tsan_interceptors.cc revision 9d4956eca0894f74be09ba7e93cf722e8b400d00
1//===-- tsan_interceptors.cc ----------------------------------------------===// 2// 3// The LLVM Compiler Infrastructure 4// 5// This file is distributed under the University of Illinois Open Source 6// License. See LICENSE.TXT for details. 7// 8//===----------------------------------------------------------------------===// 9// 10// This file is a part of ThreadSanitizer (TSan), a race detector. 11// 12// FIXME: move as many interceptors as possible into 13// sanitizer_common/sanitizer_common_interceptors.inc 14//===----------------------------------------------------------------------===// 15 16#include "sanitizer_common/sanitizer_atomic.h" 17#include "sanitizer_common/sanitizer_libc.h" 18#include "sanitizer_common/sanitizer_linux.h" 19#include "sanitizer_common/sanitizer_platform_limits_posix.h" 20#include "sanitizer_common/sanitizer_placement_new.h" 21#include "sanitizer_common/sanitizer_stacktrace.h" 22#include "interception/interception.h" 23#include "tsan_interface.h" 24#include "tsan_platform.h" 25#include "tsan_rtl.h" 26#include "tsan_mman.h" 27#include "tsan_fd.h" 28 29using namespace __tsan; // NOLINT 30 31const int kSigCount = 64; 32 33struct my_siginfo_t { 34 // The size is determined by looking at sizeof of real siginfo_t on linux. 35 u64 opaque[128 / sizeof(u64)]; 36}; 37 38struct sigset_t { 39 // The size is determined by looking at sizeof of real sigset_t on linux. 40 u64 val[128 / sizeof(u64)]; 41}; 42 43struct ucontext_t { 44 // The size is determined by looking at sizeof of real ucontext_t on linux. 45 u64 opaque[936 / sizeof(u64) + 1]; 46}; 47 48extern "C" int pthread_attr_init(void *attr); 49extern "C" int pthread_attr_destroy(void *attr); 50extern "C" int pthread_attr_getdetachstate(void *attr, int *v); 51extern "C" int pthread_attr_setstacksize(void *attr, uptr stacksize); 52extern "C" int pthread_attr_getstacksize(void *attr, uptr *stacksize); 53extern "C" int pthread_key_create(unsigned *key, void (*destructor)(void* v)); 54extern "C" int pthread_setspecific(unsigned key, const void *v); 55extern "C" int pthread_mutexattr_gettype(void *a, int *type); 56extern "C" int pthread_yield(); 57extern "C" int pthread_sigmask(int how, const sigset_t *set, sigset_t *oldset); 58extern "C" int sigfillset(sigset_t *set); 59extern "C" void *pthread_self(); 60extern "C" void _exit(int status); 61extern "C" int *__errno_location(); 62extern "C" int fileno_unlocked(void *stream); 63extern "C" void *__libc_malloc(uptr size); 64extern "C" void *__libc_calloc(uptr size, uptr n); 65extern "C" void *__libc_realloc(void *ptr, uptr size); 66extern "C" void __libc_free(void *ptr); 67extern "C" int mallopt(int param, int value); 68const int PTHREAD_MUTEX_RECURSIVE = 1; 69const int PTHREAD_MUTEX_RECURSIVE_NP = 1; 70const int EINVAL = 22; 71const int EBUSY = 16; 72const int EPOLL_CTL_ADD = 1; 73const int SIGILL = 4; 74const int SIGABRT = 6; 75const int SIGFPE = 8; 76const int SIGSEGV = 11; 77const int SIGPIPE = 13; 78const int SIGBUS = 7; 79const int SIGSYS = 31; 80void *const MAP_FAILED = (void*)-1; 81const int PTHREAD_BARRIER_SERIAL_THREAD = -1; 82const int MAP_FIXED = 0x10; 83typedef long long_t; // NOLINT 84 85// From /usr/include/unistd.h 86# define F_ULOCK 0 /* Unlock a previously locked region. */ 87# define F_LOCK 1 /* Lock a region for exclusive use. */ 88# define F_TLOCK 2 /* Test and lock a region for exclusive use. */ 89# define F_TEST 3 /* Test a region for other processes locks. */ 90 91typedef void (*sighandler_t)(int sig); 92 93#define errno (*__errno_location()) 94 95struct sigaction_t { 96 union { 97 sighandler_t sa_handler; 98 void (*sa_sigaction)(int sig, my_siginfo_t *siginfo, void *uctx); 99 }; 100 sigset_t sa_mask; 101 int sa_flags; 102 void (*sa_restorer)(); 103}; 104 105const sighandler_t SIG_DFL = (sighandler_t)0; 106const sighandler_t SIG_IGN = (sighandler_t)1; 107const sighandler_t SIG_ERR = (sighandler_t)-1; 108const int SA_SIGINFO = 4; 109const int SIG_SETMASK = 2; 110 111namespace std { 112struct nothrow_t {}; 113} // namespace std 114 115static sigaction_t sigactions[kSigCount]; 116 117namespace __tsan { 118struct SignalDesc { 119 bool armed; 120 bool sigaction; 121 my_siginfo_t siginfo; 122 ucontext_t ctx; 123}; 124 125struct SignalContext { 126 int in_blocking_func; 127 int int_signal_send; 128 int pending_signal_count; 129 SignalDesc pending_signals[kSigCount]; 130}; 131} // namespace __tsan 132 133static SignalContext *SigCtx(ThreadState *thr) { 134 SignalContext *ctx = (SignalContext*)thr->signal_ctx; 135 if (ctx == 0 && thr->is_alive) { 136 ScopedInRtl in_rtl; 137 ctx = (SignalContext*)MmapOrDie(sizeof(*ctx), "SignalContext"); 138 MemoryResetRange(thr, (uptr)&SigCtx, (uptr)ctx, sizeof(*ctx)); 139 thr->signal_ctx = ctx; 140 } 141 return ctx; 142} 143 144static unsigned g_thread_finalize_key; 145 146class ScopedInterceptor { 147 public: 148 ScopedInterceptor(ThreadState *thr, const char *fname, uptr pc); 149 ~ScopedInterceptor(); 150 private: 151 ThreadState *const thr_; 152 const int in_rtl_; 153}; 154 155ScopedInterceptor::ScopedInterceptor(ThreadState *thr, const char *fname, 156 uptr pc) 157 : thr_(thr) 158 , in_rtl_(thr->in_rtl) { 159 if (thr_->in_rtl == 0) { 160 Initialize(thr); 161 FuncEntry(thr, pc); 162 thr_->in_rtl++; 163 DPrintf("#%d: intercept %s()\n", thr_->tid, fname); 164 } else { 165 thr_->in_rtl++; 166 } 167} 168 169ScopedInterceptor::~ScopedInterceptor() { 170 thr_->in_rtl--; 171 if (thr_->in_rtl == 0) { 172 FuncExit(thr_); 173 ProcessPendingSignals(thr_); 174 } 175 CHECK_EQ(in_rtl_, thr_->in_rtl); 176} 177 178#define SCOPED_INTERCEPTOR_RAW(func, ...) \ 179 ThreadState *thr = cur_thread(); \ 180 StatInc(thr, StatInterceptor); \ 181 StatInc(thr, StatInt_##func); \ 182 const uptr caller_pc = GET_CALLER_PC(); \ 183 ScopedInterceptor si(thr, #func, caller_pc); \ 184 const uptr pc = __sanitizer::StackTrace::GetCurrentPc(); \ 185 (void)pc; \ 186/**/ 187 188#define SCOPED_TSAN_INTERCEPTOR(func, ...) \ 189 SCOPED_INTERCEPTOR_RAW(func, __VA_ARGS__); \ 190 if (REAL(func) == 0) { \ 191 Printf("FATAL: ThreadSanitizer: failed to intercept %s\n", #func); \ 192 Die(); \ 193 } \ 194 if (thr->in_rtl > 1) \ 195 return REAL(func)(__VA_ARGS__); \ 196/**/ 197 198#define TSAN_INTERCEPTOR(ret, func, ...) INTERCEPTOR(ret, func, __VA_ARGS__) 199#define TSAN_INTERCEPT(func) INTERCEPT_FUNCTION(func) 200 201#define BLOCK_REAL(name) (BlockingCall(thr), REAL(name)) 202 203struct BlockingCall { 204 explicit BlockingCall(ThreadState *thr) 205 : ctx(SigCtx(thr)) { 206 ctx->in_blocking_func++; 207 } 208 209 ~BlockingCall() { 210 ctx->in_blocking_func--; 211 } 212 213 SignalContext *ctx; 214}; 215 216TSAN_INTERCEPTOR(unsigned, sleep, unsigned sec) { 217 SCOPED_TSAN_INTERCEPTOR(sleep, sec); 218 unsigned res = BLOCK_REAL(sleep)(sec); 219 AfterSleep(thr, pc); 220 return res; 221} 222 223TSAN_INTERCEPTOR(int, usleep, long_t usec) { 224 SCOPED_TSAN_INTERCEPTOR(usleep, usec); 225 int res = BLOCK_REAL(usleep)(usec); 226 AfterSleep(thr, pc); 227 return res; 228} 229 230TSAN_INTERCEPTOR(int, nanosleep, void *req, void *rem) { 231 SCOPED_TSAN_INTERCEPTOR(nanosleep, req, rem); 232 int res = BLOCK_REAL(nanosleep)(req, rem); 233 AfterSleep(thr, pc); 234 return res; 235} 236 237class AtExitContext { 238 public: 239 AtExitContext() 240 : mtx_(MutexTypeAtExit, StatMtxAtExit) 241 , pos_() { 242 } 243 244 typedef void(*atexit_t)(); 245 246 int atexit(ThreadState *thr, uptr pc, bool is_on_exit, 247 atexit_t f, void *arg) { 248 Lock l(&mtx_); 249 if (pos_ == kMaxAtExit) 250 return 1; 251 Release(thr, pc, (uptr)this); 252 stack_[pos_] = f; 253 args_[pos_] = arg; 254 is_on_exits_[pos_] = is_on_exit; 255 pos_++; 256 return 0; 257 } 258 259 void exit(ThreadState *thr, uptr pc) { 260 CHECK_EQ(thr->in_rtl, 0); 261 for (;;) { 262 atexit_t f = 0; 263 void *arg = 0; 264 bool is_on_exit = false; 265 { 266 Lock l(&mtx_); 267 if (pos_) { 268 pos_--; 269 f = stack_[pos_]; 270 arg = args_[pos_]; 271 is_on_exit = is_on_exits_[pos_]; 272 ScopedInRtl in_rtl; 273 Acquire(thr, pc, (uptr)this); 274 } 275 } 276 if (f == 0) 277 break; 278 DPrintf("#%d: executing atexit func %p\n", thr->tid, f); 279 CHECK_EQ(thr->in_rtl, 0); 280 if (is_on_exit) 281 ((void(*)(int