2013-01-31 21:46:14 +08:00
|
|
|
//===-- asan_interface_internal.h -------------------------------*- C++ -*-===//
|
|
|
|
//
|
2019-01-19 16:50:56 +08:00
|
|
|
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
|
|
|
|
// See https://llvm.org/LICENSE.txt for license information.
|
|
|
|
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
|
2013-01-31 21:46:14 +08:00
|
|
|
//
|
|
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
//
|
|
|
|
// This file is a part of AddressSanitizer, an address sanity checker.
|
|
|
|
//
|
2015-02-19 23:15:33 +08:00
|
|
|
// This header declares the AddressSanitizer runtime interface functions.
|
|
|
|
// The runtime library has to define these functions so the instrumented program
|
|
|
|
// could call them.
|
|
|
|
//
|
|
|
|
// See also include/sanitizer/asan_interface.h
|
2013-01-31 21:46:14 +08:00
|
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
#ifndef ASAN_INTERFACE_INTERNAL_H
|
|
|
|
#define ASAN_INTERFACE_INTERNAL_H
|
|
|
|
|
|
|
|
#include "sanitizer_common/sanitizer_internal_defs.h"
|
|
|
|
|
2014-07-10 18:33:48 +08:00
|
|
|
#include "asan_init_version.h"
|
|
|
|
|
2013-01-31 21:46:14 +08:00
|
|
|
using __sanitizer::uptr;
|
2016-09-16 05:02:18 +08:00
|
|
|
using __sanitizer::u64;
|
|
|
|
using __sanitizer::u32;
|
2013-01-31 21:46:14 +08:00
|
|
|
|
|
|
|
extern "C" {
|
2014-07-15 16:16:04 +08:00
|
|
|
// This function should be called at the very beginning of the process,
|
|
|
|
// before any instrumented code is executed and before any call to malloc.
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_init();
|
|
|
|
|
2015-07-23 18:55:13 +08:00
|
|
|
// This function exists purely to get a linker/loader error when using
|
|
|
|
// incompatible versions of instrumentation and runtime library. Please note
|
|
|
|
// that __asan_version_mismatch_check is a macro that is replaced with
|
|
|
|
// __asan_version_mismatch_check_vXXX at compile-time.
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_version_mismatch_check();
|
|
|
|
|
2014-07-03 00:54:41 +08:00
|
|
|
// This structure is used to describe the source location of a place where
|
|
|
|
// global was defined.
|
|
|
|
struct __asan_global_source_location {
|
|
|
|
const char *filename;
|
|
|
|
int line_no;
|
|
|
|
int column_no;
|
|
|
|
};
|
2013-01-31 21:46:14 +08:00
|
|
|
|
|
|
|
// This structure describes an instrumented global variable.
|
|
|
|
struct __asan_global {
|
|
|
|
uptr beg; // The address of the global.
|
|
|
|
uptr size; // The original size of the global.
|
|
|
|
uptr size_with_redzone; // The size with the redzone.
|
|
|
|
const char *name; // Name as a C string.
|
2013-03-26 21:06:12 +08:00
|
|
|
const char *module_name; // Module name as a C string. This pointer is a
|
|
|
|
// unique identifier of a module.
|
2013-01-31 21:46:14 +08:00
|
|
|
uptr has_dynamic_init; // Non-zero if the global has dynamic initializer.
|
2014-07-03 00:54:41 +08:00
|
|
|
__asan_global_source_location *location; // Source location of a global,
|
|
|
|
// or NULL if it is unknown.
|
2016-02-08 16:39:59 +08:00
|
|
|
uptr odr_indicator; // The address of the ODR indicator symbol.
|
2013-01-31 21:46:14 +08:00
|
|
|
};
|
|
|
|
|
2016-03-29 04:28:17 +08:00
|
|
|
// These functions can be called on some platforms to find globals in the same
|
|
|
|
// loaded image as `flag' and apply __asan_(un)register_globals to them,
|
|
|
|
// filtering out redundant calls.
