blob: 0dde845559e7bdac6f1e8a28ed1b430672c9b30a [file] [log] [blame]
Dan Gohmanf17a25c2007-07-18 16:29:46 +00001//===-- Intercept.cpp - System function interception routines -------------===//
2//
3// The LLVM Compiler Infrastructure
4//
Chris Lattner081ce942007-12-29 20:36:04 +00005// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
Dan Gohmanf17a25c2007-07-18 16:29:46 +00007//
8//===----------------------------------------------------------------------===//
9//
10// If a function call occurs to an external function, the JIT is designed to use
11// the dynamic loader interface to find a function to call. This is useful for
12// calling system calls and library functions that are not available in LLVM.
13// Some system calls, however, need to be handled specially. For this reason,
14// we intercept some of them here and use our own stubs to handle them.
15//
16//===----------------------------------------------------------------------===//
17
18#include "JIT.h"
Edwin Törökced9ff82009-07-11 13:10:19 +000019#include "llvm/Support/ErrorHandling.h"
Dan Gohmand408d392008-05-23 20:40:06 +000020#include "llvm/Support/Streams.h"
Dan Gohmanf17a25c2007-07-18 16:29:46 +000021#include "llvm/System/DynamicLibrary.h"
22#include "llvm/Config/config.h"
23using namespace llvm;
24
25// AtExitHandlers - List of functions to call when the program exits,
26// registered with the atexit() library function.
27static std::vector<void (*)()> AtExitHandlers;
28
29/// runAtExitHandlers - Run any functions registered by the program's
30/// calls to atexit(3), which we intercept and store in
31/// AtExitHandlers.
32///
33static void runAtExitHandlers() {
34 while (!AtExitHandlers.empty()) {
35 void (*Fn)() = AtExitHandlers.back();
36 AtExitHandlers.pop_back();
37 Fn();
38 }
39}
40
41//===----------------------------------------------------------------------===//
42// Function stubs that are invoked instead of certain library calls
43//===----------------------------------------------------------------------===//
44
45// Force the following functions to be linked in to anything that uses the
46// JIT. This is a hack designed to work around the all-too-clever Glibc
47// strategy of making these functions work differently when inlined vs. when
48// not inlined, and hiding their real definitions in a separate archive file
49// that the dynamic linker can't see. For more info, search for
50// 'libc_nonshared.a' on Google, or read http://llvm.org/PR274.
51#if defined(__linux__)
52#if defined(HAVE_SYS_STAT_H)
53#include <sys/stat.h>
54#endif
Edwin Török98178f42009-05-23 16:23:59 +000055#include <fcntl.h>
Chris Lattner96e66cb2008-01-03 22:15:32 +000056/* stat functions are redirecting to __xstat with a version number. On x86-64
57 * linking with libc_nonshared.a and -Wl,--export-dynamic doesn't make 'stat'
58 * available as an exported symbol, so we have to add it explicitly.
59 */
Chris Lattner77010bb2008-01-03 07:10:51 +000060class StatSymbols {
Chris Lattner96e66cb2008-01-03 22:15:32 +000061public:
62 StatSymbols() {
63 sys::DynamicLibrary::AddSymbol("stat", (void*)(intptr_t)stat);
64 sys::DynamicLibrary::AddSymbol("fstat", (void*)(intptr_t)fstat);
65 sys::DynamicLibrary::AddSymbol("lstat", (void*)(intptr_t)lstat);
66 sys::DynamicLibrary::AddSymbol("stat64", (void*)(intptr_t)stat64);
Edwin Török98178f42009-05-23 16:23:59 +000067 sys::DynamicLibrary::AddSymbol("\x1stat64", (void*)(intptr_t)stat64);
68 sys::DynamicLibrary::AddSymbol("\x1open64", (void*)(intptr_t)open64);
69 sys::DynamicLibrary::AddSymbol("\x1lseek64", (void*)(intptr_t)lseek64);
Chris Lattner96e66cb2008-01-03 22:15:32 +000070 sys::DynamicLibrary::AddSymbol("fstat64", (void*)(intptr_t)fstat64);
71 sys::DynamicLibrary::AddSymbol("lstat64", (void*)(intptr_t)lstat64);
72 sys::DynamicLibrary::AddSymbol("atexit", (void*)(intptr_t)atexit);
73 sys::DynamicLibrary::AddSymbol("mknod", (void*)(intptr_t)mknod);
74 }
Dan Gohmanf17a25c2007-07-18 16:29:46 +000075};
Chris Lattner77010bb2008-01-03 07:10:51 +000076static StatSymbols initStatSymbols;
Dan Gohmanf17a25c2007-07-18 16:29:46 +000077#endif // __linux__
78
Dan Gohmanf17a25c2007-07-18 16:29:46 +000079// jit_exit - Used to intercept the "exit" library call.
