tsan_interceptors.cc revision 67f5544391c338411b0006bda7dc1b852bbdd4fb
1//===-- tsan_interceptors.cc ----------------------------------------------===// 2// 3// The LLVM Compiler Infrastructure 4// 5// This file is distributed under the University of Illinois Open Source 6// License. See LICENSE.TXT for details. 7// 8//===----------------------------------------------------------------------===// 9// 10// This file is a part of ThreadSanitizer (TSan), a race detector. 11// 12// FIXME: move as many interceptors as possible into 13// sanitizer_common/sanitizer_common_interceptors.inc 14//===----------------------------------------------------------------------===// 15 16#include "sanitizer_common/sanitizer_atomic.h" 17#include "sanitizer_common/sanitizer_libc.h" 18#include "sanitizer_common/sanitizer_linux.h" 19#include "sanitizer_common/sanitizer_platform_limits_posix.h" 20#include "sanitizer_common/sanitizer_placement_new.h" 21#include "sanitizer_common/sanitizer_stacktrace.h" 22#include "interception/interception.h" 23#include "tsan_interface.h" 24#include "tsan_platform.h" 25#include "tsan_suppressions.h" 26#include "tsan_rtl.h" 27#include "tsan_mman.h" 28#include "tsan_fd.h" 29 30using namespace __tsan; // NOLINT 31 32const int kSigCount = 64; 33 34struct my_siginfo_t { 35 // The size is determined by looking at sizeof of real siginfo_t on linux. 36 u64 opaque[128 / sizeof(u64)]; 37}; 38 39struct ucontext_t { 40 // The size is determined by looking at sizeof of real ucontext_t on linux. 41 u64 opaque[936 / sizeof(u64) + 1]; 42}; 43 44extern "C" int pthread_attr_init(void *attr); 45extern "C" int pthread_attr_destroy(void *attr); 46extern "C" int pthread_attr_getdetachstate(void *attr, int *v); 47extern "C" int pthread_attr_setstacksize(void *attr, uptr stacksize); 48extern "C" int pthread_attr_getstacksize(void *attr, uptr *stacksize); 49extern "C" int pthread_key_create(unsigned *key, void (*destructor)(void* v)); 50extern "C" int pthread_setspecific(unsigned key, const void *v); 51extern "C" int pthread_mutexattr_gettype(void *a, int *type); 52extern "C" int pthread_yield(); 53extern "C" int pthread_sigmask(int how, const __sanitizer_sigset_t *set, 54 __sanitizer_sigset_t *oldset); 55// REAL(sigfillset) defined in common interceptors. 56DECLARE_REAL(int, sigfillset, __sanitizer_sigset_t *set) 57extern "C" void *pthread_self(); 58extern "C" void _exit(int status); 59extern "C" int *__errno_location(); 60extern "C" int fileno_unlocked(void *stream); 61extern "C" void *__libc_malloc(uptr size); 62extern "C" void *__libc_calloc(uptr size, uptr n); 63extern "C" void *__libc_realloc(void *ptr, uptr size); 64extern "C" void __libc_free(void *ptr); 65extern "C" int mallopt(int param, int value); 66const int PTHREAD_MUTEX_RECURSIVE = 1; 67const int PTHREAD_MUTEX_RECURSIVE_NP = 1; 68const int EINVAL = 22; 69const int EBUSY = 16; 70const int EPOLL_CTL_ADD = 1; 71const int SIGILL = 4; 72const int SIGABRT = 6; 73const int SIGFPE = 8; 74const int SIGSEGV = 11; 75const int SIGPIPE = 13; 76const int SIGBUS = 7; 77const int SIGSYS = 31; 78void *const MAP_FAILED = (void*)-1; 79const int PTHREAD_BARRIER_SERIAL_THREAD = -1; 80const int MAP_FIXED = 0x10; 81typedef long long_t; // NOLINT 82 83// From /usr/include/unistd.h 84# define F_ULOCK 0 /* Unlock a previously locked region. */ 85# define F_LOCK 1 /* Lock a region for exclusive use. */ 86# define F_TLOCK 2 /* Test and lock a region for exclusive use. */ 87# define F_TEST 3 /* Test a region for other processes locks. */ 88 89typedef void (*sighandler_t)(int sig); 90 91#define errno (*__errno_location()) 92 93struct sigaction_t { 94 union { 95 sighandler_t sa_handler; 96 void (*sa_sigaction)(int sig, my_siginfo_t *siginfo, void *uctx); 97 }; 98 __sanitizer_sigset_t sa_mask; 99 int sa_flags; 100 void (*sa_restorer)(); 101}; 102 103const sighandler_t SIG_DFL = (sighandler_t)0; 104const sighandler_t SIG_IGN = (sighandler_t)1; 105const sighandler_t SIG_ERR = (sighandler_t)-1; 106const int SA_SIGINFO = 4; 107const int SIG_SETMASK = 2; 108 109namespace std { 110struct nothrow_t {}; 111} // namespace std 112 113static sigaction_t sigactions[kSigCount]; 114 115namespace __tsan { 116struct SignalDesc { 117 bool armed; 118 bool sigaction; 119 my_siginfo_t siginfo; 120 ucontext_t ctx; 121}; 122 123struct SignalContext { 124 int in_blocking_func; 125 int int_signal_send; 126 int pending_signal_count; 127 SignalDesc pending_signals[kSigCount]; 128}; 129 130// The object is 64-byte aligned, because we want hot data to be located in 131// a single cache line if possible (it's accessed in every interceptor). 132static ALIGNED(64) char libignore_placeholder[sizeof(LibIgnore)]; 133static LibIgnore *libignore() { 134 return reinterpret_cast<LibIgnore*>(&libignore_placeholder[0]); 135} 136 137void InitializeLibIgnore() { 138 libignore()->Init(*GetSuppressionContext()); 139 libignore()->OnLibraryLoaded(); 140} 141 142} // namespace __tsan 143 144static SignalContext *SigCtx(ThreadState *thr) { 145 SignalContext *ctx = (SignalContext*)thr->signal_ctx; 146 if (ctx == 0 && thr->is_alive) { 147 ScopedInRtl in_rtl; 148 ctx = (SignalContext*)MmapOrDie(sizeof(*ctx), "SignalContext"); 149 MemoryResetRange(thr, (uptr)&SigCtx, (uptr)ctx, sizeof(*ctx)); 150 thr->signal_ctx = ctx; 151 } 152 return ctx; 153} 154 155static unsigned g_thread_finalize_key; 156 157class ScopedInterceptor { 158 public: 159 ScopedInterceptor(ThreadState *thr, const char *fname, uptr pc); 160 ~ScopedInterceptor(); 161 private: 162 ThreadState *const thr_; 163 const int in_rtl_; 164 bool in_ignored_lib_; 165}; 166 167ScopedInterceptor::ScopedInterceptor(ThreadState *thr, const char *fname, 168 uptr pc) 169 : thr_(thr) 170 , in_rtl_(thr->in_rtl) 171 , in_ignored_lib_(false) { 172 if (thr_->in_rtl == 0) { 173 Initialize(thr); 174 FuncEntry(thr, pc); 175 thr_->in_rtl++; 176 DPrintf("#%d: intercept %s()\n", thr_->tid, fname); 177 } else { 178 thr_->in_rtl++; 179 } 180 if (!thr_->in_ignored_lib && libignore()->IsIgnored(pc)) { 181 in_ignored_lib_ = true; 182 thr_->in_ignored_lib = true; 183 ThreadIgnoreBegin(thr_); 184 } 185} 186 187ScopedInterceptor::~ScopedInterceptor() { 188 if (in_ignored_lib_) { 189 thr_->in_ignored_lib = false; 190 ThreadIgnoreEnd(thr_); 191 } 192 thr_->in_rtl--; 193 if (thr_->in_rtl == 0) { 194 FuncExit(thr_); 195 ProcessPendingSignals(thr_); 196 } 197 CHECK_EQ(in_rtl_, thr_->in_rtl); 198} 199 200#define SCOPED_INTERCEPTOR_RAW(func, ...) \ 201 ThreadState *thr = cur_thread(); \ 202 StatInc(thr, StatInterceptor); \ 203 StatInc(thr, StatInt_##func); \ 204 const uptr caller_pc = GET_CALLER_PC(); \ 205 ScopedInterceptor si(thr, #func, caller_pc); \ 206 const uptr pc = __sanitizer::StackTrace::GetCurrentPc(); \ 207 (void)pc; \ 208/**/ 209 210#define SCOPED_TSAN_INTERCEPTOR(func, ...) \ 211 SCOPED_INTERCEPTOR_RAW(func, __VA_ARGS__); \ 212 if (REAL(func) == 0) { \ 213 Printf("FATAL: ThreadSanitizer: failed to intercept %s\n", #func); \ 214 Die(); \ 215 } \ 216 if (thr->in_rtl > 1 || thr->in_ignored_lib) \ 217 return REAL(func)(__VA_ARGS__); \ 218/**/ 219 220#define TSAN_INTERCEPTOR(ret, func, ...) INTERCEPTOR(ret, func, __VA_ARGS__) 221#define TSAN_INTERCEPT(func) INTERCEPT_FUNCTION(func) 222 223#define BLOCK_REAL(name) (BlockingCall(thr), REAL(name)) 224 225struct BlockingCall { 226 explicit BlockingCall(ThreadState *thr) 227 : ctx(SigCtx(thr)) { 228 ctx->in_blocking_func++; 229 } 230 231 ~BlockingCall() { 232 ctx->in_blocking_func--; 233 } 234 235 SignalContext *ctx; 236}; 237 238TSAN_INTERCEPTOR(unsigned, sleep, unsigned sec) { 239 SCOPED_TSAN_INTERCEPTOR(sleep, sec); 240 unsigned res = BLOCK_REAL(sleep)(sec); 241 AfterSleep(thr, pc); 242 return res; 243} 244 245TSAN_INTERCEPTOR(int, usleep, long_t usec) { 246 SCOPED_TSAN_INTERCEPTOR(usleep, usec); 247 int res = BLOCK_REAL(usleep)(usec); 248 AfterSleep(thr, pc); 249 return res; 250} 251 252TSAN_INTERCEPTOR(int, nanosleep, void *req, void *rem) { 253 SCOPED_TSAN_INTERCEPTOR(nanosleep, req, rem); 254 int res = BLOCK_REAL(nanosleep)(req, rem); 255 AfterSleep(thr, pc); 256 return res; 257} 258 259TSAN_INTERCEPTOR(void*, dlopen, const char *filename, int flag) { 260 SCOPED_INTERCEPTOR_RAW(dlopen, filename, flag); 261 // dlopen will execute global constructors, so it must be not in rtl. 262 CHECK_EQ(thr->in_rtl, 1); 263 thr->in_rtl = 0; 264 void *res = REAL(dlopen)(filename, flag); 265 thr->in_rtl = 1; 266 libignore()->OnLibraryLoaded(); 267 return res; 268} 269 270TSAN_INTERCEPTOR(int, dlclose, void *handle) { 271 SCOPED_INTERCEPTOR_RAW(dlclose, handle); 272 // dlclose will execute global destructors, so it must be not in rtl. 273 CHECK_EQ(thr->in_rtl, 1); 274 thr->in_rtl = 0; 275 int res = REAL(dlclose)(handle); 276 thr->in_rtl = 1; 277 