blob: 1ad75aa0cec48d5b1aa2c6675178ca1119ba9de1 [file] [log] [blame]
Evgeniy Stepanovc5033782012-12-11 12:27:27 +00001//===-- msan_interceptors.cc ----------------------------------------------===//
2//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9//
10// This file is a part of MemorySanitizer.
11//
12// Interceptors for standard library functions.
Kostya Serebryany9a58d392012-12-12 09:54:35 +000013//
14// FIXME: move as many interceptors as possible into
15// sanitizer_common/sanitizer_common_interceptors.h
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000016//===----------------------------------------------------------------------===//
17
18#include "interception/interception.h"
19#include "msan.h"
20#include "msan_platform_limits_posix.h"
21#include "sanitizer_common/sanitizer_common.h"
22#include "sanitizer_common/sanitizer_libc.h"
23
24#include <stdarg.h>
25// ACHTUNG! No other system header includes in this file.
26// Ideally, we should get rid of stdarg.h as well.
27
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000028using namespace __msan;
29
30#define ENSURE_MSAN_INITED() do { \
31 CHECK(!msan_init_is_running); \
32 if (!msan_inited) { \
33 __msan_init(); \
34 } \
35} while (0)
36
37#define CHECK_UNPOISONED(x, n) \
38 do { \
39 sptr offset = __msan_test_shadow(x, n); \
40 if (offset >= 0 && flags()->report_umrs) { \
41 GET_CALLER_PC_BP_SP; \
42 (void)sp; \
43 Printf("UMR in %s at offset %d inside [%p, +%d) \n", \
44 __FUNCTION__, offset, x, n); \
45 __msan::PrintWarningWithOrigin( \
46 pc, bp, __msan_get_origin((char*)x + offset)); \
47 } \
48 } while (0)
49
Kostya Serebryany07bb3922012-12-13 06:31:40 +000050static void *fast_memset(void *ptr, int c, SIZE_T n);
51static void *fast_memcpy(void *dst, const void *src, SIZE_T n);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000052
Kostya Serebryany07bb3922012-12-13 06:31:40 +000053INTERCEPTOR(SIZE_T, fread, void *ptr, SIZE_T size, SIZE_T nmemb, void *file) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000054 ENSURE_MSAN_INITED();
Kostya Serebryany07bb3922012-12-13 06:31:40 +000055 SIZE_T res = REAL(fread)(ptr, size, nmemb, file);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000056 if (res > 0)
57 __msan_unpoison(ptr, res *size);
58 return res;
59}
60
Kostya Serebryany07bb3922012-12-13 06:31:40 +000061INTERCEPTOR(SIZE_T, fread_unlocked, void *ptr, SIZE_T size, SIZE_T nmemb,
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000062 void *file) {
63 ENSURE_MSAN_INITED();
Kostya Serebryany07bb3922012-12-13 06:31:40 +000064 SIZE_T res = REAL(fread_unlocked)(ptr, size, nmemb, file);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000065 if (res > 0)
66 __msan_unpoison(ptr, res *size);
67 return res;
68}
69
Kostya Serebryany07bb3922012-12-13 06:31:40 +000070INTERCEPTOR(SSIZE_T, read, int fd, void *ptr, SIZE_T count) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000071 ENSURE_MSAN_INITED();
Kostya Serebryany07bb3922012-12-13 06:31:40 +000072 SSIZE_T res = REAL(read)(fd, ptr, count);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000073 if (res > 0)
74 __msan_unpoison(ptr, res);
75 return res;
76}
77
Kostya Serebryany07bb3922012-12-13 06:31:40 +000078INTERCEPTOR(SSIZE_T, pread, int fd, void *ptr, SIZE_T count, OFF_T offset) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000079 ENSURE_MSAN_INITED();
Kostya Serebryany07bb3922012-12-13 06:31:40 +000080 SSIZE_T res = REAL(pread)(fd, ptr, count, offset);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000081 if (res > 0)
82 __msan_unpoison(ptr, res);
83 return res;
84}
85
Kostya Serebryany07bb3922012-12-13 06:31:40 +000086INTERCEPTOR(SSIZE_T, pread64, int fd, void *ptr, SIZE_T count, OFF64_T offset) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000087 ENSURE_MSAN_INITED();
Kostya Serebryany07bb3922012-12-13 06:31:40 +000088 SSIZE_T res = REAL(pread64)(fd, ptr, count, offset);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000089 if (res > 0)
90 __msan_unpoison(ptr, res);
91 return res;
92}
93
Kostya Serebryany07bb3922012-12-13 06:31:40 +000094INTERCEPTOR(SSIZE_T, readlink, const char *path, char *buf, SIZE_T bufsiz) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000095 ENSURE_MSAN_INITED();
Kostya Serebryany07bb3922012-12-13 06:31:40 +000096 SSIZE_T res = REAL(readlink)(path, buf, bufsiz);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000097 if (res > 0)
98 __msan_unpoison(buf, res);
99 return res;
100}
101
102INTERCEPTOR(void *, readdir, void *a) {
103 ENSURE_MSAN_INITED();
104 void *res = REAL(readdir)(a);
105 __msan_unpoison(res, __msan::struct_dirent_sz);
106 return res;
107}
108
