]> git.ipfire.org Git - thirdparty/gcc.git/blame - libsanitizer/sanitizer_common/sanitizer_win_dll_thunk.cc
[AArch64] Use "x" predication for SVE integer arithmetic patterns
[thirdparty/gcc.git] / libsanitizer / sanitizer_common / sanitizer_win_dll_thunk.cc
CommitLineData
36093749 1//===-- sanitizer_win_dll_thunk.cc ----------------------------------------===//
2//
3// This file is distributed under the University of Illinois Open Source
4// License. See LICENSE.TXT for details.
5//
6//===----------------------------------------------------------------------===//
7// This file defines a family of thunks that should be statically linked into
8// the DLLs that have instrumentation in order to delegate the calls to the
9// shared runtime that lives in the main binary.
10// See https://github.com/google/sanitizers/issues/209 for the details.
11//===----------------------------------------------------------------------===//
12
13#ifdef SANITIZER_DLL_THUNK
14#include "sanitizer_win_defs.h"
15#include "sanitizer_win_dll_thunk.h"
16#include "interception/interception.h"
17
18extern "C" {
19void *WINAPI GetModuleHandleA(const char *module_name);
20void abort();
21}
22
23namespace __sanitizer {
24uptr dllThunkGetRealAddrOrDie(const char *name) {
25 uptr ret =
26 __interception::InternalGetProcAddress((void *)GetModuleHandleA(0), name);
27 if (!ret)
28 abort();
29 return ret;
30}
31
32int dllThunkIntercept(const char* main_function, uptr dll_function) {
33 uptr wrapper = dllThunkGetRealAddrOrDie(main_function);
34 if (!__interception::OverrideFunction(dll_function, wrapper, 0))
35 abort();
36 return 0;
37}
38
39int dllThunkInterceptWhenPossible(const char* main_function,
40 const char* default_function, uptr dll_function) {
41 uptr wrapper = __interception::InternalGetProcAddress(
42 (void *)GetModuleHandleA(0), main_function);
43 if (!wrapper)
44 wrapper = dllThunkGetRealAddrOrDie(default_function);
45 if (!__interception::OverrideFunction(dll_function, wrapper, 0))
46 abort();
47 return 0;
48}
49} // namespace __sanitizer
50
51// Include Sanitizer Common interface.
52#define INTERFACE_FUNCTION(Name) INTERCEPT_SANITIZER_FUNCTION(Name)
53#define INTERFACE_WEAK_FUNCTION(Name) INTERCEPT_SANITIZER_WEAK_FUNCTION(Name)
54#include "sanitizer_common_interface.inc"
55
56#pragma section(".DLLTH$A", read) // NOLINT
57#pragma section(".DLLTH$Z", read) // NOLINT
58
59typedef void (*DllThunkCB)();
60extern "C" {
61__declspec(allocate(".DLLTH$A")) DllThunkCB __start_dll_thunk;
62__declspec(allocate(".DLLTH$Z")) DllThunkCB __stop_dll_thunk;
63}
64
65// Disable compiler warnings that show up if we declare our own version
66// of a compiler intrinsic (e.g. strlen).
67#pragma warning(disable: 4391)
68#pragma warning(disable: 4392)
69
70extern "C" int __dll_thunk_init() {
71 static bool flag = false;
72 // __dll_thunk_init is expected to be called by only one thread.
73 if (flag) return 0;
74 flag = true;
75
76 for (DllThunkCB *it = &__start_dll_thunk; it < &__stop_dll_thunk; ++it)
77 if (*it)
78 (*it)();
79
80 // In DLLs, the callbacks are expected to return 0,
81 // otherwise CRT initialization fails.
82 return 0;
83}
84
85// We want to call dll_thunk_init before C/C++ initializers / constructors are
86// executed, otherwise functions like memset might be invoked.
87#pragma section(".CRT$XIB", long, read) // NOLINT
88__declspec(allocate(".CRT$XIB")) int (*__dll_thunk_preinit)() =
89 __dll_thunk_init;
90
91static void WINAPI dll_thunk_thread_init(void *mod, unsigned long reason,
92 void *reserved) {
93 if (reason == /*DLL_PROCESS_ATTACH=*/1) __dll_thunk_init();
94}
95
96#pragma section(".CRT$XLAB", long, read) // NOLINT
97__declspec(allocate(".CRT$XLAB")) void (WINAPI *__dll_thunk_tls_init)(void *,
98 unsigned long, void *) = dll_thunk_thread_init;
99
100#endif // SANITIZER_DLL_THUNK