• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 //===-- tsan_interceptors.cc ----------------------------------------------===//
2 //
3 //                     The LLVM Compiler Infrastructure
4 //
5 // This file is distributed under the University of Illinois Open Source
6 // License. See LICENSE.TXT for details.
7 //
8 //===----------------------------------------------------------------------===//
9 //
10 // This file is a part of ThreadSanitizer (TSan), a race detector.
11 //
12 // FIXME: move as many interceptors as possible into
13 // sanitizer_common/sanitizer_common_interceptors.inc
14 //===----------------------------------------------------------------------===//
15 
16 #include "sanitizer_common/sanitizer_atomic.h"
17 #include "sanitizer_common/sanitizer_libc.h"
18 #include "sanitizer_common/sanitizer_linux.h"
19 #include "sanitizer_common/sanitizer_platform_limits_posix.h"
20 #include "sanitizer_common/sanitizer_placement_new.h"
21 #include "sanitizer_common/sanitizer_stacktrace.h"
22 #include "interception/interception.h"
23 #include "tsan_interface.h"
24 #include "tsan_platform.h"
25 #include "tsan_suppressions.h"
26 #include "tsan_rtl.h"
27 #include "tsan_mman.h"
28 #include "tsan_fd.h"
29 
30 using namespace __tsan;  // NOLINT
31 
32 const int kSigCount = 65;
33 
34 struct my_siginfo_t {
35   // The size is determined by looking at sizeof of real siginfo_t on linux.
36   u64 opaque[128 / sizeof(u64)];
37 };
38 
39 struct ucontext_t {
40   // The size is determined by looking at sizeof of real ucontext_t on linux.
41   u64 opaque[936 / sizeof(u64) + 1];
42 };
43 
44 extern "C" int pthread_attr_init(void *attr);
45 extern "C" int pthread_attr_destroy(void *attr);
46 DECLARE_REAL(int, pthread_attr_getdetachstate, void *, void *)
47 extern "C" int pthread_attr_setstacksize(void *attr, uptr stacksize);
48 extern "C" int pthread_key_create(unsigned *key, void (*destructor)(void* v));
49 extern "C" int pthread_setspecific(unsigned key, const void *v);
50 DECLARE_REAL(int, pthread_mutexattr_gettype, void *, void *)
51 extern "C" int pthread_yield();
52 extern "C" int pthread_sigmask(int how, const __sanitizer_sigset_t *set,
53                                __sanitizer_sigset_t *oldset);
54 // REAL(sigfillset) defined in common interceptors.
55 DECLARE_REAL(int, sigfillset, __sanitizer_sigset_t *set)
56 DECLARE_REAL(int, fflush, __sanitizer_FILE *fp)
57 extern "C" void *pthread_self();
58 extern "C" void _exit(int status);
59 extern "C" int *__errno_location();
60 extern "C" int fileno_unlocked(void *stream);
61 extern "C" void *__libc_malloc(uptr size);
62 extern "C" void *__libc_calloc(uptr size, uptr n);
63 extern "C" void *__libc_realloc(void *ptr, uptr size);
64 extern "C" void __libc_free(void *ptr);
65 extern "C" int mallopt(int param, int value);
66 extern __sanitizer_FILE *stdout, *stderr;
67 const int PTHREAD_MUTEX_RECURSIVE = 1;
68 const int PTHREAD_MUTEX_RECURSIVE_NP = 1;
69 const int EINVAL = 22;
70 const int EBUSY = 16;
71 const int EOWNERDEAD = 130;
72 const int EPOLL_CTL_ADD = 1;
73 const int SIGILL = 4;
74 const int SIGABRT = 6;
75 const int SIGFPE = 8;
76 const int SIGSEGV = 11;
77 const int SIGPIPE = 13;
78 const int SIGTERM = 15;
79 const int SIGBUS = 7;
80 const int SIGSYS = 31;
81 void *const MAP_FAILED = (void*)-1;
82 const int PTHREAD_BARRIER_SERIAL_THREAD = -1;
83 const int MAP_FIXED = 0x10;
84 typedef long long_t;  // NOLINT
85 
86 // From /usr/include/unistd.h
87 # define F_ULOCK 0      /* Unlock a previously locked region.  */
88 # define F_LOCK  1      /* Lock a region for exclusive use.  */
89 # define F_TLOCK 2      /* Test and lock a region for exclusive use.  */
90 # define F_TEST  3      /* Test a region for other processes locks.  */
91 
92 typedef void (*sighandler_t)(int sig);
93 
94 #define errno (*__errno_location())
95 
96 struct sigaction_t {
97   union {
98     sighandler_t sa_handler;
99     void (*sa_sigaction)(int sig, my_siginfo_t *siginfo, void *uctx);
100   };
101   __sanitizer_sigset_t sa_mask;
102   int sa_flags;
103   void (*sa_restorer)();
104 };
105 
106 const sighandler_t SIG_DFL = (sighandler_t)0;
107 const sighandler_t SIG_IGN = (sighandler_t)1;
108 const sighandler_t SIG_ERR = (sighandler_t)-1;
109 const int SA_SIGINFO = 4;
110 const int SIG_SETMASK = 2;
111 
112 namespace std {
113 struct nothrow_t {};
114 }  // namespace std
115 
116 static sigaction_t sigactions[kSigCount];
117 
118 namespace __tsan {
119 struct SignalDesc {
120   bool armed;
121   bool sigaction;
122   my_siginfo_t siginfo;
123   ucontext_t ctx;
124 };
125 
126 struct SignalContext {
127   int in_blocking_func;
128   int int_signal_send;
129   int pending_signal_count;
130   SignalDesc pending_signals[kSigCount];
131 };
132 
133 // The object is 64-byte aligned, because we want hot data to be located in
134 // a single cache line if possible (it's accessed in every interceptor).
135 static ALIGNED(64) char libignore_placeholder[sizeof(LibIgnore)];
libignore()136 static LibIgnore *libignore() {
137   return reinterpret_cast<LibIgnore*>(&libignore_placeholder[0]);
138 }
139 
InitializeLibIgnore()140 void InitializeLibIgnore() {
141   libignore()->Init(*GetSuppressionContext());
142   libignore()->OnLibraryLoaded(0);
143 }
144 
145 }  // namespace __tsan
146 
SigCtx(ThreadState * thr)147 static SignalContext *SigCtx(ThreadState *thr) {
148   SignalContext *ctx = (SignalContext*)thr->signal_ctx;
149   if (ctx == 0 && thr->is_alive) {
150     ctx = (SignalContext*)MmapOrDie(sizeof(*ctx), "SignalContext");
151     MemoryResetRange(thr, (uptr)&SigCtx, (uptr)ctx, sizeof(*ctx));
152     thr->signal_ctx = ctx;
153   }
154   return ctx;
155 }
156 
157 static unsigned g_thread_finalize_key;
158 
159 class ScopedInterceptor {
160  public:
161   ScopedInterceptor(ThreadState *thr, const char *fname, uptr pc);
162   ~ScopedInterceptor();
163  private:
164   ThreadState *const thr_;
165   const uptr pc_;
166   bool in_ignored_lib_;
167 };
168 
ScopedInterceptor(ThreadState * thr,const char * fname,uptr pc)169 ScopedInterceptor::ScopedInterceptor(ThreadState *thr, const char *fname,
170                                      uptr pc)
171     : thr_(thr)
172     , pc_(pc)
173     , in_ignored_lib_(false) {
174   if (!thr_->ignore_interceptors) {
175     Initialize(thr);
176     FuncEntry(thr, pc);
177   }
178   DPrintf("#%d: intercept %s()\n", thr_->tid, fname);
179   if (!thr_->in_ignored_lib && libignore()->IsIgnored(pc)) {
180     in_ignored_lib_ = true;
181     thr_->in_ignored_lib = true;
182     ThreadIgnoreBegin(thr_, pc_);
183   }
184 }
185 
~ScopedInterceptor()186 ScopedInterceptor::~ScopedInterceptor() {
187   if (in_ignored_lib_) {
188     thr_->in_ignored_lib = false;
189     ThreadIgnoreEnd(thr_, pc_);
190   }
191   if (!thr_->ignore_interceptors) {
192     ProcessPendingSignals(thr_);
193     FuncExit(thr_);
194     CheckNoLocks(thr_);
195   }
196 }
197 
198 #define SCOPED_INTERCEPTOR_RAW(func, ...) \
199     ThreadState *thr = cur_thread(); \
200     const uptr caller_pc = GET_CALLER_PC(); \
201     ScopedInterceptor si(thr, #func, caller_pc); \
202     const uptr pc = __sanitizer::StackTrace::GetCurrentPc(); \
203     (void)pc; \
204 /**/
205 
206 #define SCOPED_TSAN_INTERCEPTOR(func, ...) \
207     SCOPED_INTERCEPTOR_RAW(func, __VA_ARGS__); \
208     if (REAL(func) == 0) { \
209       Report("FATAL: ThreadSanitizer: failed to intercept %s\n", #func); \
210       Die(); \
211     }                                                    \
212     if (thr->ignore_interceptors || thr->in_ignored_lib) \
213       return REAL(func)(__VA_ARGS__); \
214 /**/
215 
216 #define TSAN_INTERCEPTOR(ret, func, ...) INTERCEPTOR(ret, func, __VA_ARGS__)
217 #define TSAN_INTERCEPT(func) INTERCEPT_FUNCTION(func)
218 #define TSAN_INTERCEPT_VER(func, ver) INTERCEPT_FUNCTION_VER(func, ver)
219 
220 #define BLOCK_REAL(name) (BlockingCall(thr), REAL(name))
221 
222 struct BlockingCall {
BlockingCallBlockingCall223   explicit BlockingCall(ThreadState *thr)
224       : ctx(SigCtx(thr)) {
225     ctx->in_blocking_func++;
226   }
227 
~BlockingCallBlockingCall228   ~BlockingCall() {
229     ctx->in_blocking_func--;
230   }
231 
232   SignalContext *ctx;
233 
234   // When we are in a "blocking call", we process signals asynchronously
235   // (right when they arrive). In this context we do not expect to be
236   // executing any user/runtime code. The known interceptor sequence when
237   // this is not true is: pthread_join -> munmap(stack). It's fine
238   // to ignore munmap in this case -- we handle stack shadow separately.
239   ScopedIgnoreInterceptors ignore_interceptors;
240 };
241 
TSAN_INTERCEPTOR(unsigned,sleep,unsigned sec)242 TSAN_INTERCEPTOR(unsigned, sleep, unsigned sec) {
243   SCOPED_TSAN_INTERCEPTOR(sleep, sec);
244   unsigned res = BLOCK_REAL(sleep)(sec);
245   AfterSleep(thr, pc);
246   return res;
247 }
248 
TSAN_INTERCEPTOR(int,usleep,long_t usec)249 TSAN_INTERCEPTOR(int, usleep, long_t usec) {
250   SCOPED_TSAN_INTERCEPTOR(usleep, usec);
251   int res = BLOCK_REAL(usleep)(usec);
252   AfterSleep(thr, pc);
253   return res;
254 }
255 
TSAN_INTERCEPTOR(int,nanosleep,void * req,void * rem)256 TSAN_INTERCEPTOR(int, nanosleep, void *req, void *rem) {
257   SCOPED_TSAN_INTERCEPTOR(nanosleep, req, rem);
258   int res = BLOCK_REAL(nanosleep)(req, rem);
259   AfterSleep(thr, pc);
260   return res;
261 }
262 
263 class AtExitContext {
264  public:
AtExitContext()265   AtExitContext()
266     : mtx_(MutexTypeAtExit, StatMtxAtExit)
267     , pos_() {
268   }
269 
270   typedef void(*atexit_t)();
271 
atexit(ThreadState * thr,uptr pc,bool is_on_exit,atexit_t f,void * arg)272   int atexit(ThreadState *thr, uptr pc, bool is_on_exit,
273              atexit_t f, void *arg) {
274     Lock l(&mtx_);
275     if (pos_ == kMaxAtExit)
276       return 1;
277     Release(thr, pc, (uptr)this);
278     stack_[pos_] = f;
279     args_[pos_] = arg;
280     is_on_exits_[pos_] = is_on_exit;
281     pos_++;
282     return 0;
283   }
284 
exit(ThreadState * thr,uptr pc)285   void exit(ThreadState *thr, uptr pc) {
286     for (;;) {
287       atexit_t f = 0;
288       void *arg = 0;
289       bool is_on_exit = false;
290       {
291         Lock l(&mtx_);
292         if (pos_) {
293           pos_--;
294           f = stack_[pos_];
295           arg = args_[pos_];
296           is_on_exit = is_on_exits_[pos_];
297           Acquire(thr, pc, (uptr)this);
298         }
299       }
300       if (f == 0)
301         break;
302       DPrintf("#%d: executing atexit func %p\n", thr->tid, f);
303       if (is_on_exit)
304         ((void(*)(int status, void *arg))f)(0, arg);
305       else
306         ((void(*)(void *arg, void *dso))f)(arg, 0);
307     }
308   }
309 
310  private:
311   static const int kMaxAtExit = 128;
312   Mutex mtx_;
313   atexit_t stack_[kMaxAtExit];
314   void *args_[kMaxAtExit];
315   bool is_on_exits_[kMaxAtExit];
316   int pos_;
317 };
318 
319 static AtExitContext *atexit_ctx;
320 
TSAN_INTERCEPTOR(int,atexit,void (* f)())321 TSAN_INTERCEPTOR(int, atexit, void (*f)()) {
322   if (cur_thread()->in_symbolizer)
323     return 0;
324   // We want to setup the atexit callback even if we are in ignored lib
325   // or after fork.
326   SCOPED_INTERCEPTOR_RAW(atexit, f);
327   return atexit_ctx->atexit(thr, pc, false, (void(*)())f, 0);
328 }
329 
TSAN_INTERCEPTOR(int,on_exit,void (* f)(int,void *),void * arg)330 TSAN_INTERCEPTOR(int, on_exit, void(*f)(int, void*), void *arg) {
331   if (cur_thread()->in_symbolizer)
332     return 0;
333   SCOPED_TSAN_INTERCEPTOR(on_exit, f, arg);
334   return atexit_ctx->atexit(thr, pc, true, (void(*)())f, arg);
335 }
336 
TSAN_INTERCEPTOR(int,__cxa_atexit,void (* f)(void * a),void * arg,void * dso)337 TSAN_INTERCEPTOR(int, __cxa_atexit, void (*f)(void *a), void *arg, void *dso) {
338   if (cur_thread()->in_symbolizer)
339     return 0;
340   SCOPED_TSAN_INTERCEPTOR(__cxa_atexit, f, arg, dso);
341   if (dso) {
342     // Memory allocation in __cxa_atexit will race with free during exit,
343     // because we do not see synchronization around atexit callback list.
344     ThreadIgnoreBegin(thr, pc);
345     int res = REAL(__cxa_atexit)(f, arg, dso);
346     ThreadIgnoreEnd(thr, pc);
347     return res;
348   }
349   return atexit_ctx->atexit(thr, pc, false, (void(*)())f, arg);
350 }
351 
352 // Cleanup old bufs.