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000109INTERCEPTOR(void *, memcpy, void *dest, const void *src, SIZE_T n) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000110 return __msan_memcpy(dest, src, n);
111}
112
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000113INTERCEPTOR(void *, memmove, void *dest, const void *src, SIZE_T n) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000114 return __msan_memmove(dest, src, n);
115}
116
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000117INTERCEPTOR(void *, memset, void *s, int c, SIZE_T n) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000118 return __msan_memset(s, c, n);
119}
120
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000121INTERCEPTOR(int, posix_memalign, void **memptr, SIZE_T alignment, SIZE_T size) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000122 GET_MALLOC_STACK_TRACE;
123 CHECK_EQ(alignment & (alignment - 1), 0);
124 *memptr = MsanReallocate(&stack, 0, size, alignment, false);
125 CHECK_NE(memptr, 0);
126 return 0;
127}
128
129INTERCEPTOR(void, free, void *ptr) {
130 ENSURE_MSAN_INITED();
131 if (ptr == 0) return;
132 MsanDeallocate(ptr);
133}
134
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000135INTERCEPTOR(SIZE_T, strlen, const char *s) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000136 ENSURE_MSAN_INITED();
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000137 SIZE_T res = REAL(strlen)(s);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000138 CHECK_UNPOISONED(s, res + 1);
139 return res;
140}
141
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000142INTERCEPTOR(SIZE_T, strnlen, const char *s, SIZE_T n) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000143 ENSURE_MSAN_INITED();
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000144 SIZE_T res = REAL(strnlen)(s, n);
145 SIZE_T scan_size = (res == n) ? res : res + 1;
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000146 CHECK_UNPOISONED(s, scan_size);
147 return res;
148}
149
150// FIXME: Add stricter shadow checks in str* interceptors (ex.: strcpy should
151// check the shadow of the terminating \0 byte).
152
153INTERCEPTOR(char *, strcpy, char *dest, const char *src) { // NOLINT
154 ENSURE_MSAN_INITED();
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000155 SIZE_T n = REAL(strlen)(src);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000156 char *res = REAL(strcpy)(dest, src); // NOLINT
157 __msan_copy_poison(dest, src, n + 1);
158 return res;
159}
160
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000161INTERCEPTOR(char *, strncpy, char *dest, const char *src, SIZE_T n) { // NOLINT
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000162 ENSURE_MSAN_INITED();
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000163 SIZE_T copy_size = REAL(strnlen)(src, n);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000164 if (copy_size < n)
165 copy_size++; // trailing \0
166 char *res = REAL(strncpy)(dest, src, n); // NOLINT
167 __msan_copy_poison(dest, src, copy_size);
168 return res;
169}
170
171INTERCEPTOR(char *, strdup, char *src) {
172 ENSURE_MSAN_INITED();
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000173 SIZE_T n = REAL(strlen)(src);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000174 char *res = REAL(strdup)(src);
175 __msan_copy_poison(res, src, n + 1);
176 return res;
177}
178
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000179INTERCEPTOR(char *, gcvt, double number, SIZE_T ndigit, char *buf) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000180 ENSURE_MSAN_INITED();
181 char *res = REAL(gcvt)(number, ndigit, buf);
182 // DynamoRio tool will take care of unpoisoning gcvt result for us.
183 if (!__msan_has_dynamic_component()) {
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000184 SIZE_T n = REAL(strlen)(buf);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000185 __msan_unpoison(buf, n + 1);
186 }
187 return res;
188}
189
190INTERCEPTOR(char *, strcat, char *dest, const char *src) { // NOLINT
191 ENSURE_MSAN_INITED();
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000192 SIZE_T src_size = REAL(strlen)(src);
193 SIZE_T dest_size = REAL(strlen)(dest);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000194 char *res = REAL(strcat)(dest, src); // NOLINT
195 __msan_copy_poison(dest + dest_size, src, src_size + 1);
196 return res;
197}
198
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000199INTERCEPTOR(char *, strncat, char *dest, const char *src, SIZE_T n) { // NOLINT
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000200 ENSURE_MSAN_INITED();
