blob: 57463fbefa869538428f42a7ae079780ff63fa82 [file] [log] [blame]
sewardjde4a1d02002-03-22 01:27:54 +00001
2/*--------------------------------------------------------------------*/
nethercote71980f02004-01-24 18:18:54 +00003/*--- Startup: the real stuff vg_main.c ---*/
sewardjde4a1d02002-03-22 01:27:54 +00004/*--------------------------------------------------------------------*/
5
6/*
njnc9539842002-10-02 13:26:35 +00007 This file is part of Valgrind, an extensible x86 protected-mode
8 emulator for monitoring program execution on x86-Unixes.
sewardjde4a1d02002-03-22 01:27:54 +00009
nethercotebb1c9912004-01-04 16:43:23 +000010 Copyright (C) 2000-2004 Julian Seward
sewardjde4a1d02002-03-22 01:27:54 +000011 jseward@acm.org
sewardjde4a1d02002-03-22 01:27:54 +000012
13 This program is free software; you can redistribute it and/or
14 modify it under the terms of the GNU General Public License as
15 published by the Free Software Foundation; either version 2 of the
16 License, or (at your option) any later version.
17
18 This program is distributed in the hope that it will be useful, but
19 WITHOUT ANY WARRANTY; without even the implied warranty of
20 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
21 General Public License for more details.
22
23 You should have received a copy of the GNU General Public License
24 along with this program; if not, write to the Free Software
25 Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA
26 02111-1307, USA.
27
njn25e49d8e72002-09-23 09:36:25 +000028 The GNU General Public License is contained in the file COPYING.
sewardjde4a1d02002-03-22 01:27:54 +000029*/
30
nethercote71980f02004-01-24 18:18:54 +000031#define _FILE_OFFSET_BITS 64
sewardjde4a1d02002-03-22 01:27:54 +000032
nethercote71980f02004-01-24 18:18:54 +000033#include "vg_include.h"
34#include "ume.h"
35#include "ume_arch.h"
36#include "ume_archdefs.h"
37
38#include <dirent.h>
39#include <dlfcn.h>
40#include <errno.h>
41#include <fcntl.h>
42#include <stdio.h>
fitzhardingeb727d042004-01-06 00:18:21 +000043#include <stdlib.h>
nethercote71980f02004-01-24 18:18:54 +000044#include <string.h>
45#include <sys/mman.h>
46#include <sys/types.h>
47#include <sys/stat.h>
fitzhardingeb727d042004-01-06 00:18:21 +000048#include <sys/ptrace.h>
49#include <sys/signal.h>
fitzhardingeb727d042004-01-06 00:18:21 +000050#include <sys/wait.h>
51#include <unistd.h>
52
thughes74b8de22004-04-22 18:12:31 +000053#ifndef AT_DCACHEBSIZE
54#define AT_DCACHEBSIZE 19
55#endif /* AT_DCACHEBSIZE */
56
57#ifndef AT_ICACHEBSIZE
58#define AT_ICACHEBSIZE 20
59#endif /* AT_ICACHEBSIZE */
60
61#ifndef AT_UCACHEBSIZE
62#define AT_UCACHEBSIZE 21
63#endif /* AT_UCACHEBSIZE */
64
nethercote71980f02004-01-24 18:18:54 +000065#ifndef AT_SYSINFO
66#define AT_SYSINFO 32
67#endif /* AT_SYSINFO */
68
69#ifndef AT_SYSINFO_EHDR
70#define AT_SYSINFO_EHDR 33
71#endif /* AT_SYSINFO_EHDR */
72
73#ifndef AT_SECURE
74#define AT_SECURE 23 /* secure mode boolean */
75#endif /* AT_SECURE */
76
77/* Amount to reserve for Valgrind's internal heap */
78#define VALGRIND_HEAPSIZE (128*1024*1024)
79
80/* Amount to reserve for Valgrind's internal mappings */
81#define VALGRIND_MAPSIZE (128*1024*1024)
82
83/* redzone gap between client address space and shadow */
84#define REDZONE_SIZE (1 * 1024*1024)
85
86/* size multiple for client address space */
87#define CLIENT_SIZE_MULTIPLE (64 * 1024*1024)
88
89#define ISSPACE(cc) ((cc) == ' ' || (cc) == '\t' || (cc) == '\n')
90
91/*====================================================================*/
92/*=== Global entities not referenced from generated code ===*/
93/*====================================================================*/
94
sewardjde4a1d02002-03-22 01:27:54 +000095/* ---------------------------------------------------------------------
nethercote71980f02004-01-24 18:18:54 +000096 Startup stuff
sewardjde4a1d02002-03-22 01:27:54 +000097 ------------------------------------------------------------------ */
nethercote71980f02004-01-24 18:18:54 +000098/* linker-defined base address */
99extern char kickstart_base;
sewardjde4a1d02002-03-22 01:27:54 +0000100
nethercote71980f02004-01-24 18:18:54 +0000101/* Client address space, lowest to highest (see top of ume.c) */
102Addr VG_(client_base); /* client address space limits */
fitzhardinge98abfc72003-12-16 02:05:15 +0000103Addr VG_(client_end);
104Addr VG_(client_mapbase);
fitzhardinge92360792003-12-24 10:11:11 +0000105Addr VG_(client_trampoline_code);
fitzhardinge98abfc72003-12-16 02:05:15 +0000106Addr VG_(clstk_base);
107Addr VG_(clstk_end);
nethercote71980f02004-01-24 18:18:54 +0000108
109Addr VG_(brk_base); /* start of brk */
110Addr VG_(brk_limit); /* current brk */
111
112Addr VG_(shadow_base); /* skin's shadow memory */
fitzhardinge98abfc72003-12-16 02:05:15 +0000113Addr VG_(shadow_end);
nethercote71980f02004-01-24 18:18:54 +0000114
115Addr VG_(valgrind_base); /* valgrind's address range */
116Addr VG_(valgrind_mmap_end); /* valgrind's mmaps are between valgrind_base and here */
fitzhardinge98abfc72003-12-16 02:05:15 +0000117Addr VG_(valgrind_end);
118
fitzhardingeb50068f2004-02-24 23:42:55 +0000119vki_rlimit VG_(client_rlimit_data);
120
nethercote71980f02004-01-24 18:18:54 +0000121/* This is set early to indicate whether this CPU has the
122 SSE/fxsave/fxrestor features. */
123Bool VG_(have_ssestate);
124
125/* Indicates presence, and holds address of client's sysinfo page, a
126 feature of some modern kernels used to provide vsyscalls, etc. */
127Bool VG_(sysinfo_page_exists) = False;
128Addr VG_(sysinfo_page_addr) = 0;
129
fitzhardinge98abfc72003-12-16 02:05:15 +0000130/* stage1 (main) executable */
