forked from OSchip/llvm-project
Add new interceptors: access(2), faccessat(2)
Summary: access, faccessat - check access permissions of a file or pathname Sponsored by <The NetBSD Foundation> Reviewers: joerg, vitalybuka Reviewed By: vitalybuka Subscribers: llvm-commits, kubamracek, #sanitizers Tags: #sanitizers Differential Revision: https://reviews.llvm.org/D42065 llvm-svn: 322831
This commit is contained in:
parent
e5499111b9
commit
26370ddcd7
|
@ -6540,6 +6540,32 @@ INTERCEPTOR(int, gid_from_group, const char *group, u32 *gid) {
|
|||
#define INIT_GID_FROM_GROUP
|
||||
#endif
|
||||
|
||||
#if SANITIZER_INTERCEPT_ACCESS
|
||||
INTERCEPTOR(int, access, const char *path, int mode) {
|
||||
void *ctx;
|
||||
COMMON_INTERCEPTOR_ENTER(ctx, access, path, mode);
|
||||
if (path)
|
||||
COMMON_INTERCEPTOR_READ_RANGE(ctx, path, REAL(strlen)(path) + 1);
|
||||
return REAL(access)(path, mode);
|
||||
}
|
||||
#define INIT_ACCESS COMMON_INTERCEPT_FUNCTION(access)
|
||||
#else
|
||||
#define INIT_ACCESS
|
||||
#endif
|
||||
|
||||
#if SANITIZER_INTERCEPT_FACCESSAT
|
||||
INTERCEPTOR(int, faccessat, int fd, const char *path, int mode, int flags) {
|
||||
void *ctx;
|
||||
COMMON_INTERCEPTOR_ENTER(ctx, faccessat, fd, path, mode, flags);
|
||||
if (path)
|
||||
COMMON_INTERCEPTOR_READ_RANGE(ctx, path, REAL(strlen)(path) + 1);
|
||||
return REAL(faccessat)(fd, path, mode, flags);
|
||||
}
|
||||
#define INIT_FACCESSAT COMMON_INTERCEPT_FUNCTION(faccessat)
|
||||
#else
|
||||
#define INIT_FACCESSAT
|
||||
#endif
|
||||
|
||||
static void InitializeCommonInterceptors() {
|
||||
static u64 metadata_mem[sizeof(MetadataHashMap) / sizeof(u64) + 1];
|
||||
interceptor_metadata_map = new((void *)&metadata_mem) MetadataHashMap();
|
||||
|
@ -6756,6 +6782,8 @@ static void InitializeCommonInterceptors() {
|
|||
INIT_UID_FROM_USER;
|
||||
INIT_GROUP_FROM_GID;
|
||||
INIT_GID_FROM_GROUP;
|
||||
INIT_ACCESS;
|
||||
INIT_FACCESSAT;
|
||||
|
||||
#if SANITIZER_NETBSD
|
||||
COMMON_INTERCEPT_FUNCTION(__libc_mutex_lock);
|
||||
|
|
|
@ -437,5 +437,7 @@
|
|||
#define SANITIZER_INTERCEPT_UID_FROM_USER SI_NETBSD
|
||||
#define SANITIZER_INTERCEPT_GROUP_FROM_GID SI_NETBSD
|
||||
#define SANITIZER_INTERCEPT_GID_FROM_GROUP SI_NETBSD
|
||||
#define SANITIZER_INTERCEPT_ACCESS SI_NETBSD
|
||||
#define SANITIZER_INTERCEPT_FACCESSAT SI_NETBSD
|
||||
|
||||
#endif // #ifndef SANITIZER_PLATFORM_INTERCEPTORS_H
|
||||
|
|
|
@ -0,0 +1,5 @@
|
|||
// RUN: %clangxx -O0 -g %s -o %t && %run %t
|
||||
|
||||
#include <unistd.h>
|
||||
|
||||
int main(void) { return access("/root", F_OK); }
|
|
@ -0,0 +1,6 @@
|
|||
// RUN: %clangxx -O0 -g %s -o %t && %run %t
|
||||
|
||||
#include <fcntl.h>
|
||||
#include <unistd.h>
|
||||
|
||||
int main(void) { return faccessat(AT_FDCWD, "/root", F_OK, 0); }
|
Loading…
Reference in New Issue