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000201 SIZE_T dest_size = REAL(strlen)(dest);
202 SIZE_T copy_size = REAL(strlen)(src);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000203 if (copy_size < n)
204 copy_size++; // trailing \0
205 char *res = REAL(strncat)(dest, src, n); // NOLINT
206 __msan_copy_poison(dest + dest_size, src, copy_size);
207 return res;
208}
209
210INTERCEPTOR(long, strtol, const char *nptr, char **endptr, // NOLINT
211 int base) {
212 ENSURE_MSAN_INITED();
213 long res = REAL(strtol)(nptr, endptr, base); // NOLINT
214 if (!__msan_has_dynamic_component()) {
215 __msan_unpoison(endptr, sizeof(*endptr));
216 }
217 return res;
218}
219
220INTERCEPTOR(long long, strtoll, const char *nptr, char **endptr, // NOLINT
221 int base) {
222 ENSURE_MSAN_INITED();
223 long res = REAL(strtoll)(nptr, endptr, base); //NOLINT
224 if (!__msan_has_dynamic_component()) {
225 __msan_unpoison(endptr, sizeof(*endptr));
226 }
227 return res;
228}
229
230INTERCEPTOR(unsigned long, strtoul, const char *nptr, char **endptr, // NOLINT
231 int base) {
232 ENSURE_MSAN_INITED();
233 unsigned long res = REAL(strtoul)(nptr, endptr, base); // NOLINT
234 if (!__msan_has_dynamic_component()) {
235 __msan_unpoison(endptr, sizeof(*endptr));
236 }
237 return res;
238}
239
240INTERCEPTOR(unsigned long long, strtoull, const char *nptr, // NOLINT
241 char **endptr, int base) {
242 ENSURE_MSAN_INITED();
243 unsigned long res = REAL(strtoull)(nptr, endptr, base); // NOLINT
244 if (!__msan_has_dynamic_component()) {
245 __msan_unpoison(endptr, sizeof(*endptr));
246 }
247 return res;
248}
249
250INTERCEPTOR(int, vsnprintf, char *str, uptr size,
251 const char *format, va_list ap) {
252 ENSURE_MSAN_INITED();
253 int res = REAL(vsnprintf)(str, size, format, ap);
254 if (!__msan_has_dynamic_component()) {
255 __msan_unpoison(str, res + 1);
256 }
257 return res;
258}
259
260INTERCEPTOR(int, vsprintf, char *str, const char *format, va_list ap) {
261 ENSURE_MSAN_INITED();
262 int res = REAL(vsprintf)(str, format, ap);
263 if (!__msan_has_dynamic_component()) {
264 __msan_unpoison(str, res + 1);
265 }
266 return res;
267}
268
269INTERCEPTOR(int, vswprintf, void *str, uptr size, void *format, va_list ap) {
270 ENSURE_MSAN_INITED();
271 int res = REAL(vswprintf)(str, size, format, ap);
272 if (!__msan_has_dynamic_component()) {
273 __msan_unpoison(str, 4 * (res + 1));
274 }
275 return res;
276}
277
278INTERCEPTOR(int, sprintf, char *str, const char *format, ...) { // NOLINT
279 ENSURE_MSAN_INITED();
280 va_list ap;
281 va_start(ap, format);
282 int res = vsprintf(str, format, ap); // NOLINT
283 va_end(ap);
284 return res;
285}
286
287INTERCEPTOR(int, snprintf, char *str, uptr size, const char *format, ...) {
288 ENSURE_MSAN_INITED();
289 va_list ap;
290 va_start(ap, format);
291 int res = vsnprintf(str, size, format, ap);
292 va_end(ap);
293 return res;
294}
295
296INTERCEPTOR(int, swprintf, void *str, uptr size, void *format, ...) {
297 ENSURE_MSAN_INITED();
298 va_list ap;
299 va_start(ap, format);
300 int res = vswprintf(str, size, format, ap);
301 va_end(ap);
302 return res;
303}
304
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000305// SIZE_T strftime(char *s, SIZE_T max, const char *format,const struct tm *tm);
306INTERCEPTOR(SIZE_T, strftime, char *s, SIZE_T max, const char *format,
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000307 void *tm) {
308 ENSURE_MSAN_INITED();
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000309 SIZE_T res = REAL(strftime)(s, max, format, tm);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000310 if (res) __msan_unpoison(s, res + 1);
311 return res;
312}
313
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000314INTERCEPTOR(SIZE_T, wcstombs, void *dest, void *src, SIZE_T size) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000315 ENSURE_MSAN_INITED();
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000316 SIZE_T res = REAL(wcstombs)(dest, src, size);
317 if (res != (SIZE_T)-1) __msan_unpoison(dest, res + 1);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000318 return res;
319}
320
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000321// SIZE_T mbstowcs(wchar_t *dest, const char *src, SIZE_T n);
322INTERCEPTOR(SIZE_T, mbstowcs, wchar_t *dest, const char *src, SIZE_T n) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000323 ENSURE_MSAN_INITED();
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000324 SIZE_T res = REAL(mbstowcs)(dest, src, n);
325 if (res != (SIZE_T)-1) __msan_unpoison(dest, (res + 1) * sizeof(wchar_t));
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000326 return res;
327}
328