status, void *arg))f)(0, arg); 282 else 283 ((void(*)(void *arg, void *dso))f)(arg, 0); 284 } 285 } 286 287 private: 288 static const int kMaxAtExit = 128; 289 Mutex mtx_; 290 atexit_t stack_[kMaxAtExit]; 291 void *args_[kMaxAtExit]; 292 bool is_on_exits_[kMaxAtExit]; 293 int pos_; 294}; 295 296static AtExitContext *atexit_ctx; 297 298TSAN_INTERCEPTOR(int, atexit, void (*f)()) { 299 if (cur_thread()->in_symbolizer) 300 return 0; 301 SCOPED_TSAN_INTERCEPTOR(atexit, f); 302 return atexit_ctx->atexit(thr, pc, false, (void(*)())f, 0); 303} 304 305TSAN_INTERCEPTOR(int, on_exit, void(*f)(int, void*), void *arg) { 306 if (cur_thread()->in_symbolizer) 307 return 0; 308 SCOPED_TSAN_INTERCEPTOR(on_exit, f, arg); 309 return atexit_ctx->atexit(thr, pc, true, (void(*)())f, arg); 310} 311 312TSAN_INTERCEPTOR(int, __cxa_atexit, void (*f)(void *a), void *arg, void *dso) { 313 if (cur_thread()->in_symbolizer) 314 return 0; 315 SCOPED_TSAN_INTERCEPTOR(__cxa_atexit, f, arg, dso); 316 if (dso) { 317 // Memory allocation in __cxa_atexit will race with free during exit, 318 // because we do not see synchronization around atexit callback list. 319 ThreadIgnoreBegin(thr); 320 int res = REAL(__cxa_atexit)(f, arg, dso); 321 ThreadIgnoreEnd(thr); 322 return res; 323 } 324 return atexit_ctx->atexit(thr, pc, false, (void(*)())f, arg); 325} 326 327// Cleanup old bufs. 328static void JmpBufGarbageCollect(ThreadState *thr, uptr sp) { 329 for (uptr i = 0; i < thr->jmp_bufs.Size(); i++) { 330 JmpBuf *buf = &thr->jmp_bufs[i]; 331 if (buf->sp <= sp) { 332 uptr sz = thr->jmp_bufs.Size(); 333 thr->jmp_bufs[i] = thr->jmp_bufs[sz - 1]; 334 thr->jmp_bufs.PopBack(); 335 i--; 336 } 337 } 338} 339 340static void SetJmp(ThreadState *thr, uptr sp, uptr mangled_sp) { 341 if (thr->shadow_stack_pos == 0) // called from libc guts during bootstrap 342 return; 343 // Cleanup old bufs. 344 JmpBufGarbageCollect(thr, sp); 345 // Remember the buf. 346 JmpBuf *buf = thr->jmp_bufs.PushBack(); 347 buf->sp = sp; 348 buf->mangled_sp = mangled_sp; 349 buf->shadow_stack_pos = thr->shadow_stack_pos; 350} 351 352static void LongJmp(ThreadState *thr, uptr *env) { 353 uptr mangled_sp = env[6]; 354 // Find the saved buf by mangled_sp. 355 for (uptr i = 0; i < thr->jmp_bufs.Size(); i++) { 356 JmpBuf *buf = &thr->jmp_bufs[i]; 357 if (buf->mangled_sp == mangled_sp) { 358 CHECK_GE(thr->shadow_stack_pos, buf->shadow_stack_pos); 359 // Unwind the stack. 360 while (thr->shadow_stack_pos > buf->shadow_stack_pos) 361 FuncExit(thr); 362 JmpBufGarbageCollect(thr, buf->sp - 1); // do not collect buf->sp 363 return; 364 } 365 } 366 Printf("ThreadSanitizer: can't find longjmp buf\n"); 367 CHECK(0); 368} 369 370// FIXME: put everything below into a common extern "C" block? 371extern "C" void __tsan_setjmp(uptr sp, uptr mangled_sp) { 372 ScopedInRtl in_rtl; 373 SetJmp(cur_thread(), sp, mangled_sp); 374} 375 376// Not called. Merely to satisfy TSAN_INTERCEPT(). 377extern "C" SANITIZER_INTERFACE_ATTRIBUTE 378int __interceptor_setjmp(void *env); 379extern "C" int __interceptor_setjmp(void *env) { 380 CHECK(0); 381 return 0; 382} 383 384// FIXME: any reason to have a separate declaration? 385extern "C" SANITIZER_INTERFACE_ATTRIBUTE 386int __interceptor__setjmp(void *env); 387extern "C" int __interceptor__setjmp(void *env) { 388 CHECK(0); 389 return 0; 390} 391 392extern "C" SANITIZER_INTERFACE_ATTRIBUTE 393int __interceptor_sigsetjmp(void *env); 394extern "C" int __interceptor_sigsetjmp(void *env) { 395 CHECK(0); 396 return 0; 397} 398 399extern "C" SANITIZER_INTERFACE_ATTRIBUTE 400int __interceptor___sigsetjmp(void *env); 401extern "C" int __interceptor___sigsetjmp(void *env) { 402 CHECK(0); 403 return 0; 404} 405 406extern "C" int setjmp(void *env); 407extern "C" int _setjmp(void *env); 408extern "C" int sigsetjmp(void *env); 409extern "C" int __sigsetjmp(void *env); 410DEFINE_REAL(int, setjmp, void *env) 411DEFINE_REAL(int, _setjmp, void *env) 412DEFINE_REAL(int, sigsetjmp, void *env) 413DEFINE_REAL(int, __sigsetjmp, void *env) 414 415TSAN_INTERCEPTOR(void, longjmp, uptr *env, int val) { 416 { 417 SCOPED_TSAN_INTERCEPTOR(longjmp, env, val); 418 } 419 LongJmp(cur_thread(), env); 420 REAL(longjmp)(env, val); 421} 422 423TSAN_INTERCEPTOR(void, siglongjmp, uptr *env, int val) { 424 { 425 SCOPED_TSAN_INTERCEPTOR(siglongjmp, env, val); 426 } 427 LongJmp(cur_thread(), env); 428 REAL(siglongjmp)(env, val); 429} 430 431TSAN_INTERCEPTOR(void*, malloc, uptr size) { 432 if (cur_thread()->in_symbolizer) 433 return __libc_malloc(size); 434 void *p = 0; 435 { 436 SCOPED_INTERCEPTOR_RAW(malloc, size); 437 p = user_alloc(thr, pc, size); 438 } 439 invoke_malloc_hook(p, size); 440 return p; 441} 442 443TSAN_INTERCEPTOR(void*, __libc_memalign, uptr align, uptr sz) { 444 SCOPED_TSAN_INTERCEPTOR(__libc_memalign, align, sz); 445 return user_alloc(thr, pc, sz, align); 446} 447 448TSAN_INTERCEPTOR(void*, calloc, uptr size, uptr n) { 449 if (cur_thread()->in_symbolizer) 450 return __libc_calloc(size, n); 451 if (__sanitizer::CallocShouldReturnNullDueToOverflow(size, n)) 452 return AllocatorReturnNull(); 453 void *p = 0; 454 { 455 SCOPED_INTERCEPTOR_RAW(calloc, size, n); 456 p = user_alloc(thr, pc, n * size); 457 if (p) 458 internal_memset(p, 0, n * size); 459 } 460 invoke_malloc_hook(p, n * size); 461 return p; 462} 463 464TSAN_INTERCEPTOR(void*, realloc, void *p, uptr size) { 465 if (cur_thread()->in_symbolizer) 466 return __libc_realloc(p, size); 467 if (p) 468 invoke_free_hook(p); 469 { 470 SCOPED_INTERCEPTOR_RAW(realloc, p, size); 471 p = user_realloc(thr, pc, p, size); 472 } 473 invoke_malloc_hook(p, size); 474 return p; 475} 476 477TSAN_INTERCEPTOR(void, free, void *p) { 478 if (p == 0) 479 return; 480 if (cur_thread()->in_symbolizer) 481 return __libc_free(p); 482 invoke_free_hook(p); 483 SCOPED_INTERCEPTOR_RAW(free, p); 484 user_free(thr, pc, p); 485} 486 487TSAN_INTERCEPTOR(void, cfree, void *p) { 488 if (p == 0) 489 return; 490 if (cur_thread()->in_symbolizer) 491 return __libc_free(p); 492 invoke_free_hook(p); 493 SCOPED_INTERCEPTOR_RAW(cfree, p); 494 user_free(thr, pc, p); 495} 496 497TSAN_INTERCEPTOR(uptr, malloc_usable_size, void *p) { 498 SCOPED_INTERCEPTOR_RAW(malloc_usable_size, p); 499 return user_alloc_usable_size(thr, pc, p); 500} 501 502#define OPERATOR_NEW_BODY(mangled_name) \ 503 if (cur_thread()->in_symbolizer) \ 504 return __libc_malloc(size); \ 505 void *p = 0; \ 506 { \ 507 SCOPED_INTERCEPTOR_RAW(mangled_name, size); \ 508 p = user_alloc(thr, pc, size); \ 509 } \ 510 invoke_malloc_hook(p, size); \ 511 return p; 512 513SANITIZER_INTERFACE_ATTRIBUTE 514void *operator new(__sanitizer::uptr size); 515void *operator new(__sanitizer::uptr size) { 516 OPERATOR_NEW_BODY(_Znwm); 517} 518 519SANITIZER_INTERFACE_ATTRIBUTE 520void *operator new[](__sanitizer::uptr size); 521void *operator new[](__sanitizer::uptr size) { 522 OPERATOR_NEW_BODY(_Znam); 523} 524 525SANITIZER_INTERFACE_ATTRIBUTE 526void *operator new(__sanitizer::uptr size, std::nothrow_t const&); 527void *operator new(__sanitizer::uptr size, std::nothrow_t const&) { 528 OPERATOR_NEW_BODY(_ZnwmRKSt9nothrow_t); 529} 530 531SANITIZER_INTERFACE_ATTRIBUTE 532void *operator new[](__sanitizer::uptr size, std::nothrow_t const&); 533void *operator new[](__sanitizer::uptr size, std::nothrow_t const&) { 534 OPERATOR_NEW_BODY(_ZnamRKSt9nothrow_t); 535} 536 537#define OPERATOR_DELETE_BODY(mangled_name) \ 538 if (ptr == 0) return; \ 539 if (cur_thread()->in_symbolizer) \ 540 return __libc_free(ptr); \ 541 invoke_free_hook(ptr); \ 542 SCOPED_INTERCEPTOR_RAW(mangled_name, ptr); \ 543 user_free(thr, pc, ptr); 544 545SANITIZER_INTERFACE_ATTRIBUTE 546void operator delete(void *ptr); 547void operator delete(void *ptr) { 548 OPERATOR_DELETE_BODY(_ZdlPv); 549} 550 551SANITIZER_INTERFACE_ATTRIBUTE 552void operator delete[](void *ptr); 553void operator delete[](void *ptr) { 554 OPERATOR_DELETE_BODY(_ZdlPvRKSt9nothrow_t); 555} 556 557SANITIZER_INTERFACE_ATTRIBUTE 558void operator delete(void *ptr, std::nothrow_t const&); 559void operator delete(void *ptr, std::nothrow_t const&) { 560 OPERATOR_DELETE_BODY(_ZdaPv); 561} 562 563SANITIZER_INTERFACE_ATTRIBUTE 564void operator delete[](void *ptr, std::nothrow_t const&); 565void operator delete[](void *ptr, std::nothrow_t