tsan_interceptors.cc revision 39fa68e4076f6a86765ddc69c44bcecb804f0b53
1//===-- tsan_interceptors.cc ----------------------------------------------===// 2// 3// The LLVM Compiler Infrastructure 4// 5// This file is distributed under the University of Illinois Open Source 6// License. See LICENSE.TXT for details. 7// 8//===----------------------------------------------------------------------===// 9// 10// This file is a part of ThreadSanitizer (TSan), a race detector. 11// 12// FIXME: move as many interceptors as possible into 13// sanitizer_common/sanitizer_common_interceptors.inc 14//===----------------------------------------------------------------------===// 15 16#include "sanitizer_common/sanitizer_atomic.h" 17#include "sanitizer_common/sanitizer_libc.h" 18#include "sanitizer_common/sanitizer_linux.h" 19#include "sanitizer_common/sanitizer_platform_limits_posix.h" 20#include "sanitizer_common/sanitizer_placement_new.h" 21#include "sanitizer_common/sanitizer_stacktrace.h" 22#include "interception/interception.h" 23#include "tsan_interface.h" 24#include "tsan_platform.h" 25#include "tsan_rtl.h" 26#include "tsan_mman.h" 27#include "tsan_fd.h" 28 29using namespace __tsan; // NOLINT 30 31const int kSigCount = 64; 32 33struct my_siginfo_t { 34 // The size is determined by looking at sizeof of real siginfo_t on linux. 35 u64 opaque[128 / sizeof(u64)]; 36}; 37 38struct sigset_t { 39 // The size is determined by looking at sizeof of real sigset_t on linux. 40 u64 val[128 / sizeof(u64)]; 41}; 42 43struct ucontext_t { 44 // The size is determined by looking at sizeof of real ucontext_t on linux. 45 u64 opaque[936 / sizeof(u64) + 1]; 46}; 47 48extern "C" int pthread_attr_init(void *attr); 49extern "C" int pthread_attr_destroy(void *attr); 50extern "C" int pthread_attr_getdetachstate(void *attr, int *v); 51extern "C" int pthread_attr_setstacksize(void *attr, uptr stacksize); 52extern "C" int pthread_attr_getstacksize(void *attr, uptr *stacksize); 53extern "C" int pthread_key_create(unsigned *key, void (*destructor)(void* v)); 54extern "C" int pthread_setspecific(unsigned key, const void *v); 55extern "C" int pthread_mutexattr_gettype(void *a, int *type); 56extern "C" int pthread_yield(); 57extern "C" int pthread_sigmask(int how, const sigset_t *set, sigset_t *oldset); 58extern "C" int sigfillset(sigset_t *set); 59extern "C" void *pthread_self(); 60extern "C" void _exit(int status); 61extern "C" int *__errno_location(); 62extern "C" int fileno_unlocked(void *stream); 63extern "C" void *__libc_malloc(uptr size); 64extern "C" void *__libc_calloc(uptr size, uptr n); 65extern "C" void *__libc_realloc(void *ptr, uptr size); 66extern "C" void __libc_free(void *ptr); 67extern "C" int mallopt(int param, int value); 68const int PTHREAD_MUTEX_RECURSIVE = 1; 69const int PTHREAD_MUTEX_RECURSIVE_NP = 1; 70const int EINVAL = 22; 71const int EBUSY = 16; 72const int EPOLL_CTL_ADD = 1; 73const int SIGILL = 4; 74const int SIGABRT = 6; 75const int SIGFPE = 8; 76const int SIGSEGV = 11; 77const int SIGPIPE = 13; 78const int SIGBUS = 7; 79const int SIGSYS = 31; 80void *const MAP_FAILED = (void*)-1; 81const int PTHREAD_BARRIER_SERIAL_THREAD = -1; 82const int MAP_FIXED = 0x10; 83typedef long long_t; // NOLINT 84 85// From /usr/include/unistd.h 86# define F_ULOCK 0 /* Unlock a previously locked region. */ 87# define F_LOCK 1 /* Lock a region for exclusive use. */ 88# define F_TLOCK 2 /* Test and lock a region for exclusive use. */ 89# define F_TEST 3 /* Test a region for other processes locks. */ 90 91typedef void (*sighandler_t)(int sig); 92 93#define errno (*__errno_location()) 94 95struct sigaction_t { 96 union { 97 sighandler_t sa_handler; 98 void (*sa_sigaction)(int sig, my_siginfo_t *siginfo, void *uctx); 99 }; 100 sigset_t sa_mask; 101 int sa_flags; 102 void (*sa_restorer)(); 103}; 104 105const sighandler_t SIG_DFL = (sighandler_t)0; 106const sighandler_t SIG_IGN = (sighandler_t)1; 107const sighandler_t SIG_ERR = (sighandler_t)-1; 108const int SA_SIGINFO = 4; 109const int SIG_SETMASK = 2; 110 111namespace std { 112struct nothrow_t {}; 113} // namespace std 114 115static sigaction_t sigactions[kSigCount]; 116 117namespace __tsan { 118struct SignalDesc { 119 bool armed; 120 bool sigaction; 121 my_siginfo_t siginfo; 122 ucontext_t ctx; 123}; 124 125struct SignalContext { 126 int in_blocking_func; 127 int int_signal_send; 128 int pending_signal_count; 129 SignalDesc pending_signals[kSigCount]; 130}; 131 132// Used to ignore interceptors coming directly from libjvm.so. 133atomic_uintptr_t libjvm_begin; 134atomic_uintptr_t libjvm_end; 135 136static bool libjvm_check(uptr pc) { 137 uptr begin = atomic_load(&libjvm_begin, memory_order_relaxed); 138 if (begin != 0 && pc >= begin) { 139 uptr end = atomic_load(&libjvm_end, memory_order_relaxed); 140 if (end != 0 && pc < end) 141 return true; 142 } 143 return false; 144} 145 146} // namespace __tsan 147 148static SignalContext *SigCtx(ThreadState *thr) { 149 SignalContext *ctx = (SignalContext*)thr->signal_ctx; 150 if (ctx == 0 && thr->is_alive) { 151 ScopedInRtl in_rtl; 152 ctx = (SignalContext*)MmapOrDie(sizeof(*ctx), "SignalContext"); 153 MemoryResetRange(thr, (uptr)&SigCtx, (uptr)ctx, sizeof(*ctx)); 154 thr->signal_ctx = ctx; 155 } 156 return ctx; 157} 158 159static unsigned g_thread_finalize_key; 160 161class ScopedInterceptor { 162 public: 163 ScopedInterceptor(ThreadState *thr, const char *fname, uptr pc); 164 ~ScopedInterceptor(); 165 private: 166 ThreadState *const thr_; 167 const int in_rtl_; 168}; 169 170ScopedInterceptor::ScopedInterceptor(ThreadState *thr, const char *fname, 171 uptr pc) 172 : thr_(thr) 173 , in_rtl_(thr->in_rtl) { 174 if (thr_->in_rtl == 0) { 175 Initialize(thr); 176 FuncEntry(thr, pc); 177 thr_->in_rtl++; 178 DPrintf("#%d: intercept %s()\n", thr_->tid, fname); 179 } else { 180 thr_->in_rtl++; 181 } 182} 183 184ScopedInterceptor::~ScopedInterceptor() { 185 thr_->in_rtl--; 186 if (thr_->in_rtl == 0) { 187 FuncExit(thr_); 188 ProcessPendingSignals(thr_); 189 } 190 CHECK_EQ(in_rtl_, thr_->in_rtl); 191} 192 193#define SCOPED_INTERCEPTOR_RAW(func, ...) \ 194 ThreadState *thr = cur_thread(); \ 195 StatInc(thr, StatInterceptor); \ 196 StatInc(thr, StatInt_##func); \ 197 const uptr caller_pc = GET_CALLER_PC(); \ 198 ScopedInterceptor si(thr, #func, caller_pc); \ 199 const uptr pc = __sanitizer::StackTrace::GetCurrentPc(); \ 200 (void)pc; \ 201/**/ 202 203#define SCOPED_TSAN_INTERCEPTOR(func, ...) \ 204 SCOPED_INTERCEPTOR_RAW(func, __VA_ARGS__); \ 205 if (REAL(func) == 0) { \ 206 Printf("FATAL: ThreadSanitizer: failed to intercept %s\n", #func); \ 207 Die(); \ 208 } \ 209 if (thr->in_rtl > 1 || libjvm_check(pc)) \ 210 return REAL(func)(__VA_ARGS__); \ 211/**/ 212 213#define TSAN_INTERCEPTOR(ret, func, ...) INTERCEPTOR(ret, func, __VA_ARGS__) 214#define TSAN_INTERCEPT(func) INTERCEPT_FUNCTION(func) 215 216#define BLOCK_REAL(name) (BlockingCall(thr), REAL(name)) 217 218struct BlockingCall { 219 explicit BlockingCall(ThreadState *thr) 220 : ctx(SigCtx(thr)) { 221 ctx->in_blocking_func++; 222 } 223 224 ~BlockingCall() { 225 ctx->in_blocking_func--; 226 } 227 228 SignalContext *ctx; 229}; 230 231TSAN_INTERCEPTOR(unsigned, sleep, unsigned sec) { 232 SCOPED_TSAN_INTERCEPTOR(sleep, sec); 233 unsigned res = BLOCK_REAL(sleep)(sec); 234 AfterSleep(thr, pc); 235 return res; 236} 237 238TSAN_INTERCEPTOR(int, usleep, long_t usec) { 239 SCOPED_TSAN_INTERCEPTOR(usleep, usec); 240 int res = BLOCK_REAL(usleep)(usec); 241 AfterSleep(thr, pc); 242 return res; 243} 244 245TSAN_INTERCEPTOR(int, nanosleep, void *req, void *rem) { 246 SCOPED_TSAN_INTERCEPTOR(nanosleep, req, rem); 247 int res = BLOCK_REAL(nanosleep)(req, rem); 248 AfterSleep(thr, pc); 249 return res; 250} 251 252class AtExitContext { 253 public: 254 AtExitContext() 255 : mtx_(MutexTypeAtExit, StatMtxAtExit) 256 , pos_() { 257 } 258 259 typedef void(*atexit_t)(); 260 261 int atexit(ThreadState *thr, uptr pc, bool is_on_exit, 262 atexit_t f, void *arg) { 263 Lock l(&mtx_); 264 if (pos_ == kMaxAtExit) 265 return 1; 266 Release(thr, pc, (uptr)this); 267 stack_[pos_] = f; 268 args_[pos_] = arg; 269 is_on_exits_[pos_] = is_on_exit; 270 pos_++; 271 return 0; 272 } 273 274 void exit(ThreadState *thr, uptr pc) { 275 CHECK_EQ(thr->in_rtl, 0); 276 for (;;) { 277 atexit_t f = 0; 278 void *arg = 0; 279 bool is_on_exit = false; 280 { 281 Lock l(&mtx_); 282 if (pos_) { 283 pos_--; 284 f = stack_[pos_]; 285 arg = args_[pos_]; 286 is_on_exit = is_on_exits_[pos_]; 287 ScopedInRtl in_rtl; 288 Acquire(thr, pc, (uptr)this); 289 } 290 } 291 if (f == 0) 