blob: a2033eb8de1fc0930f9d5f5326ed948c350b511c [file] [log] [blame]
Alexey Samsonov4f0ea392012-09-24 13:19:47 +00001//===-- tsan_interceptors.cc ----------------------------------------------===//
Kostya Serebryany7ac41482012-05-10 13:48:04 +00002//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9//
10// This file is a part of ThreadSanitizer (TSan), a race detector.
11//
Kostya Serebryany8530e2b2012-12-12 09:54:35 +000012// FIXME: move as many interceptors as possible into
Dmitry Vyukovedd28212013-04-24 11:06:05 +000013// sanitizer_common/sanitizer_common_interceptors.inc
Kostya Serebryany7ac41482012-05-10 13:48:04 +000014//===----------------------------------------------------------------------===//
15
Dmitry Vyukovfce5bd42012-06-29 16:58:33 +000016#include "sanitizer_common/sanitizer_atomic.h"
Alexey Samsonov230c3be2012-06-06 09:26:25 +000017#include "sanitizer_common/sanitizer_libc.h"
Evgeniy Stepanovb9bf7002013-03-19 09:30:52 +000018#include "sanitizer_common/sanitizer_linux.h"
Alexey Samsonov47a0f6e2013-03-14 07:13:00 +000019#include "sanitizer_common/sanitizer_platform_limits_posix.h"
Alexey Samsonov47b16342012-06-07 09:50:16 +000020#include "sanitizer_common/sanitizer_placement_new.h"
Alexey Samsonov7eff3112012-09-27 09:50:19 +000021#include "sanitizer_common/sanitizer_stacktrace.h"
Dmitry Vyukov36decbf2012-12-05 10:16:17 +000022#include "interception/interception.h"
Kostya Serebryany7ac41482012-05-10 13:48:04 +000023#include "tsan_interface.h"
Kostya Serebryany7ac41482012-05-10 13:48:04 +000024#include "tsan_platform.h"
Dmitry Vyukov4af0f212013-10-03 13:37:17 +000025#include "tsan_suppressions.h"
Alexey Samsonov4f0ea392012-09-24 13:19:47 +000026#include "tsan_rtl.h"
Kostya Serebryany7ac41482012-05-10 13:48:04 +000027#include "tsan_mman.h"
Dmitry Vyukovc78839f2012-12-12 11:59:30 +000028#include "tsan_fd.h"
Kostya Serebryany7ac41482012-05-10 13:48:04 +000029
30using namespace __tsan; // NOLINT
31
Dmitry Vyukov236a0982013-03-20 14:57:28 +000032const int kSigCount = 64;
Dmitry Vyukove9636662012-06-27 16:05:06 +000033
34struct my_siginfo_t {
Dmitry Vyukov4219ea32013-03-21 06:28:04 +000035 // The size is determined by looking at sizeof of real siginfo_t on linux.
Dmitry Vyukov236a0982013-03-20 14:57:28 +000036 u64 opaque[128 / sizeof(u64)];
Dmitry Vyukove9636662012-06-27 16:05:06 +000037};
38
Kostya Serebryany7ac41482012-05-10 13:48:04 +000039struct ucontext_t {
Dmitry Vyukov4219ea32013-03-21 06:28:04 +000040 // The size is determined by looking at sizeof of real ucontext_t on linux.
Dmitry Vyukov236a0982013-03-20 14:57:28 +000041 u64 opaque[936 / sizeof(u64) + 1];
Kostya Serebryany7ac41482012-05-10 13:48:04 +000042};
43
44extern "C" int pthread_attr_init(void *attr);
45extern "C" int pthread_attr_destroy(void *attr);
Evgeniy Stepanove236dbb2013-10-25 13:01:31 +000046DECLARE_REAL(int, pthread_attr_getdetachstate, void *, void *)
Kostya Serebryany7ac41482012-05-10 13:48:04 +000047extern "C" int pthread_attr_setstacksize(void *attr, uptr stacksize);
Kostya Serebryany7ac41482012-05-10 13:48:04 +000048extern "C" int pthread_key_create(unsigned *key, void (*destructor)(void* v));
49extern "C" int pthread_setspecific(unsigned key, const void *v);
50extern "C" int pthread_mutexattr_gettype(void *a, int *type);
51extern "C" int pthread_yield();
Evgeniy Stepanov9a949a82013-09-25 14:47:43 +000052extern "C" int pthread_sigmask(int how, const __sanitizer_sigset_t *set,
53 __sanitizer_sigset_t *oldset);
54// REAL(sigfillset) defined in common interceptors.
55DECLARE_REAL(int, sigfillset, __sanitizer_sigset_t *set)
Kostya Serebryany7ac41482012-05-10 13:48:04 +000056extern "C" void *pthread_self();
Kostya Serebryany7ac41482012-05-10 13:48:04 +000057extern "C" void _exit(int status);
Kostya Serebryany7ac41482012-05-10 13:48:04 +000058extern "C" int *__errno_location();
Dmitry Vyukovf17b3822013-01-09 11:54:52 +000059extern "C" int fileno_unlocked(void *stream);
Dmitry Vyukov31c05ea2013-01-29 13:05:30 +000060extern "C" void *__libc_malloc(uptr size);
61extern "C" void *__libc_calloc(uptr size, uptr n);
62extern "C" void *__libc_realloc(void *ptr, uptr size);
63extern "C" void __libc_free(void *ptr);
Dmitry Vyukov8e1c7692013-03-19 12:24:19 +000064extern "C" int mallopt(int param, int value);
Kostya Serebryany7ac41482012-05-10 13:48:04 +000065const int PTHREAD_MUTEX_RECURSIVE = 1;
66const int PTHREAD_MUTEX_RECURSIVE_NP = 1;
Kostya Serebryany7ac41482012-05-10 13:48:04 +000067const int EINVAL = 22;
68const int EBUSY = 16;
69const int EPOLL_CTL_ADD = 1;
Dmitry Vyukovd91d0672012-05-21 08:26:51 +000070const int SIGILL = 4;
71const int SIGABRT = 6;
72const int SIGFPE = 8;
73const int SIGSEGV = 11;
74const int SIGPIPE = 13;
75const int SIGBUS = 7;
Dmitry Vyukov158ca522013-07-18 13:14:11 +000076const int SIGSYS = 31;
Kostya Serebryany7ac41482012-05-10 13:48:04 +000077void *const MAP_FAILED = (void*)-1;
78const int PTHREAD_BARRIER_SERIAL_THREAD = -1;
79const int MAP_FIXED = 0x10;
80typedef long long_t; // NOLINT
81
Alexander Potapenko0ce948e2012-09-11 09:26:35 +000082// From /usr/include/unistd.h
83# define F_ULOCK 0 /* Unlock a previously locked region. */
84# define F_LOCK 1 /* Lock a region for exclusive use. */
85# define F_TLOCK 2 /* Test and lock a region for exclusive use. */
86# define F_TEST 3 /* Test a region for other processes locks. */
87
Kostya Serebryany7ac41482012-05-10 13:48:04 +000088typedef void (*sighandler_t)(int sig);
89
Dmitry Vyukov7a72b4a2012-06-27 13:54:46 +000090#define errno (*__errno_location())
91
Kostya Serebryany7ac41482012-05-10 13:48:04 +000092struct sigaction_t {
93 union {
94 sighandler_t sa_handler;
95 void (*sa_sigaction)(int sig, my_siginfo_t *siginfo, void *uctx);
96 };
Evgeniy Stepanov9a949a82013-09-25 14:47:43 +000097 __sanitizer_sigset_t sa_mask;
Kostya Serebryany7ac41482012-05-10 13:48:04 +000098 int sa_flags;
99 void (*sa_restorer)();
100};
101
102const sighandler_t SIG_DFL = (sighandler_t)0;
103const sighandler_t SIG_IGN = (sighandler_t)1;
Dmitry Vyukovd91d0672012-05-21 08:26:51 +0000104const sighandler_t SIG_ERR = (sighandler_t)-1;
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000105const int SA_SIGINFO = 4;
106const int SIG_SETMASK = 2;
107
Alexey Samsonov7eff3112012-09-27 09:50:19 +0000108namespace std {
109struct nothrow_t {};
110} // namespace std
111
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000112static sigaction_t sigactions[kSigCount];
113
Dmitry Vyukove9636662012-06-27 16:05:06 +0000114namespace __tsan {
115struct SignalDesc {
116 bool armed;
117 bool sigaction;
118 my_siginfo_t siginfo;
119 ucontext_t ctx;
120};
121
122struct SignalContext {
Dmitry Vyukovee8ee242012-11-15 17:40:49 +0000123 int in_blocking_func;
Dmitry Vyukove9636662012-06-27 16:05:06 +0000124 int int_signal_send;
125 int pending_signal_count;
126 SignalDesc pending_signals[kSigCount];
127};
Dmitry Vyukovd1886532013-09-21 23:06:00 +0000128
Dmitry Vyukov4af0f212013-10-03 13:37:17 +0000129// The object is 64-byte aligned, because we want hot data to be located in
130// a single cache line if possible (it's accessed in every interceptor).
131static ALIGNED(64) char libignore_placeholder[sizeof(LibIgnore)];
132static LibIgnore *libignore() {
133 return reinterpret_cast<LibIgnore*>(&libignore_placeholder[0]);
134}
Dmitry Vyukovd1886532013-09-21 23:06:00 +0000135
Dmitry Vyukov4af0f212013-10-03 13:37:17 +0000136void InitializeLibIgnore() {
137 libignore()->Init(*GetSuppressionContext());
Dmitry Vyukov3dbbd852013-10-15 11:34:59 +0000138 libignore()->OnLibraryLoaded(0);
Dmitry Vyukovd1886532013-09-21 23:06:00 +0000139}
140
Alexey Samsonovba5e9962013-01-30 07:45:58 +0000141} // namespace __tsan
Dmitry Vyukove9636662012-06-27 16:05:06 +0000142
143static SignalContext *SigCtx(ThreadState *thr) {
144 SignalContext *ctx = (SignalContext*)thr->signal_ctx;
Dmitry Vyukov1fc03d52012-06-28 18:07:46 +0000145 if (ctx == 0 && thr->is_alive) {
Dmitry Vyukove9636662012-06-27 16:05:06 +0000146 ScopedInRtl in_rtl;
Dmitry Vyukovc78839f2012-12-12 11:59:30 +0000147 ctx = (SignalContext*)MmapOrDie(sizeof(*ctx), "SignalContext");
148 MemoryResetRange(thr, (uptr)&SigCtx, (uptr)ctx, sizeof(*ctx));
Dmitry Vyukove9636662012-06-27 16:05:06 +0000149 thr->signal_ctx = ctx;
150 }
151 return ctx;
152}
153
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000154static unsigned g_thread_finalize_key;
155
Dmitry Vyukov36decbf2012-12-05 10:16:17 +0000156class ScopedInterceptor {
157 public:
158 ScopedInterceptor(ThreadState *thr, const char *fname, uptr pc);
159 ~ScopedInterceptor();
160 private:
161 ThreadState *const thr_;
162 const int in_rtl_;
Dmitry Vyukov4af0f212013-10-03 13:37:17 +0000163 bool in_ignored_lib_;
Dmitry Vyukov36decbf2012-12-05 10:16:17 +0000164};
165
Alexey Samsonov4f0ea392012-09-24 13:19:47 +0000166ScopedInterceptor::ScopedInterceptor(ThreadState *thr, const char *fname,
167 uptr pc)
168 : thr_(thr)
Dmitry Vyukov4af0f212013-10-03 13:37:17 +0000169 , in_rtl_(thr->in_rtl)
170 , in_ignored_lib_(false) {
Alexey Samsonov4f0ea392012-09-24 13:19:47 +0000171 if (thr_->in_rtl == 0) {
172 Initialize(thr);
173 FuncEntry(thr, pc);
174 thr_->in_rtl++;
175 DPrintf("#%d: intercept %s()\n", thr_->tid, fname);
176 } else {
177 thr_->in_rtl++;
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000178 }
Dmitry Vyukov4af0f212013-10-03 13:37:17 +0000179 if (!thr_->in_ignored_lib && libignore()->IsIgnored(pc)) {
180 in_ignored_lib_ = true;
181 thr_->in_ignored_lib = true;
182 ThreadIgnoreBegin(thr_);
183 }
Alexey Samsonov4f0ea392012-09-24 13:19:47 +0000184}
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000185
Alexey Samsonov4f0ea392012-09-24 13:19:47 +0000186ScopedInterceptor::~ScopedInterceptor() {
Dmitry Vyukov4af0f212013-10-03 13:37:17 +0000187 if (in_ignored_lib_) {
188 thr_->in_ignored_lib = false;
189 ThreadIgnoreEnd(thr_);
190 }
Alexey Samsonov4f0ea392012-09-24 13:19:47 +0000191 thr_->in_rtl--;
192 if (thr_->in_rtl == 0) {
193 FuncExit(thr_);
Dmitry Vyukovee8ee242012-11-15 17:40:49 +0000194 ProcessPendingSignals(thr_);
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000195 }
Alexey Samsonov4f0ea392012-09-24 13:19:47 +0000196 CHECK_EQ(in_rtl_, thr_->in_rtl);
Dmitry Vyukov05906a72012-05-21 17:39:40 +0000197}
198
Dmitry Vyukov36decbf2012-12-05 10:16:17 +0000199#define SCOPED_INTERCEPTOR_RAW(func, ...) \
200 ThreadState *thr = cur_thread(); \
201 StatInc(thr, StatInterceptor); \
202 StatInc(thr, StatInt_##func); \
203 const uptr caller_pc = GET_CALLER_PC(); \
204 ScopedInterceptor si(thr, #func, caller_pc); \
Dmitry Vyukove7718bc2013-06-17 19:57:03 +0000205 const uptr pc = __sanitizer::StackTrace::GetCurrentPc(); \
Dmitry Vyukov36decbf2012-12-05 10:16:17 +0000206 (void)pc; \
207/**/
208
209#define SCOPED_TSAN_INTERCEPTOR(func, ...) \
210 SCOPED_INTERCEPTOR_RAW(func, __VA_ARGS__); \
211 if (REAL(func) == 0) { \
212 Printf("FATAL: ThreadSanitizer: failed to intercept %s\n", #func); \
213 Die(); \
214 } \
Dmitry Vyukov4af0f212013-10-03 13:37:17 +0000215 if (thr->in_rtl > 1 || thr->in_ignored_lib) \
Dmitry Vyukov36decbf2012-12-05 10:16:17 +0000216 return REAL(func)(__VA_ARGS__); \
217/**/
218
219#define TSAN_INTERCEPTOR(ret, func, ...) INTERCEPTOR(ret, func, __VA_ARGS__)
220#define TSAN_INTERCEPT(func) INTERCEPT_FUNCTION(func)
221
Dmitry Vyukovee8ee242012-11-15 17:40:49 +0000222#define BLOCK_REAL(name) (BlockingCall(thr), REAL(name))
223
224struct BlockingCall {
Alexey Samsonovb717f4d2012-11-16 11:21:07 +0000225 explicit BlockingCall(ThreadState *thr)
Dmitry Vyukovee8ee242012-11-15 17:40:49 +0000226 : ctx(SigCtx(thr)) {
Dmitry Vyukovee8ee242012-11-15 17:40:49 +0000227 ctx->in_blocking_func++;
228 }
229
230 ~BlockingCall() {
231 ctx->in_blocking_func--;
Dmitry Vyukovee8ee242012-11-15 17:40:49 +0000232 }
233
234 SignalContext *ctx;
235};
236
Dmitry Vyukov84853112012-08-31 17:27:49 +0000237TSAN_INTERCEPTOR(unsigned, sleep, unsigned sec) {
238 SCOPED_TSAN_INTERCEPTOR(sleep, sec);
Dmitry Vyukovee8ee242012-11-15 17:40:49 +0000239 unsigned res = BLOCK_REAL(sleep)(sec);
Dmitry Vyukov84853112012-08-31 17:27:49 +0000240 AfterSleep(thr, pc);
241 return res;
242}
243
244TSAN_INTERCEPTOR(int, usleep, long_t usec) {
245 SCOPED_TSAN_INTERCEPTOR(usleep, usec);
Dmitry Vyukovee8ee242012-11-15 17:40:49 +0000246 int res = BLOCK_REAL(usleep)(usec);
Dmitry Vyukov84853112012-08-31 17:27:49 +0000247 AfterSleep(thr, pc);
248 return res;
249}
250
251TSAN_INTERCEPTOR(int, nanosleep, void *req, void *rem) {
252 SCOPED_TSAN_INTERCEPTOR(nanosleep, req, rem);
Dmitry Vyukovee8ee242012-11-15 17:40:49 +0000253 int res = BLOCK_REAL(nanosleep)(req, rem);
Dmitry Vyukov84853112012-08-31 17:27:49 +0000254 AfterSleep(thr, pc);
255 return res;
256}
257
Dmitry Vyukov4af0f212013-10-03 13:37:17 +0000258TSAN_INTERCEPTOR(void*, dlopen, const char *filename, int flag) {
259 SCOPED_INTERCEPTOR_RAW(dlopen, filename, flag);
260 // dlopen will execute global constructors, so it must be not in rtl.