const&) { 566 OPERATOR_DELETE_BODY(_ZdaPvRKSt9nothrow_t); 567} 568 569TSAN_INTERCEPTOR(uptr, strlen, const char *s) { 570 SCOPED_TSAN_INTERCEPTOR(strlen, s); 571 uptr len = internal_strlen(s); 572 MemoryAccessRange(thr, pc, (uptr)s, len + 1, false); 573 return len; 574} 575 576TSAN_INTERCEPTOR(void*, memset, void *dst, int v, uptr size) { 577 SCOPED_TSAN_INTERCEPTOR(memset, dst, v, size); 578 MemoryAccessRange(thr, pc, (uptr)dst, size, true); 579 return internal_memset(dst, v, size); 580} 581 582TSAN_INTERCEPTOR(void*, memcpy, void *dst, const void *src, uptr size) { 583 SCOPED_TSAN_INTERCEPTOR(memcpy, dst, src, size); 584 MemoryAccessRange(thr, pc, (uptr)dst, size, true); 585 MemoryAccessRange(thr, pc, (uptr)src, size, false); 586 return internal_memcpy(dst, src, size); 587} 588 589TSAN_INTERCEPTOR(int, memcmp, const void *s1, const void *s2, uptr n) { 590 SCOPED_TSAN_INTERCEPTOR(memcmp, s1, s2, n); 591 int res = 0; 592 uptr len = 0; 593 for (; len < n; len++) { 594 if ((res = ((unsigned char*)s1)[len] - ((unsigned char*)s2)[len])) 595 break; 596 } 597 MemoryAccessRange(thr, pc, (uptr)s1, len < n ? len + 1 : n, false); 598 MemoryAccessRange(thr, pc, (uptr)s2, len < n ? len + 1 : n, false); 599 return res; 600} 601 602TSAN_INTERCEPTOR(void*, memchr, void *s, int c, uptr n) { 603 SCOPED_TSAN_INTERCEPTOR(memchr, s, c, n); 604 void *res = REAL(memchr)(s, c, n); 605 uptr len = res ? (char*)res - (char*)s + 1 : n; 606 MemoryAccessRange(thr, pc, (uptr)s, len, false); 607 return res; 608} 609 610TSAN_INTERCEPTOR(void*, memrchr, char *s, int c, uptr n) { 611 SCOPED_TSAN_INTERCEPTOR(memrchr, s, c, n); 612 MemoryAccessRange(thr, pc, (uptr)s, n, false); 613 return REAL(memrchr)(s, c, n); 614} 615 616TSAN_INTERCEPTOR(void*, memmove, void *dst, void *src, uptr n) { 617 SCOPED_TSAN_INTERCEPTOR(memmove, dst, src, n); 618 MemoryAccessRange(thr, pc, (uptr)dst, n, true); 619 MemoryAccessRange(thr, pc, (uptr)src, n, false); 620 return REAL(memmove)(dst, src, n); 621} 622 623TSAN_INTERCEPTOR(char*, strchr, char *s, int c) { 624 SCOPED_TSAN_INTERCEPTOR(strchr, s, c); 625 char *res = REAL(strchr)(s, c); 626 uptr len = res ? (char*)res - (char*)s + 1 : internal_strlen(s) + 1; 627 MemoryAccessRange(thr, pc, (uptr)s, len, false); 628 return res; 629} 630 631TSAN_INTERCEPTOR(char*, strchrnul, char *s, int c) { 632 SCOPED_TSAN_INTERCEPTOR(strchrnul, s, c); 633 char *res = REAL(strchrnul)(s, c); 634 uptr len = (char*)res - (char*)s + 1; 635 MemoryAccessRange(thr, pc, (uptr)s, len, false); 636 return res; 637} 638 639TSAN_INTERCEPTOR(char*, strrchr, char *s, int c) { 640 SCOPED_TSAN_INTERCEPTOR(strrchr, s, c); 641 MemoryAccessRange(thr, pc, (uptr)s, internal_strlen(s) + 1, false); 642 return REAL(strrchr)(s, c); 643} 644 645TSAN_INTERCEPTOR(char*, strcpy, char *dst, const char *src) { // NOLINT 646 SCOPED_TSAN_INTERCEPTOR(strcpy, dst, src); // NOLINT 647 uptr srclen = internal_strlen(src); 648 MemoryAccessRange(thr, pc, (uptr)dst, srclen + 1, true); 649 MemoryAccessRange(thr, pc, (uptr)src, srclen + 1, false); 650 return REAL(strcpy)(dst, src); // NOLINT 651} 652 653TSAN_INTERCEPTOR(char*, strncpy, char *dst, char *src, uptr n) { 654 SCOPED_TSAN_INTERCEPTOR(strncpy, dst, src, n); 655 uptr srclen = internal_strnlen(src, n); 656 MemoryAccessRange(thr, pc, (uptr)dst, n, true); 657 MemoryAccessRange(thr, pc, (uptr)src, min(srclen + 1, n), false); 658 return REAL(strncpy)(dst, src, n); 659} 660 661TSAN_INTERCEPTOR(const char*, strstr, const char *s1, const char *s2) { 662 SCOPED_TSAN_INTERCEPTOR(strstr, s1, s2); 663 const char *res = REAL(strstr)(s1, s2); 664 uptr len1 = internal_strlen(s1); 665 uptr len2 = internal_strlen(s2); 666 MemoryAccessRange(thr, pc, (uptr)s1, len1 + 1, false); 667 MemoryAccessRange(thr, pc, (uptr)s2, len2 + 1, false); 668 return res; 669} 670 671static bool fix_mmap_addr(void **addr, long_t sz, int flags) { 672 if (*addr) { 673 if (!IsAppMem((uptr)*addr) || !IsAppMem((uptr)*addr + sz - 1)) { 674 if (flags & MAP_FIXED) { 675 errno = EINVAL; 676 return false; 677 } else { 678 *addr = 0; 679 } 680 } 681 } 682 return true; 683} 684 685TSAN_INTERCEPTOR(void*, mmap, void *addr, long_t sz, int prot, 686 int flags, int fd, unsigned off) { 687 SCOPED_TSAN_INTERCEPTOR(mmap, addr, sz, prot, flags, fd, off); 688 if (!fix_mmap_addr(&addr, sz, flags)) 689 return MAP_FAILED; 690 void *res = REAL(mmap)(addr, sz, prot, flags, fd, off); 691 if (res != MAP_FAILED) { 692 if (fd > 0) 693 FdAccess(thr, pc, fd); 694 MemoryRangeImitateWrite(thr, pc, (uptr)res, sz); 695 } 696 return res; 697} 698 699TSAN_INTERCEPTOR(void*, mmap64, void *addr, long_t sz, int prot, 700 int flags, int fd, u64 off) { 701 SCOPED_TSAN_INTERCEPTOR(mmap64, addr, sz, prot, flags, fd, off); 702 if (!fix_mmap_addr(&addr, sz, flags)) 703 return MAP_FAILED; 704 void *res = REAL(mmap64)(addr, sz, prot, flags, fd, off); 705 if (res != MAP_FAILED) { 706 if (fd > 0) 707 FdAccess(thr, pc, fd); 708 MemoryRangeImitateWrite(thr, pc, (uptr)res, sz); 709 } 710 return res; 711} 712 713TSAN_INTERCEPTOR(int, munmap, void *addr, long_t sz) { 714 SCOPED_TSAN_INTERCEPTOR(munmap, addr, sz); 715 DontNeedShadowFor((uptr)addr, sz); 716 int res = REAL(munmap)(addr, sz); 717 return res; 718} 719 720TSAN_INTERCEPTOR(void*, memalign, uptr align, uptr sz) { 721 SCOPED_TSAN_INTERCEPTOR(memalign, align, sz); 722 return user_alloc(thr, pc, sz, align); 723} 724 725TSAN_INTERCEPTOR(void*, valloc, uptr sz) { 726 SCOPED_TSAN_INTERCEPTOR(valloc, sz); 727 return user_alloc(thr, pc, sz, GetPageSizeCached()); 728} 729 730TSAN_INTERCEPTOR(void*, pvalloc, uptr sz) { 731 SCOPED_TSAN_INTERCEPTOR(pvalloc, sz); 732 sz = RoundUp(sz, GetPageSizeCached()); 733 return user_alloc(thr, pc, sz, GetPageSizeCached()); 734} 735 736TSAN_INTERCEPTOR(int, posix_memalign, void **memptr, uptr align, uptr sz) { 737 SCOPED_TSAN_INTERCEPTOR(posix_memalign, memptr, align, sz); 738 *memptr = user_alloc(thr, pc, sz, align); 739 return 0; 740} 741 742// Used in thread-safe function static initialization. 743extern "C" int INTERFACE_ATTRIBUTE __cxa_guard_acquire(atomic_uint32_t *g) { 744 SCOPED_INTERCEPTOR_RAW(__cxa_guard_acquire, g); 745 for (;;) { 746 u32 cmp = atomic_load(g, memory_order_acquire); 747 if (cmp == 0) { 748 if (atomic_compare_exchange_strong(g, &cmp, 1<<16, memory_order_relaxed)) 749 return 1; 750 } else if (cmp == 1) { 751 Acquire(thr, pc, (uptr)g); 752 return 0; 753 } else { 754 internal_sched_yield(); 755 } 756 } 757} 758 759extern "C" void INTERFACE_ATTRIBUTE __cxa_guard_release(atomic_uint32_t *g) { 760 SCOPED_INTERCEPTOR_RAW(__cxa_guard_release, g); 761 Release(thr, pc, (uptr)g); 762 atomic_store(g, 1, memory_order_release); 763} 764 765extern "C" void INTERFACE_ATTRIBUTE __cxa_guard_abort(atomic_uint32_t *g) { 766 SCOPED_INTERCEPTOR_RAW(__cxa_guard_abort, g); 767 atomic_store(g, 0, memory_order_relaxed); 768} 769 770static void thread_finalize(void *v) { 771 uptr iter = (uptr)v; 772 if (iter > 1) { 773 if (pthread_setspecific(g_thread_finalize_key, (void*)(iter - 1))) { 774 Printf("ThreadSanitizer: failed to set thread key\n"); 775 Die(); 776 } 777 return; 778 } 779 { 780 ScopedInRtl in_rtl; 781 ThreadState *thr = cur_thread(); 782 ThreadFinish(thr); 783 SignalContext *sctx = thr->signal_ctx; 784 if (sctx) { 785 thr->signal_ctx = 0; 786 UnmapOrDie(sctx, sizeof(*sctx)); 787 } 788 } 789} 790 791 792struct ThreadParam { 793 void* (*callback)(void *arg); 794 void *param; 795 atomic_uintptr_t tid; 796}; 797 798extern "C" void *__tsan_thread_start_func(void *arg) { 799 ThreadParam *p = (ThreadParam*)arg; 800 void* (*callback)(void *arg) = p->callback; 801 void *param = p->param; 802 int tid = 0; 803 { 804 ThreadState *thr = cur_thread(); 805 ScopedInRtl in_rtl; 806 if (pthread_setspecific(g_thread_finalize_key, (void*)4)) { 807 Printf("ThreadSanitizer: failed to set thread key\n"); 808 Die(); 809 } 810 while ((tid = atomic_load(&p->tid, memory_order_acquire)) == 0) 811 pthread_yield(); 812 atomic_store(&p->tid, 0, memory_order_release); 813 ThreadStart(thr, tid, GetTid()); 814 CHECK_EQ(thr->in_rtl, 1); 815 } 816 void *res = callback(param); 817 // Prevent the callback from being tail called, 818 // it mixes up stack traces. 