tsan_interceptors.cc revision e236dbb5e558b174609d2d13e80685d488c129d8
1d2592a34a059e7cbb2b11dc53649ac4912422909Argyrios Kyrtzidis//===-- tsan_interceptors.cc ----------------------------------------------===// 21eb4433ac451dc16f4133a88af2d002ac26c58efMike Stump// 3f24af5bc2e01ca8e7396ed997378a77fddfa521eTed Kremenek// The LLVM Compiler Infrastructure 4f24af5bc2e01ca8e7396ed997378a77fddfa521eTed Kremenek// 5f24af5bc2e01ca8e7396ed997378a77fddfa521eTed Kremenek// This file is distributed under the University of Illinois Open Source 6f24af5bc2e01ca8e7396ed997378a77fddfa521eTed Kremenek// License. See LICENSE.TXT for details. 7f24af5bc2e01ca8e7396ed997378a77fddfa521eTed Kremenek// 8f24af5bc2e01ca8e7396ed997378a77fddfa521eTed Kremenek//===----------------------------------------------------------------------===// 9f24af5bc2e01ca8e7396ed997378a77fddfa521eTed Kremenek// 10f24af5bc2e01ca8e7396ed997378a77fddfa521eTed Kremenek// This file is a part of ThreadSanitizer (TSan), a race detector. 118e49dd6e7e73b275a74338a5127a524f0765303cTed Kremenek// 12f24af5bc2e01ca8e7396ed997378a77fddfa521eTed Kremenek// FIXME: move as many interceptors as possible into 13f24af5bc2e01ca8e7396ed997378a77fddfa521eTed Kremenek// sanitizer_common/sanitizer_common_interceptors.inc 14f24af5bc2e01ca8e7396ed997378a77fddfa521eTed Kremenek//===----------------------------------------------------------------------===// 15d2592a34a059e7cbb2b11dc53649ac4912422909Argyrios Kyrtzidis 16d2592a34a059e7cbb2b11dc53649ac4912422909Argyrios Kyrtzidis#include "sanitizer_common/sanitizer_atomic.h" 17f24af5bc2e01ca8e7396ed997378a77fddfa521eTed Kremenek#include "sanitizer_common/sanitizer_libc.h" 1899c6ad3f22b865d0f4cce52bc36904403c9ed4c4Ted Kremenek#include "sanitizer_common/sanitizer_linux.h" 195eca482fe895ea57bc82410222e6426c09e63284Ted Kremenek#include "sanitizer_common/sanitizer_platform_limits_posix.h" 2030a2e16f6c27f888dd11eba6bbbae1e980078fcbChandler Carruth#include "sanitizer_common/sanitizer_placement_new.h" 219b663716449b618ba0390b1dbebc54fa8e971124Ted Kremenek#include "sanitizer_common/sanitizer_stacktrace.h" 22e62f048960645b79363408fdead53fec2a063c52Anna Zaks#include "interception/interception.h" 239b663716449b618ba0390b1dbebc54fa8e971124Ted Kremenek#include "tsan_interface.h" 24651f13cea278ec967336033dd032faef0e9fc2ecStephen Hines#include "tsan_platform.h" 25f24af5bc2e01ca8e7396ed997378a77fddfa521eTed Kremenek#include "tsan_suppressions.h" 26f24af5bc2e01ca8e7396ed997378a77fddfa521eTed Kremenek#include "tsan_rtl.h" 270111f575b968e423dccae439e501225b8314b257Zhongxing Xu#include "tsan_mman.h" 28ca804539d908d3a0e8c72a0df5f1f571d29490bbTed Kremenek#include "tsan_fd.h" 29ca804539d908d3a0e8c72a0df5f1f571d29490bbTed Kremenek 309ef6537a894c33003359b1f9b9676e9178e028b7Ted Kremenekusing namespace __tsan; // NOLINT 315a4f98ff943e6a501b0fe47ade007c9bbf96cb88Argyrios Kyrtzidis 32a19f4af7a94835ce4693bfe12d6270754e79eb56Anna Zaksconst int kSigCount = 64; 33a19f4af7a94835ce4693bfe12d6270754e79eb56Anna Zaks 3424f1a967741ff9f8025ee23be12ba6feacc31f77Ted Kremenekstruct my_siginfo_t { 35d2592a34a059e7cbb2b11dc53649ac4912422909Argyrios Kyrtzidis // The size is determined by looking at sizeof of real siginfo_t on linux. 36922059dec59c7bed235da01aff75ae522a369811Ted Kremenek u64 opaque[128 / sizeof(u64)]; 37922059dec59c7bed235da01aff75ae522a369811Ted Kremenek}; 38d2592a34a059e7cbb2b11dc53649ac4912422909Argyrios Kyrtzidis 39922059dec59c7bed235da01aff75ae522a369811Ted Kremenekstruct ucontext_t { 40922059dec59c7bed235da01aff75ae522a369811Ted Kremenek // The size is determined by looking at sizeof of real ucontext_t on linux. 41922059dec59c7bed235da01aff75ae522a369811Ted Kremenek u64 opaque[936 / sizeof(u64) + 1]; 42922059dec59c7bed235da01aff75ae522a369811Ted Kremenek}; 43d2592a34a059e7cbb2b11dc53649ac4912422909Argyrios Kyrtzidis 44ebae6d0209e1ec3d5ea14f9e63bd0d740218ed14Anna Zaksextern "C" int pthread_attr_init(void *attr); 45f05aac8472d8ed081a361a218fd14d59ddc91b85Anna Zaksextern "C" int pthread_attr_destroy(void *attr); 46253955ca25c7e7049963b5db613c0cd15d66e4f8Anna ZaksDECLARE_REAL(int, pthread_attr_getdetachstate, void *, void *) 47ebae6d0209e1ec3d5ea14f9e63bd0d740218ed14Anna Zaksextern "C" int pthread_attr_setstacksize(void *attr, uptr stacksize); 48d2592a34a059e7cbb2b11dc53649ac4912422909Argyrios Kyrtzidisextern "C" int pthread_key_create(unsigned *key, void (*destructor)(void* v)); 49d2592a34a059e7cbb2b11dc53649ac4912422909Argyrios Kyrtzidisextern "C" int pthread_setspecific(unsigned key, const void *v); 50e36de1fe51c39d9161915dd3dbef880954af6476Ted Kremenekextern "C" int pthread_mutexattr_gettype(void *a, int *type); 51a7a8a450d908b34fa5f569f2e694ebd4b61aae2fTom Careextern "C" int pthread_yield(); 52a7a8a450d908b34fa5f569f2e694ebd4b61aae2fTom Careextern "C" int pthread_sigmask(int how, const __sanitizer_sigset_t *set, 5366750fa464ace9f8c41666c8585ec71a248c1ccaTed Kremenek __sanitizer_sigset_t *oldset); 54422ab7a49a9a4252dbc6350e49d7a5708337b9c7Ted Kremenek// REAL(sigfillset) defined in common interceptors. 55422ab7a49a9a4252dbc6350e49d7a5708337b9c7Ted KremenekDECLARE_REAL(int, sigfillset, __sanitizer_sigset_t *set) 56422ab7a49a9a4252dbc6350e49d7a5708337b9c7Ted Kremenekextern "C" void *pthread_self(); 57422ab7a49a9a4252dbc6350e49d7a5708337b9c7Ted Kremenekextern "C" void _exit(int status); 58a7a8a450d908b34fa5f569f2e694ebd4b61aae2fTom Careextern "C" int *__errno_location(); 59a7a8a450d908b34fa5f569f2e694ebd4b61aae2fTom Careextern "C" int fileno_unlocked(void *stream); 60d2592a34a059e7cbb2b11dc53649ac4912422909Argyrios Kyrtzidisextern "C" void *__libc_malloc(uptr size); 610111f575b968e423dccae439e501225b8314b257Zhongxing Xuextern "C" void *__libc_calloc(uptr size, uptr n); 62f24af5bc2e01ca8e7396ed997378a77fddfa521eTed Kremenekextern "C" void *__libc_realloc(void *ptr, uptr size); 63651f13cea278ec967336033dd032faef0e9fc2ecStephen Hinesextern "C" void __libc_free(void *ptr); 641eb4433ac451dc16f4133a88af2d002ac26c58efMike Stumpextern "C" int mallopt(int param, int value); 65f24af5bc2e01ca8e7396ed997378a77fddfa521eTed Kremenekconst int PTHREAD_MUTEX_RECURSIVE = 1; 66f24af5bc2e01ca8e7396ed997378a77fddfa521eTed Kremenekconst int PTHREAD_MUTEX_RECURSIVE_NP = 1; 67f24af5bc2e01ca8e7396ed997378a77fddfa521eTed Kremenekconst int EINVAL = 22; 68651f13cea278ec967336033dd032faef0e9fc2ecStephen Hinesconst int EBUSY = 16; 691eb4433ac451dc16f4133a88af2d002ac26c58efMike Stumpconst int EPOLL_CTL_ADD = 1; 70d2592a34a059e7cbb2b11dc53649ac4912422909Argyrios Kyrtzidisconst int SIGILL = 4; 718e49dd6e7e73b275a74338a5127a524f0765303cTed Kremenekconst int SIGABRT = 6; 728e49dd6e7e73b275a74338a5127a524f0765303cTed Kremenekconst int SIGFPE = 8; 73d2592a34a059e7cbb2b11dc53649ac4912422909Argyrios Kyrtzidisconst int SIGSEGV = 11; 74f598087b4adfea164acdd5b53ea2951bde740a2dTed Kremenekconst int SIGPIPE = 13; 75f598087b4adfea164acdd5b53ea2951bde740a2dTed Kremenekconst int SIGBUS = 7; 76f598087b4adfea164acdd5b53ea2951bde740a2dTed Kremenekconst int SIGSYS = 31; 7766750fa464ace9f8c41666c8585ec71a248c1ccaTed Kremenekvoid *const MAP_FAILED = (void*)-1; 78422ab7a49a9a4252dbc6350e49d7a5708337b9c7Ted Kremenekconst int PTHREAD_BARRIER_SERIAL_THREAD = -1; 79422ab7a49a9a4252dbc6350e49d7a5708337b9c7Ted Kremenekconst int MAP_FIXED = 0x10; 80422ab7a49a9a4252dbc6350e49d7a5708337b9c7Ted Kremenektypedef long long_t; // NOLINT 81422ab7a49a9a4252dbc6350e49d7a5708337b9c7Ted Kremenek 821eb4433ac451dc16f4133a88af2d002ac26c58efMike Stump// From /usr/include/unistd.h 83e62f048960645b79363408fdead53fec2a063c52Anna Zaks# define F_ULOCK 0 /* Unlock a previously locked region. */ 84e62f048960645b79363408fdead53fec2a063c52Anna Zaks# define F_LOCK 1 /* Lock a region for exclusive use. */ 85e62f048960645b79363408fdead53fec2a063c52Anna Zaks# define F_TLOCK 2 /* Test and lock a region for exclusive use. */ 86e62f048960645b79363408fdead53fec2a063c52Anna Zaks# define F_TEST 3 /* Test a region for other processes locks. */ 8718c66fdc3c4008d335885695fe36fb5353c5f672Ted Kremenek 888bef8238181a30e52dea380789a7e2d760eac532Ted Kremenektypedef void (*sighandler_t)(int sig); 899c378f705405d37f49795d5e915989de774fe11fTed Kremenek 901eb4433ac451dc16f4133a88af2d002ac26c58efMike Stump#define errno (*__errno_location()) 919c378f705405d37f49795d5e915989de774fe11fTed Kremenek 929c378f705405d37f49795d5e915989de774fe11fTed Kremenekstruct sigaction_t { 939c378f705405d37f49795d5e915989de774fe11fTed Kremenek union { 949c378f705405d37f49795d5e915989de774fe11fTed Kremenek sighandler_t sa_handler; 951eb4433ac451dc16f4133a88af2d002ac26c58efMike Stump void (*sa_sigaction)(int sig, my_siginfo_t *siginfo, void *uctx); 969c378f705405d37f49795d5e915989de774fe11fTed Kremenek }; 979c378f705405d37f49795d5e915989de774fe11fTed Kremenek __sanitizer_sigset_t sa_mask; 980111f575b968e423dccae439e501225b8314b257Zhongxing Xu int sa_flags; 990f5c5c60e9806d13f0907cd99d7204ffab0e08f7Ted Kremenek void (*sa_restorer)(); 1000f5c5c60e9806d13f0907cd99d7204ffab0e08f7Ted Kremenek}; 1010f5c5c60e9806d13f0907cd99d7204ffab0e08f7Ted Kremenek 1020f5c5c60e9806d13f0907cd99d7204ffab0e08f7Ted Kremenekconst sighandler_t SIG_DFL = (sighandler_t)0; 103f24af5bc2e01ca8e7396ed997378a77fddfa521eTed Kremenekconst sighandler_t SIG_IGN = (sighandler_t)1; 104f56faa01936b9cf909623d7f06e3c2569ca4a78eDmitri Gribenkoconst sighandler_t SIG_ERR = (sighandler_t)-1; 105f56faa01936b9cf909623d7f06e3c2569ca4a78eDmitri Gribenkoconst int SA_SIGINFO = 4; 1061eb4433ac451dc16f4133a88af2d002ac26c58efMike Stumpconst int SIG_SETMASK = 2; 1070b3ade86a1c60cf0c7b56aa238aff458eb7f5974Anna Zaks 1084d2ae4a70336dc2aa11389b34946be152bb454c9Anna Zaksnamespace std { 109f24af5bc2e01ca8e7396ed997378a77fddfa521eTed Kremenekstruct nothrow_t {}; 1108d0f528afd9fcb9ebb8ccb4b8a529a05375b628eJordan Rose} // namespace std 111fbcb3f11fc90e9f00e6074e9b118b8dc11ca604cAnna Zaks 112e62f048960645b79363408fdead53fec2a063c52Anna Zaksstatic sigaction_t sigactions[kSigCount]; 113d2592a34a059e7cbb2b11dc53649ac4912422909Argyrios Kyrtzidis 1148d0f528afd9fcb9ebb8ccb4b8a529a05375b628eJordan Rosenamespace __tsan { 1153fd5f370a28552976c52e76c3035d79012d78ddaAnna Zaksstruct SignalDesc { 116e62f048960645b79363408fdead53fec2a063c52Anna Zaks bool armed; 1170111f575b968e423dccae439e501225b8314b257Zhongxing Xu bool sigaction; 1180111f575b968e423dccae439e501225b8314b257Zhongxing Xu my_siginfo_t siginfo; 119031ccc0555a82afc2e8afe29e19dd57ff204e2deZhongxing Xu ucontext_t ctx; 1201eb4433ac451dc16f4133a88af2d002ac26c58efMike Stump}; 1210111f575b968e423dccae439e501225b8314b257Zhongxing Xu 122fc8f0e14ad142ed811e90fbd9a30e419e301c717Chris Lattnerstruct SignalContext { 123651f13cea278ec967336033dd032faef0e9fc2ecStephen Hines int in_blocking_func; 1240111f575b968e423dccae439e501225b8314b257Zhongxing Xu int int_signal_send; 125f24af5bc2e01ca8e7396ed997378a77fddfa521eTed Kremenek int pending_signal_count; 126f24af5bc2e01ca8e7396ed997378a77fddfa521eTed Kremenek SignalDesc pending_signals[kSigCount]; 1272ce43c8f43254a9edea53a20dc0e69195bc82ae0Zhongxing Xu}; 1288bef8238181a30e52dea380789a7e2d760eac532Ted Kremenek 129253955ca25c7e7049963b5db613c0cd15d66e4f8Anna Zaks// The object is 64-byte aligned, because we want hot data to be located in 130253955ca25c7e7049963b5db613c0cd15d66e4f8Anna Zaks// a single cache line if possible (it's accessed in every interceptor). 