261 CHECK_EQ(thr->in_rtl, 1);
262 thr->in_rtl = 0;
263 void *res = REAL(dlopen)(filename, flag);
264 thr->in_rtl = 1;
Dmitry Vyukov3dbbd852013-10-15 11:34:59 +0000265 libignore()->OnLibraryLoaded(filename);
Dmitry Vyukov4af0f212013-10-03 13:37:17 +0000266 return res;
267}
268
269TSAN_INTERCEPTOR(int, dlclose, void *handle) {
270 SCOPED_INTERCEPTOR_RAW(dlclose, handle);
271 // dlclose will execute global destructors, so it must be not in rtl.
272 CHECK_EQ(thr->in_rtl, 1);
273 thr->in_rtl = 0;
274 int res = REAL(dlclose)(handle);
275 thr->in_rtl = 1;
276 libignore()->OnLibraryUnloaded();
277 return res;
278}
279
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000280class AtExitContext {
281 public:
282 AtExitContext()
283 : mtx_(MutexTypeAtExit, StatMtxAtExit)
284 , pos_() {
285 }
286
287 typedef void(*atexit_t)();
288
Dmitry Vyukov31c05ea2013-01-29 13:05:30 +0000289 int atexit(ThreadState *thr, uptr pc, bool is_on_exit,
290 atexit_t f, void *arg) {
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000291 Lock l(&mtx_);
292 if (pos_ == kMaxAtExit)
293 return 1;
294 Release(thr, pc, (uptr)this);
295 stack_[pos_] = f;
Dmitry Vyukov31c05ea2013-01-29 13:05:30 +0000296 args_[pos_] = arg;
297 is_on_exits_[pos_] = is_on_exit;
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000298 pos_++;
299 return 0;
300 }
301
302 void exit(ThreadState *thr, uptr pc) {
303 CHECK_EQ(thr->in_rtl, 0);
304 for (;;) {
305 atexit_t f = 0;
Dmitry Vyukov31c05ea2013-01-29 13:05:30 +0000306 void *arg = 0;
307 bool is_on_exit = false;
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000308 {
309 Lock l(&mtx_);
310 if (pos_) {
311 pos_--;
312 f = stack_[pos_];
Dmitry Vyukov31c05ea2013-01-29 13:05:30 +0000313 arg = args_[pos_];
314 is_on_exit = is_on_exits_[pos_];
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000315 ScopedInRtl in_rtl;
316 Acquire(thr, pc, (uptr)this);
317 }
318 }
319 if (f == 0)
320 break;
321 DPrintf("#%d: executing atexit func %p\n", thr->tid, f);
322 CHECK_EQ(thr->in_rtl, 0);
Dmitry Vyukov31c05ea2013-01-29 13:05:30 +0000323 if (is_on_exit)
324 ((void(*)(int status, void *arg))f)(0, arg);
325 else
326 ((void(*)(void *arg, void *dso))f)(arg, 0);
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000327 }
328 }
329
330 private:
331 static const int kMaxAtExit = 128;
332 Mutex mtx_;
333 atexit_t stack_[kMaxAtExit];
Dmitry Vyukov31c05ea2013-01-29 13:05:30 +0000334 void *args_[kMaxAtExit];
335 bool is_on_exits_[kMaxAtExit];
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000336 int pos_;
337};
338
339static AtExitContext *atexit_ctx;
340
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000341TSAN_INTERCEPTOR(int, atexit, void (*f)()) {
Dmitry Vyukov31c05ea2013-01-29 13:05:30 +0000342 if (cur_thread()->in_symbolizer)
343 return 0;
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000344 SCOPED_TSAN_INTERCEPTOR(atexit, f);
Dmitry Vyukov31c05ea2013-01-29 13:05:30 +0000345 return atexit_ctx->atexit(thr, pc, false, (void(*)())f, 0);
346}
347
348TSAN_INTERCEPTOR(int, on_exit, void(*f)(int, void*), void *arg) {
349 if (cur_thread()->in_symbolizer)
350 return 0;
351 SCOPED_TSAN_INTERCEPTOR(on_exit, f, arg);
352 return atexit_ctx->atexit(thr, pc, true, (void(*)())f, arg);
353}
354
355TSAN_INTERCEPTOR(int, __cxa_atexit, void (*f)(void *a), void *arg, void *dso) {
356 if (cur_thread()->in_symbolizer)
357 return 0;
358 SCOPED_TSAN_INTERCEPTOR(__cxa_atexit, f, arg, dso);
Dmitry Vyukov9d4956e2013-09-19 04:48:59 +0000359 if (dso) {
360 // Memory allocation in __cxa_atexit will race with free during exit,
361 // because we do not see synchronization around atexit callback list.
362 ThreadIgnoreBegin(thr);
363 int res = REAL(__cxa_atexit)(f, arg, dso);
364 ThreadIgnoreEnd(thr);
365 return res;
366 }
Dmitry Vyukov31c05ea2013-01-29 13:05:30 +0000367 return atexit_ctx->atexit(thr, pc, false, (void(*)())f, arg);
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000368}
369
Dmitry Vyukov8b30c252013-03-25 10:10:44 +0000370// Cleanup old bufs.
371static void JmpBufGarbageCollect(ThreadState *thr, uptr sp) {
372 for (uptr i = 0; i < thr->jmp_bufs.Size(); i++) {
373 JmpBuf *buf = &thr->jmp_bufs[i];
374 if (buf->sp <= sp) {
375 uptr sz = thr->jmp_bufs.Size();
376 thr->jmp_bufs[i] = thr->jmp_bufs[sz - 1];
377 thr->jmp_bufs.PopBack();
378 i--;
379 }
380 }
Dmitry Vyukovf037f562012-05-31 18:03:59 +0000381}
382
Dmitry Vyukov8b30c252013-03-25 10:10:44 +0000383static void SetJmp(ThreadState *thr, uptr sp, uptr mangled_sp) {
384 if (thr->shadow_stack_pos == 0) // called from libc guts during bootstrap
385 return;
386 // Cleanup old bufs.
387 JmpBufGarbageCollect(thr, sp);
388 // Remember the buf.
389 JmpBuf *buf = thr->jmp_bufs.PushBack();
390 buf->sp = sp;
391 buf->mangled_sp = mangled_sp;
392 buf->shadow_stack_pos = thr->shadow_stack_pos;
393}
394
395static void LongJmp(ThreadState *thr, uptr *env) {
396 uptr mangled_sp = env[6];
397 // Find the saved buf by mangled_sp.
398 for (uptr i = 0; i < thr->jmp_bufs.Size(); i++) {
399 JmpBuf *buf = &thr->jmp_bufs[i];
400 if (buf->mangled_sp == mangled_sp) {
401 CHECK_GE(thr->shadow_stack_pos, buf->shadow_stack_pos);
402 // Unwind the stack.
403 while (thr->shadow_stack_pos > buf->shadow_stack_pos)
404 FuncExit(thr);
405 JmpBufGarbageCollect(thr, buf->sp - 1); // do not collect buf->sp
406 return;
407 }
408 }
409 Printf("ThreadSanitizer: can't find longjmp buf\n");
410 CHECK(0);
411}
412
Timur Iskhodzhanovf1092672013-08-13 12:03:51 +0000413// FIXME: put everything below into a common extern "C" block?
Dmitry Vyukov8b30c252013-03-25 10:10:44 +0000414extern "C" void __tsan_setjmp(uptr sp, uptr mangled_sp) {
415 ScopedInRtl in_rtl;
416 SetJmp(cur_thread(), sp, mangled_sp);
417}
418
419// Not called. Merely to satisfy TSAN_INTERCEPT().
Timur Iskhodzhanovf1092672013-08-13 12:03:51 +0000420extern "C" SANITIZER_INTERFACE_ATTRIBUTE
421int __interceptor_setjmp(void *env);
Dmitry Vyukov8b30c252013-03-25 10:10:44 +0000422extern "C" int __interceptor_setjmp(void *env) {
423 CHECK(0);
424 return 0;
425}
426
Timur Iskhodzhanovf1092672013-08-13 12:03:51 +0000427// FIXME: any reason to have a separate declaration?
428extern "C" SANITIZER_INTERFACE_ATTRIBUTE
429int __interceptor__setjmp(void *env);
Dmitry Vyukov8b30c252013-03-25 10:10:44 +0000430extern "C" int __interceptor__setjmp(void *env) {
431 CHECK(0);
432 return 0;
433}
434
Timur Iskhodzhanovf1092672013-08-13 12:03:51 +0000435extern "C" SANITIZER_INTERFACE_ATTRIBUTE
436int __interceptor_sigsetjmp(void *env);
Dmitry Vyukov8b30c252013-03-25 10:10:44 +0000437extern "C" int __interceptor_sigsetjmp(void *env) {
438 CHECK(0);
439 return 0;
440}
441
Timur Iskhodzhanovf1092672013-08-13 12:03:51 +0000442extern "C" SANITIZER_INTERFACE_ATTRIBUTE
443int __interceptor___sigsetjmp(void *env);
Dmitry Vyukov8b30c252013-03-25 10:10:44 +0000444extern "C" int __interceptor___sigsetjmp(void *env) {
445 CHECK(0);
446 return 0;
447}
448
449extern "C" int setjmp(void *env);
450extern "C" int _setjmp(void *env);
451extern "C" int sigsetjmp(void *env);
452extern "C" int __sigsetjmp(void *env);
453DEFINE_REAL(int, setjmp, void *env)
454DEFINE_REAL(int, _setjmp, void *env)
455DEFINE_REAL(int, sigsetjmp, void *env)
456DEFINE_REAL(int, __sigsetjmp, void *env)
457
458TSAN_INTERCEPTOR(void, longjmp, uptr *env, int val) {
459 {
460 SCOPED_TSAN_INTERCEPTOR(longjmp, env, val);
461 }
462 LongJmp(cur_thread(), env);
463 REAL(longjmp)(env, val);
464}
465
466TSAN_INTERCEPTOR(void, siglongjmp, uptr *env, int val) {
467 {
468 SCOPED_TSAN_INTERCEPTOR(siglongjmp, env, val);
469 }
470 LongJmp(cur_thread(), env);
471 REAL(siglongjmp)(env, val);
Dmitry Vyukovf037f562012-05-31 18:03:59 +0000472}
473
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000474TSAN_INTERCEPTOR(void*, malloc, uptr size) {
Dmitry Vyukov4af0f212013-10-03 13:37:17 +0000475 if (cur_thread()->in_symbolizer)
Dmitry Vyukov31c05ea2013-01-29 13:05:30 +0000476 return __libc_malloc(size);
Dmitry Vyukov05906a72012-05-21 17:39:40 +0000477 void *p = 0;
478 {
479 SCOPED_INTERCEPTOR_RAW(malloc, size);
480 p = user_alloc(thr, pc, size);
481 }
482 invoke_malloc_hook(p, size);
483 return p;
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000484}
485
Dmitry Vyukov07ba8ef2012-11-30 17:27:58 +0000486TSAN_INTERCEPTOR(void*, __libc_memalign, uptr align, uptr sz) {
487 SCOPED_TSAN_INTERCEPTOR(__libc_memalign, align, sz);
Dmitry Vyukov543b94a2012-11-30 17:45:53 +0000488 return user_alloc(thr, pc, sz, align);
Dmitry Vyukov07ba8ef2012-11-30 17:27:58 +0000489}
490
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000491TSAN_INTERCEPTOR(void*, calloc, uptr size, uptr n) {
Dmitry Vyukov4af0f212013-10-03 13:37:17 +0000492 if (cur_thread()->in_symbolizer)
Dmitry Vyukov31c05ea2013-01-29 13:05:30 +0000493 return __libc_calloc(size, n);
Kostya Serebryanybd33d3a2013-09-06 11:04:14 +0000494 if (__sanitizer::CallocShouldReturnNullDueToOverflow(size, n))
495 return AllocatorReturnNull();
Dmitry Vyukov05906a72012-05-21 17:39:40 +0000496 void *p = 0;
497 {
498 SCOPED_INTERCEPTOR_RAW(calloc, size, n);
499 p = user_alloc(thr, pc, n * size);
Dmitry Vyukov7423c782013-03-22 17:06:22 +0000500 if (p)
501 internal_memset(p, 0, n * size);
Dmitry Vyukov05906a72012-05-21 17:39:40 +0000502 }
503 invoke_malloc_hook(p, n * size);
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000504 return p;
505}
506
507TSAN_INTERCEPTOR(void*, realloc, void *p, uptr size) {
Dmitry Vyukov4af0f212013-10-03 13:37:17 +0000508 if (cur_thread()->in_symbolizer)
Dmitry Vyukov31c05ea2013-01-29 13:05:30 +0000509 return __libc_realloc(p, size);
Dmitry Vyukov05906a72012-05-21 17:39:40 +0000510 if (p)
511 invoke_free_hook(p);
512 {
513 SCOPED_INTERCEPTOR_RAW(realloc, p, size);
514 p = user_realloc(thr, pc, p, size);
515 }
516 invoke_malloc_hook(p, size);
517 return p;
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000518}
519
520TSAN_INTERCEPTOR(void, free, void *p) {
521 if (p == 0)
522 return;
Dmitry Vyukov4af0f212013-10-03 13:37:17 +0000523 if (cur_thread()->in_symbolizer)
Dmitry Vyukov31c05ea2013-01-29 13:05:30 +0000524 return __libc_free(p);
Dmitry Vyukov05906a72012-05-21 17:39:40 +0000525 invoke_free_hook(p);
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000526 SCOPED_INTERCEPTOR_RAW(free, p);
527 user_free(thr, pc, p);
528}
529
530TSAN_INTERCEPTOR(void, cfree, void *p) {
531 if (p == 0)
532 return;
Dmitry Vyukov4af0f212013-10-03 13:37:17 +0000533 if (cur_thread()->in_symbolizer)
Dmitry Vyukov31c05ea2013-01-29 13:05:30 +0000534 return __libc_free(p);
Dmitry Vyukov05906a72012-05-21 17:39:40 +0000535 invoke_free_hook(p);
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000536 SCOPED_INTERCEPTOR_RAW(cfree, p);
537 user_free(thr, pc, p);
538}
539
Alexey Samsonov8a6b5e52013-02-25 08:43:10 +0000540TSAN_INTERCEPTOR(uptr, malloc_usable_size, void *p) {
541 SCOPED_INTERCEPTOR_RAW(malloc_usable_size, p);
542 return user_alloc_usable_size(thr, pc, p);
543}
544
Alexey Samsonov7eff3112012-09-27 09:50:19 +0000545#define OPERATOR_NEW_BODY(mangled_name) \
Dmitry Vyukov4af0f212013-10-03 13:37:17 +0000546 if (cur_thread()->in_symbolizer) \
Dmitry Vyukov31c05ea2013-01-29 13:05:30 +0000547 return __libc_malloc(size); \
Alexey Samsonov7eff3112012-09-27 09:50:19 +0000548 void *p = 0; \
549 { \
550 SCOPED_INTERCEPTOR_RAW(mangled_name, size); \
551 p = user_alloc(thr, pc, size); \
552 } \
553 invoke_malloc_hook(p, size); \
554 return p;
555
Timur Iskhodzhanov3c80c6c2013-08-13 11:42:45 +0000556SANITIZER_INTERFACE_ATTRIBUTE
557void *operator new(__sanitizer::uptr size);
Alexey Samsonov7eff3112012-09-27 09:50:19 +0000558void *operator new(__sanitizer::uptr size) {
559 OPERATOR_NEW_BODY(_Znwm);
560}
Dmitry Vyukov1dcabd12013-06-25 15:36:25 +0000561
Timur Iskhodzhanov3c80c6c2013-08-13 11:42:45 +0000562SANITIZER_INTERFACE_ATTRIBUTE
563void *operator new[](__sanitizer::uptr size);
Alexey Samsonov7eff3112012-09-27 09:50:19 +0000564void *operator new[](__sanitizer::uptr size) {
565 OPERATOR_NEW_BODY(_Znam);
566}
Dmitry Vyukov1dcabd12013-06-25 15:36:25 +0000567
Timur Iskhodzhanov3c80c6c2013-08-13 11:42:45 +0000568SANITIZER_INTERFACE_ATTRIBUTE
569void *operator new(__sanitizer::uptr size, std::nothrow_t const&);
Alexey Samsonov7eff3112012-09-27 09:50:19 +0000570void *operator new(__sanitizer::uptr size, std::nothrow_t const&) {
571 OPERATOR_NEW_BODY(_ZnwmRKSt9nothrow_t);
572}
Dmitry Vyukov1dcabd12013-06-25 15:36:25 +0000573
Timur Iskhodzhanov3c80c6c2013-08-13 11:42:45 +0000574SANITIZER_INTERFACE_ATTRIBUTE
575void *operator new[](__sanitizer::uptr size, std::nothrow_t const&);
Alexey Samsonov7eff3112012-09-27 09:50:19 +0000576void *operator new[](__sanitizer::uptr size, std::nothrow_t const&) {
577 OPERATOR_NEW_BODY(_ZnamRKSt9nothrow_t);
578}
579
580#define OPERATOR_DELETE_BODY(mangled_name) \
581 if (ptr == 0) return; \
Dmitry Vyukov4af0f212013-10-03 13:37:17 +0000582 if (cur_thread()->in_symbolizer) \
Dmitry Vyukov31c05ea2013-01-29 13:05:30 +0000583 return __libc_free(ptr); \
Alexey Samsonov7eff3112012-09-27 09:50:19 +0000584 invoke_free_hook(ptr); \
585 SCOPED_INTERCEPTOR_RAW(mangled_name, ptr); \
586 user_free(thr, pc, ptr);
587
Timur Iskhodzhanov3c80c6c2013-08-13 11:42:45 +0000588SANITIZER_INTERFACE_ATTRIBUTE
589void operator delete(void *ptr);
Alexey Samsonov7eff3112012-09-27 09:50:19 +0000590void operator delete(void *ptr) {
591 OPERATOR_DELETE_BODY(_ZdlPv);
592}
Dmitry Vyukov1dcabd12013-06-25 15:36:25 +0000593
