1 | //=-- lsan_interceptors.cpp -----------------------------------------------===// |
2 | // |
3 | // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. |
4 | // See https://llvm.org/LICENSE.txt for license information. |
5 | // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception |
6 | // |
7 | //===----------------------------------------------------------------------===// |
8 | // |
9 | // This file is a part of LeakSanitizer. |
10 | // Interceptors for standalone LSan. |
11 | // |
12 | //===----------------------------------------------------------------------===// |
13 | |
14 | #include "interception/interception.h" |
15 | #include "sanitizer_common/sanitizer_allocator.h" |
16 | #include "sanitizer_common/sanitizer_allocator_dlsym.h" |
17 | #include "sanitizer_common/sanitizer_allocator_report.h" |
18 | #include "sanitizer_common/sanitizer_atomic.h" |
19 | #include "sanitizer_common/sanitizer_common.h" |
20 | #include "sanitizer_common/sanitizer_flags.h" |
21 | #include "sanitizer_common/sanitizer_internal_defs.h" |
22 | #include "sanitizer_common/sanitizer_linux.h" |
23 | #include "sanitizer_common/sanitizer_platform_interceptors.h" |
24 | #include "sanitizer_common/sanitizer_platform_limits_netbsd.h" |
25 | #include "sanitizer_common/sanitizer_platform_limits_posix.h" |
26 | #if SANITIZER_POSIX |
27 | #include "sanitizer_common/sanitizer_posix.h" |
28 | #endif |
29 | #include "lsan.h" |
30 | #include "lsan_allocator.h" |
31 | #include "lsan_common.h" |
32 | #include "lsan_thread.h" |
33 | |
34 | #include <stddef.h> |
35 | |
36 | using namespace __lsan; |
37 | |
38 | extern "C" { |
39 | int pthread_attr_init(void *attr); |
40 | int pthread_attr_destroy(void *attr); |
41 | int pthread_attr_getdetachstate(void *attr, int *v); |
42 | int pthread_key_create(unsigned *key, void (*destructor)(void* v)); |
43 | int pthread_setspecific(unsigned key, const void *v); |
44 | } |
45 | |
46 | struct DlsymAlloc : DlSymAllocator<DlsymAlloc> { |
47 | static bool UseImpl() { return lsan_init_is_running; } |
48 | static void OnAllocate(const void *ptr, uptr size) { |
49 | #if CAN_SANITIZE_LEAKS |
50 | // Suppress leaks from dlerror(). Previously dlsym hack on global array was |
51 | // used by leak sanitizer as a root region. |
52 | __lsan_register_root_region(p: ptr, size); |
53 | #endif |
54 | } |
55 | static void OnFree(const void *ptr, uptr size) { |
56 | #if CAN_SANITIZE_LEAKS |
57 | __lsan_unregister_root_region(p: ptr, size); |
58 | #endif |
59 | } |
60 | }; |
61 | |
62 | ///// Malloc/free interceptors. ///// |
63 | |
64 | namespace std { |
65 | struct nothrow_t; |
66 | enum class align_val_t: size_t; |
67 | } |
68 | |
69 | #if !SANITIZER_APPLE |
70 | INTERCEPTOR(void*, malloc, uptr size) { |
71 | if (DlsymAlloc::Use()) |
72 | return DlsymAlloc::Allocate(size_in_bytes: size); |
73 | ENSURE_LSAN_INITED; |
74 | GET_STACK_TRACE_MALLOC; |
75 | return lsan_malloc(size, stack); |
76 | } |
