blob: bbdf18e162a3874a0bd71026a740ce7780891e21 [file] [log] [blame]
Evgeniy Stepanovc5033782012-12-11 12:27:27 +00001//===-- msan_interceptors.cc ----------------------------------------------===//
2//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9//
10// This file is a part of MemorySanitizer.
11//
12// Interceptors for standard library functions.
Kostya Serebryany9a58d392012-12-12 09:54:35 +000013//
14// FIXME: move as many interceptors as possible into
15// sanitizer_common/sanitizer_common_interceptors.h
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000016//===----------------------------------------------------------------------===//
17
Evgeniy Stepanov7555f5e2014-11-18 10:33:15 +000018#include "interception/interception.h"
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000019#include "msan.h"
Evgeniy Stepanov208aae82014-05-21 09:02:13 +000020#include "msan_chained_origin_depot.h"
21#include "msan_origin.h"
Evgeniy Stepanovf653cda2014-04-04 09:47:41 +000022#include "msan_thread.h"
Evgeniy Stepanovea61d082013-02-19 09:19:16 +000023#include "sanitizer_common/sanitizer_platform_limits_posix.h"
Kostya Serebryanyfa79cd62013-01-25 11:46:22 +000024#include "sanitizer_common/sanitizer_allocator.h"
Alexey Samsonov91bb8e02014-07-07 17:39:31 +000025#include "sanitizer_common/sanitizer_allocator_interface.h"
Evgeniy Stepanov022235c2013-09-27 11:32:21 +000026#include "sanitizer_common/sanitizer_allocator_internal.h"
Evgeniy Stepanovbb25af52013-08-27 11:34:05 +000027#include "sanitizer_common/sanitizer_atomic.h"
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000028#include "sanitizer_common/sanitizer_common.h"
Evgeniy Stepanov9f7e8c12013-01-28 13:52:49 +000029#include "sanitizer_common/sanitizer_stackdepot.h"
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000030#include "sanitizer_common/sanitizer_libc.h"
Evgeniy Stepanovb4a218d2013-03-19 09:30:52 +000031#include "sanitizer_common/sanitizer_linux.h"
Evgeniy Stepanov7ad0bde2014-06-25 11:30:35 +000032#include "sanitizer_common/sanitizer_tls_get_addr.h"
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000033
34#include <stdarg.h>
35// ACHTUNG! No other system header includes in this file.
36// Ideally, we should get rid of stdarg.h as well.
37
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000038using namespace __msan;
39
Evgeniy Stepanovbb25af52013-08-27 11:34:05 +000040using __sanitizer::memory_order;
41using __sanitizer::atomic_load;
42using __sanitizer::atomic_store;
43using __sanitizer::atomic_uintptr_t;
44
Viktor Kutuzov38ec0482014-11-26 10:51:49 +000045#if SANITIZER_FREEBSD
46#define __errno_location __error
47#endif
48
Evgeniy Stepanovbfd21222013-05-22 12:50:26 +000049// True if this is a nested interceptor.
50static THREADLOCAL int in_interceptor_scope;
51
Evgeniy Stepanov791a7e12014-02-10 09:37:03 +000052extern "C" int *__errno_location(void);
53
Evgeniy Stepanovbfd21222013-05-22 12:50:26 +000054struct InterceptorScope {
55 InterceptorScope() { ++in_interceptor_scope; }
56 ~InterceptorScope() { --in_interceptor_scope; }
57};
58
59bool IsInInterceptorScope() {
60 return in_interceptor_scope;
61}
62
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000063#define ENSURE_MSAN_INITED() do { \
Alexey Samsonovcd1e68e2012-12-14 11:52:02 +000064 CHECK(!msan_init_is_running); \
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000065 if (!msan_inited) { \
66 __msan_init(); \
67 } \
68} while (0)
69
Evgeniy Stepanovbfd21222013-05-22 12:50:26 +000070// Check that [x, x+n) range is unpoisoned.
Alexey Samsonov4925fd42014-11-13 22:40:59 +000071#define CHECK_UNPOISONED_0(x, n) \
72 do { \
73 sptr offset = __msan_test_shadow(x, n); \
74 if (__msan::IsInSymbolizer()) \
75 break; \
76 if (offset >= 0 && __msan::flags()->report_umrs) { \
77 GET_CALLER_PC_BP_SP; \
78 (void) sp; \
79 ReportUMRInsideAddressRange(__func__, x, n, offset); \
80 __msan::PrintWarningWithOrigin( \
81 pc, bp, __msan_get_origin((const char *)x + offset)); \
82 if (__msan::flags()->halt_on_error) { \
83 Printf("Exiting\n"); \
84 Die(); \
85 } \
86 } \
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000087 } while (0)
88
Evgeniy Stepanovbfd21222013-05-22 12:50:26 +000089// Check that [x, x+n) range is unpoisoned unless we are in a nested
90// interceptor.
Evgeniy Stepanovdec0f762013-06-28 11:02:43 +000091#define CHECK_UNPOISONED(x, n) \
92 do { \
93 if (!IsInInterceptorScope()) CHECK_UNPOISONED_0(x, n); \
94 } while (0);
Evgeniy Stepanovbfd21222013-05-22 12:50:26 +000095
Kostya Serebryany07bb3922012-12-13 06:31:40 +000096INTERCEPTOR(SIZE_T, fread, void *ptr, SIZE_T size, SIZE_T nmemb, void *file) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000097 ENSURE_MSAN_INITED();
Kostya Serebryany07bb3922012-12-13 06:31:40 +000098 SIZE_T res = REAL(fread)(ptr, size, nmemb, file);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +000099 if (res > 0)
100 __msan_unpoison(ptr, res *size);
101 return res;
102}
103
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000104#if !SANITIZER_FREEBSD
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000105INTERCEPTOR(SIZE_T, fread_unlocked, void *ptr, SIZE_T size, SIZE_T nmemb,
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000106 void *file) {
107 ENSURE_MSAN_INITED();
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000108 SIZE_T res = REAL(fread_unlocked)(ptr, size, nmemb, file);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000109 if (res > 0)
110 __msan_unpoison(ptr, res *size);
111 return res;
112}
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000113#define MSAN_MAYBE_INTERCEPT_FREAD_UNLOCKED INTERCEPT_FUNCTION(fread_unlocked)
114#else
115#define MSAN_MAYBE_INTERCEPT_FREAD_UNLOCKED
116#endif
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000117
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000118INTERCEPTOR(SSIZE_T, readlink, const char *path, char *buf, SIZE_T bufsiz) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000119 ENSURE_MSAN_INITED();
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000120 SSIZE_T res = REAL(readlink)(path, buf, bufsiz);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000121 if (res > 0)
122 __msan_unpoison(buf, res);
123 return res;
124}
125
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000126INTERCEPTOR(void *, memcpy, void *dest, const void *src, SIZE_T n) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000127 return __msan_memcpy(dest, src, n);
128}
129
Evgeniy Stepanovaa23bd82013-07-02 14:49:24 +0000130INTERCEPTOR(void *, mempcpy, void *dest, const void *src, SIZE_T n) {
131 return (char *)__msan_memcpy(dest, src, n) + n;
132}
133
Evgeniy Stepanov365bd0c2013-11-01 23:49:48 +0000134INTERCEPTOR(void *, memccpy, void *dest, const void *src, int c, SIZE_T n) {
135 ENSURE_MSAN_INITED();
136 void *res = REAL(memccpy)(dest, src, c, n);
137 CHECK(!res || (res >= dest && res <= (char *)dest + n));
138 SIZE_T sz = res ? (char *)res - (char *)dest : n;
139 CHECK_UNPOISONED(src, sz);
140 __msan_unpoison(dest, sz);
141 return res;
142}
143
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000144INTERCEPTOR(void *, memmove, void *dest, const void *src, SIZE_T n) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000145 return __msan_memmove(dest, src, n);
146}
147
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000148INTERCEPTOR(void *, memset, void *s, int c, SIZE_T n) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000149 return __msan_memset(s, c, n);
150}
151
Evgeniy Stepanovdb615c12013-07-04 13:19:41 +0000152INTERCEPTOR(void *, bcopy, const void *src, void *dest, SIZE_T n) {
153 return __msan_memmove(dest, src, n);
154}
155
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000156INTERCEPTOR(int, posix_memalign, void **memptr, SIZE_T alignment, SIZE_T size) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000157 GET_MALLOC_STACK_TRACE;
158 CHECK_EQ(alignment & (alignment - 1), 0);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000159 CHECK_NE(memptr, 0);
Evgeniy Stepanov455abf42013-04-23 13:27:36 +0000160 *memptr = MsanReallocate(&stack, 0, size, alignment, false);
161 CHECK_NE(*memptr, 0);
162 __msan_unpoison(memptr, sizeof(*memptr));
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000163 return 0;
164}
165
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000166#if !SANITIZER_FREEBSD
Evgeniy Stepanove3eaa7b2013-09-02 09:24:53 +0000167INTERCEPTOR(void *, memalign, SIZE_T boundary, SIZE_T size) {
168 GET_MALLOC_STACK_TRACE;
169 CHECK_EQ(boundary & (boundary - 1), 0);
170 void *ptr = MsanReallocate(&stack, 0, size, boundary, false);
171 return ptr;
172}
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000173#define MSAN_MAYBE_INTERCEPT_MEMALIGN INTERCEPT_FUNCTION(memalign)
174#else
175#define MSAN_MAYBE_INTERCEPT_MEMALIGN
176#endif
Evgeniy Stepanove3eaa7b2013-09-02 09:24:53 +0000177
Kostya Serebryany7c163a42014-07-04 07:30:34 +0000178INTERCEPTOR(void *, aligned_alloc, SIZE_T boundary, SIZE_T size) {
179 GET_MALLOC_STACK_TRACE;
180 CHECK_EQ(boundary & (boundary - 1), 0);
181 void *ptr = MsanReallocate(&stack, 0, size, boundary, false);
182 return ptr;
183}
184
Evgeniy Stepanov7ad0bde2014-06-25 11:30:35 +0000185INTERCEPTOR(void *, __libc_memalign, SIZE_T boundary, SIZE_T size) {
186 GET_MALLOC_STACK_TRACE;
187 CHECK_EQ(boundary & (boundary - 1), 0);
188 void *ptr = MsanReallocate(&stack, 0, size, boundary, false);
189 DTLS_on_libc_memalign(ptr, size * boundary);
190 return ptr;
191}
Kostya Serebryanye402b432014-01-24 09:14:11 +0000192
Evgeniy Stepanove3eaa7b2013-09-02 09:24:53 +0000193INTERCEPTOR(void *, valloc, SIZE_T size) {
194 GET_MALLOC_STACK_TRACE;
195 void *ptr = MsanReallocate(&stack, 0, size, GetPageSizeCached(), false);
196 return ptr;
197}
198
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000199#if !SANITIZER_FREEBSD
Evgeniy Stepanove3eaa7b2013-09-02 09:24:53 +0000200INTERCEPTOR(void *, pvalloc, SIZE_T size) {
201 GET_MALLOC_STACK_TRACE;
202 uptr PageSize = GetPageSizeCached();
203 size = RoundUpTo(size, PageSize);
204 if (size == 0) {
205 // pvalloc(0) should allocate one page.
206 size = PageSize;
207 }
208 void *ptr = MsanReallocate(&stack, 0, size, PageSize, false);
209 return ptr;
210}
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000211#define MSAN_MAYBE_INTERCEPT_PVALLOC INTERCEPT_FUNCTION(pvalloc)
212#else
213#define MSAN_MAYBE_INTERCEPT_PVALLOC
214#endif
Evgeniy Stepanove3eaa7b2013-09-02 09:24:53 +0000215
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000216INTERCEPTOR(void, free, void *ptr) {
Evgeniy Stepanov65562f52013-09-16 11:03:31 +0000217 GET_MALLOC_STACK_TRACE;
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000218 if (ptr == 0) return;
Evgeniy Stepanov65562f52013-09-16 11:03:31 +0000219 MsanDeallocate(&stack, ptr);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000220}
221
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000222#if !SANITIZER_FREEBSD
Evgeniy Stepanov9dcd5a32014-03-27 13:29:29 +0000223INTERCEPTOR(void, cfree, void *ptr) {
224 GET_MALLOC_STACK_TRACE;
225 if (ptr == 0) return;
226 MsanDeallocate(&stack, ptr);
227}
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000228#define MSAN_MAYBE_INTERCEPT_CFREE INTERCEPT_FUNCTION(cfree)
229#else
230#define MSAN_MAYBE_INTERCEPT_CFREE
231#endif
Evgeniy Stepanov9dcd5a32014-03-27 13:29:29 +0000232
233INTERCEPTOR(uptr, malloc_usable_size, void *ptr) {
Alexey Samsonov91bb8e02014-07-07 17:39:31 +0000234 return __sanitizer_get_allocated_size(ptr);
Evgeniy Stepanov9dcd5a32014-03-27 13:29:29 +0000235}
236
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000237#if !SANITIZER_FREEBSD
Evgeniy Stepanov9dcd5a32014-03-27 13:29:29 +0000238// This function actually returns a struct by value, but we can't unpoison a
239// temporary! The following is equivalent on all supported platforms, and we
240// have a test to confirm that.
