1 | //===-- sanitizer_win_dll_thunk.cpp ---------------------------------------===// |
2 | // |
3 | // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. |
4 | // See https://llvm.org/LICENSE.txt for license information. |
5 | // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception |
6 | // |
7 | //===----------------------------------------------------------------------===// |
8 | // This file defines a family of thunks that should be statically linked into |
9 | // the DLLs that have instrumentation in order to delegate the calls to the |
10 | // shared runtime that lives in the main binary. |
11 | // See https://github.com/google/sanitizers/issues/209 for the details. |
12 | //===----------------------------------------------------------------------===// |
13 | |
14 | #ifdef SANITIZER_DLL_THUNK |
15 | #include "sanitizer_win_defs.h" |
16 | #include "sanitizer_win_dll_thunk.h" |
17 | #include "interception/interception.h" |
18 | |
19 | extern "C" { |
20 | void *WINAPI GetModuleHandleA(const char *module_name); |
21 | void abort(); |
22 | } |
23 | |
24 | namespace __sanitizer { |
25 | uptr dllThunkGetRealAddrOrDie(const char *name) { |
26 | uptr ret = |
27 | __interception::InternalGetProcAddress((void *)GetModuleHandleA(0), name); |
28 | if (!ret) |
29 | abort(); |
30 | return ret; |
31 | } |
32 | |
33 | int dllThunkIntercept(const char* main_function, uptr dll_function) { |
34 | uptr wrapper = dllThunkGetRealAddrOrDie(main_function); |
35 | if (!__interception::OverrideFunction(dll_function, wrapper, 0)) |
36 | abort(); |
37 | return 0; |
38 | } |
39 | |
40 | int dllThunkInterceptWhenPossible(const char* main_function, |
41 | const char* default_function, uptr dll_function) { |
42 | uptr wrapper = __interception::InternalGetProcAddress( |
43 | (void *)GetModuleHandleA(0), main_function); |
44 | if (!wrapper) |
45 | wrapper = dllThunkGetRealAddrOrDie(default_function); |
46 | if (!__interception::OverrideFunction(dll_function, wrapper, 0)) |
47 | abort(); |
48 | return 0; |
49 | } |
50 | } // namespace __sanitizer |
51 | |
52 | // Include Sanitizer Common interface. |
53 | #define INTERFACE_FUNCTION(Name) INTERCEPT_SANITIZER_FUNCTION(Name) |
54 | #define INTERFACE_WEAK_FUNCTION(Name) INTERCEPT_SANITIZER_WEAK_FUNCTION(Name) |
55 | #include "sanitizer_common_interface.inc" |
56 | |
57 | #pragma section(".DLLTH$A", read) |
58 | #pragma section(".DLLTH$Z", read) |
59 | |
60 | typedef void (*DllThunkCB)(); |
61 | extern "C" { |
62 | __declspec(allocate(".DLLTH$A" )) DllThunkCB __start_dll_thunk; |
63 | __declspec(allocate(".DLLTH$Z" )) DllThunkCB __stop_dll_thunk; |
64 | } |
65 | |
66 | // Disable compiler warnings that show up if we declare our own version |
67 | // of a compiler intrinsic (e.g. strlen). |
68 | #pragma warning(disable: 4391) |
69 | #pragma warning(disable: 4392) |
70 | |
71 | extern "C" int __dll_thunk_init() { |
72 | static bool flag = false; |
73 | // __dll_thunk_init is expected to be called by only one thread. |
74 | if (flag) return 0; |
75 | flag = true; |
76 | |
77 | for (DllThunkCB *it = &__start_dll_thunk; it < &__stop_dll_thunk; ++it) |
78 | if (*it) |
79 | (*it)(); |
80 | |
81 | // In DLLs, the callbacks are expected to return 0, |
82 | // otherwise CRT initialization fails. |
83 | return 0; |
84 | } |
85 | |
86 | // We want to call dll_thunk_init before C/C++ initializers / constructors are |
87 | // executed, otherwise functions like memset might be invoked. |
88 | #pragma section(".CRT$XIB", long, read) |
89 | __declspec(allocate(".CRT$XIB" )) int (*__dll_thunk_preinit)() = |
90 | __dll_thunk_init; |
91 | |
92 | static void WINAPI dll_thunk_thread_init(void *mod, unsigned long reason, |
93 | void *reserved) { |
94 | if (reason == /*DLL_PROCESS_ATTACH=*/1) __dll_thunk_init(); |
95 | } |
96 | |
97 | #pragma section(".CRT$XLAB", long, read) |
98 | __declspec(allocate(".CRT$XLAB" )) void (WINAPI *__dll_thunk_tls_init)(void *, |
99 | unsigned long, void *) = dll_thunk_thread_init; |
100 | |
101 | #endif // SANITIZER_DLL_THUNK |
102 | |