77 | |
78 | INTERCEPTOR(void, free, void *p) { |
79 | if (UNLIKELY(!p)) |
80 | return; |
81 | if (DlsymAlloc::PointerIsMine(ptr: p)) |
82 | return DlsymAlloc::Free(ptr: p); |
83 | ENSURE_LSAN_INITED; |
84 | lsan_free(p); |
85 | } |
86 | |
87 | # if SANITIZER_INTERCEPT_FREE_SIZED |
88 | INTERCEPTOR(void, free_sized, void *p, uptr size) { |
89 | if (UNLIKELY(!p)) |
90 | return; |
91 | if (DlsymAlloc::PointerIsMine(ptr: p)) |
92 | return DlsymAlloc::Free(ptr: p); |
93 | ENSURE_LSAN_INITED; |
94 | lsan_free_sized(p, size); |
95 | } |
96 | # define LSAN_MAYBE_INTERCEPT_FREE_SIZED INTERCEPT_FUNCTION(free_sized) |
97 | # else |
98 | # define LSAN_MAYBE_INTERCEPT_FREE_SIZED |
99 | # endif |
100 | |
101 | # if SANITIZER_INTERCEPT_FREE_ALIGNED_SIZED |
102 | INTERCEPTOR(void, free_aligned_sized, void *p, uptr alignment, uptr size) { |
103 | if (UNLIKELY(!p)) |
104 | return; |
105 | if (DlsymAlloc::PointerIsMine(ptr: p)) |
106 | return DlsymAlloc::Free(ptr: p); |
107 | ENSURE_LSAN_INITED; |
108 | lsan_free_aligned_sized(p, alignment, size); |
109 | } |
110 | # define LSAN_MAYBE_INTERCEPT_FREE_ALIGNED_SIZED \ |
111 | INTERCEPT_FUNCTION(free_aligned_sized) |
112 | # else |
113 | # define LSAN_MAYBE_INTERCEPT_FREE_ALIGNED_SIZED |
114 | # endif |
115 | |
116 | INTERCEPTOR(void*, calloc, uptr nmemb, uptr size) { |
117 | if (DlsymAlloc::Use()) |
118 | return DlsymAlloc::Callocate(nmemb, size); |
119 | ENSURE_LSAN_INITED; |
120 | GET_STACK_TRACE_MALLOC; |
121 | return lsan_calloc(nmemb, size, stack); |
122 | } |
123 | |
124 | INTERCEPTOR(void *, realloc, void *ptr, uptr size) { |
125 | if (DlsymAlloc::Use() || DlsymAlloc::PointerIsMine(ptr)) |
126 | return DlsymAlloc::Realloc(ptr, new_size: size); |
127 | ENSURE_LSAN_INITED; |
128 | GET_STACK_TRACE_MALLOC; |
129 | return lsan_realloc(p: ptr, size, stack); |
130 | } |
131 | |
132 | INTERCEPTOR(void*, reallocarray, void *q, uptr nmemb, uptr size) { |
133 | ENSURE_LSAN_INITED; |
134 | GET_STACK_TRACE_MALLOC; |
135 | return lsan_reallocarray(p: q, nmemb, size, stack); |
136 | } |
137 | |
138 | INTERCEPTOR(int, posix_memalign, void **memptr, uptr alignment, uptr size) { |
139 | ENSURE_LSAN_INITED; |
140 | GET_STACK_TRACE_MALLOC; |
141 | return lsan_posix_memalign(memptr, alignment, size, stack); |
142 | } |
143 | |
144 | INTERCEPTOR(void*, valloc, uptr size) { |
145 | ENSURE_LSAN_INITED; |
146 | GET_STACK_TRACE_MALLOC; |
147 | return lsan_valloc(size, stack); |
148 | } |
149 | #else |
150 | # define LSAN_MAYBE_INTERCEPT_FREE_SIZED |
151 | # define LSAN_MAYBE_INTERCEPT_FREE_ALIGNED_SIZED |
152 | #endif // !SANITIZER_APPLE |
153 | |
154 | #if SANITIZER_INTERCEPT_MEMALIGN |
155 | INTERCEPTOR(void*, memalign, uptr alignment, uptr size) { |
156 | ENSURE_LSAN_INITED; |
157 | GET_STACK_TRACE_MALLOC; |
158 | return lsan_memalign(alignment, size, stack); |
159 | } |
160 | #define LSAN_MAYBE_INTERCEPT_MEMALIGN INTERCEPT_FUNCTION(memalign) |
161 | #else |