241INTERCEPTOR(void, mallinfo, __sanitizer_mallinfo *sret) {
242 REAL(memset)(sret, 0, sizeof(*sret));
243 __msan_unpoison(sret, sizeof(*sret));
244}
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000245#define MSAN_MAYBE_INTERCEPT_MALLINFO INTERCEPT_FUNCTION(mallinfo)
246#else
247#define MSAN_MAYBE_INTERCEPT_MALLINFO
248#endif
Evgeniy Stepanov9dcd5a32014-03-27 13:29:29 +0000249
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000250#if !SANITIZER_FREEBSD
Evgeniy Stepanov9dcd5a32014-03-27 13:29:29 +0000251INTERCEPTOR(int, mallopt, int cmd, int value) {
252 return -1;
253}
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000254#define MSAN_MAYBE_INTERCEPT_MALLOPT INTERCEPT_FUNCTION(mallopt)
255#else
256#define MSAN_MAYBE_INTERCEPT_MALLOPT
257#endif
Evgeniy Stepanov9dcd5a32014-03-27 13:29:29 +0000258
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000259#if !SANITIZER_FREEBSD
Evgeniy Stepanov9dcd5a32014-03-27 13:29:29 +0000260INTERCEPTOR(void, malloc_stats, void) {
261 // FIXME: implement, but don't call REAL(malloc_stats)!
262}
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000263#define MSAN_MAYBE_INTERCEPT_MALLOC_STATS INTERCEPT_FUNCTION(malloc_stats)
264#else
265#define MSAN_MAYBE_INTERCEPT_MALLOC_STATS
266#endif
Evgeniy Stepanov9dcd5a32014-03-27 13:29:29 +0000267
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000268INTERCEPTOR(SIZE_T, strlen, const char *s) {
Viktor Kutuzovd9779852014-11-27 14:28:57 +0000269 if (msan_init_is_running)
270 return REAL(strlen)(s);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000271 ENSURE_MSAN_INITED();
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000272 SIZE_T res = REAL(strlen)(s);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000273 CHECK_UNPOISONED(s, res + 1);
274 return res;
275}
276
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000277INTERCEPTOR(SIZE_T, strnlen, const char *s, SIZE_T n) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000278 ENSURE_MSAN_INITED();
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000279 SIZE_T res = REAL(strnlen)(s, n);
280 SIZE_T scan_size = (res == n) ? res : res + 1;
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000281 CHECK_UNPOISONED(s, scan_size);
282 return res;
283}
284
285// FIXME: Add stricter shadow checks in str* interceptors (ex.: strcpy should
286// check the shadow of the terminating \0 byte).
287
288INTERCEPTOR(char *, strcpy, char *dest, const char *src) { // NOLINT
289 ENSURE_MSAN_INITED();
Evgeniy Stepanov412d9732014-03-18 13:45:19 +0000290 GET_STORE_STACK_TRACE;
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000291 SIZE_T n = REAL(strlen)(src);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000292 char *res = REAL(strcpy)(dest, src); // NOLINT
Evgeniy Stepanov412d9732014-03-18 13:45:19 +0000293 CopyPoison(dest, src, n + 1, &stack);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000294 return res;
295}
296
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000297INTERCEPTOR(char *, strncpy, char *dest, const char *src, SIZE_T n) { // NOLINT
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000298 ENSURE_MSAN_INITED();
Evgeniy Stepanov412d9732014-03-18 13:45:19 +0000299 GET_STORE_STACK_TRACE;
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000300 SIZE_T copy_size = REAL(strnlen)(src, n);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000301 if (copy_size < n)
302 copy_size++; // trailing \0
303 char *res = REAL(strncpy)(dest, src, n); // NOLINT
Evgeniy Stepanov412d9732014-03-18 13:45:19 +0000304 CopyPoison(dest, src, copy_size, &stack);
Alexey Samsonovd6906e42014-07-22 00:10:08 +0000305 __msan_unpoison(dest + copy_size, n - copy_size);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000306 return res;
307}
308
Evgeniy Stepanov654688b2013-07-01 15:19:37 +0000309INTERCEPTOR(char *, stpcpy, char *dest, const char *src) { // NOLINT
310 ENSURE_MSAN_INITED();
Evgeniy Stepanov412d9732014-03-18 13:45:19 +0000311 GET_STORE_STACK_TRACE;
Evgeniy Stepanov654688b2013-07-01 15:19:37 +0000312 SIZE_T n = REAL(strlen)(src);
313 char *res = REAL(stpcpy)(dest, src); // NOLINT
Evgeniy Stepanov412d9732014-03-18 13:45:19 +0000314 CopyPoison(dest, src, n + 1, &stack);
Evgeniy Stepanov654688b2013-07-01 15:19:37 +0000315 return res;
316}
317
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000318INTERCEPTOR(char *, strdup, char *src) {
319 ENSURE_MSAN_INITED();
Evgeniy Stepanov412d9732014-03-18 13:45:19 +0000320 GET_STORE_STACK_TRACE;
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000321 SIZE_T n = REAL(strlen)(src);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000322 char *res = REAL(strdup)(src);
Evgeniy Stepanov412d9732014-03-18 13:45:19 +0000323 CopyPoison(res, src, n + 1, &stack);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000324 return res;
325}
326
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000327#if !SANITIZER_FREEBSD
Evgeniy Stepanovead6cf72013-03-14 11:10:36 +0000328INTERCEPTOR(char *, __strdup, char *src) {
329 ENSURE_MSAN_INITED();
Evgeniy Stepanov412d9732014-03-18 13:45:19 +0000330 GET_STORE_STACK_TRACE;
Evgeniy Stepanovead6cf72013-03-14 11:10:36 +0000331 SIZE_T n = REAL(strlen)(src);
332 char *res = REAL(__strdup)(src);
Evgeniy Stepanov412d9732014-03-18 13:45:19 +0000333 CopyPoison(res, src, n + 1, &stack);
Evgeniy Stepanovead6cf72013-03-14 11:10:36 +0000334 return res;
335}
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000336#define MSAN_MAYBE_INTERCEPT___STRDUP INTERCEPT_FUNCTION(__strdup)
337#else
338#define MSAN_MAYBE_INTERCEPT___STRDUP
339#endif
Evgeniy Stepanovead6cf72013-03-14 11:10:36 +0000340
341INTERCEPTOR(char *, strndup, char *src, SIZE_T n) {
342 ENSURE_MSAN_INITED();
Evgeniy Stepanov412d9732014-03-18 13:45:19 +0000343 GET_STORE_STACK_TRACE;
Evgeniy Stepanovead6cf72013-03-14 11:10:36 +0000344 SIZE_T copy_size = REAL(strnlen)(src, n);
345 char *res = REAL(strndup)(src, n);
Evgeniy Stepanov412d9732014-03-18 13:45:19 +0000346 CopyPoison(res, src, copy_size, &stack);
Evgeniy Stepanovead6cf72013-03-14 11:10:36 +0000347 __msan_unpoison(res + copy_size, 1); // \0
348 return res;
349}
350
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000351#if !SANITIZER_FREEBSD
Evgeniy Stepanovead6cf72013-03-14 11:10:36 +0000352INTERCEPTOR(char *, __strndup, char *src, SIZE_T n) {
353 ENSURE_MSAN_INITED();
Evgeniy Stepanov412d9732014-03-18 13:45:19 +0000354 GET_STORE_STACK_TRACE;
Evgeniy Stepanovead6cf72013-03-14 11:10:36 +0000355 SIZE_T copy_size = REAL(strnlen)(src, n);
356 char *res = REAL(__strndup)(src, n);
Evgeniy Stepanov412d9732014-03-18 13:45:19 +0000357 CopyPoison(res, src, copy_size, &stack);
Evgeniy Stepanovead6cf72013-03-14 11:10:36 +0000358 __msan_unpoison(res + copy_size, 1); // \0
359 return res;
360}
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000361#define MSAN_MAYBE_INTERCEPT___STRNDUP INTERCEPT_FUNCTION(__strndup)
362#else
363#define MSAN_MAYBE_INTERCEPT___STRNDUP
364#endif
Evgeniy Stepanovead6cf72013-03-14 11:10:36 +0000365
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000366INTERCEPTOR(char *, gcvt, double number, SIZE_T ndigit, char *buf) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000367 ENSURE_MSAN_INITED();
368 char *res = REAL(gcvt)(number, ndigit, buf);
Evgeniy Stepanov7555f5e2014-11-18 10:33:15 +0000369 SIZE_T n = REAL(strlen)(buf);
370 __msan_unpoison(buf, n + 1);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000371 return res;
372}
373
374INTERCEPTOR(char *, strcat, char *dest, const char *src) { // NOLINT
375 ENSURE_MSAN_INITED();
Evgeniy Stepanov412d9732014-03-18 13:45:19 +0000376 GET_STORE_STACK_TRACE;
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000377 SIZE_T src_size = REAL(strlen)(src);
378 SIZE_T dest_size = REAL(strlen)(dest);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000379 char *res = REAL(strcat)(dest, src); // NOLINT
Evgeniy Stepanov412d9732014-03-18 13:45:19 +0000380 CopyPoison(dest + dest_size, src, src_size + 1, &stack);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000381 return res;
382}
383
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000384INTERCEPTOR(char *, strncat, char *dest, const char *src, SIZE_T n) { // NOLINT
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000385 ENSURE_MSAN_INITED();
Evgeniy Stepanov412d9732014-03-18 13:45:19 +0000386 GET_STORE_STACK_TRACE;
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000387 SIZE_T dest_size = REAL(strlen)(dest);
Evgeniy Stepanov3158ec42013-12-13 16:31:59 +0000388 SIZE_T copy_size = REAL(strnlen)(src, n);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000389 char *res = REAL(strncat)(dest, src, n); // NOLINT
Evgeniy Stepanov412d9732014-03-18 13:45:19 +0000390 CopyPoison(dest + dest_size, src, copy_size, &stack);
Evgeniy Stepanov3158ec42013-12-13 16:31:59 +0000391 __msan_unpoison(dest + dest_size + copy_size, 1); // \0
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000392 return res;
393}
394
Sergey Matveev1394f2d2014-01-28 13:45:58 +0000395// Hack: always pass nptr and endptr as part of __VA_ARGS_ to avoid having to
396// deal with empty __VA_ARGS__ in the case of INTERCEPTOR_STRTO.
397#define INTERCEPTOR_STRTO_BODY(ret_type, func, ...) \
398 ENSURE_MSAN_INITED(); \
399 ret_type res = REAL(func)(__VA_ARGS__); \
Evgeniy Stepanov7555f5e2014-11-18 10:33:15 +0000400 __msan_unpoison(endptr, sizeof(*endptr)); \
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000401 return res;
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000402
Evgeniy Stepanov3a9be642014-12-08 10:41:28 +0000403#define INTERCEPTOR_STRTO(ret_type, func, char_type) \
404 INTERCEPTOR(ret_type, func, const char_type *nptr, char_type **endptr) { \
405 INTERCEPTOR_STRTO_BODY(ret_type, func, nptr, endptr); \
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000406 }
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000407
Evgeniy Stepanov3a9be642014-12-08 10:41:28 +0000408#define INTERCEPTOR_STRTO_BASE(ret_type, func, char_type) \
409 INTERCEPTOR(ret_type, func, const char_type *nptr, char_type **endptr, \
410 int base) { \
411 INTERCEPTOR_STRTO_BODY(ret_type, func, nptr, endptr, base); \
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000412 }
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000413
Evgeniy Stepanov3a9be642014-12-08 10:41:28 +0000414#define INTERCEPTOR_STRTO_LOC(ret_type, func, char_type) \
415 INTERCEPTOR(ret_type, func, const char_type *nptr, char_type **endptr, \
Sergey Matveev1394f2d2014-01-28 13:45:58 +0000416 void *loc) { \
Evgeniy Stepanov3a9be642014-12-08 10:41:28 +0000417 INTERCEPTOR_STRTO_BODY(ret_type, func, nptr, endptr, loc); \
418 }
419
420#define INTERCEPTOR_STRTO_BASE_LOC(ret_type, func, char_type) \
421 INTERCEPTOR(ret_type, func, const char_type *nptr, char_type **endptr, \
422 int base, void *loc) { \
Sergey Matveev1394f2d2014-01-28 13:45:58 +0000423 INTERCEPTOR_STRTO_BODY(ret_type, func, nptr, endptr, base, loc); \
Evgeniy Stepanove3a32512013-01-17 13:42:17 +0000424 }
Evgeniy Stepanove3a32512013-01-17 13:42:17 +0000425
Evgeniy Stepanov3a9be642014-12-08 10:41:28 +0000426#define INTERCEPTORS_STRTO(ret_type, func, char_type) \
427 INTERCEPTOR_STRTO(ret_type, func, char_type) \
428 INTERCEPTOR_STRTO_LOC(ret_type, func##_l, char_type) \
429 INTERCEPTOR_STRTO_LOC(ret_type, __##func##_l, char_type) \
430 INTERCEPTOR_STRTO_LOC(ret_type, __##func##_internal, char_type)
431
432#define INTERCEPTORS_STRTO_BASE(ret_type, func, char_type) \
433 INTERCEPTOR_STRTO_BASE(ret_type, func, char_type) \
434 INTERCEPTOR_STRTO_BASE_LOC(ret_type, func##_l, char_type) \
435 INTERCEPTOR_STRTO_BASE_LOC(ret_type, __##func##_l, char_type) \
436 INTERCEPTOR_STRTO_BASE_LOC(ret_type, __##func##_internal, char_type)
437
438INTERCEPTORS_STRTO(double, strtod, char) // NOLINT
439INTERCEPTORS_STRTO(float, strtof, char) // NOLINT
440INTERCEPTORS_STRTO(long double, strtold, char) // NOLINT
441INTERCEPTORS_STRTO_BASE(long, strtol, char) // NOLINT
442INTERCEPTORS_STRTO_BASE(long long, strtoll, char) // NOLINT
443INTERCEPTORS_STRTO_BASE(unsigned long, strtoul, char) // NOLINT
444INTERCEPTORS_STRTO_BASE(unsigned long long, strtoull, char) // NOLINT
445
446INTERCEPTORS_STRTO(double, wcstod, wchar_t) // NOLINT
447INTERCEPTORS_STRTO(float, wcstof, wchar_t) // NOLINT
448INTERCEPTORS_STRTO(long double, wcstold, wchar_t) // NOLINT
449INTERCEPTORS_STRTO_BASE(long, wcstol, wchar_t) // NOLINT
450INTERCEPTORS_STRTO_BASE(long long, wcstoll, wchar_t) // NOLINT
451INTERCEPTORS_STRTO_BASE(unsigned long, wcstoul, wchar_t) // NOLINT
452INTERCEPTORS_STRTO_BASE(unsigned long long, wcstoull, wchar_t) // NOLINT
453
454#define INTERCEPT_STRTO(func) \
455 INTERCEPT_FUNCTION(func); \
456 INTERCEPT_FUNCTION(func##_l); \
457 INTERCEPT_FUNCTION(__##func##_l); \
458 INTERCEPT_FUNCTION(__##func##_internal);
459
Evgeniy Stepanov7aacd9c2013-10-14 11:52:40 +0000460
Evgeniy Stepanovac030ff2014-05-08 09:50:59 +0000461// FIXME: support *wprintf in common format interceptors.