Timur Iskhodzhanov3c80c6c2013-08-13 11:42:45 +0000594SANITIZER_INTERFACE_ATTRIBUTE
595void operator delete[](void *ptr);
Alexey Samsonov7eff3112012-09-27 09:50:19 +0000596void operator delete[](void *ptr) {
597 OPERATOR_DELETE_BODY(_ZdlPvRKSt9nothrow_t);
598}
Dmitry Vyukov1dcabd12013-06-25 15:36:25 +0000599
Timur Iskhodzhanov3c80c6c2013-08-13 11:42:45 +0000600SANITIZER_INTERFACE_ATTRIBUTE
601void operator delete(void *ptr, std::nothrow_t const&);
Alexey Samsonov7eff3112012-09-27 09:50:19 +0000602void operator delete(void *ptr, std::nothrow_t const&) {
603 OPERATOR_DELETE_BODY(_ZdaPv);
604}
Dmitry Vyukov1dcabd12013-06-25 15:36:25 +0000605
Timur Iskhodzhanov3c80c6c2013-08-13 11:42:45 +0000606SANITIZER_INTERFACE_ATTRIBUTE
607void operator delete[](void *ptr, std::nothrow_t const&);
Alexey Samsonov7eff3112012-09-27 09:50:19 +0000608void operator delete[](void *ptr, std::nothrow_t const&) {
609 OPERATOR_DELETE_BODY(_ZdaPvRKSt9nothrow_t);
610}
611
Dmitry Vyukovd51a1a12012-06-27 21:00:23 +0000612TSAN_INTERCEPTOR(uptr, strlen, const char *s) {
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000613 SCOPED_TSAN_INTERCEPTOR(strlen, s);
Dmitry Vyukovd51a1a12012-06-27 21:00:23 +0000614 uptr len = internal_strlen(s);
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000615 MemoryAccessRange(thr, pc, (uptr)s, len + 1, false);
616 return len;
617}
618
Dmitry Vyukov065c4ac2012-06-29 15:19:14 +0000619TSAN_INTERCEPTOR(void*, memset, void *dst, int v, uptr size) {
620 SCOPED_TSAN_INTERCEPTOR(memset, dst, v, size);
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000621 MemoryAccessRange(thr, pc, (uptr)dst, size, true);
Dmitry Vyukov065c4ac2012-06-29 15:19:14 +0000622 return internal_memset(dst, v, size);
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000623}
624
Dmitry Vyukov065c4ac2012-06-29 15:19:14 +0000625TSAN_INTERCEPTOR(void*, memcpy, void *dst, const void *src, uptr size) {
626 SCOPED_TSAN_INTERCEPTOR(memcpy, dst, src, size);
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000627 MemoryAccessRange(thr, pc, (uptr)dst, size, true);
628 MemoryAccessRange(thr, pc, (uptr)src, size, false);
Dmitry Vyukov065c4ac2012-06-29 15:19:14 +0000629 return internal_memcpy(dst, src, size);
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000630}
631
Dmitry Vyukov065c4ac2012-06-29 15:19:14 +0000632TSAN_INTERCEPTOR(int, memcmp, const void *s1, const void *s2, uptr n) {
633 SCOPED_TSAN_INTERCEPTOR(memcmp, s1, s2, n);
Dmitry Vyukovd51a1a12012-06-27 21:00:23 +0000634 int res = 0;
635 uptr len = 0;
636 for (; len < n; len++) {
637 if ((res = ((unsigned char*)s1)[len] - ((unsigned char*)s2)[len]))
638 break;
639 }
640 MemoryAccessRange(thr, pc, (uptr)s1, len < n ? len + 1 : n, false);
641 MemoryAccessRange(thr, pc, (uptr)s2, len < n ? len + 1 : n, false);
642 return res;
643}
Dmitry Vyukovd51a1a12012-06-27 21:00:23 +0000644
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000645TSAN_INTERCEPTOR(void*, memchr, void *s, int c, uptr n) {
646 SCOPED_TSAN_INTERCEPTOR(memchr, s, c, n);
647 void *res = REAL(memchr)(s, c, n);
648 uptr len = res ? (char*)res - (char*)s + 1 : n;
649 MemoryAccessRange(thr, pc, (uptr)s, len, false);
650 return res;
651}
652
653TSAN_INTERCEPTOR(void*, memrchr, char *s, int c, uptr n) {
654 SCOPED_TSAN_INTERCEPTOR(memrchr, s, c, n);
655 MemoryAccessRange(thr, pc, (uptr)s, n, false);
656 return REAL(memrchr)(s, c, n);
657}
658
659TSAN_INTERCEPTOR(void*, memmove, void *dst, void *src, uptr n) {
660 SCOPED_TSAN_INTERCEPTOR(memmove, dst, src, n);
661 MemoryAccessRange(thr, pc, (uptr)dst, n, true);
662 MemoryAccessRange(thr, pc, (uptr)src, n, false);
663 return REAL(memmove)(dst, src, n);
664}
665
Dmitry Vyukovd51a1a12012-06-27 21:00:23 +0000666TSAN_INTERCEPTOR(char*, strchr, char *s, int c) {
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000667 SCOPED_TSAN_INTERCEPTOR(strchr, s, c);
Dmitry Vyukovd51a1a12012-06-27 21:00:23 +0000668 char *res = REAL(strchr)(s, c);
669 uptr len = res ? (char*)res - (char*)s + 1 : internal_strlen(s) + 1;
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000670 MemoryAccessRange(thr, pc, (uptr)s, len, false);
671 return res;
672}
673
Dmitry Vyukovd51a1a12012-06-27 21:00:23 +0000674TSAN_INTERCEPTOR(char*, strchrnul, char *s, int c) {
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000675 SCOPED_TSAN_INTERCEPTOR(strchrnul, s, c);
Dmitry Vyukovd51a1a12012-06-27 21:00:23 +0000676 char *res = REAL(strchrnul)(s, c);
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000677 uptr len = (char*)res - (char*)s + 1;
678 MemoryAccessRange(thr, pc, (uptr)s, len, false);
679 return res;
680}
681
Dmitry Vyukovd51a1a12012-06-27 21:00:23 +0000682TSAN_INTERCEPTOR(char*, strrchr, char *s, int c) {
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000683 SCOPED_TSAN_INTERCEPTOR(strrchr, s, c);
Dmitry Vyukovd51a1a12012-06-27 21:00:23 +0000684 MemoryAccessRange(thr, pc, (uptr)s, internal_strlen(s) + 1, false);
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000685 return REAL(strrchr)(s, c);
686}
687
Dmitry Vyukovd51a1a12012-06-27 21:00:23 +0000688TSAN_INTERCEPTOR(char*, strcpy, char *dst, const char *src) { // NOLINT
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000689 SCOPED_TSAN_INTERCEPTOR(strcpy, dst, src); // NOLINT
Dmitry Vyukovd51a1a12012-06-27 21:00:23 +0000690 uptr srclen = internal_strlen(src);
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000691 MemoryAccessRange(thr, pc, (uptr)dst, srclen + 1, true);
692 MemoryAccessRange(thr, pc, (uptr)src, srclen + 1, false);
693 return REAL(strcpy)(dst, src); // NOLINT
694}
695
Dmitry Vyukovd51a1a12012-06-27 21:00:23 +0000696TSAN_INTERCEPTOR(char*, strncpy, char *dst, char *src, uptr n) {
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000697 SCOPED_TSAN_INTERCEPTOR(strncpy, dst, src, n);
Kostya Serebryanyb93c3d52012-07-13 13:04:43 +0000698 uptr srclen = internal_strnlen(src, n);
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000699 MemoryAccessRange(thr, pc, (uptr)dst, n, true);
700 MemoryAccessRange(thr, pc, (uptr)src, min(srclen + 1, n), false);
701 return REAL(strncpy)(dst, src, n);
702}
703
704TSAN_INTERCEPTOR(const char*, strstr, const char *s1, const char *s2) {
705 SCOPED_TSAN_INTERCEPTOR(strstr, s1, s2);
706 const char *res = REAL(strstr)(s1, s2);
Dmitry Vyukovd51a1a12012-06-27 21:00:23 +0000707 uptr len1 = internal_strlen(s1);
708 uptr len2 = internal_strlen(s2);
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000709 MemoryAccessRange(thr, pc, (uptr)s1, len1 + 1, false);
710 MemoryAccessRange(thr, pc, (uptr)s2, len2 + 1, false);
711 return res;
712}
713
Dmitry Vyukov39fa68e2013-09-21 23:44:19 +0000714TSAN_INTERCEPTOR(char*, strdup, const char *str) {
715 SCOPED_TSAN_INTERCEPTOR(strdup, str);
Dmitry Vyukov39fa68e2013-09-21 23:44:19 +0000716 // strdup will call malloc, so no instrumentation is required here.
717 return REAL(strdup)(str);
718}
719
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000720static bool fix_mmap_addr(void **addr, long_t sz, int flags) {
721 if (*addr) {
722 if (!IsAppMem((uptr)*addr) || !IsAppMem((uptr)*addr + sz - 1)) {
723 if (flags & MAP_FIXED) {
Dmitry Vyukov7a72b4a2012-06-27 13:54:46 +0000724 errno = EINVAL;
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000725 return false;
726 } else {
727 *addr = 0;
728 }
729 }
730 }
731 return true;
732}
733
734TSAN_INTERCEPTOR(void*, mmap, void *addr, long_t sz, int prot,
735 int flags, int fd, unsigned off) {
736 SCOPED_TSAN_INTERCEPTOR(mmap, addr, sz, prot, flags, fd, off);
737 if (!fix_mmap_addr(&addr, sz, flags))
738 return MAP_FAILED;
739 void *res = REAL(mmap)(addr, sz, prot, flags, fd, off);
740 if (res != MAP_FAILED) {
Dmitry Vyukovc05cbca2013-02-01 15:52:35 +0000741 if (fd > 0)
742 FdAccess(thr, pc, fd);
Dmitry Vyukov74172de2013-03-18 16:56:48 +0000743 MemoryRangeImitateWrite(thr, pc, (uptr)res, sz);
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000744 }
745 return res;
746}
747
748TSAN_INTERCEPTOR(void*, mmap64, void *addr, long_t sz, int prot,
749 int flags, int fd, u64 off) {
750 SCOPED_TSAN_INTERCEPTOR(mmap64, addr, sz, prot, flags, fd, off);
751 if (!fix_mmap_addr(&addr, sz, flags))
752 return MAP_FAILED;
753 void *res = REAL(mmap64)(addr, sz, prot, flags, fd, off);
754 if (res != MAP_FAILED) {
Dmitry Vyukovc05cbca2013-02-01 15:52:35 +0000755 if (fd > 0)
756 FdAccess(thr, pc, fd);
Dmitry Vyukov74172de2013-03-18 16:56:48 +0000757 MemoryRangeImitateWrite(thr, pc, (uptr)res, sz);
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000758 }
759 return res;
760}
761
762TSAN_INTERCEPTOR(int, munmap, void *addr, long_t sz) {
763 SCOPED_TSAN_INTERCEPTOR(munmap, addr, sz);
Dmitry Vyukov7ac33ac2013-03-18 15:49:07 +0000764 DontNeedShadowFor((uptr)addr, sz);
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000765 int res = REAL(munmap)(addr, sz);
766 return res;
767}
768
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000769TSAN_INTERCEPTOR(void*, memalign, uptr align, uptr sz) {
Dmitry Vyukov4af0f212013-10-03 13:37:17 +0000770 SCOPED_INTERCEPTOR_RAW(memalign, align, sz);
Dmitry Vyukov2e870512012-08-15 15:35:15 +0000771 return user_alloc(thr, pc, sz, align);
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000772}
773
774TSAN_INTERCEPTOR(void*, valloc, uptr sz) {
Dmitry Vyukov4af0f212013-10-03 13:37:17 +0000775 SCOPED_INTERCEPTOR_RAW(valloc, sz);
Kostya Serebryanyf67ec2b2012-11-23 15:38:49 +0000776 return user_alloc(thr, pc, sz, GetPageSizeCached());
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000777}
778
779TSAN_INTERCEPTOR(void*, pvalloc, uptr sz) {
Dmitry Vyukov4af0f212013-10-03 13:37:17 +0000780 SCOPED_INTERCEPTOR_RAW(pvalloc, sz);
Kostya Serebryanyf67ec2b2012-11-23 15:38:49 +0000781 sz = RoundUp(sz, GetPageSizeCached());
782 return user_alloc(thr, pc, sz, GetPageSizeCached());
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000783}
784
785TSAN_INTERCEPTOR(int, posix_memalign, void **memptr, uptr align, uptr sz) {
Dmitry Vyukov4af0f212013-10-03 13:37:17 +0000786 SCOPED_INTERCEPTOR_RAW(posix_memalign, memptr, align, sz);
Dmitry Vyukov2e870512012-08-15 15:35:15 +0000787 *memptr = user_alloc(thr, pc, sz, align);
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000788 return 0;
789}
790
791// Used in thread-safe function static initialization.
Dmitry Vyukov1ffeded2012-12-05 12:10:22 +0000792extern "C" int INTERFACE_ATTRIBUTE __cxa_guard_acquire(atomic_uint32_t *g) {
793 SCOPED_INTERCEPTOR_RAW(__cxa_guard_acquire, g);
794 for (;;) {
795 u32 cmp = atomic_load(g, memory_order_acquire);
796 if (cmp == 0) {
797 if (atomic_compare_exchange_strong(g, &cmp, 1<<16, memory_order_relaxed))
798 return 1;
799 } else if (cmp == 1) {
800 Acquire(thr, pc, (uptr)g);
801 return 0;
802 } else {
803 internal_sched_yield();
804 }
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000805 }
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000806}
807
Dmitry Vyukov1ffeded2012-12-05 12:10:22 +0000808extern "C" void INTERFACE_ATTRIBUTE __cxa_guard_release(atomic_uint32_t *g) {
809 SCOPED_INTERCEPTOR_RAW(__cxa_guard_release, g);
810 Release(thr, pc, (uptr)g);
811 atomic_store(g, 1, memory_order_release);
812}
813
814extern "C" void INTERFACE_ATTRIBUTE __cxa_guard_abort(atomic_uint32_t *g) {
815 SCOPED_INTERCEPTOR_RAW(__cxa_guard_abort, g);
816 atomic_store(g, 0, memory_order_relaxed);
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000817}
818
819static void thread_finalize(void *v) {
820 uptr iter = (uptr)v;
821 if (iter > 1) {
822 if (pthread_setspecific(g_thread_finalize_key, (void*)(iter - 1))) {
Alexey Samsonovb1fe3022012-11-02 12:17:51 +0000823 Printf("ThreadSanitizer: failed to set thread key\n");
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000824 Die();
825 }
826 return;
827 }
828 {
829 ScopedInRtl in_rtl;
Dmitry Vyukove9636662012-06-27 16:05:06 +0000830 ThreadState *thr = cur_thread();
Dmitry Vyukove9636662012-06-27 16:05:06 +0000831 ThreadFinish(thr);
Dmitry Vyukov1fc03d52012-06-28 18:07:46 +0000832 SignalContext *sctx = thr->signal_ctx;
833 if (sctx) {
834 thr->signal_ctx = 0;
Dmitry Vyukovc78839f2012-12-12 11:59:30 +0000835 UnmapOrDie(sctx, sizeof(*sctx));
Dmitry Vyukov1fc03d52012-06-28 18:07:46 +0000836 }
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000837 }
838}
839
840
841struct ThreadParam {
842 void* (*callback)(void *arg);
843 void *param;
844 atomic_uintptr_t tid;
845};
846
847extern "C" void *__tsan_thread_start_func(void *arg) {
848 ThreadParam *p = (ThreadParam*)arg;
849 void* (*callback)(void *arg) = p->callback;
850 void *param = p->param;
851 int tid = 0;
852 {
853 ThreadState *thr = cur_thread();
854 ScopedInRtl in_rtl;
Sergey Matveev6eb836f2013-10-11 12:09:49 +0000855 if (pthread_setspecific(g_thread_finalize_key,
856 (void *)kPthreadDestructorIterations)) {
Alexey Samsonovb1fe3022012-11-02 12:17:51 +0000857 Printf("ThreadSanitizer: failed to set thread key\n");
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000858 Die();
859 }
860 while ((tid = atomic_load(&p->tid, memory_order_acquire)) == 0)
861 pthread_yield();
862 atomic_store(&p->tid, 0, memory_order_release);
Dmitry Vyukov7dccf3f2012-10-02 11:52:05 +0000863 ThreadStart(thr, tid, GetTid());
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000864 CHECK_EQ(thr->in_rtl, 1);
865 }
866 void *res = callback(param);
867 // Prevent the callback from being tail called,
868 // it mixes up stack traces.
