tsan_interceptors.cc revision f061554e8bbfad5e29dcd9e81feb725b75869fa0
1//===-- tsan_interceptors.cc ----------------------------------------------===// 2// 3// The LLVM Compiler Infrastructure 4// 5// This file is distributed under the University of Illinois Open Source 6// License. See LICENSE.TXT for details. 7// 8//===----------------------------------------------------------------------===// 9// 10// This file is a part of ThreadSanitizer (TSan), a race detector. 11// 12// FIXME: move as many interceptors as possible into 13// sanitizer_common/sanitizer_common_interceptors.inc 14//===----------------------------------------------------------------------===// 15 16#include "sanitizer_common/sanitizer_atomic.h" 17#include "sanitizer_common/sanitizer_libc.h" 18#include "sanitizer_common/sanitizer_linux.h" 19#include "sanitizer_common/sanitizer_platform_limits_posix.h" 20#include "sanitizer_common/sanitizer_placement_new.h" 21#include "sanitizer_common/sanitizer_stacktrace.h" 22#include "interception/interception.h" 23#include "tsan_interface.h" 24#include "tsan_platform.h" 25#include "tsan_rtl.h" 26#include "tsan_mman.h" 27#include "tsan_fd.h" 28 29using namespace __tsan; // NOLINT 30 31const int kSigCount = 64; 32 33struct my_siginfo_t { 34 // The size is determined by looking at sizeof of real siginfo_t on linux. 35 u64 opaque[128 / sizeof(u64)]; 36}; 37 38struct sigset_t { 39 // The size is determined by looking at sizeof of real sigset_t on linux. 40 u64 val[128 / sizeof(u64)]; 41}; 42 43struct ucontext_t { 44 // The size is determined by looking at sizeof of real ucontext_t on linux. 45 u64 opaque[936 / sizeof(u64) + 1]; 46}; 47 48extern "C" int pthread_attr_init(void *attr); 49extern "C" int pthread_attr_destroy(void *attr); 50extern "C" int pthread_attr_getdetachstate(void *attr, int *v); 51extern "C" int pthread_attr_setstacksize(void *attr, uptr stacksize); 52extern "C" int pthread_attr_getstacksize(void *attr, uptr *stacksize); 53extern "C" int pthread_key_create(unsigned *key, void (*destructor)(void* v)); 54extern "C" int pthread_setspecific(unsigned key, const void *v); 55extern "C" int pthread_mutexattr_gettype(void *a, int *type); 56extern "C" int pthread_yield(); 57extern "C" int pthread_sigmask(int how, const sigset_t *set, sigset_t *oldset); 58extern "C" int sigfillset(sigset_t *set); 59extern "C" void *pthread_self(); 60extern "C" void _exit(int status); 61extern "C" int *__errno_location(); 62extern "C" int fileno_unlocked(void *stream); 63extern "C" void *__libc_malloc(uptr size); 64extern "C" void *__libc_calloc(uptr size, uptr n); 65extern "C" void *__libc_realloc(void *ptr, uptr size); 66extern "C" void __libc_free(void *ptr); 67extern "C" int mallopt(int param, int value); 68const int PTHREAD_MUTEX_RECURSIVE = 1; 69const int PTHREAD_MUTEX_RECURSIVE_NP = 1; 70const int kPthreadAttrSize = 56; 71const int EINVAL = 22; 72const int EBUSY = 16; 73const int EPOLL_CTL_ADD = 1; 74const int SIGILL = 4; 75const int SIGABRT = 6; 76const int SIGFPE = 8; 77const int SIGSEGV = 11; 78const int SIGPIPE = 13; 79const int SIGBUS = 7; 80const int SIGSYS = 31; 81void *const MAP_FAILED = (void*)-1; 82const int PTHREAD_BARRIER_SERIAL_THREAD = -1; 83const int MAP_FIXED = 0x10; 84typedef long long_t; // NOLINT 85 86// From /usr/include/unistd.h 87# define F_ULOCK 0 /* Unlock a previously locked region. */ 88# define F_LOCK 1 /* Lock a region for exclusive use. */ 89# define F_TLOCK 2 /* Test and lock a region for exclusive use. */ 90# define F_TEST 3 /* Test a region for other processes locks. */ 91 92typedef void (*sighandler_t)(int sig); 93 94#define errno (*__errno_location()) 95 96struct sigaction_t { 97 union { 98 sighandler_t sa_handler; 99 void (*sa_sigaction)(int sig, my_siginfo_t *siginfo, void *uctx); 100 }; 101 sigset_t sa_mask; 102 int sa_flags; 103 void (*sa_restorer)(); 104}; 105 106const sighandler_t SIG_DFL = (sighandler_t)0; 107const sighandler_t SIG_IGN = (sighandler_t)1; 108const sighandler_t SIG_ERR = (sighandler_t)-1; 109const int SA_SIGINFO = 4; 110const int SIG_SETMASK = 2; 111 112namespace std { 113struct nothrow_t {}; 114} // namespace std 115 116static sigaction_t sigactions[kSigCount]; 117 118namespace __tsan { 119struct SignalDesc { 120 bool armed; 121 bool sigaction; 122 my_siginfo_t siginfo; 123 ucontext_t ctx; 124}; 125 126struct SignalContext { 127 int in_blocking_func; 128 int int_signal_send; 129 int pending_signal_count; 130 SignalDesc pending_signals[kSigCount]; 131}; 132} // namespace __tsan 133 134static SignalContext *SigCtx(ThreadState *thr) { 135 SignalContext *ctx = (SignalContext*)thr->signal_ctx; 136 if (ctx == 0 && thr->is_alive) { 137 ScopedInRtl in_rtl; 138 ctx = (SignalContext*)MmapOrDie(sizeof(*ctx), "SignalContext"); 139 MemoryResetRange(thr, (uptr)&SigCtx, (uptr)ctx, sizeof(*ctx)); 140 thr->signal_ctx = ctx; 141 } 142 return ctx; 143} 144 145static unsigned g_thread_finalize_key; 146 147class ScopedInterceptor { 148 public: 149 ScopedInterceptor(ThreadState *thr, const char *fname, uptr pc); 150 ~ScopedInterceptor(); 151 private: 152 ThreadState *const thr_; 153 const int in_rtl_; 154}; 155 156ScopedInterceptor::ScopedInterceptor(ThreadState *thr, const char *fname, 157 uptr pc) 158 : thr_(thr) 159 , in_rtl_(thr->in_rtl) { 160 if (thr_->in_rtl == 0) { 161 Initialize(thr); 162 FuncEntry(thr, pc); 163 thr_->in_rtl++; 164 DPrintf("#%d: intercept %s()\n", thr_->tid, fname); 165 } else { 166 thr_->in_rtl++; 167 } 168} 169 170ScopedInterceptor::~ScopedInterceptor() { 171 thr_->in_rtl--; 172 if (thr_->in_rtl == 0) { 173 FuncExit(thr_); 174 ProcessPendingSignals(thr_); 175 } 176 CHECK_EQ(in_rtl_, thr_->in_rtl); 177} 178 179#define SCOPED_INTERCEPTOR_RAW(func, ...) \ 180 ThreadState *thr = cur_thread(); \ 181 StatInc(thr, StatInterceptor); \ 182 StatInc(thr, StatInt_##func); \ 183 const uptr caller_pc = GET_CALLER_PC(); \ 184 ScopedInterceptor si(thr, #func, caller_pc); \ 185 const uptr pc = __sanitizer::StackTrace::GetCurrentPc(); \ 186 (void)pc; \ 187/**/ 188 189#define SCOPED_TSAN_INTERCEPTOR(func, ...) \ 190 SCOPED_INTERCEPTOR_RAW(func, __VA_ARGS__); \ 191 if (REAL(func) == 0) { \ 192 Printf("FATAL: ThreadSanitizer: failed to intercept %s\n", #func); \ 193 Die(); \ 194 } \ 195 if (thr->in_rtl > 1) \ 196 return REAL(func)(__VA_ARGS__); \ 197/**/ 198 199#define TSAN_INTERCEPTOR(ret, func, ...) INTERCEPTOR(ret, func, __VA_ARGS__) 200#define TSAN_INTERCEPT(func) INTERCEPT_FUNCTION(func) 201 202#define BLOCK_REAL(name) (BlockingCall(thr), REAL(name)) 203 204struct BlockingCall { 205 explicit BlockingCall(ThreadState *thr) 206 : ctx(SigCtx(thr)) { 207 ctx->in_blocking_func++; 208 } 209 210 ~BlockingCall() { 211 ctx->in_blocking_func--; 212 } 213 214 SignalContext *ctx; 215}; 216 217TSAN_INTERCEPTOR(unsigned, sleep, unsigned sec) { 218 SCOPED_TSAN_INTERCEPTOR(sleep, sec); 219 unsigned res = BLOCK_REAL(sleep)(sec); 220 AfterSleep(thr, pc); 221 return res; 222} 223 224TSAN_INTERCEPTOR(int, usleep, long_t usec) { 225 SCOPED_TSAN_INTERCEPTOR(usleep, usec); 226 int res = BLOCK_REAL(usleep)(usec); 227 AfterSleep(thr, pc); 228 return res; 229} 230 231TSAN_INTERCEPTOR(int, nanosleep, void *req, void *rem) { 232 SCOPED_TSAN_INTERCEPTOR(nanosleep, req, rem); 233 int res = BLOCK_REAL(nanosleep)(req, rem); 234 AfterSleep(thr, pc); 235 return res; 236} 237 238class AtExitContext { 239 public: 240 AtExitContext() 241 : mtx_(MutexTypeAtExit, StatMtxAtExit) 242 , pos_() { 243 } 244 245 typedef void(*atexit_t)(); 246 247 int atexit(ThreadState *thr, uptr pc, bool is_on_exit, 248 atexit_t f, void *arg) { 249 Lock l(&mtx_); 250 if (pos_ == kMaxAtExit) 251 return 1; 252 Release(thr, pc, (uptr)this); 253 stack_[pos_] = f; 254 args_[pos_] = arg; 255 is_on_exits_[pos_] = is_on_exit; 256 pos_++; 257 return 0; 258 } 259 260 void exit(ThreadState *thr, uptr pc) { 261 CHECK_EQ(thr->in_rtl, 0); 262 for (;;) { 263 atexit_t f = 0; 264 void *arg = 0; 265 bool is_on_exit = false; 266 { 267 Lock l(&mtx_); 268 if (pos_) { 269 pos_--; 270 f = stack_[pos_]; 271 arg = args_[pos_]; 272 is_on_exit = is_on_exits_[pos_]; 273 ScopedInRtl in_rtl; 274 Acquire(thr, pc, (uptr)this); 275 } 276 } 277 if (f == 0) 278 break; 279 DPrintf("#%d: executing atexit