Retro68/gcc/libsanitizer/interception/interception_linux.cc

54 lines
1.9 KiB
C++
Raw Normal View History

2014-09-21 17:33:12 +00:00
//===-- interception_linux.cc -----------------------------------*- C++ -*-===//
//
// This file is distributed under the University of Illinois Open Source
// License. See LICENSE.TXT for details.
//
//===----------------------------------------------------------------------===//
//
// This file is a part of AddressSanitizer, an address sanity checker.
//
// Linux-specific interception methods.
//===----------------------------------------------------------------------===//
#include "interception.h"
2019-06-02 15:48:37 +00:00
#if SANITIZER_LINUX || SANITIZER_FREEBSD || SANITIZER_NETBSD || \
SANITIZER_OPENBSD || SANITIZER_SOLARIS
2015-08-28 15:33:40 +00:00
#include <dlfcn.h> // for dlsym() and dlvsym()
2014-09-21 17:33:12 +00:00
2019-06-02 15:48:37 +00:00
#if SANITIZER_NETBSD
2018-12-28 15:30:48 +00:00
#include "sanitizer_common/sanitizer_libc.h"
#endif
2014-09-21 17:33:12 +00:00
namespace __interception {
bool GetRealFunctionAddress(const char *func_name, uptr *func_addr,
uptr real, uptr wrapper) {
2019-06-02 15:48:37 +00:00
#if SANITIZER_NETBSD
2018-12-28 15:30:48 +00:00
// XXX: Find a better way to handle renames
if (internal_strcmp(func_name, "sigaction") == 0) func_name = "__sigaction14";
#endif
2014-09-21 17:33:12 +00:00
*func_addr = (uptr)dlsym(RTLD_NEXT, func_name);
2019-06-02 15:48:37 +00:00
if (!*func_addr) {
// If the lookup using RTLD_NEXT failed, the sanitizer runtime library is
// later in the library search order than the DSO that we are trying to
// intercept, which means that we cannot intercept this function. We still
// want the address of the real definition, though, so look it up using
// RTLD_DEFAULT.
*func_addr = (uptr)dlsym(RTLD_DEFAULT, func_name);
}
2014-09-21 17:33:12 +00:00
return real == wrapper;
}
2019-06-02 15:48:37 +00:00
// Android and Solaris do not have dlvsym
#if !SANITIZER_ANDROID && !SANITIZER_SOLARIS && !SANITIZER_OPENBSD
2014-09-21 17:33:12 +00:00
void *GetFuncAddrVer(const char *func_name, const char *ver) {
return dlvsym(RTLD_NEXT, func_name, ver);
}
2019-06-02 15:48:37 +00:00
#endif // !SANITIZER_ANDROID
2014-09-21 17:33:12 +00:00
} // namespace __interception
2019-06-02 15:48:37 +00:00
#endif // SANITIZER_LINUX || SANITIZER_FREEBSD || SANITIZER_NETBSD ||
// SANITIZER_OPENBSD || SANITIZER_SOLARIS