blob: ffae221cec4488007a3fddf1e621b7744cd52deb [file] [log] [blame]
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +00001//===-- msan_interceptors.cc ----------------------------------------------===//
2//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9//
10// This file is a part of MemorySanitizer.
11//
12// Interceptors for standard library functions.
Kostya Serebryany8530e2b2012-12-12 09:54:35 +000013//
14// FIXME: move as many interceptors as possible into
15// sanitizer_common/sanitizer_common_interceptors.h
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +000016//===----------------------------------------------------------------------===//
17
Stephen Hines6d186232014-11-26 17:56:19 -080018#include "interception/interception.h"
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +000019#include "msan.h"
Stephen Hines2d1fdb22014-05-28 23:58:16 -070020#include "msan_chained_origin_depot.h"
21#include "msan_origin.h"
22#include "msan_thread.h"
Stephen Hines86277eb2015-03-23 12:06:32 -070023#include "msan_poisoning.h"
Evgeniy Stepanov9358c582013-02-19 09:19:16 +000024#include "sanitizer_common/sanitizer_platform_limits_posix.h"
Kostya Serebryany65199f12013-01-25 11:46:22 +000025#include "sanitizer_common/sanitizer_allocator.h"
Stephen Hines6a211c52014-07-21 00:49:56 -070026#include "sanitizer_common/sanitizer_allocator_interface.h"
Evgeniy Stepanovcfc29de2013-09-27 11:32:21 +000027#include "sanitizer_common/sanitizer_allocator_internal.h"
Evgeniy Stepanove0a87122013-08-27 11:34:05 +000028#include "sanitizer_common/sanitizer_atomic.h"
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +000029#include "sanitizer_common/sanitizer_common.h"
Evgeniy Stepanov887a5fe2013-01-28 13:52:49 +000030#include "sanitizer_common/sanitizer_stackdepot.h"
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +000031#include "sanitizer_common/sanitizer_libc.h"
Evgeniy Stepanovb9bf7002013-03-19 09:30:52 +000032#include "sanitizer_common/sanitizer_linux.h"
Stephen Hines6a211c52014-07-21 00:49:56 -070033#include "sanitizer_common/sanitizer_tls_get_addr.h"
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +000034
35#include <stdarg.h>
36// ACHTUNG! No other system header includes in this file.
37// Ideally, we should get rid of stdarg.h as well.
38
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +000039using namespace __msan;
40
Evgeniy Stepanove0a87122013-08-27 11:34:05 +000041using __sanitizer::memory_order;
42using __sanitizer::atomic_load;
43using __sanitizer::atomic_store;
44using __sanitizer::atomic_uintptr_t;
45
Stephen Hines86277eb2015-03-23 12:06:32 -070046#if SANITIZER_FREEBSD
47#define __errno_location __error
48#endif
49
Evgeniy Stepanov447ef192013-05-22 12:50:26 +000050// True if this is a nested interceptor.
51static THREADLOCAL int in_interceptor_scope;
52
Stephen Hines2d1fdb22014-05-28 23:58:16 -070053extern "C" int *__errno_location(void);
54
Evgeniy Stepanov447ef192013-05-22 12:50:26 +000055struct InterceptorScope {
56 InterceptorScope() { ++in_interceptor_scope; }
57 ~InterceptorScope() { --in_interceptor_scope; }
58};
59
60bool IsInInterceptorScope() {
61 return in_interceptor_scope;
62}
63
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +000064#define ENSURE_MSAN_INITED() do { \
Alexey Samsonov8028c712012-12-14 11:52:02 +000065 CHECK(!msan_init_is_running); \
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +000066 if (!msan_inited) { \
67 __msan_init(); \
68 } \
69} while (0)
70
Evgeniy Stepanov447ef192013-05-22 12:50:26 +000071// Check that [x, x+n) range is unpoisoned.
Stephen Hines6d186232014-11-26 17:56:19 -080072#define CHECK_UNPOISONED_0(x, n) \
73 do { \
74 sptr offset = __msan_test_shadow(x, n); \
75 if (__msan::IsInSymbolizer()) \
76 break; \
77 if (offset >= 0 && __msan::flags()->report_umrs) { \
78 GET_CALLER_PC_BP_SP; \
79 (void) sp; \
80 ReportUMRInsideAddressRange(__func__, x, n, offset); \
81 __msan::PrintWarningWithOrigin( \
82 pc, bp, __msan_get_origin((const char *)x + offset)); \
83 if (__msan::flags()->halt_on_error) { \
84 Printf("Exiting\n"); \
85 Die(); \
86 } \
87 } \
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +000088 } while (0)
89
Evgeniy Stepanov447ef192013-05-22 12:50:26 +000090// Check that [x, x+n) range is unpoisoned unless we are in a nested
91// interceptor.
Evgeniy Stepanov341b9e62013-06-28 11:02:43 +000092#define CHECK_UNPOISONED(x, n) \
93 do { \
94 if (!IsInInterceptorScope()) CHECK_UNPOISONED_0(x, n); \
95 } while (0);
Evgeniy Stepanov447ef192013-05-22 12:50:26 +000096
Pirama Arumuga Nainar259f7062015-05-06 11:49:53 -070097#define CHECK_UNPOISONED_STRING_OF_LEN(x, len, n) \
98 CHECK_UNPOISONED((x), \
99 common_flags()->strict_string_checks ? (len) + 1 : (n) )
100
101#define CHECK_UNPOISONED_STRING(x, n) \
102 CHECK_UNPOISONED_STRING_OF_LEN((x), internal_strlen(x), (n))
103
Kostya Serebryany6afa1b02012-12-13 06:31:40 +0000104INTERCEPTOR(SIZE_T, fread, void *ptr, SIZE_T size, SIZE_T nmemb, void *file) {
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000105 ENSURE_MSAN_INITED();
Kostya Serebryany6afa1b02012-12-13 06:31:40 +0000106 SIZE_T res = REAL(fread)(ptr, size, nmemb, file);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000107 if (res > 0)
108 __msan_unpoison(ptr, res *size);
109 return res;
110}
111
Stephen Hines86277eb2015-03-23 12:06:32 -0700112#if !SANITIZER_FREEBSD
Kostya Serebryany6afa1b02012-12-13 06:31:40 +0000113INTERCEPTOR(SIZE_T, fread_unlocked, void *ptr, SIZE_T size, SIZE_T nmemb,
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000114 void *file) {
115 ENSURE_MSAN_INITED();
Kostya Serebryany6afa1b02012-12-13 06:31:40 +0000116 SIZE_T res = REAL(fread_unlocked)(ptr, size, nmemb, file);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000117 if (res > 0)
118 __msan_unpoison(ptr, res *size);
119 return res;
120}
Stephen Hines86277eb2015-03-23 12:06:32 -0700121#define MSAN_MAYBE_INTERCEPT_FREAD_UNLOCKED INTERCEPT_FUNCTION(fread_unlocked)
122#else
123#define MSAN_MAYBE_INTERCEPT_FREAD_UNLOCKED
124#endif
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000125
Kostya Serebryany6afa1b02012-12-13 06:31:40 +0000126INTERCEPTOR(SSIZE_T, readlink, const char *path, char *buf, SIZE_T bufsiz) {
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000127 ENSURE_MSAN_INITED();
Pirama Arumuga Nainar259f7062015-05-06 11:49:53 -0700128 CHECK_UNPOISONED_STRING(path, 0)
Kostya Serebryany6afa1b02012-12-13 06:31:40 +0000129 SSIZE_T res = REAL(readlink)(path, buf, bufsiz);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000130 if (res > 0)
131 __msan_unpoison(buf, res);
132 return res;
133}
134
Kostya Serebryany6afa1b02012-12-13 06:31:40 +0000135INTERCEPTOR(void *, memcpy, void *dest, const void *src, SIZE_T n) {
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000136 return __msan_memcpy(dest, src, n);
137}
138
Evgeniy Stepanov353c9962013-07-02 14:49:24 +0000139INTERCEPTOR(void *, mempcpy, void *dest, const void *src, SIZE_T n) {
140 return (char *)__msan_memcpy(dest, src, n) + n;
141}
142
Evgeniy Stepanov5492ff92013-11-01 23:49:48 +0000143INTERCEPTOR(void *, memccpy, void *dest, const void *src, int c, SIZE_T n) {
144 ENSURE_MSAN_INITED();
145 void *res = REAL(memccpy)(dest, src, c, n);
146 CHECK(!res || (res >= dest && res <= (char *)dest + n));
147 SIZE_T sz = res ? (char *)res - (char *)dest : n;
148 CHECK_UNPOISONED(src, sz);
149 __msan_unpoison(dest, sz);
150 return res;
151}
152
Kostya Serebryany6afa1b02012-12-13 06:31:40 +0000153INTERCEPTOR(void *, memmove, void *dest, const void *src, SIZE_T n) {
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000154 return __msan_memmove(dest, src, n);
155}
156
Kostya Serebryany6afa1b02012-12-13 06:31:40 +0000157INTERCEPTOR(void *, memset, void *s, int c, SIZE_T n) {
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000158 return __msan_memset(s, c, n);
159}
160
Evgeniy Stepanovff6c9fb2013-07-04 13:19:41 +0000161INTERCEPTOR(void *, bcopy, const void *src, void *dest, SIZE_T n) {
162 return __msan_memmove(dest, src, n);
163}
164
Kostya Serebryany6afa1b02012-12-13 06:31:40 +0000165INTERCEPTOR(int, posix_memalign, void **memptr, SIZE_T alignment, SIZE_T size) {
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000166 GET_MALLOC_STACK_TRACE;
167 CHECK_EQ(alignment & (alignment - 1), 0);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000168 CHECK_NE(memptr, 0);
Evgeniy Stepanovb6c8e472013-04-23 13:27:36 +0000169 *memptr = MsanReallocate(&stack, 0, size, alignment, false);
170 CHECK_NE(*memptr, 0);
171 __msan_unpoison(memptr, sizeof(*memptr));
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000172 return 0;
173}
174
Stephen Hines86277eb2015-03-23 12:06:32 -0700175#if !SANITIZER_FREEBSD
Evgeniy Stepanov97160a82013-09-02 09:24:53 +0000176INTERCEPTOR(void *, memalign, SIZE_T boundary, SIZE_T size) {
177 GET_MALLOC_STACK_TRACE;
178 CHECK_EQ(boundary & (boundary - 1), 0);
179 void *ptr = MsanReallocate(&stack, 0, size, boundary, false);
180 return ptr;
181}
Stephen Hines86277eb2015-03-23 12:06:32 -0700182#define MSAN_MAYBE_INTERCEPT_MEMALIGN INTERCEPT_FUNCTION(memalign)
183#else
184#define MSAN_MAYBE_INTERCEPT_MEMALIGN
185#endif
Evgeniy Stepanov97160a82013-09-02 09:24:53 +0000186
Stephen Hines6a211c52014-07-21 00:49:56 -0700187INTERCEPTOR(void *, aligned_alloc, SIZE_T boundary, SIZE_T size) {
188 GET_MALLOC_STACK_TRACE;
189 CHECK_EQ(boundary & (boundary - 1), 0);
190 void *ptr = MsanReallocate(&stack, 0, size, boundary, false);
191 return ptr;
192}
193
194INTERCEPTOR(void *, __libc_memalign, SIZE_T boundary, SIZE_T size) {
195 GET_MALLOC_STACK_TRACE;
196 CHECK_EQ(boundary & (boundary - 1), 0);
197 void *ptr = MsanReallocate(&stack, 0, size, boundary, false);
198 DTLS_on_libc_memalign(ptr, size * boundary);
199 return ptr;
200}
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700201
Evgeniy Stepanov97160a82013-09-02 09:24:53 +0000202INTERCEPTOR(void *, valloc, SIZE_T size) {
203 GET_MALLOC_STACK_TRACE;
204 void *ptr = MsanReallocate(&stack, 0, size, GetPageSizeCached(), false);
205 return ptr;
206}
207
Stephen Hines86277eb2015-03-23 12:06:32 -0700208#if !SANITIZER_FREEBSD
Evgeniy Stepanov97160a82013-09-02 09:24:53 +0000209INTERCEPTOR(void *, pvalloc, SIZE_T size) {
210 GET_MALLOC_STACK_TRACE;
211 uptr PageSize = GetPageSizeCached();
212 size = RoundUpTo(size, PageSize);
213 if (size == 0) {
214 // pvalloc(0) should allocate one page.
