tsan_interceptors.cc revision c8c312adee610a1f9284f567a35562f6f8dc15e0
1//===-- tsan_interceptors.cc ----------------------------------------------===// 2// 3// The LLVM Compiler Infrastructure 4// 5// This file is distributed under the University of Illinois Open Source 6// License. See LICENSE.TXT for details. 7// 8//===----------------------------------------------------------------------===// 9// 10// This file is a part of ThreadSanitizer (TSan), a race detector. 11// 12// FIXME: move as many interceptors as possible into 13// sanitizer_common/sanitizer_common_interceptors.inc 14//===----------------------------------------------------------------------===// 15 16#include "sanitizer_common/sanitizer_atomic.h" 17#include "sanitizer_common/sanitizer_libc.h" 18#include "sanitizer_common/sanitizer_linux.h" 19#include "sanitizer_common/sanitizer_platform_limits_posix.h" 20#include "sanitizer_common/sanitizer_placement_new.h" 21#include "sanitizer_common/sanitizer_stacktrace.h" 22#include "interception/interception.h" 23#include "tsan_interface.h" 24#include "tsan_platform.h" 25#include "tsan_rtl.h" 26#include "tsan_mman.h" 27#include "tsan_fd.h" 28 29using namespace __tsan; // NOLINT 30 31const int kSigCount = 64; 32 33struct my_siginfo_t { 34 // The size is determined by looking at sizeof of real siginfo_t on linux. 35 u64 opaque[128 / sizeof(u64)]; 36}; 37 38struct sigset_t { 39 // The size is determined by looking at sizeof of real sigset_t on linux. 40 u64 val[128 / sizeof(u64)]; 41}; 42 43struct ucontext_t { 44 // The size is determined by looking at sizeof of real ucontext_t on linux. 45 u64 opaque[936 / sizeof(u64) + 1]; 46}; 47 48extern "C" int pthread_attr_init(void *attr); 49extern "C" int pthread_attr_destroy(void *attr); 50extern "C" int pthread_attr_getdetachstate(void *attr, int *v); 51extern "C" int pthread_attr_setstacksize(void *attr, uptr stacksize); 52extern "C" int pthread_attr_getstacksize(void *attr, uptr *stacksize); 53extern "C" int pthread_key_create(unsigned *key, void (*destructor)(void* v)); 54extern "C" int pthread_setspecific(unsigned key, const void *v); 55extern "C" int pthread_mutexattr_gettype(void *a, int *type); 56extern "C" int pthread_yield(); 57extern "C" int pthread_sigmask(int how, const sigset_t *set, sigset_t *oldset); 58extern "C" int sigfillset(sigset_t *set); 59extern "C" void *pthread_self(); 60extern "C" void _exit(int status); 61extern "C" int *__errno_location(); 62extern "C" int fileno_unlocked(void *stream); 63extern "C" void *__libc_malloc(uptr size); 64extern "C" void *__libc_calloc(uptr size, uptr n); 65extern "C" void *__libc_realloc(void *ptr, uptr size); 66extern "C" void __libc_free(void *ptr); 67extern "C" int mallopt(int param, int value); 68const int PTHREAD_MUTEX_RECURSIVE = 1; 69const int PTHREAD_MUTEX_RECURSIVE_NP = 1; 70const int kPthreadAttrSize = 56; 71const int EINVAL = 22; 72const int EBUSY = 16; 73const int EPOLL_CTL_ADD = 1; 74const int SIGILL = 4; 75const int SIGABRT = 6; 76const int SIGFPE = 8; 77const int SIGSEGV = 11; 78const int SIGPIPE = 13; 79const int SIGBUS = 7; 80void *const MAP_FAILED = (void*)-1; 81const int PTHREAD_BARRIER_SERIAL_THREAD = -1; 82const int MAP_FIXED = 0x10; 83typedef long long_t; // NOLINT 84 85// From /usr/include/unistd.h 86# define F_ULOCK 0 /* Unlock a previously locked region. */ 87# define F_LOCK 1 /* Lock a region for exclusive use. */ 88# define F_TLOCK 2 /* Test and lock a region for exclusive use. */ 89# define F_TEST 3 /* Test a region for other processes locks. */ 90 91typedef void (*sighandler_t)(int sig); 92 93#define errno (*__errno_location()) 94 95struct sigaction_t { 96 union { 97 sighandler_t sa_handler; 98 void (*sa_sigaction)(int sig, my_siginfo_t *siginfo, void *uctx); 99 }; 100 sigset_t sa_mask; 101 int sa_flags; 102 void (*sa_restorer)(); 103}; 104 105const sighandler_t SIG_DFL = (sighandler_t)0; 106const sighandler_t SIG_IGN = (sighandler_t)1; 107const sighandler_t SIG_ERR = (sighandler_t)-1; 108const int SA_SIGINFO = 4; 109const int SIG_SETMASK = 2; 110 111namespace std { 112struct nothrow_t {}; 113} // namespace std 114 115static sigaction_t sigactions[kSigCount]; 116 117namespace __tsan { 118struct SignalDesc { 119 bool armed; 120 bool sigaction; 121 my_siginfo_t siginfo; 122 ucontext_t ctx; 123}; 124 125struct SignalContext { 126 int in_blocking_func; 127 int int_signal_send; 128 int pending_signal_count; 129 SignalDesc pending_signals[kSigCount]; 130}; 131} // namespace __tsan 132 133static SignalContext *SigCtx(ThreadState *thr) { 134 SignalContext *ctx = (SignalContext*)thr->signal_ctx; 135 if (ctx == 0 && thr->is_alive) { 136 ScopedInRtl in_rtl; 137 ctx = (SignalContext*)MmapOrDie(sizeof(*ctx), "SignalContext"); 138 MemoryResetRange(thr, (uptr)&SigCtx, (uptr)ctx, sizeof(*ctx)); 139 thr->signal_ctx = ctx; 140 } 141 return ctx; 142} 143 144static unsigned g_thread_finalize_key; 145 146class ScopedInterceptor { 147 public: 148 ScopedInterceptor(ThreadState *thr, const char *fname, uptr pc); 149 ~ScopedInterceptor(); 150 private: 151 ThreadState *const thr_; 152 const int in_rtl_; 153}; 154 155ScopedInterceptor::ScopedInterceptor(ThreadState *thr, const char *fname, 156 uptr pc) 157 : thr_(thr) 158 , in_rtl_(thr->in_rtl) { 159 if (thr_->in_rtl == 0) { 160 Initialize(thr); 161 FuncEntry(thr, pc); 162 thr_->in_rtl++; 163 DPrintf("#%d: intercept %s()\n", thr_->tid, fname); 164 } else { 165 thr_->in_rtl++; 166 } 167} 168 169ScopedInterceptor::~ScopedInterceptor() { 170 thr_->in_rtl--; 171 if (thr_->in_rtl == 0) { 172 FuncExit(thr_); 173 ProcessPendingSignals(thr_); 174 } 175 CHECK_EQ(in_rtl_, thr_->in_rtl); 176} 177 178#define SCOPED_INTERCEPTOR_RAW(func, ...) \ 179 ThreadState *thr = cur_thread(); \ 180 StatInc(thr, StatInterceptor); \ 181 StatInc(thr, StatInt_##func); \ 182 const uptr caller_pc = GET_CALLER_PC(); \ 183 ScopedInterceptor si(thr, #func, caller_pc); \ 184 const uptr pc = __sanitizer::StackTrace::GetCurrentPc(); \ 185 (void)pc; \ 186/**/ 187 188#define SCOPED_TSAN_INTERCEPTOR(func, ...) \ 189 SCOPED_INTERCEPTOR_RAW(func, __VA_ARGS__); \ 190 if (REAL(func) == 0) { \ 191 Printf("FATAL: ThreadSanitizer: failed to intercept %s\n", #func); \ 192 Die(); \ 193 } \ 194 if (thr->in_rtl > 1) \ 195 return REAL(func)(__VA_ARGS__); \ 196/**/ 197 198#define TSAN_INTERCEPTOR(ret, func, ...) INTERCEPTOR(ret, func, __VA_ARGS__) 199#define TSAN_INTERCEPT(func) INTERCEPT_FUNCTION(func) 200 201#define BLOCK_REAL(name) (BlockingCall(thr), REAL(name)) 202 203struct BlockingCall { 204 explicit BlockingCall(ThreadState *thr) 205 : ctx(SigCtx(thr)) { 206 ctx->in_blocking_func++; 207 } 208 209 ~BlockingCall() { 210 ctx->in_blocking_func--; 211 } 212 213 SignalContext *ctx; 214}; 215 216TSAN_INTERCEPTOR(unsigned, sleep, unsigned sec) { 217 SCOPED_TSAN_INTERCEPTOR(sleep, sec); 218 unsigned res = BLOCK_REAL(sleep)(sec); 219 AfterSleep(thr, pc); 220 return res; 221} 222 223TSAN_INTERCEPTOR(int, usleep, long_t usec) { 224 SCOPED_TSAN_INTERCEPTOR(usleep, usec); 225 int res = BLOCK_REAL(usleep)(usec); 226 AfterSleep(thr, pc); 227 return res; 228} 229 230TSAN_INTERCEPTOR(int, nanosleep, void *req, void *rem) { 231 SCOPED_TSAN_INTERCEPTOR(nanosleep, req, rem); 232 int res = BLOCK_REAL(nanosleep)(req, rem); 233 AfterSleep(thr, pc); 234 return res; 235} 236 237class AtExitContext { 238 public: 239 AtExitContext() 240 : mtx_(MutexTypeAtExit, StatMtxAtExit) 241 , pos_() { 242 } 243 244 typedef void(*atexit_t)(); 245 246 int atexit(ThreadState *thr, uptr pc, bool is_on_exit, 247 atexit_t f, void *arg) { 248 Lock l(&mtx_); 249 if (pos_ == kMaxAtExit) 250 return 1; 251 Release(thr, pc, (uptr)this); 252 stack_[pos_] = f; 253 args_[pos_] = arg; 254 is_on_exits_[pos_] = is_on_exit; 255 pos_++; 256 return 0; 257 } 258 259 void exit(ThreadState *thr, uptr pc) { 260 CHECK_EQ(thr->in_rtl, 0); 261 for (;;) { 262 atexit_t f = 0; 263 void *arg = 0; 264 bool is_on_exit = false; 265 { 266 Lock l(&mtx_); 267 if (pos_) { 268 pos_--; 269 f = stack_[pos_]; 270 arg = args_[pos_]; 271 is_on_exit = is_on_exits_[pos_]; 272 ScopedInRtl in_rtl; 273 Acquire(thr, pc, (uptr)this); 274 } 275 } 276 if (f == 0) 277 break; 278 DPrintf("#%d: executing