2 /*--------------------------------------------------------------------*/
3 /*--- Function replacement and wrapping. m_redir.c ---*/
4 /*--------------------------------------------------------------------*/
7 This file is part of Valgrind, a dynamic binary instrumentation
10 Copyright (C) 2000-2015 Julian Seward
12 Copyright (C) 2003-2015 Jeremy Fitzhardinge
15 This program is free software; you can redistribute it and/or
16 modify it under the terms of the GNU General Public License as
17 published by the Free Software Foundation; either version 2 of the
18 License, or (at your option) any later version.
20 This program is distributed in the hope that it will be useful, but
21 WITHOUT ANY WARRANTY; without even the implied warranty of
22 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
23 General Public License for more details.
25 You should have received a copy of the GNU General Public License
26 along with this program; if not, write to the Free Software
27 Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA
30 The GNU General Public License is contained in the file COPYING.
33 #include "pub_core_basics.h"
34 #include "pub_core_debuglog.h"
35 #include "pub_core_debuginfo.h"
36 #include "pub_core_libcbase.h"
37 #include "pub_core_libcassert.h"
38 #include "pub_core_libcprint.h"
39 #include "pub_core_vki.h"
40 #include "pub_core_libcfile.h"
41 #include "pub_core_seqmatch.h"
42 #include "pub_core_mallocfree.h"
43 #include "pub_core_options.h"
44 #include "pub_core_oset.h"
45 #include "pub_core_redir.h"
46 #include "pub_core_trampoline.h"
47 #include "pub_core_transtab.h"
48 #include "pub_core_tooliface.h" // VG_(needs).malloc_replacement
49 #include "pub_core_machine.h" // VG_(fnptr_to_fnentry)
50 #include "pub_core_aspacemgr.h" // VG_(am_find_nsegment)
51 #include "pub_core_xarray.h"
52 #include "pub_core_clientstate.h" // VG_(client___libc_freeres_wrapper)
53 #include "pub_core_demangle.h" // VG_(maybe_Z_demangle)
54 #include "pub_core_libcproc.h" // VG_(libdir)
56 #include "config.h" /* GLIBC_MANDATORY_*_REDIRECT */
59 /* This module is a critical part of the redirection/intercept system.
60 It keeps track of the current intercept state, cleans up the
61 translation caches when that state changes, and finally, answers
62 queries about the whether an address is currently redirected or
63 not. It doesn't do any of the control-flow trickery needed to put
64 the redirections into practice. That is the job of m_translate,
65 which calls here to find out which translations need to be
68 The interface is simple. VG_(redir_initialise) initialises and
69 loads some hardwired redirects which never disappear; this is
72 The module is notified of redirection state changes by m_debuginfo.
73 That calls VG_(redir_notify_new_DebugInfo) when a new DebugInfo
74 (shared object symbol table, basically) appears. Appearance of new
75 symbols can cause new (active) redirections to appear for two
76 reasons: the symbols in the new table may match existing
77 redirection specifications (see comments below), and because the
78 symbols in the new table may themselves supply new redirect
79 specifications which match existing symbols (or ones in the new
82 Redirect specifications are really symbols with "funny" prefixes
83 (_vgrNNNNZU_ and _vgrNNNNZZ_). These names tell m_redir that the
84 associated code should replace the standard entry point for some
85 set of functions. The set of functions is specified by a (soname
86 pattern, function name pattern) pair which is encoded in the symbol
87 name following the prefix. The names use a Z-encoding scheme so
88 that they may contain punctuation characters and wildcards (*).
89 The encoding scheme is described in pub_tool_redir.h and is decoded
90 by VG_(maybe_Z_demangle). The NNNN are behavioural equivalence
91 class tags, and are used to by code in this module to resolve
92 situations where one address appears to be redirected to more than
93 one replacement/wrapper. This is also described in
96 When a shared object is unloaded, this module learns of it via a
97 call to VG_(redir_notify_delete_DebugInfo). It then removes from
98 its tables all active redirections in any way associated with that
99 object, and tidies up the translation caches accordingly.
101 That takes care of tracking the redirection state. When a
102 translation is actually to be made, m_translate calls to
103 VG_(redir_do_lookup) in this module to find out if the
104 translation's address should be redirected.
107 /*------------------------------------------------------------*/
108 /*--- Semantics ---*/
109 /*------------------------------------------------------------*/
111 /* The redirector holds two pieces of state:
113 Specs - a set of (soname pattern, fnname pattern) -> redir addr
114 Active - a set of orig addr -> (bool, redir addr)
116 Active is the currently active set of bindings that the translator
117 consults. Specs is the current set of specifications as harvested
118 from reading symbol tables of the currently loaded objects.
120 Active is a pure function of Specs and the current symbol table
121 state (maintained by m_debuginfo). Call the latter SyminfoState.
123 Therefore whenever either Specs or SyminfoState changes, Active
124 must be recomputed. [Inefficient if done naively, but this is a
127 Active is computed as follows:
131 sopatt = spec.soname pattern
132 fnpatt = spec.fnname pattern
133 redir = spec.redir addr
134 for so matching sopatt in SyminfoState {
135 for fn matching fnpatt in fnnames_of(so) {
136 &fn -> redir is added to Active
141 [as an implementation detail, when a binding (orig -> redir) is
142 deleted from Active as a result of recomputing it, then all
143 translations intersecting redir must be deleted. However, this is
144 not part of the spec].
146 [Active also depends on where the aspacemgr has decided to put all
147 the pieces of code -- that affects the "orig addr" and "redir addr"
150 ---------------------
152 That completes the spec, apart from one difficult issue: duplicates.
154 Clearly we must impose the requirement that domain(Active) contains
155 no duplicates. The difficulty is how to constrain Specs enough to
156 avoid getting into that situation. It's easy to write specs which
157 could cause conflicting bindings in Active, eg:
159 (libpthread.so, pthread_mutex_lock) -> a1
160 (libpthread.so, pthread_*) -> a2
162 for a1 != a2. Or even hairier:
164 (libpthread.so, pthread_mutex_*) -> a1
165 (libpthread.so, pthread_*_lock) -> a2
167 I can't think of any sane way of detecting when an addition to
168 Specs would generate conflicts. However, considering we don't
169 actually want to have a system that allows this, I propose this:
170 all changes to Specs are acceptable. But, when recomputing Active
171 following the change, if the same orig is bound to more than one
172 redir, then the first binding for orig is retained, and all the
175 ===========================================================
176 ===========================================================
177 Incremental implementation:
179 When a new DebugInfo appears:
180 - it may be the source of new specs
181 - it may be the source of new matches for existing specs
184 - (new Specs x existing DebugInfos): scan all symbols in the new
185 DebugInfo to find new specs. Each of these needs to be compared
186 against all symbols in all the existing DebugInfos to generate
189 - (existing Specs x new DebugInfo): scan all symbols in the
190 DebugInfo, trying to match them to any existing specs, also
191 generating new actives.
193 - (new Specs x new DebugInfo): scan all symbols in the new
194 DebugInfo, trying to match them against the new specs, to
195 generate new actives.
197 - Finally, add new new specs to the current set of specs.
199 When adding a new active (s,d) to the Actives:
201 if already bound to d, ignore
202 if already bound to something other than d, complain loudly and ignore
203 else add (s,d) to Actives
204 and discard (s,1) and (d,1) (maybe overly conservative)
206 When a DebugInfo disappears:
207 - delete all specs acquired from the seginfo
208 - delete all actives derived from the just-deleted specs
209 - if each active (s,d) deleted, discard (s,1) and (d,1)
213 /*------------------------------------------------------------*/
214 /*--- REDIRECTION SPECIFICATIONS ---*/
215 /*------------------------------------------------------------*/
217 /* A specification of a redirection we want to do. Note that because
218 both the "from" soname and function name may contain wildcards, the
219 spec can match an arbitrary number of times.
221 16 Nov 2007: Comments re .mandatory field: The initial motivation
222 for this is making Memcheck work sanely on glibc-2.6.X ppc32-linux.
223 We really need to intercept 'strlen' in ld.so right from startup.
224 If ld.so does not have a visible 'strlen' symbol, Memcheck
225 generates an impossible number of errors resulting from highly
226 tuned strlen implementation in ld.so, and is completely unusable
227 -- the resulting undefinedness eventually seeps everywhere. */
230 struct _Spec
* next
; /* linked list */
231 /* FIXED PARTS -- set when created and not changed */
232 HChar
* from_sopatt
; /* from soname pattern */
233 HChar
* from_fnpatt
; /* from fnname pattern */
234 Addr to_addr
; /* where redirecting to */
235 Bool isWrap
; /* wrap or replacement? */
236 Bool isGlobal
; /* must the symbol to replace be global? */
237 Int becTag
; /* 0 through 9999. Behavioural equivalance class tag.
238 If two wrappers have the same (non-zero) tag, they
239 are promising that they behave identically. */
240 Int becPrio
; /* 0 through 9. Behavioural equivalence class prio.
