File: syscall.cpp

package info (click to toggle)
llvm-toolchain-20 1%3A20.1.8-1
  • links: PTS, VCS
  • area: main
  • in suites: experimental
  • size: 2,111,696 kB
  • sloc: cpp: 7,438,781; ansic: 1,393,871; asm: 1,012,926; python: 241,771; f90: 86,635; objc: 75,411; lisp: 42,144; pascal: 17,286; sh: 8,596; ml: 5,082; perl: 4,730; makefile: 3,591; awk: 3,523; javascript: 2,251; xml: 892; fortran: 672
file content (78 lines) | stat: -rw-r--r-- 2,224 bytes parent folder | download | duplicates (10)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
// RUN: %clangxx -fsanitize=realtime %s -o %t
// RUN: %env_rtsan_opts="halt_on_error=false" %run %t 2>&1 | FileCheck %s --check-prefixes=CHECK-RTSAN,CHECK

// RUN: %clangxx %s -o %t
// RUN: %run %t 2>&1 | FileCheck %s

// UNSUPPORTED: ios

// Intent: Ensure the `syscall` call behaves in the same way with/without the
//         sanitizer disabled

#include <fcntl.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/syscall.h>
#include <sys/types.h>
#include <unistd.h>

const char *GetTemporaryFilePath() { return "/tmp/rtsan_syscall_test.txt"; }

void custom_assert(bool condition, const char *message) {
  if (!condition) {
    fprintf(stderr, "ASSERTION FAILED: %s\n", message);
    exit(1);
  }
}

class ScopedFileCleanup {
public:
  [[nodiscard]] ScopedFileCleanup() = default;
  ~ScopedFileCleanup() {
    if (access(GetTemporaryFilePath(), F_OK) != -1)
      unlink(GetTemporaryFilePath());
  }
};

// Apple has deprecated `syscall`, ignore that error
#pragma clang diagnostic push
#pragma clang diagnostic ignored "-Wdeprecated-declarations"
int main() [[clang::nonblocking]] {
  ScopedFileCleanup cleanup;

  {
    int fd = syscall(SYS_openat, AT_FDCWD, GetTemporaryFilePath(),
                     O_CREAT | O_WRONLY, 0644);

    custom_assert(fd != -1, "Failed to open file - write");

    int written = syscall(SYS_write, fd, "Hello, world!", 13);
    custom_assert(written == 13, "Failed to write to file");

    custom_assert(syscall(SYS_close, fd) == 0, "Failed to close file - write");
  }

  {
    int fd = syscall(SYS_openat, AT_FDCWD, GetTemporaryFilePath(), O_RDONLY);
    custom_assert(fd != -1, "Failed to open file - read");

    char buffer[13];
    int read = syscall(SYS_read, fd, buffer, 13);
    custom_assert(read == 13, "Failed to read from file");

    custom_assert(memcmp(buffer, "Hello, world!", 13) == 0,
                  "Read data does not match written data");

    custom_assert(syscall(SYS_close, fd) == 0, "Failed to close file - read");
  }

  unlink(GetTemporaryFilePath());
  printf("DONE\n");
}
#pragma clang diagnostic pop

// CHECK-NOT: ASSERTION FAILED
// CHECK-RTSAN-COUNT-6: Intercepted call to real-time unsafe function `syscall`

// CHECK: DONE