292 break; 293 DPrintf("#%d: executing atexit func %p\n", thr->tid, f); 294 CHECK_EQ(thr->in_rtl, 0); 295 if (is_on_exit) 296 ((void(*)(int status, void *arg))f)(0, arg); 297 else 298 ((void(*)(void *arg, void *dso))f)(arg, 0); 299 } 300 } 301 302 private: 303 static const int kMaxAtExit = 128; 304 Mutex mtx_; 305 atexit_t stack_[kMaxAtExit]; 306 void *args_[kMaxAtExit]; 307 bool is_on_exits_[kMaxAtExit]; 308 int pos_; 309}; 310 311static AtExitContext *atexit_ctx; 312 313TSAN_INTERCEPTOR(int, atexit, void (*f)()) { 314 if (cur_thread()->in_symbolizer) 315 return 0; 316 SCOPED_TSAN_INTERCEPTOR(atexit, f); 317 return atexit_ctx->atexit(thr, pc, false, (void(*)())f, 0); 318} 319 320TSAN_INTERCEPTOR(int, on_exit, void(*f)(int, void*), void *arg) { 321 if (cur_thread()->in_symbolizer) 322 return 0; 323 SCOPED_TSAN_INTERCEPTOR(on_exit, f, arg); 324 return atexit_ctx->atexit(thr, pc, true, (void(*)())f, arg); 325} 326 327TSAN_INTERCEPTOR(int, __cxa_atexit, void (*f)(void *a), void *arg, void *dso) { 328 if (cur_thread()->in_symbolizer) 329 return 0; 330 SCOPED_TSAN_INTERCEPTOR(__cxa_atexit, f, arg, dso); 331 if (dso) { 332 // Memory allocation in __cxa_atexit will race with free during exit, 333 // because we do not see synchronization around atexit callback list. 334 ThreadIgnoreBegin(thr); 335 int res = REAL(__cxa_atexit)(f, arg, dso); 336 ThreadIgnoreEnd(thr); 337 return res; 338 } 339 return atexit_ctx->atexit(thr, pc, false, (void(*)())f, arg); 340} 341 342// Cleanup old bufs. 343static void JmpBufGarbageCollect(ThreadState *thr, uptr sp) { 344 for (uptr i = 0; i < thr->jmp_bufs.Size(); i++) { 345 JmpBuf *buf = &thr->jmp_bufs[i]; 346 if (buf->sp <= sp) { 347 uptr sz = thr->jmp_bufs.Size(); 348 thr->jmp_bufs[i] = thr->jmp_bufs[sz - 1]; 349 thr->jmp_bufs.PopBack(); 350 i--; 351 } 352 } 353} 354 355static void SetJmp(ThreadState *thr, uptr sp, uptr mangled_sp) { 356 if (thr->shadow_stack_pos == 0) // called from libc guts during bootstrap 357 return; 358 // Cleanup old bufs. 359 JmpBufGarbageCollect(thr, sp); 360 // Remember the buf. 361 JmpBuf *buf = thr->jmp_bufs.PushBack(); 362 buf->sp = sp; 363 buf->mangled_sp = mangled_sp; 364 buf->shadow_stack_pos = thr->shadow_stack_pos; 365} 366 367static void LongJmp(ThreadState *thr, uptr *env) { 368 uptr mangled_sp = env[6]; 369 // Find the saved buf by mangled_sp. 370 for (uptr i = 0; i < thr->jmp_bufs.Size(); i++) { 371 JmpBuf *buf = &thr->jmp_bufs[i]; 372 if (buf->mangled_sp == mangled_sp) { 373 CHECK_GE(thr->shadow_stack_pos, buf->shadow_stack_pos); 374 // Unwind the stack. 375 while (thr->shadow_stack_pos > buf->shadow_stack_pos) 376 FuncExit(thr); 377 JmpBufGarbageCollect(thr, buf->sp - 1); // do not collect buf->sp 378 return; 379 } 380 } 381 Printf("ThreadSanitizer: can't find longjmp buf\n"); 382 CHECK(0); 383} 384 385// FIXME: put everything below into a common extern "C" block? 386extern "C" void __tsan_setjmp(uptr sp, uptr mangled_sp) { 387 ScopedInRtl in_rtl; 388 SetJmp(cur_thread(), sp, mangled_sp); 389} 390 391// Not called. Merely to satisfy TSAN_INTERCEPT(). 392extern "C" SANITIZER_INTERFACE_ATTRIBUTE 393int __interceptor_setjmp(void *env); 394extern "C" int __interceptor_setjmp(void *env) { 395 CHECK(0); 396 return 0; 397} 398 399// FIXME: any reason to have a separate declaration? 400extern "C" SANITIZER_INTERFACE_ATTRIBUTE 401int __interceptor__setjmp(void *env); 402extern "C" int __interceptor__setjmp(void *env) { 403 CHECK(0); 404 return 0; 405} 406 407extern "C" SANITIZER_INTERFACE_ATTRIBUTE 408int __interceptor_sigsetjmp(void *env); 409extern "C" int __interceptor_sigsetjmp(void *env) { 410 CHECK(0); 411 return 0; 412} 413 414extern "C" SANITIZER_INTERFACE_ATTRIBUTE 415int __interceptor___sigsetjmp(void *env); 416extern "C" int __interceptor___sigsetjmp(void *env) { 417 CHECK(0); 418 return 0; 419} 420 421extern "C" int setjmp(void *env); 422extern "C" int _setjmp(void *env); 423extern "C" int sigsetjmp(void *env); 424extern "C" int __sigsetjmp(void *env); 425DEFINE_REAL(int, setjmp, void *env) 426DEFINE_REAL(int, _setjmp, void *env) 427DEFINE_REAL(int, sigsetjmp, void *env) 428DEFINE_REAL(int, __sigsetjmp, void *env) 429 430TSAN_INTERCEPTOR(void, longjmp, uptr *env, int val) { 431 { 432 SCOPED_TSAN_INTERCEPTOR(longjmp, env, val); 433 } 434 LongJmp(cur_thread(), env); 435 REAL(longjmp)(env, val); 436} 437 438TSAN_INTERCEPTOR(void, siglongjmp, uptr *env, int val) { 439 { 440 SCOPED_TSAN_INTERCEPTOR(siglongjmp, env, val); 441 } 442 LongJmp(cur_thread(), env); 443 REAL(siglongjmp)(env, val); 444} 445 446TSAN_INTERCEPTOR(void*, malloc, uptr size) { 447 if (cur_thread()->in_symbolizer || libjvm_check(GET_CALLER_PC())) 448 return __libc_malloc(size); 449 void *p = 0; 450 { 451 SCOPED_INTERCEPTOR_RAW(malloc, size); 452 p = user_alloc(thr, pc, size); 453 } 454 invoke_malloc_hook(p, size); 455 return p; 456} 457 458TSAN_INTERCEPTOR(void*, __libc_memalign, uptr align, uptr sz) { 459 SCOPED_TSAN_INTERCEPTOR(__libc_memalign, align, sz); 460 return user_alloc(thr, pc, sz, align); 461} 462 463TSAN_INTERCEPTOR(void*, calloc, uptr size, uptr n) { 464 if (cur_thread()->in_symbolizer || libjvm_check(GET_CALLER_PC())) 465 return __libc_calloc(size, n); 466 if (__sanitizer::CallocShouldReturnNullDueToOverflow(size, n)) 467 return AllocatorReturnNull(); 468 void *p = 0; 469 { 470 SCOPED_INTERCEPTOR_RAW(calloc, size, n); 471 p = user_alloc(thr, pc, n * size); 472 if (p) 473 internal_memset(p, 0, n * size); 474 } 475 invoke_malloc_hook(p, n * size); 476 return p; 477} 478 479TSAN_INTERCEPTOR(void*, realloc, void *p, uptr size) { 480 if (cur_thread()->in_symbolizer || libjvm_check(GET_CALLER_PC())) 481 return __libc_realloc(p, size); 482 if (p) 483 invoke_free_hook(p); 484 { 485 SCOPED_INTERCEPTOR_RAW(realloc, p, size); 486 p = user_realloc(thr, pc, p, size); 487 } 488 invoke_malloc_hook(p, size); 489 return p; 490} 491 492TSAN_INTERCEPTOR(void, free, void *p) { 493 if (p == 0) 494 return; 495 if (cur_thread()->in_symbolizer || libjvm_check(GET_CALLER_PC())) 496 return __libc_free(p); 497 invoke_free_hook(p); 498 SCOPED_INTERCEPTOR_RAW(free, p); 499 user_free(thr, pc, p); 500} 501 502TSAN_INTERCEPTOR(void, cfree, void *p) { 503 if (p == 0) 504 return; 505 if (cur_thread()->in_symbolizer || libjvm_check(GET_CALLER_PC())) 506 return __libc_free(p); 507 invoke_free_hook(p); 508 SCOPED_INTERCEPTOR_RAW(cfree, p); 509 user_free(thr, pc, p); 510} 511 512TSAN_INTERCEPTOR(uptr, malloc_usable_size, void *p) { 513 SCOPED_INTERCEPTOR_RAW(malloc_usable_size, p); 514 if (libjvm_check(pc)) 515 return malloc_usable_size(p); 516 return user_alloc_usable_size(thr, pc, p); 517} 518 519#define OPERATOR_NEW_BODY(mangled_name) \ 520 if (cur_thread()->in_symbolizer || libjvm_check(GET_CALLER_PC())) \ 521 return __libc_malloc(size); \ 522 void *p = 0; \ 523 { \ 524 SCOPED_INTERCEPTOR_RAW(mangled_name, size); \ 525 p = user_alloc(thr, pc, size); \ 526 } \ 527 invoke_malloc_hook(p, size); \ 528 return p; 529 530SANITIZER_INTERFACE_ATTRIBUTE 531void *operator new(__sanitizer::uptr size); 532void *operator new(__sanitizer::uptr size) { 533 OPERATOR_NEW_BODY(_Znwm); 534} 535 536SANITIZER_INTERFACE_ATTRIBUTE 537void *operator new[](__sanitizer::uptr size); 538void *operator new[](__sanitizer::uptr size) { 539 OPERATOR_NEW_BODY(_Znam); 540} 541 542SANITIZER_INTERFACE_ATTRIBUTE 543void *operator new(__sanitizer::uptr size, std::nothrow_t const&); 544void *operator new(__sanitizer::uptr size, std::nothrow_t const&) { 545 OPERATOR_NEW_BODY(_ZnwmRKSt9nothrow_t); 546} 547 548SANITIZER_INTERFACE_ATTRIBUTE 549void *operator new[](__sanitizer::uptr size, std::nothrow_t const&); 550void *operator new[](__sanitizer::uptr size, std::nothrow_t const&) { 551 OPERATOR_NEW_BODY(_ZnamRKSt9nothrow_t); 552} 553 554#define OPERATOR_DELETE_BODY(mangled_name) \ 555 if (ptr == 0) return; \ 556 if (cur_thread()->in_symbolizer || libjvm_check(GET_CALLER_PC())) \ 557 return __libc_free(ptr); \ 558 invoke_free_hook(ptr); \ 559 SCOPED_INTERCEPTOR_RAW(mangled_name, ptr); \ 560 user_free(thr, pc, ptr); 561 562SANITIZER_INTERFACE_ATTRIBUTE 563void operator delete(void *ptr); 564void operator delete(void *ptr) { 565 OPERATOR_DELETE_BODY(_ZdlPv); 566} 567 568SANITIZER_INTERFACE_ATTRIBUTE 569void operator delete[](void *ptr); 570void operator delete[](void *ptr) { 571 OPERATOR_DELETE_BODY(_ZdlPvRKSt9nothrow_t); 572} 573 574SANITIZER_INTERFACE_ATTRIBUTE 575void operator delete(void *ptr, std::nothrow_t const&); 576void operator delete(void *ptr, std::nothrow_t const&) { 577 OPERATOR_DELETE_BODY(_ZdaPv); 578} 579 580SANITIZER_INTERFACE_ATTRIBUTE 