Dr. Dobb's is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Channels ▼
RSS

Building Library Interposers for Fun and Profit


Building Library Interposers for Fun and Profit

Most of today's applications use shared libraries and dynamic linking, especially for such system libraries as the standard C library (libc), or the X Window or OpenGL libraries. Operating system vendors encourage this method because it provides many advantages. With dynamic linking, you can intercept any function call that an application makes to any shared library. Once you intercept it, you can do whatever you want in that function, as well as call the real function that the application originally intended to call. Performance tuning is one use of this technology. Even if you have access to profilers and other development tools, or the application's source code itself, having your own library interposer

puts you completely in control. You can see exactly what you're doing and make adjustments at any time.

Building and Running Your First Interposer

To use library interposition, you need to create a special shared library and set the LD_PRELOAD environment variable. When LD_PRELOAD is set, the dynamic linker will use the specified library before any other when it searches for shared libraries. Let's create a simple interposer for malloc(), which is normally a part of /usr/lib/libc.so.1, the standard C library. A message, displaying the argument passed to each malloc() call, will be printed out each time the application calls malloc(). Listing One (malloc_interposer.c) is the source for this interposer. In Listing One, func is a function pointer to the real malloc() routine, which is in /usr/lib/libc.so.1. The RTLD_NEXT argument passed to dlsym(3X) tells the dynamic linker to find the next reference to the specified function, using the normal dynamic linker search sequence. Now let's build and run this interposer, using ls(1) as our sample application. We'll use the C-shell syntax for this and other examples.

  % cc -o malloc_interposer.so -G -Kpic malloc_interposer.c
  % setenv LD_PRELOAD $cwd/malloc_interposer.so
  % ls -l malloc_interposer.so
  malloc(64) is called
  malloc(52) is called
  malloc(1072) is called
  -rwxr-xr-x 1 gregn 5224 	Aug 3 15:21 
  malloc_interposer.so*
  % unsetenv LD_PRELOAD

Without access to the source code of ls(1), and without rebuilding it in any way, we've just discovered which arguments the application used to call malloc() in the test run. Note that LD_PRELOAD must specify the full path to the interposer library, and that library interposition is disabled for setuid programs in order to prevent security problems.

Collecting Runtime Statistics

Here's a more practical example of library interposition on malloc(), as well as on a few other routines. It collects statistics about the size of the memory blocks requested with the calls to malloc(), calloc(), and realloc(), and prints out a histogram detailing their use upon exiting the application. Listing Two (malloc_hist.c) is the source code. Note that we round up all memory-request sizes to the next power of two. To obtain the name of the current executable, we use the proc(4) interface. The version of the proc(4) interface used here works with Solaris 2.6 and above. We can run this interposer with the CDE editor dtpad as the test application.

% setenv LD_PRELOAD $cwd/malloc_hist.so
% dtpad malloc_hist.c
% unsetenv LD_PRELOAD

	Here are the results.

% cat /tmp/malloc_histogram.dtpad.15203
prog_name=dtpad.15203
******** malloc **********
         1              76
         2             105
         4             450
         8             667
        16            2047
        32             620
        64             158
       128              39
       256              33
       512              22
      1024              32
      2048              10
      4096              14
      8192              46
     32768               2
    131072               3
******** calloc **********
         1               0
         2               0
         4            1676
         8              40
        16              21
        32              12
        64              34
       128               4
       256               2
       512               0
      1024               3
      8192               7
******** realloc **********
         1               0
         2               0
         4               2
         8               2
        16              11
        32              11
        64              14
       128               1
       256               0
       512               0
If the application invokes more than one executable, you'll get a histogram in the /tmp directory for each. Such histograms can be quite useful in application performance tuning. We now know that dtpad (as used in this session) calls malloc() to request 16-byte memory blocks more often than it requests other sizes. This tool has been used with many real applications. It revealed that most of one application's malloc() requests were for blocks of four bytes or less. There are two performance problems with this pattern. First of all, most malloc() implementations, including the default Solaris malloc(3C), will waste a lot of memory when used this way. malloc(3C) uses eight bytes of overhead for each memory block it returns to the caller. When the application calls malloc, requesting only four bytes of memory, the malloc() overhead is twice as large as the useful memory consumed. This memory waste can easily lead to increased paging to disk, ruining the application's performance. Second, it's possible to create your own memory allocator specially geared towards small blocks. It can be made a lot faster than the system's default malloc(), which is designed to deal with a wide variety of block sizes.