819 volatile int foo = 42; 820 foo++; 821 return res; 822} 823 824TSAN_INTERCEPTOR(int, pthread_create, 825 void *th, void *attr, void *(*callback)(void*), void * param) { 826 SCOPED_TSAN_INTERCEPTOR(pthread_create, th, attr, callback, param); 827 __sanitizer_pthread_attr_t myattr; 828 if (attr == 0) { 829 pthread_attr_init(&myattr); 830 attr = &myattr; 831 } 832 int detached = 0; 833 pthread_attr_getdetachstate(attr, &detached); 834 835#if defined(TSAN_DEBUG_OUTPUT) 836 int verbosity = (TSAN_DEBUG_OUTPUT); 837#else 838 int verbosity = 0; 839#endif 840 AdjustStackSizeLinux(attr, verbosity); 841 842 ThreadParam p; 843 p.callback = callback; 844 p.param = param; 845 atomic_store(&p.tid, 0, memory_order_relaxed); 846 int res = REAL(pthread_create)(th, attr, __tsan_thread_start_func, &p); 847 if (res == 0) { 848 int tid = ThreadCreate(thr, pc, *(uptr*)th, detached); 849 CHECK_NE(tid, 0); 850 atomic_store(&p.tid, tid, memory_order_release); 851 while (atomic_load(&p.tid, memory_order_acquire) != 0) 852 pthread_yield(); 853 } 854 if (attr == &myattr) 855 pthread_attr_destroy(&myattr); 856 return res; 857} 858 859TSAN_INTERCEPTOR(int, pthread_join, void *th, void **ret) { 860 SCOPED_TSAN_INTERCEPTOR(pthread_join, th, ret); 861 int tid = ThreadTid(thr, pc, (uptr)th); 862 int res = BLOCK_REAL(pthread_join)(th, ret); 863 if (res == 0) { 864 ThreadJoin(thr, pc, tid); 865 } 866 return res; 867} 868 869TSAN_INTERCEPTOR(int, pthread_detach, void *th) { 870 SCOPED_TSAN_INTERCEPTOR(pthread_detach, th); 871 int tid = ThreadTid(thr, pc, (uptr)th); 872 int res = REAL(pthread_detach)(th); 873 if (res == 0) { 874 ThreadDetach(thr, pc, tid); 875 } 876 return res; 877} 878 879TSAN_INTERCEPTOR(int, pthread_mutex_init, void *m, void *a) { 880 SCOPED_TSAN_INTERCEPTOR(pthread_mutex_init, m, a); 881 int res = REAL(pthread_mutex_init)(m, a); 882 if (res == 0) { 883 bool recursive = false; 884 if (a) { 885 int type = 0; 886 if (pthread_mutexattr_gettype(a, &type) == 0) 887 recursive = (type == PTHREAD_MUTEX_RECURSIVE 888 || type == PTHREAD_MUTEX_RECURSIVE_NP); 889 } 890 MutexCreate(thr, pc, (uptr)m, false, recursive, false); 891 } 892 return res; 893} 894 895TSAN_INTERCEPTOR(int, pthread_mutex_destroy, void *m) { 896 SCOPED_TSAN_INTERCEPTOR(pthread_mutex_destroy, m); 897 int res = REAL(pthread_mutex_destroy)(m); 898 if (res == 0 || res == EBUSY) { 899 MutexDestroy(thr, pc, (uptr)m); 900 } 901 return res; 902} 903 904TSAN_INTERCEPTOR(int, pthread_mutex_lock, void *m) { 905 SCOPED_TSAN_INTERCEPTOR(pthread_mutex_lock, m); 906 int res = REAL(pthread_mutex_lock)(m); 907 if (res == 0) { 908 MutexLock(thr, pc, (uptr)m); 909 } 910 return res; 911} 912 913TSAN_INTERCEPTOR(int, pthread_mutex_trylock, void *m) { 914 SCOPED_TSAN_INTERCEPTOR(pthread_mutex_trylock, m); 915 int res = REAL(pthread_mutex_trylock)(m); 916 if (res == 0) { 917 MutexLock(thr, pc, (uptr)m); 918 } 919 return res; 920} 921 922TSAN_INTERCEPTOR(int, pthread_mutex_timedlock, void *m, void *abstime) { 923 SCOPED_TSAN_INTERCEPTOR(pthread_mutex_timedlock, m, abstime); 924 int res = REAL(pthread_mutex_timedlock)(m, abstime); 925 if (res == 0) { 926 MutexLock(thr, pc, (uptr)m); 927 } 928 return res; 929} 930 931TSAN_INTERCEPTOR(int, pthread_mutex_unlock, void *m) { 932 SCOPED_TSAN_INTERCEPTOR(pthread_mutex_unlock, m); 933 MutexUnlock(thr, pc, (uptr)m); 934 int res = REAL(pthread_mutex_unlock)(m); 935 return res; 936} 937 938TSAN_INTERCEPTOR(int, pthread_spin_init, void *m, int pshared) { 939 SCOPED_TSAN_INTERCEPTOR(pthread_spin_init, m, pshared); 940 int res = REAL(pthread_spin_init)(m, pshared); 941 if (res == 0) { 942 MutexCreate(thr, pc, (uptr)m, false, false, false); 943 } 944 return res; 945} 946 947TSAN_INTERCEPTOR(int, pthread_spin_destroy, void *m) { 948 SCOPED_TSAN_INTERCEPTOR(pthread_spin_destroy, m); 949 int res = REAL(pthread_spin_destroy)(m); 950 if (res == 0) { 951 MutexDestroy(thr, pc, (uptr)m); 952 } 953 return res; 954} 955 956TSAN_INTERCEPTOR(int, pthread_spin_lock, void *m) { 957 SCOPED_TSAN_INTERCEPTOR(pthread_spin_lock, m); 958 int res = REAL(pthread_spin_lock)(m); 959 if (res == 0) { 960 MutexLock(thr, pc, (uptr)m); 961 } 962 return res; 963} 964 965TSAN_INTERCEPTOR(int, pthread_spin_trylock, void *m) { 966 SCOPED_TSAN_INTERCEPTOR(pthread_spin_trylock, m); 967 int res = REAL(pthread_spin_trylock)(m); 968 if (res == 0) { 969 MutexLock(thr, pc, (uptr)m); 970 } 971 return res; 972} 973 974TSAN_INTERCEPTOR(int, pthread_spin_unlock, void *m) { 975 SCOPED_TSAN_INTERCEPTOR(pthread_spin_unlock, m); 976 MutexUnlock(thr, pc, (uptr)m); 977 int res = REAL(pthread_spin_unlock)(m); 978 return res; 979} 980 981TSAN_INTERCEPTOR(int, pthread_rwlock_init, void *m, void *a) { 982 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_init, m, a); 983 int res = REAL(pthread_rwlock_init)(m, a); 984 if (res == 0) { 985 MutexCreate(thr, pc, (uptr)m, true, false, false); 986 } 987 return res; 988} 989 990TSAN_INTERCEPTOR(int, pthread_rwlock_destroy, void *m) { 991 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_destroy, m); 992 int res = REAL(pthread_rwlock_destroy)(m); 993 if (res == 0) { 994 MutexDestroy(thr, pc, (uptr)m); 995 } 996 return res; 997} 998 999TSAN_INTERCEPTOR(int, pthread_rwlock_rdlock, void *m) { 1000 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_rdlock, m); 1001 int res = REAL(pthread_rwlock_rdlock)(m); 1002 if (res == 0) { 1003 MutexReadLock(thr, pc, (uptr)m); 1004 } 1005 return res; 1006} 1007 1008TSAN_INTERCEPTOR(int, pthread_rwlock_tryrdlock, void *m) { 1009 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_tryrdlock, m); 1010 int res = REAL(pthread_rwlock_tryrdlock)(m); 1011 if (res == 0) { 1012 MutexReadLock(thr, pc, (uptr)m); 1013 } 1014 return res; 1015} 1016 1017TSAN_INTERCEPTOR(int, pthread_rwlock_timedrdlock, void *m, void *abstime) { 1018 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_timedrdlock, m, abstime); 1019 int res = REAL(pthread_rwlock_timedrdlock)(m, abstime); 1020 if (res == 0) { 1021 MutexReadLock(thr, pc, (uptr)m); 1022 } 1023 return res; 1024} 1025 1026TSAN_INTERCEPTOR(int, pthread_rwlock_wrlock, void *m) { 1027 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_wrlock, m); 1028 int res = REAL(pthread_rwlock_wrlock)(m); 1029 if (res == 0) { 1030 MutexLock(thr, pc, (uptr)m); 1031 } 1032 return res; 1033} 1034 1035TSAN_INTERCEPTOR(int, pthread_rwlock_trywrlock, void *m) { 1036 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_trywrlock, m); 1037 int res = REAL(pthread_rwlock_trywrlock)(m); 1038 if (res == 0) { 1039 MutexLock(thr, pc, (uptr)m); 1040 } 1041 return res; 1042} 1043 1044TSAN_INTERCEPTOR(int, pthread_rwlock_timedwrlock, void *m, void *abstime) { 1045 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_timedwrlock, m, abstime); 1046 int res = REAL(pthread_rwlock_timedwrlock)(m, abstime); 1047 if (res == 0) { 1048 MutexLock(thr, pc, (uptr)m); 1049 } 1050 return res; 1051} 1052 1053TSAN_INTERCEPTOR(int, pthread_rwlock_unlock, void *m) { 1054 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_unlock, m); 1055 MutexReadOrWriteUnlock(thr, pc, (uptr)m); 1056 int res = REAL(pthread_rwlock_unlock)(m); 1057 return res; 1058} 1059 1060TSAN_INTERCEPTOR(int, pthread_cond_init_2_3_2, void *c, void *a) { 1061 SCOPED_TSAN_INTERCEPTOR(pthread_cond_init_2_3_2, c, a); 1062 MemoryWrite(thr, pc, (uptr)c, kSizeLog1); 1063 int res = REAL(pthread_cond_init_2_3_2)(c, a); 1064 return res; 1065} 1066 1067TSAN_INTERCEPTOR(int, pthread_cond_destroy_2_3_2, void *c) { 1068 SCOPED_TSAN_INTERCEPTOR(pthread_cond_destroy_2_3_2, c); 1069 MemoryWrite(thr, pc, (uptr)c, kSizeLog1); 1070 int res = REAL(pthread_cond_destroy_2_3_2)(c); 1071 return res; 1072} 1073 1074TSAN_INTERCEPTOR(int, pthread_cond_signal_2_3_2, void *c) { 1075 SCOPED_TSAN_INTERCEPTOR(pthread_cond_signal_2_3_2, c); 1076 MemoryRead(thr, pc, (uptr)c, kSizeLog1); 1077 int res = REAL(pthread_cond_signal_2_3_2)(c); 1078 return res; 1079} 1080 1081TSAN_INTERCEPTOR(int, pthread_cond_broadcast_2_3_2, void *c) { 1082 SCOPED_TSAN_INTERCEPTOR(pthread_cond_broadcast_2_3_2, c); 1083 MemoryRead(thr, pc, (uptr)c, kSizeLog1); 1084 int res = REAL(pthread_cond_broadcast_2_3_2)(c); 1085 return res; 1086} 1087 1088TSAN_INTERCEPTOR(int, pthread_cond_wait_2_3_2, void *c, void *m) { 1089 SCOPED_TSAN_INTERCEPTOR(pthread_cond_wait_2_3_2, c, m); 1090 MutexUnlock(thr, pc, (uptr)m); 