581void operator delete[](void *ptr, std::nothrow_t const&); 582void operator delete[](void *ptr, std::nothrow_t const&) { 583 OPERATOR_DELETE_BODY(_ZdaPvRKSt9nothrow_t); 584} 585 586TSAN_INTERCEPTOR(uptr, strlen, const char *s) { 587 SCOPED_TSAN_INTERCEPTOR(strlen, s); 588 uptr len = internal_strlen(s); 589 MemoryAccessRange(thr, pc, (uptr)s, len + 1, false); 590 return len; 591} 592 593TSAN_INTERCEPTOR(void*, memset, void *dst, int v, uptr size) { 594 SCOPED_TSAN_INTERCEPTOR(memset, dst, v, size); 595 MemoryAccessRange(thr, pc, (uptr)dst, size, true); 596 return internal_memset(dst, v, size); 597} 598 599TSAN_INTERCEPTOR(void*, memcpy, void *dst, const void *src, uptr size) { 600 SCOPED_TSAN_INTERCEPTOR(memcpy, dst, src, size); 601 MemoryAccessRange(thr, pc, (uptr)dst, size, true); 602 MemoryAccessRange(thr, pc, (uptr)src, size, false); 603 return internal_memcpy(dst, src, size); 604} 605 606TSAN_INTERCEPTOR(int, memcmp, const void *s1, const void *s2, uptr n) { 607 SCOPED_TSAN_INTERCEPTOR(memcmp, s1, s2, n); 608 int res = 0; 609 uptr len = 0; 610 for (; len < n; len++) { 611 if ((res = ((unsigned char*)s1)[len] - ((unsigned char*)s2)[len])) 612 break; 613 } 614 MemoryAccessRange(thr, pc, (uptr)s1, len < n ? len + 1 : n, false); 615 MemoryAccessRange(thr, pc, (uptr)s2, len < n ? len + 1 : n, false); 616 return res; 617} 618 619TSAN_INTERCEPTOR(void*, memchr, void *s, int c, uptr n) { 620 SCOPED_TSAN_INTERCEPTOR(memchr, s, c, n); 621 void *res = REAL(memchr)(s, c, n); 622 uptr len = res ? (char*)res - (char*)s + 1 : n; 623 MemoryAccessRange(thr, pc, (uptr)s, len, false); 624 return res; 625} 626 627TSAN_INTERCEPTOR(void*, memrchr, char *s, int c, uptr n) { 628 SCOPED_TSAN_INTERCEPTOR(memrchr, s, c, n); 629 MemoryAccessRange(thr, pc, (uptr)s, n, false); 630 return REAL(memrchr)(s, c, n); 631} 632 633TSAN_INTERCEPTOR(void*, memmove, void *dst, void *src, uptr n) { 634 SCOPED_TSAN_INTERCEPTOR(memmove, dst, src, n); 635 MemoryAccessRange(thr, pc, (uptr)dst, n, true); 636 MemoryAccessRange(thr, pc, (uptr)src, n, false); 637 return REAL(memmove)(dst, src, n); 638} 639 640TSAN_INTERCEPTOR(char*, strchr, char *s, int c) { 641 SCOPED_TSAN_INTERCEPTOR(strchr, s, c); 642 char *res = REAL(strchr)(s, c); 643 uptr len = res ? (char*)res - (char*)s + 1 : internal_strlen(s) + 1; 644 MemoryAccessRange(thr, pc, (uptr)s, len, false); 645 return res; 646} 647 648TSAN_INTERCEPTOR(char*, strchrnul, char *s, int c) { 649 SCOPED_TSAN_INTERCEPTOR(strchrnul, s, c); 650 char *res = REAL(strchrnul)(s, c); 651 uptr len = (char*)res - (char*)s + 1; 652 MemoryAccessRange(thr, pc, (uptr)s, len, false); 653 return res; 654} 655 656TSAN_INTERCEPTOR(char*, strrchr, char *s, int c) { 657 SCOPED_TSAN_INTERCEPTOR(strrchr, s, c); 658 MemoryAccessRange(thr, pc, (uptr)s, internal_strlen(s) + 1, false); 659 return REAL(strrchr)(s, c); 660} 661 662TSAN_INTERCEPTOR(char*, strcpy, char *dst, const char *src) { // NOLINT 663 SCOPED_TSAN_INTERCEPTOR(strcpy, dst, src); // NOLINT 664 uptr srclen = internal_strlen(src); 665 MemoryAccessRange(thr, pc, (uptr)dst, srclen + 1, true); 666 MemoryAccessRange(thr, pc, (uptr)src, srclen + 1, false); 667 return REAL(strcpy)(dst, src); // NOLINT 668} 669 670TSAN_INTERCEPTOR(char*, strncpy, char *dst, char *src, uptr n) { 671 SCOPED_TSAN_INTERCEPTOR(strncpy, dst, src, n); 672 uptr srclen = internal_strnlen(src, n); 673 MemoryAccessRange(thr, pc, (uptr)dst, n, true); 674 MemoryAccessRange(thr, pc, (uptr)src, min(srclen + 1, n), false); 675 return REAL(strncpy)(dst, src, n); 676} 677 678TSAN_INTERCEPTOR(const char*, strstr, const char *s1, const char *s2) { 679 SCOPED_TSAN_INTERCEPTOR(strstr, s1, s2); 680 const char *res = REAL(strstr)(s1, s2); 681 uptr len1 = internal_strlen(s1); 682 uptr len2 = internal_strlen(s2); 683 MemoryAccessRange(thr, pc, (uptr)s1, len1 + 1, false); 684 MemoryAccessRange(thr, pc, (uptr)s2, len2 + 1, false); 685 return res; 686} 687 688TSAN_INTERCEPTOR(char*, strdup, const char *str) { 689 SCOPED_TSAN_INTERCEPTOR(strdup, str); 690 if (libjvm_check(pc)) { 691 // The memory must come from libc malloc, 692 // and we must not instrument accesses in this case. 693 uptr n = internal_strlen(str) + 1; 694 void *p = __libc_malloc(n); 695 if (p == 0) 696 return 0; 697 return (char*)internal_memcpy(p, str, n); 698 } 699 // strdup will call malloc, so no instrumentation is required here. 700 return REAL(strdup)(str); 701} 702 703static bool fix_mmap_addr(void **addr, long_t sz, int flags) { 704 if (*addr) { 705 if (!IsAppMem((uptr)*addr) || !IsAppMem((uptr)*addr + sz - 1)) { 706 if (flags & MAP_FIXED) { 707 errno = EINVAL; 708 return false; 709 } else { 710 *addr = 0; 711 } 712 } 713 } 714 return true; 715} 716 717TSAN_INTERCEPTOR(void*, mmap, void *addr, long_t sz, int prot, 718 int flags, int fd, unsigned off) { 719 SCOPED_TSAN_INTERCEPTOR(mmap, addr, sz, prot, flags, fd, off); 720 if (!fix_mmap_addr(&addr, sz, flags)) 721 return MAP_FAILED; 722 void *res = REAL(mmap)(addr, sz, prot, flags, fd, off); 723 if (res != MAP_FAILED) { 724 if (fd > 0) 725 FdAccess(thr, pc, fd); 726 MemoryRangeImitateWrite(thr, pc, (uptr)res, sz); 727 } 728 return res; 729} 730 731TSAN_INTERCEPTOR(void*, mmap64, void *addr, long_t sz, int prot, 732 int flags, int fd, u64 off) { 733 SCOPED_TSAN_INTERCEPTOR(mmap64, addr, sz, prot, flags, fd, off); 734 if (!fix_mmap_addr(&addr, sz, flags)) 735 return MAP_FAILED; 736 void *res = REAL(mmap64)(addr, sz, prot, flags, fd, off); 737 if (res != MAP_FAILED) { 738 if (fd > 0) 739 FdAccess(thr, pc, fd); 740 MemoryRangeImitateWrite(thr, pc, (uptr)res, sz); 741 } 742 return res; 743} 744 745TSAN_INTERCEPTOR(int, munmap, void *addr, long_t sz) { 746 SCOPED_TSAN_INTERCEPTOR(munmap, addr, sz); 747 DontNeedShadowFor((uptr)addr, sz); 748 int res = REAL(munmap)(addr, sz); 749 return res; 750} 751 752TSAN_INTERCEPTOR(void*, memalign, uptr align, uptr sz) { 753 SCOPED_TSAN_INTERCEPTOR(memalign, align, sz); 754 return user_alloc(thr, pc, sz, align); 755} 756 757TSAN_INTERCEPTOR(void*, valloc, uptr sz) { 758 SCOPED_TSAN_INTERCEPTOR(valloc, sz); 759 return user_alloc(thr, pc, sz, GetPageSizeCached()); 760} 761 762TSAN_INTERCEPTOR(void*, pvalloc, uptr sz) { 763 SCOPED_TSAN_INTERCEPTOR(pvalloc, sz); 764 sz = RoundUp(sz, GetPageSizeCached()); 765 return user_alloc(thr, pc, sz, GetPageSizeCached()); 766} 767 768TSAN_INTERCEPTOR(int, posix_memalign, void **memptr, uptr align, uptr sz) { 769 SCOPED_TSAN_INTERCEPTOR(posix_memalign, memptr, align, sz); 770 *memptr = user_alloc(thr, pc, sz, align); 771 return 0; 772} 773 774// Used in thread-safe function static initialization. 775extern "C" int INTERFACE_ATTRIBUTE __cxa_guard_acquire(atomic_uint32_t *g) { 776 SCOPED_INTERCEPTOR_RAW(__cxa_guard_acquire, g); 777 for (;;) { 778 u32 cmp = atomic_load(g, memory_order_acquire); 779 if (cmp == 0) { 780 if (atomic_compare_exchange_strong(g, &cmp, 1<<16, memory_order_relaxed)) 781 return 1; 782 } else if (cmp == 1) { 783 Acquire(thr, pc, (uptr)g); 784 return 0; 785 } else { 786 internal_sched_yield(); 787 } 788 } 789} 790 791extern "C" void INTERFACE_ATTRIBUTE __cxa_guard_release(atomic_uint32_t *g) { 792 SCOPED_INTERCEPTOR_RAW(__cxa_guard_release, g); 793 Release(thr, pc, (uptr)g); 794 atomic_store(g, 1, memory_order_release); 795} 796 797extern "C" void INTERFACE_ATTRIBUTE __cxa_guard_abort(atomic_uint32_t *g) { 798 SCOPED_INTERCEPTOR_RAW(__cxa_guard_abort, g); 799 atomic_store(g, 0, memory_order_relaxed); 800} 801 802static void thread_finalize(void *v) { 803 uptr iter = (uptr)v; 804 if (iter > 1) { 805 if (pthread_setspecific(g_thread_finalize_key, (void*)(iter - 1))) { 806 Printf("ThreadSanitizer: failed to set thread key\n"); 807 Die(); 808 } 809 return; 810 } 811 { 812 ScopedInRtl in_rtl; 813 ThreadState *thr = cur_thread(); 814 ThreadFinish(thr); 815 SignalContext *sctx = thr->signal_ctx; 816 if (sctx) { 817 thr->signal_ctx = 0; 818 UnmapOrDie(sctx, sizeof(*sctx)); 819 } 820 } 821} 822 823 824struct ThreadParam { 825 void* (*callback)(void *arg); 826 void *param; 827 atomic_uintptr_t tid; 828}; 829 830extern "C" void *__tsan_thread_start_func(void *arg) { 831 ThreadParam *p = (ThreadParam*)arg; 832 void* (*callback)(void *arg) = p->callback; 833 void *param = p->param; 834 int tid = 0; 835 { 836 ThreadState *thr = cur_thread(); 837 ScopedInRtl in_rtl; 838 if (pthread_setspecific(g_thread_finalize_key, (void*)4)) { 839 Printf("ThreadSanitizer: failed to set thread key\n"); 840 Die(); 841 } 842 while ((tid = atomic_load(&p->tid, memory_order_acquire)) == 0) 843 pthread_yield(); 844 atomic_store(&p->tid, 0, memory_order_release); 845 ThreadStart(thr, tid, GetTid()); 846 CHECK_EQ(thr->in_rtl, 1); 847 } 848 void *res = callback(param); 849 // Prevent the callback from being tail called, 850 // it mixes up stack traces. 