func %p\n", thr->tid, f); 280 CHECK_EQ(thr->in_rtl, 0); 281 if (is_on_exit) 282 ((void(*)(int status, void *arg))f)(0, arg); 283 else 284 ((void(*)(void *arg, void *dso))f)(arg, 0); 285 } 286 } 287 288 private: 289 static const int kMaxAtExit = 128; 290 Mutex mtx_; 291 atexit_t stack_[kMaxAtExit]; 292 void *args_[kMaxAtExit]; 293 bool is_on_exits_[kMaxAtExit]; 294 int pos_; 295}; 296 297static AtExitContext *atexit_ctx; 298 299TSAN_INTERCEPTOR(int, atexit, void (*f)()) { 300 if (cur_thread()->in_symbolizer) 301 return 0; 302 SCOPED_TSAN_INTERCEPTOR(atexit, f); 303 return atexit_ctx->atexit(thr, pc, false, (void(*)())f, 0); 304} 305 306TSAN_INTERCEPTOR(int, on_exit, void(*f)(int, void*), void *arg) { 307 if (cur_thread()->in_symbolizer) 308 return 0; 309 SCOPED_TSAN_INTERCEPTOR(on_exit, f, arg); 310 return atexit_ctx->atexit(thr, pc, true, (void(*)())f, arg); 311} 312 313TSAN_INTERCEPTOR(int, __cxa_atexit, void (*f)(void *a), void *arg, void *dso) { 314 if (cur_thread()->in_symbolizer) 315 return 0; 316 SCOPED_TSAN_INTERCEPTOR(__cxa_atexit, f, arg, dso); 317 if (dso) 318 return REAL(__cxa_atexit)(f, arg, dso); 319 return atexit_ctx->atexit(thr, pc, false, (void(*)())f, arg); 320} 321 322// Cleanup old bufs. 323static void JmpBufGarbageCollect(ThreadState *thr, uptr sp) { 324 for (uptr i = 0; i < thr->jmp_bufs.Size(); i++) { 325 JmpBuf *buf = &thr->jmp_bufs[i]; 326 if (buf->sp <= sp) { 327 uptr sz = thr->jmp_bufs.Size(); 328 thr->jmp_bufs[i] = thr->jmp_bufs[sz - 1]; 329 thr->jmp_bufs.PopBack(); 330 i--; 331 } 332 } 333} 334 335static void SetJmp(ThreadState *thr, uptr sp, uptr mangled_sp) { 336 if (thr->shadow_stack_pos == 0) // called from libc guts during bootstrap 337 return; 338 // Cleanup old bufs. 339 JmpBufGarbageCollect(thr, sp); 340 // Remember the buf. 341 JmpBuf *buf = thr->jmp_bufs.PushBack(); 342 buf->sp = sp; 343 buf->mangled_sp = mangled_sp; 344 buf->shadow_stack_pos = thr->shadow_stack_pos; 345} 346 347static void LongJmp(ThreadState *thr, uptr *env) { 348 uptr mangled_sp = env[6]; 349 // Find the saved buf by mangled_sp. 350 for (uptr i = 0; i < thr->jmp_bufs.Size(); i++) { 351 JmpBuf *buf = &thr->jmp_bufs[i]; 352 if (buf->mangled_sp == mangled_sp) { 353 CHECK_GE(thr->shadow_stack_pos, buf->shadow_stack_pos); 354 // Unwind the stack. 355 while (thr->shadow_stack_pos > buf->shadow_stack_pos) 356 FuncExit(thr); 357 JmpBufGarbageCollect(thr, buf->sp - 1); // do not collect buf->sp 358 return; 359 } 360 } 361 Printf("ThreadSanitizer: can't find longjmp buf\n"); 362 CHECK(0); 363} 364 365// FIXME: put everything below into a common extern "C" block? 366extern "C" void __tsan_setjmp(uptr sp, uptr mangled_sp) { 367 ScopedInRtl in_rtl; 368 SetJmp(cur_thread(), sp, mangled_sp); 369} 370 371// Not called. Merely to satisfy TSAN_INTERCEPT(). 372extern "C" SANITIZER_INTERFACE_ATTRIBUTE 373int __interceptor_setjmp(void *env); 374extern "C" int __interceptor_setjmp(void *env) { 375 CHECK(0); 376 return 0; 377} 378 379// FIXME: any reason to have a separate declaration? 380extern "C" SANITIZER_INTERFACE_ATTRIBUTE 381int __interceptor__setjmp(void *env); 382extern "C" int __interceptor__setjmp(void *env) { 383 CHECK(0); 384 return 0; 385} 386 387extern "C" SANITIZER_INTERFACE_ATTRIBUTE 388int __interceptor_sigsetjmp(void *env); 389extern "C" int __interceptor_sigsetjmp(void *env) { 390 CHECK(0); 391 return 0; 392} 393 394extern "C" SANITIZER_INTERFACE_ATTRIBUTE 395int __interceptor___sigsetjmp(void *env); 396extern "C" int __interceptor___sigsetjmp(void *env) { 397 CHECK(0); 398 return 0; 399} 400 401extern "C" int setjmp(void *env); 402extern "C" int _setjmp(void *env); 403extern "C" int sigsetjmp(void *env); 404extern "C" int __sigsetjmp(void *env); 405DEFINE_REAL(int, setjmp, void *env) 406DEFINE_REAL(int, _setjmp, void *env) 407DEFINE_REAL(int, sigsetjmp, void *env) 408DEFINE_REAL(int, __sigsetjmp, void *env) 409 410TSAN_INTERCEPTOR(void, longjmp, uptr *env, int val) { 411 { 412 SCOPED_TSAN_INTERCEPTOR(longjmp, env, val); 413 } 414 LongJmp(cur_thread(), env); 415 REAL(longjmp)(env, val); 416} 417 418TSAN_INTERCEPTOR(void, siglongjmp, uptr *env, int val) { 419 { 420 SCOPED_TSAN_INTERCEPTOR(siglongjmp, env, val); 421 } 422 LongJmp(cur_thread(), env); 423 REAL(siglongjmp)(env, val); 424} 425 426TSAN_INTERCEPTOR(void*, malloc, uptr size) { 427 if (cur_thread()->in_symbolizer) 428 return __libc_malloc(size); 429 void *p = 0; 430 { 431 SCOPED_INTERCEPTOR_RAW(malloc, size); 432 p = user_alloc(thr, pc, size); 433 } 434 invoke_malloc_hook(p, size); 435 return p; 436} 437 438TSAN_INTERCEPTOR(void*, __libc_memalign, uptr align, uptr sz) { 439 SCOPED_TSAN_INTERCEPTOR(__libc_memalign, align, sz); 440 return user_alloc(thr, pc, sz, align); 441} 442 443TSAN_INTERCEPTOR(void*, calloc, uptr size, uptr n) { 444 if (cur_thread()->in_symbolizer) 445 return __libc_calloc(size, n); 446 if (__sanitizer::CallocShouldReturnNullDueToOverflow(size, n)) return 0; 447 void *p = 0; 448 { 449 SCOPED_INTERCEPTOR_RAW(calloc, size, n); 450 p = user_alloc(thr, pc, n * size); 451 if (p) 452 internal_memset(p, 0, n * size); 453 } 454 invoke_malloc_hook(p, n * size); 455 return p; 456} 457 458TSAN_INTERCEPTOR(void*, realloc, void *p, uptr size) { 459 if (cur_thread()->in_symbolizer) 460 return __libc_realloc(p, size); 461 if (p) 462 invoke_free_hook(p); 463 { 464 SCOPED_INTERCEPTOR_RAW(realloc, p, size); 465 p = user_realloc(thr, pc, p, size); 466 } 467 invoke_malloc_hook(p, size); 468 return p; 469} 470 471TSAN_INTERCEPTOR(void, free, void *p) { 472 if (p == 0) 473 return; 474 if (cur_thread()->in_symbolizer) 475 return __libc_free(p); 476 invoke_free_hook(p); 477 SCOPED_INTERCEPTOR_RAW(free, p); 478 user_free(thr, pc, p); 479} 480 481TSAN_INTERCEPTOR(void, cfree, void *p) { 482 if (p == 0) 483 return; 484 if (cur_thread()->in_symbolizer) 485 return __libc_free(p); 486 invoke_free_hook(p); 487 SCOPED_INTERCEPTOR_RAW(cfree, p); 488 user_free(thr, pc, p); 489} 490 491TSAN_INTERCEPTOR(uptr, malloc_usable_size, void *p) { 492 SCOPED_INTERCEPTOR_RAW(malloc_usable_size, p); 493 return user_alloc_usable_size(thr, pc, p); 494} 495 496#define OPERATOR_NEW_BODY(mangled_name) \ 497 if (cur_thread()->in_symbolizer) \ 498 return __libc_malloc(size); \ 499 void *p = 0; \ 500 { \ 501 SCOPED_INTERCEPTOR_RAW(mangled_name, size); \ 502 p = user_alloc(thr, pc, size); \ 503 } \ 504 invoke_malloc_hook(p, size); \ 505 return p; 506 507SANITIZER_INTERFACE_ATTRIBUTE 508void *operator new(__sanitizer::uptr size); 509void *operator new(__sanitizer::uptr size) { 510 OPERATOR_NEW_BODY(_Znwm); 511} 512 513SANITIZER_INTERFACE_ATTRIBUTE 514void *operator new[](__sanitizer::uptr size); 515void *operator new[](__sanitizer::uptr size) { 516 OPERATOR_NEW_BODY(_Znam); 517} 518 519SANITIZER_INTERFACE_ATTRIBUTE 520void *operator new(__sanitizer::uptr size, std::nothrow_t const&); 521void *operator new(__sanitizer::uptr size, std::nothrow_t const&) { 522 OPERATOR_NEW_BODY(_ZnwmRKSt9nothrow_t); 523} 524 525SANITIZER_INTERFACE_ATTRIBUTE 526void *operator new[](__sanitizer::uptr size, std::nothrow_t const&); 527void *operator new[](__sanitizer::uptr size, std::nothrow_t const&) { 528 OPERATOR_NEW_BODY(_ZnamRKSt9nothrow_t); 529} 530 531#define OPERATOR_DELETE_BODY(mangled_name) \ 532 if (ptr == 0) return; \ 533 if (cur_thread()->in_symbolizer) \ 534 return __libc_free(ptr); \ 535 invoke_free_hook(ptr); \ 536 SCOPED_INTERCEPTOR_RAW(mangled_name, ptr); \ 537 user_free(thr, pc, ptr); 538 539SANITIZER_INTERFACE_ATTRIBUTE 540void operator delete(void *ptr); 541void operator delete(void *ptr) { 542 OPERATOR_DELETE_BODY(_ZdlPv); 543} 544 545SANITIZER_INTERFACE_ATTRIBUTE 546void operator delete[](void *ptr); 547void operator delete[](void *ptr) { 548 OPERATOR_DELETE_BODY(_ZdlPvRKSt9nothrow_t); 549} 550 551SANITIZER_INTERFACE_ATTRIBUTE 552void operator delete(void *ptr, std::nothrow_t const&); 553void operator delete(void *ptr, std::nothrow_t const&) { 554 OPERATOR_DELETE_BODY(_ZdaPv); 555} 556 557SANITIZER_INTERFACE_ATTRIBUTE 558void operator delete[](void *ptr, std::nothrow_t const&); 559void operator delete[](void *ptr, std::nothrow_t const&) { 560 OPERATOR_DELETE_BODY(_ZdaPvRKSt9nothrow_t); 561} 562 563TSAN_INTERCEPTOR(uptr, strlen, const