mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-10-20 08:45:46 +00:00
1e9c395548
Same approach as the other bug, mostly replacing automatically by removing 'using mozilla::Forward;' and then: s/mozilla::Forward/std::forward/ s/Forward</std::forward</ The only file that required manual fixup was TestTreeTraversal.cpp, which had a class called TestNodeForward with template parameters :) MozReview-Commit-ID: A88qFG5AccP
97 lines
3.0 KiB
C++
97 lines
3.0 KiB
C++
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at https://mozilla.org/MPL/2.0/. */
|
|
|
|
#ifndef mozilla_interceptor_PatcherBase_h
|
|
#define mozilla_interceptor_PatcherBase_h
|
|
|
|
#include "mozilla/interceptor/TargetFunction.h"
|
|
|
|
namespace mozilla {
|
|
namespace interceptor {
|
|
|
|
template <typename VMPolicy>
|
|
class WindowsDllPatcherBase
|
|
{
|
|
protected:
|
|
typedef typename VMPolicy::MMPolicyT MMPolicyT;
|
|
|
|
template <typename... Args>
|
|
explicit WindowsDllPatcherBase(Args... aArgs)
|
|
: mVMPolicy(std::forward<Args>(aArgs)...)
|
|
{
|
|
}
|
|
|
|
ReadOnlyTargetFunction<MMPolicyT>
|
|
ResolveRedirectedAddress(const void* aOriginalFunction)
|
|
{
|
|
ReadOnlyTargetFunction<MMPolicyT> origFn(mVMPolicy, aOriginalFunction);
|
|
// If function entry is jmp rel8 stub to the internal implementation, we
|
|
// resolve redirected address from the jump target.
|
|
if (origFn[0] == 0xeb) {
|
|
int8_t offset = (int8_t)(origFn[1]);
|
|
if (offset <= 0) {
|
|
// Bail out for negative offset: probably already patched by some
|
|
// third-party code.
|
|
return std::move(origFn);
|
|
}
|
|
|
|
for (int8_t i = 0; i < offset; i++) {
|
|
if (origFn[2 + i] != 0x90) {
|
|
// Bail out on insufficient nop space.
|
|
return std::move(origFn);
|
|
}
|
|
}
|
|
|
|
uintptr_t abstarget = (origFn + 2 + offset).GetAddress();
|
|
return EnsureTargetIsAccessible(std::move(origFn), abstarget);
|
|
}
|
|
|
|
#if defined(_M_IX86)
|
|
// If function entry is jmp [disp32] such as used by kernel32,
|
|
// we resolve redirected address from import table.
|
|
if (origFn[0] == 0xff && origFn[1] == 0x25) {
|
|
uintptr_t abstarget = (origFn + 2).template ChasePointer<uintptr_t*>();
|
|
return EnsureTargetIsAccessible(std::move(origFn), abstarget);
|
|
}
|
|
#elif defined(_M_X64)
|
|
// If function entry is jmp [disp32] such as used by kernel32,
|
|
// we resolve redirected address from import table.
|
|
if (origFn[0] == 0x48 && origFn[1] == 0xff && origFn[2] == 0x25) {
|
|
uintptr_t abstarget = (origFn + 3).ChasePointerFromDisp();
|
|
return EnsureTargetIsAccessible(std::move(origFn), abstarget);
|
|
}
|
|
|
|
if (origFn[0] == 0xe9) {
|
|
// require for TestDllInterceptor with --disable-optimize
|
|
uintptr_t abstarget = (origFn + 1).ReadDisp32AsAbsolute();
|
|
return EnsureTargetIsAccessible(std::move(origFn), abstarget);
|
|
}
|
|
#endif
|
|
|
|
return std::move(origFn);
|
|
}
|
|
|
|
private:
|
|
ReadOnlyTargetFunction<MMPolicyT>
|
|
EnsureTargetIsAccessible(ReadOnlyTargetFunction<MMPolicyT> aOrigFn,
|
|
uintptr_t aRedirAddress)
|
|
{
|
|
if (!mVMPolicy.IsPageAccessible(reinterpret_cast<void*>(aRedirAddress))) {
|
|
return std::move(aOrigFn);
|
|
}
|
|
|
|
return ReadOnlyTargetFunction<MMPolicyT>(mVMPolicy, aRedirAddress);
|
|
}
|
|
|
|
protected:
|
|
VMPolicy mVMPolicy;
|
|
};
|
|
|
|
} // namespace interceptor
|
|
} // namespace mozilla
|
|
|
|
#endif // mozilla_interceptor_PatcherBase_h
|