JmpBufGarbageCollect(ThreadState * thr,uptr sp)353 static void JmpBufGarbageCollect(ThreadState *thr, uptr sp) {
354   for (uptr i = 0; i < thr->jmp_bufs.Size(); i++) {
355     JmpBuf *buf = &thr->jmp_bufs[i];
356     if (buf->sp <= sp) {
357       uptr sz = thr->jmp_bufs.Size();
358       thr->jmp_bufs[i] = thr->jmp_bufs[sz - 1];
359       thr->jmp_bufs.PopBack();
360       i--;
361     }
362   }
363 }
364 
SetJmp(ThreadState * thr,uptr sp,uptr mangled_sp)365 static void SetJmp(ThreadState *thr, uptr sp, uptr mangled_sp) {
366   if (thr->shadow_stack_pos == 0)  // called from libc guts during bootstrap
367     return;
368   // Cleanup old bufs.
369   JmpBufGarbageCollect(thr, sp);
370   // Remember the buf.
371   JmpBuf *buf = thr->jmp_bufs.PushBack();
372   buf->sp = sp;
373   buf->mangled_sp = mangled_sp;
374   buf->shadow_stack_pos = thr->shadow_stack_pos;
375 }
376 
LongJmp(ThreadState * thr,uptr * env)377 static void LongJmp(ThreadState *thr, uptr *env) {
378   uptr mangled_sp = env[6];
379   // Find the saved buf by mangled_sp.
380   for (uptr i = 0; i < thr->jmp_bufs.Size(); i++) {
381     JmpBuf *buf = &thr->jmp_bufs[i];
382     if (buf->mangled_sp == mangled_sp) {
383       CHECK_GE(thr->shadow_stack_pos, buf->shadow_stack_pos);
384       // Unwind the stack.
385       while (thr->shadow_stack_pos > buf->shadow_stack_pos)
386         FuncExit(thr);
387       JmpBufGarbageCollect(thr, buf->sp - 1);  // do not collect buf->sp
388       return;
389     }
390   }
391   Printf("ThreadSanitizer: can't find longjmp buf\n");
392   CHECK(0);
393 }
394 
395 // FIXME: put everything below into a common extern "C" block?
__tsan_setjmp(uptr sp,uptr mangled_sp)396 extern "C" void __tsan_setjmp(uptr sp, uptr mangled_sp) {
397   SetJmp(cur_thread(), sp, mangled_sp);
398 }
399 
400 // Not called.  Merely to satisfy TSAN_INTERCEPT().
401 extern "C" SANITIZER_INTERFACE_ATTRIBUTE
402 int __interceptor_setjmp(void *env);
__interceptor_setjmp(void * env)403 extern "C" int __interceptor_setjmp(void *env) {
404   CHECK(0);
405   return 0;
406 }
407 
408 // FIXME: any reason to have a separate declaration?
409 extern "C" SANITIZER_INTERFACE_ATTRIBUTE
410 int __interceptor__setjmp(void *env);
__interceptor__setjmp(void * env)411 extern "C" int __interceptor__setjmp(void *env) {
412   CHECK(0);
413   return 0;
414 }
415 
416 extern "C" SANITIZER_INTERFACE_ATTRIBUTE
417 int __interceptor_sigsetjmp(void *env);
__interceptor_sigsetjmp(void * env)418 extern "C" int __interceptor_sigsetjmp(void *env) {
419   CHECK(0);
420   return 0;
421 }
422 
423 extern "C" SANITIZER_INTERFACE_ATTRIBUTE
424 int __interceptor___sigsetjmp(void *env);
__interceptor___sigsetjmp(void * env)425 extern "C" int __interceptor___sigsetjmp(void *env) {
426   CHECK(0);
427   return 0;
428 }
429 
430 extern "C" int setjmp(void *env);
431 extern "C" int _setjmp(void *env);
432 extern "C" int sigsetjmp(void *env);
433 extern "C" int __sigsetjmp(void *env);
DEFINE_REAL(int,setjmp,void * env)434 DEFINE_REAL(int, setjmp, void *env)
435 DEFINE_REAL(int, _setjmp, void *env)
436 DEFINE_REAL(int, sigsetjmp, void *env)
437 DEFINE_REAL(int, __sigsetjmp, void *env)
438 
439 TSAN_INTERCEPTOR(void, longjmp, uptr *env, int val) {
440   {
441     SCOPED_TSAN_INTERCEPTOR(longjmp, env, val);
442   }
443   LongJmp(cur_thread(), env);
444   REAL(longjmp)(env, val);
445 }
446 
TSAN_INTERCEPTOR(void,siglongjmp,uptr * env,int val)447 TSAN_INTERCEPTOR(void, siglongjmp, uptr *env, int val) {
448   {
449     SCOPED_TSAN_INTERCEPTOR(siglongjmp, env, val);
450   }
451   LongJmp(cur_thread(), env);
452   REAL(siglongjmp)(env, val);
453 }
454 
TSAN_INTERCEPTOR(void *,malloc,uptr size)455 TSAN_INTERCEPTOR(void*, malloc, uptr size) {
456   if (cur_thread()->in_symbolizer)
457     return __libc_malloc(size);
458   void *p = 0;
459   {
460     SCOPED_INTERCEPTOR_RAW(malloc, size);
461     p = user_alloc(thr, pc, size);
462   }
463   invoke_malloc_hook(p, size);
464   return p;
465 }
466 
TSAN_INTERCEPTOR(void *,__libc_memalign,uptr align,uptr sz)467 TSAN_INTERCEPTOR(void*, __libc_memalign, uptr align, uptr sz) {
468   SCOPED_TSAN_INTERCEPTOR(__libc_memalign, align, sz);
469   return user_alloc(thr, pc, sz, align);
470 }
471 
TSAN_INTERCEPTOR(void *,calloc,uptr size,uptr n)472 TSAN_INTERCEPTOR(void*, calloc, uptr size, uptr n) {
473   if (cur_thread()->in_symbolizer)
474     return __libc_calloc(size, n);
475   if (__sanitizer::CallocShouldReturnNullDueToOverflow(size, n))
476     return AllocatorReturnNull();
477   void *p = 0;
478   {
479     SCOPED_INTERCEPTOR_RAW(calloc, size, n);
480     p = user_alloc(thr, pc, n * size);
481     if (p)
482       internal_memset(p, 0, n * size);
483   }
484   invoke_malloc_hook(p, n * size);
485   return p;
486 }
487 
TSAN_INTERCEPTOR(void *,realloc,void * p,uptr size)488 TSAN_INTERCEPTOR(void*, realloc, void *p, uptr size) {
489   if (cur_thread()->in_symbolizer)
490     return __libc_realloc(p, size);
491   if (p)
492     invoke_free_hook(p);
493   {
494     SCOPED_INTERCEPTOR_RAW(realloc, p, size);
495     p = user_realloc(thr, pc, p, size);
496   }
497   invoke_malloc_hook(p, size);
498   return p;
499 }
500 
TSAN_INTERCEPTOR(void,free,void * p)501 TSAN_INTERCEPTOR(void, free, void *p) {
502   if (p == 0)
503     return;
504   if (cur_thread()->in_symbolizer)
505     return __libc_free(p);
506   invoke_free_hook(p);
507   SCOPED_INTERCEPTOR_RAW(free, p);
508   user_free(thr, pc, p);
509 }
510 
TSAN_INTERCEPTOR(void,cfree,void * p)511 TSAN_INTERCEPTOR(void, cfree, void *p) {
512   if (p == 0)
513     return;
514   if (cur_thread()->in_symbolizer)
515     return __libc_free(p);
516   invoke_free_hook(p);
517   SCOPED_INTERCEPTOR_RAW(cfree, p);
518   user_free(thr, pc, p);
519 }
520 
TSAN_INTERCEPTOR(uptr,malloc_usable_size,void * p)521 TSAN_INTERCEPTOR(uptr, malloc_usable_size, void *p) {
522   SCOPED_INTERCEPTOR_RAW(malloc_usable_size, p);
523   return user_alloc_usable_size(p);
524 }
525 
526 #define OPERATOR_NEW_BODY(mangled_name) \
527   if (cur_thread()->in_symbolizer) \
528     return __libc_malloc(size); \
529   void *p = 0; \
530   {  \
531     SCOPED_INTERCEPTOR_RAW(mangled_name, size); \
532     p = user_alloc(thr, pc, size); \
533   }  \
534   invoke_malloc_hook(p, size);  \
535   return p;
536 
537 SANITIZER_INTERFACE_ATTRIBUTE
538 void *operator new(__sanitizer::uptr size);
operator new(__sanitizer::uptr size)539 void *operator new(__sanitizer::uptr size) {
540   OPERATOR_NEW_BODY(_Znwm);
541 }
542 
543 SANITIZER_INTERFACE_ATTRIBUTE
544 void *operator new[](__sanitizer::uptr size);
operator new[](__sanitizer::uptr size)545 void *operator new[](__sanitizer::uptr size) {
546   OPERATOR_NEW_BODY(_Znam);
547 }
548 
549 SANITIZER_INTERFACE_ATTRIBUTE
550 void *operator new(__sanitizer::uptr size, std::nothrow_t const&);
operator new(__sanitizer::uptr size,std::nothrow_t const &)551 void *operator new(__sanitizer::uptr size, std::nothrow_t const&) {
552   OPERATOR_NEW_BODY(_ZnwmRKSt9nothrow_t);
553 }
554 
555 SANITIZER_INTERFACE_ATTRIBUTE
556 void *operator new[](__sanitizer::uptr size, std::nothrow_t const&);
operator new[](__sanitizer::uptr size,std::nothrow_t const &)557 void *operator new[](__sanitizer::uptr size, std::nothrow_t const&) {
558   OPERATOR_NEW_BODY(_ZnamRKSt9nothrow_t);
559 }
560 
561 #define OPERATOR_DELETE_BODY(mangled_name) \
562   if (ptr == 0) return;  \
563   if (cur_thread()->in_symbolizer) \
564     return __libc_free(ptr); \
565   invoke_free_hook(ptr);  \
566   SCOPED_INTERCEPTOR_RAW(mangled_name, ptr);  \
567   user_free(thr, pc, ptr);
568 
569 SANITIZER_INTERFACE_ATTRIBUTE
570 void operator delete(void *ptr) throw();
operator delete(void * ptr)571 void operator delete(void *ptr) throw() {
572   OPERATOR_DELETE_BODY(_ZdlPv);
573 }
574 
575 SANITIZER_INTERFACE_ATTRIBUTE
576 void operator delete[](void *ptr) throw();
operator delete[](void * ptr)577 void operator delete[](void *ptr) throw() {
578   OPERATOR_DELETE_BODY(_ZdaPv);
579 }
580 
581 SANITIZER_INTERFACE_ATTRIBUTE
582 void operator delete(void *ptr, std::nothrow_t const&);
operator delete(void * ptr,std::nothrow_t const &)583 void operator delete(void *ptr, std::nothrow_t const&) {
584   OPERATOR_DELETE_BODY(_ZdlPvRKSt9nothrow_t);
585 }
586 
587 SANITIZER_INTERFACE_ATTRIBUTE
588 void operator delete[](void *ptr, std::nothrow_t const&);
operator delete[](void * ptr,std::nothrow_t const &)589 void operator delete[](void *ptr, std::nothrow_t const&) {
590   OPERATOR_DELETE_BODY(_ZdaPvRKSt9nothrow_t);
591 }
592 
TSAN_INTERCEPTOR(uptr,strlen,const char * s)593 TSAN_INTERCEPTOR(uptr, strlen, const char *s) {
594   SCOPED_TSAN_INTERCEPTOR(strlen, s);
595   uptr len = internal_strlen(s);
596   MemoryAccessRange(thr, pc, (uptr)s, len + 1, false);
597   return len;
598 }
599 
TSAN_INTERCEPTOR(void *,memset,void * dst,int v,uptr size)600 TSAN_INTERCEPTOR(void*, memset, void *dst, int v, uptr size) {
601   SCOPED_TSAN_INTERCEPTOR(memset, dst, v, size);
602   MemoryAccessRange(thr, pc, (uptr)dst, size, true);
603   return internal_memset(dst, v, size);
604 }
605 
TSAN_INTERCEPTOR(void *,memcpy,void * dst,const void * src,uptr size)606 TSAN_INTERCEPTOR(void*, memcpy, void *dst, const void *src, uptr size) {
607   SCOPED_TSAN_INTERCEPTOR(memcpy, dst, src, size);
608   MemoryAccessRange(thr, pc, (uptr)dst, size, true);
609   MemoryAccessRange(thr, pc, (uptr)src, size, false);
610   return internal_memcpy(dst, src, size);
611 }
612 
TSAN_INTERCEPTOR(int,memcmp,const void * s1,const void * s2,uptr n)613 TSAN_INTERCEPTOR(int, memcmp, const void *s1, const void *s2, uptr n) {
614   SCOPED_TSAN_INTERCEPTOR(memcmp, s1, s2, n);
615   int res = 0;
616   uptr len = 0;
617   for (; len < n; len++) {
618     if ((res = ((unsigned char*)s1)[len] - ((unsigned char*)s2)[len]))
619       break;
620   }
621   MemoryAccessRange(thr, pc, (uptr)s1, len < n ? len + 1 : n, false);
622   MemoryAccessRange(thr, pc, (uptr)s2, len < n ? len + 1 : n, false);
623   return res;
624 }
625 
TSAN_INTERCEPTOR(void *,memmove,void * dst,void * src,uptr n)626 TSAN_INTERCEPTOR(void*, memmove, void *dst, void *src, uptr n) {
627   SCOPED_TSAN_INTERCEPTOR(memmove, dst, src, n);
628   MemoryAccessRange(thr, pc, (uptr)dst, n, true);
629   MemoryAccessRange(thr, pc, (uptr)src, n, false);
630   return REAL(memmove)(dst, src, n);
631 }
632 
TSAN_INTERCEPTOR(char *,strchr,char * s,int c)633 TSAN_INTERCEPTOR(char*, strchr, char *s, int c) {
634   SCOPED_TSAN_INTERCEPTOR(strchr, s, c);
635   char *res = REAL(strchr)(s, c);
636   uptr len = res ? (char*)res - (char*)s + 1 : internal_strlen(s) + 1;
637   MemoryAccessRange(thr, pc, (uptr)s, len, false);
638   return res;
639 }
640 
TSAN_INTERCEPTOR(char *,strchrnul,char * s,int c)641 TSAN_INTERCEPTOR(char*, strchrnul, char *s, int c) {
642   SCOPED_TSAN_INTERCEPTOR(strchrnul, s, c);
643   char *res = REAL(strchrnul)(s, c);
644   uptr len = (char*)res - (char*)s + 1;
645   MemoryAccessRange(thr, pc, (uptr)s, len, false);
646   return res;
647 }
648 
TSAN_INTERCEPTOR(char *,strrchr,char * s,int c)649 TSAN_INTERCEPTOR(char*, strrchr, char *s, int c) {
650   SCOPED_TSAN_INTERCEPTOR(strrchr, s, c);
651   MemoryAccessRange(thr, pc, (uptr)s, internal_strlen(s) + 1, false);
652   return REAL(strrchr)(s, c);
653 }
654 
TSAN_INTERCEPTOR(char *,strcpy,char * dst,const char * src)655 TSAN_INTERCEPTOR(char*, strcpy, char *dst, const char *src) {  // NOLINT
656   SCOPED_TSAN_INTERCEPTOR(strcpy, dst, src);  // NOLINT
657   uptr srclen = internal_strlen(src);
658   MemoryAccessRange(thr, pc, (uptr)dst, srclen + 1, true);
659   MemoryAccessRange(thr, pc, (uptr)src, srclen + 1, false);
660   return REAL(strcpy)(dst, src);  // NOLINT
661 }
662 
TSAN_INTERCEPTOR(char *,strncpy,char * dst,char * src,uptr n)663 TSAN_INTERCEPTOR(char*, strncpy, char *dst, char *src, uptr n) {
664   SCOPED_TSAN_INTERCEPTOR(strncpy, dst, src, n);
665   uptr srclen = internal_strnlen(src, n);
666   MemoryAccessRange(thr, pc, (uptr)dst, n, true);
667   MemoryAccessRange(thr, pc, (uptr)src, min(srclen + 1, n), false);
668   return REAL(strncpy)(dst, src, n);
669 }
670 
TSAN_INTERCEPTOR(const char *,strstr,const char * s1,const char * s2)671 TSAN_INTERCEPTOR(const char*, strstr, const char *s1, const char *s2) {
672   SCOPED_TSAN_INTERCEPTOR(strstr, s1, s2);
673   const char *res = REAL(strstr)(s1, s2);
674   uptr len1 = internal_strlen(s1);
675   uptr len2 = internal_strlen(s2);
676   MemoryAccessRange(thr, pc, (uptr)s1, len1 + 1, false);
677   MemoryAccessRange(thr, pc, (uptr)s2, len2 + 1, false);
678   return res;
679 }
680 
TSAN_INTERCEPTOR(char *,strdup,const char * str)681 TSAN_INTERCEPTOR(char*, strdup, const char *str) {
682   SCOPED_TSAN_INTERCEPTOR(strdup, str);
683   // strdup will call malloc, so no instrumentation is required here.