241 Used to choose between competing wrappers with
242 the same (non-zero) tag. */
243 const HChar
** mandatory
; /* non-NULL ==> abort V and print the
244 strings if from_sopatt is loaded but
245 from_fnpatt cannot be found */
246 /* VARIABLE PARTS -- used transiently whilst processing redirections */
247 Bool mark
; /* set if spec requires further processing */
248 Bool done
; /* set if spec was successfully matched */
252 /* Top-level data structure. It contains a pointer to a DebugInfo and
253 also a list of the specs harvested from that DebugInfo. Note that
254 seginfo is allowed to be NULL, meaning that the specs are
255 pre-loaded ones at startup and are not associated with any
256 particular seginfo. */
259 struct _TopSpec
* next
; /* linked list */
260 const DebugInfo
* seginfo
; /* symbols etc */
261 Spec
* specs
; /* specs pulled out of seginfo */
262 Bool mark
; /* transient temporary used during deletion */
266 /* This is the top level list of redirections. m_debuginfo maintains
267 a list of DebugInfos, and the idea here is to maintain a list with
268 the same number of elements (in fact, with one more element, so as
269 to record abovementioned preloaded specifications.) */
270 static TopSpec
* topSpecs
= NULL
;
273 /*------------------------------------------------------------*/
274 /*--- CURRENTLY ACTIVE REDIRECTIONS ---*/
275 /*------------------------------------------------------------*/
277 /* Represents a currently active binding. If either parent_spec or
278 parent_sym is NULL, then this binding was hardwired at startup and
279 should not be deleted. Same is true if either parent's seginfo
283 Addr from_addr
; /* old addr -- MUST BE THE FIRST WORD! */
284 Addr to_addr
; /* where redirecting to */
285 TopSpec
* parent_spec
; /* the TopSpec which supplied the Spec */
286 TopSpec
* parent_sym
; /* the TopSpec which supplied the symbol */
287 Int becTag
; /* behavioural eclass tag for ::to_addr */
288 Int becPrio
; /* and its priority */
289 Bool isWrap
; /* wrap or replacement? */
290 Bool isIFunc
; /* indirect function? */
294 /* The active set is a fast lookup table */
295 static OSet
* activeSet
= NULL
;
297 /* Wrapper routine for indirect functions */
298 static Addr iFuncWrapper
;
300 /*------------------------------------------------------------*/
302 /*------------------------------------------------------------*/
304 static void maybe_add_active ( Active
/*by value; callee copies*/ );
306 static void* dinfo_zalloc(const HChar
* ec
, SizeT
);
307 static void dinfo_free(void*);
308 static HChar
* dinfo_strdup(const HChar
* ec
, const HChar
*);
309 static Bool
is_plausible_guest_addr(Addr
);
311 static void show_redir_state ( const HChar
* who
);
312 static void show_active ( const HChar
* left
, const Active
* act
);
314 static void handle_maybe_load_notifier( const HChar
* soname
,
315 const HChar
* symbol
, Addr addr
);
317 static void handle_require_text_symbols ( const DebugInfo
* );
319 /*------------------------------------------------------------*/
320 /*--- NOTIFICATIONS ---*/
321 /*------------------------------------------------------------*/
324 void generate_and_add_actives (
325 /* spec list and the owning TopSpec */
327 TopSpec
* parent_spec
,
328 /* debuginfo and the owning TopSpec */
334 /* Copy all the names from a given symbol into an AR_DINFO allocated,
335 NULL terminated array, for easy iteration. Caller must pass also
336 the address of a 2-entry array which can be used in the common case
337 to avoid dynamic allocation. */
338 static const HChar
** alloc_symname_array ( const HChar
* pri_name
,
339 const HChar
** sec_names
,
340 const HChar
** twoslots
)
342 /* Special-case the common case: only one name. We expect the
343 caller to supply a stack-allocated 2-entry array for this. */
344 if (sec_names
== NULL
) {
345 twoslots
[0] = pri_name
;
349 /* Else must use dynamic allocation. Figure out size .. */
351 const HChar
** pp
= sec_names
;
352 while (*pp
) { n_req
++; pp
++; }
353 /* .. allocate and copy in. */
354 const HChar
** arr
= dinfo_zalloc("redir.asa.1", (n_req
+1) * sizeof(HChar
*));
358 while (*pp
) { arr
[i
++] = *pp
; pp
++; }
359 vg_assert(i
== n_req
);
360 vg_assert(arr
[n_req
] == NULL
);
365 /* Free the array allocated by alloc_symname_array, if any. */
366 static void free_symname_array ( const HChar
** names
, const HChar
** twoslots
)
368 if (names
!= twoslots
)
372 static HChar
const* advance_to_equal ( HChar
const* c
) {
373 while (*c
&& *c
!= '=') {
378 static HChar
const* advance_to_comma ( HChar
const* c
) {
379 while (*c
&& *c
!= ',') {
385 /* Notify m_redir of the arrival of a new DebugInfo. This is fairly
386 complex, but the net effect is to (1) add a new entry to the
387 topspecs list, and (2) figure out what new binding are now active,
388 and, as a result, add them to the actives mapping. */
390 void VG_(redir_notify_new_DebugInfo
)( const DebugInfo
* newdi
)
392 Bool ok
, isWrap
, isGlobal
;
393 Int i
, nsyms
, becTag
, becPrio
;
398 const HChar
* sym_name_pri
;
399 const HChar
** sym_names_sec
;
401 const HChar
* demangled_sopatt
;
402 const HChar
* demangled_fnpatt
;
403 Bool check_ppcTOCs
= False
;
405 const HChar
* newdi_soname
;
406 Bool dehacktivate_pthread_stack_cache_var_search
= False
;
407 const HChar
* const pthread_soname
= "libpthread.so.0";
408 const HChar
* const pthread_stack_cache_actsize_varname
409 = "stack_cache_actsize";
410 #if defined(VGO_solaris)
411 Bool vg_vfork_fildes_var_search
= False
;
412 const HChar
* const vg_preload_core_soname
= "vgpreload_core.so.0";
413 const HChar
* const vg_vfork_fildes_varname
= "vg_vfork_fildes";
416 # if defined(VG_PLAT_USES_PPCTOC)
417 check_ppcTOCs
= True
;
421 newdi_soname
= VG_(DebugInfo_get_soname
)(newdi
);
422 vg_assert(newdi_soname
!= NULL
);
426 /* When an outer Valgrind is executing an inner Valgrind, the
427 inner "sees" in its address space the mmap-ed vgpreload files
428 of the outer. The inner must avoid interpreting the
429 redirections given in the outer vgpreload mmap-ed files.
430 Otherwise, some tool combinations badly fail.
432 Example: outer memcheck tool executing an inner none tool.
434 If inner none interprets the outer malloc redirection, the
435 inner will redirect malloc to a memcheck function it does not
436 have (as the redirection target is from the outer). With
437 such a failed redirection, a call to malloc inside the inner
438 will then result in a "no-operation" (and so no memory will
441 When running as an inner, no redirection will be done
442 for a vgpreload file if this file is not located in the
443 inner VALGRIND_LIB directory.
445 Recognising a vgpreload file based on a filename pattern
446 is a kludge. An alternate solution would be to change
447 the _vgr prefix according to outer/inner/client.
449 const HChar
* newdi_filename
= VG_(DebugInfo_get_filename
)(newdi
);
450 const HChar
* newdi_basename
= VG_(basename
) (newdi_filename
);
451 if (VG_(strncmp
) (newdi_basename
, "vgpreload_", 10) == 0) {
452 /* This looks like a vgpreload file => check if this file
453 is from the inner VALGRIND_LIB.
454 We do this check using VG_(stat) + dev/inode comparison
455 as vg-in-place defines a VALGRIND_LIB with symlinks
456 pointing to files inside the valgrind build directories. */
457 struct vg_stat newdi_stat
;
459 struct vg_stat in_vglib_stat
;
462 newdi_res
= VG_(stat
)(newdi_filename
, &newdi_stat
);
464 HChar in_vglib_filename
[VG_(strlen
)(VG_(libdir
)) + 1 +
465 VG_(strlen
)(newdi_basename
) + 1];
466 VG_(sprintf
)(in_vglib_filename
, "%s/%s", VG_(libdir
), newdi_basename
);
468 in_vglib_res
= VG_(stat
)(in_vglib_filename
, &in_vglib_stat
);
470 /* If we find newdi_basename in inner VALGRIND_LIB
471 but newdi_filename is not the same file, then we do
472 not execute the redirection. */
473 if (!sr_isError(in_vglib_res
)
474 && !sr_isError(newdi_res
)
475 && (newdi_stat
.dev
!= in_vglib_stat
.dev
476 || newdi_stat
.ino
!= in_vglib_stat
.ino
)) {
477 /* <inner VALGRIND_LIB>/newdi_basename is an existing file
478 and is different of newdi_filename.