char *s) { 564 SCOPED_TSAN_INTERCEPTOR(strlen, s); 565 uptr len = internal_strlen(s); 566 MemoryAccessRange(thr, pc, (uptr)s, len + 1, false); 567 return len; 568} 569 570TSAN_INTERCEPTOR(void*, memset, void *dst, int v, uptr size) { 571 SCOPED_TSAN_INTERCEPTOR(memset, dst, v, size); 572 MemoryAccessRange(thr, pc, (uptr)dst, size, true); 573 return internal_memset(dst, v, size); 574} 575 576TSAN_INTERCEPTOR(void*, memcpy, void *dst, const void *src, uptr size) { 577 SCOPED_TSAN_INTERCEPTOR(memcpy, dst, src, size); 578 MemoryAccessRange(thr, pc, (uptr)dst, size, true); 579 MemoryAccessRange(thr, pc, (uptr)src, size, false); 580 return internal_memcpy(dst, src, size); 581} 582 583TSAN_INTERCEPTOR(int, memcmp, const void *s1, const void *s2, uptr n) { 584 SCOPED_TSAN_INTERCEPTOR(memcmp, s1, s2, n); 585 int res = 0; 586 uptr len = 0; 587 for (; len < n; len++) { 588 if ((res = ((unsigned char*)s1)[len] - ((unsigned char*)s2)[len])) 589 break; 590 } 591 MemoryAccessRange(thr, pc, (uptr)s1, len < n ? len + 1 : n, false); 592 MemoryAccessRange(thr, pc, (uptr)s2, len < n ? len + 1 : n, false); 593 return res; 594} 595 596TSAN_INTERCEPTOR(void*, memchr, void *s, int c, uptr n) { 597 SCOPED_TSAN_INTERCEPTOR(memchr, s, c, n); 598 void *res = REAL(memchr)(s, c, n); 599 uptr len = res ? (char*)res - (char*)s + 1 : n; 600 MemoryAccessRange(thr, pc, (uptr)s, len, false); 601 return res; 602} 603 604TSAN_INTERCEPTOR(void*, memrchr, char *s, int c, uptr n) { 605 SCOPED_TSAN_INTERCEPTOR(memrchr, s, c, n); 606 MemoryAccessRange(thr, pc, (uptr)s, n, false); 607 return REAL(memrchr)(s, c, n); 608} 609 610TSAN_INTERCEPTOR(void*, memmove, void *dst, void *src, uptr n) { 611 SCOPED_TSAN_INTERCEPTOR(memmove, dst, src, n); 612 MemoryAccessRange(thr, pc, (uptr)dst, n, true); 613 MemoryAccessRange(thr, pc, (uptr)src, n, false); 614 return REAL(memmove)(dst, src, n); 615} 616 617TSAN_INTERCEPTOR(char*, strchr, char *s, int c) { 618 SCOPED_TSAN_INTERCEPTOR(strchr, s, c); 619 char *res = REAL(strchr)(s, c); 620 uptr len = res ? (char*)res - (char*)s + 1 : internal_strlen(s) + 1; 621 MemoryAccessRange(thr, pc, (uptr)s, len, false); 622 return res; 623} 624 625TSAN_INTERCEPTOR(char*, strchrnul, char *s, int c) { 626 SCOPED_TSAN_INTERCEPTOR(strchrnul, s, c); 627 char *res = REAL(strchrnul)(s, c); 628 uptr len = (char*)res - (char*)s + 1; 629 MemoryAccessRange(thr, pc, (uptr)s, len, false); 630 return res; 631} 632 633TSAN_INTERCEPTOR(char*, strrchr, char *s, int c) { 634 SCOPED_TSAN_INTERCEPTOR(strrchr, s, c); 635 MemoryAccessRange(thr, pc, (uptr)s, internal_strlen(s) + 1, false); 636 return REAL(strrchr)(s, c); 637} 638 639TSAN_INTERCEPTOR(char*, strcpy, char *dst, const char *src) { // NOLINT 640 SCOPED_TSAN_INTERCEPTOR(strcpy, dst, src); // NOLINT 641 uptr srclen = internal_strlen(src); 642 MemoryAccessRange(thr, pc, (uptr)dst, srclen + 1, true); 643 MemoryAccessRange(thr, pc, (uptr)src, srclen + 1, false); 644 return REAL(strcpy)(dst, src); // NOLINT 645} 646 647TSAN_INTERCEPTOR(char*, strncpy, char *dst, char *src, uptr n) { 648 SCOPED_TSAN_INTERCEPTOR(strncpy, dst, src, n); 649 uptr srclen = internal_strnlen(src, n); 650 MemoryAccessRange(thr, pc, (uptr)dst, n, true); 651 MemoryAccessRange(thr, pc, (uptr)src, min(srclen + 1, n), false); 652 return REAL(strncpy)(dst, src, n); 653} 654 655TSAN_INTERCEPTOR(const char*, strstr, const char *s1, const char *s2) { 656 SCOPED_TSAN_INTERCEPTOR(strstr, s1, s2); 657 const char *res = REAL(strstr)(s1, s2); 658 uptr len1 = internal_strlen(s1); 659 uptr len2 = internal_strlen(s2); 660 MemoryAccessRange(thr, pc, (uptr)s1, len1 + 1, false); 661 MemoryAccessRange(thr, pc, (uptr)s2, len2 + 1, false); 662 return res; 663} 664 665static bool fix_mmap_addr(void **addr, long_t sz, int flags) { 666 if (*addr) { 667 if (!IsAppMem((uptr)*addr) || !IsAppMem((uptr)*addr + sz - 1)) { 668 if (flags & MAP_FIXED) { 669 errno = EINVAL; 670 return false; 671 } else { 672 *addr = 0; 673 } 674 } 675 } 676 return true; 677} 678 679TSAN_INTERCEPTOR(void*, mmap, void *addr, long_t sz, int prot, 680 int flags, int fd, unsigned off) { 681 SCOPED_TSAN_INTERCEPTOR(mmap, addr, sz, prot, flags, fd, off); 682 if (!fix_mmap_addr(&addr, sz, flags)) 683 return MAP_FAILED; 684 void *res = REAL(mmap)(addr, sz, prot, flags, fd, off); 685 if (res != MAP_FAILED) { 686 if (fd > 0) 687 FdAccess(thr, pc, fd); 688 MemoryRangeImitateWrite(thr, pc, (uptr)res, sz); 689 } 690 return res; 691} 692 693TSAN_INTERCEPTOR(void*, mmap64, void *addr, long_t sz, int prot, 694 int flags, int fd, u64 off) { 695 SCOPED_TSAN_INTERCEPTOR(mmap64, addr, sz, prot, flags, fd, off); 696 if (!fix_mmap_addr(&addr, sz, flags)) 697 return MAP_FAILED; 698 void *res = REAL(mmap64)(addr, sz, prot, flags, fd, off); 699 if (res != MAP_FAILED) { 700 if (fd > 0) 701 FdAccess(thr, pc, fd); 702 MemoryRangeImitateWrite(thr, pc, (uptr)res, sz); 703 } 704 return res; 705} 706 707TSAN_INTERCEPTOR(int, munmap, void *addr, long_t sz) { 708 SCOPED_TSAN_INTERCEPTOR(munmap, addr, sz); 709 DontNeedShadowFor((uptr)addr, sz); 710 int res = REAL(munmap)(addr, sz); 711 return res; 712} 713 714TSAN_INTERCEPTOR(void*, memalign, uptr align, uptr sz) { 715 SCOPED_TSAN_INTERCEPTOR(memalign, align, sz); 716 return user_alloc(thr, pc, sz, align); 717} 718 719TSAN_INTERCEPTOR(void*, valloc, uptr sz) { 720 SCOPED_TSAN_INTERCEPTOR(valloc, sz); 721 return user_alloc(thr, pc, sz, GetPageSizeCached()); 722} 723 724TSAN_INTERCEPTOR(void*, pvalloc, uptr sz) { 725 SCOPED_TSAN_INTERCEPTOR(pvalloc, sz); 726 sz = RoundUp(sz, GetPageSizeCached()); 727 return user_alloc(thr, pc, sz, GetPageSizeCached()); 728} 729 730TSAN_INTERCEPTOR(int, posix_memalign, void **memptr, uptr align, uptr sz) { 731 SCOPED_TSAN_INTERCEPTOR(posix_memalign, memptr, align, sz); 732 *memptr = user_alloc(thr, pc, sz, align); 733 return 0; 734} 735 736// Used in thread-safe function static initialization. 737extern "C" int INTERFACE_ATTRIBUTE __cxa_guard_acquire(atomic_uint32_t *g) { 738 SCOPED_INTERCEPTOR_RAW(__cxa_guard_acquire, g); 739 for (;;) { 740 u32 cmp = atomic_load(g, memory_order_acquire); 741 if (cmp == 0) { 742 if (atomic_compare_exchange_strong(g, &cmp, 1<<16, memory_order_relaxed)) 743 return 1; 744 } else if (cmp == 1) { 745 Acquire(thr, pc, (uptr)g); 746 return 0; 747 } else { 748 internal_sched_yield(); 749 } 750 } 751} 752 753extern "C" void INTERFACE_ATTRIBUTE __cxa_guard_release(atomic_uint32_t *g) { 754 SCOPED_INTERCEPTOR_RAW(__cxa_guard_release, g); 755 Release(thr, pc, (uptr)g); 756 atomic_store(g, 1, memory_order_release); 757} 758 759extern "C" void INTERFACE_ATTRIBUTE __cxa_guard_abort(atomic_uint32_t *g) { 760 SCOPED_INTERCEPTOR_RAW(__cxa_guard_abort, g); 761 atomic_store(g, 0, memory_order_relaxed); 762} 763 764static void thread_finalize(void *v) { 765 uptr iter = (uptr)v; 766 if (iter > 1) { 767 if (pthread_setspecific(g_thread_finalize_key, (void*)(iter - 1))) { 768 Printf("ThreadSanitizer: failed to set thread key\n"); 769 Die(); 770 } 771 return; 772 } 773 { 774 ScopedInRtl in_rtl; 775 ThreadState *thr = cur_thread(); 776 ThreadFinish(thr); 777 SignalContext *sctx = thr->signal_ctx; 778 if (sctx) { 779 thr->signal_ctx = 0; 780 UnmapOrDie(sctx, sizeof(*sctx)); 781 } 782 } 783} 784 785 786struct ThreadParam { 787 void* (*callback)(void *arg); 788 void *param; 789 atomic_uintptr_t tid; 790}; 791 792extern "C" void *__tsan_thread_start_func(void *arg) { 793 ThreadParam *p = (ThreadParam*)arg; 794 void* (*callback)(void *arg) = p->callback; 795 void *param = p->param; 796 int tid = 0; 797 { 798 ThreadState *thr = cur_thread(); 799 ScopedInRtl in_rtl; 800 if (pthread_setspecific(g_thread_finalize_key, (void*)4)) { 801 Printf("ThreadSanitizer: failed to set thread key\n"); 802 Die(); 803 } 804 while ((tid = atomic_load(&p->tid, memory_order_acquire)) == 0) 805 pthread_yield(); 806 atomic_store(&p->tid, 0, memory_order_release); 807 ThreadStart(thr, tid, GetTid()); 808 CHECK_EQ(thr->in_rtl, 1); 809 } 810 void *res = callback(param); 811 // Prevent the callback from being tail called, 812 // it mixes up stack traces. 