fitzhardingea49f9b52003-12-16 22:26:45 +0000131Int VG_(vgexecfd) = -1;
132
133/* client executable */
134Int VG_(clexecfd) = -1;
fitzhardinge98abfc72003-12-16 02:05:15 +0000135
136/* Path to library directory */
137const Char *VG_(libdir) = VG_LIBDIR;
138
139/* our argc/argv */
140Int VG_(vg_argc);
141Char **VG_(vg_argv);
142
jsgf855d93d2003-10-13 22:26:55 +0000143/* PID of the main thread */
144Int VG_(main_pid);
145
146/* PGRP of process */
147Int VG_(main_pgrp);
njn25e49d8e72002-09-23 09:36:25 +0000148
fitzhardingef0046f22003-12-18 02:39:22 +0000149/* Maximum allowed application-visible file descriptor */
fitzhardingeb791a192003-12-18 07:22:44 +0000150Int VG_(max_fd) = -1;
fitzhardingef0046f22003-12-18 02:39:22 +0000151
nethercote71980f02004-01-24 18:18:54 +0000152/* As deduced from esp_at_startup, the client's argc, argv[] and
153 envp[] as extracted from the client's stack at startup-time. */
154Int VG_(client_argc);
155Char** VG_(client_argv);
156Char** VG_(client_envp);
sewardjde4a1d02002-03-22 01:27:54 +0000157
158/* ---------------------------------------------------------------------
nethercote71980f02004-01-24 18:18:54 +0000159 Running stuff
sewardjde4a1d02002-03-22 01:27:54 +0000160 ------------------------------------------------------------------ */
nethercote71980f02004-01-24 18:18:54 +0000161/* Our signal delivery stack. */
njn6eba4ef2003-05-01 08:06:41 +0000162UInt VG_(sigstack)[VG_SIGSTACK_SIZE_W];
sewardjde4a1d02002-03-22 01:27:54 +0000163
164/* Saving stuff across system calls. */
sewardjb91ae7f2003-04-29 23:50:00 +0000165__attribute__ ((aligned (16)))
166UInt VG_(real_sse_state_saved_over_syscall)[VG_SIZE_OF_SSESTATE_W];
sewardj43c356f2002-06-02 00:21:08 +0000167Addr VG_(esp_saved_over_syscall);
sewardjde4a1d02002-03-22 01:27:54 +0000168
nethercote71980f02004-01-24 18:18:54 +0000169/* jmp_buf for fatal signals */
170Int VG_(fatal_sigNo) = -1;
171Bool VG_(fatal_signal_set) = False;
172jmp_buf VG_(fatal_signal_jmpbuf);
sewardjde4a1d02002-03-22 01:27:54 +0000173
nethercote71980f02004-01-24 18:18:54 +0000174/* Counts downwards in VG_(run_innerloop). */
175UInt VG_(dispatch_ctr);
sewardjde4a1d02002-03-22 01:27:54 +0000176
177/* 64-bit counter for the number of basic blocks done. */
178ULong VG_(bbs_done);
sewardjde4a1d02002-03-22 01:27:54 +0000179
sewardj7e87e382002-05-03 19:09:05 +0000180/* This is the ThreadId of the last thread the scheduler ran. */
181ThreadId VG_(last_run_tid) = 0;
182
nethercote71980f02004-01-24 18:18:54 +0000183/* Tell the logging mechanism whether we are logging to a file
184 descriptor or a socket descriptor. */
185Bool VG_(logging_to_filedes) = True;
186
187/* This Bool is needed by wrappers in vg_clientmalloc.c to decide how
188 to behave. Initially we say False. */
189Bool VG_(running_on_simd_CPU) = False;
190
njn25e49d8e72002-09-23 09:36:25 +0000191/* This is the argument to __NR_exit() supplied by the first thread to
192 call that syscall. We eventually pass that to __NR_exit() for
193 real. */
njn633de322003-05-12 20:40:13 +0000194Int VG_(exitcode) = 0;
njn25e49d8e72002-09-23 09:36:25 +0000195
sewardj73cf3bc2002-11-03 03:20:15 +0000196
nethercote71980f02004-01-24 18:18:54 +0000197/*====================================================================*/
198/*=== Counters, for profiling purposes only ===*/
199/*====================================================================*/
sewardjde4a1d02002-03-22 01:27:54 +0000200
201/* Number of lookups which miss the fast tt helper. */
202UInt VG_(tt_fast_misses) = 0;
203
204
sewardjc0d8f682002-11-30 00:49:43 +0000205/* Counts for TT/TC informational messages. */
sewardjde4a1d02002-03-22 01:27:54 +0000206
sewardjde4a1d02002-03-22 01:27:54 +0000207/* Number and total o/t size of translations overall. */
208UInt VG_(overall_in_count) = 0;
209UInt VG_(overall_in_osize) = 0;
210UInt VG_(overall_in_tsize) = 0;
211/* Number and total o/t size of discards overall. */
212UInt VG_(overall_out_count) = 0;
213UInt VG_(overall_out_osize) = 0;
214UInt VG_(overall_out_tsize) = 0;
sewardjc0d8f682002-11-30 00:49:43 +0000215/* The number of discards of TT/TC. */
216UInt VG_(number_of_tc_discards) = 0;
sewardj22854b92002-11-30 14:00:47 +0000217/* Counts of chain and unchain operations done. */
218UInt VG_(bb_enchain_count) = 0;
219UInt VG_(bb_dechain_count) = 0;
220/* Number of unchained jumps performed. */
221UInt VG_(unchained_jumps_done) = 0;
sewardjde4a1d02002-03-22 01:27:54 +0000222
223
224/* Counts pertaining to the register allocator. */
225
226/* total number of uinstrs input to reg-alloc */
227UInt VG_(uinstrs_prealloc) = 0;
228
229/* total number of uinstrs added due to spill code */
230UInt VG_(uinstrs_spill) = 0;
231
232/* number of bbs requiring spill code */
233UInt VG_(translations_needing_spill) = 0;
234
235/* total of register ranks over all translations */
236UInt VG_(total_reg_rank) = 0;
237
238
sewardjde4a1d02002-03-22 01:27:54 +0000239/* Counts pertaining to internal sanity checking. */
sewardjde4a1d02002-03-22 01:27:54 +0000240UInt VG_(sanity_fast_count) = 0;
241UInt VG_(sanity_slow_count) = 0;
242
sewardj2e93c502002-04-12 11:12:52 +0000243/* Counts pertaining to the scheduler. */
244UInt VG_(num_scheduling_events_MINOR) = 0;
245UInt VG_(num_scheduling_events_MAJOR) = 0;
sewardjde4a1d02002-03-22 01:27:54 +0000246
247
nethercote71980f02004-01-24 18:18:54 +0000248static __inline__ Int safe_idiv(Int a, Int b)
249{
250 return (b == 0 ? 0 : a / b);
251}
252
253static void show_counts ( void )
254{
255 VG_(message)(Vg_DebugMsg,
256 " TT/TC: %d tc sectors discarded.",
257 VG_(number_of_tc_discards) );
258 VG_(message)(Vg_DebugMsg,
259 " %d chainings, %d unchainings.",
