xref: /openbsd-src/gnu/llvm/compiler-rt/lib/fuzzer/FuzzerExtFunctions.def (revision 3cab2bb3f667058bece8e38b12449a63a9d73c4b)
1*3cab2bb3Spatrick//===- FuzzerExtFunctions.def - External functions --------------*- C++ -* ===//
2*3cab2bb3Spatrick//
3*3cab2bb3Spatrick// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4*3cab2bb3Spatrick// See https://llvm.org/LICENSE.txt for license information.
5*3cab2bb3Spatrick// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6*3cab2bb3Spatrick//
7*3cab2bb3Spatrick//===----------------------------------------------------------------------===//
8*3cab2bb3Spatrick// This defines the external function pointers that
9*3cab2bb3Spatrick// ``fuzzer::ExternalFunctions`` should contain and try to initialize.  The
10*3cab2bb3Spatrick// EXT_FUNC macro must be defined at the point of inclusion. The signature of
11*3cab2bb3Spatrick// the macro is:
12*3cab2bb3Spatrick//
13*3cab2bb3Spatrick// EXT_FUNC(<name>, <return_type>, <function_signature>, <warn_if_missing>)
14*3cab2bb3Spatrick//===----------------------------------------------------------------------===//
15*3cab2bb3Spatrick
16*3cab2bb3Spatrick// Optional user functions
17*3cab2bb3SpatrickEXT_FUNC(LLVMFuzzerInitialize, int, (int *argc, char ***argv), false);
18*3cab2bb3SpatrickEXT_FUNC(LLVMFuzzerCustomMutator, size_t,
19*3cab2bb3Spatrick         (uint8_t *Data, size_t Size, size_t MaxSize, unsigned int Seed),
20*3cab2bb3Spatrick         false);
21*3cab2bb3SpatrickEXT_FUNC(LLVMFuzzerCustomCrossOver, size_t,
22*3cab2bb3Spatrick         (const uint8_t *Data1, size_t Size1,
23*3cab2bb3Spatrick          const uint8_t *Data2, size_t Size2,
24*3cab2bb3Spatrick          uint8_t *Out, size_t MaxOutSize, unsigned int Seed),
25*3cab2bb3Spatrick         false);
26*3cab2bb3Spatrick
27*3cab2bb3Spatrick// Sanitizer functions
28*3cab2bb3SpatrickEXT_FUNC(__lsan_enable, void, (), false);
29*3cab2bb3SpatrickEXT_FUNC(__lsan_disable, void, (), false);
30*3cab2bb3SpatrickEXT_FUNC(__lsan_do_recoverable_leak_check, int, (), false);
31*3cab2bb3SpatrickEXT_FUNC(__sanitizer_acquire_crash_state, int, (), true);
32*3cab2bb3SpatrickEXT_FUNC(__sanitizer_install_malloc_and_free_hooks, int,
33*3cab2bb3Spatrick         (void (*malloc_hook)(const volatile void *, size_t),
34*3cab2bb3Spatrick          void (*free_hook)(const volatile void *)),
35*3cab2bb3Spatrick         false);
36*3cab2bb3SpatrickEXT_FUNC(__sanitizer_log_write, void, (const char *buf, size_t len), false);
37*3cab2bb3SpatrickEXT_FUNC(__sanitizer_purge_allocator, void, (), false);
38*3cab2bb3SpatrickEXT_FUNC(__sanitizer_print_memory_profile, void, (size_t, size_t), false);
39*3cab2bb3SpatrickEXT_FUNC(__sanitizer_print_stack_trace, void, (), true);
40*3cab2bb3SpatrickEXT_FUNC(__sanitizer_symbolize_pc, void,
41*3cab2bb3Spatrick         (void *, const char *fmt, char *out_buf, size_t out_buf_size), false);
42*3cab2bb3SpatrickEXT_FUNC(__sanitizer_get_module_and_offset_for_pc, int,
43*3cab2bb3Spatrick         (void *pc, char *module_path,
44*3cab2bb3Spatrick         size_t module_path_len,void **pc_offset), false);
45*3cab2bb3SpatrickEXT_FUNC(__sanitizer_set_death_callback, void, (void (*)(void)), true);
46*3cab2bb3SpatrickEXT_FUNC(__sanitizer_set_report_fd, void, (void*), false);
47*3cab2bb3SpatrickEXT_FUNC(__msan_scoped_disable_interceptor_checks, void, (), false);
48*3cab2bb3SpatrickEXT_FUNC(__msan_scoped_enable_interceptor_checks, void, (), false);
49*3cab2bb3SpatrickEXT_FUNC(__msan_unpoison, void, (const volatile void *, size_t size), false);
50*3cab2bb3SpatrickEXT_FUNC(__msan_unpoison_param, void, (size_t n), false);
51