atexit func %p\n", thr->tid, f); 279 CHECK_EQ(thr->in_rtl, 0); 280 if (is_on_exit) 281 ((void(*)(int status, void *arg))f)(0, arg); 282 else 283 ((void(*)(void *arg, void *dso))f)(arg, 0); 284 } 285 } 286 287 private: 288 static const int kMaxAtExit = 128; 289 Mutex mtx_; 290 atexit_t stack_[kMaxAtExit]; 291 void *args_[kMaxAtExit]; 292 bool is_on_exits_[kMaxAtExit]; 293 int pos_; 294}; 295 296static AtExitContext *atexit_ctx; 297 298TSAN_INTERCEPTOR(int, atexit, void (*f)()) { 299 if (cur_thread()->in_symbolizer) 300 return 0; 301 SCOPED_TSAN_INTERCEPTOR(atexit, f); 302 return atexit_ctx->atexit(thr, pc, false, (void(*)())f, 0); 303} 304 305TSAN_INTERCEPTOR(int, on_exit, void(*f)(int, void*), void *arg) { 306 if (cur_thread()->in_symbolizer) 307 return 0; 308 SCOPED_TSAN_INTERCEPTOR(on_exit, f, arg); 309 return atexit_ctx->atexit(thr, pc, true, (void(*)())f, arg); 310} 311 312TSAN_INTERCEPTOR(int, __cxa_atexit, void (*f)(void *a), void *arg, void *dso) { 313 if (cur_thread()->in_symbolizer) 314 return 0; 315 SCOPED_TSAN_INTERCEPTOR(__cxa_atexit, f, arg, dso); 316 if (dso) 317 return REAL(__cxa_atexit)(f, arg, dso); 318 return atexit_ctx->atexit(thr, pc, false, (void(*)())f, arg); 319} 320 321// Cleanup old bufs. 322static void JmpBufGarbageCollect(ThreadState *thr, uptr sp) { 323 for (uptr i = 0; i < thr->jmp_bufs.Size(); i++) { 324 JmpBuf *buf = &thr->jmp_bufs[i]; 325 if (buf->sp <= sp) { 326 uptr sz = thr->jmp_bufs.Size(); 327 thr->jmp_bufs[i] = thr->jmp_bufs[sz - 1]; 328 thr->jmp_bufs.PopBack(); 329 i--; 330 } 331 } 332} 333 334static void SetJmp(ThreadState *thr, uptr sp, uptr mangled_sp) { 335 if (thr->shadow_stack_pos == 0) // called from libc guts during bootstrap 336 return; 337 // Cleanup old bufs. 338 JmpBufGarbageCollect(thr, sp); 339 // Remember the buf. 340 JmpBuf *buf = thr->jmp_bufs.PushBack(); 341 buf->sp = sp; 342 buf->mangled_sp = mangled_sp; 343 buf->shadow_stack_pos = thr->shadow_stack_pos; 344} 345 346static void LongJmp(ThreadState *thr, uptr *env) { 347 uptr mangled_sp = env[6]; 348 // Find the saved buf by mangled_sp. 349 for (uptr i = 0; i < thr->jmp_bufs.Size(); i++) { 350 JmpBuf *buf = &thr->jmp_bufs[i]; 351 if (buf->mangled_sp == mangled_sp) { 352 CHECK_GE(thr->shadow_stack_pos, buf->shadow_stack_pos); 353 // Unwind the stack. 354 while (thr->shadow_stack_pos > buf->shadow_stack_pos) 355 FuncExit(thr); 356 JmpBufGarbageCollect(thr, buf->sp - 1); // do not collect buf->sp 357 return; 358 } 359 } 360 Printf("ThreadSanitizer: can't find longjmp buf\n"); 361 CHECK(0); 362} 363 364extern "C" void __tsan_setjmp(uptr sp, uptr mangled_sp) { 365 ScopedInRtl in_rtl; 366 SetJmp(cur_thread(), sp, mangled_sp); 367} 368 369// Not called. Merely to satisfy TSAN_INTERCEPT(). 370extern "C" int __interceptor_setjmp(void *env) 371 SANITIZER_INTERFACE_ATTRIBUTE; 372extern "C" int __interceptor_setjmp(void *env) { 373 CHECK(0); 374 return 0; 375} 376 377extern "C" int __interceptor__setjmp(void *env) 378 SANITIZER_INTERFACE_ATTRIBUTE; 379extern "C" int __interceptor__setjmp(void *env) { 380 CHECK(0); 381 return 0; 382} 383 384extern "C" int __interceptor_sigsetjmp(void *env) 385 SANITIZER_INTERFACE_ATTRIBUTE; 386extern "C" int __interceptor_sigsetjmp(void *env) { 387 CHECK(0); 388 return 0; 389} 390 391extern "C" int __interceptor___sigsetjmp(void *env) 392 SANITIZER_INTERFACE_ATTRIBUTE; 393extern "C" int __interceptor___sigsetjmp(void *env) { 394 CHECK(0); 395 return 0; 396} 397 398extern "C" int setjmp(void *env); 399extern "C" int _setjmp(void *env); 400extern "C" int sigsetjmp(void *env); 401extern "C" int __sigsetjmp(void *env); 402DEFINE_REAL(int, setjmp, void *env) 403DEFINE_REAL(int, _setjmp, void *env) 404DEFINE_REAL(int, sigsetjmp, void *env) 405DEFINE_REAL(int, __sigsetjmp, void *env) 406 407TSAN_INTERCEPTOR(void, longjmp, uptr *env, int val) { 408 { 409 SCOPED_TSAN_INTERCEPTOR(longjmp, env, val); 410 } 411 LongJmp(cur_thread(), env); 412 REAL(longjmp)(env, val); 413} 414 415TSAN_INTERCEPTOR(void, siglongjmp, uptr *env, int val) { 416 { 417 SCOPED_TSAN_INTERCEPTOR(siglongjmp, env, val); 418 } 419 LongJmp(cur_thread(), env); 420 REAL(siglongjmp)(env, val); 421} 422 423TSAN_INTERCEPTOR(void*, malloc, uptr size) { 424 if (cur_thread()->in_symbolizer) 425 return __libc_malloc(size); 426 void *p = 0; 427 { 428 SCOPED_INTERCEPTOR_RAW(malloc, size); 429 p = user_alloc(thr, pc, size); 430 } 431 invoke_malloc_hook(p, size); 432 return p; 433} 434 435TSAN_INTERCEPTOR(void*, __libc_memalign, uptr align, uptr sz) { 436 SCOPED_TSAN_INTERCEPTOR(__libc_memalign, align, sz); 437 return user_alloc(thr, pc, sz, align); 438} 439 440TSAN_INTERCEPTOR(void*, calloc, uptr size, uptr n) { 441 if (cur_thread()->in_symbolizer) 442 return __libc_calloc(size, n); 443 if (__sanitizer::CallocShouldReturnNullDueToOverflow(size, n)) return 0; 444 void *p = 0; 445 { 446 SCOPED_INTERCEPTOR_RAW(calloc, size, n); 447 p = user_alloc(thr, pc, n * size); 448 if (p) 449 internal_memset(p, 0, n * size); 450 } 451 invoke_malloc_hook(p, n * size); 452 return p; 453} 454 455TSAN_INTERCEPTOR(void*, realloc, void *p, uptr size) { 456 if (cur_thread()->in_symbolizer) 457 return __libc_realloc(p, size); 458 if (p) 459 invoke_free_hook(p); 460 { 461 SCOPED_INTERCEPTOR_RAW(realloc, p, size); 462 p = user_realloc(thr, pc, p, size); 463 } 464 invoke_malloc_hook(p, size); 465 return p; 466} 467 468TSAN_INTERCEPTOR(void, free, void *p) { 469 if (p == 0) 470 return; 471 if (cur_thread()->in_symbolizer) 472 return __libc_free(p); 473 invoke_free_hook(p); 474 SCOPED_INTERCEPTOR_RAW(free, p); 475 user_free(thr, pc, p); 476} 477 478TSAN_INTERCEPTOR(void, cfree, void *p) { 479 if (p == 0) 480 return; 481 if (cur_thread()->in_symbolizer) 482 return __libc_free(p); 483 invoke_free_hook(p); 484 SCOPED_INTERCEPTOR_RAW(cfree, p); 485 user_free(thr, pc, p); 486} 487 488TSAN_INTERCEPTOR(uptr, malloc_usable_size, void *p) { 489 SCOPED_INTERCEPTOR_RAW(malloc_usable_size, p); 490 return user_alloc_usable_size(thr, pc, p); 491} 492 493#define OPERATOR_NEW_BODY(mangled_name) \ 494 if (cur_thread()->in_symbolizer) \ 495 return __libc_malloc(size); \ 496 void *p = 0; \ 497 { \ 498 SCOPED_INTERCEPTOR_RAW(mangled_name, size); \ 499 p = user_alloc(thr, pc, size); \ 500 } \ 501 invoke_malloc_hook(p, size); \ 502 return p; 503 504void *operator new(__sanitizer::uptr size) 505 SANITIZER_INTERFACE_ATTRIBUTE; 506void *operator new(__sanitizer::uptr size) { 507 OPERATOR_NEW_BODY(_Znwm); 508} 509 510void *operator new[](__sanitizer::uptr size) 511 SANITIZER_INTERFACE_ATTRIBUTE; 512void *operator new[](__sanitizer::uptr size) { 513 OPERATOR_NEW_BODY(_Znam); 514} 515 516void *operator new(__sanitizer::uptr size, std::nothrow_t const&) 517 SANITIZER_INTERFACE_ATTRIBUTE; 518void *operator new(__sanitizer::uptr size, std::nothrow_t const&) { 519 OPERATOR_NEW_BODY(_ZnwmRKSt9nothrow_t); 520} 521 522void *operator new[](__sanitizer::uptr size, std::nothrow_t const&) 523 SANITIZER_INTERFACE_ATTRIBUTE; 524void *operator new[](__sanitizer::uptr size, std::nothrow_t const&) { 525 OPERATOR_NEW_BODY(_ZnamRKSt9nothrow_t); 526} 527 528#define OPERATOR_DELETE_BODY(mangled_name) \ 529 if (ptr == 0) return; \ 530 if (cur_thread()->in_symbolizer) \ 531 return __libc_free(ptr); \ 532 invoke_free_hook(ptr); \ 533 SCOPED_INTERCEPTOR_RAW(mangled_name, ptr); \ 534 user_free(thr, pc, ptr); 535 536void operator delete(void *ptr) 537 SANITIZER_INTERFACE_ATTRIBUTE; 538void operator delete(void *ptr) { 539 OPERATOR_DELETE_BODY(_ZdlPv); 540} 541 542void operator delete[](void *ptr) 543 SANITIZER_INTERFACE_ATTRIBUTE; 544void operator delete[](void *ptr) { 545 OPERATOR_DELETE_BODY(_ZdlPvRKSt9nothrow_t); 546} 547 548void operator delete(void *ptr, std::nothrow_t const&) 549 SANITIZER_INTERFACE_ATTRIBUTE; 550void operator delete(void *ptr, std::nothrow_t const&) { 551 OPERATOR_DELETE_BODY(_ZdaPv); 552} 553 554void operator delete[](void *ptr, std::nothrow_t const&) 555 SANITIZER_INTERFACE_ATTRIBUTE; 556void operator delete[](void *ptr, std::nothrow_t const&) { 557 OPERATOR_DELETE_BODY(_ZdaPvRKSt9nothrow_t); 558} 559 560TSAN_INTERCEPTOR(uptr, strlen, const char *s) { 561 SCOPED_TSAN_INTERCEPTOR(strlen, s); 562 uptr