Chris Apple eae30a240e
[rtsan] Add syscall interceptor (#118250)
This is a complex one - `syscall` is used when people want to bypass
libc and make the call directly

However, this call:
* Has a variable amount of arguments (up to 6, typically)
* Has arguments that can be any type, (think of whatever arguments go in
to the libc call, or see more details here
https://syscalls.mebeim.net/?table=x86/64/x64/latest)


I've tried to put in a couple tests to ensure we aren't mucking with the
underlying functionality and they seem to be working.
2024-12-02 06:29:54 -08:00

79 lines
2.2 KiB
C++

// RUN: %clangxx -fsanitize=realtime %s -o %t
// RUN: %env_rtsan_opts="halt_on_error=false" %run %t 2>&1 | FileCheck %s --check-prefixes=CHECK-RTSAN,CHECK
// RUN: %clangxx %s -o %t
// RUN: %run %t 2>&1 | FileCheck %s
// UNSUPPORTED: ios
// Intent: Ensure the `syscall` call behaves in the same way with/without the
// sanitizer disabled
#include <fcntl.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/syscall.h>
#include <sys/types.h>
#include <unistd.h>
const char *GetTemporaryFilePath() { return "/tmp/rtsan_syscall_test.txt"; }
void custom_assert(bool condition, const char *message) {
if (!condition) {
fprintf(stderr, "ASSERTION FAILED: %s\n", message);
exit(1);
}
}
class ScopedFileCleanup {
public:
[[nodiscard]] ScopedFileCleanup() = default;
~ScopedFileCleanup() {
if (access(GetTemporaryFilePath(), F_OK) != -1)
unlink(GetTemporaryFilePath());
}
};
// Apple has deprecated `syscall`, ignore that error
#pragma clang diagnostic push
#pragma clang diagnostic ignored "-Wdeprecated-declarations"
int main() [[clang::nonblocking]] {
ScopedFileCleanup cleanup;
{
int fd = syscall(SYS_openat, AT_FDCWD, GetTemporaryFilePath(),
O_CREAT | O_WRONLY, 0644);
custom_assert(fd != -1, "Failed to open file - write");
int written = syscall(SYS_write, fd, "Hello, world!", 13);
custom_assert(written == 13, "Failed to write to file");
custom_assert(syscall(SYS_close, fd) == 0, "Failed to close file - write");
}
{
int fd = syscall(SYS_openat, AT_FDCWD, GetTemporaryFilePath(), O_RDONLY);
custom_assert(fd != -1, "Failed to open file - read");
char buffer[13];
int read = syscall(SYS_read, fd, buffer, 13);
custom_assert(read == 13, "Failed to read from file");
custom_assert(memcmp(buffer, "Hello, world!", 13) == 0,
"Read data does not match written data");
custom_assert(syscall(SYS_close, fd) == 0, "Failed to close file - read");
}
unlink(GetTemporaryFilePath());
printf("DONE\n");
}
#pragma clang diagnostic pop
// CHECK-NOT: ASSERTION FAILED
// CHECK-RTSAN-COUNT-6: Intercepted call to real-time unsafe function `syscall`
// CHECK: DONE