479 So, we do not execute newdi_filename redirection. */
480 if ( VG_(clo_verbosity
) > 1 ) {
481 VG_(message
)( Vg_DebugMsg
,
482 "Skipping vgpreload redir in %s"
483 " (not from VALGRIND_LIB_INNER)\n",
488 if ( VG_(clo_verbosity
) > 1 ) {
489 VG_(message
)( Vg_DebugMsg
,
490 "Executing vgpreload redir in %s"
491 " (from VALGRIND_LIB_INNER)\n",
500 /* stay sane: we don't already have this. */
501 for (ts
= topSpecs
; ts
; ts
= ts
->next
)
502 vg_assert(ts
->seginfo
!= newdi
);
504 /* scan this DebugInfo's symbol table, pulling out and demangling
507 specList
= NULL
; /* the spec list we're building up */
509 dehacktivate_pthread_stack_cache_var_search
=
510 SimHintiS(SimHint_no_nptl_pthread_stackcache
, VG_(clo_sim_hints
))
511 && 0 == VG_(strcmp
)(newdi_soname
, pthread_soname
);
513 #if defined(VGO_solaris)
514 vg_vfork_fildes_var_search
=
515 0 == VG_(strcmp
)(newdi_soname
, vg_preload_core_soname
);
518 nsyms
= VG_(DebugInfo_syms_howmany
)( newdi
);
519 for (i
= 0; i
< nsyms
; i
++) {
520 VG_(DebugInfo_syms_getidx
)( newdi
, i
, &sym_avmas
,
521 NULL
, &sym_name_pri
, &sym_names_sec
,
522 &isText
, NULL
, NULL
);
523 /* Set up to conveniently iterate over all names for this symbol. */
524 const HChar
* twoslots
[2];
525 const HChar
** names_init
=
526 alloc_symname_array(sym_name_pri
, sym_names_sec
, &twoslots
[0]);
528 for (names
= names_init
; *names
; names
++) {
530 ok
= VG_(maybe_Z_demangle
)( *names
,
533 &isWrap
, &becTag
, &becPrio
);
534 /* ignore data symbols */
536 /* But search for dehacktivate stack cache var if needed. */
537 if (dehacktivate_pthread_stack_cache_var_search
538 && 0 == VG_(strcmp
)(*names
,
539 pthread_stack_cache_actsize_varname
)) {
540 if ( VG_(clo_verbosity
) > 1 ) {
541 VG_(message
)( Vg_DebugMsg
,
542 "deactivate nptl pthread stackcache via kludge:"
543 " found symbol %s at addr %p\n",
544 *names
, (void*) sym_avmas
.main
);
546 VG_(client__stack_cache_actsize__addr
) = (SizeT
*) sym_avmas
.main
;
547 dehacktivate_pthread_stack_cache_var_search
= False
;
549 #if defined(VGO_solaris)
550 if (vg_vfork_fildes_var_search
551 && 0 == VG_(strcmp
)(*names
, vg_vfork_fildes_varname
)) {
552 if ( VG_(clo_verbosity
) > 1 ) {
553 VG_(message
)( Vg_DebugMsg
,
554 "vfork kludge: found symbol %s at addr %p\n",
555 *names
, (void*) sym_avmas
.main
);
557 VG_(vfork_fildes_addr
) = (Int
*) sym_avmas
.main
;
558 vg_vfork_fildes_var_search
= False
;
564 /* It's not a full-scale redirect, but perhaps it is a load-notify
565 fn? Let the load-notify department see it. */
566 handle_maybe_load_notifier( newdi_soname
, *names
, sym_avmas
.main
);
569 if (check_ppcTOCs
&& GET_TOCPTR_AVMA(sym_avmas
) == 0) {
570 /* This platform uses toc pointers, but none could be found
571 for this symbol, so we can't safely redirect/wrap to it.
572 Just skip it; we'll make a second pass over the symbols in
573 the following loop, and complain at that point. */
577 HChar
*replaced_sopatt
= NULL
;
578 if (0 == VG_(strncmp
) (demangled_sopatt
,
579 VG_SO_SYN_PREFIX
, VG_SO_SYN_PREFIX_LEN
)) {
580 /* This is a redirection for handling lib so synonyms. If we
581 have a matching lib synonym, then replace the sopatt.
582 Otherwise, just ignore this redirection spec. */
584 /* Search for a matching synonym=newname*/
585 SizeT
const sopatt_syn_len
586 = VG_(strlen
)(demangled_sopatt
+VG_SO_SYN_PREFIX_LEN
);
587 HChar
const* last
= VG_(clo_soname_synonyms
);
589 while (last
!= NULL
&& *last
) {
590 HChar
const* first
= last
;
591 last
= advance_to_equal(first
);
593 if ((last
- first
) == sopatt_syn_len
594 && 0 == VG_(strncmp
)(demangled_sopatt
+VG_SO_SYN_PREFIX_LEN
,
597 // Found the demangle_sopatt synonym => replace it
599 last
= advance_to_comma(first
);
600 replaced_sopatt
= dinfo_zalloc("redir.rnnD.5",
602 VG_(strncpy
)(replaced_sopatt
, first
, last
- first
);
603 replaced_sopatt
[last
- first
] = '\0';
604 demangled_sopatt
= replaced_sopatt
;
608 last
= advance_to_comma(last
);
613 // If the user didn't set it then somalloc is special. We
614 // want to match public/global symbols that match the
615 // fnpatt everywhere.
616 if (replaced_sopatt
== NULL
617 && VG_(strcmp
) ( demangled_sopatt
, SO_SYN_MALLOC_NAME
) == 0)
619 replaced_sopatt
= VG_(strdup
)("m_redir.rnnD.1", "*");
620 demangled_sopatt
= replaced_sopatt
;
624 // If we have not replaced the sopatt, then skip the redir.
625 if (replaced_sopatt
== NULL
)
629 spec
= dinfo_zalloc("redir.rnnD.1", sizeof(Spec
));
630 spec
->from_sopatt
= dinfo_strdup("redir.rnnD.2", demangled_sopatt
);
631 spec
->from_fnpatt
= dinfo_strdup("redir.rnnD.3", demangled_fnpatt
);
632 spec
->to_addr
= sym_avmas
.main
;
633 spec
->isWrap
= isWrap
;
634 spec
->isGlobal
= isGlobal
;
635 spec
->becTag
= becTag
;
636 spec
->becPrio
= becPrio
;
637 /* check we're not adding manifestly stupid destinations */
638 vg_assert(is_plausible_guest_addr(sym_avmas
.main
));
639 spec
->next
= specList
;
640 spec
->mark
= False
; /* not significant */
641 spec
->done
= False
; /* not significant */
644 free_symname_array(names_init
, &twoslots
[0]);
646 if (dehacktivate_pthread_stack_cache_var_search
) {
647 VG_(message
)(Vg_DebugMsg
,
648 "WARNING: could not find symbol for var %s in %s\n",
649 pthread_stack_cache_actsize_varname
, pthread_soname
);
650 VG_(message
)(Vg_DebugMsg
,
651 "=> pthread stack cache cannot be disabled!\n");
653 #if defined(VGO_solaris)
654 if (vg_vfork_fildes_var_search
) {
655 VG_(message
)(Vg_DebugMsg
,
656 "WARNING: could not find symbol for var %s in %s\n",
657 vg_vfork_fildes_varname
, vg_preload_core_soname
);
658 VG_(message
)(Vg_DebugMsg
,
659 "=> posix_spawn() will not work correctly!\n");
664 for (i
= 0; i
< nsyms
; i
++) {
665 VG_(DebugInfo_syms_getidx
)( newdi
, i
, &sym_avmas
,
666 NULL
, &sym_name_pri
, &sym_names_sec
,
667 &isText
, NULL
, NULL
);
668 const HChar
* twoslots
[2];
669 const HChar
** names_init
=
670 alloc_symname_array(sym_name_pri
, sym_names_sec
, &twoslots
[0]);
672 for (names
= names_init
; *names
; names
++) {
674 && VG_(maybe_Z_demangle
)(
675 *names
, &demangled_sopatt
,
676 &demangled_fnpatt
, &isWrap
, NULL
, NULL
);
678 /* not a redirect. Ignore. */
680 if (GET_TOCPTR_AVMA(sym_avmas
) != 0)
681 /* has a valid toc pointer. Ignore. */
684 for (spec
= specList
; spec
; spec
= spec
->next
)
685 if (0 == VG_(strcmp
)(spec
->from_sopatt
, demangled_sopatt
)
686 && 0 == VG_(strcmp
)(spec
->from_fnpatt
, demangled_fnpatt
))
689 /* a redirect to some other copy of that symbol, which
690 does have a TOC value, already exists */
694 VG_(message
)(Vg_DebugMsg
,
695 "WARNING: no TOC ptr for redir/wrap to %s %s\n",
696 demangled_sopatt
, demangled_fnpatt
);
698 free_symname_array(names_init
, &twoslots
[0]);
702 /* Ok. Now specList holds the list of specs from the DebugInfo.
703 Build a new TopSpec, but don't add it to topSpecs yet. */
704 newts
= dinfo_zalloc("redir.rnnD.4", sizeof(TopSpec
));
705 newts
->next
= NULL
; /* not significant */
706 newts
->seginfo
= newdi
;
707 newts
->specs
= specList
;
708 newts
->mark
= False
; /* not significant */
710 /* We now need to augment the active set with the following partial
713 (1) actives formed by matching the new specs in specList against
714 all symbols currently listed in topSpecs
716 (2) actives formed by matching the new symbols in newdi against
717 all specs currently listed in topSpecs
719 (3) actives formed by matching the new symbols in newdi against
720 the new specs in specList
722 This is necessary in order to maintain the invariant that
723 Actives contains all bindings generated by matching ALL specs in
724 topSpecs against ALL symbols in topSpecs (that is, a cross
725 product of ALL known specs against ALL known symbols).