851 volatile int foo = 42; 852 foo++; 853 return res; 854} 855 856TSAN_INTERCEPTOR(int, pthread_create, 857 void *th, void *attr, void *(*callback)(void*), void * param) { 858 SCOPED_TSAN_INTERCEPTOR(pthread_create, th, attr, callback, param); 859 __sanitizer_pthread_attr_t myattr; 860 if (attr == 0) { 861 pthread_attr_init(&myattr); 862 attr = &myattr; 863 } 864 int detached = 0; 865 pthread_attr_getdetachstate(attr, &detached); 866 867#if defined(TSAN_DEBUG_OUTPUT) 868 int verbosity = (TSAN_DEBUG_OUTPUT); 869#else 870 int verbosity = 0; 871#endif 872 AdjustStackSizeLinux(attr, verbosity); 873 874 ThreadParam p; 875 p.callback = callback; 876 p.param = param; 877 atomic_store(&p.tid, 0, memory_order_relaxed); 878 int res = REAL(pthread_create)(th, attr, __tsan_thread_start_func, &p); 879 if (res == 0) { 880 int tid = ThreadCreate(thr, pc, *(uptr*)th, detached); 881 CHECK_NE(tid, 0); 882 atomic_store(&p.tid, tid, memory_order_release); 883 while (atomic_load(&p.tid, memory_order_acquire) != 0) 884 pthread_yield(); 885 } 886 if (attr == &myattr) 887 pthread_attr_destroy(&myattr); 888 return res; 889} 890 891TSAN_INTERCEPTOR(int, pthread_join, void *th, void **ret) { 892 SCOPED_TSAN_INTERCEPTOR(pthread_join, th, ret); 893 int tid = ThreadTid(thr, pc, (uptr)th); 894 int res = BLOCK_REAL(pthread_join)(th, ret); 895 if (res == 0) { 896 ThreadJoin(thr, pc, tid); 897 } 898 return res; 899} 900 901TSAN_INTERCEPTOR(int, pthread_detach, void *th) { 902 SCOPED_TSAN_INTERCEPTOR(pthread_detach, th); 903 int tid = ThreadTid(thr, pc, (uptr)th); 904 int res = REAL(pthread_detach)(th); 905 if (res == 0) { 906 ThreadDetach(thr, pc, tid); 907 } 908 return res; 909} 910 911TSAN_INTERCEPTOR(int, pthread_mutex_init, void *m, void *a) { 912 SCOPED_TSAN_INTERCEPTOR(pthread_mutex_init, m, a); 913 int res = REAL(pthread_mutex_init)(m, a); 914 if (res == 0) { 915 bool recursive = false; 916 if (a) { 917 int type = 0; 918 if (pthread_mutexattr_gettype(a, &type) == 0) 919 recursive = (type == PTHREAD_MUTEX_RECURSIVE 920 || type == PTHREAD_MUTEX_RECURSIVE_NP); 921 } 922 MutexCreate(thr, pc, (uptr)m, false, recursive, false); 923 } 924 return res; 925} 926 927TSAN_INTERCEPTOR(int, pthread_mutex_destroy, void *m) { 928 SCOPED_TSAN_INTERCEPTOR(pthread_mutex_destroy, m); 929 int res = REAL(pthread_mutex_destroy)(m); 930 if (res == 0 || res == EBUSY) { 931 MutexDestroy(thr, pc, (uptr)m); 932 } 933 return res; 934} 935 936TSAN_INTERCEPTOR(int, pthread_mutex_lock, void *m) { 937 SCOPED_TSAN_INTERCEPTOR(pthread_mutex_lock, m); 938 int res = REAL(pthread_mutex_lock)(m); 939 if (res == 0) { 940 MutexLock(thr, pc, (uptr)m); 941 } 942 return res; 943} 944 945TSAN_INTERCEPTOR(int, pthread_mutex_trylock, void *m) { 946 SCOPED_TSAN_INTERCEPTOR(pthread_mutex_trylock, m); 947 int res = REAL(pthread_mutex_trylock)(m); 948 if (res == 0) { 949 MutexLock(thr, pc, (uptr)m); 950 } 951 return res; 952} 953 954TSAN_INTERCEPTOR(int, pthread_mutex_timedlock, void *m, void *abstime) { 955 SCOPED_TSAN_INTERCEPTOR(pthread_mutex_timedlock, m, abstime); 956 int res = REAL(pthread_mutex_timedlock)(m, abstime); 957 if (res == 0) { 958 MutexLock(thr, pc, (uptr)m); 959 } 960 return res; 961} 962 963TSAN_INTERCEPTOR(int, pthread_mutex_unlock, void *m) { 964 SCOPED_TSAN_INTERCEPTOR(pthread_mutex_unlock, m); 965 MutexUnlock(thr, pc, (uptr)m); 966 int res = REAL(pthread_mutex_unlock)(m); 967 return res; 968} 969 970TSAN_INTERCEPTOR(int, pthread_spin_init, void *m, int pshared) { 971 SCOPED_TSAN_INTERCEPTOR(pthread_spin_init, m, pshared); 972 int res = REAL(pthread_spin_init)(m, pshared); 973 if (res == 0) { 974 MutexCreate(thr, pc, (uptr)m, false, false, false); 975 } 976 return res; 977} 978 979TSAN_INTERCEPTOR(int, pthread_spin_destroy, void *m) { 980 SCOPED_TSAN_INTERCEPTOR(pthread_spin_destroy, m); 981 int res = REAL(pthread_spin_destroy)(m); 982 if (res == 0) { 983 MutexDestroy(thr, pc, (uptr)m); 984 } 985 return res; 986} 987 988TSAN_INTERCEPTOR(int, pthread_spin_lock, void *m) { 989 SCOPED_TSAN_INTERCEPTOR(pthread_spin_lock, m); 990 int res = REAL(pthread_spin_lock)(m); 991 if (res == 0) { 992 MutexLock(thr, pc, (uptr)m); 993 } 994 return res; 995} 996 997TSAN_INTERCEPTOR(int, pthread_spin_trylock, void *m) { 998 SCOPED_TSAN_INTERCEPTOR(pthread_spin_trylock, m); 999 int res = REAL(pthread_spin_trylock)(m); 1000 if (res == 0) { 1001 MutexLock(thr, pc, (uptr)m); 1002 } 1003 return res; 1004} 1005 1006TSAN_INTERCEPTOR(int, pthread_spin_unlock, void *m) { 1007 SCOPED_TSAN_INTERCEPTOR(pthread_spin_unlock, m); 1008 MutexUnlock(thr, pc, (uptr)m); 1009 int res = REAL(pthread_spin_unlock)(m); 1010 return res; 1011} 1012 1013TSAN_INTERCEPTOR(int, pthread_rwlock_init, void *m, void *a) { 1014 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_init, m, a); 1015 int res = REAL(pthread_rwlock_init)(m, a); 1016 if (res == 0) { 1017 MutexCreate(thr, pc, (uptr)m, true, false, false); 1018 } 1019 return res; 1020} 1021 1022TSAN_INTERCEPTOR(int, pthread_rwlock_destroy, void *m) { 1023 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_destroy, m); 1024 int res = REAL(pthread_rwlock_destroy)(m); 1025 if (res == 0) { 1026 MutexDestroy(thr, pc, (uptr)m); 1027 } 1028 return res; 1029} 1030 1031TSAN_INTERCEPTOR(int, pthread_rwlock_rdlock, void *m) { 1032 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_rdlock, m); 1033 int res = REAL(pthread_rwlock_rdlock)(m); 1034 if (res == 0) { 1035 MutexReadLock(thr, pc, (uptr)m); 1036 } 1037 return res; 1038} 1039 1040TSAN_INTERCEPTOR(int, pthread_rwlock_tryrdlock, void *m) { 1041 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_tryrdlock, m); 1042 int res = REAL(pthread_rwlock_tryrdlock)(m); 1043 if (res == 0) { 1044 MutexReadLock(thr, pc, (uptr)m); 1045 } 1046 return res; 1047} 1048 1049TSAN_INTERCEPTOR(int, pthread_rwlock_timedrdlock, void *m, void *abstime) { 1050 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_timedrdlock, m, abstime); 1051 int res = REAL(pthread_rwlock_timedrdlock)(m, abstime); 1052 if (res == 0) { 1053 MutexReadLock(thr, pc, (uptr)m); 1054 } 1055 return res; 1056} 1057 1058TSAN_INTERCEPTOR(int, pthread_rwlock_wrlock, void *m) { 1059 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_wrlock, m); 1060 int res = REAL(pthread_rwlock_wrlock)(m); 1061 if (res == 0) { 1062 MutexLock(thr, pc, (uptr)m); 1063 } 1064 return res; 1065} 1066 1067TSAN_INTERCEPTOR(int, pthread_rwlock_trywrlock, void *m) { 1068 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_trywrlock, m); 1069 int res = REAL(pthread_rwlock_trywrlock)(m); 1070 if (res == 0) { 1071 MutexLock(thr, pc, (uptr)m); 1072 } 1073 return res; 1074} 1075 1076TSAN_INTERCEPTOR(int, pthread_rwlock_timedwrlock, void *m, void *abstime) { 1077 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_timedwrlock, m, abstime); 1078 int res = REAL(pthread_rwlock_timedwrlock)(m, abstime); 1079 if (res == 0) { 1080 MutexLock(thr, pc, (uptr)m); 1081 } 1082 return res; 1083} 1084 1085TSAN_INTERCEPTOR(int, pthread_rwlock_unlock, void *m) { 1086 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_unlock, m); 1087 MutexReadOrWriteUnlock(thr, pc, (uptr)m); 1088 int res = REAL(pthread_rwlock_unlock)(m); 1089 return res; 1090} 1091 1092TSAN_INTERCEPTOR(int, pthread_cond_init, void *c, void *a) { 1093 SCOPED_TSAN_INTERCEPTOR(pthread_cond_init, c, a); 1094 MemoryWrite(thr, pc, (uptr)c, kSizeLog1); 1095 int res = REAL(pthread_cond_init)(c, a); 1096 return res; 1097} 1098 1099TSAN_INTERCEPTOR(int, pthread_cond_destroy, void *c) { 1100 SCOPED_TSAN_INTERCEPTOR(pthread_cond_destroy, c); 1101 MemoryWrite(thr, pc, (uptr)c, kSizeLog1); 1102 int res = REAL(pthread_cond_destroy)(c); 1103 return res; 1104} 1105 1106TSAN_INTERCEPTOR(int, pthread_cond_signal, void *c) { 1107 SCOPED_TSAN_INTERCEPTOR(pthread_cond_signal, c); 1108 MemoryRead(thr, pc, (uptr)c, kSizeLog1); 1109 int res = REAL(pthread_cond_signal)(c); 1110 return res; 1111} 1112 1113TSAN_INTERCEPTOR(int, pthread_cond_broadcast, void *c) { 1114 SCOPED_TSAN_INTERCEPTOR(pthread_cond_broadcast, c); 1115 MemoryRead(thr, pc, (uptr)c, kSizeLog1); 1116 int res = REAL(pthread_cond_broadcast)(c); 1117 return res; 1118} 1119 1120TSAN_INTERCEPTOR(int, pthread_cond_wait, void *c, void *m) { 1121 SCOPED_TSAN_INTERCEPTOR(pthread_cond_wait, c, m); 1122 MutexUnlock(thr, pc, (uptr)m); 1123 MemoryRead(thr, pc, (uptr)c, kSizeLog1); 1124 