xref: /netbsd-src/sys/external/bsd/compiler_rt/dist/lib/interception/interception.h (revision a7c257b03e4462df2b1020128fb82716512d7856)
1*a7c257b0Skamil //===-- interception.h ------------------------------------------*- C++ -*-===//
2*a7c257b0Skamil //
3*a7c257b0Skamil //                     The LLVM Compiler Infrastructure
4*a7c257b0Skamil //
5*a7c257b0Skamil // This file is distributed under the University of Illinois Open Source
6*a7c257b0Skamil // License. See LICENSE.TXT for details.
7*a7c257b0Skamil //
8*a7c257b0Skamil //===----------------------------------------------------------------------===//
9*a7c257b0Skamil //
10*a7c257b0Skamil // This file is a part of AddressSanitizer, an address sanity checker.
11*a7c257b0Skamil //
12*a7c257b0Skamil // Machinery for providing replacements/wrappers for system functions.
13*a7c257b0Skamil //===----------------------------------------------------------------------===//
14*a7c257b0Skamil 
15*a7c257b0Skamil #ifndef INTERCEPTION_H
16*a7c257b0Skamil #define INTERCEPTION_H
17*a7c257b0Skamil 
18*a7c257b0Skamil #include "sanitizer_common/sanitizer_internal_defs.h"
19*a7c257b0Skamil 
20*a7c257b0Skamil #if !SANITIZER_LINUX && !SANITIZER_FREEBSD && !SANITIZER_MAC && \
21*a7c257b0Skamil     !SANITIZER_NETBSD && !SANITIZER_OPENBSD && !SANITIZER_WINDOWS && \
22*a7c257b0Skamil     !SANITIZER_FUCHSIA && !SANITIZER_RTEMS && !SANITIZER_SOLARIS
23*a7c257b0Skamil # error "Interception doesn't work on this operating system."
24*a7c257b0Skamil #endif
25*a7c257b0Skamil 
26*a7c257b0Skamil // These typedefs should be used only in the interceptor definitions to replace
27*a7c257b0Skamil // the standard system types (e.g. SSIZE_T instead of ssize_t)
28*a7c257b0Skamil typedef __sanitizer::uptr    SIZE_T;
29*a7c257b0Skamil typedef __sanitizer::sptr    SSIZE_T;
30*a7c257b0Skamil typedef __sanitizer::sptr    PTRDIFF_T;
31*a7c257b0Skamil typedef __sanitizer::s64     INTMAX_T;
32*a7c257b0Skamil typedef __sanitizer::u64     UINTMAX_T;
33*a7c257b0Skamil typedef __sanitizer::OFF_T   OFF_T;
34*a7c257b0Skamil typedef __sanitizer::OFF64_T OFF64_T;
35*a7c257b0Skamil 
36*a7c257b0Skamil // How to add an interceptor:
37*a7c257b0Skamil // Suppose you need to wrap/replace system function (generally, from libc):
38*a7c257b0Skamil //      int foo(const char *bar, double baz);
39*a7c257b0Skamil // You'll need to:
40*a7c257b0Skamil //      1) define INTERCEPTOR(int, foo, const char *bar, double baz) { ... } in
41*a7c257b0Skamil //         your source file. See the notes below for cases when
42*a7c257b0Skamil //         INTERCEPTOR_WITH_SUFFIX(...) should be used instead.
43*a7c257b0Skamil //      2) Call "INTERCEPT_FUNCTION(foo)" prior to the first call of "foo".
44*a7c257b0Skamil //         INTERCEPT_FUNCTION(foo) evaluates to "true" iff the function was
45*a7c257b0Skamil //         intercepted successfully.
46*a7c257b0Skamil // You can access original function by calling REAL(foo)(bar, baz).
47*a7c257b0Skamil // By default, REAL(foo) will be visible only inside your interceptor, and if
48*a7c257b0Skamil // you want to use it in other parts of RTL, you'll need to:
49*a7c257b0Skamil //      3a) add DECLARE_REAL(int, foo, const char*, double) to a
50*a7c257b0Skamil //          header file.
