Fix format string warnings from gcc9. No functional change (I think!)
[valgrind.git] / coregrind / m_redir.c
blob6bc01b434d3160f936e2e9da037cdec7e2a839ef
2 /*--------------------------------------------------------------------*/
3 /*--- Function replacement and wrapping. m_redir.c ---*/
4 /*--------------------------------------------------------------------*/
6 /*
7 This file is part of Valgrind, a dynamic binary instrumentation
8 framework.
10 Copyright (C) 2000-2017 Julian Seward
11 jseward@acm.org
12 Copyright (C) 2003-2017 Jeremy Fitzhardinge
13 jeremy@goop.org
15 This program is free software; you can redistribute it and/or
16 modify it under the terms of the GNU General Public License as
17 published by the Free Software Foundation; either version 2 of the
18 License, or (at your option) any later version.
20 This program is distributed in the hope that it will be useful, but
21 WITHOUT ANY WARRANTY; without even the implied warranty of
22 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
23 General Public License for more details.
25 You should have received a copy of the GNU General Public License
26 along with this program; if not, write to the Free Software
27 Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA
28 02111-1307, USA.
30 The GNU General Public License is contained in the file COPYING.
33 #include "pub_core_basics.h"
34 #include "pub_core_debuglog.h"
35 #include "pub_core_debuginfo.h"
36 #include "pub_core_libcbase.h"
37 #include "pub_core_libcassert.h"
38 #include "pub_core_libcprint.h"
39 #include "pub_core_vki.h"
40 #include "pub_core_libcfile.h"
41 #include "pub_core_seqmatch.h"
42 #include "pub_core_mallocfree.h"
43 #include "pub_core_options.h"
44 #include "pub_core_oset.h"
45 #include "pub_core_redir.h"
46 #include "pub_core_trampoline.h"
47 #include "pub_core_transtab.h"
48 #include "pub_core_tooliface.h" // VG_(needs).malloc_replacement
49 #include "pub_core_machine.h" // VG_(fnptr_to_fnentry)
50 #include "pub_core_aspacemgr.h" // VG_(am_find_nsegment)
51 #include "pub_core_xarray.h"
52 #include "pub_core_clientstate.h" // VG_(client_freeres_wrapper)
53 #include "pub_core_demangle.h" // VG_(maybe_Z_demangle)
54 #include "pub_core_libcproc.h" // VG_(libdir)
56 #include "config.h" /* GLIBC_MANDATORY_*_REDIRECT */
59 /* This module is a critical part of the redirection/intercept system.
60 It keeps track of the current intercept state, cleans up the
61 translation caches when that state changes, and finally, answers
62 queries about the whether an address is currently redirected or
63 not. It doesn't do any of the control-flow trickery needed to put
64 the redirections into practice. That is the job of m_translate,
65 which calls here to find out which translations need to be
66 redirected.
68 The interface is simple. VG_(redir_initialise) initialises and
69 loads some hardwired redirects which never disappear; this is
70 platform-specific.
72 The module is notified of redirection state changes by m_debuginfo.
73 That calls VG_(redir_notify_new_DebugInfo) when a new DebugInfo
74 (shared object symbol table, basically) appears. Appearance of new
75 symbols can cause new (active) redirections to appear for two
76 reasons: the symbols in the new table may match existing
77 redirection specifications (see comments below), and because the
78 symbols in the new table may themselves supply new redirect
79 specifications which match existing symbols (or ones in the new
80 table).
82 Redirect specifications are really symbols with "funny" prefixes
83 (_vgrNNNNZU_ and _vgrNNNNZZ_). These names tell m_redir that the
84 associated code should replace the standard entry point for some
85 set of functions. The set of functions is specified by a (soname
86 pattern, function name pattern) pair which is encoded in the symbol
87 name following the prefix. The names use a Z-encoding scheme so
88 that they may contain punctuation characters and wildcards (*).
89 The encoding scheme is described in pub_tool_redir.h and is decoded
90 by VG_(maybe_Z_demangle). The NNNN are behavioural equivalence
91 class tags, and are used to by code in this module to resolve
92 situations where one address appears to be redirected to more than
93 one replacement/wrapper. This is also described in
94 pub_tool_redir.h.
96 When a shared object is unloaded, this module learns of it via a
97 call to VG_(redir_notify_delete_DebugInfo). It then removes from
98 its tables all active redirections in any way associated with that
99 object, and tidies up the translation caches accordingly.
101 That takes care of tracking the redirection state. When a
102 translation is actually to be made, m_translate calls to
103 VG_(redir_do_lookup) in this module to find out if the
104 translation's address should be redirected.
107 /*------------------------------------------------------------*/
108 /*--- Semantics ---*/
109 /*------------------------------------------------------------*/
111 /* The redirector holds two pieces of state:
113 Specs - a set of (soname pattern, fnname pattern) -> redir addr
114 Active - a set of orig addr -> (bool, redir addr)
116 Active is the currently active set of bindings that the translator
117 consults. Specs is the current set of specifications as harvested
118 from reading symbol tables of the currently loaded objects.
120 Active is a pure function of Specs and the current symbol table
121 state (maintained by m_debuginfo). Call the latter SyminfoState.
123 Therefore whenever either Specs or SyminfoState changes, Active
124 must be recomputed. [Inefficient if done naively, but this is a
125 spec].
127 Active is computed as follows:
129 Active = empty
130 for spec in Specs {
131 sopatt = spec.soname pattern
132 fnpatt = spec.fnname pattern
133 redir = spec.redir addr
134 for so matching sopatt in SyminfoState {
135 for fn matching fnpatt in fnnames_of(so) {
136 &fn -> redir is added to Active
141 [as an implementation detail, when a binding (orig -> redir) is
142 deleted from Active as a result of recomputing it, then all
143 translations intersecting redir must be deleted. However, this is
144 not part of the spec].
146 [Active also depends on where the aspacemgr has decided to put all
147 the pieces of code -- that affects the "orig addr" and "redir addr"
148 values.]
150 ---------------------
152 That completes the spec, apart from one difficult issue: duplicates.
154 Clearly we must impose the requirement that domain(Active) contains
155 no duplicates. The difficulty is how to constrain Specs enough to
156 avoid getting into that situation. It's easy to write specs which
157 could cause conflicting bindings in Active, eg:
159 (libpthread.so, pthread_mutex_lock) -> a1
160 (libpthread.so, pthread_*) -> a2
162 for a1 != a2. Or even hairier:
164 (libpthread.so, pthread_mutex_*) -> a1
165 (libpthread.so, pthread_*_lock) -> a2
167 I can't think of any sane way of detecting when an addition to
168 Specs would generate conflicts. However, considering we don't
169 actually want to have a system that allows this, I propose this:
170 all changes to Specs are acceptable. But, when recomputing Active
171 following the change, if the same orig is bound to more than one
172 redir, then the first binding for orig is retained, and all the
173 rest ignored.
175 ===========================================================
176 ===========================================================
177 Incremental implementation:
179 When a new DebugInfo appears:
180 - it may be the source of new specs
181 - it may be the source of new matches for existing specs
182 Therefore:
184 - (new Specs x existing DebugInfos): scan all symbols in the new
185 DebugInfo to find new specs. Each of these needs to be compared
186 against all symbols in all the existing DebugInfos to generate
187 new actives.
189 - (existing Specs x new DebugInfo): scan all symbols in the
190 DebugInfo, trying to match them to any existing specs, also
191 generating new actives.
193 - (new Specs x new DebugInfo): scan all symbols in the new
194 DebugInfo, trying to match them against the new specs, to
195 generate new actives.
197 - Finally, add new new specs to the current set of specs.
199 When adding a new active (s,d) to the Actives:
200 lookup s in Actives
201 if already bound to d, ignore
202 if already bound to something other than d, complain loudly and ignore
203 else add (s,d) to Actives
204 and discard (s,1) and (d,1) (maybe overly conservative)
206 When a DebugInfo disappears:
207 - delete all specs acquired from the seginfo
208 - delete all actives derived from the just-deleted specs
209 - if each active (s,d) deleted, discard (s,1) and (d,1)
213 /*------------------------------------------------------------*/
214 /*--- REDIRECTION SPECIFICATIONS ---*/
215 /*------------------------------------------------------------*/
217 /* A specification of a redirection we want to do. Note that because
218 both the "from" soname and function name may contain wildcards, the
219 spec can match an arbitrary number of times.
221 16 Nov 2007: Comments re .mandatory field: The initial motivation
222 for this is making Memcheck work sanely on glibc-2.6.X ppc32-linux.