260 VG_(bb_enchain_count), VG_(bb_dechain_count) );
261 VG_(message)(Vg_DebugMsg,
262 "translate: new %d (%d -> %d; ratio %d:10)",
263 VG_(overall_in_count),
264 VG_(overall_in_osize),
265 VG_(overall_in_tsize),
266 safe_idiv(10*VG_(overall_in_tsize), VG_(overall_in_osize)));
267 VG_(message)(Vg_DebugMsg,
268 " discard %d (%d -> %d; ratio %d:10).",
269 VG_(overall_out_count),
270 VG_(overall_out_osize),
271 VG_(overall_out_tsize),
272 safe_idiv(10*VG_(overall_out_tsize), VG_(overall_out_osize)));
273 VG_(message)(Vg_DebugMsg,
274 " dispatch: %llu jumps (bb entries), of which %u (%lu%%) were unchained.",
275 VG_(bbs_done),
276 VG_(unchained_jumps_done),
277 ((ULong)(100) * (ULong)(VG_(unchained_jumps_done)))
278 / ( VG_(bbs_done)==0 ? 1 : VG_(bbs_done) )
279 );
280
281 VG_(message)(Vg_DebugMsg,
282 " %d/%d major/minor sched events. %d tt_fast misses.",
283 VG_(num_scheduling_events_MAJOR),
284 VG_(num_scheduling_events_MINOR),
285 VG_(tt_fast_misses));
286
287 VG_(message)(Vg_DebugMsg,
288 "reg-alloc: %d t-req-spill, "
289 "%d+%d orig+spill uis, %d total-reg-r.",
290 VG_(translations_needing_spill),
291 VG_(uinstrs_prealloc),
292 VG_(uinstrs_spill),
293 VG_(total_reg_rank) );
294 VG_(message)(Vg_DebugMsg,
295 " sanity: %d cheap, %d expensive checks.",
296 VG_(sanity_fast_count),
297 VG_(sanity_slow_count) );
298 VG_(print_ccall_stats)();
299}
300
301
302/*====================================================================*/
303/*=== Miscellaneous global functions ===*/
304/*====================================================================*/
305
nethercote04d0fbc2004-01-26 16:48:06 +0000306/* Start debugger and get it to attach to this process. Called if the
307 user requests this service after an error has been shown, so she can
nethercote71980f02004-01-24 18:18:54 +0000308 poke around and look at parameters, memory, etc. You can't
nethercote04d0fbc2004-01-26 16:48:06 +0000309 meaningfully get the debugger to continue the program, though; to
310 continue, quit the debugger. */
311void VG_(start_debugger) ( Int tid )
nethercote71980f02004-01-24 18:18:54 +0000312{
313 Int pid;
314
315 if ((pid = fork()) == 0) {
316 ptrace(PTRACE_TRACEME, 0, NULL, NULL);
317 VG_(kkill)(VG_(getpid)(), VKI_SIGSTOP);
318
319 } else if (pid > 0) {
320 struct user_regs_struct regs;
321 Int status;
322 Int res;
323
324 if (VG_(is_running_thread)( tid )) {
fitzhardinged65dcad2004-03-13 02:06:58 +0000325 regs.cs = VG_(baseBlock)[VGOFF_(m_cs)];
326 regs.ss = VG_(baseBlock)[VGOFF_(m_ss)];
327 regs.ds = VG_(baseBlock)[VGOFF_(m_ds)];
328 regs.es = VG_(baseBlock)[VGOFF_(m_es)];
329 regs.fs = VG_(baseBlock)[VGOFF_(m_fs)];
330 regs.gs = VG_(baseBlock)[VGOFF_(m_gs)];
nethercote71980f02004-01-24 18:18:54 +0000331 regs.eax = VG_(baseBlock)[VGOFF_(m_eax)];
332 regs.ebx = VG_(baseBlock)[VGOFF_(m_ebx)];
333 regs.ecx = VG_(baseBlock)[VGOFF_(m_ecx)];
334 regs.edx = VG_(baseBlock)[VGOFF_(m_edx)];
335 regs.esi = VG_(baseBlock)[VGOFF_(m_esi)];
336 regs.edi = VG_(baseBlock)[VGOFF_(m_edi)];
337 regs.ebp = VG_(baseBlock)[VGOFF_(m_ebp)];
338 regs.esp = VG_(baseBlock)[VGOFF_(m_esp)];
339 regs.eflags = VG_(baseBlock)[VGOFF_(m_eflags)];
340 regs.eip = VG_(baseBlock)[VGOFF_(m_eip)];
341 } else {
342 ThreadState* tst = & VG_(threads)[ tid ];
343
fitzhardinged65dcad2004-03-13 02:06:58 +0000344 regs.cs = tst->m_cs;
345 regs.ss = tst->m_ss;
346 regs.ds = tst->m_ds;
347 regs.es = tst->m_es;
348 regs.fs = tst->m_fs;
349 regs.gs = tst->m_gs;
nethercote71980f02004-01-24 18:18:54 +0000350 regs.eax = tst->m_eax;
351 regs.ebx = tst->m_ebx;
352 regs.ecx = tst->m_ecx;
353 regs.edx = tst->m_edx;
354 regs.esi = tst->m_esi;
355 regs.edi = tst->m_edi;
356 regs.ebp = tst->m_ebp;
357 regs.esp = tst->m_esp;
358 regs.eflags = tst->m_eflags;
359 regs.eip = tst->m_eip;
360 }
361
362 if ((res = VG_(waitpid)(pid, &status, 0)) == pid &&
363 WIFSTOPPED(status) && WSTOPSIG(status) == SIGSTOP &&
364 ptrace(PTRACE_SETREGS, pid, NULL, &regs) == 0 &&
thughes1d160052004-04-21 15:39:57 +0000365 kill(pid, SIGSTOP) == 0 &&
366 ptrace(PTRACE_DETACH, pid, NULL, 0) == 0) {
nethercote04d0fbc2004-01-26 16:48:06 +0000367 Char pidbuf[15];
368 Char file[30];
369 Char buf[100];
370 Char *bufptr;
371 Char *cmdptr;
372
373 VG_(sprintf)(pidbuf, "%d", pid);
374 VG_(sprintf)(file, "/proc/%d/fd/%d", pid, VG_(clexecfd));
375
376 bufptr = buf;
377 cmdptr = VG_(clo_db_command);
378
379 while (*cmdptr) {
380 switch (*cmdptr) {
381 case '%':
382 switch (*++cmdptr) {
383 case 'f':
384 VG_(memcpy)(bufptr, file, VG_(strlen)(file));
385 bufptr += VG_(strlen)(file);
386 cmdptr++;
387 break;
388 case 'p':
389 VG_(memcpy)(bufptr, pidbuf, VG_(strlen)(pidbuf));
390 bufptr += VG_(strlen)(pidbuf);
391 cmdptr++;
392 break;
393 default:
394 *bufptr++ = *cmdptr++;
395 break;
396 }
397 break;
398 default:
399 *bufptr++ = *cmdptr++;
400 break;
401 }
402 }
403
404 *bufptr++ = '\0';
405
406 VG_(message)(Vg_UserMsg, "starting debugger with cmd: %s", buf);
nethercote71980f02004-01-24 18:18:54 +0000407 res = VG_(system)(buf);
408 if (res == 0) {
409 VG_(message)(Vg_UserMsg, "");
410 VG_(message)(Vg_UserMsg,
nethercote04d0fbc2004-01-26 16:48:06 +0000411 "Debugger has detached. Valgrind regains control. We continue.");
nethercote71980f02004-01-24 18:18:54 +0000412 } else {
413 VG_(message)(Vg_UserMsg, "Apparently failed!");
414 VG_(message)(Vg_UserMsg, "");
415 }
416 }
417
418 VG_(kkill)(pid, VKI_SIGKILL);
419 VG_(waitpid)(pid, &status, 0);
420 }
421}
422
423
424/* Print some helpful-ish text about unimplemented things, and give
425 up. */
426void VG_(unimplemented) ( Char* msg )
427{
428 VG_(message)(Vg_UserMsg, "");
429 VG_(message)(Vg_UserMsg,
430 "Valgrind detected that your program requires");