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000329INTERCEPTOR(SIZE_T, wcslen, const wchar_t *s) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000330 ENSURE_MSAN_INITED();
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000331 SIZE_T res = REAL(wcslen)(s);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000332 CHECK_UNPOISONED(s, sizeof(wchar_t) * (res + 1));
333 return res;
334}
335
336// wchar_t *wcschr(const wchar_t *wcs, wchar_t wc);
337INTERCEPTOR(wchar_t *, wcschr, void *s, wchar_t wc, void *ps) {
338 ENSURE_MSAN_INITED();
339 wchar_t *res = REAL(wcschr)(s, wc, ps);
340 return res;
341}
342
343// wchar_t *wcscpy(wchar_t *dest, const wchar_t *src);
344INTERCEPTOR(wchar_t *, wcscpy, wchar_t *dest, const wchar_t *src) {
345 ENSURE_MSAN_INITED();
346 wchar_t *res = REAL(wcscpy)(dest, src);
347 __msan_copy_poison(dest, src, sizeof(wchar_t) * (REAL(wcslen)(src) + 1));
348 return res;
349}
350
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000351// wchar_t *wmemcpy(wchar_t *dest, const wchar_t *src, SIZE_T n);
352INTERCEPTOR(wchar_t *, wmemcpy, wchar_t *dest, const wchar_t *src, SIZE_T n) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000353 ENSURE_MSAN_INITED();
354 wchar_t *res = REAL(wmemcpy)(dest, src, n);
355 __msan_copy_poison(dest, src, n * sizeof(wchar_t));
356 return res;
357}
358
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000359INTERCEPTOR(wchar_t *, wmemset, wchar_t *s, wchar_t c, SIZE_T n) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000360 CHECK(MEM_IS_APP(s));
361 ENSURE_MSAN_INITED();
362 wchar_t *res = (wchar_t *)fast_memset(s, c, n * sizeof(wchar_t));
363 __msan_unpoison(s, n * sizeof(wchar_t));
364 return res;
365}
366
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000367INTERCEPTOR(wchar_t *, wmemmove, wchar_t *dest, const wchar_t *src, SIZE_T n) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000368 ENSURE_MSAN_INITED();
369 wchar_t *res = REAL(wmemmove)(dest, src, n);
370 __msan_move_poison(dest, src, n * sizeof(wchar_t));
371 return res;
372}
373
374INTERCEPTOR(int, wcscmp, const wchar_t *s1, const wchar_t *s2) {
375 ENSURE_MSAN_INITED();
376 int res = REAL(wcscmp)(s1, s2);
377 return res;
378}
379
380INTERCEPTOR(double, wcstod, const wchar_t *nptr, wchar_t **endptr) {
381 ENSURE_MSAN_INITED();
382 double res = REAL(wcstod)(nptr, endptr);
383 __msan_unpoison(endptr, sizeof(*endptr));
384 return res;
385}
386
387// #define UNSUPPORTED(name) \
388// INTERCEPTOR(void, name, void) { \
389// Printf("MSAN: Unsupported %s\n", __FUNCTION__); \
390// Die(); \
391// }
392
393// FIXME: intercept the following functions:
394// Note, they only matter when running without a dynamic tool.
395// UNSUPPORTED(wcscoll_l)
396// UNSUPPORTED(wcsnrtombs)
397// UNSUPPORTED(wcstol)
398// UNSUPPORTED(wcstoll)
399// UNSUPPORTED(wcstold)
400// UNSUPPORTED(wcstoul)
401// UNSUPPORTED(wcstoull)
402// UNSUPPORTED(wcsxfrm_l)
403// UNSUPPORTED(wcsdup)
404// UNSUPPORTED(wcsftime)
405// UNSUPPORTED(wcsstr)
406// UNSUPPORTED(wcsrchr)
407// UNSUPPORTED(wctob)
408
409INTERCEPTOR(int, gettimeofday, void *tv, void *tz) {
410 ENSURE_MSAN_INITED();
411 int res = REAL(gettimeofday)(tv, tz);
412 if (tv)
413 __msan_unpoison(tv, 16);
414 if (tz)
415 __msan_unpoison(tz, 8);
416 return res;
417}
418
419INTERCEPTOR(char *, fcvt, double x, int a, int *b, int *c) {
420 ENSURE_MSAN_INITED();
421 char *res = REAL(fcvt)(x, a, b, c);
422 if (!__msan_has_dynamic_component()) {
423 __msan_unpoison(b, sizeof(*b));
424 __msan_unpoison(c, sizeof(*c));
425 }
426 return res;
427}
428
429INTERCEPTOR(char *, getenv, char *name) {
430 ENSURE_MSAN_INITED();
431 char *res = REAL(getenv)(name);
432 if (!__msan_has_dynamic_component()) {
433 if (res)
434 __msan_unpoison(res, REAL(strlen)(res) + 1);
435 }
436 return res;
437}
438
439INTERCEPTOR(int, __fxstat, int magic, int fd, void *buf) {
440 ENSURE_MSAN_INITED();
441 int res = REAL(__fxstat)(magic, fd, buf);
442 if (!res)
443 __msan_unpoison(buf, __msan::struct_stat_sz);
444 return res;
445}
446
447INTERCEPTOR(int, __fxstat64, int magic, int fd, void *buf) {
448 ENSURE_MSAN_INITED();
449 int res = REAL(__fxstat64)(magic, fd, buf);
450 if (!res)
451 __msan_unpoison(buf, __msan::struct_stat64_sz);
452 return res;
453}
454
455INTERCEPTOR(int, __xstat, int magic, char *path, void *buf) {
456 ENSURE_MSAN_INITED();
457 int res = REAL(__xstat)(magic, path, buf);
458 if (!res)
459 __msan_unpoison(buf, __msan::struct_stat_sz);
460 return res;
461}
462
463INTERCEPTOR(int, __xstat64, int magic, char *path, void *buf) {
464 ENSURE_MSAN_INITED();
465 int res = REAL(__xstat64)(magic, path, buf);
466 if (!res)
467 __msan_unpoison(buf, __msan::struct_stat64_sz);