869 volatile int foo = 42;
870 foo++;
871 return res;
872}
873
874TSAN_INTERCEPTOR(int, pthread_create,
875 void *th, void *attr, void *(*callback)(void*), void * param) {
Dmitry Vyukov4af0f212013-10-03 13:37:17 +0000876 SCOPED_INTERCEPTOR_RAW(pthread_create, th, attr, callback, param);
Alexey Samsonovf110e352013-03-14 07:10:52 +0000877 __sanitizer_pthread_attr_t myattr;
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000878 if (attr == 0) {
879 pthread_attr_init(&myattr);
880 attr = &myattr;
881 }
882 int detached = 0;
Evgeniy Stepanove236dbb2013-10-25 13:01:31 +0000883 REAL(pthread_attr_getdetachstate)(attr, &detached);
Dmitry Vyukov06cbed82013-10-15 14:12:26 +0000884 AdjustStackSizeLinux(attr);
Evgeniy Stepanovb9bf7002013-03-19 09:30:52 +0000885
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000886 ThreadParam p;
887 p.callback = callback;
888 p.param = param;
889 atomic_store(&p.tid, 0, memory_order_relaxed);
890 int res = REAL(pthread_create)(th, attr, __tsan_thread_start_func, &p);
891 if (res == 0) {
Dmitry Vyukov64310b22012-08-16 13:26:54 +0000892 int tid = ThreadCreate(thr, pc, *(uptr*)th, detached);
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000893 CHECK_NE(tid, 0);
894 atomic_store(&p.tid, tid, memory_order_release);
895 while (atomic_load(&p.tid, memory_order_acquire) != 0)
896 pthread_yield();
897 }
898 if (attr == &myattr)
899 pthread_attr_destroy(&myattr);
900 return res;
901}
902
903TSAN_INTERCEPTOR(int, pthread_join, void *th, void **ret) {
Dmitry Vyukov4af0f212013-10-03 13:37:17 +0000904 SCOPED_INTERCEPTOR_RAW(pthread_join, th, ret);
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000905 int tid = ThreadTid(thr, pc, (uptr)th);
Dmitry Vyukovee8ee242012-11-15 17:40:49 +0000906 int res = BLOCK_REAL(pthread_join)(th, ret);
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000907 if (res == 0) {
Dmitry Vyukov64310b22012-08-16 13:26:54 +0000908 ThreadJoin(thr, pc, tid);
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000909 }
910 return res;
911}
912
913TSAN_INTERCEPTOR(int, pthread_detach, void *th) {
914 SCOPED_TSAN_INTERCEPTOR(pthread_detach, th);
915 int tid = ThreadTid(thr, pc, (uptr)th);
916 int res = REAL(pthread_detach)(th);
917 if (res == 0) {
Dmitry Vyukov64310b22012-08-16 13:26:54 +0000918 ThreadDetach(thr, pc, tid);
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000919 }
920 return res;
921}
922
923TSAN_INTERCEPTOR(int, pthread_mutex_init, void *m, void *a) {
924 SCOPED_TSAN_INTERCEPTOR(pthread_mutex_init, m, a);
925 int res = REAL(pthread_mutex_init)(m, a);
926 if (res == 0) {
927 bool recursive = false;
928 if (a) {
929 int type = 0;
930 if (pthread_mutexattr_gettype(a, &type) == 0)
931 recursive = (type == PTHREAD_MUTEX_RECURSIVE
932 || type == PTHREAD_MUTEX_RECURSIVE_NP);
933 }
Dmitry Vyukovc20e9ba2012-08-16 13:29:41 +0000934 MutexCreate(thr, pc, (uptr)m, false, recursive, false);
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000935 }
936 return res;
937}
938
939TSAN_INTERCEPTOR(int, pthread_mutex_destroy, void *m) {
940 SCOPED_TSAN_INTERCEPTOR(pthread_mutex_destroy, m);
941 int res = REAL(pthread_mutex_destroy)(m);
942 if (res == 0 || res == EBUSY) {
Dmitry Vyukov64310b22012-08-16 13:26:54 +0000943 MutexDestroy(thr, pc, (uptr)m);
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000944 }
945 return res;
946}
947
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000948TSAN_INTERCEPTOR(int, pthread_mutex_trylock, void *m) {
949 SCOPED_TSAN_INTERCEPTOR(pthread_mutex_trylock, m);
950 int res = REAL(pthread_mutex_trylock)(m);
951 if (res == 0) {
Dmitry Vyukov64310b22012-08-16 13:26:54 +0000952 MutexLock(thr, pc, (uptr)m);
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000953 }
954 return res;
955}
956
957TSAN_INTERCEPTOR(int, pthread_mutex_timedlock, void *m, void *abstime) {
958 SCOPED_TSAN_INTERCEPTOR(pthread_mutex_timedlock, m, abstime);
959 int res = REAL(pthread_mutex_timedlock)(m, abstime);
960 if (res == 0) {
Dmitry Vyukov64310b22012-08-16 13:26:54 +0000961 MutexLock(thr, pc, (uptr)m);
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000962 }
963 return res;
964}
965
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000966TSAN_INTERCEPTOR(int, pthread_spin_init, void *m, int pshared) {
967 SCOPED_TSAN_INTERCEPTOR(pthread_spin_init, m, pshared);
968 int res = REAL(pthread_spin_init)(m, pshared);
969 if (res == 0) {
Dmitry Vyukovc20e9ba2012-08-16 13:29:41 +0000970 MutexCreate(thr, pc, (uptr)m, false, false, false);
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000971 }
972 return res;
973}
974
975TSAN_INTERCEPTOR(int, pthread_spin_destroy, void *m) {
976 SCOPED_TSAN_INTERCEPTOR(pthread_spin_destroy, m);
977 int res = REAL(pthread_spin_destroy)(m);
978 if (res == 0) {
Dmitry Vyukov64310b22012-08-16 13:26:54 +0000979 MutexDestroy(thr, pc, (uptr)m);
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000980 }
981 return res;
982}
983
984TSAN_INTERCEPTOR(int, pthread_spin_lock, void *m) {
985 SCOPED_TSAN_INTERCEPTOR(pthread_spin_lock, m);
986 int res = REAL(pthread_spin_lock)(m);
987 if (res == 0) {
Dmitry Vyukov64310b22012-08-16 13:26:54 +0000988 MutexLock(thr, pc, (uptr)m);
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000989 }
990 return res;
991}
992
993TSAN_INTERCEPTOR(int, pthread_spin_trylock, void *m) {
994 SCOPED_TSAN_INTERCEPTOR(pthread_spin_trylock, m);
995 int res = REAL(pthread_spin_trylock)(m);
996 if (res == 0) {
Dmitry Vyukov64310b22012-08-16 13:26:54 +0000997 MutexLock(thr, pc, (uptr)m);
Kostya Serebryany7ac41482012-05-10 13:48:04 +0000998 }
999 return res;
1000}
1001
1002TSAN_INTERCEPTOR(int, pthread_spin_unlock, void *m) {
1003 SCOPED_TSAN_INTERCEPTOR(pthread_spin_unlock, m);
Dmitry Vyukov64310b22012-08-16 13:26:54 +00001004 MutexUnlock(thr, pc, (uptr)m);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001005 int res = REAL(pthread_spin_unlock)(m);
1006 return res;
1007}
1008
1009TSAN_INTERCEPTOR(int, pthread_rwlock_init, void *m, void *a) {
1010 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_init, m, a);
1011 int res = REAL(pthread_rwlock_init)(m, a);
1012 if (res == 0) {
Dmitry Vyukovc20e9ba2012-08-16 13:29:41 +00001013 MutexCreate(thr, pc, (uptr)m, true, false, false);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001014 }
1015 return res;
1016}
1017
1018TSAN_INTERCEPTOR(int, pthread_rwlock_destroy, void *m) {
1019 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_destroy, m);
1020 int res = REAL(pthread_rwlock_destroy)(m);
1021 if (res == 0) {
Dmitry Vyukov64310b22012-08-16 13:26:54 +00001022 MutexDestroy(thr, pc, (uptr)m);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001023 }
1024 return res;
1025}
1026
1027TSAN_INTERCEPTOR(int, pthread_rwlock_rdlock, void *m) {
1028 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_rdlock, m);
1029 int res = REAL(pthread_rwlock_rdlock)(m);
1030 if (res == 0) {
Dmitry Vyukov64310b22012-08-16 13:26:54 +00001031 MutexReadLock(thr, pc, (uptr)m);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001032 }
1033 return res;
1034}
1035
1036TSAN_INTERCEPTOR(int, pthread_rwlock_tryrdlock, void *m) {
1037 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_tryrdlock, m);
1038 int res = REAL(pthread_rwlock_tryrdlock)(m);
1039 if (res == 0) {
Dmitry Vyukov64310b22012-08-16 13:26:54 +00001040 MutexReadLock(thr, pc, (uptr)m);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001041 }
1042 return res;
1043}
1044
1045TSAN_INTERCEPTOR(int, pthread_rwlock_timedrdlock, void *m, void *abstime) {
1046 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_timedrdlock, m, abstime);
1047 int res = REAL(pthread_rwlock_timedrdlock)(m, abstime);
1048 if (res == 0) {
Dmitry Vyukov64310b22012-08-16 13:26:54 +00001049 MutexReadLock(thr, pc, (uptr)m);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001050 }
1051 return res;
1052}
1053
1054TSAN_INTERCEPTOR(int, pthread_rwlock_wrlock, void *m) {
1055 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_wrlock, m);
1056 int res = REAL(pthread_rwlock_wrlock)(m);
1057 if (res == 0) {
Dmitry Vyukov64310b22012-08-16 13:26:54 +00001058 MutexLock(thr, pc, (uptr)m);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001059 }
1060 return res;
1061}
1062
1063TSAN_INTERCEPTOR(int, pthread_rwlock_trywrlock, void *m) {
1064 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_trywrlock, m);
1065 int res = REAL(pthread_rwlock_trywrlock)(m);
1066 if (res == 0) {
Dmitry Vyukov64310b22012-08-16 13:26:54 +00001067 MutexLock(thr, pc, (uptr)m);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001068 }
1069 return res;
1070}
1071
1072TSAN_INTERCEPTOR(int, pthread_rwlock_timedwrlock, void *m, void *abstime) {
1073 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_timedwrlock, m, abstime);
1074 int res = REAL(pthread_rwlock_timedwrlock)(m, abstime);
1075 if (res == 0) {
Dmitry Vyukov64310b22012-08-16 13:26:54 +00001076 MutexLock(thr, pc, (uptr)m);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001077 }
1078 return res;
1079}
1080
1081TSAN_INTERCEPTOR(int, pthread_rwlock_unlock, void *m) {
1082 SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_unlock, m);
Dmitry Vyukov64310b22012-08-16 13:26:54 +00001083 MutexReadOrWriteUnlock(thr, pc, (uptr)m);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001084 int res = REAL(pthread_rwlock_unlock)(m);
1085 return res;
1086}
1087
Dmitry Vyukovfae2bff2013-09-19 23:44:51 +00001088TSAN_INTERCEPTOR(int, pthread_cond_destroy, void *c) {
1089 SCOPED_TSAN_INTERCEPTOR(pthread_cond_destroy, c);
Dmitry Vyukov8cde5cb2013-09-03 15:04:15 +00001090 MemoryWrite(thr, pc, (uptr)c, kSizeLog1);
Dmitry Vyukovfae2bff2013-09-19 23:44:51 +00001091 int res = REAL(pthread_cond_destroy)(c);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001092 return res;
1093}
1094
Dmitry Vyukovfae2bff2013-09-19 23:44:51 +00001095TSAN_INTERCEPTOR(int, pthread_cond_timedwait, void *c, void *m,
Dmitry Vyukovf0615542013-09-02 18:06:28 +00001096 void *abstime) {
Dmitry Vyukovfae2bff2013-09-19 23:44:51 +00001097 SCOPED_TSAN_INTERCEPTOR(pthread_cond_timedwait, c, m, abstime);
Dmitry Vyukov64310b22012-08-16 13:26:54 +00001098 MutexUnlock(thr, pc, (uptr)m);
Dmitry Vyukov8cde5cb2013-09-03 15:04:15 +00001099 MemoryRead(thr, pc, (uptr)c, kSizeLog1);
Dmitry Vyukovfae2bff2013-09-19 23:44:51 +00001100 int res = REAL(pthread_cond_timedwait)(c, m, abstime);
Dmitry Vyukov64310b22012-08-16 13:26:54 +00001101 MutexLock(thr, pc, (uptr)m);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001102 return res;
1103}
1104
1105TSAN_INTERCEPTOR(int, pthread_barrier_init, void *b, void *a, unsigned count) {
1106 SCOPED_TSAN_INTERCEPTOR(pthread_barrier_init, b, a, count);
Dmitry Vyukov334553e2013-02-01 09:42:06 +00001107 MemoryWrite(thr, pc, (uptr)b, kSizeLog1);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001108 int res = REAL(pthread_barrier_init)(b, a, count);
1109 return res;
1110}
1111
1112TSAN_INTERCEPTOR(int, pthread_barrier_destroy, void *b) {
1113 SCOPED_TSAN_INTERCEPTOR(pthread_barrier_destroy, b);
Dmitry Vyukov334553e2013-02-01 09:42:06 +00001114 MemoryWrite(thr, pc, (uptr)b, kSizeLog1);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001115 int res = REAL(pthread_barrier_destroy)(b);
1116 return res;
1117}
1118
1119TSAN_INTERCEPTOR(int, pthread_barrier_wait, void *b) {
1120 SCOPED_TSAN_INTERCEPTOR(pthread_barrier_wait, b);
Dmitry Vyukov64310b22012-08-16 13:26:54 +00001121 Release(thr, pc, (uptr)b);
Dmitry Vyukov334553e2013-02-01 09:42:06 +00001122 MemoryRead(thr, pc, (uptr)b, kSizeLog1);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001123 int res = REAL(pthread_barrier_wait)(b);
Dmitry Vyukov334553e2013-02-01 09:42:06 +00001124 MemoryRead(thr, pc, (uptr)b, kSizeLog1);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001125 if (res == 0 || res == PTHREAD_BARRIER_SERIAL_THREAD) {
Dmitry Vyukov64310b22012-08-16 13:26:54 +00001126 Acquire(thr, pc, (uptr)b);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001127 }
1128 return res;
1129}
1130
1131TSAN_INTERCEPTOR(int, pthread_once, void *o, void (*f)()) {
Dmitry Vyukov9fe1d5a2013-10-04 10:27:21 +00001132 SCOPED_INTERCEPTOR_RAW(pthread_once, o, f);
1133 // Using SCOPED_INTERCEPTOR_RAW, because if we are called from an ignored lib,
1134 // the user callback must be executed with thr->in_rtl == 0.