728 for (ts
= topSpecs
; ts
; ts
= ts
->next
) {
730 generate_and_add_actives( specList
, newts
,
735 for (ts
= topSpecs
; ts
; ts
= ts
->next
) {
736 generate_and_add_actives( ts
->specs
, ts
,
741 generate_and_add_actives( specList
, newts
,
744 /* Finally, add the new TopSpec. */
745 newts
->next
= topSpecs
;
748 if (VG_(clo_trace_redir
))
749 show_redir_state("after VG_(redir_notify_new_DebugInfo)");
751 /* Really finally (quite unrelated to all the above) check the
752 names in the module against any --require-text-symbol=
753 specifications we might have. */
754 handle_require_text_symbols(newdi
);
757 /* Add a new target for an indirect function. Adds a new redirection
758 for the indirection function with address old_from that redirects
759 the ordinary function with address new_from to the target address
760 of the original redirection. */
762 void VG_(redir_add_ifunc_target
)( Addr old_from
, Addr new_from
)
766 old
= VG_(OSetGen_Lookup
)(activeSet
, &old_from
);
768 vg_assert(old
->isIFunc
);
771 new.from_addr
= new_from
;
773 maybe_add_active (new);
775 if (VG_(clo_trace_redir
)) {
776 VG_(message
)( Vg_DebugMsg
,
777 "Adding redirect for indirect function "
778 "0x%lx from 0x%lx -> 0x%lx\n",
779 old_from
, new_from
, new.to_addr
);
783 /* Do one element of the basic cross product: add to the active set,
784 all matches resulting from comparing all the given specs against
785 all the symbols in the given seginfo. If a conflicting binding
786 would thereby arise, don't add it, but do complain. */
789 void generate_and_add_actives (
790 /* spec list and the owning TopSpec */
792 TopSpec
* parent_spec
,
793 /* seginfo and the owning TopSpec */
799 Bool anyMark
, isText
, isIFunc
, isGlobal
;
803 const HChar
* sym_name_pri
;
804 const HChar
** sym_names_sec
;
806 /* First figure out which of the specs match the seginfo's soname.
807 Also clear the 'done' bits, so that after the main loop below
808 tell which of the Specs really did get done. */
810 for (sp
= specs
; sp
; sp
= sp
->next
) {
812 const HChar
*soname
= VG_(DebugInfo_get_soname
)(di
);
814 /* When searching for global public symbols (like for the somalloc
815 synonym symbols), exclude the dynamic (runtime) linker as it is very
816 special. See https://bugs.kde.org/show_bug.cgi?id=355454 */
817 if ((VG_(strcmp
)(sp
->from_sopatt
, "*") == 0) &&
818 (sp
->isGlobal
== True
) &&
819 VG_(is_soname_ld_so
)(soname
)) {
824 sp
->mark
= VG_(string_match
)( sp
->from_sopatt
, soname
);
825 anyMark
= anyMark
|| sp
->mark
;
828 /* shortcut: if none of the sonames match, there will be no bindings. */
832 /* Iterate outermost over the symbols in the seginfo, in the hope
833 of trashing the caches less. */
834 nsyms
= VG_(DebugInfo_syms_howmany
)( di
);
835 for (i
= 0; i
< nsyms
; i
++) {
836 VG_(DebugInfo_syms_getidx
)( di
, i
, &sym_avmas
,
837 NULL
, &sym_name_pri
, &sym_names_sec
,
838 &isText
, &isIFunc
, &isGlobal
);
839 const HChar
* twoslots
[2];
840 const HChar
** names_init
=
841 alloc_symname_array(sym_name_pri
, sym_names_sec
, &twoslots
[0]);
843 for (names
= names_init
; *names
; names
++) {
845 /* ignore data symbols */
849 for (sp
= specs
; sp
; sp
= sp
->next
) {
851 continue; /* soname doesn't match */
852 if (VG_(string_match
)( sp
->from_fnpatt
, *names
)
853 && (sp
->isGlobal
== False
|| isGlobal
== True
)) {
854 /* got a new binding. Add to collection. */
855 act
.from_addr
= sym_avmas
.main
;
856 act
.to_addr
= sp
->to_addr
;
857 act
.parent_spec
= parent_spec
;
858 act
.parent_sym
= parent_sym
;
859 act
.becTag
= sp
->becTag
;
860 act
.becPrio
= sp
->becPrio
;
861 act
.isWrap
= sp
->isWrap
;
862 act
.isIFunc
= isIFunc
;
864 maybe_add_active( act
);
866 /* If the function being wrapped has a local entry point
867 * redirect it to the global entry point. The redirection
868 * must save and setup r2 then setup r12 for the new function.
869 * On return, r2 must be restored. Local entry points used
870 * in PPC64 Little Endian.
872 if (GET_LOCAL_EP_AVMA(sym_avmas
) != 0) {
873 act
.from_addr
= GET_LOCAL_EP_AVMA(sym_avmas
);
874 maybe_add_active( act
);
878 } /* for (sp = specs; sp; sp = sp->next) */
880 } /* iterating over names[] */
881 free_symname_array(names_init
, &twoslots
[0]);
882 } /* for (i = 0; i < nsyms; i++) */
884 /* Now, finally, look for Specs which were marked to be done, but
885 didn't get matched. If any such are mandatory we must abort the
886 system at this point. */
887 for (sp
= specs
; sp
; sp
= sp
->next
) {
890 if (sp
->mark
&& (!sp
->done
) && sp
->mandatory
)
895 const HChar
* v
= "valgrind: ";
897 vg_assert(!sp
->done
);
898 vg_assert(sp
->mandatory
);
901 "%sFatal error at startup: a function redirection\n", v
);
903 "%swhich is mandatory for this platform-tool combination\n", v
);
905 "%scannot be set up. Details of the redirection are:\n", v
);
909 "%sA must-be-redirected function\n", v
);
911 "%swhose name matches the pattern: %s\n", v
, sp
->from_fnpatt
);
913 "%sin an object with soname matching: %s\n", v
, sp
->from_sopatt
);
915 "%swas not found whilst processing\n", v
);
917 "%ssymbols from the object with soname: %s\n",
918 v
, VG_(DebugInfo_get_soname
)(di
));
922 for (strp
= sp
->mandatory
; *strp
; strp
++)
929 "%sCannot continue -- exiting now. Sorry.\n", v
);
936 /* Add an act (passed by value; is copied here) and deal with
937 conflicting bindings. */
938 static void maybe_add_active ( Active act
)
940 const HChar
* what
= NULL
;
942 Bool add_act
= False
;
944 /* Complain and ignore manifestly bogus 'from' addresses.
946 Kludge: because this can get called befor the trampoline area (a
947 bunch of magic 'to' addresses) has its ownership changed from V
948 to C, we can't check the 'to' address similarly. Sigh.
950 amd64-linux hack: the vsysinfo pages appear to have no
952 ffffffffff600000-ffffffffffe00000 ---p 00000000 00:00 0
953 so skip the check for them. */
954 if (!is_plausible_guest_addr(act
.from_addr
)
955 # if defined(VGP_amd64_linux)
956 && act
.from_addr
!= 0xFFFFFFFFFF600000ULL
957 && act
.from_addr
!= 0xFFFFFFFFFF600400ULL
958 && act
.from_addr
!= 0xFFFFFFFFFF600800ULL
961 what
= "redirection from-address is in non-executable area";
965 old
= VG_(OSetGen_Lookup
)( activeSet
, &act
.from_addr
);
967 /* Dodgy. Conflicting binding. */
968 vg_assert(old
->from_addr
== act
.from_addr
);
969 if (old
->to_addr
!= act
.to_addr
) {
970 /* We've got a conflicting binding -- that is, from_addr is
971 specified to redirect to two different destinations,
972 old->to_addr and act.to_addr. If we can prove that they
973 are behaviourally equivalent then that's no problem. So
974 we can look at the behavioural eclass tags for both
975 functions to see if that's so. If they are equal, and
976 nonzero, then that's fine. But if not, we can't show they
977 are equivalent, so we have to complain, and ignore the new
979 vg_assert(old
->becTag
>= 0 && old
->becTag
<= 9999);
980 vg_assert(old
->becPrio
>= 0 && old
->becPrio
<= 9);
981 vg_assert(act
.becTag
>= 0 && act
.becTag
<= 9999);
982 vg_assert(act
.becPrio
>= 0 && act
.becPrio
<= 9);
983 if (old
->becTag
== 0)
984 vg_assert(old
->becPrio
== 0);
986 vg_assert(act
.becPrio
== 0);
988 if (old
->becTag
== 0 || act
.becTag
== 0 || old
->becTag
!= act
.becTag
) {
989 /* We can't show that they are equivalent. Complain and
991 what
= "new redirection conflicts with existing -- ignoring it";
994 /* They have the same eclass tag. Use the priorities to
995 resolve the ambiguity. */
996 if (act
.becPrio
<= old
->becPrio
) {
997 /* The new one doesn't have a higher priority, so just
999 if (VG_(clo_verbosity
) > 2) {
1000 VG_(message
)(Vg_UserMsg
, "Ignoring %s redirection:\n",
1001 act
.becPrio
< old
->becPrio
? "lower priority"
1003 show_active( " old: ", old
);
1004 show_active( " new: ", &act
);
1007 /* The tricky case. The new one has a higher priority, so
1008 we need to get the old one out of the OSet and install
1009 this one in its place. */
1010 if (VG_(clo_verbosity
) > 1) {
1011 VG_(message
)(Vg_UserMsg
,
1012 "Preferring higher priority redirection:\n");
1013 show_active( " old: ", old
);
1014 show_active( " new: ", &act
);
1017 void* oldNd
= VG_(OSetGen_Remove
)( activeSet
, &act
.from_addr
);
1018 vg_assert(oldNd
== old
);
1019 VG_(OSetGen_FreeNode
)( activeSet
, old
);
1023 /* This appears to be a duplicate of an existing binding.