223 We really need to intercept 'strlen' in ld.so right from startup.
224 If ld.so does not have a visible 'strlen' symbol, Memcheck
225 generates an impossible number of errors resulting from highly
226 tuned strlen implementation in ld.so, and is completely unusable
227 -- the resulting undefinedness eventually seeps everywhere. */
228 typedef
229 struct _Spec {
230 struct _Spec* next; /* linked list */
231 /* FIXED PARTS -- set when created and not changed */
232 HChar* from_sopatt; /* from soname pattern */
233 HChar* from_fnpatt; /* from fnname pattern */
234 Addr to_addr; /* where redirecting to */
235 Bool isWrap; /* wrap or replacement? */
236 Bool isGlobal; /* must the symbol to replace be global? */
237 Int becTag; /* 0 through 9999. Behavioural equivalance class tag.
238 If two wrappers have the same (non-zero) tag, they
239 are promising that they behave identically. */
240 Int becPrio; /* 0 through 9. Behavioural equivalence class prio.
241 Used to choose between competing wrappers with
242 the same (non-zero) tag. */
243 const HChar** mandatory; /* non-NULL ==> abort V and print the
244 strings if from_sopatt is loaded but
245 from_fnpatt cannot be found */
246 /* VARIABLE PARTS -- used transiently whilst processing redirections */
247 Bool mark; /* set if spec requires further processing */
248 Bool done; /* set if spec was successfully matched */
250 Spec;
252 /* Top-level data structure. It contains a pointer to a DebugInfo and
253 also a list of the specs harvested from that DebugInfo. Note that
254 seginfo is allowed to be NULL, meaning that the specs are
255 pre-loaded ones at startup and are not associated with any
256 particular seginfo. */
257 typedef
258 struct _TopSpec {
259 struct _TopSpec* next; /* linked list */
260 const DebugInfo* seginfo; /* symbols etc */
261 Spec* specs; /* specs pulled out of seginfo */
262 Bool mark; /* transient temporary used during deletion */
264 TopSpec;
266 /* This is the top level list of redirections. m_debuginfo maintains
267 a list of DebugInfos, and the idea here is to maintain a list with
268 the same number of elements (in fact, with one more element, so as
269 to record abovementioned preloaded specifications.) */
270 static TopSpec* topSpecs = NULL;
273 /*------------------------------------------------------------*/
274 /*--- CURRENTLY ACTIVE REDIRECTIONS ---*/
275 /*------------------------------------------------------------*/
277 /* Represents a currently active binding. If either parent_spec or
278 parent_sym is NULL, then this binding was hardwired at startup and
279 should not be deleted. Same is true if either parent's seginfo
280 field is NULL. */
281 typedef
282 struct {
283 Addr from_addr; /* old addr -- MUST BE THE FIRST WORD! */
284 Addr to_addr; /* where redirecting to */
285 TopSpec* parent_spec; /* the TopSpec which supplied the Spec */
286 TopSpec* parent_sym; /* the TopSpec which supplied the symbol */
287 Int becTag; /* behavioural eclass tag for ::to_addr */
288 Int becPrio; /* and its priority */
289 Bool isWrap; /* wrap or replacement? */
290 Bool isIFunc; /* indirect function? */
292 Active;
294 /* The active set is a fast lookup table */
295 static OSet* activeSet = NULL;
297 /* Wrapper routine for indirect functions */
298 static Addr iFuncWrapper;
300 /*------------------------------------------------------------*/
301 /*--- FWDses ---*/
302 /*------------------------------------------------------------*/
304 static void maybe_add_active ( Active /*by value; callee copies*/ );
306 static void* dinfo_zalloc(const HChar* ec, SizeT);
307 static void dinfo_free(void*);
308 static HChar* dinfo_strdup(const HChar* ec, const HChar*);
309 static Bool is_plausible_guest_addr(Addr);
311 static void show_redir_state ( const HChar* who );
312 static void show_active ( const HChar* left, const Active* act );
314 static void handle_maybe_load_notifier( const HChar* soname,
315 const HChar* symbol, Addr addr );
317 static void handle_require_text_symbols ( const DebugInfo* );
319 /*------------------------------------------------------------*/
320 /*--- NOTIFICATIONS ---*/
321 /*------------------------------------------------------------*/
323 static
324 void generate_and_add_actives (
325 /* spec list and the owning TopSpec */
326 Spec* specs,
327 TopSpec* parent_spec,
328 /* debuginfo and the owning TopSpec */
329 const DebugInfo* di,
330 TopSpec* parent_sym
334 /* Copy all the names from a given symbol into an AR_DINFO allocated,
335 NULL terminated array, for easy iteration. Caller must pass also
336 the address of a 2-entry array which can be used in the common case
337 to avoid dynamic allocation. */
338 static const HChar** alloc_symname_array ( const HChar* pri_name,
339 const HChar** sec_names,
340 const HChar** twoslots )
342 /* Special-case the common case: only one name. We expect the
343 caller to supply a stack-allocated 2-entry array for this. */
344 if (sec_names == NULL) {
345 twoslots[0] = pri_name;
346 twoslots[1] = NULL;
347 return twoslots;
349 /* Else must use dynamic allocation. Figure out size .. */
350 Word n_req = 1;
351 const HChar** pp = sec_names;
352 while (*pp) { n_req++; pp++; }
353 /* .. allocate and copy in. */
354 const HChar** arr = dinfo_zalloc("redir.asa.1", (n_req+1) * sizeof(HChar*));
355 Word i = 0;
356 arr[i++] = pri_name;
357 pp = sec_names;
358 while (*pp) { arr[i++] = *pp; pp++; }
359 vg_assert(i == n_req);
360 vg_assert(arr[n_req] == NULL);
361 return arr;
365 /* Free the array allocated by alloc_symname_array, if any. */
366 static void free_symname_array ( const HChar** names, const HChar** twoslots )
368 if (names != twoslots)
369 dinfo_free(names);
372 static HChar const* advance_to_equal ( HChar const* c ) {
373 while (*c && *c != '=') {
374 ++c;
376 return c;
378 static HChar const* advance_to_comma ( HChar const* c ) {
379 while (*c && *c != ',') {
380 ++c;
382 return c;
385 /* Notify m_redir of the arrival of a new DebugInfo. This is fairly
386 complex, but the net effect is to (1) add a new entry to the
387 topspecs list, and (2) figure out what new binding are now active,
388 and, as a result, add them to the actives mapping. */
390 void VG_(redir_notify_new_DebugInfo)( const DebugInfo* newdi )
392 Bool ok, isWrap, isGlobal;
393 Int i, nsyms, becTag, becPrio;
394 Spec* specList;
395 Spec* spec;
396 TopSpec* ts;
397 TopSpec* newts;
398 const HChar* sym_name_pri;
399 const HChar** sym_names_sec;
400 SymAVMAs sym_avmas;
401 const HChar* demangled_sopatt;
402 const HChar* demangled_fnpatt;
403 Bool check_ppcTOCs = False;
404 Bool isText;
405 const HChar* newdi_soname;
406 Bool dehacktivate_pthread_stack_cache_var_search = False;
407 const HChar* const pthread_soname = "libpthread.so.0";
408 const HChar* const pthread_stack_cache_actsize_varname
409 = "stack_cache_actsize";
410 #if defined(VGO_solaris)
411 Bool vg_vfork_fildes_var_search = False;
412 const HChar* const vg_preload_core_soname = "vgpreload_core.so.0";
413 const HChar* const vg_vfork_fildes_varname = "vg_vfork_fildes";
414 #endif
416 # if defined(VG_PLAT_USES_PPCTOC)
417 check_ppcTOCs = True;
418 # endif
420 vg_assert(newdi);
421 newdi_soname = VG_(DebugInfo_get_soname)(newdi);
422 vg_assert(newdi_soname != NULL);
424 #ifdef ENABLE_INNER
426 /* When an outer Valgrind is executing an inner Valgrind, the
427 inner "sees" in its address space the mmap-ed vgpreload files
428 of the outer. The inner must avoid interpreting the
429 redirections given in the outer vgpreload mmap-ed files.
430 Otherwise, some tool combinations badly fail.
432 Example: outer memcheck tool executing an inner none tool.
434 If inner none interprets the outer malloc redirection, the
435 inner will redirect malloc to a memcheck function it does not
436 have (as the redirection target is from the outer). With
437 such a failed redirection, a call to malloc inside the inner
438 will then result in a "no-operation" (and so no memory will
439 be allocated).
441 When running as an inner, no redirection will be done
442 for a vgpreload file if this file is not located in the
443 inner VALGRIND_LIB directory.
445 Recognising a vgpreload file based on a filename pattern
446 is a kludge. An alternate solution would be to change
447 the _vgr prefix according to outer/inner/client.
449 const HChar* newdi_filename = VG_(DebugInfo_get_filename)(newdi);
450 const HChar* newdi_basename = VG_(basename) (newdi_filename);
451 if (VG_(strncmp) (newdi_basename, "vgpreload_", 10) == 0) {
452 /* This looks like a vgpreload file => check if this file
453 is from the inner VALGRIND_LIB.
454 We do this check using VG_(stat) + dev/inode comparison
455 as vg-in-place defines a VALGRIND_LIB with symlinks
456 pointing to files inside the valgrind build directories. */
457 struct vg_stat newdi_stat;
458 SysRes newdi_res;
459 struct vg_stat in_vglib_stat;
460 SysRes in_vglib_res;
462 newdi_res = VG_(stat)(newdi_filename, &newdi_stat);
464 HChar in_vglib_filename[VG_(strlen)(VG_(libdir)) + 1 +
465 VG_(strlen)(newdi_basename) + 1];
466 VG_(sprintf)(in_vglib_filename, "%s/%s", VG_(libdir), newdi_basename);
468 in_vglib_res = VG_(stat)(in_vglib_filename, &in_vglib_stat);
470 /* If we find newdi_basename in inner VALGRIND_LIB
471 but newdi_filename is not the same file, then we do
472 not execute the redirection. */
473 if (!sr_isError(in_vglib_res)
474 && !sr_isError(newdi_res)
475 && (newdi_stat.dev != in_vglib_stat.dev
476 || newdi_stat.ino != in_vglib_stat.ino)) {
477 /* <inner VALGRIND_LIB>/newdi_basename is an existing file
478 and is different of newdi_filename.