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001135 if (o == 0 || f == 0)
1136 return EINVAL;
1137 atomic_uint32_t *a = static_cast<atomic_uint32_t*>(o);
1138 u32 v = atomic_load(a, memory_order_acquire);
1139 if (v == 0 && atomic_compare_exchange_strong(a, &v, 1,
1140 memory_order_relaxed)) {
1141 const int old_in_rtl = thr->in_rtl;
1142 thr->in_rtl = 0;
1143 (*f)();
1144 CHECK_EQ(thr->in_rtl, 0);
1145 thr->in_rtl = old_in_rtl;
Dmitry Vyukov9fe1d5a2013-10-04 10:27:21 +00001146 if (!thr->in_ignored_lib)
1147 Release(thr, pc, (uptr)o);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001148 atomic_store(a, 2, memory_order_release);
1149 } else {
1150 while (v != 2) {
1151 pthread_yield();
1152 v = atomic_load(a, memory_order_acquire);
1153 }
Dmitry Vyukov9fe1d5a2013-10-04 10:27:21 +00001154 if (!thr->in_ignored_lib)
1155 Acquire(thr, pc, (uptr)o);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001156 }
1157 return 0;
1158}
1159
1160TSAN_INTERCEPTOR(int, sem_init, void *s, int pshared, unsigned value) {
1161 SCOPED_TSAN_INTERCEPTOR(sem_init, s, pshared, value);
1162 int res = REAL(sem_init)(s, pshared, value);
1163 return res;
1164}
1165
1166TSAN_INTERCEPTOR(int, sem_destroy, void *s) {
1167 SCOPED_TSAN_INTERCEPTOR(sem_destroy, s);
1168 int res = REAL(sem_destroy)(s);
1169 return res;
1170}
1171
1172TSAN_INTERCEPTOR(int, sem_wait, void *s) {
1173 SCOPED_TSAN_INTERCEPTOR(sem_wait, s);
Dmitry Vyukovee8ee242012-11-15 17:40:49 +00001174 int res = BLOCK_REAL(sem_wait)(s);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001175 if (res == 0) {
Dmitry Vyukov64310b22012-08-16 13:26:54 +00001176 Acquire(thr, pc, (uptr)s);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001177 }
1178 return res;
1179}
1180
1181TSAN_INTERCEPTOR(int, sem_trywait, void *s) {
1182 SCOPED_TSAN_INTERCEPTOR(sem_trywait, s);
Dmitry Vyukovee8ee242012-11-15 17:40:49 +00001183 int res = BLOCK_REAL(sem_trywait)(s);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001184 if (res == 0) {
Dmitry Vyukov64310b22012-08-16 13:26:54 +00001185 Acquire(thr, pc, (uptr)s);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001186 }
1187 return res;
1188}
1189
1190TSAN_INTERCEPTOR(int, sem_timedwait, void *s, void *abstime) {
1191 SCOPED_TSAN_INTERCEPTOR(sem_timedwait, s, abstime);
Dmitry Vyukovee8ee242012-11-15 17:40:49 +00001192 int res = BLOCK_REAL(sem_timedwait)(s, abstime);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001193 if (res == 0) {
Dmitry Vyukov64310b22012-08-16 13:26:54 +00001194 Acquire(thr, pc, (uptr)s);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001195 }
1196 return res;
1197}
1198
1199TSAN_INTERCEPTOR(int, sem_post, void *s) {
1200 SCOPED_TSAN_INTERCEPTOR(sem_post, s);
Dmitry Vyukov64310b22012-08-16 13:26:54 +00001201 Release(thr, pc, (uptr)s);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001202 int res = REAL(sem_post)(s);
1203 return res;
1204}
1205
1206TSAN_INTERCEPTOR(int, sem_getvalue, void *s, int *sval) {
1207 SCOPED_TSAN_INTERCEPTOR(sem_getvalue, s, sval);
1208 int res = REAL(sem_getvalue)(s, sval);
1209 if (res == 0) {
Dmitry Vyukov64310b22012-08-16 13:26:54 +00001210 Acquire(thr, pc, (uptr)s);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001211 }
1212 return res;
1213}
1214
Dmitry Vyukov61ba1b52013-01-29 09:23:09 +00001215TSAN_INTERCEPTOR(int, __xstat, int version, const char *path, void *buf) {
1216 SCOPED_TSAN_INTERCEPTOR(__xstat, version, path, buf);
1217 return REAL(__xstat)(version, path, buf);
1218}
1219
1220TSAN_INTERCEPTOR(int, stat, const char *path, void *buf) {
1221 SCOPED_TSAN_INTERCEPTOR(__xstat, 0, path, buf);
1222 return REAL(__xstat)(0, path, buf);
1223}
1224
1225TSAN_INTERCEPTOR(int, __xstat64, int version, const char *path, void *buf) {
1226 SCOPED_TSAN_INTERCEPTOR(__xstat64, version, path, buf);
1227 return REAL(__xstat64)(version, path, buf);
1228}
1229
1230TSAN_INTERCEPTOR(int, stat64, const char *path, void *buf) {
1231 SCOPED_TSAN_INTERCEPTOR(__xstat64, 0, path, buf);
1232 return REAL(__xstat64)(0, path, buf);
1233}
1234
1235TSAN_INTERCEPTOR(int, __lxstat, int version, const char *path, void *buf) {
1236 SCOPED_TSAN_INTERCEPTOR(__lxstat, version, path, buf);
1237 return REAL(__lxstat)(version, path, buf);
1238}
1239
1240TSAN_INTERCEPTOR(int, lstat, const char *path, void *buf) {
1241 SCOPED_TSAN_INTERCEPTOR(__lxstat, 0, path, buf);
1242 return REAL(__lxstat)(0, path, buf);
1243}
1244
1245TSAN_INTERCEPTOR(int, __lxstat64, int version, const char *path, void *buf) {
1246 SCOPED_TSAN_INTERCEPTOR(__lxstat64, version, path, buf);
1247 return REAL(__lxstat64)(version, path, buf);
1248}
1249
1250TSAN_INTERCEPTOR(int, lstat64, const char *path, void *buf) {
1251 SCOPED_TSAN_INTERCEPTOR(__lxstat64, 0, path, buf);
1252 return REAL(__lxstat64)(0, path, buf);
1253}
1254
1255TSAN_INTERCEPTOR(int, __fxstat, int version, int fd, void *buf) {
1256 SCOPED_TSAN_INTERCEPTOR(__fxstat, version, fd, buf);
Dmitry Vyukovc05cbca2013-02-01 15:52:35 +00001257 if (fd > 0)
1258 FdAccess(thr, pc, fd);
Dmitry Vyukov61ba1b52013-01-29 09:23:09 +00001259 return REAL(__fxstat)(version, fd, buf);
1260}
1261
1262TSAN_INTERCEPTOR(int, fstat, int fd, void *buf) {
1263 SCOPED_TSAN_INTERCEPTOR(__fxstat, 0, fd, buf);
Dmitry Vyukovc05cbca2013-02-01 15:52:35 +00001264 if (fd > 0)
1265 FdAccess(thr, pc, fd);
Dmitry Vyukov61ba1b52013-01-29 09:23:09 +00001266 return REAL(__fxstat)(0, fd, buf);
1267}
1268
1269TSAN_INTERCEPTOR(int, __fxstat64, int version, int fd, void *buf) {
1270 SCOPED_TSAN_INTERCEPTOR(__fxstat64, version, fd, buf);
Dmitry Vyukovc05cbca2013-02-01 15:52:35 +00001271 if (fd > 0)
1272 FdAccess(thr, pc, fd);
Dmitry Vyukov61ba1b52013-01-29 09:23:09 +00001273 return REAL(__fxstat64)(version, fd, buf);
1274}
1275
1276TSAN_INTERCEPTOR(int, fstat64, int fd, void *buf) {
1277 SCOPED_TSAN_INTERCEPTOR(__fxstat64, 0, fd, buf);
Dmitry Vyukovc05cbca2013-02-01 15:52:35 +00001278 if (fd > 0)
1279 FdAccess(thr, pc, fd);
Dmitry Vyukov61ba1b52013-01-29 09:23:09 +00001280 return REAL(__fxstat64)(0, fd, buf);
1281}
1282
Dmitry Vyukovba3ae352012-12-07 18:30:40 +00001283TSAN_INTERCEPTOR(int, open, const char *name, int flags, int mode) {
1284 SCOPED_TSAN_INTERCEPTOR(open, name, flags, mode);
1285 int fd = REAL(open)(name, flags, mode);
1286 if (fd >= 0)
Dmitry Vyukov68230a12012-12-07 19:23:59 +00001287 FdFileCreate(thr, pc, fd);
Dmitry Vyukovba3ae352012-12-07 18:30:40 +00001288 return fd;
1289}
1290
Dmitry Vyukovc78839f2012-12-12 11:59:30 +00001291TSAN_INTERCEPTOR(int, open64, const char *name, int flags, int mode) {
1292 SCOPED_TSAN_INTERCEPTOR(open64, name, flags, mode);
1293 int fd = REAL(open64)(name, flags, mode);
1294 if (fd >= 0)
1295 FdFileCreate(thr, pc, fd);
1296 return fd;
1297}
1298
Dmitry Vyukovba3ae352012-12-07 18:30:40 +00001299TSAN_INTERCEPTOR(int, creat, const char *name, int mode) {
1300 SCOPED_TSAN_INTERCEPTOR(creat, name, mode);
1301 int fd = REAL(creat)(name, mode);
1302 if (fd >= 0)
Dmitry Vyukov68230a12012-12-07 19:23:59 +00001303 FdFileCreate(thr, pc, fd);
Dmitry Vyukovba3ae352012-12-07 18:30:40 +00001304 return fd;
1305}
1306
Dmitry Vyukovc78839f2012-12-12 11:59:30 +00001307TSAN_INTERCEPTOR(int, creat64, const char *name, int mode) {
1308 SCOPED_TSAN_INTERCEPTOR(creat64, name, mode);
1309 int fd = REAL(creat64)(name, mode);
1310 if (fd >= 0)
1311 FdFileCreate(thr, pc, fd);
1312 return fd;
1313}
1314
Dmitry Vyukovba3ae352012-12-07 18:30:40 +00001315TSAN_INTERCEPTOR(int, dup, int oldfd) {
1316 SCOPED_TSAN_INTERCEPTOR(dup, oldfd);
1317 int newfd = REAL(dup)(oldfd);
Dmitry Vyukovb843c1f2012-12-24 11:43:34 +00001318 if (oldfd >= 0 && newfd >= 0 && newfd != oldfd)
Dmitry Vyukovba3ae352012-12-07 18:30:40 +00001319 FdDup(thr, pc, oldfd, newfd);
1320 return newfd;
1321}
1322
1323TSAN_INTERCEPTOR(int, dup2, int oldfd, int newfd) {
1324 SCOPED_TSAN_INTERCEPTOR(dup2, oldfd, newfd);
1325 int newfd2 = REAL(dup2)(oldfd, newfd);
Dmitry Vyukovb843c1f2012-12-24 11:43:34 +00001326 if (oldfd >= 0 && newfd2 >= 0 && newfd2 != oldfd)
Dmitry Vyukovba3ae352012-12-07 18:30:40 +00001327 FdDup(thr, pc, oldfd, newfd2);
1328 return newfd2;
1329}
1330
1331TSAN_INTERCEPTOR(int, dup3, int oldfd, int newfd, int flags) {
1332 SCOPED_TSAN_INTERCEPTOR(dup3, oldfd, newfd, flags);
1333 int newfd2 = REAL(dup3)(oldfd, newfd, flags);
Dmitry Vyukovb843c1f2012-12-24 11:43:34 +00001334 if (oldfd >= 0 && newfd2 >= 0 && newfd2 != oldfd)
Dmitry Vyukovba3ae352012-12-07 18:30:40 +00001335 FdDup(thr, pc, oldfd, newfd2);
1336 return newfd2;
1337}
1338
Dmitry Vyukov68230a12012-12-07 19:23:59 +00001339TSAN_INTERCEPTOR(int, eventfd, unsigned initval, int flags) {
1340 SCOPED_TSAN_INTERCEPTOR(eventfd, initval, flags);
1341 int fd = REAL(eventfd)(initval, flags);
1342 if (fd >= 0)
1343 FdEventCreate(thr, pc, fd);
1344 return fd;
1345}
1346
Dmitry Vyukov45d43242012-12-18 12:35:31 +00001347TSAN_INTERCEPTOR(int, signalfd, int fd, void *mask, int flags) {
1348 SCOPED_TSAN_INTERCEPTOR(signalfd, fd, mask, flags);
Dmitry Vyukovb843c1f2012-12-24 11:43:34 +00001349 if (fd >= 0)
1350 FdClose(thr, pc, fd);
Dmitry Vyukov45d43242012-12-18 12:35:31 +00001351 fd = REAL(signalfd)(fd, mask, flags);
1352 if (fd >= 0)
1353 FdSignalCreate(thr, pc, fd);
1354 return fd;
1355}
1356
Dmitry Vyukovb75c67b2012-12-19 06:59:45 +00001357TSAN_INTERCEPTOR(int, inotify_init, int fake) {
1358 SCOPED_TSAN_INTERCEPTOR(inotify_init, fake);
1359 int fd = REAL(inotify_init)(fake);
Dmitry Vyukov45d43242012-12-18 12:35:31 +00001360 if (fd >= 0)
1361 FdInotifyCreate(thr, pc, fd);
1362 return fd;
1363}
1364
1365TSAN_INTERCEPTOR(int, inotify_init1, int flags) {
1366 SCOPED_TSAN_INTERCEPTOR(inotify_init1, flags);
1367 int fd = REAL(inotify_init1)(flags);
1368 if (fd >= 0)
1369 FdInotifyCreate(thr, pc, fd);
1370 return fd;
1371}
1372
Dmitry Vyukov68230a12012-12-07 19:23:59 +00001373TSAN_INTERCEPTOR(int, socket, int domain, int type, int protocol) {
1374 SCOPED_TSAN_INTERCEPTOR(socket, domain, type, protocol);
1375 int fd = REAL(socket)(domain, type, protocol);
1376 if (fd >= 0)
1377 FdSocketCreate(thr, pc, fd);
1378 return fd;
1379}
1380
Dmitry Vyukov983518e2012-12-14 09:57:42 +00001381TSAN_INTERCEPTOR(int, socketpair, int domain, int type, int protocol, int *fd) {
1382 SCOPED_TSAN_INTERCEPTOR(socketpair, domain, type, protocol, fd);
1383 int res = REAL(socketpair)(domain, type, protocol, fd);
1384 if (res == 0 && fd[0] >= 0 && fd[1] >= 0)
1385 FdPipeCreate(thr, pc, fd[0], fd[1]);
1386 return res;
1387}
1388
Dmitry Vyukov68230a12012-12-07 19:23:59 +00001389TSAN_INTERCEPTOR(int, connect, int fd, void *addr, unsigned addrlen) {
1390 SCOPED_TSAN_INTERCEPTOR(connect, fd, addr, addrlen);
Dmitry Vyukoved513f62012-12-14 20:01:58 +00001391 FdSocketConnecting(thr, pc, fd);
Dmitry Vyukov68230a12012-12-07 19:23:59 +00001392 int res = REAL(connect)(fd, addr, addrlen);
Dmitry Vyukovb843c1f2012-12-24 11:43:34 +00001393 if (res == 0 && fd >= 0)
Dmitry Vyukov68230a12012-12-07 19:23:59 +00001394 FdSocketConnect(thr, pc, fd);
1395 return res;
1396}
1397
Dmitry Vyukov52c70e52013-02-04 08:06:32 +00001398TSAN_INTERCEPTOR(int, bind, int fd, void *addr, unsigned addrlen) {
1399 SCOPED_TSAN_INTERCEPTOR(bind, fd, addr, addrlen);
1400 int res = REAL(bind)(fd, addr, addrlen);
1401 if (fd > 0 && res == 0)
1402 FdAccess(thr, pc, fd);
1403 return res;
1404}
1405
1406TSAN_INTERCEPTOR(int, listen, int fd, int backlog) {
1407 SCOPED_TSAN_INTERCEPTOR(listen, fd, backlog);
1408 int res = REAL(listen)(fd, backlog);
1409 if (fd > 0 && res == 0)
1410 FdAccess(thr, pc, fd);
1411 return res;
1412}
1413
Dmitry Vyukov68230a12012-12-07 19:23:59 +00001414TSAN_INTERCEPTOR(int, epoll_create, int size) {
1415 SCOPED_TSAN_INTERCEPTOR(epoll_create, size);
1416 int fd = REAL(epoll_create)(size);
1417 if (fd >= 0)
1418 FdPollCreate(thr, pc, fd);
1419 return fd;
1420}
1421
1422TSAN_INTERCEPTOR(int, epoll_create1, int flags) {
1423 SCOPED_TSAN_INTERCEPTOR(epoll_create1, flags);
1424 int fd = REAL(epoll_create1)(flags);
1425 if (fd >= 0)
1426 FdPollCreate(thr, pc, fd);
1427 return fd;
1428}
1429
Dmitry Vyukovddeb2c32012-12-07 15:32:56 +00001430TSAN_INTERCEPTOR(int, close, int fd) {
1431 SCOPED_TSAN_INTERCEPTOR(close, fd);
Dmitry Vyukovc78839f2012-12-12 11:59:30 +00001432 if (fd >= 0)
1433 FdClose(thr, pc, fd);
Dmitry Vyukovddeb2c32012-12-07 15:32:56 +00001434 return REAL(close)(fd);
1435}
1436
Dmitry Vyukovc78839f2012-12-12 11:59:30 +00001437TSAN_INTERCEPTOR(int, __close, int fd) {
1438 SCOPED_TSAN_INTERCEPTOR(__close, fd);
1439 if (fd >= 0)
1440 FdClose(thr, pc, fd);
1441 return REAL(__close)(fd);
1442}
1443
Dmitry Vyukov03f22482013-02-07 15:27:45 +00001444// glibc guts
1445TSAN_INTERCEPTOR(void, __res_iclose, void *state, bool free_addr) {
1446 SCOPED_TSAN_INTERCEPTOR(__res_iclose, state, free_addr);
1447 int fds[64];
1448 int cnt = ExtractResolvFDs(state, fds, ARRAY_SIZE(fds));
1449 for (int i = 0; i < cnt; i++) {
1450 if (fds[i] > 0)
1451 FdClose(thr, pc, fds[i]);
1452 }
1453 REAL(__res_iclose)(state, free_addr);
1454}
1455
Dmitry Vyukov01e96982012-12-07 16:22:54 +00001456TSAN_INTERCEPTOR(int, pipe, int *pipefd) {
Dmitry Vyukovddeb2c32012-12-07 15:32:56 +00001457 SCOPED_TSAN_INTERCEPTOR(pipe, pipefd);
1458 int res = REAL(pipe)(pipefd);
Dmitry Vyukovb843c1f2012-12-24 11:43:34 +00001459 if (res == 0 && pipefd[0] >= 0 && pipefd[1] >= 0)
Dmitry Vyukov68230a12012-12-07 19:23:59 +00001460 FdPipeCreate(thr, pc, pipefd[0], pipefd[1]);
Dmitry Vyukov01e96982012-12-07 16:22:54 +00001461 return res;
Dmitry Vyukovddeb2c32012-12-07 15:32:56 +00001462}
1463
Dmitry Vyukov01e96982012-12-07 16:22:54 +00001464TSAN_INTERCEPTOR(int, pipe2, int *pipefd, int flags) {
Dmitry Vyukovddeb2c32012-12-07 15:32:56 +00001465 SCOPED_TSAN_INTERCEPTOR(pipe2, pipefd, flags);
1466 int res = REAL(pipe2)(pipefd, flags);
Dmitry Vyukovb843c1f2012-12-24 11:43:34 +00001467 if (res == 0 && pipefd[0] >= 0 && pipefd[1] >= 0)
Dmitry Vyukov68230a12012-12-07 19:23:59 +00001468 FdPipeCreate(thr, pc, pipefd[0], pipefd[1]);
Dmitry Vyukovddeb2c32012-12-07 15:32:56 +00001469 return res;
1470}
1471
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001472TSAN_INTERCEPTOR(long_t, send, int fd, void *buf, long_t len, int flags) {