len = internal_strlen(s); 563 MemoryAccessRange(thr, pc, (uptr)s, len + 1, false); 564 return len; 565} 566 567TSAN_INTERCEPTOR(void*, memset, void *dst, int v, uptr size) { 568 SCOPED_TSAN_INTERCEPTOR(memset, dst, v, size); 569 MemoryAccessRange(thr, pc, (uptr)dst, size, true); 570 return internal_memset(dst, v, size); 571} 572 573TSAN_INTERCEPTOR(void*, memcpy, void *dst, const void *src, uptr size) { 574 SCOPED_TSAN_INTERCEPTOR(memcpy, dst, src, size); 575 MemoryAccessRange(thr, pc, (uptr)dst, size, true); 576 MemoryAccessRange(thr, pc, (uptr)src, size, false); 577 return internal_memcpy(dst, src, size); 578} 579 580TSAN_INTERCEPTOR(int, memcmp, const void *s1, const void *s2, uptr n) { 581 SCOPED_TSAN_INTERCEPTOR(memcmp, s1, s2, n); 582 int res = 0; 583 uptr len = 0; 584 for (; len < n; len++) { 585 if ((res = ((unsigned char*)s1)[len] - ((unsigned char*)s2)[len])) 586 break; 587 } 588 MemoryAccessRange(thr, pc, (uptr)s1, len < n ? len + 1 : n, false); 589 MemoryAccessRange(thr, pc, (uptr)s2, len < n ? len + 1 : n, false); 590 return res; 591} 592 593TSAN_INTERCEPTOR(int, strcmp, const char *s1, const char *s2) { 594 SCOPED_TSAN_INTERCEPTOR(strcmp, s1, s2); 595 uptr len = 0; 596 for (; s1[len] && s2[len]; len++) { 597 if (s1[len] != s2[len]) 598 break; 599 } 600 MemoryAccessRange(thr, pc, (uptr)s1, len + 1, false); 601 MemoryAccessRange(thr, pc, (uptr)s2, len + 1, false); 602 return s1[len] - s2[len]; 603} 604 605TSAN_INTERCEPTOR(int, strncmp, const char *s1, const char *s2, uptr n) { 606 SCOPED_TSAN_INTERCEPTOR(strncmp, s1, s2, n); 607 uptr len = 0; 608 for (; len < n && s1[len] && s2[len]; len++) { 609 if (s1[len] != s2[len]) 610 break; 611 } 612 MemoryAccessRange(thr, pc, (uptr)s1, len < n ? len + 1 : n, false); 613 MemoryAccessRange(thr, pc, (uptr)s2, len < n ? len + 1 : n, false); 614 return len == n ? 0 : s1[len] - s2[len]; 615} 616 617TSAN_INTERCEPTOR(void*, memchr, void *s, int c, uptr n) { 618 SCOPED_TSAN_INTERCEPTOR(memchr, s, c, n); 619 void *res = REAL(memchr)(s, c, n); 620 uptr len = res ? (char*)res - (char*)s + 1 : n; 621 MemoryAccessRange(thr, pc, (uptr)s, len, false); 622 return res; 623} 624 625TSAN_INTERCEPTOR(void*, memrchr, char *s, int c, uptr n) { 626 SCOPED_TSAN_INTERCEPTOR(memrchr, s, c, n); 627 MemoryAccessRange(thr, pc, (uptr)s, n, false); 628 return REAL(memrchr)(s, c, n); 629} 630 631TSAN_INTERCEPTOR(void*, memmove, void *dst, void *src, uptr n) { 632 SCOPED_TSAN_INTERCEPTOR(memmove, dst, src, n); 633 MemoryAccessRange(thr, pc, (uptr)dst, n, true); 634 MemoryAccessRange(thr, pc, (uptr)src, n, false); 635 return REAL(memmove)(dst, src, n); 636} 637 638TSAN_INTERCEPTOR(char*, strchr, char *s, int c) { 639 SCOPED_TSAN_INTERCEPTOR(strchr, s, c); 640 char *res = REAL(strchr)(s, c); 641 uptr len = res ? (char*)res - (char*)s + 1 : internal_strlen(s) + 1; 642 MemoryAccessRange(thr, pc, (uptr)s, len, false); 643 return res; 644} 645 646TSAN_INTERCEPTOR(char*, strchrnul, char *s, int c) { 647 SCOPED_TSAN_INTERCEPTOR(strchrnul, s, c); 648 char *res = REAL(strchrnul)(s, c); 649 uptr len = (char*)res - (char*)s + 1; 650 MemoryAccessRange(thr, pc, (uptr)s, len, false); 651 return res; 652} 653 654TSAN_INTERCEPTOR(char*, strrchr, char *s, int c) { 655 SCOPED_TSAN_INTERCEPTOR(strrchr, s, c); 656 MemoryAccessRange(thr, pc, (uptr)s, internal_strlen(s) + 1, false); 657 return REAL(strrchr)(s, c); 658} 659 660TSAN_INTERCEPTOR(char*, strcpy, char *dst, const char *src) { // NOLINT 661 SCOPED_TSAN_INTERCEPTOR(strcpy, dst, src); // NOLINT 662 uptr srclen = internal_strlen(src); 663 MemoryAccessRange(thr, pc, (uptr)dst, srclen + 1, true); 664 MemoryAccessRange(thr, pc, (uptr)src, srclen + 1, false); 665 return REAL(strcpy)(dst, src); // NOLINT 666} 667 668TSAN_INTERCEPTOR(char*, strncpy, char *dst, char *src, uptr n) { 669 SCOPED_TSAN_INTERCEPTOR(strncpy, dst, src, n); 670 uptr srclen = internal_strnlen(src, n); 671 MemoryAccessRange(thr, pc, (uptr)dst, n, true); 672 MemoryAccessRange(thr, pc, (uptr)src, min(srclen + 1, n), false); 673 return REAL(strncpy)(dst, src, n); 674} 675 676TSAN_INTERCEPTOR(const char*, strstr, const char *s1, const char *s2) { 677 SCOPED_TSAN_INTERCEPTOR(strstr, s1, s2); 678 const char *res = REAL(strstr)(s1, s2); 679 uptr len1 = internal_strlen(s1); 680 uptr len2 = internal_strlen(s2); 681 MemoryAccessRange(thr, pc, (uptr)s1, len1 + 1, false); 682 MemoryAccessRange(thr, pc, (uptr)s2, len2 + 1, false); 683 return res; 684} 685 686static bool fix_mmap_addr(void **addr, long_t sz, int flags) { 687 if (*addr) { 688 if (!IsAppMem((uptr)*addr) || !IsAppMem((uptr)*addr + sz - 1)) { 689 if (flags & MAP_FIXED) { 690 errno = EINVAL; 691 return false; 692 } else { 693 *addr = 0; 694 } 695 } 696 } 697 return true; 698} 699 700TSAN_INTERCEPTOR(void*, mmap, void *addr, long_t sz, int prot, 701 int flags, int fd, unsigned off) { 702 SCOPED_TSAN_INTERCEPTOR(mmap, addr, sz, prot, flags, fd, off); 703 if (!fix_mmap_addr(&addr, sz, flags)) 704 return MAP_FAILED; 705 void *res = REAL(mmap)(addr, sz, prot, flags, fd, off); 706 if (res != MAP_FAILED) { 707 if (fd > 0) 708 FdAccess(thr, pc, fd); 709 MemoryRangeImitateWrite(thr, pc, (uptr)res, sz); 710 } 711 return res; 712} 713 714TSAN_INTERCEPTOR(void*, mmap64, void *addr, long_t sz, int prot, 715 int flags, int fd, u64 off) { 716 SCOPED_TSAN_INTERCEPTOR(mmap64, addr, sz, prot, flags, fd, off); 717 if (!fix_mmap_addr(&addr, sz, flags)) 718 return MAP_FAILED; 719 void *res = REAL(mmap64)(addr, sz, prot, flags, fd, off); 720 if (res != MAP_FAILED) { 721 if (fd > 0) 722 FdAccess(thr, pc, fd); 723 MemoryRangeImitateWrite(thr, pc, (uptr)res, sz); 724 } 725 return res; 726} 727 728TSAN_INTERCEPTOR(int, munmap, void *addr, long_t sz) { 729 SCOPED_TSAN_INTERCEPTOR(munmap, addr, sz); 730 DontNeedShadowFor((uptr)addr, sz); 731 int res = REAL(munmap)(addr, sz); 732 return res; 733} 734 735TSAN_INTERCEPTOR(void*, memalign, uptr align, uptr sz) { 736 SCOPED_TSAN_INTERCEPTOR(memalign, align, sz); 737 return user_alloc(thr, pc, sz, align); 738} 739 740TSAN_INTERCEPTOR(void*, valloc, uptr sz) { 741 SCOPED_TSAN_INTERCEPTOR(valloc, sz); 742 return user_alloc(thr, pc, sz, GetPageSizeCached()); 743} 744 745TSAN_INTERCEPTOR(void*, pvalloc, uptr sz) { 746 SCOPED_TSAN_INTERCEPTOR(pvalloc, sz); 747 sz = RoundUp(sz, GetPageSizeCached()); 748 return user_alloc(thr, pc, sz, GetPageSizeCached()); 749} 750 751TSAN_INTERCEPTOR(int, posix_memalign, void **memptr, uptr align, uptr sz) { 752 SCOPED_TSAN_INTERCEPTOR(posix_memalign, memptr, align, sz); 753 *memptr = user_alloc(thr, pc, sz, align); 754 return 0; 755} 756 757// Used in thread-safe function static initialization. 758extern "C" int INTERFACE_ATTRIBUTE __cxa_guard_acquire(atomic_uint32_t *g) { 759 SCOPED_INTERCEPTOR_RAW(__cxa_guard_acquire, g); 760 for (;;) { 761 u32 cmp = atomic_load(g, memory_order_acquire); 762 if (cmp == 0) { 763 if (atomic_compare_exchange_strong(g, &cmp, 1<<16, memory_order_relaxed)) 764 return 1; 765 } else if (cmp == 1) { 766 Acquire(thr, pc, (uptr)g); 767 return 0; 768 } else { 769 internal_sched_yield(); 770 } 771 } 772} 773 774extern "C" void INTERFACE_ATTRIBUTE __cxa_guard_release(atomic_uint32_t *g) { 775 SCOPED_INTERCEPTOR_RAW(__cxa_guard_release, g); 776 Release(thr, pc, (uptr)g); 777 atomic_store(g, 1, memory_order_release); 778} 779 780extern "C" void INTERFACE_ATTRIBUTE __cxa_guard_abort(atomic_uint32_t *g) { 781 SCOPED_INTERCEPTOR_RAW(__cxa_guard_abort, g); 782 atomic_store(g, 0, memory_order_relaxed); 783} 784 785static void thread_finalize(void *v) { 786 uptr iter = (uptr)v; 787 if (iter > 1) { 788 if (pthread_setspecific(g_thread_finalize_key, (void*)(iter - 1))) { 789 Printf("ThreadSanitizer: failed to set thread key\n"); 790 Die(); 791 } 792 return; 793 } 794 { 795 ScopedInRtl in_rtl; 796 ThreadState *thr = cur_thread(); 797 ThreadFinish(thr); 798 SignalContext *sctx = thr->signal_ctx; 799 if (sctx) { 800 thr->signal_ctx = 0; 801 UnmapOrDie(sctx, sizeof(*sctx)); 802 } 803 } 804} 805 806 807struct ThreadParam { 808 void* (*callback)(void *arg); 809 void *param; 810 atomic_uintptr_t tid; 811}; 812 813extern "C" void *__tsan_thread_start_func(void *arg) { 814 ThreadParam *p = (ThreadParam*)arg; 815 void* (*callback)(void *arg) = p->callback; 816 void *param = p->param; 817 int tid = 0; 818 { 819 ThreadState *thr = cur_thread(); 820 ScopedInRtl in_rtl; 821 if (pthread_setspecific(g_thread_finalize_key, (void*)4)) { 822 Printf("ThreadSanitizer: failed to set thread key\n"); 823 Die(); 824 } 825 while ((tid = atomic_load(&p->tid, memory_order_acquire)) == 0) 826 pthread_yield(); 827 atomic_store(&p->tid, 0, memory_order_release); 828 ThreadStart(thr, tid, GetTid()); 829 CHECK_EQ(thr->in_rtl, 1); 830 } 831 void *res = callback(param); 832 // Prevent the callback from being tail called, 833 // it mixes up stack traces. 