51*a7c257b0Skamil // However, if the call "INTERCEPT_FUNCTION(foo)" and definition for
52*a7c257b0Skamil // INTERCEPTOR(..., foo, ...) are in different files, you'll instead need to:
53*a7c257b0Skamil //      3b) add DECLARE_REAL_AND_INTERCEPTOR(int, foo, const char*, double)
54*a7c257b0Skamil //          to a header file.
55*a7c257b0Skamil 
56*a7c257b0Skamil // Notes: 1. Things may not work properly if macro INTERCEPTOR(...) {...} or
57*a7c257b0Skamil //           DECLARE_REAL(...) are located inside namespaces.
58*a7c257b0Skamil //        2. On Mac you can also use: "OVERRIDE_FUNCTION(foo, zoo)" to
59*a7c257b0Skamil //           effectively redirect calls from "foo" to "zoo". In this case
60*a7c257b0Skamil //           you aren't required to implement
61*a7c257b0Skamil //           INTERCEPTOR(int, foo, const char *bar, double baz) {...}
62*a7c257b0Skamil //           but instead you'll have to add
63*a7c257b0Skamil //           DECLARE_REAL(int, foo, const char *bar, double baz) in your
64*a7c257b0Skamil //           source file (to define a pointer to overriden function).
65*a7c257b0Skamil //        3. Some Mac functions have symbol variants discriminated by
66*a7c257b0Skamil //           additional suffixes, e.g. _$UNIX2003 (see
67*a7c257b0Skamil //           https://developer.apple.com/library/mac/#releasenotes/Darwin/SymbolVariantsRelNotes/index.html
68*a7c257b0Skamil //           for more details). To intercept such functions you need to use the
69*a7c257b0Skamil //           INTERCEPTOR_WITH_SUFFIX(...) macro.
70*a7c257b0Skamil 
71*a7c257b0Skamil // How it works:
72*a7c257b0Skamil // To replace system functions on Linux we just need to declare functions
73*a7c257b0Skamil // with same names in our library and then obtain the real function pointers
74*a7c257b0Skamil // using dlsym().
75*a7c257b0Skamil // There is one complication. A user may also intercept some of the functions
76*a7c257b0Skamil // we intercept. To resolve this we declare our interceptors with __interceptor_
77*a7c257b0Skamil // prefix, and then make actual interceptors weak aliases to __interceptor_
78*a7c257b0Skamil // functions.
79*a7c257b0Skamil //
80*a7c257b0Skamil // This is not so on Mac OS, where the two-level namespace makes
81*a7c257b0Skamil // our replacement functions invisible to other libraries. This may be overcomed
82*a7c257b0Skamil // using the DYLD_FORCE_FLAT_NAMESPACE, but some errors loading the shared
83*a7c257b0Skamil // libraries in Chromium were noticed when doing so.
84*a7c257b0Skamil // Instead we create a dylib containing a __DATA,__interpose section that
85*a7c257b0Skamil // associates library functions with their wrappers. When this dylib is
86*a7c257b0Skamil // preloaded before an executable using DYLD_INSERT_LIBRARIES, it routes all
87*a7c257b0Skamil // the calls to interposed functions done through stubs to the wrapper
88*a7c257b0Skamil // functions.
89*a7c257b0Skamil // As it's decided at compile time which functions are to be intercepted on Mac,
90*a7c257b0Skamil // INTERCEPT_FUNCTION() is effectively a no-op on this system.
91*a7c257b0Skamil 
92*a7c257b0Skamil #if SANITIZER_MAC
93*a7c257b0Skamil #include <sys/cdefs.h>  // For __DARWIN_ALIAS_C().
94*a7c257b0Skamil 
95*a7c257b0Skamil // Just a pair of pointers.
96*a7c257b0Skamil struct interpose_substitution {
97*a7c257b0Skamil   const __sanitizer::uptr replacement;
98*a7c257b0Skamil   const __sanitizer::uptr original;
99*a7c257b0Skamil };
100*a7c257b0Skamil 
101*a7c257b0Skamil // For a function foo() create a global pair of pointers { wrap_foo, foo } in
102*a7c257b0Skamil // the __DATA,__interpose section.