479 So, we do not execute newdi_filename redirection. */
480 if ( VG_(clo_verbosity) > 1 ) {
481 VG_(message)( Vg_DebugMsg,
482 "Skipping vgpreload redir in %s"
483 " (not from VALGRIND_LIB_INNER)\n",
484 newdi_filename);
486 return;
487 } else {
488 if ( VG_(clo_verbosity) > 1 ) {
489 VG_(message)( Vg_DebugMsg,
490 "Executing vgpreload redir in %s"
491 " (from VALGRIND_LIB_INNER)\n",
492 newdi_filename);
497 #endif
500 /* stay sane: we don't already have this. */
501 for (ts = topSpecs; ts; ts = ts->next)
502 vg_assert(ts->seginfo != newdi);
504 /* scan this DebugInfo's symbol table, pulling out and demangling
505 any specs found */
507 specList = NULL; /* the spec list we're building up */
509 dehacktivate_pthread_stack_cache_var_search =
510 SimHintiS(SimHint_no_nptl_pthread_stackcache, VG_(clo_sim_hints))
511 && 0 == VG_(strcmp)(newdi_soname, pthread_soname);
513 #if defined(VGO_solaris)
514 vg_vfork_fildes_var_search =
515 0 == VG_(strcmp)(newdi_soname, vg_preload_core_soname);
516 #endif
518 nsyms = VG_(DebugInfo_syms_howmany)( newdi );
519 for (i = 0; i < nsyms; i++) {
520 VG_(DebugInfo_syms_getidx)( newdi, i, &sym_avmas,
521 NULL, &sym_name_pri, &sym_names_sec,
522 &isText, NULL, NULL );
523 /* Set up to conveniently iterate over all names for this symbol. */
524 const HChar* twoslots[2];
525 const HChar** names_init =
526 alloc_symname_array(sym_name_pri, sym_names_sec, &twoslots[0]);
527 const HChar** names;
528 for (names = names_init; *names; names++) {
529 isGlobal = False;
530 ok = VG_(maybe_Z_demangle)( *names,
531 &demangled_sopatt,
532 &demangled_fnpatt,
533 &isWrap, &becTag, &becPrio );
534 /* ignore data symbols */
535 if (!isText) {
536 /* But search for dehacktivate stack cache var if needed. */
537 if (dehacktivate_pthread_stack_cache_var_search
538 && 0 == VG_(strcmp)(*names,
539 pthread_stack_cache_actsize_varname)) {
540 if ( VG_(clo_verbosity) > 1 ) {
541 VG_(message)( Vg_DebugMsg,
542 "deactivate nptl pthread stackcache via kludge:"
543 " found symbol %s at addr %p\n",
544 *names, (void*) sym_avmas.main);
546 VG_(client__stack_cache_actsize__addr) = (SizeT*) sym_avmas.main;
547 dehacktivate_pthread_stack_cache_var_search = False;
549 #if defined(VGO_solaris)
550 if (vg_vfork_fildes_var_search
551 && 0 == VG_(strcmp)(*names, vg_vfork_fildes_varname)) {
552 if ( VG_(clo_verbosity) > 1 ) {
553 VG_(message)( Vg_DebugMsg,
554 "vfork kludge: found symbol %s at addr %p\n",
555 *names, (void*) sym_avmas.main);
557 VG_(vfork_fildes_addr) = (Int*) sym_avmas.main;
558 vg_vfork_fildes_var_search = False;
560 #endif
561 continue;
563 if (!ok) {
564 /* It's not a full-scale redirect, but perhaps it is a load-notify
565 fn? Let the load-notify department see it. */
566 handle_maybe_load_notifier( newdi_soname, *names, sym_avmas.main );
567 continue;
569 if (check_ppcTOCs && GET_TOCPTR_AVMA(sym_avmas) == 0) {
570 /* This platform uses toc pointers, but none could be found
571 for this symbol, so we can't safely redirect/wrap to it.
572 Just skip it; we'll make a second pass over the symbols in
573 the following loop, and complain at that point. */
574 continue;
577 HChar *replaced_sopatt = NULL;
578 if (0 == VG_(strncmp) (demangled_sopatt,
579 VG_SO_SYN_PREFIX, VG_SO_SYN_PREFIX_LEN)) {
580 /* This is a redirection for handling lib so synonyms. If we
581 have a matching lib synonym, then replace the sopatt.
582 Otherwise, just ignore this redirection spec. */
584 /* Search for a matching synonym=newname*/
585 SizeT const sopatt_syn_len
586 = VG_(strlen)(demangled_sopatt+VG_SO_SYN_PREFIX_LEN);
587 HChar const* last = VG_(clo_soname_synonyms);
589 while (last != NULL && *last) {
590 HChar const* first = last;
591 last = advance_to_equal(first);
593 if ((last - first) == sopatt_syn_len
594 && 0 == VG_(strncmp)(demangled_sopatt+VG_SO_SYN_PREFIX_LEN,
595 first,
596 sopatt_syn_len)) {
597 // Found the demangle_sopatt synonym => replace it
598 first = last + 1;
599 last = advance_to_comma(first);
600 replaced_sopatt = dinfo_zalloc("redir.rnnD.5",
601 last - first + 1);
602 VG_(strncpy)(replaced_sopatt, first, last - first);
603 replaced_sopatt[last - first] = '\0';
604 demangled_sopatt = replaced_sopatt;
605 break;
608 last = advance_to_comma(last);
609 if (*last == ',')
610 last++;
613 // If the user didn't set it then somalloc is special. We
614 // want to match public/global symbols that match the
615 // fnpatt everywhere.
616 if (replaced_sopatt == NULL
617 && VG_(strcmp) ( demangled_sopatt, SO_SYN_MALLOC_NAME ) == 0)
619 replaced_sopatt = dinfo_strdup("m_redir.rnnD.1", "*");
620 demangled_sopatt = replaced_sopatt;
621 isGlobal = True;
624 // If we have not replaced the sopatt, then skip the redir.
625 if (replaced_sopatt == NULL)
626 continue;
629 spec = dinfo_zalloc("redir.rnnD.1", sizeof(Spec));
630 spec->from_sopatt = dinfo_strdup("redir.rnnD.2", demangled_sopatt);
631 spec->from_fnpatt = dinfo_strdup("redir.rnnD.3", demangled_fnpatt);
632 spec->to_addr = sym_avmas.main;
633 spec->isWrap = isWrap;
634 spec->isGlobal = isGlobal;
635 spec->becTag = becTag;
636 spec->becPrio = becPrio;
637 /* check we're not adding manifestly stupid destinations */
638 vg_assert(is_plausible_guest_addr(sym_avmas.main));
639 spec->next = specList;
640 spec->mark = False; /* not significant */
641 spec->done = False; /* not significant */
642 specList = spec;
643 /* The demangler is the owner of the demangled_sopatt memory,
644 unless it was replaced. In this case, we have to free the
645 replace_sopatt(==demangled_sopatt). We can free it,
646 because it was dinfo_strup-ed into spec->from_sopatt. */
647 if (replaced_sopatt != NULL) {
648 vg_assert(demangled_sopatt == replaced_sopatt);
649 dinfo_free(replaced_sopatt);
652 free_symname_array(names_init, &twoslots[0]);
654 if (dehacktivate_pthread_stack_cache_var_search) {
655 VG_(message)(Vg_DebugMsg,
656 "WARNING: could not find symbol for var %s in %s\n",
657 pthread_stack_cache_actsize_varname, pthread_soname);
658 VG_(message)(Vg_DebugMsg,
659 "=> pthread stack cache cannot be disabled!\n");
661 #if defined(VGO_solaris)
662 if (vg_vfork_fildes_var_search) {
663 VG_(message)(Vg_DebugMsg,
664 "WARNING: could not find symbol for var %s in %s\n",
665 vg_vfork_fildes_varname, vg_preload_core_soname);
666 VG_(message)(Vg_DebugMsg,
667 "=> posix_spawn() will not work correctly!\n");
669 #endif
671 if (check_ppcTOCs) {
672 for (i = 0; i < nsyms; i++) {
673 VG_(DebugInfo_syms_getidx)( newdi, i, &sym_avmas,
674 NULL, &sym_name_pri, &sym_names_sec,
675 &isText, NULL, NULL );
676 const HChar* twoslots[2];
677 const HChar** names_init =
678 alloc_symname_array(sym_name_pri, sym_names_sec, &twoslots[0]);
679 const HChar** names;
680 for (names = names_init; *names; names++) {
681 ok = isText
682 && VG_(maybe_Z_demangle)(
683 *names, &demangled_sopatt,
684 &demangled_fnpatt, &isWrap, NULL, NULL );
685 if (!ok)
686 /* not a redirect. Ignore. */
687 continue;
688 if (GET_TOCPTR_AVMA(sym_avmas) != 0)
689 /* has a valid toc pointer. Ignore. */
690 continue;
692 for (spec = specList; spec; spec = spec->next)
693 if (0 == VG_(strcmp)(spec->from_sopatt, demangled_sopatt)
694 && 0 == VG_(strcmp)(spec->from_fnpatt, demangled_fnpatt))
695 break;
696 if (spec)
697 /* a redirect to some other copy of that symbol, which
698 does have a TOC value, already exists */
699 continue;
701 /* Complain */
702 VG_(message)(Vg_DebugMsg,
703 "WARNING: no TOC ptr for redir/wrap to %s %s\n",
704 demangled_sopatt, demangled_fnpatt);
706 free_symname_array(names_init, &twoslots[0]);
710 /* Ok. Now specList holds the list of specs from the DebugInfo.
711 Build a new TopSpec, but don't add it to topSpecs yet. */
712 newts = dinfo_zalloc("redir.rnnD.4", sizeof(TopSpec));
713 newts->next = NULL; /* not significant */
714 newts->seginfo = newdi;
715 newts->specs = specList;
716 newts->mark = False; /* not significant */
718 /* We now need to augment the active set with the following partial
719 cross product:
721 (1) actives formed by matching the new specs in specList against
722 all symbols currently listed in topSpecs
724 (2) actives formed by matching the new symbols in newdi against
725 all specs currently listed in topSpecs
727 (3) actives formed by matching the new symbols in newdi against
728 the new specs in specList
730 This is necessary in order to maintain the invariant that
731 Actives contains all bindings generated by matching ALL specs in
732 topSpecs against ALL symbols in topSpecs (that is, a cross
733 product of ALL known specs against ALL known symbols).