684   return REAL(strdup)(str);
685 }
686 
fix_mmap_addr(void ** addr,long_t sz,int flags)687 static bool fix_mmap_addr(void **addr, long_t sz, int flags) {
688   if (*addr) {
689     if (!IsAppMem((uptr)*addr) || !IsAppMem((uptr)*addr + sz - 1)) {
690       if (flags & MAP_FIXED) {
691         errno = EINVAL;
692         return false;
693       } else {
694         *addr = 0;
695       }
696     }
697   }
698   return true;
699 }
700 
TSAN_INTERCEPTOR(void *,mmap,void * addr,long_t sz,int prot,int flags,int fd,unsigned off)701 TSAN_INTERCEPTOR(void*, mmap, void *addr, long_t sz, int prot,
702                          int flags, int fd, unsigned off) {
703   SCOPED_TSAN_INTERCEPTOR(mmap, addr, sz, prot, flags, fd, off);
704   if (!fix_mmap_addr(&addr, sz, flags))
705     return MAP_FAILED;
706   void *res = REAL(mmap)(addr, sz, prot, flags, fd, off);
707   if (res != MAP_FAILED) {
708     if (fd > 0)
709       FdAccess(thr, pc, fd);
710     MemoryRangeImitateWrite(thr, pc, (uptr)res, sz);
711   }
712   return res;
713 }
714 
TSAN_INTERCEPTOR(void *,mmap64,void * addr,long_t sz,int prot,int flags,int fd,u64 off)715 TSAN_INTERCEPTOR(void*, mmap64, void *addr, long_t sz, int prot,
716                            int flags, int fd, u64 off) {
717   SCOPED_TSAN_INTERCEPTOR(mmap64, addr, sz, prot, flags, fd, off);
718   if (!fix_mmap_addr(&addr, sz, flags))
719     return MAP_FAILED;
720   void *res = REAL(mmap64)(addr, sz, prot, flags, fd, off);
721   if (res != MAP_FAILED) {
722     if (fd > 0)
723       FdAccess(thr, pc, fd);
724     MemoryRangeImitateWrite(thr, pc, (uptr)res, sz);
725   }
726   return res;
727 }
728 
TSAN_INTERCEPTOR(int,munmap,void * addr,long_t sz)729 TSAN_INTERCEPTOR(int, munmap, void *addr, long_t sz) {
730   SCOPED_TSAN_INTERCEPTOR(munmap, addr, sz);
731   DontNeedShadowFor((uptr)addr, sz);
732   int res = REAL(munmap)(addr, sz);
733   return res;
734 }
735 
TSAN_INTERCEPTOR(void *,memalign,uptr align,uptr sz)736 TSAN_INTERCEPTOR(void*, memalign, uptr align, uptr sz) {
737   SCOPED_INTERCEPTOR_RAW(memalign, align, sz);
738   return user_alloc(thr, pc, sz, align);
739 }
740 
TSAN_INTERCEPTOR(void *,aligned_alloc,uptr align,uptr sz)741 TSAN_INTERCEPTOR(void*, aligned_alloc, uptr align, uptr sz) {
742   SCOPED_INTERCEPTOR_RAW(memalign, align, sz);
743   return user_alloc(thr, pc, sz, align);
744 }
745 
TSAN_INTERCEPTOR(void *,valloc,uptr sz)746 TSAN_INTERCEPTOR(void*, valloc, uptr sz) {
747   SCOPED_INTERCEPTOR_RAW(valloc, sz);
748   return user_alloc(thr, pc, sz, GetPageSizeCached());
749 }
750 
TSAN_INTERCEPTOR(void *,pvalloc,uptr sz)751 TSAN_INTERCEPTOR(void*, pvalloc, uptr sz) {
752   SCOPED_INTERCEPTOR_RAW(pvalloc, sz);
753   sz = RoundUp(sz, GetPageSizeCached());
754   return user_alloc(thr, pc, sz, GetPageSizeCached());
755 }
756 
TSAN_INTERCEPTOR(int,posix_memalign,void ** memptr,uptr align,uptr sz)757 TSAN_INTERCEPTOR(int, posix_memalign, void **memptr, uptr align, uptr sz) {
758   SCOPED_INTERCEPTOR_RAW(posix_memalign, memptr, align, sz);
759   *memptr = user_alloc(thr, pc, sz, align);
760   return 0;
761 }
762 
763 // Used in thread-safe function static initialization.
__cxa_guard_acquire(atomic_uint32_t * g)764 extern "C" int INTERFACE_ATTRIBUTE __cxa_guard_acquire(atomic_uint32_t *g) {
765   SCOPED_INTERCEPTOR_RAW(__cxa_guard_acquire, g);
766   for (;;) {
767     u32 cmp = atomic_load(g, memory_order_acquire);
768     if (cmp == 0) {
769       if (atomic_compare_exchange_strong(g, &cmp, 1<<16, memory_order_relaxed))
770         return 1;
771     } else if (cmp == 1) {
772       Acquire(thr, pc, (uptr)g);
773       return 0;
774     } else {
775       internal_sched_yield();
776     }
777   }
778 }
779 
__cxa_guard_release(atomic_uint32_t * g)780 extern "C" void INTERFACE_ATTRIBUTE __cxa_guard_release(atomic_uint32_t *g) {
781   SCOPED_INTERCEPTOR_RAW(__cxa_guard_release, g);
782   Release(thr, pc, (uptr)g);
783   atomic_store(g, 1, memory_order_release);
784 }
785 
__cxa_guard_abort(atomic_uint32_t * g)786 extern "C" void INTERFACE_ATTRIBUTE __cxa_guard_abort(atomic_uint32_t *g) {
787   SCOPED_INTERCEPTOR_RAW(__cxa_guard_abort, g);
788   atomic_store(g, 0, memory_order_relaxed);
789 }
790 
thread_finalize(void * v)791 static void thread_finalize(void *v) {
792   uptr iter = (uptr)v;
793   if (iter > 1) {
794     if (pthread_setspecific(g_thread_finalize_key, (void*)(iter - 1))) {
795       Printf("ThreadSanitizer: failed to set thread key\n");
796       Die();
797     }
798     return;
799   }
800   {
801     ThreadState *thr = cur_thread();
802     ThreadFinish(thr);
803     SignalContext *sctx = thr->signal_ctx;
804     if (sctx) {
805       thr->signal_ctx = 0;
806       UnmapOrDie(sctx, sizeof(*sctx));
807     }
808   }
809 }
810 
811 
812 struct ThreadParam {
813   void* (*callback)(void *arg);
814   void *param;
815   atomic_uintptr_t tid;
816 };
817 
__tsan_thread_start_func(void * arg)818 extern "C" void *__tsan_thread_start_func(void *arg) {
819   ThreadParam *p = (ThreadParam*)arg;
820   void* (*callback)(void *arg) = p->callback;
821   void *param = p->param;
822   int tid = 0;
823   {
824     ThreadState *thr = cur_thread();
825     // Thread-local state is not initialized yet.
826     ScopedIgnoreInterceptors ignore;
827     if (pthread_setspecific(g_thread_finalize_key,
828                             (void *)kPthreadDestructorIterations)) {
829       Printf("ThreadSanitizer: failed to set thread key\n");
830       Die();
831     }
832     while ((tid = atomic_load(&p->tid, memory_order_acquire)) == 0)
833       pthread_yield();
834     atomic_store(&p->tid, 0, memory_order_release);
835     ThreadStart(thr, tid, GetTid());
836   }
837   void *res = callback(param);
838   // Prevent the callback from being tail called,
839   // it mixes up stack traces.
840   volatile int foo = 42;
841   foo++;
842   return res;
843 }
844 
TSAN_INTERCEPTOR(int,pthread_create,void * th,void * attr,void * (* callback)(void *),void * param)845 TSAN_INTERCEPTOR(int, pthread_create,
846     void *th, void *attr, void *(*callback)(void*), void * param) {
847   SCOPED_INTERCEPTOR_RAW(pthread_create, th, attr, callback, param);
848   if (ctx->after_multithreaded_fork) {
849     if (flags()->die_after_fork) {
850       Report("ThreadSanitizer: starting new threads after multi-threaded "
851           "fork is not supported. Dying (set die_after_fork=0 to override)\n");
852       Die();
853     } else {
854       VPrintf(1, "ThreadSanitizer: starting new threads after multi-threaded "
855           "fork is not supported (pid %d). Continuing because of "
856           "die_after_fork=0, but you are on your own\n", internal_getpid());
857     }
858   }
859   __sanitizer_pthread_attr_t myattr;
860   if (attr == 0) {
861     pthread_attr_init(&myattr);
862     attr = &myattr;
863   }
864   int detached = 0;
865   REAL(pthread_attr_getdetachstate)(attr, &detached);
866   AdjustStackSize(attr);
867 
868   ThreadParam p;
869   p.callback = callback;
870   p.param = param;
871   atomic_store(&p.tid, 0, memory_order_relaxed);
872   int res = -1;
873   {
874     // Otherwise we see false positives in pthread stack manipulation.
875     ScopedIgnoreInterceptors ignore;
876     ThreadIgnoreBegin(thr, pc);
877     res = REAL(pthread_create)(th, attr, __tsan_thread_start_func, &p);
878     ThreadIgnoreEnd(thr, pc);
879   }
880   if (res == 0) {
881     int tid = ThreadCreate(thr, pc, *(uptr*)th, detached);
882     CHECK_NE(tid, 0);
883     atomic_store(&p.tid, tid, memory_order_release);
884     while (atomic_load(&p.tid, memory_order_acquire) != 0)
885       pthread_yield();
886   }
887   if (attr == &myattr)
888     pthread_attr_destroy(&myattr);
889   return res;
890 }
891 
TSAN_INTERCEPTOR(int,pthread_join,void * th,void ** ret)892 TSAN_INTERCEPTOR(int, pthread_join, void *th, void **ret) {
893   SCOPED_INTERCEPTOR_RAW(pthread_join, th, ret);
894   int tid = ThreadTid(thr, pc, (uptr)th);
895   ThreadIgnoreBegin(thr, pc);
896   int res = BLOCK_REAL(pthread_join)(th, ret);
897   ThreadIgnoreEnd(thr, pc);
898   if (res == 0) {
899     ThreadJoin(thr, pc, tid);
900   }
901   return res;
902 }
903 
TSAN_INTERCEPTOR(int,pthread_detach,void * th)904 TSAN_INTERCEPTOR(int, pthread_detach, void *th) {
905   SCOPED_TSAN_INTERCEPTOR(pthread_detach, th);
906   int tid = ThreadTid(thr, pc, (uptr)th);
907   int res = REAL(pthread_detach)(th);
908   if (res == 0) {
909     ThreadDetach(thr, pc, tid);
910   }
911   return res;
912 }
913 
914 // Problem:
915 // NPTL implementation of pthread_cond has 2 versions (2.2.5 and 2.3.2).
916 // pthread_cond_t has different size in the different versions.
917 // If call new REAL functions for old pthread_cond_t, they will corrupt memory
918 // after pthread_cond_t (old cond is smaller).
919 // If we call old REAL functions for new pthread_cond_t, we will lose  some
920 // functionality (e.g. old functions do not support waiting against
921 // CLOCK_REALTIME).
922 // Proper handling would require to have 2 versions of interceptors as well.
923 // But this is messy, in particular requires linker scripts when sanitizer
924 // runtime is linked into a shared library.
925 // Instead we assume we don't have dynamic libraries built against old
926 // pthread (2.2.5 is dated by 2002). And provide legacy_pthread_cond flag
927 // that allows to work with old libraries (but this mode does not support
928 // some features, e.g. pthread_condattr_getpshared).
init_cond(void * c,bool force=false)929 static void *init_cond(void *c, bool force = false) {
930   // sizeof(pthread_cond_t) >= sizeof(uptr) in both versions.
931   // So we allocate additional memory on the side large enough to hold
932   // any pthread_cond_t object. Always call new REAL functions, but pass
933   // the aux object to them.
934   // Note: the code assumes that PTHREAD_COND_INITIALIZER initializes
935   // first word of pthread_cond_t to zero.
936   // It's all relevant only for linux.
937   if (!common_flags()->legacy_pthread_cond)
938     return c;
939   atomic_uintptr_t *p = (atomic_uintptr_t*)c;
940   uptr cond = atomic_load(p, memory_order_acquire);
941   if (!force && cond != 0)
942     return (void*)cond;
943   void *newcond = WRAP(malloc)(pthread_cond_t_sz);
944   internal_memset(newcond, 0, pthread_cond_t_sz);
945   if (atomic_compare_exchange_strong(p, &cond, (uptr)newcond,
946       memory_order_acq_rel))
947     return newcond;
948   WRAP(free)(newcond);
949   return (void*)cond;
950 }
951 
952 struct CondMutexUnlockCtx {
953   ThreadState *thr;
954   uptr pc;
955   void *m;
956 };
957 
cond_mutex_unlock(CondMutexUnlockCtx * arg)958 static void cond_mutex_unlock(CondMutexUnlockCtx *arg) {
959   MutexLock(arg->thr, arg->pc, (uptr)arg->m);
960 }
961 
INTERCEPTOR(int,pthread_cond_init,void * c,void * a)962 INTERCEPTOR(int, pthread_cond_init, void *c, void *a) {
963   void *cond = init_cond(c, true);
964   SCOPED_TSAN_INTERCEPTOR(pthread_cond_init, cond, a);
965   MemoryAccessRange(thr, pc, (uptr)c, sizeof(uptr), true);
966   return REAL(pthread_cond_init)(cond, a);
967 }
968 
INTERCEPTOR(int,pthread_cond_wait,void * c,void * m)969 INTERCEPTOR(int, pthread_cond_wait, void *c, void *m) {
970   void *cond = init_cond(c);
971   SCOPED_TSAN_INTERCEPTOR(pthread_cond_wait, cond, m);
972   MutexUnlock(thr, pc, (uptr)m);
973   MemoryAccessRange(thr, pc, (uptr)c, sizeof(uptr), false);
974   CondMutexUnlockCtx arg = {thr, pc, m};
975   // This ensures that we handle mutex lock even in case of pthread_cancel.
