|
1 | | -//===-- asan_win_common_runtime_thunk.cpp --------------------------- -----===// |
2 | | -// |
3 | | -// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. |
4 | | -// See https://llvm.org/LICENSE.txt for license information. |
5 | | -// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception |
6 | | -// |
7 | | -//===----------------------------------------------------------------------===// |
8 | | -// |
9 | | -// This file is a part of AddressSanitizer, an address sanity checker. |
10 | | -// |
11 | | -// This file defines things that need to be present in the application modules |
12 | | -// to interact with the ASan DLL runtime correctly and can't be implemented |
13 | | -// using the default "import library" generated when linking the DLL. |
14 | | -// |
15 | | -// This includes: |
16 | | -// - Cloning shadow memory dynamic address from ASAN DLL |
17 | | -// - Creating weak aliases to default implementation imported from asan dll |
18 | | -// - Forwarding the detect_stack_use_after_return runtime option |
19 | | -// - installing a custom SEH handler |
20 | | -// |
21 | | -//===----------------------------------------------------------------------===// |
22 | | - |
23 | | -#if defined(SANITIZER_DYNAMIC_RUNTIME_THUNK) || \ |
24 | | - defined(SANITIZER_STATIC_RUNTIME_THUNK) |
25 | | -# define SANITIZER_IMPORT_INTERFACE 1 |
26 | | -# define WIN32_LEAN_AND_MEAN |
27 | | -# include "asan_win_common_runtime_thunk.h" |
28 | | - |
29 | | -# include <windows.h> |
30 | | - |
31 | | -# include "sanitizer_common/sanitizer_win_defs.h" |
32 | | -# include "sanitizer_common/sanitizer_win_thunk_interception.h" |
33 | | - |
34 | | -// Define weak alias for all weak functions imported from asan dll. |
35 | | -# define INTERFACE_FUNCTION(Name) |
36 | | -# define INTERFACE_WEAK_FUNCTION(Name) REGISTER_WEAK_FUNCTION(Name) |
37 | | -# include "asan_interface.inc" |
38 | | - |
39 | | -//////////////////////////////////////////////////////////////////////////////// |
40 | | -// Define a copy of __asan_option_detect_stack_use_after_return that should be |
41 | | -// used when linking an MD runtime with a set of object files on Windows. |
42 | | -// |
43 | | -// The ASan MD runtime dllexports '__asan_option_detect_stack_use_after_return', |
44 | | -// so normally we would just dllimport it. Unfortunately, the dllimport |
45 | | -// attribute adds __imp_ prefix to the symbol name of a variable. |
46 | | -// Since in general we don't know if a given TU is going to be used |
47 | | -// with a MT or MD runtime and we don't want to use ugly __imp_ names on Windows |
48 | | -// just to work around this issue, let's clone the variable that is constant |
49 | | -// after initialization anyways. |
50 | | - |
51 | | -extern "C" { |
52 | | -__declspec(dllimport) int __asan_should_detect_stack_use_after_return(); |
53 | | -int __asan_option_detect_stack_use_after_return; |
54 | | - |
55 | | -__declspec(dllimport) void *__asan_get_shadow_memory_dynamic_address(); |
56 | | -void *__asan_shadow_memory_dynamic_address; |
57 | | - |
58 | | -static void __asan_initialize_cloned_variables() { |
59 | | - __asan_option_detect_stack_use_after_return = |
60 | | - __asan_should_detect_stack_use_after_return(); |
61 | | - __asan_shadow_memory_dynamic_address = |
62 | | - __asan_get_shadow_memory_dynamic_address(); |
63 | | -} |
64 | | -} |
65 | | - |
66 | | -static int asan_thunk_init() { |
67 | | - __asan_initialize_cloned_variables(); |
68 | | - |
69 | | -# ifdef SANITIZER_STATIC_RUNTIME_THUNK |
70 | | - __asan_initialize_static_thunk(); |
71 | | -# endif |
72 | | - |
73 | | - return 0; |