834 volatile int foo = 42; 835 foo++; 836 return res; 837} 838 839TSAN_INTERCEPTOR(int, pthread_create, 840 void *th, void *attr, void *(*callback)(void*), void * param) { 841 SCOPED_TSAN_INTERCEPTOR(pthread_create, th, attr, callback, param); 842 __sanitizer_pthread_attr_t myattr; 843 if (attr == 0) { 844 pthread_attr_init(&myattr); 845 attr = &myattr; 846 } 847 int detached = 0; 848 pthread_attr_getdetachstate(attr, &detached); 849 850#if defined(TSAN_DEBUG_OUTPUT) 851 int verbosity = (TSAN_DEBUG_OUTPUT); 852#else 853 int verbosity = 0; 854#endif 855 AdjustStackSizeLinux(attr, verbosity); 856 857 ThreadParam p; 858 p.callback = callback; 859 p.param = param; 860 atomic_store(&p.tid, 0, memory_order_relaxed); 861 int res = REAL(pthread_create)(th, attr, __tsan_thread_start_func, &p); 862 if (res == 0) { 863 int tid = ThreadCreate(thr, pc, *(uptr*)th, detached); 864 CHECK_NE(tid, 0); 865 atomic_store(&p.tid, tid, memory_order_release); 866 while (atomic_load(&p.tid, memory_order_acquire) != 0) 867 pthread_yield(); 868 } 869 if (attr == &myattr) 870 pthread_attr_destroy(&myattr); 871 return res; 872} 873 874TSAN_INTERCEPTOR(int, pthread_join, void *th, void **ret) { 875 SCOPED_TSAN_INTERCEPTOR(pthread_join, th, ret); 876 int tid = ThreadTid(thr, pc, (uptr)th); 877 int res = BLOCK_REAL(pthread_join)(th, ret); 878 if (res == 0) { 879 ThreadJoin(thr, pc, tid); 880 } 881 return res; 882} 883 884TSAN_INTERCEPTOR(int, pthread_detach, void *th) { 885 SCOPED_TSAN_INTERCEPTOR(pthread_detach, th); 886 int tid = ThreadTid(thr, pc, (uptr)th); 887 int res = REAL(pthread_detach)(th); 888 if (res == 0) { 889 ThreadDetach(thr, pc, tid); 890 } 891 return res; 892} 893 894TSAN_INTERCEPTOR(int, pthread_mutex_init, void *m, void *a) { 895 SCOPED_TSAN_INTERCEPTOR(pthread_mutex_init, m, a); 896 int res = REAL(pthread_mutex_init)(m, a); 897 if (res == 0) { 898 bool recursive = false; 899 if (a) { 900 int type = 0; 901 if (pthread_mutexattr_gettype(a, &type) == 0) 902 recursive = (type == PTHREAD_MUTEX_RECURSIVE 903 || type == PTHREAD_MUTEX_RECURSIVE_NP); 904 } 905 MutexCreate(thr, pc, (uptr)m, false, recursive, false); 906 } 907 return res; 908} 909 910TSAN_INTERCEPTOR(int, pthread_mutex_destroy, void *m) { 911 SCOPED_TSAN_INTERCEPTOR(pthread_mutex_destroy, m); 912 int res = REAL(pthread_mutex_destroy)(m); 913 if (res == 0 || res == EBUSY) { 914 MutexDestroy(thr, pc, (uptr)m); 915 } 916 return res; 917} 918 919TSAN_INTERCEPTOR(int, pthread_mutex_lock, void *m) { 920 SCOPED_TSAN_INTERCEPTOR(pthread_mutex_lock, m); 921 int res = REAL(pthread_mutex_lock)(m); 922 if (res == 0) { 923 MutexLock(thr, pc, (uptr)m); 924 } 925 return res; 926} 927 928TSAN_INTERCEPTOR(int, pthread_mutex_trylock, void *m) { 929 SCOPED_TSAN_INTERCEPTOR(pthread_mutex_trylock, m); 930 int res = REAL(pthread_mutex_trylock)(m); 931 if (res == 0) { 932 MutexLock(thr, pc, (uptr)m); 933 } 934 return res; 935} 936 937TSAN_INTERCEPTOR(int, pthread_mutex_timedlock, void *m, void *abstime) { 938 SCOPED_TSAN_INTERCEPTOR(pthread_mutex_timedlock, m, abstime); 939 int res = REAL(pthread_mutex_timedlock)(m, abstime); 940 if (res == 0) { 941 MutexLock(thr, pc, (uptr)m); 942 } 943 return res; 944} 945 946TSAN_INTERCEPTOR(int, pthread_mutex_unlock, void *m) { 947 SCOPED_TSAN_INTERCEPTOR(pthread_mutex_unlock, m); 948 MutexUnlock(thr, pc, (uptr)m); 949 int res = REAL(pthread_mutex_unlock)(m); 950 return res; 951} 952 953TSAN_INTERCEPTOR(int, pthread_spin_init, void *m, int pshared) { 954 SCOPED_TSAN_INTERCEPTOR(pthread_spin_init, m, pshared); 955 int res = REAL(pthread_spin_init)(m, pshared); 956 if (res == 0) { 957 MutexCreate(thr, pc, (uptr)m, false, false, false); 958 } 959 return res; 960} 961 962TSAN_INTERCEPTOR(int, pthread_spin_destroy, void *m) { 963 SCOPED_TSAN_INTERCEPTOR(pthread_spin_destroy, m); 964 int res = REAL(pthread_spin_destroy)(m); 965 if (res == 0) { 966 MutexDestroy(thr, pc, (uptr)m); 967 } 968 return res; 969} 970 971TSAN_INTERCEPTOR(int, pthread_spin_lock, void *m) { 972 SCOPED_TSAN_INTERCEPTOR(pthread_spin_lock, m); 973 int res = REAL(pthread_spin_lock)(m); 974 if (res == 0) { 975 MutexLock(thr, pc, (uptr)m); 976 } 977 return res; 978} 979 980TSAN_INTERCEPTOR(int, pthread_spin_trylock, void *m) { 981 SCOPED_TSAN_INTERCEPTOR(pthread_spin_trylock, m); 982 int res = REAL(pthread_spin_trylock)(m); 983 if (res == 0) { 984 MutexLock(thr, pc, (uptr)m); 985 } 986 return res; 987} 988 989TSAN_INTERCEPTOR(int, pthread_spin_unlock, void *m) { 990 SCOPED_TSAN_INTERCEPTOR(pthread_spin_unlock, m); 991 MutexUnlock(thr, pc, (uptr)m); 992 int res = REAL(pthread_spin_unlock)(m); 993 return res; 994} 995 996TSAN_INTERCEPTOR(int, pthread_rwlock_init, void *m, void *a) { 997 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_init, m, a); 998 int res = REAL(pthread_rwlock_init)(m, a); 999 if (res == 0) { 1000 MutexCreate(thr, pc, (uptr)m, true, false, false); 1001 } 1002 return res; 1003} 1004 1005TSAN_INTERCEPTOR(int, pthread_rwlock_destroy, void *m) { 1006 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_destroy, m); 1007 int res = REAL(pthread_rwlock_destroy)(m); 1008 if (res == 0) { 1009 MutexDestroy(thr, pc, (uptr)m); 1010 } 1011 return res; 1012} 1013 1014TSAN_INTERCEPTOR(int, pthread_rwlock_rdlock, void *m) { 1015 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_rdlock, m); 1016 int res = REAL(pthread_rwlock_rdlock)(m); 1017 if (res == 0) { 1018 MutexReadLock(thr, pc, (uptr)m); 1019 } 1020 return res; 1021} 1022 1023TSAN_INTERCEPTOR(int, pthread_rwlock_tryrdlock, void *m) { 1024 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_tryrdlock, m); 1025 int res = REAL(pthread_rwlock_tryrdlock)(m); 1026 if (res == 0) { 1027 MutexReadLock(thr, pc, (uptr)m); 1028 } 1029 return res; 1030} 1031 1032TSAN_INTERCEPTOR(int, pthread_rwlock_timedrdlock, void *m, void *abstime) { 1033 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_timedrdlock, m, abstime); 1034 int res = REAL(pthread_rwlock_timedrdlock)(m, abstime); 1035 if (res == 0) { 1036 MutexReadLock(thr, pc, (uptr)m); 1037 } 1038 return res; 1039} 1040 1041TSAN_INTERCEPTOR(int, pthread_rwlock_wrlock, void *m) { 1042 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_wrlock, m); 1043 int res = REAL(pthread_rwlock_wrlock)(m); 1044 if (res == 0) { 1045 MutexLock(thr, pc, (uptr)m); 1046 } 1047 return res; 1048} 1049 1050TSAN_INTERCEPTOR(int, pthread_rwlock_trywrlock, void *m) { 1051 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_trywrlock, m); 1052 int res = REAL(pthread_rwlock_trywrlock)(m); 1053 if (res == 0) { 1054 MutexLock(thr, pc, (uptr)m); 1055 } 1056 return res; 1057} 1058 1059TSAN_INTERCEPTOR(int, pthread_rwlock_timedwrlock, void *m, void *abstime) { 1060 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_timedwrlock, m, abstime); 1061 int res = REAL(pthread_rwlock_timedwrlock)(m, abstime); 1062 if (res == 0) { 1063 MutexLock(thr, pc, (uptr)m); 1064 } 1065 return res; 1066} 1067 1068TSAN_INTERCEPTOR(int, pthread_rwlock_unlock, void *m) { 1069 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_unlock, m); 1070 MutexReadOrWriteUnlock(thr, pc, (uptr)m); 1071 int res = REAL(pthread_rwlock_unlock)(m); 1072 return res; 1073} 1074 1075// libpthread.so contains several versions of pthread_cond_init symbol. 1076// When we just dlsym() it, we get the wrong (old) version. 