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000462INTERCEPTOR(int, vswprintf, void *str, uptr size, void *format, va_list ap) {
463 ENSURE_MSAN_INITED();
464 int res = REAL(vswprintf)(str, size, format, ap);
Evgeniy Stepanov7555f5e2014-11-18 10:33:15 +0000465 if (res >= 0) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000466 __msan_unpoison(str, 4 * (res + 1));
467 }
468 return res;
469}
470
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000471INTERCEPTOR(int, swprintf, void *str, uptr size, void *format, ...) {
472 ENSURE_MSAN_INITED();
473 va_list ap;
474 va_start(ap, format);
475 int res = vswprintf(str, size, format, ap);
476 va_end(ap);
477 return res;
478}
479
Evgeniy Stepanovc5e51922014-05-08 12:04:01 +0000480INTERCEPTOR(SIZE_T, strxfrm, char *dest, const char *src, SIZE_T n) {
481 ENSURE_MSAN_INITED();
482 CHECK_UNPOISONED(src, REAL(strlen)(src) + 1);
483 SIZE_T res = REAL(strxfrm)(dest, src, n);
484 if (res < n) __msan_unpoison(dest, res + 1);
485 return res;
486}
487
488INTERCEPTOR(SIZE_T, strxfrm_l, char *dest, const char *src, SIZE_T n,
489 void *loc) {
490 ENSURE_MSAN_INITED();
491 CHECK_UNPOISONED(src, REAL(strlen)(src) + 1);
492 SIZE_T res = REAL(strxfrm_l)(dest, src, n, loc);
493 if (res < n) __msan_unpoison(dest, res + 1);
494 return res;
495}
496
Evgeniy Stepanov9ce9a6c2014-04-14 14:59:42 +0000497#define INTERCEPTOR_STRFTIME_BODY(char_type, ret_type, func, s, ...) \
498 ENSURE_MSAN_INITED(); \
499 ret_type res = REAL(func)(s, __VA_ARGS__); \
500 if (s) __msan_unpoison(s, sizeof(char_type) * (res + 1)); \
501 return res;
502
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000503INTERCEPTOR(SIZE_T, strftime, char *s, SIZE_T max, const char *format,
Evgeniy Stepanova6b5eec2013-11-02 01:01:35 +0000504 __sanitizer_tm *tm) {
Evgeniy Stepanov9ce9a6c2014-04-14 14:59:42 +0000505 INTERCEPTOR_STRFTIME_BODY(char, SIZE_T, strftime, s, max, format, tm);
506}
507
508INTERCEPTOR(SIZE_T, strftime_l, char *s, SIZE_T max, const char *format,
509 __sanitizer_tm *tm, void *loc) {
510 INTERCEPTOR_STRFTIME_BODY(char, SIZE_T, strftime_l, s, max, format, tm, loc);
511}
512
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000513#if !SANITIZER_FREEBSD
Evgeniy Stepanov9ce9a6c2014-04-14 14:59:42 +0000514INTERCEPTOR(SIZE_T, __strftime_l, char *s, SIZE_T max, const char *format,
515 __sanitizer_tm *tm, void *loc) {
516 INTERCEPTOR_STRFTIME_BODY(char, SIZE_T, __strftime_l, s, max, format, tm,
517 loc);
518}
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000519#define MSAN_MAYBE_INTERCEPT___STRFTIME_L INTERCEPT_FUNCTION(__strftime_l)
520#else
521#define MSAN_MAYBE_INTERCEPT___STRFTIME_L
522#endif
Evgeniy Stepanov9ce9a6c2014-04-14 14:59:42 +0000523
524INTERCEPTOR(SIZE_T, wcsftime, wchar_t *s, SIZE_T max, const wchar_t *format,
525 __sanitizer_tm *tm) {
526 INTERCEPTOR_STRFTIME_BODY(wchar_t, SIZE_T, wcsftime, s, max, format, tm);
527}
528
529INTERCEPTOR(SIZE_T, wcsftime_l, wchar_t *s, SIZE_T max, const wchar_t *format,
530 __sanitizer_tm *tm, void *loc) {
531 INTERCEPTOR_STRFTIME_BODY(wchar_t, SIZE_T, wcsftime_l, s, max, format, tm,
532 loc);
533}
534
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000535#if !SANITIZER_FREEBSD
Evgeniy Stepanov9ce9a6c2014-04-14 14:59:42 +0000536INTERCEPTOR(SIZE_T, __wcsftime_l, wchar_t *s, SIZE_T max, const wchar_t *format,
537 __sanitizer_tm *tm, void *loc) {
538 INTERCEPTOR_STRFTIME_BODY(wchar_t, SIZE_T, __wcsftime_l, s, max, format, tm,
539 loc);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000540}
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000541#define MSAN_MAYBE_INTERCEPT___WCSFTIME_L INTERCEPT_FUNCTION(__wcsftime_l)
542#else
543#define MSAN_MAYBE_INTERCEPT___WCSFTIME_L
544#endif
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000545
Evgeniy Stepanov165d7592013-07-02 13:34:44 +0000546INTERCEPTOR(int, mbtowc, wchar_t *dest, const char *src, SIZE_T n) {
547 ENSURE_MSAN_INITED();
548 int res = REAL(mbtowc)(dest, src, n);
549 if (res != -1 && dest) __msan_unpoison(dest, sizeof(wchar_t));
550 return res;
551}
552
553INTERCEPTOR(int, mbrtowc, wchar_t *dest, const char *src, SIZE_T n, void *ps) {
554 ENSURE_MSAN_INITED();
555 SIZE_T res = REAL(mbrtowc)(dest, src, n, ps);
556 if (res != (SIZE_T)-1 && dest) __msan_unpoison(dest, sizeof(wchar_t));
557 return res;
558}
559
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000560INTERCEPTOR(SIZE_T, wcslen, const wchar_t *s) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000561 ENSURE_MSAN_INITED();
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000562 SIZE_T res = REAL(wcslen)(s);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000563 CHECK_UNPOISONED(s, sizeof(wchar_t) * (res + 1));
564 return res;
565}
566
567// wchar_t *wcschr(const wchar_t *wcs, wchar_t wc);
568INTERCEPTOR(wchar_t *, wcschr, void *s, wchar_t wc, void *ps) {
569 ENSURE_MSAN_INITED();
570 wchar_t *res = REAL(wcschr)(s, wc, ps);
571 return res;
572}
573
574// wchar_t *wcscpy(wchar_t *dest, const wchar_t *src);
575INTERCEPTOR(wchar_t *, wcscpy, wchar_t *dest, const wchar_t *src) {
576 ENSURE_MSAN_INITED();
Evgeniy Stepanov412d9732014-03-18 13:45:19 +0000577 GET_STORE_STACK_TRACE;
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000578 wchar_t *res = REAL(wcscpy)(dest, src);
Evgeniy Stepanov412d9732014-03-18 13:45:19 +0000579 CopyPoison(dest, src, sizeof(wchar_t) * (REAL(wcslen)(src) + 1), &stack);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000580 return res;
581}
582
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000583// wchar_t *wmemcpy(wchar_t *dest, const wchar_t *src, SIZE_T n);
584INTERCEPTOR(wchar_t *, wmemcpy, wchar_t *dest, const wchar_t *src, SIZE_T n) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000585 ENSURE_MSAN_INITED();
Evgeniy Stepanov412d9732014-03-18 13:45:19 +0000586 GET_STORE_STACK_TRACE;
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000587 wchar_t *res = REAL(wmemcpy)(dest, src, n);
Evgeniy Stepanov412d9732014-03-18 13:45:19 +0000588 CopyPoison(dest, src, n * sizeof(wchar_t), &stack);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000589 return res;
590}
591
Evgeniy Stepanovaa23bd82013-07-02 14:49:24 +0000592INTERCEPTOR(wchar_t *, wmempcpy, wchar_t *dest, const wchar_t *src, SIZE_T n) {
593 ENSURE_MSAN_INITED();
Evgeniy Stepanov412d9732014-03-18 13:45:19 +0000594 GET_STORE_STACK_TRACE;
Evgeniy Stepanovaa23bd82013-07-02 14:49:24 +0000595 wchar_t *res = REAL(wmempcpy)(dest, src, n);
Evgeniy Stepanov412d9732014-03-18 13:45:19 +0000596 CopyPoison(dest, src, n * sizeof(wchar_t), &stack);
Evgeniy Stepanovaa23bd82013-07-02 14:49:24 +0000597 return res;
598}
599
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000600INTERCEPTOR(wchar_t *, wmemset, wchar_t *s, wchar_t c, SIZE_T n) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000601 CHECK(MEM_IS_APP(s));
602 ENSURE_MSAN_INITED();
Eric Fiselier909deeb2014-11-24 18:17:04 +0000603 wchar_t *res = REAL(wmemset)(s, c, n);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000604 __msan_unpoison(s, n * sizeof(wchar_t));
605 return res;
606}
607
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000608INTERCEPTOR(wchar_t *, wmemmove, wchar_t *dest, const wchar_t *src, SIZE_T n) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000609 ENSURE_MSAN_INITED();
Evgeniy Stepanov412d9732014-03-18 13:45:19 +0000610 GET_STORE_STACK_TRACE;
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000611 wchar_t *res = REAL(wmemmove)(dest, src, n);
Evgeniy Stepanov412d9732014-03-18 13:45:19 +0000612 MovePoison(dest, src, n * sizeof(wchar_t), &stack);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000613 return res;
614}
615
616INTERCEPTOR(int, wcscmp, const wchar_t *s1, const wchar_t *s2) {
617 ENSURE_MSAN_INITED();
618 int res = REAL(wcscmp)(s1, s2);
619 return res;
620}
621
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000622INTERCEPTOR(int, gettimeofday, void *tv, void *tz) {
623 ENSURE_MSAN_INITED();
624 int res = REAL(gettimeofday)(tv, tz);
625 if (tv)
626 __msan_unpoison(tv, 16);
627 if (tz)
628 __msan_unpoison(tz, 8);
629 return res;
630}
631
632INTERCEPTOR(char *, fcvt, double x, int a, int *b, int *c) {
633 ENSURE_MSAN_INITED();
634 char *res = REAL(fcvt)(x, a, b, c);
Evgeniy Stepanov7555f5e2014-11-18 10:33:15 +0000635 __msan_unpoison(b, sizeof(*b));
636 __msan_unpoison(c, sizeof(*c));
637 if (res) __msan_unpoison(res, REAL(strlen)(res) + 1);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000638 return res;
639}
640
641INTERCEPTOR(char *, getenv, char *name) {
Viktor Kutuzovd9779852014-11-27 14:28:57 +0000642 if (msan_init_is_running)
643 return REAL(getenv)(name);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000644 ENSURE_MSAN_INITED();
645 char *res = REAL(getenv)(name);
Evgeniy Stepanov7555f5e2014-11-18 10:33:15 +0000646 if (res) __msan_unpoison(res, REAL(strlen)(res) + 1);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000647 return res;
648}
649
Evgeniy Stepanov5dbedf62013-08-01 11:14:14 +0000650extern char **environ;
651
652static void UnpoisonEnviron() {
653 char **envp = environ;
654 for (; *envp; ++envp) {
655 __msan_unpoison(envp, sizeof(*envp));
656 __msan_unpoison(*envp, REAL(strlen)(*envp) + 1);
657 }
658 // Trailing NULL pointer.
