mirror of
https://github.com/llvm/llvm-project.git
synced 2025-04-17 06:56:44 +00:00

The idea isthat asan/tsan can survive if user intercepts the same functions. At the same time user has an ability to call back into asan/tsan runtime. See the following tests for examples: asan/output_tests/interception_failure_test-linux.cc asan/output_tests/interception_test-linux.cc asan/output_tests/interception_malloc_test-linux.cc llvm-svn: 157388
36 lines
1.2 KiB
C++
36 lines
1.2 KiB
C++
//===-- interception_linux.h ------------------------------------*- C++ -*-===//
|
|
//
|
|
// The LLVM Compiler Infrastructure
|
|
//
|
|
// This file is distributed under the University of Illinois Open Source
|
|
// License. See LICENSE.TXT for details.
|
|
//
|
|
//===----------------------------------------------------------------------===//
|
|
//
|
|
// This file is a part of AddressSanitizer, an address sanity checker.
|
|
//
|
|
// Linux-specific interception methods.
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
#ifdef __linux__
|
|
|
|
#if !defined(INCLUDED_FROM_INTERCEPTION_LIB)
|
|
# error "interception_linux.h should be included from interception library only"
|
|
#endif
|
|
|
|
#ifndef INTERCEPTION_LINUX_H
|
|
#define INTERCEPTION_LINUX_H
|
|
|
|
namespace __interception {
|
|
// returns true if a function with the given name was found.
|
|
bool GetRealFunctionAddress(const char *func_name, void **func_addr,
|
|
void *real, void *wrapper);
|
|
} // namespace __interception
|
|
|
|
#define INTERCEPT_FUNCTION_LINUX(func) \
|
|
::__interception::GetRealFunctionAddress(#func, (void**)&REAL(func), \
|
|
(void*)&(func), (void*)&WRAP(func))
|
|
|
|
#endif // INTERCEPTION_LINUX_H
|
|
#endif // __linux__
|