13118c66fdc3c4008d335885695fe36fb5353c5f672Ted Kremenekstatic ALIGNED(64) char libignore_placeholder[sizeof(LibIgnore)]; 1328bef8238181a30e52dea380789a7e2d760eac532Ted Kremenekstatic LibIgnore *libignore() { 1332ce43c8f43254a9edea53a20dc0e69195bc82ae0Zhongxing Xu return reinterpret_cast<LibIgnore*>(&libignore_placeholder[0]); 134bc42c533e7d3d946704a49e242939dd232f33072Tom Care} 1355903a373db3d27794c90b25687e0dd6adb0e497dAnna Zaks 1365903a373db3d27794c90b25687e0dd6adb0e497dAnna Zaksvoid InitializeLibIgnore() { 1375903a373db3d27794c90b25687e0dd6adb0e497dAnna Zaks libignore()->Init(*GetSuppressionContext()); 1385903a373db3d27794c90b25687e0dd6adb0e497dAnna Zaks libignore()->OnLibraryLoaded(0); 1395903a373db3d27794c90b25687e0dd6adb0e497dAnna Zaks} 140bc42c533e7d3d946704a49e242939dd232f33072Tom Care 141422ab7a49a9a4252dbc6350e49d7a5708337b9c7Ted Kremenek} // namespace __tsan 142422ab7a49a9a4252dbc6350e49d7a5708337b9c7Ted Kremenek 143422ab7a49a9a4252dbc6350e49d7a5708337b9c7Ted Kremenekstatic SignalContext *SigCtx(ThreadState *thr) { 144422ab7a49a9a4252dbc6350e49d7a5708337b9c7Ted Kremenek SignalContext *ctx = (SignalContext*)thr->signal_ctx; 145422ab7a49a9a4252dbc6350e49d7a5708337b9c7Ted Kremenek if (ctx == 0 && thr->is_alive) { 146422ab7a49a9a4252dbc6350e49d7a5708337b9c7Ted Kremenek ScopedInRtl in_rtl; 147422ab7a49a9a4252dbc6350e49d7a5708337b9c7Ted Kremenek ctx = (SignalContext*)MmapOrDie(sizeof(*ctx), "SignalContext"); 148422ab7a49a9a4252dbc6350e49d7a5708337b9c7Ted Kremenek MemoryResetRange(thr, (uptr)&SigCtx, (uptr)ctx, sizeof(*ctx)); 149422ab7a49a9a4252dbc6350e49d7a5708337b9c7Ted Kremenek thr->signal_ctx = ctx; 150422ab7a49a9a4252dbc6350e49d7a5708337b9c7Ted Kremenek } 151422ab7a49a9a4252dbc6350e49d7a5708337b9c7Ted Kremenek return ctx; 152422ab7a49a9a4252dbc6350e49d7a5708337b9c7Ted Kremenek} 1538d0f528afd9fcb9ebb8ccb4b8a529a05375b628eJordan Rose 154f598087b4adfea164acdd5b53ea2951bde740a2dTed Kremenekstatic unsigned g_thread_finalize_key; 155422ab7a49a9a4252dbc6350e49d7a5708337b9c7Ted Kremenek 15666750fa464ace9f8c41666c8585ec71a248c1ccaTed Kremenekclass ScopedInterceptor { 157f598087b4adfea164acdd5b53ea2951bde740a2dTed Kremenek public: 158422ab7a49a9a4252dbc6350e49d7a5708337b9c7Ted Kremenek ScopedInterceptor(ThreadState *thr, const char *fname, uptr pc); 15966750fa464ace9f8c41666c8585ec71a248c1ccaTed Kremenek ~ScopedInterceptor(); 160f598087b4adfea164acdd5b53ea2951bde740a2dTed Kremenek private: 161422ab7a49a9a4252dbc6350e49d7a5708337b9c7Ted Kremenek ThreadState *const thr_; 162422ab7a49a9a4252dbc6350e49d7a5708337b9c7Ted Kremenek const int in_rtl_; 163422ab7a49a9a4252dbc6350e49d7a5708337b9c7Ted Kremenek bool in_ignored_lib_; 164422ab7a49a9a4252dbc6350e49d7a5708337b9c7Ted Kremenek}; 165422ab7a49a9a4252dbc6350e49d7a5708337b9c7Ted Kremenek 166422ab7a49a9a4252dbc6350e49d7a5708337b9c7Ted KremenekScopedInterceptor::ScopedInterceptor(ThreadState *thr, const char *fname, 167a19f4af7a94835ce4693bfe12d6270754e79eb56Anna Zaks uptr pc) 168dd7ddf2b2296f95e7591ca3f9791f0eb9a15ee42Anna Zaks : thr_(thr) 1694d2ae4a70336dc2aa11389b34946be152bb454c9Anna Zaks , in_rtl_(thr->in_rtl) 170dd7ddf2b2296f95e7591ca3f9791f0eb9a15ee42Anna Zaks , in_ignored_lib_(false) { 171dd7ddf2b2296f95e7591ca3f9791f0eb9a15ee42Anna Zaks if (thr_->in_rtl == 0) { 172dd7ddf2b2296f95e7591ca3f9791f0eb9a15ee42Anna Zaks Initialize(thr); 173dd7ddf2b2296f95e7591ca3f9791f0eb9a15ee42Anna Zaks FuncEntry(thr, pc); 1744d2ae4a70336dc2aa11389b34946be152bb454c9Anna Zaks thr_->in_rtl++; 1754d2ae4a70336dc2aa11389b34946be152bb454c9Anna Zaks DPrintf("#%d: intercept %s()\n", thr_->tid, fname); 1764d2ae4a70336dc2aa11389b34946be152bb454c9Anna Zaks } else { 1774d2ae4a70336dc2aa11389b34946be152bb454c9Anna Zaks thr_->in_rtl++; 1785903a373db3d27794c90b25687e0dd6adb0e497dAnna Zaks } 1795903a373db3d27794c90b25687e0dd6adb0e497dAnna Zaks if (!thr_->in_ignored_lib && libignore()->IsIgnored(pc)) { 1805903a373db3d27794c90b25687e0dd6adb0e497dAnna Zaks in_ignored_lib_ = true; 181a19f4af7a94835ce4693bfe12d6270754e79eb56Anna Zaks thr_->in_ignored_lib = true; 182a19f4af7a94835ce4693bfe12d6270754e79eb56Anna Zaks ThreadIgnoreBegin(thr_); 183c03a39e16762627b421247b12a2658be630a3300Anna Zaks } 184a19f4af7a94835ce4693bfe12d6270754e79eb56Anna Zaks} 1855a878b2cabb940bf3c1ac420a52cac305765e3e2Anna Zaks 186a19f4af7a94835ce4693bfe12d6270754e79eb56Anna ZaksScopedInterceptor::~ScopedInterceptor() { 187b355be838a22a511d078504b2277f70aea52ca85Anna Zaks if (in_ignored_lib_) { 1885a878b2cabb940bf3c1ac420a52cac305765e3e2Anna Zaks thr_->in_ignored_lib = false; 189b355be838a22a511d078504b2277f70aea52ca85Anna Zaks ThreadIgnoreEnd(thr_); 190c03a39e16762627b421247b12a2658be630a3300Anna Zaks } 191ebae6d0209e1ec3d5ea14f9e63bd0d740218ed14Anna Zaks thr_->in_rtl--; 192ebae6d0209e1ec3d5ea14f9e63bd0d740218ed14Anna Zaks if (thr_->in_rtl == 0) { 193ebae6d0209e1ec3d5ea14f9e63bd0d740218ed14Anna Zaks FuncExit(thr_); 194ebae6d0209e1ec3d5ea14f9e63bd0d740218ed14Anna Zaks ProcessPendingSignals(thr_); 195ebae6d0209e1ec3d5ea14f9e63bd0d740218ed14Anna Zaks } 19666c486f275531df6362b3511fc3af6563561801bTed Kremenek CHECK_EQ(in_rtl_, thr_->in_rtl); 197ebae6d0209e1ec3d5ea14f9e63bd0d740218ed14Anna Zaks} 198b355be838a22a511d078504b2277f70aea52ca85Anna Zaks 199ebae6d0209e1ec3d5ea14f9e63bd0d740218ed14Anna Zaks#define SCOPED_INTERCEPTOR_RAW(func, ...) \ 200ebae6d0209e1ec3d5ea14f9e63bd0d740218ed14Anna Zaks ThreadState *thr = cur_thread(); \ 201f24af5bc2e01ca8e7396ed997378a77fddfa521eTed Kremenek StatInc(thr, StatInterceptor); \ 2021eb4433ac451dc16f4133a88af2d002ac26c58efMike Stump StatInc(thr, StatInt_##func); \ 203aa0aeb1cbe117db68d35700cb3a34aace0f99b99Anna Zaks const uptr caller_pc = GET_CALLER_PC(); \ 204aa0aeb1cbe117db68d35700cb3a34aace0f99b99Anna Zaks ScopedInterceptor si(thr, #func, caller_pc); \ 205aa0aeb1cbe117db68d35700cb3a34aace0f99b99Anna Zaks const uptr pc = __sanitizer::StackTrace::GetCurrentPc(); \ 206aa0aeb1cbe117db68d35700cb3a34aace0f99b99Anna Zaks (void)pc; \ 207aa0aeb1cbe117db68d35700cb3a34aace0f99b99Anna Zaks/**/ 208aa0aeb1cbe117db68d35700cb3a34aace0f99b99Anna Zaks 209aa0aeb1cbe117db68d35700cb3a34aace0f99b99Anna Zaks#define SCOPED_TSAN_INTERCEPTOR(func, ...) \ 210aa0aeb1cbe117db68d35700cb3a34aace0f99b99Anna Zaks SCOPED_INTERCEPTOR_RAW(func, __VA_ARGS__); \ 211aa0aeb1cbe117db68d35700cb3a34aace0f99b99Anna Zaks if (REAL(func) == 0) { \ 212f05aac8472d8ed081a361a218fd14d59ddc91b85Anna Zaks Printf("FATAL: ThreadSanitizer: failed to intercept %s\n", #func); \ 21399ba9e3bd70671f3441fb974895f226a83ce0e66David Blaikie Die(); \ 214a19f4af7a94835ce4693bfe12d6270754e79eb56Anna Zaks } \ 215cd656cab3fa3dd4b0c974c6ae1c0e60880b18c22Anna Zaks if (thr->in_rtl > 1 || thr->in_ignored_lib) \ 216319a9184d5ca9f77622b45ae15c08f6b9ce01621Anna Zaks return REAL(func)(__VA_ARGS__); \ 2173152b3cb5b6a2f797d0972c81a5eb3fd69c0d620Anna Zaks/**/ 2183152b3cb5b6a2f797d0972c81a5eb3fd69c0d620Anna Zaks 219f05aac8472d8ed081a361a218fd14d59ddc91b85Anna Zaks#define TSAN_INTERCEPTOR(ret, func, ...) INTERCEPTOR(ret, func, __VA_ARGS__) 2204e82d3cf6fd4c907265e3fa3aac0a835c35dc759Anna Zaks#define TSAN_INTERCEPT(func) INTERCEPT_FUNCTION(func) 221f05aac8472d8ed081a361a218fd14d59ddc91b85Anna Zaks 222f05aac8472d8ed081a361a218fd14d59ddc91b85Anna Zaks#define BLOCK_REAL(name) (BlockingCall(thr), REAL(name)) 2231aae01a8308d2f8e31adab3f4d7ac35543aac680Anna Zaks 22471fdf469a3b6d7d557b0bfba36e8659f4966c565Anna Zaksstruct BlockingCall { 2253152b3cb5b6a2f797d0972c81a5eb3fd69c0d620Anna Zaks explicit BlockingCall(ThreadState *thr) 2263152b3cb5b6a2f797d0972c81a5eb3fd69c0d620Anna Zaks : ctx(SigCtx(thr)) { 227a19f4af7a94835ce4693bfe12d6270754e79eb56Anna Zaks ctx->in_blocking_func++; 228a19f4af7a94835ce4693bfe12d6270754e79eb56Anna Zaks } 229a19f4af7a94835ce4693bfe12d6270754e79eb56Anna Zaks 230a19f4af7a94835ce4693bfe12d6270754e79eb56Anna Zaks ~BlockingCall() { 231f05aac8472d8ed081a361a218fd14d59ddc91b85Anna Zaks ctx->in_blocking_func--; 232aa0aeb1cbe117db68d35700cb3a34aace0f99b99Anna Zaks } 2338ff5c41f2bde7ebbe568b4c15e59f14b8befae66Anna Zaks 2348ff5c41f2bde7ebbe568b4c15e59f14b8befae66Anna Zaks SignalContext *ctx; 2358ff5c41f2bde7ebbe568b4c15e59f14b8befae66Anna Zaks}; 2368ff5c41f2bde7ebbe568b4c15e59f14b8befae66Anna Zaks 2378ff5c41f2bde7ebbe568b4c15e59f14b8befae66Anna ZaksTSAN_INTERCEPTOR(unsigned, sleep, unsigned sec) { 2388ff5c41f2bde7ebbe568b4c15e59f14b8befae66Anna Zaks SCOPED_TSAN_INTERCEPTOR(sleep, sec); 2398ff5c41f2bde7ebbe568b4c15e59f14b8befae66Anna Zaks unsigned res = BLOCK_REAL(sleep)(sec); 2403152b3cb5b6a2f797d0972c81a5eb3fd69c0d620Anna Zaks AfterSleep(thr, pc); 2413152b3cb5b6a2f797d0972c81a5eb3fd69c0d620Anna Zaks return res; 242f05aac8472d8ed081a361a218fd14d59ddc91b85Anna Zaks} 243f05aac8472d8ed081a361a218fd14d59ddc91b85Anna Zaks 2448bef8238181a30e52dea380789a7e2d760eac532Ted KremenekTSAN_INTERCEPTOR(int, usleep, long_t usec) { 245f05aac8472d8ed081a361a218fd14d59ddc91b85Anna Zaks SCOPED_TSAN_INTERCEPTOR(usleep, usec); 246f05aac8472d8ed081a361a218fd14d59ddc91b85Anna Zaks int res = BLOCK_REAL(usleep)(usec); 247f05aac8472d8ed081a361a218fd14d59ddc91b85Anna Zaks AfterSleep(thr, pc); 248f05aac8472d8ed081a361a218fd14d59ddc91b85Anna Zaks return res; 2491aae01a8308d2f8e31adab3f4d7ac35543aac680Anna Zaks} 2501aae01a8308d2f8e31adab3f4d7ac35543aac680Anna Zaks 2511aae01a8308d2f8e31adab3f4d7ac35543aac680Anna ZaksTSAN_INTERCEPTOR(int, nanosleep, void *req, void *rem) { 2528ff5c41f2bde7ebbe568b4c15e59f14b8befae66Anna Zaks SCOPED_TSAN_INTERCEPTOR(nanosleep, req, rem); 253ad62deeb70e97da6bd514dd390ea1ce6af6ad81dAnna Zaks int res = BLOCK_REAL(nanosleep)(req, rem); 254a19f4af7a94835ce4693bfe12d6270754e79eb56Anna Zaks AfterSleep(thr, pc); 2551aae01a8308d2f8e31adab3f4d7ac35543aac680Anna Zaks return res; 2561aae01a8308d2f8e31adab3f4d7ac35543aac680Anna Zaks} 2571aae01a8308d2f8e31adab3f4d7ac35543aac680Anna Zaks 2581aae01a8308d2f8e31adab3f4d7ac35543aac680Anna ZaksTSAN_INTERCEPTOR(void*, dlopen, const char *filename, int flag) { 259aa0aeb1cbe117db68d35700cb3a34aace0f99b99Anna Zaks SCOPED_INTERCEPTOR_RAW(dlopen, filename, flag); 260cd656cab3fa3dd4b0c974c6ae1c0e60880b18c22Anna Zaks // dlopen will execute global constructors, so it must be not in rtl. 261cd656cab3fa3dd4b0c974c6ae1c0e60880b18c22Anna Zaks CHECK_EQ(thr->in_rtl, 1); 262a19f4af7a94835ce4693bfe12d6270754e79eb56Anna Zaks thr->in_rtl = 0; 263f05aac8472d8ed081a361a218fd14d59ddc91b85Anna Zaks void *res = REAL(dlopen)(filename, flag); 264f05aac8472d8ed081a361a218fd14d59ddc91b85Anna Zaks thr->in_rtl = 1; 265fa06f0464a04bb7fce1fcfb3780d151bb029e00cJordan Rose libignore()->OnLibraryLoaded(filename); 266fa06f0464a04bb7fce1fcfb3780d151bb029e00cJordan Rose return res; 267fa06f0464a04bb7fce1fcfb3780d151bb029e00cJordan Rose} 268fa06f0464a04bb7fce1fcfb3780d151bb029e00cJordan Rose 269fa06f0464a04bb7fce1fcfb3780d151bb029e00cJordan RoseTSAN_INTERCEPTOR(int, dlclose, void *handle) { 270fa06f0464a04bb7fce1fcfb3780d151bb029e00cJordan Rose SCOPED_INTERCEPTOR_RAW(dlclose, handle); 271fa06f0464a04bb7fce1fcfb3780d151bb029e00cJordan Rose // dlclose will execute global destructors, so it must be not in rtl. 272f05aac8472d8ed081a361a218fd14d59ddc91b85Anna Zaks CHECK_EQ(thr->in_rtl, 1); 273f05aac8472d8ed081a361a218fd14d59ddc91b85Anna Zaks thr->in_rtl = 0; 274fa06f0464a04bb7fce1fcfb3780d151bb029e00cJordan Rose int res = REAL(dlclose)(handle); 275fa06f0464a04bb7fce1fcfb3780d151bb029e00cJordan Rose thr->in_rtl = 1; 276fa06f0464a04bb7fce1fcfb3780d151bb029e00cJordan Rose libignore()->OnLibraryUnloaded(); 2778bef8238181a30e52dea380789a7e2d760eac532Ted Kremenek return res; 278fa06f0464a04bb7fce1fcfb3780d151bb029e00cJordan Rose} 279fa06f0464a04bb7fce1fcfb3780d151bb029e00cJordan Rose 280f05aac8472d8ed081a361a218fd14d59ddc91b85Anna Zaksclass AtExitContext { 281f05aac8472d8ed081a361a218fd14d59ddc91b85Anna Zaks public: 2821aae01a8308d2f8e31adab3f4d7ac35543aac680Anna Zaks AtExitContext() 2831aae01a8308d2f8e31adab3f4d7ac35543aac680Anna Zaks : mtx_(MutexTypeAtExit, StatMtxAtExit) 2841aae01a8308d2f8e31adab3f4d7ac35543aac680Anna Zaks , pos_() { 2851aae01a8308d2f8e31adab3f4d7ac35543aac680Anna Zaks } 2861aae01a8308d2f8e31adab3f4d7ac35543aac680Anna Zaks 2871aae01a8308d2f8e31adab3f4d7ac35543aac680Anna Zaks typedef void(*atexit_t)(); 2881aae01a8308d2f8e31adab3f4d7ac35543aac680Anna Zaks 289f05aac8472d8ed081a361a218fd14d59ddc91b85Anna Zaks int atexit(ThreadState *thr, uptr pc, bool is_on_exit, 2901aae01a8308d2f8e31adab3f4d7ac35543aac680Anna Zaks atexit_t f, void *arg) { 291a19f4af7a94835ce4693bfe12d6270754e79eb56Anna Zaks Lock l(&mtx_); 292a19f4af7a94835ce4693bfe12d6270754e79eb56Anna Zaks if (pos_ == kMaxAtExit) 2931aae01a8308d2f8e31adab3f4d7ac35543aac680Anna Zaks return 1; 294a19f4af7a94835ce4693bfe12d6270754e79eb56Anna Zaks Release(thr, pc, (uptr)this); 2951aae01a8308d2f8e31adab3f4d7ac35543aac680Anna