111
|
1 //===-- interception.h ------------------------------------------*- C++ -*-===//
|
|
2 //
|
145
|
3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
|
|
4 // See https://llvm.org/LICENSE.txt for license information.
|
|
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
|
111
|
6 //
|
|
7 //===----------------------------------------------------------------------===//
|
|
8 //
|
|
9 // This file is a part of AddressSanitizer, an address sanity checker.
|
|
10 //
|
|
11 // Machinery for providing replacements/wrappers for system functions.
|
|
12 //===----------------------------------------------------------------------===//
|
|
13
|
|
14 #ifndef INTERCEPTION_H
|
|
15 #define INTERCEPTION_H
|
|
16
|
145
|
17 #include "sanitizer_common/sanitizer_internal_defs.h"
|
|
18
|
|
19 #if !SANITIZER_LINUX && !SANITIZER_FREEBSD && !SANITIZER_MAC && \
|
|
20 !SANITIZER_NETBSD && !SANITIZER_OPENBSD && !SANITIZER_WINDOWS && \
|
|
21 !SANITIZER_FUCHSIA && !SANITIZER_RTEMS && !SANITIZER_SOLARIS
|
111
|
22 # error "Interception doesn't work on this operating system."
|
|
23 #endif
|
|
24
|
|
25 // These typedefs should be used only in the interceptor definitions to replace
|
|
26 // the standard system types (e.g. SSIZE_T instead of ssize_t)
|
|
27 typedef __sanitizer::uptr SIZE_T;
|
|
28 typedef __sanitizer::sptr SSIZE_T;
|
|
29 typedef __sanitizer::sptr PTRDIFF_T;
|
|
30 typedef __sanitizer::s64 INTMAX_T;
|
145
|
31 typedef __sanitizer::u64 UINTMAX_T;
|
111
|
32 typedef __sanitizer::OFF_T OFF_T;
|
|
33 typedef __sanitizer::OFF64_T OFF64_T;
|
|
34
|
|
35 // How to add an interceptor:
|
|
36 // Suppose you need to wrap/replace system function (generally, from libc):
|
|
37 // int foo(const char *bar, double baz);
|
|
38 // You'll need to:
|
|
39 // 1) define INTERCEPTOR(int, foo, const char *bar, double baz) { ... } in
|
|
40 // your source file. See the notes below for cases when
|
|
41 // INTERCEPTOR_WITH_SUFFIX(...) should be used instead.
|
|
42 // 2) Call "INTERCEPT_FUNCTION(foo)" prior to the first call of "foo".
|
|
43 // INTERCEPT_FUNCTION(foo) evaluates to "true" iff the function was
|
|
44 // intercepted successfully.
|
|
45 // You can access original function by calling REAL(foo)(bar, baz).
|
|
46 // By default, REAL(foo) will be visible only inside your interceptor, and if
|
|
47 // you want to use it in other parts of RTL, you'll need to:
|
|
48 // 3a) add DECLARE_REAL(int, foo, const char*, double) to a
|
|
49 // header file.
|
|
50 // However, if the call "INTERCEPT_FUNCTION(foo)" and definition for
|
|
51 // INTERCEPTOR(..., foo, ...) are in different files, you'll instead need to:
|
|
52 // 3b) add DECLARE_REAL_AND_INTERCEPTOR(int, foo, const char*, double)
|
|
53 // to a header file.
|
|
54
|
|
55 // Notes: 1. Things may not work properly if macro INTERCEPTOR(...) {...} or
|
|
56 // DECLARE_REAL(...) are located inside namespaces.
|
|
57 // 2. On Mac you can also use: "OVERRIDE_FUNCTION(foo, zoo)" to
|
|
58 // effectively redirect calls from "foo" to "zoo". In this case
|
|
59 // you aren't required to implement
|
|
60 // INTERCEPTOR(int, foo, const char *bar, double baz) {...}
|
|
61 // but instead you'll have to add
|
|
62 // DECLARE_REAL(int, foo, const char *bar, double baz) in your
|
|
63 // source file (to define a pointer to overriden function).