103*a7c257b0Skamil // As a result all the calls to foo() will be routed to wrap_foo() at runtime.
104*a7c257b0Skamil #define INTERPOSER(func_name) __attribute__((used)) \
105*a7c257b0Skamil const interpose_substitution substitution_##func_name[] \
106*a7c257b0Skamil     __attribute__((section("__DATA, __interpose"))) = { \
107*a7c257b0Skamil     { reinterpret_cast<const uptr>(WRAP(func_name)), \
108*a7c257b0Skamil       reinterpret_cast<const uptr>(func_name) } \
109*a7c257b0Skamil }
110*a7c257b0Skamil 
111*a7c257b0Skamil // For a function foo() and a wrapper function bar() create a global pair
112*a7c257b0Skamil // of pointers { bar, foo } in the __DATA,__interpose section.
113*a7c257b0Skamil // As a result all the calls to foo() will be routed to bar() at runtime.
114*a7c257b0Skamil #define INTERPOSER_2(func_name, wrapper_name) __attribute__((used)) \
115*a7c257b0Skamil const interpose_substitution substitution_##func_name[] \
116*a7c257b0Skamil     __attribute__((section("__DATA, __interpose"))) = { \
117*a7c257b0Skamil     { reinterpret_cast<const uptr>(wrapper_name), \
118*a7c257b0Skamil       reinterpret_cast<const uptr>(func_name) } \
119*a7c257b0Skamil }
120*a7c257b0Skamil 
121*a7c257b0Skamil # define WRAP(x) wrap_##x
122*a7c257b0Skamil # define WRAPPER_NAME(x) "wrap_"#x
123*a7c257b0Skamil # define INTERCEPTOR_ATTRIBUTE
124*a7c257b0Skamil # define DECLARE_WRAPPER(ret_type, func, ...)
125*a7c257b0Skamil 
126*a7c257b0Skamil #elif SANITIZER_WINDOWS
127*a7c257b0Skamil # define WRAP(x) __asan_wrap_##x
128*a7c257b0Skamil # define WRAPPER_NAME(x) "__asan_wrap_"#x
129*a7c257b0Skamil # define INTERCEPTOR_ATTRIBUTE __declspec(dllexport)
130*a7c257b0Skamil # define DECLARE_WRAPPER(ret_type, func, ...) \
131*a7c257b0Skamil     extern "C" ret_type func(__VA_ARGS__);
132*a7c257b0Skamil # define DECLARE_WRAPPER_WINAPI(ret_type, func, ...) \
133*a7c257b0Skamil     extern "C" __declspec(dllimport) ret_type __stdcall func(__VA_ARGS__);
134*a7c257b0Skamil #elif SANITIZER_RTEMS
135*a7c257b0Skamil # define WRAP(x) x
136*a7c257b0Skamil # define WRAPPER_NAME(x) #x
137*a7c257b0Skamil # define INTERCEPTOR_ATTRIBUTE
138*a7c257b0Skamil # define DECLARE_WRAPPER(ret_type, func, ...)
139*a7c257b0Skamil #elif SANITIZER_FREEBSD || SANITIZER_NETBSD
140*a7c257b0Skamil # define WRAP(x) __interceptor_ ## x
141*a7c257b0Skamil # define WRAPPER_NAME(x) "__interceptor_" #x
142*a7c257b0Skamil # define INTERCEPTOR_ATTRIBUTE __attribute__((visibility("default")))
143*a7c257b0Skamil // FreeBSD's dynamic linker (incompliantly) gives non-weak symbols higher
144*a7c257b0Skamil // priority than weak ones so weak aliases won't work for indirect calls
145*a7c257b0Skamil // in position-independent (-fPIC / -fPIE) mode.