Fixing a Bug

This is a true story. A major mechanical CAD application stopped working with Solaris 2.6, but continued to work with Solaris 2.5.1. Debugging showed that the reason for failure was a call to XOpenDisplay(3X11) that returned NULL. Interposing on that routine revealed that the application was calling XOpenDisplay() with the argument unix:0.0 instead of with the usual NULL. The reason it didn't work was a bug in X. It could also be considered a bug in the application, because using unix:0.0 for DISPLAY is an old Unix technique which no longer makes sense. In any case, we needed a quick workaround until the bug was fixed. The application in question was old and complex. It called XOpenDisplay() many times from different modules, so even tracking the troublesome calls was a challenge. The following library interposer was our solution. Not only did this interposer print out the argument passed to XOpenDisplay(), it actually changed the XOpenDisplay() argument to NULL, fixing the problem; see Listing Three (XOpenDisplay_interpose.c).

More Ideas

Now that you know how to build and use library interposers, here are some other things you can have them do:

  • Compute the amount of time spent in malloc(), realloc(), and free() routines, and print out the results upon exiting. A good timing routine in Solaris is gethrtime(3C). Once you have this information, you'll know if memory management is a performance bottleneck.
  • Collect usage statistics for memmove(), memcpy(), and memset() routines, and print out a histogram similar to the one for malloc(). This will tell you how much data the application is moving around, and whether or not this area of the program is worth optimizing.
  • You can also determine how many backward moves or copies the application performs. A backward move occurs when the source address is larger than the destination address. The performance of backward memory moves is often much worse than that of forward moves.
  • Determine which environment variables the application is using. Interpose on getenv(3C), and print its argument and return value.
  • Test a different version of malloc(), or any other dynamically-linked routine, with your application. All you have to do is interpose the test version (assuming it's built as a shared library). To go back to using the original version, simply undefine LD_PRELOAD.

Using the library interposers described in this article, you can monitor your applications' patterns of system-resource consumption and provide useful feedback to application developers.

Acknowledgments

I'd like to thank two of my colleagues at Sun Microsystems: Bart Smaalders, who wrote the original version of the interposer to collect malloc statistics, and Morgan Herrington, who generously helped in many ways.

Resources

"Profiling and Tracing Dynamic Library Usage via Interposition," Timothy W. Curry (USENIX Conference Proceedings, Summer 1994): http://www.usenix.org/publications/library/proceedings/bos94/curry.html.

Listing One
/* Example of a library interposer: interpose on malloc().
* Build and use this interposer as following:
* cc -o malloc_interposer.so -G -Kpic malloc_interposer.c
* setenv LD_PRELOAD $cwd/malloc_interposer.so
* run the app
* unsetenv LD_PRELOAD
*/
  #include <stdio.h>
  #include <dlfcn.h>
void *malloc(size_t size)
  {
  static void * (*func)();
 if(!func)
  func = (void *(*)()) dlsym(RTLD_NEXT, "malloc");
  printf("malloc(%d) is called\n", size); 
  return(func(size));
  }

  Listing Two
  /* Library interposer to collect malloc/calloc/realloc statistics
  * and produce a histogram of their use.
  * cc -o malloc_hist.so -G -Kpic malloc_hist.c
  * setenv LD_PRELOAD $cwd/malloc_hist.so
  * run the application
  * unsetenv LD_PRELOAD
  *
  * The results will be in /tmp/malloc_histogram.<prog_name>.<pid>
  * for each process invoked by current application.
  */
  #include <dlfcn.h>
  #include <memory.h>
  #include <assert.h>
  #include <thread.h>
  #include <stdio.h>
  #include <procfs.h>
  #include <fcntl.h>
typedef struct data {
  int histogram[32];
  char * caller;
  } data_t;
data_t mdata = { 
  0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0, 
  "malloc"};
data_t cdata = { 
  0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0, 
  "calloc"};
data_t rdata = { 
  0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0, 
  "realloc"};
static FILE* output;
  static int pid;
  static char prog_name[32];
  static char path[64];
static void done()
  {
  fprintf(output, "prog_name=%s\n", prog_name);
  print_data(&mdata);
  print_data(&cdata);
  print_data(&rdata);
  }
static int print_data(data_t * ptr)
  {
  int i;
 fprintf(output, "******** %s **********\n", ptr->caller);
  for(i=0;i<32;i++)
  if(i < 10 || ptr->histogram[i])
  fprintf(output, "%10u\t%10d\n", 1<<i, ptr->histogram[i]);
  }
exit(int status)
  {
  char procbuf[32];
  psinfo_t psbuf;
  int fd;
 /* Get current executable's name using proc(4) interface */
  pid = (int)getpid();
  (void)sprintf(procbuf, "/proc/%ld/psinfo", (long)pid);
  if ((fd = open(procbuf, O_RDONLY)) != -1)
  {
  if (read(fd, &psbuf, sizeof(psbuf)) == sizeof(psbuf))
  sprintf(prog_name, "%s.%d", psbuf.pr_fname, pid);
  else
  sprintf(prog_name, "%s.%d", "unknown", pid);
  }
  else
  sprintf(prog_name, "%s.%d", "unknown", pid);
  sprintf(path, "%s%s", "/tmp/malloc_histogram.", prog_name);
 /* Open the file here since
  the shell closes all file descriptors before calling exit() */
  output = fopen(path, "w");
  if(output)
  done();
  (*((void (*)())dlsym(RTLD_NEXT, "exit")))(status);
  }
static int bump_counter(data_t * ptr, int size)
  {
  static mutex_t lock;
  int size_orig;
  int i = 0;
 size_orig = size;
  while(size /= 2)
  i++;
  if(1<<i < size_orig)
  i++;
 /* protect histogram data if application is multithreaded */ 
  mutex_lock(&lock);
  ptr->histogram[i]++;
  mutex_unlock(&lock);
  }