215 size = PageSize;
216 }
217 void *ptr = MsanReallocate(&stack, 0, size, PageSize, false);
218 return ptr;
219}
Stephen Hines86277eb2015-03-23 12:06:32 -0700220#define MSAN_MAYBE_INTERCEPT_PVALLOC INTERCEPT_FUNCTION(pvalloc)
221#else
222#define MSAN_MAYBE_INTERCEPT_PVALLOC
223#endif
Evgeniy Stepanov97160a82013-09-02 09:24:53 +0000224
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000225INTERCEPTOR(void, free, void *ptr) {
Evgeniy Stepanoveffdc7e2013-09-16 11:03:31 +0000226 GET_MALLOC_STACK_TRACE;
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000227 if (ptr == 0) return;
Evgeniy Stepanoveffdc7e2013-09-16 11:03:31 +0000228 MsanDeallocate(&stack, ptr);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000229}
230
Stephen Hines86277eb2015-03-23 12:06:32 -0700231#if !SANITIZER_FREEBSD
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700232INTERCEPTOR(void, cfree, void *ptr) {
233 GET_MALLOC_STACK_TRACE;
234 if (ptr == 0) return;
235 MsanDeallocate(&stack, ptr);
236}
Stephen Hines86277eb2015-03-23 12:06:32 -0700237#define MSAN_MAYBE_INTERCEPT_CFREE INTERCEPT_FUNCTION(cfree)
238#else
239#define MSAN_MAYBE_INTERCEPT_CFREE
240#endif
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700241
242INTERCEPTOR(uptr, malloc_usable_size, void *ptr) {
Stephen Hines6a211c52014-07-21 00:49:56 -0700243 return __sanitizer_get_allocated_size(ptr);
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700244}
245
Stephen Hines86277eb2015-03-23 12:06:32 -0700246#if !SANITIZER_FREEBSD
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700247// This function actually returns a struct by value, but we can't unpoison a
248// temporary! The following is equivalent on all supported platforms, and we
249// have a test to confirm that.
250INTERCEPTOR(void, mallinfo, __sanitizer_mallinfo *sret) {
251 REAL(memset)(sret, 0, sizeof(*sret));
252 __msan_unpoison(sret, sizeof(*sret));
253}
Stephen Hines86277eb2015-03-23 12:06:32 -0700254#define MSAN_MAYBE_INTERCEPT_MALLINFO INTERCEPT_FUNCTION(mallinfo)
255#else
256#define MSAN_MAYBE_INTERCEPT_MALLINFO
257#endif
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700258
Stephen Hines86277eb2015-03-23 12:06:32 -0700259#if !SANITIZER_FREEBSD
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700260INTERCEPTOR(int, mallopt, int cmd, int value) {
261 return -1;
262}
Stephen Hines86277eb2015-03-23 12:06:32 -0700263#define MSAN_MAYBE_INTERCEPT_MALLOPT INTERCEPT_FUNCTION(mallopt)
264#else
265#define MSAN_MAYBE_INTERCEPT_MALLOPT
266#endif
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700267
Stephen Hines86277eb2015-03-23 12:06:32 -0700268#if !SANITIZER_FREEBSD
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700269INTERCEPTOR(void, malloc_stats, void) {
270 // FIXME: implement, but don't call REAL(malloc_stats)!
271}
Stephen Hines86277eb2015-03-23 12:06:32 -0700272#define MSAN_MAYBE_INTERCEPT_MALLOC_STATS INTERCEPT_FUNCTION(malloc_stats)
273#else
274#define MSAN_MAYBE_INTERCEPT_MALLOC_STATS
275#endif
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700276
Kostya Serebryany6afa1b02012-12-13 06:31:40 +0000277INTERCEPTOR(SIZE_T, strlen, const char *s) {
Stephen Hines86277eb2015-03-23 12:06:32 -0700278 if (msan_init_is_running)
279 return REAL(strlen)(s);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000280 ENSURE_MSAN_INITED();
Kostya Serebryany6afa1b02012-12-13 06:31:40 +0000281 SIZE_T res = REAL(strlen)(s);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000282 CHECK_UNPOISONED(s, res + 1);
283 return res;
284}
285
Kostya Serebryany6afa1b02012-12-13 06:31:40 +0000286INTERCEPTOR(SIZE_T, strnlen, const char *s, SIZE_T n) {
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000287 ENSURE_MSAN_INITED();
Kostya Serebryany6afa1b02012-12-13 06:31:40 +0000288 SIZE_T res = REAL(strnlen)(s, n);
289 SIZE_T scan_size = (res == n) ? res : res + 1;
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000290 CHECK_UNPOISONED(s, scan_size);
291 return res;
292}
293
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000294INTERCEPTOR(char *, strcpy, char *dest, const char *src) { // NOLINT
295 ENSURE_MSAN_INITED();
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700296 GET_STORE_STACK_TRACE;
Kostya Serebryany6afa1b02012-12-13 06:31:40 +0000297 SIZE_T n = REAL(strlen)(src);
Pirama Arumuga Nainar259f7062015-05-06 11:49:53 -0700298 CHECK_UNPOISONED_STRING(src + n, 0);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000299 char *res = REAL(strcpy)(dest, src); // NOLINT
Stephen Hines86277eb2015-03-23 12:06:32 -0700300 CopyShadowAndOrigin(dest, src, n + 1, &stack);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000301 return res;
302}
303
Kostya Serebryany6afa1b02012-12-13 06:31:40 +0000304INTERCEPTOR(char *, strncpy, char *dest, const char *src, SIZE_T n) { // NOLINT
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000305 ENSURE_MSAN_INITED();
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700306 GET_STORE_STACK_TRACE;
Kostya Serebryany6afa1b02012-12-13 06:31:40 +0000307 SIZE_T copy_size = REAL(strnlen)(src, n);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000308 if (copy_size < n)
309 copy_size++; // trailing \0
310 char *res = REAL(strncpy)(dest, src, n); // NOLINT
Stephen Hines86277eb2015-03-23 12:06:32 -0700311 CopyShadowAndOrigin(dest, src, copy_size, &stack);
Stephen Hines6d186232014-11-26 17:56:19 -0800312 __msan_unpoison(dest + copy_size, n - copy_size);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000313 return res;
314}
315
Evgeniy Stepanov4bbbe132013-07-01 15:19:37 +0000316INTERCEPTOR(char *, stpcpy, char *dest, const char *src) { // NOLINT
317 ENSURE_MSAN_INITED();
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700318 GET_STORE_STACK_TRACE;
Evgeniy Stepanov4bbbe132013-07-01 15:19:37 +0000319 SIZE_T n = REAL(strlen)(src);
Pirama Arumuga Nainar259f7062015-05-06 11:49:53 -0700320 CHECK_UNPOISONED_STRING(src + n, 0);
Evgeniy Stepanov4bbbe132013-07-01 15:19:37 +0000321 char *res = REAL(stpcpy)(dest, src); // NOLINT
Stephen Hines86277eb2015-03-23 12:06:32 -0700322 CopyShadowAndOrigin(dest, src, n + 1, &stack);
Evgeniy Stepanov4bbbe132013-07-01 15:19:37 +0000323 return res;
324}
325
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000326INTERCEPTOR(char *, strdup, char *src) {
327 ENSURE_MSAN_INITED();
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700328 GET_STORE_STACK_TRACE;
Stephen Hines86277eb2015-03-23 12:06:32 -0700329 // On FreeBSD strdup() leverages strlen().
330 InterceptorScope interceptor_scope;
Kostya Serebryany6afa1b02012-12-13 06:31:40 +0000331 SIZE_T n = REAL(strlen)(src);
Pirama Arumuga Nainar259f7062015-05-06 11:49:53 -0700332 CHECK_UNPOISONED_STRING(src + n, 0);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000333 char *res = REAL(strdup)(src);
Stephen Hines86277eb2015-03-23 12:06:32 -0700334 CopyShadowAndOrigin(res, src, n + 1, &stack);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000335 return res;
336}
337
Stephen Hines86277eb2015-03-23 12:06:32 -0700338#if !SANITIZER_FREEBSD
Evgeniy Stepanov8aa1ae02013-03-14 11:10:36 +0000339INTERCEPTOR(char *, __strdup, char *src) {
340 ENSURE_MSAN_INITED();
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700341 GET_STORE_STACK_TRACE;
Evgeniy Stepanov8aa1ae02013-03-14 11:10:36 +0000342 SIZE_T n = REAL(strlen)(src);
Pirama Arumuga Nainar259f7062015-05-06 11:49:53 -0700343 CHECK_UNPOISONED_STRING(src + n, 0);
Evgeniy Stepanov8aa1ae02013-03-14 11:10:36 +0000344 char *res = REAL(__strdup)(src);
Stephen Hines86277eb2015-03-23 12:06:32 -0700345 CopyShadowAndOrigin(res, src, n + 1, &stack);
Evgeniy Stepanov8aa1ae02013-03-14 11:10:36 +0000346 return res;
347}
Stephen Hines86277eb2015-03-23 12:06:32 -0700348#define MSAN_MAYBE_INTERCEPT___STRDUP INTERCEPT_FUNCTION(__strdup)
349#else
350#define MSAN_MAYBE_INTERCEPT___STRDUP
351#endif
Evgeniy Stepanov8aa1ae02013-03-14 11:10:36 +0000352
353INTERCEPTOR(char *, strndup, char *src, SIZE_T n) {
354 ENSURE_MSAN_INITED();
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700355 GET_STORE_STACK_TRACE;
Stephen Hines86277eb2015-03-23 12:06:32 -0700356 // On FreeBSD strndup() leverages strnlen().
357 InterceptorScope interceptor_scope;
Evgeniy Stepanov8aa1ae02013-03-14 11:10:36 +0000358 SIZE_T copy_size = REAL(strnlen)(src, n);
359 char *res = REAL(strndup)(src, n);
Stephen Hines86277eb2015-03-23 12:06:32 -0700360 CopyShadowAndOrigin(res, src, copy_size, &stack);
Evgeniy Stepanov8aa1ae02013-03-14 11:10:36 +0000361 __msan_unpoison(res + copy_size, 1); // \0
362 return res;
363}
364
Stephen Hines86277eb2015-03-23 12:06:32 -0700365#if !SANITIZER_FREEBSD
Evgeniy Stepanov8aa1ae02013-03-14 11:10:36 +0000366INTERCEPTOR(char *, __strndup, char *src, SIZE_T n) {
367 ENSURE_MSAN_INITED();
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700368 GET_STORE_STACK_TRACE;
Evgeniy Stepanov8aa1ae02013-03-14 11:10:36 +0000369 SIZE_T copy_size = REAL(strnlen)(src, n);
370 char *res = REAL(__strndup)(src, n);
Stephen Hines86277eb2015-03-23 12:06:32 -0700371 CopyShadowAndOrigin(res, src, copy_size, &stack);
Evgeniy Stepanov8aa1ae02013-03-14 11:10:36 +0000372 __msan_unpoison(res + copy_size, 1); // \0
373 return res;
374}
Stephen Hines86277eb2015-03-23 12:06:32 -0700375#define MSAN_MAYBE_INTERCEPT___STRNDUP INTERCEPT_FUNCTION(__strndup)
376#else
377#define MSAN_MAYBE_INTERCEPT___STRNDUP
378#endif
Evgeniy Stepanov8aa1ae02013-03-14 11:10:36 +0000379
Kostya Serebryany6afa1b02012-12-13 06:31:40 +0000380INTERCEPTOR(char *, gcvt, double number, SIZE_T ndigit, char *buf) {
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000381 ENSURE_MSAN_INITED();
382 char *res = REAL(gcvt)(number, ndigit, buf);
Stephen Hines6d186232014-11-26 17:56:19 -0800383 SIZE_T n = REAL(strlen)(buf);
384 __msan_unpoison(buf, n + 1);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000385 return res;
386}
387
388INTERCEPTOR(char *, strcat, char *dest, const char *src) { // NOLINT
389 ENSURE_MSAN_INITED();
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700390 GET_STORE_STACK_TRACE;
Kostya Serebryany6afa1b02012-12-13 06:31:40 +0000391 SIZE_T src_size = REAL(strlen)(src);
392 SIZE_T dest_size = REAL(strlen)(dest);
Pirama Arumuga Nainar259f7062015-05-06 11:49:53 -0700393 CHECK_UNPOISONED_STRING(src + src_size, 0);
394 CHECK_UNPOISONED_STRING(dest + dest_size, 0);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000395 char *res = REAL(strcat)(dest, src); // NOLINT
Stephen Hines86277eb2015-03-23 12:06:32 -0700396 CopyShadowAndOrigin(dest + dest_size, src, src_size + 1, &stack);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000397 return res;
398}
399
Kostya Serebryany6afa1b02012-12-13 06:31:40 +0000400INTERCEPTOR(char *, strncat, char *dest, const char *src, SIZE_T n) { // NOLINT
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000401 ENSURE_MSAN_INITED();
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700402 GET_STORE_STACK_TRACE;
Kostya Serebryany6afa1b02012-12-13 06:31:40 +0000403 SIZE_T dest_size = REAL(strlen)(dest);
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700404 SIZE_T copy_size = REAL(strnlen)(src, n);
Pirama Arumuga Nainar259f7062015-05-06 11:49:53 -0700405 CHECK_UNPOISONED_STRING(dest + dest_size, 0);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000406 char *res = REAL(strncat)(dest, src, n); // NOLINT
Stephen Hines86277eb2015-03-23 12:06:32 -0700407 CopyShadowAndOrigin(dest + dest_size, src, copy_size, &stack);
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700408 __msan_unpoison(dest + dest_size + copy_size, 1); // \0
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000409 return res;
410}
411
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700412// Hack: always pass nptr and endptr as part of __VA_ARGS_ to avoid having to
413// deal with empty __VA_ARGS__ in the case of INTERCEPTOR_STRTO.