146*a7c257b0Skamil # define DECLARE_WRAPPER(ret_type, func, ...) \
147*a7c257b0Skamil      extern "C" ret_type func(__VA_ARGS__) \
148*a7c257b0Skamil      __attribute__((alias("__interceptor_" #func), visibility("default")));
149*a7c257b0Skamil #elif !SANITIZER_FUCHSIA
150*a7c257b0Skamil # define WRAP(x) __interceptor_ ## x
151*a7c257b0Skamil # define WRAPPER_NAME(x) "__interceptor_" #x
152*a7c257b0Skamil # define INTERCEPTOR_ATTRIBUTE __attribute__((visibility("default")))
153*a7c257b0Skamil # define DECLARE_WRAPPER(ret_type, func, ...) \
154*a7c257b0Skamil     extern "C" ret_type func(__VA_ARGS__) \
155*a7c257b0Skamil     __attribute__((weak, alias("__interceptor_" #func), visibility("default")));
156*a7c257b0Skamil #endif
157*a7c257b0Skamil 
158*a7c257b0Skamil #if SANITIZER_FUCHSIA
159*a7c257b0Skamil // There is no general interception at all on Fuchsia.
160*a7c257b0Skamil // Sanitizer runtimes just define functions directly to preempt them,
161*a7c257b0Skamil // and have bespoke ways to access the underlying libc functions.
162*a7c257b0Skamil # include <zircon/sanitizer.h>
163*a7c257b0Skamil # define INTERCEPTOR_ATTRIBUTE __attribute__((visibility("default")))
164*a7c257b0Skamil # define REAL(x) __unsanitized_##x
165*a7c257b0Skamil # define DECLARE_REAL(ret_type, func, ...)
166*a7c257b0Skamil #elif SANITIZER_RTEMS
167*a7c257b0Skamil # define REAL(x) __real_ ## x
168*a7c257b0Skamil # define DECLARE_REAL(ret_type, func, ...) \
169*a7c257b0Skamil     extern "C" ret_type REAL(func)(__VA_ARGS__);
170*a7c257b0Skamil #elif !SANITIZER_MAC
171*a7c257b0Skamil # define PTR_TO_REAL(x) real_##x
172*a7c257b0Skamil # define REAL(x) __interception::PTR_TO_REAL(x)
173*a7c257b0Skamil # define FUNC_TYPE(x) x##_type
174*a7c257b0Skamil 
175*a7c257b0Skamil # define DECLARE_REAL(ret_type, func, ...) \
176*a7c257b0Skamil     typedef ret_type (*FUNC_TYPE(func))(__VA_ARGS__); \
177*a7c257b0Skamil     namespace __interception { \
178*a7c257b0Skamil       extern FUNC_TYPE(func) PTR_TO_REAL(func); \
179*a7c257b0Skamil     }
180*a7c257b0Skamil # define ASSIGN_REAL(dst, src) REAL(dst) = REAL(src)
181*a7c257b0Skamil #else  // SANITIZER_MAC
182*a7c257b0Skamil # define REAL(x) x
183*a7c257b0Skamil # define DECLARE_REAL(ret_type, func, ...) \
184*a7c257b0Skamil     extern "C" ret_type func(__VA_ARGS__);
185*a7c257b0Skamil # define ASSIGN_REAL(x, y)
186*a7c257b0Skamil #endif  // SANITIZER_MAC
187*a7c257b0Skamil 
188*a7c257b0Skamil #if !SANITIZER_FUCHSIA && !SANITIZER_RTEMS
189*a7c257b0Skamil #define DECLARE_REAL_AND_INTERCEPTOR(ret_type, func, ...) \
190*a7c257b0Skamil   DECLARE_REAL(ret_type, func, __VA_ARGS__) \
191*a7c257b0Skamil   extern "C" ret_type WRAP(func)(__VA_ARGS__);
192*a7c257b0Skamil #else
193*a7c257b0Skamil #define DECLARE_REAL_AND_INTERCEPTOR(ret_type, func, ...)
194*a7c257b0Skamil #endif
195*a7c257b0Skamil 
196*a7c257b0Skamil // Generally, you don't need to use DEFINE_REAL by itself, as INTERCEPTOR
197*a7c257b0Skamil // macros does its job. In exceptional cases you may need to call REAL(foo)
198*a7c257b0Skamil // without defining INTERCEPTOR(..., foo, ...). For example, if you override
199*a7c257b0Skamil // foo with an interceptor for other function.