1024 Safe(ish) -- ignore. */
1025 /* XXXXXXXXXXX COMPLAIN if new and old parents differ */
1029 /* There's no previous binding for this from_addr, so we must
1030 add 'act' to the active set. */
1034 /* So, finally, actually add it. */
1036 Active
* a
= VG_(OSetGen_AllocNode
)(activeSet
, sizeof(Active
));
1039 VG_(OSetGen_Insert
)(activeSet
, a
);
1040 /* Now that a new from->to redirection is in force, we need to
1041 get rid of any translations intersecting 'from' in order that
1042 they get redirected to 'to'. So discard them. Just for
1043 paranoia (but, I believe, unnecessarily), discard 'to' as
1045 VG_(discard_translations
)( act
.from_addr
, 1,
1046 "redir_new_DebugInfo(from_addr)");
1047 VG_(discard_translations
)( act
.to_addr
, 1,
1048 "redir_new_DebugInfo(to_addr)");
1049 if (VG_(clo_verbosity
) > 2) {
1050 VG_(message
)(Vg_UserMsg
, "Adding active redirection:\n");
1051 show_active( " new: ", &act
);
1058 vg_assert(!add_act
);
1059 if (VG_(clo_verbosity
) > 1) {
1060 VG_(message
)(Vg_UserMsg
, "WARNING: %s\n", what
);
1062 show_active( " old: ", old
);
1064 show_active( " new: ", &act
);
1069 /* Notify m_redir of the deletion of a DebugInfo. This is relatively
1070 simple -- just get rid of all actives derived from it, and free up
1071 the associated list elements. */
1073 void VG_(redir_notify_delete_DebugInfo
)( const DebugInfo
* delsi
)
1086 /* Search for it, and make tsPrev point to the previous entry, if
1091 if (ts
== NULL
) break;
1092 if (ts
->seginfo
== delsi
) break;
1097 vg_assert(ts
); /* else we don't have the deleted DebugInfo */
1098 vg_assert(ts
->seginfo
== delsi
);
1100 /* Traverse the actives, copying the addresses of those we intend
1101 to delete into tmpSet. */
1102 tmpSet
= VG_(OSetWord_Create
)(dinfo_zalloc
, "redir.rndD.1", dinfo_free
);
1106 VG_(OSetGen_ResetIter
)( activeSet
);
1107 while ( (act
= VG_(OSetGen_Next
)(activeSet
)) ) {
1108 delMe
= act
->parent_spec
!= NULL
1109 && act
->parent_sym
!= NULL
1110 && act
->parent_spec
->seginfo
!= NULL
1111 && act
->parent_sym
->seginfo
!= NULL
1112 && (act
->parent_spec
->mark
|| act
->parent_sym
->mark
);
1114 /* While we're at it, a bit of paranoia: delete any actives
1115 which don't have both feet in valid client executable areas.
1116 But don't delete hardwired-at-startup ones; these are denoted
1117 by having parent_spec or parent_sym being NULL. */
1119 && act
->parent_spec
!= NULL
1120 && act
->parent_sym
!= NULL
) {
1121 if (!is_plausible_guest_addr(act
->from_addr
))
1123 if (!is_plausible_guest_addr(act
->to_addr
))
1128 VG_(OSetWord_Insert
)( tmpSet
, act
->from_addr
);
1129 /* While we have our hands on both the 'from' and 'to'
1130 of this Active, do paranoid stuff with tt/tc. */
1131 VG_(discard_translations
)( act
->from_addr
, 1,
1132 "redir_del_DebugInfo(from_addr)");
1133 VG_(discard_translations
)( act
->to_addr
, 1,
1134 "redir_del_DebugInfo(to_addr)");
1138 /* Now traverse tmpSet, deleting corresponding elements in activeSet. */
1139 VG_(OSetWord_ResetIter
)( tmpSet
);
1140 while ( VG_(OSetWord_Next
)(tmpSet
, &addr
) ) {
1141 act
= VG_(OSetGen_Remove
)( activeSet
, &addr
);
1143 VG_(OSetGen_FreeNode
)( activeSet
, act
);
1146 VG_(OSetWord_Destroy
)( tmpSet
);
1148 /* The Actives set is now cleaned up. Free up this TopSpec and
1149 everything hanging off it. */
1150 for (sp
= ts
->specs
; sp
; sp
= sp_next
) {
1151 if (sp
->from_sopatt
) dinfo_free(sp
->from_sopatt
);
1152 if (sp
->from_fnpatt
) dinfo_free(sp
->from_fnpatt
);
1157 if (tsPrev
== NULL
) {
1159 topSpecs
= ts
->next
;
1161 tsPrev
->next
= ts
->next
;
1165 if (VG_(clo_trace_redir
))
1166 show_redir_state("after VG_(redir_notify_delete_DebugInfo)");
1170 /*------------------------------------------------------------*/
1171 /*--- QUERIES (really the whole point of this module) ---*/
1172 /*------------------------------------------------------------*/
1174 /* This is the crucial redirection function. It answers the question:
1175 should this code address be redirected somewhere else? It's used
1176 just before translating a basic block. */
1177 Addr
VG_(redir_do_lookup
) ( Addr orig
, Bool
* isWrap
)
1179 Active
* r
= VG_(OSetGen_Lookup
)(activeSet
, &orig
);
1183 vg_assert(r
->to_addr
!= 0);
1185 *isWrap
= r
->isWrap
|| r
->isIFunc
;
1187 vg_assert(iFuncWrapper
);
1188 return iFuncWrapper
;
1193 /* Does the soname represent a dynamic (runtime) linker?