659 __msan_unpoison(envp, sizeof(*envp));
660}
661
662INTERCEPTOR(int, setenv, const char *name, const char *value, int overwrite) {
663 ENSURE_MSAN_INITED();
664 int res = REAL(setenv)(name, value, overwrite);
665 if (!res) UnpoisonEnviron();
666 return res;
667}
668
669INTERCEPTOR(int, putenv, char *string) {
670 ENSURE_MSAN_INITED();
671 int res = REAL(putenv)(string);
672 if (!res) UnpoisonEnviron();
673 return res;
674}
675
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000676#if !SANITIZER_FREEBSD
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000677INTERCEPTOR(int, __fxstat, int magic, int fd, void *buf) {
678 ENSURE_MSAN_INITED();
679 int res = REAL(__fxstat)(magic, fd, buf);
680 if (!res)
Evgeniy Stepanovea61d082013-02-19 09:19:16 +0000681 __msan_unpoison(buf, __sanitizer::struct_stat_sz);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000682 return res;
683}
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000684#define MSAN_MAYBE_INTERCEPT___FXSTAT INTERCEPT_FUNCTION(__fxstat)
685#else
686#define MSAN_MAYBE_INTERCEPT___FXSTAT
687#endif
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000688
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000689#if !SANITIZER_FREEBSD
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000690INTERCEPTOR(int, __fxstat64, int magic, int fd, void *buf) {
691 ENSURE_MSAN_INITED();
692 int res = REAL(__fxstat64)(magic, fd, buf);
693 if (!res)
Evgeniy Stepanovea61d082013-02-19 09:19:16 +0000694 __msan_unpoison(buf, __sanitizer::struct_stat64_sz);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000695 return res;
696}
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000697#define MSAN_MAYBE_INTERCEPT___FXSTAT64 INTERCEPT_FUNCTION(__fxstat64)
698#else
699#define MSAN_MAYBE_INTERCEPT___FXSTAT64
700#endif
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000701
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000702#if !SANITIZER_FREEBSD
Evgeniy Stepanov842fa3f2013-09-09 13:40:41 +0000703INTERCEPTOR(int, __fxstatat, int magic, int fd, char *pathname, void *buf,
704 int flags) {
705 ENSURE_MSAN_INITED();
706 int res = REAL(__fxstatat)(magic, fd, pathname, buf, flags);
707 if (!res) __msan_unpoison(buf, __sanitizer::struct_stat_sz);
708 return res;
709}
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000710#define MSAN_MAYBE_INTERCEPT___FXSTATAT INTERCEPT_FUNCTION(__fxstatat)
711#else
712#define MSAN_MAYBE_INTERCEPT___FXSTATAT
713#endif
Evgeniy Stepanov842fa3f2013-09-09 13:40:41 +0000714
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000715#if !SANITIZER_FREEBSD
Evgeniy Stepanov842fa3f2013-09-09 13:40:41 +0000716INTERCEPTOR(int, __fxstatat64, int magic, int fd, char *pathname, void *buf,
717 int flags) {
718 ENSURE_MSAN_INITED();
719 int res = REAL(__fxstatat64)(magic, fd, pathname, buf, flags);
720 if (!res) __msan_unpoison(buf, __sanitizer::struct_stat64_sz);
721 return res;
722}
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000723#define MSAN_MAYBE_INTERCEPT___FXSTATAT64 INTERCEPT_FUNCTION(__fxstatat64)
724#else
725#define MSAN_MAYBE_INTERCEPT___FXSTATAT64
726#endif
Evgeniy Stepanov842fa3f2013-09-09 13:40:41 +0000727
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000728#if !SANITIZER_FREEBSD
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000729INTERCEPTOR(int, __xstat, int magic, char *path, void *buf) {
730 ENSURE_MSAN_INITED();
731 int res = REAL(__xstat)(magic, path, buf);
732 if (!res)
Evgeniy Stepanovea61d082013-02-19 09:19:16 +0000733 __msan_unpoison(buf, __sanitizer::struct_stat_sz);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000734 return res;
735}
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000736#define MSAN_MAYBE_INTERCEPT___XSTAT INTERCEPT_FUNCTION(__xstat)
737#else
738#define MSAN_MAYBE_INTERCEPT___XSTAT
739#endif
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000740
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000741#if !SANITIZER_FREEBSD
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000742INTERCEPTOR(int, __xstat64, int magic, char *path, void *buf) {
743 ENSURE_MSAN_INITED();
744 int res = REAL(__xstat64)(magic, path, buf);
745 if (!res)
Evgeniy Stepanovea61d082013-02-19 09:19:16 +0000746 __msan_unpoison(buf, __sanitizer::struct_stat64_sz);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000747 return res;
748}
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000749#define MSAN_MAYBE_INTERCEPT___XSTAT64 INTERCEPT_FUNCTION(__xstat64)
750#else
751#define MSAN_MAYBE_INTERCEPT___XSTAT64
752#endif
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000753
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000754#if !SANITIZER_FREEBSD
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000755INTERCEPTOR(int, __lxstat, int magic, char *path, void *buf) {
756 ENSURE_MSAN_INITED();
757 int res = REAL(__lxstat)(magic, path, buf);
758 if (!res)
Evgeniy Stepanovea61d082013-02-19 09:19:16 +0000759 __msan_unpoison(buf, __sanitizer::struct_stat_sz);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000760 return res;
761}
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000762#define MSAN_MAYBE_INTERCEPT___LXSTAT INTERCEPT_FUNCTION(__lxstat)
763#else
764#define MSAN_MAYBE_INTERCEPT___LXSTAT
765#endif
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000766
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000767#if !SANITIZER_FREEBSD
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000768INTERCEPTOR(int, __lxstat64, int magic, char *path, void *buf) {
769 ENSURE_MSAN_INITED();
770 int res = REAL(__lxstat64)(magic, path, buf);
771 if (!res)
Evgeniy Stepanovea61d082013-02-19 09:19:16 +0000772 __msan_unpoison(buf, __sanitizer::struct_stat64_sz);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000773 return res;
774}
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000775#define MSAN_MAYBE_INTERCEPT___LXSTAT64 INTERCEPT_FUNCTION(__lxstat64)
776#else
777#define MSAN_MAYBE_INTERCEPT___LXSTAT64
778#endif
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000779
780INTERCEPTOR(int, pipe, int pipefd[2]) {
781 if (msan_init_is_running)
782 return REAL(pipe)(pipefd);
783 ENSURE_MSAN_INITED();
784 int res = REAL(pipe)(pipefd);
785 if (!res)
786 __msan_unpoison(pipefd, sizeof(int[2]));
787 return res;
788}
789
Evgeniy Stepanovb4eac2f2013-04-08 13:45:12 +0000790INTERCEPTOR(int, pipe2, int pipefd[2], int flags) {
791 ENSURE_MSAN_INITED();
792 int res = REAL(pipe2)(pipefd, flags);
793 if (!res)
794 __msan_unpoison(pipefd, sizeof(int[2]));
795 return res;
796}
797
798INTERCEPTOR(int, socketpair, int domain, int type, int protocol, int sv[2]) {
799 ENSURE_MSAN_INITED();
800 int res = REAL(socketpair)(domain, type, protocol, sv);
801 if (!res)
802 __msan_unpoison(sv, sizeof(int[2]));
803 return res;
804}
805
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000806INTERCEPTOR(char *, fgets, char *s, int size, void *stream) {
807 ENSURE_MSAN_INITED();
808 char *res = REAL(fgets)(s, size, stream);
809 if (res)
810 __msan_unpoison(s, REAL(strlen)(s) + 1);
811 return res;
812}
813
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000814#if !SANITIZER_FREEBSD
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000815INTERCEPTOR(char *, fgets_unlocked, char *s, int size, void *stream) {
816 ENSURE_MSAN_INITED();
817 char *res = REAL(fgets_unlocked)(s, size, stream);
818 if (res)
819 __msan_unpoison(s, REAL(strlen)(s) + 1);
820 return res;
821}
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000822#define MSAN_MAYBE_INTERCEPT_FGETS_UNLOCKED INTERCEPT_FUNCTION(fgets_unlocked)
823#else
824#define MSAN_MAYBE_INTERCEPT_FGETS_UNLOCKED
825#endif
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000826
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000827INTERCEPTOR(int, getrlimit, int resource, void *rlim) {
828 if (msan_init_is_running)
829 return REAL(getrlimit)(resource, rlim);
830 ENSURE_MSAN_INITED();
831 int res = REAL(getrlimit)(resource, rlim);
832 if (!res)
Evgeniy Stepanovea61d082013-02-19 09:19:16 +0000833 __msan_unpoison(rlim, __sanitizer::struct_rlimit_sz);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000834 return res;
835}
836
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000837#if !SANITIZER_FREEBSD
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000838INTERCEPTOR(int, getrlimit64, int resource, void *rlim) {
839 if (msan_init_is_running)
840 return REAL(getrlimit64)(resource, rlim);
841 ENSURE_MSAN_INITED();
842 int res = REAL(getrlimit64)(resource, rlim);
843 if (!res)
Evgeniy Stepanovea61d082013-02-19 09:19:16 +0000844 __msan_unpoison(rlim, __sanitizer::struct_rlimit64_sz);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000845 return res;
846}
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000847#define MSAN_MAYBE_INTERCEPT_GETRLIMIT64 INTERCEPT_FUNCTION(getrlimit64)
848#else
849#define MSAN_MAYBE_INTERCEPT_GETRLIMIT64
850#endif
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000851
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000852INTERCEPTOR(int, uname, void *utsname) {
853 ENSURE_MSAN_INITED();
854 int res = REAL(uname)(utsname);
855 if (!res) {
Evgeniy Stepanovea61d082013-02-19 09:19:16 +0000856 __msan_unpoison(utsname, __sanitizer::struct_utsname_sz);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000857 }
858 return res;
859}
860
Evgeniy Stepanovffffbef2013-01-23 10:43:38 +0000861INTERCEPTOR(int, gethostname, char *name, SIZE_T len) {
862 ENSURE_MSAN_INITED();
863 int res = REAL(gethostname)(name, len);
864 if (!res) {
865 SIZE_T real_len = REAL(strnlen)(name, len);
866 if (real_len < len)
867 ++real_len;
868 __msan_unpoison(name, real_len);
869 }
870 return res;
871}
872
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000873#if !SANITIZER_FREEBSD
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000874INTERCEPTOR(int, epoll_wait, int epfd, void *events, int maxevents,
875 int timeout) {
876 ENSURE_MSAN_INITED();
877 int res = REAL(epoll_wait)(epfd, events, maxevents, timeout);
878 if (res > 0) {
Evgeniy Stepanovea61d082013-02-19 09:19:16 +0000879 __msan_unpoison(events, __sanitizer::struct_epoll_event_sz * res);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000880 }
881 return res;
882}
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000883#define MSAN_MAYBE_INTERCEPT_EPOLL_WAIT INTERCEPT_FUNCTION(epoll_wait)
884#else
885#define MSAN_MAYBE_INTERCEPT_EPOLL_WAIT
886#endif
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000887
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000888#if !SANITIZER_FREEBSD
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000889INTERCEPTOR(int, epoll_pwait, int epfd, void *events, int maxevents,
890 int timeout, void *sigmask) {
891 ENSURE_MSAN_INITED();
892 int res = REAL(epoll_pwait)(epfd, events, maxevents, timeout, sigmask);
893 if (res > 0) {
Evgeniy Stepanovea61d082013-02-19 09:19:16 +0000894 __msan_unpoison(events, __sanitizer::struct_epoll_event_sz * res);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000895 }
896 return res;
897}
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000898#define MSAN_MAYBE_INTERCEPT_EPOLL_PWAIT INTERCEPT_FUNCTION(epoll_pwait)
899#else
900#define MSAN_MAYBE_INTERCEPT_EPOLL_PWAIT
901#endif
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000902
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000903INTERCEPTOR(SSIZE_T, recv, int fd, void *buf, SIZE_T len, int flags) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000904 ENSURE_MSAN_INITED();
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000905 SSIZE_T res = REAL(recv)(fd, buf, len, flags);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000906 if (res > 0)
907 __msan_unpoison(buf, res);
908 return res;
909}
910
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000911INTERCEPTOR(SSIZE_T, recvfrom, int fd, void *buf, SIZE_T len, int flags,
Evgeniy Stepanova4d08c42013-05-29 11:30:00 +0000912 void *srcaddr, int *addrlen) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000913 ENSURE_MSAN_INITED();
Evgeniy Stepanov84f46d92012-12-25 16:51:57 +0000914 SIZE_T srcaddr_sz;
Evgeniy Stepanova4d08c42013-05-29 11:30:00 +0000915 if (srcaddr) srcaddr_sz = *addrlen;
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000916 SSIZE_T res = REAL(recvfrom)(fd, buf, len, flags, srcaddr, addrlen);
Evgeniy Stepanov84f46d92012-12-25 16:51:57 +0000917 if (res > 0) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000918 __msan_unpoison(buf, res);
Evgeniy Stepanov84f46d92012-12-25 16:51:57 +0000919 if (srcaddr) {
Evgeniy Stepanova4d08c42013-05-29 11:30:00 +0000920 SIZE_T sz = *addrlen;
Yury Gribovecfa5922014-11-13 19:37:30 +0000921 __msan_unpoison(srcaddr, (sz < srcaddr_sz) ? sz : srcaddr_sz);
Evgeniy Stepanov84f46d92012-12-25 16:51:57 +0000922 }
923 }
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000924 return res;
925}
926
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000927INTERCEPTOR(void *, calloc, SIZE_T nmemb, SIZE_T size) {
Kostya Serebryany6c5b0342013-09-06 10:58:55 +0000928 if (CallocShouldReturnNullDueToOverflow(size, nmemb))
929 return AllocatorReturnNull();
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000930 GET_MALLOC_STACK_TRACE;
931 if (!msan_inited) {
932 // Hack: dlsym calls calloc before REAL(calloc) is retrieved from dlsym.