74 | | -} |
75 | | - |
76 | | -static void WINAPI asan_thread_init(void *mod, unsigned long reason, |
77 | | - void *reserved) { |
78 | | - if (reason == DLL_PROCESS_ATTACH) { |
79 | | - asan_thunk_init(); |
80 | | - } |
81 | | -} |
82 | | - |
83 | | -// Our cloned variables must be initialized before C/C++ constructors. If TLS |
84 | | -// is used, our .CRT$XLAB initializer will run first. If not, our .CRT$XIB |
85 | | -// initializer is needed as a backup. |
86 | | -extern "C" __declspec(allocate(".CRT$XIB")) int (*__asan_thunk_init)() = |
87 | | - asan_thunk_init; |
88 | | -WIN_FORCE_LINK(__asan_thunk_init); |
89 | | - |
90 | | -extern "C" __declspec(allocate(".CRT$XLAB")) void(WINAPI *__asan_tls_init)( |
91 | | - void *, unsigned long, void *) = asan_thread_init; |
92 | | -WIN_FORCE_LINK(__asan_tls_init); |
93 | | - |
94 | | -//////////////////////////////////////////////////////////////////////////////// |
95 | | -// ASan SEH handling. |
96 | | -// We need to set the ASan-specific SEH handler at the end of CRT initialization |
97 | | -// of each module (see also asan_win.cpp). |
98 | | -extern "C" { |
99 | | -__declspec(dllimport) int __asan_set_seh_filter(); |
100 | | -static int SetSEHFilter() { return __asan_set_seh_filter(); } |
101 | | - |
102 | | -// Unfortunately, putting a pointer to __asan_set_seh_filter into |
103 | | -// __asan_intercept_seh gets optimized out, so we have to use an extra function. |
104 | | -extern "C" __declspec(allocate(".CRT$XCAB")) int (*__asan_seh_interceptor)() = |
105 | | - SetSEHFilter; |
106 | | -WIN_FORCE_LINK(__asan_seh_interceptor); |
107 | | -} |
108 | | - |
109 | | -WIN_FORCE_LINK(__asan_dso_reg_hook) |
110 | | - |
111 | | -#endif // defined(SANITIZER_DYNAMIC_RUNTIME_THUNK) || |
112 | | - // defined(SANITIZER_STATIC_RUNTIME_THUNK) |
| 1 | +//===-- asan_win_common_runtime_thunk.cpp --------------------------- -----===// |
| 2 | +// |
| 3 | +// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. |
| 4 | +// See https://llvm.org/LICENSE.txt for license information. |
| 5 | +// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception |
| 6 | +// |
| 7 | +//===----------------------------------------------------------------------===// |
| 8 | +// |
| 9 | +// This file is a part of AddressSanitizer, an address sanity checker. |
| 10 | +// |
| 11 | +// This file defines things that need to be present in the application modules |
| 12 | +// to interact with the ASan DLL runtime correctly and can't be implemented |
| 13 | +// using the default "import library" generated when linking the DLL. |
| 14 | +// |
| 15 | +// This includes: |
| 16 | +// - Cloning shadow memory dynamic address from ASAN DLL |
| 17 | +// - Creating weak aliases to default implementation imported from asan dll |
| 18 | +// - Forwarding the detect_stack_use_after_return runtime option |
| 19 | +// - installing a custom SEH handler |
| 20 | +// |
| 21 | +//===----------------------------------------------------------------------===// |
| 22 | + |
| 23 | +#if defined(SANITIZER_DYNAMIC_RUNTIME_THUNK) || \ |
| 24 | + defined(SANITIZER_STATIC_RUNTIME_THUNK) |
| 25 | +# define SANITIZER_IMPORT_INTERFACE 1 |
| 26 | +# define WIN32_LEAN_AND_MEAN |
| 27 | +# include "asan_win_common_runtime_thunk.h" |
| 28 | + |
| 29 | +# include <windows.h> |
| 30 | + |
| 31 | +# include "sanitizer_common/sanitizer_win_defs.h" |
| 32 | +# include "sanitizer_common/sanitizer_win_thunk_interception.h" |
| 33 | + |
| 34 | +// Define weak alias for all weak functions imported from asan dll. |
| 35 | +# define INTERFACE_FUNCTION(Name) |
| 36 | +# define INTERFACE_WEAK_FUNCTION(Name) REGISTER_WEAK_FUNCTION(Name) |