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
void __asan_register_image_globals(uptr *flag);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
void __asan_unregister_image_globals(uptr *flag);
|
|
|
|
|
2017-04-28 04:27:33 +08:00
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
void __asan_register_elf_globals(uptr *flag, void *start, void *stop);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
void __asan_unregister_elf_globals(uptr *flag, void *start, void *stop);
|
|
|
|
|
2013-01-31 21:46:14 +08:00
|
|
|
// These two functions should be called by the instrumented code.
|
|
|
|
// 'globals' is an array of structures describing 'n' globals.
|
2013-08-13 19:42:45 +08:00
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
void __asan_register_globals(__asan_global *globals, uptr n);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
void __asan_unregister_globals(__asan_global *globals, uptr n);
|
2013-01-31 21:46:14 +08:00
|
|
|
|
|
|
|
// These two functions should be called before and after dynamic initializers
|
2013-03-26 21:06:12 +08:00
|
|
|
// of a single module run, respectively.
|
2013-08-13 19:42:45 +08:00
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
void __asan_before_dynamic_init(const char *module_name);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
void __asan_after_dynamic_init();
|
2013-01-31 21:46:14 +08:00
|
|
|
|
2016-08-18 08:56:11 +08:00
|
|
|
// Sets bytes of the given range of the shadow memory into specific value.
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
void __asan_set_shadow_00(uptr addr, uptr size);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
void __asan_set_shadow_f1(uptr addr, uptr size);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
void __asan_set_shadow_f2(uptr addr, uptr size);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
void __asan_set_shadow_f3(uptr addr, uptr size);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
void __asan_set_shadow_f5(uptr addr, uptr size);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
void __asan_set_shadow_f8(uptr addr, uptr size);
|
|
|
|
|
2013-01-31 21:46:14 +08:00
|
|
|
// These two functions are used by instrumented code in the
|
|
|
|
// use-after-scope mode. They mark memory for local variables as
|
|
|
|
// unaddressable when they leave scope and addressable before the
|
|
|
|
// function exits.
|
2013-08-13 19:42:45 +08:00
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
void __asan_poison_stack_memory(uptr addr, uptr size);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
void __asan_unpoison_stack_memory(uptr addr, uptr size);
|
2013-01-31 21:46:14 +08:00
|
|
|
|
|
|
|
// Performs cleanup before a NoReturn function. Must be called before things
|
|
|
|
// like _exit and execl to avoid false positives on stack.
|
2013-08-13 19:42:45 +08:00
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_handle_no_return();
|
2013-01-31 21:46:14 +08:00
|
|
|
|
2013-08-13 19:42:45 +08:00
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
void __asan_poison_memory_region(void const volatile *addr, uptr size);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
void __asan_unpoison_memory_region(void const volatile *addr, uptr size);
|
2013-01-31 21:46:14 +08:00
|
|
|
|
2013-08-13 19:42:45 +08:00
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
2014-04-14 19:16:53 +08:00
|
|
|
int __asan_address_is_poisoned(void const volatile *addr);
|
2013-01-31 21:46:14 +08:00
|
|
|
|
2013-08-13 19:42:45 +08:00
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
uptr __asan_region_is_poisoned(uptr beg, uptr size);
|
2013-01-31 21:46:14 +08:00
|
|
|
|
2013-08-13 19:42:45 +08:00
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
void __asan_describe_address(uptr addr);
|
2013-01-31 21:46:14 +08:00
|
|
|
|
2014-09-27 03:15:32 +08:00
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
int __asan_report_present();
|
|
|
|
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
uptr __asan_get_report_pc();
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
uptr __asan_get_report_bp();
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
uptr __asan_get_report_sp();
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
uptr __asan_get_report_address();
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
int __asan_get_report_access_type();
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
uptr __asan_get_report_access_size();
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
const char * __asan_get_report_description();
|
|
|
|
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
const char * __asan_locate_address(uptr addr, char *name, uptr name_size,
|
|
|
|
uptr *region_address, uptr *region_size);
|
|
|
|
|
2014-07-16 01:33:23 +08:00
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
uptr __asan_get_alloc_stack(uptr addr, uptr *trace, uptr size,
|
|
|
|
u32 *thread_id);
|
|
|
|
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
uptr __asan_get_free_stack(uptr addr, uptr *trace, uptr size,
|
|
|
|
u32 *thread_id);
|
|
|
|
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
void __asan_get_shadow_mapping(uptr *shadow_scale, uptr *shadow_offset);
|
|
|
|
|
2013-08-13 19:42:45 +08:00
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
2013-01-31 21:46:14 +08:00
|
|
|
void __asan_report_error(uptr pc, uptr bp, uptr sp,
|
2015-03-18 00:59:11 +08:00
|
|
|
uptr addr, int is_write, uptr access_size, u32 exp);
|
2013-01-31 21:46:14 +08:00
|
|
|
|
2013-08-13 19:42:45 +08:00
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
void __asan_set_death_callback(void (*callback)(void));
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
void __asan_set_error_report_callback(void (*callback)(const char*));
|
2013-01-31 21:46:14 +08:00
|
|
|
|
2013-08-13 19:42:45 +08:00
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE SANITIZER_WEAK_ATTRIBUTE
|
[sanitizer] Add list of symbols exported in sanitizers' interface.