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000933 const SIZE_T kCallocPoolSize = 1024;
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000934 static uptr calloc_memory_for_dlsym[kCallocPoolSize];
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000935 static SIZE_T allocated;
936 SIZE_T size_in_words = ((nmemb * size) + kWordSize - 1) / kWordSize;
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000937 void *mem = (void*)&calloc_memory_for_dlsym[allocated];
938 allocated += size_in_words;
939 CHECK(allocated < kCallocPoolSize);
940 return mem;
941 }
942 return MsanReallocate(&stack, 0, nmemb * size, sizeof(u64), true);
943}
944
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000945INTERCEPTOR(void *, realloc, void *ptr, SIZE_T size) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000946 GET_MALLOC_STACK_TRACE;
947 return MsanReallocate(&stack, ptr, size, sizeof(u64), false);
948}
949
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000950INTERCEPTOR(void *, malloc, SIZE_T size) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000951 GET_MALLOC_STACK_TRACE;
952 return MsanReallocate(&stack, 0, size, sizeof(u64), false);
953}
954
Alexey Samsonov34093f02013-04-23 13:34:19 +0000955void __msan_allocated_memory(const void* data, uptr size) {
Evgeniy Stepanov9f7e8c12013-01-28 13:52:49 +0000956 GET_MALLOC_STACK_TRACE;
957 if (flags()->poison_in_malloc)
958 __msan_poison(data, size);
959 if (__msan_get_track_origins()) {
Evgeniy Stepanov7395cae2014-12-03 13:58:40 +0000960 Origin o = Origin::CreateHeapOrigin(&stack);
961 __msan_set_origin(data, size, o.raw_id());
Evgeniy Stepanov9f7e8c12013-01-28 13:52:49 +0000962 }
963}
964
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000965INTERCEPTOR(void *, mmap, void *addr, SIZE_T length, int prot, int flags,
966 int fd, OFF_T offset) {
Viktor Kutuzovd9779852014-11-27 14:28:57 +0000967 if (msan_init_is_running)
968 return REAL(mmap)(addr, length, prot, flags, fd, offset);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000969 ENSURE_MSAN_INITED();
Evgeniy Stepanov067f5472014-01-27 09:12:22 +0000970 if (addr && !MEM_IS_APP(addr)) {
Evgeniy Stepanov791a7e12014-02-10 09:37:03 +0000971 if (flags & map_fixed) {
972 *__errno_location() = errno_EINVAL;
973 return (void *)-1;
974 } else {
975 addr = 0;
976 }
Evgeniy Stepanov067f5472014-01-27 09:12:22 +0000977 }
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000978 void *res = REAL(mmap)(addr, length, prot, flags, fd, offset);
979 if (res != (void*)-1)
980 __msan_unpoison(res, RoundUpTo(length, GetPageSize()));
981 return res;
982}
983
Viktor Kutuzov38ec0482014-11-26 10:51:49 +0000984#if !SANITIZER_FREEBSD
Kostya Serebryany07bb3922012-12-13 06:31:40 +0000985INTERCEPTOR(void *, mmap64, void *addr, SIZE_T length, int prot, int flags,
986 int fd, OFF64_T offset) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000987 ENSURE_MSAN_INITED();
Evgeniy Stepanovfb74ea82014-02-14 09:49:29 +0000988 if (addr && !MEM_IS_APP(addr)) {
989 if (flags & map_fixed) {
990 *__errno_location() = errno_EINVAL;
991 return (void *)-1;
992 } else {
993 addr = 0;
994 }
995 }
Evgeniy Stepanovc5033782012-12-11 12:27:27 +0000996 void *res = REAL(mmap64)(addr, length, prot, flags, fd, offset);
997 if (res != (void*)-1)
998 __msan_unpoison(res, RoundUpTo(length, GetPageSize()));
999 return res;
1000}
Viktor Kutuzov38ec0482014-11-26 10:51:49 +00001001#define MSAN_MAYBE_INTERCEPT_MMAP64 INTERCEPT_FUNCTION(mmap64)
1002#else
1003#define MSAN_MAYBE_INTERCEPT_MMAP64
1004#endif
Evgeniy Stepanovc5033782012-12-11 12:27:27 +00001005
Evgeniy Stepanove3a32512013-01-17 13:42:17 +00001006struct dlinfo {
1007 char *dli_fname;
1008 void *dli_fbase;
1009 char *dli_sname;
1010 void *dli_saddr;
1011};
1012
1013INTERCEPTOR(int, dladdr, void *addr, dlinfo *info) {
1014 ENSURE_MSAN_INITED();
1015 int res = REAL(dladdr)(addr, info);
1016 if (res != 0) {
1017 __msan_unpoison(info, sizeof(*info));
1018 if (info->dli_fname)
1019 __msan_unpoison(info->dli_fname, REAL(strlen)(info->dli_fname) + 1);
1020 if (info->dli_sname)
1021 __msan_unpoison(info->dli_sname, REAL(strlen)(info->dli_sname) + 1);
1022 }
1023 return res;
1024}
1025
Evgeniy Stepanovb1fa8102014-01-23 08:43:12 +00001026INTERCEPTOR(char *, dlerror, int fake) {
Evgeniy Stepanov13322c62013-10-31 16:58:44 +00001027 ENSURE_MSAN_INITED();
Evgeniy Stepanovb1fa8102014-01-23 08:43:12 +00001028 char *res = REAL(dlerror)(fake);
Evgeniy Stepanov13322c62013-10-31 16:58:44 +00001029 if (res != 0) __msan_unpoison(res, REAL(strlen)(res) + 1);
1030 return res;
1031}
1032
Evgeniy Stepanovff6728f2013-05-17 12:51:13 +00001033typedef int (*dl_iterate_phdr_cb)(__sanitizer_dl_phdr_info *info, SIZE_T size,
1034 void *data);
Evgeniy Stepanov87c6ec72013-05-16 13:00:25 +00001035struct dl_iterate_phdr_data {
1036 dl_iterate_phdr_cb callback;
1037 void *data;
1038};
1039
Evgeniy Stepanovff6728f2013-05-17 12:51:13 +00001040static int msan_dl_iterate_phdr_cb(__sanitizer_dl_phdr_info *info, SIZE_T size,
1041 void *data) {
1042 if (info) {
Evgeniy Stepanov87c6ec72013-05-16 13:00:25 +00001043 __msan_unpoison(info, size);
Evgeniy Stepanovff6728f2013-05-17 12:51:13 +00001044 if (info->dlpi_name)
1045 __msan_unpoison(info->dlpi_name, REAL(strlen)(info->dlpi_name) + 1);
1046 }
Evgeniy Stepanov87c6ec72013-05-16 13:00:25 +00001047 dl_iterate_phdr_data *cbdata = (dl_iterate_phdr_data *)data;
Alexey Samsonoved4594b2013-06-27 07:50:56 +00001048 UnpoisonParam(3);
Evgeniy Stepanov7555f5e2014-11-18 10:33:15 +00001049 return cbdata->callback(info, size, cbdata->data);
Evgeniy Stepanov87c6ec72013-05-16 13:00:25 +00001050}
1051
1052INTERCEPTOR(int, dl_iterate_phdr, dl_iterate_phdr_cb callback, void *data) {
1053 ENSURE_MSAN_INITED();
Evgeniy Stepanov87c6ec72013-05-16 13:00:25 +00001054 dl_iterate_phdr_data cbdata;
1055 cbdata.callback = callback;
1056 cbdata.data = data;
1057 int res = REAL(dl_iterate_phdr)(msan_dl_iterate_phdr_cb, (void *)&cbdata);
Evgeniy Stepanov87c6ec72013-05-16 13:00:25 +00001058 return res;
1059}
1060
Evgeniy Stepanove3a32512013-01-17 13:42:17 +00001061INTERCEPTOR(int, getrusage, int who, void *usage) {
1062 ENSURE_MSAN_INITED();
1063 int res = REAL(getrusage)(who, usage);
1064 if (res == 0) {
Evgeniy Stepanovea61d082013-02-19 09:19:16 +00001065 __msan_unpoison(usage, __sanitizer::struct_rusage_sz);
Evgeniy Stepanove3a32512013-01-17 13:42:17 +00001066 }
1067 return res;
1068}
1069
Evgeniy Stepanov5a7c3642014-04-23 14:01:57 +00001070class SignalHandlerScope {
1071 public:
Alexey Samsonov2fccdfb2014-05-07 21:23:12 +00001072 SignalHandlerScope() {
1073 if (MsanThread *t = GetCurrentThread())
1074 t->EnterSignalHandler();
1075 }
1076 ~SignalHandlerScope() {
1077 if (MsanThread *t = GetCurrentThread())
1078 t->LeaveSignalHandler();
1079 }
Evgeniy Stepanov5a7c3642014-04-23 14:01:57 +00001080};
1081
Evgeniy Stepanovbb25af52013-08-27 11:34:05 +00001082// sigactions_mu guarantees atomicity of sigaction() and signal() calls.
1083// Access to sigactions[] is gone with relaxed atomics to avoid data race with
1084// the signal handler.
Evgeniy Stepanov1f8b3532013-04-04 08:22:52 +00001085const int kMaxSignals = 1024;
Evgeniy Stepanovbb25af52013-08-27 11:34:05 +00001086static atomic_uintptr_t sigactions[kMaxSignals];
Evgeniy Stepanov1f8b3532013-04-04 08:22:52 +00001087static StaticSpinMutex sigactions_mu;
1088
1089static void SignalHandler(int signo) {
Evgeniy Stepanov5a7c3642014-04-23 14:01:57 +00001090 SignalHandlerScope signal_handler_scope;
Evgeniy Stepanovcb22c672013-08-27 14:08:15 +00001091 ScopedThreadLocalStateBackup stlsb;
Evgeniy Stepanovc4179812013-08-27 12:59:39 +00001092 UnpoisonParam(1);
1093
Kostya Serebryany5b4267f2013-04-05 14:40:25 +00001094 typedef void (*signal_cb)(int x);
Evgeniy Stepanovbb25af52013-08-27 11:34:05 +00001095 signal_cb cb =
1096 (signal_cb)atomic_load(&sigactions[signo], memory_order_relaxed);
Evgeniy Stepanov7555f5e2014-11-18 10:33:15 +00001097 cb(signo);
Evgeniy Stepanov1f8b3532013-04-04 08:22:52 +00001098}
1099
1100static void SignalAction(int signo, void *si, void *uc) {
Evgeniy Stepanov5a7c3642014-04-23 14:01:57 +00001101 SignalHandlerScope signal_handler_scope;
Evgeniy Stepanovcb22c672013-08-27 14:08:15 +00001102 ScopedThreadLocalStateBackup stlsb;
Alexey Samsonoved4594b2013-06-27 07:50:56 +00001103 UnpoisonParam(3);
Evgeniy Stepanova40a0582013-08-27 11:10:04 +00001104 __msan_unpoison(si, sizeof(__sanitizer_sigaction));
Evgeniy Stepanov7b0e1322013-04-04 09:03:56 +00001105 __msan_unpoison(uc, __sanitizer::ucontext_t_sz);
Evgeniy Stepanov1f8b3532013-04-04 08:22:52 +00001106
1107 typedef void (*sigaction_cb)(int, void *, void *);
Evgeniy Stepanovbb25af52013-08-27 11:34:05 +00001108 sigaction_cb cb =
1109 (sigaction_cb)atomic_load(&sigactions[signo], memory_order_relaxed);
Evgeniy Stepanov7555f5e2014-11-18 10:33:15 +00001110 cb(signo, si, uc);
Evgeniy Stepanov1f8b3532013-04-04 08:22:52 +00001111}
1112
1113INTERCEPTOR(int, sigaction, int signo, const __sanitizer_sigaction *act,
1114 __sanitizer_sigaction *oldact) {
Evgeniy Stepanovf8213b42013-04-01 14:47:21 +00001115 ENSURE_MSAN_INITED();
Kostya Serebryanyc3525ce2013-04-04 06:52:40 +00001116 // FIXME: check that *act is unpoisoned.
Evgeniy Stepanovf8213b42013-04-01 14:47:21 +00001117 // That requires intercepting all of sigemptyset, sigfillset, etc.