80static void jit_exit(int Status) {
81 runAtExitHandlers(); // Run atexit handlers...
82 exit(Status);
83}
84
85// jit_atexit - Used to intercept the "atexit" library call.
86static int jit_atexit(void (*Fn)(void)) {
87 AtExitHandlers.push_back(Fn); // Take note of atexit handler...
88 return 0; // Always successful
89}
90
91//===----------------------------------------------------------------------===//
92//
93/// getPointerToNamedFunction - This method returns the address of the specified
94/// function by using the dynamic loader interface. As such it is only useful
95/// for resolving library symbols, not code generated symbols.
96///
Dan Gohman0ae39622009-01-05 05:32:42 +000097void *JIT::getPointerToNamedFunction(const std::string &Name,
98 bool AbortOnFailure) {
Chris Lattner247ec522008-06-16 17:44:14 +000099 if (!isSymbolSearchingDisabled()) {
100 // Check to see if this is one of the functions we want to intercept. Note,
101 // we cast to intptr_t here to silence a -pedantic warning that complains
102 // about casting a function pointer to a normal pointer.
103 if (Name == "exit") return (void*)(intptr_t)&jit_exit;
104 if (Name == "atexit") return (void*)(intptr_t)&jit_atexit;
Dan Gohmanf17a25c2007-07-18 16:29:46 +0000105
Chris Lattner247ec522008-06-16 17:44:14 +0000106 const char *NameStr = Name.c_str();
107 // If this is an asm specifier, skip the sentinal.
108 if (NameStr[0] == 1) ++NameStr;
109
110 // If it's an external function, look it up in the process image...
111 void *Ptr = sys::DynamicLibrary::SearchForAddressOfSymbol(NameStr);
Dan Gohmanf17a25c2007-07-18 16:29:46 +0000112 if (Ptr) return Ptr;
Chris Lattner247ec522008-06-16 17:44:14 +0000113
114 // If it wasn't found and if it starts with an underscore ('_') character,
115 // and has an asm specifier, try again without the underscore.
116 if (Name[0] == 1 && NameStr[0] == '_') {
117 Ptr = sys::DynamicLibrary::SearchForAddressOfSymbol(NameStr+1);
118 if (Ptr) return Ptr;
119 }
120
121 // Darwin/PPC adds $LDBLStub suffixes to various symbols like printf. These
122 // are references to hidden visibility symbols that dlsym cannot resolve.
123 // If we have one of these, strip off $LDBLStub and try again.
Chris Lattner5370e622007-11-27 20:41:32 +0000124#if defined(__APPLE__) && defined(__ppc__)
Chris Lattner247ec522008-06-16 17:44:14 +0000125 if (Name.size() > 9 && Name[Name.size()-9] == '$' &&
126 memcmp(&Name[Name.size()-8], "LDBLStub", 8) == 0) {
127 // First try turning $LDBLStub into $LDBL128. If that fails, strip it off.
128 // This mirrors logic in libSystemStubs.a.
129 std::string Prefix = std::string(Name.begin(), Name.end()-9);
Evan Cheng39634262009-01-05 17:17:04 +0000130 if (void *Ptr = getPointerToNamedFunction(Prefix+"$LDBL128", false))
Chris Lattner247ec522008-06-16 17:44:14 +0000131 return Ptr;
Evan Cheng39634262009-01-05 17:17:04 +0000132 if (void *Ptr = getPointerToNamedFunction(Prefix, false))
Chris Lattner247ec522008-06-16 17:44:14 +0000133 return Ptr;
134 }
Chris Lattner5370e622007-11-27 20:41:32 +0000135#endif
Chris Lattner247ec522008-06-16 17:44:14 +0000136 }
Chris Lattner5370e622007-11-27 20:41:32 +0000137
Chris Lattner247ec522008-06-16 17:44:14 +0000138 /// If a LazyFunctionCreator is installed, use it to get/create the function.
Chris Lattner5c507602007-10-22 02:50:12 +0000139 if (LazyFunctionCreator)
140 if (void *RP = LazyFunctionCreator(Name))
141 return RP;
Dan Gohmanf17a25c2007-07-18 16:29:46 +0000142
Dan Gohman0ae39622009-01-05 05:32:42 +0000143 if (AbortOnFailure) {
Benjamin Kramer98c00ab2009-08-03 13:33:33 +0000144 llvm_report_error("Program used external function '"+Name+
Edwin Törökced9ff82009-07-11 13:10:19 +0000145 "' which could not be resolved!");
Dan Gohman0ae39622009-01-05 05:32:42 +0000146 }
Dan Gohmanf17a25c2007-07-18 16:29:46 +0000147 return 0;
148}