414#define INTERCEPTOR_STRTO_BODY(ret_type, func, ...) \
415 ENSURE_MSAN_INITED(); \
416 ret_type res = REAL(func)(__VA_ARGS__); \
Stephen Hines6d186232014-11-26 17:56:19 -0800417 __msan_unpoison(endptr, sizeof(*endptr)); \
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700418 return res;
419
Stephen Hines86277eb2015-03-23 12:06:32 -0700420#define INTERCEPTOR_STRTO(ret_type, func, char_type) \
421 INTERCEPTOR(ret_type, func, const char_type *nptr, char_type **endptr) { \
422 INTERCEPTOR_STRTO_BODY(ret_type, func, nptr, endptr); \
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000423 }
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000424
Stephen Hines86277eb2015-03-23 12:06:32 -0700425#define INTERCEPTOR_STRTO_BASE(ret_type, func, char_type) \
426 INTERCEPTOR(ret_type, func, const char_type *nptr, char_type **endptr, \
427 int base) { \
428 INTERCEPTOR_STRTO_BODY(ret_type, func, nptr, endptr, base); \
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000429 }
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000430
Stephen Hines86277eb2015-03-23 12:06:32 -0700431#define INTERCEPTOR_STRTO_LOC(ret_type, func, char_type) \
432 INTERCEPTOR(ret_type, func, const char_type *nptr, char_type **endptr, \
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700433 void *loc) { \
Stephen Hines86277eb2015-03-23 12:06:32 -0700434 INTERCEPTOR_STRTO_BODY(ret_type, func, nptr, endptr, loc); \
435 }
436
437#define INTERCEPTOR_STRTO_BASE_LOC(ret_type, func, char_type) \
438 INTERCEPTOR(ret_type, func, const char_type *nptr, char_type **endptr, \
439 int base, void *loc) { \
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700440 INTERCEPTOR_STRTO_BODY(ret_type, func, nptr, endptr, base, loc); \
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000441 }
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000442
Stephen Hines86277eb2015-03-23 12:06:32 -0700443#define INTERCEPTORS_STRTO(ret_type, func, char_type) \
444 INTERCEPTOR_STRTO(ret_type, func, char_type) \
445 INTERCEPTOR_STRTO_LOC(ret_type, func##_l, char_type) \
446 INTERCEPTOR_STRTO_LOC(ret_type, __##func##_l, char_type) \
447 INTERCEPTOR_STRTO_LOC(ret_type, __##func##_internal, char_type)
448
449#define INTERCEPTORS_STRTO_BASE(ret_type, func, char_type) \
450 INTERCEPTOR_STRTO_BASE(ret_type, func, char_type) \
451 INTERCEPTOR_STRTO_BASE_LOC(ret_type, func##_l, char_type) \
452 INTERCEPTOR_STRTO_BASE_LOC(ret_type, __##func##_l, char_type) \
453 INTERCEPTOR_STRTO_BASE_LOC(ret_type, __##func##_internal, char_type)
454
455INTERCEPTORS_STRTO(double, strtod, char) // NOLINT
456INTERCEPTORS_STRTO(float, strtof, char) // NOLINT
457INTERCEPTORS_STRTO(long double, strtold, char) // NOLINT
458INTERCEPTORS_STRTO_BASE(long, strtol, char) // NOLINT
459INTERCEPTORS_STRTO_BASE(long long, strtoll, char) // NOLINT
460INTERCEPTORS_STRTO_BASE(unsigned long, strtoul, char) // NOLINT
461INTERCEPTORS_STRTO_BASE(unsigned long long, strtoull, char) // NOLINT
462
463INTERCEPTORS_STRTO(double, wcstod, wchar_t) // NOLINT
464INTERCEPTORS_STRTO(float, wcstof, wchar_t) // NOLINT
465INTERCEPTORS_STRTO(long double, wcstold, wchar_t) // NOLINT
466INTERCEPTORS_STRTO_BASE(long, wcstol, wchar_t) // NOLINT
467INTERCEPTORS_STRTO_BASE(long long, wcstoll, wchar_t) // NOLINT
468INTERCEPTORS_STRTO_BASE(unsigned long, wcstoul, wchar_t) // NOLINT
469INTERCEPTORS_STRTO_BASE(unsigned long long, wcstoull, wchar_t) // NOLINT
470
471#define INTERCEPT_STRTO(func) \
472 INTERCEPT_FUNCTION(func); \
473 INTERCEPT_FUNCTION(func##_l); \
474 INTERCEPT_FUNCTION(__##func##_l); \
475 INTERCEPT_FUNCTION(__##func##_internal);
476
Evgeniy Stepanove03345b2013-01-17 13:42:17 +0000477
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700478// FIXME: support *wprintf in common format interceptors.
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000479INTERCEPTOR(int, vswprintf, void *str, uptr size, void *format, va_list ap) {
480 ENSURE_MSAN_INITED();
481 int res = REAL(vswprintf)(str, size, format, ap);
Stephen Hines6d186232014-11-26 17:56:19 -0800482 if (res >= 0) {
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000483 __msan_unpoison(str, 4 * (res + 1));
484 }
485 return res;
486}
487
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000488INTERCEPTOR(int, swprintf, void *str, uptr size, void *format, ...) {
489 ENSURE_MSAN_INITED();
490 va_list ap;
491 va_start(ap, format);
492 int res = vswprintf(str, size, format, ap);
493 va_end(ap);
494 return res;
495}
496
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700497INTERCEPTOR(SIZE_T, strxfrm, char *dest, const char *src, SIZE_T n) {
498 ENSURE_MSAN_INITED();
499 CHECK_UNPOISONED(src, REAL(strlen)(src) + 1);
500 SIZE_T res = REAL(strxfrm)(dest, src, n);
501 if (res < n) __msan_unpoison(dest, res + 1);
502 return res;
503}
504
505INTERCEPTOR(SIZE_T, strxfrm_l, char *dest, const char *src, SIZE_T n,
506 void *loc) {
507 ENSURE_MSAN_INITED();
508 CHECK_UNPOISONED(src, REAL(strlen)(src) + 1);
509 SIZE_T res = REAL(strxfrm_l)(dest, src, n, loc);
510 if (res < n) __msan_unpoison(dest, res + 1);
511 return res;
512}
513
514#define INTERCEPTOR_STRFTIME_BODY(char_type, ret_type, func, s, ...) \
515 ENSURE_MSAN_INITED(); \
516 ret_type res = REAL(func)(s, __VA_ARGS__); \
517 if (s) __msan_unpoison(s, sizeof(char_type) * (res + 1)); \
518 return res;
519
Kostya Serebryany6afa1b02012-12-13 06:31:40 +0000520INTERCEPTOR(SIZE_T, strftime, char *s, SIZE_T max, const char *format,
Evgeniy Stepanove4f9f8a2013-11-02 01:01:35 +0000521 __sanitizer_tm *tm) {
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700522 INTERCEPTOR_STRFTIME_BODY(char, SIZE_T, strftime, s, max, format, tm);
523}
524
525INTERCEPTOR(SIZE_T, strftime_l, char *s, SIZE_T max, const char *format,
526 __sanitizer_tm *tm, void *loc) {
527 INTERCEPTOR_STRFTIME_BODY(char, SIZE_T, strftime_l, s, max, format, tm, loc);
528}
529
Stephen Hines86277eb2015-03-23 12:06:32 -0700530#if !SANITIZER_FREEBSD
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700531INTERCEPTOR(SIZE_T, __strftime_l, char *s, SIZE_T max, const char *format,
532 __sanitizer_tm *tm, void *loc) {
533 INTERCEPTOR_STRFTIME_BODY(char, SIZE_T, __strftime_l, s, max, format, tm,
534 loc);
535}
Stephen Hines86277eb2015-03-23 12:06:32 -0700536#define MSAN_MAYBE_INTERCEPT___STRFTIME_L INTERCEPT_FUNCTION(__strftime_l)
537#else
538#define MSAN_MAYBE_INTERCEPT___STRFTIME_L
539#endif
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700540
541INTERCEPTOR(SIZE_T, wcsftime, wchar_t *s, SIZE_T max, const wchar_t *format,
542 __sanitizer_tm *tm) {
543 INTERCEPTOR_STRFTIME_BODY(wchar_t, SIZE_T, wcsftime, s, max, format, tm);
544}
545
546INTERCEPTOR(SIZE_T, wcsftime_l, wchar_t *s, SIZE_T max, const wchar_t *format,
547 __sanitizer_tm *tm, void *loc) {
548 INTERCEPTOR_STRFTIME_BODY(wchar_t, SIZE_T, wcsftime_l, s, max, format, tm,
549 loc);
550}
551
Stephen Hines86277eb2015-03-23 12:06:32 -0700552#if !SANITIZER_FREEBSD
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700553INTERCEPTOR(SIZE_T, __wcsftime_l, wchar_t *s, SIZE_T max, const wchar_t *format,
554 __sanitizer_tm *tm, void *loc) {
555 INTERCEPTOR_STRFTIME_BODY(wchar_t, SIZE_T, __wcsftime_l, s, max, format, tm,
556 loc);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000557}
Stephen Hines86277eb2015-03-23 12:06:32 -0700558#define MSAN_MAYBE_INTERCEPT___WCSFTIME_L INTERCEPT_FUNCTION(__wcsftime_l)
559#else
560#define MSAN_MAYBE_INTERCEPT___WCSFTIME_L
561#endif
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000562
Evgeniy Stepanov80144892013-07-02 13:34:44 +0000563INTERCEPTOR(int, mbtowc, wchar_t *dest, const char *src, SIZE_T n) {
564 ENSURE_MSAN_INITED();
565 int res = REAL(mbtowc)(dest, src, n);
566 if (res != -1 && dest) __msan_unpoison(dest, sizeof(wchar_t));
567 return res;
568}
569
570INTERCEPTOR(int, mbrtowc, wchar_t *dest, const char *src, SIZE_T n, void *ps) {
571 ENSURE_MSAN_INITED();
572 SIZE_T res = REAL(mbrtowc)(dest, src, n, ps);
573 if (res != (SIZE_T)-1 && dest) __msan_unpoison(dest, sizeof(wchar_t));
574 return res;
575}
576
Kostya Serebryany6afa1b02012-12-13 06:31:40 +0000577INTERCEPTOR(SIZE_T, wcslen, const wchar_t *s) {
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000578 ENSURE_MSAN_INITED();
Kostya Serebryany6afa1b02012-12-13 06:31:40 +0000579 SIZE_T res = REAL(wcslen)(s);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000580 CHECK_UNPOISONED(s, sizeof(wchar_t) * (res + 1));
581 return res;
582}
583
584// wchar_t *wcschr(const wchar_t *wcs, wchar_t wc);
585INTERCEPTOR(wchar_t *, wcschr, void *s, wchar_t wc, void *ps) {
586 ENSURE_MSAN_INITED();
587 wchar_t *res = REAL(wcschr)(s, wc, ps);
588 return res;
589}
590
591// wchar_t *wcscpy(wchar_t *dest, const wchar_t *src);
592INTERCEPTOR(wchar_t *, wcscpy, wchar_t *dest, const wchar_t *src) {
593 ENSURE_MSAN_INITED();
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700594 GET_STORE_STACK_TRACE;
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000595 wchar_t *res = REAL(wcscpy)(dest, src);
Stephen Hines86277eb2015-03-23 12:06:32 -0700596 CopyShadowAndOrigin(dest, src, sizeof(wchar_t) * (REAL(wcslen)(src) + 1),
597 &stack);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000598 return res;
599}
600
Kostya Serebryany6afa1b02012-12-13 06:31:40 +0000601// wchar_t *wmemcpy(wchar_t *dest, const wchar_t *src, SIZE_T n);
602INTERCEPTOR(wchar_t *, wmemcpy, wchar_t *dest, const wchar_t *src, SIZE_T n) {
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000603 ENSURE_MSAN_INITED();
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700604 GET_STORE_STACK_TRACE;
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000605 wchar_t *res = REAL(wmemcpy)(dest, src, n);
Stephen Hines86277eb2015-03-23 12:06:32 -0700606 CopyShadowAndOrigin(dest, src, n * sizeof(wchar_t), &stack);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000607 return res;
608}
609
Evgeniy Stepanov353c9962013-07-02 14:49:24 +0000610INTERCEPTOR(wchar_t *, wmempcpy, wchar_t *dest, const wchar_t *src, SIZE_T n) {
611 ENSURE_MSAN_INITED();
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700612 GET_STORE_STACK_TRACE;
Evgeniy Stepanov353c9962013-07-02 14:49:24 +0000613 wchar_t *res = REAL(wmempcpy)(dest, src, n);
Stephen Hines86277eb2015-03-23 12:06:32 -0700614 CopyShadowAndOrigin(dest, src, n * sizeof(wchar_t), &stack);
Evgeniy Stepanov353c9962013-07-02 14:49:24 +0000615 return res;
616}
617
Kostya Serebryany6afa1b02012-12-13 06:31:40 +0000618INTERCEPTOR(wchar_t *, wmemset, wchar_t *s, wchar_t c, SIZE_T n) {
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000619 CHECK(MEM_IS_APP(s));
620 ENSURE_MSAN_INITED();
Stephen Hines86277eb2015-03-23 12:06:32 -0700621 wchar_t *res = REAL(wmemset)(s, c, n);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000622 __msan_unpoison(s, n * sizeof(wchar_t));
623 return res;
624}
625
Kostya Serebryany6afa1b02012-12-13 06:31:40 +0000626INTERCEPTOR(wchar_t *, wmemmove, wchar_t *dest, const wchar_t *src, SIZE_T n) {
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000627 ENSURE_MSAN_INITED();
Stephen Hines2d1fdb22014-05-28 23:58:16 -0700628 GET_STORE_STACK_TRACE;
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000629 wchar_t *res = REAL(wmemmove)(dest, src, n);
Stephen Hines86277eb2015-03-23 12:06:32 -0700630 MoveShadowAndOrigin(dest, src, n * sizeof(wchar_t), &stack);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000631 return res;
632}
633
634INTERCEPTOR(int, wcscmp, const wchar_t *s1, const wchar_t *s2) {
635 ENSURE_MSAN_INITED();
636 int res = REAL(wcscmp)(s1, s2);
637 return res;
638}
639
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000640INTERCEPTOR(int, gettimeofday, void *tv, void *tz) {
641 ENSURE_MSAN_INITED();
642 int res = REAL(gettimeofday)(tv, tz);
643 if (tv)
644 __msan_unpoison(tv, 16);
645 if (tz)
646 __msan_unpoison(tz, 8);
647 return res;
648}
649
650INTERCEPTOR(char *, fcvt, double x, int a, int *b, int *c) {
651 ENSURE_MSAN_INITED();
652 char *res = REAL(fcvt)(x, a, b, c);
Stephen Hines6d186232014-11-26 17:56:19 -0800653 __msan_unpoison(b, sizeof(*b));
654 __msan_unpoison(c, sizeof(*c));
655 if (res) __msan_unpoison(res, REAL(strlen)(res) + 1);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000656 return res;
657}
658
659INTERCEPTOR(char *, getenv, char *name) {
Stephen Hines86277eb2015-03-23 12:06:32 -0700660 if (msan_init_is_running)
661 return REAL(getenv)(name);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000662 ENSURE_MSAN_INITED();
663 char *res = REAL(getenv)(name);
Stephen Hines6d186232014-11-26 17:56:19 -0800664 if (res) __msan_unpoison(res, REAL(strlen)(res) + 1);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000665 return res;
666}
667
Evgeniy Stepanov534e2ba2013-08-01 11:14:14 +0000668extern char **environ;
669
670static void UnpoisonEnviron() {
671 char **envp = environ;
672 for (; *envp; ++envp) {
673 __msan_unpoison(envp, sizeof(*envp));
674 __msan_unpoison(*envp, REAL(strlen)(*envp) + 1);
675 }
676 // Trailing NULL pointer.