976   // See test/tsan/cond_cancel.cc.
977   int res = call_pthread_cancel_with_cleanup(
978       (int(*)(void *c, void *m, void *abstime))REAL(pthread_cond_wait),
979       cond, m, 0, (void(*)(void *arg))cond_mutex_unlock, &arg);
980   if (res == errno_EOWNERDEAD)
981     MutexRepair(thr, pc, (uptr)m);
982   MutexLock(thr, pc, (uptr)m);
983   return res;
984 }
985 
INTERCEPTOR(int,pthread_cond_timedwait,void * c,void * m,void * abstime)986 INTERCEPTOR(int, pthread_cond_timedwait, void *c, void *m, void *abstime) {
987   void *cond = init_cond(c);
988   SCOPED_TSAN_INTERCEPTOR(pthread_cond_timedwait, cond, m, abstime);
989   MutexUnlock(thr, pc, (uptr)m);
990   MemoryAccessRange(thr, pc, (uptr)c, sizeof(uptr), false);
991   CondMutexUnlockCtx arg = {thr, pc, m};
992   // This ensures that we handle mutex lock even in case of pthread_cancel.
993   // See test/tsan/cond_cancel.cc.
994   int res = call_pthread_cancel_with_cleanup(
995       REAL(pthread_cond_timedwait), cond, m, abstime,
996       (void(*)(void *arg))cond_mutex_unlock, &arg);
997   if (res == errno_EOWNERDEAD)
998     MutexRepair(thr, pc, (uptr)m);
999   MutexLock(thr, pc, (uptr)m);
1000   return res;
1001 }
1002 
INTERCEPTOR(int,pthread_cond_signal,void * c)1003 INTERCEPTOR(int, pthread_cond_signal, void *c) {
1004   void *cond = init_cond(c);
1005   SCOPED_TSAN_INTERCEPTOR(pthread_cond_signal, cond);
1006   MemoryAccessRange(thr, pc, (uptr)c, sizeof(uptr), false);
1007   return REAL(pthread_cond_signal)(cond);
1008 }
1009 
INTERCEPTOR(int,pthread_cond_broadcast,void * c)1010 INTERCEPTOR(int, pthread_cond_broadcast, void *c) {
1011   void *cond = init_cond(c);
1012   SCOPED_TSAN_INTERCEPTOR(pthread_cond_broadcast, cond);
1013   MemoryAccessRange(thr, pc, (uptr)c, sizeof(uptr), false);
1014   return REAL(pthread_cond_broadcast)(cond);
1015 }
1016 
INTERCEPTOR(int,pthread_cond_destroy,void * c)1017 INTERCEPTOR(int, pthread_cond_destroy, void *c) {
1018   void *cond = init_cond(c);
1019   SCOPED_TSAN_INTERCEPTOR(pthread_cond_destroy, cond);
1020   MemoryAccessRange(thr, pc, (uptr)c, sizeof(uptr), true);
1021   int res = REAL(pthread_cond_destroy)(cond);
1022   if (common_flags()->legacy_pthread_cond) {
1023     // Free our aux cond and zero the pointer to not leave dangling pointers.
1024     WRAP(free)(cond);
1025     atomic_store((atomic_uintptr_t*)c, 0, memory_order_relaxed);
1026   }
1027   return res;
1028 }
1029 
TSAN_INTERCEPTOR(int,pthread_mutex_init,void * m,void * a)1030 TSAN_INTERCEPTOR(int, pthread_mutex_init, void *m, void *a) {
1031   SCOPED_TSAN_INTERCEPTOR(pthread_mutex_init, m, a);
1032   int res = REAL(pthread_mutex_init)(m, a);
1033   if (res == 0) {
1034     bool recursive = false;
1035     if (a) {
1036       int type = 0;
1037       if (REAL(pthread_mutexattr_gettype)(a, &type) == 0)
1038         recursive = (type == PTHREAD_MUTEX_RECURSIVE
1039             || type == PTHREAD_MUTEX_RECURSIVE_NP);
1040     }
1041     MutexCreate(thr, pc, (uptr)m, false, recursive, false);
1042   }
1043   return res;
1044 }
1045 
TSAN_INTERCEPTOR(int,pthread_mutex_destroy,void * m)1046 TSAN_INTERCEPTOR(int, pthread_mutex_destroy, void *m) {
1047   SCOPED_TSAN_INTERCEPTOR(pthread_mutex_destroy, m);
1048   int res = REAL(pthread_mutex_destroy)(m);
1049   if (res == 0 || res == EBUSY) {
1050     MutexDestroy(thr, pc, (uptr)m);
1051   }
1052   return res;
1053 }
1054 
TSAN_INTERCEPTOR(int,pthread_mutex_trylock,void * m)1055 TSAN_INTERCEPTOR(int, pthread_mutex_trylock, void *m) {
1056   SCOPED_TSAN_INTERCEPTOR(pthread_mutex_trylock, m);
1057   int res = REAL(pthread_mutex_trylock)(m);
1058   if (res == EOWNERDEAD)
1059     MutexRepair(thr, pc, (uptr)m);
1060   if (res == 0 || res == EOWNERDEAD)
1061     MutexLock(thr, pc, (uptr)m, /*rec=*/1, /*try_lock=*/true);
1062   return res;
1063 }
1064 
TSAN_INTERCEPTOR(int,pthread_mutex_timedlock,void * m,void * abstime)1065 TSAN_INTERCEPTOR(int, pthread_mutex_timedlock, void *m, void *abstime) {
1066   SCOPED_TSAN_INTERCEPTOR(pthread_mutex_timedlock, m, abstime);
1067   int res = REAL(pthread_mutex_timedlock)(m, abstime);
1068   if (res == 0) {
1069     MutexLock(thr, pc, (uptr)m);
1070   }
1071   return res;
1072 }
1073 
TSAN_INTERCEPTOR(int,pthread_spin_init,void * m,int pshared)1074 TSAN_INTERCEPTOR(int, pthread_spin_init, void *m, int pshared) {
1075   SCOPED_TSAN_INTERCEPTOR(pthread_spin_init, m, pshared);
1076   int res = REAL(pthread_spin_init)(m, pshared);
1077   if (res == 0) {
1078     MutexCreate(thr, pc, (uptr)m, false, false, false);
1079   }
1080   return res;
1081 }
1082 
TSAN_INTERCEPTOR(int,pthread_spin_destroy,void * m)1083 TSAN_INTERCEPTOR(int, pthread_spin_destroy, void *m) {
1084   SCOPED_TSAN_INTERCEPTOR(pthread_spin_destroy, m);
1085   int res = REAL(pthread_spin_destroy)(m);
1086   if (res == 0) {
1087     MutexDestroy(thr, pc, (uptr)m);
1088   }
1089   return res;
1090 }
1091 
TSAN_INTERCEPTOR(int,pthread_spin_lock,void * m)1092 TSAN_INTERCEPTOR(int, pthread_spin_lock, void *m) {
1093   SCOPED_TSAN_INTERCEPTOR(pthread_spin_lock, m);
1094   int res = REAL(pthread_spin_lock)(m);
1095   if (res == 0) {
1096     MutexLock(thr, pc, (uptr)m);
1097   }
1098   return res;
1099 }
1100 
TSAN_INTERCEPTOR(int,pthread_spin_trylock,void * m)1101 TSAN_INTERCEPTOR(int, pthread_spin_trylock, void *m) {
1102   SCOPED_TSAN_INTERCEPTOR(pthread_spin_trylock, m);
1103   int res = REAL(pthread_spin_trylock)(m);
1104   if (res == 0) {
1105     MutexLock(thr, pc, (uptr)m, /*rec=*/1, /*try_lock=*/true);
1106   }
1107   return res;
1108 }
1109 
TSAN_INTERCEPTOR(int,pthread_spin_unlock,void * m)1110 TSAN_INTERCEPTOR(int, pthread_spin_unlock, void *m) {
1111   SCOPED_TSAN_INTERCEPTOR(pthread_spin_unlock, m);
1112   MutexUnlock(thr, pc, (uptr)m);
1113   int res = REAL(pthread_spin_unlock)(m);
1114   return res;
1115 }
1116 
TSAN_INTERCEPTOR(int,pthread_rwlock_init,void * m,void * a)1117 TSAN_INTERCEPTOR(int, pthread_rwlock_init, void *m, void *a) {
1118   SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_init, m, a);
1119   int res = REAL(pthread_rwlock_init)(m, a);
1120   if (res == 0) {
1121     MutexCreate(thr, pc, (uptr)m, true, false, false);
1122   }
1123   return res;
1124 }
1125 
TSAN_INTERCEPTOR(int,pthread_rwlock_destroy,void * m)1126 TSAN_INTERCEPTOR(int, pthread_rwlock_destroy, void *m) {
1127   SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_destroy, m);
1128   int res = REAL(pthread_rwlock_destroy)(m);
1129   if (res == 0) {
1130     MutexDestroy(thr, pc, (uptr)m);
1131   }
1132   return res;
1133 }
1134 
TSAN_INTERCEPTOR(int,pthread_rwlock_rdlock,void * m)1135 TSAN_INTERCEPTOR(int, pthread_rwlock_rdlock, void *m) {
1136   SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_rdlock, m);
1137   int res = REAL(pthread_rwlock_rdlock)(m);
1138   if (res == 0) {
1139     MutexReadLock(thr, pc, (uptr)m);
1140   }
1141   return res;
1142 }
1143 
TSAN_INTERCEPTOR(int,pthread_rwlock_tryrdlock,void * m)1144 TSAN_INTERCEPTOR(int, pthread_rwlock_tryrdlock, void *m) {
1145   SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_tryrdlock, m);
1146   int res = REAL(pthread_rwlock_tryrdlock)(m);
1147   if (res == 0) {
1148     MutexReadLock(thr, pc, (uptr)m, /*try_lock=*/true);
1149   }
1150   return res;
1151 }
1152 
TSAN_INTERCEPTOR(int,pthread_rwlock_timedrdlock,void * m,void * abstime)1153 TSAN_INTERCEPTOR(int, pthread_rwlock_timedrdlock, void *m, void *abstime) {
1154   SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_timedrdlock, m, abstime);
1155   int res = REAL(pthread_rwlock_timedrdlock)(m, abstime);
1156   if (res == 0) {
1157     MutexReadLock(thr, pc, (uptr)m);
1158   }
1159   return res;
1160 }
1161 
TSAN_INTERCEPTOR(int,pthread_rwlock_wrlock,void * m)1162 TSAN_INTERCEPTOR(int, pthread_rwlock_wrlock, void *m) {
1163   SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_wrlock, m);
1164   int res = REAL(pthread_rwlock_wrlock)(m);
1165   if (res == 0) {
1166     MutexLock(thr, pc, (uptr)m);
1167   }
1168   return res;
1169 }
1170 
TSAN_INTERCEPTOR(int,pthread_rwlock_trywrlock,void * m)1171 TSAN_INTERCEPTOR(int, pthread_rwlock_trywrlock, void *m) {
1172   SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_trywrlock, m);
1173   int res = REAL(pthread_rwlock_trywrlock)(m);
1174   if (res == 0) {
1175     MutexLock(thr, pc, (uptr)m, /*rec=*/1, /*try_lock=*/true);
1176   }
1177   return res;
1178 }
1179 
TSAN_INTERCEPTOR(int,pthread_rwlock_timedwrlock,void * m,void * abstime)1180 TSAN_INTERCEPTOR(int, pthread_rwlock_timedwrlock, void *m, void *abstime) {
1181   SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_timedwrlock, m, abstime);
1182   int res = REAL(pthread_rwlock_timedwrlock)(m, abstime);
1183   if (res == 0) {
1184     MutexLock(thr, pc, (uptr)m);
1185   }
1186   return res;
1187 }
1188 
TSAN_INTERCEPTOR(int,pthread_rwlock_unlock,void * m)1189 TSAN_INTERCEPTOR(int, pthread_rwlock_unlock, void *m) {
1190   SCOPED_TSAN_INTERCEPTOR(pthread_rwlock_unlock, m);
1191   MutexReadOrWriteUnlock(thr, pc, (uptr)m);
1192   int res = REAL(pthread_rwlock_unlock)(m);
1193   return res;
1194 }
1195 
TSAN_INTERCEPTOR(int,pthread_barrier_init,void * b,void * a,unsigned count)1196 TSAN_INTERCEPTOR(int, pthread_barrier_init, void *b, void *a, unsigned count) {
1197   SCOPED_TSAN_INTERCEPTOR(pthread_barrier_init, b, a, count);
1198   MemoryWrite(thr, pc, (uptr)b, kSizeLog1);
1199   int res = REAL(pthread_barrier_init)(b, a, count);
1200   return res;
1201 }
1202 
TSAN_INTERCEPTOR(int,pthread_barrier_destroy,void * b)1203 TSAN_INTERCEPTOR(int, pthread_barrier_destroy, void *b) {
1204   SCOPED_TSAN_INTERCEPTOR(pthread_barrier_destroy, b);
1205   MemoryWrite(thr, pc, (uptr)b, kSizeLog1);
1206   int res = REAL(pthread_barrier_destroy)(b);
1207   return res;
1208 }
1209 
TSAN_INTERCEPTOR(int,pthread_barrier_wait,void * b)1210 TSAN_INTERCEPTOR(int, pthread_barrier_wait, void *b) {
1211   SCOPED_TSAN_INTERCEPTOR(pthread_barrier_wait, b);
1212   Release(thr, pc, (uptr)b);
1213   MemoryRead(thr, pc, (uptr)b, kSizeLog1);
1214   int res = REAL(pthread_barrier_wait)(b);
1215   MemoryRead(thr, pc, (uptr)b, kSizeLog1);
1216   if (res == 0 || res == PTHREAD_BARRIER_SERIAL_THREAD) {
1217     Acquire(thr, pc, (uptr)b);
1218   }
1219   return res;
1220 }
1221 
TSAN_INTERCEPTOR(int,pthread_once,void * o,void (* f)())1222 TSAN_INTERCEPTOR(int, pthread_once, void *o, void (*f)()) {
1223   SCOPED_INTERCEPTOR_RAW(pthread_once, o, f);
1224   if (o == 0 || f == 0)
1225     return EINVAL;
1226   atomic_uint32_t *a = static_cast<atomic_uint32_t*>(o);
1227   u32 v = atomic_load(a, memory_order_acquire);
1228   if (v == 0 && atomic_compare_exchange_strong(a, &v, 1,
1229                                                memory_order_relaxed)) {
1230     (*f)();
1231     if (!thr->in_ignored_lib)
1232       Release(thr, pc, (uptr)o);
1233     atomic_store(a, 2, memory_order_release);
1234   } else {
1235     while (v != 2) {
1236       pthread_yield();