735 /* Case (1) */
736 for (ts = topSpecs; ts; ts = ts->next) {
737 if (ts->seginfo)
738 generate_and_add_actives( specList, newts,
739 ts->seginfo, ts );
742 /* Case (2) */
743 for (ts = topSpecs; ts; ts = ts->next) {
744 generate_and_add_actives( ts->specs, ts,
745 newdi, newts );
748 /* Case (3) */
749 generate_and_add_actives( specList, newts,
750 newdi, newts );
752 /* Finally, add the new TopSpec. */
753 newts->next = topSpecs;
754 topSpecs = newts;
756 if (VG_(clo_trace_redir))
757 show_redir_state("after VG_(redir_notify_new_DebugInfo)");
759 /* Really finally (quite unrelated to all the above) check the
760 names in the module against any --require-text-symbol=
761 specifications we might have. */
762 handle_require_text_symbols(newdi);
765 /* Add a new target for an indirect function. Adds a new redirection
766 for the indirection function with address old_from that redirects
767 the ordinary function with address new_from to the target address
768 of the original redirection. */
770 void VG_(redir_add_ifunc_target)( Addr old_from, Addr new_from )
772 Active *old, new;
774 old = VG_(OSetGen_Lookup)(activeSet, &old_from);
775 vg_assert(old);
776 vg_assert(old->isIFunc);
778 new = *old;
779 new.from_addr = new_from;
780 new.isIFunc = False;
781 maybe_add_active (new);
783 if (VG_(clo_trace_redir)) {
784 VG_(message)( Vg_DebugMsg,
785 "Adding redirect for indirect function "
786 "0x%lx from 0x%lx -> 0x%lx\n",
787 old_from, new_from, new.to_addr );
791 /* Do one element of the basic cross product: add to the active set,
792 all matches resulting from comparing all the given specs against
793 all the symbols in the given seginfo. If a conflicting binding
794 would thereby arise, don't add it, but do complain. */
796 static
797 void generate_and_add_actives (
798 /* spec list and the owning TopSpec */
799 Spec* specs,
800 TopSpec* parent_spec,
801 /* seginfo and the owning TopSpec */
802 const DebugInfo* di,
803 TopSpec* parent_sym
806 Spec* sp;
807 Bool anyMark, isText, isIFunc, isGlobal;
808 Active act;
809 Int nsyms, i;
810 SymAVMAs sym_avmas;
811 const HChar* sym_name_pri;
812 const HChar** sym_names_sec;
814 /* First figure out which of the specs match the seginfo's soname.
815 Also clear the 'done' bits, so that after the main loop below
816 tell which of the Specs really did get done. */
817 anyMark = False;
818 for (sp = specs; sp; sp = sp->next) {
819 sp->done = False;
820 const HChar *soname = VG_(DebugInfo_get_soname)(di);
822 /* When searching for global public symbols (like for the somalloc
823 synonym symbols), exclude the dynamic (runtime) linker as it is very
824 special. See https://bugs.kde.org/show_bug.cgi?id=355454 */
825 if ((VG_(strcmp)(sp->from_sopatt, "*") == 0) &&
826 (sp->isGlobal == True) &&
827 VG_(is_soname_ld_so)(soname)) {
828 sp->mark = False;
829 continue;
832 sp->mark = VG_(string_match)( sp->from_sopatt, soname );
833 anyMark = anyMark || sp->mark;
836 /* shortcut: if none of the sonames match, there will be no bindings. */
837 if (!anyMark)
838 return;
840 /* Iterate outermost over the symbols in the seginfo, in the hope
841 of trashing the caches less. */
842 nsyms = VG_(DebugInfo_syms_howmany)( di );
843 for (i = 0; i < nsyms; i++) {
844 VG_(DebugInfo_syms_getidx)( di, i, &sym_avmas,
845 NULL, &sym_name_pri, &sym_names_sec,
846 &isText, &isIFunc, &isGlobal );
847 const HChar* twoslots[2];
848 const HChar** names_init =
849 alloc_symname_array(sym_name_pri, sym_names_sec, &twoslots[0]);
850 const HChar** names;
851 for (names = names_init; *names; names++) {
853 /* ignore data symbols */
854 if (!isText)
855 continue;
857 for (sp = specs; sp; sp = sp->next) {
858 if (!sp->mark)
859 continue; /* soname doesn't match */
860 if (VG_(string_match)( sp->from_fnpatt, *names )
861 && (sp->isGlobal == False || isGlobal == True)) {
862 /* got a new binding. Add to collection. */
863 act.from_addr = sym_avmas.main;
864 act.to_addr = sp->to_addr;
865 act.parent_spec = parent_spec;
866 act.parent_sym = parent_sym;
867 act.becTag = sp->becTag;
868 act.becPrio = sp->becPrio;
869 act.isWrap = sp->isWrap;
870 act.isIFunc = isIFunc;
871 sp->done = True;
872 maybe_add_active( act );
874 /* If the function being wrapped has a local entry point
875 * redirect it to the global entry point. The redirection
876 * must save and setup r2 then setup r12 for the new function.
877 * On return, r2 must be restored. Local entry points used
878 * in PPC64 Little Endian.
880 if (GET_LOCAL_EP_AVMA(sym_avmas) != 0) {
881 act.from_addr = GET_LOCAL_EP_AVMA(sym_avmas);
882 maybe_add_active( act );
886 } /* for (sp = specs; sp; sp = sp->next) */
888 } /* iterating over names[] */
889 free_symname_array(names_init, &twoslots[0]);
890 } /* for (i = 0; i < nsyms; i++) */
892 /* Now, finally, look for Specs which were marked to be done, but
893 didn't get matched. If any such are mandatory we must abort the
894 system at this point. */
895 for (sp = specs; sp; sp = sp->next) {
896 if (!sp->mark)
897 continue;
898 if (sp->mark && (!sp->done) && sp->mandatory)
899 break;
901 if (sp) {
902 const HChar** strp;
903 const HChar* v = "valgrind: ";
904 vg_assert(sp->mark);
905 vg_assert(!sp->done);
906 vg_assert(sp->mandatory);
907 VG_(printf)("\n");
908 VG_(printf)(
909 "%sFatal error at startup: a function redirection\n", v);
910 VG_(printf)(
911 "%swhich is mandatory for this platform-tool combination\n", v);
912 VG_(printf)(
913 "%scannot be set up. Details of the redirection are:\n", v);
914 VG_(printf)(
915 "%s\n", v);
916 VG_(printf)(
917 "%sA must-be-redirected function\n", v);
918 VG_(printf)(
919 "%swhose name matches the pattern: %s\n", v, sp->from_fnpatt);
920 VG_(printf)(
921 "%sin an object with soname matching: %s\n", v, sp->from_sopatt);
922 VG_(printf)(
923 "%swas not found whilst processing\n", v);
924 VG_(printf)(
925 "%ssymbols from the object with soname: %s\n",
926 v, VG_(DebugInfo_get_soname)(di));
927 VG_(printf)(
928 "%s\n", v);
930 for (strp = sp->mandatory; *strp; strp++)
931 VG_(printf)(
932 "%s%s\n", v, *strp);
934 VG_(printf)(
935 "%s\n", v);
936 VG_(printf)(
937 "%sCannot continue -- exiting now. Sorry.\n", v);
938 VG_(printf)("\n");
939 VG_(exit)(1);
944 /* Add an act (passed by value; is copied here) and deal with
945 conflicting bindings. */
946 static void maybe_add_active ( Active act )
948 const HChar* what = NULL;
949 Active* old = NULL;
950 Bool add_act = False;
952 /* Complain and ignore manifestly bogus 'from' addresses.
954 Kludge: because this can get called befor the trampoline area (a
955 bunch of magic 'to' addresses) has its ownership changed from V
956 to C, we can't check the 'to' address similarly. Sigh.
958 amd64-linux hack: the vsysinfo pages appear to have no
959 permissions
960 ffffffffff600000-ffffffffffe00000 ---p 00000000 00:00 0
961 so skip the check for them. */
962 if (!is_plausible_guest_addr(act.from_addr)
963 # if defined(VGP_amd64_linux)
964 && act.from_addr != 0xFFFFFFFFFF600000ULL
965 && act.from_addr != 0xFFFFFFFFFF600400ULL
966 && act.from_addr != 0xFFFFFFFFFF600800ULL
967 # endif
969 what = "redirection from-address is in non-executable area";
970 goto bad;
973 old = VG_(OSetGen_Lookup)( activeSet, &act.from_addr );
974 if (old) {
975 /* Dodgy. Conflicting binding. */
976 vg_assert(old->from_addr == act.from_addr);
977 if (old->to_addr != act.to_addr) {
978 /* We've got a conflicting binding -- that is, from_addr is
979 specified to redirect to two different destinations,
980 old->to_addr and act.to_addr. If we can prove that they
981 are behaviourally equivalent then that's no problem. So
982 we can look at the behavioural eclass tags for both
983 functions to see if that's so. If they are equal, and
984 nonzero, then that's fine. But if not, we can't show they
985 are equivalent, so we have to complain, and ignore the new
986 binding. */
987 vg_assert(old->becTag >= 0 && old->becTag <= 9999);
988 vg_assert(old->becPrio >= 0 && old->becPrio <= 9);
989 vg_assert(act.becTag >= 0 && act.becTag <= 9999);
990 vg_assert(act.becPrio >= 0 && act.becPrio <= 9);
991 if (old->becTag == 0)
992 vg_assert(old->becPrio == 0);
993 if (act.becTag == 0)
994 vg_assert(act.becPrio == 0);
996 if (old->becTag == 0 || act.becTag == 0 || old->becTag != act.becTag) {
997 /* We can't show that they are equivalent. Complain and
998 ignore. */
999 what = "new redirection conflicts with existing -- ignoring it";
1000 goto bad;
1002 /* They have the same eclass tag. Use the priorities to
1003 resolve the ambiguity. */
1004 if (act.becPrio <= old->becPrio) {
1005 /* The new one doesn't have a higher priority, so just
1006 ignore it. */
1007 if (VG_(clo_verbosity) > 2) {
1008 VG_(message)(Vg_UserMsg, "Ignoring %s redirection:\n",
1009 act.becPrio < old->becPrio ? "lower priority"
1010 : "duplicate");
1011 show_active( " old: ", old);
1012 show_active( " new: ", &act);
1014 } else {
1015 /* The tricky case. The new one has a higher priority, so
1016 we need to get the old one out of the OSet and install
1017 this one in its place. */
1018 if (VG_(clo_verbosity) > 1) {
1019 VG_(message)(Vg_UserMsg,
1020 "Preferring higher priority redirection:\n");
1021 show_active( " old: ", old);
1022 show_active( " new: ", &act);
1024 add_act = True;
1025 void* oldNd = VG_(OSetGen_Remove)( activeSet, &act.from_addr );
1026 vg_assert(oldNd == old);
1027 VG_(OSetGen_FreeNode)( activeSet, old );
1028 old = NULL;
1030 } else {
1031 /* This appears to be a duplicate of an existing binding.