677 __msan_unpoison(envp, sizeof(*envp));
678}
679
680INTERCEPTOR(int, setenv, const char *name, const char *value, int overwrite) {
681 ENSURE_MSAN_INITED();
Pirama Arumuga Nainar259f7062015-05-06 11:49:53 -0700682 CHECK_UNPOISONED_STRING(name, 0)
Evgeniy Stepanov534e2ba2013-08-01 11:14:14 +0000683 int res = REAL(setenv)(name, value, overwrite);
684 if (!res) UnpoisonEnviron();
685 return res;
686}
687
688INTERCEPTOR(int, putenv, char *string) {
689 ENSURE_MSAN_INITED();
690 int res = REAL(putenv)(string);
691 if (!res) UnpoisonEnviron();
692 return res;
693}
694
Stephen Hines86277eb2015-03-23 12:06:32 -0700695#if !SANITIZER_FREEBSD
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000696INTERCEPTOR(int, __fxstat, int magic, int fd, void *buf) {
697 ENSURE_MSAN_INITED();
698 int res = REAL(__fxstat)(magic, fd, buf);
699 if (!res)
Evgeniy Stepanov9358c582013-02-19 09:19:16 +0000700 __msan_unpoison(buf, __sanitizer::struct_stat_sz);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000701 return res;
702}
Stephen Hines86277eb2015-03-23 12:06:32 -0700703#define MSAN_MAYBE_INTERCEPT___FXSTAT INTERCEPT_FUNCTION(__fxstat)
704#else
705#define MSAN_MAYBE_INTERCEPT___FXSTAT
706#endif
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000707
Stephen Hines86277eb2015-03-23 12:06:32 -0700708#if !SANITIZER_FREEBSD
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000709INTERCEPTOR(int, __fxstat64, int magic, int fd, void *buf) {
710 ENSURE_MSAN_INITED();
711 int res = REAL(__fxstat64)(magic, fd, buf);
712 if (!res)
Evgeniy Stepanov9358c582013-02-19 09:19:16 +0000713 __msan_unpoison(buf, __sanitizer::struct_stat64_sz);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000714 return res;
715}
Stephen Hines86277eb2015-03-23 12:06:32 -0700716#define MSAN_MAYBE_INTERCEPT___FXSTAT64 INTERCEPT_FUNCTION(__fxstat64)
717#else
718#define MSAN_MAYBE_INTERCEPT___FXSTAT64
719#endif
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000720
Stephen Hines86277eb2015-03-23 12:06:32 -0700721#if SANITIZER_FREEBSD
722INTERCEPTOR(int, fstatat, int fd, char *pathname, void *buf, int flags) {
723 ENSURE_MSAN_INITED();
724 int res = REAL(fstatat)(fd, pathname, buf, flags);
725 if (!res) __msan_unpoison(buf, __sanitizer::struct_stat_sz);
726 return res;
727}
728# define MSAN_INTERCEPT_FSTATAT INTERCEPT_FUNCTION(fstatat)
729#else
Evgeniy Stepanovbb229422013-09-09 13:40:41 +0000730INTERCEPTOR(int, __fxstatat, int magic, int fd, char *pathname, void *buf,
731 int flags) {
732 ENSURE_MSAN_INITED();
733 int res = REAL(__fxstatat)(magic, fd, pathname, buf, flags);
734 if (!res) __msan_unpoison(buf, __sanitizer::struct_stat_sz);
735 return res;
736}
Stephen Hines86277eb2015-03-23 12:06:32 -0700737# define MSAN_INTERCEPT_FSTATAT INTERCEPT_FUNCTION(__fxstatat)
738#endif
Evgeniy Stepanovbb229422013-09-09 13:40:41 +0000739
Stephen Hines86277eb2015-03-23 12:06:32 -0700740#if !SANITIZER_FREEBSD
Evgeniy Stepanovbb229422013-09-09 13:40:41 +0000741INTERCEPTOR(int, __fxstatat64, int magic, int fd, char *pathname, void *buf,
742 int flags) {
743 ENSURE_MSAN_INITED();
744 int res = REAL(__fxstatat64)(magic, fd, pathname, buf, flags);
745 if (!res) __msan_unpoison(buf, __sanitizer::struct_stat64_sz);
746 return res;
747}
Stephen Hines86277eb2015-03-23 12:06:32 -0700748#define MSAN_MAYBE_INTERCEPT___FXSTATAT64 INTERCEPT_FUNCTION(__fxstatat64)
749#else
750#define MSAN_MAYBE_INTERCEPT___FXSTATAT64
751#endif
Evgeniy Stepanovbb229422013-09-09 13:40:41 +0000752
Stephen Hines86277eb2015-03-23 12:06:32 -0700753#if SANITIZER_FREEBSD
754INTERCEPTOR(int, stat, char *path, void *buf) {
755 ENSURE_MSAN_INITED();
756 int res = REAL(stat)(path, buf);
757 if (!res)
758 __msan_unpoison(buf, __sanitizer::struct_stat_sz);
759 return res;
760}
761# define MSAN_INTERCEPT_STAT INTERCEPT_FUNCTION(stat)
762#else
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000763INTERCEPTOR(int, __xstat, int magic, char *path, void *buf) {
764 ENSURE_MSAN_INITED();
765 int res = REAL(__xstat)(magic, path, buf);
766 if (!res)
Evgeniy Stepanov9358c582013-02-19 09:19:16 +0000767 __msan_unpoison(buf, __sanitizer::struct_stat_sz);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000768 return res;
769}
Stephen Hines86277eb2015-03-23 12:06:32 -0700770# define MSAN_INTERCEPT_STAT INTERCEPT_FUNCTION(__xstat)
771#endif
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000772
Stephen Hines86277eb2015-03-23 12:06:32 -0700773#if !SANITIZER_FREEBSD
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000774INTERCEPTOR(int, __xstat64, int magic, char *path, void *buf) {
775 ENSURE_MSAN_INITED();
776 int res = REAL(__xstat64)(magic, path, buf);
777 if (!res)
Evgeniy Stepanov9358c582013-02-19 09:19:16 +0000778 __msan_unpoison(buf, __sanitizer::struct_stat64_sz);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000779 return res;
780}
Stephen Hines86277eb2015-03-23 12:06:32 -0700781#define MSAN_MAYBE_INTERCEPT___XSTAT64 INTERCEPT_FUNCTION(__xstat64)
782#else
783#define MSAN_MAYBE_INTERCEPT___XSTAT64
784#endif
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000785
Stephen Hines86277eb2015-03-23 12:06:32 -0700786#if !SANITIZER_FREEBSD
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000787INTERCEPTOR(int, __lxstat, int magic, char *path, void *buf) {
788 ENSURE_MSAN_INITED();
789 int res = REAL(__lxstat)(magic, path, buf);
790 if (!res)
Evgeniy Stepanov9358c582013-02-19 09:19:16 +0000791 __msan_unpoison(buf, __sanitizer::struct_stat_sz);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000792 return res;
793}
Stephen Hines86277eb2015-03-23 12:06:32 -0700794#define MSAN_MAYBE_INTERCEPT___LXSTAT INTERCEPT_FUNCTION(__lxstat)
795#else
796#define MSAN_MAYBE_INTERCEPT___LXSTAT
797#endif
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000798
Stephen Hines86277eb2015-03-23 12:06:32 -0700799#if !SANITIZER_FREEBSD
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000800INTERCEPTOR(int, __lxstat64, int magic, char *path, void *buf) {
801 ENSURE_MSAN_INITED();
802 int res = REAL(__lxstat64)(magic, path, buf);
803 if (!res)
Evgeniy Stepanov9358c582013-02-19 09:19:16 +0000804 __msan_unpoison(buf, __sanitizer::struct_stat64_sz);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000805 return res;
806}
Stephen Hines86277eb2015-03-23 12:06:32 -0700807#define MSAN_MAYBE_INTERCEPT___LXSTAT64 INTERCEPT_FUNCTION(__lxstat64)
808#else
809#define MSAN_MAYBE_INTERCEPT___LXSTAT64
810#endif
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000811
812INTERCEPTOR(int, pipe, int pipefd[2]) {
813 if (msan_init_is_running)
814 return REAL(pipe)(pipefd);
815 ENSURE_MSAN_INITED();
816 int res = REAL(pipe)(pipefd);
817 if (!res)
818 __msan_unpoison(pipefd, sizeof(int[2]));
819 return res;
820}
821
Evgeniy Stepanov134fe8a2013-04-08 13:45:12 +0000822INTERCEPTOR(int, pipe2, int pipefd[2], int flags) {
823 ENSURE_MSAN_INITED();
824 int res = REAL(pipe2)(pipefd, flags);
825 if (!res)
826 __msan_unpoison(pipefd, sizeof(int[2]));
827 return res;
828}
829
830INTERCEPTOR(int, socketpair, int domain, int type, int protocol, int sv[2]) {
831 ENSURE_MSAN_INITED();
832 int res = REAL(socketpair)(domain, type, protocol, sv);
833 if (!res)
834 __msan_unpoison(sv, sizeof(int[2]));
835 return res;
836}
837
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000838INTERCEPTOR(char *, fgets, char *s, int size, void *stream) {
839 ENSURE_MSAN_INITED();
840 char *res = REAL(fgets)(s, size, stream);
841 if (res)
842 __msan_unpoison(s, REAL(strlen)(s) + 1);
843 return res;
844}
845
Stephen Hines86277eb2015-03-23 12:06:32 -0700846#if !SANITIZER_FREEBSD
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000847INTERCEPTOR(char *, fgets_unlocked, char *s, int size, void *stream) {
848 ENSURE_MSAN_INITED();
849 char *res = REAL(fgets_unlocked)(s, size, stream);
850 if (res)
851 __msan_unpoison(s, REAL(strlen)(s) + 1);
852 return res;
853}
Stephen Hines86277eb2015-03-23 12:06:32 -0700854#define MSAN_MAYBE_INTERCEPT_FGETS_UNLOCKED INTERCEPT_FUNCTION(fgets_unlocked)
855#else
856#define MSAN_MAYBE_INTERCEPT_FGETS_UNLOCKED
857#endif
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000858
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000859INTERCEPTOR(int, getrlimit, int resource, void *rlim) {
860 if (msan_init_is_running)
861 return REAL(getrlimit)(resource, rlim);
862 ENSURE_MSAN_INITED();
863 int res = REAL(getrlimit)(resource, rlim);
864 if (!res)
Evgeniy Stepanov9358c582013-02-19 09:19:16 +0000865 __msan_unpoison(rlim, __sanitizer::struct_rlimit_sz);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000866 return res;
867}
868
Stephen Hines86277eb2015-03-23 12:06:32 -0700869#if !SANITIZER_FREEBSD
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000870INTERCEPTOR(int, getrlimit64, int resource, void *rlim) {
871 if (msan_init_is_running)
872 return REAL(getrlimit64)(resource, rlim);
873 ENSURE_MSAN_INITED();
874 int res = REAL(getrlimit64)(resource, rlim);
875 if (!res)
Evgeniy Stepanov9358c582013-02-19 09:19:16 +0000876 __msan_unpoison(rlim, __sanitizer::struct_rlimit64_sz);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000877 return res;
878}
Stephen Hines86277eb2015-03-23 12:06:32 -0700879#define MSAN_MAYBE_INTERCEPT_GETRLIMIT64 INTERCEPT_FUNCTION(getrlimit64)
880#else
881#define MSAN_MAYBE_INTERCEPT_GETRLIMIT64
882#endif
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000883
Stephen Hines86277eb2015-03-23 12:06:32 -0700884#if SANITIZER_FREEBSD
885// FreeBSD's <sys/utsname.h> define uname() as
886// static __inline int uname(struct utsname *name) {
887// return __xuname(SYS_NMLN, (void*)name);
888// }
889INTERCEPTOR(int, __xuname, int size, void *utsname) {
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000890 ENSURE_MSAN_INITED();
Stephen Hines86277eb2015-03-23 12:06:32 -0700891 int res = REAL(__xuname)(size, utsname);
892 if (!res)
Evgeniy Stepanov9358c582013-02-19 09:19:16 +0000893 __msan_unpoison(utsname, __sanitizer::struct_utsname_sz);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000894 return res;
895}
Stephen Hines86277eb2015-03-23 12:06:32 -0700896#define MSAN_INTERCEPT_UNAME INTERCEPT_FUNCTION(__xuname)
897#else
898INTERCEPTOR(int, uname, struct utsname *utsname) {
899 ENSURE_MSAN_INITED();
900 int res = REAL(uname)(utsname);
901 if (!res)
902 __msan_unpoison(utsname, __sanitizer::struct_utsname_sz);
903 return res;
904}
905#define MSAN_INTERCEPT_UNAME INTERCEPT_FUNCTION(uname)
906#endif
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000907
Evgeniy Stepanov95d05882013-01-23 10:43:38 +0000908INTERCEPTOR(int, gethostname, char *name, SIZE_T len) {