|
|
64 // 3. Some Mac functions have symbol variants discriminated by
|
|
65 // additional suffixes, e.g. _$UNIX2003 (see
|
|
66 // https://developer.apple.com/library/mac/#releasenotes/Darwin/SymbolVariantsRelNotes/index.html
|
|
67 // for more details). To intercept such functions you need to use the
|
|
68 // INTERCEPTOR_WITH_SUFFIX(...) macro.
|
|
69
|
|
70 // How it works:
|
|
71 // To replace system functions on Linux we just need to declare functions
|
|
72 // with same names in our library and then obtain the real function pointers
|
|
73 // using dlsym().
|
|
74 // There is one complication. A user may also intercept some of the functions
|
|
75 // we intercept. To resolve this we declare our interceptors with __interceptor_
|
|
76 // prefix, and then make actual interceptors weak aliases to __interceptor_
|
|
77 // functions.
|
|
78 //
|
|
79 // This is not so on Mac OS, where the two-level namespace makes
|
|
80 // our replacement functions invisible to other libraries. This may be overcomed
|
|
81 // using the DYLD_FORCE_FLAT_NAMESPACE, but some errors loading the shared
|
|
82 // libraries in Chromium were noticed when doing so.
|
|
83 // Instead we create a dylib containing a __DATA,__interpose section that
|
|
84 // associates library functions with their wrappers. When this dylib is
|
|
85 // preloaded before an executable using DYLD_INSERT_LIBRARIES, it routes all
|
|
86 // the calls to interposed functions done through stubs to the wrapper
|
|
87 // functions.
|
|
88 // As it's decided at compile time which functions are to be intercepted on Mac,
|
|
89 // INTERCEPT_FUNCTION() is effectively a no-op on this system.
|
|
90
|
145
|
91 #if SANITIZER_MAC
|
111
|
92 #include <sys/cdefs.h> // For __DARWIN_ALIAS_C().
|
|
93
|
|
94 // Just a pair of pointers.
|
|
95 struct interpose_substitution {
|
|
96 const __sanitizer::uptr replacement;
|
|
97 const __sanitizer::uptr original;
|
|
98 };
|
|
99
|
|
100 // For a function foo() create a global pair of pointers { wrap_foo, foo } in
|
|
101 // the __DATA,__interpose section.
|
|
102 // As a result all the calls to foo() will be routed to wrap_foo() at runtime.
|
|
103 #define INTERPOSER(func_name) __attribute__((used)) \
|
|
104 const interpose_substitution substitution_##func_name[] \
|
|
105 __attribute__((section("__DATA, __interpose"))) = { \
|
|
106 { reinterpret_cast<const uptr>(WRAP(func_name)), \
|
|
107 reinterpret_cast<const uptr>(func_name) } \
|
|
108 }
|
|
109
|
|
110 // For a function foo() and a wrapper function bar() create a global pair
|
|
111 // of pointers { bar, foo } in the __DATA,__interpose section.
|
|
112 // As a result all the calls to foo() will be routed to bar() at runtime.
|
|
113 #define INTERPOSER_2(func_name, wrapper_name) __attribute__((used)) \
|
|
114 const interpose_substitution substitution_##func_name[] \
|
|
115 __attribute__((section("__DATA, __interpose"))) = { \
|
|
116 { reinterpret_cast<const uptr>(wrapper_name), \
|
|
117 reinterpret_cast<const uptr>(func_name) } \
|
|
118 }
|
|
119
|
|
120 # define WRAP(x) wrap_##x
|
|
121 # define WRAPPER_NAME(x) "wrap_"#x
|
|
122 # define INTERCEPTOR_ATTRIBUTE
|
|
123 # define DECLARE_WRAPPER(ret_type, func, ...)