1091 MemoryRead(thr, pc, (uptr)c, kSizeLog1); 1092 int res = REAL(pthread_cond_wait_2_3_2)(c, m); 1093 MutexLock(thr, pc, (uptr)m); 1094 return res; 1095} 1096 1097TSAN_INTERCEPTOR(int, pthread_cond_timedwait_2_3_2, void *c, void *m, 1098 void *abstime) { 1099 SCOPED_TSAN_INTERCEPTOR(pthread_cond_timedwait_2_3_2, c, m, abstime); 1100 MutexUnlock(thr, pc, (uptr)m); 1101 MemoryRead(thr, pc, (uptr)c, kSizeLog1); 1102 int res = REAL(pthread_cond_timedwait_2_3_2)(c, m, abstime); 1103 MutexLock(thr, pc, (uptr)m); 1104 return res; 1105} 1106 1107TSAN_INTERCEPTOR(int, pthread_barrier_init, void *b, void *a, unsigned count) { 1108 SCOPED_TSAN_INTERCEPTOR(pthread_barrier_init, b, a, count); 1109 MemoryWrite(thr, pc, (uptr)b, kSizeLog1); 1110 int res = REAL(pthread_barrier_init)(b, a, count); 1111 return res; 1112} 1113 1114TSAN_INTERCEPTOR(int, pthread_barrier_destroy, void *b) { 1115 SCOPED_TSAN_INTERCEPTOR(pthread_barrier_destroy, b); 1116 MemoryWrite(thr, pc, (uptr)b, kSizeLog1); 1117 int res = REAL(pthread_barrier_destroy)(b); 1118 return res; 1119} 1120 1121TSAN_INTERCEPTOR(int, pthread_barrier_wait, void *b) { 1122 SCOPED_TSAN_INTERCEPTOR(pthread_barrier_wait, b); 1123 Release(thr, pc, (uptr)b); 1124 MemoryRead(thr, pc, (uptr)b, kSizeLog1); 1125 int res = REAL(pthread_barrier_wait)(b); 1126 MemoryRead(thr, pc, (uptr)b, kSizeLog1); 1127 if (res == 0 || res == PTHREAD_BARRIER_SERIAL_THREAD) { 1128 Acquire(thr, pc, (uptr)b); 1129 } 1130 return res; 1131} 1132 1133TSAN_INTERCEPTOR(int, pthread_once, void *o, void (*f)()) { 1134 SCOPED_TSAN_INTERCEPTOR(pthread_once, o, f); 1135 if (o == 0 || f == 0) 1136 return EINVAL; 1137 atomic_uint32_t *a = static_cast<atomic_uint32_t*>(o); 1138 u32 v = atomic_load(a, memory_order_acquire); 1139 if (v == 0 && atomic_compare_exchange_strong(a, &v, 1, 1140 memory_order_relaxed)) { 1141 const int old_in_rtl = thr->in_rtl; 1142 thr->in_rtl = 0; 1143 (*f)(); 1144 CHECK_EQ(thr->in_rtl, 0); 1145 thr->in_rtl = old_in_rtl; 1146 Release(thr, pc, (uptr)o); 1147 atomic_store(a, 2, memory_order_release); 1148 } else { 1149 while (v != 2) { 1150 pthread_yield(); 1151 v = atomic_load(a, memory_order_acquire); 1152 } 1153 Acquire(thr, pc, (uptr)o); 1154 } 1155 return 0; 1156} 1157 1158TSAN_INTERCEPTOR(int, sem_init, void *s, int pshared, unsigned value) { 1159 SCOPED_TSAN_INTERCEPTOR(sem_init, s, pshared, value); 1160 int res = REAL(sem_init)(s, pshared, value); 1161 return res; 1162} 1163 1164TSAN_INTERCEPTOR(int, sem_destroy, void *s) { 1165 SCOPED_TSAN_INTERCEPTOR(sem_destroy, s); 1166 int res = REAL(sem_destroy)(s); 1167 return res; 1168} 1169 1170TSAN_INTERCEPTOR(int, sem_wait, void *s) { 1171 SCOPED_TSAN_INTERCEPTOR(sem_wait, s); 1172 int res = BLOCK_REAL(sem_wait)(s); 1173 if (res == 0) { 1174 Acquire(thr, pc, (uptr)s); 1175 } 1176 return res; 1177} 1178 1179TSAN_INTERCEPTOR(int, sem_trywait, void *s) { 1180 SCOPED_TSAN_INTERCEPTOR(sem_trywait, s); 1181 int res = BLOCK_REAL(sem_trywait)(s); 1182 if (res == 0) { 1183 Acquire(thr, pc, (uptr)s); 1184 } 1185 return res; 1186} 1187 1188TSAN_INTERCEPTOR(int, sem_timedwait, void *s, void *abstime) { 1189 SCOPED_TSAN_INTERCEPTOR(sem_timedwait, s, abstime); 1190 int res = BLOCK_REAL(sem_timedwait)(s, abstime); 1191 if (res == 0) { 1192 Acquire(thr, pc, (uptr)s); 1193 } 1194 return res; 1195} 1196 1197TSAN_INTERCEPTOR(int, sem_post, void *s) { 1198 SCOPED_TSAN_INTERCEPTOR(sem_post, s); 1199 Release(thr, pc, (uptr)s); 1200 int res = REAL(sem_post)(s); 1201 return res; 1202} 1203 1204TSAN_INTERCEPTOR(int, sem_getvalue, void *s, int *sval) { 1205 SCOPED_TSAN_INTERCEPTOR(sem_getvalue, s, sval); 1206 int res = REAL(sem_getvalue)(s, sval); 1207 if (res == 0) { 1208 Acquire(thr, pc, (uptr)s); 1209 } 1210 return res; 1211} 1212 1213TSAN_INTERCEPTOR(int, __xstat, int version, const char *path, void *buf) { 1214 SCOPED_TSAN_INTERCEPTOR(__xstat, version, path, buf); 1215 return REAL(__xstat)(version, path, buf); 1216} 1217 1218TSAN_INTERCEPTOR(int, stat, const char *path, void *buf) { 1219 SCOPED_TSAN_INTERCEPTOR(__xstat, 0, path, buf); 1220 return REAL(__xstat)(0, path, buf); 1221} 1222 1223TSAN_INTERCEPTOR(int, __xstat64, int version, const char *path, void *buf) { 1224 SCOPED_TSAN_INTERCEPTOR(__xstat64, version, path, buf); 1225 return REAL(__xstat64)(version, path, buf); 1226} 1227 1228TSAN_INTERCEPTOR(int, stat64, const char *path, void *buf) { 1229 SCOPED_TSAN_INTERCEPTOR(__xstat64, 0, path, buf); 1230 return REAL(__xstat64)(0, path, buf); 1231} 1232 1233TSAN_INTERCEPTOR(int, __lxstat, int version, const char *path, void *buf) { 1234 SCOPED_TSAN_INTERCEPTOR(__lxstat, version, path, buf); 1235 return REAL(__lxstat)(version, path, buf); 1236} 1237 1238TSAN_INTERCEPTOR(int, lstat, const char *path, void *buf) { 1239 SCOPED_TSAN_INTERCEPTOR(__lxstat, 0, path, buf); 1240 return REAL(__lxstat)(0, path, buf); 1241} 1242 1243TSAN_INTERCEPTOR(int, __lxstat64, int version, const char *path, void *buf) { 1244 SCOPED_TSAN_INTERCEPTOR(__lxstat64, version, path, buf); 1245 return REAL(__lxstat64)(version, path, buf); 1246} 1247 1248TSAN_INTERCEPTOR(int, lstat64, const char *path, void *buf) { 1249 SCOPED_TSAN_INTERCEPTOR(__lxstat64, 0, path, buf); 1250 return REAL(__lxstat64)(0, path, buf); 1251} 1252 1253TSAN_INTERCEPTOR(int, __fxstat, int version, int fd, void *buf) { 1254 SCOPED_TSAN_INTERCEPTOR(__fxstat, version, fd, buf); 1255 if (fd > 0) 1256 FdAccess(thr, pc, fd); 1257 return REAL(__fxstat)(version, fd, buf); 1258} 1259 1260TSAN_INTERCEPTOR(int, fstat, int fd, void *buf) { 1261 SCOPED_TSAN_INTERCEPTOR(__fxstat, 0, fd, buf); 1262 if (fd > 0) 1263 FdAccess(thr, pc, fd); 1264 return REAL(__fxstat)(0, fd, buf); 1265} 1266 1267TSAN_INTERCEPTOR(int, __fxstat64, int version, int fd, void *buf) { 1268 SCOPED_TSAN_INTERCEPTOR(__fxstat64, version, fd, buf); 1269 if (fd > 0) 1270 FdAccess(thr, pc, fd); 1271 return REAL(__fxstat64)(version, fd, buf); 1272} 1273 1274TSAN_INTERCEPTOR(int, fstat64, int fd, void *buf) { 1275 SCOPED_TSAN_INTERCEPTOR(__fxstat64, 0, fd, buf); 1276 if (fd > 0) 1277 FdAccess(thr, pc, fd); 1278 return REAL(__fxstat64)(0, fd, buf); 1279} 1280 1281TSAN_INTERCEPTOR(int, open, const char *name, int flags, int mode) { 1282 SCOPED_TSAN_INTERCEPTOR(open, name, flags, mode); 1283 int fd = REAL(open)(name, flags, mode); 1284 if (fd >= 0) 1285 FdFileCreate(thr, pc, fd); 1286 return fd; 1287} 1288 1289TSAN_INTERCEPTOR(int, open64, const char *name, int flags, int mode) { 1290 SCOPED_TSAN_INTERCEPTOR(open64, name, flags, mode); 1291 int fd = REAL(open64)(name, flags, mode); 1292 if (fd >= 0) 1293 FdFileCreate(thr, pc, fd); 1294 return fd; 1295} 1296 1297TSAN_INTERCEPTOR(int, creat, const char *name, int mode) { 1298 SCOPED_TSAN_INTERCEPTOR(creat, name, mode); 1299 int fd = REAL(creat)(name, mode); 1300 if (fd >= 0) 1301 FdFileCreate(thr, pc, fd); 1302 return fd; 1303} 1304 1305TSAN_INTERCEPTOR(int, creat64, const char *name, int mode) { 1306 SCOPED_TSAN_INTERCEPTOR(creat64, name, mode); 1307 int fd = REAL(creat64)(name, mode); 1308 if (fd >= 0) 1309 FdFileCreate(thr, pc, fd); 1310 return fd; 1311} 1312 1313TSAN_INTERCEPTOR(int, dup, int oldfd) { 1314 SCOPED_TSAN_INTERCEPTOR(dup, oldfd); 1315 int newfd = REAL(dup)(oldfd); 1316 if (oldfd >= 0 && newfd >= 0 && newfd != oldfd) 1317 FdDup(thr, pc, oldfd, newfd); 1318 return newfd; 1319} 1320 1321TSAN_INTERCEPTOR(int, dup2, int oldfd, int newfd) { 1322 SCOPED_TSAN_INTERCEPTOR(dup2, oldfd, newfd); 1323 int newfd2 = REAL(dup2)(oldfd, newfd); 1324 if (oldfd >= 0 && newfd2 >= 0 && newfd2 != oldfd) 1325 FdDup(thr, pc, oldfd, newfd2); 1326 return newfd2; 1327} 1328 1329TSAN_INTERCEPTOR(int, dup3, int oldfd, int newfd, int flags) { 1330 SCOPED_TSAN_INTERCEPTOR(dup3, oldfd, newfd, flags); 1331 int newfd2 = REAL(dup3)(oldfd, newfd, flags); 1332 if (oldfd >= 0 && newfd2 >= 0 && newfd2 != oldfd) 1333 FdDup(thr, pc, oldfd, newfd2); 1334 return newfd2; 1335} 1336 1337TSAN_INTERCEPTOR(int, eventfd, unsigned initval, int flags) { 1338 SCOPED_TSAN_INTERCEPTOR(eventfd, initval, flags); 1339 int fd = REAL(eventfd)(initval, flags); 1340 if (fd >= 0) 1341 FdEventCreate(thr, pc, fd); 1342 return fd; 1343} 1344 1345TSAN_INTERCEPTOR(int, signalfd, int fd, void *mask, int flags) { 1346 SCOPED_TSAN_INTERCEPTOR(signalfd, fd, mask, flags); 