  void * malloc(size_t size)
  {
  static void * (*func)();
  void * ret;
 if(!func) {
  func = (void *(*)()) dlsym(RTLD_NEXT, "malloc");
  }
 ret = func(size);
 bump_counter(&mdata, size);
  
  return(ret);
  }
void * calloc(size_t nelem, size_t elsize)
  {
  static void * (*func)();
  void * ret;
  int i;
 if(!func)
  func = (void *(*)()) dlsym(RTLD_NEXT, "calloc");
 ret = func(nelem, elsize);
 for(i=0;i<nelem;i++)
  bump_counter(&cdata, elsize);
  
  return(ret);
  }
void * realloc(void *ptr, size_t size)
  {
  static void * (*func)();
  void * ret;
 if(!func)
  func = (void *(*)()) dlsym(RTLD_NEXT, "realloc");
 ret = func(ptr, size);
  bump_counter(&rdata, size);
  
  return(ret);
  }

  Listing Three 
  /*
  * Library interposer for XOpenDisplay() and XCloseDisplay.
  * cc -g -o XOpenDisplay_interpose.so -G -Kpic XOpenDisplay_interpose.c
  * setenv LD_PRELOAD $cwd/XOpenDisplay_interpose.so
  * run the app
  * unsetenv LD_PRELOAD
  */
  #include <stdio.h>
  #include <X11/Xlib.h>
  #include <dlfcn.h>
Display *XOpenDisplay(char *display_name)
  {
  static Display * (*func)(char *);
  Display *ret;
  
  if(!func)
  func = (Display *(*)(char *))dlsym(RTLD_NEXT, "XOpenDisplay");
 if(display_name)
  printf("XOpenDisplay() is called with display_name=%s\n", display_name);
  else
  printf("XOpenDisplay() is called with display_name=NULL\n");
  /*
  ret = func(display_name);
  */
  printf(" calling XOpenDisplay(NULL)\n");
  ret = func(0);
  printf("XOpenDisplay() returned %p\n", ret);
 return(ret);
  }
int XCloseDisplay(Display *display_name)
  { 
  static int (*func)(Display *); 
  int ret; 
  
  if(!func)
  func = (int (*)(Display *))dlsym(RTLD_NEXT, "XCloseDisplay"); 
  
  ret = func(display_name); 
  
  printf("called XCloseDisplay(%p)\n", display_name); 
  
  return(ret); 
  }


Related Reading


More Insights






Currently we allow the following HTML tags in comments:

Single tags

These tags can be used alone and don't need an ending tag.

<br> Defines a single line break

<hr> Defines a horizontal line

Matching tags

These require an ending tag - e.g. <i>italic text</i>

<a> Defines an anchor

<b> Defines bold text

<big> Defines big text

<blockquote> Defines a long quotation

<caption> Defines a table caption

<cite> Defines a citation

<code> Defines computer code text

<em> Defines emphasized text

<fieldset> Defines a border around elements in a form

<h1> This is heading 1

<h2> This is heading 2

<h3> This is heading 3

<h4> This is heading 4

<h5> This is heading 5

<h6> This is heading 6

<i> Defines italic text

<p> Defines a paragraph

<pre> Defines preformatted text

<q> Defines a short quotation

<samp> Defines sample computer code text

<small> Defines small text

<span> Defines a section in a document

<s> Defines strikethrough text

<strike> Defines strikethrough text

<strong> Defines strong text

<sub> Defines subscripted text

<sup> Defines superscripted text

<u> Defines underlined text

Dr. Dobb's encourages readers to engage in spirited, healthy debate, including taking us to task. However, Dr. Dobb's moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing or spam. Dr. Dobb's further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | View the list of supported HTML tags you can use to style comments. | Please read our commenting policy.