libignore()->OnLibraryUnloaded(); 278 return res; 279} 280 281class AtExitContext { 282 public: 283 AtExitContext() 284 : mtx_(MutexTypeAtExit, StatMtxAtExit) 285 , pos_() { 286 } 287 288 typedef void(*atexit_t)(); 289 290 int atexit(ThreadState *thr, uptr pc, bool is_on_exit, 291 atexit_t f, void *arg) { 292 Lock l(&mtx_); 293 if (pos_ == kMaxAtExit) 294 return 1; 295 Release(thr, pc, (uptr)this); 296 stack_[pos_] = f; 297 args_[pos_] = arg; 298 is_on_exits_[pos_] = is_on_exit; 299 pos_++; 300 return 0; 301 } 302 303 void exit(ThreadState *thr, uptr pc) { 304 CHECK_EQ(thr->in_rtl, 0); 305 for (;;) { 306 atexit_t f = 0; 307 void *arg = 0; 308 bool is_on_exit = false; 309 { 310 Lock l(&mtx_); 311 if (pos_) { 312 pos_--; 313 f = stack_[pos_]; 314 arg = args_[pos_]; 315 is_on_exit = is_on_exits_[pos_]; 316 ScopedInRtl in_rtl; 317 Acquire(thr, pc, (uptr)this); 318 } 319 } 320 if (f == 0) 321 break; 322 DPrintf("#%d: executing atexit func %p\n", thr->tid, f); 323 CHECK_EQ(thr->in_rtl, 0); 324 if (is_on_exit) 325 ((void(*)(int status, void *arg))f)(0, arg); 326 else 327 ((void(*)(void *arg, void *dso))f)(arg, 0); 328 } 329 } 330 331 private: 332 static const int kMaxAtExit = 128; 333 Mutex mtx_; 334 atexit_t stack_[kMaxAtExit]; 335 void *args_[kMaxAtExit]; 336 bool is_on_exits_[kMaxAtExit]; 337 int pos_; 338}; 339 340static AtExitContext *atexit_ctx; 341 342TSAN_INTERCEPTOR(int, atexit, void (*f)()) { 343 if (cur_thread()->in_symbolizer) 344 return 0; 345 SCOPED_TSAN_INTERCEPTOR(atexit, f); 346 return atexit_ctx->atexit(thr, pc, false, (void(*)())f, 0); 347} 348 349TSAN_INTERCEPTOR(int, on_exit, void(*f)(int, void*), void *arg) { 350 if (cur_thread()->in_symbolizer) 351 return 0; 352 SCOPED_TSAN_INTERCEPTOR(on_exit, f, arg); 353 return atexit_ctx->atexit(thr, pc, true, (void(*)())f, arg); 354} 355 356TSAN_INTERCEPTOR(int, __cxa_atexit, void (*f)(void *a), void *arg, void *dso) { 357 if (cur_thread()->in_symbolizer) 358 return 0; 359 SCOPED_TSAN_INTERCEPTOR(__cxa_atexit, f, arg, dso); 360 if (dso) { 361 // Memory allocation in __cxa_atexit will race with free during exit, 362 // because we do not see synchronization around atexit callback list. 363 ThreadIgnoreBegin(thr); 364 int res = REAL(__cxa_atexit)(f, arg, dso); 365 ThreadIgnoreEnd(thr); 366 return res; 367 } 368 return atexit_ctx->atexit(thr, pc, false, (void(*)())f, arg); 369} 370 371// Cleanup old bufs. 372static void JmpBufGarbageCollect(ThreadState *thr, uptr sp) { 373 for (uptr i = 0; i < thr->jmp_bufs.Size(); i++) { 374 JmpBuf *buf = &thr->jmp_bufs[i]; 375 if (buf->sp <= sp) { 376 uptr sz = thr->jmp_bufs.Size(); 377 thr->jmp_bufs[i] = thr->jmp_bufs[sz - 1]; 378 thr->jmp_bufs.PopBack(); 379 i--; 380 } 381 } 382} 383 384static void SetJmp(ThreadState *thr, uptr sp, uptr mangled_sp) { 385 if (thr->shadow_stack_pos == 0) // called from libc guts during bootstrap 386 return; 387 // Cleanup old bufs. 388 JmpBufGarbageCollect(thr, sp); 389 // Remember the buf. 390 JmpBuf *buf = thr->jmp_bufs.PushBack(); 391 buf->sp = sp; 392 buf->mangled_sp = mangled_sp; 393 buf->shadow_stack_pos = thr->shadow_stack_pos; 394} 395 396static void LongJmp(ThreadState *thr, uptr *env) { 397 uptr mangled_sp = env[6]; 398 // Find the saved buf by mangled_sp. 399 for (uptr i = 0; i < thr->jmp_bufs.Size(); i++) { 400 JmpBuf *buf = &thr->jmp_bufs[i]; 401 if (buf->mangled_sp == mangled_sp) { 402 CHECK_GE(thr->shadow_stack_pos, buf->shadow_stack_pos); 403 // Unwind the stack. 404 while (thr->shadow_stack_pos > buf->shadow_stack_pos) 405 FuncExit(thr); 406 JmpBufGarbageCollect(thr, buf->sp - 1); // do not collect buf->sp 407 return; 408 } 409 } 410 Printf("ThreadSanitizer: can't find longjmp buf\n"); 411 CHECK(0); 412} 413 414// FIXME: put everything below into a common extern "C" block? 415extern "C" void __tsan_setjmp(uptr sp, uptr mangled_sp) { 416 ScopedInRtl in_rtl; 417 SetJmp(cur_thread(), sp, mangled_sp); 418} 419 420// Not called. Merely to satisfy TSAN_INTERCEPT(). 421extern "C" SANITIZER_INTERFACE_ATTRIBUTE 422int __interceptor_setjmp(void *env); 423extern "C" int __interceptor_setjmp(void *env) { 424 CHECK(0); 425 return 0; 426} 427 428// FIXME: any reason to have a separate declaration? 429extern "C" SANITIZER_INTERFACE_ATTRIBUTE 430int __interceptor__setjmp(void *env); 431extern "C" int __interceptor__setjmp(void *env) { 432 CHECK(0); 433 return 0; 434} 435 436extern "C" SANITIZER_INTERFACE_ATTRIBUTE 437int __interceptor_sigsetjmp(void *env); 438extern "C" int __interceptor_sigsetjmp(void *env) { 439 CHECK(0); 440 return 0; 441} 442 443extern "C" SANITIZER_INTERFACE_ATTRIBUTE 444int __interceptor___sigsetjmp(void *env); 445extern "C" int __interceptor___sigsetjmp(void *env) { 446 CHECK(0); 447 return 0; 448} 449 450extern "C" int setjmp(void *env); 451extern "C" int _setjmp(void *env); 452extern "C" int sigsetjmp(void *env); 453extern "C" int __sigsetjmp(void *env); 454DEFINE_REAL(int, setjmp, void *env) 455DEFINE_REAL(int, _setjmp, void *env) 456DEFINE_REAL(int, sigsetjmp, void *env) 457DEFINE_REAL(int, __sigsetjmp, void *env) 458 459TSAN_INTERCEPTOR(void, longjmp, uptr *env, int val) { 460 { 461 SCOPED_TSAN_INTERCEPTOR(longjmp, env, val); 462 } 463 LongJmp(cur_thread(), env); 464 REAL(longjmp)(env, val); 465} 466 467TSAN_INTERCEPTOR(void, siglongjmp, uptr *env, int val) { 468 { 469 SCOPED_TSAN_INTERCEPTOR(siglongjmp, env, val); 470 } 471 LongJmp(cur_thread(), env); 472 REAL(siglongjmp)(env, val); 473} 474 475TSAN_INTERCEPTOR(void*, malloc, uptr size) { 476 if (cur_thread()->in_symbolizer) 477 return __libc_malloc(size); 478 void *p = 0; 479 { 480 SCOPED_INTERCEPTOR_RAW(malloc, size); 481 p = user_alloc(thr, pc, size); 482 } 483 invoke_malloc_hook(p, size); 484 return p; 485} 486 487TSAN_INTERCEPTOR(void*, __libc_memalign, uptr align, uptr sz) { 488 SCOPED_TSAN_INTERCEPTOR(__libc_memalign, align, sz); 489 return user_alloc(thr, pc, sz, align); 490} 491 492TSAN_INTERCEPTOR(void*, calloc, uptr size, uptr n) { 493 if (cur_thread()->in_symbolizer) 494 return __libc_calloc(size, n); 495 if (__sanitizer::CallocShouldReturnNullDueToOverflow(size, n)) 496 return AllocatorReturnNull(); 497 void *p = 0; 498 { 499 SCOPED_INTERCEPTOR_RAW(calloc, size, n); 500 p = user_alloc(thr, pc, n * size); 501 if (p) 502 internal_memset(p, 0, n * size); 503 } 504 invoke_malloc_hook(p, n * size); 505 return p; 506} 507 508TSAN_INTERCEPTOR(void*, realloc, void *p, uptr size) { 509 if (cur_thread()->in_symbolizer) 510 return __libc_realloc(p, size); 511 if (p) 512 invoke_free_hook(p); 513 { 514 SCOPED_INTERCEPTOR_RAW(realloc, p, size); 515 p = user_realloc(thr, pc, p, size); 516 } 517 invoke_malloc_hook(p, size); 518 return p; 519} 520 521TSAN_INTERCEPTOR(void, free, void *p) { 522 if (p == 0) 523 return; 524 if (cur_thread()->in_symbolizer) 525 return __libc_free(p); 526 invoke_free_hook(p); 527 SCOPED_INTERCEPTOR_RAW(free, p); 528 user_free(thr, pc, p); 529} 530 531TSAN_INTERCEPTOR(void, cfree, void *p) { 532 if (p == 0) 533 return; 534 if (cur_thread()->in_symbolizer) 535 return __libc_free(p); 536 invoke_free_hook(p); 537 SCOPED_INTERCEPTOR_RAW(cfree, p); 538 user_free(thr, pc, p); 539} 540 541TSAN_INTERCEPTOR(uptr, malloc_usable_size, void *p) { 542 SCOPED_INTERCEPTOR_RAW(malloc_usable_size, p); 543 return user_alloc_usable_size(thr, pc, p); 544} 545 546#define OPERATOR_NEW_BODY(mangled_name) \ 547 if (cur_thread()->in_symbolizer) \ 548 return __libc_malloc(size); \ 549 void *p = 0; \ 550 { \ 551 SCOPED_INTERCEPTOR_RAW(mangled_name, size); \ 552 p = user_alloc(thr, pc, size); \ 553 } \ 554 invoke_malloc_hook(p, size); \ 555 return p; 556 557SANITIZER_INTERFACE_ATTRIBUTE 558void *operator new(__sanitizer::uptr size); 559void *operator new(__sanitizer::uptr size) { 560 OPERATOR_NEW_BODY(_Znwm); 561} 562 563SANITIZER_INTERFACE_ATTRIBUTE 564void *operator new[](__sanitizer::uptr size); 565void *operator new[](__sanitizer::uptr size) { 566 OPERATOR_NEW_BODY(_Znam); 567} 568 569SANITIZER_INTERFACE_ATTRIBUTE 570void *operator new(__sanitizer::uptr size, std::nothrow_t const&); 571void *operator new(__sanitizer::uptr size, std::nothrow_t const&) { 572 OPERATOR_NEW_BODY(_ZnwmRKSt9nothrow_t); 573} 574 575SANITIZER_INTERFACE_ATTRIBUTE 576void *operator new[](__sanitizer::uptr size, std::nothrow_t const&); 577void *operator new[](__sanitizer::uptr size, std::nothrow_t const&) { 578 OPERATOR_NEW_BODY(_ZnamRKSt9nothrow_t); 579} 580 581#define OPERATOR_DELETE_BODY(mangled_name) \ 582 if (ptr == 0) return; \ 583 if (cur_thread()->in_symbolizer) \ 584 return __libc_free(ptr); \ 585 invoke_free_hook(ptr); \ 586 SCOPED_INTERCEPTOR_RAW(mangled_name, ptr); \ 587 user_free(thr, pc, ptr); 588 589SANITIZER_INTERFACE_ATTRIBUTE 590void operator delete(void *ptr); 591void operator delete(void *ptr) { 