int res = REAL(pthread_cond_wait)(c, m); 1125 MutexLock(thr, pc, (uptr)m); 1126 return res; 1127} 1128 1129TSAN_INTERCEPTOR(int, pthread_cond_timedwait, void *c, void *m, 1130 void *abstime) { 1131 SCOPED_TSAN_INTERCEPTOR(pthread_cond_timedwait, c, m, abstime); 1132 MutexUnlock(thr, pc, (uptr)m); 1133 MemoryRead(thr, pc, (uptr)c, kSizeLog1); 1134 int res = REAL(pthread_cond_timedwait)(c, m, abstime); 1135 MutexLock(thr, pc, (uptr)m); 1136 return res; 1137} 1138 1139TSAN_INTERCEPTOR(int, pthread_barrier_init, void *b, void *a, unsigned count) { 1140 SCOPED_TSAN_INTERCEPTOR(pthread_barrier_init, b, a, count); 1141 MemoryWrite(thr, pc, (uptr)b, kSizeLog1); 1142 int res = REAL(pthread_barrier_init)(b, a, count); 1143 return res; 1144} 1145 1146TSAN_INTERCEPTOR(int, pthread_barrier_destroy, void *b) { 1147 SCOPED_TSAN_INTERCEPTOR(pthread_barrier_destroy, b); 1148 MemoryWrite(thr, pc, (uptr)b, kSizeLog1); 1149 int res = REAL(pthread_barrier_destroy)(b); 1150 return res; 1151} 1152 1153TSAN_INTERCEPTOR(int, pthread_barrier_wait, void *b) { 1154 SCOPED_TSAN_INTERCEPTOR(pthread_barrier_wait, b); 1155 Release(thr, pc, (uptr)b); 1156 MemoryRead(thr, pc, (uptr)b, kSizeLog1); 1157 int res = REAL(pthread_barrier_wait)(b); 1158 MemoryRead(thr, pc, (uptr)b, kSizeLog1); 1159 if (res == 0 || res == PTHREAD_BARRIER_SERIAL_THREAD) { 1160 Acquire(thr, pc, (uptr)b); 1161 } 1162 return res; 1163} 1164 1165TSAN_INTERCEPTOR(int, pthread_once, void *o, void (*f)()) { 1166 SCOPED_TSAN_INTERCEPTOR(pthread_once, o, f); 1167 if (o == 0 || f == 0) 1168 return EINVAL; 1169 atomic_uint32_t *a = static_cast<atomic_uint32_t*>(o); 1170 u32 v = atomic_load(a, memory_order_acquire); 1171 if (v == 0 && atomic_compare_exchange_strong(a, &v, 1, 1172 memory_order_relaxed)) { 1173 const int old_in_rtl = thr->in_rtl; 1174 thr->in_rtl = 0; 1175 (*f)(); 1176 CHECK_EQ(thr->in_rtl, 0); 1177 thr->in_rtl = old_in_rtl; 1178 Release(thr, pc, (uptr)o); 1179 atomic_store(a, 2, memory_order_release); 1180 } else { 1181 while (v != 2) { 1182 pthread_yield(); 1183 v = atomic_load(a, memory_order_acquire); 1184 } 1185 Acquire(thr, pc, (uptr)o); 1186 } 1187 return 0; 1188} 1189 1190TSAN_INTERCEPTOR(int, sem_init, void *s, int pshared, unsigned value) { 1191 SCOPED_TSAN_INTERCEPTOR(sem_init, s, pshared, value); 1192 int res = REAL(sem_init)(s, pshared, value); 1193 return res; 1194} 1195 1196TSAN_INTERCEPTOR(int, sem_destroy, void *s) { 1197 SCOPED_TSAN_INTERCEPTOR(sem_destroy, s); 1198 int res = REAL(sem_destroy)(s); 1199 return res; 1200} 1201 1202TSAN_INTERCEPTOR(int, sem_wait, void *s) { 1203 SCOPED_TSAN_INTERCEPTOR(sem_wait, s); 1204 int res = BLOCK_REAL(sem_wait)(s); 1205 if (res == 0) { 1206 Acquire(thr, pc, (uptr)s); 1207 } 1208 return res; 1209} 1210 1211TSAN_INTERCEPTOR(int, sem_trywait, void *s) { 1212 SCOPED_TSAN_INTERCEPTOR(sem_trywait, s); 1213 int res = BLOCK_REAL(sem_trywait)(s); 1214 if (res == 0) { 1215 Acquire(thr, pc, (uptr)s); 1216 } 1217 return res; 1218} 1219 1220TSAN_INTERCEPTOR(int, sem_timedwait, void *s, void *abstime) { 1221 SCOPED_TSAN_INTERCEPTOR(sem_timedwait, s, abstime); 1222 int res = BLOCK_REAL(sem_timedwait)(s, abstime); 1223 if (res == 0) { 1224 Acquire(thr, pc, (uptr)s); 1225 } 1226 return res; 1227} 1228 1229TSAN_INTERCEPTOR(int, sem_post, void *s) { 1230 SCOPED_TSAN_INTERCEPTOR(sem_post, s); 1231 Release(thr, pc, (uptr)s); 1232 int res = REAL(sem_post)(s); 1233 return res; 1234} 1235 1236TSAN_INTERCEPTOR(int, sem_getvalue, void *s, int *sval) { 1237 SCOPED_TSAN_INTERCEPTOR(sem_getvalue, s, sval); 1238 int res = REAL(sem_getvalue)(s, sval); 1239 if (res == 0) { 1240 Acquire(thr, pc, (uptr)s); 1241 } 1242 return res; 1243} 1244 1245TSAN_INTERCEPTOR(int, __xstat, int version, const char *path, void *buf) { 1246 SCOPED_TSAN_INTERCEPTOR(__xstat, version, path, buf); 1247 return REAL(__xstat)(version, path, buf); 1248} 1249 1250TSAN_INTERCEPTOR(int, stat, const char *path, void *buf) { 1251 SCOPED_TSAN_INTERCEPTOR(__xstat, 0, path, buf); 1252 return REAL(__xstat)(0, path, buf); 1253} 1254 1255TSAN_INTERCEPTOR(int, __xstat64, int version, const char *path, void *buf) { 1256 SCOPED_TSAN_INTERCEPTOR(__xstat64, version, path, buf); 1257 return REAL(__xstat64)(version, path, buf); 1258} 1259 1260TSAN_INTERCEPTOR(int, stat64, const char *path, void *buf) { 1261 SCOPED_TSAN_INTERCEPTOR(__xstat64, 0, path, buf); 1262 return REAL(__xstat64)(0, path, buf); 1263} 1264 1265TSAN_INTERCEPTOR(int, __lxstat, int version, const char *path, void *buf) { 1266 SCOPED_TSAN_INTERCEPTOR(__lxstat, version, path, buf); 1267 return REAL(__lxstat)(version, path, buf); 1268} 1269 1270TSAN_INTERCEPTOR(int, lstat, const char *path, void *buf) { 1271 SCOPED_TSAN_INTERCEPTOR(__lxstat, 0, path, buf); 1272 return REAL(__lxstat)(0, path, buf); 1273} 1274 1275TSAN_INTERCEPTOR(int, __lxstat64, int version, const char *path, void *buf) { 1276 SCOPED_TSAN_INTERCEPTOR(__lxstat64, version, path, buf); 1277 return REAL(__lxstat64)(version, path, buf); 1278} 1279 1280TSAN_INTERCEPTOR(int, lstat64, const char *path, void *buf) { 1281 SCOPED_TSAN_INTERCEPTOR(__lxstat64, 0, path, buf); 1282 return REAL(__lxstat64)(0, path, buf); 1283} 1284 1285TSAN_INTERCEPTOR(int, __fxstat, int version, int fd, void *buf) { 1286 SCOPED_TSAN_INTERCEPTOR(__fxstat, version, fd, buf); 1287 if (fd > 0) 1288 FdAccess(thr, pc, fd); 1289 return REAL(__fxstat)(version, fd, buf); 1290} 1291 1292TSAN_INTERCEPTOR(int, fstat, int fd, void *buf) { 1293 SCOPED_TSAN_INTERCEPTOR(__fxstat, 0, fd, buf); 1294 if (fd > 0) 1295 FdAccess(thr, pc, fd); 1296 return REAL(__fxstat)(0, fd, buf); 1297} 1298 1299TSAN_INTERCEPTOR(int, __fxstat64, int version, int fd, void *buf) { 1300 SCOPED_TSAN_INTERCEPTOR(__fxstat64, version, fd, buf); 1301 if (fd > 0) 1302 FdAccess(thr, pc, fd); 1303 return REAL(__fxstat64)(version, fd, buf); 1304} 1305 1306TSAN_INTERCEPTOR(int, fstat64, int fd, void *buf) { 1307 SCOPED_TSAN_INTERCEPTOR(__fxstat64, 0, fd, buf); 1308 if (fd > 0) 1309 FdAccess(thr, pc, fd); 1310 return REAL(__fxstat64)(0, fd, buf); 1311} 1312 1313TSAN_INTERCEPTOR(int, open, const char *name, int flags, int mode) { 1314 SCOPED_TSAN_INTERCEPTOR(open, name, flags, mode); 1315 int fd = REAL(open)(name, flags, mode); 1316 if (fd >= 0) 1317 FdFileCreate(thr, pc, fd); 1318 return fd; 1319} 1320 1321TSAN_INTERCEPTOR(int, open64, const char *name, int flags, int mode) { 1322 SCOPED_TSAN_INTERCEPTOR(open64, name, flags, mode); 1323 int fd = REAL(open64)(name, flags, mode); 1324 if (fd >= 0) 1325 FdFileCreate(thr, pc, fd); 1326 return fd; 1327} 1328 1329TSAN_INTERCEPTOR(int, creat, const char *name, int mode) { 1330 SCOPED_TSAN_INTERCEPTOR(creat, name, mode); 1331 int fd = REAL(creat)(name, mode); 1332 if (fd >= 0) 1333 FdFileCreate(thr, pc, fd); 1334 return fd; 1335} 1336 1337TSAN_INTERCEPTOR(int, creat64, const char *name, int mode) { 1338 SCOPED_TSAN_INTERCEPTOR(creat64, name, mode); 1339 int fd = REAL(creat64)(name, mode); 1340 if (fd >= 0) 1341 FdFileCreate(thr, pc, fd); 1342 return fd; 1343} 1344 1345TSAN_INTERCEPTOR(int, dup, int oldfd) { 1346 SCOPED_TSAN_INTERCEPTOR(dup, oldfd); 1347 int newfd = REAL(dup)(oldfd); 1348 if (oldfd >= 0 && newfd >= 0 && newfd != oldfd) 1349 FdDup(thr, pc, oldfd, newfd); 1350 return newfd; 1351} 1352 1353TSAN_INTERCEPTOR(int, dup2, int oldfd, int newfd) { 1354 SCOPED_TSAN_INTERCEPTOR(dup2, oldfd, newfd); 1355 int newfd2 = REAL(dup2)(oldfd, newfd); 1356 if (oldfd >= 0 && newfd2 >= 0 && newfd2 != oldfd) 1357 FdDup(thr, pc, oldfd, newfd2); 1358 return newfd2; 1359} 1360 1361TSAN_INTERCEPTOR(int, dup3, int oldfd, int newfd, int flags) { 1362 SCOPED_TSAN_INTERCEPTOR(dup3, oldfd, newfd, flags); 1363 int newfd2 = REAL(dup3)(oldfd, newfd, flags); 1364 if (oldfd >= 0 && newfd2 >= 0 && newfd2 != oldfd) 1365 FdDup(thr, pc, oldfd, newfd2); 1366 return newfd2; 1367} 1368 1369TSAN_INTERCEPTOR(int, eventfd, unsigned initval, int flags) { 1370 SCOPED_TSAN_INTERCEPTOR(eventfd, initval, flags); 1371 int fd = REAL(eventfd)(initval, flags); 1372 if (fd >= 0) 1373 FdEventCreate(thr, pc, fd); 1374 return fd; 1375} 1376 1377TSAN_INTERCEPTOR(int, signalfd, int fd, void *mask, int flags) { 1378 SCOPED_TSAN_INTERCEPTOR(signalfd, fd, mask, flags); 1379 if (fd >= 0) 1380 FdClose(thr, pc, fd); 1381 fd = REAL(signalfd)(fd, mask, flags); 1382 if (fd >= 0) 1383 FdSignalCreate(thr, pc, fd); 1384 return fd; 1385} 1386 1387TSAN_INTERCEPTOR(int, inotify_init, int fake) { 1388 SCOPED_TSAN_INTERCEPTOR(inotify_init, fake); 1389 int fd = REAL(inotify_init)(fake); 1390 if (fd >= 0) 1391 FdInotifyCreate(thr, pc, fd); 1392 return fd; 