You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

341 lines
10 KiB

/*
* Copyright 2002-2019 Intel Corporation.
*
* This software is provided to you as Sample Source Code as defined in the accompanying
* End User License Agreement for the Intel(R) Software Development Products ("Agreement")
* section 1.L.
*
* This software and the related documents are provided as is, with no express or implied
* warranties, other than those that are expressly stated in the License.
*/
/*! @file
* Probe mode detach-reattach test which confirms that each thread get its respective thread detach callbacks
* in a scenario that one of the application threads (main or secondary) may be a zombie thread.
*/
#include "pin.H"
#include <iostream>
#include <fstream>
#include <stdlib.h>
#include <assert.h>
#include <sched.h>
#include <unistd.h>
#include <linux/unistd.h>
#include <sys/syscall.h>
#include "zombie_utils.h"
using std::ofstream;
using std::endl;
#define MAX_ITERATION 5
const static char * firstDllName = "libmy_dll.so";
const static int iteration = 3;
pid_t zombiePid = -1;
TEST_TYPE testType = TEST_TYPE_DEFAULT;
PIN_LOCK pinLock;
using std::cerr;
/* ===================================================================== */
/* Commandline Switches */
/* ===================================================================== */
KNOB<string> knobOutputFile(KNOB_MODE_WRITEONCE, "pintool",
"o", "", "specify file name");
ofstream traceFile;
/* ===================================================================== */
// Session control checks that there is no callbacks mix between different
// attach-detach iterations
class SESSION_CONTROL
{
public:
SESSION_CONTROL():_currentIteration(0),
_threadCounter(0),
_startAttachSession(FALSE),
_startDetachSession(FALSE)
{}
static VOID ApplicationStart(VOID *v);
static VOID AttachedThreadStart(VOID *sigmask, VOID *v);
static INT DedicatedThread(VOID *arg);
VOID StartIteration(UINT32 it) { _currentIteration = it; _threadCounter = 0;}
UINT32 CurrentIteration() { return _currentIteration; }
BOOL GotFirstThreadNotification(UINT32 it)
{
return ((it == _currentIteration) && (_threadCounter > 0));
}
static SESSION_CONTROL* Instance() { return &m_instance; }
VOID StartDetach()
{
_startDetachSession = TRUE;
_startAttachSession = FALSE;
}
VOID StartAttach()
{
_startAttachSession = TRUE;
_startDetachSession = FALSE;
}
VOID WaitForDetach() { while (!_startDetachSession) sched_yield(); }
VOID WaitForAttach() { while (!_startAttachSession) sched_yield(); }
private:
UINT32 _currentIteration;
UINT32 _threadCounter;
volatile BOOL _startAttachSession;
volatile BOOL _startDetachSession;
static SESSION_CONTROL m_instance;
};
SESSION_CONTROL SESSION_CONTROL::m_instance;
SESSION_CONTROL *SessionControl() { return SESSION_CONTROL::Instance(); }
// Detach session.
// Callbacks and function replacements.
class DETACH_SESSION
{
public:
// Detach completion notification
static VOID DetachCompleted(VOID *v);
static VOID DetachThreadStart(VOID *v);
static VOID ImageLoad(IMG img, VOID *v);
};
// Reattach session
class REATTACH_SESSION
{
public:
static VOID ImageLoad(IMG img, VOID *v);
static VOID AttachedThreadStart(VOID *sigmask, VOID *v);
};
// Pin-tool detach-completed callback
// Called from Pin
VOID DETACH_SESSION::DetachCompleted(VOID *v)
{
unsigned long detachIteration = (unsigned long)v;
if (detachIteration != SessionControl()->CurrentIteration())
{
cerr << "Detach iteration error: Expected " << SessionControl()->CurrentIteration()
<< " Rececived " << detachIteration << " In DetachCompleted" << endl;
PIN_ExitProcess (1);
}
PIN_GetLock(&pinLock, PIN_GetTid());
traceFile << "Detach session " << detachIteration << " Detach completed; tid = "
<< PIN_GetTid() << endl;
if (detachIteration == MAX_ITERATION)
{
traceFile << "TEST PASSED" << endl;
traceFile.close();
PIN_ExitProcess(0);
}
PIN_ReleaseLock(&pinLock);
SessionControl()->StartAttach();
}
// Notify the application when Pin attaches to it.
BOOL AfterAttachProbe(void)
{
return TRUE;
}
// Sets the pid of the zombie thread.
VOID SetZombiePid(pid_t pid)
{
zombiePid = pid;
}
// Set the type of the thread, meaning:
// 1. Which thread (main/secondary) is a zombie thread.
// 2. Is the main thread turn into zombie only not in the first attach session.
VOID SetTestType(TEST_TYPE exprType)
{
testType = exprType;
}
VOID AttachMain(VOID *arg)
{
UINT32 reattachIteration = *(reinterpret_cast <UINT32 *> (&arg));
SessionControl()->StartIteration(reattachIteration);
IMG_AddInstrumentFunction(REATTACH_SESSION::ImageLoad, arg);
PIN_AddDetachFunctionProbed(DETACH_SESSION::DetachCompleted, arg);
PIN_AddThreadAttachProbedFunction(SESSION_CONTROL::AttachedThreadStart, arg);
PIN_AddThreadDetachProbedFunction(DETACH_SESSION::DetachThreadStart, arg);
}
// This is the start function which is called by the child process of the main process
// at the beginning of its execution.
// Its performs the repeated detach-reattach.