1194 Considers various VG_U_LD* entries from pub_tool_redir.h. */
1195 Bool
VG_(is_soname_ld_so
) (const HChar
*soname
)
1197 # if defined(VGO_linux)
1198 if (VG_STREQ(soname
, VG_U_LD_LINUX_SO_3
)) return True
;
1199 if (VG_STREQ(soname
, VG_U_LD_LINUX_SO_2
)) return True
;
1200 if (VG_STREQ(soname
, VG_U_LD_LINUX_X86_64_SO_2
)) return True
;
1201 if (VG_STREQ(soname
, VG_U_LD64_SO_1
)) return True
;
1202 if (VG_STREQ(soname
, VG_U_LD64_SO_2
)) return True
;
1203 if (VG_STREQ(soname
, VG_U_LD_SO_1
)) return True
;
1204 if (VG_STREQ(soname
, VG_U_LD_LINUX_AARCH64_SO_1
)) return True
;
1205 if (VG_STREQ(soname
, VG_U_LD_LINUX_ARMHF_SO_3
)) return True
;
1206 # elif defined(VGO_darwin)
1207 if (VG_STREQ(soname
, VG_U_DYLD
)) return True
;
1208 # elif defined(VGO_solaris)
1209 if (VG_STREQ(soname
, VG_U_LD_SO_1
)) return True
;
1211 # error "Unsupported OS"
1217 /*------------------------------------------------------------*/
1218 /*--- INITIALISATION ---*/
1219 /*------------------------------------------------------------*/
1221 /* Add a never-delete-me Active. */
1223 __attribute__((unused
)) /* only used on amd64 */
1224 static void add_hardwired_active ( Addr from
, Addr to
)
1227 act
.from_addr
= from
;
1229 act
.parent_spec
= NULL
;
1230 act
.parent_sym
= NULL
;
1231 act
.becTag
= 0; /* "not equivalent to any other fn" */
1232 act
.becPrio
= 0; /* mandatory when becTag == 0 */
1234 act
.isIFunc
= False
;
1235 maybe_add_active( act
);
1239 /* Add a never-delete-me Spec. This is a bit of a kludge. On the
1240 assumption that this is called only at startup, only handle the
1241 case where topSpecs is completely empty, or if it isn't, it has
1242 just one entry and that is the one with NULL seginfo -- that is the
1243 entry that holds these initial specs. */
1245 __attribute__((unused
)) /* not used on all platforms */
1246 static void add_hardwired_spec (const HChar
* sopatt
, const HChar
* fnpatt
,
1248 const HChar
** mandatory
)
1250 Spec
* spec
= dinfo_zalloc("redir.ahs.1", sizeof(Spec
));
1252 if (topSpecs
== NULL
) {
1253 topSpecs
= dinfo_zalloc("redir.ahs.2", sizeof(TopSpec
));
1254 /* symtab_zalloc sets all fields to zero */
1257 vg_assert(topSpecs
!= NULL
);
1258 vg_assert(topSpecs
->next
== NULL
);
1259 vg_assert(topSpecs
->seginfo
== NULL
);
1261 /* Note, that these CONST_CAST will not cause a problem, in the sense
1262 that VG_(redir_notify_delete_DebugInfo) will delete them. The reason
1263 is that the TopSpec here has seginfo == NULL and such a TopSpec will
1264 never be freed. See the asserts at the beginning of said function. */
1265 spec
->from_sopatt
= CONST_CAST(HChar
*,sopatt
);
1266 spec
->from_fnpatt
= CONST_CAST(HChar
*,fnpatt
);
1267 spec
->to_addr
= to_addr
;
1268 spec
->isWrap
= False
;
1269 spec
->isGlobal
= False
;
1270 spec
->mandatory
= mandatory
;
1271 /* VARIABLE PARTS */
1272 spec
->mark
= False
; /* not significant */
1273 spec
->done
= False
; /* not significant */
1275 spec
->next
= topSpecs
->specs
;
1276 topSpecs
->specs
= spec
;
1280 __attribute__((unused
)) /* not used on all platforms */
1281 static const HChar
* complain_about_stripped_glibc_ldso
[]
1282 = { "Possible fixes: (1, short term): install glibc's debuginfo",
1283 "package on this machine. (2, longer term): ask the packagers",
1284 "for your Linux distribution to please in future ship a non-",
1285 "stripped ld.so (or whatever the dynamic linker .so is called)",
1286 "that exports the above-named function using the standard",
1287 "calling conventions for this platform. The package you need",
1288 "to install for fix (1) is called",
1290 " On Debian, Ubuntu: libc6-dbg",
1291 " On SuSE, openSuSE, Fedora, RHEL: glibc-debuginfo",
1296 /* Initialise the redir system, and create the initial Spec list and
1297 for amd64-linux a couple of permanent active mappings. The initial
1298 Specs are not converted into Actives yet, on the (checked)
1299 assumption that no DebugInfos have so far been created, and so when
1300 they are created, that will happen. */
1302 void VG_(redir_initialise
) ( void )
1304 // Assert that there are no DebugInfos so far
1305 vg_assert( VG_(next_DebugInfo
)(NULL
) == NULL
);
1307 // Initialise active mapping.
1308 activeSet
= VG_(OSetGen_Create
)(offsetof(Active
, from_addr
),
1309 NULL
, // Use fast comparison
1314 // The rest of this function just adds initial Specs.
1316 # if defined(VGP_x86_linux)
1317 /* If we're using memcheck, use this intercept right from the
1318 start, otherwise ld.so (glibc-2.3.5) makes a lot of noise. */
1319 if (0==VG_(strcmp
)("Memcheck", VG_(details
).name
)) {
1320 const HChar
** mandatory
;
1321 # ifndef GLIBC_MANDATORY_INDEX_AND_STRLEN_REDIRECT
1324 /* for glibc-2.12 and later, this is mandatory - can't sanely
1325 continue without it */
1326 mandatory
= complain_about_stripped_glibc_ldso
;
1329 "ld-linux.so.2", "index",
1330 (Addr
)&VG_(x86_linux_REDIR_FOR_index
), mandatory
);
1332 "ld-linux.so.2", "strlen",
1333 (Addr
)&VG_(x86_linux_REDIR_FOR_strlen
), mandatory
);
1336 # elif defined(VGP_amd64_linux)
1337 /* Redirect vsyscalls to local versions */
1338 add_hardwired_active(
1339 0xFFFFFFFFFF600000ULL
,
1340 (Addr
)&VG_(amd64_linux_REDIR_FOR_vgettimeofday
)
1342 add_hardwired_active(
1343 0xFFFFFFFFFF600400ULL
,
1344 (Addr
)&VG_(amd64_linux_REDIR_FOR_vtime
)
1346 add_hardwired_active(
1347 0xFFFFFFFFFF600800ULL
,
1348 (Addr
)&VG_(amd64_linux_REDIR_FOR_vgetcpu
)
1351 /* If we're using memcheck, use these intercepts right from
1352 the start, otherwise ld.so makes a lot of noise. */
1353 if (0==VG_(strcmp
)("Memcheck", VG_(details
).name
)) {
1356 "ld-linux-x86-64.so.2", "strlen",
1357 (Addr
)&VG_(amd64_linux_REDIR_FOR_strlen
),
1358 # ifndef GLIBC_MANDATORY_STRLEN_REDIRECT
1361 /* for glibc-2.10 and later, this is mandatory - can't sanely
1362 continue without it */
1363 complain_about_stripped_glibc_ldso
1368 # elif defined(VGP_ppc32_linux)
1369 /* If we're using memcheck, use these intercepts right from
1370 the start, otherwise ld.so makes a lot of noise. */
1371 if (0==VG_(strcmp
)("Memcheck", VG_(details
).name
)) {
1373 /* this is mandatory - can't sanely continue without it */
1375 "ld.so.1", "strlen",
1376 (Addr
)&VG_(ppc32_linux_REDIR_FOR_strlen
),
1377 complain_about_stripped_glibc_ldso
1380 "ld.so.1", "strcmp",
1381 (Addr
)&VG_(ppc32_linux_REDIR_FOR_strcmp
),
1382 NULL
/* not mandatory - so why bother at all? */
1383 /* glibc-2.6.1 (openSUSE 10.3, ppc32) seems fine without it */
1387 (Addr
)&VG_(ppc32_linux_REDIR_FOR_strchr
),
1388 NULL
/* not mandatory - so why bother at all? */
1389 /* glibc-2.6.1 (openSUSE 10.3, ppc32) seems fine without it */
1393 # elif defined(VGP_ppc64be_linux)
1394 /* If we're using memcheck, use these intercepts right from
1395 the start, otherwise ld.so makes a lot of noise. */
1396 if (0==VG_(strcmp
)("Memcheck", VG_(details
).name
)) {
1398 /* this is mandatory - can't sanely continue without it */
1400 "ld64.so.1", "strlen",
1401 (Addr
)VG_(fnptr_to_fnentry
)( &VG_(ppc64_linux_REDIR_FOR_strlen
) ),
1402 complain_about_stripped_glibc_ldso
1406 "ld64.so.1", "index",
1407 (Addr
)VG_(fnptr_to_fnentry
)( &VG_(ppc64_linux_REDIR_FOR_strchr
) ),
1408 NULL
/* not mandatory - so why bother at all? */
1409 /* glibc-2.5 (FC6, ppc64) seems fine without it */
1413 # elif defined(VGP_ppc64le_linux)
1414 /* If we're using memcheck, use these intercepts right from
1415 * the start, otherwise ld.so makes a lot of noise.