468 return res;
469}
470
471INTERCEPTOR(int, __lxstat, int magic, char *path, void *buf) {
472 ENSURE_MSAN_INITED();
473 int res = REAL(__lxstat)(magic, path, buf);
474 if (!res)
475 __msan_unpoison(buf, __msan::struct_stat_sz);
476 return res;
477}
478
479INTERCEPTOR(int, __lxstat64, int magic, char *path, void *buf) {
480 ENSURE_MSAN_INITED();
481 int res = REAL(__lxstat64)(magic, path, buf);
482 if (!res)
483 __msan_unpoison(buf, __msan::struct_stat64_sz);
484 return res;
485}
486
487INTERCEPTOR(int, pipe, int pipefd[2]) {
488 if (msan_init_is_running)
489 return REAL(pipe)(pipefd);
490 ENSURE_MSAN_INITED();
491 int res = REAL(pipe)(pipefd);
492 if (!res)
493 __msan_unpoison(pipefd, sizeof(int[2]));
494 return res;
495}
496
497INTERCEPTOR(int, wait, int *status) {
498 ENSURE_MSAN_INITED();
499 int res = REAL(wait)(status);
500 if (status)
501 __msan_unpoison(status, sizeof(*status));
502 return res;
503}
504
505INTERCEPTOR(int, waitpid, int pid, int *status, int options) {
506 ENSURE_MSAN_INITED();
507 int res = REAL(waitpid)(pid, status, options);
508 if (status)
509 __msan_unpoison(status, sizeof(*status));
510 return res;
511}
512
513INTERCEPTOR(char *, fgets, char *s, int size, void *stream) {
514 ENSURE_MSAN_INITED();
515 char *res = REAL(fgets)(s, size, stream);
516 if (res)
517 __msan_unpoison(s, REAL(strlen)(s) + 1);
518 return res;
519}
520
521INTERCEPTOR(char *, fgets_unlocked, char *s, int size, void *stream) {
522 ENSURE_MSAN_INITED();
523 char *res = REAL(fgets_unlocked)(s, size, stream);
524 if (res)
525 __msan_unpoison(s, REAL(strlen)(s) + 1);
526 return res;
527}
528
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000529INTERCEPTOR(char *, getcwd, char *buf, SIZE_T size) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000530 ENSURE_MSAN_INITED();
531 char *res = REAL(getcwd)(buf, size);
532 if (res)
533 __msan_unpoison(buf, REAL(strlen)(buf) + 1);
534 return res;
535}
536
537INTERCEPTOR(char *, realpath, char *path, char *abspath) {
538 ENSURE_MSAN_INITED();
539 char *res = REAL(realpath)(path, abspath);
540 if (res)
541 __msan_unpoison(abspath, REAL(strlen)(abspath) + 1);
542 return res;
543}
544
545INTERCEPTOR(int, getrlimit, int resource, void *rlim) {
546 if (msan_init_is_running)
547 return REAL(getrlimit)(resource, rlim);
548 ENSURE_MSAN_INITED();
549 int res = REAL(getrlimit)(resource, rlim);
550 if (!res)
551 __msan_unpoison(rlim, __msan::struct_rlimit_sz);
552 return res;
553}
554
555INTERCEPTOR(int, getrlimit64, int resource, void *rlim) {
556 if (msan_init_is_running)
557 return REAL(getrlimit64)(resource, rlim);
558 ENSURE_MSAN_INITED();
559 int res = REAL(getrlimit64)(resource, rlim);
560 if (!res)
561 __msan_unpoison(rlim, __msan::struct_rlimit64_sz);
562 return res;
563}
564
565INTERCEPTOR(int, statfs, const char *s, void *buf) {
566 ENSURE_MSAN_INITED();
567 int res = REAL(statfs)(s, buf);
568 if (!res)
569 __msan_unpoison(buf, __msan::struct_statfs_sz);
570 return res;
571}
572
573INTERCEPTOR(int, fstatfs, int fd, void *buf) {
574 ENSURE_MSAN_INITED();
575 int res = REAL(fstatfs)(fd, buf);
576 if (!res)
577 __msan_unpoison(buf, __msan::struct_statfs_sz);
578 return res;
579}
580
581INTERCEPTOR(int, statfs64, const char *s, void *buf) {
582 ENSURE_MSAN_INITED();
583 int res = REAL(statfs64)(s, buf);
584 if (!res)
585 __msan_unpoison(buf, __msan::struct_statfs64_sz);
586 return res;
587}
588
589INTERCEPTOR(int, fstatfs64, int fd, void *buf) {
590 ENSURE_MSAN_INITED();
591 int res = REAL(fstatfs64)(fd, buf);
592 if (!res)
593 __msan_unpoison(buf, __msan::struct_statfs64_sz);
594 return res;
595}
596
597INTERCEPTOR(int, uname, void *utsname) {
598 ENSURE_MSAN_INITED();
599 int res = REAL(uname)(utsname);
600 if (!res) {
601 __msan_unpoison(utsname, __msan::struct_utsname_sz);
602 }
603 return res;
604}
605
606INTERCEPTOR(int, epoll_wait, int epfd, void *events, int maxevents,
607 int timeout) {
608 ENSURE_MSAN_INITED();
609 int res = REAL(epoll_wait)(epfd, events, maxevents, timeout);
610 if (res > 0) {
611 __msan_unpoison(events, __msan::struct_epoll_event_sz * res);
612 }
613 return res;
614}
615
616INTERCEPTOR(int, epoll_pwait, int epfd, void *events, int maxevents,
617 int timeout, void *sigmask) {
618 ENSURE_MSAN_INITED();
619 int res = REAL(epoll_pwait)(epfd, events, maxevents, timeout, sigmask);
620 if (res > 0) {
621 __msan_unpoison(events, __msan::struct_epoll_event_sz * res);
622 }
623 return res;
624}
625
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000626INTERCEPTOR(SSIZE_T, recv, int fd, void *buf, SIZE_T len, int flags) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000627 ENSURE_MSAN_INITED();
