/*! @file ObjdumpProcessor.cc * @brief ObjdumpProcessor Implementation * * This file contains the implementation of the functions supporting * the reading of an objdump output file and adding nops to a * coverage map. */ #include #include #include #include #include #include #include #include "app_common.h" #include "ObjdumpProcessor.h" #include "CoverageMap.h" #include "ExecutableInfo.h" #include "SymbolTable.h" #include "TargetFactory.h" #include "rld.h" #include "rld-process.h" namespace Coverage { void finalizeSymbol( ExecutableInfo* const executableInfo, std::string& symbolName, ObjdumpProcessor::objdumpLines_t instructions ) { // Find the symbol's coverage map. CoverageMapBase& coverageMap = executableInfo->findCoverageMap( symbolName ); uint32_t lowAddress = coverageMap.getFirstLowAddress(); uint32_t size = coverageMap.getSize(); uint32_t highAddress = lowAddress + size; // If there are NOT already saved instructions, save them. SymbolInformation* symbolInfo = SymbolsToAnalyze->find( symbolName ); if (symbolInfo->instructions.empty()) { symbolInfo->sourceFile = executableInfo; symbolInfo->baseAddress = lowAddress; symbolInfo->instructions = instructions; } // Add the symbol to this executable's symbol table. SymbolTable* theSymbolTable = executableInfo->getSymbolTable(); theSymbolTable->addSymbol( symbolName, lowAddress, highAddress - lowAddress + 1 ); // Mark the start of each instruction in the coverage map. for (auto& instruction : instructions) { coverageMap.setIsStartOfInstruction( instruction.address ); } // Create a unified coverage map for the symbol. SymbolsToAnalyze->createCoverageMap( executableInfo->getFileName().c_str(), symbolName, size ); } ObjdumpProcessor::ObjdumpProcessor() { } ObjdumpProcessor::~ObjdumpProcessor() { } uint32_t ObjdumpProcessor::determineLoadAddress( ExecutableInfo* theExecutable ) { #define METHOD "ERROR: ObjdumpProcessor::determineLoadAddress - " FILE* loadAddressFile = NULL; char* cStatus; uint32_t offset; // This method should only be call for a dynamic library. if (!theExecutable->hasDynamicLibrary()) return 0; std::string dlinfoName = theExecutable->getFileName(); uint32_t address; char inLibName[128]; std::string Library = theExecutable->getLibraryName(); dlinfoName += ".dlinfo"; // Read load address. loadAddressFile = ::fopen( dlinfoName.c_str(), "r" ); if (!loadAddressFile) { std::ostringstream what; what << "Unable to open " << dlinfoName; throw rld::error( what, METHOD ); } // Process the dlinfo file. while ( 1 ) { // Get a line. cStatus = ::fgets( inputBuffer, MAX_LINE_LENGTH, loadAddressFile ); if (cStatus == NULL) { ::fclose( loadAddressFile ); std::ostringstream what; what << "library " << Library << " not found in " << dlinfoName; throw rld::error( what, METHOD ); } sscanf( inputBuffer, "%s %x", inLibName, &offset ); std::string tmp = inLibName; if ( tmp.find( Library ) != tmp.npos ) { // fprintf( stderr, "%s - 0x%08x\n", inLibName, offset ); address = offset; break; } } ::fclose( loadAddressFile ); return address; #undef METHOD } bool ObjdumpProcessor::IsBranch( const char *instruction ) { if ( !TargetInfo ) { fprintf( stderr, "ERROR: ObjdumpProcessor::IsBranch - unknown architecture\n" ); assert(0); return false; } return TargetInfo->isBranch( instruction ); } bool ObjdumpProcessor::isBranchLine( const char* const line ) { if ( !TargetInfo ) { fprintf( stderr, "ERROR: ObjdumpProcessor::isBranchLine - unknown architecture\n" ); assert(0); return false; } return TargetInfo->isBranchLine( line ); } bool ObjdumpProcessor::isNop( const char* const line, int& size ) { if ( !TargetInfo ){ fprintf( stderr, "ERROR: ObjdumpProcessor::isNop - unknown architecture\n" ); assert(0); return false; } return TargetInfo->isNopLine( line, size ); } void ObjdumpProcessor::getFile( std::string fileName, rld::process::tempfile& objdumpFile, rld::process::tempfile& err ) { rld::process::status status; rld::process::arg_container args = { TargetInfo->getObjdump(), "-Cda", "--section=.text", "--source", fileName }; try { status = rld::process::execute( TargetInfo->getObjdump(), args, objdumpFile.name(), err.name() ); if ( (status.type != rld::process::status::normal) || (status.code != 0) ) { throw rld::error( "Objdump error", "generating objdump" ); } } catch( rld::error& err ) { std::cout << "Error while running " << TargetInfo->getObjdump() << " on " << fileName << std::endl; std::cout << err.what << " in " << err.where << std::endl; return; } objdumpFile.open( true ); } uint32_t ObjdumpProcessor::getAddressAfter( uint32_t address ) { objdumpFile_t::iterator itr; itr = find ( objdumpList.begin(), objdumpList.end(), address ); if (itr == objdumpList.end()) { return 0; } itr++; if (itr == objdumpList.end()) { return 0; } return (*itr); } void ObjdumpProcessor::loadAddressTable ( ExecutableInfo* const executableInformation, rld::process::tempfile& objdumpFile, rld::process::tempfile& err ) { int items; uint32_t offset; char terminator; std::string line; // Obtain the objdump file. if ( !executableInformation->hasDynamicLibrary() ) getFile( executableInformation->getFileName(), objdumpFile, err ); else getFile( executableInformation->getLibraryName(), objdumpFile, err ); // Process all lines from the objdump file. while ( true ) { // Get the line. objdumpFile.read_line( line ); if ( line.empty() ) { break; } // See if it is the dump of an instruction. items = sscanf( line.c_str(), "%x%c", &offset, &terminator ); // If it looks like an instruction ... if ((items == 2) && (terminator == ':')) { objdumpList.push_back( executableInformation->getLoadAddress() + offset ); } } } void ObjdumpProcessor::load( ExecutableInfo* const executableInformation, rld::process::tempfile& objdumpFile, rld::process::tempfile& err ) { std::string currentSymbol = ""; uint32_t instructionOffset; int items; int found; objdumpLine_t lineInfo; uint32_t offset; bool processSymbol = false; char symbol[ MAX_LINE_LENGTH ]; char terminator1; char terminatorOne; char terminator2; objdumpLines_t theInstructions; char instruction[ MAX_LINE_LENGTH ]; char ID[ MAX_LINE_LENGTH ]; std::string call = ""; std::string jumpTableID = ""; std::string line = ""; // Obtain the objdump file. if ( !executableInformation->hasDynamicLibrary() ) getFile( executableInformation->getFileName(), objdumpFile, err ); else getFile( executableInformation->getLibraryName(), objdumpFile, err ); while ( true ) { // Get the line. objdumpFile.read_line( line ); if ( line.empty() ) { // If we are currently processing a symbol, finalize it. if (processSymbol) { finalizeSymbol( executableInformation, currentSymbol, theInstructions ); fprintf( stderr, "WARNING: ObjdumpProcessor::load - analysis of symbol %s \n" " may be incorrect. It was the last symbol in %s\n" " and the length of its last instruction is assumed " " to be one.\n", currentSymbol.c_str(), executableInformation->getFileName().c_str() ); } objdumpFile.close(); break; } lineInfo.line = line; lineInfo.address = 0xffffffff; lineInfo.isInstruction = false; lineInfo.isNop = false; lineInfo.nopSize = 0; lineInfo.isBranch = false; instruction[0] = '\0'; ID[0] = '\0'; // Look for the start of a symbol's objdump and extract // offset and symbol (i.e. offset :). items = sscanf( line.c_str(), "%x <%[^>]>%c", &offset, symbol, &terminator1 ); // See if it is a jump table. found = sscanf( line.c_str(), "%x%c\t%*[^\t]%c%s %*x %*[^+]%s", &instructionOffset, &terminatorOne, &terminator2, instruction, ID ); call = instruction; jumpTableID = ID; // If all items found, we are at the beginning of a symbol's objdump. if ((items == 3) && (terminator1 == ':')) { // If we are currently processing a symbol, finalize it. if (processSymbol) { finalizeSymbol( executableInformation, currentSymbol, theInstructions ); } // Start processing of a new symbol. currentSymbol = ""; processSymbol = false; theInstructions.clear(); // See if the new symbol is one that we care about. if (SymbolsToAnalyze->isDesired( symbol )) { currentSymbol = symbol; processSymbol = true; theInstructions.push_back( lineInfo ); } } // If it looks like a jump table, finalize the symbol. else if ( (found == 5) && (terminatorOne == ':') && (terminator2 == '\t') && (call.find( "call" ) != std::string::npos) && (jumpTableID.find( "+0x" ) != std::string::npos) && processSymbol ) { // If we are currently processing a symbol, finalize it. if ( processSymbol ) { finalizeSymbol( executableInformation, currentSymbol, theInstructions ); } processSymbol = false; } else if (processSymbol) { // See if it is the dump of an instruction. items = sscanf( line.c_str(), "%x%c\t%*[^\t]%c", &instructionOffset, &terminator1, &terminator2 ); // If it looks like an instruction ... if ((items == 3) && (terminator1 == ':') && (terminator2 == '\t')) { // update the line's information, save it and ... lineInfo.address = executableInformation->getLoadAddress() + instructionOffset; lineInfo.isInstruction = true; lineInfo.isNop = isNop( line.c_str(), lineInfo.nopSize ); lineInfo.isBranch = isBranchLine( line.c_str() ); } // Always save the line. theInstructions.push_back( lineInfo ); } } } }