Zaks stack_[pos_] = f; 296a19f4af7a94835ce4693bfe12d6270754e79eb56Anna Zaks args_[pos_] = arg; 2971aae01a8308d2f8e31adab3f4d7ac35543aac680Anna Zaks is_on_exits_[pos_] = is_on_exit; 298a19f4af7a94835ce4693bfe12d6270754e79eb56Anna Zaks pos_++; 299f05aac8472d8ed081a361a218fd14d59ddc91b85Anna Zaks return 0; 3001aae01a8308d2f8e31adab3f4d7ac35543aac680Anna Zaks } 301aa0aeb1cbe117db68d35700cb3a34aace0f99b99Anna Zaks 3021aae01a8308d2f8e31adab3f4d7ac35543aac680Anna Zaks void exit(ThreadState *thr, uptr pc) { 303d231d0130a95336610ab9a42eaeb2cdac19992f3Anna Zaks CHECK_EQ(thr->in_rtl, 0); 304d231d0130a95336610ab9a42eaeb2cdac19992f3Anna Zaks for (;;) { 305d231d0130a95336610ab9a42eaeb2cdac19992f3Anna Zaks atexit_t f = 0; 306d231d0130a95336610ab9a42eaeb2cdac19992f3Anna Zaks void *arg = 0; 307aa0aeb1cbe117db68d35700cb3a34aace0f99b99Anna Zaks bool is_on_exit = false; 308aa0aeb1cbe117db68d35700cb3a34aace0f99b99Anna Zaks { 309aa0aeb1cbe117db68d35700cb3a34aace0f99b99Anna Zaks Lock l(&mtx_); 310f05aac8472d8ed081a361a218fd14d59ddc91b85Anna Zaks if (pos_) { 311f05aac8472d8ed081a361a218fd14d59ddc91b85Anna Zaks pos_--; 312c03a39e16762627b421247b12a2658be630a3300Anna Zaks f = stack_[pos_]; 313c03a39e16762627b421247b12a2658be630a3300Anna Zaks arg = args_[pos_]; 314c03a39e16762627b421247b12a2658be630a3300Anna Zaks is_on_exit = is_on_exits_[pos_]; 315651f13cea278ec967336033dd032faef0e9fc2ecStephen Hines ScopedInRtl in_rtl; 316c03a39e16762627b421247b12a2658be630a3300Anna Zaks Acquire(thr, pc, (uptr)this); 317c03a39e16762627b421247b12a2658be630a3300Anna Zaks } 318c03a39e16762627b421247b12a2658be630a3300Anna Zaks } 319c03a39e16762627b421247b12a2658be630a3300Anna Zaks if (f == 0) 320c03a39e16762627b421247b12a2658be630a3300Anna Zaks break; 321c03a39e16762627b421247b12a2658be630a3300Anna Zaks DPrintf("#%d: executing atexit func %p\n", thr->tid, f); 322c03a39e16762627b421247b12a2658be630a3300Anna Zaks CHECK_EQ(thr->in_rtl, 0); 323c03a39e16762627b421247b12a2658be630a3300Anna Zaks if (is_on_exit) 324fa06f0464a04bb7fce1fcfb3780d151bb029e00cJordan Rose ((void(*)(int status, void *arg))f)(0, arg); 3258bef8238181a30e52dea380789a7e2d760eac532Ted Kremenek else 326c03a39e16762627b421247b12a2658be630a3300Anna Zaks ((void(*)(void *arg, void *dso))f)(arg, 0); 327fa06f0464a04bb7fce1fcfb3780d151bb029e00cJordan Rose } 328fa06f0464a04bb7fce1fcfb3780d151bb029e00cJordan Rose } 329fa06f0464a04bb7fce1fcfb3780d151bb029e00cJordan Rose 330fa06f0464a04bb7fce1fcfb3780d151bb029e00cJordan Rose private: 331c03a39e16762627b421247b12a2658be630a3300Anna Zaks static const int kMaxAtExit = 128; 332fa06f0464a04bb7fce1fcfb3780d151bb029e00cJordan Rose Mutex mtx_; 333fa06f0464a04bb7fce1fcfb3780d151bb029e00cJordan Rose atexit_t stack_[kMaxAtExit]; 334fa06f0464a04bb7fce1fcfb3780d151bb029e00cJordan Rose void *args_[kMaxAtExit]; 335fa06f0464a04bb7fce1fcfb3780d151bb029e00cJordan Rose bool is_on_exits_[kMaxAtExit]; 336c03a39e16762627b421247b12a2658be630a3300Anna Zaks int pos_; 337c03a39e16762627b421247b12a2658be630a3300Anna Zaks}; 338c03a39e16762627b421247b12a2658be630a3300Anna Zaks 339c03a39e16762627b421247b12a2658be630a3300Anna Zaksstatic AtExitContext *atexit_ctx; 340c03a39e16762627b421247b12a2658be630a3300Anna Zaks 341c03a39e16762627b421247b12a2658be630a3300Anna ZaksTSAN_INTERCEPTOR(int, atexit, void (*f)()) { 342c03a39e16762627b421247b12a2658be630a3300Anna Zaks if (cur_thread()->in_symbolizer) 343c03a39e16762627b421247b12a2658be630a3300Anna Zaks return 0; 344c03a39e16762627b421247b12a2658be630a3300Anna Zaks SCOPED_TSAN_INTERCEPTOR(atexit, f); 345c03a39e16762627b421247b12a2658be630a3300Anna Zaks return atexit_ctx->atexit(thr, pc, false, (void(*)())f, 0); 346aa0aeb1cbe117db68d35700cb3a34aace0f99b99Anna Zaks} 347aa0aeb1cbe117db68d35700cb3a34aace0f99b99Anna Zaks 348fa06f0464a04bb7fce1fcfb3780d151bb029e00cJordan RoseTSAN_INTERCEPTOR(int, on_exit, void(*f)(int, void*), void *arg) { 349aa0aeb1cbe117db68d35700cb3a34aace0f99b99Anna Zaks if (cur_thread()->in_symbolizer) 350aa0aeb1cbe117db68d35700cb3a34aace0f99b99Anna Zaks return 0; 351ebae6d0209e1ec3d5ea14f9e63bd0d740218ed14Anna Zaks SCOPED_TSAN_INTERCEPTOR(on_exit, f, arg); 3528ad8c546372fe602708cb7ceeaf0ebbb866735c6Anna Zaks return atexit_ctx->atexit(thr, pc, true, (void(*)())f, arg); 353aa0aeb1cbe117db68d35700cb3a34aace0f99b99Anna Zaks} 354aa0aeb1cbe117db68d35700cb3a34aace0f99b99Anna Zaks 355aa0aeb1cbe117db68d35700cb3a34aace0f99b99Anna ZaksTSAN_INTERCEPTOR(int, __cxa_atexit, void (*f)(void *a), void *arg, void *dso) { 356aa0aeb1cbe117db68d35700cb3a34aace0f99b99Anna Zaks if (cur_thread()->in_symbolizer) 357aa0aeb1cbe117db68d35700cb3a34aace0f99b99Anna Zaks return 0; 358ebae6d0209e1ec3d5ea14f9e63bd0d740218ed14Anna Zaks SCOPED_TSAN_INTERCEPTOR(__cxa_atexit, f, arg, dso); 359ebae6d0209e1ec3d5ea14f9e63bd0d740218ed14Anna Zaks if (dso) { 360ebae6d0209e1ec3d5ea14f9e63bd0d740218ed14Anna Zaks // Memory allocation in __cxa_atexit will race with free during exit, 361ebae6d0209e1ec3d5ea14f9e63bd0d740218ed14Anna Zaks // because we do not see synchronization around atexit callback list. 362ebae6d0209e1ec3d5ea14f9e63bd0d740218ed14Anna Zaks ThreadIgnoreBegin(thr); 3638ad8c546372fe602708cb7ceeaf0ebbb866735c6Anna Zaks int res = REAL(__cxa_atexit)(f, arg, dso); 364aa0aeb1cbe117db68d35700cb3a34aace0f99b99Anna Zaks ThreadIgnoreEnd(thr); 365ebae6d0209e1ec3d5ea14f9e63bd0d740218ed14Anna Zaks return res; 366ebae6d0209e1ec3d5ea14f9e63bd0d740218ed14Anna Zaks } 367ebae6d0209e1ec3d5ea14f9e63bd0d740218ed14Anna Zaks return atexit_ctx->atexit(thr, pc, false, (void(*)())f, arg); 368ebae6d0209e1ec3d5ea14f9e63bd0d740218ed14Anna Zaks} 369ebae6d0209e1ec3d5ea14f9e63bd0d740218ed14Anna Zaks 370ebae6d0209e1ec3d5ea14f9e63bd0d740218ed14Anna Zaks// Cleanup old bufs. 371ebae6d0209e1ec3d5ea14f9e63bd0d740218ed14Anna Zaksstatic void JmpBufGarbageCollect(ThreadState *thr, uptr sp) { 372ebae6d0209e1ec3d5ea14f9e63bd0d740218ed14Anna Zaks for (uptr i = 0; i < thr->jmp_bufs.Size(); i++) { 373aa0aeb1cbe117db68d35700cb3a34aace0f99b99Anna Zaks JmpBuf *buf = &thr->jmp_bufs[i]; 3746b6152ba96c164a292cc0b8d8b1d4cecbec27a60Anna Zaks if (buf->sp <= sp) { 375fa06f0464a04bb7fce1fcfb3780d151bb029e00cJordan Rose uptr sz = thr->jmp_bufs.Size(); 376fa06f0464a04bb7fce1fcfb3780d151bb029e00cJordan Rose thr->jmp_bufs[i] = thr->jmp_bufs[sz - 1]; 377fa06f0464a04bb7fce1fcfb3780d151bb029e00cJordan Rose thr->jmp_bufs.PopBack(); 3788ad8c546372fe602708cb7ceeaf0ebbb866735c6Anna Zaks i--; 3798ad8c546372fe602708cb7ceeaf0ebbb866735c6Anna Zaks } 3808bef8238181a30e52dea380789a7e2d760eac532Ted Kremenek } 3818ad8c546372fe602708cb7ceeaf0ebbb866735c6Anna Zaks} 382aa0aeb1cbe117db68d35700cb3a34aace0f99b99Anna Zaks 3838ad8c546372fe602708cb7ceeaf0ebbb866735c6Anna Zaksstatic void SetJmp(ThreadState *thr, uptr sp, uptr mangled_sp) { 3848ad8c546372fe602708cb7ceeaf0ebbb866735c6Anna Zaks if (thr->shadow_stack_pos == 0) // called from libc guts during bootstrap 385fa06f0464a04bb7fce1fcfb3780d151bb029e00cJordan Rose return; 3868ad8c546372fe602708cb7ceeaf0ebbb866735c6Anna Zaks // Cleanup old bufs. 387ebae6d0209e1ec3d5ea14f9e63bd0d740218ed14Anna Zaks JmpBufGarbageCollect(thr, sp); 388fa06f0464a04bb7fce1fcfb3780d151bb029e00cJordan Rose // Remember the buf. 389ebae6d0209e1ec3d5ea14f9e63bd0d740218ed14Anna Zaks JmpBuf *buf = thr->jmp_bufs.PushBack(); 390fa06f0464a04bb7fce1fcfb3780d151bb029e00cJordan Rose buf->sp = sp; 391fa06f0464a04bb7fce1fcfb3780d151bb029e00cJordan Rose buf->mangled_sp = mangled_sp; 392fa06f0464a04bb7fce1fcfb3780d151bb029e00cJordan Rose buf->shadow_stack_pos = thr->shadow_stack_pos; 393fa06f0464a04bb7fce1fcfb3780d151bb029e00cJordan Rose} 394fa06f0464a04bb7fce1fcfb3780d151bb029e00cJordan Rose 395fa06f0464a04bb7fce1fcfb3780d151bb029e00cJordan Rosestatic void LongJmp(ThreadState *thr, uptr *env) { 396ebae6d0209e1ec3d5ea14f9e63bd0d740218ed14Anna Zaks uptr mangled_sp = env[6]; 3978ad8c546372fe602708cb7ceeaf0ebbb866735c6Anna Zaks // Find the saved buf by mangled_sp. 3988ad8c546372fe602708cb7ceeaf0ebbb866735c6Anna Zaks for (uptr i = 0; i < thr->jmp_bufs.Size(); i++) { 399cdcc653642d4ac9255c574fabe74a48149e06733Anna Zaks JmpBuf *buf = &thr->jmp_bufs[i]; 400cdcc653642d4ac9255c574fabe74a48149e06733Anna Zaks if (buf->mangled_sp == mangled_sp) { 401a19f4af7a94835ce4693bfe12d6270754e79eb56Anna Zaks CHECK_GE(thr->shadow_stack_pos, buf->shadow_stack_pos); 402651f13cea278ec967336033dd032faef0e9fc2ecStephen Hines // Unwind the stack. 4039c378f705405d37f49795d5e915989de774fe11fTed Kremenek while (thr->shadow_stack_pos > buf->shadow_stack_pos) 4049c378f705405d37f49795d5e915989de774fe11fTed Kremenek FuncExit(thr); 40552a16499df87730c0252b431abdf2b2e32d756a6Ted Kremenek JmpBufGarbageCollect(thr, buf->sp - 1); // do not collect buf->sp 406520035439d7133064325c4df6378c5a8f2f05539Ted Kremenek return; 407520035439d7133064325c4df6378c5a8f2f05539Ted Kremenek } 4081eb4433ac451dc16f4133a88af2d002ac26c58efMike Stump } 4097d7fe6d539b3bdb1701835223cca306c325614a7Ted Kremenek Printf("ThreadSanitizer: can't find longjmp buf\n"); 4101aae01a8308d2f8e31adab3f4d7ac35543aac680Anna Zaks CHECK(0); 4111aae01a8308d2f8e31adab3f4d7ac35543aac680Anna Zaks} 412ad62deeb70e97da6bd514dd390ea1ce6af6ad81dAnna Zaks 4131aae01a8308d2f8e31adab3f4d7ac35543aac680Anna Zaks// FIXME: put everything below into a common extern "C" block? 414cdcc653642d4ac9255c574fabe74a48149e06733Anna Zaksextern "C" void __tsan_setjmp(uptr sp, uptr mangled_sp) { 4152d950b15b2b2b650b102ecf0c6b50b45e0cb6a8aAnna Zaks ScopedInRtl in_rtl; 416cdcc653642d4ac9255c574fabe74a48149e06733Anna Zaks SetJmp(cur_thread(), sp, mangled_sp); 417cdcc653642d4ac9255c574fabe74a48149e06733Anna Zaks} 418cdcc653642d4ac9255c574fabe74a48149e06733Anna Zaks 419031ccc0555a82afc2e8afe29e19dd57ff204e2deZhongxing Xu// Not called. Merely to satisfy TSAN_INTERCEPT(). 4201aae01a8308d2f8e31adab3f4d7ac35543aac680Anna Zaksextern "C" SANITIZER_INTERFACE_ATTRIBUTE 4211aae01a8308d2f8e31adab3f4d7ac35543aac680Anna Zaksint __interceptor_setjmp(void *env); 4221aae01a8308d2f8e31adab3f4d7ac35543aac680Anna Zaksextern "C" int __interceptor_setjmp(void *env) { 4231aae01a8308d2f8e31adab3f4d7ac35543aac680Anna Zaks CHECK(0); 424cdcc653642d4ac9255c574fabe74a48149e06733Anna Zaks return 0; 425cdcc653642d4ac9255c574fabe74a48149e06733Anna Zaks} 426cdcc653642d4ac9255c574fabe74a48149e06733Anna Zaks 4278083414ee7cc8f5c807ed6a4e120fb4e0ab50ff8Ted Kremenek// FIXME: any reason to have a separate declaration? 