813 volatile int foo = 42; 814 foo++; 815 return res; 816} 817 818TSAN_INTERCEPTOR(int, pthread_create, 819 void *th, void *attr, void *(*callback)(void*), void * param) { 820 SCOPED_TSAN_INTERCEPTOR(pthread_create, th, attr, callback, param); 821 __sanitizer_pthread_attr_t myattr; 822 if (attr == 0) { 823 pthread_attr_init(&myattr); 824 attr = &myattr; 825 } 826 int detached = 0; 827 pthread_attr_getdetachstate(attr, &detached); 828 829#if defined(TSAN_DEBUG_OUTPUT) 830 int verbosity = (TSAN_DEBUG_OUTPUT); 831#else 832 int verbosity = 0; 833#endif 834 AdjustStackSizeLinux(attr, verbosity); 835 836 ThreadParam p; 837 p.callback = callback; 838 p.param = param; 839 atomic_store(&p.tid, 0, memory_order_relaxed); 840 int res = REAL(pthread_create)(th, attr, __tsan_thread_start_func, &p); 841 if (res == 0) { 842 int tid = ThreadCreate(thr, pc, *(uptr*)th, detached); 843 CHECK_NE(tid, 0); 844 atomic_store(&p.tid, tid, memory_order_release); 845 while (atomic_load(&p.tid, memory_order_acquire) != 0) 846 pthread_yield(); 847 } 848 if (attr == &myattr) 849 pthread_attr_destroy(&myattr); 850 return res; 851} 852 853TSAN_INTERCEPTOR(int, pthread_join, void *th, void **ret) { 854 SCOPED_TSAN_INTERCEPTOR(pthread_join, th, ret); 855 int tid = ThreadTid(thr, pc, (uptr)th); 856 int res = BLOCK_REAL(pthread_join)(th, ret); 857 if (res == 0) { 858 ThreadJoin(thr, pc, tid); 859 } 860 return res; 861} 862 863TSAN_INTERCEPTOR(int, pthread_detach, void *th) { 864 SCOPED_TSAN_INTERCEPTOR(pthread_detach, th); 865 int tid = ThreadTid(thr, pc, (uptr)th); 866 int res = REAL(pthread_detach)(th); 867 if (res == 0) { 868 ThreadDetach(thr, pc, tid); 869 } 870 return res; 871} 872 873TSAN_INTERCEPTOR(int, pthread_mutex_init, void *m, void *a) { 874 SCOPED_TSAN_INTERCEPTOR(pthread_mutex_init, m, a); 875 int res = REAL(pthread_mutex_init)(m, a); 876 if (res == 0) { 877 bool recursive = false; 878 if (a) { 879 int type = 0; 880 if (pthread_mutexattr_gettype(a, &type) == 0) 881 recursive = (type == PTHREAD_MUTEX_RECURSIVE 882 || type == PTHREAD_MUTEX_RECURSIVE_NP); 883 } 884 MutexCreate(thr, pc, (uptr)m, false, recursive, false); 885 } 886 return res; 887} 888 889TSAN_INTERCEPTOR(int, pthread_mutex_destroy, void *m) { 890 SCOPED_TSAN_INTERCEPTOR(pthread_mutex_destroy, m); 891 int res = REAL(pthread_mutex_destroy)(m); 892 if (res == 0 || res == EBUSY) { 893 MutexDestroy(thr, pc, (uptr)m); 894 } 895 return res; 896} 897 898TSAN_INTERCEPTOR(int, pthread_mutex_lock, void *m) { 899 SCOPED_TSAN_INTERCEPTOR(pthread_mutex_lock, m); 900 int res = REAL(pthread_mutex_lock)(m); 901 if (res == 0) { 902 MutexLock(thr, pc, (uptr)m); 903 } 904 return res; 905} 906 907TSAN_INTERCEPTOR(int, pthread_mutex_trylock, void *m) { 908 SCOPED_TSAN_INTERCEPTOR(pthread_mutex_trylock, m); 909 int res = REAL(pthread_mutex_trylock)(m); 910 if (res == 0) { 911 MutexLock(thr, pc, (uptr)m); 912 } 913 return res; 914} 915 916TSAN_INTERCEPTOR(int, pthread_mutex_timedlock, void *m, void *abstime) { 917 SCOPED_TSAN_INTERCEPTOR(pthread_mutex_timedlock, m, abstime); 918 int res = REAL(pthread_mutex_timedlock)(m, abstime); 919 if (res == 0) { 920 MutexLock(thr, pc, (uptr)m); 921 } 922 return res; 923} 924 925TSAN_INTERCEPTOR(int, pthread_mutex_unlock, void *m) { 926 SCOPED_TSAN_INTERCEPTOR(pthread_mutex_unlock, m); 927 MutexUnlock(thr, pc, (uptr)m); 928 int res = REAL(pthread_mutex_unlock)(m); 929 return res; 930} 931 932TSAN_INTERCEPTOR(int, pthread_spin_init, void *m, int pshared) { 933 SCOPED_TSAN_INTERCEPTOR(pthread_spin_init, m, pshared); 934 int res = REAL(pthread_spin_init)(m, pshared); 935 if (res == 0) { 936 MutexCreate(thr, pc, (uptr)m, false, false, false); 937 } 938 return res; 939} 940 941TSAN_INTERCEPTOR(int, pthread_spin_destroy, void *m) { 942 SCOPED_TSAN_INTERCEPTOR(pthread_spin_destroy, m); 943 int res = REAL(pthread_spin_destroy)(m); 944 if (res == 0) { 945 MutexDestroy(thr, pc, (uptr)m); 946 } 947 return res; 948} 949 950TSAN_INTERCEPTOR(int, pthread_spin_lock, void *m) { 951 SCOPED_TSAN_INTERCEPTOR(pthread_spin_lock, m); 952 int res = REAL(pthread_spin_lock)(m); 953 if (res == 0) { 954 MutexLock(thr, pc, (uptr)m); 955 } 956 return res; 957} 958 959TSAN_INTERCEPTOR(int, pthread_spin_trylock, void *m) { 960 SCOPED_TSAN_INTERCEPTOR(pthread_spin_trylock, m); 961 int res = REAL(pthread_spin_trylock)(m); 962 if (res == 0) { 963 MutexLock(thr, pc, (uptr)m); 964 } 965 return res; 966} 967 968TSAN_INTERCEPTOR(int, pthread_spin_unlock, void *m) { 969 SCOPED_TSAN_INTERCEPTOR(pthread_spin_unlock, m); 970 MutexUnlock(thr, pc, (uptr)m); 971 int res = REAL(pthread_spin_unlock)(m); 972 return res; 973} 974 975TSAN_INTERCEPTOR(int, pthread_rwlock_init, void *m, void *a) { 976 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_init, m, a); 977 int res = REAL(pthread_rwlock_init)(m, a); 978 if (res == 0) { 979 MutexCreate(thr, pc, (uptr)m, true, false, false); 980 } 981 return res; 982} 983 984TSAN_INTERCEPTOR(int, pthread_rwlock_destroy, void *m) { 985 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_destroy, m); 986 int res = REAL(pthread_rwlock_destroy)(m); 987 if (res == 0) { 988 MutexDestroy(thr, pc, (uptr)m); 989 } 990 return res; 991} 992 993TSAN_INTERCEPTOR(int, pthread_rwlock_rdlock, void *m) { 994 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_rdlock, m); 995 int res = REAL(pthread_rwlock_rdlock)(m); 996 if (res == 0) { 997 MutexReadLock(thr, pc, (uptr)m); 998 } 999 return res; 1000} 1001 1002TSAN_INTERCEPTOR(int, pthread_rwlock_tryrdlock, void *m) { 1003 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_tryrdlock, m); 1004 int res = REAL(pthread_rwlock_tryrdlock)(m); 1005 if (res == 0) { 1006 MutexReadLock(thr, pc, (uptr)m); 1007 } 1008 return res; 1009} 1010 1011TSAN_INTERCEPTOR(int, pthread_rwlock_timedrdlock, void *m, void *abstime) { 1012 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_timedrdlock, m, abstime); 1013 int res = REAL(pthread_rwlock_timedrdlock)(m, abstime); 1014 if (res == 0) { 1015 MutexReadLock(thr, pc, (uptr)m); 1016 } 1017 return res; 1018} 1019 1020TSAN_INTERCEPTOR(int, pthread_rwlock_wrlock, void *m) { 1021 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_wrlock, m); 1022 int res = REAL(pthread_rwlock_wrlock)(m); 1023 if (res == 0) { 1024 MutexLock(thr, pc, (uptr)m); 1025 } 1026 return res; 1027} 1028 1029TSAN_INTERCEPTOR(int, pthread_rwlock_trywrlock, void *m) { 1030 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_trywrlock, m); 1031 int res = REAL(pthread_rwlock_trywrlock)(m); 1032 if (res == 0) { 1033 MutexLock(thr, pc, (uptr)m); 1034 } 1035 return res; 1036} 1037 1038TSAN_INTERCEPTOR(int, pthread_rwlock_timedwrlock, void *m, void *abstime) { 1039 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_timedwrlock, m, abstime); 1040 int res = REAL(pthread_rwlock_timedwrlock)(m, abstime); 1041 if (res == 0) { 1042 MutexLock(thr, pc, (uptr)m); 1043 } 1044 return res; 1045} 1046 1047TSAN_INTERCEPTOR(int, pthread_rwlock_unlock, void *m) { 1048 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_unlock, m); 1049 MutexReadOrWriteUnlock(thr, pc, (uptr)m); 1050 int res = REAL(pthread_rwlock_unlock)(m); 1051 return res; 1052} 1053 1054TSAN_INTERCEPTOR(int, pthread_cond_init_2_3_2, void *c, void *a) { 1055 SCOPED_TSAN_INTERCEPTOR(pthread_cond_init_2_3_2, c, a); 1056 int res = REAL(pthread_cond_init_2_3_2)(c, a); 1057 return res; 1058} 1059 1060TSAN_INTERCEPTOR(int, pthread_cond_destroy_2_3_2, void *c) { 1061 SCOPED_TSAN_INTERCEPTOR(pthread_cond_destroy_2_3_2, c); 1062 int res = REAL(pthread_cond_destroy_2_3_2)(c); 1063 return res; 1064} 1065 1066TSAN_INTERCEPTOR(int, pthread_cond_signal_2_3_2, void *c) { 1067 SCOPED_TSAN_INTERCEPTOR(pthread_cond_signal_2_3_2, c); 1068 int res = REAL(pthread_cond_signal_2_3_2)(c); 1069 return res; 1070} 1071 1072TSAN_INTERCEPTOR(int, pthread_cond_broadcast_2_3_2, void *c) { 1073 SCOPED_TSAN_INTERCEPTOR(pthread_cond_broadcast_2_3_2, c); 1074 int res = REAL(pthread_cond_broadcast_2_3_2)(c); 1075 return res; 1076} 1077 1078TSAN_INTERCEPTOR(int, pthread_cond_wait_2_3_2, void *c, void *m) { 1079 SCOPED_TSAN_INTERCEPTOR(pthread_cond_wait_2_3_2, c, m); 1080 MutexUnlock(thr, pc, (uptr)m); 1081 int res = REAL(pthread_cond_wait_2_3_2)(c, m); 1082 MutexLock(thr, pc, (uptr)m); 1083 return res; 1084} 1085 1086TSAN_INTERCEPTOR(int, pthread_cond_timedwait_2_3_2, void *c, void *m, 1087 