1032 Safe(ish) -- ignore. */
1033 /* XXXXXXXXXXX COMPLAIN if new and old parents differ */
1036 } else {
1037 /* There's no previous binding for this from_addr, so we must
1038 add 'act' to the active set. */
1039 add_act = True;
1042 /* So, finally, actually add it. */
1043 if (add_act) {
1044 Active* a = VG_(OSetGen_AllocNode)(activeSet, sizeof(Active));
1045 vg_assert(a);
1046 *a = act;
1047 VG_(OSetGen_Insert)(activeSet, a);
1048 /* Now that a new from->to redirection is in force, we need to
1049 get rid of any translations intersecting 'from' in order that
1050 they get redirected to 'to'. So discard them. Just for
1051 paranoia (but, I believe, unnecessarily), discard 'to' as
1052 well. */
1053 VG_(discard_translations)( act.from_addr, 1,
1054 "redir_new_DebugInfo(from_addr)");
1055 VG_(discard_translations)( act.to_addr, 1,
1056 "redir_new_DebugInfo(to_addr)");
1057 if (VG_(clo_verbosity) > 2) {
1058 VG_(message)(Vg_UserMsg, "Adding active redirection:\n");
1059 show_active( " new: ", &act);
1062 return;
1064 bad:
1065 vg_assert(what);
1066 vg_assert(!add_act);
1067 if (VG_(clo_verbosity) > 1) {
1068 VG_(message)(Vg_UserMsg, "WARNING: %s\n", what);
1069 if (old) {
1070 show_active( " old: ", old);
1072 show_active( " new: ", &act);
1077 /* Notify m_redir of the deletion of a DebugInfo. This is relatively
1078 simple -- just get rid of all actives derived from it, and free up
1079 the associated list elements. */
1081 void VG_(redir_notify_delete_DebugInfo)( const DebugInfo* delsi )
1083 TopSpec* ts;
1084 TopSpec* tsPrev;
1085 Spec* sp;
1086 Spec* sp_next;
1087 OSet* tmpSet;
1088 Active* act;
1089 Bool delMe;
1090 Addr addr;
1092 vg_assert(delsi);
1094 /* Search for it, and make tsPrev point to the previous entry, if
1095 any. */
1096 tsPrev = NULL;
1097 ts = topSpecs;
1098 while (True) {
1099 if (ts == NULL) break;
1100 if (ts->seginfo == delsi) break;
1101 tsPrev = ts;
1102 ts = ts->next;
1105 vg_assert(ts); /* else we don't have the deleted DebugInfo */
1106 vg_assert(ts->seginfo == delsi);
1108 /* Traverse the actives, copying the addresses of those we intend
1109 to delete into tmpSet. */
1110 tmpSet = VG_(OSetWord_Create)(dinfo_zalloc, "redir.rndD.1", dinfo_free);
1112 ts->mark = True;
1114 VG_(OSetGen_ResetIter)( activeSet );
1115 while ( (act = VG_(OSetGen_Next)(activeSet)) ) {
1116 delMe = act->parent_spec != NULL
1117 && act->parent_sym != NULL
1118 && act->parent_spec->seginfo != NULL
1119 && act->parent_sym->seginfo != NULL
1120 && (act->parent_spec->mark || act->parent_sym->mark);
1122 /* While we're at it, a bit of paranoia: delete any actives
1123 which don't have both feet in valid client executable areas.
1124 But don't delete hardwired-at-startup ones; these are denoted
1125 by having parent_spec or parent_sym being NULL. */
1126 if ( (!delMe)
1127 && act->parent_spec != NULL
1128 && act->parent_sym != NULL ) {
1129 if (!is_plausible_guest_addr(act->from_addr))
1130 delMe = True;
1131 if (!is_plausible_guest_addr(act->to_addr))
1132 delMe = True;
1135 if (delMe) {
1136 VG_(OSetWord_Insert)( tmpSet, act->from_addr );
1137 /* While we have our hands on both the 'from' and 'to'
1138 of this Active, do paranoid stuff with tt/tc. */
1139 VG_(discard_translations)( act->from_addr, 1,
1140 "redir_del_DebugInfo(from_addr)");
1141 VG_(discard_translations)( act->to_addr, 1,
1142 "redir_del_DebugInfo(to_addr)");
1146 /* Now traverse tmpSet, deleting corresponding elements in activeSet. */
1147 VG_(OSetWord_ResetIter)( tmpSet );
1148 while ( VG_(OSetWord_Next)(tmpSet, &addr) ) {
1149 act = VG_(OSetGen_Remove)( activeSet, &addr );
1150 vg_assert(act);
1151 VG_(OSetGen_FreeNode)( activeSet, act );
1154 VG_(OSetWord_Destroy)( tmpSet );
1156 /* The Actives set is now cleaned up. Free up this TopSpec and
1157 everything hanging off it. */
1158 for (sp = ts->specs; sp; sp = sp_next) {
1159 if (sp->from_sopatt) dinfo_free(sp->from_sopatt);
1160 if (sp->from_fnpatt) dinfo_free(sp->from_fnpatt);
1161 sp_next = sp->next;
1162 dinfo_free(sp);
1165 if (tsPrev == NULL) {
1166 /* first in list */
1167 topSpecs = ts->next;
1168 } else {
1169 tsPrev->next = ts->next;
1171 dinfo_free(ts);
1173 if (VG_(clo_trace_redir))
1174 show_redir_state("after VG_(redir_notify_delete_DebugInfo)");
1178 /*------------------------------------------------------------*/
1179 /*--- QUERIES (really the whole point of this module) ---*/
1180 /*------------------------------------------------------------*/
1182 /* This is the crucial redirection function. It answers the question:
1183 should this code address be redirected somewhere else? It's used
1184 just before translating a basic block. */
1185 Addr VG_(redir_do_lookup) ( Addr orig, Bool* isWrap )
1187 Active* r = VG_(OSetGen_Lookup)(activeSet, &orig);
1188 if (r == NULL) {
1189 if (isWrap) *isWrap = False;
1190 return orig;
1193 vg_assert(r->to_addr != 0);
1194 if (isWrap)
1195 *isWrap = r->isWrap || r->isIFunc;
1196 if (r->isIFunc) {
1197 vg_assert(iFuncWrapper);
1198 return iFuncWrapper;
1200 return r->to_addr;
1203 /* Does the soname represent a dynamic (runtime) linker?
1204 Considers various VG_U_LD* entries from pub_tool_redir.h. */
1205 Bool VG_(is_soname_ld_so) (const HChar *soname)
1207 # if defined(VGO_linux)
1208 if (VG_STREQ(soname, VG_U_LD_LINUX_SO_3)) return True;
1209 if (VG_STREQ(soname, VG_U_LD_LINUX_SO_2)) return True;
1210 if (VG_STREQ(soname, VG_U_LD_LINUX_X86_64_SO_2)) return True;
1211 if (VG_STREQ(soname, VG_U_LD64_SO_1)) return True;
1212 if (VG_STREQ(soname, VG_U_LD64_SO_2)) return True;
1213 if (VG_STREQ(soname, VG_U_LD_SO_1)) return True;
1214 if (VG_STREQ(soname, VG_U_LD_LINUX_AARCH64_SO_1)) return True;
1215 if (VG_STREQ(soname, VG_U_LD_LINUX_ARMHF_SO_3)) return True;
1216 # elif defined(VGO_darwin)
1217 if (VG_STREQ(soname, VG_U_DYLD)) return True;
1218 # elif defined(VGO_solaris)
1219 if (VG_STREQ(soname, VG_U_LD_SO_1)) return True;
1220 # else
1221 # error "Unsupported OS"
1222 # endif
1224 return False;
1227 /*------------------------------------------------------------*/
1228 /*--- INITIALISATION ---*/
1229 /*------------------------------------------------------------*/
1231 /* Add a never-delete-me Active. */
1233 __attribute__((unused)) /* only used on amd64 */
1234 static void add_hardwired_active ( Addr from, Addr to )
1236 Active act;
1237 act.from_addr = from;
1238 act.to_addr = to;
1239 act.parent_spec = NULL;
1240 act.parent_sym = NULL;
1241 act.becTag = 0; /* "not equivalent to any other fn" */
1242 act.becPrio = 0; /* mandatory when becTag == 0 */
1243 act.isWrap = False;
1244 act.isIFunc = False;
1245 maybe_add_active( act );
1249 /* Add a never-delete-me Spec. This is a bit of a kludge. On the
1250 assumption that this is called only at startup, only handle the
1251 case where topSpecs is completely empty, or if it isn't, it has
1252 just one entry and that is the one with NULL seginfo -- that is the
1253 entry that holds these initial specs. */
1255 __attribute__((unused)) /* not used on all platforms */
1256 static void add_hardwired_spec (const HChar* sopatt, const HChar* fnpatt,
1257 Addr to_addr,
1258 const HChar** mandatory )
1260 Spec* spec = dinfo_zalloc("redir.ahs.1", sizeof(Spec));
1262 if (topSpecs == NULL) {
1263 topSpecs = dinfo_zalloc("redir.ahs.2", sizeof(TopSpec));
1264 /* symtab_zalloc sets all fields to zero */
1267 vg_assert(topSpecs != NULL);
1268 vg_assert(topSpecs->next == NULL);
1269 vg_assert(topSpecs->seginfo == NULL);
1270 /* FIXED PARTS */
1271 /* Note, that these CONST_CAST will not cause a problem, in the sense
1272 that VG_(redir_notify_delete_DebugInfo) will delete them. The reason
1273 is that the TopSpec here has seginfo == NULL and such a TopSpec will
1274 never be freed. See the asserts at the beginning of said function. */
1275 spec->from_sopatt = CONST_CAST(HChar *,sopatt);
1276 spec->from_fnpatt = CONST_CAST(HChar *,fnpatt);
1277 spec->to_addr = to_addr;
1278 spec->isWrap = False;
1279 spec->isGlobal = False;
1280 spec->mandatory = mandatory;
1281 /* VARIABLE PARTS */
1282 spec->mark = False; /* not significant */
1283 spec->done = False; /* not significant */
1285 spec->next = topSpecs->specs;
1286 topSpecs->specs = spec;
1290 __attribute__((unused)) /* not used on all platforms */
1291 static const HChar* complain_about_stripped_glibc_ldso[]
1292 = { "Possible fixes: (1, short term): install glibc's debuginfo",
1293 "package on this machine. (2, longer term): ask the packagers",
1294 "for your Linux distribution to please in future ship a non-",
1295 "stripped ld.so (or whatever the dynamic linker .so is called)",
1296 "that exports the above-named function using the standard",
1297 "calling conventions for this platform. The package you need",
1298 "to install for fix (1) is called",
1300 " On Debian, Ubuntu: libc6-dbg",
1301 " On SuSE, openSuSE, Fedora, RHEL: glibc-debuginfo",
1303 "Note that if you are debugging a 32 bit process on a",
1304 "64 bit system, you will need a corresponding 32 bit debuginfo",
1305 "package (e.g. libc6-dbg:i386).",
1306 NULL
1310 /* Initialise the redir system, and create the initial Spec list and
1311 for amd64-linux a couple of permanent active mappings. The initial
1312 Specs are not converted into Actives yet, on the (checked)
1313 assumption that no DebugInfos have so far been created, and so when
1314 they are created, that will happen. */
1316 void VG_(redir_initialise) ( void )
1318 // Assert that there are no DebugInfos so far
1319 vg_assert( VG_(next_DebugInfo)(NULL) == NULL );
1321 // Initialise active mapping.