Evgeniy Stepanov7948c642013-04-05 11:59:16 +00001118 int res;
1119 if (flags()->wrap_signals) {
1120 SpinMutexLock lock(&sigactions_mu);
1121 CHECK_LT(signo, kMaxSignals);
Evgeniy Stepanovbb25af52013-08-27 11:34:05 +00001122 uptr old_cb = atomic_load(&sigactions[signo], memory_order_relaxed);
Evgeniy Stepanov7948c642013-04-05 11:59:16 +00001123 __sanitizer_sigaction new_act;
1124 __sanitizer_sigaction *pnew_act = act ? &new_act : 0;
1125 if (act) {
Evgeniy Stepanovdb298122014-07-11 08:57:57 +00001126 REAL(memcpy)(pnew_act, act, sizeof(__sanitizer_sigaction));
Alexander Potapenkod5802fe2014-01-31 11:29:51 +00001127 uptr cb = (uptr)pnew_act->sigaction;
Evgeniy Stepanova40a0582013-08-27 11:10:04 +00001128 uptr new_cb = (pnew_act->sa_flags & __sanitizer::sa_siginfo)
1129 ? (uptr)SignalAction
1130 : (uptr)SignalHandler;
Evgeniy Stepanov7948c642013-04-05 11:59:16 +00001131 if (cb != __sanitizer::sig_ign && cb != __sanitizer::sig_dfl) {
Evgeniy Stepanovbb25af52013-08-27 11:34:05 +00001132 atomic_store(&sigactions[signo], cb, memory_order_relaxed);
Alexander Potapenkod5802fe2014-01-31 11:29:51 +00001133 pnew_act->sigaction = (void (*)(int, void *, void *))new_cb;
Evgeniy Stepanov7948c642013-04-05 11:59:16 +00001134 }
Evgeniy Stepanov1f8b3532013-04-04 08:22:52 +00001135 }
Evgeniy Stepanov7948c642013-04-05 11:59:16 +00001136 res = REAL(sigaction)(signo, pnew_act, oldact);
1137 if (res == 0 && oldact) {
Alexander Potapenkod5802fe2014-01-31 11:29:51 +00001138 uptr cb = (uptr)oldact->sigaction;
Evgeniy Stepanove7a7a9b2013-04-05 12:58:07 +00001139 if (cb != __sanitizer::sig_ign && cb != __sanitizer::sig_dfl) {
Alexander Potapenkod5802fe2014-01-31 11:29:51 +00001140 oldact->sigaction = (void (*)(int, void *, void *))old_cb;
Evgeniy Stepanove7a7a9b2013-04-05 12:58:07 +00001141 }
Evgeniy Stepanov7948c642013-04-05 11:59:16 +00001142 }
1143 } else {
1144 res = REAL(sigaction)(signo, act, oldact);
Evgeniy Stepanov1f8b3532013-04-04 08:22:52 +00001145 }
Evgeniy Stepanov7948c642013-04-05 11:59:16 +00001146
Evgeniy Stepanov1f8b3532013-04-04 08:22:52 +00001147 if (res == 0 && oldact) {
Evgeniy Stepanova40a0582013-08-27 11:10:04 +00001148 __msan_unpoison(oldact, sizeof(__sanitizer_sigaction));
Evgeniy Stepanovf8213b42013-04-01 14:47:21 +00001149 }
1150 return res;
1151}
1152
Evgeniy Stepanov1f8b3532013-04-04 08:22:52 +00001153INTERCEPTOR(int, signal, int signo, uptr cb) {
1154 ENSURE_MSAN_INITED();
Evgeniy Stepanov7948c642013-04-05 11:59:16 +00001155 if (flags()->wrap_signals) {
1156 CHECK_LT(signo, kMaxSignals);
1157 SpinMutexLock lock(&sigactions_mu);
1158 if (cb != __sanitizer::sig_ign && cb != __sanitizer::sig_dfl) {
Evgeniy Stepanovbb25af52013-08-27 11:34:05 +00001159 atomic_store(&sigactions[signo], cb, memory_order_relaxed);
Evgeniy Stepanov7948c642013-04-05 11:59:16 +00001160 cb = (uptr) SignalHandler;
1161 }
1162 return REAL(signal)(signo, cb);
1163 } else {
1164 return REAL(signal)(signo, cb);
Evgeniy Stepanov1f8b3532013-04-04 08:22:52 +00001165 }
Evgeniy Stepanov1f8b3532013-04-04 08:22:52 +00001166}
1167
Evgeniy Stepanov98f5ea02013-03-13 09:01:40 +00001168extern "C" int pthread_attr_init(void *attr);
1169extern "C" int pthread_attr_destroy(void *attr);
Evgeniy Stepanov2794c472013-10-22 14:31:30 +00001170
1171static void *MsanThreadStartFunc(void *arg) {
Evgeniy Stepanovf653cda2014-04-04 09:47:41 +00001172 MsanThread *t = (MsanThread *)arg;
1173 SetCurrentThread(t);
1174 return t->ThreadStart();
Evgeniy Stepanov2794c472013-10-22 14:31:30 +00001175}
Evgeniy Stepanov98f5ea02013-03-13 09:01:40 +00001176
1177INTERCEPTOR(int, pthread_create, void *th, void *attr, void *(*callback)(void*),
1178 void * param) {
1179 ENSURE_MSAN_INITED(); // for GetTlsSize()
1180 __sanitizer_pthread_attr_t myattr;
1181 if (attr == 0) {
1182 pthread_attr_init(&myattr);
1183 attr = &myattr;
1184 }
Evgeniy Stepanovb4a218d2013-03-19 09:30:52 +00001185
Kostya Serebryanycf5d8e42014-02-24 08:53:26 +00001186 AdjustStackSize(attr);
Evgeniy Stepanov98f5ea02013-03-13 09:01:40 +00001187
Evgeniy Stepanovf653cda2014-04-04 09:47:41 +00001188 MsanThread *t = MsanThread::Create(callback, param);
Evgeniy Stepanov2794c472013-10-22 14:31:30 +00001189
Evgeniy Stepanovf653cda2014-04-04 09:47:41 +00001190 int res = REAL(pthread_create)(th, attr, MsanThreadStartFunc, t);
Evgeniy Stepanov2794c472013-10-22 14:31:30 +00001191
Evgeniy Stepanov98f5ea02013-03-13 09:01:40 +00001192 if (attr == &myattr)
1193 pthread_attr_destroy(&myattr);
Evgeniy Stepanovf8213b42013-04-01 14:47:21 +00001194 if (!res) {
1195 __msan_unpoison(th, __sanitizer::pthread_t_sz);
1196 }
Evgeniy Stepanov98f5ea02013-03-13 09:01:40 +00001197 return res;
1198}
1199
Timur Iskhodzhanovd7eb6772013-07-15 16:11:39 +00001200INTERCEPTOR(int, pthread_key_create, __sanitizer_pthread_key_t *key,
1201 void (*dtor)(void *value)) {
Evgeniy Stepanovf653cda2014-04-04 09:47:41 +00001202 if (msan_init_is_running) return REAL(pthread_key_create)(key, dtor);
Evgeniy Stepanov628d7272013-07-05 12:31:07 +00001203 ENSURE_MSAN_INITED();
1204 int res = REAL(pthread_key_create)(key, dtor);
1205 if (!res && key)
1206 __msan_unpoison(key, sizeof(*key));
1207 return res;
1208}
1209
Evgeniy Stepanov807e1312013-07-30 12:54:34 +00001210INTERCEPTOR(int, pthread_join, void *th, void **retval) {
1211 ENSURE_MSAN_INITED();
1212 int res = REAL(pthread_join)(th, retval);
1213 if (!res && retval)
1214 __msan_unpoison(retval, sizeof(*retval));
1215 return res;
1216}
1217
Evgeniy Stepanov9be91e92013-09-13 11:27:38 +00001218extern char *tzname[2];
1219
Evgeniy Stepanovb1fa8102014-01-23 08:43:12 +00001220INTERCEPTOR(void, tzset, int fake) {
Evgeniy Stepanov9be91e92013-09-13 11:27:38 +00001221 ENSURE_MSAN_INITED();
Evgeniy Stepanovb1fa8102014-01-23 08:43:12 +00001222 REAL(tzset)(fake);
Evgeniy Stepanov9be91e92013-09-13 11:27:38 +00001223 if (tzname[0])
1224 __msan_unpoison(tzname[0], REAL(strlen)(tzname[0]) + 1);
1225 if (tzname[1])
1226 __msan_unpoison(tzname[1], REAL(strlen)(tzname[1]) + 1);
1227 return;
1228}
1229
Evgeniy Stepanov022235c2013-09-27 11:32:21 +00001230struct MSanAtExitRecord {
1231 void (*func)(void *arg);
1232 void *arg;
1233};
1234
1235void MSanAtExitWrapper(void *arg) {
1236 UnpoisonParam(1);
1237 MSanAtExitRecord *r = (MSanAtExitRecord *)arg;
Evgeniy Stepanov7555f5e2014-11-18 10:33:15 +00001238 r->func(r->arg);
Evgeniy Stepanov022235c2013-09-27 11:32:21 +00001239 InternalFree(r);
1240}
1241
1242// Unpoison argument shadow for C++ module destructors.
1243INTERCEPTOR(int, __cxa_atexit, void (*func)(void *), void *arg,
1244 void *dso_handle) {
1245 if (msan_init_is_running) return REAL(__cxa_atexit)(func, arg, dso_handle);
1246 ENSURE_MSAN_INITED();
1247 MSanAtExitRecord *r =
1248 (MSanAtExitRecord *)InternalAlloc(sizeof(MSanAtExitRecord));
1249 r->func = func;
1250 r->arg = arg;
1251 return REAL(__cxa_atexit)(MSanAtExitWrapper, r, dso_handle);
1252}
1253
Evgeniy Stepanov451c8de2013-10-29 02:48:49 +00001254DECLARE_REAL(int, shmctl, int shmid, int cmd, void *buf)
1255
1256INTERCEPTOR(void *, shmat, int shmid, const void *shmaddr, int shmflg) {
1257 ENSURE_MSAN_INITED();
1258 void *p = REAL(shmat)(shmid, shmaddr, shmflg);
1259 if (p != (void *)-1) {
1260 __sanitizer_shmid_ds ds;
1261 int res = REAL(shmctl)(shmid, shmctl_ipc_stat, &ds);
1262 if (!res) {
1263 __msan_unpoison(p, ds.shm_segsz);
1264 }
1265 }
1266 return p;
1267}
1268
Evgeniy Stepanovbb91e022014-09-04 10:36:14 +00001269static void BeforeFork() {
1270 StackDepotLockAll();
1271 ChainedOriginDepotLockAll();
1272}
1273
1274static void AfterFork() {
1275 ChainedOriginDepotUnlockAll();
1276 StackDepotUnlockAll();
1277}
1278
1279INTERCEPTOR(int, fork, void) {
1280 ENSURE_MSAN_INITED();
1281 BeforeFork();
1282 int pid = REAL(fork)();
1283 AfterFork();
1284 return pid;
1285}
1286
Evgeniy Stepanovbfd21222013-05-22 12:50:26 +00001287struct MSanInterceptorContext {
1288 bool in_interceptor_scope;
1289};
1290
Dmitry Vyukov19a13022013-10-03 15:43:59 +00001291namespace __msan {
1292
1293int OnExit() {
Dmitry Vyukovfdfb2ade2013-10-03 15:22:29 +00001294 // FIXME: ask frontend whether we need to return failure.
1295 return 0;
1296}
1297
Dmitry Vyukov19a13022013-10-03 15:43:59 +00001298} // namespace __msan
1299
Evgeniy Stepanovb69699e2013-11-11 11:28:30 +00001300// A version of CHECK_UNPOISONED using a saved scope value. Used in common
Evgeniy Stepanova343d1d2013-05-23 11:51:47 +00001301// interceptors.