162 | #define LSAN_MAYBE_INTERCEPT_MEMALIGN |
163 | #endif // SANITIZER_INTERCEPT_MEMALIGN |
164 | |
165 | #if SANITIZER_INTERCEPT___LIBC_MEMALIGN |
166 | INTERCEPTOR(void *, __libc_memalign, uptr alignment, uptr size) { |
167 | ENSURE_LSAN_INITED; |
168 | GET_STACK_TRACE_MALLOC; |
169 | return lsan_memalign(alignment, size, stack); |
170 | } |
171 | #define LSAN_MAYBE_INTERCEPT___LIBC_MEMALIGN INTERCEPT_FUNCTION(__libc_memalign) |
172 | #else |
173 | #define LSAN_MAYBE_INTERCEPT___LIBC_MEMALIGN |
174 | #endif // SANITIZER_INTERCEPT___LIBC_MEMALIGN |
175 | |
176 | #if SANITIZER_INTERCEPT_ALIGNED_ALLOC |
177 | INTERCEPTOR(void*, aligned_alloc, uptr alignment, uptr size) { |
178 | ENSURE_LSAN_INITED; |
179 | GET_STACK_TRACE_MALLOC; |
180 | return lsan_aligned_alloc(alignment, size, stack); |
181 | } |
182 | #define LSAN_MAYBE_INTERCEPT_ALIGNED_ALLOC INTERCEPT_FUNCTION(aligned_alloc) |
183 | #else |
184 | #define LSAN_MAYBE_INTERCEPT_ALIGNED_ALLOC |
185 | #endif |
186 | |
187 | #if SANITIZER_INTERCEPT_MALLOC_USABLE_SIZE |
188 | INTERCEPTOR(uptr, malloc_usable_size, void *ptr) { |
189 | ENSURE_LSAN_INITED; |
190 | return GetMallocUsableSize(p: ptr); |
191 | } |
192 | #define LSAN_MAYBE_INTERCEPT_MALLOC_USABLE_SIZE \ |
193 | INTERCEPT_FUNCTION(malloc_usable_size) |
194 | #else |
195 | #define LSAN_MAYBE_INTERCEPT_MALLOC_USABLE_SIZE |
196 | #endif |
197 | |
198 | #if SANITIZER_INTERCEPT_MALLOPT_AND_MALLINFO |
199 | struct fake_mallinfo { |
200 | int x[10]; |
201 | }; |
202 | |
203 | INTERCEPTOR(struct fake_mallinfo, mallinfo, void) { |
204 | struct fake_mallinfo res; |
205 | internal_memset(s: &res, c: 0, n: sizeof(res)); |
206 | return res; |
207 | } |
208 | #define LSAN_MAYBE_INTERCEPT_MALLINFO INTERCEPT_FUNCTION(mallinfo) |
209 | |
210 | INTERCEPTOR(int, mallopt, int cmd, int value) { |
211 | return 0; |
212 | } |
213 | #define LSAN_MAYBE_INTERCEPT_MALLOPT INTERCEPT_FUNCTION(mallopt) |
214 | #else |
215 | #define LSAN_MAYBE_INTERCEPT_MALLINFO |
216 | #define LSAN_MAYBE_INTERCEPT_MALLOPT |
217 | #endif // SANITIZER_INTERCEPT_MALLOPT_AND_MALLINFO |
218 | |
219 | #if SANITIZER_INTERCEPT_PVALLOC |
220 | INTERCEPTOR(void*, pvalloc, uptr size) { |
221 | ENSURE_LSAN_INITED; |
222 | GET_STACK_TRACE_MALLOC; |
223 | return lsan_pvalloc(size, stack); |
224 | } |
225 | #define LSAN_MAYBE_INTERCEPT_PVALLOC INTERCEPT_FUNCTION(pvalloc) |
226 | #else |
227 | #define LSAN_MAYBE_INTERCEPT_PVALLOC |
228 | #endif // SANITIZER_INTERCEPT_PVALLOC |
229 | |
230 | #if SANITIZER_INTERCEPT_CFREE |
231 | INTERCEPTOR(void, cfree, void *p) ALIAS(WRAP(free)); |
232 | #define LSAN_MAYBE_INTERCEPT_CFREE INTERCEPT_FUNCTION(cfree) |
233 | #else |
234 | #define LSAN_MAYBE_INTERCEPT_CFREE |
235 | #endif // SANITIZER_INTERCEPT_CFREE |
236 | |
237 | #if SANITIZER_INTERCEPT_MCHECK_MPROBE |
238 | INTERCEPTOR(int, mcheck, void (*abortfunc)(int mstatus)) { |
239 | return 0; |
240 | } |
241 | |
242 | INTERCEPTOR(int, mcheck_pedantic, void (*abortfunc)(int mstatus)) { |
