Summary: Unlike the rest of the sanitizer code, lib/interception uses native macros like __linux__ to check for specific targets instead of the common ones like SANITIZER_LINUX. When working on the Solaris port of the sanitizers, the current style was found to not only be inconsistent, but clumsy to use because the canonical way to check for Solaris is to check for __sun__ && __svr4__ which is a mouthful. Therefore, this patch switches to use SANITIZER_* macros instead. Tested on x86_64-pc-linux-gnu. Reviewers: kcc, vitalybuka Reviewed By: vitalybuka Subscribers: #sanitizers, srhines, krytarowski, llvm-commits, fedor.sergeev Tags: #sanitizers Differential Revision: https://reviews.llvm.org/D39798 llvm-svn: 319906
53 lines
1.8 KiB
C++
53 lines
1.8 KiB
C++
//===-- interception_linux.cc -----------------------------------*- C++ -*-===//
|
|
//
|
|
// The LLVM Compiler Infrastructure
|
|
//
|
|
// This file is distributed under the University of Illinois Open Source
|
|
// License. See LICENSE.TXT for details.
|
|
//
|
|
//===----------------------------------------------------------------------===//
|
|
//
|
|
// This file is a part of AddressSanitizer, an address sanity checker.
|
|
//
|
|
// Linux-specific interception methods.
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
#include "interception.h"
|
|
|
|
#if SANITIZER_LINUX || SANITIZER_FREEBSD || SANITIZER_NETBSD
|
|
|
|
#include <dlfcn.h> // for dlsym() and dlvsym()
|
|
|
|
#if SANITIZER_NETBSD
|
|
#include "sanitizer_common/sanitizer_libc.h"
|
|
#endif
|
|
|
|
namespace __interception {
|
|
bool GetRealFunctionAddress(const char *func_name, uptr *func_addr,
|
|
uptr real, uptr wrapper) {
|
|
#if SANITIZER_NETBSD
|
|
// XXX: Find a better way to handle renames
|
|
if (internal_strcmp(func_name, "sigaction") == 0) func_name = "__sigaction14";
|
|
#endif
|
|
*func_addr = (uptr)dlsym(RTLD_NEXT, func_name);
|
|
if (!*func_addr) {
|
|
// If the lookup using RTLD_NEXT failed, the sanitizer runtime library is
|
|
// later in the library search order than the DSO that we are trying to
|
|
// intercept, which means that we cannot intercept this function. We still
|
|
// want the address of the real definition, though, so look it up using
|
|
// RTLD_DEFAULT.
|
|
*func_addr = (uptr)dlsym(RTLD_DEFAULT, func_name);
|
|
}
|
|
return real == wrapper;
|
|
}
|
|
|
|
#if !SANITIZER_ANDROID // android does not have dlvsym
|
|
void *GetFuncAddrVer(const char *func_name, const char *ver) {
|
|
return dlvsym(RTLD_NEXT, func_name, ver);
|
|
}
|
|
#endif // !SANITIZER_ANDROID
|
|
|
|
} // namespace __interception
|
|
|
|
#endif // SANITIZER_LINUX || SANITIZER_FREEBSD || SANITIZER_NETBSD
|