4288bef8238181a30e52dea380789a7e2d760eac532Ted Kremenekextern "C" SANITIZER_INTERFACE_ATTRIBUTE 429c9003c89c7aead1686aba89c8e3ddcea1f2bec54Anna Zaksint __interceptor__setjmp(void *env); 4301eb4433ac451dc16f4133a88af2d002ac26c58efMike Stumpextern "C" int __interceptor__setjmp(void *env) { 4319c378f705405d37f49795d5e915989de774fe11fTed Kremenek CHECK(0); 4328e49dd6e7e73b275a74338a5127a524f0765303cTed Kremenek return 0; 4331eb4433ac451dc16f4133a88af2d002ac26c58efMike Stump} 4341eb4433ac451dc16f4133a88af2d002ac26c58efMike Stump 43552a16499df87730c0252b431abdf2b2e32d756a6Ted Kremenekextern "C" SANITIZER_INTERFACE_ATTRIBUTE 436520035439d7133064325c4df6378c5a8f2f05539Ted Kremenekint __interceptor_sigsetjmp(void *env); 4374e82d3cf6fd4c907265e3fa3aac0a835c35dc759Anna Zaksextern "C" int __interceptor_sigsetjmp(void *env) { 438520035439d7133064325c4df6378c5a8f2f05539Ted Kremenek CHECK(0); 4394e82d3cf6fd4c907265e3fa3aac0a835c35dc759Anna Zaks return 0; 440520035439d7133064325c4df6378c5a8f2f05539Ted Kremenek} 4411eb4433ac451dc16f4133a88af2d002ac26c58efMike Stump 442520035439d7133064325c4df6378c5a8f2f05539Ted Kremenekextern "C" SANITIZER_INTERFACE_ATTRIBUTE 443520035439d7133064325c4df6378c5a8f2f05539Ted Kremenekint __interceptor___sigsetjmp(void *env); 44452a16499df87730c0252b431abdf2b2e32d756a6Ted Kremenekextern "C" int __interceptor___sigsetjmp(void *env) { 4457d7fe6d539b3bdb1701835223cca306c325614a7Ted Kremenek CHECK(0); 446031ccc0555a82afc2e8afe29e19dd57ff204e2deZhongxing Xu return 0; 447d2592a34a059e7cbb2b11dc53649ac4912422909Argyrios Kyrtzidis} 448d2592a34a059e7cbb2b11dc53649ac4912422909Argyrios Kyrtzidis 4499c378f705405d37f49795d5e915989de774fe11fTed Kremenekextern "C" int setjmp(void *env); 4509c378f705405d37f49795d5e915989de774fe11fTed Kremenekextern "C" int _setjmp(void *env); 4519c378f705405d37f49795d5e915989de774fe11fTed Kremenekextern "C" int sigsetjmp(void *env); 4529c378f705405d37f49795d5e915989de774fe11fTed Kremenekextern "C" int __sigsetjmp(void *env); 453031ccc0555a82afc2e8afe29e19dd57ff204e2deZhongxing XuDEFINE_REAL(int, setjmp, void *env) 454754607e7cff2d902d9af8b771409449fb2f8d2bfTed KremenekDEFINE_REAL(int, _setjmp, void *env) 4559c378f705405d37f49795d5e915989de774fe11fTed KremenekDEFINE_REAL(int, sigsetjmp, void *env) 4569c378f705405d37f49795d5e915989de774fe11fTed KremenekDEFINE_REAL(int, __sigsetjmp, void *env) 45703509aea098772644bf4662dc1c88634818ceeccZhongxing Xu 458754607e7cff2d902d9af8b771409449fb2f8d2bfTed KremenekTSAN_INTERCEPTOR(void, longjmp, uptr *env, int val) { 459031ccc0555a82afc2e8afe29e19dd57ff204e2deZhongxing Xu { 46003509aea098772644bf4662dc1c88634818ceeccZhongxing Xu SCOPED_TSAN_INTERCEPTOR(longjmp, env, val); 4611eb4433ac451dc16f4133a88af2d002ac26c58efMike Stump } 462d2592a34a059e7cbb2b11dc53649ac4912422909Argyrios Kyrtzidis LongJmp(cur_thread(), env); 46303509aea098772644bf4662dc1c88634818ceeccZhongxing Xu REAL(longjmp)(env, val); 464754607e7cff2d902d9af8b771409449fb2f8d2bfTed Kremenek} 4651eb4433ac451dc16f4133a88af2d002ac26c58efMike Stump 4669c378f705405d37f49795d5e915989de774fe11fTed KremenekTSAN_INTERCEPTOR(void, siglongjmp, uptr *env, int val) { 4679c378f705405d37f49795d5e915989de774fe11fTed Kremenek { 4681eb4433ac451dc16f4133a88af2d002ac26c58efMike Stump SCOPED_TSAN_INTERCEPTOR(siglongjmp, env, val); 469ad8dcf4a9df0e24051dc31bf9e6f3cd138a34298Chris Lattner } 470cfa88f893915ceb8ae4ce2f17c46c24a4d67502fDmitri Gribenko LongJmp(cur_thread(), env); 47124f1a967741ff9f8025ee23be12ba6feacc31f77Ted Kremenek REAL(siglongjmp)(env, val); 4721eb4433ac451dc16f4133a88af2d002ac26c58efMike Stump} 473ad8dcf4a9df0e24051dc31bf9e6f3cd138a34298Chris Lattner 47424f1a967741ff9f8025ee23be12ba6feacc31f77Ted KremenekTSAN_INTERCEPTOR(void*, malloc, uptr size) { 47524f1a967741ff9f8025ee23be12ba6feacc31f77Ted Kremenek if (cur_thread()->in_symbolizer) 476754607e7cff2d902d9af8b771409449fb2f8d2bfTed Kremenek return __libc_malloc(size); 4771eb4433ac451dc16f4133a88af2d002ac26c58efMike Stump void *p = 0; 478031ccc0555a82afc2e8afe29e19dd57ff204e2deZhongxing Xu { 479031ccc0555a82afc2e8afe29e19dd57ff204e2deZhongxing Xu SCOPED_INTERCEPTOR_RAW(malloc, size); 4801eb4433ac451dc16f4133a88af2d002ac26c58efMike Stump p = user_alloc(thr, pc, size); 48118c66fdc3c4008d335885695fe36fb5353c5f672Ted Kremenek } 4828bef8238181a30e52dea380789a7e2d760eac532Ted Kremenek invoke_malloc_hook(p, size); 483031ccc0555a82afc2e8afe29e19dd57ff204e2deZhongxing Xu return p; 4841eb4433ac451dc16f4133a88af2d002ac26c58efMike Stump} 4859c378f705405d37f49795d5e915989de774fe11fTed Kremenek 486754607e7cff2d902d9af8b771409449fb2f8d2bfTed KremenekTSAN_INTERCEPTOR(void*, __libc_memalign, uptr align, uptr sz) { 4878bef8238181a30e52dea380789a7e2d760eac532Ted Kremenek SCOPED_TSAN_INTERCEPTOR(__libc_memalign, align, sz); 4885eca482fe895ea57bc82410222e6426c09e63284Ted Kremenek return user_alloc(thr, pc, sz, align); 4895eca482fe895ea57bc82410222e6426c09e63284Ted Kremenek} 4905eca482fe895ea57bc82410222e6426c09e63284Ted Kremenek 4915eca482fe895ea57bc82410222e6426c09e63284Ted KremenekTSAN_INTERCEPTOR(void*, calloc, uptr size, uptr n) { 492754607e7cff2d902d9af8b771409449fb2f8d2bfTed Kremenek if (cur_thread()->in_symbolizer) 4931eb4433ac451dc16f4133a88af2d002ac26c58efMike Stump return __libc_calloc(size, n); 494d2592a34a059e7cbb2b11dc53649ac4912422909Argyrios Kyrtzidis if (__sanitizer::CallocShouldReturnNullDueToOverflow(size, n)) 495d2592a34a059e7cbb2b11dc53649ac4912422909Argyrios Kyrtzidis return AllocatorReturnNull(); 4969c378f705405d37f49795d5e915989de774fe11fTed Kremenek void *p = 0; 4979c378f705405d37f49795d5e915989de774fe11fTed Kremenek { 4989c378f705405d37f49795d5e915989de774fe11fTed Kremenek SCOPED_INTERCEPTOR_RAW(calloc, size, n); 499031ccc0555a82afc2e8afe29e19dd57ff204e2deZhongxing Xu p = user_alloc(thr, pc, n * size); 500daeb9a7376830d637e02b5bc51faf4750a7bce70Ted Kremenek if (p) 5019c378f705405d37f49795d5e915989de774fe11fTed Kremenek internal_memset(p, 0, n * size); 5029c378f705405d37f49795d5e915989de774fe11fTed Kremenek } 503daeb9a7376830d637e02b5bc51faf4750a7bce70Ted Kremenek invoke_malloc_hook(p, n * size); 5041eb4433ac451dc16f4133a88af2d002ac26c58efMike Stump return p; 505031ccc0555a82afc2e8afe29e19dd57ff204e2deZhongxing Xu} 50603509aea098772644bf4662dc1c88634818ceeccZhongxing Xu 5071eb4433ac451dc16f4133a88af2d002ac26c58efMike StumpTSAN_INTERCEPTOR(void*, realloc, void *p, uptr size) { 508d2592a34a059e7cbb2b11dc53649ac4912422909Argyrios Kyrtzidis if (cur_thread()->in_symbolizer) 50903509aea098772644bf4662dc1c88634818ceeccZhongxing Xu return __libc_realloc(p, size); 510031ccc0555a82afc2e8afe29e19dd57ff204e2deZhongxing Xu if (p) 511daeb9a7376830d637e02b5bc51faf4750a7bce70Ted Kremenek invoke_free_hook(p); 5129c378f705405d37f49795d5e915989de774fe11fTed Kremenek { 51334feff654c6304e0a59ceb1376989d28dbc956ffTed Kremenek SCOPED_INTERCEPTOR_RAW(realloc, p, size); 51434feff654c6304e0a59ceb1376989d28dbc956ffTed Kremenek p = user_realloc(thr, pc, p, size); 5151eb4433ac451dc16f4133a88af2d002ac26c58efMike Stump } 5169c378f705405d37f49795d5e915989de774fe11fTed Kremenek invoke_malloc_hook(p, size); 517cfa88f893915ceb8ae4ce2f17c46c24a4d67502fDmitri Gribenko return p; 518daeb9a7376830d637e02b5bc51faf4750a7bce70Ted Kremenek} 5191eb4433ac451dc16f4133a88af2d002ac26c58efMike Stump 5209c378f705405d37f49795d5e915989de774fe11fTed KremenekTSAN_INTERCEPTOR(void, free, void *p) { 521daeb9a7376830d637e02b5bc51faf4750a7bce70Ted Kremenek if (p == 0) 522daeb9a7376830d637e02b5bc51faf4750a7bce70Ted Kremenek return; 523daeb9a7376830d637e02b5bc51faf4750a7bce70Ted Kremenek if (cur_thread()->in_symbolizer) 5241eb4433ac451dc16f4133a88af2d002ac26c58efMike Stump return __libc_free(p); 525031ccc0555a82afc2e8afe29e19dd57ff204e2deZhongxing Xu invoke_free_hook(p); 526031ccc0555a82afc2e8afe29e19dd57ff204e2deZhongxing Xu SCOPED_INTERCEPTOR_RAW(free, p); 5271eb4433ac451dc16f4133a88af2d002ac26c58efMike Stump user_free(thr, pc, p); 5284d3175c1e5a44251ea97b0c81e80f060629d9c08Ted Kremenek} 529cfa88f893915ceb8ae4ce2f17c46c24a4d67502fDmitri Gribenko 5304d3175c1e5a44251ea97b0c81e80f060629d9c08Ted KremenekTSAN_INTERCEPTOR(void, cfree, void *p) { 5314d3175c1e5a44251ea97b0c81e80f060629d9c08Ted Kremenek if (p == 0) 53218c66fdc3c4008d335885695fe36fb5353c5f672Ted Kremenek return; 5338bef8238181a30e52dea380789a7e2d760eac532Ted Kremenek if (cur_thread()->in_symbolizer) 5341eb4433ac451dc16f4133a88af2d002ac26c58efMike Stump return __libc_free(p); 5358bef8238181a30e52dea380789a7e2d760eac532Ted Kremenek invoke_free_hook(p); 536031ccc0555a82afc2e8afe29e19dd57ff204e2deZhongxing Xu SCOPED_INTERCEPTOR_RAW(cfree, p); 5371eb4433ac451dc16f4133a88af2d002ac26c58efMike Stump user_free(thr, pc, p); 5389c378f705405d37f49795d5e915989de774fe11fTed Kremenek} 539daeb9a7376830d637e02b5bc51faf4750a7bce70Ted Kremenek 5408bef8238181a30e52dea380789a7e2d760eac532Ted KremenekTSAN_INTERCEPTOR(uptr, malloc_usable_size, void *p) { 5415eca482fe895ea57bc82410222e6426c09e63284Ted Kremenek SCOPED_INTERCEPTOR_RAW(malloc_usable_size, p); 5425eca482fe895ea57bc82410222e6426c09e63284Ted Kremenek return user_alloc_usable_size(thr, pc, p); 5435eca482fe895ea57bc82410222e6426c09e63284Ted Kremenek} 5445eca482fe895ea57bc82410222e6426c09e63284Ted Kremenek 545daeb9a7376830d637e02b5bc51faf4750a7bce70Ted Kremenek#define OPERATOR_NEW_BODY(mangled_name) \ 54611062b118476368fa5b294954713e5df97d8599fTed Kremenek if (cur_thread()->in_symbolizer) \ 5473070e13dca5bbefa32acb80ce4a7b217a6220983Ted Kremenek return __libc_malloc(size); \ 548f24af5bc2e01ca8e7396ed997378a77fddfa521eTed Kremenek void *p = 0; \ 549f24af5bc2e01ca8e7396ed997378a77fddfa521eTed Kremenek { \ 550f24af5bc2e01ca8e7396ed997378a77fddfa521eTed Kremenek SCOPED_INTERCEPTOR_RAW(mangled_name, size); \ 551 p = user_alloc(thr, pc, size); \ 552 } \ 553 invoke_malloc_hook(p, size); \ 554 return p; 555 556SANITIZER_INTERFACE_ATTRIBUTE 557void *operator new(__sanitizer::uptr size); 558void *operator new(__sanitizer::uptr size) { 559 OPERATOR_NEW_BODY(_Znwm); 560} 561 562SANITIZER_INTERFACE_ATTRIBUTE 563void *operator new[](__sanitizer::uptr size); 564void *operator new[](__sanitizer::uptr size) { 565 OPERATOR_NEW_BODY(_Znam); 566} 567 568SANITIZER_INTERFACE_ATTRIBUTE 569void *operator new(__sanitizer::uptr size, std::nothrow_t const&); 570void *operator new(__sanitizer::uptr size, std::nothrow_t const&) { 571 OPERATOR_NEW_BODY(_ZnwmRKSt9nothrow_t); 572} 573 574SANITIZER_INTERFACE_ATTRIBUTE 575void *operator new[](__sanitizer::uptr size, std::nothrow_t const&); 576void *operator new[](__sanitizer::uptr size, std::nothrow_t const&) { 577 OPERATOR_NEW_BODY(_ZnamRKSt9nothrow_t); 578} 579 580#define OPERATOR_DELETE_BODY(mangled_name) \ 581 if (ptr == 0) return; \ 582 if (cur_thread()->in_symbolizer) \ 583 return __libc_free(ptr); \ 584 invoke_free_hook(ptr); \ 585 SCOPED_INTERCEPTOR_RAW(mangled_name, ptr); \ 586 user_free(thr, pc, ptr); 587 588SANITIZER_INTERFACE_ATTRIBUTE 589void operator delete(void *ptr); 590void operator delete(void *ptr) { 591 OPERATOR_DELETE_BODY(_ZdlPv); 592} 593 594SANITIZER_INTERFACE_ATTRIBUTE 595void operator delete[](void *ptr); 596void operator delete[](void *ptr) { 597 OPERATOR_DELETE_BODY(_ZdlPvRKSt9nothrow_t); 598} 599 600SANITIZER_INTERFACE_ATTRIBUTE 601void operator delete(void *ptr, std::nothrow_t const&); 602void operator delete(void *ptr, std::nothrow_t const&) { 603 OPERATOR_DELETE_BODY(_ZdaPv); 604} 605 606SANITIZER_INTERFACE_ATTRIBUTE 607void operator delete[](void *ptr, std::nothrow_t const&); 608void operator delete[](void *ptr, std::nothrow_t const&) { 609 OPERATOR_DELETE_BODY(_ZdaPvRKSt9nothrow_t); 610} 611 612TSAN_INTERCEPTOR(uptr, strlen, const char *s) { 613 SCOPED_TSAN_INTERCEPTOR(strlen, s); 614 uptr len = internal_strlen(s); 615 MemoryAccessRange(thr, pc, (uptr)s, len + 1, false); 616 return len; 617} 618 619TSAN_INTERCEPTOR(void*, memset, void *dst, int v, uptr size) { 620 SCOPED_TSAN_INTERCEPTOR(memset, dst, v, size); 621 MemoryAccessRange(thr, pc, (uptr)dst, size, true); 622 return internal_memset(dst, v, size); 623} 624 625TSAN_INTERCEPTOR(void*, memcpy, void *dst, const void *src, uptr size) { 626 SCOPED_TSAN_INTERCEPTOR(memcpy, dst, src, size); 627 MemoryAccessRange(thr, pc, (uptr)dst, size, true); 628 MemoryAccessRange(thr, pc, (uptr)src, size, false); 629 return internal_memcpy(dst, src, size); 630} 631 632TSAN_INTERCEPTOR(int, memcmp, const void *s1, const void *s2, uptr n) { 633 SCOPED_TSAN_INTERCEPTOR(memcmp, s1, s2, n); 634 int res = 0; 635 uptr len = 0; 636 for (; len < n; len++) { 637 if ((res = ((unsigned char*)s1)[len] - ((unsigned char*)s2)[len])) 638 break; 639 } 640 MemoryAccessRange(thr, pc, (uptr)s1, len < n ? len + 1 : n, false); 641 MemoryAccessRange(thr, pc, (uptr)s2, len < n ? len + 1 : n, false); 642 return res; 643} 644 645TSAN_INTERCEPTOR(void*, memchr, void *s, int c, uptr n) { 646 SCOPED_TSAN_INTERCEPTOR(memchr, s, c, n); 647 void *res = REAL(memchr)(s, c, n); 648 uptr len = res ? (char*)res - (char*)s + 1 : n; 649 MemoryAccessRange(thr, pc, (uptr)s, len, false); 650 return res; 651} 652 653TSAN_INTERCEPTOR(void*, memrchr, char *s, int c, uptr n) { 654 SCOPED_TSAN_INTERCEPTOR(memrchr, s, c, n); 655 MemoryAccessRange(thr, pc, (uptr)s, n, false); 656 return REAL(memrchr)(s, c, n); 657} 658 659TSAN_INTERCEPTOR(void*, memmove, void *dst, void *src, uptr n) { 660 SCOPED_TSAN_INTERCEPTOR(memmove, dst, src, n); 661 MemoryAccessRange(thr, pc, (uptr)dst, n, true); 662 MemoryAccessRange(thr, pc, (uptr)src, n, false); 663 return REAL(memmove)(dst, src, n); 664} 665 666TSAN_INTERCEPTOR(char*, strchr, char *s, int c) { 667 SCOPED_TSAN_INTERCEPTOR(strchr, s, c); 668 char *res = REAL(strchr)(s, c); 669 uptr len = res ? (char*)res - (char*)s + 1 : internal_strlen(s) + 1; 670 