431 VG_(message)(Vg_UserMsg,
432 "the following unimplemented functionality:");
433 VG_(message)(Vg_UserMsg, " %s", msg);
434 VG_(message)(Vg_UserMsg,
435 "This may be because the functionality is hard to implement,");
436 VG_(message)(Vg_UserMsg,
437 "or because no reasonable program would behave this way,");
438 VG_(message)(Vg_UserMsg,
439 "or because nobody has yet needed it. In any case, let us know at");
440 VG_(message)(Vg_UserMsg,
441 "%s and/or try to work around the problem, if you can.", VG_BUGS_TO);
442 VG_(message)(Vg_UserMsg,
443 "");
444 VG_(message)(Vg_UserMsg,
445 "Valgrind has to exit now. Sorry. Bye!");
446 VG_(message)(Vg_UserMsg,
447 "");
448 VG_(pp_sched_status)();
449 VG_(exit)(1);
450}
451
452Addr VG_(get_stack_pointer) ( void )
453{
454 return VG_(baseBlock)[VGOFF_(m_esp)];
455}
456
457/* Debugging thing .. can be called from assembly with OYNK macro. */
458void VG_(oynk) ( Int n )
459{
460 OINK(n);
461}
462
463/* Initialize the PID and PGRP of scheduler LWP; this is also called
464 in any new children after fork. */
465static void newpid(ThreadId unused)
466{
467 /* PID of scheduler LWP */
468 VG_(main_pid) = VG_(getpid)();
469 VG_(main_pgrp) = VG_(getpgrp)();
470}
471
472/*====================================================================*/
473/*=== Check we were launched by stage 1 ===*/
474/*====================================================================*/
475
476/* Look for our AUXV table */
477static void scan_auxv(void)
478{
479 const struct ume_auxv *auxv = find_auxv((int *)ume_exec_esp);
480 int found = 0;
481
482 for (; auxv->a_type != AT_NULL; auxv++)
483 switch(auxv->a_type) {
484 case AT_UME_PADFD:
485 as_setpadfd(auxv->u.a_val);
486 found |= 1;
487 break;
488
489 case AT_UME_EXECFD:
490 VG_(vgexecfd) = auxv->u.a_val;
491 found |= 2;
492 break;
493 }
494
495 if ( ! (1|2) ) {
496 fprintf(stderr, "stage2 must be launched by stage1\n");
497 exit(127);
498 }
499}
500
501
502/*====================================================================*/
503/*=== Address space determination ===*/
504/*====================================================================*/
505
506/* Pad client space so it doesn't get filled in before the right time */
507static void layout_client_space(Addr argc_addr)
508{
509 VG_(client_base) = CLIENT_BASE;
510 VG_(valgrind_mmap_end) = (addr_t)&kickstart_base; /* end of V's mmaps */
511 VG_(valgrind_base) = VG_(valgrind_mmap_end) - VALGRIND_MAPSIZE;
512 VG_(valgrind_end) = ROUNDUP(argc_addr, 0x10000); /* stack */
513
514 if (0)
515 printf("client base: %x\n"
516 "valgrind base--end: %x--%x (%x)\n"
517 "valgrind mmap end: %x\n\n",
518 VG_(client_base),
519 VG_(valgrind_base), VG_(valgrind_end),
520 VG_(valgrind_end) - VG_(valgrind_base),
521 VG_(valgrind_mmap_end));
522
523 as_pad((void *)VG_(client_base), (void *)VG_(valgrind_base));
524}
525
526static void layout_remaining_space(float ratio)
527{
528 /* This tries to give the client as large as possible address space while
529 * taking into account the tool's shadow needs. */
530 addr_t client_size = ROUNDDN((VG_(valgrind_base) - REDZONE_SIZE) / (1. + ratio),
531 CLIENT_SIZE_MULTIPLE);
532 addr_t shadow_size = PGROUNDUP(client_size * ratio);
533
534 VG_(client_end) = VG_(client_base) + client_size;
535 VG_(client_mapbase) = PGROUNDDN((client_size/4)*3); /* where !FIXED mmap goes */
536 VG_(client_trampoline_code) = VG_(client_end) - VKI_BYTES_PER_PAGE;
537
538 VG_(shadow_base) = VG_(client_end) + REDZONE_SIZE;
539 VG_(shadow_end) = VG_(shadow_base) + shadow_size;
540
541 if (0)
542 printf("client base--end: %x--%x (%x)\n"
543 "client mapbase: %x\n"
544 "shadow base--end: %x--%x (%x)\n\n",
545 VG_(client_base), VG_(client_end), client_size,
546 VG_(client_mapbase),
547 VG_(shadow_base), VG_(shadow_end), shadow_size);
548
549 // Ban redzone
550 mmap((void *)VG_(client_end), REDZONE_SIZE, PROT_NONE,
551 MAP_FIXED|MAP_ANON|MAP_PRIVATE, -1, 0);
552
553 // Make client hole
554 munmap((void*)VG_(client_base), client_size);
555
556 // Map shadow memory.
557 // Initially all inaccessible, incrementally initialized as it is used
558 if (shadow_size != 0)
559 mmap((char *)VG_(shadow_base), shadow_size, PROT_NONE,
560 MAP_PRIVATE|MAP_ANON|MAP_FIXED, -1, 0);
561}
562
563/*====================================================================*/
564/*=== Command line setup ===*/
565/*====================================================================*/
566
567/* Nb: malloc'd memory never freed -- kept throughout like argv, envp */
568static char* get_file_clo(char* dir)
569{
570# define FLEN 512
571 Int fd, n;
572 struct stat s1;
573 char* f_clo = NULL;
574 char filename[FLEN];
575
576 snprintf(filename, FLEN, "%s/.valgrindrc", ( NULL == dir ? "" : dir ) );
577 fd = VG_(open)(filename, 0, VKI_S_IRUSR);
578 if ( fd > 0 ) {
579 if ( 0 == fstat(fd, &s1) ) {
580 f_clo = malloc(s1.st_size+1);
581 vg_assert(f_clo);
582 n = read(fd, f_clo, s1.st_size);
583 if (n == -1) n = 0;
584 f_clo[n] = '\0';
585 }
586 close(fd);
587 }
588 return f_clo;
589# undef FLEN
590}
591
592static Int count_args(char* s)
593{
594 Int n = 0;
595 if (s) {
596 char* cp = s;
597 while (True) {
598 // We have alternating sequences: blanks, non-blanks, blanks...
599 // count the non-blanks sequences.
600 while ( ISSPACE(*cp) ) cp++;
601 if ( !*cp ) break;
602 n++;
603 while ( !ISSPACE(*cp) && *cp ) cp++;
604 }
605 }
606 return n;
607}
608
609/* add args out of environment, skipping multiple spaces and -- args */
610static char** copy_args( char* s, char** to )
611{
612 if (s) {
613 char* cp = s;
614 while (True) {
615 // We have alternating sequences: blanks, non-blanks, blanks...