1077/* 1078TSAN_INTERCEPTOR(int, pthread_cond_init, void *c, void *a) { 1079 SCOPED_TSAN_INTERCEPTOR(pthread_cond_init, c, a); 1080 int res = REAL(pthread_cond_init)(c, a); 1081 return res; 1082} 1083*/ 1084 1085TSAN_INTERCEPTOR(int, pthread_cond_destroy, void *c) { 1086 SCOPED_TSAN_INTERCEPTOR(pthread_cond_destroy, c); 1087 int res = REAL(pthread_cond_destroy)(c); 1088 return res; 1089} 1090 1091TSAN_INTERCEPTOR(int, pthread_cond_signal, void *c) { 1092 SCOPED_TSAN_INTERCEPTOR(pthread_cond_signal, c); 1093 int res = REAL(pthread_cond_signal)(c); 1094 return res; 1095} 1096 1097TSAN_INTERCEPTOR(int, pthread_cond_broadcast, void *c) { 1098 SCOPED_TSAN_INTERCEPTOR(pthread_cond_broadcast, c); 1099 int res = REAL(pthread_cond_broadcast)(c); 1100 return res; 1101} 1102 1103TSAN_INTERCEPTOR(int, pthread_cond_wait, void *c, void *m) { 1104 SCOPED_TSAN_INTERCEPTOR(pthread_cond_wait, c, m); 1105 MutexUnlock(thr, pc, (uptr)m); 1106 int res = REAL(pthread_cond_wait)(c, m); 1107 MutexLock(thr, pc, (uptr)m); 1108 return res; 1109} 1110 1111TSAN_INTERCEPTOR(int, pthread_cond_timedwait, void *c, void *m, void *abstime) { 1112 SCOPED_TSAN_INTERCEPTOR(pthread_cond_timedwait, c, m, abstime); 1113 MutexUnlock(thr, pc, (uptr)m); 1114 int res = REAL(pthread_cond_timedwait)(c, m, abstime); 1115 MutexLock(thr, pc, (uptr)m); 1116 return res; 1117} 1118 1119TSAN_INTERCEPTOR(int, pthread_barrier_init, void *b, void *a, unsigned count) { 1120 SCOPED_TSAN_INTERCEPTOR(pthread_barrier_init, b, a, count); 1121 MemoryWrite(thr, pc, (uptr)b, kSizeLog1); 1122 int res = REAL(pthread_barrier_init)(b, a, count); 1123 return res; 1124} 1125 1126TSAN_INTERCEPTOR(int, pthread_barrier_destroy, void *b) { 1127 SCOPED_TSAN_INTERCEPTOR(pthread_barrier_destroy, b); 1128 MemoryWrite(thr, pc, (uptr)b, kSizeLog1); 1129 int res = REAL(pthread_barrier_destroy)(b); 1130 return res; 1131} 1132 1133TSAN_INTERCEPTOR(int, pthread_barrier_wait, void *b) { 1134 SCOPED_TSAN_INTERCEPTOR(pthread_barrier_wait, b); 1135 Release(thr, pc, (uptr)b); 1136 MemoryRead(thr, pc, (uptr)b, kSizeLog1); 1137 int res = REAL(pthread_barrier_wait)(b); 1138 MemoryRead(thr, pc, (uptr)b, kSizeLog1); 1139 if (res == 0 || res == PTHREAD_BARRIER_SERIAL_THREAD) { 1140 Acquire(thr, pc, (uptr)b); 1141 } 1142 return res; 1143} 1144 1145TSAN_INTERCEPTOR(int, pthread_once, void *o, void (*f)()) { 1146 SCOPED_TSAN_INTERCEPTOR(pthread_once, o, f); 1147 if (o == 0 || f == 0) 1148 return EINVAL; 1149 atomic_uint32_t *a = static_cast<atomic_uint32_t*>(o); 1150 u32 v = atomic_load(a, memory_order_acquire); 1151 if (v == 0 && atomic_compare_exchange_strong(a, &v, 1, 1152 memory_order_relaxed)) { 1153 const int old_in_rtl = thr->in_rtl; 1154 thr->in_rtl = 0; 1155 (*f)(); 1156 CHECK_EQ(thr->in_rtl, 0); 1157 thr->in_rtl = old_in_rtl; 1158 Release(thr, pc, (uptr)o); 1159 atomic_store(a, 2, memory_order_release); 1160 } else { 1161 while (v != 2) { 1162 pthread_yield(); 1163 v = atomic_load(a, memory_order_acquire); 1164 } 1165 Acquire(thr, pc, (uptr)o); 1166 } 1167 return 0; 1168} 1169 1170TSAN_INTERCEPTOR(int, sem_init, void *s, int pshared, unsigned value) { 1171 SCOPED_TSAN_INTERCEPTOR(sem_init, s, pshared, value); 1172 int res = REAL(sem_init)(s, pshared, value); 1173 return res; 1174} 1175 1176TSAN_INTERCEPTOR(int, sem_destroy, void *s) { 1177 SCOPED_TSAN_INTERCEPTOR(sem_destroy, s); 1178 int res = REAL(sem_destroy)(s); 1179 return res; 1180} 1181 1182TSAN_INTERCEPTOR(int, sem_wait, void *s) { 1183 SCOPED_TSAN_INTERCEPTOR(sem_wait, s); 1184 int res = BLOCK_REAL(sem_wait)(s); 1185 if (res == 0) { 1186 Acquire(thr, pc, (uptr)s); 1187 } 1188 return res; 1189} 1190 1191TSAN_INTERCEPTOR(int, sem_trywait, void *s) { 1192 SCOPED_TSAN_INTERCEPTOR(sem_trywait, s); 1193 int res = BLOCK_REAL(sem_trywait)(s); 1194 if (res == 0) { 1195 Acquire(thr, pc, (uptr)s); 1196 } 1197 return res; 1198} 1199 1200TSAN_INTERCEPTOR(int, sem_timedwait, void *s, void *abstime) { 1201 SCOPED_TSAN_INTERCEPTOR(sem_timedwait, s, abstime); 1202 int res = BLOCK_REAL(sem_timedwait)(s, abstime); 1203 if (res == 0) { 1204 Acquire(thr, pc, (uptr)s); 1205 } 1206 return res; 1207} 1208 1209TSAN_INTERCEPTOR(int, sem_post, void *s) { 1210 SCOPED_TSAN_INTERCEPTOR(sem_post, s); 1211 Release(thr, pc, (uptr)s); 1212 int res = REAL(sem_post)(s); 1213 return res; 1214} 1215 1216TSAN_INTERCEPTOR(int, sem_getvalue, void *s, int *sval) { 1217 SCOPED_TSAN_INTERCEPTOR(sem_getvalue, s, sval); 1218 int res = REAL(sem_getvalue)(s, sval); 1219 if (res == 0) { 1220 Acquire(thr, pc, (uptr)s); 1221 } 1222 return res; 1223} 1224 1225TSAN_INTERCEPTOR(int, __xstat, int version, const char *path, void *buf) { 1226 SCOPED_TSAN_INTERCEPTOR(__xstat, version, path, buf); 1227 return REAL(__xstat)(version, path, buf); 1228} 1229 1230TSAN_INTERCEPTOR(int, stat, const char *path, void *buf) { 1231 SCOPED_TSAN_INTERCEPTOR(__xstat, 0, path, buf); 1232 return REAL(__xstat)(0, path, buf); 1233} 1234 1235TSAN_INTERCEPTOR(int, __xstat64, int version, const char *path, void *buf) { 1236 SCOPED_TSAN_INTERCEPTOR(__xstat64, version, path, buf); 1237 return REAL(__xstat64)(version, path, buf); 1238} 1239 1240TSAN_INTERCEPTOR(int, stat64, const char *path, void *buf) { 1241 SCOPED_TSAN_INTERCEPTOR(__xstat64, 0, path, buf); 1242 return REAL(__xstat64)(0, path, buf); 1243} 1244 1245TSAN_INTERCEPTOR(int, __lxstat, int version, const char *path, void *buf) { 1246 SCOPED_TSAN_INTERCEPTOR(__lxstat, version, path, buf); 1247 return REAL(__lxstat)(version, path, buf); 1248} 1249 1250TSAN_INTERCEPTOR(int, lstat, const char *path, void *buf) { 1251 SCOPED_TSAN_INTERCEPTOR(__lxstat, 0, path, buf); 1252 return REAL(__lxstat)(0, path, buf); 1253} 1254 1255TSAN_INTERCEPTOR(int, __lxstat64, int version, const char *path, void *buf) { 1256 SCOPED_TSAN_INTERCEPTOR(__lxstat64, version, path, buf); 1257 return REAL(__lxstat64)(version, path, buf); 1258} 1259 1260TSAN_INTERCEPTOR(int, lstat64, const char *path, void *buf) { 1261 SCOPED_TSAN_INTERCEPTOR(__lxstat64, 0, path, buf); 1262 return REAL(__lxstat64)(0, path, buf); 1263} 1264 1265TSAN_INTERCEPTOR(int, __fxstat, int version, int fd, void *buf) { 1266 SCOPED_TSAN_INTERCEPTOR(__fxstat, version, fd, buf); 1267 if (fd > 0) 1268 FdAccess(thr, pc, fd); 1269 return REAL(__fxstat)(version, fd, buf); 1270} 1271 1272TSAN_INTERCEPTOR(int, fstat, int fd, void *buf) { 1273 SCOPED_TSAN_INTERCEPTOR(__fxstat, 0, fd, buf); 1274 if (fd > 0) 1275 FdAccess(thr, pc, fd); 1276 return REAL(__fxstat)(0, fd, buf); 1277} 1278 1279TSAN_INTERCEPTOR(int, __fxstat64, int version, int fd, void *buf) { 1280 SCOPED_TSAN_INTERCEPTOR(__fxstat64, version, fd, buf); 1281 if (fd > 0) 1282 FdAccess(thr, pc, fd); 1283 return REAL(__fxstat64)(version, fd, buf); 1284} 1285 1286TSAN_INTERCEPTOR(int, fstat64, int fd, void *buf) { 1287 SCOPED_TSAN_INTERCEPTOR(__fxstat64, 0, fd, buf); 1288 if (fd > 0) 1289 FdAccess(thr, pc, fd); 1290 return REAL(__fxstat64)(0, fd, buf); 1291} 1292 1293TSAN_INTERCEPTOR(int, open, const char *name, int flags, int mode) { 1294 SCOPED_TSAN_INTERCEPTOR(open, name, flags, mode); 1295 int fd = REAL(open)(name, flags, mode); 1296 if (fd >= 0) 1297 FdFileCreate(thr, pc, fd); 1298 return fd; 1299} 1300 1301TSAN_INTERCEPTOR(int, open64, const char *name, int flags, int mode) { 1302 SCOPED_TSAN_INTERCEPTOR(open64, name, flags, mode); 1303 int fd = REAL(open64)(name, flags, mode); 1304 if (fd >= 0) 1305 FdFileCreate(thr, pc, fd); 1306 return fd; 1307} 1308 1309TSAN_INTERCEPTOR(int, creat, const char *name, int mode) { 1310 SCOPED_TSAN_INTERCEPTOR(creat, name, mode); 1311 int fd = REAL(creat)(name, mode); 1312 if (fd >= 0) 1313 FdFileCreate(thr, pc, fd); 1314 return fd; 1315} 1316 1317TSAN_INTERCEPTOR(int, creat64, const char *name, int mode) { 1318 SCOPED_TSAN_INTERCEPTOR(creat64, name, mode); 1319 int fd = REAL(creat64)(name, mode); 1320 if (fd >= 0) 1321 FdFileCreate(thr, pc, fd); 1322 return fd; 1323} 1324 1325TSAN_INTERCEPTOR(int, dup, int oldfd) { 1326 SCOPED_TSAN_INTERCEPTOR(dup, oldfd); 1327 int newfd = REAL(dup)(oldfd); 1328 if (oldfd >= 0 && newfd >= 0 && newfd != oldfd) 1329 FdDup(thr, pc, oldfd, newfd); 1330 return newfd; 1331} 1332 1333TSAN_INTERCEPTOR(int, dup2, int oldfd, int newfd) { 1334 SCOPED_TSAN_INTERCEPTOR(dup2, oldfd, newfd); 1335 int newfd2 = REAL(dup2)(oldfd, newfd); 1336 if (oldfd >= 0 && newfd2 >= 0 && newfd2 != oldfd) 1337 FdDup(thr, pc, oldfd, newfd2); 1338 return