1393} 1394 1395TSAN_INTERCEPTOR(int, inotify_init1, int flags) { 1396 SCOPED_TSAN_INTERCEPTOR(inotify_init1, flags); 1397 int fd = REAL(inotify_init1)(flags); 1398 if (fd >= 0) 1399 FdInotifyCreate(thr, pc, fd); 1400 return fd; 1401} 1402 1403TSAN_INTERCEPTOR(int, socket, int domain, int type, int protocol) { 1404 SCOPED_TSAN_INTERCEPTOR(socket, domain, type, protocol); 1405 int fd = REAL(socket)(domain, type, protocol); 1406 if (fd >= 0) 1407 FdSocketCreate(thr, pc, fd); 1408 return fd; 1409} 1410 1411TSAN_INTERCEPTOR(int, socketpair, int domain, int type, int protocol, int *fd) { 1412 SCOPED_TSAN_INTERCEPTOR(socketpair, domain, type, protocol, fd); 1413 int res = REAL(socketpair)(domain, type, protocol, fd); 1414 if (res == 0 && fd[0] >= 0 && fd[1] >= 0) 1415 FdPipeCreate(thr, pc, fd[0], fd[1]); 1416 return res; 1417} 1418 1419TSAN_INTERCEPTOR(int, connect, int fd, void *addr, unsigned addrlen) { 1420 SCOPED_TSAN_INTERCEPTOR(connect, fd, addr, addrlen); 1421 FdSocketConnecting(thr, pc, fd); 1422 int res = REAL(connect)(fd, addr, addrlen); 1423 if (res == 0 && fd >= 0) 1424 FdSocketConnect(thr, pc, fd); 1425 return res; 1426} 1427 1428TSAN_INTERCEPTOR(int, bind, int fd, void *addr, unsigned addrlen) { 1429 SCOPED_TSAN_INTERCEPTOR(bind, fd, addr, addrlen); 1430 int res = REAL(bind)(fd, addr, addrlen); 1431 if (fd > 0 && res == 0) 1432 FdAccess(thr, pc, fd); 1433 return res; 1434} 1435 1436TSAN_INTERCEPTOR(int, listen, int fd, int backlog) { 1437 SCOPED_TSAN_INTERCEPTOR(listen, fd, backlog); 1438 int res = REAL(listen)(fd, backlog); 1439 if (fd > 0 && res == 0) 1440 FdAccess(thr, pc, fd); 1441 return res; 1442} 1443 1444TSAN_INTERCEPTOR(int, epoll_create, int size) { 1445 SCOPED_TSAN_INTERCEPTOR(epoll_create, size); 1446 int fd = REAL(epoll_create)(size); 1447 if (fd >= 0) 1448 FdPollCreate(thr, pc, fd); 1449 return fd; 1450} 1451 1452TSAN_INTERCEPTOR(int, epoll_create1, int flags) { 1453 SCOPED_TSAN_INTERCEPTOR(epoll_create1, flags); 1454 int fd = REAL(epoll_create1)(flags); 1455 if (fd >= 0) 1456 FdPollCreate(thr, pc, fd); 1457 return fd; 1458} 1459 1460TSAN_INTERCEPTOR(int, close, int fd) { 1461 SCOPED_TSAN_INTERCEPTOR(close, fd); 1462 if (fd >= 0) 1463 FdClose(thr, pc, fd); 1464 return REAL(close)(fd); 1465} 1466 1467TSAN_INTERCEPTOR(int, __close, int fd) { 1468 SCOPED_TSAN_INTERCEPTOR(__close, fd); 1469 if (fd >= 0) 1470 FdClose(thr, pc, fd); 1471 return REAL(__close)(fd); 1472} 1473 1474// glibc guts 1475TSAN_INTERCEPTOR(void, __res_iclose, void *state, bool free_addr) { 1476 SCOPED_TSAN_INTERCEPTOR(__res_iclose, state, free_addr); 1477 int fds[64]; 1478 int cnt = ExtractResolvFDs(state, fds, ARRAY_SIZE(fds)); 1479 for (int i = 0; i < cnt; i++) { 1480 if (fds[i] > 0) 1481 FdClose(thr, pc, fds[i]); 1482 } 1483 REAL(__res_iclose)(state, free_addr); 1484} 1485 1486TSAN_INTERCEPTOR(int, pipe, int *pipefd) { 1487 SCOPED_TSAN_INTERCEPTOR(pipe, pipefd); 1488 int res = REAL(pipe)(pipefd); 1489 if (res == 0 && pipefd[0] >= 0 && pipefd[1] >= 0) 1490 FdPipeCreate(thr, pc, pipefd[0], pipefd[1]); 1491 return res; 1492} 1493 1494TSAN_INTERCEPTOR(int, pipe2, int *pipefd, int flags) { 1495 SCOPED_TSAN_INTERCEPTOR(pipe2, pipefd, flags); 1496 int res = REAL(pipe2)(pipefd, flags); 1497 if (res == 0 && pipefd[0] >= 0 && pipefd[1] >= 0) 1498 FdPipeCreate(thr, pc, pipefd[0], pipefd[1]); 1499 return res; 1500} 1501 1502TSAN_INTERCEPTOR(long_t, send, int fd, void *buf, long_t len, int flags) { 1503 SCOPED_TSAN_INTERCEPTOR(send, fd, buf, len, flags); 1504 if (fd >= 0) 1505 FdRelease(thr, pc, fd); 1506 int res = REAL(send)(fd, buf, len, flags); 1507 return res; 1508} 1509 1510TSAN_INTERCEPTOR(long_t, sendmsg, int fd, void *msg, int flags) { 1511 SCOPED_TSAN_INTERCEPTOR(sendmsg, fd, msg, flags); 1512 if (fd >= 0) 1513 FdRelease(thr, pc, fd); 1514 int res = REAL(sendmsg)(fd, msg, flags); 1515 return res; 1516} 1517 1518TSAN_INTERCEPTOR(long_t, recv, int fd, void *buf, long_t len, int flags) { 1519 SCOPED_TSAN_INTERCEPTOR(recv, fd, buf, len, flags); 1520 int res = REAL(recv)(fd, buf, len, flags); 1521 if (res >= 0 && fd >= 0) { 1522 FdAcquire(thr, pc, fd); 1523 } 1524 return res; 1525} 1526 1527TSAN_INTERCEPTOR(int, unlink, char *path) { 1528 SCOPED_TSAN_INTERCEPTOR(unlink, path); 1529 Release(thr, pc, File2addr(path)); 1530 int res = REAL(unlink)(path); 1531 return res; 1532} 1533 1534TSAN_INTERCEPTOR(void*, fopen, char *path, char *mode) { 1535 SCOPED_TSAN_INTERCEPTOR(fopen, path, mode); 1536 void *res = REAL(fopen)(path, mode); 1537 Acquire(thr, pc, File2addr(path)); 1538 if (res) { 1539 int fd = fileno_unlocked(res); 1540 if (fd >= 0) 1541 FdFileCreate(thr, pc, fd); 1542 } 1543 return res; 1544} 1545 1546TSAN_INTERCEPTOR(void*, freopen, char *path, char *mode, void *stream) { 1547 SCOPED_TSAN_INTERCEPTOR(freopen, path, mode, stream); 1548 if (stream) { 1549 int fd = fileno_unlocked(stream); 1550 if (fd >= 0) 1551 FdClose(thr, pc, fd); 1552 } 1553 void *res = REAL(freopen)(path, mode, stream); 1554 Acquire(thr, pc, File2addr(path)); 1555 if (res) { 1556 int fd = fileno_unlocked(res); 1557 if (fd >= 0) 1558 FdFileCreate(thr, pc, fd); 1559 } 1560 return res; 1561} 1562 1563TSAN_INTERCEPTOR(int, fclose, void *stream) { 1564 { 1565 SCOPED_TSAN_INTERCEPTOR(fclose, stream); 1566 if (stream) { 1567 int fd = fileno_unlocked(stream); 1568 if (fd >= 0) 1569 FdClose(thr, pc, fd); 1570 } 1571 } 1572 return REAL(fclose)(stream); 1573} 1574 1575TSAN_INTERCEPTOR(uptr, fread, void *ptr, uptr size, uptr nmemb, void *f) { 1576 { 1577 SCOPED_TSAN_INTERCEPTOR(fread, ptr, size, nmemb, f); 1578 MemoryAccessRange(thr, pc, (uptr)ptr, size * nmemb, true); 1579 } 1580 return REAL(fread)(ptr, size, nmemb, f); 1581} 1582 1583TSAN_INTERCEPTOR(uptr, fwrite, const void *p, uptr size, uptr nmemb, void *f) { 1584 { 1585 SCOPED_TSAN_INTERCEPTOR(fwrite, p, size, nmemb, f); 1586 MemoryAccessRange(thr, pc, (uptr)p, size * nmemb, false); 1587 } 1588 return REAL(fwrite)(p, size, nmemb, f); 1589} 1590 1591TSAN_INTERCEPTOR(int, fflush, void *stream) { 1592 SCOPED_TSAN_INTERCEPTOR(fflush, stream); 1593 return REAL(fflush)(stream); 1594} 1595 1596TSAN_INTERCEPTOR(void, abort, int fake) { 1597 SCOPED_TSAN_INTERCEPTOR(abort, fake); 1598 REAL(fflush)(0); 1599 REAL(abort)(fake); 1600} 1601 1602TSAN_INTERCEPTOR(int, puts, const char *s) { 1603 SCOPED_TSAN_INTERCEPTOR(puts, s); 1604 MemoryAccessRange(thr, pc, (uptr)s, internal_strlen(s), false); 1605 return REAL(puts)(s); 1606} 1607 1608TSAN_INTERCEPTOR(int, rmdir, char *path) { 1609 SCOPED_TSAN_INTERCEPTOR(rmdir, path); 1610 Release(thr, pc, Dir2addr(path)); 1611 int res = REAL(rmdir)(path); 1612 return res; 1613} 1614 1615TSAN_INTERCEPTOR(void*, opendir, char *path) { 1616 SCOPED_TSAN_INTERCEPTOR(opendir, path); 1617 void *res = REAL(opendir)(path); 1618 if (res != 0) 1619 Acquire(thr, pc, Dir2addr(path)); 1620 return res; 1621} 1622 1623TSAN_INTERCEPTOR(int, epoll_ctl, int epfd, int op, int fd, void *ev) { 1624 SCOPED_TSAN_INTERCEPTOR(epoll_ctl, epfd, op, fd, ev); 1625 if (op == EPOLL_CTL_ADD && epfd >= 0) { 1626 FdRelease(thr, pc, epfd); 1627 } 1628 int res = REAL(epoll_ctl)(epfd, op, fd, ev); 1629 if (fd >= 0) 1630 FdAccess(thr, pc, fd); 1631 return res; 1632} 1633 1634TSAN_INTERCEPTOR(int, epoll_wait, int epfd, void *ev, int cnt, int timeout) { 1635 SCOPED_TSAN_INTERCEPTOR(epoll_wait, epfd, ev, cnt, timeout); 1636 int res = BLOCK_REAL(epoll_wait)(epfd, ev, cnt, timeout); 1637 if (res > 0 && epfd >= 0) { 1638 FdAcquire(thr, pc, epfd); 1639 } 1640 return res; 1641} 1642 1643void ALWAYS_INLINE rtl_generic_sighandler(bool sigact, int sig, 1644 my_siginfo_t *info, void *ctx) { 1645 ThreadState *thr = cur_thread(); 1646 SignalContext *sctx = SigCtx(thr); 1647 // Don't mess with synchronous signals. 1648 if (sig == SIGSEGV || sig == SIGBUS || sig == SIGILL || 1649 sig == SIGABRT || sig == SIGFPE || sig == SIGPIPE || sig == SIGSYS || 1650 // If we are sending signal to ourselves, we must process it now. 1651 (sctx && sig == sctx->int_signal_send) || 1652 // If we are in blocking function, we can safely process it now 1653 // (but check if we are in a recursive interceptor, 1654 // i.e. pthread_join()->munmap()). 