200*a7c257b0Skamil #if !SANITIZER_MAC && !SANITIZER_FUCHSIA && !SANITIZER_RTEMS
201*a7c257b0Skamil # define DEFINE_REAL(ret_type, func, ...) \
202*a7c257b0Skamil     typedef ret_type (*FUNC_TYPE(func))(__VA_ARGS__); \
203*a7c257b0Skamil     namespace __interception { \
204*a7c257b0Skamil       FUNC_TYPE(func) PTR_TO_REAL(func); \
205*a7c257b0Skamil     }
206*a7c257b0Skamil #else
207*a7c257b0Skamil # define DEFINE_REAL(ret_type, func, ...)
208*a7c257b0Skamil #endif
209*a7c257b0Skamil 
210*a7c257b0Skamil #if SANITIZER_FUCHSIA
211*a7c257b0Skamil 
212*a7c257b0Skamil // We need to define the __interceptor_func name just to get
213*a7c257b0Skamil // sanitizer_common/scripts/gen_dynamic_list.py to export func.
214*a7c257b0Skamil // But we don't need to export __interceptor_func to get that.
215*a7c257b0Skamil #define INTERCEPTOR(ret_type, func, ...)                                \
216*a7c257b0Skamil   extern "C"[[ gnu::alias(#func), gnu::visibility("hidden") ]] ret_type \
217*a7c257b0Skamil       __interceptor_##func(__VA_ARGS__);                                \
218*a7c257b0Skamil   extern "C" INTERCEPTOR_ATTRIBUTE ret_type func(__VA_ARGS__)
219*a7c257b0Skamil 
220*a7c257b0Skamil #elif !SANITIZER_MAC
221*a7c257b0Skamil 
222*a7c257b0Skamil #define INTERCEPTOR(ret_type, func, ...) \
223*a7c257b0Skamil   DEFINE_REAL(ret_type, func, __VA_ARGS__) \
224*a7c257b0Skamil   DECLARE_WRAPPER(ret_type, func, __VA_ARGS__) \
225*a7c257b0Skamil   extern "C" \
226*a7c257b0Skamil   INTERCEPTOR_ATTRIBUTE \
227*a7c257b0Skamil   ret_type WRAP(func)(__VA_ARGS__)
228*a7c257b0Skamil 
229*a7c257b0Skamil // We don't need INTERCEPTOR_WITH_SUFFIX on non-Darwin for now.
230*a7c257b0Skamil #define INTERCEPTOR_WITH_SUFFIX(ret_type, func, ...) \
231*a7c257b0Skamil   INTERCEPTOR(ret_type, func, __VA_ARGS__)
232*a7c257b0Skamil 
233*a7c257b0Skamil #else  // SANITIZER_MAC
234*a7c257b0Skamil 
235*a7c257b0Skamil #define INTERCEPTOR_ZZZ(suffix, ret_type, func, ...) \
236*a7c257b0Skamil   extern "C" ret_type func(__VA_ARGS__) suffix; \
237*a7c257b0Skamil   extern "C" ret_type WRAP(func)(__VA_ARGS__); \
238*a7c257b0Skamil   INTERPOSER(func); \
239*a7c257b0Skamil   extern "C" INTERCEPTOR_ATTRIBUTE ret_type WRAP(func)(__VA_ARGS__)
240*a7c257b0Skamil 
241*a7c257b0Skamil #define INTERCEPTOR(ret_type, func, ...) \
242*a7c257b0Skamil   INTERCEPTOR_ZZZ(/*no symbol variants*/, ret_type, func, __VA_ARGS__)
243*a7c257b0Skamil 
244*a7c257b0Skamil #define INTERCEPTOR_WITH_SUFFIX(ret_type, func, ...) \
245*a7c257b0Skamil   INTERCEPTOR_ZZZ(__DARWIN_ALIAS_C(func), ret_type, func, __VA_ARGS__)
246*a7c257b0Skamil 
247*a7c257b0Skamil // Override |overridee| with |overrider|.