592 OPERATOR_DELETE_BODY(_ZdlPv); 593} 594 595SANITIZER_INTERFACE_ATTRIBUTE 596void operator delete[](void *ptr); 597void operator delete[](void *ptr) { 598 OPERATOR_DELETE_BODY(_ZdlPvRKSt9nothrow_t); 599} 600 601SANITIZER_INTERFACE_ATTRIBUTE 602void operator delete(void *ptr, std::nothrow_t const&); 603void operator delete(void *ptr, std::nothrow_t const&) { 604 OPERATOR_DELETE_BODY(_ZdaPv); 605} 606 607SANITIZER_INTERFACE_ATTRIBUTE 608void operator delete[](void *ptr, std::nothrow_t const&); 609void operator delete[](void *ptr, std::nothrow_t const&) { 610 OPERATOR_DELETE_BODY(_ZdaPvRKSt9nothrow_t); 611} 612 613TSAN_INTERCEPTOR(uptr, strlen, const char *s) { 614 SCOPED_TSAN_INTERCEPTOR(strlen, s); 615 uptr len = internal_strlen(s); 616 MemoryAccessRange(thr, pc, (uptr)s, len + 1, false); 617 return len; 618} 619 620TSAN_INTERCEPTOR(void*, memset, void *dst, int v, uptr size) { 621 SCOPED_TSAN_INTERCEPTOR(memset, dst, v, size); 622 MemoryAccessRange(thr, pc, (uptr)dst, size, true); 623 return internal_memset(dst, v, size); 624} 625 626TSAN_INTERCEPTOR(void*, memcpy, void *dst, const void *src, uptr size) { 627 SCOPED_TSAN_INTERCEPTOR(memcpy, dst, src, size); 628 MemoryAccessRange(thr, pc, (uptr)dst, size, true); 629 MemoryAccessRange(thr, pc, (uptr)src, size, false); 630 return internal_memcpy(dst, src, size); 631} 632 633TSAN_INTERCEPTOR(int, memcmp, const void *s1, const void *s2, uptr n) { 634 SCOPED_TSAN_INTERCEPTOR(memcmp, s1, s2, n); 635 int res = 0; 636 uptr len = 0; 637 for (; len < n; len++) { 638 if ((res = ((unsigned char*)s1)[len] - ((unsigned char*)s2)[len])) 639 break; 640 } 641 MemoryAccessRange(thr, pc, (uptr)s1, len < n ? len + 1 : n, false); 642 MemoryAccessRange(thr, pc, (uptr)s2, len < n ? len + 1 : n, false); 643 return res; 644} 645 646TSAN_INTERCEPTOR(void*, memchr, void *s, int c, uptr n) { 647 SCOPED_TSAN_INTERCEPTOR(memchr, s, c, n); 648 void *res = REAL(memchr)(s, c, n); 649 uptr len = res ? (char*)res - (char*)s + 1 : n; 650 MemoryAccessRange(thr, pc, (uptr)s, len, false); 651 return res; 652} 653 654TSAN_INTERCEPTOR(void*, memrchr, char *s, int c, uptr n) { 655 SCOPED_TSAN_INTERCEPTOR(memrchr, s, c, n); 656 MemoryAccessRange(thr, pc, (uptr)s, n, false); 657 return REAL(memrchr)(s, c, n); 658} 659 660TSAN_INTERCEPTOR(void*, memmove, void *dst, void *src, uptr n) { 661 SCOPED_TSAN_INTERCEPTOR(memmove, dst, src, n); 662 MemoryAccessRange(thr, pc, (uptr)dst, n, true); 663 MemoryAccessRange(thr, pc, (uptr)src, n, false); 664 return REAL(memmove)(dst, src, n); 665} 666 667TSAN_INTERCEPTOR(char*, strchr, char *s, int c) { 668 SCOPED_TSAN_INTERCEPTOR(strchr, s, c); 669 char *res = REAL(strchr)(s, c); 670 uptr len = res ? (char*)res - (char*)s + 1 : internal_strlen(s) + 1; 671 MemoryAccessRange(thr, pc, (uptr)s, len, false); 672 return res; 673} 674 675TSAN_INTERCEPTOR(char*, strchrnul, char *s, int c) { 676 SCOPED_TSAN_INTERCEPTOR(strchrnul, s, c); 677 char *res = REAL(strchrnul)(s, c); 678 uptr len = (char*)res - (char*)s + 1; 679 MemoryAccessRange(thr, pc, (uptr)s, len, false); 680 return res; 681} 682 683TSAN_INTERCEPTOR(char*, strrchr, char *s, int c) { 684 SCOPED_TSAN_INTERCEPTOR(strrchr, s, c); 685 MemoryAccessRange(thr, pc, (uptr)s, internal_strlen(s) + 1, false); 686 return REAL(strrchr)(s, c); 687} 688 689TSAN_INTERCEPTOR(char*, strcpy, char *dst, const char *src) { // NOLINT 690 SCOPED_TSAN_INTERCEPTOR(strcpy, dst, src); // NOLINT 691 uptr srclen = internal_strlen(src); 692 MemoryAccessRange(thr, pc, (uptr)dst, srclen + 1, true); 693 MemoryAccessRange(thr, pc, (uptr)src, srclen + 1, false); 694 return REAL(strcpy)(dst, src); // NOLINT 695} 696 697TSAN_INTERCEPTOR(char*, strncpy, char *dst, char *src, uptr n) { 698 SCOPED_TSAN_INTERCEPTOR(strncpy, dst, src, n); 699 uptr srclen = internal_strnlen(src, n); 700 MemoryAccessRange(thr, pc, (uptr)dst, n, true); 701 MemoryAccessRange(thr, pc, (uptr)src, min(srclen + 1, n), false); 702 return REAL(strncpy)(dst, src, n); 703} 704 705TSAN_INTERCEPTOR(const char*, strstr, const char *s1, const char *s2) { 706 SCOPED_TSAN_INTERCEPTOR(strstr, s1, s2); 707 const char *res = REAL(strstr)(s1, s2); 708 uptr len1 = internal_strlen(s1); 709 uptr len2 = internal_strlen(s2); 710 MemoryAccessRange(thr, pc, (uptr)s1, len1 + 1, false); 711 MemoryAccessRange(thr, pc, (uptr)s2, len2 + 1, false); 712 return res; 713} 714 715TSAN_INTERCEPTOR(char*, strdup, const char *str) { 716 SCOPED_TSAN_INTERCEPTOR(strdup, str); 717 // strdup will call malloc, so no instrumentation is required here. 718 return REAL(strdup)(str); 719} 720 721static bool fix_mmap_addr(void **addr, long_t sz, int flags) { 722 if (*addr) { 723 if (!IsAppMem((uptr)*addr) || !IsAppMem((uptr)*addr + sz - 1)) { 724 if (flags & MAP_FIXED) { 725 errno = EINVAL; 726 return false; 727 } else { 728 *addr = 0; 729 } 730 } 731 } 732 return true; 733} 734 735TSAN_INTERCEPTOR(void*, mmap, void *addr, long_t sz, int prot, 736 int flags, int fd, unsigned off) { 737 SCOPED_TSAN_INTERCEPTOR(mmap, addr, sz, prot, flags, fd, off); 738 if (!fix_mmap_addr(&addr, sz, flags)) 739 return MAP_FAILED; 740 void *res = REAL(mmap)(addr, sz, prot, flags, fd, off); 741 if (res != MAP_FAILED) { 742 if (fd > 0) 743 FdAccess(thr, pc, fd); 744 MemoryRangeImitateWrite(thr, pc, (uptr)res, sz); 745 } 746 return res; 747} 748 749TSAN_INTERCEPTOR(void*, mmap64, void *addr, long_t sz, int prot, 750 int flags, int fd, u64 off) { 751 SCOPED_TSAN_INTERCEPTOR(mmap64, addr, sz, prot, flags, fd, off); 752 if (!fix_mmap_addr(&addr, sz, flags)) 753 return MAP_FAILED; 754 void *res = REAL(mmap64)(addr, sz, prot, flags, fd, off); 755 if (res != MAP_FAILED) { 756 if (fd > 0) 757 FdAccess(thr, pc, fd); 758 MemoryRangeImitateWrite(thr, pc, (uptr)res, sz); 759 } 760 return res; 761} 762 763TSAN_INTERCEPTOR(int, munmap, void *addr, long_t sz) { 764 SCOPED_TSAN_INTERCEPTOR(munmap, addr, sz); 765 DontNeedShadowFor((uptr)addr, sz); 766 int res = REAL(munmap)(addr, sz); 767 return res; 768} 769 770TSAN_INTERCEPTOR(void*, memalign, uptr align, uptr sz) { 771 SCOPED_INTERCEPTOR_RAW(memalign, align, sz); 772 return user_alloc(thr, pc, sz, align); 773} 774 775TSAN_INTERCEPTOR(void*, valloc, uptr sz) { 776 SCOPED_INTERCEPTOR_RAW(valloc, sz); 777 return user_alloc(thr, pc, sz, GetPageSizeCached()); 778} 779 780TSAN_INTERCEPTOR(void*, pvalloc, uptr sz) { 781 SCOPED_INTERCEPTOR_RAW(pvalloc, sz); 782 sz = RoundUp(sz, GetPageSizeCached()); 783 return user_alloc(thr, pc, sz, GetPageSizeCached()); 784} 785 786TSAN_INTERCEPTOR(int, posix_memalign, void **memptr, uptr align, uptr sz) { 787 SCOPED_INTERCEPTOR_RAW(posix_memalign, memptr, align, sz); 788 *memptr = user_alloc(thr, pc, sz, align); 789 return 0; 790} 791 792// Used in thread-safe function static initialization. 793extern "C" int INTERFACE_ATTRIBUTE __cxa_guard_acquire(atomic_uint32_t *g) { 794 SCOPED_INTERCEPTOR_RAW(__cxa_guard_acquire, g); 795 for (;;) { 796 u32 cmp = atomic_load(g, memory_order_acquire); 797 if (cmp == 0) { 798 if (atomic_compare_exchange_strong(g, &cmp, 1<<16, memory_order_relaxed)) 799 return 1; 800 } else if (cmp == 1) { 801 Acquire(thr, pc, (uptr)g); 802 return 0; 803 } else { 804 internal_sched_yield(); 805 } 806 } 807} 808 809extern "C" void INTERFACE_ATTRIBUTE __cxa_guard_release(atomic_uint32_t *g) { 810 SCOPED_INTERCEPTOR_RAW(__cxa_guard_release, g); 811 Release(thr, pc, (uptr)g); 812 atomic_store(g, 1, memory_order_release); 813} 814 815extern "C" void INTERFACE_ATTRIBUTE __cxa_guard_abort(atomic_uint32_t *g) { 816 SCOPED_INTERCEPTOR_RAW(__cxa_guard_abort, g); 817 atomic_store(g, 0, memory_order_relaxed); 818} 819 820static void thread_finalize(void *v) { 821 uptr iter = (uptr)v; 822 if (iter > 1) { 823 if (pthread_setspecific(g_thread_finalize_key, (void*)(iter - 1))) { 824 Printf("ThreadSanitizer: failed to set thread key\n"); 825 Die(); 826 } 827 return; 828 } 829 { 830 ScopedInRtl in_rtl; 831 ThreadState *thr = cur_thread(); 832 ThreadFinish(thr); 833 SignalContext *sctx = thr->signal_ctx; 834 if (sctx) { 835 thr->signal_ctx = 0; 836 UnmapOrDie(sctx, sizeof(*sctx)); 837 } 838 } 839} 840 841 842struct ThreadParam { 843 void* (*callback)(void *arg); 844 void *param; 845 atomic_uintptr_t tid; 846}; 847 848extern "C" void *__tsan_thread_start_func(void *arg) { 849 ThreadParam *p = (ThreadParam*)arg; 850 void* (*callback)(void *arg) = p->callback; 851 void *param = p->param; 852 int tid = 0; 853 { 854 ThreadState *thr = cur_thread(); 855 ScopedInRtl in_rtl; 856 if (pthread_setspecific(g_thread_finalize_key, 857 (void *)kPthreadDestructorIterations)) { 858 Printf("ThreadSanitizer: failed to set thread key\n"); 859 Die(); 860 } 861 while ((tid = atomic_load(&p->tid, memory_order_acquire)) == 0) 862 pthread_yield(); 863 atomic_store(&p->tid, 0, memory_order_release); 864 ThreadStart(thr, tid, GetTid()); 865 CHECK_EQ(thr->in_rtl, 1); 866 } 867 void *res = callback(param); 868 // Prevent the callback from being tail called, 869 // it mixes up stack traces. 