Summary: Unlike the rest of the sanitizer code, lib/interception uses native macros like __linux__ to check for specific targets instead of the common ones like SANITIZER_LINUX. When working on the Solaris port of the sanitizers, the current style was found to not only be inconsistent, but clumsy to use because the canonical way to check for Solaris is to check for __sun__ && __svr4__ which is a mouthful. Therefore, this patch switches to use SANITIZER_* macros instead. Tested on x86_64-pc-linux-gnu. Reviewers: kcc, vitalybuka Reviewed By: vitalybuka Subscribers: #sanitizers, srhines, krytarowski, llvm-commits, fedor.sergeev Tags: #sanitizers Differential Revision: https://reviews.llvm.org/D39798 llvm-svn: 319906
85 lines
3.4 KiB
C++
85 lines
3.4 KiB
C++
//===-- interception_linux.h ------------------------------------*- C++ -*-===//
|
|
//
|
|
// The LLVM Compiler Infrastructure
|
|
//
|
|
// This file is distributed under the University of Illinois Open Source
|
|
// License. See LICENSE.TXT for details.
|
|
//
|
|
//===----------------------------------------------------------------------===//
|
|
//
|
|
// This file is a part of AddressSanitizer, an address sanity checker.
|
|
//
|
|
// Windows-specific interception methods.
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
#if SANITIZER_WINDOWS
|
|
|
|
#if !defined(INCLUDED_FROM_INTERCEPTION_LIB)
|
|
# error "interception_win.h should be included from interception library only"
|
|
#endif
|
|
|
|
#ifndef INTERCEPTION_WIN_H
|
|
#define INTERCEPTION_WIN_H
|
|
|
|
namespace __interception {
|
|
// All the functions in the OverrideFunction() family return true on success,
|
|
// false on failure (including "couldn't find the function").
|
|
|
|
// Overrides a function by its address.
|
|
bool OverrideFunction(uptr old_func, uptr new_func, uptr *orig_old_func = 0);
|
|
|
|
// Overrides a function in a system DLL or DLL CRT by its exported name.
|
|
bool OverrideFunction(const char *name, uptr new_func, uptr *orig_old_func = 0);
|
|
|
|
// Windows-only replacement for GetProcAddress. Useful for some sanitizers.
|
|
uptr InternalGetProcAddress(void *module, const char *func_name);
|
|
|
|
// Overrides a function only when it is called from a specific DLL. For example,
|
|
// this is used to override calls to HeapAlloc/HeapFree from ucrtbase without
|
|
// affecting other third party libraries.
|
|
bool OverrideImportedFunction(const char *module_to_patch,
|
|
const char *imported_module,
|
|
const char *function_name, uptr new_function,
|
|
uptr *orig_old_func);
|
|
|
|
#if !SANITIZER_WINDOWS64
|
|
// Exposed for unittests
|
|
bool OverrideFunctionWithDetour(
|
|
uptr old_func, uptr new_func, uptr *orig_old_func);
|
|
#endif
|
|
|
|
// Exposed for unittests
|
|
bool OverrideFunctionWithRedirectJump(
|
|
uptr old_func, uptr new_func, uptr *orig_old_func);
|
|
bool OverrideFunctionWithHotPatch(
|
|
uptr old_func, uptr new_func, uptr *orig_old_func);
|
|
bool OverrideFunctionWithTrampoline(
|
|
uptr old_func, uptr new_func, uptr *orig_old_func);
|
|
|
|
// Exposed for unittests
|
|
void TestOnlyReleaseTrampolineRegions();
|
|
|
|
} // namespace __interception
|
|
|
|
#if defined(INTERCEPTION_DYNAMIC_CRT)
|
|
#define INTERCEPT_FUNCTION_WIN(func) \
|
|
::__interception::OverrideFunction(#func, \
|
|
(::__interception::uptr)WRAP(func), \
|
|
(::__interception::uptr *)&REAL(func))
|
|
#else
|
|
#define INTERCEPT_FUNCTION_WIN(func) \
|
|
::__interception::OverrideFunction((::__interception::uptr)func, \
|
|
(::__interception::uptr)WRAP(func), \
|
|
(::__interception::uptr *)&REAL(func))
|
|
#endif
|
|
|
|
#define INTERCEPT_FUNCTION_VER_WIN(func, symver) INTERCEPT_FUNCTION_WIN(func)
|
|
|
|
#define INTERCEPT_FUNCTION_DLLIMPORT(user_dll, provider_dll, func) \
|
|
::__interception::OverrideImportedFunction( \
|
|
user_dll, provider_dll, #func, (::__interception::uptr)WRAP(func), \
|
|
(::__interception::uptr *)&REAL(func))
|
|
|
|
#endif // INTERCEPTION_WIN_H
|
|
#endif // SANITIZER_WINDOWS
|