Home | History | Annotate | Download | only in sanitizer_common
      1 //===-- sanitizer_linux.h ---------------------------------------*- C++ -*-===//
      2 //
      3 //                     The LLVM Compiler Infrastructure
      4 //
      5 // This file is distributed under the University of Illinois Open Source
      6 // License. See LICENSE.TXT for details.
      7 //
      8 //===----------------------------------------------------------------------===//
      9 //
     10 // Linux-specific syscall wrappers and classes.
     11 //
     12 //===----------------------------------------------------------------------===//
     13 #ifndef SANITIZER_LINUX_H
     14 #define SANITIZER_LINUX_H
     15 
     16 #include "sanitizer_platform.h"
     17 #if SANITIZER_FREEBSD || SANITIZER_LINUX
     18 #include "sanitizer_common.h"
     19 #include "sanitizer_internal_defs.h"
     20 #include "sanitizer_posix.h"
     21 #include "sanitizer_platform_limits_posix.h"
     22 
     23 struct link_map;  // Opaque type returned by dlopen().
     24 struct sigaltstack;
     25 
     26 namespace __sanitizer {
     27 // Dirent structure for getdents(). Note that this structure is different from
     28 // the one in <dirent.h>, which is used by readdir().
     29 struct linux_dirent;
     30 
     31 // Syscall wrappers.
     32 uptr internal_getdents(fd_t fd, struct linux_dirent *dirp, unsigned int count);
     33 uptr internal_sigaltstack(const struct sigaltstack* ss,
     34                           struct sigaltstack* oss);
     35 uptr internal_sigprocmask(int how, __sanitizer_sigset_t *set,
     36     __sanitizer_sigset_t *oldset);
     37 
     38 // Linux-only syscalls.
     39 #if SANITIZER_LINUX
     40 uptr internal_prctl(int option, uptr arg2, uptr arg3, uptr arg4, uptr arg5);
     41 // Used only by sanitizer_stoptheworld. Signal handlers that are actually used
     42 // (like the process-wide error reporting SEGV handler) must use
     43 // internal_sigaction instead.
     44 int internal_sigaction_norestorer(int signum, const void *act, void *oldact);
     45 #if defined(__x86_64__) && !SANITIZER_GO
     46 // Uses a raw system call to avoid interceptors.
     47 int internal_sigaction_syscall(int signum, const void *act, void *oldact);
     48 #endif
     49 void internal_sigdelset(__sanitizer_sigset_t *set, int signum);
     50 #if defined(__x86_64__) || defined(__mips__) || defined(__aarch64__) \
     51   || defined(__powerpc64__) || defined(__s390__)
     52 uptr internal_clone(int (*fn)(void *), void *child_stack, int flags, void *arg,
     53                     int *parent_tidptr, void *newtls, int *child_tidptr);
     54 #endif
     55 #endif  // SANITIZER_LINUX
     56 
     57 // This class reads thread IDs from /proc/<pid>/task using only syscalls.
     58 class ThreadLister {
     59  public:
     60   explicit ThreadLister(int pid);
     61   ~ThreadLister();
     62   // GetNextTID returns -1 if the list of threads is exhausted, or if there has
     63   // been an error.
     64   int GetNextTID();
     65   void Reset();
     66   bool error();
     67 
     68  private:
     69   bool GetDirectoryEntries();
     70 
     71   int pid_;
     72   int descriptor_;
     73   InternalScopedBuffer<char> buffer_;
     74   bool error_;
     75   struct linux_dirent* entry_;
     76   int bytes_read_;
     77 };
     78 
     79 // Exposed for testing.
     80 uptr ThreadDescriptorSize();
     81 uptr ThreadSelf();
     82 uptr ThreadSelfOffset();
     83 
     84 // Matches a library's file name against a base name (stripping path and version
     85 // information).
     86 bool LibraryNameIs(const char *full_name, const char *base_name);
     87 
     88 // Call cb for each region mapped by map.
     89 void ForEachMappedRegion(link_map *map, void (*cb)(const void *, uptr));
     90 }  // namespace __sanitizer
     91 
     92 #endif  // SANITIZER_FREEBSD || SANITIZER_LINUX
     93 #endif  // SANITIZER_LINUX_H
     94