Evgeniy Stepanovdec0f762013-06-28 11:02:43 +00001302#define CHECK_UNPOISONED_CTX(ctx, x, n) \
1303 do { \
1304 if (!((MSanInterceptorContext *)ctx)->in_interceptor_scope) \
1305 CHECK_UNPOISONED_0(x, n); \
1306 } while (0)
Evgeniy Stepanovbfd21222013-05-22 12:50:26 +00001307
Sergey Matveev9be70fb2013-12-05 12:04:51 +00001308#define MSAN_INTERCEPT_FUNC(name) \
1309 do { \
1310 if ((!INTERCEPT_FUNCTION(name) || !REAL(name))) \
1311 VReport(1, "MemorySanitizer: failed to intercept '" #name "'\n"); \
Evgeniy Stepanovb69699e2013-11-11 11:28:30 +00001312 } while (0)
1313
1314#define COMMON_INTERCEPT_FUNCTION(name) MSAN_INTERCEPT_FUNC(name)
Evgeniy Stepanov72a9d252014-03-06 13:26:09 +00001315#define COMMON_INTERCEPTOR_UNPOISON_PARAM(count) \
Evgeniy Stepanovfaba61a2013-07-09 12:07:59 +00001316 UnpoisonParam(count)
Evgeniy Stepanov222076e2013-01-18 11:17:23 +00001317#define COMMON_INTERCEPTOR_WRITE_RANGE(ctx, ptr, size) \
Evgeniy Stepanovbfd21222013-05-22 12:50:26 +00001318 __msan_unpoison(ptr, size)
1319#define COMMON_INTERCEPTOR_READ_RANGE(ctx, ptr, size) \
Evgeniy Stepanovdec0f762013-06-28 11:02:43 +00001320 CHECK_UNPOISONED_CTX(ctx, ptr, size)
Evgeniy Stepanov72a9d252014-03-06 13:26:09 +00001321#define COMMON_INTERCEPTOR_INITIALIZE_RANGE(ptr, size) \
Dmitry Vyukov83ebd022013-10-03 14:12:09 +00001322 __msan_unpoison(ptr, size)
Evgeniy Stepanov7edb87a2013-10-24 13:20:34 +00001323#define COMMON_INTERCEPTOR_ENTER(ctx, func, ...) \
1324 if (msan_init_is_running) return REAL(func)(__VA_ARGS__); \
1325 MSanInterceptorContext msan_ctx = {IsInInterceptorScope()}; \
1326 ctx = (void *)&msan_ctx; \
1327 (void)ctx; \
1328 InterceptorScope interceptor_scope; \
1329 __msan_unpoison(__errno_location(), sizeof(int)); /* NOLINT */ \
Evgeniy Stepanovbfd21222013-05-22 12:50:26 +00001330 ENSURE_MSAN_INITED();
1331#define COMMON_INTERCEPTOR_FD_ACQUIRE(ctx, fd) \
1332 do { \
Evgeniy Stepanov01671c32013-01-18 13:12:56 +00001333 } while (false)
Evgeniy Stepanov08f66282013-05-29 09:09:58 +00001334#define COMMON_INTERCEPTOR_FD_RELEASE(ctx, fd) \
1335 do { \
1336 } while (false)
1337#define COMMON_INTERCEPTOR_FD_SOCKET_ACCEPT(ctx, fd, newfd) \
1338 do { \
1339 } while (false)
Evgeniy Stepanov01671c32013-01-18 13:12:56 +00001340#define COMMON_INTERCEPTOR_SET_THREAD_NAME(ctx, name) \
Evgeniy Stepanov08f66282013-05-29 09:09:58 +00001341 do { \
1342 } while (false) // FIXME
Dmitry Vyukov3e8432e2013-10-29 10:30:39 +00001343#define COMMON_INTERCEPTOR_SET_PTHREAD_NAME(ctx, thread, name) \
1344 do { \
1345 } while (false) // FIXME
Evgeniy Stepanov64cace02013-08-12 13:19:53 +00001346#define COMMON_INTERCEPTOR_BLOCK_REAL(name) REAL(name)
Dmitry Vyukovfdfb2ade2013-10-03 15:22:29 +00001347#define COMMON_INTERCEPTOR_ON_EXIT(ctx) OnExit()
Evgeniy Stepanov7555f5e2014-11-18 10:33:15 +00001348#define COMMON_INTERCEPTOR_LIBRARY_LOADED(filename, map) \
1349 if (map) ForEachMappedRegion((link_map *)map, __msan_unpoison);
Evgeniy Stepanov567e5162014-05-27 12:37:52 +00001350
Evgeniy Stepanova6c4a382013-01-18 13:01:18 +00001351#include "sanitizer_common/sanitizer_common_interceptors.inc"
Kostya Serebryany69fe0ba2013-01-18 06:43:13 +00001352
Evgeniy Stepanovf5523112013-04-11 14:37:04 +00001353#define COMMON_SYSCALL_PRE_READ_RANGE(p, s) CHECK_UNPOISONED(p, s)
Alexey Samsonov786ee9b2013-09-19 08:35:16 +00001354#define COMMON_SYSCALL_PRE_WRITE_RANGE(p, s) \
1355 do { \
1356 } while (false)
1357#define COMMON_SYSCALL_POST_READ_RANGE(p, s) \
1358 do { \
1359 } while (false)
Evgeniy Stepanovf5523112013-04-11 14:37:04 +00001360#define COMMON_SYSCALL_POST_WRITE_RANGE(p, s) __msan_unpoison(p, s)
1361#include "sanitizer_common/sanitizer_common_syscalls.inc"
1362
Evgeniy Stepanov05938a22014-02-14 11:41:26 +00001363static void PoisonShadow(uptr ptr, uptr size, u8 value) {
1364 uptr PageSize = GetPageSizeCached();
1365 uptr shadow_beg = MEM_TO_SHADOW(ptr);
1366 uptr shadow_end = MEM_TO_SHADOW(ptr + size);
1367 if (value ||
1368 shadow_end - shadow_beg < common_flags()->clear_shadow_mmap_threshold) {
Evgeniy Stepanovdb298122014-07-11 08:57:57 +00001369 REAL(memset)((void*)shadow_beg, value, shadow_end - shadow_beg);
Evgeniy Stepanov05938a22014-02-14 11:41:26 +00001370 } else {
1371 uptr page_beg = RoundUpTo(shadow_beg, PageSize);
1372 uptr page_end = RoundDownTo(shadow_end, PageSize);
1373
1374 if (page_beg >= page_end) {
Evgeniy Stepanovdb298122014-07-11 08:57:57 +00001375 REAL(memset)((void *)shadow_beg, 0, shadow_end - shadow_beg);
Evgeniy Stepanov05938a22014-02-14 11:41:26 +00001376 } else {
1377 if (page_beg != shadow_beg) {
Evgeniy Stepanovdb298122014-07-11 08:57:57 +00001378 REAL(memset)((void *)shadow_beg, 0, page_beg - shadow_beg);
Evgeniy Stepanov05938a22014-02-14 11:41:26 +00001379 }
1380 if (page_end != shadow_end) {
Evgeniy Stepanovdb298122014-07-11 08:57:57 +00001381 REAL(memset)((void *)page_end, 0, shadow_end - page_end);
Evgeniy Stepanov05938a22014-02-14 11:41:26 +00001382 }
1383 MmapFixedNoReserve(page_beg, page_end - page_beg);
1384 }
1385 }
1386}
1387
Evgeniy Stepanovc5033782012-12-11 12:27:27 +00001388// These interface functions reside here so that they can use
Evgeniy Stepanovdb298122014-07-11 08:57:57 +00001389// REAL(memset), etc.
Alexey Samsonov34093f02013-04-23 13:34:19 +00001390void __msan_unpoison(const void *a, uptr size) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +00001391 if (!MEM_IS_APP(a)) return;
Evgeniy Stepanov05938a22014-02-14 11:41:26 +00001392 PoisonShadow((uptr)a, size, 0);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +00001393}
1394
Alexey Samsonov34093f02013-04-23 13:34:19 +00001395void __msan_poison(const void *a, uptr size) {
Evgeniy Stepanovc5033782012-12-11 12:27:27 +00001396 if (!MEM_IS_APP(a)) return;
Evgeniy Stepanov05938a22014-02-14 11:41:26 +00001397 PoisonShadow((uptr)a, size,
1398 __msan::flags()->poison_heap_with_zeroes ? 0 : -1);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +00001399}
1400
1401void __msan_poison_stack(void *a, uptr size) {
1402 if (!MEM_IS_APP(a)) return;
Evgeniy Stepanov05938a22014-02-14 11:41:26 +00001403 PoisonShadow((uptr)a, size,
1404 __msan::flags()->poison_stack_with_zeroes ? 0 : -1);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +00001405}
1406
1407void __msan_clear_and_unpoison(void *a, uptr size) {
Evgeniy Stepanovdb298122014-07-11 08:57:57 +00001408 REAL(memset)(a, 0, size);
Evgeniy Stepanov05938a22014-02-14 11:41:26 +00001409 PoisonShadow((uptr)a, size, 0);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +00001410}
1411
Kostya Serebryany07bb3922012-12-13 06:31:40 +00001412void *__msan_memcpy(void *dest, const void *src, SIZE_T n) {
Evgeniy Stepanovf653cda2014-04-04 09:47:41 +00001413 if (!msan_inited) return internal_memcpy(dest, src, n);
1414 if (msan_init_is_running) return REAL(memcpy)(dest, src, n);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +00001415 ENSURE_MSAN_INITED();
Evgeniy Stepanov412d9732014-03-18 13:45:19 +00001416 GET_STORE_STACK_TRACE;
Evgeniy Stepanovdb298122014-07-11 08:57:57 +00001417 void *res = REAL(memcpy)(dest, src, n);
Evgeniy Stepanov412d9732014-03-18 13:45:19 +00001418 CopyPoison(dest, src, n, &stack);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +00001419 return res;
1420}
1421
Kostya Serebryany07bb3922012-12-13 06:31:40 +00001422void *__msan_memset(void *s, int c, SIZE_T n) {
Evgeniy Stepanovf653cda2014-04-04 09:47:41 +00001423 if (!msan_inited) return internal_memset(s, c, n);
1424 if (msan_init_is_running) return REAL(memset)(s, c, n);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +00001425 ENSURE_MSAN_INITED();
Evgeniy Stepanovdb298122014-07-11 08:57:57 +00001426 void *res = REAL(memset)(s, c, n);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +00001427 __msan_unpoison(s, n);
1428 return res;
1429}
1430
Kostya Serebryany07bb3922012-12-13 06:31:40 +00001431void *__msan_memmove(void *dest, const void *src, SIZE_T n) {
Evgeniy Stepanovf653cda2014-04-04 09:47:41 +00001432 if (!msan_inited) return internal_memmove(dest, src, n);
1433 if (msan_init_is_running) return REAL(memmove)(dest, src, n);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +00001434 ENSURE_MSAN_INITED();
Evgeniy Stepanov412d9732014-03-18 13:45:19 +00001435 GET_STORE_STACK_TRACE;
Evgeniy Stepanovc5033782012-12-11 12:27:27 +00001436 void *res = REAL(memmove)(dest, src, n);
Evgeniy Stepanov412d9732014-03-18 13:45:19 +00001437 MovePoison(dest, src, n, &stack);
Evgeniy Stepanovc5033782012-12-11 12:27:27 +00001438 return res;
1439}
1440
Sergey Matveevfa76f3b2014-03-21 10:12:17 +00001441void __msan_unpoison_string(const char* s) {
1442 if (!MEM_IS_APP(s)) return;
1443 __msan_unpoison(s, REAL(strlen)(s) + 1);
1444}
1445
Evgeniy Stepanovc5033782012-12-11 12:27:27 +00001446namespace __msan {
Evgeniy Stepanov412d9732014-03-18 13:45:19 +00001447
Evgeniy Stepanova55fcd32014-04-02 11:06:35 +00001448u32 GetOriginIfPoisoned(uptr addr, uptr size) {
1449 unsigned char *s = (unsigned char *)MEM_TO_SHADOW(addr);
1450 for (uptr i = 0; i < size; ++i)
1451 if (s[i])
Viktor Kutuzov30bd3452014-11-28 11:42:55 +00001452 return *(u32 *)SHADOW_TO_ORIGIN(((uptr)s + i) & ~3UL);
Evgeniy Stepanova55fcd32014-04-02 11:06:35 +00001453 return 0;
1454}
1455
1456void SetOriginIfPoisoned(uptr addr, uptr src_shadow, uptr size,
1457 u32 src_origin) {
1458 uptr dst_s = MEM_TO_SHADOW(addr);
1459 uptr src_s = src_shadow;
1460 uptr src_s_end = src_s + size;
1461
1462 for (; src_s < src_s_end; ++dst_s, ++src_s)
1463 if (*(u8 *)src_s) *(u32 *)SHADOW_TO_ORIGIN(dst_s &~3UL) = src_origin;
1464}
1465
Evgeniy Stepanov412d9732014-03-18 13:45:19 +00001466void CopyOrigin(void *dst, const void *src, uptr size, StackTrace *stack) {
1467 if (!__msan_get_track_origins()) return;
1468 if (!MEM_IS_APP(dst) || !MEM_IS_APP(src)) return;
1469
1470 uptr d = (uptr)dst;
1471 uptr beg = d & ~3UL;
1472 // Copy left unaligned origin if that memory is poisoned.
1473 if (beg < d) {
Evgeniy Stepanov8717fec2014-06-24 11:50:26 +00001474 u32 o = GetOriginIfPoisoned((uptr)src, d - beg);
Evgeniy Stepanov412d9732014-03-18 13:45:19 +00001475 if (o) {
1476 if (__msan_get_track_origins() > 1) o = ChainOrigin(o, stack);
1477 *(u32 *)MEM_TO_ORIGIN(beg) = o;
1478 }
1479 beg += 4;
1480 }
1481
Evgeniy Stepanov8717fec2014-06-24 11:50:26 +00001482 uptr end = (d + size) & ~3UL;
Evgeniy Stepanoveb893a12014-07-08 14:15:23 +00001483 // If both ends fall into the same 4-byte slot, we are done.
1484 if (end < beg) return;
1485
Evgeniy Stepanov412d9732014-03-18 13:45:19 +00001486 // Copy right unaligned origin if that memory is poisoned.
Evgeniy Stepanov8717fec2014-06-24 11:50:26 +00001487 if (end < d + size) {
1488 u32 o = GetOriginIfPoisoned((uptr)src + (end - d), (d + size) - end);
Evgeniy Stepanov412d9732014-03-18 13:45:19 +00001489 if (o) {
1490 if (__msan_get_track_origins() > 1) o = ChainOrigin(o, stack);
Evgeniy Stepanov8717fec2014-06-24 11:50:26 +00001491 *(u32 *)MEM_TO_ORIGIN(end) = o;
Evgeniy Stepanov412d9732014-03-18 13:45:19 +00001492 }
Evgeniy Stepanov412d9732014-03-18 13:45:19 +00001493 }
1494
1495 if (beg < end) {
1496 // Align src up.
