f35db108b9
This patch imports the runtime library in the GCC tree, ensures that -lasan is passed to the linker when -faddress-sanitizer is used and sets up the build system accordingly. ChangeLog: * configure.ac: Add libsanitizer to target_libraries. * Makefile.def: Ditto. * configure: Regenerate. * Makefile.in: Regenerate. * libsanitizer: New directory for asan runtime. Contains an empty tsan directory. gcc/ChangeLog: * gcc.c (LINK_COMMAND_SPEC): Add -laddress-sanitizer to link command if -faddress-sanitizer is on. libsanitizer: Initial checkin: migrate asan runtime from llvm. From-SVN: r193441
29 lines
851 B
C++
29 lines
851 B
C++
//===-- interception_linux.cc -----------------------------------*- C++ -*-===//
|
|
//
|
|
// This file is distributed under the University of Illinois Open Source
|
|
// License. See LICENSE.TXT for details.
|
|
//
|
|
//===----------------------------------------------------------------------===//
|
|
//
|
|
// This file is a part of AddressSanitizer, an address sanity checker.
|
|
//
|
|
// Linux-specific interception methods.
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
#ifdef __linux__
|
|
#include "interception.h"
|
|
|
|
#include <stddef.h> // for NULL
|
|
#include <dlfcn.h> // for dlsym
|
|
|
|
namespace __interception {
|
|
bool GetRealFunctionAddress(const char *func_name, uptr *func_addr,
|
|
uptr real, uptr wrapper) {
|
|
*func_addr = (uptr)dlsym(RTLD_NEXT, func_name);
|
|
return real == wrapper;
|
|
}
|
|
} // namespace __interception
|
|
|
|
|
|
#endif // __linux__
|