1417 if (0==VG_(strcmp
)("Memcheck", VG_(details
).name
)) {
1419 /* this is mandatory - can't sanely continue without it */
1421 "ld64.so.2", "strlen",
1422 (Addr
)&VG_(ppc64_linux_REDIR_FOR_strlen
),
1423 complain_about_stripped_glibc_ldso
1427 "ld64.so.2", "index",
1428 (Addr
)&VG_(ppc64_linux_REDIR_FOR_strchr
),
1429 NULL
/* not mandatory - so why bother at all? */
1430 /* glibc-2.5 (FC6, ppc64) seems fine without it */
1434 # elif defined(VGP_arm_linux)
1435 /* If we're using memcheck, use these intercepts right from the
1436 start, otherwise ld.so makes a lot of noise. In most ARM-linux
1437 distros, ld.so's soname is ld-linux.so.3, but Ubuntu 14.04 on
1438 Odroid uses ld-linux-armhf.so.3 for some reason. */
1439 if (0==VG_(strcmp
)("Memcheck", VG_(details
).name
)) {
1442 "ld-linux.so.3", "strlen",
1443 (Addr
)&VG_(arm_linux_REDIR_FOR_strlen
),
1444 complain_about_stripped_glibc_ldso
1447 "ld-linux-armhf.so.3", "strlen",
1448 (Addr
)&VG_(arm_linux_REDIR_FOR_strlen
),
1449 complain_about_stripped_glibc_ldso
1453 "ld-linux.so.3", "memcpy",
1454 (Addr
)&VG_(arm_linux_REDIR_FOR_memcpy
),
1455 complain_about_stripped_glibc_ldso
1458 "ld-linux-armhf.so.3", "memcpy",
1459 (Addr
)&VG_(arm_linux_REDIR_FOR_memcpy
),
1460 complain_about_stripped_glibc_ldso
1464 "ld-linux.so.3", "strcmp",
1465 (Addr
)&VG_(arm_linux_REDIR_FOR_strcmp
),
1466 complain_about_stripped_glibc_ldso
1469 "ld-linux-armhf.so.3", "strcmp",
1470 (Addr
)&VG_(arm_linux_REDIR_FOR_strcmp
),
1471 complain_about_stripped_glibc_ldso
1475 # elif defined(VGP_arm64_linux)
1476 /* If we're using memcheck, use these intercepts right from
1477 the start, otherwise ld.so makes a lot of noise. */
1478 if (0==VG_(strcmp
)("Memcheck", VG_(details
).name
)) {
1480 "ld-linux-aarch64.so.1", "strlen",
1481 (Addr
)&VG_(arm64_linux_REDIR_FOR_strlen
),
1482 complain_about_stripped_glibc_ldso
1485 "ld-linux-aarch64.so.1", "index",
1486 (Addr
)&VG_(arm64_linux_REDIR_FOR_index
),
1490 "ld-linux-aarch64.so.1", "strcmp",
1491 (Addr
)&VG_(arm64_linux_REDIR_FOR_strcmp
),
1494 # if defined(VGPV_arm64_linux_android)
1496 "NONE", "__dl_strlen", // in /system/bin/linker64
1497 (Addr
)&VG_(arm64_linux_REDIR_FOR_strlen
),
1503 # elif defined(VGP_x86_darwin)
1504 /* If we're using memcheck, use these intercepts right from
1505 the start, otherwise dyld makes a lot of noise. */
1506 if (0==VG_(strcmp
)("Memcheck", VG_(details
).name
)) {
1507 add_hardwired_spec("dyld", "strcmp",
1508 (Addr
)&VG_(x86_darwin_REDIR_FOR_strcmp
), NULL
);
1509 add_hardwired_spec("dyld", "strlen",
1510 (Addr
)&VG_(x86_darwin_REDIR_FOR_strlen
), NULL
);
1511 add_hardwired_spec("dyld", "strcat",
1512 (Addr
)&VG_(x86_darwin_REDIR_FOR_strcat
), NULL
);
1513 add_hardwired_spec("dyld", "strcpy",
1514 (Addr
)&VG_(x86_darwin_REDIR_FOR_strcpy
), NULL
);
1515 add_hardwired_spec("dyld", "strlcat",
1516 (Addr
)&VG_(x86_darwin_REDIR_FOR_strlcat
), NULL
);
1519 # elif defined(VGP_amd64_darwin)
1520 /* If we're using memcheck, use these intercepts right from
1521 the start, otherwise dyld makes a lot of noise. */
1522 if (0==VG_(strcmp
)("Memcheck", VG_(details
).name
)) {
1523 add_hardwired_spec("dyld", "strcmp",
1524 (Addr
)&VG_(amd64_darwin_REDIR_FOR_strcmp
), NULL
);
1525 add_hardwired_spec("dyld", "strlen",
1526 (Addr
)&VG_(amd64_darwin_REDIR_FOR_strlen
), NULL
);
1527 add_hardwired_spec("dyld", "strcat",
1528 (Addr
)&VG_(amd64_darwin_REDIR_FOR_strcat
), NULL
);
1529 add_hardwired_spec("dyld", "strcpy",
1530 (Addr
)&VG_(amd64_darwin_REDIR_FOR_strcpy
), NULL
);
1531 add_hardwired_spec("dyld", "strlcat",
1532 (Addr
)&VG_(amd64_darwin_REDIR_FOR_strlcat
), NULL
);
1533 // DDD: #warning fixme rdar://6166275
1534 add_hardwired_spec("dyld", "arc4random",
1535 (Addr
)&VG_(amd64_darwin_REDIR_FOR_arc4random
), NULL
);
1536 # if DARWIN_VERS == DARWIN_10_9
1537 add_hardwired_spec("dyld", "strchr",
1538 (Addr
)&VG_(amd64_darwin_REDIR_FOR_strchr
), NULL
);
1542 # elif defined(VGP_s390x_linux)
1543 if (0==VG_(strcmp
)("Memcheck", VG_(details
).name
)) {
1544 // added in rsponse to BZ 327943
1545 add_hardwired_spec("ld64.so.1", "index",
1546 (Addr
)&VG_(s390x_linux_REDIR_FOR_index
),
1547 complain_about_stripped_glibc_ldso
);
1550 # elif defined(VGP_mips32_linux)
1551 if (0==VG_(strcmp
)("Memcheck", VG_(details
).name
)) {
1553 /* this is mandatory - can't sanely continue without it */
1555 "ld.so.3", "strlen",
1556 (Addr
)&VG_(mips32_linux_REDIR_FOR_strlen
),
1557 complain_about_stripped_glibc_ldso
1561 # elif defined(VGP_mips64_linux)
1562 if (0==VG_(strcmp
)("Memcheck", VG_(details
).name
)) {
1564 /* this is mandatory - can't sanely continue without it */
1566 "ld.so.3", "strlen",
1567 (Addr
)&VG_(mips64_linux_REDIR_FOR_strlen
),
1568 complain_about_stripped_glibc_ldso
1572 # elif defined(VGP_tilegx_linux)
1573 if (0==VG_(strcmp
)("Memcheck", VG_(details
).name
)) {
1576 "ld.so.1", "strlen",
1577 (Addr
)&VG_(tilegx_linux_REDIR_FOR_strlen
), NULL
1581 # elif defined(VGP_x86_solaris)
1582 /* If we're using memcheck, use these intercepts right from
1583 the start, otherwise ld.so makes a lot of noise. */
1584 if (0==VG_(strcmp
)("Memcheck", VG_(details
).name
)) {
1585 add_hardwired_spec("/lib/ld.so.1", "strcmp",
1586 (Addr
)&VG_(x86_solaris_REDIR_FOR_strcmp
), NULL
);
1588 if (0==VG_(strcmp
)("Memcheck", VG_(details
).name
)) {
1589 add_hardwired_spec("/lib/ld.so.1", "strlen",
1590 (Addr
)&VG_(x86_solaris_REDIR_FOR_strlen
), NULL
);
1593 # elif defined(VGP_amd64_solaris)
1594 if (0==VG_(strcmp
)("Memcheck", VG_(details
).name
)) {
1595 add_hardwired_spec("/lib/amd64/ld.so.1", "strcpy",
1596 (Addr
)&VG_(amd64_solaris_REDIR_FOR_strcpy
), NULL
);
1598 if (0==VG_(strcmp
)("Memcheck", VG_(details
).name
)) {
1599 add_hardwired_spec("/lib/amd64/ld.so.1", "strncpy",
1600 (Addr
)&VG_(amd64_solaris_REDIR_FOR_strncpy
), NULL
);
1602 if (0==VG_(strcmp
)("Memcheck", VG_(details
).name
)) {
1603 add_hardwired_spec("/lib/amd64/ld.so.1", "strcmp",
1604 (Addr
)&VG_(amd64_solaris_REDIR_FOR_strcmp
), NULL
);
1606 if (0==VG_(strcmp
)("Memcheck", VG_(details
).name
)) {
1607 add_hardwired_spec("/lib/amd64/ld.so.1", "strcat",
1608 (Addr
)&VG_(amd64_solaris_REDIR_FOR_strcat
), NULL
);
1610 if (0==VG_(strcmp
)("Memcheck", VG_(details
).name
)) {
1611 add_hardwired_spec("/lib/amd64/ld.so.1", "strlen",
1612 (Addr
)&VG_(amd64_solaris_REDIR_FOR_strlen
), NULL
);
1616 # error Unknown platform
1619 if (VG_(clo_trace_redir
))
1620 show_redir_state("after VG_(redir_initialise)");
1624 /*------------------------------------------------------------*/
1625 /*--- MISC HELPERS ---*/
1626 /*------------------------------------------------------------*/
1628 static void* dinfo_zalloc(const HChar
* ec
, SizeT n
) {
1631 p
= VG_(arena_malloc
)(VG_AR_DINFO
, ec
, n
);
1632 VG_(memset
)(p
, 0, n
);
1636 static void dinfo_free(void* p
) {
1638 return VG_(arena_free
)(VG_AR_DINFO
, p
);
1641 static HChar
* dinfo_strdup(const HChar
* ec
, const HChar
* str
)
1643 return VG_(arena_strdup
)(VG_AR_DINFO
, ec
, str
);
1646 /* Really this should be merged with translations_allowable_from_seg
1648 static Bool
is_plausible_guest_addr(Addr a
)
1650 NSegment
const* seg
= VG_(am_find_nsegment
)(a
);
1652 && (seg
->kind
== SkAnonC
|| seg
->kind
== SkFileC
||
1653 seg
->kind
== SkShmC
)
1654 && (seg
->hasX
|| seg
->hasR
); /* crude x86-specific hack */
1658 /*------------------------------------------------------------*/
1659 /*--- NOTIFY-ON-LOAD FUNCTIONS ---*/
1660 /*------------------------------------------------------------*/
1663 void handle_maybe_load_notifier( const HChar
* soname
,
1664 const HChar
* symbol
, Addr addr
)
1666 # if defined(VGP_x86_linux)
1667 /* x86-linux only: if we see _dl_sysinfo_int80, note its address.