870 volatile int foo = 42; 871 foo++; 872 return res; 873} 874 875TSAN_INTERCEPTOR(int, pthread_create, 876 void *th, void *attr, void *(*callback)(void*), void * param) { 877 SCOPED_INTERCEPTOR_RAW(pthread_create, th, attr, callback, param); 878 __sanitizer_pthread_attr_t myattr; 879 if (attr == 0) { 880 pthread_attr_init(&myattr); 881 attr = &myattr; 882 } 883 int detached = 0; 884 pthread_attr_getdetachstate(attr, &detached); 885 886#if defined(TSAN_DEBUG_OUTPUT) 887 int verbosity = (TSAN_DEBUG_OUTPUT); 888#else 889 int verbosity = 0; 890#endif 891 AdjustStackSizeLinux(attr, verbosity); 892 893 ThreadParam p; 894 p.callback = callback; 895 p.param = param; 896 atomic_store(&p.tid, 0, memory_order_relaxed); 897 int res = REAL(pthread_create)(th, attr, __tsan_thread_start_func, &p); 898 if (res == 0) { 899 int tid = ThreadCreate(thr, pc, *(uptr*)th, detached); 900 CHECK_NE(tid, 0); 901 atomic_store(&p.tid, tid, memory_order_release); 902 while (atomic_load(&p.tid, memory_order_acquire) != 0) 903 pthread_yield(); 904 } 905 if (attr == &myattr) 906 pthread_attr_destroy(&myattr); 907 return res; 908} 909 910TSAN_INTERCEPTOR(int, pthread_join, void *th, void **ret) { 911 SCOPED_INTERCEPTOR_RAW(pthread_join, th, ret); 912 int tid = ThreadTid(thr, pc, (uptr)th); 913 int res = BLOCK_REAL(pthread_join)(th, ret); 914 if (res == 0) { 915 ThreadJoin(thr, pc, tid); 916 } 917 return res; 918} 919 920TSAN_INTERCEPTOR(int, pthread_detach, void *th) { 921 SCOPED_TSAN_INTERCEPTOR(pthread_detach, th); 922 int tid = ThreadTid(thr, pc, (uptr)th); 923 int res = REAL(pthread_detach)(th); 924 if (res == 0) { 925 ThreadDetach(thr, pc, tid); 926 } 927 return res; 928} 929 930TSAN_INTERCEPTOR(int, pthread_mutex_init, void *m, void *a) { 931 SCOPED_TSAN_INTERCEPTOR(pthread_mutex_init, m, a); 932 int res = REAL(pthread_mutex_init)(m, a); 933 if (res == 0) { 934 bool recursive = false; 935 if (a) { 936 int type = 0; 937 if (pthread_mutexattr_gettype(a, &type) == 0) 938 recursive = (type == PTHREAD_MUTEX_RECURSIVE 939 || type == PTHREAD_MUTEX_RECURSIVE_NP); 940 } 941 MutexCreate(thr, pc, (uptr)m, false, recursive, false); 942 } 943 return res; 944} 945 946TSAN_INTERCEPTOR(int, pthread_mutex_destroy, void *m) { 947 SCOPED_TSAN_INTERCEPTOR(pthread_mutex_destroy, m); 948 int res = REAL(pthread_mutex_destroy)(m); 949 if (res == 0 || res == EBUSY) { 950 MutexDestroy(thr, pc, (uptr)m); 951 } 952 return res; 953} 954 955TSAN_INTERCEPTOR(int, pthread_mutex_lock, void *m) { 956 SCOPED_TSAN_INTERCEPTOR(pthread_mutex_lock, m); 957 int res = REAL(pthread_mutex_lock)(m); 958 if (res == 0) { 959 MutexLock(thr, pc, (uptr)m); 960 } 961 return res; 962} 963 964TSAN_INTERCEPTOR(int, pthread_mutex_trylock, void *m) { 965 SCOPED_TSAN_INTERCEPTOR(pthread_mutex_trylock, m); 966 int res = REAL(pthread_mutex_trylock)(m); 967 if (res == 0) { 968 MutexLock(thr, pc, (uptr)m); 969 } 970 return res; 971} 972 973TSAN_INTERCEPTOR(int, pthread_mutex_timedlock, void *m, void *abstime) { 974 SCOPED_TSAN_INTERCEPTOR(pthread_mutex_timedlock, m, abstime); 975 int res = REAL(pthread_mutex_timedlock)(m, abstime); 976 if (res == 0) { 977 MutexLock(thr, pc, (uptr)m); 978 } 979 return res; 980} 981 982TSAN_INTERCEPTOR(int, pthread_mutex_unlock, void *m) { 983 SCOPED_TSAN_INTERCEPTOR(pthread_mutex_unlock, m); 984 MutexUnlock(thr, pc, (uptr)m); 985 int res = REAL(pthread_mutex_unlock)(m); 986 return res; 987} 988 989TSAN_INTERCEPTOR(int, pthread_spin_init, void *m, int pshared) { 990 SCOPED_TSAN_INTERCEPTOR(pthread_spin_init, m, pshared); 991 int res = REAL(pthread_spin_init)(m, pshared); 992 if (res == 0) { 993 MutexCreate(thr, pc, (uptr)m, false, false, false); 994 } 995 return res; 996} 997 998TSAN_INTERCEPTOR(int, pthread_spin_destroy, void *m) { 999 SCOPED_TSAN_INTERCEPTOR(pthread_spin_destroy, m); 1000 int res = REAL(pthread_spin_destroy)(m); 1001 if (res == 0) { 1002 MutexDestroy(thr, pc, (uptr)m); 1003 } 1004 return res; 1005} 1006 1007TSAN_INTERCEPTOR(int, pthread_spin_lock, void *m) { 1008 SCOPED_TSAN_INTERCEPTOR(pthread_spin_lock, m); 1009 int res = REAL(pthread_spin_lock)(m); 1010 if (res == 0) { 1011 MutexLock(thr, pc, (uptr)m); 1012 } 1013 return res; 1014} 1015 1016TSAN_INTERCEPTOR(int, pthread_spin_trylock, void *m) { 1017 SCOPED_TSAN_INTERCEPTOR(pthread_spin_trylock, m); 1018 int res = REAL(pthread_spin_trylock)(m); 1019 if (res == 0) { 1020 MutexLock(thr, pc, (uptr)m); 1021 } 1022 return res; 1023} 1024 1025TSAN_INTERCEPTOR(int, pthread_spin_unlock, void *m) { 1026 SCOPED_TSAN_INTERCEPTOR(pthread_spin_unlock, m); 1027 MutexUnlock(thr, pc, (uptr)m); 1028 int res = REAL(pthread_spin_unlock)(m); 1029 return res; 1030} 1031 1032TSAN_INTERCEPTOR(int, pthread_rwlock_init, void *m, void *a) { 1033 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_init, m, a); 1034 int res = REAL(pthread_rwlock_init)(m, a); 1035 if (res == 0) { 1036 MutexCreate(thr, pc, (uptr)m, true, false, false); 1037 } 1038 return res; 1039} 1040 1041TSAN_INTERCEPTOR(int, pthread_rwlock_destroy, void *m) { 1042 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_destroy, m); 1043 int res = REAL(pthread_rwlock_destroy)(m); 1044 if (res == 0) { 1045 MutexDestroy(thr, pc, (uptr)m); 1046 } 1047 return res; 1048} 1049 1050TSAN_INTERCEPTOR(int, pthread_rwlock_rdlock, void *m) { 1051 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_rdlock, m); 1052 int res = REAL(pthread_rwlock_rdlock)(m); 1053 if (res == 0) { 1054 MutexReadLock(thr, pc, (uptr)m); 1055 } 1056 return res; 1057} 1058 1059TSAN_INTERCEPTOR(int, pthread_rwlock_tryrdlock, void *m) { 1060 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_tryrdlock, m); 1061 int res = REAL(pthread_rwlock_tryrdlock)(m); 1062 if (res == 0) { 1063 MutexReadLock(thr, pc, (uptr)m); 1064 } 1065 return res; 1066} 1067 1068TSAN_INTERCEPTOR(int, pthread_rwlock_timedrdlock, void *m, void *abstime) { 1069 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_timedrdlock, m, abstime); 1070 int res = REAL(pthread_rwlock_timedrdlock)(m, abstime); 1071 if (res == 0) { 1072 MutexReadLock(thr, pc, (uptr)m); 1073 } 1074 return res; 1075} 1076 1077TSAN_INTERCEPTOR(int, pthread_rwlock_wrlock, void *m) { 1078 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_wrlock, m); 1079 int res = REAL(pthread_rwlock_wrlock)(m); 1080 if (res == 0) { 1081 MutexLock(thr, pc, (uptr)m); 1082 } 1083 return res; 1084} 1085 1086TSAN_INTERCEPTOR(int, pthread_rwlock_trywrlock, void *m) { 1087 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_trywrlock, m); 1088 int res = REAL(pthread_rwlock_trywrlock)(m); 1089 if (res == 0) { 1090 MutexLock(thr, pc, (uptr)m); 1091 } 1092 return res; 1093} 1094 1095TSAN_INTERCEPTOR(int, pthread_rwlock_timedwrlock, void *m, void *abstime) { 1096 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_timedwrlock, m, abstime); 1097 int res = REAL(pthread_rwlock_timedwrlock)(m, abstime); 1098 if (res == 0) { 1099 MutexLock(thr, pc, (uptr)m); 1100 } 1101 return res; 1102} 1103 1104TSAN_INTERCEPTOR(int, pthread_rwlock_unlock, void *m) { 1105 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_unlock, m); 1106 MutexReadOrWriteUnlock(thr, pc, (uptr)m); 1107 int res = REAL(pthread_rwlock_unlock)(m); 1108 return res; 1109} 1110 1111TSAN_INTERCEPTOR(int, pthread_cond_init, void *c, void *a) { 1112 SCOPED_TSAN_INTERCEPTOR(pthread_cond_init, c, a); 1113 MemoryWrite(thr, pc, (uptr)c, kSizeLog1); 1114 int res = REAL(pthread_cond_init)(c, a); 1115 return res; 1116} 1117 1118TSAN_INTERCEPTOR(int, pthread_cond_destroy, void *c) { 1119 SCOPED_TSAN_INTERCEPTOR(pthread_cond_destroy, c); 1120 MemoryWrite(thr, pc, (uptr)c, kSizeLog1); 1121 int res = REAL(pthread_cond_destroy)(c); 1122 return res; 1123} 1124 1125TSAN_INTERCEPTOR(int, pthread_cond_signal, void *c) { 1126 SCOPED_TSAN_INTERCEPTOR(pthread_cond_signal, c); 1127 MemoryRead(thr, pc, (uptr)c, kSizeLog1); 1128 int res = REAL(pthread_cond_signal)(c); 1129 return res; 1130} 1131 1132TSAN_INTERCEPTOR(int, pthread_cond_broadcast, void *c) { 1133 SCOPED_TSAN_INTERCEPTOR(pthread_cond_broadcast, c); 1134 MemoryRead(thr, pc, (uptr)c, kSizeLog1); 1135 int res = REAL(pthread_cond_broadcast)(c); 1136 return res; 1137} 1138 1139TSAN_INTERCEPTOR(int, pthread_cond_wait, void *c, void *m) { 1140 SCOPED_TSAN_INTERCEPTOR(pthread_cond_wait, c, m); 1141 MutexUnlock(thr, pc, (uptr)m); 1142 MemoryRead(thr, pc, (uptr)c, kSizeLog1); 1143 int res = REAL(pthread_cond_wait)(c, m); 1144 MutexLock(thr, pc, (uptr)m); 1145 return res; 1146} 1147 1148TSAN_INTERCEPTOR(int, pthread_cond_timedwait, void *c, void *m, 