1655 (sctx && sctx->in_blocking_func == 1 && thr->in_rtl == 1)) { 1656 int in_rtl = thr->in_rtl; 1657 thr->in_rtl = 0; 1658 CHECK_EQ(thr->in_signal_handler, false); 1659 thr->in_signal_handler = true; 1660 if (sigact) 1661 sigactions[sig].sa_sigaction(sig, info, ctx); 1662 else 1663 sigactions[sig].sa_handler(sig); 1664 CHECK_EQ(thr->in_signal_handler, true); 1665 thr->in_signal_handler = false; 1666 thr->in_rtl = in_rtl; 1667 return; 1668 } 1669 1670 if (sctx == 0) 1671 return; 1672 SignalDesc *signal = &sctx->pending_signals[sig]; 1673 if (signal->armed == false) { 1674 signal->armed = true; 1675 signal->sigaction = sigact; 1676 if (info) 1677 internal_memcpy(&signal->siginfo, info, sizeof(*info)); 1678 if (ctx) 1679 internal_memcpy(&signal->ctx, ctx, sizeof(signal->ctx)); 1680 sctx->pending_signal_count++; 1681 } 1682} 1683 1684static void rtl_sighandler(int sig) { 1685 rtl_generic_sighandler(false, sig, 0, 0); 1686} 1687 1688static void rtl_sigaction(int sig, my_siginfo_t *info, void *ctx) { 1689 rtl_generic_sighandler(true, sig, info, ctx); 1690} 1691 1692TSAN_INTERCEPTOR(int, sigaction, int sig, sigaction_t *act, sigaction_t *old) { 1693 SCOPED_TSAN_INTERCEPTOR(sigaction, sig, act, old); 1694 if (old) 1695 internal_memcpy(old, &sigactions[sig], sizeof(*old)); 1696 if (act == 0) 1697 return 0; 1698 internal_memcpy(&sigactions[sig], act, sizeof(*act)); 1699 sigaction_t newact; 1700 internal_memcpy(&newact, act, sizeof(newact)); 1701 sigfillset(&newact.sa_mask); 1702 if (act->sa_handler != SIG_IGN && act->sa_handler != SIG_DFL) { 1703 if (newact.sa_flags & SA_SIGINFO) 1704 newact.sa_sigaction = rtl_sigaction; 1705 else 1706 newact.sa_handler = rtl_sighandler; 1707 } 1708 int res = REAL(sigaction)(sig, &newact, 0); 1709 return res; 1710} 1711 1712TSAN_INTERCEPTOR(sighandler_t, signal, int sig, sighandler_t h) { 1713 sigaction_t act; 1714 act.sa_handler = h; 1715 REAL(memset)(&act.sa_mask, -1, sizeof(act.sa_mask)); 1716 act.sa_flags = 0; 1717 sigaction_t old; 1718 int res = sigaction(sig, &act, &old); 1719 if (res) 1720 return SIG_ERR; 1721 return old.sa_handler; 1722} 1723 1724TSAN_INTERCEPTOR(int, sigsuspend, const sigset_t *mask) { 1725 SCOPED_TSAN_INTERCEPTOR(sigsuspend, mask); 1726 return REAL(sigsuspend)(mask); 1727} 1728 1729TSAN_INTERCEPTOR(int, raise, int sig) { 1730 SCOPED_TSAN_INTERCEPTOR(raise, sig); 1731 SignalContext *sctx = SigCtx(thr); 1732 CHECK_NE(sctx, 0); 1733 int prev = sctx->int_signal_send; 1734 sctx->int_signal_send = sig; 1735 int res = REAL(raise)(sig); 1736 CHECK_EQ(sctx->int_signal_send, sig); 1737 sctx->int_signal_send = prev; 1738 return res; 1739} 1740 1741TSAN_INTERCEPTOR(int, kill, int pid, int sig) { 1742 SCOPED_TSAN_INTERCEPTOR(kill, pid, sig); 1743 SignalContext *sctx = SigCtx(thr); 1744 CHECK_NE(sctx, 0); 1745 int prev = sctx->int_signal_send; 1746 if (pid == (int)internal_getpid()) { 1747 sctx->int_signal_send = sig; 1748 } 1749 int res = REAL(kill)(pid, sig); 1750 if (pid == (int)internal_getpid()) { 1751 CHECK_EQ(sctx->int_signal_send, sig); 1752 sctx->int_signal_send = prev; 1753 } 1754 return res; 1755} 1756 1757TSAN_INTERCEPTOR(int, pthread_kill, void *tid, int sig) { 1758 SCOPED_TSAN_INTERCEPTOR(pthread_kill, tid, sig); 1759 SignalContext *sctx = SigCtx(thr); 1760 CHECK_NE(sctx, 0); 1761 int prev = sctx->int_signal_send; 1762 if (tid == pthread_self()) { 1763 sctx->int_signal_send = sig; 1764 } 1765 int res = REAL(pthread_kill)(tid, sig); 1766 if (tid == pthread_self()) { 1767 CHECK_EQ(sctx->int_signal_send, sig); 1768 sctx->int_signal_send = prev; 1769 } 1770 return res; 1771} 1772 1773TSAN_INTERCEPTOR(int, gettimeofday, void *tv, void *tz) { 1774 SCOPED_TSAN_INTERCEPTOR(gettimeofday, tv, tz); 1775 // It's intercepted merely to process pending signals. 1776 return REAL(gettimeofday)(tv, tz); 1777} 1778 1779TSAN_INTERCEPTOR(int, getaddrinfo, void *node, void *service, 1780 void *hints, void *rv) { 1781 SCOPED_TSAN_INTERCEPTOR(getaddrinfo, node, service, hints, rv); 1782 // We miss atomic synchronization in getaddrinfo, 1783 // and can report false race between malloc and free 1784 // inside of getaddrinfo. So ignore memory accesses. 1785 ThreadIgnoreBegin(thr); 1786 // getaddrinfo calls fopen, which can be intercepted by user. 1787 thr->in_rtl--; 1788 CHECK_EQ(thr->in_rtl, 0); 1789 int res = REAL(getaddrinfo)(node, service, hints, rv); 1790 thr->in_rtl++; 1791 ThreadIgnoreEnd(thr); 1792 return res; 1793} 1794 1795// Linux kernel has a bug that leads to kernel deadlock if a process 1796// maps TBs of memory and then calls mlock(). 1797static void MlockIsUnsupported() { 1798 static atomic_uint8_t printed; 1799 if (atomic_exchange(&printed, 1, memory_order_relaxed)) 1800 return; 1801 if (flags()->verbosity > 0) 1802 Printf("INFO: ThreadSanitizer ignores mlock/mlockall/munlock/munlockall\n"); 1803} 1804 1805TSAN_INTERCEPTOR(int, mlock, const void *addr, uptr len) { 1806 MlockIsUnsupported(); 1807 return 0; 1808} 1809 1810TSAN_INTERCEPTOR(int, munlock, const void *addr, uptr len) { 1811 MlockIsUnsupported(); 1812 return 0; 1813} 1814 1815TSAN_INTERCEPTOR(int, mlockall, int flags) { 1816 MlockIsUnsupported(); 1817 return 0; 1818} 1819 1820TSAN_INTERCEPTOR(int, munlockall, void) { 1821 MlockIsUnsupported(); 1822 return 0; 1823} 1824 1825TSAN_INTERCEPTOR(int, fork, int fake) { 1826 SCOPED_TSAN_INTERCEPTOR(fork, fake); 1827 int pid = REAL(fork)(fake); 1828 if (pid == 0) { 1829 // child 1830 FdOnFork(thr, pc); 1831 } else if (pid > 0) { 1832 // parent 1833 } 1834 return pid; 1835} 1836 1837struct TsanInterceptorContext { 1838 ThreadState *thr; 1839 const uptr caller_pc; 1840 const uptr pc; 1841}; 1842 1843#include "sanitizer_common/sanitizer_platform_interceptors.h" 1844// Causes interceptor recursion (getpwuid_r() calls fopen()) 1845#undef SANITIZER_INTERCEPT_GETPWNAM_AND_FRIENDS 1846#undef SANITIZER_INTERCEPT_GETPWNAM_R_AND_FRIENDS 1847// Causes interceptor recursion (getaddrinfo() and fopen()) 1848#undef SANITIZER_INTERCEPT_GETADDRINFO 1849#undef SANITIZER_INTERCEPT_GETNAMEINFO 1850// Causes interceptor recursion (glob64() calls lstat64()) 1851#undef SANITIZER_INTERCEPT_GLOB 1852 1853#define COMMON_INTERCEPTOR_UNPOISON_PARAM(ctx, count) \ 1854 do { \ 1855 } while (false) 1856#define COMMON_INTERCEPTOR_WRITE_RANGE(ctx, ptr, size) \ 1857 MemoryAccessRange(((TsanInterceptorContext *)ctx)->thr, \ 1858 ((TsanInterceptorContext *)ctx)->pc, (uptr)ptr, size, \ 1859 true) 1860#define COMMON_INTERCEPTOR_READ_RANGE(ctx, ptr, size) \ 1861 MemoryAccessRange(((TsanInterceptorContext *) ctx)->thr, \ 1862 ((TsanInterceptorContext *) ctx)->pc, (uptr) ptr, size, \ 1863 false) 1864#define COMMON_INTERCEPTOR_ENTER(ctx, func, ...) \ 1865 SCOPED_TSAN_INTERCEPTOR(func, __VA_ARGS__); \ 1866 TsanInterceptorContext _ctx = {thr, caller_pc, pc}; \ 1867 ctx = (void *)&_ctx; \ 1868 (void) ctx; 1869#define COMMON_INTERCEPTOR_FD_ACQUIRE(ctx, fd) \ 1870 FdAcquire(((TsanInterceptorContext *) ctx)->thr, pc, fd) 1871#define COMMON_INTERCEPTOR_FD_RELEASE(ctx, fd) \ 1872 FdRelease(((TsanInterceptorContext *) ctx)->thr, pc, fd) 1873#define COMMON_INTERCEPTOR_FD_SOCKET_ACCEPT(ctx, fd, newfd) \ 1874 FdSocketAccept(((TsanInterceptorContext *) ctx)->thr, pc, fd, newfd) 1875#define COMMON_INTERCEPTOR_SET_THREAD_NAME(ctx, name) \ 1876 ThreadSetName(((TsanInterceptorContext *) ctx)->thr, name) 1877#define COMMON_INTERCEPTOR_BLOCK_REAL(name) BLOCK_REAL(name) 1878#include "sanitizer_common/sanitizer_common_interceptors.inc" 1879 1880#define TSAN_SYSCALL() \ 1881 ThreadState *thr = cur_thread(); \ 1882 ScopedSyscall scoped_syscall(thr) \ 1883/**/ 1884 1885struct ScopedSyscall { 1886 ThreadState *thr; 1887 1888 explicit ScopedSyscall(ThreadState *thr) 1889 : thr(thr) { 1890 if (thr->in_rtl == 0) 1891 Initialize(thr); 1892 thr->in_rtl++; 1893 } 1894 1895 ~ScopedSyscall() { 1896 thr->in_rtl--; 1897 if (thr->in_rtl == 0) 1898 ProcessPendingSignals(thr); 1899 } 1900}; 1901 1902static void syscall_access_range(uptr pc, uptr p, uptr s, bool write) { 1903 TSAN_SYSCALL(); 1904 MemoryAccessRange(thr, pc, p, s, write); 1905} 1906 1907static void syscall_fd_close(uptr pc, int fd) { 1908 TSAN_SYSCALL(); 1909 if (fd >= 0) 1910 FdClose(thr, pc, fd); 1911} 1912 1913static void syscall_pre_fork(uptr pc) { 1914 TSAN_SYSCALL(); 1915} 1916 1917static void syscall_post_fork(uptr pc, int res) { 1918 TSAN_SYSCALL(); 1919 if (res == 0) { 1920 // child 1921 FdOnFork(thr, pc); 1922 } else if (res > 0) { 1923 // parent 1924 } 1925} 1926 1927#define COMMON_SYSCALL_PRE_READ_RANGE(p, s) \ 1928 syscall_access_range(GET_CALLER_PC(), (uptr)(p), (uptr)(s), false) 1929#define COMMON_SYSCALL_PRE_WRITE_RANGE(p, s) \ 1930 syscall_access_range(GET_CALLER_PC(), (uptr)(p), (uptr)(s), true) 1931#define COMMON_SYSCALL_POST_READ_RANGE(p, s) \ 1932 do { } while (false) 1933#define COMMON_SYSCALL_POST_WRITE_RANGE(p, s) \ 1934 do { } while (false) 1935#define COMMON_SYSCALL_FD_CLOSE(fd) \ 1936 syscall_fd_close(GET_CALLER_PC(), fd) 1937#define COMMON_SYSCALL_PRE_FORK() \ 1938 syscall_pre_fork(GET_CALLER_PC()) 1939#define COMMON_SYSCALL_POST_FORK(res) \ 1940 syscall_post_fork(GET_CALLER_PC(), res) 1941#include "sanitizer_common/sanitizer_common_syscalls.inc" 1942 1943namespace __tsan { 1944 1945void ProcessPendingSignals(ThreadState *thr) { 1946 CHECK_EQ(thr->in_rtl, 0); 1947 SignalContext *sctx = SigCtx(thr); 1948 if (sctx == 0 || sctx->pending_signal_count == 0 || thr->in_signal_handler) 1949 return; 1950 Context *ctx = CTX(); 1951 thr->in_signal_handler = true; 1952 sctx->pending_signal_count = 0; 1953 // These are too big for stack. 