1347 if (fd >= 0) 1348 FdClose(thr, pc, fd); 1349 fd = REAL(signalfd)(fd, mask, flags); 1350 if (fd >= 0) 1351 FdSignalCreate(thr, pc, fd); 1352 return fd; 1353} 1354 1355TSAN_INTERCEPTOR(int, inotify_init, int fake) { 1356 SCOPED_TSAN_INTERCEPTOR(inotify_init, fake); 1357 int fd = REAL(inotify_init)(fake); 1358 if (fd >= 0) 1359 FdInotifyCreate(thr, pc, fd); 1360 return fd; 1361} 1362 1363TSAN_INTERCEPTOR(int, inotify_init1, int flags) { 1364 SCOPED_TSAN_INTERCEPTOR(inotify_init1, flags); 1365 int fd = REAL(inotify_init1)(flags); 1366 if (fd >= 0) 1367 FdInotifyCreate(thr, pc, fd); 1368 return fd; 1369} 1370 1371TSAN_INTERCEPTOR(int, socket, int domain, int type, int protocol) { 1372 SCOPED_TSAN_INTERCEPTOR(socket, domain, type, protocol); 1373 int fd = REAL(socket)(domain, type, protocol); 1374 if (fd >= 0) 1375 FdSocketCreate(thr, pc, fd); 1376 return fd; 1377} 1378 1379TSAN_INTERCEPTOR(int, socketpair, int domain, int type, int protocol, int *fd) { 1380 SCOPED_TSAN_INTERCEPTOR(socketpair, domain, type, protocol, fd); 1381 int res = REAL(socketpair)(domain, type, protocol, fd); 1382 if (res == 0 && fd[0] >= 0 && fd[1] >= 0) 1383 FdPipeCreate(thr, pc, fd[0], fd[1]); 1384 return res; 1385} 1386 1387TSAN_INTERCEPTOR(int, connect, int fd, void *addr, unsigned addrlen) { 1388 SCOPED_TSAN_INTERCEPTOR(connect, fd, addr, addrlen); 1389 FdSocketConnecting(thr, pc, fd); 1390 int res = REAL(connect)(fd, addr, addrlen); 1391 if (res == 0 && fd >= 0) 1392 FdSocketConnect(thr, pc, fd); 1393 return res; 1394} 1395 1396TSAN_INTERCEPTOR(int, bind, int fd, void *addr, unsigned addrlen) { 1397 SCOPED_TSAN_INTERCEPTOR(bind, fd, addr, addrlen); 1398 int res = REAL(bind)(fd, addr, addrlen); 1399 if (fd > 0 && res == 0) 1400 FdAccess(thr, pc, fd); 1401 return res; 1402} 1403 1404TSAN_INTERCEPTOR(int, listen, int fd, int backlog) { 1405 SCOPED_TSAN_INTERCEPTOR(listen, fd, backlog); 1406 int res = REAL(listen)(fd, backlog); 1407 if (fd > 0 && res == 0) 1408 FdAccess(thr, pc, fd); 1409 return res; 1410} 1411 1412TSAN_INTERCEPTOR(int, epoll_create, int size) { 1413 SCOPED_TSAN_INTERCEPTOR(epoll_create, size); 1414 int fd = REAL(epoll_create)(size); 1415 if (fd >= 0) 1416 FdPollCreate(thr, pc, fd); 1417 return fd; 1418} 1419 1420TSAN_INTERCEPTOR(int, epoll_create1, int flags) { 1421 SCOPED_TSAN_INTERCEPTOR(epoll_create1, flags); 1422 int fd = REAL(epoll_create1)(flags); 1423 if (fd >= 0) 1424 FdPollCreate(thr, pc, fd); 1425 return fd; 1426} 1427 1428TSAN_INTERCEPTOR(int, close, int fd) { 1429 SCOPED_TSAN_INTERCEPTOR(close, fd); 1430 if (fd >= 0) 1431 FdClose(thr, pc, fd); 1432 return REAL(close)(fd); 1433} 1434 1435TSAN_INTERCEPTOR(int, __close, int fd) { 1436 SCOPED_TSAN_INTERCEPTOR(__close, fd); 1437 if (fd >= 0) 1438 FdClose(thr, pc, fd); 1439 return REAL(__close)(fd); 1440} 1441 1442// glibc guts 1443TSAN_INTERCEPTOR(void, __res_iclose, void *state, bool free_addr) { 1444 SCOPED_TSAN_INTERCEPTOR(__res_iclose, state, free_addr); 1445 int fds[64]; 1446 int cnt = ExtractResolvFDs(state, fds, ARRAY_SIZE(fds)); 1447 for (int i = 0; i < cnt; i++) { 1448 if (fds[i] > 0) 1449 FdClose(thr, pc, fds[i]); 1450 } 1451 REAL(__res_iclose)(state, free_addr); 1452} 1453 1454TSAN_INTERCEPTOR(int, pipe, int *pipefd) { 1455 SCOPED_TSAN_INTERCEPTOR(pipe, pipefd); 1456 int res = REAL(pipe)(pipefd); 1457 if (res == 0 && pipefd[0] >= 0 && pipefd[1] >= 0) 1458 FdPipeCreate(thr, pc, pipefd[0], pipefd[1]); 1459 return res; 1460} 1461 1462TSAN_INTERCEPTOR(int, pipe2, int *pipefd, int flags) { 1463 SCOPED_TSAN_INTERCEPTOR(pipe2, pipefd, flags); 1464 int res = REAL(pipe2)(pipefd, flags); 1465 if (res == 0 && pipefd[0] >= 0 && pipefd[1] >= 0) 1466 FdPipeCreate(thr, pc, pipefd[0], pipefd[1]); 1467 return res; 1468} 1469 1470TSAN_INTERCEPTOR(long_t, send, int fd, void *buf, long_t len, int flags) { 1471 SCOPED_TSAN_INTERCEPTOR(send, fd, buf, len, flags); 1472 if (fd >= 0) 1473 FdRelease(thr, pc, fd); 1474 int res = REAL(send)(fd, buf, len, flags); 1475 return res; 1476} 1477 1478TSAN_INTERCEPTOR(long_t, sendmsg, int fd, void *msg, int flags) { 1479 SCOPED_TSAN_INTERCEPTOR(sendmsg, fd, msg, flags); 1480 if (fd >= 0) 1481 FdRelease(thr, pc, fd); 1482 int res = REAL(sendmsg)(fd, msg, flags); 1483 return res; 1484} 1485 1486TSAN_INTERCEPTOR(long_t, recv, int fd, void *buf, long_t len, int flags) { 1487 SCOPED_TSAN_INTERCEPTOR(recv, fd, buf, len, flags); 1488 int res = REAL(recv)(fd, buf, len, flags); 1489 if (res >= 0 && fd >= 0) { 1490 FdAcquire(thr, pc, fd); 1491 } 1492 return res; 1493} 1494 1495TSAN_INTERCEPTOR(int, unlink, char *path) { 1496 SCOPED_TSAN_INTERCEPTOR(unlink, path); 1497 Release(thr, pc, File2addr(path)); 1498 int res = REAL(unlink)(path); 1499 return res; 1500} 1501 1502TSAN_INTERCEPTOR(void*, fopen, char *path, char *mode) { 1503 SCOPED_TSAN_INTERCEPTOR(fopen, path, mode); 1504 void *res = REAL(fopen)(path, mode); 1505 Acquire(thr, pc, File2addr(path)); 1506 if (res) { 1507 int fd = fileno_unlocked(res); 1508 if (fd >= 0) 1509 FdFileCreate(thr, pc, fd); 1510 } 1511 return res; 1512} 1513 1514TSAN_INTERCEPTOR(void*, freopen, char *path, char *mode, void *stream) { 1515 SCOPED_TSAN_INTERCEPTOR(freopen, path, mode, stream); 1516 if (stream) { 1517 int fd = fileno_unlocked(stream); 1518 if (fd >= 0) 1519 FdClose(thr, pc, fd); 1520 } 1521 void *res = REAL(freopen)(path, mode, stream); 1522 Acquire(thr, pc, File2addr(path)); 1523 if (res) { 1524 int fd = fileno_unlocked(res); 1525 if (fd >= 0) 1526 FdFileCreate(thr, pc, fd); 1527 } 1528 return res; 1529} 1530 1531TSAN_INTERCEPTOR(int, fclose, void *stream) { 1532 { 1533 SCOPED_TSAN_INTERCEPTOR(fclose, stream); 1534 if (stream) { 1535 int fd = fileno_unlocked(stream); 1536 if (fd >= 0) 1537 FdClose(thr, pc, fd); 1538 } 1539 } 1540 return REAL(fclose)(stream); 1541} 1542 1543TSAN_INTERCEPTOR(uptr, fread, void *ptr, uptr size, uptr nmemb, void *f) { 1544 { 1545 SCOPED_TSAN_INTERCEPTOR(fread, ptr, size, nmemb, f); 1546 MemoryAccessRange(thr, pc, (uptr)ptr, size * nmemb, true); 1547 } 1548 return REAL(fread)(ptr, size, nmemb, f); 1549} 1550 1551TSAN_INTERCEPTOR(uptr, fwrite, const void *p, uptr size, uptr nmemb, void *f) { 1552 { 1553 SCOPED_TSAN_INTERCEPTOR(fwrite, p, size, nmemb, f); 1554 MemoryAccessRange(thr, pc, (uptr)p, size * nmemb, false); 1555 } 1556 return REAL(fwrite)(p, size, nmemb, f); 1557} 1558 1559TSAN_INTERCEPTOR(int, fflush, void *stream) { 1560 SCOPED_TSAN_INTERCEPTOR(fflush, stream); 1561 return REAL(fflush)(stream); 1562} 1563 1564TSAN_INTERCEPTOR(void, abort, int fake) { 1565 SCOPED_TSAN_INTERCEPTOR(abort, fake); 1566 REAL(fflush)(0); 1567 REAL(abort)(fake); 1568} 1569 1570TSAN_INTERCEPTOR(int, puts, const char *s) { 1571 SCOPED_TSAN_INTERCEPTOR(puts, s); 1572 MemoryAccessRange(thr, pc, (uptr)s, internal_strlen(s), false); 1573 return REAL(puts)(s); 1574} 1575 1576TSAN_INTERCEPTOR(int, rmdir, char *path) { 1577 SCOPED_TSAN_INTERCEPTOR(rmdir, path); 1578 Release(thr, pc, Dir2addr(path)); 1579 int res = REAL(rmdir)(path); 1580 return res; 1581} 1582 1583TSAN_INTERCEPTOR(void*, opendir, char *path) { 1584 SCOPED_TSAN_INTERCEPTOR(opendir, path); 1585 void *res = REAL(opendir)(path); 1586 if (res != 0) 1587 Acquire(thr, pc, Dir2addr(path)); 1588 return res; 1589} 1590 1591TSAN_INTERCEPTOR(int, epoll_ctl, int epfd, int op, int fd, void *ev) { 1592 SCOPED_TSAN_INTERCEPTOR(epoll_ctl, epfd, op, fd, ev); 1593 if (op == EPOLL_CTL_ADD && epfd >= 0) { 1594 FdRelease(thr, pc, epfd); 1595 } 1596 int res = REAL(epoll_ctl)(epfd, op, fd, ev); 1597 if (fd >= 0) 1598 FdAccess(thr, pc, fd); 1599 return res; 1600} 1601 1602TSAN_INTERCEPTOR(int, epoll_wait, int epfd, void *ev, int cnt, int timeout) { 1603 SCOPED_TSAN_INTERCEPTOR(epoll_wait, epfd, ev, cnt, timeout); 1604 int res = BLOCK_REAL(epoll_wait)(epfd, ev, cnt, timeout); 1605 if (res > 0 && epfd >= 0) { 1606 FdAcquire(thr, pc, epfd); 1607 } 1608 return res; 1609} 1610 1611void ALWAYS_INLINE rtl_generic_sighandler(bool sigact, int sig, 1612 my_siginfo_t *info, void *ctx) { 1613 ThreadState *thr = cur_thread(); 1614 SignalContext *sctx = SigCtx(thr); 1615 // Don't mess with synchronous signals. 