Viewing file: sanitizer_win_dll_thunk.cpp (3.41 KB) -rw-r--r-- Select action/file-type: (+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
//===-- sanitizer_win_dll_thunk.cpp ---------------------------------------===// // // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. // See https://llvm.org/LICENSE.txt for license information. // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception // //===----------------------------------------------------------------------===// // This file defines a family of thunks that should be statically linked into // the DLLs that have instrumentation in order to delegate the calls to the // shared runtime that lives in the main binary. // See https://github.com/google/sanitizers/issues/209 for the details. //===----------------------------------------------------------------------===//
#ifdef SANITIZER_DLL_THUNK #include "sanitizer_win_defs.h" #include "sanitizer_win_dll_thunk.h" #include "interception/interception.h"
extern "C" { void *WINAPI GetModuleHandleA(const char *module_name); void abort(); }
namespace __sanitizer { uptr dllThunkGetRealAddrOrDie(const char *name) { uptr ret = __interception::InternalGetProcAddress((void *)GetModuleHandleA(0), name); if (!ret) abort(); return ret; }
int dllThunkIntercept(const char* main_function, uptr dll_function) { uptr wrapper = dllThunkGetRealAddrOrDie(main_function); if (!__interception::OverrideFunction(dll_function, wrapper, 0)) abort(); return 0; }
int dllThunkInterceptWhenPossible(const char* main_function, const char* default_function, uptr dll_function) { uptr wrapper = __interception::InternalGetProcAddress( (void *)GetModuleHandleA(0), main_function); if (!wrapper) wrapper = dllThunkGetRealAddrOrDie(default_function); if (!__interception::OverrideFunction(dll_function, wrapper, 0)) abort(); return 0; } } // namespace __sanitizer
// Include Sanitizer Common interface. #define INTERFACE_FUNCTION(Name) INTERCEPT_SANITIZER_FUNCTION(Name) #define INTERFACE_WEAK_FUNCTION(Name) INTERCEPT_SANITIZER_WEAK_FUNCTION(Name) #include "sanitizer_common_interface.inc"
#pragma section(".DLLTH$A", read) #pragma section(".DLLTH$Z", read)
typedef void (*DllThunkCB)(); extern "C" { __declspec(allocate(".DLLTH$A")) DllThunkCB __start_dll_thunk; __declspec(allocate(".DLLTH$Z")) DllThunkCB __stop_dll_thunk; }
// Disable compiler warnings that show up if we declare our own version // of a compiler intrinsic (e.g. strlen). #pragma warning(disable: 4391) #pragma warning(disable: 4392)
extern "C" int __dll_thunk_init() { static bool flag = false; // __dll_thunk_init is expected to be called by only one thread. if (flag) return 0; flag = true;
for (DllThunkCB *it = &__start_dll_thunk; it < &__stop_dll_thunk; ++it) if (*it) (*it)();
// In DLLs, the callbacks are expected to return 0, // otherwise CRT initialization fails. return 0; }
// We want to call dll_thunk_init before C/C++ initializers / constructors are // executed, otherwise functions like memset might be invoked. #pragma section(".CRT$XIB", long, read) __declspec(allocate(".CRT$XIB")) int (*__dll_thunk_preinit)() = __dll_thunk_init;
static void WINAPI dll_thunk_thread_init(void *mod, unsigned long reason, void *reserved) { if (reason == /*DLL_PROCESS_ATTACH=*/1) __dll_thunk_init(); }
#pragma section(".CRT$XLAB", long, read) __declspec(allocate(".CRT$XLAB")) void (WINAPI *__dll_thunk_tls_init)(void *, unsigned long, void *) = dll_thunk_thread_init;
#endif // SANITIZER_DLL_THUNK
|