2015-04-09 01:08:24 +08:00
|
|
|
//===-- sanitizer_posix.h -------------------------------------------------===//
|
|
|
|
//
|
2019-01-19 16:50:56 +08:00
|
|
|
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
|
|
|
|
// See https://llvm.org/LICENSE.txt for license information.
|
|
|
|
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
|
2015-04-09 01:08:24 +08:00
|
|
|
//
|
|
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
//
|
|
|
|
// This file is shared between AddressSanitizer and ThreadSanitizer
|
|
|
|
// run-time libraries and declares some useful POSIX-specific functions.
|
|
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
#ifndef SANITIZER_POSIX_H
|
|
|
|
#define SANITIZER_POSIX_H
|
|
|
|
|
|
|
|
// ----------- ATTENTION -------------
|
|
|
|
// This header should NOT include any other headers from sanitizer runtime.
|
|
|
|
#include "sanitizer_internal_defs.h"
|
2018-12-08 04:05:55 +08:00
|
|
|
#include "sanitizer_platform_limits_freebsd.h"
|
2017-08-29 05:03:23 +08:00
|
|
|
#include "sanitizer_platform_limits_netbsd.h"
|
2018-03-03 20:12:03 +08:00
|
|
|
#include "sanitizer_platform_limits_openbsd.h"
|
2016-01-15 10:59:23 +08:00
|
|
|
#include "sanitizer_platform_limits_posix.h"
|
[Sanitizers] Basic sanitizer Solaris support (PR 33274)
Summary:
This is the first mostly working version of the Sanitizer port to 32-bit Solaris/x86.
It is currently based on Solaris 11.4 Beta.
This part was initially developed inside libsanitizer in the GCC tree and should apply to
both. Subsequent parts will address changes to clang, the compiler-rt build system
and testsuite.
I'm not yet sure what the right patch granularity is: if it's profitable to split the patch
up, I'd like to get guidance on how to do so.
Most of the changes are probably straightforward with a few exceptions:
* The Solaris syscall interface isn't stable, undocumented and can change within an
OS release. The stable interface is the libc interface, which I'm using here, if possible
using the internal _-prefixed names.
* While the patch primarily target 32-bit x86, I've left a few sparc changes in. They
cannot currently be used with clang due to a backend limitation, but have worked
fine inside the gcc tree.
* Some functions (e.g. largefile versions of functions like open64) only exist in 32-bit
Solaris, so I've introduced a separate SANITIZER_SOLARIS32 to check for that.
The patch (with the subsequent ones to be submitted shortly) was tested
on i386-pc-solaris2.11. Only a few failures remain, some of them analyzed, some
still TBD:
AddressSanitizer-i386-sunos :: TestCases/Posix/concurrent_overflow.cc
AddressSanitizer-i386-sunos :: TestCases/init-order-atexit.cc
AddressSanitizer-i386-sunos :: TestCases/log-path_test.cc
AddressSanitizer-i386-sunos :: TestCases/malloc-no-intercept.c
AddressSanitizer-i386-sunos-dynamic :: TestCases/Posix/concurrent_overflow.cc
AddressSanitizer-i386-sunos-dynamic :: TestCases/Posix/start-deactivated.cc
AddressSanitizer-i386-sunos-dynamic :: TestCases/default_options.cc
AddressSanitizer-i386-sunos-dynamic :: TestCases/init-order-atexit.cc
AddressSanitizer-i386-sunos-dynamic :: TestCases/log-path_test.cc
AddressSanitizer-i386-sunos-dynamic :: TestCases/malloc-no-intercept.c
SanitizerCommon-Unit :: ./Sanitizer-i386-Test/MemoryMappingLayout.DumpListOfModules
SanitizerCommon-Unit :: ./Sanitizer-i386-Test/SanitizerCommon.PthreadDestructorIterations
Maybe this is good enough the get the ball rolling.
Reviewers: kcc, alekseyshl
Reviewed By: alekseyshl
Subscribers: srhines, jyknight, kubamracek, krytarowski, fedor.sergeev, llvm-commits, #sanitizers
Tags: #sanitizers
Differential Revision: https://reviews.llvm.org/D40898
llvm-svn: 320740
2017-12-15 04:14:29 +08:00
|
|
|
#include "sanitizer_platform_limits_solaris.h"
|
2015-04-09 01:08:24 +08:00
|
|
|
|
|
|
|
#if !SANITIZER_POSIX
|
|
|
|
// Make it hard to accidentally use any of functions declared in this file:
|
|
|
|
#error This file should only be included on POSIX
|
|
|
|
#endif
|
|
|
|
|
|
|
|
namespace __sanitizer {
|
|
|
|
|
|
|
|
// I/O
|
|
|
|
// Don't use directly, use __sanitizer::OpenFile() instead.