1616 if (sig == SIGSEGV || sig == SIGBUS || sig == SIGILL || 1617 sig == SIGABRT || sig == SIGFPE || sig == SIGPIPE || sig == SIGSYS || 1618 // If we are sending signal to ourselves, we must process it now. 1619 (sctx && sig == sctx->int_signal_send) || 1620 // If we are in blocking function, we can safely process it now 1621 // (but check if we are in a recursive interceptor, 1622 // i.e. pthread_join()->munmap()). 1623 (sctx && sctx->in_blocking_func == 1 && thr->in_rtl == 1)) { 1624 int in_rtl = thr->in_rtl; 1625 thr->in_rtl = 0; 1626 CHECK_EQ(thr->in_signal_handler, false); 1627 thr->in_signal_handler = true; 1628 if (sigact) 1629 sigactions[sig].sa_sigaction(sig, info, ctx); 1630 else 1631 sigactions[sig].sa_handler(sig); 1632 CHECK_EQ(thr->in_signal_handler, true); 1633 thr->in_signal_handler = false; 1634 thr->in_rtl = in_rtl; 1635 return; 1636 } 1637 1638 if (sctx == 0) 1639 return; 1640 SignalDesc *signal = &sctx->pending_signals[sig]; 1641 if (signal->armed == false) { 1642 signal->armed = true; 1643 signal->sigaction = sigact; 1644 if (info) 1645 internal_memcpy(&signal->siginfo, info, sizeof(*info)); 1646 if (ctx) 1647 internal_memcpy(&signal->ctx, ctx, sizeof(signal->ctx)); 1648 sctx->pending_signal_count++; 1649 } 1650} 1651 1652static void rtl_sighandler(int sig) { 1653 rtl_generic_sighandler(false, sig, 0, 0); 1654} 1655 1656static void rtl_sigaction(int sig, my_siginfo_t *info, void *ctx) { 1657 rtl_generic_sighandler(true, sig, info, ctx); 1658} 1659 1660TSAN_INTERCEPTOR(int, sigaction, int sig, sigaction_t *act, sigaction_t *old) { 1661 SCOPED_TSAN_INTERCEPTOR(sigaction, sig, act, old); 1662 if (old) 1663 internal_memcpy(old, &sigactions[sig], sizeof(*old)); 1664 if (act == 0) 1665 return 0; 1666 internal_memcpy(&sigactions[sig], act, sizeof(*act)); 1667 sigaction_t newact; 1668 internal_memcpy(&newact, act, sizeof(newact)); 1669 sigfillset(&newact.sa_mask); 1670 if (act->sa_handler != SIG_IGN && act->sa_handler != SIG_DFL) { 1671 if (newact.sa_flags & SA_SIGINFO) 1672 newact.sa_sigaction = rtl_sigaction; 1673 else 1674 newact.sa_handler = rtl_sighandler; 1675 } 1676 int res = REAL(sigaction)(sig, &newact, 0); 1677 return res; 1678} 1679 1680TSAN_INTERCEPTOR(sighandler_t, signal, int sig, sighandler_t h) { 1681 sigaction_t act; 1682 act.sa_handler = h; 1683 REAL(memset)(&act.sa_mask, -1, sizeof(act.sa_mask)); 1684 act.sa_flags = 0; 1685 sigaction_t old; 1686 int res = sigaction(sig, &act, &old); 1687 if (res) 1688 return SIG_ERR; 1689 return old.sa_handler; 1690} 1691 1692TSAN_INTERCEPTOR(int, sigsuspend, const sigset_t *mask) { 1693 SCOPED_TSAN_INTERCEPTOR(sigsuspend, mask); 1694 return REAL(sigsuspend)(mask); 1695} 1696 1697TSAN_INTERCEPTOR(int, raise, int sig) { 1698 SCOPED_TSAN_INTERCEPTOR(raise, sig); 1699 SignalContext *sctx = SigCtx(thr); 1700 CHECK_NE(sctx, 0); 1701 int prev = sctx->int_signal_send; 1702 sctx->int_signal_send = sig; 1703 int res = REAL(raise)(sig); 1704 CHECK_EQ(sctx->int_signal_send, sig); 1705 sctx->int_signal_send = prev; 1706 return res; 1707} 1708 1709TSAN_INTERCEPTOR(int, kill, int pid, int sig) { 1710 SCOPED_TSAN_INTERCEPTOR(kill, pid, sig); 1711 SignalContext *sctx = SigCtx(thr); 1712 CHECK_NE(sctx, 0); 1713 int prev = sctx->int_signal_send; 1714 if (pid == (int)internal_getpid()) { 1715 sctx->int_signal_send = sig; 1716 } 1717 int res = REAL(kill)(pid, sig); 1718 if (pid == (int)internal_getpid()) { 1719 CHECK_EQ(sctx->int_signal_send, sig); 1720 sctx->int_signal_send = prev; 1721 } 1722 return res; 1723} 1724 1725TSAN_INTERCEPTOR(int, pthread_kill, void *tid, int sig) { 1726 SCOPED_TSAN_INTERCEPTOR(pthread_kill, tid, sig); 1727 SignalContext *sctx = SigCtx(thr); 1728 CHECK_NE(sctx, 0); 1729 int prev = sctx->int_signal_send; 1730 if (tid == pthread_self()) { 1731 sctx->int_signal_send = sig; 1732 } 1733 int res = REAL(pthread_kill)(tid, sig); 1734 if (tid == pthread_self()) { 1735 CHECK_EQ(sctx->int_signal_send, sig); 1736 sctx->int_signal_send = prev; 1737 } 1738 return res; 1739} 1740 1741TSAN_INTERCEPTOR(int, gettimeofday, void *tv, void *tz) { 1742 SCOPED_TSAN_INTERCEPTOR(gettimeofday, tv, tz); 1743 // It's intercepted merely to process pending signals. 1744 return REAL(gettimeofday)(tv, tz); 1745} 1746 1747TSAN_INTERCEPTOR(int, getaddrinfo, void *node, void *service, 1748 void *hints, void *rv) { 1749 SCOPED_TSAN_INTERCEPTOR(getaddrinfo, node, service, hints, rv); 1750 // We miss atomic synchronization in getaddrinfo, 1751 // and can report false race between malloc and free 1752 // inside of getaddrinfo. So ignore memory accesses. 1753 ThreadIgnoreBegin(thr); 1754 int res = REAL(getaddrinfo)(node, service, hints, rv); 1755 ThreadIgnoreEnd(thr); 1756 return res; 1757} 1758 1759// Linux kernel has a bug that leads to kernel deadlock if a process 1760// maps TBs of memory and then calls mlock(). 1761static void MlockIsUnsupported() { 1762 static atomic_uint8_t printed; 1763 if (atomic_exchange(&printed, 1, memory_order_relaxed)) 1764 return; 1765 if (flags()->verbosity > 0) 1766 Printf("INFO: ThreadSanitizer ignores mlock/mlockall/munlock/munlockall\n"); 1767} 1768 1769TSAN_INTERCEPTOR(int, mlock, const void *addr, uptr len) { 1770 MlockIsUnsupported(); 1771 return 0; 1772} 1773 1774TSAN_INTERCEPTOR(int, munlock, const void *addr, uptr len) { 1775 MlockIsUnsupported(); 1776 return 0; 1777} 1778 1779TSAN_INTERCEPTOR(int, mlockall, int flags) { 1780 MlockIsUnsupported(); 1781 return 0; 1782} 1783 1784TSAN_INTERCEPTOR(int, munlockall, void) { 1785 MlockIsUnsupported(); 1786 return 0; 1787} 1788 1789TSAN_INTERCEPTOR(int, fork, int fake) { 1790 SCOPED_TSAN_INTERCEPTOR(fork, fake); 1791 // It's intercepted merely to process pending signals. 1792 int pid = REAL(fork)(fake); 1793 if (pid == 0) { 1794 // child 1795 FdOnFork(thr, pc); 1796 } else if (pid > 0) { 1797 // parent 1798 } 1799 return pid; 1800} 1801 1802struct TsanInterceptorContext { 1803 ThreadState *thr; 1804 const uptr caller_pc; 1805 const uptr pc; 1806}; 1807 1808#include "sanitizer_common/sanitizer_platform_interceptors.h" 1809// Causes interceptor recursion (getpwuid_r() calls fopen()) 1810#undef SANITIZER_INTERCEPT_GETPWNAM_AND_FRIENDS 1811#undef SANITIZER_INTERCEPT_GETPWNAM_R_AND_FRIENDS 1812// Causes interceptor recursion (getaddrinfo() and fopen()) 1813#undef SANITIZER_INTERCEPT_GETADDRINFO 1814#undef SANITIZER_INTERCEPT_GETNAMEINFO 1815// Causes interceptor recursion (glob64() calls lstat64()) 1816#undef SANITIZER_INTERCEPT_GLOB 1817 1818#define COMMON_INTERCEPTOR_UNPOISON_PARAM(ctx, count) \ 1819 do { \ 1820 } while (false) 1821#define COMMON_INTERCEPTOR_WRITE_RANGE(ctx, ptr, size) \ 1822 MemoryAccessRange(((TsanInterceptorContext *)ctx)->thr, \ 1823 ((TsanInterceptorContext *)ctx)->pc, (uptr)ptr, size, \ 1824 true) 1825#define COMMON_INTERCEPTOR_READ_RANGE(ctx, ptr, size) \ 1826 MemoryAccessRange(((TsanInterceptorContext *) ctx)->thr, \ 1827 ((TsanInterceptorContext *) ctx)->pc, (uptr) ptr, size, \ 1828 false) 1829#define COMMON_INTERCEPTOR_ENTER(ctx, func, ...) \ 1830 SCOPED_TSAN_INTERCEPTOR(func, __VA_ARGS__); \ 1831 TsanInterceptorContext _ctx = {thr, caller_pc, pc}; \ 1832 ctx = (void *)&_ctx; \ 1833 (void) ctx; 1834#define COMMON_INTERCEPTOR_FD_ACQUIRE(ctx, fd) \ 1835 FdAcquire(((TsanInterceptorContext *) ctx)->thr, pc, fd) 1836#define COMMON_INTERCEPTOR_FD_RELEASE(ctx, fd) \ 1837 FdRelease(((TsanInterceptorContext *) ctx)->thr, pc, fd) 1838#define COMMON_INTERCEPTOR_FD_SOCKET_ACCEPT(ctx, fd, newfd) \ 1839 FdSocketAccept(((TsanInterceptorContext *) ctx)->thr, pc, fd, newfd) 1840#define COMMON_INTERCEPTOR_SET_THREAD_NAME(ctx, name) \ 1841 ThreadSetName(((TsanInterceptorContext *) ctx)->thr, name) 1842#define COMMON_INTERCEPTOR_BLOCK_REAL(name) BLOCK_REAL(name) 1843#include "sanitizer_common/sanitizer_common_interceptors.inc" 1844 1845// FIXME: Implement these with MemoryAccessRange(). 1846#define COMMON_SYSCALL_PRE_READ_RANGE(p, s) 1847#define COMMON_SYSCALL_PRE_WRITE_RANGE(p, s) 1848#define COMMON_SYSCALL_POST_READ_RANGE(p, s) 1849#define COMMON_SYSCALL_POST_WRITE_RANGE(p, s) 1850#include "sanitizer_common/sanitizer_common_syscalls.inc" 1851 1852namespace __tsan { 1853 1854void ProcessPendingSignals(ThreadState *thr) { 1855 CHECK_EQ(thr->in_rtl, 0); 1856 SignalContext *sctx = SigCtx(thr); 1857 if (sctx == 0 || sctx->pending_signal_count == 0 || thr->in_signal_handler) 1858 return; 1859 Context *ctx = CTX(); 1860 thr->in_signal_handler = true; 1861 sctx->pending_signal_count = 0; 1862 // These are too big for stack. 