909 ENSURE_MSAN_INITED();
910 int res = REAL(gethostname)(name, len);
911 if (!res) {
912 SIZE_T real_len = REAL(strnlen)(name, len);
913 if (real_len < len)
914 ++real_len;
915 __msan_unpoison(name, real_len);
916 }
917 return res;
918}
919
Stephen Hines86277eb2015-03-23 12:06:32 -0700920#if !SANITIZER_FREEBSD
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000921INTERCEPTOR(int, epoll_wait, int epfd, void *events, int maxevents,
922 int timeout) {
923 ENSURE_MSAN_INITED();
924 int res = REAL(epoll_wait)(epfd, events, maxevents, timeout);
925 if (res > 0) {
Evgeniy Stepanov9358c582013-02-19 09:19:16 +0000926 __msan_unpoison(events, __sanitizer::struct_epoll_event_sz * res);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000927 }
928 return res;
929}
Stephen Hines86277eb2015-03-23 12:06:32 -0700930#define MSAN_MAYBE_INTERCEPT_EPOLL_WAIT INTERCEPT_FUNCTION(epoll_wait)
931#else
932#define MSAN_MAYBE_INTERCEPT_EPOLL_WAIT
933#endif
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000934
Stephen Hines86277eb2015-03-23 12:06:32 -0700935#if !SANITIZER_FREEBSD
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000936INTERCEPTOR(int, epoll_pwait, int epfd, void *events, int maxevents,
937 int timeout, void *sigmask) {
938 ENSURE_MSAN_INITED();
939 int res = REAL(epoll_pwait)(epfd, events, maxevents, timeout, sigmask);
940 if (res > 0) {
Evgeniy Stepanov9358c582013-02-19 09:19:16 +0000941 __msan_unpoison(events, __sanitizer::struct_epoll_event_sz * res);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000942 }
943 return res;
944}
Stephen Hines86277eb2015-03-23 12:06:32 -0700945#define MSAN_MAYBE_INTERCEPT_EPOLL_PWAIT INTERCEPT_FUNCTION(epoll_pwait)
946#else
947#define MSAN_MAYBE_INTERCEPT_EPOLL_PWAIT
948#endif
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000949
Kostya Serebryany6afa1b02012-12-13 06:31:40 +0000950INTERCEPTOR(SSIZE_T, recv, int fd, void *buf, SIZE_T len, int flags) {
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000951 ENSURE_MSAN_INITED();
Kostya Serebryany6afa1b02012-12-13 06:31:40 +0000952 SSIZE_T res = REAL(recv)(fd, buf, len, flags);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000953 if (res > 0)
954 __msan_unpoison(buf, res);
955 return res;
956}
957
Kostya Serebryany6afa1b02012-12-13 06:31:40 +0000958INTERCEPTOR(SSIZE_T, recvfrom, int fd, void *buf, SIZE_T len, int flags,
Evgeniy Stepanov9666d892013-05-29 11:30:00 +0000959 void *srcaddr, int *addrlen) {
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000960 ENSURE_MSAN_INITED();
Evgeniy Stepanov7b719df2012-12-25 16:51:57 +0000961 SIZE_T srcaddr_sz;
Evgeniy Stepanov9666d892013-05-29 11:30:00 +0000962 if (srcaddr) srcaddr_sz = *addrlen;
Kostya Serebryany6afa1b02012-12-13 06:31:40 +0000963 SSIZE_T res = REAL(recvfrom)(fd, buf, len, flags, srcaddr, addrlen);
Evgeniy Stepanov7b719df2012-12-25 16:51:57 +0000964 if (res > 0) {
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000965 __msan_unpoison(buf, res);
Evgeniy Stepanov7b719df2012-12-25 16:51:57 +0000966 if (srcaddr) {
Evgeniy Stepanov9666d892013-05-29 11:30:00 +0000967 SIZE_T sz = *addrlen;
Stephen Hines86277eb2015-03-23 12:06:32 -0700968 __msan_unpoison(srcaddr, Min(sz, srcaddr_sz));
Evgeniy Stepanov7b719df2012-12-25 16:51:57 +0000969 }
970 }
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000971 return res;
972}
973
Kostya Serebryany6afa1b02012-12-13 06:31:40 +0000974INTERCEPTOR(void *, calloc, SIZE_T nmemb, SIZE_T size) {
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000975 GET_MALLOC_STACK_TRACE;
Stephen Hines86277eb2015-03-23 12:06:32 -0700976 if (UNLIKELY(!msan_inited)) {
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000977 // Hack: dlsym calls calloc before REAL(calloc) is retrieved from dlsym.
Kostya Serebryany6afa1b02012-12-13 06:31:40 +0000978 const SIZE_T kCallocPoolSize = 1024;
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000979 static uptr calloc_memory_for_dlsym[kCallocPoolSize];
Kostya Serebryany6afa1b02012-12-13 06:31:40 +0000980 static SIZE_T allocated;
981 SIZE_T size_in_words = ((nmemb * size) + kWordSize - 1) / kWordSize;
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000982 void *mem = (void*)&calloc_memory_for_dlsym[allocated];
983 allocated += size_in_words;
984 CHECK(allocated < kCallocPoolSize);
985 return mem;
986 }
Stephen Hines86277eb2015-03-23 12:06:32 -0700987 return MsanCalloc(&stack, nmemb, size);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000988}
989
Kostya Serebryany6afa1b02012-12-13 06:31:40 +0000990INTERCEPTOR(void *, realloc, void *ptr, SIZE_T size) {
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000991 GET_MALLOC_STACK_TRACE;
992 return MsanReallocate(&stack, ptr, size, sizeof(u64), false);
993}
994
Kostya Serebryany6afa1b02012-12-13 06:31:40 +0000995INTERCEPTOR(void *, malloc, SIZE_T size) {
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +0000996 GET_MALLOC_STACK_TRACE;
997 return MsanReallocate(&stack, 0, size, sizeof(u64), false);
998}
999
Stephen Hines86277eb2015-03-23 12:06:32 -07001000void __msan_allocated_memory(const void *data, uptr size) {
Evgeniy Stepanov887a5fe2013-01-28 13:52:49 +00001001 GET_MALLOC_STACK_TRACE;
Stephen Hines86277eb2015-03-23 12:06:32 -07001002 if (flags()->poison_in_malloc) {
1003 stack.tag = STACK_TRACE_TAG_POISON;
1004 PoisonMemory(data, size, &stack);
Evgeniy Stepanov887a5fe2013-01-28 13:52:49 +00001005 }
1006}
1007
Kostya Serebryany6afa1b02012-12-13 06:31:40 +00001008INTERCEPTOR(void *, mmap, void *addr, SIZE_T length, int prot, int flags,
1009 int fd, OFF_T offset) {
Stephen Hines86277eb2015-03-23 12:06:32 -07001010 if (msan_init_is_running)
1011 return REAL(mmap)(addr, length, prot, flags, fd, offset);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +00001012 ENSURE_MSAN_INITED();
Stephen Hines2d1fdb22014-05-28 23:58:16 -07001013 if (addr && !MEM_IS_APP(addr)) {
1014 if (flags & map_fixed) {
1015 *__errno_location() = errno_EINVAL;
1016 return (void *)-1;
1017 } else {
1018 addr = 0;
1019 }
1020 }
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +00001021 void *res = REAL(mmap)(addr, length, prot, flags, fd, offset);
1022 if (res != (void*)-1)
1023 __msan_unpoison(res, RoundUpTo(length, GetPageSize()));
1024 return res;
1025}
1026
Stephen Hines86277eb2015-03-23 12:06:32 -07001027#if !SANITIZER_FREEBSD
Kostya Serebryany6afa1b02012-12-13 06:31:40 +00001028INTERCEPTOR(void *, mmap64, void *addr, SIZE_T length, int prot, int flags,
1029 int fd, OFF64_T offset) {
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +00001030 ENSURE_MSAN_INITED();
Stephen Hines2d1fdb22014-05-28 23:58:16 -07001031 if (addr && !MEM_IS_APP(addr)) {
1032 if (flags & map_fixed) {
1033 *__errno_location() = errno_EINVAL;
1034 return (void *)-1;
1035 } else {
1036 addr = 0;
1037 }
1038 }
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +00001039 void *res = REAL(mmap64)(addr, length, prot, flags, fd, offset);
1040 if (res != (void*)-1)
1041 __msan_unpoison(res, RoundUpTo(length, GetPageSize()));
1042 return res;
1043}
Stephen Hines86277eb2015-03-23 12:06:32 -07001044#define MSAN_MAYBE_INTERCEPT_MMAP64 INTERCEPT_FUNCTION(mmap64)
1045#else
1046#define MSAN_MAYBE_INTERCEPT_MMAP64
1047#endif
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +00001048
Evgeniy Stepanove03345b2013-01-17 13:42:17 +00001049struct dlinfo {
1050 char *dli_fname;
1051 void *dli_fbase;
1052 char *dli_sname;
1053 void *dli_saddr;
1054};
1055
1056INTERCEPTOR(int, dladdr, void *addr, dlinfo *info) {
1057 ENSURE_MSAN_INITED();
1058 int res = REAL(dladdr)(addr, info);
1059 if (res != 0) {
1060 __msan_unpoison(info, sizeof(*info));
1061 if (info->dli_fname)
1062 __msan_unpoison(info->dli_fname, REAL(strlen)(info->dli_fname) + 1);
1063 if (info->dli_sname)
1064 __msan_unpoison(info->dli_sname, REAL(strlen)(info->dli_sname) + 1);
1065 }
1066 return res;
1067}
1068
Stephen Hines2d1fdb22014-05-28 23:58:16 -07001069INTERCEPTOR(char *, dlerror, int fake) {
Evgeniy Stepanovae7db432013-10-31 16:58:44 +00001070 ENSURE_MSAN_INITED();
Stephen Hines2d1fdb22014-05-28 23:58:16 -07001071 char *res = REAL(dlerror)(fake);
Evgeniy Stepanovae7db432013-10-31 16:58:44 +00001072 if (res != 0) __msan_unpoison(res, REAL(strlen)(res) + 1);
1073 return res;
1074}
1075
Evgeniy Stepanov1aad6b52013-05-17 12:51:13 +00001076typedef int (*dl_iterate_phdr_cb)(__sanitizer_dl_phdr_info *info, SIZE_T size,
1077 void *data);
Evgeniy Stepanov2bba4ef2013-05-16 13:00:25 +00001078struct dl_iterate_phdr_data {
1079 dl_iterate_phdr_cb callback;
1080 void *data;
1081};
1082
Evgeniy Stepanov1aad6b52013-05-17 12:51:13 +00001083static int msan_dl_iterate_phdr_cb(__sanitizer_dl_phdr_info *info, SIZE_T size,
1084 void *data) {
1085 if (info) {
Evgeniy Stepanov2bba4ef2013-05-16 13:00:25 +00001086 __msan_unpoison(info, size);
Evgeniy Stepanov1aad6b52013-05-17 12:51:13 +00001087 if (info->dlpi_name)
1088 __msan_unpoison(info->dlpi_name, REAL(strlen)(info->dlpi_name) + 1);
1089 }
Evgeniy Stepanov2bba4ef2013-05-16 13:00:25 +00001090 dl_iterate_phdr_data *cbdata = (dl_iterate_phdr_data *)data;
Alexey Samsonovc2918bf2013-06-27 07:50:56 +00001091 UnpoisonParam(3);
Stephen Hines6d186232014-11-26 17:56:19 -08001092 return cbdata->callback(info, size, cbdata->data);
Evgeniy Stepanov2bba4ef2013-05-16 13:00:25 +00001093}
1094
1095INTERCEPTOR(int, dl_iterate_phdr, dl_iterate_phdr_cb callback, void *data) {
1096 ENSURE_MSAN_INITED();
Evgeniy Stepanov2bba4ef2013-05-16 13:00:25 +00001097 dl_iterate_phdr_data cbdata;
1098 cbdata.callback = callback;
1099 cbdata.data = data;
1100 int res = REAL(dl_iterate_phdr)(msan_dl_iterate_phdr_cb, (void *)&cbdata);
Evgeniy Stepanov2bba4ef2013-05-16 13:00:25 +00001101 return res;
1102}
1103
Evgeniy Stepanove03345b2013-01-17 13:42:17 +00001104INTERCEPTOR(int, getrusage, int who, void *usage) {
1105 ENSURE_MSAN_INITED();
1106 int res = REAL(getrusage)(who, usage);
1107 if (res == 0) {
Evgeniy Stepanov9358c582013-02-19 09:19:16 +00001108 __msan_unpoison(usage, __sanitizer::struct_rusage_sz);
Evgeniy Stepanove03345b2013-01-17 13:42:17 +00001109 }
1110 return res;
1111}
1112
Stephen Hines2d1fdb22014-05-28 23:58:16 -07001113class SignalHandlerScope {
1114 public:
1115 SignalHandlerScope() {
1116 if (MsanThread *t = GetCurrentThread())
1117 t->EnterSignalHandler();
1118 }
1119 ~SignalHandlerScope() {
1120 if (MsanThread *t = GetCurrentThread())
1121 t->LeaveSignalHandler();
1122 }
1123};
1124
Evgeniy Stepanove0a87122013-08-27 11:34:05 +00001125// sigactions_mu guarantees atomicity of sigaction() and signal() calls.