void *abstime) { 1088 SCOPED_TSAN_INTERCEPTOR(pthread_cond_timedwait_2_3_2, c, m, abstime); 1089 MutexUnlock(thr, pc, (uptr)m); 1090 int res = REAL(pthread_cond_timedwait_2_3_2)(c, m, abstime); 1091 MutexLock(thr, pc, (uptr)m); 1092 return res; 1093} 1094 1095TSAN_INTERCEPTOR(int, pthread_barrier_init, void *b, void *a, unsigned count) { 1096 SCOPED_TSAN_INTERCEPTOR(pthread_barrier_init, b, a, count); 1097 MemoryWrite(thr, pc, (uptr)b, kSizeLog1); 1098 int res = REAL(pthread_barrier_init)(b, a, count); 1099 return res; 1100} 1101 1102TSAN_INTERCEPTOR(int, pthread_barrier_destroy, void *b) { 1103 SCOPED_TSAN_INTERCEPTOR(pthread_barrier_destroy, b); 1104 MemoryWrite(thr, pc, (uptr)b, kSizeLog1); 1105 int res = REAL(pthread_barrier_destroy)(b); 1106 return res; 1107} 1108 1109TSAN_INTERCEPTOR(int, pthread_barrier_wait, void *b) { 1110 SCOPED_TSAN_INTERCEPTOR(pthread_barrier_wait, b); 1111 Release(thr, pc, (uptr)b); 1112 MemoryRead(thr, pc, (uptr)b, kSizeLog1); 1113 int res = REAL(pthread_barrier_wait)(b); 1114 MemoryRead(thr, pc, (uptr)b, kSizeLog1); 1115 if (res == 0 || res == PTHREAD_BARRIER_SERIAL_THREAD) { 1116 Acquire(thr, pc, (uptr)b); 1117 } 1118 return res; 1119} 1120 1121TSAN_INTERCEPTOR(int, pthread_once, void *o, void (*f)()) { 1122 SCOPED_TSAN_INTERCEPTOR(pthread_once, o, f); 1123 if (o == 0 || f == 0) 1124 return EINVAL; 1125 atomic_uint32_t *a = static_cast<atomic_uint32_t*>(o); 1126 u32 v = atomic_load(a, memory_order_acquire); 1127 if (v == 0 && atomic_compare_exchange_strong(a, &v, 1, 1128 memory_order_relaxed)) { 1129 const int old_in_rtl = thr->in_rtl; 1130 thr->in_rtl = 0; 1131 (*f)(); 1132 CHECK_EQ(thr->in_rtl, 0); 1133 thr->in_rtl = old_in_rtl; 1134 Release(thr, pc, (uptr)o); 1135 atomic_store(a, 2, memory_order_release); 1136 } else { 1137 while (v != 2) { 1138 pthread_yield(); 1139 v = atomic_load(a, memory_order_acquire); 1140 } 1141 Acquire(thr, pc, (uptr)o); 1142 } 1143 return 0; 1144} 1145 1146TSAN_INTERCEPTOR(int, sem_init, void *s, int pshared, unsigned value) { 1147 SCOPED_TSAN_INTERCEPTOR(sem_init, s, pshared, value); 1148 int res = REAL(sem_init)(s, pshared, value); 1149 return res; 1150} 1151 1152TSAN_INTERCEPTOR(int, sem_destroy, void *s) { 1153 SCOPED_TSAN_INTERCEPTOR(sem_destroy, s); 1154 int res = REAL(sem_destroy)(s); 1155 return res; 1156} 1157 1158TSAN_INTERCEPTOR(int, sem_wait, void *s) { 1159 SCOPED_TSAN_INTERCEPTOR(sem_wait, s); 1160 int res = BLOCK_REAL(sem_wait)(s); 1161 if (res == 0) { 1162 Acquire(thr, pc, (uptr)s); 1163 } 1164 return res; 1165} 1166 1167TSAN_INTERCEPTOR(int, sem_trywait, void *s) { 1168 SCOPED_TSAN_INTERCEPTOR(sem_trywait, s); 1169 int res = BLOCK_REAL(sem_trywait)(s); 1170 if (res == 0) { 1171 Acquire(thr, pc, (uptr)s); 1172 } 1173 return res; 1174} 1175 1176TSAN_INTERCEPTOR(int, sem_timedwait, void *s, void *abstime) { 1177 SCOPED_TSAN_INTERCEPTOR(sem_timedwait, s, abstime); 1178 int res = BLOCK_REAL(sem_timedwait)(s, abstime); 1179 if (res == 0) { 1180 Acquire(thr, pc, (uptr)s); 1181 } 1182 return res; 1183} 1184 1185TSAN_INTERCEPTOR(int, sem_post, void *s) { 1186 SCOPED_TSAN_INTERCEPTOR(sem_post, s); 1187 Release(thr, pc, (uptr)s); 1188 int res = REAL(sem_post)(s); 1189 return res; 1190} 1191 1192TSAN_INTERCEPTOR(int, sem_getvalue, void *s, int *sval) { 1193 SCOPED_TSAN_INTERCEPTOR(sem_getvalue, s, sval); 1194 int res = REAL(sem_getvalue)(s, sval); 1195 if (res == 0) { 1196 Acquire(thr, pc, (uptr)s); 1197 } 1198 return res; 1199} 1200 1201TSAN_INTERCEPTOR(int, __xstat, int version, const char *path, void *buf) { 1202 SCOPED_TSAN_INTERCEPTOR(__xstat, version, path, buf); 1203 return REAL(__xstat)(version, path, buf); 1204} 1205 1206TSAN_INTERCEPTOR(int, stat, const char *path, void *buf) { 1207 SCOPED_TSAN_INTERCEPTOR(__xstat, 0, path, buf); 1208 return REAL(__xstat)(0, path, buf); 1209} 1210 1211TSAN_INTERCEPTOR(int, __xstat64, int version, const char *path, void *buf) { 1212 SCOPED_TSAN_INTERCEPTOR(__xstat64, version, path, buf); 1213 return REAL(__xstat64)(version, path, buf); 1214} 1215 1216TSAN_INTERCEPTOR(int, stat64, const char *path, void *buf) { 1217 SCOPED_TSAN_INTERCEPTOR(__xstat64, 0, path, buf); 1218 return REAL(__xstat64)(0, path, buf); 1219} 1220 1221TSAN_INTERCEPTOR(int, __lxstat, int version, const char *path, void *buf) { 1222 SCOPED_TSAN_INTERCEPTOR(__lxstat, version, path, buf); 1223 return REAL(__lxstat)(version, path, buf); 1224} 1225 1226TSAN_INTERCEPTOR(int, lstat, const char *path, void *buf) { 1227 SCOPED_TSAN_INTERCEPTOR(__lxstat, 0, path, buf); 1228 return REAL(__lxstat)(0, path, buf); 1229} 1230 1231TSAN_INTERCEPTOR(int, __lxstat64, int version, const char *path, void *buf) { 1232 SCOPED_TSAN_INTERCEPTOR(__lxstat64, version, path, buf); 1233 return REAL(__lxstat64)(version, path, buf); 1234} 1235 1236TSAN_INTERCEPTOR(int, lstat64, const char *path, void *buf) { 1237 SCOPED_TSAN_INTERCEPTOR(__lxstat64, 0, path, buf); 1238 return REAL(__lxstat64)(0, path, buf); 1239} 1240 1241TSAN_INTERCEPTOR(int, __fxstat, int version, int fd, void *buf) { 1242 SCOPED_TSAN_INTERCEPTOR(__fxstat, version, fd, buf); 1243 if (fd > 0) 1244 FdAccess(thr, pc, fd); 1245 return REAL(__fxstat)(version, fd, buf); 1246} 1247 1248TSAN_INTERCEPTOR(int, fstat, int fd, void *buf) { 1249 SCOPED_TSAN_INTERCEPTOR(__fxstat, 0, fd, buf); 1250 if (fd > 0) 1251 FdAccess(thr, pc, fd); 1252 return REAL(__fxstat)(0, fd, buf); 1253} 1254 1255TSAN_INTERCEPTOR(int, __fxstat64, int version, int fd, void *buf) { 1256 SCOPED_TSAN_INTERCEPTOR(__fxstat64, version, fd, buf); 1257 if (fd > 0) 1258 FdAccess(thr, pc, fd); 1259 return REAL(__fxstat64)(version, fd, buf); 1260} 1261 1262TSAN_INTERCEPTOR(int, fstat64, int fd, void *buf) { 1263 SCOPED_TSAN_INTERCEPTOR(__fxstat64, 0, fd, buf); 1264 if (fd > 0) 1265 FdAccess(thr, pc, fd); 1266 return REAL(__fxstat64)(0, fd, buf); 1267} 1268 1269TSAN_INTERCEPTOR(int, open, const char *name, int flags, int mode) { 1270 SCOPED_TSAN_INTERCEPTOR(open, name, flags, mode); 1271 int fd = REAL(open)(name, flags, mode); 1272 if (fd >= 0) 1273 FdFileCreate(thr, pc, fd); 1274 return fd; 1275} 1276 1277TSAN_INTERCEPTOR(int, open64, const char *name, int flags, int mode) { 1278 SCOPED_TSAN_INTERCEPTOR(open64, name, flags, mode); 1279 int fd = REAL(open64)(name, flags, mode); 1280 if (fd >= 0) 1281 FdFileCreate(thr, pc, fd); 1282 return fd; 1283} 1284 1285TSAN_INTERCEPTOR(int, creat, const char *name, int mode) { 1286 SCOPED_TSAN_INTERCEPTOR(creat, name, mode); 1287 int fd = REAL(creat)(name, mode); 1288 if (fd >= 0) 1289 FdFileCreate(thr, pc, fd); 1290 return fd; 1291} 1292 1293TSAN_INTERCEPTOR(int, creat64, const char *name, int mode) { 1294 SCOPED_TSAN_INTERCEPTOR(creat64, name, mode); 1295 int fd = REAL(creat64)(name, mode); 1296 if (fd >= 0) 1297 FdFileCreate(thr, pc, fd); 1298 return fd; 1299} 1300 1301TSAN_INTERCEPTOR(int, dup, int oldfd) { 1302 SCOPED_TSAN_INTERCEPTOR(dup, oldfd); 1303 int newfd = REAL(dup)(oldfd); 1304 if (oldfd >= 0 && newfd >= 0 && newfd != oldfd) 1305 FdDup(thr, pc, oldfd, newfd); 1306 return newfd; 1307} 1308 1309TSAN_INTERCEPTOR(int, dup2, int oldfd, int newfd) { 1310 SCOPED_TSAN_INTERCEPTOR(dup2, oldfd, newfd); 1311 int newfd2 = REAL(dup2)(oldfd, newfd); 1312 if (oldfd >= 0 && newfd2 >= 0 && newfd2 != oldfd) 1313 FdDup(thr, pc, oldfd, newfd2); 1314 return newfd2; 1315} 1316 1317TSAN_INTERCEPTOR(int, dup3, int oldfd, int newfd, int flags) { 1318 SCOPED_TSAN_INTERCEPTOR(dup3, oldfd, newfd, flags); 1319 int newfd2 = REAL(dup3)(oldfd, newfd, flags); 1320 if (oldfd >= 0 && newfd2 >= 0 && newfd2 != oldfd) 1321 FdDup(thr, pc, oldfd, newfd2); 1322 return newfd2; 1323} 1324 1325TSAN_INTERCEPTOR(int, eventfd, unsigned initval, int flags) { 1326 SCOPED_TSAN_INTERCEPTOR(eventfd, initval, flags); 1327 int fd = REAL(eventfd)(initval, flags); 1328 if (fd >= 0) 1329 FdEventCreate(thr, pc, fd); 1330 return fd; 1331} 1332 1333TSAN_INTERCEPTOR(int, signalfd, int fd, void *mask, int flags) { 1334 SCOPED_TSAN_INTERCEPTOR(signalfd, fd, mask, flags); 1335 if (fd >= 0) 1336 FdClose(thr, pc, fd); 1337 fd = REAL(signalfd)(fd, mask, flags); 1338 if (fd >= 0) 1339 FdSignalCreate(thr, pc, fd); 1340 return fd; 1341} 1342 1343TSAN_INTERCEPTOR(int, inotify_init, int fake) { 1344 