1237       v = atomic_load(a, memory_order_acquire);
1238     }
1239     if (!thr->in_ignored_lib)
1240       Acquire(thr, pc, (uptr)o);
1241   }
1242   return 0;
1243 }
1244 
TSAN_INTERCEPTOR(int,sem_init,void * s,int pshared,unsigned value)1245 TSAN_INTERCEPTOR(int, sem_init, void *s, int pshared, unsigned value) {
1246   SCOPED_TSAN_INTERCEPTOR(sem_init, s, pshared, value);
1247   int res = REAL(sem_init)(s, pshared, value);
1248   return res;
1249 }
1250 
TSAN_INTERCEPTOR(int,sem_destroy,void * s)1251 TSAN_INTERCEPTOR(int, sem_destroy, void *s) {
1252   SCOPED_TSAN_INTERCEPTOR(sem_destroy, s);
1253   int res = REAL(sem_destroy)(s);
1254   return res;
1255 }
1256 
TSAN_INTERCEPTOR(int,sem_wait,void * s)1257 TSAN_INTERCEPTOR(int, sem_wait, void *s) {
1258   SCOPED_TSAN_INTERCEPTOR(sem_wait, s);
1259   int res = BLOCK_REAL(sem_wait)(s);
1260   if (res == 0) {
1261     Acquire(thr, pc, (uptr)s);
1262   }
1263   return res;
1264 }
1265 
TSAN_INTERCEPTOR(int,sem_trywait,void * s)1266 TSAN_INTERCEPTOR(int, sem_trywait, void *s) {
1267   SCOPED_TSAN_INTERCEPTOR(sem_trywait, s);
1268   int res = BLOCK_REAL(sem_trywait)(s);
1269   if (res == 0) {
1270     Acquire(thr, pc, (uptr)s);
1271   }
1272   return res;
1273 }
1274 
TSAN_INTERCEPTOR(int,sem_timedwait,void * s,void * abstime)1275 TSAN_INTERCEPTOR(int, sem_timedwait, void *s, void *abstime) {
1276   SCOPED_TSAN_INTERCEPTOR(sem_timedwait, s, abstime);
1277   int res = BLOCK_REAL(sem_timedwait)(s, abstime);
1278   if (res == 0) {
1279     Acquire(thr, pc, (uptr)s);
1280   }
1281   return res;
1282 }
1283 
TSAN_INTERCEPTOR(int,sem_post,void * s)1284 TSAN_INTERCEPTOR(int, sem_post, void *s) {
1285   SCOPED_TSAN_INTERCEPTOR(sem_post, s);
1286   Release(thr, pc, (uptr)s);
1287   int res = REAL(sem_post)(s);
1288   return res;
1289 }
1290 
TSAN_INTERCEPTOR(int,sem_getvalue,void * s,int * sval)1291 TSAN_INTERCEPTOR(int, sem_getvalue, void *s, int *sval) {
1292   SCOPED_TSAN_INTERCEPTOR(sem_getvalue, s, sval);
1293   int res = REAL(sem_getvalue)(s, sval);
1294   if (res == 0) {
1295     Acquire(thr, pc, (uptr)s);
1296   }
1297   return res;
1298 }
1299 
TSAN_INTERCEPTOR(int,__xstat,int version,const char * path,void * buf)1300 TSAN_INTERCEPTOR(int, __xstat, int version, const char *path, void *buf) {
1301   SCOPED_TSAN_INTERCEPTOR(__xstat, version, path, buf);
1302   return REAL(__xstat)(version, path, buf);
1303 }
1304 
TSAN_INTERCEPTOR(int,stat,const char * path,void * buf)1305 TSAN_INTERCEPTOR(int, stat, const char *path, void *buf) {
1306   SCOPED_TSAN_INTERCEPTOR(__xstat, 0, path, buf);
1307   return REAL(__xstat)(0, path, buf);
1308 }
1309 
TSAN_INTERCEPTOR(int,__xstat64,int version,const char * path,void * buf)1310 TSAN_INTERCEPTOR(int, __xstat64, int version, const char *path, void *buf) {
1311   SCOPED_TSAN_INTERCEPTOR(__xstat64, version, path, buf);
1312   return REAL(__xstat64)(version, path, buf);
1313 }
1314 
TSAN_INTERCEPTOR(int,stat64,const char * path,void * buf)1315 TSAN_INTERCEPTOR(int, stat64, const char *path, void *buf) {
1316   SCOPED_TSAN_INTERCEPTOR(__xstat64, 0, path, buf);
1317   return REAL(__xstat64)(0, path, buf);
1318 }
1319 
TSAN_INTERCEPTOR(int,__lxstat,int version,const char * path,void * buf)1320 TSAN_INTERCEPTOR(int, __lxstat, int version, const char *path, void *buf) {
1321   SCOPED_TSAN_INTERCEPTOR(__lxstat, version, path, buf);
1322   return REAL(__lxstat)(version, path, buf);
1323 }
1324 
TSAN_INTERCEPTOR(int,lstat,const char * path,void * buf)1325 TSAN_INTERCEPTOR(int, lstat, const char *path, void *buf) {
1326   SCOPED_TSAN_INTERCEPTOR(__lxstat, 0, path, buf);
1327   return REAL(__lxstat)(0, path, buf);
1328 }
1329 
TSAN_INTERCEPTOR(int,__lxstat64,int version,const char * path,void * buf)1330 TSAN_INTERCEPTOR(int, __lxstat64, int version, const char *path, void *buf) {
1331   SCOPED_TSAN_INTERCEPTOR(__lxstat64, version, path, buf);
1332   return REAL(__lxstat64)(version, path, buf);
1333 }
1334 
TSAN_INTERCEPTOR(int,lstat64,const char * path,void * buf)1335 TSAN_INTERCEPTOR(int, lstat64, const char *path, void *buf) {
1336   SCOPED_TSAN_INTERCEPTOR(__lxstat64, 0, path, buf);
1337   return REAL(__lxstat64)(0, path, buf);
1338 }
1339 
TSAN_INTERCEPTOR(int,__fxstat,int version,int fd,void * buf)1340 TSAN_INTERCEPTOR(int, __fxstat, int version, int fd, void *buf) {
1341   SCOPED_TSAN_INTERCEPTOR(__fxstat, version, fd, buf);
1342   if (fd > 0)
1343     FdAccess(thr, pc, fd);
1344   return REAL(__fxstat)(version, fd, buf);
1345 }
1346 
TSAN_INTERCEPTOR(int,fstat,int fd,void * buf)1347 TSAN_INTERCEPTOR(int, fstat, int fd, void *buf) {
1348   SCOPED_TSAN_INTERCEPTOR(__fxstat, 0, fd, buf);
1349   if (fd > 0)
1350     FdAccess(thr, pc, fd);
1351   return REAL(__fxstat)(0, fd, buf);
1352 }
1353 
TSAN_INTERCEPTOR(int,__fxstat64,int version,int fd,void * buf)1354 TSAN_INTERCEPTOR(int, __fxstat64, int version, int fd, void *buf) {
1355   SCOPED_TSAN_INTERCEPTOR(__fxstat64, version, fd, buf);
1356   if (fd > 0)
1357     FdAccess(thr, pc, fd);
1358   return REAL(__fxstat64)(version, fd, buf);
1359 }
1360 
TSAN_INTERCEPTOR(int,fstat64,int fd,void * buf)1361 TSAN_INTERCEPTOR(int, fstat64, int fd, void *buf) {
1362   SCOPED_TSAN_INTERCEPTOR(__fxstat64, 0, fd, buf);
1363   if (fd > 0)
1364     FdAccess(thr, pc, fd);
1365   return REAL(__fxstat64)(0, fd, buf);
1366 }
1367 
TSAN_INTERCEPTOR(int,open,const char * name,int flags,int mode)1368 TSAN_INTERCEPTOR(int, open, const char *name, int flags, int mode) {
1369   SCOPED_TSAN_INTERCEPTOR(open, name, flags, mode);
1370   int fd = REAL(open)(name, flags, mode);
1371   if (fd >= 0)
1372     FdFileCreate(thr, pc, fd);
1373   return fd;
1374 }
1375 
TSAN_INTERCEPTOR(int,open64,const char * name,int flags,int mode)1376 TSAN_INTERCEPTOR(int, open64, const char *name, int flags, int mode) {
1377   SCOPED_TSAN_INTERCEPTOR(open64, name, flags, mode);
1378   int fd = REAL(open64)(name, flags, mode);
1379   if (fd >= 0)
1380     FdFileCreate(thr, pc, fd);
1381   return fd;
1382 }
1383 
TSAN_INTERCEPTOR(int,creat,const char * name,int mode)1384 TSAN_INTERCEPTOR(int, creat, const char *name, int mode) {
1385   SCOPED_TSAN_INTERCEPTOR(creat, name, mode);
1386   int fd = REAL(creat)(name, mode);
1387   if (fd >= 0)
1388     FdFileCreate(thr, pc, fd);
1389   return fd;
1390 }
1391 
TSAN_INTERCEPTOR(int,creat64,const char * name,int mode)1392 TSAN_INTERCEPTOR(int, creat64, const char *name, int mode) {
1393   SCOPED_TSAN_INTERCEPTOR(creat64, name, mode);
1394   int fd = REAL(creat64)(name, mode);
1395   if (fd >= 0)
1396     FdFileCreate(thr, pc, fd);
1397   return fd;
1398 }
1399 
TSAN_INTERCEPTOR(int,dup,int oldfd)1400 TSAN_INTERCEPTOR(int, dup, int oldfd) {
1401   SCOPED_TSAN_INTERCEPTOR(dup, oldfd);
1402   int newfd = REAL(dup)(oldfd);
1403   if (oldfd >= 0 && newfd >= 0 && newfd != oldfd)
1404     FdDup(thr, pc, oldfd, newfd);
1405   return newfd;
1406 }
1407 
TSAN_INTERCEPTOR(int,dup2,int oldfd,int newfd)1408 TSAN_INTERCEPTOR(int, dup2, int oldfd, int newfd) {
1409   SCOPED_TSAN_INTERCEPTOR(dup2, oldfd, newfd);
1410   int newfd2 = REAL(dup2)(oldfd, newfd);
1411   if (oldfd >= 0 && newfd2 >= 0 && newfd2 != oldfd)
1412     FdDup(thr, pc, oldfd, newfd2);
1413   return newfd2;
1414 }
1415 
TSAN_INTERCEPTOR(int,dup3,int oldfd,int newfd,int flags)1416 TSAN_INTERCEPTOR(int, dup3, int oldfd, int newfd, int flags) {
1417   SCOPED_TSAN_INTERCEPTOR(dup3, oldfd, newfd, flags);
1418   int newfd2 = REAL(dup3)(oldfd, newfd, flags);
1419   if (oldfd >= 0 && newfd2 >= 0 && newfd2 != oldfd)
1420     FdDup(thr, pc, oldfd, newfd2);
1421   return newfd2;
1422 }
1423 
TSAN_INTERCEPTOR(int,eventfd,unsigned initval,int flags)1424 TSAN_INTERCEPTOR(int, eventfd, unsigned initval, int flags) {
1425   SCOPED_TSAN_INTERCEPTOR(eventfd, initval, flags);
1426   int fd = REAL(eventfd)(initval, flags);
1427   if (fd >= 0)
1428     FdEventCreate(thr, pc, fd);
1429   return fd;
1430 }
1431 
TSAN_INTERCEPTOR(int,signalfd,int fd,void * mask,int flags)1432 TSAN_INTERCEPTOR(int, signalfd, int fd, void *mask, int flags) {
1433   SCOPED_TSAN_INTERCEPTOR(signalfd, fd, mask, flags);
1434   if (fd >= 0)
1435     FdClose(thr, pc, fd);
1436   fd = REAL(signalfd)(fd, mask, flags);
1437   if (fd >= 0)
1438     FdSignalCreate(thr, pc, fd);
1439   return fd;
1440 }
1441 
TSAN_INTERCEPTOR(int,inotify_init,int fake)1442 TSAN_INTERCEPTOR(int, inotify_init, int fake) {
1443   SCOPED_TSAN_INTERCEPTOR(inotify_init, fake);
1444   int fd = REAL(inotify_init)(fake);
1445   if (fd >= 0)
1446     FdInotifyCreate(thr, pc, fd);
1447   return fd;
1448 }
1449 
TSAN_INTERCEPTOR(int,inotify_init1,int flags)1450 TSAN_INTERCEPTOR(int, inotify_init1, int flags) {
1451   SCOPED_TSAN_INTERCEPTOR(inotify_init1, flags);
1452   int fd = REAL(inotify_init1)(flags);
1453   if (fd >= 0)
1454     FdInotifyCreate(thr, pc, fd);
1455   return fd;
1456 }
1457 
TSAN_INTERCEPTOR(int,socket,int domain,int type,int protocol)1458 TSAN_INTERCEPTOR(int, socket, int domain, int type, int protocol) {
1459   SCOPED_TSAN_INTERCEPTOR(socket, domain, type, protocol);
1460   int fd = REAL(socket)(domain, type, protocol);
1461   if (fd >= 0)
1462     FdSocketCreate(thr, pc, fd);
1463   return fd;
1464 }
1465 
TSAN_INTERCEPTOR(int,socketpair,int domain,int type,int protocol,int * fd)1466 TSAN_INTERCEPTOR(int, socketpair, int domain, int type, int protocol, int *fd) {
1467   SCOPED_TSAN_INTERCEPTOR(socketpair, domain, type, protocol, fd);
1468   int res = REAL(socketpair)(domain, type, protocol, fd);
1469   if (res == 0 && fd[0] >= 0 && fd[1] >= 0)
1470     FdPipeCreate(thr, pc, fd[0], fd[1]);
1471   return res;
1472 }
1473 
TSAN_INTERCEPTOR(int,connect,int fd,void * addr,unsigned addrlen)1474 TSAN_INTERCEPTOR(int, connect, int fd, void *addr, unsigned addrlen) {
1475   SCOPED_TSAN_INTERCEPTOR(connect, fd, addr, addrlen);
1476   FdSocketConnecting(thr, pc, fd);
1477   int res = REAL(connect)(fd, addr, addrlen);
1478   if (res == 0 && fd >= 0)
1479     FdSocketConnect(thr, pc, fd);
1480   return res;
1481 }
1482 
TSAN_INTERCEPTOR(int,bind,int fd,void * addr,unsigned addrlen)1483 TSAN_INTERCEPTOR(int, bind, int fd, void *addr, unsigned addrlen) {
1484   SCOPED_TSAN_INTERCEPTOR(bind, fd, addr, addrlen);
1485   int res = REAL(bind)(fd, addr, addrlen);
1486   if (fd > 0 && res == 0)
1487     FdAccess(thr, pc, fd);
1488   return res;
1489 }
1490 
TSAN_INTERCEPTOR(int,listen,int fd,int backlog)1491 TSAN_INTERCEPTOR(int, listen, int fd, int backlog) {
1492   SCOPED_TSAN_INTERCEPTOR(listen, fd, backlog);
1493   int res = REAL(listen)(fd, backlog);
1494   if (fd > 0 && res == 0)
1495     FdAccess(thr, pc, fd);
1496   return res;
1497 }
1498 
TSAN_INTERCEPTOR(int,epoll_create,int size)1499 TSAN_INTERCEPTOR(int, epoll_create, int size) {
1500   SCOPED_TSAN_INTERCEPTOR(epoll_create, size);
1501   int fd = REAL(epoll_create)(size);
1502   if (fd >= 0)
1503     FdPollCreate(thr, pc, fd);
1504   return fd;
1505 }
1506 
TSAN_INTERCEPTOR(int,epoll_create1,int flags)1507 TSAN_INTERCEPTOR(int, epoll_create1, int flags) {