243 | return 0; |
244 | } |
245 | |
246 | INTERCEPTOR(int, mprobe, void *ptr) { |
247 | return 0; |
248 | } |
249 | #endif // SANITIZER_INTERCEPT_MCHECK_MPROBE |
250 | |
251 | |
252 | // TODO(alekseys): throw std::bad_alloc instead of dying on OOM. |
253 | #define OPERATOR_NEW_BODY(nothrow)\ |
254 | ENSURE_LSAN_INITED;\ |
255 | GET_STACK_TRACE_MALLOC;\ |
256 | void *res = lsan_malloc(size, stack);\ |
257 | if (!nothrow && UNLIKELY(!res)) ReportOutOfMemory(size, &stack);\ |
258 | return res; |
259 | #define OPERATOR_NEW_BODY_ALIGN(nothrow)\ |
260 | ENSURE_LSAN_INITED;\ |
261 | GET_STACK_TRACE_MALLOC;\ |
262 | void *res = lsan_memalign((uptr)align, size, stack);\ |
263 | if (!nothrow && UNLIKELY(!res)) ReportOutOfMemory(size, &stack);\ |
264 | return res; |
265 | |
266 | #define OPERATOR_DELETE_BODY\ |
267 | ENSURE_LSAN_INITED;\ |
268 | lsan_free(ptr); |
269 | |
270 | // On OS X it's not enough to just provide our own 'operator new' and |
271 | // 'operator delete' implementations, because they're going to be in the runtime |
272 | // dylib, and the main executable will depend on both the runtime dylib and |
273 | // libstdc++, each of has its implementation of new and delete. |
274 | // To make sure that C++ allocation/deallocation operators are overridden on |
275 | // OS X we need to intercept them using their mangled names. |
276 | #if !SANITIZER_APPLE |
277 | |
278 | INTERCEPTOR_ATTRIBUTE |
279 | void *operator new(size_t size) { OPERATOR_NEW_BODY(false /*nothrow*/); } |
280 | INTERCEPTOR_ATTRIBUTE |
281 | void *operator new[](size_t size) { OPERATOR_NEW_BODY(false /*nothrow*/); } |
282 | INTERCEPTOR_ATTRIBUTE |
283 | void *operator new(size_t size, std::nothrow_t const&) |
284 | { OPERATOR_NEW_BODY(true /*nothrow*/); } |
285 | INTERCEPTOR_ATTRIBUTE |
286 | void *operator new[](size_t size, std::nothrow_t const&) |
287 | { OPERATOR_NEW_BODY(true /*nothrow*/); } |
288 | INTERCEPTOR_ATTRIBUTE |
289 | void *operator new(size_t size, std::align_val_t align) |
290 | { OPERATOR_NEW_BODY_ALIGN(false /*nothrow*/); } |
291 | INTERCEPTOR_ATTRIBUTE |
292 | void *operator new[](size_t size, std::align_val_t align) |
293 | { OPERATOR_NEW_BODY_ALIGN(false /*nothrow*/); } |
294 | INTERCEPTOR_ATTRIBUTE |
295 | void *operator new(size_t size, std::align_val_t align, std::nothrow_t const&) |
296 | { OPERATOR_NEW_BODY_ALIGN(true /*nothrow*/); } |
297 | INTERCEPTOR_ATTRIBUTE |
298 | void *operator new[](size_t size, std::align_val_t align, std::nothrow_t const&) |
299 | { OPERATOR_NEW_BODY_ALIGN(true /*nothrow*/); } |
300 | |
301 | INTERCEPTOR_ATTRIBUTE |
302 | void operator delete(void *ptr) NOEXCEPT { OPERATOR_DELETE_BODY; } |
303 | INTERCEPTOR_ATTRIBUTE |
304 | void operator delete[](void *ptr) NOEXCEPT { OPERATOR_DELETE_BODY; } |
305 | INTERCEPTOR_ATTRIBUTE |
306 | void operator delete(void *ptr, std::nothrow_t const&) { OPERATOR_DELETE_BODY; } |
307 | INTERCEPTOR_ATTRIBUTE |