1149 void *abstime) { 1150 SCOPED_TSAN_INTERCEPTOR(pthread_cond_timedwait, c, m, abstime); 1151 MutexUnlock(thr, pc, (uptr)m); 1152 MemoryRead(thr, pc, (uptr)c, kSizeLog1); 1153 int res = REAL(pthread_cond_timedwait)(c, m, abstime); 1154 MutexLock(thr, pc, (uptr)m); 1155 return res; 1156} 1157 1158TSAN_INTERCEPTOR(int, pthread_barrier_init, void *b, void *a, unsigned count) { 1159 SCOPED_TSAN_INTERCEPTOR(pthread_barrier_init, b, a, count); 1160 MemoryWrite(thr, pc, (uptr)b, kSizeLog1); 1161 int res = REAL(pthread_barrier_init)(b, a, count); 1162 return res; 1163} 1164 1165TSAN_INTERCEPTOR(int, pthread_barrier_destroy, void *b) { 1166 SCOPED_TSAN_INTERCEPTOR(pthread_barrier_destroy, b); 1167 MemoryWrite(thr, pc, (uptr)b, kSizeLog1); 1168 int res = REAL(pthread_barrier_destroy)(b); 1169 return res; 1170} 1171 1172TSAN_INTERCEPTOR(int, pthread_barrier_wait, void *b) { 1173 SCOPED_TSAN_INTERCEPTOR(pthread_barrier_wait, b); 1174 Release(thr, pc, (uptr)b); 1175 MemoryRead(thr, pc, (uptr)b, kSizeLog1); 1176 int res = REAL(pthread_barrier_wait)(b); 1177 MemoryRead(thr, pc, (uptr)b, kSizeLog1); 1178 if (res == 0 || res == PTHREAD_BARRIER_SERIAL_THREAD) { 1179 Acquire(thr, pc, (uptr)b); 1180 } 1181 return res; 1182} 1183 1184TSAN_INTERCEPTOR(int, pthread_once, void *o, void (*f)()) { 1185 SCOPED_INTERCEPTOR_RAW(pthread_once, o, f); 1186 // Using SCOPED_INTERCEPTOR_RAW, because if we are called from an ignored lib, 1187 // the user callback must be executed with thr->in_rtl == 0. 1188 if (o == 0 || f == 0) 1189 return EINVAL; 1190 atomic_uint32_t *a = static_cast<atomic_uint32_t*>(o); 1191 u32 v = atomic_load(a, memory_order_acquire); 1192 if (v == 0 && atomic_compare_exchange_strong(a, &v, 1, 1193 memory_order_relaxed)) { 1194 const int old_in_rtl = thr->in_rtl; 1195 thr->in_rtl = 0; 1196 (*f)(); 1197 CHECK_EQ(thr->in_rtl, 0); 1198 thr->in_rtl = old_in_rtl; 1199 if (!thr->in_ignored_lib) 1200 Release(thr, pc, (uptr)o); 1201 atomic_store(a, 2, memory_order_release); 1202 } else { 1203 while (v != 2) { 1204 pthread_yield(); 1205 v = atomic_load(a, memory_order_acquire); 1206 } 1207 if (!thr->in_ignored_lib) 1208 Acquire(thr, pc, (uptr)o); 1209 } 1210 return 0; 1211} 1212 1213TSAN_INTERCEPTOR(int, sem_init, void *s, int pshared, unsigned value) { 1214 SCOPED_TSAN_INTERCEPTOR(sem_init, s, pshared, value); 1215 int res = REAL(sem_init)(s, pshared, value); 1216 return res; 1217} 1218 1219TSAN_INTERCEPTOR(int, sem_destroy, void *s) { 1220 SCOPED_TSAN_INTERCEPTOR(sem_destroy, s); 1221 int res = REAL(sem_destroy)(s); 1222 return res; 1223} 1224 1225TSAN_INTERCEPTOR(int, sem_wait, void *s) { 1226 SCOPED_TSAN_INTERCEPTOR(sem_wait, s); 1227 int res = BLOCK_REAL(sem_wait)(s); 1228 if (res == 0) { 1229 Acquire(thr, pc, (uptr)s); 1230 } 1231 return res; 1232} 1233 1234TSAN_INTERCEPTOR(int, sem_trywait, void *s) { 1235 SCOPED_TSAN_INTERCEPTOR(sem_trywait, s); 1236 int res = BLOCK_REAL(sem_trywait)(s); 1237 if (res == 0) { 1238 Acquire(thr, pc, (uptr)s); 1239 } 1240 return res; 1241} 1242 1243TSAN_INTERCEPTOR(int, sem_timedwait, void *s, void *abstime) { 1244 SCOPED_TSAN_INTERCEPTOR(sem_timedwait, s, abstime); 1245 int res = BLOCK_REAL(sem_timedwait)(s, abstime); 1246 if (res == 0) { 1247 Acquire(thr, pc, (uptr)s); 1248 } 1249 return res; 1250} 1251 1252TSAN_INTERCEPTOR(int, sem_post, void *s) { 1253 SCOPED_TSAN_INTERCEPTOR(sem_post, s); 1254 Release(thr, pc, (uptr)s); 1255 int res = REAL(sem_post)(s); 1256 return res; 1257} 1258 1259TSAN_INTERCEPTOR(int, sem_getvalue, void *s, int *sval) { 1260 SCOPED_TSAN_INTERCEPTOR(sem_getvalue, s, sval); 1261 int res = REAL(sem_getvalue)(s, sval); 1262 if (res == 0) { 1263 Acquire(thr, pc, (uptr)s); 1264 } 1265 return res; 1266} 1267 1268TSAN_INTERCEPTOR(int, __xstat, int version, const char *path, void *buf) { 1269 SCOPED_TSAN_INTERCEPTOR(__xstat, version, path, buf); 1270 return REAL(__xstat)(version, path, buf); 1271} 1272 1273TSAN_INTERCEPTOR(int, stat, const char *path, void *buf) { 1274 SCOPED_TSAN_INTERCEPTOR(__xstat, 0, path, buf); 1275 return REAL(__xstat)(0, path, buf); 1276} 1277 1278TSAN_INTERCEPTOR(int, __xstat64, int version, const char *path, void *buf) { 1279 SCOPED_TSAN_INTERCEPTOR(__xstat64, version, path, buf); 1280 return REAL(__xstat64)(version, path, buf); 1281} 1282 1283TSAN_INTERCEPTOR(int, stat64, const char *path, void *buf) { 1284 SCOPED_TSAN_INTERCEPTOR(__xstat64, 0, path, buf); 1285 return REAL(__xstat64)(0, path, buf); 1286} 1287 1288TSAN_INTERCEPTOR(int, __lxstat, int version, const char *path, void *buf) { 1289 SCOPED_TSAN_INTERCEPTOR(__lxstat, version, path, buf); 1290 return REAL(__lxstat)(version, path, buf); 1291} 1292 1293TSAN_INTERCEPTOR(int, lstat, const char *path, void *buf) { 1294 SCOPED_TSAN_INTERCEPTOR(__lxstat, 0, path, buf); 1295 return REAL(__lxstat)(0, path, buf); 1296} 1297 1298TSAN_INTERCEPTOR(int, __lxstat64, int version, const char *path, void *buf) { 1299 SCOPED_TSAN_INTERCEPTOR(__lxstat64, version, path, buf); 1300 return REAL(__lxstat64)(version, path, buf); 1301} 1302 1303TSAN_INTERCEPTOR(int, lstat64, const char *path, void *buf) { 1304 SCOPED_TSAN_INTERCEPTOR(__lxstat64, 0, path, buf); 1305 return REAL(__lxstat64)(0, path, buf); 1306} 1307 1308TSAN_INTERCEPTOR(int, __fxstat, int version, int fd, void *buf) { 1309 SCOPED_TSAN_INTERCEPTOR(__fxstat, version, fd, buf); 1310 if (fd > 0) 1311 FdAccess(thr, pc, fd); 1312 return REAL(__fxstat)(version, fd, buf); 1313} 1314 1315TSAN_INTERCEPTOR(int, fstat, int fd, void *buf) { 1316 SCOPED_TSAN_INTERCEPTOR(__fxstat, 0, fd, buf); 1317 if (fd > 0) 1318 FdAccess(thr, pc, fd); 1319 return REAL(__fxstat)(0, fd, buf); 1320} 1321 1322TSAN_INTERCEPTOR(int, __fxstat64, int version, int fd, void *buf) { 1323 SCOPED_TSAN_INTERCEPTOR(__fxstat64, version, fd, buf); 1324 if (fd > 0) 1325 FdAccess(thr, pc, fd); 1326 return REAL(__fxstat64)(version, fd, buf); 1327} 1328 1329TSAN_INTERCEPTOR(int, fstat64, int fd, void *buf) { 1330 SCOPED_TSAN_INTERCEPTOR(__fxstat64, 0, fd, buf); 1331 if (fd > 0) 1332 FdAccess(thr, pc, fd); 1333 return REAL(__fxstat64)(0, fd, buf); 1334} 1335 1336TSAN_INTERCEPTOR(int, open, const char *name, int flags, int mode) { 1337 SCOPED_TSAN_INTERCEPTOR(open, name, flags, mode); 1338 int fd = REAL(open)(name, flags, mode); 1339 if (fd >= 0) 1340 FdFileCreate(thr, pc, fd); 1341 return fd; 1342} 1343 1344TSAN_INTERCEPTOR(int, open64, const char *name, int flags, int mode) { 1345 SCOPED_TSAN_INTERCEPTOR(open64, name, flags, mode); 1346 int fd = REAL(open64)(name, flags, mode); 1347 if (fd >= 0) 1348 FdFileCreate(thr, pc, fd); 1349 return fd; 1350} 1351 1352TSAN_INTERCEPTOR(int, creat, const char *name, int mode) { 1353 SCOPED_TSAN_INTERCEPTOR(creat, name, mode); 1354 int fd = REAL(creat)(name, mode); 1355 if (fd >= 0) 1356 FdFileCreate(thr, pc, fd); 1357 return fd; 1358} 1359 1360TSAN_INTERCEPTOR(int, creat64, const char *name, int mode) { 1361 SCOPED_TSAN_INTERCEPTOR(creat64, name, mode); 1362 int fd = REAL(creat64)(name, mode); 1363 if (fd >= 0) 1364 FdFileCreate(thr, pc, fd); 1365 return fd; 1366} 1367 1368TSAN_INTERCEPTOR(int, dup, int oldfd) { 1369 SCOPED_TSAN_INTERCEPTOR(dup, oldfd); 1370 int newfd = REAL(dup)(oldfd); 1371 if (oldfd >= 0 && newfd >= 0 && newfd != oldfd) 1372 FdDup(thr, pc, oldfd, newfd); 1373 return newfd; 1374} 1375 1376TSAN_INTERCEPTOR(int, dup2, int oldfd, int newfd) { 1377 SCOPED_TSAN_INTERCEPTOR(dup2, oldfd, newfd); 1378 int newfd2 = REAL(dup2)(oldfd, newfd); 1379 if (oldfd >= 0 && newfd2 >= 0 && newfd2 != oldfd) 1380 FdDup(thr, pc, oldfd, newfd2); 1381 return newfd2; 1382} 1383 1384TSAN_INTERCEPTOR(int, dup3, int oldfd, int newfd, int flags) { 1385 SCOPED_TSAN_INTERCEPTOR(dup3, oldfd, newfd, flags); 1386 int newfd2 = REAL(dup3)(oldfd, newfd, flags); 1387 if (oldfd >= 0 && newfd2 >= 0 && newfd2 != oldfd) 1388 FdDup(thr, pc, oldfd, newfd2); 1389 return newfd2; 1390} 1391 1392TSAN_INTERCEPTOR(int, eventfd, unsigned initval, int flags) { 1393 SCOPED_TSAN_INTERCEPTOR(eventfd, initval, flags); 1394 int fd = REAL(eventfd)(initval, flags); 1395 if (fd >= 0) 1396 FdEventCreate(thr, pc, fd); 1397 return fd; 1398} 1399 1400TSAN_INTERCEPTOR(int, signalfd, int fd, void *mask, int flags) { 1401 SCOPED_TSAN_INTERCEPTOR(signalfd, fd, mask, flags); 1402 if (fd >= 0) 1403 FdClose(thr, pc, fd); 1404 fd = REAL(signalfd)(fd, mask, flags); 1405 if (fd >= 0) 1406 FdSignalCreate(thr, pc, fd); 1407 return fd; 1408} 1409 1410TSAN_INTERCEPTOR(int, inotify_init, int fake) { 1411 SCOPED_TSAN_INTERCEPTOR(inotify_init, fake); 1412 int fd = REAL(inotify_init)(fake); 1413 if (fd >= 0) 1414 FdInotifyCreate(thr, pc, fd); 1415 return fd; 1416} 1417 1418TSAN_INTERCEPTOR(int, inotify_init1, int flags) { 1419 SCOPED_TSAN_INTERCEPTOR(inotify_init1, flags); 1420 int fd = REAL(inotify_init1)(flags); 1421 if (fd >= 0) 1422 FdInotifyCreate(thr, pc, fd); 1423 return fd; 1424} 1425 1426TSAN_INTERCEPTOR(int, socket, int domain, int type, int protocol) { 1427 SCOPED_TSAN_INTERCEPTOR(socket, domain, type, protocol); 1428 int fd = REAL(socket)(domain, type, protocol); 1429 if (fd >= 0) 1430 FdSocketCreate(thr, pc, fd); 1431 return fd; 1432} 1433 1434TSAN_INTERCEPTOR(int, socketpair, int domain, int type, int protocol, int *fd) { 1435 SCOPED_TSAN_INTERCEPTOR(socketpair, domain, type, protocol, fd); 1436 int res = REAL(socketpair)(domain, type, protocol, fd); 1437 if (res == 0 && fd[0] >= 0 && fd[1] >= 0) 1438 FdPipeCreate(thr, pc, fd[0], fd[1]); 1439 return res; 1440} 1441 1442TSAN_INTERCEPTOR(int, connect, int fd, void *addr, unsigned addrlen) { 1443 SCOPED_TSAN_INTERCEPTOR(connect, fd, addr, addrlen); 1444 FdSocketConnecting(thr, pc, fd); 1445 int res = REAL(connect)(fd, addr, addrlen); 1446 if (res == 0 && fd >= 0) 1447 FdSocketConnect(thr, pc, fd); 1448 return res; 1449} 1450 1451TSAN_INTERCEPTOR(int, bind, int fd, void *addr, unsigned addrlen) { 1452 SCOPED_TSAN_INTERCEPTOR(bind, fd, addr, addrlen); 1453 int res = REAL(bind)(fd, addr, addrlen); 1454 if (fd > 0 && res == 0) 1455 FdAccess(thr, pc, fd); 1456 return res; 1457} 1458 1459TSAN_INTERCEPTOR(int, listen, int fd, int backlog) { 1460 SCOPED_TSAN_INTERCEPTOR(listen, fd, backlog); 1461 int res = REAL(listen)(fd, backlog); 1462 if (fd > 0 && res == 0) 1463 FdAccess(thr, pc, fd); 1464 return res; 1465} 1466 1467TSAN_INTERCEPTOR(int, epoll_create, int size) { 1468 SCOPED_TSAN_INTERCEPTOR(epoll_create, size); 1469 int fd = REAL(epoll_create)(size); 1470 if (fd >= 0) 1471 FdPollCreate(thr, pc, fd); 1472 return fd; 1473} 1474 1475TSAN_INTERCEPTOR(int, epoll_create1, int flags) { 1476 SCOPED_TSAN_INTERCEPTOR(epoll_create1, flags); 1477 int fd = REAL(epoll_create1)(flags); 1478 if (fd >= 0) 1479 FdPollCreate(thr, pc, fd); 1480 return fd; 1481} 1482 1483TSAN_INTERCEPTOR(int, close, int fd) { 1484 SCOPED_TSAN_INTERCEPTOR(close, fd); 1485 if (fd >= 0) 1486 FdClose(thr, pc, fd); 1487 return REAL(close)(fd); 1488} 1489 1490TSAN_INTERCEPTOR(int, __close, int fd) { 1491 SCOPED_TSAN_INTERCEPTOR(__close, fd); 1492 if (fd >= 0) 1493 FdClose(thr, pc, fd); 1494 return REAL(__close)(fd); 1495} 1496 1497// glibc guts 1498TSAN_INTERCEPTOR(void, __res_iclose, void *state, bool free_addr) { 1499 SCOPED_TSAN_INTERCEPTOR(__res_iclose, state, free_addr); 1500 int fds[64]; 1501 int cnt = ExtractResolvFDs(state, fds, ARRAY_SIZE(fds)); 1502 for (int i = 0; i < cnt; i++) { 1503 if (fds[i] > 0) 1504 FdClose(thr, pc, fds[i]); 1505 } 1506 REAL(__res_iclose)(state, free_addr); 1507} 1508 1509TSAN_INTERCEPTOR(int, pipe, int *pipefd) { 1510 SCOPED_TSAN_INTERCEPTOR(pipe, pipefd); 1511 int res = REAL(pipe)(pipefd); 1512 if (res == 0 && pipefd[0] >= 0 && pipefd[1] >= 0) 1513 FdPipeCreate(thr, pc, pipefd[0], pipefd[1]); 1514 return res; 1515} 1516 1517TSAN_INTERCEPTOR(int, pipe2, int *pipefd, int flags) { 1518 SCOPED_TSAN_INTERCEPTOR(pipe2, pipefd, flags); 1519 int res = REAL(pipe2)(pipefd, flags); 1520 if (res == 0 && pipefd[0] >= 0 && pipefd[1] >= 0) 1521 FdPipeCreate(thr, pc, pipefd[0], pipefd[1]); 1522 return res; 1523} 1524 1525TSAN_INTERCEPTOR(long_t, send, int fd, void *buf, long_t len, int flags) { 1526 SCOPED_TSAN_INTERCEPTOR(send, fd, buf, len, flags); 1527 if (fd >= 0) { 1528 FdAccess(thr, pc, fd); 1529 FdRelease(thr, pc, fd); 1530 } 1531 int res = REAL(send)(fd, buf, len, flags); 1532 return res; 1533} 1534 1535TSAN_INTERCEPTOR(long_t, sendmsg, int fd, void *msg, int flags) { 1536 SCOPED_TSAN_INTERCEPTOR(sendmsg, fd, msg, flags); 1537 if (fd >= 0) { 1538 FdAccess(thr, pc, fd); 1539 FdRelease(thr, pc, fd); 1540 } 1541 int res = REAL(sendmsg)(fd, msg, flags); 1542 return res; 1543} 1544 1545TSAN_INTERCEPTOR(long_t, recv, int fd, void *buf, long_t len, int flags) { 1546 SCOPED_TSAN_INTERCEPTOR(recv, fd, buf, len, flags); 1547 if (fd >= 0) 1548 FdAccess(thr, pc, fd); 1549 int res = REAL(recv)(fd, buf, len, flags); 1550 if (res >= 0 && fd >= 0) { 1551 FdAcquire(thr, pc, fd); 1552 } 1553 return res; 1554} 1555 1556TSAN_INTERCEPTOR(int, unlink, char *path) { 1557 SCOPED_TSAN_INTERCEPTOR(unlink, path); 1558 Release(thr, pc, File2addr(path)); 1559 int res = REAL(unlink)(path); 1560 return res; 1561} 1562 1563TSAN_INTERCEPTOR(void*, fopen, char *path, char *mode) { 1564 SCOPED_TSAN_INTERCEPTOR(fopen, path, mode); 1565 void *res = REAL(fopen)(path, mode); 1566 Acquire(thr, pc, File2addr(path)); 1567 if (res) { 1568 int fd = fileno_unlocked(res); 1569 if (fd >= 0) 1570 FdFileCreate(thr, pc, fd); 1571 } 1572 return res; 1573} 1574 1575TSAN_INTERCEPTOR(void*, freopen, char *path, char *mode, void *stream) { 1576 SCOPED_TSAN_INTERCEPTOR(freopen, path, mode, stream); 1577 if (stream) { 1578 int fd = fileno_unlocked(stream); 1579 if (fd >= 0) 1580 FdClose(thr, pc, fd); 1581 } 1582 void *res = REAL(freopen)(path, mode, stream); 1583 Acquire(thr, pc, File2addr(path)); 1584 if (res) { 1585 int fd = fileno_unlocked(res); 1586 if (fd >= 0) 1587 FdFileCreate(thr, pc, fd); 1588 } 1589 return res; 1590} 1591 1592TSAN_INTERCEPTOR(int, fclose, void *stream) { 1593 { 1594 SCOPED_TSAN_INTERCEPTOR(fclose, stream); 1595 if (stream) { 1596 int fd = fileno_unlocked(stream); 1597 if (fd >= 0) 1598 FdClose(thr, pc, fd); 1599 } 1600 } 1601 return REAL(fclose)(stream); 1602} 1603 1604TSAN_INTERCEPTOR(uptr, fread, void *ptr, uptr size, uptr nmemb, void *f) { 1605 { 1606 SCOPED_TSAN_INTERCEPTOR(fread, ptr, size, nmemb, f); 1607 MemoryAccessRange(thr, pc, (uptr)ptr, size * nmemb, true); 1608 } 1609 return REAL(fread)(ptr, size, nmemb, f); 1610} 1611 1612TSAN_INTERCEPTOR(uptr, fwrite, const void *p, uptr size, uptr nmemb, void *f) { 1613 { 1614 SCOPED_TSAN_INTERCEPTOR(fwrite, p, size, nmemb, f); 1615 MemoryAccessRange(thr, pc, (uptr)p, size * nmemb, false); 1616 } 1617 return REAL(fwrite)(p, size, nmemb, f); 1618} 1619 1620TSAN_INTERCEPTOR(int, fflush, void *stream) { 1621 SCOPED_TSAN_INTERCEPTOR(fflush, stream); 1622 return REAL(fflush)(stream); 1623} 1624 1625TSAN_INTERCEPTOR(void, abort, int fake) { 1626 SCOPED_TSAN_INTERCEPTOR(abort, fake); 1627 REAL(fflush)(0); 1628 REAL(abort)(fake); 1629} 1630 1631TSAN_INTERCEPTOR(int, puts, const char *s) { 1632 SCOPED_TSAN_INTERCEPTOR(puts, s); 1633 MemoryAccessRange(thr, pc, (uptr)s, internal_strlen(s), false); 1634 return REAL(puts)(s); 1635} 1636 1637TSAN_INTERCEPTOR(int, rmdir, char *path) { 1638 SCOPED_TSAN_INTERCEPTOR(rmdir, path); 1639 Release(thr, pc, Dir2addr(path)); 1640 int res = REAL(rmdir)(path); 1641 return res; 1642} 1643 1644TSAN_INTERCEPTOR(void*, opendir, char *path) { 1645 SCOPED_TSAN_INTERCEPTOR(opendir, path); 1646 void *res = REAL(opendir)(path); 1647 if (res != 0) 1648 Acquire(thr, pc, Dir2addr(path)); 1649 return res; 1650} 1651 1652TSAN_INTERCEPTOR(int, epoll_ctl, int epfd, int op, int fd, void *ev) { 1653 SCOPED_TSAN_INTERCEPTOR(epoll_ctl, epfd, op, fd, ev); 1654 if (epfd >= 0) 1655 FdAccess(thr, pc, epfd); 1656 if (epfd >= 0 && fd >= 0) 1657 FdAccess(thr, pc, fd); 1658 if (op == EPOLL_CTL_ADD && epfd >= 0) 1659 FdRelease(thr, pc, epfd); 1660 int res = REAL(epoll_ctl)(epfd, op, fd, ev); 1661 return res; 1662} 1663 1664TSAN_INTERCEPTOR(int, epoll_wait, int epfd, void *ev, int cnt, int timeout) { 1665 SCOPED_TSAN_INTERCEPTOR(epoll_wait, epfd, ev, cnt, timeout); 1666 if (epfd >= 0) 1667 FdAccess(thr, pc, epfd); 1668 int res = BLOCK_REAL(epoll_wait)(epfd, ev, cnt, timeout); 1669 if (res > 0 && epfd >= 0) 1670 FdAcquire(thr, pc, epfd); 1671 return res; 1672} 1673 1674void ALWAYS_INLINE rtl_generic_sighandler(bool sigact, int sig, 1675 my_siginfo_t *info, void *ctx) { 1676 ThreadState *thr = cur_thread(); 1677 SignalContext *sctx = SigCtx(thr); 1678 // Don't mess with synchronous signals. 1679 if (sig == SIGSEGV || sig == SIGBUS || sig == SIGILL || 1680 sig == SIGABRT || sig == SIGFPE || sig == SIGPIPE || sig == SIGSYS || 1681 // If we are sending signal to ourselves, we must process it now. 1682 (sctx && sig == sctx->int_signal_send) || 1683 // If we are in blocking function, we can safely process it now 1684 // (but check if we are in a recursive interceptor, 1685 // i.e. pthread_join()->munmap()). 