1668 See comment on declaration of VG_(client__dl_sysinfo_int80) for
1669 the reason. As far as I can tell, the relevant symbol is always
1670 in object with soname "ld-linux.so.2". */
1671 if (symbol
&& symbol
[0] == '_'
1672 && 0 == VG_(strcmp
)(symbol
, "_dl_sysinfo_int80")
1673 && 0 == VG_(strcmp
)(soname
, "ld-linux.so.2")) {
1674 if (VG_(client__dl_sysinfo_int80
) == 0)
1675 VG_(client__dl_sysinfo_int80
) = addr
;
1679 /* Normal load-notifier handling after here. First, ignore all
1680 symbols lacking the right prefix. */
1681 vg_assert(symbol
); // assert rather than segfault if it is NULL
1682 if (0 != VG_(strncmp
)(symbol
, VG_NOTIFY_ON_LOAD_PREFIX
,
1683 VG_NOTIFY_ON_LOAD_PREFIX_LEN
))
1684 /* Doesn't have the right prefix */
1687 if (VG_(strcmp
)(symbol
, VG_STRINGIFY(VG_NOTIFY_ON_LOAD(freeres
))) == 0)
1688 VG_(client___libc_freeres_wrapper
) = addr
;
1690 if (VG_(strcmp
)(symbol
, VG_STRINGIFY(VG_NOTIFY_ON_LOAD(ifunc_wrapper
))) == 0)
1691 iFuncWrapper
= addr
;
1693 vg_assert2(0, "unrecognised load notification function: %s", symbol
);
1697 /*------------------------------------------------------------*/
1698 /*--- REQUIRE-TEXT-SYMBOL HANDLING ---*/
1699 /*------------------------------------------------------------*/
1701 /* In short: check that the currently-being-loaded object has text
1702 symbols that satisfy any --require-text-symbol= specifications that
1703 apply to it, and abort the run with an error message if not.
1705 static void handle_require_text_symbols ( const DebugInfo
* di
)
1707 /* First thing to do is figure out which, if any,
1708 --require-text-symbol specification strings apply to this
1709 object. Most likely none do, since it is not expected to
1710 frequently be used. Work through the list of specs and
1711 accumulate in fnpatts[] the fn patterns that pertain to this
1713 XArray
*fnpatts
= VG_(newXA
)( VG_(malloc
), "m_redir.hrts.5",
1714 VG_(free
), sizeof(HChar
*) );
1717 const HChar
* di_soname
= VG_(DebugInfo_get_soname
)(di
);
1718 vg_assert(di_soname
); // must be present
1720 for (i
= 0; i
< VG_(sizeXA
)(VG_(clo_req_tsyms
)); i
++) {
1721 const HChar
* clo_spec
= *(HChar
**) VG_(indexXA
)(VG_(clo_req_tsyms
), i
);
1722 vg_assert(clo_spec
&& VG_(strlen
)(clo_spec
) >= 4);
1723 // clone the spec, so we can stick a zero at the end of the sopatt
1724 HChar
*spec
= VG_(strdup
)("m_redir.hrts.1", clo_spec
);
1725 HChar sep
= spec
[0];
1726 HChar
* sopatt
= &spec
[1];
1727 HChar
* fnpatt
= VG_(strchr
)(sopatt
, sep
);
1728 // the initial check at clo processing in time in m_main
1729 // should ensure this.
1730 vg_assert(fnpatt
&& *fnpatt
== sep
);
1733 if (VG_(string_match
)(sopatt
, di_soname
)) {
1734 HChar
*pattern
= VG_(strdup
)("m_redir.hrts.2", fnpatt
);
1735 VG_(addToXA
)(fnpatts
, &pattern
);
1740 if (VG_(sizeXA
)(fnpatts
) == 0) {
1741 VG_(deleteXA
)(fnpatts
);
1742 return; /* no applicable spec strings */
1745 /* So finally, fnpatts contains the set of
1746 (patterns for) text symbol names that must be found in this
1747 object, in order to continue. That is, we must find at least
1748 one text symbol name that matches each pattern, else we must
1751 if (0) VG_(printf
)("for %s\n", di_soname
);
1752 for (i
= 0; i
< VG_(sizeXA
)(fnpatts
); i
++)
1753 if (0) VG_(printf
)(" fnpatt: %s\n",
1754 *(HChar
**) VG_(indexXA
)(fnpatts
, i
));
1756 /* For each spec, look through the syms to find one that matches.
1757 This isn't terribly efficient but it happens rarely, so no big
1759 for (i
= 0; i
< VG_(sizeXA
)(fnpatts
); i
++) {
1761 const HChar
* fnpatt
= *(HChar
**) VG_(indexXA
)(fnpatts
, i
);
1762 Int nsyms
= VG_(DebugInfo_syms_howmany
)(di
);
1763 for (j
= 0; j
< nsyms
; j
++) {
1764 Bool isText
= False
;
1765 const HChar
* sym_name_pri
= NULL
;
1766 const HChar
** sym_names_sec
= NULL
;
1767 VG_(DebugInfo_syms_getidx
)( di
, j
, NULL
,
1768 NULL
, &sym_name_pri
, &sym_names_sec
,
1769 &isText
, NULL
, NULL
);
1770 const HChar
* twoslots
[2];
1771 const HChar
** names_init
=
1772 alloc_symname_array(sym_name_pri
, sym_names_sec
, &twoslots
[0]);
1773 const HChar
** names
;
1774 for (names
= names_init
; *names
; names
++) {
1775 /* ignore data symbols */
1776 if (0) VG_(printf
)("QQQ %s\n", *names
);
1777 vg_assert(sym_name_pri
);
1780 if (VG_(string_match
)(fnpatt
, *names
)) {
1785 free_symname_array(names_init
, &twoslots
[0]);
1791 const HChar
* v
= "valgrind: ";
1794 "%sFatal error at when loading library with soname\n", v
);
1796 "%s %s\n", v
, di_soname
);
1798 "%sCannot find any text symbol with a name "
1799 "that matches the pattern\n", v
);
1800 VG_(printf
)("%s %s\n", v
, fnpatt
);
1801 VG_(printf
)("%sas required by a --require-text-symbol= "
1802 "specification.\n", v
);
1805 "%sCannot continue -- exiting now.\n", v
);
1811 /* All required specs were found. Just free memory and return. */
1812 VG_(deleteXA
)(fnpatts
);
1816 /*------------------------------------------------------------*/
1817 /*--- SANITY/DEBUG ---*/
1818 /*------------------------------------------------------------*/
1820 static void show_spec ( const HChar
* left
, const Spec
* spec
)
1822 VG_(message
)( Vg_DebugMsg
,
1823 "%s%-25s %-30s %s%s-> (%04d.%d) 0x%08lx\n",
1825 spec
->from_sopatt
, spec
->from_fnpatt
,
1826 spec
->isWrap
? "W" : "R",
1827 spec
->isGlobal
? "G" : "L",
1828 spec
->becTag
, spec
->becPrio
,
1832 static void show_active ( const HChar
* left
, const Active
* act
)
1837 ok
= VG_(get_fnname_w_offset
)(act
->from_addr
, &buf
);
1838 if (!ok
) buf
= "???";
1840 HChar name1
[VG_(strlen
)(buf
) + 1];
1841 VG_(strcpy
)(name1
, buf
);
1844 ok
= VG_(get_fnname_w_offset
)(act
->to_addr
, &name2
);
1845 if (!ok
) name2
= "???";
1847 VG_(message
)(Vg_DebugMsg
, "%s0x%08lx (%-20s) %s-> (%04d.%d) 0x%08lx %s\n",
1849 act
->from_addr
, name1
,
1850 act
->isWrap
? "W" : "R",
1851 act
->becTag
, act
->becPrio
,
1852 act
->to_addr
, name2
);
1855 static void show_redir_state ( const HChar
* who
)
1860 VG_(message
)(Vg_DebugMsg
, "<<\n");
1861 VG_(message
)(Vg_DebugMsg
, " ------ REDIR STATE %s ------\n", who
);
1862 for (ts
= topSpecs
; ts
; ts
= ts
->next
) {
1864 VG_(message
)(Vg_DebugMsg
,
1865 " TOPSPECS of soname %s filename %s\n",
1866 VG_(DebugInfo_get_soname
)(ts
->seginfo
),
1867 VG_(DebugInfo_get_filename
)(ts
->seginfo
));
1869 VG_(message
)(Vg_DebugMsg
,
1870 " TOPSPECS of soname (hardwired)\n");
1872 for (sp
= ts
->specs
; sp
; sp
= sp
->next
)
1875 VG_(message
)(Vg_DebugMsg
, " ------ ACTIVE ------\n");
1876 VG_(OSetGen_ResetIter
)( activeSet
);
1877 while ( (act
= VG_(OSetGen_Next
)(activeSet
)) ) {
1878 show_active(" ", act
);
1881 VG_(message
)(Vg_DebugMsg
, ">>\n");
1884 /*--------------------------------------------------------------------*/
1886 /*--------------------------------------------------------------------*/