1473 SCOPED_TSAN_INTERCEPTOR(send, fd, buf, len, flags);
Dmitry Vyukov67f55442013-10-11 14:13:11 +00001474 if (fd >= 0) {
1475 FdAccess(thr, pc, fd);
Dmitry Vyukovb843c1f2012-12-24 11:43:34 +00001476 FdRelease(thr, pc, fd);
Dmitry Vyukov67f55442013-10-11 14:13:11 +00001477 }
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001478 int res = REAL(send)(fd, buf, len, flags);
1479 return res;
1480}
1481
1482TSAN_INTERCEPTOR(long_t, sendmsg, int fd, void *msg, int flags) {
1483 SCOPED_TSAN_INTERCEPTOR(sendmsg, fd, msg, flags);
Dmitry Vyukov67f55442013-10-11 14:13:11 +00001484 if (fd >= 0) {
1485 FdAccess(thr, pc, fd);
Dmitry Vyukovb843c1f2012-12-24 11:43:34 +00001486 FdRelease(thr, pc, fd);
Dmitry Vyukov67f55442013-10-11 14:13:11 +00001487 }
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001488 int res = REAL(sendmsg)(fd, msg, flags);
1489 return res;
1490}
1491
1492TSAN_INTERCEPTOR(long_t, recv, int fd, void *buf, long_t len, int flags) {
1493 SCOPED_TSAN_INTERCEPTOR(recv, fd, buf, len, flags);
Dmitry Vyukov67f55442013-10-11 14:13:11 +00001494 if (fd >= 0)
1495 FdAccess(thr, pc, fd);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001496 int res = REAL(recv)(fd, buf, len, flags);
Dmitry Vyukovb843c1f2012-12-24 11:43:34 +00001497 if (res >= 0 && fd >= 0) {
Dmitry Vyukov3f4e6d92012-12-07 14:40:10 +00001498 FdAcquire(thr, pc, fd);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001499 }
1500 return res;
1501}
1502
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001503TSAN_INTERCEPTOR(int, unlink, char *path) {
1504 SCOPED_TSAN_INTERCEPTOR(unlink, path);
Dmitry Vyukovc78839f2012-12-12 11:59:30 +00001505 Release(thr, pc, File2addr(path));
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001506 int res = REAL(unlink)(path);
1507 return res;
1508}
1509
1510TSAN_INTERCEPTOR(void*, fopen, char *path, char *mode) {
1511 SCOPED_TSAN_INTERCEPTOR(fopen, path, mode);
1512 void *res = REAL(fopen)(path, mode);
Dmitry Vyukovc78839f2012-12-12 11:59:30 +00001513 Acquire(thr, pc, File2addr(path));
1514 if (res) {
Dmitry Vyukovf17b3822013-01-09 11:54:52 +00001515 int fd = fileno_unlocked(res);
Dmitry Vyukovc78839f2012-12-12 11:59:30 +00001516 if (fd >= 0)
1517 FdFileCreate(thr, pc, fd);
1518 }
1519 return res;
1520}
1521
1522TSAN_INTERCEPTOR(void*, freopen, char *path, char *mode, void *stream) {
1523 SCOPED_TSAN_INTERCEPTOR(freopen, path, mode, stream);
1524 if (stream) {
Dmitry Vyukovf17b3822013-01-09 11:54:52 +00001525 int fd = fileno_unlocked(stream);
Dmitry Vyukovc78839f2012-12-12 11:59:30 +00001526 if (fd >= 0)
1527 FdClose(thr, pc, fd);
1528 }
1529 void *res = REAL(freopen)(path, mode, stream);
1530 Acquire(thr, pc, File2addr(path));
1531 if (res) {
Dmitry Vyukovf17b3822013-01-09 11:54:52 +00001532 int fd = fileno_unlocked(res);
Dmitry Vyukovc78839f2012-12-12 11:59:30 +00001533 if (fd >= 0)
1534 FdFileCreate(thr, pc, fd);
1535 }
1536 return res;
1537}
1538
1539TSAN_INTERCEPTOR(int, fclose, void *stream) {
Dmitry Vyukovf17b3822013-01-09 11:54:52 +00001540 {
1541 SCOPED_TSAN_INTERCEPTOR(fclose, stream);
1542 if (stream) {
1543 int fd = fileno_unlocked(stream);
1544 if (fd >= 0)
1545 FdClose(thr, pc, fd);
1546 }
Dmitry Vyukovc78839f2012-12-12 11:59:30 +00001547 }
Dmitry Vyukovf17b3822013-01-09 11:54:52 +00001548 return REAL(fclose)(stream);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001549}
1550
1551TSAN_INTERCEPTOR(uptr, fread, void *ptr, uptr size, uptr nmemb, void *f) {
Dmitry Vyukovf17b3822013-01-09 11:54:52 +00001552 {
1553 SCOPED_TSAN_INTERCEPTOR(fread, ptr, size, nmemb, f);
1554 MemoryAccessRange(thr, pc, (uptr)ptr, size * nmemb, true);
1555 }
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001556 return REAL(fread)(ptr, size, nmemb, f);
1557}
1558
1559TSAN_INTERCEPTOR(uptr, fwrite, const void *p, uptr size, uptr nmemb, void *f) {
Dmitry Vyukovf17b3822013-01-09 11:54:52 +00001560 {
1561 SCOPED_TSAN_INTERCEPTOR(fwrite, p, size, nmemb, f);
1562 MemoryAccessRange(thr, pc, (uptr)p, size * nmemb, false);
1563 }
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001564 return REAL(fwrite)(p, size, nmemb, f);
1565}
1566
Dmitry Vyukov0ebfc6f2013-03-20 14:01:10 +00001567TSAN_INTERCEPTOR(int, fflush, void *stream) {
1568 SCOPED_TSAN_INTERCEPTOR(fflush, stream);
1569 return REAL(fflush)(stream);
1570}
1571
Dmitry Vyukov5043f052013-03-21 12:50:43 +00001572TSAN_INTERCEPTOR(void, abort, int fake) {
1573 SCOPED_TSAN_INTERCEPTOR(abort, fake);
1574 REAL(fflush)(0);
1575 REAL(abort)(fake);
1576}
1577
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001578TSAN_INTERCEPTOR(int, puts, const char *s) {
1579 SCOPED_TSAN_INTERCEPTOR(puts, s);
Dmitry Vyukovd51a1a12012-06-27 21:00:23 +00001580 MemoryAccessRange(thr, pc, (uptr)s, internal_strlen(s), false);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001581 return REAL(puts)(s);
1582}
1583
1584TSAN_INTERCEPTOR(int, rmdir, char *path) {
1585 SCOPED_TSAN_INTERCEPTOR(rmdir, path);
Dmitry Vyukovc78839f2012-12-12 11:59:30 +00001586 Release(thr, pc, Dir2addr(path));
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001587 int res = REAL(rmdir)(path);
1588 return res;
1589}
1590
1591TSAN_INTERCEPTOR(void*, opendir, char *path) {
1592 SCOPED_TSAN_INTERCEPTOR(opendir, path);
1593 void *res = REAL(opendir)(path);
Dmitry Vyukovc78839f2012-12-12 11:59:30 +00001594 if (res != 0)
1595 Acquire(thr, pc, Dir2addr(path));
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001596 return res;
1597}
1598
1599TSAN_INTERCEPTOR(int, epoll_ctl, int epfd, int op, int fd, void *ev) {
1600 SCOPED_TSAN_INTERCEPTOR(epoll_ctl, epfd, op, fd, ev);
Dmitry Vyukov29cec482013-10-11 13:33:22 +00001601 if (epfd >= 0)
1602 FdAccess(thr, pc, epfd);
1603 if (epfd >= 0 && fd >= 0)
Dmitry Vyukovf5d42732013-01-10 12:28:58 +00001604 FdAccess(thr, pc, fd);
Dmitry Vyukov29cec482013-10-11 13:33:22 +00001605 if (op == EPOLL_CTL_ADD && epfd >= 0)
1606 FdRelease(thr, pc, epfd);
1607 int res = REAL(epoll_ctl)(epfd, op, fd, ev);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001608 return res;
1609}
1610
1611TSAN_INTERCEPTOR(int, epoll_wait, int epfd, void *ev, int cnt, int timeout) {
1612 SCOPED_TSAN_INTERCEPTOR(epoll_wait, epfd, ev, cnt, timeout);
Dmitry Vyukov29cec482013-10-11 13:33:22 +00001613 if (epfd >= 0)
1614 FdAccess(thr, pc, epfd);
Dmitry Vyukovee8ee242012-11-15 17:40:49 +00001615 int res = BLOCK_REAL(epoll_wait)(epfd, ev, cnt, timeout);
Dmitry Vyukov29cec482013-10-11 13:33:22 +00001616 if (res > 0 && epfd >= 0)
Dmitry Vyukov3f4e6d92012-12-07 14:40:10 +00001617 FdAcquire(thr, pc, epfd);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001618 return res;
1619}
1620
Timur Iskhodzhanovb157c672013-03-28 21:16:09 +00001621void ALWAYS_INLINE rtl_generic_sighandler(bool sigact, int sig,
Dmitry Vyukovd91d0672012-05-21 08:26:51 +00001622 my_siginfo_t *info, void *ctx) {
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001623 ThreadState *thr = cur_thread();
Dmitry Vyukove9636662012-06-27 16:05:06 +00001624 SignalContext *sctx = SigCtx(thr);
Dmitry Vyukovd91d0672012-05-21 08:26:51 +00001625 // Don't mess with synchronous signals.
Dmitry Vyukov1fc03d52012-06-28 18:07:46 +00001626 if (sig == SIGSEGV || sig == SIGBUS || sig == SIGILL ||
Dmitry Vyukov158ca522013-07-18 13:14:11 +00001627 sig == SIGABRT || sig == SIGFPE || sig == SIGPIPE || sig == SIGSYS ||
Dmitry Vyukovee8ee242012-11-15 17:40:49 +00001628 // If we are sending signal to ourselves, we must process it now.
1629 (sctx && sig == sctx->int_signal_send) ||
Dmitry Vyukov0bf04ea2012-11-21 11:12:33 +00001630 // If we are in blocking function, we can safely process it now
1631 // (but check if we are in a recursive interceptor,
1632 // i.e. pthread_join()->munmap()).
Dmitry Vyukov80d46a22012-11-22 13:53:54 +00001633 (sctx && sctx->in_blocking_func == 1 && thr->in_rtl == 1)) {
Dmitry Vyukovd91d0672012-05-21 08:26:51 +00001634 int in_rtl = thr->in_rtl;
1635 thr->in_rtl = 0;
1636 CHECK_EQ(thr->in_signal_handler, false);
1637 thr->in_signal_handler = true;
1638 if (sigact)
1639 sigactions[sig].sa_sigaction(sig, info, ctx);
1640 else
1641 sigactions[sig].sa_handler(sig);
1642 CHECK_EQ(thr->in_signal_handler, true);
1643 thr->in_signal_handler = false;
1644 thr->in_rtl = in_rtl;
1645 return;
1646 }
1647
Dmitry Vyukov1fc03d52012-06-28 18:07:46 +00001648 if (sctx == 0)
1649 return;
Dmitry Vyukove9636662012-06-27 16:05:06 +00001650 SignalDesc *signal = &sctx->pending_signals[sig];
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001651 if (signal->armed == false) {
1652 signal->armed = true;
Dmitry Vyukovd91d0672012-05-21 08:26:51 +00001653 signal->sigaction = sigact;
1654 if (info)
Dmitry Vyukov6e481552012-06-29 15:26:55 +00001655 internal_memcpy(&signal->siginfo, info, sizeof(*info));
Dmitry Vyukova5562db2012-06-27 17:35:35 +00001656 if (ctx)
Dmitry Vyukov6e481552012-06-29 15:26:55 +00001657 internal_memcpy(&signal->ctx, ctx, sizeof(signal->ctx));
Dmitry Vyukove9636662012-06-27 16:05:06 +00001658 sctx->pending_signal_count++;
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001659 }
1660}
1661
Dmitry Vyukovd91d0672012-05-21 08:26:51 +00001662static void rtl_sighandler(int sig) {
1663 rtl_generic_sighandler(false, sig, 0, 0);
1664}
1665
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001666static void rtl_sigaction(int sig, my_siginfo_t *info, void *ctx) {
Dmitry Vyukovd91d0672012-05-21 08:26:51 +00001667 rtl_generic_sighandler(true, sig, info, ctx);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001668}
1669
1670TSAN_INTERCEPTOR(int, sigaction, int sig, sigaction_t *act, sigaction_t *old) {
1671 SCOPED_TSAN_INTERCEPTOR(sigaction, sig, act, old);
Dmitry Vyukovd91d0672012-05-21 08:26:51 +00001672 if (old)
Dmitry Vyukov6e481552012-06-29 15:26:55 +00001673 internal_memcpy(old, &sigactions[sig], sizeof(*old));
Dmitry Vyukovd91d0672012-05-21 08:26:51 +00001674 if (act == 0)
1675 return 0;
Dmitry Vyukov6e481552012-06-29 15:26:55 +00001676 internal_memcpy(&sigactions[sig], act, sizeof(*act));
1677 sigaction_t newact;
1678 internal_memcpy(&newact, act, sizeof(newact));
Evgeniy Stepanov9a949a82013-09-25 14:47:43 +00001679 REAL(sigfillset)(&newact.sa_mask);
Dmitry Vyukovd91d0672012-05-21 08:26:51 +00001680 if (act->sa_handler != SIG_IGN && act->sa_handler != SIG_DFL) {
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001681 if (newact.sa_flags & SA_SIGINFO)
1682 newact.sa_sigaction = rtl_sigaction;
1683 else
1684 newact.sa_handler = rtl_sighandler;
Dmitry Vyukovd91d0672012-05-21 08:26:51 +00001685 }
1686 int res = REAL(sigaction)(sig, &newact, 0);
1687 return res;
1688}
1689
1690TSAN_INTERCEPTOR(sighandler_t, signal, int sig, sighandler_t h) {
Alexey Samsonov2135d8a2012-09-13 11:54:41 +00001691 sigaction_t act;
Dmitry Vyukovd91d0672012-05-21 08:26:51 +00001692 act.sa_handler = h;
Alexey Samsonov88207ab2012-06-15 12:24:07 +00001693 REAL(memset)(&act.sa_mask, -1, sizeof(act.sa_mask));
Dmitry Vyukovd91d0672012-05-21 08:26:51 +00001694 act.sa_flags = 0;
Alexey Samsonov2135d8a2012-09-13 11:54:41 +00001695 sigaction_t old;
Dmitry Vyukovd91d0672012-05-21 08:26:51 +00001696 int res = sigaction(sig, &act, &old);
1697 if (res)
1698 return SIG_ERR;
1699 return old.sa_handler;
1700}
1701
Evgeniy Stepanov9a949a82013-09-25 14:47:43 +00001702TSAN_INTERCEPTOR(int, sigsuspend, const __sanitizer_sigset_t *mask) {
Dmitry Vyukovfbeab512013-07-16 11:28:04 +00001703 SCOPED_TSAN_INTERCEPTOR(sigsuspend, mask);
1704 return REAL(sigsuspend)(mask);
1705}
1706
Dmitry Vyukovd91d0672012-05-21 08:26:51 +00001707TSAN_INTERCEPTOR(int, raise, int sig) {
1708 SCOPED_TSAN_INTERCEPTOR(raise, sig);
Dmitry Vyukove9636662012-06-27 16:05:06 +00001709 SignalContext *sctx = SigCtx(thr);
Dmitry Vyukov1fc03d52012-06-28 18:07:46 +00001710 CHECK_NE(sctx, 0);
Dmitry Vyukove9636662012-06-27 16:05:06 +00001711 int prev = sctx->int_signal_send;
1712 sctx->int_signal_send = sig;
Dmitry Vyukovd91d0672012-05-21 08:26:51 +00001713 int res = REAL(raise)(sig);
Dmitry Vyukove9636662012-06-27 16:05:06 +00001714 CHECK_EQ(sctx->int_signal_send, sig);
1715 sctx->int_signal_send = prev;
Dmitry Vyukovd91d0672012-05-21 08:26:51 +00001716 return res;
1717}
1718
1719TSAN_INTERCEPTOR(int, kill, int pid, int sig) {
1720 SCOPED_TSAN_INTERCEPTOR(kill, pid, sig);
Dmitry Vyukove9636662012-06-27 16:05:06 +00001721 SignalContext *sctx = SigCtx(thr);
Dmitry Vyukov1fc03d52012-06-28 18:07:46 +00001722 CHECK_NE(sctx, 0);
Dmitry Vyukove9636662012-06-27 16:05:06 +00001723 int prev = sctx->int_signal_send;
Peter Collingbourne0b694fc2013-05-17 16:56:53 +00001724 if (pid == (int)internal_getpid()) {
Dmitry Vyukove9636662012-06-27 16:05:06 +00001725 sctx->int_signal_send = sig;
Dmitry Vyukovd91d0672012-05-21 08:26:51 +00001726 }
1727 int res = REAL(kill)(pid, sig);
Peter Collingbourne0b694fc2013-05-17 16:56:53 +00001728 if (pid == (int)internal_getpid()) {
Dmitry Vyukove9636662012-06-27 16:05:06 +00001729 CHECK_EQ(sctx->int_signal_send, sig);
1730 sctx->int_signal_send = prev;
Dmitry Vyukovd91d0672012-05-21 08:26:51 +00001731 }
1732 return res;
1733}
1734
1735TSAN_INTERCEPTOR(int, pthread_kill, void *tid, int sig) {
1736 SCOPED_TSAN_INTERCEPTOR(pthread_kill, tid, sig);
Dmitry Vyukove9636662012-06-27 16:05:06 +00001737 SignalContext *sctx = SigCtx(thr);
Dmitry Vyukov1fc03d52012-06-28 18:07:46 +00001738 CHECK_NE(sctx, 0);
Dmitry Vyukove9636662012-06-27 16:05:06 +00001739 int prev = sctx->int_signal_send;
Dmitry Vyukovd91d0672012-05-21 08:26:51 +00001740 if (tid == pthread_self()) {
Dmitry Vyukove9636662012-06-27 16:05:06 +00001741 sctx->int_signal_send = sig;
Dmitry Vyukovd91d0672012-05-21 08:26:51 +00001742 }
1743 int res = REAL(pthread_kill)(tid, sig);
1744 if (tid == pthread_self()) {
Dmitry Vyukove9636662012-06-27 16:05:06 +00001745 CHECK_EQ(sctx->int_signal_send, sig);
1746 sctx->int_signal_send = prev;
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001747 }
1748 return res;
1749}
1750
Dmitry Vyukovee8ee242012-11-15 17:40:49 +00001751TSAN_INTERCEPTOR(int, gettimeofday, void *tv, void *tz) {
1752 SCOPED_TSAN_INTERCEPTOR(gettimeofday, tv, tz);
1753 // It's intercepted merely to process pending signals.