MemoryAccessRange(thr, pc, (uptr)s, len, false); 671 return res; 672} 673 674TSAN_INTERCEPTOR(char*, strchrnul, char *s, int c) { 675 SCOPED_TSAN_INTERCEPTOR(strchrnul, s, c); 676 char *res = REAL(strchrnul)(s, c); 677 uptr len = (char*)res - (char*)s + 1; 678 MemoryAccessRange(thr, pc, (uptr)s, len, false); 679 return res; 680} 681 682TSAN_INTERCEPTOR(char*, strrchr, char *s, int c) { 683 SCOPED_TSAN_INTERCEPTOR(strrchr, s, c); 684 MemoryAccessRange(thr, pc, (uptr)s, internal_strlen(s) + 1, false); 685 return REAL(strrchr)(s, c); 686} 687 688TSAN_INTERCEPTOR(char*, strcpy, char *dst, const char *src) { // NOLINT 689 SCOPED_TSAN_INTERCEPTOR(strcpy, dst, src); // NOLINT 690 uptr srclen = internal_strlen(src); 691 MemoryAccessRange(thr, pc, (uptr)dst, srclen + 1, true); 692 MemoryAccessRange(thr, pc, (uptr)src, srclen + 1, false); 693 return REAL(strcpy)(dst, src); // NOLINT 694} 695 696TSAN_INTERCEPTOR(char*, strncpy, char *dst, char *src, uptr n) { 697 SCOPED_TSAN_INTERCEPTOR(strncpy, dst, src, n); 698 uptr srclen = internal_strnlen(src, n); 699 MemoryAccessRange(thr, pc, (uptr)dst, n, true); 700 MemoryAccessRange(thr, pc, (uptr)src, min(srclen + 1, n), false); 701 return REAL(strncpy)(dst, src, n); 702} 703 704TSAN_INTERCEPTOR(const char*, strstr, const char *s1, const char *s2) { 705 SCOPED_TSAN_INTERCEPTOR(strstr, s1, s2); 706 const char *res = REAL(strstr)(s1, s2); 707 uptr len1 = internal_strlen(s1); 708 uptr len2 = internal_strlen(s2); 709 MemoryAccessRange(thr, pc, (uptr)s1, len1 + 1, false); 710 MemoryAccessRange(thr, pc, (uptr)s2, len2 + 1, false); 711 return res; 712} 713 714TSAN_INTERCEPTOR(char*, strdup, const char *str) { 715 SCOPED_TSAN_INTERCEPTOR(strdup, str); 716 // strdup will call malloc, so no instrumentation is required here. 717 return REAL(strdup)(str); 718} 719 720static bool fix_mmap_addr(void **addr, long_t sz, int flags) { 721 if (*addr) { 722 if (!IsAppMem((uptr)*addr) || !IsAppMem((uptr)*addr + sz - 1)) { 723 if (flags & MAP_FIXED) { 724 errno = EINVAL; 725 return false; 726 } else { 727 *addr = 0; 728 } 729 } 730 } 731 return true; 732} 733 734TSAN_INTERCEPTOR(void*, mmap, void *addr, long_t sz, int prot, 735 int flags, int fd, unsigned off) { 736 SCOPED_TSAN_INTERCEPTOR(mmap, addr, sz, prot, flags, fd, off); 737 if (!fix_mmap_addr(&addr, sz, flags)) 738 return MAP_FAILED; 739 void *res = REAL(mmap)(addr, sz, prot, flags, fd, off); 740 if (res != MAP_FAILED) { 741 if (fd > 0) 742 FdAccess(thr, pc, fd); 743 MemoryRangeImitateWrite(thr, pc, (uptr)res, sz); 744 } 745 return res; 746} 747 748TSAN_INTERCEPTOR(void*, mmap64, void *addr, long_t sz, int prot, 749 int flags, int fd, u64 off) { 750 SCOPED_TSAN_INTERCEPTOR(mmap64, addr, sz, prot, flags, fd, off); 751 if (!fix_mmap_addr(&addr, sz, flags)) 752 return MAP_FAILED; 753 void *res = REAL(mmap64)(addr, sz, prot, flags, fd, off); 754 if (res != MAP_FAILED) { 755 if (fd > 0) 756 FdAccess(thr, pc, fd); 757 MemoryRangeImitateWrite(thr, pc, (uptr)res, sz); 758 } 759 return res; 760} 761 762TSAN_INTERCEPTOR(int, munmap, void *addr, long_t sz) { 763 SCOPED_TSAN_INTERCEPTOR(munmap, addr, sz); 764 DontNeedShadowFor((uptr)addr, sz); 765 int res = REAL(munmap)(addr, sz); 766 return res; 767} 768 769TSAN_INTERCEPTOR(void*, memalign, uptr align, uptr sz) { 770 SCOPED_INTERCEPTOR_RAW(memalign, align, sz); 771 return user_alloc(thr, pc, sz, align); 772} 773 774TSAN_INTERCEPTOR(void*, valloc, uptr sz) { 775 SCOPED_INTERCEPTOR_RAW(valloc, sz); 776 return user_alloc(thr, pc, sz, GetPageSizeCached()); 777} 778 779TSAN_INTERCEPTOR(void*, pvalloc, uptr sz) { 780 SCOPED_INTERCEPTOR_RAW(pvalloc, sz); 781 sz = RoundUp(sz, GetPageSizeCached()); 782 return user_alloc(thr, pc, sz, GetPageSizeCached()); 783} 784 785TSAN_INTERCEPTOR(int, posix_memalign, void **memptr, uptr align, uptr sz) { 786 SCOPED_INTERCEPTOR_RAW(posix_memalign, memptr, align, sz); 787 *memptr = user_alloc(thr, pc, sz, align); 788 return 0; 789} 790 791// Used in thread-safe function static initialization. 792extern "C" int INTERFACE_ATTRIBUTE __cxa_guard_acquire(atomic_uint32_t *g) { 793 SCOPED_INTERCEPTOR_RAW(__cxa_guard_acquire, g); 794 for (;;) { 795 u32 cmp = atomic_load(g, memory_order_acquire); 796 if (cmp == 0) { 797 if (atomic_compare_exchange_strong(g, &cmp, 1<<16, memory_order_relaxed)) 798 return 1; 799 } else if (cmp == 1) { 800 Acquire(thr, pc, (uptr)g); 801 return 0; 802 } else { 803 internal_sched_yield(); 804 } 805 } 806} 807 808extern "C" void INTERFACE_ATTRIBUTE __cxa_guard_release(atomic_uint32_t *g) { 809 SCOPED_INTERCEPTOR_RAW(__cxa_guard_release, g); 810 Release(thr, pc, (uptr)g); 811 atomic_store(g, 1, memory_order_release); 812} 813 814extern "C" void INTERFACE_ATTRIBUTE __cxa_guard_abort(atomic_uint32_t *g) { 815 SCOPED_INTERCEPTOR_RAW(__cxa_guard_abort, g); 816 atomic_store(g, 0, memory_order_relaxed); 817} 818 819static void thread_finalize(void *v) { 820 uptr iter = (uptr)v; 821 if (iter > 1) { 822 if (pthread_setspecific(g_thread_finalize_key, (void*)(iter - 1))) { 823 Printf("ThreadSanitizer: failed to set thread key\n"); 824 Die(); 825 } 826 return; 827 } 828 { 829 ScopedInRtl in_rtl; 830 ThreadState *thr = cur_thread(); 831 ThreadFinish(thr); 832 SignalContext *sctx = thr->signal_ctx; 833 if (sctx) { 834 thr->signal_ctx = 0; 835 UnmapOrDie(sctx, sizeof(*sctx)); 836 } 837 } 838} 839 840 841struct ThreadParam { 842 void* (*callback)(void *arg); 843 void *param; 844 atomic_uintptr_t tid; 845}; 846 847extern "C" void *__tsan_thread_start_func(void *arg) { 848 ThreadParam *p = (ThreadParam*)arg; 849 void* (*callback)(void *arg) = p->callback; 850 void *param = p->param; 851 int tid = 0; 852 { 853 ThreadState *thr = cur_thread(); 854 ScopedInRtl in_rtl; 855 if (pthread_setspecific(g_thread_finalize_key, 856 (void *)kPthreadDestructorIterations)) { 857 Printf("ThreadSanitizer: failed to set thread key\n"); 858 Die(); 859 } 860 while ((tid = atomic_load(&p->tid, memory_order_acquire)) == 0) 861 pthread_yield(); 862 atomic_store(&p->tid, 0, memory_order_release); 863 ThreadStart(thr, tid, GetTid()); 864 CHECK_EQ(thr->in_rtl, 1); 865 } 866 void *res = callback(param); 867 // Prevent the callback from being tail called, 868 // it mixes up stack traces. 869 volatile int foo = 42; 870 foo++; 871 return res; 872} 873 874TSAN_INTERCEPTOR(int, pthread_create, 875 void *th, void *attr, void *(*callback)(void*), void * param) { 876 SCOPED_INTERCEPTOR_RAW(pthread_create, th, attr, callback, param); 877 __sanitizer_pthread_attr_t myattr; 878 if (attr == 0) { 879 pthread_attr_init(&myattr); 880 attr = &myattr; 881 } 882 int detached = 0; 883 REAL(pthread_attr_getdetachstate)(attr, &detached); 884 AdjustStackSizeLinux(attr); 885 886 ThreadParam p; 887 p.callback = callback; 888 p.param = param; 889 atomic_store(&p.tid, 0, memory_order_relaxed); 890 int res = REAL(pthread_create)(th, attr, __tsan_thread_start_func, &p); 891 if (res == 0) { 892 int tid = ThreadCreate(thr, pc, *(uptr*)th, detached); 893 CHECK_NE(tid, 0); 894 atomic_store(&p.tid, tid, memory_order_release); 895 while (atomic_load(&p.tid, memory_order_acquire) != 0) 896 pthread_yield(); 897 } 898 if (attr == &myattr) 899 pthread_attr_destroy(&myattr); 900 return res; 901} 902 903TSAN_INTERCEPTOR(int, pthread_join, void *th, void **ret) { 904 SCOPED_INTERCEPTOR_RAW(pthread_join, th, ret); 905 int tid = ThreadTid(thr, pc, (uptr)th); 906 int res = BLOCK_REAL(pthread_join)(th, ret); 907 if (res == 0) { 908 ThreadJoin(thr, pc, tid); 909 } 910 return res; 911} 912 913TSAN_INTERCEPTOR(int, pthread_detach, void *th) { 914 SCOPED_TSAN_INTERCEPTOR(pthread_detach, th); 915 int tid = ThreadTid(thr, pc, (uptr)th); 916 int res = REAL(pthread_detach)(th); 917 if (res == 0) { 918 ThreadDetach(thr, pc, tid); 919 } 920 return res; 921} 922 923TSAN_INTERCEPTOR(int, pthread_mutex_init, void *m, void *a) { 924 SCOPED_TSAN_INTERCEPTOR(pthread_mutex_init, m, a); 925 int res = REAL(pthread_mutex_init)(m, a); 926 if (res == 0) { 927 bool recursive = false; 928 if (a) { 929 int type = 0; 930 if (pthread_mutexattr_gettype(a, &type) == 0) 931 recursive = (type == PTHREAD_MUTEX_RECURSIVE 932 || type == PTHREAD_MUTEX_RECURSIVE_NP); 933 } 934 MutexCreate(thr, pc, (uptr)m, false, recursive, false); 935 } 936 return res; 937} 938 939TSAN_INTERCEPTOR(int, pthread_mutex_destroy, void *m) { 940 SCOPED_TSAN_INTERCEPTOR(pthread_mutex_destroy, m); 941 int res = REAL(pthread_mutex_destroy)(m); 942 if (res == 0 || res == EBUSY) { 943 MutexDestroy(thr, pc, (uptr)m); 944 } 945 return res; 946} 947 948TSAN_INTERCEPTOR(int, pthread_mutex_trylock, void *m) { 949 SCOPED_TSAN_INTERCEPTOR(pthread_mutex_trylock, m); 950 int res = REAL(pthread_mutex_trylock)(m); 951 if (res == 0) { 952 MutexLock(thr, pc, (uptr)m); 953 } 954 return res; 955} 956 957TSAN_INTERCEPTOR(int, pthread_mutex_timedlock, void *m, void *abstime) { 958 SCOPED_TSAN_INTERCEPTOR(pthread_mutex_timedlock, m, abstime); 959 int res = REAL(pthread_mutex_timedlock)(m, abstime); 960 if (res == 0) { 961 MutexLock(thr, pc, (uptr)m); 962 } 963 return res; 964} 965 966TSAN_INTERCEPTOR(int, pthread_spin_init, void *m, int pshared) { 967 SCOPED_TSAN_INTERCEPTOR(pthread_spin_init, m, pshared); 968 int res = REAL(pthread_spin_init)(m, pshared); 969 if (res == 0) { 970 MutexCreate(thr, pc, (uptr)m, false, false, false); 971 } 972 return res; 973} 974 975TSAN_INTERCEPTOR(int, pthread_spin_destroy, void *m) { 976 SCOPED_TSAN_INTERCEPTOR(pthread_spin_destroy, m); 977 int res = REAL(pthread_spin_destroy)(m); 978 if (res == 0) { 979 MutexDestroy(thr, pc, (uptr)m); 980 } 981 return res; 982} 983 984TSAN_INTERCEPTOR(int, pthread_spin_lock, void *m) { 985 SCOPED_TSAN_INTERCEPTOR(pthread_spin_lock, m); 986 int res = REAL(pthread_spin_lock)(m); 987 if (res == 0) { 988 MutexLock(thr, pc, (uptr)m); 989 } 990 return res; 991} 992 993TSAN_INTERCEPTOR(int, pthread_spin_trylock, void *m) { 994 SCOPED_TSAN_INTERCEPTOR(pthread_spin_trylock, m); 995 int res = REAL(pthread_spin_trylock)(m); 996 if (res == 0) { 997 MutexLock(thr, pc, (uptr)m); 998 } 999 return res; 1000} 1001 1002TSAN_INTERCEPTOR(int, pthread_spin_unlock, void *m) { 1003 SCOPED_TSAN_INTERCEPTOR(pthread_spin_unlock, m); 1004 MutexUnlock(thr, pc, (uptr)m); 1005 int res = REAL(pthread_spin_unlock)(m); 1006 return res; 1007} 1008 1009TSAN_INTERCEPTOR(int, pthread_rwlock_init, void *m, void *a) { 1010 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_init, m, a); 1011 int res = REAL(pthread_rwlock_init)(m, a); 1012 if (res == 0) { 1013 MutexCreate(thr, pc, (uptr)m, true, false, false); 1014 } 1015 return res; 1016} 1017 1018TSAN_INTERCEPTOR(int, pthread_rwlock_destroy, void *m) { 1019 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_destroy, m); 1020 int res = REAL(pthread_rwlock_destroy)(m); 1021 if (res == 0) { 1022 MutexDestroy(thr, pc, (uptr)m); 1023 } 1024 return res; 1025} 1026 1027TSAN_INTERCEPTOR(int, pthread_rwlock_rdlock, void *m) { 1028 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_rdlock, m); 1029 int res = REAL(pthread_rwlock_rdlock)(m); 1030 if (res == 0) { 1031 MutexReadLock(thr, pc, (uptr)m); 1032 } 1033 return res; 1034} 1035 1036TSAN_INTERCEPTOR(int, pthread_rwlock_tryrdlock, void *m) { 1037 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_tryrdlock, m); 1038 int res = REAL(pthread_rwlock_tryrdlock)(m); 1039 if (res == 0) { 1040 MutexReadLock(thr, pc, (uptr)m); 1041 } 1042 return res; 1043} 1044 1045TSAN_INTERCEPTOR(int, pthread_rwlock_timedrdlock, void *m, void *abstime) { 1046 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_timedrdlock, m, abstime); 1047 int res = REAL(pthread_rwlock_timedrdlock)(m, abstime); 1048 if (res == 0) { 1049 MutexReadLock(thr, pc, (uptr)m); 1050 } 1051 return res; 1052} 1053 1054TSAN_INTERCEPTOR(int, pthread_rwlock_wrlock, void *m) { 1055 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_wrlock, m); 1056 int res = REAL(pthread_rwlock_wrlock)(m); 1057 if (res == 0) { 1058 MutexLock(thr, pc, (uptr)m); 1059 } 1060 return res; 1061} 1062 1063TSAN_INTERCEPTOR(int, pthread_rwlock_trywrlock, void *m) { 1064 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_trywrlock, m); 1065 int res = REAL(pthread_rwlock_trywrlock)(m); 1066 if (res == 0) { 1067 MutexLock(thr, pc, (uptr)m); 1068 } 1069 return res; 1070} 1071 1072TSAN_INTERCEPTOR(int, pthread_rwlock_timedwrlock, void *m, void *abstime) { 1073 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_timedwrlock, m, abstime); 1074 int res = REAL(pthread_rwlock_timedwrlock)(m, abstime); 1075 if (res == 0) { 1076 MutexLock(thr, pc, (uptr)m); 1077 } 1078 return res; 1079} 1080 1081TSAN_INTERCEPTOR(int, pthread_rwlock_unlock, void *m) { 1082 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_unlock, m); 1083 MutexReadOrWriteUnlock(thr, pc, (uptr)m); 1084 int res = REAL(pthread_rwlock_unlock)(m); 1085 return res; 1086} 1087 1088TSAN_INTERCEPTOR(int, pthread_cond_destroy, void *c) { 1089 SCOPED_TSAN_INTERCEPTOR(pthread_cond_destroy, c); 1090 MemoryWrite(thr, pc, (uptr)c, kSizeLog1); 1091 int res = REAL(pthread_cond_destroy)(c); 1092 return res; 1093} 1094 1095TSAN_INTERCEPTOR(int, pthread_cond_timedwait, void *c, void *m, 1096 void *abstime) { 1097 SCOPED_TSAN_INTERCEPTOR(pthread_cond_timedwait, c, m, abstime); 1098 MutexUnlock(thr, pc, (uptr)m); 1099 MemoryRead(thr, pc, (uptr)c, kSizeLog1); 1100 int res = REAL(pthread_cond_timedwait)(c, m, abstime); 1101 MutexLock(thr, pc, (uptr)m); 1102 return res; 1103} 1104 1105TSAN_INTERCEPTOR(int, pthread_barrier_init, void *b, void *a, unsigned count) { 1106 SCOPED_TSAN_INTERCEPTOR(pthread_barrier_init, b, a, count); 1107 MemoryWrite(thr, pc, (uptr)b, kSizeLog1); 1108 int res = REAL(pthread_barrier_init)(b, a, count); 1109 return res; 1110} 1111 1112TSAN_INTERCEPTOR(int, pthread_barrier_destroy, void *b) { 1113 SCOPED_TSAN_INTERCEPTOR(pthread_barrier_destroy, b); 1114 MemoryWrite(thr, pc, (uptr)b, kSizeLog1); 1115 int res = REAL(pthread_barrier_destroy)(b); 1116 return res; 1117} 1118 1119TSAN_INTERCEPTOR(int, pthread_barrier_wait, void *b) { 1120 SCOPED_TSAN_INTERCEPTOR(pthread_barrier_wait, b); 1121 Release(thr, pc, (uptr)b); 1122 MemoryRead(thr, pc, (uptr)b, kSizeLog1); 1123 int res = REAL(pthread_barrier_wait)(b); 1124 MemoryRead(thr, pc, (uptr)b, kSizeLog1); 1125 if (res == 0 || res == PTHREAD_BARRIER_SERIAL_THREAD) { 1126 Acquire(thr, pc, (uptr)b); 1127 } 1128 return res; 1129} 1130 1131TSAN_INTERCEPTOR(int, pthread_once, void *o, void (*f)()) { 1132 SCOPED_INTERCEPTOR_RAW(pthread_once, o, f); 1133 // Using SCOPED_INTERCEPTOR_RAW, because if we are called from an ignored lib, 1134 // the user callback must be executed with thr->in_rtl == 0. 1135 if (o == 0 || f == 0) 1136 return EINVAL; 1137 atomic_uint32_t *a = static_cast<atomic_uint32_t*>(o); 1138 u32 v = atomic_load(a, memory_order_acquire); 1139 if (v == 0 && atomic_compare_exchange_strong(a, &v, 1, 1140 memory_order_relaxed)) { 1141 const int old_in_rtl = thr->in_rtl; 1142 thr->in_rtl = 0; 1143 (*f)(); 1144 CHECK_EQ(thr->in_rtl, 0); 1145 thr->in_rtl = old_in_rtl; 1146 if (!thr->in_ignored_lib) 1147 Release(thr, pc, (uptr)o); 1148 atomic_store(a, 2, memory_order_release); 1149 } else { 1150 while (v != 2) { 1151 pthread_yield(); 1152 v = atomic_load(a, memory_order_acquire); 1153 } 1154 if (!thr->in_ignored_lib) 1155 Acquire(thr, pc, (uptr)o); 1156 } 1157 return 0; 1158} 1159 1160TSAN_INTERCEPTOR(int, sem_init, void *s, int pshared, unsigned value) { 1161 SCOPED_TSAN_INTERCEPTOR(sem_init, s, pshared, value); 1162 int res = REAL(sem_init)(s, pshared, value); 1163 return res; 1164} 1165 1166TSAN_INTERCEPTOR(int, sem_destroy, void *s) { 1167 SCOPED_TSAN_INTERCEPTOR(sem_destroy, s); 1168 int res = REAL(sem_destroy)(s); 1169 return res; 1170} 1171 1172TSAN_INTERCEPTOR(int, sem_wait, void *s) { 1173 SCOPED_TSAN_INTERCEPTOR(sem_wait, s); 1174 int res = BLOCK_REAL(sem_wait)(s); 1175 if (res == 0) { 1176 Acquire(thr, pc, (uptr)s); 1177 } 1178 return res; 1179} 1180 1181TSAN_INTERCEPTOR(int, sem_trywait, void *s) { 1182 SCOPED_TSAN_INTERCEPTOR(sem_trywait, s); 1183 int res = BLOCK_REAL(sem_trywait)(s); 1184 if (res == 0) { 1185 Acquire(thr, pc, (uptr)s); 1186 } 1187 return res; 1188} 1189 1190TSAN_INTERCEPTOR(int, sem_timedwait, void *s, void *abstime) { 1191 SCOPED_TSAN_INTERCEPTOR(sem_timedwait, s, abstime); 1192 int res = BLOCK_REAL(sem_timedwait)(s, abstime); 1193 if (res == 0) { 1194 Acquire(thr, pc, (uptr)s); 1195 } 1196 return res; 1197} 1198 1199TSAN_INTERCEPTOR(int, sem_post, void *s) { 1200 SCOPED_TSAN_INTERCEPTOR(sem_post, s); 1201 Release(thr, pc, (uptr)s); 1202 int res = REAL(sem_post)(s); 1203 return res; 1204} 1205 1206TSAN_INTERCEPTOR(int, sem_getvalue, void *s, int *sval) { 1207 SCOPED_TSAN_INTERCEPTOR(sem_getvalue, s, sval); 1208 int res = REAL(sem_getvalue)(s, sval); 1209 if (res == 0) { 1210 Acquire(thr, pc, (uptr)s); 1211 } 1212 return res; 1213} 1214 1215TSAN_INTERCEPTOR(int, __xstat, int version, const char *path, void *buf) { 1216 SCOPED_TSAN_INTERCEPTOR(__xstat, version, path, buf); 1217 return REAL(__xstat)(version, path, buf); 1218} 1219 1220TSAN_INTERCEPTOR(int, stat, const char *path, void *buf) { 1221 SCOPED_TSAN_INTERCEPTOR(__xstat, 0, path, buf); 1222 return REAL(__xstat)(0, path, buf); 1223} 1224 1225TSAN_INTERCEPTOR(int, __xstat64, int version, const char *path, void *buf) { 1226 SCOPED_TSAN_INTERCEPTOR(__xstat64, version, path, buf); 1227 return REAL(__xstat64)(version, path, buf); 1228} 1229 1230TSAN_INTERCEPTOR(int, stat64, const char *path, void *buf) { 1231 SCOPED_TSAN_INTERCEPTOR(__xstat64, 0, path, buf); 1232 return REAL(__xstat64)(0, path, buf); 1233} 1234 1235TSAN_INTERCEPTOR(int, __lxstat, int version, const char *path, void *buf) { 1236 SCOPED_TSAN_INTERCEPTOR(__lxstat, version, path, buf); 1237 return REAL(__lxstat)(version, path, buf); 1238} 1239 1240TSAN_INTERCEPTOR(int, lstat, const char *path, void *buf) { 1241 SCOPED_TSAN_INTERCEPTOR(__lxstat, 0, path, buf); 1242 return REAL(__lxstat)(0, path, buf); 1243} 1244 1245TSAN_INTERCEPTOR(int, __lxstat64, int version, const char *path, void *buf) { 1246 SCOPED_TSAN_INTERCEPTOR(__lxstat64, version, path, buf); 1247 return REAL(__lxstat64)(version, path, buf); 1248} 1249 1250TSAN_INTERCEPTOR(int, lstat64, const char *path, void *buf) { 1251 SCOPED_TSAN_INTERCEPTOR(__lxstat64, 0, path, buf); 1252 return REAL(__lxstat64)(0, path, buf); 1253} 1254 1255TSAN_INTERCEPTOR(int, __fxstat, int version, int fd, void *buf) { 1256 SCOPED_TSAN_INTERCEPTOR(__fxstat, version, fd, buf); 1257 if (fd > 0) 1258 FdAccess(thr, pc, fd); 1259 return REAL(__fxstat)(version, fd, buf); 1260} 1261 1262TSAN_INTERCEPTOR(int, fstat, int fd, void *buf) { 1263 SCOPED_TSAN_INTERCEPTOR(__fxstat, 0, fd, buf); 1264 if (fd > 0) 1265 FdAccess(thr, pc, fd); 1266 return REAL(__fxstat)(0, fd, buf); 1267} 1268 1269TSAN_INTERCEPTOR(int, __fxstat64, int version, int fd, void *buf) { 1270 SCOPED_TSAN_INTERCEPTOR(__fxstat64, version, fd, buf); 1271 if (fd > 0) 1272 FdAccess(thr, pc, fd); 1273 return REAL(__fxstat64)(version, fd, buf); 1274} 1275 1276TSAN_INTERCEPTOR(int, fstat64, int fd, void *buf) { 1277 SCOPED_TSAN_INTERCEPTOR(__fxstat64, 0, fd, buf); 1278 if (fd > 0) 1279 FdAccess(thr, pc, fd); 1280 return REAL(__fxstat64)(0, fd, buf); 1281} 1282 1283TSAN_INTERCEPTOR(int, open, const char *name, int flags, int mode) { 1284 SCOPED_TSAN_INTERCEPTOR(open, name, flags, mode); 1285 int fd = REAL(open)(name, flags, mode); 1286 if (fd >= 0) 1287 FdFileCreate(thr, pc, fd); 1288 return fd; 1289} 1290 1291TSAN_INTERCEPTOR(int, open64, const char *name, int flags, int mode) { 1292 SCOPED_TSAN_INTERCEPTOR(open64, name, flags, mode); 1293 int fd = REAL(open64)(name, flags, mode); 1294 if (fd >= 0) 1295 FdFileCreate(thr, pc, fd); 1296 return fd; 1297} 1298 1299TSAN_INTERCEPTOR(int, creat, const char *name, int mode) { 1300 SCOPED_TSAN_INTERCEPTOR(creat, name, mode); 1301 int fd = REAL(creat)(name, mode); 1302 if (fd >= 0) 1303 FdFileCreate(thr, pc, fd); 1304 return fd; 1305} 1306 1307TSAN_INTERCEPTOR(int, creat64, const char *name, int mode) { 1308 SCOPED_TSAN_INTERCEPTOR(creat64, name, mode); 1309 int fd = REAL(creat64)(name, mode); 1310 if (fd >= 0) 1311 FdFileCreate(thr, pc, fd); 1312 return fd; 1313} 1314 1315TSAN_INTERCEPTOR(int, dup, int oldfd) { 1316 SCOPED_TSAN_INTERCEPTOR(dup, oldfd); 1317 int newfd = REAL(dup)(oldfd); 1318 if (oldfd >= 0 && newfd >= 0 && newfd != oldfd) 1319 FdDup(thr, pc, oldfd, newfd); 1320 return newfd; 1321} 1322 1323TSAN_INTERCEPTOR(int, dup2, int oldfd, int newfd) { 1324 SCOPED_TSAN_INTERCEPTOR(dup2, oldfd, newfd); 1325 int newfd2 = REAL(dup2)(oldfd, newfd); 1326 if (oldfd >= 0 && newfd2 >= 0 && newfd2 != oldfd) 1327 FdDup(thr, pc, oldfd, newfd2); 1328 return newfd2; 1329} 1330 1331TSAN_INTERCEPTOR(int, dup3, int oldfd, int newfd, int flags) { 1332 SCOPED_TSAN_INTERCEPTOR(dup3, oldfd, newfd, flags); 1333 int newfd2 = REAL(dup3)(oldfd, newfd, flags); 1334 if (oldfd >= 0 && newfd2 >= 0 && newfd2 != oldfd) 1335 FdDup(thr, pc, oldfd, newfd2); 1336 return newfd2; 1337} 1338 1339TSAN_INTERCEPTOR(int, eventfd, unsigned initval, int flags) { 1340 SCOPED_TSAN_INTERCEPTOR(eventfd, initval, flags); 1341 int fd = REAL(eventfd)(initval, flags); 1342 if (fd >= 0) 1343 FdEventCreate(thr, pc, fd); 1344 return fd; 1345} 1346 1347TSAN_INTERCEPTOR(int, signalfd, int fd, void *mask, int flags) { 1348 SCOPED_TSAN_INTERCEPTOR(signalfd, fd, mask, flags); 1349 if (fd >= 0) 1350 FdClose(thr, pc, fd); 1351 fd = REAL(signalfd)(fd, mask, flags); 1352 if (fd >= 0) 1353 FdSignalCreate(thr, pc, fd); 1354 return fd; 1355} 1356 1357TSAN_INTERCEPTOR(int, inotify_init, int fake) { 1358 SCOPED_TSAN_INTERCEPTOR(inotify_init, fake); 1359 int fd = REAL(inotify_init)(fake); 1360 if (fd >= 0) 1361 FdInotifyCreate(thr, pc, fd); 1362 return fd; 1363} 1364 1365TSAN_INTERCEPTOR(int, inotify_init1, int flags) { 1366 SCOPED_TSAN_INTERCEPTOR(inotify_init1, flags); 1367 int fd = REAL(inotify_init1)(flags); 1368 if (fd >= 0) 1369 FdInotifyCreate(thr, pc, fd); 1370 return fd; 1371} 1372 1373TSAN_INTERCEPTOR(int, socket, int domain, int type, int protocol) { 1374 SCOPED_TSAN_INTERCEPTOR(socket, domain, type, protocol); 1375 int fd = REAL(socket)(domain, type, protocol); 1376 if (fd >= 0) 1377 FdSocketCreate(thr, pc, fd); 1378 return fd; 1379} 1380 1381TSAN_INTERCEPTOR(int, socketpair, int domain, int type, int protocol, int *fd) { 1382 SCOPED_TSAN_INTERCEPTOR(socketpair, domain, type, protocol, fd); 1383 int res = REAL(socketpair)(domain, type, protocol, fd); 1384 if (res == 0 && fd[0] >= 0 && fd[1] >= 0) 1385 FdPipeCreate(thr, pc, fd[0], fd[1]); 1386 return res; 1387} 1388 1389TSAN_INTERCEPTOR(int, connect, int fd, void *addr, unsigned addrlen) { 1390 SCOPED_TSAN_INTERCEPTOR(connect, fd, addr, addrlen); 1391 FdSocketConnecting(thr, pc, fd); 1392 int res = REAL(connect)(fd, addr, addrlen); 1393 if (res == 0 && fd >= 0) 1394 FdSocketConnect(thr, pc, fd); 1395 return res; 1396} 1397 1398TSAN_INTERCEPTOR(int, bind, int fd, void *addr, unsigned addrlen) { 1399 SCOPED_TSAN_INTERCEPTOR(bind, fd, addr, addrlen); 1400 int res = REAL(bind)(fd, addr, addrlen); 1401 if (fd > 0 && res == 0) 1402 FdAccess(thr, pc, fd); 1403 return res; 1404} 1405 1406TSAN_INTERCEPTOR(int, listen, int fd, int backlog) { 1407 SCOPED_TSAN_INTERCEPTOR(listen, fd, backlog); 1408 int res = REAL(listen)(fd, backlog); 1409 if (fd > 0 && res == 0) 1410 FdAccess(thr, pc, fd); 1411 return res; 1412} 1413 1414TSAN_INTERCEPTOR(int, epoll_create, int size) { 1415 SCOPED_TSAN_INTERCEPTOR(epoll_create, size); 1416 int fd = REAL(epoll_create)(size); 1417 if (fd >= 0) 1418 FdPollCreate(thr, pc, fd); 1419 return fd; 1420} 1421 1422TSAN_INTERCEPTOR(int, epoll_create1, int flags) { 1423 SCOPED_TSAN_INTERCEPTOR(epoll_create1, flags); 1424 int fd = REAL(epoll_create1)(flags); 1425 if (fd >= 0) 1426 FdPollCreate(thr, pc, fd); 1427 return fd; 1428} 1429 1430TSAN_INTERCEPTOR(int, close, int fd) { 1431 SCOPED_TSAN_INTERCEPTOR(close, fd); 1432 if (fd >= 0) 1433 FdClose(thr, pc, fd); 1434 return REAL(close)(fd); 1435} 1436 1437TSAN_INTERCEPTOR(int, __close, int fd) { 1438 