1508   SCOPED_TSAN_INTERCEPTOR(epoll_create1, flags);
1509   int fd = REAL(epoll_create1)(flags);
1510   if (fd >= 0)
1511     FdPollCreate(thr, pc, fd);
1512   return fd;
1513 }
1514 
TSAN_INTERCEPTOR(int,close,int fd)1515 TSAN_INTERCEPTOR(int, close, int fd) {
1516   SCOPED_TSAN_INTERCEPTOR(close, fd);
1517   if (fd >= 0)
1518     FdClose(thr, pc, fd);
1519   return REAL(close)(fd);
1520 }
1521 
TSAN_INTERCEPTOR(int,__close,int fd)1522 TSAN_INTERCEPTOR(int, __close, int fd) {
1523   SCOPED_TSAN_INTERCEPTOR(__close, fd);
1524   if (fd >= 0)
1525     FdClose(thr, pc, fd);
1526   return REAL(__close)(fd);
1527 }
1528 
1529 // glibc guts
TSAN_INTERCEPTOR(void,__res_iclose,void * state,bool free_addr)1530 TSAN_INTERCEPTOR(void, __res_iclose, void *state, bool free_addr) {
1531   SCOPED_TSAN_INTERCEPTOR(__res_iclose, state, free_addr);
1532   int fds[64];
1533   int cnt = ExtractResolvFDs(state, fds, ARRAY_SIZE(fds));
1534   for (int i = 0; i < cnt; i++) {
1535     if (fds[i] > 0)
1536       FdClose(thr, pc, fds[i]);
1537   }
1538   REAL(__res_iclose)(state, free_addr);
1539 }
1540 
TSAN_INTERCEPTOR(int,pipe,int * pipefd)1541 TSAN_INTERCEPTOR(int, pipe, int *pipefd) {
1542   SCOPED_TSAN_INTERCEPTOR(pipe, pipefd);
1543   int res = REAL(pipe)(pipefd);
1544   if (res == 0 && pipefd[0] >= 0 && pipefd[1] >= 0)
1545     FdPipeCreate(thr, pc, pipefd[0], pipefd[1]);
1546   return res;
1547 }
1548 
TSAN_INTERCEPTOR(int,pipe2,int * pipefd,int flags)1549 TSAN_INTERCEPTOR(int, pipe2, int *pipefd, int flags) {
1550   SCOPED_TSAN_INTERCEPTOR(pipe2, pipefd, flags);
1551   int res = REAL(pipe2)(pipefd, flags);
1552   if (res == 0 && pipefd[0] >= 0 && pipefd[1] >= 0)
1553     FdPipeCreate(thr, pc, pipefd[0], pipefd[1]);
1554   return res;
1555 }
1556 
TSAN_INTERCEPTOR(long_t,send,int fd,void * buf,long_t len,int flags)1557 TSAN_INTERCEPTOR(long_t, send, int fd, void *buf, long_t len, int flags) {
1558   SCOPED_TSAN_INTERCEPTOR(send, fd, buf, len, flags);
1559   if (fd >= 0) {
1560     FdAccess(thr, pc, fd);
1561     FdRelease(thr, pc, fd);
1562   }
1563   int res = REAL(send)(fd, buf, len, flags);
1564   return res;
1565 }
1566 
TSAN_INTERCEPTOR(long_t,sendmsg,int fd,void * msg,int flags)1567 TSAN_INTERCEPTOR(long_t, sendmsg, int fd, void *msg, int flags) {
1568   SCOPED_TSAN_INTERCEPTOR(sendmsg, fd, msg, flags);
1569   if (fd >= 0) {
1570     FdAccess(thr, pc, fd);
1571     FdRelease(thr, pc, fd);
1572   }
1573   int res = REAL(sendmsg)(fd, msg, flags);
1574   return res;
1575 }
1576 
TSAN_INTERCEPTOR(long_t,recv,int fd,void * buf,long_t len,int flags)1577 TSAN_INTERCEPTOR(long_t, recv, int fd, void *buf, long_t len, int flags) {
1578   SCOPED_TSAN_INTERCEPTOR(recv, fd, buf, len, flags);
1579   if (fd >= 0)
1580     FdAccess(thr, pc, fd);
1581   int res = REAL(recv)(fd, buf, len, flags);
1582   if (res >= 0 && fd >= 0) {
1583     FdAcquire(thr, pc, fd);
1584   }
1585   return res;
1586 }
1587 
TSAN_INTERCEPTOR(int,unlink,char * path)1588 TSAN_INTERCEPTOR(int, unlink, char *path) {
1589   SCOPED_TSAN_INTERCEPTOR(unlink, path);
1590   Release(thr, pc, File2addr(path));
1591   int res = REAL(unlink)(path);
1592   return res;
1593 }
1594 
TSAN_INTERCEPTOR(void *,tmpfile,int fake)1595 TSAN_INTERCEPTOR(void*, tmpfile, int fake) {
1596   SCOPED_TSAN_INTERCEPTOR(tmpfile, fake);
1597   void *res = REAL(tmpfile)(fake);
1598   if (res) {
1599     int fd = fileno_unlocked(res);
1600     if (fd >= 0)
1601       FdFileCreate(thr, pc, fd);
1602   }
1603   return res;
1604 }
1605 
TSAN_INTERCEPTOR(void *,tmpfile64,int fake)1606 TSAN_INTERCEPTOR(void*, tmpfile64, int fake) {
1607   SCOPED_TSAN_INTERCEPTOR(tmpfile64, fake);
1608   void *res = REAL(tmpfile64)(fake);
1609   if (res) {
1610     int fd = fileno_unlocked(res);
1611     if (fd >= 0)
1612       FdFileCreate(thr, pc, fd);
1613   }
1614   return res;
1615 }
1616 
TSAN_INTERCEPTOR(uptr,fread,void * ptr,uptr size,uptr nmemb,void * f)1617 TSAN_INTERCEPTOR(uptr, fread, void *ptr, uptr size, uptr nmemb, void *f) {
1618   // libc file streams can call user-supplied functions, see fopencookie.
1619   {
1620     SCOPED_TSAN_INTERCEPTOR(fread, ptr, size, nmemb, f);
1621     MemoryAccessRange(thr, pc, (uptr)ptr, size * nmemb, true);
1622   }
1623   return REAL(fread)(ptr, size, nmemb, f);
1624 }
1625 
TSAN_INTERCEPTOR(uptr,fwrite,const void * p,uptr size,uptr nmemb,void * f)1626 TSAN_INTERCEPTOR(uptr, fwrite, const void *p, uptr size, uptr nmemb, void *f) {
1627   // libc file streams can call user-supplied functions, see fopencookie.
1628   {
1629     SCOPED_TSAN_INTERCEPTOR(fwrite, p, size, nmemb, f);
1630     MemoryAccessRange(thr, pc, (uptr)p, size * nmemb, false);
1631   }
1632   return REAL(fwrite)(p, size, nmemb, f);
1633 }
1634 
TSAN_INTERCEPTOR(void,abort,int fake)1635 TSAN_INTERCEPTOR(void, abort, int fake) {
1636   SCOPED_TSAN_INTERCEPTOR(abort, fake);
1637   REAL(fflush)(0);
1638   REAL(abort)(fake);
1639 }
1640 
TSAN_INTERCEPTOR(int,puts,const char * s)1641 TSAN_INTERCEPTOR(int, puts, const char *s) {
1642   SCOPED_TSAN_INTERCEPTOR(puts, s);
1643   MemoryAccessRange(thr, pc, (uptr)s, internal_strlen(s), false);
1644   return REAL(puts)(s);
1645 }
1646 
TSAN_INTERCEPTOR(int,rmdir,char * path)1647 TSAN_INTERCEPTOR(int, rmdir, char *path) {
1648   SCOPED_TSAN_INTERCEPTOR(rmdir, path);
1649   Release(thr, pc, Dir2addr(path));
1650   int res = REAL(rmdir)(path);
1651   return res;
1652 }
1653 
TSAN_INTERCEPTOR(void *,opendir,char * path)1654 TSAN_INTERCEPTOR(void*, opendir, char *path) {
1655   SCOPED_TSAN_INTERCEPTOR(opendir, path);
1656   void *res = REAL(opendir)(path);
1657   if (res != 0)
1658     Acquire(thr, pc, Dir2addr(path));
1659   return res;
1660 }
1661 
TSAN_INTERCEPTOR(int,epoll_ctl,int epfd,int op,int fd,void * ev)1662 TSAN_INTERCEPTOR(int, epoll_ctl, int epfd, int op, int fd, void *ev) {
1663   SCOPED_TSAN_INTERCEPTOR(epoll_ctl, epfd, op, fd, ev);
1664   if (epfd >= 0)
1665     FdAccess(thr, pc, epfd);
1666   if (epfd >= 0 && fd >= 0)
1667     FdAccess(thr, pc, fd);
1668   if (op == EPOLL_CTL_ADD && epfd >= 0)
1669     FdRelease(thr, pc, epfd);
1670   int res = REAL(epoll_ctl)(epfd, op, fd, ev);
1671   return res;
1672 }
1673 
TSAN_INTERCEPTOR(int,epoll_wait,int epfd,void * ev,int cnt,int timeout)1674 TSAN_INTERCEPTOR(int, epoll_wait, int epfd, void *ev, int cnt, int timeout) {
1675   SCOPED_TSAN_INTERCEPTOR(epoll_wait, epfd, ev, cnt, timeout);
1676   if (epfd >= 0)
1677     FdAccess(thr, pc, epfd);
1678   int res = BLOCK_REAL(epoll_wait)(epfd, ev, cnt, timeout);
1679   if (res > 0 && epfd >= 0)
1680     FdAcquire(thr, pc, epfd);
1681   return res;
1682 }
1683 
1684 namespace __tsan {
1685 
CallUserSignalHandler(ThreadState * thr,bool sync,bool sigact,int sig,my_siginfo_t * info,void * uctx)1686 static void CallUserSignalHandler(ThreadState *thr, bool sync, bool sigact,
1687     int sig, my_siginfo_t *info, void *uctx) {
1688   // Ensure that the handler does not spoil errno.
1689   const int saved_errno = errno;
1690   errno = 99;
1691   // Need to remember pc before the call, because the handler can reset it.
1692   uptr pc = sigact ?
1693      (uptr)sigactions[sig].sa_sigaction :
1694      (uptr)sigactions[sig].sa_handler;
1695   pc += 1;  // return address is expected, OutputReport() will undo this
1696   if (sigact)
1697     sigactions[sig].sa_sigaction(sig, info, uctx);
1698   else
1699     sigactions[sig].sa_handler(sig);
1700   // We do not detect errno spoiling for SIGTERM,
1701   // because some SIGTERM handlers do spoil errno but reraise SIGTERM,
1702   // tsan reports false positive in such case.
1703   // It's difficult to properly detect this situation (reraise),
1704   // because in async signal processing case (when handler is called directly
1705   // from rtl_generic_sighandler) we have not yet received the reraised
1706   // signal; and it looks too fragile to intercept all ways to reraise a signal.
1707   if (flags()->report_bugs && !sync && sig != SIGTERM && errno != 99) {
1708     __tsan::StackTrace stack;
1709     stack.ObtainCurrent(thr, pc);
1710     ThreadRegistryLock l(ctx->thread_registry);
1711     ScopedReport rep(ReportTypeErrnoInSignal);
1712     if (!IsFiredSuppression(ctx, rep, stack)) {
1713       rep.AddStack(&stack, true);
1714       OutputReport(thr, rep);
1715     }
1716   }
1717   errno = saved_errno;
1718 }
1719 
ProcessPendingSignals(ThreadState * thr)1720 void ProcessPendingSignals(ThreadState *thr) {
1721   SignalContext *sctx = SigCtx(thr);
1722   if (sctx == 0 || sctx->pending_signal_count == 0 || thr->in_signal_handler)
1723     return;
1724   thr->in_signal_handler = true;
1725   sctx->pending_signal_count = 0;
1726   // These are too big for stack.
1727   static THREADLOCAL __sanitizer_sigset_t emptyset, oldset;
1728   REAL(sigfillset)(&emptyset);
1729   pthread_sigmask(SIG_SETMASK, &emptyset, &oldset);
1730   for (int sig = 0; sig < kSigCount; sig++) {
1731     SignalDesc *signal = &sctx->pending_signals[sig];
1732     if (signal->armed) {
1733       signal->armed = false;
1734       if (sigactions[sig].sa_handler != SIG_DFL
1735           && sigactions[sig].sa_handler != SIG_IGN) {
1736         CallUserSignalHandler(thr, false, signal->sigaction,
1737             sig, &signal->siginfo, &signal->ctx);
1738       }
1739     }
1740   }
1741   pthread_sigmask(SIG_SETMASK, &oldset, 0);
1742   CHECK_EQ(thr->in_signal_handler, true);
1743   thr->in_signal_handler = false;
1744 }
1745 
1746 }  // namespace __tsan
1747 
is_sync_signal(SignalContext * sctx,int sig)1748 static bool is_sync_signal(SignalContext *sctx, int sig) {
1749   return sig == SIGSEGV || sig == SIGBUS || sig == SIGILL ||
1750       sig == SIGABRT || sig == SIGFPE || sig == SIGPIPE || sig == SIGSYS ||
1751       // If we are sending signal to ourselves, we must process it now.
1752       (sctx && sig == sctx->int_signal_send);
1753 }
1754 
rtl_generic_sighandler(bool sigact,int sig,my_siginfo_t * info,void * ctx)1755 void ALWAYS_INLINE rtl_generic_sighandler(bool sigact, int sig,
1756     my_siginfo_t *info, void *ctx) {
1757   ThreadState *thr = cur_thread();
1758   SignalContext *sctx = SigCtx(thr);
1759   if (sig < 0 || sig >= kSigCount) {
1760     VPrintf(1, "ThreadSanitizer: ignoring signal %d\n", sig);
1761     return;
1762   }
1763   // Don't mess with synchronous signals.
1764   const bool sync = is_sync_signal(sctx, sig);
1765   if (sync ||
1766       // If we are in blocking function, we can safely process it now
1767       // (but check if we are in a recursive interceptor,
1768       // i.e. pthread_join()->munmap()).
1769       (sctx && sctx->in_blocking_func == 1)) {
1770     CHECK_EQ(thr->in_signal_handler, false);
1771     thr->in_signal_handler = true;
1772     if (sctx && sctx->in_blocking_func == 1) {
1773       // We ignore interceptors in blocking functions,
1774       // temporary enbled them again while we are calling user function.