newfd2; 1339} 1340 1341TSAN_INTERCEPTOR(int, dup3, int oldfd, int newfd, int flags) { 1342 SCOPED_TSAN_INTERCEPTOR(dup3, oldfd, newfd, flags); 1343 int newfd2 = REAL(dup3)(oldfd, newfd, flags); 1344 if (oldfd >= 0 && newfd2 >= 0 && newfd2 != oldfd) 1345 FdDup(thr, pc, oldfd, newfd2); 1346 return newfd2; 1347} 1348 1349TSAN_INTERCEPTOR(int, eventfd, unsigned initval, int flags) { 1350 SCOPED_TSAN_INTERCEPTOR(eventfd, initval, flags); 1351 int fd = REAL(eventfd)(initval, flags); 1352 if (fd >= 0) 1353 FdEventCreate(thr, pc, fd); 1354 return fd; 1355} 1356 1357TSAN_INTERCEPTOR(int, signalfd, int fd, void *mask, int flags) { 1358 SCOPED_TSAN_INTERCEPTOR(signalfd, fd, mask, flags); 1359 if (fd >= 0) 1360 FdClose(thr, pc, fd); 1361 fd = REAL(signalfd)(fd, mask, flags); 1362 if (fd >= 0) 1363 FdSignalCreate(thr, pc, fd); 1364 return fd; 1365} 1366 1367TSAN_INTERCEPTOR(int, inotify_init, int fake) { 1368 SCOPED_TSAN_INTERCEPTOR(inotify_init, fake); 1369 int fd = REAL(inotify_init)(fake); 1370 if (fd >= 0) 1371 FdInotifyCreate(thr, pc, fd); 1372 return fd; 1373} 1374 1375TSAN_INTERCEPTOR(int, inotify_init1, int flags) { 1376 SCOPED_TSAN_INTERCEPTOR(inotify_init1, flags); 1377 int fd = REAL(inotify_init1)(flags); 1378 if (fd >= 0) 1379 FdInotifyCreate(thr, pc, fd); 1380 return fd; 1381} 1382 1383TSAN_INTERCEPTOR(int, socket, int domain, int type, int protocol) { 1384 SCOPED_TSAN_INTERCEPTOR(socket, domain, type, protocol); 1385 int fd = REAL(socket)(domain, type, protocol); 1386 if (fd >= 0) 1387 FdSocketCreate(thr, pc, fd); 1388 return fd; 1389} 1390 1391TSAN_INTERCEPTOR(int, socketpair, int domain, int type, int protocol, int *fd) { 1392 SCOPED_TSAN_INTERCEPTOR(socketpair, domain, type, protocol, fd); 1393 int res = REAL(socketpair)(domain, type, protocol, fd); 1394 if (res == 0 && fd[0] >= 0 && fd[1] >= 0) 1395 FdPipeCreate(thr, pc, fd[0], fd[1]); 1396 return res; 1397} 1398 1399TSAN_INTERCEPTOR(int, connect, int fd, void *addr, unsigned addrlen) { 1400 SCOPED_TSAN_INTERCEPTOR(connect, fd, addr, addrlen); 1401 FdSocketConnecting(thr, pc, fd); 1402 int res = REAL(connect)(fd, addr, addrlen); 1403 if (res == 0 && fd >= 0) 1404 FdSocketConnect(thr, pc, fd); 1405 return res; 1406} 1407 1408TSAN_INTERCEPTOR(int, bind, int fd, void *addr, unsigned addrlen) { 1409 SCOPED_TSAN_INTERCEPTOR(bind, fd, addr, addrlen); 1410 int res = REAL(bind)(fd, addr, addrlen); 1411 if (fd > 0 && res == 0) 1412 FdAccess(thr, pc, fd); 1413 return res; 1414} 1415 1416TSAN_INTERCEPTOR(int, listen, int fd, int backlog) { 1417 SCOPED_TSAN_INTERCEPTOR(listen, fd, backlog); 1418 int res = REAL(listen)(fd, backlog); 1419 if (fd > 0 && res == 0) 1420 FdAccess(thr, pc, fd); 1421 return res; 1422} 1423 1424TSAN_INTERCEPTOR(int, epoll_create, int size) { 1425 SCOPED_TSAN_INTERCEPTOR(epoll_create, size); 1426 int fd = REAL(epoll_create)(size); 1427 if (fd >= 0) 1428 FdPollCreate(thr, pc, fd); 1429 return fd; 1430} 1431 1432TSAN_INTERCEPTOR(int, epoll_create1, int flags) { 1433 SCOPED_TSAN_INTERCEPTOR(epoll_create1, flags); 1434 int fd = REAL(epoll_create1)(flags); 1435 if (fd >= 0) 1436 FdPollCreate(thr, pc, fd); 1437 return fd; 1438} 1439 1440TSAN_INTERCEPTOR(int, close, int fd) { 1441 SCOPED_TSAN_INTERCEPTOR(close, fd); 1442 if (fd >= 0) 1443 FdClose(thr, pc, fd); 1444 return REAL(close)(fd); 1445} 1446 1447TSAN_INTERCEPTOR(int, __close, int fd) { 1448 SCOPED_TSAN_INTERCEPTOR(__close, fd); 1449 if (fd >= 0) 1450 FdClose(thr, pc, fd); 1451 return REAL(__close)(fd); 1452} 1453 1454// glibc guts 1455TSAN_INTERCEPTOR(void, __res_iclose, void *state, bool free_addr) { 1456 SCOPED_TSAN_INTERCEPTOR(__res_iclose, state, free_addr); 1457 int fds[64]; 1458 int cnt = ExtractResolvFDs(state, fds, ARRAY_SIZE(fds)); 1459 for (int i = 0; i < cnt; i++) { 1460 if (fds[i] > 0) 1461 FdClose(thr, pc, fds[i]); 1462 } 1463 REAL(__res_iclose)(state, free_addr); 1464} 1465 1466TSAN_INTERCEPTOR(int, pipe, int *pipefd) { 1467 SCOPED_TSAN_INTERCEPTOR(pipe, pipefd); 1468 int res = REAL(pipe)(pipefd); 1469 if (res == 0 && pipefd[0] >= 0 && pipefd[1] >= 0) 1470 FdPipeCreate(thr, pc, pipefd[0], pipefd[1]); 1471 return res; 1472} 1473 1474TSAN_INTERCEPTOR(int, pipe2, int *pipefd, int flags) { 1475 SCOPED_TSAN_INTERCEPTOR(pipe2, pipefd, flags); 1476 int res = REAL(pipe2)(pipefd, flags); 1477 if (res == 0 && pipefd[0] >= 0 && pipefd[1] >= 0) 1478 FdPipeCreate(thr, pc, pipefd[0], pipefd[1]); 1479 return res; 1480} 1481 1482TSAN_INTERCEPTOR(long_t, send, int fd, void *buf, long_t len, int flags) { 1483 SCOPED_TSAN_INTERCEPTOR(send, fd, buf, len, flags); 1484 if (fd >= 0) 1485 FdRelease(thr, pc, fd); 1486 int res = REAL(send)(fd, buf, len, flags); 1487 return res; 1488} 1489 1490TSAN_INTERCEPTOR(long_t, sendmsg, int fd, void *msg, int flags) { 1491 SCOPED_TSAN_INTERCEPTOR(sendmsg, fd, msg, flags); 1492 if (fd >= 0) 1493 FdRelease(thr, pc, fd); 1494 int res = REAL(sendmsg)(fd, msg, flags); 1495 return res; 1496} 1497 1498TSAN_INTERCEPTOR(long_t, recv, int fd, void *buf, long_t len, int flags) { 1499 SCOPED_TSAN_INTERCEPTOR(recv, fd, buf, len, flags); 1500 int res = REAL(recv)(fd, buf, len, flags); 1501 if (res >= 0 && fd >= 0) { 1502 FdAcquire(thr, pc, fd); 1503 } 1504 return res; 1505} 1506 1507TSAN_INTERCEPTOR(int, unlink, char *path) { 1508 SCOPED_TSAN_INTERCEPTOR(unlink, path); 1509 Release(thr, pc, File2addr(path)); 1510 int res = REAL(unlink)(path); 1511 return res; 1512} 1513 1514TSAN_INTERCEPTOR(void*, fopen, char *path, char *mode) { 1515 SCOPED_TSAN_INTERCEPTOR(fopen, path, mode); 1516 void *res = REAL(fopen)(path, mode); 1517 Acquire(thr, pc, File2addr(path)); 1518 if (res) { 1519 int fd = fileno_unlocked(res); 1520 if (fd >= 0) 1521 FdFileCreate(thr, pc, fd); 1522 } 1523 return res; 1524} 1525 1526TSAN_INTERCEPTOR(void*, freopen, char *path, char *mode, void *stream) { 1527 SCOPED_TSAN_INTERCEPTOR(freopen, path, mode, stream); 1528 if (stream) { 1529 int fd = fileno_unlocked(stream); 1530 if (fd >= 0) 1531 FdClose(thr, pc, fd); 1532 } 1533 void *res = REAL(freopen)(path, mode, stream); 1534 Acquire(thr, pc, File2addr(path)); 1535 if (res) { 1536 int fd = fileno_unlocked(res); 1537 if (fd >= 0) 1538 FdFileCreate(thr, pc, fd); 1539 } 1540 return res; 1541} 1542 1543TSAN_INTERCEPTOR(int, fclose, void *stream) { 1544 { 1545 SCOPED_TSAN_INTERCEPTOR(fclose, stream); 1546 if (stream) { 1547 int fd = fileno_unlocked(stream); 1548 if (fd >= 0) 1549 FdClose(thr, pc, fd); 1550 } 1551 } 1552 return REAL(fclose)(stream); 1553} 1554 1555TSAN_INTERCEPTOR(uptr, fread, void *ptr, uptr size, uptr nmemb, void *f) { 1556 { 1557 SCOPED_TSAN_INTERCEPTOR(fread, ptr, size, nmemb, f); 1558 MemoryAccessRange(thr, pc, (uptr)ptr, size * nmemb, true); 1559 } 1560 return REAL(fread)(ptr, size, nmemb, f); 1561} 1562 1563TSAN_INTERCEPTOR(uptr, fwrite, const void *p, uptr size, uptr nmemb, void *f) { 1564 { 1565 SCOPED_TSAN_INTERCEPTOR(fwrite, p, size, nmemb, f); 1566 MemoryAccessRange(thr, pc, (uptr)p, size * nmemb, false); 1567 } 1568 return REAL(fwrite)(p, size, nmemb, f); 1569} 1570 1571TSAN_INTERCEPTOR(int, fflush, void *stream) { 1572 SCOPED_TSAN_INTERCEPTOR(fflush, stream); 1573 return REAL(fflush)(stream); 1574} 1575 1576TSAN_INTERCEPTOR(void, abort, int fake) { 1577 SCOPED_TSAN_INTERCEPTOR(abort, fake); 1578 REAL(fflush)(0); 1579 REAL(abort)(fake); 1580} 1581 1582TSAN_INTERCEPTOR(int, puts, const char *s) { 1583 SCOPED_TSAN_INTERCEPTOR(puts, s); 1584 MemoryAccessRange(thr, pc, (uptr)s, internal_strlen(s), false); 1585 return REAL(puts)(s); 1586} 1587 1588TSAN_INTERCEPTOR(int, rmdir, char *path) { 1589 SCOPED_TSAN_INTERCEPTOR(rmdir, path); 1590 Release(thr, pc, Dir2addr(path)); 1591 int res = REAL(rmdir)(path); 1592 return res; 1593} 1594 1595TSAN_INTERCEPTOR(void*, opendir, char *path) { 1596 SCOPED_TSAN_INTERCEPTOR(opendir, path); 1597 void *res = REAL(opendir)(path); 1598 if (res != 0) 1599 Acquire(thr, pc, Dir2addr(path)); 1600 return res; 1601} 1602 1603TSAN_INTERCEPTOR(int, epoll_ctl, int epfd, int op, int fd, void *ev) { 1604 SCOPED_TSAN_INTERCEPTOR(epoll_ctl, epfd, op, fd, ev); 1605 if (op == EPOLL_CTL_ADD && epfd >= 0) { 1606 FdRelease(thr, pc, epfd); 1607 } 1608 int res = REAL(epoll_ctl)(epfd, op, fd, ev); 1609 if (fd >= 0) 1610 FdAccess(thr, pc, fd); 1611 return res; 1612} 1613 1614TSAN_INTERCEPTOR(int, epoll_wait, int epfd, void *ev, int cnt, int timeout) { 1615 SCOPED_TSAN_INTERCEPTOR(epoll_wait, epfd, ev, cnt, timeout); 1616 int res = BLOCK_REAL(epoll_wait)(epfd, ev, cnt, timeout); 1617 if (res > 0 && epfd >= 0) { 1618 FdAcquire(thr, pc, epfd); 1619 } 1620 return res; 1621} 1622 1623TSAN_INTERCEPTOR(int, poll, void *fds, long_t nfds, int timeout) { 1624 SCOPED_TSAN_INTERCEPTOR(poll, fds, nfds, timeout); 1625 int res = BLOCK_REAL(poll)(fds, nfds, timeout); 1626 return res; 1627} 1628 1629void ALWAYS_INLINE rtl_generic_sighandler(bool sigact, int sig, 1630 my_siginfo_t *info, void *ctx) { 1631 ThreadState *thr = cur_thread(); 1632 SignalContext *sctx = SigCtx(thr); 1633 // Don't mess with synchronous signals. 