SCOPED_TSAN_INTERCEPTOR(__close, fd); 1439 if (fd >= 0) 1440 FdClose(thr, pc, fd); 1441 return REAL(__close)(fd); 1442} 1443 1444// glibc guts 1445TSAN_INTERCEPTOR(void, __res_iclose, void *state, bool free_addr) { 1446 SCOPED_TSAN_INTERCEPTOR(__res_iclose, state, free_addr); 1447 int fds[64]; 1448 int cnt = ExtractResolvFDs(state, fds, ARRAY_SIZE(fds)); 1449 for (int i = 0; i < cnt; i++) { 1450 if (fds[i] > 0) 1451 FdClose(thr, pc, fds[i]); 1452 } 1453 REAL(__res_iclose)(state, free_addr); 1454} 1455 1456TSAN_INTERCEPTOR(int, pipe, int *pipefd) { 1457 SCOPED_TSAN_INTERCEPTOR(pipe, pipefd); 1458 int res = REAL(pipe)(pipefd); 1459 if (res == 0 && pipefd[0] >= 0 && pipefd[1] >= 0) 1460 FdPipeCreate(thr, pc, pipefd[0], pipefd[1]); 1461 return res; 1462} 1463 1464TSAN_INTERCEPTOR(int, pipe2, int *pipefd, int flags) { 1465 SCOPED_TSAN_INTERCEPTOR(pipe2, pipefd, flags); 1466 int res = REAL(pipe2)(pipefd, flags); 1467 if (res == 0 && pipefd[0] >= 0 && pipefd[1] >= 0) 1468 FdPipeCreate(thr, pc, pipefd[0], pipefd[1]); 1469 return res; 1470} 1471 1472TSAN_INTERCEPTOR(long_t, send, int fd, void *buf, long_t len, int flags) { 1473 SCOPED_TSAN_INTERCEPTOR(send, fd, buf, len, flags); 1474 if (fd >= 0) { 1475 FdAccess(thr, pc, fd); 1476 FdRelease(thr, pc, fd); 1477 } 1478 int res = REAL(send)(fd, buf, len, flags); 1479 return res; 1480} 1481 1482TSAN_INTERCEPTOR(long_t, sendmsg, int fd, void *msg, int flags) { 1483 SCOPED_TSAN_INTERCEPTOR(sendmsg, fd, msg, flags); 1484 if (fd >= 0) { 1485 FdAccess(thr, pc, fd); 1486 FdRelease(thr, pc, fd); 1487 } 1488 int res = REAL(sendmsg)(fd, msg, flags); 1489 return res; 1490} 1491 1492TSAN_INTERCEPTOR(long_t, recv, int fd, void *buf, long_t len, int flags) { 1493 SCOPED_TSAN_INTERCEPTOR(recv, fd, buf, len, flags); 1494 if (fd >= 0) 1495 FdAccess(thr, pc, fd); 1496 int res = REAL(recv)(fd, buf, len, flags); 1497 if (res >= 0 && fd >= 0) { 1498 FdAcquire(thr, pc, fd); 1499 } 1500 return res; 1501} 1502 1503TSAN_INTERCEPTOR(int, unlink, char *path) { 1504 SCOPED_TSAN_INTERCEPTOR(unlink, path); 1505 Release(thr, pc, File2addr(path)); 1506 int res = REAL(unlink)(path); 1507 return res; 1508} 1509 1510TSAN_INTERCEPTOR(void*, fopen, char *path, char *mode) { 1511 SCOPED_TSAN_INTERCEPTOR(fopen, path, mode); 1512 void *res = REAL(fopen)(path, mode); 1513 Acquire(thr, pc, File2addr(path)); 1514 if (res) { 1515 int fd = fileno_unlocked(res); 1516 if (fd >= 0) 1517 FdFileCreate(thr, pc, fd); 1518 } 1519 return res; 1520} 1521 1522TSAN_INTERCEPTOR(void*, freopen, char *path, char *mode, void *stream) { 1523 SCOPED_TSAN_INTERCEPTOR(freopen, path, mode, stream); 1524 if (stream) { 1525 int fd = fileno_unlocked(stream); 1526 if (fd >= 0) 1527 FdClose(thr, pc, fd); 1528 } 1529 void *res = REAL(freopen)(path, mode, stream); 1530 Acquire(thr, pc, File2addr(path)); 1531 if (res) { 1532 int fd = fileno_unlocked(res); 1533 if (fd >= 0) 1534 FdFileCreate(thr, pc, fd); 1535 } 1536 return res; 1537} 1538 1539TSAN_INTERCEPTOR(int, fclose, void *stream) { 1540 { 1541 SCOPED_TSAN_INTERCEPTOR(fclose, stream); 1542 if (stream) { 1543 int fd = fileno_unlocked(stream); 1544 if (fd >= 0) 1545 FdClose(thr, pc, fd); 1546 } 1547 } 1548 return REAL(fclose)(stream); 1549} 1550 1551TSAN_INTERCEPTOR(uptr, fread, void *ptr, uptr size, uptr nmemb, void *f) { 1552 { 1553 SCOPED_TSAN_INTERCEPTOR(fread, ptr, size, nmemb, f); 1554 MemoryAccessRange(thr, pc, (uptr)ptr, size * nmemb, true); 1555 } 1556 return REAL(fread)(ptr, size, nmemb, f); 1557} 1558 1559TSAN_INTERCEPTOR(uptr, fwrite, const void *p, uptr size, uptr nmemb, void *f) { 1560 { 1561 SCOPED_TSAN_INTERCEPTOR(fwrite, p, size, nmemb, f); 1562 MemoryAccessRange(thr, pc, (uptr)p, size * nmemb, false); 1563 } 1564 return REAL(fwrite)(p, size, nmemb, f); 1565} 1566 1567TSAN_INTERCEPTOR(int, fflush, void *stream) { 1568 SCOPED_TSAN_INTERCEPTOR(fflush, stream); 1569 return REAL(fflush)(stream); 1570} 1571 1572TSAN_INTERCEPTOR(void, abort, int fake) { 1573 SCOPED_TSAN_INTERCEPTOR(abort, fake); 1574 REAL(fflush)(0); 1575 REAL(abort)(fake); 1576} 1577 1578TSAN_INTERCEPTOR(int, puts, const char *s) { 1579 SCOPED_TSAN_INTERCEPTOR(puts, s); 1580 MemoryAccessRange(thr, pc, (uptr)s, internal_strlen(s), false); 1581 return REAL(puts)(s); 1582} 1583 1584TSAN_INTERCEPTOR(int, rmdir, char *path) { 1585 SCOPED_TSAN_INTERCEPTOR(rmdir, path); 1586 Release(thr, pc, Dir2addr(path)); 1587 int res = REAL(rmdir)(path); 1588 return res; 1589} 1590 1591TSAN_INTERCEPTOR(void*, opendir, char *path) { 1592 SCOPED_TSAN_INTERCEPTOR(opendir, path); 1593 void *res = REAL(opendir)(path); 1594 if (res != 0) 1595 Acquire(thr, pc, Dir2addr(path)); 1596 return res; 1597} 1598 1599TSAN_INTERCEPTOR(int, epoll_ctl, int epfd, int op, int fd, void *ev) { 1600 SCOPED_TSAN_INTERCEPTOR(epoll_ctl, epfd, op, fd, ev); 1601 if (epfd >= 0) 1602 FdAccess(thr, pc, epfd); 1603 if (epfd >= 0 && fd >= 0) 1604 FdAccess(thr, pc, fd); 1605 if (op == EPOLL_CTL_ADD && epfd >= 0) 1606 FdRelease(thr, pc, epfd); 1607 int res = REAL(epoll_ctl)(epfd, op, fd, ev); 1608 return res; 1609} 1610 1611TSAN_INTERCEPTOR(int, epoll_wait, int epfd, void *ev, int cnt, int timeout) { 1612 SCOPED_TSAN_INTERCEPTOR(epoll_wait, epfd, ev, cnt, timeout); 1613 if (epfd >= 0) 1614 FdAccess(thr, pc, epfd); 1615 int res = BLOCK_REAL(epoll_wait)(epfd, ev, cnt, timeout); 1616 if (res > 0 && epfd >= 0) 1617 FdAcquire(thr, pc, epfd); 1618 return res; 1619} 1620 1621void ALWAYS_INLINE rtl_generic_sighandler(bool sigact, int sig, 1622 my_siginfo_t *info, void *ctx) { 1623 ThreadState *thr = cur_thread(); 1624 SignalContext *sctx = SigCtx(thr); 1625 // Don't mess with synchronous signals. 1626 if (sig == SIGSEGV || sig == SIGBUS || sig == SIGILL || 1627 sig == SIGABRT || sig == SIGFPE || sig == SIGPIPE || sig == SIGSYS || 1628 // If we are sending signal to ourselves, we must process it now. 1629 (sctx && sig == sctx->int_signal_send) || 1630 // If we are in blocking function, we can safely process it now 1631 // (but check if we are in a recursive interceptor, 1632 // i.e. pthread_join()->munmap()). 1633 (sctx && sctx->in_blocking_func == 1 && thr->in_rtl == 1)) { 1634 int in_rtl = thr->in_rtl; 1635 thr->in_rtl = 0; 1636 CHECK_EQ(thr->in_signal_handler, false); 1637 thr->in_signal_handler = true; 1638 if (sigact) 1639 sigactions[sig].sa_sigaction(sig, info, ctx); 1640 else 1641 sigactions[sig].sa_handler(sig); 1642 CHECK_EQ(thr->in_signal_handler, true); 1643 thr->in_signal_handler = false; 1644 thr->in_rtl = in_rtl; 1645 return; 1646 } 1647 1648 if (sctx == 0) 1649 return; 1650 SignalDesc *signal = &sctx->pending_signals[sig]; 1651 if (signal->armed == false) { 1652 signal->armed = true; 1653 signal->sigaction = sigact; 1654 if (info) 1655 internal_memcpy(&signal->siginfo, info, sizeof(*info)); 1656 if (ctx) 1657 internal_memcpy(&signal->ctx, ctx, sizeof(signal->ctx)); 1658 sctx->pending_signal_count++; 1659 } 1660} 1661 1662static void rtl_sighandler(int sig) { 1663 rtl_generic_sighandler(false, sig, 0, 0); 1664} 1665 1666static void rtl_sigaction(int sig, my_siginfo_t *info, void *ctx) { 1667 rtl_generic_sighandler(true, sig, info, ctx); 1668} 1669 1670TSAN_INTERCEPTOR(int, sigaction, int sig, sigaction_t *act, sigaction_t *old) { 1671 SCOPED_TSAN_INTERCEPTOR(sigaction, sig, act, old); 1672 if (old) 1673 internal_memcpy(old, &sigactions[sig], sizeof(*old)); 1674 if (act == 0) 1675 return 0; 1676 internal_memcpy(&sigactions[sig], act, sizeof(*act)); 1677 sigaction_t newact; 1678 internal_memcpy(&newact, act, sizeof(newact)); 1679 REAL(sigfillset)(&newact.sa_mask); 1680 if (act->sa_handler != SIG_IGN && act->sa_handler != SIG_DFL) { 1681 if (newact.sa_flags & SA_SIGINFO) 1682 newact.sa_sigaction = rtl_sigaction; 1683 else 1684 newact.sa_handler = rtl_sighandler; 1685 } 1686 int res = REAL(sigaction)(sig, &newact, 0); 1687 return res; 1688} 1689 1690TSAN_INTERCEPTOR(sighandler_t, signal, int sig, sighandler_t h) { 1691 sigaction_t act; 1692 act.sa_handler = h; 1693 REAL(memset)(&act.sa_mask, -1, sizeof(act.sa_mask)); 1694 act.sa_flags = 0; 1695 sigaction_t old; 1696 int res = sigaction(sig, &act, &old); 1697 if (res) 1698 return SIG_ERR; 1699 return old.sa_handler; 1700} 1701 1702TSAN_INTERCEPTOR(int, sigsuspend, const __sanitizer_sigset_t *mask) { 1703 SCOPED_TSAN_INTERCEPTOR(sigsuspend, mask); 1704 return REAL(sigsuspend)(mask); 1705} 1706 1707TSAN_INTERCEPTOR(int, raise, int sig) { 1708 SCOPED_TSAN_INTERCEPTOR(raise, sig); 1709 SignalContext *sctx = SigCtx(thr); 1710 CHECK_NE(sctx, 0); 1711 int prev = sctx->int_signal_send; 1712 sctx->int_signal_send = sig; 1713 int res = REAL(raise)(sig); 1714 CHECK_EQ(sctx->int_signal_send, sig); 1715 sctx->int_signal_send = prev; 1716 return res; 1717} 1718 1719TSAN_INTERCEPTOR(int, kill, int pid, int sig) { 1720 SCOPED_TSAN_INTERCEPTOR(kill, pid, sig); 1721 SignalContext *sctx = SigCtx(thr); 1722 CHECK_NE(sctx, 0); 1723 int prev = sctx->int_signal_send; 1724 if (pid == (int)internal_getpid()) { 1725 sctx->int_signal_send = sig; 1726 } 1727 int res = REAL(kill)(pid, sig); 1728 if (pid == (int)internal_getpid()) { 1729 CHECK_EQ(sctx->int_signal_send, sig); 1730 sctx->int_signal_send = prev; 1731 } 1732 return res; 1733} 1734 1735TSAN_INTERCEPTOR(int, pthread_kill, void *tid, int sig) { 1736 SCOPED_TSAN_INTERCEPTOR(pthread_kill, tid, sig); 1737 SignalContext *sctx = SigCtx(thr); 1738 CHECK_NE(sctx, 0); 1739 int prev = sctx->int_signal_send; 1740 if (tid == pthread_self()) { 1741 sctx->int_signal_send = sig; 1742 } 1743 int res = REAL(pthread_kill)(tid, sig); 1744 if (tid == pthread_self()) { 1745 CHECK_EQ(sctx->int_signal_send, sig); 1746 sctx->int_signal_send = prev; 1747 } 1748 return res; 1749} 1750 1751TSAN_INTERCEPTOR(int, gettimeofday, void *tv, void *tz) { 1752 SCOPED_TSAN_INTERCEPTOR(gettimeofday, tv, tz); 1753 // It's intercepted merely to process pending signals. 1754 return REAL(gettimeofday)(tv, tz); 1755} 1756 1757TSAN_INTERCEPTOR(int, getaddrinfo, void *node, void *service, 1758 void *hints, void *rv) { 1759 SCOPED_TSAN_INTERCEPTOR(getaddrinfo, node, service, hints, rv); 1760 // We miss atomic synchronization in getaddrinfo, 1761 // and can report false race between malloc and free 1762 // inside of getaddrinfo. So ignore memory accesses. 1763 ThreadIgnoreBegin(thr); 1764 // getaddrinfo calls fopen, which can be intercepted by user. 1765 thr->in_rtl--; 1766 CHECK_EQ(thr->in_rtl, 0); 1767 int res = REAL(getaddrinfo)(node, service, hints, rv); 1768 thr->in_rtl++; 1769 ThreadIgnoreEnd(thr); 1770 return res; 1771} 1772 1773// Linux kernel has a bug that leads to kernel deadlock if a process 1774// maps TBs of memory and then calls mlock(). 