[ASan] Intercept functions on Windows - first version

git-svn-id: https://llvm.org/svn/llvm-project/compiler-rt/trunk@151161 91177308-0d34-0410-b5e6-96231b3b80d8
diff --git a/lib/asan/interception/interception.h b/lib/asan/interception/interception.h
index c7cbd0f..ae56af3 100644
--- a/lib/asan/interception/interception.h
+++ b/lib/asan/interception/interception.h
@@ -77,7 +77,7 @@
 # define INTERCEPTOR_ATTRIBUTE
 #elif defined(_WIN32)
 // TODO(timurrrr): we're likely to use something else later on Windows.
-# define WRAP(x) wrap_##x
+# define WRAP(x) x
 # define WRAPPER_NAME(x) #x
 # define INTERCEPTOR_ATTRIBUTE
 #else
@@ -128,7 +128,8 @@
 # define INTERCEPT_FUNCTION(func) INTERCEPT_FUNCTION_MAC(func)
 #else  // defined(_WIN32)
   // FIXME: deal with interception on Win.
-# define INTERCEPT_FUNCTION(func) true
+# include "interception_win.h"
+# define INTERCEPT_FUNCTION(func) INTERCEPT_FUNCTION_WIN(func)
 #endif
 
 #undef INCLUDED_FROM_INTERCEPTION_LIB
diff --git a/lib/asan/interception/interception_win.cc b/lib/asan/interception/interception_win.cc
new file mode 100644
index 0000000..a3f0f2b
--- /dev/null
+++ b/lib/asan/interception/interception_win.cc
@@ -0,0 +1,36 @@
+//===-- interception_linux.cc -----------------------------------*- C++ -*-===//
+//
+//                     The LLVM Compiler Infrastructure
+//
+// This file is distributed under the University of Illinois Open Source
+// License. See LICENSE.TXT for details.
+//
+//===----------------------------------------------------------------------===//
+//
+// This file is a part of AddressSanitizer, an address sanity checker.
+//
+// Windows-specific interception methods.
+//===----------------------------------------------------------------------===//
+
+#ifdef _WIN32
+
+#include <windows.h>
+
+namespace __interception {
+
+bool GetRealFunctionAddress(const char *func_name, void **func_addr) {
+  const char *DLLS[] = {
+    "msvcr80.dll",
+    "msvcr90.dll",
+    "kernel32.dll",
+    NULL
+  };
+  *func_addr = NULL;
+  for (size_t i = 0; *func_addr == NULL && DLLS[i]; ++i) {
+    *func_addr = GetProcAddress(GetModuleHandleA(DLLS[i]), func_name);
+  }
+  return (*func_addr != NULL);
+}
+}  // namespace __interception
+
+#endif  // _WIN32
diff --git a/lib/asan/interception/interception_win.h b/lib/asan/interception/interception_win.h
new file mode 100644
index 0000000..fb7988e
--- /dev/null
+++ b/lib/asan/interception/interception_win.h
@@ -0,0 +1,33 @@
+//===-- interception_linux.h ------------------------------------*- C++ -*-===//
+//
+//                     The LLVM Compiler Infrastructure
+//
+// This file is distributed under the University of Illinois Open Source
+// License. See LICENSE.TXT for details.
+//
+//===----------------------------------------------------------------------===//
+//
+// This file is a part of AddressSanitizer, an address sanity checker.
+//
+// Windows-specific interception methods.
+//===----------------------------------------------------------------------===//
+
+#ifdef _WIN32
+
+#if !defined(INCLUDED_FROM_INTERCEPTION_LIB)
+# error "interception_win.h should be included from interception library only"
+#endif
+
+#ifndef INTERCEPTION_WIN_H
+#define INTERCEPTION_WIN_H
+
+namespace __interception {
+// returns true if a function with the given name was found.
+bool GetRealFunctionAddress(const char *func_name, void **func_addr);
+}  // namespace __interception
+
+#define INTERCEPT_FUNCTION_WIN(func) \
+    ::__interception::GetRealFunctionAddress(#func, (void**)&REAL(func))
+
+#endif  // INTERCEPTION_WIN_H
+#endif  // _WIN32