)) >= MEMMODEL_LAST)
> +           return;
> +         t = TYPE_ARG_TYPES (TREE_TYPE (decl));
> +         t = TREE_VALUE (TREE_CHAIN (t));
> +         if (lookup_stmt_eh_lp (stmt))
> +           remove_stmt_from_eh_lp (stmt);
> +         if (tsan_atomic_table[i].action == bool_clear)
> +           {
> +             update_gimple_call (gsi, decl, 3, gimple_call_arg (stmt, 0),
> +                                 build_int_cst (t, 0), last_arg);
> +             return;
> +           }
> +         t = build_int_cst (t, targetm.atomic_test_and_set_trueval);
> +         update_gimple_call (gsi, decl, 3, gimple_call_arg (stmt, 0),
> +                             t, last_arg);
> +         stmt = gsi_stmt (*gsi);
> +         lhs = gimple_call_lhs (stmt);
> +         if (lhs == NULL_TREE)
> +           return;
> +         if (targetm.atomic_test_and_set_trueval != 1
> +             || !useless_type_conversion_p (TREE_TYPE (lhs),
> +                                            TREE_TYPE (t)))
> +           {
> +             tree new_lhs = make_ssa_name (TREE_TYPE (t));
> +             gimple_call_set_lhs (stmt, new_lhs);
> +             if (targetm.atomic_test_and_set_trueval != 1)
> +               g = gimple_build_assign (lhs, NE_EXPR, new_lhs,
> +                                        build_int_cst (TREE_TYPE (t), 0));
> +             else
> +               g = gimple_build_assign (lhs, NOP_EXPR, new_lhs);
> +             gsi_insert_after (gsi, g, GSI_NEW_STMT);
> +             update_stmt (stmt);
> +           }
> +         return;
>         default:
>           continue;
>         }
> @@ -706,7 +780,7 @@ instrument_func_exit (void)
>     Return true if func entry/exit should be instrumented.  */
>  
>  static bool
> -instrument_memory_accesses (void)
> +instrument_memory_accesses (unsigned int *ret)
>  {
>    basic_block bb;
>    gimple_stmt_iterator gsi;
> @@ -715,22 +789,26 @@ instrument_memory_accesses (void)
>    auto_vec<gimple *> tsan_func_exits;
>  
>    FOR_EACH_BB_FN (bb, cfun)
> -    for (gsi = gsi_start_bb (bb); !gsi_end_p (gsi); gsi_next (&gsi))
> -      {
> -     gimple *stmt = gsi_stmt (gsi);
> -     if (is_gimple_call (stmt)
> -         && gimple_call_internal_p (stmt)
> -         && gimple_call_internal_fn (stmt) == IFN_TSAN_FUNC_EXIT)
> -       {
> -         if (fentry_exit_instrument)
> -           replace_func_exit (stmt);
> -         else
> -           tsan_func_exits.safe_push (stmt);
> -         func_exit_seen = true;
> -       }
> -     else
> -       fentry_exit_instrument |= instrument_gimple (&gsi);
> -      }
> +    {
> +      for (gsi = gsi_start_bb (bb); !gsi_end_p (gsi); gsi_next (&gsi))
> +     {
> +       gimple *stmt = gsi_stmt (gsi);
> +       if (is_gimple_call (stmt)
> +           && gimple_call_internal_p (stmt)
> +           && gimple_call_internal_fn (stmt) == IFN_TSAN_FUNC_EXIT)
> +         {
> +           if (fentry_exit_instrument)
> +             replace_func_exit (stmt);
> +           else
> +             tsan_func_exits.safe_push (stmt);
> +           func_exit_seen = true;
> +         }
> +       else
> +         fentry_exit_instrument |= instrument_gimple (&gsi);
> +     }
> +      if (gimple_purge_dead_eh_edges (bb))
> +     *ret = TODO_cleanup_cfg;
> +    }
>    unsigned int i;
>    gimple *stmt;
>    FOR_EACH_VEC_ELT (tsan_func_exits, i, stmt)
> @@ -776,10 +854,11 @@ instrument_func_entry (void)
>  static unsigned
>  tsan_pass (void)
>  {
> +  unsigned int ret = 0;
>    initialize_sanitizer_builtins ();
> -  if (instrument_memory_accesses ())
> +  if (instrument_memory_accesses (&ret))
>      instrument_func_entry ();
> -  return 0;
> +  return ret;
>  }
>  
>  /* Inserts __tsan_init () into the list of CTORs.  */
> --- gcc/testsuite/c-c++-common/tsan/pr68260.c.jj      2016-09-06 
> 15:56:27.772209548 +0200
> +++ gcc/testsuite/c-c++-common/tsan/pr68260.c 2016-09-06 16:08:23.424203133 
> +0200
> @@ -0,0 +1,28 @@
> +/* PR sanitizer/68260 */
> +
> +#include <pthread.h>
> +#include <stdbool.h>
> +
> +bool lock;
> +int counter;
> +
> +void *
> +tf (void *arg)
> +{
> +  (void) arg;
> +  while (__atomic_test_and_set (&lock, __ATOMIC_ACQUIRE))
> +    ;
> +  ++counter;
> +  __atomic_clear (&lock, __ATOMIC_RELEASE);
> +  return (void *) 0;
> +}
> +
> +int
> +main ()
> +{
> +  pthread_t thr;
> +  pthread_create (&thr, 0, tf, 0);
> +  tf ((void *) 0);
> +  pthread_join (thr, 0);
> +  return 0;
> +}
> --- gcc/testsuite/g++.dg/tsan/pr68260.C.jj    2016-09-06 15:58:41.118530940 
> +0200
> +++ gcc/testsuite/g++.dg/tsan/pr68260.C       2016-09-06 16:03:11.988121144 
> +0200
> @@ -0,0 +1,19 @@
> +/* PR sanitizer/68260 */
> +/* { dg-do compile } */
> +/* { dg-additional-options "-fnon-call-exceptions" } */
> +
> +int
> +foo (bool *p, int *q)
> +{
> +  try
> +    {
> +      while (__atomic_test_and_set (p, __ATOMIC_ACQUIRE))
> +     ;
> +      __atomic_clear (p, __ATOMIC_RELEASE);
> +      return __sync_fetch_and_add_4 (q, 4);
> +    }
> +  catch (...)
> +    {
> +      return -1;
> +    }
> +}
> 
>       Jakub
> 
> 

-- 
Richard Biener <rguent...@suse.de>
SUSE LINUX GmbH, GF: Felix Imendoerffer, Jane Smithard, Graham Norton, HRB 
21284 (AG Nuernberg)

Reply via email to