616 // copy the non-blanks sequences, and add terminating '\0'
617 while ( ISSPACE(*cp) ) cp++;
618 if ( !*cp ) break;
619 *to++ = cp;
620 while ( !ISSPACE(*cp) && *cp ) cp++;
621 if ( *cp ) *cp++ = '\0'; // terminate if necessary
622 if (VG_STREQ(to[-1], "--")) to--; // undo any '--' arg
623 }
624 }
625 return to;
626}
627
628// Augment command line with arguments from environment and .valgrindrc
629// files.
630static void augment_command_line(Int* vg_argc_inout, char*** vg_argv_inout)
631{
632 int vg_argc = *vg_argc_inout;
633 char** vg_argv = *vg_argv_inout;
634
635 char* env_clo = getenv(VALGRINDOPTS);
636 char* f1_clo = get_file_clo( getenv("HOME") );
637 char* f2_clo = get_file_clo(".");
638
639 /* copy any extra args from file or environment, if present */
640 if ( (env_clo && *env_clo) || (f1_clo && *f1_clo) || (f2_clo && *f2_clo) ) {
641 /* ' ' separated extra options */
642 char **from;
643 char **to;
644 int env_arg_count, f1_arg_count, f2_arg_count;
645
646 env_arg_count = count_args(env_clo);
647 f1_arg_count = count_args(f1_clo);
648 f2_arg_count = count_args(f2_clo);
649
650 if (0)
651 printf("extra-argc=%d %d %d\n",
652 env_arg_count, f1_arg_count, f2_arg_count);
653
654 /* +2: +1 for null-termination, +1 for added '--' */
655 from = vg_argv;
656 vg_argv = malloc( (vg_argc + env_arg_count + f1_arg_count
657 + f2_arg_count + 2) * sizeof(char **));
658 to = vg_argv;
659
660 /* copy argv[0] */
661 *to++ = *from++;
662
663 /* Copy extra args from env var and file, in the order: ~/.valgrindrc,
664 * $VALGRIND_OPTS, ./.valgrindrc -- more local options are put later
665 * to override less local ones. */
666 to = copy_args(f1_clo, to);
667 to = copy_args(env_clo, to);
668 to = copy_args(f2_clo, to);
669
670 /* copy original arguments, stopping at command or -- */
671 while (*from) {
672 if (**from != '-')
673 break;
674 if (VG_STREQ(*from, "--")) {
675 from++; /* skip -- */
676 break;
677 }
678 *to++ = *from++;
679 }
680
681 /* add -- */
682 *to++ = "--";
683
684 vg_argc = to - vg_argv;
685
686 /* copy rest of original command line, then NULL */
687 while (*from) *to++ = *from++;
688 *to = NULL;
689 }
690
691 *vg_argc_inout = vg_argc;
692 *vg_argv_inout = vg_argv;
693}
694
695static void get_command_line( int argc, char** argv,
696 Int* vg_argc_out, Char*** vg_argv_out,
697 char*** cl_argv_out )
698{
699 int vg_argc;
700 char** vg_argv;
701 char** cl_argv;
702 char* env_clo = getenv(VALGRINDCLO);
703
704 if (env_clo != NULL && *env_clo != '\0') {
705 char *cp;
706 char **cpp;
707
708 /* OK, we're getting all our arguments from the environment - the
709 entire command line belongs to the client (including argv[0]) */
710 vg_argc = 1; /* argv[0] */
711 for (cp = env_clo; *cp; cp++)
712 if (*cp == '\01')
713 vg_argc++;
714
715 vg_argv = malloc(sizeof(char **) * (vg_argc + 1));
716
717 cpp = vg_argv;
718
719 *cpp++ = "valgrind"; /* nominal argv[0] */
720 *cpp++ = env_clo;
721
722 for (cp = env_clo; *cp; cp++) {
723 if (*cp == '\01') {
724 *cp++ = '\0'; /* chop it up in place */
725 *cpp++ = cp;
726 }
727 }
728 *cpp = NULL;
729 cl_argv = argv;
730
731 } else {
732 /* Count the arguments on the command line. */
733 vg_argv = argv;
734
735 for (vg_argc = 1; vg_argc < argc; vg_argc++) {
736 if (argv[vg_argc][0] != '-') /* exe name */
737 break;
738 if (VG_STREQ(argv[vg_argc], "--")) { /* dummy arg */
739 vg_argc++;
740 break;
741 }
742 }
743 cl_argv = &argv[vg_argc];
744
745 /* Get extra args from VALGRIND_OPTS and .valgrindrc files.
746 * Note we don't do this if getting args from VALGRINDCLO. */
747 augment_command_line(&vg_argc, &vg_argv);
748 }
749
750 if (0) {
751 Int i;
752 for (i = 0; i < vg_argc; i++)
753 printf("vg_argv[%d]=\"%s\"\n", i, vg_argv[i]);
754 }
755
756 *vg_argc_out = vg_argc;
757 *vg_argv_out = (Char**)vg_argv;
758 *cl_argv_out = cl_argv;
759}
760
761
762/*====================================================================*/
763/*=== Environment and stack setup ===*/
764/*====================================================================*/
765
766/* Scan a colon-separated list, and call a function on each element.
767 The string must be mutable, because we insert a temporary '\0', but
768 the string will end up unmodified. (*func) should return 1 if it
769 doesn't need to see any more.
770*/
771static void scan_colsep(char *colsep, int (*func)(const char *))
772{
773 char *cp, *entry;
774 int end;
775
776 if (colsep == NULL ||
777 *colsep == '\0')
778 return;
779
780 entry = cp = colsep;
781
782 do {
783 end = (*cp == '\0');
784
785 if (*cp == ':' || *cp == '\0') {
786 char save = *cp;
787
788 *cp = '\0';
789 if ((*func)(entry))
790 end = 1;
791 *cp = save;
792 entry = cp+1;
793 }
794 cp++;
795 } while(!end);
796}
797
798/* Prepare the client's environment. This is basically a copy of our
799 environment, except:
800 1. LD_LIBRARY_PATH=$VALGRINDLIB:$LD_LIBRARY_PATH
801 2. LD_PRELOAD=$VALGRINDLIB/vg_inject.so:($VALGRINDLIB/vgpreload_TOOL.so:)?$LD_PRELOAD
802
803 If any of these is missing, then it is added.
804
805 Yummy. String hacking in C.
806
807 If this needs to handle any more variables it should be hacked
808 into something table driven.