248*a7c257b0Skamil #define OVERRIDE_FUNCTION(overridee, overrider) \
249*a7c257b0Skamil   INTERPOSER_2(overridee, WRAP(overrider))
250*a7c257b0Skamil #endif
251*a7c257b0Skamil 
252*a7c257b0Skamil #if SANITIZER_WINDOWS
253*a7c257b0Skamil # define INTERCEPTOR_WINAPI(ret_type, func, ...) \
254*a7c257b0Skamil     typedef ret_type (__stdcall *FUNC_TYPE(func))(__VA_ARGS__); \
255*a7c257b0Skamil     namespace __interception { \
256*a7c257b0Skamil       FUNC_TYPE(func) PTR_TO_REAL(func); \
257*a7c257b0Skamil     } \
258*a7c257b0Skamil     extern "C" \
259*a7c257b0Skamil     INTERCEPTOR_ATTRIBUTE \
260*a7c257b0Skamil     ret_type __stdcall WRAP(func)(__VA_ARGS__)
261*a7c257b0Skamil #endif
262*a7c257b0Skamil 
263*a7c257b0Skamil // ISO C++ forbids casting between pointer-to-function and pointer-to-object,
264*a7c257b0Skamil // so we use casting via an integral type __interception::uptr,
265*a7c257b0Skamil // assuming that system is POSIX-compliant. Using other hacks seem
266*a7c257b0Skamil // challenging, as we don't even pass function type to
267*a7c257b0Skamil // INTERCEPT_FUNCTION macro, only its name.
268*a7c257b0Skamil namespace __interception {
269*a7c257b0Skamil #if defined(_WIN64)
270*a7c257b0Skamil typedef unsigned long long uptr;  // NOLINT
271*a7c257b0Skamil #else
272*a7c257b0Skamil typedef unsigned long uptr;  // NOLINT
273*a7c257b0Skamil #endif  // _WIN64
274*a7c257b0Skamil }  // namespace __interception
275*a7c257b0Skamil 
276*a7c257b0Skamil #define INCLUDED_FROM_INTERCEPTION_LIB
277*a7c257b0Skamil 
278*a7c257b0Skamil #if SANITIZER_LINUX || SANITIZER_FREEBSD || SANITIZER_NETBSD || \
279*a7c257b0Skamil     SANITIZER_OPENBSD || SANITIZER_SOLARIS
280*a7c257b0Skamil 
281*a7c257b0Skamil # include "interception_linux.h"
282*a7c257b0Skamil # define INTERCEPT_FUNCTION(func) INTERCEPT_FUNCTION_LINUX_OR_FREEBSD(func)
283*a7c257b0Skamil # define INTERCEPT_FUNCTION_VER(func, symver) \
284*a7c257b0Skamil     INTERCEPT_FUNCTION_VER_LINUX_OR_FREEBSD(func, symver)
285*a7c257b0Skamil #elif SANITIZER_MAC
286*a7c257b0Skamil # include "interception_mac.h"
287*a7c257b0Skamil # define INTERCEPT_FUNCTION(func) INTERCEPT_FUNCTION_MAC(func)
288*a7c257b0Skamil # define INTERCEPT_FUNCTION_VER(func, symver) \
289*a7c257b0Skamil     INTERCEPT_FUNCTION_VER_MAC(func, symver)
290*a7c257b0Skamil #elif SANITIZER_WINDOWS
291*a7c257b0Skamil # include "interception_win.h"
292*a7c257b0Skamil # define INTERCEPT_FUNCTION(func) INTERCEPT_FUNCTION_WIN(func)
293*a7c257b0Skamil # define INTERCEPT_FUNCTION_VER(func, symver) \
294*a7c257b0Skamil     INTERCEPT_FUNCTION_VER_WIN(func, symver)
295*a7c257b0Skamil #endif
296*a7c257b0Skamil 
297*a7c257b0Skamil #undef INCLUDED_FROM_INTERCEPTION_LIB
298*a7c257b0Skamil 
299*a7c257b0Skamil #endif  // INTERCEPTION_H
300