INT SESSION_CONTROL::DedicatedThread(VOID *arg)
{
static ADDRINT reattachIteration = 2;
while (1)
{
// Wait until the testType is set by the application.
while(testType == TEST_TYPE_DEFAULT) sleep(1);
{
// If the main thread will turn into zombie before the first reattach session.
if(testType == TEST_TYPE_MAIN_THREAD_ZOMBIE_IN_REATTACH)
{
// Wait until the tool records the pid of the main application thread,
while(zombiePid == -1) sleep(1);
}
}
SessionControl()->WaitForDetach();
PIN_GetLock(&pinLock, PIN_GetTid());
traceFile << "Pin tool: sending detach request" << endl;
PIN_ReleaseLock(&pinLock);
PIN_DetachProbed();
SessionControl()->WaitForAttach();
PIN_GetLock(&pinLock, PIN_GetTid());
traceFile << "Pin tool: sending attach request" << endl;
PIN_ReleaseLock(&pinLock);
// If the main thread will turn into zombie before the first time it reattaches to the application.
if(testType == TEST_TYPE_MAIN_THREAD_ZOMBIE_IN_REATTACH)
{
// Wait until the main thread turns into a zombie thread.
while(!isZombie(zombiePid)) sleep(1);
}
PIN_AttachProbed(AttachMain, (VOID *)reattachIteration++);
}
return 0;
}
// Thread start notification in the first session
VOID SESSION_CONTROL::AttachedThreadStart(VOID *sigmask, VOID *arg)
{
unsigned long iteration = (unsigned long)arg;
if (iteration != SessionControl()->CurrentIteration())
{
cerr << "Iteration error: Expected " << SessionControl()->CurrentIteration()
<< " Received " << iteration << " In AttachedThreadStart" << endl;
PIN_ExitProcess (1);
}
PIN_GetLock(&pinLock, PIN_GetTid());
++(SessionControl()->_threadCounter);
traceFile << "Thread start " << " notification at session " << iteration << " tid " << PIN_GetTid()<< endl;
PIN_ReleaseLock(&pinLock);
}
VOID DETACH_SESSION::DetachThreadStart(VOID *arg)
{
unsigned long iteration = (unsigned long)arg;
if (iteration != SessionControl()->CurrentIteration())
{
cerr << "Iteration error: Expected " << SessionControl()->CurrentIteration()
<< " Received " << iteration << " In DetachThreadStart" << endl;
PIN_ExitProcess (1);
}
PIN_GetLock(&pinLock, PIN_GetTid());
traceFile << "Thread detach " << " notification at session " << iteration << " tid " << PIN_GetTid() << endl;
PIN_ReleaseLock(&pinLock);
}
// Image load callback for the first Pin session
VOID DETACH_SESSION::ImageLoad(IMG img, VOID *v)
{
if ( IMG_IsMainExecutable(img))
{
RTN rtn = RTN_FindByName(img, "AfterAttach1");
// Relevant only in the attach scenario.
if (RTN_Valid(rtn))
{
RTN_ReplaceProbed(rtn, AFUNPTR(AfterAttachProbe));
}
rtn = RTN_FindByName(img, "NotifyZombiePid");
// Relevant only in the attach scenario.
if (RTN_Valid(rtn))
{
RTN_InsertCallProbed(rtn, IPOINT_BEFORE, (AFUNPTR)SetZombiePid, IARG_FUNCARG_ENTRYPOINT_VALUE, 0, IARG_END);
}
rtn = RTN_FindByName(img, "NotifyTestType");
// Relevant only in the attach scenario.
if (RTN_Valid(rtn))
{
RTN_InsertCallProbed(rtn, IPOINT_BEFORE, (AFUNPTR)SetTestType, IARG_FUNCARG_ENTRYPOINT_VALUE, 0, IARG_END);
}
}
PIN_GetLock(&pinLock, PIN_GetTid());
traceFile << "Load image " << IMG_Name(img) << "in iteration " << iteration << endl;
PIN_ReleaseLock(&pinLock);
size_t found;
found = IMG_Name(img).find(firstDllName);
if ( found!=string::npos )
{
SessionControl()->StartDetach();
}
}
// Image load callback for the second Pin session
VOID REATTACH_SESSION::ImageLoad(IMG img, VOID *v)
{
PIN_GetLock(&pinLock, PIN_GetTid());
traceFile <<"Load image " << IMG_Name(img) <<" in iteration" << iteration <<endl;
PIN_ReleaseLock(&pinLock);
size_t found;
found= IMG_Name(img).find(firstDllName);
if ( found!=string::npos )
{
SessionControl()->StartDetach();
}
}
/* ===================================================================== */
int main(int argc, CHAR *argv[])
{
PIN_InitSymbols();
PIN_Init(argc,argv);
SessionControl()->StartIteration(1);
PIN_InitLock(&pinLock);
traceFile.open(knobOutputFile.Value().c_str());
IMG_AddInstrumentFunction(DETACH_SESSION::ImageLoad,(VOID *) 1);
PIN_AddDetachFunctionProbed(DETACH_SESSION::DetachCompleted, (VOID *)1);
PIN_AddThreadAttachProbedFunction(SESSION_CONTROL::AttachedThreadStart, (VOID *)1);
PIN_AddThreadDetachProbedFunction(DETACH_SESSION::DetachThreadStart, (VOID *)1);
UINT32 stackSize = 0x40000;
UINT8 *stack = new UINT8[stackSize];
// thread stack should be aligned
UINT8 *stackTop = (UINT8*)((((ADDRINT)stack + stackSize) >> 4) << 4);
int flags = (CLONE_VM | CLONE_FS | CLONE_FILES | CLONE_SIGHAND | CLONE_THREAD | CLONE_PARENT);
int tid = clone(SESSION_CONTROL::DedicatedThread, stackTop, flags, 0);
assert(tid != -1);
PIN_StartProgramProbed();
return 0;
}
/* ===================================================================== */
/* eof */
/* ===================================================================== */