809 */
810static char **fix_environment(char **origenv, const char *preload)
811{
812 static const char inject_so[] = "vg_inject.so";
813 static const char ld_library_path[] = "LD_LIBRARY_PATH=";
814 static const char ld_preload[] = "LD_PRELOAD=";
815 static const char valgrind_clo[] = VALGRINDCLO "=";
816 static const int ld_library_path_len = sizeof(ld_library_path)-1;
817 static const int ld_preload_len = sizeof(ld_preload)-1;
818 static const int valgrind_clo_len = sizeof(valgrind_clo)-1;
819 int ld_preload_done = 0;
820 int ld_library_path_done = 0;
821 char *inject_path;
822 int inject_path_len;
823 int vgliblen = strlen(VG_(libdir));
824 char **cpp;
825 char **ret;
826 int envc;
827 const int preloadlen = (preload == NULL) ? 0 : strlen(preload);
828
829 /* Find the vg_inject.so; also make room for the tool preload
830 library */
831 inject_path_len = sizeof(inject_so) + vgliblen + preloadlen + 16;
832 inject_path = malloc(inject_path_len);
833
834 if (preload)
835 snprintf(inject_path, inject_path_len, "%s/%s:%s",
836 VG_(libdir), inject_so, preload);
837 else
838 snprintf(inject_path, inject_path_len, "%s/%s",
839 VG_(libdir), inject_so);
840
841 /* Count the original size of the env */
842 envc = 0; /* trailing NULL */
843 for (cpp = origenv; cpp && *cpp; cpp++)
844 envc++;
845
846 /* Allocate a new space */
847 ret = malloc(sizeof(char *) * (envc+3+1)); /* 3 new entries + NULL */
848
849 /* copy it over */
850 for (cpp = ret; *origenv; )
851 *cpp++ = *origenv++;
852 *cpp = NULL;
853
854 vg_assert(envc == (cpp - ret));
855
856 /* Walk over the new environment, mashing as we go */
857 for (cpp = ret; cpp && *cpp; cpp++) {
858 if (memcmp(*cpp, ld_library_path, ld_library_path_len) == 0) {
859 int done = 0;
860 int contains(const char *p) {
861 if (VG_STREQ(p, VG_(libdir))) {
862 done = 1;
863 return 1;
864 }
865 return 0;
866 }
867
868 /* If the LD_LIBRARY_PATH already contains libdir, then don't
869 bother adding it again, even if it isn't the first (it
870 seems that the Java runtime will keep reexecing itself
871 unless its paths are at the front of LD_LIBRARY_PATH) */
872 scan_colsep(*cpp + ld_library_path_len, contains);
873
874 if (!done) {
875 int len = strlen(*cpp) + vgliblen*2 + 16;
876 char *cp = malloc(len);
877
878 snprintf(cp, len, "%s%s:%s",
879 ld_library_path, VG_(libdir),
880 (*cpp)+ld_library_path_len);
881
882 *cpp = cp;
883 }
884
885 ld_library_path_done = 1;
886 } else if (memcmp(*cpp, ld_preload, ld_preload_len) == 0) {
887 int len = strlen(*cpp) + inject_path_len;
888 char *cp = malloc(len);
889
890 snprintf(cp, len, "%s%s:%s",
891 ld_preload, inject_path, (*cpp)+ld_preload_len);
892
893 *cpp = cp;
894
895 ld_preload_done = 1;
896 } else if (memcmp(*cpp, valgrind_clo, valgrind_clo_len) == 0) {
897 *cpp = "";
898 }
899 }
900
901 /* Add the missing bits */
902
903 if (!ld_library_path_done) {
904 int len = ld_library_path_len + vgliblen*2 + 16;
905 char *cp = malloc(len);
906
907 snprintf(cp, len, "%s%s", ld_library_path, VG_(libdir));
908
909 ret[envc++] = cp;
910 }
911
912 if (!ld_preload_done) {
913 int len = ld_preload_len + inject_path_len;
914 char *cp = malloc(len);
915
916 snprintf(cp, len, "%s%s",
917 ld_preload, inject_path);
918
919 ret[envc++] = cp;
920 }
921
922 ret[envc] = NULL;
923
924 return ret;
925}
926
927extern char **environ; /* our environment */
928//#include <error.h>
929
930/* Add a string onto the string table, and return its address */
931static char *copy_str(char **tab, const char *str)
932{
933 char *cp = *tab;
934 char *orig = cp;
935
936 while(*str)
937 *cp++ = *str++;
938 *cp++ = '\0';
939
940 if (0)
941 printf("copied %p \"%s\" len %d\n",
942 orig, orig, cp-orig);
943
944 *tab = cp;
945
946 return orig;
947}
948
949/*
950 This sets up the client's initial stack, containing the args,
951 environment and aux vector.
952
953 The format of the stack is:
954
955 higher address +-----------------+
956 | Trampoline code |
957 +-----------------+
958 | |
959 : string table :
960 | |
961 +-----------------+
962 | AT_NULL |
963 - -
964 | auxv |
965 +-----------------+
966 | NULL |
967 - -
968 | envp |
969 +-----------------+
970 | NULL |
971 - -
972 | argv |
973 +-----------------+
974 | argc |
975 lower address +-----------------+ <- esp
976 | undefined |
977 : :
978 */
979static Addr setup_client_stack(char **orig_argv, char **orig_envp,
980 const struct exeinfo *info,
981 UInt** client_auxv)
982{
983 char **cpp;
984 char *strtab; /* string table */
985 char *stringbase;
986 addr_t *ptr;
987 struct ume_auxv *auxv;
988 const struct ume_auxv *orig_auxv;
989 const struct ume_auxv *cauxv;
990 unsigned stringsize; /* total size of strings in bytes */
991 unsigned auxsize; /* total size of auxv in bytes */
992 int argc; /* total argc */
993 int envc; /* total number of env vars */
994 unsigned stacksize; /* total client stack size */
995 addr_t cl_esp; /* client stack base (initial esp) */
996
997 /* use our own auxv as a prototype */
998 orig_auxv = find_auxv(ume_exec_esp);
999
1000 /* ==================== compute sizes ==================== */
1001
1002 /* first of all, work out how big the client stack will be */
1003 stringsize = 0;
1004
1005 /* paste on the extra args if the loader needs them (ie, the #!