1754 return REAL(gettimeofday)(tv, tz);
1755}
1756
Dmitry Vyukovcf878fd2013-08-13 16:51:27 +00001757TSAN_INTERCEPTOR(int, getaddrinfo, void *node, void *service,
1758 void *hints, void *rv) {
1759 SCOPED_TSAN_INTERCEPTOR(getaddrinfo, node, service, hints, rv);
1760 // We miss atomic synchronization in getaddrinfo,
1761 // and can report false race between malloc and free
1762 // inside of getaddrinfo. So ignore memory accesses.
Dmitry Vyukov652f78a2013-09-19 04:39:04 +00001763 ThreadIgnoreBegin(thr);
Dmitry Vyukov98802192013-09-20 02:01:38 +00001764 // getaddrinfo calls fopen, which can be intercepted by user.
1765 thr->in_rtl--;
1766 CHECK_EQ(thr->in_rtl, 0);
Dmitry Vyukovcf878fd2013-08-13 16:51:27 +00001767 int res = REAL(getaddrinfo)(node, service, hints, rv);
Dmitry Vyukov98802192013-09-20 02:01:38 +00001768 thr->in_rtl++;
Dmitry Vyukov652f78a2013-09-19 04:39:04 +00001769 ThreadIgnoreEnd(thr);
Dmitry Vyukovcf878fd2013-08-13 16:51:27 +00001770 return res;
1771}
1772
Dmitry Vyukov92733f92012-11-30 06:50:15 +00001773// Linux kernel has a bug that leads to kernel deadlock if a process
1774// maps TBs of memory and then calls mlock().
1775static void MlockIsUnsupported() {
1776 static atomic_uint8_t printed;
1777 if (atomic_exchange(&printed, 1, memory_order_relaxed))
1778 return;
Alexey Samsonovc8c312a2013-07-01 08:25:29 +00001779 if (flags()->verbosity > 0)
1780 Printf("INFO: ThreadSanitizer ignores mlock/mlockall/munlock/munlockall\n");
Dmitry Vyukov92733f92012-11-30 06:50:15 +00001781}
1782
1783TSAN_INTERCEPTOR(int, mlock, const void *addr, uptr len) {
1784 MlockIsUnsupported();
1785 return 0;
1786}
1787
1788TSAN_INTERCEPTOR(int, munlock, const void *addr, uptr len) {
1789 MlockIsUnsupported();
1790 return 0;
1791}
1792
1793TSAN_INTERCEPTOR(int, mlockall, int flags) {
1794 MlockIsUnsupported();
1795 return 0;
1796}
1797
1798TSAN_INTERCEPTOR(int, munlockall, void) {
1799 MlockIsUnsupported();
1800 return 0;
1801}
1802
Dmitry Vyukovb75c67b2012-12-19 06:59:45 +00001803TSAN_INTERCEPTOR(int, fork, int fake) {
Dmitry Vyukov4af0f212013-10-03 13:37:17 +00001804 SCOPED_INTERCEPTOR_RAW(fork, fake);
Dmitry Vyukovb75c67b2012-12-19 06:59:45 +00001805 int pid = REAL(fork)(fake);
Dmitry Vyukov4554b7a2012-12-18 14:44:44 +00001806 if (pid == 0) {
1807 // child
1808 FdOnFork(thr, pc);
1809 } else if (pid > 0) {
1810 // parent
1811 }
1812 return pid;
1813}
1814
Dmitry Vyukov14dd9802013-10-03 15:22:29 +00001815static int OnExit(ThreadState *thr) {
1816 int status = Finalize(thr);
1817 REAL(fflush)(0);
1818 return status;
1819}
1820
Evgeniy Stepanov996c4f22013-01-18 11:17:23 +00001821struct TsanInterceptorContext {
1822 ThreadState *thr;
1823 const uptr caller_pc;
1824 const uptr pc;
1825};
1826
Dmitry Vyukovedd28212013-04-24 11:06:05 +00001827#include "sanitizer_common/sanitizer_platform_interceptors.h"
1828// Causes interceptor recursion (getpwuid_r() calls fopen())
1829#undef SANITIZER_INTERCEPT_GETPWNAM_AND_FRIENDS
1830#undef SANITIZER_INTERCEPT_GETPWNAM_R_AND_FRIENDS
Dmitry Vyukov917f62e2013-06-10 11:35:08 +00001831// Causes interceptor recursion (getaddrinfo() and fopen())
1832#undef SANITIZER_INTERCEPT_GETADDRINFO
Dmitry Vyukov48016bc2013-07-17 07:10:47 +00001833#undef SANITIZER_INTERCEPT_GETNAMEINFO
Dmitry Vyukovedd28212013-04-24 11:06:05 +00001834// Causes interceptor recursion (glob64() calls lstat64())
1835#undef SANITIZER_INTERCEPT_GLOB
1836
Evgeniy Stepanov3fa122e2013-07-09 12:07:59 +00001837#define COMMON_INTERCEPTOR_UNPOISON_PARAM(ctx, count) \
1838 do { \
1839 } while (false)
Dmitry Vyukov5cf2c462013-10-29 10:30:39 +00001840
Evgeniy Stepanov3fa122e2013-07-09 12:07:59 +00001841#define COMMON_INTERCEPTOR_WRITE_RANGE(ctx, ptr, size) \
1842 MemoryAccessRange(((TsanInterceptorContext *)ctx)->thr, \
1843 ((TsanInterceptorContext *)ctx)->pc, (uptr)ptr, size, \
Evgeniy Stepanov9d1525e2013-05-29 09:09:58 +00001844 true)
Dmitry Vyukov5cf2c462013-10-29 10:30:39 +00001845
Evgeniy Stepanov9d1525e2013-05-29 09:09:58 +00001846#define COMMON_INTERCEPTOR_READ_RANGE(ctx, ptr, size) \
1847 MemoryAccessRange(((TsanInterceptorContext *) ctx)->thr, \
1848 ((TsanInterceptorContext *) ctx)->pc, (uptr) ptr, size, \
1849 false)
Dmitry Vyukov5cf2c462013-10-29 10:30:39 +00001850
Evgeniy Stepanov9d1525e2013-05-29 09:09:58 +00001851#define COMMON_INTERCEPTOR_ENTER(ctx, func, ...) \
1852 SCOPED_TSAN_INTERCEPTOR(func, __VA_ARGS__); \
1853 TsanInterceptorContext _ctx = {thr, caller_pc, pc}; \
1854 ctx = (void *)&_ctx; \
1855 (void) ctx;
Dmitry Vyukov5cf2c462013-10-29 10:30:39 +00001856
Evgeniy Stepanov996c4f22013-01-18 11:17:23 +00001857#define COMMON_INTERCEPTOR_FD_ACQUIRE(ctx, fd) \
Evgeniy Stepanov9d1525e2013-05-29 09:09:58 +00001858 FdAcquire(((TsanInterceptorContext *) ctx)->thr, pc, fd)
Dmitry Vyukov5cf2c462013-10-29 10:30:39 +00001859
Evgeniy Stepanov996c4f22013-01-18 11:17:23 +00001860#define COMMON_INTERCEPTOR_FD_RELEASE(ctx, fd) \
Evgeniy Stepanov9d1525e2013-05-29 09:09:58 +00001861 FdRelease(((TsanInterceptorContext *) ctx)->thr, pc, fd)
Dmitry Vyukov5cf2c462013-10-29 10:30:39 +00001862
Dmitry Vyukov67f55442013-10-11 14:13:11 +00001863#define COMMON_INTERCEPTOR_FD_ACCESS(ctx, fd) \
1864 FdAccess(((TsanInterceptorContext *) ctx)->thr, pc, fd)
Dmitry Vyukov5cf2c462013-10-29 10:30:39 +00001865
Evgeniy Stepanov9d1525e2013-05-29 09:09:58 +00001866#define COMMON_INTERCEPTOR_FD_SOCKET_ACCEPT(ctx, fd, newfd) \
1867 FdSocketAccept(((TsanInterceptorContext *) ctx)->thr, pc, fd, newfd)
Dmitry Vyukov5cf2c462013-10-29 10:30:39 +00001868
Evgeniy Stepanov996c4f22013-01-18 11:17:23 +00001869#define COMMON_INTERCEPTOR_SET_THREAD_NAME(ctx, name) \
Evgeniy Stepanov9d1525e2013-05-29 09:09:58 +00001870 ThreadSetName(((TsanInterceptorContext *) ctx)->thr, name)
Dmitry Vyukov5cf2c462013-10-29 10:30:39 +00001871
1872#define COMMON_INTERCEPTOR_SET_PTHREAD_NAME(ctx, thread, name) \
1873 CTX()->thread_registry->SetThreadNameByUserId(thread, name)
1874
Evgeniy Stepanove18e3f02013-08-12 13:19:53 +00001875#define COMMON_INTERCEPTOR_BLOCK_REAL(name) BLOCK_REAL(name)
Dmitry Vyukov5cf2c462013-10-29 10:30:39 +00001876
Dmitry Vyukov14dd9802013-10-03 15:22:29 +00001877#define COMMON_INTERCEPTOR_ON_EXIT(ctx) \
1878 OnExit(((TsanInterceptorContext *) ctx)->thr)
Dmitry Vyukov5cf2c462013-10-29 10:30:39 +00001879
Alexey Samsonov5e2d3772013-10-16 08:20:31 +00001880#define COMMON_INTERCEPTOR_MUTEX_LOCK(ctx, m) \
1881 MutexLock(((TsanInterceptorContext *)ctx)->thr, \
1882 ((TsanInterceptorContext *)ctx)->pc, (uptr)m)
Dmitry Vyukov5cf2c462013-10-29 10:30:39 +00001883
Alexey Samsonov5e2d3772013-10-16 08:20:31 +00001884#define COMMON_INTERCEPTOR_MUTEX_UNLOCK(ctx, m) \
1885 MutexUnlock(((TsanInterceptorContext *)ctx)->thr, \
1886 ((TsanInterceptorContext *)ctx)->pc, (uptr)m)
Dmitry Vyukov5cf2c462013-10-29 10:30:39 +00001887
Evgeniy Stepanov4f32c0b2013-01-18 13:01:18 +00001888#include "sanitizer_common/sanitizer_common_interceptors.inc"
Kostya Serebryanyc8033192013-01-17 13:09:00 +00001889
Dmitry Vyukov6c21e112013-09-21 20:59:04 +00001890#define TSAN_SYSCALL() \
1891 ThreadState *thr = cur_thread(); \
1892 ScopedSyscall scoped_syscall(thr) \
1893/**/
1894
1895struct ScopedSyscall {
1896 ThreadState *thr;
1897
1898 explicit ScopedSyscall(ThreadState *thr)
1899 : thr(thr) {
1900 if (thr->in_rtl == 0)
1901 Initialize(thr);
1902 thr->in_rtl++;
1903 }
1904
1905 ~ScopedSyscall() {
1906 thr->in_rtl--;
1907 if (thr->in_rtl == 0)
1908 ProcessPendingSignals(thr);
1909 }
1910};
1911
Dmitry Vyukoveb0be612013-09-20 06:54:14 +00001912static void syscall_access_range(uptr pc, uptr p, uptr s, bool write) {
Dmitry Vyukov6c21e112013-09-21 20:59:04 +00001913 TSAN_SYSCALL();
Dmitry Vyukoveb0be612013-09-20 06:54:14 +00001914 MemoryAccessRange(thr, pc, p, s, write);
Dmitry Vyukoveb0be612013-09-20 06:54:14 +00001915}
1916
Dmitry Vyukovb47d41f2013-09-21 03:47:35 +00001917static void syscall_fd_close(uptr pc, int fd) {
Dmitry Vyukov6c21e112013-09-21 20:59:04 +00001918 TSAN_SYSCALL();
1919 if (fd >= 0)
1920 FdClose(thr, pc, fd);
1921}
1922
1923static void syscall_pre_fork(uptr pc) {
1924 TSAN_SYSCALL();
1925}
1926
1927static void syscall_post_fork(uptr pc, int res) {
1928 TSAN_SYSCALL();
1929 if (res == 0) {
1930 // child
1931 FdOnFork(thr, pc);
1932 } else if (res > 0) {
1933 // parent
1934 }
Dmitry Vyukovb47d41f2013-09-21 03:47:35 +00001935}
1936
Alexey Samsonovc09250f2013-09-19 07:59:18 +00001937#define COMMON_SYSCALL_PRE_READ_RANGE(p, s) \
Dmitry Vyukoveb0be612013-09-20 06:54:14 +00001938 syscall_access_range(GET_CALLER_PC(), (uptr)(p), (uptr)(s), false)
Alexey Samsonovc09250f2013-09-19 07:59:18 +00001939#define COMMON_SYSCALL_PRE_WRITE_RANGE(p, s) \
Dmitry Vyukoveb0be612013-09-20 06:54:14 +00001940 syscall_access_range(GET_CALLER_PC(), (uptr)(p), (uptr)(s), true)
Alexey Samsonovc09250f2013-09-19 07:59:18 +00001941#define COMMON_SYSCALL_POST_READ_RANGE(p, s) \
1942 do { } while (false)
1943#define COMMON_SYSCALL_POST_WRITE_RANGE(p, s) \
1944 do { } while (false)
Dmitry Vyukovb47d41f2013-09-21 03:47:35 +00001945#define COMMON_SYSCALL_FD_CLOSE(fd) \
1946 syscall_fd_close(GET_CALLER_PC(), fd)
Dmitry Vyukov6c21e112013-09-21 20:59:04 +00001947#define COMMON_SYSCALL_PRE_FORK() \
1948 syscall_pre_fork(GET_CALLER_PC())
1949#define COMMON_SYSCALL_POST_FORK(res) \
1950 syscall_post_fork(GET_CALLER_PC(), res)
Evgeniy Stepanov881b6772013-04-12 14:57:03 +00001951#include "sanitizer_common/sanitizer_common_syscalls.inc"
1952
Dmitry Vyukovee8ee242012-11-15 17:40:49 +00001953namespace __tsan {
1954
Dmitry Vyukovc78140f2013-10-03 14:00:46 +00001955static void finalize(void *arg) {
Dmitry Vyukov14dd9802013-10-03 15:22:29 +00001956 ThreadState *thr = cur_thread();
Dmitry Vyukovc78140f2013-10-03 14:00:46 +00001957 uptr pc = 0;
1958 atexit_ctx->exit(thr, pc);
1959 int status = Finalize(thr);
1960 REAL(fflush)(0);
1961 if (status)
1962 REAL(_exit)(status);
1963}
1964
Dmitry Vyukovee8ee242012-11-15 17:40:49 +00001965void ProcessPendingSignals(ThreadState *thr) {
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001966 CHECK_EQ(thr->in_rtl, 0);
Dmitry Vyukove9636662012-06-27 16:05:06 +00001967 SignalContext *sctx = SigCtx(thr);
Dmitry Vyukov1fc03d52012-06-28 18:07:46 +00001968 if (sctx == 0 || sctx->pending_signal_count == 0 || thr->in_signal_handler)
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001969 return;
Dmitry Vyukov158c6ac2012-10-05 15:51:32 +00001970 Context *ctx = CTX();
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001971 thr->in_signal_handler = true;
Dmitry Vyukove9636662012-06-27 16:05:06 +00001972 sctx->pending_signal_count = 0;
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001973 // These are too big for stack.
Evgeniy Stepanov9a949a82013-09-25 14:47:43 +00001974 static THREADLOCAL __sanitizer_sigset_t emptyset, oldset;
1975 REAL(sigfillset)(&emptyset);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001976 pthread_sigmask(SIG_SETMASK, &emptyset, &oldset);
1977 for (int sig = 0; sig < kSigCount; sig++) {
Dmitry Vyukove9636662012-06-27 16:05:06 +00001978 SignalDesc *signal = &sctx->pending_signals[sig];
Kostya Serebryany7ac41482012-05-10 13:48:04 +00001979 if (signal->armed) {
1980 signal->armed = false;
Dmitry Vyukovd91d0672012-05-21 08:26:51 +00001981 if (sigactions[sig].sa_handler != SIG_DFL
1982 && sigactions[sig].sa_handler != SIG_IGN) {
Dmitry Vyukov7a72b4a2012-06-27 13:54:46 +00001983 // Insure that the handler does not spoil errno.