SCOPED_TSAN_INTERCEPTOR(inotify_init, fake); 1345 int fd = REAL(inotify_init)(fake); 1346 if (fd >= 0) 1347 FdInotifyCreate(thr, pc, fd); 1348 return fd; 1349} 1350 1351TSAN_INTERCEPTOR(int, inotify_init1, int flags) { 1352 SCOPED_TSAN_INTERCEPTOR(inotify_init1, flags); 1353 int fd = REAL(inotify_init1)(flags); 1354 if (fd >= 0) 1355 FdInotifyCreate(thr, pc, fd); 1356 return fd; 1357} 1358 1359TSAN_INTERCEPTOR(int, socket, int domain, int type, int protocol) { 1360 SCOPED_TSAN_INTERCEPTOR(socket, domain, type, protocol); 1361 int fd = REAL(socket)(domain, type, protocol); 1362 if (fd >= 0) 1363 FdSocketCreate(thr, pc, fd); 1364 return fd; 1365} 1366 1367TSAN_INTERCEPTOR(int, socketpair, int domain, int type, int protocol, int *fd) { 1368 SCOPED_TSAN_INTERCEPTOR(socketpair, domain, type, protocol, fd); 1369 int res = REAL(socketpair)(domain, type, protocol, fd); 1370 if (res == 0 && fd[0] >= 0 && fd[1] >= 0) 1371 FdPipeCreate(thr, pc, fd[0], fd[1]); 1372 return res; 1373} 1374 1375TSAN_INTERCEPTOR(int, connect, int fd, void *addr, unsigned addrlen) { 1376 SCOPED_TSAN_INTERCEPTOR(connect, fd, addr, addrlen); 1377 FdSocketConnecting(thr, pc, fd); 1378 int res = REAL(connect)(fd, addr, addrlen); 1379 if (res == 0 && fd >= 0) 1380 FdSocketConnect(thr, pc, fd); 1381 return res; 1382} 1383 1384TSAN_INTERCEPTOR(int, bind, int fd, void *addr, unsigned addrlen) { 1385 SCOPED_TSAN_INTERCEPTOR(bind, fd, addr, addrlen); 1386 int res = REAL(bind)(fd, addr, addrlen); 1387 if (fd > 0 && res == 0) 1388 FdAccess(thr, pc, fd); 1389 return res; 1390} 1391 1392TSAN_INTERCEPTOR(int, listen, int fd, int backlog) { 1393 SCOPED_TSAN_INTERCEPTOR(listen, fd, backlog); 1394 int res = REAL(listen)(fd, backlog); 1395 if (fd > 0 && res == 0) 1396 FdAccess(thr, pc, fd); 1397 return res; 1398} 1399 1400TSAN_INTERCEPTOR(int, epoll_create, int size) { 1401 SCOPED_TSAN_INTERCEPTOR(epoll_create, size); 1402 int fd = REAL(epoll_create)(size); 1403 if (fd >= 0) 1404 FdPollCreate(thr, pc, fd); 1405 return fd; 1406} 1407 1408TSAN_INTERCEPTOR(int, epoll_create1, int flags) { 1409 SCOPED_TSAN_INTERCEPTOR(epoll_create1, flags); 1410 int fd = REAL(epoll_create1)(flags); 1411 if (fd >= 0) 1412 FdPollCreate(thr, pc, fd); 1413 return fd; 1414} 1415 1416TSAN_INTERCEPTOR(int, close, int fd) { 1417 SCOPED_TSAN_INTERCEPTOR(close, fd); 1418 if (fd >= 0) 1419 FdClose(thr, pc, fd); 1420 return REAL(close)(fd); 1421} 1422 1423TSAN_INTERCEPTOR(int, __close, int fd) { 1424 SCOPED_TSAN_INTERCEPTOR(__close, fd); 1425 if (fd >= 0) 1426 FdClose(thr, pc, fd); 1427 return REAL(__close)(fd); 1428} 1429 1430// glibc guts 1431TSAN_INTERCEPTOR(void, __res_iclose, void *state, bool free_addr) { 1432 SCOPED_TSAN_INTERCEPTOR(__res_iclose, state, free_addr); 1433 int fds[64]; 1434 int cnt = ExtractResolvFDs(state, fds, ARRAY_SIZE(fds)); 1435 for (int i = 0; i < cnt; i++) { 1436 if (fds[i] > 0) 1437 FdClose(thr, pc, fds[i]); 1438 } 1439 REAL(__res_iclose)(state, free_addr); 1440} 1441 1442TSAN_INTERCEPTOR(int, pipe, int *pipefd) { 1443 SCOPED_TSAN_INTERCEPTOR(pipe, pipefd); 1444 int res = REAL(pipe)(pipefd); 1445 if (res == 0 && pipefd[0] >= 0 && pipefd[1] >= 0) 1446 FdPipeCreate(thr, pc, pipefd[0], pipefd[1]); 1447 return res; 1448} 1449 1450TSAN_INTERCEPTOR(int, pipe2, int *pipefd, int flags) { 1451 SCOPED_TSAN_INTERCEPTOR(pipe2, pipefd, flags); 1452 int res = REAL(pipe2)(pipefd, flags); 1453 if (res == 0 && pipefd[0] >= 0 && pipefd[1] >= 0) 1454 FdPipeCreate(thr, pc, pipefd[0], pipefd[1]); 1455 return res; 1456} 1457 1458TSAN_INTERCEPTOR(long_t, send, int fd, void *buf, long_t len, int flags) { 1459 SCOPED_TSAN_INTERCEPTOR(send, fd, buf, len, flags); 1460 if (fd >= 0) 1461 FdRelease(thr, pc, fd); 1462 int res = REAL(send)(fd, buf, len, flags); 1463 return res; 1464} 1465 1466TSAN_INTERCEPTOR(long_t, sendmsg, int fd, void *msg, int flags) { 1467 SCOPED_TSAN_INTERCEPTOR(sendmsg, fd, msg, flags); 1468 if (fd >= 0) 1469 FdRelease(thr, pc, fd); 1470 int res = REAL(sendmsg)(fd, msg, flags); 1471 return res; 1472} 1473 1474TSAN_INTERCEPTOR(long_t, recv, int fd, void *buf, long_t len, int flags) { 1475 SCOPED_TSAN_INTERCEPTOR(recv, fd, buf, len, flags); 1476 int res = REAL(recv)(fd, buf, len, flags); 1477 if (res >= 0 && fd >= 0) { 1478 FdAcquire(thr, pc, fd); 1479 } 1480 return res; 1481} 1482 1483TSAN_INTERCEPTOR(int, unlink, char *path) { 1484 SCOPED_TSAN_INTERCEPTOR(unlink, path); 1485 Release(thr, pc, File2addr(path)); 1486 int res = REAL(unlink)(path); 1487 return res; 1488} 1489 1490TSAN_INTERCEPTOR(void*, fopen, char *path, char *mode) { 1491 SCOPED_TSAN_INTERCEPTOR(fopen, path, mode); 1492 void *res = REAL(fopen)(path, mode); 1493 Acquire(thr, pc, File2addr(path)); 1494 if (res) { 1495 int fd = fileno_unlocked(res); 1496 if (fd >= 0) 1497 FdFileCreate(thr, pc, fd); 1498 } 1499 return res; 1500} 1501 1502TSAN_INTERCEPTOR(void*, freopen, char *path, char *mode, void *stream) { 1503 SCOPED_TSAN_INTERCEPTOR(freopen, path, mode, stream); 1504 if (stream) { 1505 int fd = fileno_unlocked(stream); 1506 if (fd >= 0) 1507 FdClose(thr, pc, fd); 1508 } 1509 void *res = REAL(freopen)(path, mode, stream); 1510 Acquire(thr, pc, File2addr(path)); 1511 if (res) { 1512 int fd = fileno_unlocked(res); 1513 if (fd >= 0) 1514 FdFileCreate(thr, pc, fd); 1515 } 1516 return res; 1517} 1518 1519TSAN_INTERCEPTOR(int, fclose, void *stream) { 1520 { 1521 SCOPED_TSAN_INTERCEPTOR(fclose, stream); 1522 if (stream) { 1523 int fd = fileno_unlocked(stream); 1524 if (fd >= 0) 1525 FdClose(thr, pc, fd); 1526 } 1527 } 1528 return REAL(fclose)(stream); 1529} 1530 1531TSAN_INTERCEPTOR(uptr, fread, void *ptr, uptr size, uptr nmemb, void *f) { 1532 { 1533 SCOPED_TSAN_INTERCEPTOR(fread, ptr, size, nmemb, f); 1534 MemoryAccessRange(thr, pc, (uptr)ptr, size * nmemb, true); 1535 } 1536 return REAL(fread)(ptr, size, nmemb, f); 1537} 1538 1539TSAN_INTERCEPTOR(uptr, fwrite, const void *p, uptr size, uptr nmemb, void *f) { 1540 { 1541 SCOPED_TSAN_INTERCEPTOR(fwrite, p, size, nmemb, f); 1542 MemoryAccessRange(thr, pc, (uptr)p, size * nmemb, false); 1543 } 1544 return REAL(fwrite)(p, size, nmemb, f); 1545} 1546 1547TSAN_INTERCEPTOR(int, fflush, void *stream) { 1548 SCOPED_TSAN_INTERCEPTOR(fflush, stream); 1549 return REAL(fflush)(stream); 1550} 1551 1552TSAN_INTERCEPTOR(void, abort, int fake) { 1553 SCOPED_TSAN_INTERCEPTOR(abort, fake); 1554 REAL(fflush)(0); 1555 REAL(abort)(fake); 1556} 1557 1558TSAN_INTERCEPTOR(int, puts, const char *s) { 1559 SCOPED_TSAN_INTERCEPTOR(puts, s); 1560 MemoryAccessRange(thr, pc, (uptr)s, internal_strlen(s), false); 1561 return REAL(puts)(s); 1562} 1563 1564TSAN_INTERCEPTOR(int, rmdir, char *path) { 1565 SCOPED_TSAN_INTERCEPTOR(rmdir, path); 1566 Release(thr, pc, Dir2addr(path)); 1567 int res = REAL(rmdir)(path); 1568 return res; 1569} 1570 1571TSAN_INTERCEPTOR(void*, opendir, char *path) { 1572 SCOPED_TSAN_INTERCEPTOR(opendir, path); 1573 void *res = REAL(opendir)(path); 1574 if (res != 0) 1575 Acquire(thr, pc, Dir2addr(path)); 1576 return res; 1577} 1578 1579TSAN_INTERCEPTOR(int, epoll_ctl, int epfd, int op, int fd, void *ev) { 1580 SCOPED_TSAN_INTERCEPTOR(epoll_ctl, epfd, op, fd, ev); 1581 if (op == EPOLL_CTL_ADD && epfd >= 0) { 1582 FdRelease(thr, pc, epfd); 1583 } 1584 int res = REAL(epoll_ctl)(epfd, op, fd, ev); 1585 if (fd >= 0) 1586 FdAccess(thr, pc, fd); 1587 return res; 1588} 1589 1590TSAN_INTERCEPTOR(int, epoll_wait, int epfd, void *ev, int cnt, int timeout) { 1591 SCOPED_TSAN_INTERCEPTOR(epoll_wait, epfd, ev, cnt, timeout); 1592 int res = BLOCK_REAL(epoll_wait)(epfd, ev, cnt, timeout); 1593 if (res > 0 && epfd >= 0) { 1594 FdAcquire(thr, pc, epfd); 1595 } 1596 return res; 1597} 1598 1599void ALWAYS_INLINE rtl_generic_sighandler(bool sigact, int sig, 1600 my_siginfo_t *info, void *ctx) { 1601 ThreadState *thr = cur_thread(); 1602 SignalContext *sctx = SigCtx(thr); 1603 // Don't mess with synchronous signals. 1604 if (sig == SIGSEGV || sig == SIGBUS || sig == SIGILL || 1605 sig == SIGABRT || sig == SIGFPE || sig == SIGPIPE || sig == SIGSYS || 1606 // If we are sending signal to ourselves, we must process it now. 1607 (sctx && sig == sctx->int_signal_send) || 1608 // If we are in blocking function, we can safely process it now 1609 // (but check if we are in a recursive interceptor, 1610 // i.e. pthread_join()->munmap()). 