1634 if (sig == SIGSEGV || sig == SIGBUS || sig == SIGILL || 1635 sig == SIGABRT || sig == SIGFPE || sig == SIGPIPE || 1636 // If we are sending signal to ourselves, we must process it now. 1637 (sctx && sig == sctx->int_signal_send) || 1638 // If we are in blocking function, we can safely process it now 1639 // (but check if we are in a recursive interceptor, 1640 // i.e. pthread_join()->munmap()). 1641 (sctx && sctx->in_blocking_func == 1 && thr->in_rtl == 1)) { 1642 int in_rtl = thr->in_rtl; 1643 thr->in_rtl = 0; 1644 CHECK_EQ(thr->in_signal_handler, false); 1645 thr->in_signal_handler = true; 1646 if (sigact) 1647 sigactions[sig].sa_sigaction(sig, info, ctx); 1648 else 1649 sigactions[sig].sa_handler(sig); 1650 CHECK_EQ(thr->in_signal_handler, true); 1651 thr->in_signal_handler = false; 1652 thr->in_rtl = in_rtl; 1653 return; 1654 } 1655 1656 if (sctx == 0) 1657 return; 1658 SignalDesc *signal = &sctx->pending_signals[sig]; 1659 if (signal->armed == false) { 1660 signal->armed = true; 1661 signal->sigaction = sigact; 1662 if (info) 1663 internal_memcpy(&signal->siginfo, info, sizeof(*info)); 1664 if (ctx) 1665 internal_memcpy(&signal->ctx, ctx, sizeof(signal->ctx)); 1666 sctx->pending_signal_count++; 1667 } 1668} 1669 1670static void rtl_sighandler(int sig) { 1671 rtl_generic_sighandler(false, sig, 0, 0); 1672} 1673 1674static void rtl_sigaction(int sig, my_siginfo_t *info, void *ctx) { 1675 rtl_generic_sighandler(true, sig, info, ctx); 1676} 1677 1678TSAN_INTERCEPTOR(int, sigaction, int sig, sigaction_t *act, sigaction_t *old) { 1679 SCOPED_TSAN_INTERCEPTOR(sigaction, sig, act, old); 1680 if (old) 1681 internal_memcpy(old, &sigactions[sig], sizeof(*old)); 1682 if (act == 0) 1683 return 0; 1684 internal_memcpy(&sigactions[sig], act, sizeof(*act)); 1685 sigaction_t newact; 1686 internal_memcpy(&newact, act, sizeof(newact)); 1687 sigfillset(&newact.sa_mask); 1688 if (act->sa_handler != SIG_IGN && act->sa_handler != SIG_DFL) { 1689 if (newact.sa_flags & SA_SIGINFO) 1690 newact.sa_sigaction = rtl_sigaction; 1691 else 1692 newact.sa_handler = rtl_sighandler; 1693 } 1694 int res = REAL(sigaction)(sig, &newact, 0); 1695 return res; 1696} 1697 1698TSAN_INTERCEPTOR(sighandler_t, signal, int sig, sighandler_t h) { 1699 sigaction_t act; 1700 act.sa_handler = h; 1701 REAL(memset)(&act.sa_mask, -1, sizeof(act.sa_mask)); 1702 act.sa_flags = 0; 1703 sigaction_t old; 1704 int res = sigaction(sig, &act, &old); 1705 if (res) 1706 return SIG_ERR; 1707 return old.sa_handler; 1708} 1709 1710TSAN_INTERCEPTOR(int, raise, int sig) { 1711 SCOPED_TSAN_INTERCEPTOR(raise, sig); 1712 SignalContext *sctx = SigCtx(thr); 1713 CHECK_NE(sctx, 0); 1714 int prev = sctx->int_signal_send; 1715 sctx->int_signal_send = sig; 1716 int res = REAL(raise)(sig); 1717 CHECK_EQ(sctx->int_signal_send, sig); 1718 sctx->int_signal_send = prev; 1719 return res; 1720} 1721 1722TSAN_INTERCEPTOR(int, kill, int pid, int sig) { 1723 SCOPED_TSAN_INTERCEPTOR(kill, pid, sig); 1724 SignalContext *sctx = SigCtx(thr); 1725 CHECK_NE(sctx, 0); 1726 int prev = sctx->int_signal_send; 1727 if (pid == (int)internal_getpid()) { 1728 sctx->int_signal_send = sig; 1729 } 1730 int res = REAL(kill)(pid, sig); 1731 if (pid == (int)internal_getpid()) { 1732 CHECK_EQ(sctx->int_signal_send, sig); 1733 sctx->int_signal_send = prev; 1734 } 1735 return res; 1736} 1737 1738TSAN_INTERCEPTOR(int, pthread_kill, void *tid, int sig) { 1739 SCOPED_TSAN_INTERCEPTOR(pthread_kill, tid, sig); 1740 SignalContext *sctx = SigCtx(thr); 1741 CHECK_NE(sctx, 0); 1742 int prev = sctx->int_signal_send; 1743 if (tid == pthread_self()) { 1744 sctx->int_signal_send = sig; 1745 } 1746 int res = REAL(pthread_kill)(tid, sig); 1747 if (tid == pthread_self()) { 1748 CHECK_EQ(sctx->int_signal_send, sig); 1749 sctx->int_signal_send = prev; 1750 } 1751 return res; 1752} 1753 1754TSAN_INTERCEPTOR(int, gettimeofday, void *tv, void *tz) { 1755 SCOPED_TSAN_INTERCEPTOR(gettimeofday, tv, tz); 1756 // It's intercepted merely to process pending signals. 1757 return REAL(gettimeofday)(tv, tz); 1758} 1759 1760// Linux kernel has a bug that leads to kernel deadlock if a process 1761// maps TBs of memory and then calls mlock(). 1762static void MlockIsUnsupported() { 1763 static atomic_uint8_t printed; 1764 if (atomic_exchange(&printed, 1, memory_order_relaxed)) 1765 return; 1766 if (flags()->verbosity > 0) 1767 Printf("INFO: ThreadSanitizer ignores mlock/mlockall/munlock/munlockall\n"); 1768} 1769 1770TSAN_INTERCEPTOR(int, mlock, const void *addr, uptr len) { 1771 MlockIsUnsupported(); 1772 return 0; 1773} 1774 1775TSAN_INTERCEPTOR(int, munlock, const void *addr, uptr len) { 1776 MlockIsUnsupported(); 1777 return 0; 1778} 1779 1780TSAN_INTERCEPTOR(int, mlockall, int flags) { 1781 MlockIsUnsupported(); 1782 return 0; 1783} 1784 1785TSAN_INTERCEPTOR(int, munlockall, void) { 1786 MlockIsUnsupported(); 1787 return 0; 1788} 1789 1790TSAN_INTERCEPTOR(int, fork, int fake) { 1791 SCOPED_TSAN_INTERCEPTOR(fork, fake); 1792 // It's intercepted merely to process pending signals. 1793 int pid = REAL(fork)(fake); 1794 if (pid == 0) { 1795 // child 1796 FdOnFork(thr, pc); 1797 } else if (pid > 0) { 1798 // parent 1799 } 1800 return pid; 1801} 1802 1803struct TsanInterceptorContext { 1804 ThreadState *thr; 1805 const uptr caller_pc; 1806 const uptr pc; 1807}; 1808 1809#include "sanitizer_common/sanitizer_platform_interceptors.h" 1810// Causes interceptor recursion (getpwuid_r() calls fopen()) 1811#undef SANITIZER_INTERCEPT_GETPWNAM_AND_FRIENDS 1812#undef SANITIZER_INTERCEPT_GETPWNAM_R_AND_FRIENDS 1813// Causes interceptor recursion (getaddrinfo() and fopen()) 1814#undef SANITIZER_INTERCEPT_GETADDRINFO 1815// Causes interceptor recursion (glob64() calls lstat64()) 1816#undef SANITIZER_INTERCEPT_GLOB 1817 1818#define COMMON_INTERCEPTOR_WRITE_RANGE(ctx, ptr, size) \ 1819 MemoryAccessRange(((TsanInterceptorContext *) ctx)->thr, \ 1820 ((TsanInterceptorContext *) ctx)->pc, (uptr) ptr, size, \ 1821 true) 1822#define COMMON_INTERCEPTOR_READ_RANGE(ctx, ptr, size) \ 1823 MemoryAccessRange(((TsanInterceptorContext *) ctx)->thr, \ 1824 ((TsanInterceptorContext *) ctx)->pc, (uptr) ptr, size, \ 1825 false) 1826#define COMMON_INTERCEPTOR_ENTER(ctx, func, ...) \ 1827 SCOPED_TSAN_INTERCEPTOR(func, __VA_ARGS__); \ 1828 TsanInterceptorContext _ctx = {thr, caller_pc, pc}; \ 1829 ctx = (void *)&_ctx; \ 1830 (void) ctx; 1831#define COMMON_INTERCEPTOR_FD_ACQUIRE(ctx, fd) \ 1832 FdAcquire(((TsanInterceptorContext *) ctx)->thr, pc, fd) 1833#define COMMON_INTERCEPTOR_FD_RELEASE(ctx, fd) \ 1834 FdRelease(((TsanInterceptorContext *) ctx)->thr, pc, fd) 1835#define COMMON_INTERCEPTOR_FD_SOCKET_ACCEPT(ctx, fd, newfd) \ 1836 FdSocketAccept(((TsanInterceptorContext *) ctx)->thr, pc, fd, newfd) 1837#define COMMON_INTERCEPTOR_SET_THREAD_NAME(ctx, name) \ 1838 ThreadSetName(((TsanInterceptorContext *) ctx)->thr, name) 1839#include "sanitizer_common/sanitizer_common_interceptors.inc" 1840 1841// FIXME: Implement these with MemoryAccessRange(). 1842#define COMMON_SYSCALL_PRE_READ_RANGE(p, s) 1843#define COMMON_SYSCALL_PRE_WRITE_RANGE(p, s) 1844#define COMMON_SYSCALL_POST_READ_RANGE(p, s) 1845#define COMMON_SYSCALL_POST_WRITE_RANGE(p, s) 1846#include "sanitizer_common/sanitizer_common_syscalls.inc" 1847 1848namespace __tsan { 1849 1850void ProcessPendingSignals(ThreadState *thr) { 1851 CHECK_EQ(thr->in_rtl, 0); 1852 SignalContext *sctx = SigCtx(thr); 1853 if (sctx == 0 || sctx->pending_signal_count == 0 || thr->in_signal_handler) 1854 return; 1855 Context *ctx = CTX(); 1856 thr->in_signal_handler = true; 1857 sctx->pending_signal_count = 0; 1858 // These are too big for stack. 