1497 uptr s = ((uptr)src + 3) & ~3UL;
1498 // FIXME: factor out to msan_copy_origin_aligned
1499 if (__msan_get_track_origins() > 1) {
1500 u32 *src = (u32 *)MEM_TO_ORIGIN(s);
1501 u32 *src_s = (u32 *)MEM_TO_SHADOW(s);
Evgeniy Stepanoveb893a12014-07-08 14:15:23 +00001502 u32 *src_end = (u32 *)MEM_TO_ORIGIN(s + (end - beg));
Evgeniy Stepanov412d9732014-03-18 13:45:19 +00001503 u32 *dst = (u32 *)MEM_TO_ORIGIN(beg);
1504 u32 src_o = 0;
1505 u32 dst_o = 0;
1506 for (; src < src_end; ++src, ++src_s, ++dst) {
1507 if (!*src_s) continue;
1508 if (*src != src_o) {
1509 src_o = *src;
1510 dst_o = ChainOrigin(src_o, stack);
1511 }
1512 *dst = dst_o;
1513 }
1514 } else {
Evgeniy Stepanovdb298122014-07-11 08:57:57 +00001515 REAL(memcpy)((void *)MEM_TO_ORIGIN(beg), (void *)MEM_TO_ORIGIN(s),
Evgeniy Stepanov412d9732014-03-18 13:45:19 +00001516 end - beg);
1517 }
1518 }
1519}
1520
1521void MovePoison(void *dst, const void *src, uptr size, StackTrace *stack) {
1522 if (!MEM_IS_APP(dst)) return;
1523 if (!MEM_IS_APP(src)) return;
1524 if (src == dst) return;
Evgeniy Stepanovdb298122014-07-11 08:57:57 +00001525 REAL(memmove)((void *)MEM_TO_SHADOW((uptr)dst),
1526 (void *)MEM_TO_SHADOW((uptr)src), size);
Evgeniy Stepanov412d9732014-03-18 13:45:19 +00001527 CopyOrigin(dst, src, size, stack);
1528}
1529
1530void CopyPoison(void *dst, const void *src, uptr size, StackTrace *stack) {
1531 if (!MEM_IS_APP(dst)) return;
1532 if (!MEM_IS_APP(src)) return;
Evgeniy Stepanovdb298122014-07-11 08:57:57 +00001533 REAL(memcpy)((void *)MEM_TO_SHADOW((uptr)dst),
Evgeniy Stepanov412d9732014-03-18 13:45:19 +00001534 (void *)MEM_TO_SHADOW((uptr)src), size);
1535 CopyOrigin(dst, src, size, stack);
1536}
1537
Evgeniy Stepanovc5033782012-12-11 12:27:27 +00001538void InitializeInterceptors() {
1539 static int inited = 0;
1540 CHECK_EQ(inited, 0);
Evgeniy Stepanov7d460402014-05-07 13:24:28 +00001541 InitializeCommonInterceptors();
Kostya Serebryany69fe0ba2013-01-18 06:43:13 +00001542
Alexey Samsonovcd1e68e2012-12-14 11:52:02 +00001543 INTERCEPT_FUNCTION(mmap);
Viktor Kutuzov38ec0482014-11-26 10:51:49 +00001544 MSAN_MAYBE_INTERCEPT_MMAP64;
Alexey Samsonovcd1e68e2012-12-14 11:52:02 +00001545 INTERCEPT_FUNCTION(posix_memalign);
Viktor Kutuzov38ec0482014-11-26 10:51:49 +00001546 MSAN_MAYBE_INTERCEPT_MEMALIGN;
Evgeniy Stepanov7ad0bde2014-06-25 11:30:35 +00001547 INTERCEPT_FUNCTION(__libc_memalign);
Evgeniy Stepanove3eaa7b2013-09-02 09:24:53 +00001548 INTERCEPT_FUNCTION(valloc);
Viktor Kutuzov38ec0482014-11-26 10:51:49 +00001549 MSAN_MAYBE_INTERCEPT_PVALLOC;
Alexey Samsonovcd1e68e2012-12-14 11:52:02 +00001550 INTERCEPT_FUNCTION(malloc);
1551 INTERCEPT_FUNCTION(calloc);
1552 INTERCEPT_FUNCTION(realloc);
1553 INTERCEPT_FUNCTION(free);
Viktor Kutuzov38ec0482014-11-26 10:51:49 +00001554 MSAN_MAYBE_INTERCEPT_CFREE;
Evgeniy Stepanov9dcd5a32014-03-27 13:29:29 +00001555 INTERCEPT_FUNCTION(malloc_usable_size);
Viktor Kutuzov38ec0482014-11-26 10:51:49 +00001556 MSAN_MAYBE_INTERCEPT_MALLINFO;
1557 MSAN_MAYBE_INTERCEPT_MALLOPT;
1558 MSAN_MAYBE_INTERCEPT_MALLOC_STATS;
Alexey Samsonovcd1e68e2012-12-14 11:52:02 +00001559 INTERCEPT_FUNCTION(fread);
Viktor Kutuzov38ec0482014-11-26 10:51:49 +00001560 MSAN_MAYBE_INTERCEPT_FREAD_UNLOCKED;
Alexey Samsonovcd1e68e2012-12-14 11:52:02 +00001561 INTERCEPT_FUNCTION(readlink);
Alexey Samsonovcd1e68e2012-12-14 11:52:02 +00001562 INTERCEPT_FUNCTION(memcpy);
Evgeniy Stepanov365bd0c2013-11-01 23:49:48 +00001563 INTERCEPT_FUNCTION(memccpy);
Evgeniy Stepanovaa23bd82013-07-02 14:49:24 +00001564 INTERCEPT_FUNCTION(mempcpy);
Alexey Samsonovcd1e68e2012-12-14 11:52:02 +00001565 INTERCEPT_FUNCTION(memset);
1566 INTERCEPT_FUNCTION(memmove);
Evgeniy Stepanovdb615c12013-07-04 13:19:41 +00001567 INTERCEPT_FUNCTION(bcopy);
Alexey Samsonovcd1e68e2012-12-14 11:52:02 +00001568 INTERCEPT_FUNCTION(wmemset);
1569 INTERCEPT_FUNCTION(wmemcpy);
Evgeniy Stepanovaa23bd82013-07-02 14:49:24 +00001570 INTERCEPT_FUNCTION(wmempcpy);
Alexey Samsonovcd1e68e2012-12-14 11:52:02 +00001571 INTERCEPT_FUNCTION(wmemmove);
1572 INTERCEPT_FUNCTION(strcpy); // NOLINT
Evgeniy Stepanov654688b2013-07-01 15:19:37 +00001573 INTERCEPT_FUNCTION(stpcpy); // NOLINT
Alexey Samsonovcd1e68e2012-12-14 11:52:02 +00001574 INTERCEPT_FUNCTION(strdup);
Viktor Kutuzov38ec0482014-11-26 10:51:49 +00001575 MSAN_MAYBE_INTERCEPT___STRDUP;
Evgeniy Stepanovead6cf72013-03-14 11:10:36 +00001576 INTERCEPT_FUNCTION(strndup);
Viktor Kutuzov38ec0482014-11-26 10:51:49 +00001577 MSAN_MAYBE_INTERCEPT___STRNDUP;
Alexey Samsonovcd1e68e2012-12-14 11:52:02 +00001578 INTERCEPT_FUNCTION(strncpy); // NOLINT
1579 INTERCEPT_FUNCTION(strlen);
1580 INTERCEPT_FUNCTION(strnlen);
1581 INTERCEPT_FUNCTION(gcvt);
1582 INTERCEPT_FUNCTION(strcat); // NOLINT
1583 INTERCEPT_FUNCTION(strncat); // NOLINT
Evgeniy Stepanov3a9be642014-12-08 10:41:28 +00001584 INTERCEPT_STRTO(strtod);
1585 INTERCEPT_STRTO(strtof);
1586 INTERCEPT_STRTO(strtold);
1587 INTERCEPT_STRTO(strtol);
1588 INTERCEPT_STRTO(strtoul);
1589 INTERCEPT_STRTO(strtoll);
1590 INTERCEPT_STRTO(strtoull);
1591 INTERCEPT_STRTO(wcstod);
1592 INTERCEPT_STRTO(wcstof);
1593 INTERCEPT_STRTO(wcstold);
1594 INTERCEPT_STRTO(wcstol);
1595 INTERCEPT_STRTO(wcstoul);
1596 INTERCEPT_STRTO(wcstoll);
1597 INTERCEPT_STRTO(wcstoull);
Alexey Samsonovcd1e68e2012-12-14 11:52:02 +00001598 INTERCEPT_FUNCTION(vswprintf);
Alexey Samsonovcd1e68e2012-12-14 11:52:02 +00001599 INTERCEPT_FUNCTION(swprintf);
Evgeniy Stepanovc5e51922014-05-08 12:04:01 +00001600 INTERCEPT_FUNCTION(strxfrm);
1601 INTERCEPT_FUNCTION(strxfrm_l);
Alexey Samsonovcd1e68e2012-12-14 11:52:02 +00001602 INTERCEPT_FUNCTION(strftime);
Evgeniy Stepanov9ce9a6c2014-04-14 14:59:42 +00001603 INTERCEPT_FUNCTION(strftime_l);
Viktor Kutuzov38ec0482014-11-26 10:51:49 +00001604 MSAN_MAYBE_INTERCEPT___STRFTIME_L;
Evgeniy Stepanov9ce9a6c2014-04-14 14:59:42 +00001605 INTERCEPT_FUNCTION(wcsftime);
1606 INTERCEPT_FUNCTION(wcsftime_l);
Viktor Kutuzov38ec0482014-11-26 10:51:49 +00001607 MSAN_MAYBE_INTERCEPT___WCSFTIME_L;
Evgeniy Stepanov165d7592013-07-02 13:34:44 +00001608 INTERCEPT_FUNCTION(mbtowc);
1609 INTERCEPT_FUNCTION(mbrtowc);
Alexey Samsonovcd1e68e2012-12-14 11:52:02 +00001610 INTERCEPT_FUNCTION(wcslen);
1611 INTERCEPT_FUNCTION(wcschr);
1612 INTERCEPT_FUNCTION(wcscpy);
1613 INTERCEPT_FUNCTION(wcscmp);
Alexey Samsonovcd1e68e2012-12-14 11:52:02 +00001614 INTERCEPT_FUNCTION(getenv);
Evgeniy Stepanov5dbedf62013-08-01 11:14:14 +00001615 INTERCEPT_FUNCTION(setenv);
1616 INTERCEPT_FUNCTION(putenv);
Alexey Samsonovcd1e68e2012-12-14 11:52:02 +00001617 INTERCEPT_FUNCTION(gettimeofday);
1618 INTERCEPT_FUNCTION(fcvt);
Viktor Kutuzov38ec0482014-11-26 10:51:49 +00001619 MSAN_MAYBE_INTERCEPT___FXSTAT;
1620 MSAN_MAYBE_INTERCEPT___FXSTATAT;
1621 MSAN_MAYBE_INTERCEPT___XSTAT;
1622 MSAN_MAYBE_INTERCEPT___LXSTAT;
1623 MSAN_MAYBE_INTERCEPT___FXSTAT64;
1624 MSAN_MAYBE_INTERCEPT___FXSTATAT64;
1625 MSAN_MAYBE_INTERCEPT___XSTAT64;
1626 MSAN_MAYBE_INTERCEPT___LXSTAT64;
Alexey Samsonovcd1e68e2012-12-14 11:52:02 +00001627 INTERCEPT_FUNCTION(pipe);
Evgeniy Stepanovb4eac2f2013-04-08 13:45:12 +00001628 INTERCEPT_FUNCTION(pipe2);
1629 INTERCEPT_FUNCTION(socketpair);
Alexey Samsonovcd1e68e2012-12-14 11:52:02 +00001630 INTERCEPT_FUNCTION(fgets);
Viktor Kutuzov38ec0482014-11-26 10:51:49 +00001631 MSAN_MAYBE_INTERCEPT_FGETS_UNLOCKED;
Alexey Samsonovcd1e68e2012-12-14 11:52:02 +00001632 INTERCEPT_FUNCTION(getrlimit);
Viktor Kutuzov38ec0482014-11-26 10:51:49 +00001633 MSAN_MAYBE_INTERCEPT_GETRLIMIT64;
Alexey Samsonovcd1e68e2012-12-14 11:52:02 +00001634 INTERCEPT_FUNCTION(uname);
Evgeniy Stepanovffffbef2013-01-23 10:43:38 +00001635 INTERCEPT_FUNCTION(gethostname);
Viktor Kutuzov38ec0482014-11-26 10:51:49 +00001636 MSAN_MAYBE_INTERCEPT_EPOLL_WAIT;
1637 MSAN_MAYBE_INTERCEPT_EPOLL_PWAIT;
Alexey Samsonovcd1e68e2012-12-14 11:52:02 +00001638 INTERCEPT_FUNCTION(recv);
1639 INTERCEPT_FUNCTION(recvfrom);
Evgeniy Stepanove3a32512013-01-17 13:42:17 +00001640 INTERCEPT_FUNCTION(dladdr);
Evgeniy Stepanov13322c62013-10-31 16:58:44 +00001641 INTERCEPT_FUNCTION(dlerror);
Evgeniy Stepanov87c6ec72013-05-16 13:00:25 +00001642 INTERCEPT_FUNCTION(dl_iterate_phdr);
Evgeniy Stepanove3a32512013-01-17 13:42:17 +00001643 INTERCEPT_FUNCTION(getrusage);
Evgeniy Stepanovf8213b42013-04-01 14:47:21 +00001644 INTERCEPT_FUNCTION(sigaction);
Evgeniy Stepanov1f8b3532013-04-04 08:22:52 +00001645 INTERCEPT_FUNCTION(signal);
Evgeniy Stepanov98f5ea02013-03-13 09:01:40 +00001646 INTERCEPT_FUNCTION(pthread_create);
Evgeniy Stepanov628d7272013-07-05 12:31:07 +00001647 INTERCEPT_FUNCTION(pthread_key_create);
Evgeniy Stepanov807e1312013-07-30 12:54:34 +00001648 INTERCEPT_FUNCTION(pthread_join);
Evgeniy Stepanov9be91e92013-09-13 11:27:38 +00001649 INTERCEPT_FUNCTION(tzset);
Evgeniy Stepanov022235c2013-09-27 11:32:21 +00001650 INTERCEPT_FUNCTION(__cxa_atexit);
Evgeniy Stepanov451c8de2013-10-29 02:48:49 +00001651 INTERCEPT_FUNCTION(shmat);
Evgeniy Stepanovbb91e022014-09-04 10:36:14 +00001652 INTERCEPT_FUNCTION(fork);
Evgeniy Stepanov2794c472013-10-22 14:31:30 +00001653
Evgeniy Stepanovc5033782012-12-11 12:27:27 +00001654 inited = 1;
1655}
1656} // namespace __msan