308 | void operator delete[](void *ptr, std::nothrow_t const &) |
309 | { OPERATOR_DELETE_BODY; } |
310 | INTERCEPTOR_ATTRIBUTE |
311 | void operator delete(void *ptr, size_t size) NOEXCEPT |
312 | { OPERATOR_DELETE_BODY; } |
313 | INTERCEPTOR_ATTRIBUTE |
314 | void operator delete[](void *ptr, size_t size) NOEXCEPT |
315 | { OPERATOR_DELETE_BODY; } |
316 | INTERCEPTOR_ATTRIBUTE |
317 | void operator delete(void *ptr, std::align_val_t) NOEXCEPT |
318 | { OPERATOR_DELETE_BODY; } |
319 | INTERCEPTOR_ATTRIBUTE |
320 | void operator delete[](void *ptr, std::align_val_t) NOEXCEPT |
321 | { OPERATOR_DELETE_BODY; } |
322 | INTERCEPTOR_ATTRIBUTE |
323 | void operator delete(void *ptr, std::align_val_t, std::nothrow_t const&) |
324 | { OPERATOR_DELETE_BODY; } |
325 | INTERCEPTOR_ATTRIBUTE |
326 | void operator delete[](void *ptr, std::align_val_t, std::nothrow_t const&) |
327 | { OPERATOR_DELETE_BODY; } |
328 | INTERCEPTOR_ATTRIBUTE |
329 | void operator delete(void *ptr, size_t size, std::align_val_t) NOEXCEPT |
330 | { OPERATOR_DELETE_BODY; } |
331 | INTERCEPTOR_ATTRIBUTE |
332 | void operator delete[](void *ptr, size_t size, std::align_val_t) NOEXCEPT |
333 | { OPERATOR_DELETE_BODY; } |
334 | |
335 | #else // SANITIZER_APPLE |
336 | |
337 | INTERCEPTOR(void *, _Znwm, size_t size) |
338 | { OPERATOR_NEW_BODY(false /*nothrow*/); } |
339 | INTERCEPTOR(void *, _Znam, size_t size) |
340 | { OPERATOR_NEW_BODY(false /*nothrow*/); } |
341 | INTERCEPTOR(void *, _ZnwmRKSt9nothrow_t, size_t size, std::nothrow_t const&) |
342 | { OPERATOR_NEW_BODY(true /*nothrow*/); } |
343 | INTERCEPTOR(void *, _ZnamRKSt9nothrow_t, size_t size, std::nothrow_t const&) |
344 | { OPERATOR_NEW_BODY(true /*nothrow*/); } |
345 | |
346 | INTERCEPTOR(void, _ZdlPv, void *ptr) |
347 | { OPERATOR_DELETE_BODY; } |
348 | INTERCEPTOR(void, _ZdaPv, void *ptr) |
349 | { OPERATOR_DELETE_BODY; } |
350 | INTERCEPTOR(void, _ZdlPvRKSt9nothrow_t, void *ptr, std::nothrow_t const&) |
351 | { OPERATOR_DELETE_BODY; } |
352 | INTERCEPTOR(void, _ZdaPvRKSt9nothrow_t, void *ptr, std::nothrow_t const&) |
353 | { OPERATOR_DELETE_BODY; } |
354 | |
355 | #endif // !SANITIZER_APPLE |
356 | |
357 | |
358 | ///// Thread initialization and finalization. ///// |
359 | |
360 | #if !SANITIZER_NETBSD && !SANITIZER_FREEBSD && !SANITIZER_FUCHSIA |
361 | static unsigned g_thread_finalize_key; |
362 | |
363 | static void thread_finalize(void *v) { |
364 | uptr iter = (uptr)v; |
365 | if (iter > 1) { |
366 | if (pthread_setspecific(key: g_thread_finalize_key, v: (void*)(iter - 1))) { |
367 | Report(format: "LeakSanitizer: failed to set thread key.\n" ); |
368 | Die(); |
369 | } |
370 | return; |
371 | } |
372 | ThreadFinish(); |
373 | } |
374 | #endif |
375 | |
376 | #if SANITIZER_NETBSD |
377 | INTERCEPTOR(void, _lwp_exit) { |
378 | ENSURE_LSAN_INITED; |
379 | ThreadFinish(); |
380 | REAL(_lwp_exit)(); |
381 | } |
382 | #define LSAN_MAYBE_INTERCEPT__LWP_EXIT INTERCEPT_FUNCTION(_lwp_exit) |