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000628 SSIZE_T res = REAL(recv)(fd, buf, len, flags);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000629 if (res > 0)
630 __msan_unpoison(buf, res);
631 return res;
632}
633
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000634INTERCEPTOR(SSIZE_T, recvfrom, int fd, void *buf, SIZE_T len, int flags,
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000635 void *srcaddr, void *addrlen) {
636 ENSURE_MSAN_INITED();
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000637 SSIZE_T res = REAL(recvfrom)(fd, buf, len, flags, srcaddr, addrlen);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000638 if (res > 0)
639 __msan_unpoison(buf, res);
640 return res;
641}
642
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000643INTERCEPTOR(SSIZE_T, recvmsg, int fd, struct msghdr *msg, int flags) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000644 ENSURE_MSAN_INITED();
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000645 SSIZE_T res = REAL(recvmsg)(fd, msg, flags);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000646 if (res > 0) {
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000647 for (SIZE_T i = 0; i < __msan_get_msghdr_iovlen(msg); ++i)
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000648 __msan_unpoison(__msan_get_msghdr_iov_iov_base(msg, i),
649 __msan_get_msghdr_iov_iov_len(msg, i));
650 }
651 return res;
652}
653
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000654INTERCEPTOR(void *, calloc, SIZE_T nmemb, SIZE_T size) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000655 GET_MALLOC_STACK_TRACE;
656 if (!msan_inited) {
657 // Hack: dlsym calls calloc before REAL(calloc) is retrieved from dlsym.
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000658 const SIZE_T kCallocPoolSize = 1024;
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000659 static uptr calloc_memory_for_dlsym[kCallocPoolSize];
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000660 static SIZE_T allocated;
661 SIZE_T size_in_words = ((nmemb * size) + kWordSize - 1) / kWordSize;
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000662 void *mem = (void*)&calloc_memory_for_dlsym[allocated];
663 allocated += size_in_words;
664 CHECK(allocated < kCallocPoolSize);
665 return mem;
666 }
667 return MsanReallocate(&stack, 0, nmemb * size, sizeof(u64), true);
668}
669
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000670INTERCEPTOR(void *, realloc, void *ptr, SIZE_T size) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000671 GET_MALLOC_STACK_TRACE;
672 return MsanReallocate(&stack, ptr, size, sizeof(u64), false);
673}
674
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000675INTERCEPTOR(void *, malloc, SIZE_T size) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000676 GET_MALLOC_STACK_TRACE;
677 return MsanReallocate(&stack, 0, size, sizeof(u64), false);
678}
679
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000680INTERCEPTOR(void *, mmap, void *addr, SIZE_T length, int prot, int flags,
681 int fd, OFF_T offset) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000682 ENSURE_MSAN_INITED();
683 void *res = REAL(mmap)(addr, length, prot, flags, fd, offset);
684 if (res != (void*)-1)
685 __msan_unpoison(res, RoundUpTo(length, GetPageSize()));
686 return res;
687}
688
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000689INTERCEPTOR(void *, mmap64, void *addr, SIZE_T length, int prot, int flags,
690 int fd, OFF64_T offset) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000691 ENSURE_MSAN_INITED();
692 void *res = REAL(mmap64)(addr, length, prot, flags, fd, offset);
693 if (res != (void*)-1)
694 __msan_unpoison(res, RoundUpTo(length, GetPageSize()));
695 return res;
696}
697
698// static
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000699void *fast_memset(void *ptr, int c, SIZE_T n) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000700 // hack until we have a really fast internal_memset
701 if (sizeof(uptr) == 8 &&
702 (n % 8) == 0 &&
703 ((uptr)ptr % 8) == 0 &&
704 (c == 0 || c == -1)) {
705 // Printf("memset %p %zd %x\n", ptr, n, c);
706 uptr to_store = c ? -1L : 0L;
707 uptr *p = (uptr*)ptr;
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000708 for (SIZE_T i = 0; i < n / 8; i++)
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000709 p[i] = to_store;
710 return ptr;
711 }
712 return internal_memset(ptr, c, n);
713}
714
715// static
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000716void *fast_memcpy(void *dst, const void *src, SIZE_T n) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000717 // Same hack as in fast_memset above.