1686 (sctx && sctx->in_blocking_func == 1 && thr->in_rtl == 1)) { 1687 int in_rtl = thr->in_rtl; 1688 thr->in_rtl = 0; 1689 CHECK_EQ(thr->in_signal_handler, false); 1690 thr->in_signal_handler = true; 1691 if (sigact) 1692 sigactions[sig].sa_sigaction(sig, info, ctx); 1693 else 1694 sigactions[sig].sa_handler(sig); 1695 CHECK_EQ(thr->in_signal_handler, true); 1696 thr->in_signal_handler = false; 1697 thr->in_rtl = in_rtl; 1698 return; 1699 } 1700 1701 if (sctx == 0) 1702 return; 1703 SignalDesc *signal = &sctx->pending_signals[sig]; 1704 if (signal->armed == false) { 1705 signal->armed = true; 1706 signal->sigaction = sigact; 1707 if (info) 1708 internal_memcpy(&signal->siginfo, info, sizeof(*info)); 1709 if (ctx) 1710 internal_memcpy(&signal->ctx, ctx, sizeof(signal->ctx)); 1711 sctx->pending_signal_count++; 1712 } 1713} 1714 1715static void rtl_sighandler(int sig) { 1716 rtl_generic_sighandler(false, sig, 0, 0); 1717} 1718 1719static void rtl_sigaction(int sig, my_siginfo_t *info, void *ctx) { 1720 rtl_generic_sighandler(true, sig, info, ctx); 1721} 1722 1723TSAN_INTERCEPTOR(int, sigaction, int sig, sigaction_t *act, sigaction_t *old) { 1724 SCOPED_TSAN_INTERCEPTOR(sigaction, sig, act, old); 1725 if (old) 1726 internal_memcpy(old, &sigactions[sig], sizeof(*old)); 1727 if (act == 0) 1728 return 0; 1729 internal_memcpy(&sigactions[sig], act, sizeof(*act)); 1730 sigaction_t newact; 1731 internal_memcpy(&newact, act, sizeof(newact)); 1732 REAL(sigfillset)(&newact.sa_mask); 1733 if (act->sa_handler != SIG_IGN && act->sa_handler != SIG_DFL) { 1734 if (newact.sa_flags & SA_SIGINFO) 1735 newact.sa_sigaction = rtl_sigaction; 1736 else 1737 newact.sa_handler = rtl_sighandler; 1738 } 1739 int res = REAL(sigaction)(sig, &newact, 0); 1740 return res; 1741} 1742 1743TSAN_INTERCEPTOR(sighandler_t, signal, int sig, sighandler_t h) { 1744 sigaction_t act; 1745 act.sa_handler = h; 1746 REAL(memset)(&act.sa_mask, -1, sizeof(act.sa_mask)); 1747 act.sa_flags = 0; 1748 sigaction_t old; 1749 int res = sigaction(sig, &act, &old); 1750 if (res) 1751 return SIG_ERR; 1752 return old.sa_handler; 1753} 1754 1755TSAN_INTERCEPTOR(int, sigsuspend, const __sanitizer_sigset_t *mask) { 1756 SCOPED_TSAN_INTERCEPTOR(sigsuspend, mask); 1757 return REAL(sigsuspend)(mask); 1758} 1759 1760TSAN_INTERCEPTOR(int, raise, int sig) { 1761 SCOPED_TSAN_INTERCEPTOR(raise, sig); 1762 SignalContext *sctx = SigCtx(thr); 1763 CHECK_NE(sctx, 0); 1764 int prev = sctx->int_signal_send; 1765 sctx->int_signal_send = sig; 1766 int res = REAL(raise)(sig); 1767 CHECK_EQ(sctx->int_signal_send, sig); 1768 sctx->int_signal_send = prev; 1769 return res; 1770} 1771 1772TSAN_INTERCEPTOR(int, kill, int pid, int sig) { 1773 SCOPED_TSAN_INTERCEPTOR(kill, pid, sig); 1774 SignalContext *sctx = SigCtx(thr); 1775 CHECK_NE(sctx, 0); 1776 int prev = sctx->int_signal_send; 1777 if (pid == (int)internal_getpid()) { 1778 sctx->int_signal_send = sig; 1779 } 1780 int res = REAL(kill)(pid, sig); 1781 if (pid == (int)internal_getpid()) { 1782 CHECK_EQ(sctx->int_signal_send, sig); 1783 sctx->int_signal_send = prev; 1784 } 1785 return res; 1786} 1787 1788TSAN_INTERCEPTOR(int, pthread_kill, void *tid, int sig) { 1789 SCOPED_TSAN_INTERCEPTOR(pthread_kill, tid, sig); 1790 SignalContext *sctx = SigCtx(thr); 1791 CHECK_NE(sctx, 0); 1792 int prev = sctx->int_signal_send; 1793 if (tid == pthread_self()) { 1794 sctx->int_signal_send = sig; 1795 } 1796 int res = REAL(pthread_kill)(tid, sig); 1797 if (tid == pthread_self()) { 1798 CHECK_EQ(sctx->int_signal_send, sig); 1799 sctx->int_signal_send = prev; 1800 } 1801 return res; 1802} 1803 1804TSAN_INTERCEPTOR(int, gettimeofday, void *tv, void *tz) { 1805 SCOPED_TSAN_INTERCEPTOR(gettimeofday, tv, tz); 1806 // It's intercepted merely to process pending signals. 1807 return REAL(gettimeofday)(tv, tz); 1808} 1809 1810TSAN_INTERCEPTOR(int, getaddrinfo, void *node, void *service, 1811 void *hints, void *rv) { 1812 SCOPED_TSAN_INTERCEPTOR(getaddrinfo, node, service, hints, rv); 1813 // We miss atomic synchronization in getaddrinfo, 1814 // and can report false race between malloc and free 1815 // inside of getaddrinfo. So ignore memory accesses. 1816 ThreadIgnoreBegin(thr); 1817 // getaddrinfo calls fopen, which can be intercepted by user. 1818 thr->in_rtl--; 1819 CHECK_EQ(thr->in_rtl, 0); 1820 int res = REAL(getaddrinfo)(node, service, hints, rv); 1821 thr->in_rtl++; 1822 ThreadIgnoreEnd(thr); 1823 return res; 1824} 1825 1826// Linux kernel has a bug that leads to kernel deadlock if a process 1827// maps TBs of memory and then calls mlock(). 1828static void MlockIsUnsupported() { 1829 static atomic_uint8_t printed; 1830 if (atomic_exchange(&printed, 1, memory_order_relaxed)) 1831 return; 1832 if (flags()->verbosity > 0) 1833 Printf("INFO: ThreadSanitizer ignores mlock/mlockall/munlock/munlockall\n"); 1834} 1835 1836TSAN_INTERCEPTOR(int, mlock, const void *addr, uptr len) { 1837 MlockIsUnsupported(); 1838 return 0; 1839} 1840 1841TSAN_INTERCEPTOR(int, munlock, const void *addr, uptr len) { 1842 MlockIsUnsupported(); 1843 return 0; 1844} 1845 1846TSAN_INTERCEPTOR(int, mlockall, int flags) { 1847 MlockIsUnsupported(); 1848 return 0; 1849} 1850 1851TSAN_INTERCEPTOR(int, munlockall, void) { 1852 MlockIsUnsupported(); 1853 return 0; 1854} 1855 1856TSAN_INTERCEPTOR(int, fork, int fake) { 1857 SCOPED_INTERCEPTOR_RAW(fork, fake); 1858 int pid = REAL(fork)(fake); 1859 if (pid == 0) { 1860 // child 1861 FdOnFork(thr, pc); 1862 } else if (pid > 0) { 1863 // parent 1864 } 1865 return pid; 1866} 1867 1868static int OnExit(ThreadState *thr) { 1869 int status = Finalize(thr); 1870 REAL(fflush)(0); 1871 return status; 1872} 1873 1874struct TsanInterceptorContext { 1875 ThreadState *thr; 1876 const uptr caller_pc; 1877 const uptr pc; 1878}; 1879 1880#include "sanitizer_common/sanitizer_platform_interceptors.h" 1881// Causes interceptor recursion (getpwuid_r() calls fopen()) 1882#undef SANITIZER_INTERCEPT_GETPWNAM_AND_FRIENDS 1883#undef SANITIZER_INTERCEPT_GETPWNAM_R_AND_FRIENDS 1884// Causes interceptor recursion (getaddrinfo() and fopen()) 1885#undef SANITIZER_INTERCEPT_GETADDRINFO 1886#undef SANITIZER_INTERCEPT_GETNAMEINFO 1887// Causes interceptor recursion (glob64() calls lstat64()) 1888#undef SANITIZER_INTERCEPT_GLOB 1889 1890#define COMMON_INTERCEPTOR_UNPOISON_PARAM(ctx, count) \ 1891 do { \ 1892 } while (false) 1893#define COMMON_INTERCEPTOR_WRITE_RANGE(ctx, ptr, size) \ 1894 MemoryAccessRange(((TsanInterceptorContext *)ctx)->thr, \ 1895 ((TsanInterceptorContext *)ctx)->pc, (uptr)ptr, size, \ 1896 true) 1897#define COMMON_INTERCEPTOR_READ_RANGE(ctx, ptr, size) \ 1898 MemoryAccessRange(((TsanInterceptorContext *) ctx)->thr, \ 1899 ((TsanInterceptorContext *) ctx)->pc, (uptr) ptr, size, \ 1900 false) 1901#define COMMON_INTERCEPTOR_ENTER(ctx, func, ...) \ 1902 SCOPED_TSAN_INTERCEPTOR(func, __VA_ARGS__); \ 1903 TsanInterceptorContext _ctx = {thr, caller_pc, pc}; \ 1904 ctx = (void *)&_ctx; \ 1905 (void) ctx; 1906#define COMMON_INTERCEPTOR_FD_ACQUIRE(ctx, fd) \ 1907 FdAcquire(((TsanInterceptorContext *) ctx)->thr, pc, fd) 1908#define COMMON_INTERCEPTOR_FD_RELEASE(ctx, fd) \ 1909 FdRelease(((TsanInterceptorContext *) ctx)->thr, pc, fd) 1910#define COMMON_INTERCEPTOR_FD_ACCESS(ctx, fd) \ 1911 FdAccess(((TsanInterceptorContext *) ctx)->thr, pc, fd) 1912#define COMMON_INTERCEPTOR_FD_SOCKET_ACCEPT(ctx, fd, newfd) \ 1913 FdSocketAccept(((TsanInterceptorContext *) ctx)->thr, pc, fd, newfd) 1914#define COMMON_INTERCEPTOR_SET_THREAD_NAME(ctx, name) \ 1915 ThreadSetName(((TsanInterceptorContext *) ctx)->thr, name) 1916#define COMMON_INTERCEPTOR_BLOCK_REAL(name) BLOCK_REAL(name) 1917#define COMMON_INTERCEPTOR_ON_EXIT(ctx) \ 1918 OnExit(((TsanInterceptorContext *) ctx)->thr) 1919#include "sanitizer_common/sanitizer_common_interceptors.inc" 1920 1921#define TSAN_SYSCALL() \ 1922 ThreadState *thr = cur_thread(); \ 1923 ScopedSyscall scoped_syscall(thr) \ 1924/**/ 1925 1926struct ScopedSyscall { 1927 ThreadState *thr; 1928 1929 explicit ScopedSyscall(ThreadState *thr) 1930 : thr(thr) { 1931 if (thr->in_rtl == 0) 1932 Initialize(thr); 1933 thr->in_rtl++; 1934 } 1935 1936 ~ScopedSyscall() { 1937 thr->in_rtl--; 1938 if (thr->in_rtl == 0) 1939 ProcessPendingSignals(thr); 1940 } 1941}; 1942 1943static void syscall_access_range(uptr pc, uptr p, uptr s, bool write) { 1944 TSAN_SYSCALL(); 1945 MemoryAccessRange(thr, pc, p, s, write); 1946} 1947 1948static void syscall_fd_close(uptr pc, int fd) { 1949 TSAN_SYSCALL(); 1950 if (fd >= 0) 1951 FdClose(thr, pc, fd); 1952} 1953 1954static void syscall_pre_fork(uptr pc) { 1955 TSAN_SYSCALL(); 1956} 1957 1958static void syscall_post_fork(uptr pc, int res) { 1959 TSAN_SYSCALL(); 1960 if (res == 0) { 1961 // child 1962 FdOnFork(thr, pc); 1963 } else if (res > 0) { 1964 // parent 1965 } 1966} 1967 1968#define COMMON_SYSCALL_PRE_READ_RANGE(p, s) \ 1969 syscall_access_range(GET_CALLER_PC(), (uptr)(p), (uptr)(s), false) 1970#define COMMON_SYSCALL_PRE_WRITE_RANGE(p, s) \ 1971 syscall_access_range(GET_CALLER_PC(), (uptr)(p), (uptr)(s), true) 1972#define COMMON_SYSCALL_POST_READ_RANGE(p, s) \ 1973 do { } while (false) 1974#define COMMON_SYSCALL_POST_WRITE_RANGE(p, s) \ 1975 do { } while (false) 1976#define COMMON_SYSCALL_FD_CLOSE(fd) \ 1977 syscall_fd_close(GET_CALLER_PC(), fd) 1978#define COMMON_SYSCALL_PRE_FORK() \ 1979 syscall_pre_fork(GET_CALLER_PC()) 1980#define COMMON_SYSCALL_POST_FORK(res) \ 1981 syscall_post_fork(GET_CALLER_PC(), res) 1982#include "sanitizer_common/sanitizer_common_syscalls.inc" 1983 1984namespace __tsan { 1985 1986static void finalize(void *arg) { 1987 ThreadState *thr = cur_thread(); 1988 uptr pc = 0; 1989 atexit_ctx->exit(thr, pc); 1990 int status = Finalize(thr); 1991 REAL(fflush)(0); 1992 if (status) 1993 REAL(_exit)(status); 1994} 1995 1996void ProcessPendingSignals(ThreadState *thr) { 1997 CHECK_EQ(thr->in_rtl, 0); 1998 SignalContext *sctx = SigCtx(thr); 1999 if (sctx == 0 || sctx->pending_signal_count == 0 || thr->in_signal_handler) 2000 return; 2001 Context *ctx = CTX(); 2002 thr->in_signal_handler = true; 2003 sctx->pending_signal_count = 0; 2004 // These are too big for stack. 