1126// Access to sigactions[] is gone with relaxed atomics to avoid data race with
1127// the signal handler.
Evgeniy Stepanov06658ea2013-04-04 08:22:52 +00001128const int kMaxSignals = 1024;
Evgeniy Stepanove0a87122013-08-27 11:34:05 +00001129static atomic_uintptr_t sigactions[kMaxSignals];
Evgeniy Stepanov06658ea2013-04-04 08:22:52 +00001130static StaticSpinMutex sigactions_mu;
1131
1132static void SignalHandler(int signo) {
Stephen Hines2d1fdb22014-05-28 23:58:16 -07001133 SignalHandlerScope signal_handler_scope;
Evgeniy Stepanov0e38a672013-08-27 14:08:15 +00001134 ScopedThreadLocalStateBackup stlsb;
Evgeniy Stepanov91659d52013-08-27 12:59:39 +00001135 UnpoisonParam(1);
1136
Kostya Serebryanya27bdf72013-04-05 14:40:25 +00001137 typedef void (*signal_cb)(int x);
Evgeniy Stepanove0a87122013-08-27 11:34:05 +00001138 signal_cb cb =
1139 (signal_cb)atomic_load(&sigactions[signo], memory_order_relaxed);
Stephen Hines6d186232014-11-26 17:56:19 -08001140 cb(signo);
Evgeniy Stepanov06658ea2013-04-04 08:22:52 +00001141}
1142
1143static void SignalAction(int signo, void *si, void *uc) {
Stephen Hines2d1fdb22014-05-28 23:58:16 -07001144 SignalHandlerScope signal_handler_scope;
Evgeniy Stepanov0e38a672013-08-27 14:08:15 +00001145 ScopedThreadLocalStateBackup stlsb;
Alexey Samsonovc2918bf2013-06-27 07:50:56 +00001146 UnpoisonParam(3);
Evgeniy Stepanovb32d1bf2013-08-27 11:10:04 +00001147 __msan_unpoison(si, sizeof(__sanitizer_sigaction));
Evgeniy Stepanov07277022013-04-04 09:03:56 +00001148 __msan_unpoison(uc, __sanitizer::ucontext_t_sz);
Evgeniy Stepanov06658ea2013-04-04 08:22:52 +00001149
1150 typedef void (*sigaction_cb)(int, void *, void *);
Evgeniy Stepanove0a87122013-08-27 11:34:05 +00001151 sigaction_cb cb =
1152 (sigaction_cb)atomic_load(&sigactions[signo], memory_order_relaxed);
Stephen Hines6d186232014-11-26 17:56:19 -08001153 cb(signo, si, uc);
Evgeniy Stepanov06658ea2013-04-04 08:22:52 +00001154}
1155
1156INTERCEPTOR(int, sigaction, int signo, const __sanitizer_sigaction *act,
1157 __sanitizer_sigaction *oldact) {
Evgeniy Stepanove4bdda52013-04-01 14:47:21 +00001158 ENSURE_MSAN_INITED();
Kostya Serebryany583025d2013-04-04 06:52:40 +00001159 // FIXME: check that *act is unpoisoned.
Evgeniy Stepanove4bdda52013-04-01 14:47:21 +00001160 // That requires intercepting all of sigemptyset, sigfillset, etc.
Evgeniy Stepanova213ab62013-04-05 11:59:16 +00001161 int res;
1162 if (flags()->wrap_signals) {
1163 SpinMutexLock lock(&sigactions_mu);
1164 CHECK_LT(signo, kMaxSignals);
Evgeniy Stepanove0a87122013-08-27 11:34:05 +00001165 uptr old_cb = atomic_load(&sigactions[signo], memory_order_relaxed);
Evgeniy Stepanova213ab62013-04-05 11:59:16 +00001166 __sanitizer_sigaction new_act;
1167 __sanitizer_sigaction *pnew_act = act ? &new_act : 0;
1168 if (act) {
Stephen Hines6d186232014-11-26 17:56:19 -08001169 REAL(memcpy)(pnew_act, act, sizeof(__sanitizer_sigaction));
Stephen Hines2d1fdb22014-05-28 23:58:16 -07001170 uptr cb = (uptr)pnew_act->sigaction;
Evgeniy Stepanovb32d1bf2013-08-27 11:10:04 +00001171 uptr new_cb = (pnew_act->sa_flags & __sanitizer::sa_siginfo)
1172 ? (uptr)SignalAction
1173 : (uptr)SignalHandler;
Evgeniy Stepanova213ab62013-04-05 11:59:16 +00001174 if (cb != __sanitizer::sig_ign && cb != __sanitizer::sig_dfl) {
Evgeniy Stepanove0a87122013-08-27 11:34:05 +00001175 atomic_store(&sigactions[signo], cb, memory_order_relaxed);
Stephen Hines2d1fdb22014-05-28 23:58:16 -07001176 pnew_act->sigaction = (void (*)(int, void *, void *))new_cb;
Evgeniy Stepanova213ab62013-04-05 11:59:16 +00001177 }
Evgeniy Stepanov06658ea2013-04-04 08:22:52 +00001178 }
Evgeniy Stepanova213ab62013-04-05 11:59:16 +00001179 res = REAL(sigaction)(signo, pnew_act, oldact);
1180 if (res == 0 && oldact) {
Stephen Hines2d1fdb22014-05-28 23:58:16 -07001181 uptr cb = (uptr)oldact->sigaction;
Evgeniy Stepanovcd3049d2013-04-05 12:58:07 +00001182 if (cb != __sanitizer::sig_ign && cb != __sanitizer::sig_dfl) {
Stephen Hines2d1fdb22014-05-28 23:58:16 -07001183 oldact->sigaction = (void (*)(int, void *, void *))old_cb;
Evgeniy Stepanovcd3049d2013-04-05 12:58:07 +00001184 }
Evgeniy Stepanova213ab62013-04-05 11:59:16 +00001185 }
1186 } else {
1187 res = REAL(sigaction)(signo, act, oldact);
Evgeniy Stepanov06658ea2013-04-04 08:22:52 +00001188 }
Evgeniy Stepanova213ab62013-04-05 11:59:16 +00001189
Evgeniy Stepanov06658ea2013-04-04 08:22:52 +00001190 if (res == 0 && oldact) {
Evgeniy Stepanovb32d1bf2013-08-27 11:10:04 +00001191 __msan_unpoison(oldact, sizeof(__sanitizer_sigaction));
Evgeniy Stepanove4bdda52013-04-01 14:47:21 +00001192 }
1193 return res;
1194}
1195
Evgeniy Stepanov06658ea2013-04-04 08:22:52 +00001196INTERCEPTOR(int, signal, int signo, uptr cb) {
1197 ENSURE_MSAN_INITED();
Evgeniy Stepanova213ab62013-04-05 11:59:16 +00001198 if (flags()->wrap_signals) {
1199 CHECK_LT(signo, kMaxSignals);
1200 SpinMutexLock lock(&sigactions_mu);
1201 if (cb != __sanitizer::sig_ign && cb != __sanitizer::sig_dfl) {
Evgeniy Stepanove0a87122013-08-27 11:34:05 +00001202 atomic_store(&sigactions[signo], cb, memory_order_relaxed);
Evgeniy Stepanova213ab62013-04-05 11:59:16 +00001203 cb = (uptr) SignalHandler;
1204 }
1205 return REAL(signal)(signo, cb);
1206 } else {
1207 return REAL(signal)(signo, cb);
Evgeniy Stepanov06658ea2013-04-04 08:22:52 +00001208 }
Evgeniy Stepanov06658ea2013-04-04 08:22:52 +00001209}
1210
Evgeniy Stepanov10fd3222013-03-13 09:01:40 +00001211extern "C" int pthread_attr_init(void *attr);
1212extern "C" int pthread_attr_destroy(void *attr);
Evgeniy Stepanov7c6bd402013-10-22 14:31:30 +00001213
1214static void *MsanThreadStartFunc(void *arg) {
Stephen Hines2d1fdb22014-05-28 23:58:16 -07001215 MsanThread *t = (MsanThread *)arg;
1216 SetCurrentThread(t);
1217 return t->ThreadStart();
Evgeniy Stepanov7c6bd402013-10-22 14:31:30 +00001218}
Evgeniy Stepanov10fd3222013-03-13 09:01:40 +00001219
1220INTERCEPTOR(int, pthread_create, void *th, void *attr, void *(*callback)(void*),
1221 void * param) {
1222 ENSURE_MSAN_INITED(); // for GetTlsSize()
1223 __sanitizer_pthread_attr_t myattr;
1224 if (attr == 0) {
1225 pthread_attr_init(&myattr);
1226 attr = &myattr;
1227 }
Evgeniy Stepanovb9bf7002013-03-19 09:30:52 +00001228
Stephen Hines2d1fdb22014-05-28 23:58:16 -07001229 AdjustStackSize(attr);
Evgeniy Stepanov10fd3222013-03-13 09:01:40 +00001230
Stephen Hines2d1fdb22014-05-28 23:58:16 -07001231 MsanThread *t = MsanThread::Create(callback, param);
Evgeniy Stepanov7c6bd402013-10-22 14:31:30 +00001232
Stephen Hines2d1fdb22014-05-28 23:58:16 -07001233 int res = REAL(pthread_create)(th, attr, MsanThreadStartFunc, t);
Evgeniy Stepanov7c6bd402013-10-22 14:31:30 +00001234
Evgeniy Stepanov10fd3222013-03-13 09:01:40 +00001235 if (attr == &myattr)
1236 pthread_attr_destroy(&myattr);
Evgeniy Stepanove4bdda52013-04-01 14:47:21 +00001237 if (!res) {
1238 __msan_unpoison(th, __sanitizer::pthread_t_sz);
1239 }
Evgeniy Stepanov10fd3222013-03-13 09:01:40 +00001240 return res;
1241}
1242
Timur Iskhodzhanoveaca82c2013-07-15 16:11:39 +00001243INTERCEPTOR(int, pthread_key_create, __sanitizer_pthread_key_t *key,
1244 void (*dtor)(void *value)) {
Stephen Hines2d1fdb22014-05-28 23:58:16 -07001245 if (msan_init_is_running) return REAL(pthread_key_create)(key, dtor);
Evgeniy Stepanov737da2f2013-07-05 12:31:07 +00001246 ENSURE_MSAN_INITED();
1247 int res = REAL(pthread_key_create)(key, dtor);
1248 if (!res && key)
1249 __msan_unpoison(key, sizeof(*key));
1250 return res;
1251}
1252
Evgeniy Stepanov65670922013-07-30 12:54:34 +00001253INTERCEPTOR(int, pthread_join, void *th, void **retval) {
1254 ENSURE_MSAN_INITED();
1255 int res = REAL(pthread_join)(th, retval);
1256 if (!res && retval)
1257 __msan_unpoison(retval, sizeof(*retval));
1258 return res;
1259}
1260
Evgeniy Stepanov7b636082013-09-13 11:27:38 +00001261extern char *tzname[2];
1262
Stephen Hines2d1fdb22014-05-28 23:58:16 -07001263INTERCEPTOR(void, tzset, int fake) {
Evgeniy Stepanov7b636082013-09-13 11:27:38 +00001264 ENSURE_MSAN_INITED();
Stephen Hines2d1fdb22014-05-28 23:58:16 -07001265 REAL(tzset)(fake);
Evgeniy Stepanov7b636082013-09-13 11:27:38 +00001266 if (tzname[0])
1267 __msan_unpoison(tzname[0], REAL(strlen)(tzname[0]) + 1);
1268 if (tzname[1])
1269 __msan_unpoison(tzname[1], REAL(strlen)(tzname[1]) + 1);
1270 return;
1271}
1272
Evgeniy Stepanovcfc29de2013-09-27 11:32:21 +00001273struct MSanAtExitRecord {
1274 void (*func)(void *arg);
1275 void *arg;
1276};
1277
1278void MSanAtExitWrapper(void *arg) {
1279 UnpoisonParam(1);
1280 MSanAtExitRecord *r = (MSanAtExitRecord *)arg;
Stephen Hines6d186232014-11-26 17:56:19 -08001281 r->func(r->arg);
Evgeniy Stepanovcfc29de2013-09-27 11:32:21 +00001282 InternalFree(r);
1283}
1284
1285// Unpoison argument shadow for C++ module destructors.