|
|
|
|
uptr internal_open(const char *filename, int flags);
|
|
|
|
uptr internal_open(const char *filename, int flags, u32 mode);
|
2015-04-09 20:37:05 +08:00
|
|
|
uptr internal_close(fd_t fd);
|
2015-04-09 01:08:24 +08:00
|
|
|
|
2015-04-09 21:38:14 +08:00
|
|
|
uptr internal_read(fd_t fd, void *buf, uptr count);
|
2015-04-09 22:11:25 +08:00
|
|
|
uptr internal_write(fd_t fd, const void *buf, uptr count);
|
2015-04-09 21:38:14 +08:00
|
|
|
|
2015-04-09 01:08:24 +08:00
|
|
|
// Memory
|
|
|
|
uptr internal_mmap(void *addr, uptr length, int prot, int flags,
|
2020-01-11 05:18:55 +08:00
|
|
|
int fd, u64 offset);
|
2015-04-09 01:08:24 +08:00
|
|
|
uptr internal_munmap(void *addr, uptr length);
|
2015-04-10 23:02:19 +08:00
|
|
|
int internal_mprotect(void *addr, uptr length, int prot);
|
2015-04-09 01:08:24 +08:00
|
|
|
|
2015-04-09 20:54:06 +08:00
|
|
|
// OS
|
|
|
|
uptr internal_filesize(fd_t fd); // -1 on error.
|
|
|
|
uptr internal_stat(const char *path, void *buf);
|
|
|
|
uptr internal_lstat(const char *path, void *buf);
|
|
|
|
uptr internal_fstat(fd_t fd, void *buf);
|
2018-12-21 04:36:33 +08:00
|
|
|
uptr internal_dup(int oldfd);
|
2015-04-09 20:54:06 +08:00
|
|
|
uptr internal_dup2(int oldfd, int newfd);
|
|
|
|
uptr internal_readlink(const char *path, char *buf, uptr bufsize);
|
|
|
|
uptr internal_unlink(const char *path);
|
2015-04-09 22:45:17 +08:00
|
|
|
uptr internal_rename(const char *oldpath, const char *newpath);
|
2015-04-09 20:54:06 +08:00
|
|
|
uptr internal_lseek(fd_t fd, OFF_T offset, int whence);
|
|
|
|
|
Add NetBSD LSan support
Summary:
Combine few relatively small changes into one:
- implement internal_ptrace() and internal_clone() for NetBSD
- add support for stoptheworld based on the ptrace(2) API
- define COMPILER_RT_HAS_LSAN for NetBSD
- enable tests for NetBSD/amd64
Inspired by the original implementation by Christos Zoulas in netbsd/src for GCC.
The implementation is in theory CPU independent through well defined macros
across all NetBSD ports, however only the x86_64 version was tested.
Reviewers: mgorny, dvyukov, vitalybuka, joerg, jfb
Reviewed By: vitalybuka
Subscribers: dexonsmith, jfb, srhines, kubamracek, llvm-commits, christos
Tags: #llvm
Differential Revision: https://reviews.llvm.org/D64057
llvm-svn: 365735
2019-07-11 14:22:35 +08:00
|
|
|
#if SANITIZER_NETBSD
|
|
|
|
uptr internal_ptrace(int request, int pid, void *addr, int data);
|
|
|
|
#else
|
2015-04-09 01:08:24 +08:00
|
|
|
uptr internal_ptrace(int request, int pid, void *addr, void *data);
|
Add NetBSD LSan support
Summary:
Combine few relatively small changes into one:
- implement internal_ptrace() and internal_clone() for NetBSD
- add support for stoptheworld based on the ptrace(2) API
- define COMPILER_RT_HAS_LSAN for NetBSD
- enable tests for NetBSD/amd64
Inspired by the original implementation by Christos Zoulas in netbsd/src for GCC.
The implementation is in theory CPU independent through well defined macros
across all NetBSD ports, however only the x86_64 version was tested.