1775       int const i = thr->ignore_interceptors;
1776       thr->ignore_interceptors = 0;
1777       CallUserSignalHandler(thr, sync, sigact, sig, info, ctx);
1778       thr->ignore_interceptors = i;
1779     } else {
1780       CallUserSignalHandler(thr, sync, sigact, sig, info, ctx);
1781     }
1782     CHECK_EQ(thr->in_signal_handler, true);
1783     thr->in_signal_handler = false;
1784     return;
1785   }
1786 
1787   if (sctx == 0)
1788     return;
1789   SignalDesc *signal = &sctx->pending_signals[sig];
1790   if (signal->armed == false) {
1791     signal->armed = true;
1792     signal->sigaction = sigact;
1793     if (info)
1794       internal_memcpy(&signal->siginfo, info, sizeof(*info));
1795     if (ctx)
1796       internal_memcpy(&signal->ctx, ctx, sizeof(signal->ctx));
1797     sctx->pending_signal_count++;
1798   }
1799 }
1800 
rtl_sighandler(int sig)1801 static void rtl_sighandler(int sig) {
1802   rtl_generic_sighandler(false, sig, 0, 0);
1803 }
1804 
rtl_sigaction(int sig,my_siginfo_t * info,void * ctx)1805 static void rtl_sigaction(int sig, my_siginfo_t *info, void *ctx) {
1806   rtl_generic_sighandler(true, sig, info, ctx);
1807 }
1808 
TSAN_INTERCEPTOR(int,sigaction,int sig,sigaction_t * act,sigaction_t * old)1809 TSAN_INTERCEPTOR(int, sigaction, int sig, sigaction_t *act, sigaction_t *old) {
1810   SCOPED_TSAN_INTERCEPTOR(sigaction, sig, act, old);
1811   if (old)
1812     internal_memcpy(old, &sigactions[sig], sizeof(*old));
1813   if (act == 0)
1814     return 0;
1815   internal_memcpy(&sigactions[sig], act, sizeof(*act));
1816   sigaction_t newact;
1817   internal_memcpy(&newact, act, sizeof(newact));
1818   REAL(sigfillset)(&newact.sa_mask);
1819   if (act->sa_handler != SIG_IGN && act->sa_handler != SIG_DFL) {
1820     if (newact.sa_flags & SA_SIGINFO)
1821       newact.sa_sigaction = rtl_sigaction;
1822     else
1823       newact.sa_handler = rtl_sighandler;
1824   }
1825   int res = REAL(sigaction)(sig, &newact, 0);
1826   return res;
1827 }
1828 
TSAN_INTERCEPTOR(sighandler_t,signal,int sig,sighandler_t h)1829 TSAN_INTERCEPTOR(sighandler_t, signal, int sig, sighandler_t h) {
1830   sigaction_t act;
1831   act.sa_handler = h;
1832   REAL(memset)(&act.sa_mask, -1, sizeof(act.sa_mask));
1833   act.sa_flags = 0;
1834   sigaction_t old;
1835   int res = sigaction(sig, &act, &old);
1836   if (res)
1837     return SIG_ERR;
1838   return old.sa_handler;
1839 }
1840 
TSAN_INTERCEPTOR(int,sigsuspend,const __sanitizer_sigset_t * mask)1841 TSAN_INTERCEPTOR(int, sigsuspend, const __sanitizer_sigset_t *mask) {
1842   SCOPED_TSAN_INTERCEPTOR(sigsuspend, mask);
1843   return REAL(sigsuspend)(mask);
1844 }
1845 
TSAN_INTERCEPTOR(int,raise,int sig)1846 TSAN_INTERCEPTOR(int, raise, int sig) {
1847   SCOPED_TSAN_INTERCEPTOR(raise, sig);
1848   SignalContext *sctx = SigCtx(thr);
1849   CHECK_NE(sctx, 0);
1850   int prev = sctx->int_signal_send;
1851   sctx->int_signal_send = sig;
1852   int res = REAL(raise)(sig);
1853   CHECK_EQ(sctx->int_signal_send, sig);
1854   sctx->int_signal_send = prev;
1855   return res;
1856 }
1857 
TSAN_INTERCEPTOR(int,kill,int pid,int sig)1858 TSAN_INTERCEPTOR(int, kill, int pid, int sig) {
1859   SCOPED_TSAN_INTERCEPTOR(kill, pid, sig);
1860   SignalContext *sctx = SigCtx(thr);
1861   CHECK_NE(sctx, 0);
1862   int prev = sctx->int_signal_send;
1863   if (pid == (int)internal_getpid()) {
1864     sctx->int_signal_send = sig;
1865   }
1866   int res = REAL(kill)(pid, sig);
1867   if (pid == (int)internal_getpid()) {
1868     CHECK_EQ(sctx->int_signal_send, sig);
1869     sctx->int_signal_send = prev;
1870   }
1871   return res;
1872 }
1873 
TSAN_INTERCEPTOR(int,pthread_kill,void * tid,int sig)1874 TSAN_INTERCEPTOR(int, pthread_kill, void *tid, int sig) {
1875   SCOPED_TSAN_INTERCEPTOR(pthread_kill, tid, sig);
1876   SignalContext *sctx = SigCtx(thr);
1877   CHECK_NE(sctx, 0);
1878   int prev = sctx->int_signal_send;
1879   if (tid == pthread_self()) {
1880     sctx->int_signal_send = sig;
1881   }
1882   int res = REAL(pthread_kill)(tid, sig);
1883   if (tid == pthread_self()) {
1884     CHECK_EQ(sctx->int_signal_send, sig);
1885     sctx->int_signal_send = prev;
1886   }
1887   return res;
1888 }
1889 
TSAN_INTERCEPTOR(int,gettimeofday,void * tv,void * tz)1890 TSAN_INTERCEPTOR(int, gettimeofday, void *tv, void *tz) {
1891   SCOPED_TSAN_INTERCEPTOR(gettimeofday, tv, tz);
1892   // It's intercepted merely to process pending signals.
1893   return REAL(gettimeofday)(tv, tz);
1894 }
1895 
TSAN_INTERCEPTOR(int,getaddrinfo,void * node,void * service,void * hints,void * rv)1896 TSAN_INTERCEPTOR(int, getaddrinfo, void *node, void *service,
1897     void *hints, void *rv) {
1898   SCOPED_TSAN_INTERCEPTOR(getaddrinfo, node, service, hints, rv);
1899   // We miss atomic synchronization in getaddrinfo,
1900   // and can report false race between malloc and free
1901   // inside of getaddrinfo. So ignore memory accesses.
1902   ThreadIgnoreBegin(thr, pc);
1903   int res = REAL(getaddrinfo)(node, service, hints, rv);
1904   ThreadIgnoreEnd(thr, pc);
1905   return res;
1906 }
1907 
1908 // Linux kernel has a bug that leads to kernel deadlock if a process
1909 // maps TBs of memory and then calls mlock().
MlockIsUnsupported()1910 static void MlockIsUnsupported() {
1911   static atomic_uint8_t printed;
1912   if (atomic_exchange(&printed, 1, memory_order_relaxed))
1913     return;
1914   VPrintf(1, "INFO: ThreadSanitizer ignores mlock/munlock[all]\n");
1915 }
1916 
TSAN_INTERCEPTOR(int,mlock,const void * addr,uptr len)1917 TSAN_INTERCEPTOR(int, mlock, const void *addr, uptr len) {
1918   MlockIsUnsupported();
1919   return 0;
1920 }
1921 
TSAN_INTERCEPTOR(int,munlock,const void * addr,uptr len)1922 TSAN_INTERCEPTOR(int, munlock, const void *addr, uptr len) {
1923   MlockIsUnsupported();
1924   return 0;
1925 }
1926 
TSAN_INTERCEPTOR(int,mlockall,int flags)1927 TSAN_INTERCEPTOR(int, mlockall, int flags) {
1928   MlockIsUnsupported();
1929   return 0;
1930 }
1931 
TSAN_INTERCEPTOR(int,munlockall,void)1932 TSAN_INTERCEPTOR(int, munlockall, void) {
1933   MlockIsUnsupported();
1934   return 0;
1935 }
1936 
TSAN_INTERCEPTOR(int,fork,int fake)1937 TSAN_INTERCEPTOR(int, fork, int fake) {
1938   if (cur_thread()->in_symbolizer)
1939     return REAL(fork)(fake);
1940   SCOPED_INTERCEPTOR_RAW(fork, fake);
1941   ForkBefore(thr, pc);
1942   int pid = REAL(fork)(fake);
1943   if (pid == 0) {
1944     // child
1945     ForkChildAfter(thr, pc);
1946     FdOnFork(thr, pc);
1947   } else if (pid > 0) {
1948     // parent
1949     ForkParentAfter(thr, pc);
1950   } else {
1951     // error
1952     ForkParentAfter(thr, pc);
1953   }
1954   return pid;
1955 }
1956 
TSAN_INTERCEPTOR(int,vfork,int fake)1957 TSAN_INTERCEPTOR(int, vfork, int fake) {
1958   // Some programs (e.g. openjdk) call close for all file descriptors
1959   // in the child process. Under tsan it leads to false positives, because
1960   // address space is shared, so the parent process also thinks that
1961   // the descriptors are closed (while they are actually not).
1962   // This leads to false positives due to missed synchronization.
1963   // Strictly saying this is undefined behavior, because vfork child is not
1964   // allowed to call any functions other than exec/exit. But this is what
1965   // openjdk does, so we want to handle it.
1966   // We could disable interceptors in the child process. But it's not possible
1967   // to simply intercept and wrap vfork, because vfork child is not allowed
1968   // to return from the function that calls vfork, and that's exactly what
1969   // we would do. So this would require some assembly trickery as well.
1970   // Instead we simply turn vfork into fork.
1971   return WRAP(fork)(fake);
1972 }
1973 
OnExit(ThreadState * thr)1974 static int OnExit(ThreadState *thr) {
1975   int status = Finalize(thr);
1976   REAL(fflush)(0);
1977   return status;
1978 }
1979 
1980 struct TsanInterceptorContext {
1981   ThreadState *thr;
1982   const uptr caller_pc;
1983   const uptr pc;
1984 };
1985 
HandleRecvmsg(ThreadState * thr,uptr pc,__sanitizer_msghdr * msg)1986 static void HandleRecvmsg(ThreadState *thr, uptr pc,
1987     __sanitizer_msghdr *msg) {
1988   int fds[64];
1989   int cnt = ExtractRecvmsgFDs(msg, fds, ARRAY_SIZE(fds));
1990   for (int i = 0; i < cnt; i++)
1991     FdEventCreate(thr, pc, fds[i]);
1992 }
1993 
1994 #include "sanitizer_common/sanitizer_platform_interceptors.h"
1995 // Causes interceptor recursion (getaddrinfo() and fopen())
1996 #undef SANITIZER_INTERCEPT_GETADDRINFO
1997 
1998 #define COMMON_INTERCEPT_FUNCTION(name) INTERCEPT_FUNCTION(name)
1999 
2000 #define COMMON_INTERCEPTOR_WRITE_RANGE(ctx, ptr, size)                    \
2001   MemoryAccessRange(((TsanInterceptorContext *)ctx)->thr,                 \
2002                     ((TsanInterceptorContext *)ctx)->pc, (uptr)ptr, size, \
2003                     true)
2004 
2005 #define COMMON_INTERCEPTOR_READ_RANGE(ctx, ptr, size)                       \
2006   MemoryAccessRange(((TsanInterceptorContext *) ctx)->thr,                  \
2007                     ((TsanInterceptorContext *) ctx)->pc, (uptr) ptr, size, \
2008                     false)
2009 
2010 #define COMMON_INTERCEPTOR_ENTER(ctx, func, ...)      \
2011   SCOPED_TSAN_INTERCEPTOR(func, __VA_ARGS__);         \
2012   TsanInterceptorContext _ctx = {thr, caller_pc, pc}; \
2013   ctx = (void *)&_ctx;                                \
2014   (void) ctx;
2015 
2016 #define COMMON_INTERCEPTOR_ENTER_NOIGNORE(ctx, func, ...) \
2017   SCOPED_INTERCEPTOR_RAW(func, __VA_ARGS__);              \
2018   TsanInterceptorContext _ctx = {thr, caller_pc, pc};     \
2019   ctx = (void *)&_ctx;                                    \
2020   (void) ctx;
2021 
2022 #define COMMON_INTERCEPTOR_FILE_OPEN(ctx, file, path) \
2023   Acquire(thr, pc, File2addr(path));                  \
2024   if (file) {                                         \
2025     int fd = fileno_unlocked(file);                   \
2026     if (fd >= 0) FdFileCreate(thr, pc, fd);           \
2027   }
2028 
2029 #define COMMON_INTERCEPTOR_FILE_CLOSE(ctx, file) \
2030   if (file) {                                    \
2031     int fd = fileno_unlocked(file);              \
2032     if (fd >= 0) FdClose(thr, pc, fd);           \
2033   }
2034 
2035 #define COMMON_INTERCEPTOR_LIBRARY_LOADED(filename, res)  \
2036   libignore()->OnLibraryLoaded(filename)
2037 
2038 #define COMMON_INTERCEPTOR_LIBRARY_UNLOADED() \
2039   libignore()->OnLibraryUnloaded()
2040 
2041 #define COMMON_INTERCEPTOR_FD_ACQUIRE(ctx, fd) \
2042   FdAcquire(((TsanInterceptorContext *) ctx)->thr, pc, fd)
2043 
2044 #define COMMON_INTERCEPTOR_FD_RELEASE(ctx, fd) \
2045   FdRelease(((TsanInterceptorContext *) ctx)->thr, pc, fd)
2046 
2047 #define COMMON_INTERCEPTOR_FD_ACCESS(ctx, fd) \
2048   FdAccess(((TsanInterceptorContext *) ctx)->thr, pc, fd)
2049 
2050 #define COMMON_INTERCEPTOR_FD_SOCKET_ACCEPT(ctx, fd, newfd) \
2051   FdSocketAccept(((TsanInterceptorContext *) ctx)->thr, pc, fd, newfd)
2052 
2053 #define COMMON_INTERCEPTOR_SET_THREAD_NAME(ctx, name) \
2054   ThreadSetName(((TsanInterceptorContext *) ctx)->thr, name)
2055 
2056 #define COMMON_INTERCEPTOR_SET_PTHREAD_NAME(ctx, thread, name) \
2057   __tsan::ctx->thread_registry->SetThreadNameByUserId(thread, name)
2058 
2059 #define COMMON_INTERCEPTOR_BLOCK_REAL(name) BLOCK_REAL(name)
2060 
2061 #define COMMON_INTERCEPTOR_ON_EXIT(ctx) \
2062   OnExit(((TsanInterceptorContext *) ctx)->thr)
2063 
2064 #define COMMON_INTERCEPTOR_MUTEX_LOCK(ctx, m) \
2065   MutexLock(((TsanInterceptorContext *)ctx)->thr, \
2066             ((TsanInterceptorContext *)ctx)->pc, (uptr)m)
2067 
2068 #define COMMON_INTERCEPTOR_MUTEX_UNLOCK(ctx, m) \
2069   MutexUnlock(((TsanInterceptorContext *)ctx)->thr, \
2070             ((TsanInterceptorContext *)ctx)->pc, (uptr)m)
2071 
2072 #define COMMON_INTERCEPTOR_MUTEX_REPAIR(ctx, m) \
2073   MutexRepair(((TsanInterceptorContext *)ctx)->thr, \
2074             ((TsanInterceptorContext *)ctx)->pc, (uptr)m)
2075 
2076 #define COMMON_INTERCEPTOR_HANDLE_RECVMSG(ctx, msg) \
2077   HandleRecvmsg(((TsanInterceptorContext *)ctx)->thr, \
2078       ((TsanInterceptorContext *)ctx)->pc, msg)
2079 
2080 #include "sanitizer_common/sanitizer_common_interceptors.inc"
2081 
2082 #define TSAN_SYSCALL() \
2083   ThreadState *thr = cur_thread(); \
2084   if (thr->ignore_interceptors) \
2085     return; \
2086   ScopedSyscall scoped_syscall(thr) \
2087 /**/
2088 
2089 struct ScopedSyscall {
2090   ThreadState *thr;
2091 
ScopedSyscallScopedSyscall2092   explicit ScopedSyscall(ThreadState *thr)
2093       : thr(thr) {
2094     Initialize(thr);
2095   }
2096 
~ScopedSyscallScopedSyscall2097   ~ScopedSyscall() {
2098     ProcessPendingSignals(thr);
2099   }
2100 };
2101 
syscall_access_range(uptr pc,uptr p,uptr s,bool write)2102 static void syscall_access_range(uptr pc, uptr p, uptr s, bool write) {
2103   TSAN_SYSCALL();
2104   MemoryAccessRange(thr, pc, p, s, write);
2105 }
2106 
syscall_acquire(uptr pc,uptr addr)2107 static void syscall_acquire(uptr pc, uptr addr) {
2108   TSAN_SYSCALL();
2109   Acquire(thr, pc, addr);
2110   DPrintf("syscall_acquire(%p)\n", addr);
2111 }
2112 
syscall_release(uptr pc,uptr addr)2113 static void syscall_release(uptr pc, uptr addr) {
2114   TSAN_SYSCALL();
2115   DPrintf("syscall_release(%p)\n", addr);
2116   Release(thr, pc, addr);
2117 }
2118 
syscall_fd_close(uptr pc,int fd)2119 static void syscall_fd_close(uptr pc, int fd) {
2120   TSAN_SYSCALL();
2121   FdClose(thr, pc, fd);
2122 }
2123 
syscall_fd_acquire(uptr pc,int fd)2124 static USED void syscall_fd_acquire(uptr pc, int fd) {
2125   TSAN_SYSCALL();
2126   FdAcquire(thr, pc, fd);
2127   DPrintf("syscall_fd_acquire(%p)\n", fd);
2128 }
2129 
syscall_fd_release(uptr pc,int fd)2130 static USED void syscall_fd_release(uptr pc, int fd) {
2131   TSAN_SYSCALL();
2132   DPrintf("syscall_fd_release(%p)\n", fd);
2133   FdRelease(thr, pc, fd);
2134 }
2135 
syscall_pre_fork(uptr pc)2136 static void syscall_pre_fork(uptr pc) {
2137   TSAN_SYSCALL();
2138   ForkBefore(thr, pc);
2139 }
2140 
syscall_post_fork(uptr pc,int pid)2141 static void syscall_post_fork(uptr pc, int pid) {
2142   TSAN_SYSCALL();
2143   if (pid == 0) {
2144     // child
2145     ForkChildAfter(thr, pc);
2146     FdOnFork(thr, pc);
2147   } else if (pid > 0) {
2148     // parent
2149     ForkParentAfter(thr, pc);
2150   } else {
2151     // error
2152     ForkParentAfter(thr, pc);
2153   }
2154 }
2155 
2156 #define COMMON_SYSCALL_PRE_READ_RANGE(p, s) \
2157   syscall_access_range(GET_CALLER_PC(), (uptr)(p), (uptr)(s), false)
2158 
2159 #define COMMON_SYSCALL_PRE_WRITE_RANGE(p, s) \
2160   syscall_access_range(GET_CALLER_PC(), (uptr)(p), (uptr)(s), true)
2161 
2162 #define COMMON_SYSCALL_POST_READ_RANGE(p, s) \
2163   do {                                       \
2164     (void)(p);                               \
2165     (void)(s);                               \
2166   } while (false)
2167 
2168 #define COMMON_SYSCALL_POST_WRITE_RANGE(p, s) \
2169   do {                                        \
2170     (void)(p);                                \
2171     (void)(s);                                \
2172   } while (false)
2173 
2174 #define COMMON_SYSCALL_ACQUIRE(addr) \
2175     syscall_acquire(GET_CALLER_PC(), (uptr)(addr))
2176 
2177 #define COMMON_SYSCALL_RELEASE(addr) \
2178     syscall_release(GET_CALLER_PC(), (uptr)(addr))
2179 
2180 #define COMMON_SYSCALL_FD_CLOSE(fd) syscall_fd_close(GET_CALLER_PC(), fd)
2181 
2182 #define COMMON_SYSCALL_FD_ACQUIRE(fd) syscall_fd_acquire(GET_CALLER_PC(), fd)
2183 
2184 #define COMMON_SYSCALL_FD_RELEASE(fd) syscall_fd_release(GET_CALLER_PC(), fd)
2185 
2186 #define COMMON_SYSCALL_PRE_FORK() \
2187   syscall_pre_fork(GET_CALLER_PC())
2188 
2189 #define COMMON_SYSCALL_POST_FORK(res) \
2190   syscall_post_fork(GET_CALLER_PC(), res)
2191 
2192 #include "sanitizer_common/sanitizer_common_syscalls.inc"
2193 
2194 namespace __tsan {
2195 
finalize(void * arg)2196 static void finalize(void *arg) {
2197   ThreadState *thr = cur_thread();
2198   uptr pc = 0;
2199   atexit_ctx->exit(thr, pc);
2200   int status = Finalize(thr);
2201   // Make sure the output is not lost.