1286INTERCEPTOR(int, __cxa_atexit, void (*func)(void *), void *arg,
1287 void *dso_handle) {
1288 if (msan_init_is_running) return REAL(__cxa_atexit)(func, arg, dso_handle);
1289 ENSURE_MSAN_INITED();
1290 MSanAtExitRecord *r =
1291 (MSanAtExitRecord *)InternalAlloc(sizeof(MSanAtExitRecord));
1292 r->func = func;
1293 r->arg = arg;
1294 return REAL(__cxa_atexit)(MSanAtExitWrapper, r, dso_handle);
1295}
1296
Evgeniy Stepanovf3603892013-10-29 02:48:49 +00001297DECLARE_REAL(int, shmctl, int shmid, int cmd, void *buf)
1298
1299INTERCEPTOR(void *, shmat, int shmid, const void *shmaddr, int shmflg) {
1300 ENSURE_MSAN_INITED();
1301 void *p = REAL(shmat)(shmid, shmaddr, shmflg);
1302 if (p != (void *)-1) {
1303 __sanitizer_shmid_ds ds;
1304 int res = REAL(shmctl)(shmid, shmctl_ipc_stat, &ds);
1305 if (!res) {
1306 __msan_unpoison(p, ds.shm_segsz);
1307 }
1308 }
1309 return p;
1310}
1311
Stephen Hines6d186232014-11-26 17:56:19 -08001312static void BeforeFork() {
1313 StackDepotLockAll();
1314 ChainedOriginDepotLockAll();
Evgeniy Stepanov548559d2013-10-31 15:51:22 +00001315}
1316
Stephen Hines6d186232014-11-26 17:56:19 -08001317static void AfterFork() {
1318 ChainedOriginDepotUnlockAll();
1319 StackDepotUnlockAll();
Evgeniy Stepanov548559d2013-10-31 15:51:22 +00001320}
1321
Stephen Hines6d186232014-11-26 17:56:19 -08001322INTERCEPTOR(int, fork, void) {
1323 ENSURE_MSAN_INITED();
1324 BeforeFork();
1325 int pid = REAL(fork)();
1326 AfterFork();
1327 return pid;
Evgeniy Stepanov548559d2013-10-31 15:51:22 +00001328}
Evgeniy Stepanovf3603892013-10-29 02:48:49 +00001329
Evgeniy Stepanov447ef192013-05-22 12:50:26 +00001330struct MSanInterceptorContext {
1331 bool in_interceptor_scope;
1332};
1333
Dmitry Vyukov8cde99f2013-10-03 15:43:59 +00001334namespace __msan {
1335
1336int OnExit() {
Dmitry Vyukov14dd9802013-10-03 15:22:29 +00001337 // FIXME: ask frontend whether we need to return failure.
1338 return 0;
1339}
1340
Dmitry Vyukov8cde99f2013-10-03 15:43:59 +00001341} // namespace __msan
1342
Evgeniy Stepanova537ea92013-11-11 11:28:30 +00001343// A version of CHECK_UNPOISONED using a saved scope value. Used in common
Evgeniy Stepanov5b2afc32013-05-23 11:51:47 +00001344// interceptors.
Evgeniy Stepanov341b9e62013-06-28 11:02:43 +00001345#define CHECK_UNPOISONED_CTX(ctx, x, n) \
1346 do { \
1347 if (!((MSanInterceptorContext *)ctx)->in_interceptor_scope) \
1348 CHECK_UNPOISONED_0(x, n); \
1349 } while (0)
Evgeniy Stepanov447ef192013-05-22 12:50:26 +00001350
Stephen Hines2d1fdb22014-05-28 23:58:16 -07001351#define MSAN_INTERCEPT_FUNC(name) \
1352 do { \
1353 if ((!INTERCEPT_FUNCTION(name) || !REAL(name))) \
1354 VReport(1, "MemorySanitizer: failed to intercept '" #name "'\n"); \
Evgeniy Stepanova537ea92013-11-11 11:28:30 +00001355 } while (0)
1356
1357#define COMMON_INTERCEPT_FUNCTION(name) MSAN_INTERCEPT_FUNC(name)
Stephen Hines2d1fdb22014-05-28 23:58:16 -07001358#define COMMON_INTERCEPTOR_UNPOISON_PARAM(count) \
Evgeniy Stepanov3fa122e2013-07-09 12:07:59 +00001359 UnpoisonParam(count)
Evgeniy Stepanov996c4f22013-01-18 11:17:23 +00001360#define COMMON_INTERCEPTOR_WRITE_RANGE(ctx, ptr, size) \
Evgeniy Stepanov447ef192013-05-22 12:50:26 +00001361 __msan_unpoison(ptr, size)
1362#define COMMON_INTERCEPTOR_READ_RANGE(ctx, ptr, size) \
Evgeniy Stepanov341b9e62013-06-28 11:02:43 +00001363 CHECK_UNPOISONED_CTX(ctx, ptr, size)
Stephen Hines2d1fdb22014-05-28 23:58:16 -07001364#define COMMON_INTERCEPTOR_INITIALIZE_RANGE(ptr, size) \
Dmitry Vyukov0586dcc2013-10-03 14:12:09 +00001365 __msan_unpoison(ptr, size)
Evgeniy Stepanov1161eb42013-10-24 13:20:34 +00001366#define COMMON_INTERCEPTOR_ENTER(ctx, func, ...) \
1367 if (msan_init_is_running) return REAL(func)(__VA_ARGS__); \
1368 MSanInterceptorContext msan_ctx = {IsInInterceptorScope()}; \
1369 ctx = (void *)&msan_ctx; \
1370 (void)ctx; \
1371 InterceptorScope interceptor_scope; \
1372 __msan_unpoison(__errno_location(), sizeof(int)); /* NOLINT */ \
Evgeniy Stepanov447ef192013-05-22 12:50:26 +00001373 ENSURE_MSAN_INITED();
Stephen Hines86277eb2015-03-23 12:06:32 -07001374#define COMMON_INTERCEPTOR_DIR_ACQUIRE(ctx, path) \
1375 do { \
1376 } while (false)
Evgeniy Stepanov447ef192013-05-22 12:50:26 +00001377#define COMMON_INTERCEPTOR_FD_ACQUIRE(ctx, fd) \
1378 do { \
Evgeniy Stepanov82a90802013-01-18 13:12:56 +00001379 } while (false)
Evgeniy Stepanov9d1525e2013-05-29 09:09:58 +00001380#define COMMON_INTERCEPTOR_FD_RELEASE(ctx, fd) \
1381 do { \
1382 } while (false)
1383#define COMMON_INTERCEPTOR_FD_SOCKET_ACCEPT(ctx, fd, newfd) \
1384 do { \
1385 } while (false)
Evgeniy Stepanov82a90802013-01-18 13:12:56 +00001386#define COMMON_INTERCEPTOR_SET_THREAD_NAME(ctx, name) \
Evgeniy Stepanov9d1525e2013-05-29 09:09:58 +00001387 do { \
1388 } while (false) // FIXME
Dmitry Vyukov5cf2c462013-10-29 10:30:39 +00001389#define COMMON_INTERCEPTOR_SET_PTHREAD_NAME(ctx, thread, name) \
1390 do { \
1391 } while (false) // FIXME
Evgeniy Stepanove18e3f02013-08-12 13:19:53 +00001392#define COMMON_INTERCEPTOR_BLOCK_REAL(name) REAL(name)
Dmitry Vyukov14dd9802013-10-03 15:22:29 +00001393#define COMMON_INTERCEPTOR_ON_EXIT(ctx) OnExit()
Stephen Hines86277eb2015-03-23 12:06:32 -07001394#define COMMON_INTERCEPTOR_LIBRARY_LOADED(filename, handle) \
1395 do { \
1396 link_map *map = GET_LINK_MAP_BY_DLOPEN_HANDLE((handle)); \
1397 if (map) ForEachMappedRegion(map, __msan_unpoison); \
1398 } while (false)
Stephen Hines2d1fdb22014-05-28 23:58:16 -07001399
Pirama Arumuga Nainarcdce50b2015-07-01 12:26:56 -07001400#define COMMON_INTERCEPTOR_GET_TLS_RANGE(begin, end) \
1401 if (MsanThread *t = GetCurrentThread()) { \
1402 *begin = t->tls_begin(); \
1403 *end = t->tls_end(); \
1404 } else { \
1405 *begin = *end = 0; \
1406 }
1407
Evgeniy Stepanov4f32c0b2013-01-18 13:01:18 +00001408#include "sanitizer_common/sanitizer_common_interceptors.inc"
Kostya Serebryanyc20b3212013-01-18 06:43:13 +00001409
Evgeniy Stepanov2887a642013-04-11 14:37:04 +00001410#define COMMON_SYSCALL_PRE_READ_RANGE(p, s) CHECK_UNPOISONED(p, s)
Alexey Samsonov6b859452013-09-19 08:35:16 +00001411#define COMMON_SYSCALL_PRE_WRITE_RANGE(p, s) \
1412 do { \
1413 } while (false)
1414#define COMMON_SYSCALL_POST_READ_RANGE(p, s) \
1415 do { \
1416 } while (false)
Evgeniy Stepanov2887a642013-04-11 14:37:04 +00001417#define COMMON_SYSCALL_POST_WRITE_RANGE(p, s) __msan_unpoison(p, s)
1418#include "sanitizer_common/sanitizer_common_syscalls.inc"
1419
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +00001420// These interface functions reside here so that they can use
Stephen Hines6d186232014-11-26 17:56:19 -08001421// REAL(memset), etc.