|
|
124
|
145
|
125 #elif SANITIZER_WINDOWS
|
111
|
126 # define WRAP(x) __asan_wrap_##x
|
|
127 # define WRAPPER_NAME(x) "__asan_wrap_"#x
|
|
128 # define INTERCEPTOR_ATTRIBUTE __declspec(dllexport)
|
|
129 # define DECLARE_WRAPPER(ret_type, func, ...) \
|
|
130 extern "C" ret_type func(__VA_ARGS__);
|
|
131 # define DECLARE_WRAPPER_WINAPI(ret_type, func, ...) \
|
|
132 extern "C" __declspec(dllimport) ret_type __stdcall func(__VA_ARGS__);
|
145
|
133 #elif SANITIZER_RTEMS
|
|
134 # define WRAP(x) x
|
|
135 # define WRAPPER_NAME(x) #x
|
|
136 # define INTERCEPTOR_ATTRIBUTE
|
|
137 # define DECLARE_WRAPPER(ret_type, func, ...)
|
|
138 #elif SANITIZER_FREEBSD || SANITIZER_NETBSD
|
111
|
139 # define WRAP(x) __interceptor_ ## x
|
|
140 # define WRAPPER_NAME(x) "__interceptor_" #x
|
|
141 # define INTERCEPTOR_ATTRIBUTE __attribute__((visibility("default")))
|
|
142 // FreeBSD's dynamic linker (incompliantly) gives non-weak symbols higher
|
|
143 // priority than weak ones so weak aliases won't work for indirect calls
|
|
144 // in position-independent (-fPIC / -fPIE) mode.
|
|
145 # define DECLARE_WRAPPER(ret_type, func, ...) \
|
|
146 extern "C" ret_type func(__VA_ARGS__) \
|
|
147 __attribute__((alias("__interceptor_" #func), visibility("default")));
|
145
|
148 #elif !SANITIZER_FUCHSIA
|
111
|
149 # define WRAP(x) __interceptor_ ## x
|
|
150 # define WRAPPER_NAME(x) "__interceptor_" #x
|
|
151 # define INTERCEPTOR_ATTRIBUTE __attribute__((visibility("default")))
|
|
152 # define DECLARE_WRAPPER(ret_type, func, ...) \
|
|
153 extern "C" ret_type func(__VA_ARGS__) \
|
|
154 __attribute__((weak, alias("__interceptor_" #func), visibility("default")));
|
|
155 #endif
|
|
156
|
145
|
157 #if SANITIZER_FUCHSIA
|
111
|
158 // There is no general interception at all on Fuchsia.
|
|
159 // Sanitizer runtimes just define functions directly to preempt them,
|
|
160 // and have bespoke ways to access the underlying libc functions.
|
|
161 # include <zircon/sanitizer.h>
|
|
162 # define INTERCEPTOR_ATTRIBUTE __attribute__((visibility("default")))
|
|
163 # define REAL(x) __unsanitized_##x
|
|
164 # define DECLARE_REAL(ret_type, func, ...)
|
145
|
165 #elif SANITIZER_RTEMS
|
|
166 # define REAL(x) __real_ ## x
|
|
167 # define DECLARE_REAL(ret_type, func, ...) \
|
|
168 extern "C" ret_type REAL(func)(__VA_ARGS__);
|
|
169 #elif !SANITIZER_MAC
|
111
|
170 # define PTR_TO_REAL(x) real_##x
|
|
171 # define REAL(x) __interception::PTR_TO_REAL(x)
|
145
|
172 # define FUNC_TYPE(x) x##_type
|
111
|
173
|
|
174 # define DECLARE_REAL(ret_type, func, ...) \
|
|
175 typedef ret_type (*FUNC_TYPE(func))(__VA_ARGS__); \
|
|
176 namespace __interception { \
|
|
177 extern FUNC_TYPE(func) PTR_TO_REAL(func); \
|
|
178 }
|
|
179 # define ASSIGN_REAL(dst, src) REAL(dst) = REAL(src)
|
145
|
180 #else // SANITIZER_MAC
|
111
|
181 # define REAL(x) x
|
|
182 # define DECLARE_REAL(ret_type, func, ...) \
|
|
183 extern "C" ret_type func(__VA_ARGS__);
|
|
184 # define ASSIGN_REAL(x, y)
|
145
|
185 #endif // SANITIZER_MAC
|
111
|
186
|
145
|
187 #if !SANITIZER_FUCHSIA && !SANITIZER_RTEMS
|
|
188 # define DECLARE_REAL_AND_INTERCEPTOR(ret_type, func, ...) \
|
111
|
189 DECLARE_REAL(ret_type, func, __VA_ARGS__) \
|
|
190 extern "C" ret_type WRAP(func)(__VA_ARGS__);
|
145
|
191 // Declare an interceptor and its wrapper defined in a different translation
|
|
192 // unit (ex. asm).