| 37 | +# include "asan_interface.inc" |
| 38 | + |
| 39 | +//////////////////////////////////////////////////////////////////////////////// |
| 40 | +// Define a copy of __asan_option_detect_stack_use_after_return that should be |
| 41 | +// used when linking an MD runtime with a set of object files on Windows. |
| 42 | +// |
| 43 | +// The ASan MD runtime dllexports '__asan_option_detect_stack_use_after_return', |
| 44 | +// so normally we would just dllimport it. Unfortunately, the dllimport |
| 45 | +// attribute adds __imp_ prefix to the symbol name of a variable. |
| 46 | +// Since in general we don't know if a given TU is going to be used |
| 47 | +// with a MT or MD runtime and we don't want to use ugly __imp_ names on Windows |
| 48 | +// just to work around this issue, let's clone the variable that is constant |
| 49 | +// after initialization anyways. |
| 50 | + |
| 51 | +extern "C" { |
| 52 | +__declspec(dllimport) int __asan_should_detect_stack_use_after_return(); |
| 53 | +int __asan_option_detect_stack_use_after_return; |
| 54 | + |
| 55 | +__declspec(dllimport) void *__asan_get_shadow_memory_dynamic_address(); |
| 56 | +void *__asan_shadow_memory_dynamic_address; |
| 57 | + |
| 58 | +static void __asan_initialize_cloned_variables() { |
| 59 | + __asan_option_detect_stack_use_after_return = |
| 60 | + __asan_should_detect_stack_use_after_return(); |
| 61 | + __asan_shadow_memory_dynamic_address = |
| 62 | + __asan_get_shadow_memory_dynamic_address(); |
| 63 | +} |
| 64 | +} |
| 65 | + |
| 66 | +static int asan_thunk_init() { |
| 67 | + __asan_initialize_cloned_variables(); |
| 68 | + |
| 69 | +# ifdef SANITIZER_STATIC_RUNTIME_THUNK |
| 70 | + __asan_initialize_static_thunk(); |
| 71 | +# endif |
| 72 | + |
| 73 | + return 0; |
| 74 | +} |
| 75 | + |
| 76 | +static void WINAPI asan_thread_init(void *mod, unsigned long reason, |
| 77 | + void *reserved) { |
| 78 | + if (reason == DLL_PROCESS_ATTACH) { |
| 79 | + asan_thunk_init(); |
| 80 | + } |
| 81 | +} |
| 82 | + |
| 83 | +// Our cloned variables must be initialized before C/C++ constructors. If TLS |
| 84 | +// is used, our .CRT$XLAB initializer will run first. If not, our .CRT$XIB |
| 85 | +// initializer is needed as a backup. |
| 86 | +extern "C" __declspec(allocate(".CRT$XIB")) int (*__asan_thunk_init)() = |
| 87 | + asan_thunk_init; |
| 88 | +WIN_FORCE_LINK(__asan_thunk_init); |
| 89 | + |
| 90 | +extern "C" __declspec(allocate(".CRT$XLAB")) void(WINAPI *__asan_tls_init)( |
| 91 | + void *, unsigned long, void *) = asan_thread_init; |
| 92 | +WIN_FORCE_LINK(__asan_tls_init); |
| 93 | + |
| 94 | +//////////////////////////////////////////////////////////////////////////////// |
| 95 | +// ASan SEH handling. |
| 96 | +// We need to set the ASan-specific SEH handler at the end of CRT initialization |
| 97 | +// of each module (see also asan_win.cpp). |
| 98 | +extern "C" { |
| 99 | +__declspec(dllimport) int __asan_set_seh_filter(); |
| 100 | +static int SetSEHFilter() { return __asan_set_seh_filter(); } |
| 101 | + |
| 102 | +// Unfortunately, putting a pointer to __asan_set_seh_filter into |
| 103 | +// __asan_intercept_seh gets optimized out, so we have to use an extra function. |
| 104 | +extern "C" __declspec(allocate(".CRT$XCAB")) int (*__asan_seh_interceptor)() = |
| 105 | + SetSEHFilter; |
| 106 | +WIN_FORCE_LINK(__asan_seh_interceptor); |
| 107 | +} |
| 108 | + |
| 109 | +WIN_FORCE_LINK(__asan_dso_reg_hook) |
| 110 | + |
| 111 | +#endif // defined(SANITIZER_DYNAMIC_RUNTIME_THUNK) || |
| 112 | + // defined(SANITIZER_STATIC_RUNTIME_THUNK) |
0 commit comments