Alexey Samsonov11347bf2013-04-23 13:34:19 +00001422void __msan_unpoison(const void *a, uptr size) {
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +00001423 if (!MEM_IS_APP(a)) return;
Stephen Hines86277eb2015-03-23 12:06:32 -07001424 SetShadow(a, size, 0);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +00001425}
1426
Alexey Samsonov11347bf2013-04-23 13:34:19 +00001427void __msan_poison(const void *a, uptr size) {
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +00001428 if (!MEM_IS_APP(a)) return;
Stephen Hines86277eb2015-03-23 12:06:32 -07001429 SetShadow(a, size, __msan::flags()->poison_heap_with_zeroes ? 0 : -1);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +00001430}
1431
1432void __msan_poison_stack(void *a, uptr size) {
1433 if (!MEM_IS_APP(a)) return;
Stephen Hines86277eb2015-03-23 12:06:32 -07001434 SetShadow(a, size, __msan::flags()->poison_stack_with_zeroes ? 0 : -1);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +00001435}
1436
1437void __msan_clear_and_unpoison(void *a, uptr size) {
Stephen Hines6d186232014-11-26 17:56:19 -08001438 REAL(memset)(a, 0, size);
Stephen Hines86277eb2015-03-23 12:06:32 -07001439 SetShadow(a, size, 0);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +00001440}
1441
Kostya Serebryany6afa1b02012-12-13 06:31:40 +00001442void *__msan_memcpy(void *dest, const void *src, SIZE_T n) {
Stephen Hines2d1fdb22014-05-28 23:58:16 -07001443 if (!msan_inited) return internal_memcpy(dest, src, n);
1444 if (msan_init_is_running) return REAL(memcpy)(dest, src, n);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +00001445 ENSURE_MSAN_INITED();
Stephen Hines2d1fdb22014-05-28 23:58:16 -07001446 GET_STORE_STACK_TRACE;
Stephen Hines6d186232014-11-26 17:56:19 -08001447 void *res = REAL(memcpy)(dest, src, n);
Stephen Hines86277eb2015-03-23 12:06:32 -07001448 CopyShadowAndOrigin(dest, src, n, &stack);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +00001449 return res;
1450}
1451
Kostya Serebryany6afa1b02012-12-13 06:31:40 +00001452void *__msan_memset(void *s, int c, SIZE_T n) {
Stephen Hines2d1fdb22014-05-28 23:58:16 -07001453 if (!msan_inited) return internal_memset(s, c, n);
1454 if (msan_init_is_running) return REAL(memset)(s, c, n);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +00001455 ENSURE_MSAN_INITED();
Stephen Hines6d186232014-11-26 17:56:19 -08001456 void *res = REAL(memset)(s, c, n);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +00001457 __msan_unpoison(s, n);
1458 return res;
1459}
1460
Kostya Serebryany6afa1b02012-12-13 06:31:40 +00001461void *__msan_memmove(void *dest, const void *src, SIZE_T n) {
Stephen Hines2d1fdb22014-05-28 23:58:16 -07001462 if (!msan_inited) return internal_memmove(dest, src, n);
1463 if (msan_init_is_running) return REAL(memmove)(dest, src, n);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +00001464 ENSURE_MSAN_INITED();
Stephen Hines2d1fdb22014-05-28 23:58:16 -07001465 GET_STORE_STACK_TRACE;
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +00001466 void *res = REAL(memmove)(dest, src, n);
Stephen Hines86277eb2015-03-23 12:06:32 -07001467 MoveShadowAndOrigin(dest, src, n, &stack);
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +00001468 return res;
1469}
1470
Stephen Hines2d1fdb22014-05-28 23:58:16 -07001471void __msan_unpoison_string(const char* s) {
1472 if (!MEM_IS_APP(s)) return;
1473 __msan_unpoison(s, REAL(strlen)(s) + 1);
1474}
1475
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +00001476namespace __msan {
Stephen Hines2d1fdb22014-05-28 23:58:16 -07001477
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +00001478void InitializeInterceptors() {
1479 static int inited = 0;
1480 CHECK_EQ(inited, 0);
Stephen Hines2d1fdb22014-05-28 23:58:16 -07001481 InitializeCommonInterceptors();
Kostya Serebryanyc20b3212013-01-18 06:43:13 +00001482
Alexey Samsonov8028c712012-12-14 11:52:02 +00001483 INTERCEPT_FUNCTION(mmap);
Stephen Hines86277eb2015-03-23 12:06:32 -07001484 MSAN_MAYBE_INTERCEPT_MMAP64;
Alexey Samsonov8028c712012-12-14 11:52:02 +00001485 INTERCEPT_FUNCTION(posix_memalign);
Stephen Hines86277eb2015-03-23 12:06:32 -07001486 MSAN_MAYBE_INTERCEPT_MEMALIGN;
Stephen Hines6a211c52014-07-21 00:49:56 -07001487 INTERCEPT_FUNCTION(__libc_memalign);
Evgeniy Stepanov97160a82013-09-02 09:24:53 +00001488 INTERCEPT_FUNCTION(valloc);
Stephen Hines86277eb2015-03-23 12:06:32 -07001489 MSAN_MAYBE_INTERCEPT_PVALLOC;
Alexey Samsonov8028c712012-12-14 11:52:02 +00001490 INTERCEPT_FUNCTION(malloc);
1491 INTERCEPT_FUNCTION(calloc);
1492 INTERCEPT_FUNCTION(realloc);
1493 INTERCEPT_FUNCTION(free);
Stephen Hines86277eb2015-03-23 12:06:32 -07001494 MSAN_MAYBE_INTERCEPT_CFREE;
Stephen Hines2d1fdb22014-05-28 23:58:16 -07001495 INTERCEPT_FUNCTION(malloc_usable_size);
Stephen Hines86277eb2015-03-23 12:06:32 -07001496 MSAN_MAYBE_INTERCEPT_MALLINFO;
1497 MSAN_MAYBE_INTERCEPT_MALLOPT;
1498 MSAN_MAYBE_INTERCEPT_MALLOC_STATS;
Alexey Samsonov8028c712012-12-14 11:52:02 +00001499 INTERCEPT_FUNCTION(fread);
Stephen Hines86277eb2015-03-23 12:06:32 -07001500 MSAN_MAYBE_INTERCEPT_FREAD_UNLOCKED;
Alexey Samsonov8028c712012-12-14 11:52:02 +00001501 INTERCEPT_FUNCTION(readlink);
Alexey Samsonov8028c712012-12-14 11:52:02 +00001502 INTERCEPT_FUNCTION(memcpy);
Evgeniy Stepanov5492ff92013-11-01 23:49:48 +00001503 INTERCEPT_FUNCTION(memccpy);
Evgeniy Stepanov353c9962013-07-02 14:49:24 +00001504 INTERCEPT_FUNCTION(mempcpy);
Alexey Samsonov8028c712012-12-14 11:52:02 +00001505 INTERCEPT_FUNCTION(memset);
1506 INTERCEPT_FUNCTION(memmove);
Evgeniy Stepanovff6c9fb2013-07-04 13:19:41 +00001507 INTERCEPT_FUNCTION(bcopy);
Alexey Samsonov8028c712012-12-14 11:52:02 +00001508 INTERCEPT_FUNCTION(wmemset);
1509 INTERCEPT_FUNCTION(wmemcpy);
Evgeniy Stepanov353c9962013-07-02 14:49:24 +00001510 INTERCEPT_FUNCTION(wmempcpy);
Alexey Samsonov8028c712012-12-14 11:52:02 +00001511 INTERCEPT_FUNCTION(wmemmove);
1512 INTERCEPT_FUNCTION(strcpy); // NOLINT
Evgeniy Stepanov4bbbe132013-07-01 15:19:37 +00001513 INTERCEPT_FUNCTION(stpcpy); // NOLINT
Alexey Samsonov8028c712012-12-14 11:52:02 +00001514 INTERCEPT_FUNCTION(strdup);
Stephen Hines86277eb2015-03-23 12:06:32 -07001515 MSAN_MAYBE_INTERCEPT___STRDUP;
Evgeniy Stepanov8aa1ae02013-03-14 11:10:36 +00001516 INTERCEPT_FUNCTION(strndup);
Stephen Hines86277eb2015-03-23 12:06:32 -07001517 MSAN_MAYBE_INTERCEPT___STRNDUP;
Alexey Samsonov8028c712012-12-14 11:52:02 +00001518 INTERCEPT_FUNCTION(strncpy); // NOLINT
1519 INTERCEPT_FUNCTION(strlen);
1520 INTERCEPT_FUNCTION(strnlen);
1521 INTERCEPT_FUNCTION(gcvt);
1522 INTERCEPT_FUNCTION(strcat); // NOLINT
1523 INTERCEPT_FUNCTION(strncat); // NOLINT
Stephen Hines86277eb2015-03-23 12:06:32 -07001524 INTERCEPT_STRTO(strtod);
1525 INTERCEPT_STRTO(strtof);
1526 INTERCEPT_STRTO(strtold);
1527 INTERCEPT_STRTO(strtol);
1528 INTERCEPT_STRTO(strtoul);
1529 INTERCEPT_STRTO(strtoll);
1530 INTERCEPT_STRTO(strtoull);
1531 INTERCEPT_STRTO(wcstod);
1532 INTERCEPT_STRTO(wcstof);
1533 INTERCEPT_STRTO(wcstold);
1534 INTERCEPT_STRTO(wcstol);
1535 INTERCEPT_STRTO(wcstoul);
1536 INTERCEPT_STRTO(wcstoll);
1537 INTERCEPT_STRTO(wcstoull);
Alexey Samsonov8028c712012-12-14 11:52:02 +00001538 INTERCEPT_FUNCTION(vswprintf);
Alexey Samsonov8028c712012-12-14 11:52:02 +00001539 INTERCEPT_FUNCTION(swprintf);
Stephen Hines2d1fdb22014-05-28 23:58:16 -07001540 INTERCEPT_FUNCTION(strxfrm);
1541 INTERCEPT_FUNCTION(strxfrm_l);
Alexey Samsonov8028c712012-12-14 11:52:02 +00001542 INTERCEPT_FUNCTION(strftime);
Stephen Hines2d1fdb22014-05-28 23:58:16 -07001543 INTERCEPT_FUNCTION(strftime_l);
Stephen Hines86277eb2015-03-23 12:06:32 -07001544 MSAN_MAYBE_INTERCEPT___STRFTIME_L;
Stephen Hines2d1fdb22014-05-28 23:58:16 -07001545 INTERCEPT_FUNCTION(wcsftime);
1546 INTERCEPT_FUNCTION(wcsftime_l);
Stephen Hines86277eb2015-03-23 12:06:32 -07001547 MSAN_MAYBE_INTERCEPT___WCSFTIME_L;
Evgeniy Stepanov80144892013-07-02 13:34:44 +00001548 INTERCEPT_FUNCTION(mbtowc);
1549 INTERCEPT_FUNCTION(mbrtowc);
Alexey Samsonov8028c712012-12-14 11:52:02 +00001550 INTERCEPT_FUNCTION(wcslen);
1551 INTERCEPT_FUNCTION(wcschr);
1552 INTERCEPT_FUNCTION(wcscpy);
1553 INTERCEPT_FUNCTION(wcscmp);
Alexey Samsonov8028c712012-12-14 11:52:02 +00001554 INTERCEPT_FUNCTION(getenv);
Evgeniy Stepanov534e2ba2013-08-01 11:14:14 +00001555 INTERCEPT_FUNCTION(setenv);
1556 INTERCEPT_FUNCTION(putenv);
Alexey Samsonov8028c712012-12-14 11:52:02 +00001557 INTERCEPT_FUNCTION(gettimeofday);
1558 INTERCEPT_FUNCTION(fcvt);
Stephen Hines86277eb2015-03-23 12:06:32 -07001559 MSAN_MAYBE_INTERCEPT___FXSTAT;
1560 MSAN_INTERCEPT_FSTATAT;
1561 MSAN_INTERCEPT_STAT;
1562 MSAN_MAYBE_INTERCEPT___LXSTAT;
1563 MSAN_MAYBE_INTERCEPT___FXSTAT64;
1564 MSAN_MAYBE_INTERCEPT___FXSTATAT64;
1565 MSAN_MAYBE_INTERCEPT___XSTAT64;
1566 MSAN_MAYBE_INTERCEPT___LXSTAT64;
Alexey Samsonov8028c712012-12-14 11:52:02 +00001567 INTERCEPT_FUNCTION(pipe);
Evgeniy Stepanov134fe8a2013-04-08 13:45:12 +00001568 INTERCEPT_FUNCTION(pipe2);
1569 INTERCEPT_FUNCTION(socketpair);
Alexey Samsonov8028c712012-12-14 11:52:02 +00001570 INTERCEPT_FUNCTION(fgets);
Stephen Hines86277eb2015-03-23 12:06:32 -07001571 MSAN_MAYBE_INTERCEPT_FGETS_UNLOCKED;
Alexey Samsonov8028c712012-12-14 11:52:02 +00001572 INTERCEPT_FUNCTION(getrlimit);
Stephen Hines86277eb2015-03-23 12:06:32 -07001573 MSAN_MAYBE_INTERCEPT_GETRLIMIT64;
1574 MSAN_INTERCEPT_UNAME;
Evgeniy Stepanov95d05882013-01-23 10:43:38 +00001575 INTERCEPT_FUNCTION(gethostname);
Stephen Hines86277eb2015-03-23 12:06:32 -07001576 MSAN_MAYBE_INTERCEPT_EPOLL_WAIT;
1577 MSAN_MAYBE_INTERCEPT_EPOLL_PWAIT;
Alexey Samsonov8028c712012-12-14 11:52:02 +00001578 INTERCEPT_FUNCTION(recv);
1579 INTERCEPT_FUNCTION(recvfrom);
Evgeniy Stepanove03345b2013-01-17 13:42:17 +00001580 INTERCEPT_FUNCTION(dladdr);
Evgeniy Stepanovae7db432013-10-31 16:58:44 +00001581 INTERCEPT_FUNCTION(dlerror);
Evgeniy Stepanov2bba4ef2013-05-16 13:00:25 +00001582 INTERCEPT_FUNCTION(dl_iterate_phdr);
Evgeniy Stepanove03345b2013-01-17 13:42:17 +00001583 INTERCEPT_FUNCTION(getrusage);
Evgeniy Stepanove4bdda52013-04-01 14:47:21 +00001584 INTERCEPT_FUNCTION(sigaction);
Evgeniy Stepanov06658ea2013-04-04 08:22:52 +00001585 INTERCEPT_FUNCTION(signal);
Evgeniy Stepanov10fd3222013-03-13 09:01:40 +00001586 INTERCEPT_FUNCTION(pthread_create);
Evgeniy Stepanov737da2f2013-07-05 12:31:07 +00001587 INTERCEPT_FUNCTION(pthread_key_create);
Evgeniy Stepanov65670922013-07-30 12:54:34 +00001588 INTERCEPT_FUNCTION(pthread_join);
Evgeniy Stepanov7b636082013-09-13 11:27:38 +00001589 INTERCEPT_FUNCTION(tzset);
Evgeniy Stepanovcfc29de2013-09-27 11:32:21 +00001590 INTERCEPT_FUNCTION(__cxa_atexit);
Evgeniy Stepanovf3603892013-10-29 02:48:49 +00001591 INTERCEPT_FUNCTION(shmat);
Stephen Hines6d186232014-11-26 17:56:19 -08001592 INTERCEPT_FUNCTION(fork);
Evgeniy Stepanov7c6bd402013-10-22 14:31:30 +00001593
Evgeniy Stepanov78c56c32012-12-11 12:27:27 +00001594 inited = 1;
1595}
1596} // namespace __msan