2005 static THREADLOCAL __sanitizer_sigset_t emptyset, oldset; 2006 REAL(sigfillset)(&emptyset); 2007 pthread_sigmask(SIG_SETMASK, &emptyset, &oldset); 2008 for (int sig = 0; sig < kSigCount; sig++) { 2009 SignalDesc *signal = &sctx->pending_signals[sig]; 2010 if (signal->armed) { 2011 signal->armed = false; 2012 if (sigactions[sig].sa_handler != SIG_DFL 2013 && sigactions[sig].sa_handler != SIG_IGN) { 2014 // Insure that the handler does not spoil errno. 2015 const int saved_errno = errno; 2016 errno = 0; 2017 if (signal->sigaction) 2018 sigactions[sig].sa_sigaction(sig, &signal->siginfo, &signal->ctx); 2019 else 2020 sigactions[sig].sa_handler(sig); 2021 if (flags()->report_bugs && errno != 0) { 2022 ScopedInRtl in_rtl; 2023 __tsan::StackTrace stack; 2024 uptr pc = signal->sigaction ? 2025 (uptr)sigactions[sig].sa_sigaction : 2026 (uptr)sigactions[sig].sa_handler; 2027 pc += 1; // return address is expected, OutputReport() will undo this 2028 stack.Init(&pc, 1); 2029 ThreadRegistryLock l(ctx->thread_registry); 2030 ScopedReport rep(ReportTypeErrnoInSignal); 2031 if (!IsFiredSuppression(ctx, rep, stack)) { 2032 rep.AddStack(&stack); 2033 OutputReport(ctx, rep, rep.GetReport()->stacks[0]); 2034 } 2035 } 2036 errno = saved_errno; 2037 } 2038 } 2039 } 2040 pthread_sigmask(SIG_SETMASK, &oldset, 0); 2041 CHECK_EQ(thr->in_signal_handler, true); 2042 thr->in_signal_handler = false; 2043} 2044 2045static void unreachable() { 2046 Printf("FATAL: ThreadSanitizer: unreachable called\n"); 2047 Die(); 2048} 2049 2050void InitializeInterceptors() { 2051 CHECK_GT(cur_thread()->in_rtl, 0); 2052 2053 // We need to setup it early, because functions like dlsym() can call it. 2054 REAL(memset) = internal_memset; 2055 REAL(memcpy) = internal_memcpy; 2056 REAL(memcmp) = internal_memcmp; 2057 2058 // Instruct libc malloc to consume less memory. 2059 mallopt(1, 0); // M_MXFAST 2060 mallopt(-3, 32*1024); // M_MMAP_THRESHOLD 2061 2062 SANITIZER_COMMON_INTERCEPTORS_INIT; 2063 2064 TSAN_INTERCEPT(setjmp); 2065 TSAN_INTERCEPT(_setjmp); 2066 TSAN_INTERCEPT(sigsetjmp); 2067 TSAN_INTERCEPT(__sigsetjmp); 2068 TSAN_INTERCEPT(longjmp); 2069 TSAN_INTERCEPT(siglongjmp); 2070 2071 TSAN_INTERCEPT(malloc); 2072 TSAN_INTERCEPT(__libc_memalign); 2073 TSAN_INTERCEPT(calloc); 2074 TSAN_INTERCEPT(realloc); 2075 TSAN_INTERCEPT(free); 2076 TSAN_INTERCEPT(cfree); 2077 TSAN_INTERCEPT(mmap); 2078 TSAN_INTERCEPT(mmap64); 2079 TSAN_INTERCEPT(munmap); 2080 TSAN_INTERCEPT(memalign); 2081 TSAN_INTERCEPT(valloc); 2082 TSAN_INTERCEPT(pvalloc); 2083 TSAN_INTERCEPT(posix_memalign); 2084 2085 TSAN_INTERCEPT(strlen); 2086 TSAN_INTERCEPT(memset); 2087 TSAN_INTERCEPT(memcpy); 2088 TSAN_INTERCEPT(memchr); 2089 TSAN_INTERCEPT(memrchr); 2090 TSAN_INTERCEPT(memmove); 2091 TSAN_INTERCEPT(memcmp); 2092 TSAN_INTERCEPT(strchr); 2093 TSAN_INTERCEPT(strchrnul); 2094 TSAN_INTERCEPT(strrchr); 2095 TSAN_INTERCEPT(strcpy); // NOLINT 2096 TSAN_INTERCEPT(strncpy); 2097 TSAN_INTERCEPT(strstr); 2098 TSAN_INTERCEPT(strdup); 2099 2100 TSAN_INTERCEPT(pthread_create); 2101 TSAN_INTERCEPT(pthread_join); 2102 TSAN_INTERCEPT(pthread_detach); 2103 2104 TSAN_INTERCEPT(pthread_mutex_init); 2105 TSAN_INTERCEPT(pthread_mutex_destroy); 2106 TSAN_INTERCEPT(pthread_mutex_lock); 2107 TSAN_INTERCEPT(pthread_mutex_trylock); 2108 TSAN_INTERCEPT(pthread_mutex_timedlock); 2109 TSAN_INTERCEPT(pthread_mutex_unlock); 2110 2111 TSAN_INTERCEPT(pthread_spin_init); 2112 TSAN_INTERCEPT(pthread_spin_destroy); 2113 TSAN_INTERCEPT(pthread_spin_lock); 2114 TSAN_INTERCEPT(pthread_spin_trylock); 2115 TSAN_INTERCEPT(pthread_spin_unlock); 2116 2117 TSAN_INTERCEPT(pthread_rwlock_init); 2118 TSAN_INTERCEPT(pthread_rwlock_destroy); 2119 TSAN_INTERCEPT(pthread_rwlock_rdlock); 2120 TSAN_INTERCEPT(pthread_rwlock_tryrdlock); 2121 TSAN_INTERCEPT(pthread_rwlock_timedrdlock); 2122 TSAN_INTERCEPT(pthread_rwlock_wrlock); 2123 TSAN_INTERCEPT(pthread_rwlock_trywrlock); 2124 TSAN_INTERCEPT(pthread_rwlock_timedwrlock); 2125 TSAN_INTERCEPT(pthread_rwlock_unlock); 2126 2127 INTERCEPT_FUNCTION_VER(pthread_cond_init, GLIBC_2.3.2); 2128 INTERCEPT_FUNCTION_VER(pthread_cond_destroy, GLIBC_2.3.2); 2129 INTERCEPT_FUNCTION_VER(pthread_cond_signal, GLIBC_2.3.2); 2130 INTERCEPT_FUNCTION_VER(pthread_cond_broadcast, GLIBC_2.3.2); 2131 INTERCEPT_FUNCTION_VER(pthread_cond_wait, GLIBC_2.3.2); 2132 INTERCEPT_FUNCTION_VER(pthread_cond_timedwait, GLIBC_2.3.2); 2133 2134 TSAN_INTERCEPT(pthread_barrier_init); 2135 TSAN_INTERCEPT(pthread_barrier_destroy); 2136 TSAN_INTERCEPT(pthread_barrier_wait); 2137 2138 TSAN_INTERCEPT(pthread_once); 2139 2140 TSAN_INTERCEPT(sem_init); 2141 TSAN_INTERCEPT(sem_destroy); 2142 TSAN_INTERCEPT(sem_wait); 2143 TSAN_INTERCEPT(sem_trywait); 2144 TSAN_INTERCEPT(sem_timedwait); 2145 TSAN_INTERCEPT(sem_post); 2146 TSAN_INTERCEPT(sem_getvalue); 2147 2148 TSAN_INTERCEPT(stat); 2149 TSAN_INTERCEPT(__xstat); 2150 TSAN_INTERCEPT(stat64); 2151 TSAN_INTERCEPT(__xstat64); 2152 TSAN_INTERCEPT(lstat); 2153 TSAN_INTERCEPT(__lxstat); 2154 TSAN_INTERCEPT(lstat64); 2155 TSAN_INTERCEPT(__lxstat64); 2156 TSAN_INTERCEPT(fstat); 2157 TSAN_INTERCEPT(__fxstat); 2158 TSAN_INTERCEPT(fstat64); 2159 TSAN_INTERCEPT(__fxstat64); 2160 TSAN_INTERCEPT(open); 2161 TSAN_INTERCEPT(open64); 2162 TSAN_INTERCEPT(creat); 2163 TSAN_INTERCEPT(creat64); 2164 TSAN_INTERCEPT(dup); 2165 TSAN_INTERCEPT(dup2); 2166 TSAN_INTERCEPT(dup3); 2167 TSAN_INTERCEPT(eventfd); 2168 TSAN_INTERCEPT(signalfd); 2169 TSAN_INTERCEPT(inotify_init); 2170 TSAN_INTERCEPT(inotify_init1); 2171 TSAN_INTERCEPT(socket); 2172 TSAN_INTERCEPT(socketpair); 2173 TSAN_INTERCEPT(connect); 2174 TSAN_INTERCEPT(bind); 2175 TSAN_INTERCEPT(listen); 2176 TSAN_INTERCEPT(epoll_create); 2177 TSAN_INTERCEPT(epoll_create1); 2178 TSAN_INTERCEPT(close); 2179 TSAN_INTERCEPT(__close); 2180 TSAN_INTERCEPT(__res_iclose); 2181 TSAN_INTERCEPT(pipe); 2182 TSAN_INTERCEPT(pipe2); 2183 2184 TSAN_INTERCEPT(send); 2185 TSAN_INTERCEPT(sendmsg); 2186 TSAN_INTERCEPT(recv); 2187 2188 TSAN_INTERCEPT(unlink); 2189 TSAN_INTERCEPT(fopen); 2190 TSAN_INTERCEPT(freopen); 2191 TSAN_INTERCEPT(fclose); 2192 TSAN_INTERCEPT(fread); 2193 TSAN_INTERCEPT(fwrite); 2194 TSAN_INTERCEPT(fflush); 2195 TSAN_INTERCEPT(abort); 2196 TSAN_INTERCEPT(puts); 2197 TSAN_INTERCEPT(rmdir); 2198 TSAN_INTERCEPT(opendir); 2199 2200 TSAN_INTERCEPT(epoll_ctl); 2201 TSAN_INTERCEPT(epoll_wait); 2202 2203 TSAN_INTERCEPT(sigaction); 2204 TSAN_INTERCEPT(signal); 2205 TSAN_INTERCEPT(sigsuspend); 2206 TSAN_INTERCEPT(raise); 2207 TSAN_INTERCEPT(kill); 2208 TSAN_INTERCEPT(pthread_kill); 2209 TSAN_INTERCEPT(sleep); 2210 TSAN_INTERCEPT(usleep); 2211 TSAN_INTERCEPT(nanosleep); 2212 TSAN_INTERCEPT(gettimeofday); 2213 TSAN_INTERCEPT(getaddrinfo); 2214 2215 TSAN_INTERCEPT(mlock); 2216 TSAN_INTERCEPT(munlock); 2217 TSAN_INTERCEPT(mlockall); 2218 TSAN_INTERCEPT(munlockall); 2219 2220 TSAN_INTERCEPT(fork); 2221 TSAN_INTERCEPT(dlopen); 2222 TSAN_INTERCEPT(dlclose); 2223 TSAN_INTERCEPT(on_exit); 2224 TSAN_INTERCEPT(__cxa_atexit); 2225 TSAN_INTERCEPT(_exit); 2226 2227 // Need to setup it, because interceptors check that the function is resolved. 2228 // But atexit is emitted directly into the module, so can't be resolved. 2229 REAL(atexit) = (int(*)(void(*)()))unreachable; 2230 atexit_ctx = new(internal_alloc(MBlockAtExit, sizeof(AtExitContext))) 2231 AtExitContext(); 2232 2233 if (REAL(__cxa_atexit)(&finalize, 0, 0)) { 2234 Printf("ThreadSanitizer: failed to setup atexit callback\n"); 2235 Die(); 2236 } 2237 2238 if (pthread_key_create(&g_thread_finalize_key, &thread_finalize)) { 2239 Printf("ThreadSanitizer: failed to create thread key\n"); 2240 Die(); 2241 } 2242 2243 FdInit(); 2244} 2245 2246void internal_start_thread(void(*func)(void *arg), void *arg) { 2247 void *th; 2248 REAL(pthread_create)(&th, 0, (void*(*)(void *arg))func, arg); 2249 REAL(pthread_detach)(th); 2250} 2251 2252} // namespace __tsan 2253