Add a new auxiliary file to each sanitizer: sanitizer_interface.inc, listing all
the functions exported, with the macros: INTERFACE_FUNCTION() and
INTERFACE_WEAK_FUNCTION().
So, when we need to define or repeat a procedure for each function in the
sanitizer's interface, we can define the macros and include that header.
In particular, these files are needed for Windows, in the nexts commits.
Also, this files could replace the existing files: weak_symbols.txt for Apple.
Instead of reading weak_symbols.txt to get the list of weak symbols, we could
read the file sanitizer_interface.inc and consider all the symbols included with
the macro INTERFACE_WEAK_FUNCTION(Name).
In this commit, I only include these files to the sanitizers that work on
Windows. We could do the same for the rest of the sanitizers when needed.
I updated tests for: Linux, Darwin and Windows. If a new function is exported
but is not present in the interface list, the tests
"interface_symbols_[darwin|windows|linux].c" fail.
Also, I remove the comments: "/* OPTIONAL */" which are not required any more,
because we use the macro: INTERFACE_WEAK_FUNCTION() for weak functions.
Differential Revision: https://reviews.llvm.org/D29148
llvm-svn: 293682
2017-02-01 04:23:21 +08:00
|
|
|
void __asan_on_error();
|
2013-01-31 21:46:14 +08:00
|
|
|
|
2014-07-08 01:39:31 +08:00
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_print_accumulated_stats();
|
|
|
|
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE SANITIZER_WEAK_ATTRIBUTE
|
[sanitizer] Add list of symbols exported in sanitizers' interface.
Add a new auxiliary file to each sanitizer: sanitizer_interface.inc, listing all
the functions exported, with the macros: INTERFACE_FUNCTION() and
INTERFACE_WEAK_FUNCTION().
So, when we need to define or repeat a procedure for each function in the
sanitizer's interface, we can define the macros and include that header.
In particular, these files are needed for Windows, in the nexts commits.
Also, this files could replace the existing files: weak_symbols.txt for Apple.
Instead of reading weak_symbols.txt to get the list of weak symbols, we could
read the file sanitizer_interface.inc and consider all the symbols included with
the macro INTERFACE_WEAK_FUNCTION(Name).
In this commit, I only include these files to the sanitizers that work on
Windows. We could do the same for the rest of the sanitizers when needed.
I updated tests for: Linux, Darwin and Windows. If a new function is exported
but is not present in the interface list, the tests
"interface_symbols_[darwin|windows|linux].c" fail.
Also, I remove the comments: "/* OPTIONAL */" which are not required any more,
because we use the macro: INTERFACE_WEAK_FUNCTION() for weak functions.