1775static void MlockIsUnsupported() { 1776 static atomic_uint8_t printed; 1777 if (atomic_exchange(&printed, 1, memory_order_relaxed)) 1778 return; 1779 if (flags()->verbosity > 0) 1780 Printf("INFO: ThreadSanitizer ignores mlock/mlockall/munlock/munlockall\n"); 1781} 1782 1783TSAN_INTERCEPTOR(int, mlock, const void *addr, uptr len) { 1784 MlockIsUnsupported(); 1785 return 0; 1786} 1787 1788TSAN_INTERCEPTOR(int, munlock, const void *addr, uptr len) { 1789 MlockIsUnsupported(); 1790 return 0; 1791} 1792 1793TSAN_INTERCEPTOR(int, mlockall, int flags) { 1794 MlockIsUnsupported(); 1795 return 0; 1796} 1797 1798TSAN_INTERCEPTOR(int, munlockall, void) { 1799 MlockIsUnsupported(); 1800 return 0; 1801} 1802 1803TSAN_INTERCEPTOR(int, fork, int fake) { 1804 SCOPED_INTERCEPTOR_RAW(fork, fake); 1805 int pid = REAL(fork)(fake); 1806 if (pid == 0) { 1807 // child 1808 FdOnFork(thr, pc); 1809 } else if (pid > 0) { 1810 // parent 1811 } 1812 return pid; 1813} 1814 1815static int OnExit(ThreadState *thr) { 1816 int status = Finalize(thr); 1817 REAL(fflush)(0); 1818 return status; 1819} 1820 1821struct TsanInterceptorContext { 1822 ThreadState *thr; 1823 const uptr caller_pc; 1824 const uptr pc; 1825}; 1826 1827#include "sanitizer_common/sanitizer_platform_interceptors.h" 1828// Causes interceptor recursion (getpwuid_r() calls fopen()) 1829#undef SANITIZER_INTERCEPT_GETPWNAM_AND_FRIENDS 1830#undef SANITIZER_INTERCEPT_GETPWNAM_R_AND_FRIENDS 1831// Causes interceptor recursion (getaddrinfo() and fopen()) 1832#undef SANITIZER_INTERCEPT_GETADDRINFO 1833#undef SANITIZER_INTERCEPT_GETNAMEINFO 1834// Causes interceptor recursion (glob64() calls lstat64()) 1835#undef SANITIZER_INTERCEPT_GLOB 1836 1837#define COMMON_INTERCEPTOR_UNPOISON_PARAM(ctx, count) \ 1838 do { \ 1839 } while (false) 1840#define COMMON_INTERCEPTOR_WRITE_RANGE(ctx, ptr, size) \ 1841 MemoryAccessRange(((TsanInterceptorContext *)ctx)->thr, \ 1842 ((TsanInterceptorContext *)ctx)->pc, (uptr)ptr, size, \ 1843 true) 1844#define COMMON_INTERCEPTOR_READ_RANGE(ctx, ptr, size) \ 1845 MemoryAccessRange(((TsanInterceptorContext *) ctx)->thr, \ 1846 ((TsanInterceptorContext *) ctx)->pc, (uptr) ptr, size, \ 1847 false) 1848#define COMMON_INTERCEPTOR_ENTER(ctx, func, ...) \ 1849 SCOPED_TSAN_INTERCEPTOR(func, __VA_ARGS__); \ 1850 TsanInterceptorContext _ctx = {thr, caller_pc, pc}; \ 1851 ctx = (void *)&_ctx; \ 1852 (void) ctx; 1853#define COMMON_INTERCEPTOR_FD_ACQUIRE(ctx, fd) \ 1854 FdAcquire(((TsanInterceptorContext *) ctx)->thr, pc, fd) 1855#define COMMON_INTERCEPTOR_FD_RELEASE(ctx, fd) \ 1856 FdRelease(((TsanInterceptorContext *) ctx)->thr, pc, fd) 1857#define COMMON_INTERCEPTOR_FD_ACCESS(ctx, fd) \ 1858 FdAccess(((TsanInterceptorContext *) ctx)->thr, pc, fd) 1859#define COMMON_INTERCEPTOR_FD_SOCKET_ACCEPT(ctx, fd, newfd) \ 1860 FdSocketAccept(((TsanInterceptorContext *) ctx)->thr, pc, fd, newfd) 1861#define COMMON_INTERCEPTOR_SET_THREAD_NAME(ctx, name) \ 1862 ThreadSetName(((TsanInterceptorContext *) ctx)->thr, name) 1863#define COMMON_INTERCEPTOR_BLOCK_REAL(name) BLOCK_REAL(name) 1864#define COMMON_INTERCEPTOR_ON_EXIT(ctx) \ 1865 OnExit(((TsanInterceptorContext *) ctx)->thr) 1866#define COMMON_INTERCEPTOR_MUTEX_LOCK(ctx, m) \ 1867 MutexLock(((TsanInterceptorContext *)ctx)->thr, \ 1868 ((TsanInterceptorContext *)ctx)->pc, (uptr)m) 1869#define COMMON_INTERCEPTOR_MUTEX_UNLOCK(ctx, m) \ 1870 MutexUnlock(((TsanInterceptorContext *)ctx)->thr, \ 1871 ((TsanInterceptorContext *)ctx)->pc, (uptr)m) 1872#include "sanitizer_common/sanitizer_common_interceptors.inc" 1873 1874#define TSAN_SYSCALL() \ 1875 ThreadState *thr = cur_thread(); \ 1876 ScopedSyscall scoped_syscall(thr) \ 1877/**/ 1878 1879struct ScopedSyscall { 1880 ThreadState *thr; 1881 1882 explicit ScopedSyscall(ThreadState *thr) 1883 : thr(thr) { 1884 if (thr->in_rtl == 0) 1885 Initialize(thr); 1886 thr->in_rtl++; 1887 } 1888 1889 ~ScopedSyscall() { 1890 thr->in_rtl--; 1891 if (thr->in_rtl == 0) 1892 ProcessPendingSignals(thr); 1893 } 1894}; 1895 1896static void syscall_access_range(uptr pc, uptr p, uptr s, bool write) { 1897 TSAN_SYSCALL(); 1898 MemoryAccessRange(thr, pc, p, s, write); 1899} 1900 1901static void syscall_fd_close(uptr pc, int fd) { 1902 TSAN_SYSCALL(); 1903 if (fd >= 0) 1904 FdClose(thr, pc, fd); 1905} 1906 1907static void syscall_pre_fork(uptr pc) { 1908 TSAN_SYSCALL(); 1909} 1910 1911static void syscall_post_fork(uptr pc, int res) { 1912 TSAN_SYSCALL(); 1913 if (res == 0) { 1914 // child 1915 FdOnFork(thr, pc); 1916 } else if (res > 0) { 1917 // parent 1918 } 1919} 1920 1921#define COMMON_SYSCALL_PRE_READ_RANGE(p, s) \ 1922 syscall_access_range(GET_CALLER_PC(), (uptr)(p), (uptr)(s), false) 1923#define COMMON_SYSCALL_PRE_WRITE_RANGE(p, s) \ 1924 syscall_access_range(GET_CALLER_PC(), (uptr)(p), (uptr)(s), true) 1925#define COMMON_SYSCALL_POST_READ_RANGE(p, s) \ 1926 do { } while (false) 1927#define COMMON_SYSCALL_POST_WRITE_RANGE(p, s) \ 1928 do { } while (false) 1929#define COMMON_SYSCALL_FD_CLOSE(fd) \ 1930 syscall_fd_close(GET_CALLER_PC(), fd) 1931#define COMMON_SYSCALL_PRE_FORK() \ 1932 syscall_pre_fork(GET_CALLER_PC()) 1933#define COMMON_SYSCALL_POST_FORK(res) \ 1934 syscall_post_fork(GET_CALLER_PC(), res) 1935#include "sanitizer_common/sanitizer_common_syscalls.inc" 1936 1937namespace __tsan { 1938 1939static void finalize(void *arg) { 1940 ThreadState *thr = cur_thread(); 1941 uptr pc = 0; 1942 atexit_ctx->exit(thr, pc); 1943 int status = Finalize(thr); 1944 REAL(fflush)(0); 1945 if (status) 1946 REAL(_exit)(status); 1947} 1948 1949void ProcessPendingSignals(ThreadState *thr) { 1950 CHECK_EQ(thr->in_rtl, 0); 1951 SignalContext *sctx = SigCtx(thr); 1952 if (sctx == 0 || sctx->pending_signal_count == 0 || thr->in_signal_handler) 1953 return; 1954 Context *ctx = CTX(); 1955 thr->in_signal_handler = true; 1956 sctx->pending_signal_count = 0; 1957 // These are too big for stack. 1958 static THREADLOCAL __sanitizer_sigset_t emptyset, oldset; 1959 REAL(sigfillset)(&emptyset); 1960 pthread_sigmask(SIG_SETMASK, &emptyset, &oldset); 1961 for (int sig = 0; sig < kSigCount; sig++) { 1962 SignalDesc *signal = &sctx->pending_signals[sig]; 1963 if (signal->armed) { 1964 signal->armed = false; 1965 if (sigactions[sig].sa_handler != SIG_DFL 1966 && sigactions[sig].sa_handler != SIG_IGN) { 1967 // Insure that the handler does not spoil errno. 1968 const int saved_errno = errno; 1969 errno = 0; 1970 if (signal->sigaction) 1971 sigactions[sig].sa_sigaction(sig, &signal->siginfo, &signal->ctx); 1972 else 1973 sigactions[sig].sa_handler(sig); 1974 if (flags()->report_bugs && errno != 0) { 1975 ScopedInRtl in_rtl; 1976 __tsan::StackTrace stack; 1977 uptr pc = signal->sigaction ? 1978 (uptr)sigactions[sig].sa_sigaction : 1979 (uptr)sigactions[sig].sa_handler; 1980 pc += 1; // return address is expected, OutputReport() will undo this 1981 stack.Init(&pc, 1); 1982 ThreadRegistryLock l(ctx->thread_registry); 1983 ScopedReport rep(ReportTypeErrnoInSignal); 1984 if (!IsFiredSuppression(ctx, rep, stack)) { 1985 rep.AddStack(&stack); 1986 OutputReport(ctx, rep, rep.GetReport()->stacks[0]); 1987 } 1988 } 1989 errno = saved_errno; 1990 } 1991 } 1992 } 1993 pthread_sigmask(SIG_SETMASK, &oldset, 0); 1994 CHECK_EQ(thr->in_signal_handler, true); 1995 thr->in_signal_handler = false; 1996} 1997 1998static void unreachable() { 1999 Printf("FATAL: ThreadSanitizer: unreachable called\n"); 2000 Die(); 2001} 2002 2003void InitializeInterceptors() { 2004 CHECK_GT(cur_thread()->in_rtl, 0); 2005 2006 // We need to setup it early, because functions like dlsym() can call it. 2007 REAL(memset) = internal_memset; 2008 REAL(memcpy) = internal_memcpy; 2009 REAL(memcmp) = internal_memcmp; 2010 2011 // Instruct libc malloc to consume less memory. 2012 mallopt(1, 0); // M_MXFAST 2013 mallopt(-3, 32*1024); // M_MMAP_THRESHOLD 2014 2015 SANITIZER_COMMON_INTERCEPTORS_INIT; 2016 2017 TSAN_INTERCEPT(setjmp); 2018 TSAN_INTERCEPT(_setjmp); 2019 TSAN_INTERCEPT(sigsetjmp); 2020 TSAN_INTERCEPT(__sigsetjmp); 2021 TSAN_INTERCEPT(longjmp); 2022 TSAN_INTERCEPT(siglongjmp); 2023 2024 TSAN_INTERCEPT(malloc); 2025 TSAN_INTERCEPT(__libc_memalign); 2026 TSAN_INTERCEPT(calloc); 2027 TSAN_INTERCEPT(realloc); 2028 TSAN_INTERCEPT(free); 2029 TSAN_INTERCEPT(cfree); 2030 TSAN_INTERCEPT(mmap); 2031 TSAN_INTERCEPT(mmap64); 2032 TSAN_INTERCEPT(munmap); 2033 TSAN_INTERCEPT(memalign); 2034 TSAN_INTERCEPT(valloc); 2035 TSAN_INTERCEPT(pvalloc); 2036 TSAN_INTERCEPT(posix_memalign); 2037 2038 TSAN_INTERCEPT(strlen); 2039 TSAN_INTERCEPT(memset); 2040 TSAN_INTERCEPT(memcpy); 2041 TSAN_INTERCEPT(memchr); 2042 TSAN_INTERCEPT(memrchr); 2043 TSAN_INTERCEPT(memmove); 2044 TSAN_INTERCEPT(memcmp); 2045 TSAN_INTERCEPT(strchr); 2046 TSAN_INTERCEPT(strchrnul); 2047 TSAN_INTERCEPT(strrchr); 2048 TSAN_INTERCEPT(strcpy); // NOLINT 2049 TSAN_INTERCEPT(strncpy); 2050 TSAN_INTERCEPT(strstr); 2051 TSAN_INTERCEPT(strdup); 2052 2053 TSAN_INTERCEPT(pthread_create); 2054 TSAN_INTERCEPT(pthread_join); 2055 TSAN_INTERCEPT(pthread_detach); 2056 2057 TSAN_INTERCEPT(pthread_mutex_init); 2058 TSAN_INTERCEPT(pthread_mutex_destroy); 2059 TSAN_INTERCEPT(pthread_mutex_trylock); 2060 TSAN_INTERCEPT(pthread_mutex_timedlock); 2061 2062 TSAN_INTERCEPT(pthread_spin_init); 2063 TSAN_INTERCEPT(pthread_spin_destroy); 2064 TSAN_INTERCEPT(pthread_spin_lock); 2065 TSAN_INTERCEPT(pthread_spin_trylock); 2066 TSAN_INTERCEPT(pthread_spin_unlock); 2067 2068 TSAN_INTERCEPT(pthread_rwlock_init); 2069 TSAN_INTERCEPT(pthread_rwlock_destroy); 2070 TSAN_INTERCEPT(pthread_rwlock_rdlock); 2071 TSAN_INTERCEPT(pthread_rwlock_tryrdlock); 2072 TSAN_INTERCEPT(pthread_rwlock_timedrdlock); 2073 TSAN_INTERCEPT(pthread_rwlock_wrlock); 2074 TSAN_INTERCEPT(pthread_rwlock_trywrlock); 2075 TSAN_INTERCEPT(pthread_rwlock_timedwrlock); 2076 TSAN_INTERCEPT(pthread_rwlock_unlock); 2077 2078 INTERCEPT_FUNCTION_VER(pthread_cond_destroy, GLIBC_2.3.2); 2079 INTERCEPT_FUNCTION_VER(pthread_cond_timedwait, GLIBC_2.3.2); 2080 2081 TSAN_INTERCEPT(pthread_barrier_init); 2082 TSAN_INTERCEPT(pthread_barrier_destroy); 2083 TSAN_INTERCEPT(pthread_barrier_wait); 2084 2085 TSAN_INTERCEPT(pthread_once); 2086 2087 TSAN_INTERCEPT(sem_init); 2088 TSAN_INTERCEPT(sem_destroy); 2089 TSAN_INTERCEPT(sem_wait); 2090 TSAN_INTERCEPT(sem_trywait); 2091 TSAN_INTERCEPT(sem_timedwait); 2092 TSAN_INTERCEPT(sem_post); 2093 TSAN_INTERCEPT(sem_getvalue); 2094 2095 TSAN_INTERCEPT(stat); 2096 TSAN_INTERCEPT(__xstat); 2097 TSAN_INTERCEPT(stat64); 2098 TSAN_INTERCEPT(__xstat64); 2099 TSAN_INTERCEPT(lstat); 2100 TSAN_INTERCEPT(__lxstat); 2101 TSAN_INTERCEPT(lstat64); 2102 TSAN_INTERCEPT(__lxstat64); 2103 TSAN_INTERCEPT(fstat); 2104 TSAN_INTERCEPT(__fxstat); 2105 TSAN_INTERCEPT(fstat64); 2106 TSAN_INTERCEPT(__fxstat64); 2107 TSAN_INTERCEPT(open); 2108 TSAN_INTERCEPT(open64); 2109 TSAN_INTERCEPT(creat); 2110 TSAN_INTERCEPT(creat64); 2111 TSAN_INTERCEPT(dup); 2112 TSAN_INTERCEPT(dup2); 2113 TSAN_INTERCEPT(dup3); 2114 TSAN_INTERCEPT(eventfd); 2115 TSAN_INTERCEPT(signalfd); 2116 TSAN_INTERCEPT(inotify_init); 2117 TSAN_INTERCEPT(inotify_init1); 2118 TSAN_INTERCEPT(socket); 2119 TSAN_INTERCEPT(socketpair); 2120 TSAN_INTERCEPT(connect); 2121 TSAN_INTERCEPT(bind); 2122 TSAN_INTERCEPT(listen); 2123 TSAN_INTERCEPT(epoll_create); 2124 TSAN_INTERCEPT(epoll_create1); 2125 TSAN_INTERCEPT(close); 2126 TSAN_INTERCEPT(__close); 2127 TSAN_INTERCEPT(__res_iclose); 2128 TSAN_INTERCEPT(pipe); 2129 TSAN_INTERCEPT(pipe2); 2130 2131 TSAN_INTERCEPT(send); 2132 TSAN_INTERCEPT(sendmsg); 2133 TSAN_INTERCEPT(recv); 2134 2135 TSAN_INTERCEPT(unlink); 2136 TSAN_INTERCEPT(fopen); 2137 TSAN_INTERCEPT(freopen); 2138 TSAN_INTERCEPT(fclose); 2139 TSAN_INTERCEPT(fread); 2140 TSAN_INTERCEPT(fwrite); 2141 TSAN_INTERCEPT(fflush); 2142 TSAN_INTERCEPT(abort); 2143 TSAN_INTERCEPT(puts); 2144 TSAN_INTERCEPT(rmdir); 2145 TSAN_INTERCEPT(opendir); 2146 2147 TSAN_INTERCEPT(epoll_ctl); 2148 TSAN_INTERCEPT(epoll_wait); 2149 2150 TSAN_INTERCEPT(sigaction); 2151 TSAN_INTERCEPT(signal); 2152 TSAN_INTERCEPT(sigsuspend); 2153 TSAN_INTERCEPT(raise); 2154 TSAN_INTERCEPT(kill); 2155 TSAN_INTERCEPT(pthread_kill); 2156 TSAN_INTERCEPT(sleep); 2157 TSAN_INTERCEPT(usleep); 2158 TSAN_INTERCEPT(nanosleep); 2159 TSAN_INTERCEPT(gettimeofday); 2160 TSAN_INTERCEPT(getaddrinfo); 2161 2162 TSAN_INTERCEPT(mlock); 2163 TSAN_INTERCEPT(munlock); 2164 TSAN_INTERCEPT(mlockall); 2165 TSAN_INTERCEPT(munlockall); 2166 2167 TSAN_INTERCEPT(fork); 2168 TSAN_INTERCEPT(dlopen); 2169 TSAN_INTERCEPT(dlclose); 2170 TSAN_INTERCEPT(on_exit); 2171 TSAN_INTERCEPT(__cxa_atexit); 2172 TSAN_INTERCEPT(_exit); 2173 2174 // Need to setup it, because interceptors check that the function is resolved. 2175 // But atexit is emitted directly into the module, so can't be resolved. 2176 REAL(atexit) = (int(*)(void(*)()))unreachable; 2177 atexit_ctx = new(internal_alloc(MBlockAtExit, sizeof(AtExitContext))) 2178 AtExitContext(); 2179 2180 if (REAL(__cxa_atexit)(&finalize, 0, 0)) { 2181 Printf("ThreadSanitizer: failed to setup atexit callback\n"); 2182 Die(); 2183 } 2184 2185 if (pthread_key_create(&g_thread_finalize_key, &thread_finalize)) { 2186 Printf("ThreadSanitizer: failed to create thread key\n"); 2187 Die(); 2188 } 2189 2190 FdInit(); 2191} 2192 2193void internal_start_thread(void(*func)(void *arg), void *arg) { 2194 void *th; 2195 REAL(pthread_create)(&th, 0, (void*(*)(void *arg))func, arg); 2196 REAL(pthread_detach)(th); 2197} 2198 2199} // namespace __tsan 2200