1322 activeSet = VG_(OSetGen_Create)(offsetof(Active, from_addr),
1323 NULL, // Use fast comparison
1324 dinfo_zalloc,
1325 "redir.ri.1",
1326 dinfo_free);
1328 // The rest of this function just adds initial Specs.
1330 # if defined(VGP_x86_linux)
1331 /* If we're using memcheck, use this intercept right from the
1332 start, otherwise ld.so (glibc-2.3.5) makes a lot of noise. */
1333 if (0==VG_(strcmp)("Memcheck", VG_(details).name)) {
1334 const HChar** mandatory;
1335 # ifndef GLIBC_MANDATORY_INDEX_AND_STRLEN_REDIRECT
1336 mandatory = NULL;
1337 # else
1338 /* for glibc-2.12 and later, this is mandatory - can't sanely
1339 continue without it */
1340 mandatory = complain_about_stripped_glibc_ldso;
1341 # endif
1342 add_hardwired_spec(
1343 "ld-linux.so.2", "index",
1344 (Addr)&VG_(x86_linux_REDIR_FOR_index), mandatory);
1345 add_hardwired_spec(
1346 "ld-linux.so.2", "strlen",
1347 (Addr)&VG_(x86_linux_REDIR_FOR_strlen), mandatory);
1350 # elif defined(VGP_amd64_linux)
1351 /* Redirect vsyscalls to local versions */
1352 add_hardwired_active(
1353 0xFFFFFFFFFF600000ULL,
1354 (Addr)&VG_(amd64_linux_REDIR_FOR_vgettimeofday)
1356 add_hardwired_active(
1357 0xFFFFFFFFFF600400ULL,
1358 (Addr)&VG_(amd64_linux_REDIR_FOR_vtime)
1360 add_hardwired_active(
1361 0xFFFFFFFFFF600800ULL,
1362 (Addr)&VG_(amd64_linux_REDIR_FOR_vgetcpu)
1365 /* If we're using memcheck, use these intercepts right from
1366 the start, otherwise ld.so makes a lot of noise. */
1367 if (0==VG_(strcmp)("Memcheck", VG_(details).name)) {
1369 add_hardwired_spec(
1370 "ld-linux-x86-64.so.2", "index",
1371 (Addr)&VG_(amd64_linux_REDIR_FOR_index), NULL);
1372 add_hardwired_spec(
1373 "ld-linux-x86-64.so.2", "strlen",
1374 (Addr)&VG_(amd64_linux_REDIR_FOR_strlen),
1375 # ifndef GLIBC_MANDATORY_STRLEN_REDIRECT
1376 NULL
1377 # else
1378 /* for glibc-2.10 and later, this is mandatory - can't sanely
1379 continue without it */
1380 complain_about_stripped_glibc_ldso
1381 # endif
1385 # elif defined(VGP_ppc32_linux)
1386 /* If we're using memcheck, use these intercepts right from
1387 the start, otherwise ld.so makes a lot of noise. */
1388 if (0==VG_(strcmp)("Memcheck", VG_(details).name)) {
1390 /* this is mandatory - can't sanely continue without it */
1391 add_hardwired_spec(
1392 "ld.so.1", "strlen",
1393 (Addr)&VG_(ppc32_linux_REDIR_FOR_strlen),
1394 complain_about_stripped_glibc_ldso
1396 add_hardwired_spec(
1397 "ld.so.1", "strcmp",
1398 (Addr)&VG_(ppc32_linux_REDIR_FOR_strcmp),
1399 NULL /* not mandatory - so why bother at all? */
1400 /* glibc-2.6.1 (openSUSE 10.3, ppc32) seems fine without it */
1402 add_hardwired_spec(
1403 "ld.so.1", "index",
1404 (Addr)&VG_(ppc32_linux_REDIR_FOR_strchr),
1405 NULL /* not mandatory - so why bother at all? */
1406 /* glibc-2.6.1 (openSUSE 10.3, ppc32) seems fine without it */
1410 # elif defined(VGP_ppc64be_linux)
1411 /* If we're using memcheck, use these intercepts right from
1412 the start, otherwise ld.so makes a lot of noise. */
1413 if (0==VG_(strcmp)("Memcheck", VG_(details).name)) {
1415 /* this is mandatory - can't sanely continue without it */
1416 add_hardwired_spec(
1417 "ld64.so.1", "strlen",
1418 (Addr)VG_(fnptr_to_fnentry)( &VG_(ppc64_linux_REDIR_FOR_strlen) ),
1419 complain_about_stripped_glibc_ldso
1422 add_hardwired_spec(
1423 "ld64.so.1", "index",
1424 (Addr)VG_(fnptr_to_fnentry)( &VG_(ppc64_linux_REDIR_FOR_strchr) ),
1425 NULL /* not mandatory - so why bother at all? */
1426 /* glibc-2.5 (FC6, ppc64) seems fine without it */
1430 # elif defined(VGP_ppc64le_linux)
1431 /* If we're using memcheck, use these intercepts right from
1432 * the start, otherwise ld.so makes a lot of noise.