718 if (sizeof(uptr) == 8 &&
719 (n % 8) == 0 &&
720 ((uptr)dst % 8) == 0 &&
721 ((uptr)src % 8) == 0) {
722 uptr *d = (uptr*)dst;
723 uptr *s = (uptr*)src;
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000724 for (SIZE_T i = 0; i < n / 8; i++)
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000725 d[i] = s[i];
726 return dst;
727 }
728 return internal_memcpy(dst, src, n);
729}
730
731// These interface functions reside here so that they can use
732// fast_memset, etc.
733void __msan_unpoison(void *a, uptr size) {
734 if (!MEM_IS_APP(a)) return;
735 fast_memset((void*)MEM_TO_SHADOW((uptr)a), 0, size);
736}
737
738void __msan_poison(void *a, uptr size) {
739 if (!MEM_IS_APP(a)) return;
740 fast_memset((void*)MEM_TO_SHADOW((uptr)a),
741 __msan::flags()->poison_heap_with_zeroes ? 0 : -1, size);
742}
743
744void __msan_poison_stack(void *a, uptr size) {
745 if (!MEM_IS_APP(a)) return;
746 fast_memset((void*)MEM_TO_SHADOW((uptr)a),
747 __msan::flags()->poison_stack_with_zeroes ? 0 : -1, size);
748}
749
750void __msan_clear_and_unpoison(void *a, uptr size) {
751 fast_memset(a, 0, size);
752 fast_memset((void*)MEM_TO_SHADOW((uptr)a), 0, size);
753}
754
755void __msan_copy_origin(void *dst, const void *src, uptr size) {
756 if (!__msan_get_track_origins()) return;
757 if (!MEM_IS_APP(dst) || !MEM_IS_APP(src)) return;
758 uptr d = MEM_TO_ORIGIN(dst);
759 uptr s = MEM_TO_ORIGIN(src);
760 uptr beg = d & ~3UL; // align down.
761 uptr end = (d + size + 3) & ~3UL; // align up.
762 s = s & ~3UL; // align down.
763 fast_memcpy((void*)beg, (void*)s, end - beg);
764}
765
766void __msan_copy_poison(void *dst, const void *src, uptr size) {
767 if (!MEM_IS_APP(dst)) return;
768 if (!MEM_IS_APP(src)) return;
769 fast_memcpy((void*)MEM_TO_SHADOW((uptr)dst),
770 (void*)MEM_TO_SHADOW((uptr)src), size);
771 __msan_copy_origin(dst, src, size);
772}
773
774void __msan_move_poison(void *dst, const void *src, uptr size) {
775 if (!MEM_IS_APP(dst)) return;
776 if (!MEM_IS_APP(src)) return;
777 internal_memmove((void*)MEM_TO_SHADOW((uptr)dst),
778 (void*)MEM_TO_SHADOW((uptr)src), size);
779 __msan_copy_origin(dst, src, size);
780}
781
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000782void *__msan_memcpy(void *dest, const void *src, SIZE_T n) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000783 ENSURE_MSAN_INITED();
784 void *res = fast_memcpy(dest, src, n);
785 __msan_copy_poison(dest, src, n);
786 return res;
787}
788
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000789void *__msan_memset(void *s, int c, SIZE_T n) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000790 ENSURE_MSAN_INITED();
791 void *res = fast_memset(s, c, n);
792 __msan_unpoison(s, n);
793 return res;
794}
795
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000796void *__msan_memmove(void *dest, const void *src, SIZE_T n) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000797 ENSURE_MSAN_INITED();
798 void *res = REAL(memmove)(dest, src, n);
799 __msan_move_poison(dest, src, n);
800 return res;
801}
802
803namespace __msan {
804void InitializeInterceptors() {