1954 static THREADLOCAL sigset_t emptyset, oldset; 1955 sigfillset(&emptyset); 1956 pthread_sigmask(SIG_SETMASK, &emptyset, &oldset); 1957 for (int sig = 0; sig < kSigCount; sig++) { 1958 SignalDesc *signal = &sctx->pending_signals[sig]; 1959 if (signal->armed) { 1960 signal->armed = false; 1961 if (sigactions[sig].sa_handler != SIG_DFL 1962 && sigactions[sig].sa_handler != SIG_IGN) { 1963 // Insure that the handler does not spoil errno. 1964 const int saved_errno = errno; 1965 errno = 0; 1966 if (signal->sigaction) 1967 sigactions[sig].sa_sigaction(sig, &signal->siginfo, &signal->ctx); 1968 else 1969 sigactions[sig].sa_handler(sig); 1970 if (flags()->report_bugs && errno != 0) { 1971 ScopedInRtl in_rtl; 1972 __tsan::StackTrace stack; 1973 uptr pc = signal->sigaction ? 1974 (uptr)sigactions[sig].sa_sigaction : 1975 (uptr)sigactions[sig].sa_handler; 1976 pc += 1; // return address is expected, OutputReport() will undo this 1977 stack.Init(&pc, 1); 1978 ThreadRegistryLock l(ctx->thread_registry); 1979 ScopedReport rep(ReportTypeErrnoInSignal); 1980 if (!IsFiredSuppression(ctx, rep, stack)) { 1981 rep.AddStack(&stack); 1982 OutputReport(ctx, rep, rep.GetReport()->stacks[0]); 1983 } 1984 } 1985 errno = saved_errno; 1986 } 1987 } 1988 } 1989 pthread_sigmask(SIG_SETMASK, &oldset, 0); 1990 CHECK_EQ(thr->in_signal_handler, true); 1991 thr->in_signal_handler = false; 1992} 1993 1994static void finalize(void *arg) { 1995 ThreadState * thr = cur_thread(); 1996 uptr pc = 0; 1997 atexit_ctx->exit(thr, pc); 1998 int status = Finalize(cur_thread()); 1999 REAL(fflush)(0); 2000 if (status) 2001 _exit(status); 2002} 2003 2004static void unreachable() { 2005 Printf("FATAL: ThreadSanitizer: unreachable called\n"); 2006 Die(); 2007} 2008 2009void InitializeInterceptors() { 2010 CHECK_GT(cur_thread()->in_rtl, 0); 2011 2012 // We need to setup it early, because functions like dlsym() can call it. 2013 REAL(memset) = internal_memset; 2014 REAL(memcpy) = internal_memcpy; 2015 REAL(memcmp) = internal_memcmp; 2016 2017 // Instruct libc malloc to consume less memory. 2018 mallopt(1, 0); // M_MXFAST 2019 mallopt(-3, 32*1024); // M_MMAP_THRESHOLD 2020 2021 SANITIZER_COMMON_INTERCEPTORS_INIT; 2022 2023 TSAN_INTERCEPT(setjmp); 2024 TSAN_INTERCEPT(_setjmp); 2025 TSAN_INTERCEPT(sigsetjmp); 2026 TSAN_INTERCEPT(__sigsetjmp); 2027 TSAN_INTERCEPT(longjmp); 2028 TSAN_INTERCEPT(siglongjmp); 2029 2030 TSAN_INTERCEPT(malloc); 2031 TSAN_INTERCEPT(__libc_memalign); 2032 TSAN_INTERCEPT(calloc); 2033 TSAN_INTERCEPT(realloc); 2034 TSAN_INTERCEPT(free); 2035 TSAN_INTERCEPT(cfree); 2036 TSAN_INTERCEPT(mmap); 2037 TSAN_INTERCEPT(mmap64); 2038 TSAN_INTERCEPT(munmap); 2039 TSAN_INTERCEPT(memalign); 2040 TSAN_INTERCEPT(valloc); 2041 TSAN_INTERCEPT(pvalloc); 2042 TSAN_INTERCEPT(posix_memalign); 2043 2044 TSAN_INTERCEPT(strlen); 2045 TSAN_INTERCEPT(memset); 2046 TSAN_INTERCEPT(memcpy); 2047 TSAN_INTERCEPT(memchr); 2048 TSAN_INTERCEPT(memrchr); 2049 TSAN_INTERCEPT(memmove); 2050 TSAN_INTERCEPT(memcmp); 2051 TSAN_INTERCEPT(strchr); 2052 TSAN_INTERCEPT(strchrnul); 2053 TSAN_INTERCEPT(strrchr); 2054 TSAN_INTERCEPT(strcpy); // NOLINT 2055 TSAN_INTERCEPT(strncpy); 2056 TSAN_INTERCEPT(strstr); 2057 TSAN_INTERCEPT(strdup); 2058 2059 TSAN_INTERCEPT(pthread_create); 2060 TSAN_INTERCEPT(pthread_join); 2061 TSAN_INTERCEPT(pthread_detach); 2062 2063 TSAN_INTERCEPT(pthread_mutex_init); 2064 TSAN_INTERCEPT(pthread_mutex_destroy); 2065 TSAN_INTERCEPT(pthread_mutex_lock); 2066 TSAN_INTERCEPT(pthread_mutex_trylock); 2067 TSAN_INTERCEPT(pthread_mutex_timedlock); 2068 TSAN_INTERCEPT(pthread_mutex_unlock); 2069 2070 TSAN_INTERCEPT(pthread_spin_init); 2071 TSAN_INTERCEPT(pthread_spin_destroy); 2072 TSAN_INTERCEPT(pthread_spin_lock); 2073 TSAN_INTERCEPT(pthread_spin_trylock); 2074 TSAN_INTERCEPT(pthread_spin_unlock); 2075 2076 TSAN_INTERCEPT(pthread_rwlock_init); 2077 TSAN_INTERCEPT(pthread_rwlock_destroy); 2078 TSAN_INTERCEPT(pthread_rwlock_rdlock); 2079 TSAN_INTERCEPT(pthread_rwlock_tryrdlock); 2080 TSAN_INTERCEPT(pthread_rwlock_timedrdlock); 2081 TSAN_INTERCEPT(pthread_rwlock_wrlock); 2082 TSAN_INTERCEPT(pthread_rwlock_trywrlock); 2083 TSAN_INTERCEPT(pthread_rwlock_timedwrlock); 2084 TSAN_INTERCEPT(pthread_rwlock_unlock); 2085 2086 INTERCEPT_FUNCTION_VER(pthread_cond_init, GLIBC_2.3.2); 2087 INTERCEPT_FUNCTION_VER(pthread_cond_destroy, GLIBC_2.3.2); 2088 INTERCEPT_FUNCTION_VER(pthread_cond_signal, GLIBC_2.3.2); 2089 INTERCEPT_FUNCTION_VER(pthread_cond_broadcast, GLIBC_2.3.2); 2090 INTERCEPT_FUNCTION_VER(pthread_cond_wait, GLIBC_2.3.2); 2091 INTERCEPT_FUNCTION_VER(pthread_cond_timedwait, GLIBC_2.3.2); 2092 2093 TSAN_INTERCEPT(pthread_barrier_init); 2094 TSAN_INTERCEPT(pthread_barrier_destroy); 2095 TSAN_INTERCEPT(pthread_barrier_wait); 2096 2097 TSAN_INTERCEPT(pthread_once); 2098 2099 TSAN_INTERCEPT(sem_init); 2100 TSAN_INTERCEPT(sem_destroy); 2101 TSAN_INTERCEPT(sem_wait); 2102 TSAN_INTERCEPT(sem_trywait); 2103 TSAN_INTERCEPT(sem_timedwait); 2104 TSAN_INTERCEPT(sem_post); 2105 TSAN_INTERCEPT(sem_getvalue); 2106 2107 TSAN_INTERCEPT(stat); 2108 TSAN_INTERCEPT(__xstat); 2109 TSAN_INTERCEPT(stat64); 2110 TSAN_INTERCEPT(__xstat64); 2111 TSAN_INTERCEPT(lstat); 2112 TSAN_INTERCEPT(__lxstat); 2113 TSAN_INTERCEPT(lstat64); 2114 TSAN_INTERCEPT(__lxstat64); 2115 TSAN_INTERCEPT(fstat); 2116 TSAN_INTERCEPT(__fxstat); 2117 TSAN_INTERCEPT(fstat64); 2118 TSAN_INTERCEPT(__fxstat64); 2119 TSAN_INTERCEPT(open); 2120 TSAN_INTERCEPT(open64); 2121 TSAN_INTERCEPT(creat); 2122 TSAN_INTERCEPT(creat64); 2123 TSAN_INTERCEPT(dup); 2124 TSAN_INTERCEPT(dup2); 2125 TSAN_INTERCEPT(dup3); 2126 TSAN_INTERCEPT(eventfd); 2127 TSAN_INTERCEPT(signalfd); 2128 TSAN_INTERCEPT(inotify_init); 2129 TSAN_INTERCEPT(inotify_init1); 2130 TSAN_INTERCEPT(socket); 2131 TSAN_INTERCEPT(socketpair); 2132 TSAN_INTERCEPT(connect); 2133 TSAN_INTERCEPT(bind); 2134 TSAN_INTERCEPT(listen); 2135 TSAN_INTERCEPT(epoll_create); 2136 TSAN_INTERCEPT(epoll_create1); 2137 TSAN_INTERCEPT(close); 2138 TSAN_INTERCEPT(__close); 2139 TSAN_INTERCEPT(__res_iclose); 2140 TSAN_INTERCEPT(pipe); 2141 TSAN_INTERCEPT(pipe2); 2142 2143 TSAN_INTERCEPT(send); 2144 TSAN_INTERCEPT(sendmsg); 2145 TSAN_INTERCEPT(recv); 2146 2147 TSAN_INTERCEPT(unlink); 2148 TSAN_INTERCEPT(fopen); 2149 TSAN_INTERCEPT(freopen); 2150 TSAN_INTERCEPT(fclose); 2151 TSAN_INTERCEPT(fread); 2152 TSAN_INTERCEPT(fwrite); 2153 TSAN_INTERCEPT(fflush); 2154 TSAN_INTERCEPT(abort); 2155 TSAN_INTERCEPT(puts); 2156 TSAN_INTERCEPT(rmdir); 2157 TSAN_INTERCEPT(opendir); 2158 2159 TSAN_INTERCEPT(epoll_ctl); 2160 TSAN_INTERCEPT(epoll_wait); 2161 2162 TSAN_INTERCEPT(sigaction); 2163 TSAN_INTERCEPT(signal); 2164 TSAN_INTERCEPT(sigsuspend); 2165 TSAN_INTERCEPT(raise); 2166 TSAN_INTERCEPT(kill); 2167 TSAN_INTERCEPT(pthread_kill); 2168 TSAN_INTERCEPT(sleep); 2169 TSAN_INTERCEPT(usleep); 2170 TSAN_INTERCEPT(nanosleep); 2171 TSAN_INTERCEPT(gettimeofday); 2172 TSAN_INTERCEPT(getaddrinfo); 2173 2174 TSAN_INTERCEPT(mlock); 2175 TSAN_INTERCEPT(munlock); 2176 TSAN_INTERCEPT(mlockall); 2177 TSAN_INTERCEPT(munlockall); 2178 2179 TSAN_INTERCEPT(fork); 2180 TSAN_INTERCEPT(on_exit); 2181 TSAN_INTERCEPT(__cxa_atexit); 2182 2183 // Need to setup it, because interceptors check that the function is resolved. 2184 // But atexit is emitted directly into the module, so can't be resolved. 2185 REAL(atexit) = (int(*)(void(*)()))unreachable; 2186 atexit_ctx = new(internal_alloc(MBlockAtExit, sizeof(AtExitContext))) 2187 AtExitContext(); 2188 2189 if (REAL(__cxa_atexit)(&finalize, 0, 0)) { 2190 Printf("ThreadSanitizer: failed to setup atexit callback\n"); 2191 Die(); 2192 } 2193 2194 if (pthread_key_create(&g_thread_finalize_key, &thread_finalize)) { 2195 Printf("ThreadSanitizer: failed to create thread key\n"); 2196 Die(); 2197 } 2198 2199 FdInit(); 2200} 2201 2202void internal_start_thread(void(*func)(void *arg), void *arg) { 2203 void *th; 2204 REAL(pthread_create)(&th, 0, (void*(*)(void *arg))func, arg); 2205 REAL(pthread_detach)(th); 2206} 2207 2208} // namespace __tsan 2209