383 | #else |
384 | #define LSAN_MAYBE_INTERCEPT__LWP_EXIT |
385 | #endif |
386 | |
387 | #if SANITIZER_INTERCEPT_THR_EXIT |
388 | INTERCEPTOR(void, thr_exit, tid_t *state) { |
389 | ENSURE_LSAN_INITED; |
390 | ThreadFinish(); |
391 | REAL(thr_exit)(state); |
392 | } |
393 | #define LSAN_MAYBE_INTERCEPT_THR_EXIT INTERCEPT_FUNCTION(thr_exit) |
394 | #else |
395 | #define LSAN_MAYBE_INTERCEPT_THR_EXIT |
396 | #endif |
397 | |
398 | #if SANITIZER_INTERCEPT___CXA_ATEXIT |
399 | INTERCEPTOR(int, __cxa_atexit, void (*func)(void *), void *arg, |
400 | void *dso_handle) { |
401 | __lsan::ScopedInterceptorDisabler disabler; |
402 | return REAL(__cxa_atexit)(func, arg, dso_handle); |
403 | } |
404 | #define LSAN_MAYBE_INTERCEPT___CXA_ATEXIT INTERCEPT_FUNCTION(__cxa_atexit) |
405 | #else |
406 | #define LSAN_MAYBE_INTERCEPT___CXA_ATEXIT |
407 | #endif |
408 | |
409 | #if SANITIZER_INTERCEPT_ATEXIT |
410 | INTERCEPTOR(int, atexit, void (*f)()) { |
411 | __lsan::ScopedInterceptorDisabler disabler; |
412 | return REAL(__cxa_atexit)((void (*)(void *a))f, 0, 0); |
413 | } |
414 | #define LSAN_MAYBE_INTERCEPT_ATEXIT INTERCEPT_FUNCTION(atexit) |
415 | #else |
416 | #define LSAN_MAYBE_INTERCEPT_ATEXIT |
417 | #endif |
418 | |
419 | #if SANITIZER_INTERCEPT_PTHREAD_ATFORK |
420 | extern "C" { |
421 | extern int _pthread_atfork(void (*prepare)(), void (*parent)(), |
422 | void (*child)()); |
423 | } |
424 | |
425 | INTERCEPTOR(int, pthread_atfork, void (*prepare)(), void (*parent)(), |
426 | void (*child)()) { |
427 | __lsan::ScopedInterceptorDisabler disabler; |
428 | // REAL(pthread_atfork) cannot be called due to symbol indirections at least |
429 | // on NetBSD |
430 | return _pthread_atfork(prepare, parent, child); |
431 | } |
432 | #define LSAN_MAYBE_INTERCEPT_PTHREAD_ATFORK INTERCEPT_FUNCTION(pthread_atfork) |
433 | #else |
434 | #define LSAN_MAYBE_INTERCEPT_PTHREAD_ATFORK |
435 | #endif |
436 | |
437 | #if SANITIZER_INTERCEPT_STRERROR |
438 | INTERCEPTOR(char *, strerror, int errnum) { |
439 | __lsan::ScopedInterceptorDisabler disabler; |
440 | return REAL(strerror)(errnum); |
441 | } |
442 | #define LSAN_MAYBE_INTERCEPT_STRERROR INTERCEPT_FUNCTION(strerror) |
443 | #else |
444 | #define LSAN_MAYBE_INTERCEPT_STRERROR |
445 | #endif |
446 | |
447 | #if SANITIZER_POSIX |
448 | |
449 | template <bool Detached> |
450 | static void *ThreadStartFunc(void *arg) { |
451 | u32 parent_tid = (uptr)arg; |
452 | uptr tid = ThreadCreate(tid: parent_tid, detached: Detached); |
453 | // Wait until the last iteration to maximize the chance that we are the last |
454 | // destructor to run. |
455 | #if !SANITIZER_NETBSD && !SANITIZER_FREEBSD |
456 | if (pthread_setspecific(key: g_thread_finalize_key, |
457 | v: (void*)GetPthreadDestructorIterations())) { |
458 | Report(format: "LeakSanitizer: failed to set thread key.\n" ); |
459 | Die(); |
460 | } |
461 | # endif |