805 static int inited = 0;
806 CHECK_EQ(inited, 0);
807 CHECK(INTERCEPT_FUNCTION(mmap));
808 CHECK(INTERCEPT_FUNCTION(mmap64));
809 CHECK(INTERCEPT_FUNCTION(posix_memalign));
810 CHECK(INTERCEPT_FUNCTION(malloc));
811 CHECK(INTERCEPT_FUNCTION(calloc));
812 CHECK(INTERCEPT_FUNCTION(realloc));
813 CHECK(INTERCEPT_FUNCTION(free));
814 CHECK(INTERCEPT_FUNCTION(fread));
815 CHECK(INTERCEPT_FUNCTION(fread_unlocked));
816 CHECK(INTERCEPT_FUNCTION(read));
817 CHECK(INTERCEPT_FUNCTION(pread));
818 CHECK(INTERCEPT_FUNCTION(pread64));
819 CHECK(INTERCEPT_FUNCTION(readlink));
820 CHECK(INTERCEPT_FUNCTION(readdir));
821 CHECK(INTERCEPT_FUNCTION(memcpy));
822 CHECK(INTERCEPT_FUNCTION(memset));
823 CHECK(INTERCEPT_FUNCTION(memmove));
824 CHECK(INTERCEPT_FUNCTION(wmemset));
825 CHECK(INTERCEPT_FUNCTION(wmemcpy));
826 CHECK(INTERCEPT_FUNCTION(wmemmove));
827 CHECK(INTERCEPT_FUNCTION(strcpy)); // NOLINT
828 CHECK(INTERCEPT_FUNCTION(strdup));
829 CHECK(INTERCEPT_FUNCTION(strncpy)); // NOLINT
830 CHECK(INTERCEPT_FUNCTION(strlen));
831 CHECK(INTERCEPT_FUNCTION(strnlen));
832 CHECK(INTERCEPT_FUNCTION(gcvt));
833 CHECK(INTERCEPT_FUNCTION(strcat)); // NOLINT
834 CHECK(INTERCEPT_FUNCTION(strncat)); // NOLINT
835 CHECK(INTERCEPT_FUNCTION(strtol));
836 CHECK(INTERCEPT_FUNCTION(strtoll));
837 CHECK(INTERCEPT_FUNCTION(strtoul));
838 CHECK(INTERCEPT_FUNCTION(strtoull));
839 CHECK(INTERCEPT_FUNCTION(vsprintf));
840 CHECK(INTERCEPT_FUNCTION(vsnprintf));
841 CHECK(INTERCEPT_FUNCTION(vswprintf));
842 CHECK(INTERCEPT_FUNCTION(sprintf)); // NOLINT
843 CHECK(INTERCEPT_FUNCTION(snprintf));
844 CHECK(INTERCEPT_FUNCTION(swprintf));
845 CHECK(INTERCEPT_FUNCTION(strftime));
846 CHECK(INTERCEPT_FUNCTION(wcstombs));
847 CHECK(INTERCEPT_FUNCTION(mbstowcs));
848 CHECK(INTERCEPT_FUNCTION(wcslen));
849 CHECK(INTERCEPT_FUNCTION(wcschr));
850 CHECK(INTERCEPT_FUNCTION(wcscpy));
851 CHECK(INTERCEPT_FUNCTION(wcscmp));
852 CHECK(INTERCEPT_FUNCTION(wcstod));
853 CHECK(INTERCEPT_FUNCTION(getenv));
854 CHECK(INTERCEPT_FUNCTION(gettimeofday));
855 CHECK(INTERCEPT_FUNCTION(fcvt));
856 CHECK(INTERCEPT_FUNCTION(__fxstat));
857 CHECK(INTERCEPT_FUNCTION(__xstat));
858 CHECK(INTERCEPT_FUNCTION(__lxstat));
859 CHECK(INTERCEPT_FUNCTION(__fxstat64));
860 CHECK(INTERCEPT_FUNCTION(__xstat64));
861 CHECK(INTERCEPT_FUNCTION(__lxstat64));
862 CHECK(INTERCEPT_FUNCTION(pipe));
863 CHECK(INTERCEPT_FUNCTION(wait));
864 CHECK(INTERCEPT_FUNCTION(waitpid));
865 CHECK(INTERCEPT_FUNCTION(fgets));
866 CHECK(INTERCEPT_FUNCTION(fgets_unlocked));
867 CHECK(INTERCEPT_FUNCTION(getcwd));
868 CHECK(INTERCEPT_FUNCTION(realpath));
869 CHECK(INTERCEPT_FUNCTION(getrlimit));
870 CHECK(INTERCEPT_FUNCTION(getrlimit64));
871 CHECK(INTERCEPT_FUNCTION(statfs));
872 CHECK(INTERCEPT_FUNCTION(fstatfs));
873 CHECK(INTERCEPT_FUNCTION(statfs64));
874 CHECK(INTERCEPT_FUNCTION(fstatfs64));
875 CHECK(INTERCEPT_FUNCTION(uname));
876 CHECK(INTERCEPT_FUNCTION(epoll_wait));
877 CHECK(INTERCEPT_FUNCTION(epoll_pwait));
878 CHECK(INTERCEPT_FUNCTION(recv));
879 CHECK(INTERCEPT_FUNCTION(recvfrom));
880 CHECK(INTERCEPT_FUNCTION(recvmsg));
881 inited = 1;
882}
883} // namespace __msan