1434 if (0==VG_(strcmp)("Memcheck", VG_(details).name)) {
1436 /* this is mandatory - can't sanely continue without it */
1437 add_hardwired_spec(
1438 "ld64.so.2", "strlen",
1439 (Addr)&VG_(ppc64_linux_REDIR_FOR_strlen),
1440 complain_about_stripped_glibc_ldso
1443 add_hardwired_spec(
1444 "ld64.so.2", "index",
1445 (Addr)&VG_(ppc64_linux_REDIR_FOR_strchr),
1446 NULL /* not mandatory - so why bother at all? */
1447 /* glibc-2.5 (FC6, ppc64) seems fine without it */
1451 # elif defined(VGP_arm_linux)
1452 /* If we're using memcheck, use these intercepts right from the
1453 start, otherwise ld.so makes a lot of noise. In most ARM-linux
1454 distros, ld.so's soname is ld-linux.so.3, but Ubuntu 14.04 on
1455 Odroid uses ld-linux-armhf.so.3 for some reason. */
1456 if (0==VG_(strcmp)("Memcheck", VG_(details).name)) {
1457 /* strlen */
1458 add_hardwired_spec(
1459 "ld-linux.so.3", "strlen",
1460 (Addr)&VG_(arm_linux_REDIR_FOR_strlen),
1461 complain_about_stripped_glibc_ldso
1463 add_hardwired_spec(
1464 "ld-linux-armhf.so.3", "strlen",
1465 (Addr)&VG_(arm_linux_REDIR_FOR_strlen),
1466 complain_about_stripped_glibc_ldso
1468 /* memcpy */
1469 add_hardwired_spec(
1470 "ld-linux.so.3", "memcpy",
1471 (Addr)&VG_(arm_linux_REDIR_FOR_memcpy),
1472 complain_about_stripped_glibc_ldso
1474 add_hardwired_spec(
1475 "ld-linux-armhf.so.3", "memcpy",
1476 (Addr)&VG_(arm_linux_REDIR_FOR_memcpy),
1477 complain_about_stripped_glibc_ldso
1479 /* strcmp */
1480 add_hardwired_spec(
1481 "ld-linux.so.3", "strcmp",
1482 (Addr)&VG_(arm_linux_REDIR_FOR_strcmp),
1483 complain_about_stripped_glibc_ldso
1485 add_hardwired_spec(
1486 "ld-linux-armhf.so.3", "strcmp",
1487 (Addr)&VG_(arm_linux_REDIR_FOR_strcmp),
1488 complain_about_stripped_glibc_ldso
1490 /* index */
1491 add_hardwired_spec(
1492 "ld-linux.so.3", "index",
1493 (Addr)&VG_(arm_linux_REDIR_FOR_index),
1494 complain_about_stripped_glibc_ldso
1496 add_hardwired_spec(
1497 "ld-linux-armhf.so.3", "index",
1498 (Addr)&VG_(arm_linux_REDIR_FOR_index),
1499 complain_about_stripped_glibc_ldso
1503 # elif defined(VGP_arm64_linux)
1504 /* If we're using memcheck, use these intercepts right from
1505 the start, otherwise ld.so makes a lot of noise. */
1506 if (0==VG_(strcmp)("Memcheck", VG_(details).name)) {
1507 add_hardwired_spec(
1508 "ld-linux-aarch64.so.1", "strlen",
1509 (Addr)&VG_(arm64_linux_REDIR_FOR_strlen),
1510 complain_about_stripped_glibc_ldso
1512 add_hardwired_spec(
1513 "ld-linux-aarch64.so.1", "index",
1514 (Addr)&VG_(arm64_linux_REDIR_FOR_index),
1515 NULL
1517 add_hardwired_spec(
1518 "ld-linux-aarch64.so.1", "strcmp",
1519 (Addr)&VG_(arm64_linux_REDIR_FOR_strcmp),
1520 NULL
1522 # if defined(VGPV_arm64_linux_android)
1523 add_hardwired_spec(
1524 "NONE", "__dl_strlen", // in /system/bin/linker64
1525 (Addr)&VG_(arm64_linux_REDIR_FOR_strlen),
1526 NULL
1528 # endif
1531 # elif defined(VGP_x86_darwin)
1532 /* If we're using memcheck, use these intercepts right from
1533 the start, otherwise dyld makes a lot of noise. */
1534 if (0==VG_(strcmp)("Memcheck", VG_(details).name)) {
1535 add_hardwired_spec("dyld", "strcmp",
1536 (Addr)&VG_(x86_darwin_REDIR_FOR_strcmp), NULL);
1537 add_hardwired_spec("dyld", "strlen",
1538 (Addr)&VG_(x86_darwin_REDIR_FOR_strlen), NULL);
1539 add_hardwired_spec("dyld", "strcat",
1540 (Addr)&VG_(x86_darwin_REDIR_FOR_strcat), NULL);
1541 add_hardwired_spec("dyld", "strcpy",
1542 (Addr)&VG_(x86_darwin_REDIR_FOR_strcpy), NULL);
1543 add_hardwired_spec("dyld", "strlcat",
1544 (Addr)&VG_(x86_darwin_REDIR_FOR_strlcat), NULL);
1547 # elif defined(VGP_amd64_darwin)
1548 /* If we're using memcheck, use these intercepts right from
1549 the start, otherwise dyld makes a lot of noise. */
1550 if (0==VG_(strcmp)("Memcheck", VG_(details).name)) {
1551 add_hardwired_spec("dyld", "strcmp",
1552 (Addr)&VG_(amd64_darwin_REDIR_FOR_strcmp), NULL);
1553 add_hardwired_spec("dyld", "strlen",
1554 (Addr)&VG_(amd64_darwin_REDIR_FOR_strlen), NULL);
1555 add_hardwired_spec("dyld", "strcat",
1556 (Addr)&VG_(amd64_darwin_REDIR_FOR_strcat), NULL);
1557 add_hardwired_spec("dyld", "strcpy",
1558 (Addr)&VG_(amd64_darwin_REDIR_FOR_strcpy), NULL);
1559 add_hardwired_spec("dyld", "strlcat",
1560 (Addr)&VG_(amd64_darwin_REDIR_FOR_strlcat), NULL);
1561 // DDD: #warning fixme rdar://6166275
1562 add_hardwired_spec("dyld", "arc4random",
1563 (Addr)&VG_(amd64_darwin_REDIR_FOR_arc4random), NULL);
1564 # if DARWIN_VERS == DARWIN_10_9
1565 add_hardwired_spec("dyld", "strchr",
1566 (Addr)&VG_(amd64_darwin_REDIR_FOR_strchr), NULL);
1567 # endif
1570 # elif defined(VGP_s390x_linux)
1571 if (0==VG_(strcmp)("Memcheck", VG_(details).name)) {
1572 // added in rsponse to BZ 327943
1573 add_hardwired_spec("ld64.so.1", "index",
1574 (Addr)&VG_(s390x_linux_REDIR_FOR_index),
1575 complain_about_stripped_glibc_ldso);
1578 # elif defined(VGP_mips32_linux)
1579 if (0==VG_(strcmp)("Memcheck", VG_(details).name)) {
1580 /* this is mandatory - can't sanely continue without it */
1581 add_hardwired_spec(
1582 "ld.so.1", "strlen",
1583 (Addr)&VG_(mips32_linux_REDIR_FOR_strlen),
1584 complain_about_stripped_glibc_ldso
1586 add_hardwired_spec(
1587 "ld.so.1", "index",
1588 (Addr)&VG_(mips32_linux_REDIR_FOR_index),
1589 complain_about_stripped_glibc_ldso
1591 # if defined(VGPV_mips32_linux_android)
1592 add_hardwired_spec(
1593 "NONE", "__dl_strlen",
1594 (Addr)&VG_(mips32_linux_REDIR_FOR_strlen),
1595 NULL
1597 # endif
1600 # elif defined(VGP_mips64_linux)
1601 if (0==VG_(strcmp)("Memcheck", VG_(details).name)) {
1602 /* this is mandatory - can't sanely continue without it */
1603 add_hardwired_spec(
1604 "ld.so.1", "strlen",
1605 (Addr)&VG_(mips64_linux_REDIR_FOR_strlen),
1606 complain_about_stripped_glibc_ldso
1608 add_hardwired_spec(
1609 "ld.so.1", "index",
1610 (Addr)&VG_(mips64_linux_REDIR_FOR_index),
1611 complain_about_stripped_glibc_ldso
1613 # if defined(VGABI_64)
1614 add_hardwired_spec(
1615 "ld-linux-mipsn8.so.1", "strlen",
1616 (Addr)&VG_(mips64_linux_REDIR_FOR_strlen),
1617 complain_about_stripped_glibc_ldso
1619 add_hardwired_spec(
1620 "ld-linux-mipsn8.so.1", "index",
1621 (Addr)&VG_(mips64_linux_REDIR_FOR_index),
1622 complain_about_stripped_glibc_ldso
1624 # elif defined(VGABI_N32)
1625 add_hardwired_spec(
1626 "ld.so.1", "strchr",
1627 (Addr)&VG_(mips64_linux_REDIR_FOR_index),
1628 complain_about_stripped_glibc_ldso
1630 # else
1631 # error unknown mips64 ABI
1632 # endif
1635 # elif defined(VGP_x86_solaris)
1636 /* If we're using memcheck, use these intercepts right from
1637 the start, otherwise ld.so makes a lot of noise. */
1638 if (0==VG_(strcmp)("Memcheck", VG_(details).name)) {
1639 add_hardwired_spec("/lib/ld.so.1", "strcmp",
1640 (Addr)&VG_(x86_solaris_REDIR_FOR_strcmp), NULL);
1642 if (0==VG_(strcmp)("Memcheck", VG_(details).name)) {
1643 add_hardwired_spec("/lib/ld.so.1", "strlen",
1644 (Addr)&VG_(x86_solaris_REDIR_FOR_strlen), NULL);
1647 # elif defined(VGP_amd64_solaris)
1648 if (0==VG_(strcmp)("Memcheck", VG_(details).name)) {
1649 add_hardwired_spec("/lib/amd64/ld.so.1", "strcpy",
1650 (Addr)&VG_(amd64_solaris_REDIR_FOR_strcpy), NULL);
1652 if (0==VG_(strcmp)("Memcheck", VG_(details).name)) {
1653 add_hardwired_spec("/lib/amd64/ld.so.1", "strncpy",
1654 (Addr)&VG_(amd64_solaris_REDIR_FOR_strncpy), NULL);
1656 if (0==VG_(strcmp)("Memcheck", VG_(details).name)) {
1657 add_hardwired_spec("/lib/amd64/ld.so.1", "strcmp",
1658 (Addr)&VG_(amd64_solaris_REDIR_FOR_strcmp), NULL);
1660 if (0==VG_(strcmp)("Memcheck", VG_(details).name)) {
1661 add_hardwired_spec("/lib/amd64/ld.so.1", "strcat",
1662 (Addr)&VG_(amd64_solaris_REDIR_FOR_strcat), NULL);
1664 if (0==VG_(strcmp)("Memcheck", VG_(details).name)) {
1665 add_hardwired_spec("/lib/amd64/ld.so.1", "strlen",
1666 (Addr)&VG_(amd64_solaris_REDIR_FOR_strlen), NULL);
1669 # else
1670 # error Unknown platform
1671 # endif
1673 if (VG_(clo_trace_redir))
1674 show_redir_state("after VG_(redir_initialise)");
1678 /*------------------------------------------------------------*/
1679 /*--- MISC HELPERS ---*/
1680 /*------------------------------------------------------------*/
1682 static void* dinfo_zalloc(const HChar* ec, SizeT n) {
1683 void* p;
1684 vg_assert(n > 0);
1685 p = VG_(arena_malloc)(VG_AR_DINFO, ec, n);
1686 VG_(memset)(p, 0, n);
1687 return p;
1690 static void dinfo_free(void* p) {
1691 vg_assert(p);
1692 return VG_(arena_free)(VG_AR_DINFO, p);
1695 static HChar* dinfo_strdup(const HChar* ec, const HChar* str)
1697 return VG_(arena_strdup)(VG_AR_DINFO, ec, str);
1700 /* Really this should be merged with translations_allowable_from_seg
1701 in m_translate. */
1702 static Bool is_plausible_guest_addr(Addr a)
1704 NSegment const* seg = VG_(am_find_nsegment)(a);
1705 return seg != NULL
1706 && (seg->kind == SkAnonC || seg->kind == SkFileC ||
1707 seg->kind == SkShmC)
1708 && (seg->hasX || seg->hasR); /* crude x86-specific hack */
1712 /*------------------------------------------------------------*/
1713 /*--- NOTIFY-ON-LOAD FUNCTIONS ---*/
1714 /*------------------------------------------------------------*/
1716 static
1717 void handle_maybe_load_notifier( const HChar* soname,
1718 const HChar* symbol, Addr addr )
1720 # if defined(VGP_x86_linux)
1721 /* x86-linux only: if we see _dl_sysinfo_int80, note its address.