1611 (sctx && sctx->in_blocking_func == 1 && thr->in_rtl == 1)) { 1612 int in_rtl = thr->in_rtl; 1613 thr->in_rtl = 0; 1614 CHECK_EQ(thr->in_signal_handler, false); 1615 thr->in_signal_handler = true; 1616 if (sigact) 1617 sigactions[sig].sa_sigaction(sig, info, ctx); 1618 else 1619 sigactions[sig].sa_handler(sig); 1620 CHECK_EQ(thr->in_signal_handler, true); 1621 thr->in_signal_handler = false; 1622 thr->in_rtl = in_rtl; 1623 return; 1624 } 1625 1626 if (sctx == 0) 1627 return; 1628 SignalDesc *signal = &sctx->pending_signals[sig]; 1629 if (signal->armed == false) { 1630 signal->armed = true; 1631 signal->sigaction = sigact; 1632 if (info) 1633 internal_memcpy(&signal->siginfo, info, sizeof(*info)); 1634 if (ctx) 1635 internal_memcpy(&signal->ctx, ctx, sizeof(signal->ctx)); 1636 sctx->pending_signal_count++; 1637 } 1638} 1639 1640static void rtl_sighandler(int sig) { 1641 rtl_generic_sighandler(false, sig, 0, 0); 1642} 1643 1644static void rtl_sigaction(int sig, my_siginfo_t *info, void *ctx) { 1645 rtl_generic_sighandler(true, sig, info, ctx); 1646} 1647 1648TSAN_INTERCEPTOR(int, sigaction, int sig, sigaction_t *act, sigaction_t *old) { 1649 SCOPED_TSAN_INTERCEPTOR(sigaction, sig, act, old); 1650 if (old) 1651 internal_memcpy(old, &sigactions[sig], sizeof(*old)); 1652 if (act == 0) 1653 return 0; 1654 internal_memcpy(&sigactions[sig], act, sizeof(*act)); 1655 sigaction_t newact; 1656 internal_memcpy(&newact, act, sizeof(newact)); 1657 sigfillset(&newact.sa_mask); 1658 if (act->sa_handler != SIG_IGN && act->sa_handler != SIG_DFL) { 1659 if (newact.sa_flags & SA_SIGINFO) 1660 newact.sa_sigaction = rtl_sigaction; 1661 else 1662 newact.sa_handler = rtl_sighandler; 1663 } 1664 int res = REAL(sigaction)(sig, &newact, 0); 1665 return res; 1666} 1667 1668TSAN_INTERCEPTOR(sighandler_t, signal, int sig, sighandler_t h) { 1669 sigaction_t act; 1670 act.sa_handler = h; 1671 REAL(memset)(&act.sa_mask, -1, sizeof(act.sa_mask)); 1672 act.sa_flags = 0; 1673 sigaction_t old; 1674 int res = sigaction(sig, &act, &old); 1675 if (res) 1676 return SIG_ERR; 1677 return old.sa_handler; 1678} 1679 1680TSAN_INTERCEPTOR(int, sigsuspend, const sigset_t *mask) { 1681 SCOPED_TSAN_INTERCEPTOR(sigsuspend, mask); 1682 return REAL(sigsuspend)(mask); 1683} 1684 1685TSAN_INTERCEPTOR(int, raise, int sig) { 1686 SCOPED_TSAN_INTERCEPTOR(raise, sig); 1687 SignalContext *sctx = SigCtx(thr); 1688 CHECK_NE(sctx, 0); 1689 int prev = sctx->int_signal_send; 1690 sctx->int_signal_send = sig; 1691 int res = REAL(raise)(sig); 1692 CHECK_EQ(sctx->int_signal_send, sig); 1693 sctx->int_signal_send = prev; 1694 return res; 1695} 1696 1697TSAN_INTERCEPTOR(int, kill, int pid, int sig) { 1698 SCOPED_TSAN_INTERCEPTOR(kill, pid, sig); 1699 SignalContext *sctx = SigCtx(thr); 1700 CHECK_NE(sctx, 0); 1701 int prev = sctx->int_signal_send; 1702 if (pid == (int)internal_getpid()) { 1703 sctx->int_signal_send = sig; 1704 } 1705 int res = REAL(kill)(pid, sig); 1706 if (pid == (int)internal_getpid()) { 1707 CHECK_EQ(sctx->int_signal_send, sig); 1708 sctx->int_signal_send = prev; 1709 } 1710 return res; 1711} 1712 1713TSAN_INTERCEPTOR(int, pthread_kill, void *tid, int sig) { 1714 SCOPED_TSAN_INTERCEPTOR(pthread_kill, tid, sig); 1715 SignalContext *sctx = SigCtx(thr); 1716 CHECK_NE(sctx, 0); 1717 int prev = sctx->int_signal_send; 1718 if (tid == pthread_self()) { 1719 sctx->int_signal_send = sig; 1720 } 1721 int res = REAL(pthread_kill)(tid, sig); 1722 if (tid == pthread_self()) { 1723 CHECK_EQ(sctx->int_signal_send, sig); 1724 sctx->int_signal_send = prev; 1725 } 1726 return res; 1727} 1728 1729TSAN_INTERCEPTOR(int, gettimeofday, void *tv, void *tz) { 1730 SCOPED_TSAN_INTERCEPTOR(gettimeofday, tv, tz); 1731 // It's intercepted merely to process pending signals. 1732 return REAL(gettimeofday)(tv, tz); 1733} 1734 1735TSAN_INTERCEPTOR(int, getaddrinfo, void *node, void *service, 1736 void *hints, void *rv) { 1737 SCOPED_TSAN_INTERCEPTOR(getaddrinfo, node, service, hints, rv); 1738 // We miss atomic synchronization in getaddrinfo, 1739 // and can report false race between malloc and free 1740 // inside of getaddrinfo. So ignore memory accesses. 1741 IgnoreCtl(thr, true, true); 1742 IgnoreCtl(thr, false, true); 1743 int res = REAL(getaddrinfo)(node, service, hints, rv); 1744 IgnoreCtl(thr, true, false); 1745 IgnoreCtl(thr, false, false); 1746 return res; 1747} 1748 1749// Linux kernel has a bug that leads to kernel deadlock if a process 1750// maps TBs of memory and then calls mlock(). 1751static void MlockIsUnsupported() { 1752 static atomic_uint8_t printed; 1753 if (atomic_exchange(&printed, 1, memory_order_relaxed)) 1754 return; 1755 if (flags()->verbosity > 0) 1756 Printf("INFO: ThreadSanitizer ignores mlock/mlockall/munlock/munlockall\n"); 1757} 1758 1759TSAN_INTERCEPTOR(int, mlock, const void *addr, uptr len) { 1760 MlockIsUnsupported(); 1761 return 0; 1762} 1763 1764TSAN_INTERCEPTOR(int, munlock, const void *addr, uptr len) { 1765 MlockIsUnsupported(); 1766 return 0; 1767} 1768 1769TSAN_INTERCEPTOR(int, mlockall, int flags) { 1770 MlockIsUnsupported(); 1771 return 0; 1772} 1773 1774TSAN_INTERCEPTOR(int, munlockall, void) { 1775 MlockIsUnsupported(); 1776 return 0; 1777} 1778 1779TSAN_INTERCEPTOR(int, fork, int fake) { 1780 SCOPED_TSAN_INTERCEPTOR(fork, fake); 1781 // It's intercepted merely to process pending signals. 1782 int pid = REAL(fork)(fake); 1783 if (pid == 0) { 1784 // child 1785 FdOnFork(thr, pc); 1786 } else if (pid > 0) { 1787 // parent 1788 } 1789 return pid; 1790} 1791 1792struct TsanInterceptorContext { 1793 ThreadState *thr; 1794 const uptr caller_pc; 1795 const uptr pc; 1796}; 1797 1798#include "sanitizer_common/sanitizer_platform_interceptors.h" 1799// Causes interceptor recursion (getpwuid_r() calls fopen()) 1800#undef SANITIZER_INTERCEPT_GETPWNAM_AND_FRIENDS 1801#undef SANITIZER_INTERCEPT_GETPWNAM_R_AND_FRIENDS 1802// Causes interceptor recursion (getaddrinfo() and fopen()) 1803#undef SANITIZER_INTERCEPT_GETADDRINFO 1804#undef SANITIZER_INTERCEPT_GETNAMEINFO 1805// Causes interceptor recursion (glob64() calls lstat64()) 1806#undef SANITIZER_INTERCEPT_GLOB 1807 1808#define COMMON_INTERCEPTOR_UNPOISON_PARAM(ctx, count) \ 1809 do { \ 1810 } while (false) 1811#define COMMON_INTERCEPTOR_WRITE_RANGE(ctx, ptr, size) \ 1812 MemoryAccessRange(((TsanInterceptorContext *)ctx)->thr, \ 1813 ((TsanInterceptorContext *)ctx)->pc, (uptr)ptr, size, \ 1814 true) 1815#define COMMON_INTERCEPTOR_READ_RANGE(ctx, ptr, size) \ 1816 MemoryAccessRange(((TsanInterceptorContext *) ctx)->thr, \ 1817 ((TsanInterceptorContext *) ctx)->pc, (uptr) ptr, size, \ 1818 false) 1819#define COMMON_INTERCEPTOR_ENTER(ctx, func, ...) \ 1820 SCOPED_TSAN_INTERCEPTOR(func, __VA_ARGS__); \ 1821 TsanInterceptorContext _ctx = {thr, caller_pc, pc}; \ 1822 ctx = (void *)&_ctx; \ 1823 (void) ctx; 1824#define COMMON_INTERCEPTOR_FD_ACQUIRE(ctx, fd) \ 1825 FdAcquire(((TsanInterceptorContext *) ctx)->thr, pc, fd) 1826#define COMMON_INTERCEPTOR_FD_RELEASE(ctx, fd) \ 1827 FdRelease(((TsanInterceptorContext *) ctx)->thr, pc, fd) 1828#define COMMON_INTERCEPTOR_FD_SOCKET_ACCEPT(ctx, fd, newfd) \ 1829 FdSocketAccept(((TsanInterceptorContext *) ctx)->thr, pc, fd, newfd) 1830#define COMMON_INTERCEPTOR_SET_THREAD_NAME(ctx, name) \ 1831 ThreadSetName(((TsanInterceptorContext *) ctx)->thr, name) 1832#define COMMON_INTERCEPTOR_BLOCK_REAL(name) BLOCK_REAL(name) 1833#include "sanitizer_common/sanitizer_common_interceptors.inc" 1834 1835// FIXME: Implement these with MemoryAccessRange(). 1836#define COMMON_SYSCALL_PRE_READ_RANGE(p, s) 1837#define COMMON_SYSCALL_PRE_WRITE_RANGE(p, s) 1838#define COMMON_SYSCALL_POST_READ_RANGE(p, s) 1839#define COMMON_SYSCALL_POST_WRITE_RANGE(p, s) 1840#include "sanitizer_common/sanitizer_common_syscalls.inc" 1841 1842namespace __tsan { 1843 1844void ProcessPendingSignals(ThreadState *thr) { 1845 CHECK_EQ(thr->in_rtl, 0); 1846 SignalContext *sctx = SigCtx(thr); 1847 if (sctx == 0 || sctx->pending_signal_count == 0 || thr->in_signal_handler) 1848 return; 1849 Context *ctx = CTX(); 1850 thr->in_signal_handler = true; 1851 sctx->pending_signal_count = 0; 1852 // These are too big for stack. 