Differential Revision: https://reviews.llvm.org/D29148
llvm-svn: 293682
2017-02-01 04:23:21 +08:00
|
|
|
const char* __asan_default_options();
|
2013-09-18 18:35:12 +08:00
|
|
|
|
2016-10-01 01:47:34 +08:00
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
extern uptr __asan_shadow_memory_dynamic_address;
|
|
|
|
|
2013-09-18 18:35:12 +08:00
|
|
|
// Global flag, copy of ASAN_OPTIONS=detect_stack_use_after_return
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
extern int __asan_option_detect_stack_use_after_return;
|
2014-04-16 21:52:28 +08:00
|
|
|
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
extern uptr *__asan_test_only_reported_buggy_pointer;
|
|
|
|
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_load1(uptr p);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_load2(uptr p);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_load4(uptr p);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_load8(uptr p);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_load16(uptr p);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_store1(uptr p);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_store2(uptr p);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_store4(uptr p);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_store8(uptr p);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_store16(uptr p);
|
2014-04-21 15:09:01 +08:00
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_loadN(uptr p, uptr size);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_storeN(uptr p, uptr size);
|
2014-04-21 19:58:25 +08:00
|
|
|
|
2015-11-11 19:59:38 +08:00
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_load1_noabort(uptr p);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_load2_noabort(uptr p);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_load4_noabort(uptr p);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_load8_noabort(uptr p);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_load16_noabort(uptr p);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_store1_noabort(uptr p);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_store2_noabort(uptr p);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_store4_noabort(uptr p);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_store8_noabort(uptr p);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_store16_noabort(uptr p);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_loadN_noabort(uptr p, uptr size);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_storeN_noabort(uptr p, uptr size);
|
|
|
|
|
2015-03-18 00:59:11 +08:00
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_exp_load1(uptr p, u32 exp);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_exp_load2(uptr p, u32 exp);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_exp_load4(uptr p, u32 exp);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_exp_load8(uptr p, u32 exp);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_exp_load16(uptr p, u32 exp);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_exp_store1(uptr p, u32 exp);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_exp_store2(uptr p, u32 exp);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_exp_store4(uptr p, u32 exp);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_exp_store8(uptr p, u32 exp);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_exp_store16(uptr p, u32 exp);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_exp_loadN(uptr p, uptr size,
|
|
|
|
u32 exp);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_exp_storeN(uptr p, uptr size,
|
|
|
|
u32 exp);
|
|
|
|
|
2014-04-21 19:58:25 +08:00
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
void* __asan_memcpy(void *dst, const void *src, uptr size);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
void* __asan_memset(void *s, int c, uptr n);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
void* __asan_memmove(void* dest, const void* src, uptr n);
|
2014-08-04 20:43:13 +08:00
|
|
|
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
void __asan_poison_cxx_array_cookie(uptr p);
|
2014-08-29 06:28:04 +08:00
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
uptr __asan_load_cxx_array_cookie(uptr *p);
|
2014-10-17 09:22:37 +08:00
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
void __asan_poison_intra_object_redzone(uptr p, uptr size);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
void __asan_unpoison_intra_object_redzone(uptr p, uptr size);
|
2015-05-28 15:49:05 +08:00
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
void __asan_alloca_poison(uptr addr, uptr size);
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE
|
|
|
|
void __asan_allocas_unpoison(uptr top, uptr bottom);
|
2017-01-29 14:14:55 +08:00
|
|
|
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE SANITIZER_WEAK_ATTRIBUTE
|
[sanitizer] Add list of symbols exported in sanitizers' interface.
Add a new auxiliary file to each sanitizer: sanitizer_interface.inc, listing all
the functions exported, with the macros: INTERFACE_FUNCTION() and
INTERFACE_WEAK_FUNCTION().
So, when we need to define or repeat a procedure for each function in the
sanitizer's interface, we can define the macros and include that header.
In particular, these files are needed for Windows, in the nexts commits.
Also, this files could replace the existing files: weak_symbols.txt for Apple.
Instead of reading weak_symbols.txt to get the list of weak symbols, we could
read the file sanitizer_interface.inc and consider all the symbols included with
the macro INTERFACE_WEAK_FUNCTION(Name).
In this commit, I only include these files to the sanitizers that work on
Windows. We could do the same for the rest of the sanitizers when needed.
I updated tests for: Linux, Darwin and Windows. If a new function is exported
but is not present in the interface list, the tests
"interface_symbols_[darwin|windows|linux].c" fail.
Also, I remove the comments: "/* OPTIONAL */" which are not required any more,
because we use the macro: INTERFACE_WEAK_FUNCTION() for weak functions.
Differential Revision: https://reviews.llvm.org/D29148
llvm-svn: 293682
2017-02-01 04:23:21 +08:00
|
|
|
const char* __asan_default_suppressions();
|
[hwasan, asan] Intercept vfork.
Summary:
Intercept vfork on arm, aarch64, i386 and x86_64.
Reviewers: pcc, vitalybuka
Subscribers: kubamracek, mgorny, javed.absar, krytarowski, kristof.beyls, #sanitizers, llvm-commits
Tags: #sanitizers, #llvm
Differential Revision: https://reviews.llvm.org/D58533
llvm-svn: 355030
2019-02-28 05:11:50 +08:00
|
|
|
|
|
|
|
SANITIZER_INTERFACE_ATTRIBUTE void __asan_handle_vfork(void *sp);
|
2013-01-31 21:46:14 +08:00
|
|
|
} // extern "C"
|
|
|
|
|
|
|
|
#endif // ASAN_INTERFACE_INTERNAL_H
|