1722 See comment on declaration of VG_(client__dl_sysinfo_int80) for
1723 the reason. As far as I can tell, the relevant symbol is always
1724 in object with soname "ld-linux.so.2". */
1725 if (symbol && symbol[0] == '_'
1726 && 0 == VG_(strcmp)(symbol, "_dl_sysinfo_int80")
1727 && 0 == VG_(strcmp)(soname, "ld-linux.so.2")) {
1728 if (VG_(client__dl_sysinfo_int80) == 0)
1729 VG_(client__dl_sysinfo_int80) = addr;
1731 # endif
1733 /* Normal load-notifier handling after here. First, ignore all
1734 symbols lacking the right prefix. */
1735 vg_assert(symbol); // assert rather than segfault if it is NULL
1736 if (0 != VG_(strncmp)(symbol, VG_NOTIFY_ON_LOAD_PREFIX,
1737 VG_NOTIFY_ON_LOAD_PREFIX_LEN))
1738 /* Doesn't have the right prefix */
1739 return;
1741 if (VG_(strcmp)(symbol, VG_STRINGIFY(VG_NOTIFY_ON_LOAD(freeres))) == 0)
1742 VG_(client_freeres_wrapper) = addr;
1743 else
1744 if (VG_(strcmp)(symbol, VG_STRINGIFY(VG_NOTIFY_ON_LOAD(ifunc_wrapper))) == 0)
1745 iFuncWrapper = addr;
1746 else
1747 vg_assert2(0, "unrecognised load notification function: %s", symbol);
1751 /*------------------------------------------------------------*/
1752 /*--- REQUIRE-TEXT-SYMBOL HANDLING ---*/
1753 /*------------------------------------------------------------*/
1755 /* In short: check that the currently-being-loaded object has text
1756 symbols that satisfy any --require-text-symbol= specifications that
1757 apply to it, and abort the run with an error message if not.
1759 static void handle_require_text_symbols ( const DebugInfo* di )
1761 /* First thing to do is figure out which, if any,
1762 --require-text-symbol specification strings apply to this
1763 object. Most likely none do, since it is not expected to
1764 frequently be used. Work through the list of specs and
1765 accumulate in fnpatts[] the fn patterns that pertain to this
1766 object. */
1767 XArray *fnpatts = VG_(newXA)( VG_(malloc), "m_redir.hrts.5",
1768 VG_(free), sizeof(HChar*) );
1770 Int i, j;
1771 const HChar* di_soname = VG_(DebugInfo_get_soname)(di);
1772 vg_assert(di_soname); // must be present
1774 for (i = 0; i < VG_(sizeXA)(VG_(clo_req_tsyms)); i++) {
1775 const HChar* clo_spec = *(HChar**) VG_(indexXA)(VG_(clo_req_tsyms), i);
1776 vg_assert(clo_spec && VG_(strlen)(clo_spec) >= 4);
1777 // clone the spec, so we can stick a zero at the end of the sopatt
1778 HChar *spec = VG_(strdup)("m_redir.hrts.1", clo_spec);
1779 HChar sep = spec[0];
1780 HChar* sopatt = &spec[1];
1781 HChar* fnpatt = VG_(strchr)(sopatt, sep);
1782 // the initial check at clo processing in time in m_main
1783 // should ensure this.
1784 vg_assert(fnpatt && *fnpatt == sep);
1785 *fnpatt = 0;
1786 fnpatt++;
1787 if (VG_(string_match)(sopatt, di_soname)) {
1788 HChar *pattern = VG_(strdup)("m_redir.hrts.2", fnpatt);
1789 VG_(addToXA)(fnpatts, &pattern);
1791 VG_(free)(spec);
1794 if (VG_(sizeXA)(fnpatts) == 0) {
1795 VG_(deleteXA)(fnpatts);
1796 return; /* no applicable spec strings */
1799 /* So finally, fnpatts contains the set of
1800 (patterns for) text symbol names that must be found in this
1801 object, in order to continue. That is, we must find at least
1802 one text symbol name that matches each pattern, else we must
1803 abort the run. */
1805 if (0) VG_(printf)("for %s\n", di_soname);
1806 for (i = 0; i < VG_(sizeXA)(fnpatts); i++)
1807 if (0) VG_(printf)(" fnpatt: %s\n",
1808 *(HChar**) VG_(indexXA)(fnpatts, i));
1810 /* For each spec, look through the syms to find one that matches.
1811 This isn't terribly efficient but it happens rarely, so no big
1812 deal. */
1813 for (i = 0; i < VG_(sizeXA)(fnpatts); i++) {
1814 Bool found = False;
1815 const HChar* fnpatt = *(HChar**) VG_(indexXA)(fnpatts, i);
1816 Int nsyms = VG_(DebugInfo_syms_howmany)(di);
1817 for (j = 0; j < nsyms; j++) {
1818 Bool isText = False;
1819 const HChar* sym_name_pri = NULL;
1820 const HChar** sym_names_sec = NULL;
1821 VG_(DebugInfo_syms_getidx)( di, j, NULL,
1822 NULL, &sym_name_pri, &sym_names_sec,
1823 &isText, NULL, NULL );
1824 const HChar* twoslots[2];
1825 const HChar** names_init =
1826 alloc_symname_array(sym_name_pri, sym_names_sec, &twoslots[0]);
1827 const HChar** names;
1828 for (names = names_init; *names; names++) {
1829 /* ignore data symbols */
1830 if (0) VG_(printf)("QQQ %s\n", *names);
1831 vg_assert(sym_name_pri);
1832 if (!isText)
1833 continue;
1834 if (VG_(string_match)(fnpatt, *names)) {
1835 found = True;
1836 break;
1839 free_symname_array(names_init, &twoslots[0]);
1840 if (found)
1841 break;
1844 if (!found) {
1845 const HChar* v = "valgrind: ";
1846 VG_(printf)("\n");
1847 VG_(printf)(
1848 "%sFatal error at when loading library with soname\n", v);
1849 VG_(printf)(
1850 "%s %s\n", v, di_soname);
1851 VG_(printf)(
1852 "%sCannot find any text symbol with a name "
1853 "that matches the pattern\n", v);
1854 VG_(printf)("%s %s\n", v, fnpatt);
1855 VG_(printf)("%sas required by a --require-text-symbol= "
1856 "specification.\n", v);
1857 VG_(printf)("\n");
1858 VG_(printf)(
1859 "%sCannot continue -- exiting now.\n", v);
1860 VG_(printf)("\n");
1861 VG_(exit)(1);
1865 /* All required specs were found. Just free memory and return. */
1866 for (i = 0; i < VG_(sizeXA)(fnpatts); i++)
1867 VG_(free)(*(HChar**) VG_(indexXA)(fnpatts, i));
1868 VG_(deleteXA)(fnpatts);
1872 /*------------------------------------------------------------*/
1873 /*--- SANITY/DEBUG ---*/
1874 /*------------------------------------------------------------*/
1876 static void show_spec ( const HChar* left, const Spec* spec )
1878 VG_(message)( Vg_DebugMsg,
1879 "%s%-25s %-30s %s%s-> (%04d.%d) 0x%08lx\n",
1880 left,
1881 spec->from_sopatt, spec->from_fnpatt,
1882 spec->isWrap ? "W" : "R",
1883 spec->isGlobal ? "G" : "L",
1884 spec->becTag, spec->becPrio,
1885 spec->to_addr );
1888 static void show_active ( const HChar* left, const Active* act )
1890 Bool ok;
1891 const HChar *buf;
1893 DiEpoch ep = VG_(current_DiEpoch)();
1894 ok = VG_(get_fnname_w_offset)(ep, act->from_addr, &buf);
1895 if (!ok) buf = "???";
1896 // Stash away name1
1897 HChar name1[VG_(strlen)(buf) + 1];
1898 VG_(strcpy)(name1, buf);
1900 const HChar *name2;
1901 ok = VG_(get_fnname_w_offset)(ep, act->to_addr, &name2);
1902 if (!ok) name2 = "???";
1904 VG_(message)(Vg_DebugMsg, "%s0x%08lx (%-20s) %s-> (%04d.%d) 0x%08lx %s\n",
1905 left,
1906 act->from_addr, name1,
1907 act->isWrap ? "W" : "R",
1908 act->becTag, act->becPrio,
1909 act->to_addr, name2 );
1912 static void show_redir_state ( const HChar* who )
1914 TopSpec* ts;
1915 Spec* sp;
1916 Active* act;
1917 VG_(message)(Vg_DebugMsg, "<<\n");
1918 VG_(message)(Vg_DebugMsg, " ------ REDIR STATE %s ------\n", who);
1919 for (ts = topSpecs; ts; ts = ts->next) {
1920 if (ts->seginfo)
1921 VG_(message)(Vg_DebugMsg,
1922 " TOPSPECS of soname %s filename %s\n",
1923 VG_(DebugInfo_get_soname)(ts->seginfo),
1924 VG_(DebugInfo_get_filename)(ts->seginfo));
1925 else
1926 VG_(message)(Vg_DebugMsg,
1927 " TOPSPECS of soname (hardwired)\n");
1929 for (sp = ts->specs; sp; sp = sp->next)
1930 show_spec(" ", sp);
1932 VG_(message)(Vg_DebugMsg, " ------ ACTIVE ------\n");
1933 VG_(OSetGen_ResetIter)( activeSet );
1934 while ( (act = VG_(OSetGen_Next)(activeSet)) ) {
1935 show_active(" ", act);
1938 VG_(message)(Vg_DebugMsg, ">>\n");
1941 /*--------------------------------------------------------------------*/
1942 /*--- end ---*/
1943 /*--------------------------------------------------------------------*/