|
|
193 # define DECLARE_EXTERN_INTERCEPTOR_AND_WRAPPER(ret_type, func, ...) \
|
|
194 extern "C" ret_type WRAP(func)(__VA_ARGS__); \
|
|
195 extern "C" ret_type func(__VA_ARGS__);
|
111
|
196 #else
|
145
|
197 # define DECLARE_REAL_AND_INTERCEPTOR(ret_type, func, ...)
|
|
198 # define DECLARE_EXTERN_INTERCEPTOR_AND_WRAPPER(ret_type, func, ...)
|
111
|
199 #endif
|
|
200
|
|
201 // Generally, you don't need to use DEFINE_REAL by itself, as INTERCEPTOR
|
|
202 // macros does its job. In exceptional cases you may need to call REAL(foo)
|
|
203 // without defining INTERCEPTOR(..., foo, ...). For example, if you override
|
|
204 // foo with an interceptor for other function.
|
145
|
205 #if !SANITIZER_MAC && !SANITIZER_FUCHSIA && !SANITIZER_RTEMS
|
111
|
206 # define DEFINE_REAL(ret_type, func, ...) \
|
|
207 typedef ret_type (*FUNC_TYPE(func))(__VA_ARGS__); \
|
|
208 namespace __interception { \
|
|
209 FUNC_TYPE(func) PTR_TO_REAL(func); \
|
|
210 }
|
|
211 #else
|
|
212 # define DEFINE_REAL(ret_type, func, ...)
|
|
213 #endif
|
|
214
|
145
|
215 #if SANITIZER_FUCHSIA
|
111
|
216
|
|
217 // We need to define the __interceptor_func name just to get
|
|
218 // sanitizer_common/scripts/gen_dynamic_list.py to export func.
|
|
219 // But we don't need to export __interceptor_func to get that.
|
|
220 #define INTERCEPTOR(ret_type, func, ...) \
|
|
221 extern "C"[[ gnu::alias(#func), gnu::visibility("hidden") ]] ret_type \
|
|
222 __interceptor_##func(__VA_ARGS__); \
|
|
223 extern "C" INTERCEPTOR_ATTRIBUTE ret_type func(__VA_ARGS__)
|
|
224
|
145
|
225 #elif !SANITIZER_MAC
|
111
|
226
|
|
227 #define INTERCEPTOR(ret_type, func, ...) \
|
|
228 DEFINE_REAL(ret_type, func, __VA_ARGS__) \
|
|
229 DECLARE_WRAPPER(ret_type, func, __VA_ARGS__) \
|
|
230 extern "C" \
|
|
231 INTERCEPTOR_ATTRIBUTE \
|
|
232 ret_type WRAP(func)(__VA_ARGS__)
|
|
233
|
|
234 // We don't need INTERCEPTOR_WITH_SUFFIX on non-Darwin for now.