1853 static THREADLOCAL sigset_t emptyset, oldset; 1854 sigfillset(&emptyset); 1855 pthread_sigmask(SIG_SETMASK, &emptyset, &oldset); 1856 for (int sig = 0; sig < kSigCount; sig++) { 1857 SignalDesc *signal = &sctx->pending_signals[sig]; 1858 if (signal->armed) { 1859 signal->armed = false; 1860 if (sigactions[sig].sa_handler != SIG_DFL 1861 && sigactions[sig].sa_handler != SIG_IGN) { 1862 // Insure that the handler does not spoil errno. 1863 const int saved_errno = errno; 1864 errno = 0; 1865 if (signal->sigaction) 1866 sigactions[sig].sa_sigaction(sig, &signal->siginfo, &signal->ctx); 1867 else 1868 sigactions[sig].sa_handler(sig); 1869 if (flags()->report_bugs && errno != 0) { 1870 ScopedInRtl in_rtl; 1871 __tsan::StackTrace stack; 1872 uptr pc = signal->sigaction ? 1873 (uptr)sigactions[sig].sa_sigaction : 1874 (uptr)sigactions[sig].sa_handler; 1875 pc += 1; // return address is expected, OutputReport() will undo this 1876 stack.Init(&pc, 1); 1877 ThreadRegistryLock l(ctx->thread_registry); 1878 ScopedReport rep(ReportTypeErrnoInSignal); 1879 if (!IsFiredSuppression(ctx, rep, stack)) { 1880 rep.AddStack(&stack); 1881 OutputReport(ctx, rep, rep.GetReport()->stacks[0]); 1882 } 1883 } 1884 errno = saved_errno; 1885 } 1886 } 1887 } 1888 pthread_sigmask(SIG_SETMASK, &oldset, 0); 1889 CHECK_EQ(thr->in_signal_handler, true); 1890 thr->in_signal_handler = false; 1891} 1892 1893static void finalize(void *arg) { 1894 ThreadState * thr = cur_thread(); 1895 uptr pc = 0; 1896 atexit_ctx->exit(thr, pc); 1897 int status = Finalize(cur_thread()); 1898 REAL(fflush)(0); 1899 if (status) 1900 _exit(status); 1901} 1902 1903static void unreachable() { 1904 Printf("FATAL: ThreadSanitizer: unreachable called\n"); 1905 Die(); 1906} 1907 1908void InitializeInterceptors() { 1909 CHECK_GT(cur_thread()->in_rtl, 0); 1910 1911 // We need to setup it early, because functions like dlsym() can call it. 1912 REAL(memset) = internal_memset; 1913 REAL(memcpy) = internal_memcpy; 1914 REAL(memcmp) = internal_memcmp; 1915 1916 // Instruct libc malloc to consume less memory. 1917 mallopt(1, 0); // M_MXFAST 1918 mallopt(-3, 32*1024); // M_MMAP_THRESHOLD 1919 1920 SANITIZER_COMMON_INTERCEPTORS_INIT; 1921 1922 TSAN_INTERCEPT(setjmp); 1923 TSAN_INTERCEPT(_setjmp); 1924 TSAN_INTERCEPT(sigsetjmp); 1925 TSAN_INTERCEPT(__sigsetjmp); 1926 TSAN_INTERCEPT(longjmp); 1927 TSAN_INTERCEPT(siglongjmp); 1928 1929 TSAN_INTERCEPT(malloc); 1930 TSAN_INTERCEPT(__libc_memalign); 1931 TSAN_INTERCEPT(calloc); 1932 TSAN_INTERCEPT(realloc); 1933 TSAN_INTERCEPT(free); 1934 TSAN_INTERCEPT(cfree); 1935 TSAN_INTERCEPT(mmap); 1936 TSAN_INTERCEPT(mmap64); 1937 TSAN_INTERCEPT(munmap); 1938 TSAN_INTERCEPT(memalign); 1939 TSAN_INTERCEPT(valloc); 1940 TSAN_INTERCEPT(pvalloc); 1941 TSAN_INTERCEPT(posix_memalign); 1942 1943 TSAN_INTERCEPT(strlen); 1944 TSAN_INTERCEPT(memset); 1945 TSAN_INTERCEPT(memcpy); 1946 TSAN_INTERCEPT(memchr); 1947 TSAN_INTERCEPT(memrchr); 1948 TSAN_INTERCEPT(memmove); 1949 TSAN_INTERCEPT(memcmp); 1950 TSAN_INTERCEPT(strchr); 1951 TSAN_INTERCEPT(strchrnul); 1952 TSAN_INTERCEPT(strrchr); 1953 TSAN_INTERCEPT(strcpy); // NOLINT 1954 TSAN_INTERCEPT(strncpy); 1955 TSAN_INTERCEPT(strstr); 1956 1957 TSAN_INTERCEPT(pthread_create); 1958 TSAN_INTERCEPT(pthread_join); 1959 TSAN_INTERCEPT(pthread_detach); 1960 1961 TSAN_INTERCEPT(pthread_mutex_init); 1962 TSAN_INTERCEPT(pthread_mutex_destroy); 1963 TSAN_INTERCEPT(pthread_mutex_lock); 1964 TSAN_INTERCEPT(pthread_mutex_trylock); 1965 TSAN_INTERCEPT(pthread_mutex_timedlock); 1966 TSAN_INTERCEPT(pthread_mutex_unlock); 1967 1968 TSAN_INTERCEPT(pthread_spin_init); 1969 TSAN_INTERCEPT(pthread_spin_destroy); 1970 TSAN_INTERCEPT(pthread_spin_lock); 1971 TSAN_INTERCEPT(pthread_spin_trylock); 1972 TSAN_INTERCEPT(pthread_spin_unlock); 1973 1974 TSAN_INTERCEPT(pthread_rwlock_init); 1975 TSAN_INTERCEPT(pthread_rwlock_destroy); 1976 TSAN_INTERCEPT(pthread_rwlock_rdlock); 1977 TSAN_INTERCEPT(pthread_rwlock_tryrdlock); 1978 TSAN_INTERCEPT(pthread_rwlock_timedrdlock); 1979 TSAN_INTERCEPT(pthread_rwlock_wrlock); 1980 TSAN_INTERCEPT(pthread_rwlock_trywrlock); 1981 TSAN_INTERCEPT(pthread_rwlock_timedwrlock); 1982 TSAN_INTERCEPT(pthread_rwlock_unlock); 1983 1984 INTERCEPT_FUNCTION_VER(pthread_cond_init, pthread_cond_init_2_3_2, 1985 GLIBC_2.3.2); 1986 INTERCEPT_FUNCTION_VER(pthread_cond_destroy, pthread_cond_destroy_2_3_2, 1987 GLIBC_2.3.2); 1988 INTERCEPT_FUNCTION_VER(pthread_cond_signal, pthread_cond_signal_2_3_2, 1989 GLIBC_2.3.2); 1990 INTERCEPT_FUNCTION_VER(pthread_cond_broadcast, pthread_cond_broadcast_2_3_2, 1991 GLIBC_2.3.2); 1992 INTERCEPT_FUNCTION_VER(pthread_cond_wait, pthread_cond_wait_2_3_2, 1993 GLIBC_2.3.2); 1994 INTERCEPT_FUNCTION_VER(pthread_cond_timedwait, pthread_cond_timedwait_2_3_2, 1995 GLIBC_2.3.2); 1996 1997 TSAN_INTERCEPT(pthread_barrier_init); 1998 TSAN_INTERCEPT(pthread_barrier_destroy); 1999 TSAN_INTERCEPT(pthread_barrier_wait); 2000 2001 TSAN_INTERCEPT(pthread_once); 2002 2003 TSAN_INTERCEPT(sem_init); 2004 TSAN_INTERCEPT(sem_destroy); 2005 TSAN_INTERCEPT(sem_wait); 2006 TSAN_INTERCEPT(sem_trywait); 2007 TSAN_INTERCEPT(sem_timedwait); 2008 TSAN_INTERCEPT(sem_post); 2009 TSAN_INTERCEPT(sem_getvalue); 2010 2011 TSAN_INTERCEPT(stat); 2012 TSAN_INTERCEPT(__xstat); 2013 TSAN_INTERCEPT(stat64); 2014 TSAN_INTERCEPT(__xstat64); 2015 TSAN_INTERCEPT(lstat); 2016 TSAN_INTERCEPT(__lxstat); 2017 TSAN_INTERCEPT(lstat64); 2018 TSAN_INTERCEPT(__lxstat64); 2019 TSAN_INTERCEPT(fstat); 2020 TSAN_INTERCEPT(__fxstat); 2021 TSAN_INTERCEPT(fstat64); 2022 TSAN_INTERCEPT(__fxstat64); 2023 TSAN_INTERCEPT(open); 2024 TSAN_INTERCEPT(open64); 2025 TSAN_INTERCEPT(creat); 2026 TSAN_INTERCEPT(creat64); 2027 TSAN_INTERCEPT(dup); 2028 TSAN_INTERCEPT(dup2); 2029 TSAN_INTERCEPT(dup3); 2030 TSAN_INTERCEPT(eventfd); 2031 TSAN_INTERCEPT(signalfd); 2032 TSAN_INTERCEPT(inotify_init); 2033 TSAN_INTERCEPT(inotify_init1); 2034 TSAN_INTERCEPT(socket); 2035 TSAN_INTERCEPT(socketpair); 2036 TSAN_INTERCEPT(connect); 2037 TSAN_INTERCEPT(bind); 2038 TSAN_INTERCEPT(listen); 2039 TSAN_INTERCEPT(epoll_create); 2040 TSAN_INTERCEPT(epoll_create1); 2041 TSAN_INTERCEPT(close); 2042 TSAN_INTERCEPT(__close); 2043 TSAN_INTERCEPT(__res_iclose); 2044 TSAN_INTERCEPT(pipe); 2045 TSAN_INTERCEPT(pipe2); 2046 2047 TSAN_INTERCEPT(send); 2048 TSAN_INTERCEPT(sendmsg); 2049 TSAN_INTERCEPT(recv); 2050 2051 TSAN_INTERCEPT(unlink); 2052 TSAN_INTERCEPT(fopen); 2053 TSAN_INTERCEPT(freopen); 2054 TSAN_INTERCEPT(fclose); 2055 TSAN_INTERCEPT(fread); 2056 TSAN_INTERCEPT(fwrite); 2057 TSAN_INTERCEPT(fflush); 2058 TSAN_INTERCEPT(abort); 2059 TSAN_INTERCEPT(puts); 2060 TSAN_INTERCEPT(rmdir); 2061 TSAN_INTERCEPT(opendir); 2062 2063 TSAN_INTERCEPT(epoll_ctl); 2064 TSAN_INTERCEPT(epoll_wait); 2065 2066 TSAN_INTERCEPT(sigaction); 2067 TSAN_INTERCEPT(signal); 2068 TSAN_INTERCEPT(sigsuspend); 2069 TSAN_INTERCEPT(raise); 2070 TSAN_INTERCEPT(kill); 2071 TSAN_INTERCEPT(pthread_kill); 2072 TSAN_INTERCEPT(sleep); 2073 TSAN_INTERCEPT(usleep); 2074 TSAN_INTERCEPT(nanosleep); 2075 TSAN_INTERCEPT(gettimeofday); 2076 TSAN_INTERCEPT(getaddrinfo); 2077 2078 TSAN_INTERCEPT(mlock); 2079 TSAN_INTERCEPT(munlock); 2080 TSAN_INTERCEPT(mlockall); 2081 TSAN_INTERCEPT(munlockall); 2082 2083 TSAN_INTERCEPT(fork); 2084 TSAN_INTERCEPT(on_exit); 2085 TSAN_INTERCEPT(__cxa_atexit); 2086 2087 // Need to setup it, because interceptors check that the function is resolved. 2088 // But atexit is emitted directly into the module, so can't be resolved. 2089 REAL(atexit) = (int(*)(void(*)()))unreachable; 2090 atexit_ctx = new(internal_alloc(MBlockAtExit, sizeof(AtExitContext))) 2091 AtExitContext(); 2092 2093 if (REAL(__cxa_atexit)(&finalize, 0, 0)) { 2094 Printf("ThreadSanitizer: failed to setup atexit callback\n"); 2095 Die(); 2096 } 2097 2098 if (pthread_key_create(&g_thread_finalize_key, &thread_finalize)) { 2099 Printf("ThreadSanitizer: failed to create thread key\n"); 2100 Die(); 2101 } 2102 2103 FdInit(); 2104} 2105 2106void internal_start_thread(void(*func)(void *arg), void *arg) { 2107 void *th; 2108 REAL(pthread_create)(&th, 0, (void*(*)(void *arg))func, arg); 2109 REAL(pthread_detach)(th); 2110} 2111 2112} // namespace __tsan 2113