From mboxrd@z Thu Jan 1 00:00:00 1970 X-Msuck: nntp://news.gmane.org/gmane.linux.lib.musl.general/11636 Path: news.gmane.org!.POSTED!not-for-mail From: Rich Felker Newsgroups: gmane.linux.lib.musl.general Subject: Re: [RFC PATCH] Allow annotating calloc for Valgrind Date: Sun, 2 Jul 2017 10:35:39 -0400 Message-ID: <20170702143539.GK1627@brightrain.aerifal.cx> References: <20170629225614.19061-1-amonakov@ispras.ru> <20170629232032.GH1627@brightrain.aerifal.cx> <20170629235624.GI1627@brightrain.aerifal.cx> Reply-To: musl@lists.openwall.com NNTP-Posting-Host: blaine.gmane.org Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Trace: blaine.gmane.org 1499006155 13817 195.159.176.226 (2 Jul 2017 14:35:55 GMT) X-Complaints-To: usenet@blaine.gmane.org NNTP-Posting-Date: Sun, 2 Jul 2017 14:35:55 +0000 (UTC) User-Agent: Mutt/1.5.21 (2010-09-15) To: musl@lists.openwall.com Original-X-From: musl-return-11649-gllmg-musl=m.gmane.org@lists.openwall.com Sun Jul 02 16:35:51 2017 Return-path: Envelope-to: gllmg-musl@m.gmane.org Original-Received: from mother.openwall.net ([195.42.179.200]) by blaine.gmane.org with smtp (Exim 4.84_2) (envelope-from ) id 1dRfyX-0003IV-Az for gllmg-musl@m.gmane.org; Sun, 02 Jul 2017 16:35:49 +0200 Original-Received: (qmail 11386 invoked by uid 550); 2 Jul 2017 14:35:52 -0000 Mailing-List: contact musl-help@lists.openwall.com; run by ezmlm Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-ID: Original-Received: (qmail 11368 invoked from network); 2 Jul 2017 14:35:52 -0000 Content-Disposition: inline In-Reply-To: Original-Sender: Rich Felker Xref: news.gmane.org gmane.linux.lib.musl.general:11636 Archived-At: On Sun, Jul 02, 2017 at 04:55:08PM +0300, Alexander Monakov wrote: > On Thu, 29 Jun 2017, Rich Felker wrote: > > It reached the point of an faq item on irc; perhaps it was never > > discussed on the ml. > > I feel a quick reminder of what was discussed would be very nice. I'm not sure I can do the topic justice without digging through a lot of old logs. I don't want to misrepresent what anyone said. > > If that happens, it's just a valgrind bug. It can see the memory was > > returned by calloc and therefore the contents are defined. But maybe > > before discussing this further we need to clarify what the actual > > scenario is. > > Alright. As far as I can tell, everyone hits this (only) with static > linking. Valgrind core *does* have a concept of a symbol table being > distinct from dynamic symbol table (info from symtab is successfully > used for backtracing for example), so in principle Memcheck could use > just the .symtab when running unstripped static executables. > > Unfortunately, historically the implementation of Memcheck relies > entirely on dynamic linking to intercept allocation functions. As a > result, Memcheck's functionality on static executables degrades > significantly (it can still find a subset of uninit access errors). > > I guess the proper fix - wiring up .symtab-based interception - might > require more time than anyone was prepared to volunteer. > > I think at the moment client requests are the only straightforward way > to use Memcheck fully with statically-linked programs. But for full > functionality, people would need extra requests informing Memcheck > about the effects of static malloc & free. Where would such a patch > belong? I'm not sure it makes sense to do -- is there a good reason dynamic linking can't be used when debugging memory errors? Surely some apps (especially proprietary ones) might be shipped as static binaries, but these will likely lack debugging symbols anyway. There are also fundamental limits to the correctness of any approach that uses static linking, since too much information has already been lost. It's calling the _name_ malloc, realloc, or free (not the code at the location; think aliases etc.) that must have the allocation semantics. Even if nothing weird is happening with aliases at the libc implementation level, the compiler could do major transformations with IPA (especially with LTO) that end up resulting in code being shared in unexpected ways. Rich