2202   // Flushing all the streams here may freeze the process if a child thread is
2203   // performing file stream operations at the same time.
2204   REAL(fflush)(stdout);
2205   REAL(fflush)(stderr);
2206   if (status)
2207     REAL(_exit)(status);
2208 }
2209 
unreachable()2210 static void unreachable() {
2211   Report("FATAL: ThreadSanitizer: unreachable called\n");
2212   Die();
2213 }
2214 
InitializeInterceptors()2215 void InitializeInterceptors() {
2216   // We need to setup it early, because functions like dlsym() can call it.
2217   REAL(memset) = internal_memset;
2218   REAL(memcpy) = internal_memcpy;
2219   REAL(memcmp) = internal_memcmp;
2220 
2221   // Instruct libc malloc to consume less memory.
2222   mallopt(1, 0);  // M_MXFAST
2223   mallopt(-3, 32*1024);  // M_MMAP_THRESHOLD
2224 
2225   InitializeCommonInterceptors();
2226 
2227   // We can not use TSAN_INTERCEPT to get setjmp addr,
2228   // because it does &setjmp and setjmp is not present in some versions of libc.
2229   using __interception::GetRealFunctionAddress;
2230   GetRealFunctionAddress("setjmp", (uptr*)&REAL(setjmp), 0, 0);
2231   GetRealFunctionAddress("_setjmp", (uptr*)&REAL(_setjmp), 0, 0);
2232   GetRealFunctionAddress("sigsetjmp", (uptr*)&REAL(sigsetjmp), 0, 0);
2233   GetRealFunctionAddress("__sigsetjmp", (uptr*)&REAL(__sigsetjmp), 0, 0);
2234 
2235   TSAN_INTERCEPT(longjmp);
2236   TSAN_INTERCEPT(siglongjmp);
2237 
2238   TSAN_INTERCEPT(malloc);
2239   TSAN_INTERCEPT(__libc_memalign);
2240   TSAN_INTERCEPT(calloc);
2241   TSAN_INTERCEPT(realloc);
2242   TSAN_INTERCEPT(free);
2243   TSAN_INTERCEPT(cfree);
2244   TSAN_INTERCEPT(mmap);
2245   TSAN_INTERCEPT(mmap64);
2246   TSAN_INTERCEPT(munmap);
2247   TSAN_INTERCEPT(memalign);
2248   TSAN_INTERCEPT(valloc);
2249   TSAN_INTERCEPT(pvalloc);
2250   TSAN_INTERCEPT(posix_memalign);
2251 
2252   TSAN_INTERCEPT(strlen);
2253   TSAN_INTERCEPT(memset);
2254   TSAN_INTERCEPT(memcpy);
2255   TSAN_INTERCEPT(memmove);
2256   TSAN_INTERCEPT(memcmp);
2257   TSAN_INTERCEPT(strchr);
2258   TSAN_INTERCEPT(strchrnul);
2259   TSAN_INTERCEPT(strrchr);
2260   TSAN_INTERCEPT(strcpy);  // NOLINT
2261   TSAN_INTERCEPT(strncpy);
2262   TSAN_INTERCEPT(strstr);
2263   TSAN_INTERCEPT(strdup);
2264 
2265   TSAN_INTERCEPT(pthread_create);
2266   TSAN_INTERCEPT(pthread_join);
2267   TSAN_INTERCEPT(pthread_detach);
2268 
2269   TSAN_INTERCEPT_VER(pthread_cond_init, "GLIBC_2.3.2");
2270   TSAN_INTERCEPT_VER(pthread_cond_signal, "GLIBC_2.3.2");
2271   TSAN_INTERCEPT_VER(pthread_cond_broadcast, "GLIBC_2.3.2");
2272   TSAN_INTERCEPT_VER(pthread_cond_wait, "GLIBC_2.3.2");
2273   TSAN_INTERCEPT_VER(pthread_cond_timedwait, "GLIBC_2.3.2");
2274   TSAN_INTERCEPT_VER(pthread_cond_destroy, "GLIBC_2.3.2");
2275 
2276   TSAN_INTERCEPT(pthread_mutex_init);
2277   TSAN_INTERCEPT(pthread_mutex_destroy);
2278   TSAN_INTERCEPT(pthread_mutex_trylock);
2279   TSAN_INTERCEPT(pthread_mutex_timedlock);
2280 
2281   TSAN_INTERCEPT(pthread_spin_init);
2282   TSAN_INTERCEPT(pthread_spin_destroy);
2283   TSAN_INTERCEPT(pthread_spin_lock);
2284   TSAN_INTERCEPT(pthread_spin_trylock);
2285   TSAN_INTERCEPT(pthread_spin_unlock);
2286 
2287   TSAN_INTERCEPT(pthread_rwlock_init);
2288   TSAN_INTERCEPT(pthread_rwlock_destroy);
2289   TSAN_INTERCEPT(pthread_rwlock_rdlock);
2290   TSAN_INTERCEPT(pthread_rwlock_tryrdlock);
2291   TSAN_INTERCEPT(pthread_rwlock_timedrdlock);
2292   TSAN_INTERCEPT(pthread_rwlock_wrlock);
2293   TSAN_INTERCEPT(pthread_rwlock_trywrlock);
2294   TSAN_INTERCEPT(pthread_rwlock_timedwrlock);
2295   TSAN_INTERCEPT(pthread_rwlock_unlock);
2296 
2297   TSAN_INTERCEPT(pthread_barrier_init);
2298   TSAN_INTERCEPT(pthread_barrier_destroy);
2299   TSAN_INTERCEPT(pthread_barrier_wait);
2300 
2301   TSAN_INTERCEPT(pthread_once);
2302 
2303   TSAN_INTERCEPT(sem_init);
2304   TSAN_INTERCEPT(sem_destroy);
2305   TSAN_INTERCEPT(sem_wait);
2306   TSAN_INTERCEPT(sem_trywait);
2307   TSAN_INTERCEPT(sem_timedwait);
2308   TSAN_INTERCEPT(sem_post);
2309   TSAN_INTERCEPT(sem_getvalue);
2310 
2311   TSAN_INTERCEPT(stat);
2312   TSAN_INTERCEPT(__xstat);
2313   TSAN_INTERCEPT(stat64);
2314   TSAN_INTERCEPT(__xstat64);
2315   TSAN_INTERCEPT(lstat);
2316   TSAN_INTERCEPT(__lxstat);
2317   TSAN_INTERCEPT(lstat64);
2318   TSAN_INTERCEPT(__lxstat64);
2319   TSAN_INTERCEPT(fstat);
2320   TSAN_INTERCEPT(__fxstat);
2321   TSAN_INTERCEPT(fstat64);
2322   TSAN_INTERCEPT(__fxstat64);
2323   TSAN_INTERCEPT(open);
2324   TSAN_INTERCEPT(open64);
2325   TSAN_INTERCEPT(creat);
2326   TSAN_INTERCEPT(creat64);
2327   TSAN_INTERCEPT(dup);
2328   TSAN_INTERCEPT(dup2);
2329   TSAN_INTERCEPT(dup3);
2330   TSAN_INTERCEPT(eventfd);
2331   TSAN_INTERCEPT(signalfd);
2332   TSAN_INTERCEPT(inotify_init);
2333   TSAN_INTERCEPT(inotify_init1);
2334   TSAN_INTERCEPT(socket);
2335   TSAN_INTERCEPT(socketpair);
2336   TSAN_INTERCEPT(connect);
2337   TSAN_INTERCEPT(bind);
2338   TSAN_INTERCEPT(listen);
2339   TSAN_INTERCEPT(epoll_create);
2340   TSAN_INTERCEPT(epoll_create1);
2341   TSAN_INTERCEPT(close);
2342   TSAN_INTERCEPT(__close);
2343   TSAN_INTERCEPT(__res_iclose);
2344   TSAN_INTERCEPT(pipe);
2345   TSAN_INTERCEPT(pipe2);
2346 
2347   TSAN_INTERCEPT(send);
2348   TSAN_INTERCEPT(sendmsg);
2349   TSAN_INTERCEPT(recv);
2350 
2351   TSAN_INTERCEPT(unlink);
2352   TSAN_INTERCEPT(tmpfile);
2353   TSAN_INTERCEPT(tmpfile64);
2354   TSAN_INTERCEPT(fread);
2355   TSAN_INTERCEPT(fwrite);
2356   TSAN_INTERCEPT(abort);
2357   TSAN_INTERCEPT(puts);
2358   TSAN_INTERCEPT(rmdir);
2359   TSAN_INTERCEPT(opendir);
2360 
2361   TSAN_INTERCEPT(epoll_ctl);
2362   TSAN_INTERCEPT(epoll_wait);
2363 
2364   TSAN_INTERCEPT(sigaction);
2365   TSAN_INTERCEPT(signal);
2366   TSAN_INTERCEPT(sigsuspend);
2367   TSAN_INTERCEPT(raise);
2368   TSAN_INTERCEPT(kill);
2369   TSAN_INTERCEPT(pthread_kill);
2370   TSAN_INTERCEPT(sleep);
2371   TSAN_INTERCEPT(usleep);
2372   TSAN_INTERCEPT(nanosleep);
2373   TSAN_INTERCEPT(gettimeofday);
2374   TSAN_INTERCEPT(getaddrinfo);
2375 
2376   TSAN_INTERCEPT(mlock);
2377   TSAN_INTERCEPT(munlock);
2378   TSAN_INTERCEPT(mlockall);
2379   TSAN_INTERCEPT(munlockall);
2380 
2381   TSAN_INTERCEPT(fork);
2382   TSAN_INTERCEPT(vfork);
2383   TSAN_INTERCEPT(on_exit);
2384   TSAN_INTERCEPT(__cxa_atexit);
2385   TSAN_INTERCEPT(_exit);
2386 
2387   // Need to setup it, because interceptors check that the function is resolved.
2388   // But atexit is emitted directly into the module, so can't be resolved.
2389   REAL(atexit) = (int(*)(void(*)()))unreachable;
2390   atexit_ctx = new(internal_alloc(MBlockAtExit, sizeof(AtExitContext)))
2391       AtExitContext();
2392 
2393   if (REAL(__cxa_atexit)(&finalize, 0, 0)) {
2394     Printf("ThreadSanitizer: failed to setup atexit callback\n");
2395     Die();
2396   }
2397 
2398   if (pthread_key_create(&g_thread_finalize_key, &thread_finalize)) {
2399     Printf("ThreadSanitizer: failed to create thread key\n");
2400     Die();
2401   }
2402 
2403   FdInit();
2404 }
2405 
internal_start_thread(void (* func)(void * arg),void * arg)2406 void *internal_start_thread(void(*func)(void *arg), void *arg) {
2407   // Start the thread with signals blocked, otherwise it can steal user signals.
2408   __sanitizer_sigset_t set, old;
2409   internal_sigfillset(&set);
2410   internal_sigprocmask(SIG_SETMASK, &set, &old);
2411   void *th;
2412   REAL(pthread_create)(&th, 0, (void*(*)(void *arg))func, arg);
2413   internal_sigprocmask(SIG_SETMASK, &old, 0);
2414   return th;
2415 }
2416 
internal_join_thread(void * th)2417 void internal_join_thread(void *th) {
2418   REAL(pthread_join)(th, 0);
2419 }
2420 
2421 }  // namespace __tsan
2422