1863 static THREADLOCAL sigset_t emptyset, oldset; 1864 sigfillset(&emptyset); 1865 pthread_sigmask(SIG_SETMASK, &emptyset, &oldset); 1866 for (int sig = 0; sig < kSigCount; sig++) { 1867 SignalDesc *signal = &sctx->pending_signals[sig]; 1868 if (signal->armed) { 1869 signal->armed = false; 1870 if (sigactions[sig].sa_handler != SIG_DFL 1871 && sigactions[sig].sa_handler != SIG_IGN) { 1872 // Insure that the handler does not spoil errno. 1873 const int saved_errno = errno; 1874 errno = 0; 1875 if (signal->sigaction) 1876 sigactions[sig].sa_sigaction(sig, &signal->siginfo, &signal->ctx); 1877 else 1878 sigactions[sig].sa_handler(sig); 1879 if (flags()->report_bugs && errno != 0) { 1880 ScopedInRtl in_rtl; 1881 __tsan::StackTrace stack; 1882 uptr pc = signal->sigaction ? 1883 (uptr)sigactions[sig].sa_sigaction : 1884 (uptr)sigactions[sig].sa_handler; 1885 pc += 1; // return address is expected, OutputReport() will undo this 1886 stack.Init(&pc, 1); 1887 ThreadRegistryLock l(ctx->thread_registry); 1888 ScopedReport rep(ReportTypeErrnoInSignal); 1889 if (!IsFiredSuppression(ctx, rep, stack)) { 1890 rep.AddStack(&stack); 1891 OutputReport(ctx, rep, rep.GetReport()->stacks[0]); 1892 } 1893 } 1894 errno = saved_errno; 1895 } 1896 } 1897 } 1898 pthread_sigmask(SIG_SETMASK, &oldset, 0); 1899 CHECK_EQ(thr->in_signal_handler, true); 1900 thr->in_signal_handler = false; 1901} 1902 1903static void finalize(void *arg) { 1904 ThreadState * thr = cur_thread(); 1905 uptr pc = 0; 1906 atexit_ctx->exit(thr, pc); 1907 int status = Finalize(cur_thread()); 1908 REAL(fflush)(0); 1909 if (status) 1910 _exit(status); 1911} 1912 1913static void unreachable() { 1914 Printf("FATAL: ThreadSanitizer: unreachable called\n"); 1915 Die(); 1916} 1917 1918void InitializeInterceptors() { 1919 CHECK_GT(cur_thread()->in_rtl, 0); 1920 1921 // We need to setup it early, because functions like dlsym() can call it. 1922 REAL(memset) = internal_memset; 1923 REAL(memcpy) = internal_memcpy; 1924 REAL(memcmp) = internal_memcmp; 1925 1926 // Instruct libc malloc to consume less memory. 1927 mallopt(1, 0); // M_MXFAST 1928 mallopt(-3, 32*1024); // M_MMAP_THRESHOLD 1929 1930 SANITIZER_COMMON_INTERCEPTORS_INIT; 1931 1932 TSAN_INTERCEPT(setjmp); 1933 TSAN_INTERCEPT(_setjmp); 1934 TSAN_INTERCEPT(sigsetjmp); 1935 TSAN_INTERCEPT(__sigsetjmp); 1936 TSAN_INTERCEPT(longjmp); 1937 TSAN_INTERCEPT(siglongjmp); 1938 1939 TSAN_INTERCEPT(malloc); 1940 TSAN_INTERCEPT(__libc_memalign); 1941 TSAN_INTERCEPT(calloc); 1942 TSAN_INTERCEPT(realloc); 1943 TSAN_INTERCEPT(free); 1944 TSAN_INTERCEPT(cfree); 1945 TSAN_INTERCEPT(mmap); 1946 TSAN_INTERCEPT(mmap64); 1947 TSAN_INTERCEPT(munmap); 1948 TSAN_INTERCEPT(memalign); 1949 TSAN_INTERCEPT(valloc); 1950 TSAN_INTERCEPT(pvalloc); 1951 TSAN_INTERCEPT(posix_memalign); 1952 1953 TSAN_INTERCEPT(strlen); 1954 TSAN_INTERCEPT(memset); 1955 TSAN_INTERCEPT(memcpy); 1956 TSAN_INTERCEPT(memchr); 1957 TSAN_INTERCEPT(memrchr); 1958 TSAN_INTERCEPT(memmove); 1959 TSAN_INTERCEPT(memcmp); 1960 TSAN_INTERCEPT(strchr); 1961 TSAN_INTERCEPT(strchrnul); 1962 TSAN_INTERCEPT(strrchr); 1963 TSAN_INTERCEPT(strcpy); // NOLINT 1964 TSAN_INTERCEPT(strncpy); 1965 TSAN_INTERCEPT(strstr); 1966 1967 TSAN_INTERCEPT(pthread_create); 1968 TSAN_INTERCEPT(pthread_join); 1969 TSAN_INTERCEPT(pthread_detach); 1970 1971 TSAN_INTERCEPT(pthread_mutex_init); 1972 TSAN_INTERCEPT(pthread_mutex_destroy); 1973 TSAN_INTERCEPT(pthread_mutex_lock); 1974 TSAN_INTERCEPT(pthread_mutex_trylock); 1975 TSAN_INTERCEPT(pthread_mutex_timedlock); 1976 TSAN_INTERCEPT(pthread_mutex_unlock); 1977 1978 TSAN_INTERCEPT(pthread_spin_init); 1979 TSAN_INTERCEPT(pthread_spin_destroy); 1980 TSAN_INTERCEPT(pthread_spin_lock); 1981 TSAN_INTERCEPT(pthread_spin_trylock); 1982 TSAN_INTERCEPT(pthread_spin_unlock); 1983 1984 TSAN_INTERCEPT(pthread_rwlock_init); 1985 TSAN_INTERCEPT(pthread_rwlock_destroy); 1986 TSAN_INTERCEPT(pthread_rwlock_rdlock); 1987 TSAN_INTERCEPT(pthread_rwlock_tryrdlock); 1988 TSAN_INTERCEPT(pthread_rwlock_timedrdlock); 1989 TSAN_INTERCEPT(pthread_rwlock_wrlock); 1990 TSAN_INTERCEPT(pthread_rwlock_trywrlock); 1991 TSAN_INTERCEPT(pthread_rwlock_timedwrlock); 1992 TSAN_INTERCEPT(pthread_rwlock_unlock); 1993 1994 INTERCEPT_FUNCTION_VER(pthread_cond_init, pthread_cond_init_2_3_2, 1995 GLIBC_2.3.2); 1996 INTERCEPT_FUNCTION_VER(pthread_cond_destroy, pthread_cond_destroy_2_3_2, 1997 GLIBC_2.3.2); 1998 INTERCEPT_FUNCTION_VER(pthread_cond_signal, pthread_cond_signal_2_3_2, 1999 GLIBC_2.3.2); 2000 INTERCEPT_FUNCTION_VER(pthread_cond_broadcast, pthread_cond_broadcast_2_3_2, 2001 GLIBC_2.3.2); 2002 INTERCEPT_FUNCTION_VER(pthread_cond_wait, pthread_cond_wait_2_3_2, 2003 GLIBC_2.3.2); 2004 INTERCEPT_FUNCTION_VER(pthread_cond_timedwait, pthread_cond_timedwait_2_3_2, 2005 GLIBC_2.3.2); 2006 2007 TSAN_INTERCEPT(pthread_barrier_init); 2008 TSAN_INTERCEPT(pthread_barrier_destroy); 2009 TSAN_INTERCEPT(pthread_barrier_wait); 2010 2011 TSAN_INTERCEPT(pthread_once); 2012 2013 TSAN_INTERCEPT(sem_init); 2014 TSAN_INTERCEPT(sem_destroy); 2015 TSAN_INTERCEPT(sem_wait); 2016 TSAN_INTERCEPT(sem_trywait); 2017 TSAN_INTERCEPT(sem_timedwait); 2018 TSAN_INTERCEPT(sem_post); 2019 TSAN_INTERCEPT(sem_getvalue); 2020 2021 TSAN_INTERCEPT(stat); 2022 TSAN_INTERCEPT(__xstat); 2023 TSAN_INTERCEPT(stat64); 2024 TSAN_INTERCEPT(__xstat64); 2025 TSAN_INTERCEPT(lstat); 2026 TSAN_INTERCEPT(__lxstat); 2027 TSAN_INTERCEPT(lstat64); 2028 TSAN_INTERCEPT(__lxstat64); 2029 TSAN_INTERCEPT(fstat); 2030 TSAN_INTERCEPT(__fxstat); 2031 TSAN_INTERCEPT(fstat64); 2032 TSAN_INTERCEPT(__fxstat64); 2033 TSAN_INTERCEPT(open); 2034 TSAN_INTERCEPT(open64); 2035 TSAN_INTERCEPT(creat); 2036 TSAN_INTERCEPT(creat64); 2037 TSAN_INTERCEPT(dup); 2038 TSAN_INTERCEPT(dup2); 2039 TSAN_INTERCEPT(dup3); 2040 TSAN_INTERCEPT(eventfd); 2041 TSAN_INTERCEPT(signalfd); 2042 TSAN_INTERCEPT(inotify_init); 2043 TSAN_INTERCEPT(inotify_init1); 2044 TSAN_INTERCEPT(socket); 2045 TSAN_INTERCEPT(socketpair); 2046 TSAN_INTERCEPT(connect); 2047 TSAN_INTERCEPT(bind); 2048 TSAN_INTERCEPT(listen); 2049 TSAN_INTERCEPT(epoll_create); 2050 TSAN_INTERCEPT(epoll_create1); 2051 TSAN_INTERCEPT(close); 2052 TSAN_INTERCEPT(__close); 2053 TSAN_INTERCEPT(__res_iclose); 2054 TSAN_INTERCEPT(pipe); 2055 TSAN_INTERCEPT(pipe2); 2056 2057 TSAN_INTERCEPT(send); 2058 TSAN_INTERCEPT(sendmsg); 2059 TSAN_INTERCEPT(recv); 2060 2061 TSAN_INTERCEPT(unlink); 2062 TSAN_INTERCEPT(fopen); 2063 TSAN_INTERCEPT(freopen); 2064 TSAN_INTERCEPT(fclose); 2065 TSAN_INTERCEPT(fread); 2066 TSAN_INTERCEPT(fwrite); 2067 TSAN_INTERCEPT(fflush); 2068 TSAN_INTERCEPT(abort); 2069 TSAN_INTERCEPT(puts); 2070 TSAN_INTERCEPT(rmdir); 2071 TSAN_INTERCEPT(opendir); 2072 2073 TSAN_INTERCEPT(epoll_ctl); 2074 TSAN_INTERCEPT(epoll_wait); 2075 2076 TSAN_INTERCEPT(sigaction); 2077 TSAN_INTERCEPT(signal); 2078 TSAN_INTERCEPT(sigsuspend); 2079 TSAN_INTERCEPT(raise); 2080 TSAN_INTERCEPT(kill); 2081 TSAN_INTERCEPT(pthread_kill); 2082 TSAN_INTERCEPT(sleep); 2083 TSAN_INTERCEPT(usleep); 2084 TSAN_INTERCEPT(nanosleep); 2085 TSAN_INTERCEPT(gettimeofday); 2086 TSAN_INTERCEPT(getaddrinfo); 2087 2088 TSAN_INTERCEPT(mlock); 2089 TSAN_INTERCEPT(munlock); 2090 TSAN_INTERCEPT(mlockall); 2091 TSAN_INTERCEPT(munlockall); 2092 2093 TSAN_INTERCEPT(fork); 2094 TSAN_INTERCEPT(on_exit); 2095 TSAN_INTERCEPT(__cxa_atexit); 2096 2097 // Need to setup it, because interceptors check that the function is resolved. 2098 // But atexit is emitted directly into the module, so can't be resolved. 2099 REAL(atexit) = (int(*)(void(*)()))unreachable; 2100 atexit_ctx = new(internal_alloc(MBlockAtExit, sizeof(AtExitContext))) 2101 AtExitContext(); 2102 2103 if (REAL(__cxa_atexit)(&finalize, 0, 0)) { 2104 Printf("ThreadSanitizer: failed to setup atexit callback\n"); 2105 Die(); 2106 } 2107 2108 if (pthread_key_create(&g_thread_finalize_key, &thread_finalize)) { 2109 Printf("ThreadSanitizer: failed to create thread key\n"); 2110 Die(); 2111 } 2112 2113 FdInit(); 2114} 2115 2116void internal_start_thread(void(*func)(void *arg), void *arg) { 2117 void *th; 2118 REAL(pthread_create)(&th, 0, (void*(*)(void *arg))func, arg); 2119 REAL(pthread_detach)(th); 2120} 2121 2122} // namespace __tsan 2123