1006 interpreter and its argument) */
1007 argc = 0;
1008 if (info->argv0 != NULL) {
1009 argc++;
1010 stringsize += strlen(info->argv0) + 1;
1011 }
1012 if (info->argv1 != NULL) {
1013 argc++;
1014 stringsize += strlen(info->argv1) + 1;
1015 }
1016
1017 /* now scan the args we're given... */
1018 for (cpp = orig_argv; *cpp; cpp++) {
1019 argc++;
1020 stringsize += strlen(*cpp) + 1;
1021 }
1022
1023 /* ...and the environment */
1024 envc = 0;
1025 for (cpp = orig_envp; cpp && *cpp; cpp++) {
1026 envc++;
1027 stringsize += strlen(*cpp) + 1;
1028 }
1029
1030 /* now, how big is the auxv? */
1031 auxsize = sizeof(*auxv); /* there's always at least one entry: AT_NULL */
1032 for (cauxv = orig_auxv; cauxv->a_type != AT_NULL; cauxv++) {
1033 if (cauxv->a_type == AT_PLATFORM)
1034 stringsize += strlen(cauxv->u.a_ptr) + 1;
1035 auxsize += sizeof(*cauxv);
1036 }
1037
1038 /* OK, now we know how big the client stack is */
1039 stacksize =
1040 sizeof(int) + /* argc */
1041 sizeof(char **)*argc + /* argv */
1042 sizeof(char **) + /* terminal NULL */
1043 sizeof(char **)*envc + /* envp */
1044 sizeof(char **) + /* terminal NULL */
1045 auxsize + /* auxv */
1046 ROUNDUP(stringsize, sizeof(int)) +/* strings (aligned) */
1047 VKI_BYTES_PER_PAGE; /* page for trampoline code */
1048
1049 /* cl_esp is the client's stack pointer */
1050 cl_esp = VG_(client_end) - stacksize;
1051 cl_esp = ROUNDDN(cl_esp, 16); /* make stack 16 byte aligned */
1052
1053 if (0)
1054 printf("stringsize=%d auxsize=%d stacksize=%d\n",
1055 stringsize, auxsize, stacksize);
1056
1057
1058 /* base of the string table (aligned) */
1059 stringbase = strtab = (char *)(VG_(client_trampoline_code) - ROUNDUP(stringsize, sizeof(int)));
1060
1061 VG_(clstk_base) = PGROUNDDN(cl_esp);
1062 VG_(clstk_end) = VG_(client_end);
1063
1064 /* ==================== allocate space ==================== */
1065
1066 /* allocate a stack - mmap enough space for the stack */
1067 mmap((void *)PGROUNDDN(cl_esp),
1068 VG_(client_end) - PGROUNDDN(cl_esp),
1069 PROT_READ | PROT_WRITE | PROT_EXEC,
1070 MAP_PRIVATE | MAP_ANON | MAP_FIXED, -1, 0);
1071
1072
1073 /* ==================== copy client stack ==================== */
1074
1075 ptr = (addr_t *)cl_esp;
1076
1077 /* --- argc --- */
1078 *ptr++ = argc; /* client argc */
1079
1080 /* --- argv --- */
1081 if (info->argv0) {
1082 *ptr++ = (addr_t)copy_str(&strtab, info->argv0);
1083 free(info->argv0);
1084 }
1085 if (info->argv1) {
1086 *ptr++ = (addr_t)copy_str(&strtab, info->argv1);
1087 free(info->argv1);
1088 }
1089 for (cpp = orig_argv; *cpp; ptr++, cpp++) {
1090 *ptr = (addr_t)copy_str(&strtab, *cpp);
1091 }
1092 *ptr++ = 0;
1093
1094 /* --- envp --- */
1095 VG_(client_envp) = (Char **)ptr;
1096 for (cpp = orig_envp; cpp && *cpp; ptr++, cpp++)
1097 *ptr = (addr_t)copy_str(&strtab, *cpp);
1098 *ptr++ = 0;
1099
1100 /* --- auxv --- */
1101 auxv = (struct ume_auxv *)ptr;
1102 *client_auxv = (UInt *)auxv;
1103
1104 for (; orig_auxv->a_type != AT_NULL; auxv++, orig_auxv++) {
1105 /* copy the entry... */
1106 *auxv = *orig_auxv;
1107
1108 /* ...and fix up the copy */
1109 switch(auxv->a_type) {
1110 case AT_PHDR:
1111 if (info->phdr == 0)
1112 auxv->a_type = AT_IGNORE;
1113 else
1114 auxv->u.a_val = info->phdr;
1115 break;
1116
1117 case AT_PHNUM:
1118 if (info->phdr == 0)
1119 auxv->a_type = AT_IGNORE;
1120 else
1121 auxv->u.a_val = info->phnum;
1122 break;
1123
1124 case AT_BASE:
1125 if (info->interp_base == 0)
1126 auxv->a_type = AT_IGNORE;
1127 else
1128 auxv->u.a_val = info->interp_base;
1129 break;
1130
1131 case AT_PLATFORM: /* points to a platform description string */
1132 auxv->u.a_ptr = copy_str(&strtab, orig_auxv->u.a_ptr);
1133 break;
1134
1135 case AT_ENTRY:
1136 auxv->u.a_val = info->entry;
1137 break;
1138
1139 case AT_IGNORE:
1140 case AT_EXECFD:
1141 case AT_PHENT:
1142 case AT_PAGESZ:
1143 case AT_FLAGS:
1144 case AT_NOTELF:
1145 case AT_UID:
1146 case AT_EUID:
1147 case AT_GID:
1148 case AT_EGID:
1149 case AT_CLKTCK:
1150 case AT_HWCAP:
1151 case AT_FPUCW:
1152 case AT_DCACHEBSIZE:
1153 case AT_ICACHEBSIZE:
1154 case AT_UCACHEBSIZE:
1155 /* All these are pointerless, so we don't need to do anything
1156 about them. */
1157 break;
1158
1159 case AT_SECURE:
1160 /* If this is 1, then it means that this program is running
1161 suid, and therefore the dynamic linker should be careful
1162 about LD_PRELOAD, etc. However, since stage1 (the thing
1163 the kernel actually execve's) should never be SUID, and we
1164 need LD_PRELOAD/LD_LIBRARY_PATH to work for the client, we
1165 set AT_SECURE to 0. */
1166 auxv->u.a_val = 0;
1167 break;
1168
1169 case AT_SYSINFO:
1170 /* Leave this unmolested for now, but we'll update it later
1171 when we set up the client trampoline code page */
1172 break;
1173
1174 case AT_SYSINFO_EHDR:
1175 /* Trash this, because we don't reproduce it */
1176 auxv->a_type = AT_IGNORE;
1177 break;
1178
1179 default:
1180 /* stomp out anything we don't know about */
1181 if (0)
1182 printf("stomping auxv entry %d\n", auxv->a_type);
1183 auxv->a_type = AT_IGNORE;
1184 break;
1185
1186 }
1187 }
1188 *auxv = *orig_auxv;
1189 vg_assert(auxv->a_type == AT_NULL);
1190
1191 vg_assert((strtab-stringbase) == stringsize);
1192
1193 return cl_esp;
1194}
1195
1196/*====================================================================*/
1197/*=== Find executable ===*/
1198/*====================================================================*/
1199
1200static const char* find_executable(const char* exec)
1201{
1202 vg_assert(NULL != exec);
1203 if (strchr(exec, '/') == NULL) {
1204 /* no '/' - we need to search the path */
1205 char *path = getenv("PATH");
1206 int pathlen = path ? strlen(path) : 0;
1207
1208 int match_exe(const char *entry) {
1209 char buf[pathlen + strlen(entry) + 3];
1210
1211 /* empty PATH element means . */
1212 if (*entry == '\0')
1213 entry = ".";
1214
1215 snprintf(buf, sizeof(buf), "%s/%s", entry, exec);
1216
1217 if (access(buf, R_OK|X_OK) == 0) {
1218 exec = strdup(buf);
1219 vg_assert(NULL != exec);
1220 return 1;
1221 }
1222 return 0;
1223 }
1224 scan_colsep(path, match_exe);
1225 }
1226 return exec;
1227}
1228
1229
1230/*====================================================================*/
1231/*=== Loading tools ===*/
1232/*====================================================================*/
1233
1234static void list_tools(void)
1235{
1236 DIR *dir = opendir(VG_(libdir));
1237 struct dirent *de;
1238 int first = 1;
1239
1240 if (dir == NULL) {
1241 fprintf(stderr, "Can't open %s: %s (installation problem?)\n",
nethercotef4928da2004-06-15 10:54:40 +00001242 VG_(libdir), strerror(errno));
nethercote71980f02004-01-24 18:18:54 +00001243 return;
1244 }
1245
nethercotef4928da2004-06-15 10:54:40 +00001246 while ((de = readdir(dir)) != NULL) {
nethercote71980f02004-01-24 18:18:54 +00001247 int len = strlen(de->d_name);
1248
1249 /* look for vgskin_TOOL.so names */
1250 if (len > (7+1+3) && /* "vgskin_" + at least 1-char toolname + ".so" */
nethercotef4928da2004-06-15 10:54:40 +00001251 strncmp(de->d_name, "vgskin_", 7) == 0 &&
1252 VG_STREQ(de->d_name + len - 3, ".so")) {
1253 if (first) {
1254 fprintf(stderr, "Available tools:\n");
1255 first = 0;
1256 }
1257 de->d_name[len-3] = '\0';
1258 fprintf(stderr, "\t%s\n", de->d_name+7);
nethercote71980f02004-01-24 18:18:54 +00001259 }
1260 }
1261
1262 closedir(dir);
1263
1264 if (first)
nethercotef4928da2004-06-15 10:54:40 +00001265 fprintf(stderr, "No tools available in \"%s\" (installation problem?)\n",
1266 VG_(libdir));
nethercote71980f02004-01-24 18:18:54 +00001267}
1268
1269
1270/* Find and load a tool, and check it looks ok. Also looks to see if there's
1271 * a matching vgpreload_*.so file, and returns its name in *preloadpath. */
1272static void load_tool( const char *toolname, void** handle_out,
1273 ToolInfo** toolinfo_out, char **preloadpath_out )
1274{
1275 Bool ok;
1276 int len = strlen(VG_(libdir)) + strlen(toolname)*2 + 16;
1277 char buf[len];
1278 void* handle;
1279 ToolInfo* toolinfo;
1280 char* preloadpath = NULL;
1281 Int* vg_malloc_redzonep;
1282
1283 // XXX: allowing full paths for --tool option -- does it make sense?
