1//===-- sanitizer_posix.h -------------------------------------------------===// 2// 3// The LLVM Compiler Infrastructure 4// 5// This file is distributed under the University of Illinois Open Source 6// License. See LICENSE.TXT for details. 7// 8//===----------------------------------------------------------------------===// 9// 10// This file is shared between AddressSanitizer and ThreadSanitizer 11// run-time libraries and declares some useful POSIX-specific functions. 12//===----------------------------------------------------------------------===// 13#ifndef SANITIZER_POSIX_H 14#define SANITIZER_POSIX_H 15 16// ----------- ATTENTION ------------- 17// This header should NOT include any other headers from sanitizer runtime. 18#include "sanitizer_internal_defs.h" 19#include "sanitizer_platform_limits_freebsd.h" 20#include "sanitizer_platform_limits_netbsd.h" 21#include "sanitizer_platform_limits_openbsd.h" 22#include "sanitizer_platform_limits_posix.h" 23#include "sanitizer_platform_limits_solaris.h" 24 25#if !SANITIZER_POSIX 26// Make it hard to accidentally use any of functions declared in this file: 27#error This file should only be included on POSIX 28#endif 29 30namespace __sanitizer { 31 32// I/O 33// Don't use directly, use __sanitizer::OpenFile() instead. 34uptr internal_open(const char *filename, int flags); 35uptr internal_open(const char *filename, int flags, u32 mode); 36uptr internal_close(fd_t fd); 37 38uptr internal_read(fd_t fd, void *buf, uptr count); 39uptr internal_write(fd_t fd, const void *buf, uptr count); 40 41// Memory 42uptr internal_mmap(void *addr, uptr length, int prot, int flags, 43 int fd, OFF_T offset); 44uptr internal_munmap(void *addr, uptr length); 45int internal_mprotect(void *addr, uptr length, int prot); 46 47// OS 48uptr internal_filesize(fd_t fd); // -1 on error. 49uptr internal_stat(const char *path, void *buf); 50uptr internal_lstat(const char *path, void *buf); 51uptr internal_fstat(fd_t fd, void *buf); 52uptr internal_dup(int oldfd); 53uptr internal_dup2(int oldfd, int newfd); 54uptr internal_readlink(const char *path, char *buf, uptr bufsize); 55uptr internal_unlink(const char *path); 56uptr internal_rename(const char *oldpath, const char *newpath); 57uptr internal_lseek(fd_t fd, OFF_T offset, int whence); 58 59uptr internal_ptrace(int request, int pid, void *addr, void *data); 60uptr internal_waitpid(int pid, int *status, int options); 61 62int internal_fork(); 63int internal_forkpty(int *amaster); 64 65int internal_sysctl(const int *name, unsigned int namelen, void *oldp, 66 uptr *oldlenp, const void *newp, uptr newlen); 67int internal_sysctlbyname(const char *sname, void *oldp, uptr *oldlenp, 68 const void *newp, uptr newlen); 69 70// These functions call appropriate pthread_ functions directly, bypassing 71// the interceptor. They are weak and may not be present in some tools. 72SANITIZER_WEAK_ATTRIBUTE 73int real_pthread_create(void *th, void *attr, void *(*callback)(void *), 74 void *param); 75SANITIZER_WEAK_ATTRIBUTE 76int real_pthread_join(void *th, void **ret); 77 78#define DEFINE_REAL_PTHREAD_FUNCTIONS \ 79 namespace __sanitizer { \ 80 int real_pthread_create(void *th, void *attr, void *(*callback)(void *), \ 81 void *param) { \ 82 return REAL(pthread_create)(th, attr, callback, param); \ 83 } \ 84 int real_pthread_join(void *th, void **ret) { \ 85 return REAL(pthread_join(th, ret)); \ 86 } \ 87 } // namespace __sanitizer 88 89int my_pthread_attr_getstack(void *attr, void **addr, uptr *size); 90 91// A routine named real_sigaction() must be implemented by each sanitizer in 92// order for internal_sigaction() to bypass interceptors. 93int internal_sigaction(int signum, const void *act, void *oldact); 94void internal_sigfillset(__sanitizer_sigset_t *set); 95void internal_sigemptyset(__sanitizer_sigset_t *set); 96bool internal_sigismember(__sanitizer_sigset_t *set, int signum); 97 98uptr internal_execve(const char *filename, char *const argv[], 99 char *const envp[]); 100 101bool IsStateDetached(int state); 102 103// Move the fd out of {0, 1, 2} range. 104fd_t ReserveStandardFds(fd_t fd); 105 106bool ShouldMockFailureToOpen(const char *path); 107 108} // namespace __sanitizer 109 110#endif // SANITIZER_POSIX_H 111