1984 const int saved_errno = errno;
1985 errno = 0;
Dmitry Vyukovd91d0672012-05-21 08:26:51 +00001986 if (signal->sigaction)
Dmitry Vyukova5562db2012-06-27 17:35:35 +00001987 sigactions[sig].sa_sigaction(sig, &signal->siginfo, &signal->ctx);
Dmitry Vyukovd91d0672012-05-21 08:26:51 +00001988 else
1989 sigactions[sig].sa_handler(sig);
Dmitry Vyukov8a326772012-11-07 16:14:12 +00001990 if (flags()->report_bugs && errno != 0) {
Dmitry Vyukov7a72b4a2012-06-27 13:54:46 +00001991 ScopedInRtl in_rtl;
Alexey Samsonov4f0ea392012-09-24 13:19:47 +00001992 __tsan::StackTrace stack;
Dmitry Vyukov7a72b4a2012-06-27 13:54:46 +00001993 uptr pc = signal->sigaction ?
1994 (uptr)sigactions[sig].sa_sigaction :
1995 (uptr)sigactions[sig].sa_handler;
Dmitry Vyukove7718bc2013-06-17 19:57:03 +00001996 pc += 1; // return address is expected, OutputReport() will undo this
Dmitry Vyukov7a72b4a2012-06-27 13:54:46 +00001997 stack.Init(&pc, 1);
Alexey Samsonov2bbd8be2013-03-15 13:48:44 +00001998 ThreadRegistryLock l(ctx->thread_registry);
Dmitry Vyukov7a72b4a2012-06-27 13:54:46 +00001999 ScopedReport rep(ReportTypeErrnoInSignal);
Dmitry Vyukov158c6ac2012-10-05 15:51:32 +00002000 if (!IsFiredSuppression(ctx, rep, stack)) {
2001 rep.AddStack(&stack);
2002 OutputReport(ctx, rep, rep.GetReport()->stacks[0]);
2003 }
Dmitry Vyukov7a72b4a2012-06-27 13:54:46 +00002004 }
2005 errno = saved_errno;
Dmitry Vyukovd91d0672012-05-21 08:26:51 +00002006 }
Kostya Serebryany7ac41482012-05-10 13:48:04 +00002007 }
2008 }
2009 pthread_sigmask(SIG_SETMASK, &oldset, 0);
2010 CHECK_EQ(thr->in_signal_handler, true);
2011 thr->in_signal_handler = false;
2012}
2013
Dmitry Vyukov91ac0082012-12-04 07:28:25 +00002014static void unreachable() {
2015 Printf("FATAL: ThreadSanitizer: unreachable called\n");
2016 Die();
2017}
2018
Kostya Serebryany7ac41482012-05-10 13:48:04 +00002019void InitializeInterceptors() {
2020 CHECK_GT(cur_thread()->in_rtl, 0);
2021
2022 // We need to setup it early, because functions like dlsym() can call it.
Dmitry Vyukov065c4ac2012-06-29 15:19:14 +00002023 REAL(memset) = internal_memset;
2024 REAL(memcpy) = internal_memcpy;
2025 REAL(memcmp) = internal_memcmp;
Kostya Serebryany7ac41482012-05-10 13:48:04 +00002026
Dmitry Vyukov8e1c7692013-03-19 12:24:19 +00002027 // Instruct libc malloc to consume less memory.
2028 mallopt(1, 0); // M_MXFAST
2029 mallopt(-3, 32*1024); // M_MMAP_THRESHOLD
2030
Kostya Serebryanyc8033192013-01-17 13:09:00 +00002031 SANITIZER_COMMON_INTERCEPTORS_INIT;
2032
Dmitry Vyukov8b30c252013-03-25 10:10:44 +00002033 TSAN_INTERCEPT(setjmp);
2034 TSAN_INTERCEPT(_setjmp);
2035 TSAN_INTERCEPT(sigsetjmp);
2036 TSAN_INTERCEPT(__sigsetjmp);
Dmitry Vyukovf037f562012-05-31 18:03:59 +00002037 TSAN_INTERCEPT(longjmp);
2038 TSAN_INTERCEPT(siglongjmp);
2039
Kostya Serebryany7ac41482012-05-10 13:48:04 +00002040 TSAN_INTERCEPT(malloc);
Dmitry Vyukov07ba8ef2012-11-30 17:27:58 +00002041 TSAN_INTERCEPT(__libc_memalign);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00002042 TSAN_INTERCEPT(calloc);
2043 TSAN_INTERCEPT(realloc);
2044 TSAN_INTERCEPT(free);
2045 TSAN_INTERCEPT(cfree);
2046 TSAN_INTERCEPT(mmap);
2047 TSAN_INTERCEPT(mmap64);
2048 TSAN_INTERCEPT(munmap);
2049 TSAN_INTERCEPT(memalign);
2050 TSAN_INTERCEPT(valloc);
2051 TSAN_INTERCEPT(pvalloc);
2052 TSAN_INTERCEPT(posix_memalign);
2053
Kostya Serebryany7ac41482012-05-10 13:48:04 +00002054 TSAN_INTERCEPT(strlen);
2055 TSAN_INTERCEPT(memset);
2056 TSAN_INTERCEPT(memcpy);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00002057 TSAN_INTERCEPT(memchr);
2058 TSAN_INTERCEPT(memrchr);
2059 TSAN_INTERCEPT(memmove);
2060 TSAN_INTERCEPT(memcmp);
2061 TSAN_INTERCEPT(strchr);
2062 TSAN_INTERCEPT(strchrnul);
2063 TSAN_INTERCEPT(strrchr);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00002064 TSAN_INTERCEPT(strcpy); // NOLINT
2065 TSAN_INTERCEPT(strncpy);
2066 TSAN_INTERCEPT(strstr);
Dmitry Vyukov39fa68e2013-09-21 23:44:19 +00002067 TSAN_INTERCEPT(strdup);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00002068
Kostya Serebryany7ac41482012-05-10 13:48:04 +00002069 TSAN_INTERCEPT(pthread_create);
2070 TSAN_INTERCEPT(pthread_join);
2071 TSAN_INTERCEPT(pthread_detach);
2072
2073 TSAN_INTERCEPT(pthread_mutex_init);
2074 TSAN_INTERCEPT(pthread_mutex_destroy);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00002075 TSAN_INTERCEPT(pthread_mutex_trylock);
2076 TSAN_INTERCEPT(pthread_mutex_timedlock);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00002077
2078 TSAN_INTERCEPT(pthread_spin_init);
2079 TSAN_INTERCEPT(pthread_spin_destroy);
2080 TSAN_INTERCEPT(pthread_spin_lock);
2081 TSAN_INTERCEPT(pthread_spin_trylock);
2082 TSAN_INTERCEPT(pthread_spin_unlock);
2083
2084 TSAN_INTERCEPT(pthread_rwlock_init);
2085 TSAN_INTERCEPT(pthread_rwlock_destroy);
2086 TSAN_INTERCEPT(pthread_rwlock_rdlock);
2087 TSAN_INTERCEPT(pthread_rwlock_tryrdlock);
2088 TSAN_INTERCEPT(pthread_rwlock_timedrdlock);
2089 TSAN_INTERCEPT(pthread_rwlock_wrlock);
2090 TSAN_INTERCEPT(pthread_rwlock_trywrlock);
2091 TSAN_INTERCEPT(pthread_rwlock_timedwrlock);
2092 TSAN_INTERCEPT(pthread_rwlock_unlock);
2093
Dmitry Vyukovfae2bff2013-09-19 23:44:51 +00002094 INTERCEPT_FUNCTION_VER(pthread_cond_destroy, GLIBC_2.3.2);
Dmitry Vyukovfae2bff2013-09-19 23:44:51 +00002095 INTERCEPT_FUNCTION_VER(pthread_cond_timedwait, GLIBC_2.3.2);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00002096
2097 TSAN_INTERCEPT(pthread_barrier_init);
2098 TSAN_INTERCEPT(pthread_barrier_destroy);
2099 TSAN_INTERCEPT(pthread_barrier_wait);
2100
2101 TSAN_INTERCEPT(pthread_once);
2102
2103 TSAN_INTERCEPT(sem_init);
2104 TSAN_INTERCEPT(sem_destroy);
2105 TSAN_INTERCEPT(sem_wait);
2106 TSAN_INTERCEPT(sem_trywait);
2107 TSAN_INTERCEPT(sem_timedwait);
2108 TSAN_INTERCEPT(sem_post);
2109 TSAN_INTERCEPT(sem_getvalue);
2110
Dmitry Vyukov61ba1b52013-01-29 09:23:09 +00002111 TSAN_INTERCEPT(stat);
2112 TSAN_INTERCEPT(__xstat);
2113 TSAN_INTERCEPT(stat64);
2114 TSAN_INTERCEPT(__xstat64);
2115 TSAN_INTERCEPT(lstat);
2116 TSAN_INTERCEPT(__lxstat);
2117 TSAN_INTERCEPT(lstat64);
2118 TSAN_INTERCEPT(__lxstat64);
2119 TSAN_INTERCEPT(fstat);
2120 TSAN_INTERCEPT(__fxstat);
2121 TSAN_INTERCEPT(fstat64);
2122 TSAN_INTERCEPT(__fxstat64);
Dmitry Vyukovba3ae352012-12-07 18:30:40 +00002123 TSAN_INTERCEPT(open);
Dmitry Vyukovc78839f2012-12-12 11:59:30 +00002124 TSAN_INTERCEPT(open64);
Dmitry Vyukovba3ae352012-12-07 18:30:40 +00002125 TSAN_INTERCEPT(creat);
Dmitry Vyukovc78839f2012-12-12 11:59:30 +00002126 TSAN_INTERCEPT(creat64);
Dmitry Vyukovba3ae352012-12-07 18:30:40 +00002127 TSAN_INTERCEPT(dup);
2128 TSAN_INTERCEPT(dup2);
2129 TSAN_INTERCEPT(dup3);
Dmitry Vyukov68230a12012-12-07 19:23:59 +00002130 TSAN_INTERCEPT(eventfd);
Dmitry Vyukov45d43242012-12-18 12:35:31 +00002131 TSAN_INTERCEPT(signalfd);
2132 TSAN_INTERCEPT(inotify_init);
2133 TSAN_INTERCEPT(inotify_init1);
Dmitry Vyukov68230a12012-12-07 19:23:59 +00002134 TSAN_INTERCEPT(socket);
Dmitry Vyukov983518e2012-12-14 09:57:42 +00002135 TSAN_INTERCEPT(socketpair);
Dmitry Vyukov68230a12012-12-07 19:23:59 +00002136 TSAN_INTERCEPT(connect);
Dmitry Vyukov52c70e52013-02-04 08:06:32 +00002137 TSAN_INTERCEPT(bind);
2138 TSAN_INTERCEPT(listen);
Dmitry Vyukov68230a12012-12-07 19:23:59 +00002139 TSAN_INTERCEPT(epoll_create);
2140 TSAN_INTERCEPT(epoll_create1);
Dmitry Vyukovddeb2c32012-12-07 15:32:56 +00002141 TSAN_INTERCEPT(close);
Dmitry Vyukov03f22482013-02-07 15:27:45 +00002142 TSAN_INTERCEPT(__close);
2143 TSAN_INTERCEPT(__res_iclose);
Dmitry Vyukovddeb2c32012-12-07 15:32:56 +00002144 TSAN_INTERCEPT(pipe);
2145 TSAN_INTERCEPT(pipe2);
2146
Kostya Serebryany7ac41482012-05-10 13:48:04 +00002147 TSAN_INTERCEPT(send);
2148 TSAN_INTERCEPT(sendmsg);
2149 TSAN_INTERCEPT(recv);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00002150
2151 TSAN_INTERCEPT(unlink);
2152 TSAN_INTERCEPT(fopen);
Dmitry Vyukovc78839f2012-12-12 11:59:30 +00002153 TSAN_INTERCEPT(freopen);
2154 TSAN_INTERCEPT(fclose);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00002155 TSAN_INTERCEPT(fread);
2156 TSAN_INTERCEPT(fwrite);
Dmitry Vyukov0ebfc6f2013-03-20 14:01:10 +00002157 TSAN_INTERCEPT(fflush);
Dmitry Vyukov5043f052013-03-21 12:50:43 +00002158 TSAN_INTERCEPT(abort);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00002159 TSAN_INTERCEPT(puts);
2160 TSAN_INTERCEPT(rmdir);
2161 TSAN_INTERCEPT(opendir);
2162
2163 TSAN_INTERCEPT(epoll_ctl);
2164 TSAN_INTERCEPT(epoll_wait);
2165
2166 TSAN_INTERCEPT(sigaction);
Dmitry Vyukovd91d0672012-05-21 08:26:51 +00002167 TSAN_INTERCEPT(signal);
Dmitry Vyukovfbeab512013-07-16 11:28:04 +00002168 TSAN_INTERCEPT(sigsuspend);
Dmitry Vyukovd91d0672012-05-21 08:26:51 +00002169 TSAN_INTERCEPT(raise);
2170 TSAN_INTERCEPT(kill);
2171 TSAN_INTERCEPT(pthread_kill);
Dmitry Vyukov84853112012-08-31 17:27:49 +00002172 TSAN_INTERCEPT(sleep);
2173 TSAN_INTERCEPT(usleep);
2174 TSAN_INTERCEPT(nanosleep);
Dmitry Vyukovaad173b2012-11-09 19:55:06 +00002175 TSAN_INTERCEPT(gettimeofday);
Dmitry Vyukovcf878fd2013-08-13 16:51:27 +00002176 TSAN_INTERCEPT(getaddrinfo);
Kostya Serebryany7ac41482012-05-10 13:48:04 +00002177
Dmitry Vyukov92733f92012-11-30 06:50:15 +00002178 TSAN_INTERCEPT(mlock);
2179 TSAN_INTERCEPT(munlock);
2180 TSAN_INTERCEPT(mlockall);
2181 TSAN_INTERCEPT(munlockall);
2182
Dmitry Vyukov4554b7a2012-12-18 14:44:44 +00002183 TSAN_INTERCEPT(fork);
Dmitry Vyukov4af0f212013-10-03 13:37:17 +00002184 TSAN_INTERCEPT(dlopen);
2185 TSAN_INTERCEPT(dlclose);
Dmitry Vyukov31c05ea2013-01-29 13:05:30 +00002186 TSAN_INTERCEPT(on_exit);
2187 TSAN_INTERCEPT(__cxa_atexit);
Dmitry Vyukovc78140f2013-10-03 14:00:46 +00002188 TSAN_INTERCEPT(_exit);
Dmitry Vyukov4554b7a2012-12-18 14:44:44 +00002189
Dmitry Vyukov91ac0082012-12-04 07:28:25 +00002190 // Need to setup it, because interceptors check that the function is resolved.
2191 // But atexit is emitted directly into the module, so can't be resolved.
2192 REAL(atexit) = (int(*)(void(*)()))unreachable;
Kostya Serebryany7ac41482012-05-10 13:48:04 +00002193 atexit_ctx = new(internal_alloc(MBlockAtExit, sizeof(AtExitContext)))
2194 AtExitContext();
2195
Dmitry Vyukov31c05ea2013-01-29 13:05:30 +00002196 if (REAL(__cxa_atexit)(&finalize, 0, 0)) {
Alexey Samsonovb1fe3022012-11-02 12:17:51 +00002197 Printf("ThreadSanitizer: failed to setup atexit callback\n");
Kostya Serebryany7ac41482012-05-10 13:48:04 +00002198 Die();
2199 }
2200
2201 if (pthread_key_create(&g_thread_finalize_key, &thread_finalize)) {
Alexey Samsonovb1fe3022012-11-02 12:17:51 +00002202 Printf("ThreadSanitizer: failed to create thread key\n");
Kostya Serebryany7ac41482012-05-10 13:48:04 +00002203 Die();
2204 }
Dmitry Vyukov3f4e6d92012-12-07 14:40:10 +00002205
2206 FdInit();
Kostya Serebryany7ac41482012-05-10 13:48:04 +00002207}
2208
Dmitry Vyukov26127732012-05-22 11:33:03 +00002209void internal_start_thread(void(*func)(void *arg), void *arg) {
Dmitry Vyukov58dc8be2013-10-28 12:29:32 +00002210 // Start the thread with signals blocked, otherwise it can steal users
2211 // signals.
2212 __sanitizer_kernel_sigset_t set, old;
2213 internal_sigfillset(&set);
2214 internal_sigprocmask(SIG_SETMASK, &set, &old);
Dmitry Vyukov26127732012-05-22 11:33:03 +00002215 void *th;
2216 REAL(pthread_create)(&th, 0, (void*(*)(void *arg))func, arg);
2217 REAL(pthread_detach)(th);
Dmitry Vyukov58dc8be2013-10-28 12:29:32 +00002218 internal_sigprocmask(SIG_SETMASK, &old, 0);
Dmitry Vyukov26127732012-05-22 11:33:03 +00002219}
2220
Kostya Serebryany7ac41482012-05-10 13:48:04 +00002221} // namespace __tsan