Reviewers: mgorny, dvyukov, vitalybuka, joerg, jfb
Reviewed By: vitalybuka
Subscribers: dexonsmith, jfb, srhines, kubamracek, llvm-commits, christos
Tags: #llvm
Differential Revision: https://reviews.llvm.org/D64057
llvm-svn: 365735
2019-07-11 14:22:35 +08:00
|
|
|
#endif
|
2015-04-09 01:08:24 +08:00
|
|
|
uptr internal_waitpid(int pid, int *status, int options);
|
2015-04-09 20:54:06 +08:00
|
|
|
|
2015-04-09 01:08:24 +08:00
|
|
|
int internal_fork();
|
2020-03-24 10:57:33 +08:00
|
|
|
fd_t internal_spawn(const char *argv[], const char *envp[], pid_t *pid);
|
2015-04-09 01:08:24 +08:00
|
|
|
|
2018-08-31 16:10:06 +08:00
|
|
|
int internal_sysctl(const int *name, unsigned int namelen, void *oldp,
|
|
|
|
uptr *oldlenp, const void *newp, uptr newlen);
|
2018-10-05 14:58:02 +08:00
|
|
|
int internal_sysctlbyname(const char *sname, void *oldp, uptr *oldlenp,
|
|
|
|
const void *newp, uptr newlen);
|
2018-08-31 16:10:06 +08:00
|
|
|
|
2015-04-09 01:08:24 +08:00
|
|
|
// These functions call appropriate pthread_ functions directly, bypassing
|
|
|
|
// the interceptor. They are weak and may not be present in some tools.
|
|
|
|
SANITIZER_WEAK_ATTRIBUTE
|
|
|
|
int real_pthread_create(void *th, void *attr, void *(*callback)(void *),
|
|
|
|
void *param);
|
|
|
|
SANITIZER_WEAK_ATTRIBUTE
|
|
|
|
int real_pthread_join(void *th, void **ret);
|
|
|
|
|
|
|
|
#define DEFINE_REAL_PTHREAD_FUNCTIONS \
|
|
|
|
namespace __sanitizer { \
|
|
|
|
int real_pthread_create(void *th, void *attr, void *(*callback)(void *), \
|
|
|
|
void *param) { \
|
|
|
|
return REAL(pthread_create)(th, attr, callback, param); \
|
|
|
|
} \
|
|
|
|
int real_pthread_join(void *th, void **ret) { \
|
|
|
|
return REAL(pthread_join(th, ret)); \
|
|
|
|
} \
|
|
|
|
} // namespace __sanitizer
|
|
|
|
|
2015-11-03 22:33:39 +08:00
|
|
|
int my_pthread_attr_getstack(void *attr, void **addr, uptr *size);
|
|
|
|
|
2016-06-03 12:30:47 +08:00
|
|
|
// A routine named real_sigaction() must be implemented by each sanitizer in
|
|
|
|
// order for internal_sigaction() to bypass interceptors.
|
2015-04-09 01:08:24 +08:00
|
|
|
int internal_sigaction(int signum, const void *act, void *oldact);
|
2016-01-15 10:59:23 +08:00
|
|
|
void internal_sigfillset(__sanitizer_sigset_t *set);
|
2016-07-07 05:04:48 +08:00
|
|
|
void internal_sigemptyset(__sanitizer_sigset_t *set);
|
|
|
|
bool internal_sigismember(__sanitizer_sigset_t *set, int signum);
|
2015-04-09 01:08:24 +08:00
|
|
|
|
2016-01-27 04:10:01 +08:00
|
|
|
uptr internal_execve(const char *filename, char *const argv[],
|
|
|
|
char *const envp[]);
|
2017-04-14 01:28:52 +08:00
|
|
|
|
|
|
|
bool IsStateDetached(int state);
|
|
|
|
|
2018-12-21 04:36:33 +08:00
|
|
|
// Move the fd out of {0, 1, 2} range.
|
|
|
|
fd_t ReserveStandardFds(fd_t fd);
|
|
|
|
|
2019-01-08 09:07:34 +08:00
|
|
|
bool ShouldMockFailureToOpen(const char *path);
|
|
|
|
|
2019-02-06 09:14:50 +08:00
|
|
|
// Create a non-file mapping with a given /proc/self/maps name.
|
|
|
|
uptr MmapNamed(void *addr, uptr length, int prot, int flags, const char *name);
|
|
|
|
|
|
|
|
// Platforms should implement at most one of these.
|
|
|
|
// 1. Provide a pre-decorated file descriptor to use instead of an anonymous
|
|
|
|
// mapping.
|
|
|
|
int GetNamedMappingFd(const char *name, uptr size, int *flags);
|
|
|
|
// 2. Add name to an existing anonymous mapping. The caller must keep *name
|
|
|
|
// alive at least as long as the mapping exists.
|
|
|
|
void DecorateMapping(uptr addr, uptr size, const char *name);
|
|
|
|
|
|
|
|
|
2015-04-09 01:08:24 +08:00
|
|
|
} // namespace __sanitizer
|
|
|
|
|
|
|
|
#endif // SANITIZER_POSIX_H
|