1859 static THREADLOCAL sigset_t emptyset, oldset; 1860 sigfillset(&emptyset); 1861 pthread_sigmask(SIG_SETMASK, &emptyset, &oldset); 1862 for (int sig = 0; sig < kSigCount; sig++) { 1863 SignalDesc *signal = &sctx->pending_signals[sig]; 1864 if (signal->armed) { 1865 signal->armed = false; 1866 if (sigactions[sig].sa_handler != SIG_DFL 1867 && sigactions[sig].sa_handler != SIG_IGN) { 1868 // Insure that the handler does not spoil errno. 1869 const int saved_errno = errno; 1870 errno = 0; 1871 if (signal->sigaction) 1872 sigactions[sig].sa_sigaction(sig, &signal->siginfo, &signal->ctx); 1873 else 1874 sigactions[sig].sa_handler(sig); 1875 if (flags()->report_bugs && errno != 0) { 1876 ScopedInRtl in_rtl; 1877 __tsan::StackTrace stack; 1878 uptr pc = signal->sigaction ? 1879 (uptr)sigactions[sig].sa_sigaction : 1880 (uptr)sigactions[sig].sa_handler; 1881 pc += 1; // return address is expected, OutputReport() will undo this 1882 stack.Init(&pc, 1); 1883 ThreadRegistryLock l(ctx->thread_registry); 1884 ScopedReport rep(ReportTypeErrnoInSignal); 1885 if (!IsFiredSuppression(ctx, rep, stack)) { 1886 rep.AddStack(&stack); 1887 OutputReport(ctx, rep, rep.GetReport()->stacks[0]); 1888 } 1889 } 1890 errno = saved_errno; 1891 } 1892 } 1893 } 1894 pthread_sigmask(SIG_SETMASK, &oldset, 0); 1895 CHECK_EQ(thr->in_signal_handler, true); 1896 thr->in_signal_handler = false; 1897} 1898 1899static void finalize(void *arg) { 1900 ThreadState * thr = cur_thread(); 1901 uptr pc = 0; 1902 atexit_ctx->exit(thr, pc); 1903 int status = Finalize(cur_thread()); 1904 REAL(fflush)(0); 1905 if (status) 1906 _exit(status); 1907} 1908 1909static void unreachable() { 1910 Printf("FATAL: ThreadSanitizer: unreachable called\n"); 1911 Die(); 1912} 1913 1914void InitializeInterceptors() { 1915 CHECK_GT(cur_thread()->in_rtl, 0); 1916 1917 // We need to setup it early, because functions like dlsym() can call it. 1918 REAL(memset) = internal_memset; 1919 REAL(memcpy) = internal_memcpy; 1920 REAL(memcmp) = internal_memcmp; 1921 1922 // Instruct libc malloc to consume less memory. 1923 mallopt(1, 0); // M_MXFAST 1924 mallopt(-3, 32*1024); // M_MMAP_THRESHOLD 1925 1926 SANITIZER_COMMON_INTERCEPTORS_INIT; 1927 1928 TSAN_INTERCEPT(setjmp); 1929 TSAN_INTERCEPT(_setjmp); 1930 TSAN_INTERCEPT(sigsetjmp); 1931 TSAN_INTERCEPT(__sigsetjmp); 1932 TSAN_INTERCEPT(longjmp); 1933 TSAN_INTERCEPT(siglongjmp); 1934 1935 TSAN_INTERCEPT(malloc); 1936 TSAN_INTERCEPT(__libc_memalign); 1937 TSAN_INTERCEPT(calloc); 1938 TSAN_INTERCEPT(realloc); 1939 TSAN_INTERCEPT(free); 1940 TSAN_INTERCEPT(cfree); 1941 TSAN_INTERCEPT(mmap); 1942 TSAN_INTERCEPT(mmap64); 1943 TSAN_INTERCEPT(munmap); 1944 TSAN_INTERCEPT(memalign); 1945 TSAN_INTERCEPT(valloc); 1946 TSAN_INTERCEPT(pvalloc); 1947 TSAN_INTERCEPT(posix_memalign); 1948 1949 TSAN_INTERCEPT(strlen); 1950 TSAN_INTERCEPT(memset); 1951 TSAN_INTERCEPT(memcpy); 1952 TSAN_INTERCEPT(strcmp); 1953 TSAN_INTERCEPT(memchr); 1954 TSAN_INTERCEPT(memrchr); 1955 TSAN_INTERCEPT(memmove); 1956 TSAN_INTERCEPT(memcmp); 1957 TSAN_INTERCEPT(strchr); 1958 TSAN_INTERCEPT(strchrnul); 1959 TSAN_INTERCEPT(strrchr); 1960 TSAN_INTERCEPT(strncmp); 1961 TSAN_INTERCEPT(strcpy); // NOLINT 1962 TSAN_INTERCEPT(strncpy); 1963 TSAN_INTERCEPT(strstr); 1964 1965 TSAN_INTERCEPT(pthread_create); 1966 TSAN_INTERCEPT(pthread_join); 1967 TSAN_INTERCEPT(pthread_detach); 1968 1969 TSAN_INTERCEPT(pthread_mutex_init); 1970 TSAN_INTERCEPT(pthread_mutex_destroy); 1971 TSAN_INTERCEPT(pthread_mutex_lock); 1972 TSAN_INTERCEPT(pthread_mutex_trylock); 1973 TSAN_INTERCEPT(pthread_mutex_timedlock); 1974 TSAN_INTERCEPT(pthread_mutex_unlock); 1975 1976 TSAN_INTERCEPT(pthread_spin_init); 1977 TSAN_INTERCEPT(pthread_spin_destroy); 1978 TSAN_INTERCEPT(pthread_spin_lock); 1979 TSAN_INTERCEPT(pthread_spin_trylock); 1980 TSAN_INTERCEPT(pthread_spin_unlock); 1981 1982 TSAN_INTERCEPT(pthread_rwlock_init); 1983 TSAN_INTERCEPT(pthread_rwlock_destroy); 1984 TSAN_INTERCEPT(pthread_rwlock_rdlock); 1985 TSAN_INTERCEPT(pthread_rwlock_tryrdlock); 1986 TSAN_INTERCEPT(pthread_rwlock_timedrdlock); 1987 TSAN_INTERCEPT(pthread_rwlock_wrlock); 1988 TSAN_INTERCEPT(pthread_rwlock_trywrlock); 1989 TSAN_INTERCEPT(pthread_rwlock_timedwrlock); 1990 TSAN_INTERCEPT(pthread_rwlock_unlock); 1991 1992 // TSAN_INTERCEPT(pthread_cond_init); 1993 TSAN_INTERCEPT(pthread_cond_destroy); 1994 TSAN_INTERCEPT(pthread_cond_signal); 1995 TSAN_INTERCEPT(pthread_cond_broadcast); 1996 TSAN_INTERCEPT(pthread_cond_wait); 1997 TSAN_INTERCEPT(pthread_cond_timedwait); 1998 1999 TSAN_INTERCEPT(pthread_barrier_init); 2000 TSAN_INTERCEPT(pthread_barrier_destroy); 2001 TSAN_INTERCEPT(pthread_barrier_wait); 2002 2003 TSAN_INTERCEPT(pthread_once); 2004 2005 TSAN_INTERCEPT(sem_init); 2006 TSAN_INTERCEPT(sem_destroy); 2007 TSAN_INTERCEPT(sem_wait); 2008 TSAN_INTERCEPT(sem_trywait); 2009 TSAN_INTERCEPT(sem_timedwait); 2010 TSAN_INTERCEPT(sem_post); 2011 TSAN_INTERCEPT(sem_getvalue); 2012 2013 TSAN_INTERCEPT(stat); 2014 TSAN_INTERCEPT(__xstat); 2015 TSAN_INTERCEPT(stat64); 2016 TSAN_INTERCEPT(__xstat64); 2017 TSAN_INTERCEPT(lstat); 2018 TSAN_INTERCEPT(__lxstat); 2019 TSAN_INTERCEPT(lstat64); 2020 TSAN_INTERCEPT(__lxstat64); 2021 TSAN_INTERCEPT(fstat); 2022 TSAN_INTERCEPT(__fxstat); 2023 TSAN_INTERCEPT(fstat64); 2024 TSAN_INTERCEPT(__fxstat64); 2025 TSAN_INTERCEPT(open); 2026 TSAN_INTERCEPT(open64); 2027 TSAN_INTERCEPT(creat); 2028 TSAN_INTERCEPT(creat64); 2029 TSAN_INTERCEPT(dup); 2030 TSAN_INTERCEPT(dup2); 2031 TSAN_INTERCEPT(dup3); 2032 TSAN_INTERCEPT(eventfd); 2033 TSAN_INTERCEPT(signalfd); 2034 TSAN_INTERCEPT(inotify_init); 2035 TSAN_INTERCEPT(inotify_init1); 2036 TSAN_INTERCEPT(socket); 2037 TSAN_INTERCEPT(socketpair); 2038 TSAN_INTERCEPT(connect); 2039 TSAN_INTERCEPT(bind); 2040 TSAN_INTERCEPT(listen); 2041 TSAN_INTERCEPT(epoll_create); 2042 TSAN_INTERCEPT(epoll_create1); 2043 TSAN_INTERCEPT(close); 2044 TSAN_INTERCEPT(__close); 2045 TSAN_INTERCEPT(__res_iclose); 2046 TSAN_INTERCEPT(pipe); 2047 TSAN_INTERCEPT(pipe2); 2048 2049 TSAN_INTERCEPT(send); 2050 TSAN_INTERCEPT(sendmsg); 2051 TSAN_INTERCEPT(recv); 2052 2053 TSAN_INTERCEPT(unlink); 2054 TSAN_INTERCEPT(fopen); 2055 TSAN_INTERCEPT(freopen); 2056 TSAN_INTERCEPT(fclose); 2057 TSAN_INTERCEPT(fread); 2058 TSAN_INTERCEPT(fwrite); 2059 TSAN_INTERCEPT(fflush); 2060 TSAN_INTERCEPT(abort); 2061 TSAN_INTERCEPT(puts); 2062 TSAN_INTERCEPT(rmdir); 2063 TSAN_INTERCEPT(opendir); 2064 2065 TSAN_INTERCEPT(epoll_ctl); 2066 TSAN_INTERCEPT(epoll_wait); 2067 TSAN_INTERCEPT(poll); 2068 2069 TSAN_INTERCEPT(sigaction); 2070 TSAN_INTERCEPT(signal); 2071 TSAN_INTERCEPT(raise); 2072 TSAN_INTERCEPT(kill); 2073 TSAN_INTERCEPT(pthread_kill); 2074 TSAN_INTERCEPT(sleep); 2075 TSAN_INTERCEPT(usleep); 2076 TSAN_INTERCEPT(nanosleep); 2077 TSAN_INTERCEPT(gettimeofday); 2078 2079 TSAN_INTERCEPT(mlock); 2080 TSAN_INTERCEPT(munlock); 2081 TSAN_INTERCEPT(mlockall); 2082 TSAN_INTERCEPT(munlockall); 2083 2084 TSAN_INTERCEPT(fork); 2085 TSAN_INTERCEPT(on_exit); 2086 TSAN_INTERCEPT(__cxa_atexit); 2087 2088 // Need to setup it, because interceptors check that the function is resolved. 2089 // But atexit is emitted directly into the module, so can't be resolved. 2090 REAL(atexit) = (int(*)(void(*)()))unreachable; 2091 atexit_ctx = new(internal_alloc(MBlockAtExit, sizeof(AtExitContext))) 2092 AtExitContext(); 2093 2094 if (REAL(__cxa_atexit)(&finalize, 0, 0)) { 2095 Printf("ThreadSanitizer: failed to setup atexit callback\n"); 2096 Die(); 2097 } 2098 2099 if (pthread_key_create(&g_thread_finalize_key, &thread_finalize)) { 2100 Printf("ThreadSanitizer: failed to create thread key\n"); 2101 Die(); 2102 } 2103 2104 FdInit(); 2105} 2106 2107void internal_start_thread(void(*func)(void *arg), void *arg) { 2108 void *th; 2109 REAL(pthread_create)(&th, 0, (void*(*)(void *arg))func, arg); 2110 REAL(pthread_detach)(th); 2111} 2112 2113} // namespace __tsan 2114