|
|
235 #define INTERCEPTOR_WITH_SUFFIX(ret_type, func, ...) \
|
|
236 INTERCEPTOR(ret_type, func, __VA_ARGS__)
|
|
237
|
145
|
238 #else // SANITIZER_MAC
|
111
|
239
|
|
240 #define INTERCEPTOR_ZZZ(suffix, ret_type, func, ...) \
|
|
241 extern "C" ret_type func(__VA_ARGS__) suffix; \
|
|
242 extern "C" ret_type WRAP(func)(__VA_ARGS__); \
|
|
243 INTERPOSER(func); \
|
|
244 extern "C" INTERCEPTOR_ATTRIBUTE ret_type WRAP(func)(__VA_ARGS__)
|
|
245
|
|
246 #define INTERCEPTOR(ret_type, func, ...) \
|
|
247 INTERCEPTOR_ZZZ(/*no symbol variants*/, ret_type, func, __VA_ARGS__)
|
|
248
|
|
249 #define INTERCEPTOR_WITH_SUFFIX(ret_type, func, ...) \
|
|
250 INTERCEPTOR_ZZZ(__DARWIN_ALIAS_C(func), ret_type, func, __VA_ARGS__)
|
|
251
|
|
252 // Override |overridee| with |overrider|.
|
|
253 #define OVERRIDE_FUNCTION(overridee, overrider) \
|
|
254 INTERPOSER_2(overridee, WRAP(overrider))
|
|
255 #endif
|
|
256
|
145
|
257 #if SANITIZER_WINDOWS
|
111
|
258 # define INTERCEPTOR_WINAPI(ret_type, func, ...) \
|
|
259 typedef ret_type (__stdcall *FUNC_TYPE(func))(__VA_ARGS__); \
|
|
260 namespace __interception { \
|
|
261 FUNC_TYPE(func) PTR_TO_REAL(func); \
|
|
262 } \
|
|
263 extern "C" \
|
|
264 INTERCEPTOR_ATTRIBUTE \
|
|
265 ret_type __stdcall WRAP(func)(__VA_ARGS__)
|
|
266 #endif
|
|
267
|
|
268 // ISO C++ forbids casting between pointer-to-function and pointer-to-object,
|
|
269 // so we use casting via an integral type __interception::uptr,
|
|
270 // assuming that system is POSIX-compliant. Using other hacks seem
|
|
271 // challenging, as we don't even pass function type to
|
|
272 // INTERCEPT_FUNCTION macro, only its name.
|
|
273 namespace __interception {
|
|
274 #if defined(_WIN64)
|
145
|
275 typedef unsigned long long uptr;
|
111
|
276 #else
|
145
|
277 typedef unsigned long uptr;
|
111
|
278 #endif // _WIN64
|
|
279 } // namespace __interception
|
|
280
|
|
281 #define INCLUDED_FROM_INTERCEPTION_LIB
|
|
282
|
145
|
283 #if SANITIZER_LINUX || SANITIZER_FREEBSD || SANITIZER_NETBSD || \
|
|
284 SANITIZER_OPENBSD || SANITIZER_SOLARIS
|
|
285
|
111
|
286 # include "interception_linux.h"
|
|
287 # define INTERCEPT_FUNCTION(func) INTERCEPT_FUNCTION_LINUX_OR_FREEBSD(func)
|
|
288 # define INTERCEPT_FUNCTION_VER(func, symver) \
|
|
289 INTERCEPT_FUNCTION_VER_LINUX_OR_FREEBSD(func, symver)
|
145
|
290 #elif SANITIZER_MAC
|
111
|
291 # include "interception_mac.h"
|
|
292 # define INTERCEPT_FUNCTION(func) INTERCEPT_FUNCTION_MAC(func)
|
|
293 # define INTERCEPT_FUNCTION_VER(func, symver) \
|
|
294 INTERCEPT_FUNCTION_VER_MAC(func, symver)
|
145
|
295 #elif SANITIZER_WINDOWS
|
111
|
296 # include "interception_win.h"
|
|
297 # define INTERCEPT_FUNCTION(func) INTERCEPT_FUNCTION_WIN(func)
|
|
298 # define INTERCEPT_FUNCTION_VER(func, symver) \
|
|
299 INTERCEPT_FUNCTION_VER_WIN(func, symver)
|
|
300 #endif
|
|
301
|
|
302 #undef INCLUDED_FROM_INTERCEPTION_LIB
|
|
303
|
|
304 #endif // INTERCEPTION_H
|