462 | ThreadStart(tid, os_id: GetTid()); |
463 | auto self = GetThreadSelf(); |
464 | auto args = GetThreadArgRetval().GetArgs(thread: self); |
465 | void *retval = (*args.routine)(args.arg_retval); |
466 | GetThreadArgRetval().Finish(thread: self, retval); |
467 | return retval; |
468 | } |
469 | |
470 | INTERCEPTOR(int, pthread_create, void *th, void *attr, |
471 | void *(*callback)(void *), void *param) { |
472 | ENSURE_LSAN_INITED; |
473 | EnsureMainThreadIDIsCorrect(); |
474 | |
475 | bool detached = [attr]() { |
476 | int d = 0; |
477 | return attr && !pthread_attr_getdetachstate(attr, v: &d) && IsStateDetached(state: d); |
478 | }(); |
479 | |
480 | __sanitizer_pthread_attr_t myattr; |
481 | if (!attr) { |
482 | pthread_attr_init(attr: &myattr); |
483 | attr = &myattr; |
484 | } |
485 | AdjustStackSize(attr); |
486 | uptr this_tid = GetCurrentThreadId(); |
487 | int result; |
488 | { |
489 | // Ignore all allocations made by pthread_create: thread stack/TLS may be |
490 | // stored by pthread for future reuse even after thread destruction, and |
491 | // the linked list it's stored in doesn't even hold valid pointers to the |
492 | // objects, the latter are calculated by obscure pointer arithmetic. |
493 | ScopedInterceptorDisabler disabler; |
494 | GetThreadArgRetval().Create(detached, args: {.routine: callback, .arg_retval: param}, fn: [&]() -> uptr { |
495 | result = REAL(pthread_create)( |
496 | th, attr, detached ? ThreadStartFunc<true> : ThreadStartFunc<false>, |
497 | (void *)this_tid); |
498 | return result ? 0 : *(uptr *)(th); |
499 | }); |
500 | } |
501 | if (attr == &myattr) |
502 | pthread_attr_destroy(attr: &myattr); |
503 | return result; |
504 | } |
505 | |
506 | INTERCEPTOR(int, pthread_join, void *thread, void **retval) { |
507 | int result; |
508 | GetThreadArgRetval().Join(thread: (uptr)thread, fn: [&]() { |
509 | result = REAL(pthread_join)(thread, retval); |
510 | return !result; |
511 | }); |
512 | return result; |
513 | } |
514 | |
515 | INTERCEPTOR(int, pthread_detach, void *thread) { |
516 | int result; |
517 | GetThreadArgRetval().Detach(thread: (uptr)thread, fn: [&]() { |
518 | result = REAL(pthread_detach)(thread); |
519 | return !result; |
520 | }); |
521 | return result; |
522 | } |
523 | |
524 | INTERCEPTOR(void, pthread_exit, void *retval) { |
525 | GetThreadArgRetval().Finish(thread: GetThreadSelf(), retval); |
526 | REAL(pthread_exit)(retval); |
527 | } |
528 | |
529 | # if SANITIZER_INTERCEPT_TRYJOIN |
530 | INTERCEPTOR(int, pthread_tryjoin_np, void *thread, void **ret) { |
531 | int result; |
532 | GetThreadArgRetval().Join(thread: (uptr)thread, fn: [&]() { |
533 | result = REAL(pthread_tryjoin_np)(thread, ret); |
534 | return !result; |
535 | }); |
536 | return result; |
537 | } |
538 | # define LSAN_MAYBE_INTERCEPT_TRYJOIN INTERCEPT_FUNCTION(pthread_tryjoin_np) |
539 | # else |
540 | # define LSAN_MAYBE_INTERCEPT_TRYJOIN |
541 | # endif // SANITIZER_INTERCEPT_TRYJOIN |
542 | |
543 | # if SANITIZER_INTERCEPT_TIMEDJOIN |
544 | INTERCEPTOR(int, pthread_timedjoin_np, void *thread, void **ret, |
545 | const struct timespec *abstime) { |
546 | int result; |
547 | GetThreadArgRetval().Join(thread: (uptr)thread, fn: [&]() { |
548 | result = REAL(pthread_timedjoin_np)(thread, ret, abstime); |
549 | return !result; |
550 | }); |
551 | return result; |
552 | } |
553 | # define LSAN_MAYBE_INTERCEPT_TIMEDJOIN \ |
554 | INTERCEPT_FUNCTION(pthread_timedjoin_np) |
555 | # else |
556 | # define LSAN_MAYBE_INTERCEPT_TIMEDJOIN |
557 | # endif // SANITIZER_INTERCEPT_TIMEDJOIN |
558 | |
559 | DEFINE_INTERNAL_PTHREAD_FUNCTIONS |
560 | |
561 | INTERCEPTOR(void, _exit, int status) { |
562 | if (status == 0 && HasReportedLeaks()) status = common_flags()->exitcode; |
563 | REAL(_exit)(status); |
564 | } |
565 | |
566 | #define COMMON_INTERCEPT_FUNCTION(name) INTERCEPT_FUNCTION(name) |
567 | #define SIGNAL_INTERCEPTOR_ENTER() ENSURE_LSAN_INITED |
568 | #include "sanitizer_common/sanitizer_signal_interceptors.inc" |
569 | |
570 | #endif // SANITIZER_POSIX |
571 | |
572 | namespace __lsan { |
573 | |
574 | void InitializeInterceptors() { |
575 | // Fuchsia doesn't use interceptors that require any setup. |
576 | #if !SANITIZER_FUCHSIA |
577 | __interception::DoesNotSupportStaticLinking(); |
578 | InitializeSignalInterceptors(); |
579 | |
580 | INTERCEPT_FUNCTION(malloc); |
581 | INTERCEPT_FUNCTION(free); |
582 | LSAN_MAYBE_INTERCEPT_FREE_SIZED; |
583 | LSAN_MAYBE_INTERCEPT_FREE_ALIGNED_SIZED; |
584 | LSAN_MAYBE_INTERCEPT_CFREE; |
585 | INTERCEPT_FUNCTION(calloc); |
586 | INTERCEPT_FUNCTION(realloc); |
587 | LSAN_MAYBE_INTERCEPT_MEMALIGN; |
588 | LSAN_MAYBE_INTERCEPT___LIBC_MEMALIGN; |
589 | LSAN_MAYBE_INTERCEPT_ALIGNED_ALLOC; |
590 | INTERCEPT_FUNCTION(posix_memalign); |
591 | INTERCEPT_FUNCTION(valloc); |
592 | LSAN_MAYBE_INTERCEPT_PVALLOC; |
593 | LSAN_MAYBE_INTERCEPT_MALLOC_USABLE_SIZE; |
594 | LSAN_MAYBE_INTERCEPT_MALLINFO; |
595 | LSAN_MAYBE_INTERCEPT_MALLOPT; |
596 | INTERCEPT_FUNCTION(pthread_create); |
597 | INTERCEPT_FUNCTION(pthread_join); |
598 | INTERCEPT_FUNCTION(pthread_detach); |
599 | INTERCEPT_FUNCTION(pthread_exit); |
600 | LSAN_MAYBE_INTERCEPT_TIMEDJOIN; |
601 | LSAN_MAYBE_INTERCEPT_TRYJOIN; |
602 | INTERCEPT_FUNCTION(_exit); |
603 | |
604 | LSAN_MAYBE_INTERCEPT__LWP_EXIT; |
605 | LSAN_MAYBE_INTERCEPT_THR_EXIT; |
606 | |
607 | LSAN_MAYBE_INTERCEPT___CXA_ATEXIT; |
608 | LSAN_MAYBE_INTERCEPT_ATEXIT; |
609 | LSAN_MAYBE_INTERCEPT_PTHREAD_ATFORK; |
610 | |
611 | LSAN_MAYBE_INTERCEPT_STRERROR; |
612 | |
613 | #if !SANITIZER_NETBSD && !SANITIZER_FREEBSD |
614 | if (pthread_key_create(key: &g_thread_finalize_key, destructor: &thread_finalize)) { |
615 | Report(format: "LeakSanitizer: failed to create thread key.\n" ); |
616 | Die(); |
617 | } |
618 | #endif |
619 | |
620 | #endif // !SANITIZER_FUCHSIA |
621 | } |
622 | |
623 | } // namespace __lsan |
624 | |