1284 // Doesn't allow for vgpreload_<tool>.so.
1285
1286 if (strchr(toolname, '/') != 0) {
1287 /* toolname contains '/', and so must be a pathname */
1288 handle = dlopen(toolname, RTLD_NOW);
1289 } else {
1290 /* just try in the libdir */
1291 snprintf(buf, len, "%s/vgskin_%s.so", VG_(libdir), toolname);
1292 handle = dlopen(buf, RTLD_NOW);
1293
1294 if (handle != NULL) {
1295 snprintf(buf, len, "%s/vgpreload_%s.so", VG_(libdir), toolname);
1296 if (access(buf, R_OK) == 0) {
1297 preloadpath = strdup(buf);
1298 vg_assert(NULL != preloadpath);
1299 }
1300 }
1301 }
1302
1303 ok = (NULL != handle);
1304 if (!ok) {
1305 fprintf(stderr, "Can't open tool \"%s\": %s\n", toolname, dlerror());
1306 goto bad_load;
1307 }
1308
1309 toolinfo = dlsym(handle, "vgSkin_tool_info");
1310 ok = (NULL != toolinfo);
1311 if (!ok) {
1312 fprintf(stderr, "Tool \"%s\" doesn't define SK_(tool_info) - "
1313 "add VG_DETERMINE_INTERFACE_VERSION?\n", toolname);
1314 goto bad_load;
1315 }
1316
1317 ok = (toolinfo->sizeof_ToolInfo == sizeof(*toolinfo) &&
1318 toolinfo->interface_major_version == VG_CORE_INTERFACE_MAJOR_VERSION &&
1319 toolinfo->sk_pre_clo_init != NULL);
1320 if (!ok) {
1321 fprintf(stderr, "Error:\n"
1322 " Tool and core interface versions do not match.\n"
1323 " Interface version used by core is: %d.%d (size %d)\n"
1324 " Interface version used by tool is: %d.%d (size %d)\n"
1325 " The major version numbers must match.\n",
1326 VG_CORE_INTERFACE_MAJOR_VERSION,
1327 VG_CORE_INTERFACE_MINOR_VERSION,
1328 sizeof(*toolinfo),
1329 toolinfo->interface_major_version,
1330 toolinfo->interface_minor_version,
1331 toolinfo->sizeof_ToolInfo);
1332 fprintf(stderr, " You need to at least recompile, and possibly update,\n");
1333 if (VG_CORE_INTERFACE_MAJOR_VERSION > toolinfo->interface_major_version)
1334 fprintf(stderr, " your skin to work with this version of Valgrind.\n");
1335 else
1336 fprintf(stderr, " your version of Valgrind to work with this skin.\n");
1337 goto bad_load;
1338 }
1339
1340 // Set redzone size for V's allocator
1341 vg_malloc_redzonep = dlsym(handle, STR(VG_(vg_malloc_redzone_szB)));
1342 if ( NULL != vg_malloc_redzonep ) {
1343 VG_(vg_malloc_redzone_szB) = *vg_malloc_redzonep;
1344 }
1345
1346 vg_assert(NULL != handle && NULL != toolinfo);
1347 *handle_out = handle;
1348 *toolinfo_out = toolinfo;
1349 *preloadpath_out = preloadpath;
1350 return;
1351
1352
1353 bad_load:
1354 if (handle != NULL)
1355 dlclose(handle);
1356
nethercotef4928da2004-06-15 10:54:40 +00001357 fprintf(stderr, "valgrind: couldn't load tool\n");
nethercote71980f02004-01-24 18:18:54 +00001358 list_tools();
1359 exit(127);
1360}
1361
nethercotef4928da2004-06-15 10:54:40 +00001362
1363/*====================================================================*/
1364/*=== Command line errors ===*/
1365/*====================================================================*/
1366
1367static void abort_msg ( void )
1368{
nethercotef8548672004-06-21 12:42:35 +00001369 VG_(clo_log_to) = VgLogTo_Fd;
1370 VG_(clo_log_fd) = 2; /* stderr */
nethercotef4928da2004-06-15 10:54:40 +00001371}
1372
1373void VG_(bad_option) ( Char* opt )
1374{
1375 abort_msg();
1376 VG_(printf)("valgrind: Bad option `%s'; aborting.\n", opt);
1377 VG_(printf)("valgrind: Use --help for more information.\n");
1378 VG_(exit)(1);
1379}
1380
1381static void missing_tool_option ( void )
1382{
1383 abort_msg();
1384 VG_(printf)("valgrind: Missing --tool option\n");
1385 list_tools();
1386 VG_(printf)("valgrind: Use --help for more information.\n");
1387 VG_(exit)(1);
1388}
1389
1390static void missing_prog ( void )
1391{
1392 abort_msg();
1393 VG_(printf)("valgrind: no program specified\n");
1394 VG_(printf)("valgrind: Use --help for more information.\n");
1395 VG_(exit)(1);
1396}
1397
1398static void config_error ( Char* msg )
1399{
1400 abort_msg();
1401 VG_(printf)("valgrind: Startup or configuration error:\n %s\n", msg);
1402 VG_(printf)("valgrind: Unable to start up properly. Giving up.\n");
1403 VG_(exit)(1);
1404}
1405
1406
nethercote71980f02004-01-24 18:18:54 +00001407/*====================================================================*/
1408/*=== Loading the client ===*/
1409/*====================================================================*/
1410
nethercotef4928da2004-06-15 10:54:40 +00001411static void load_client(char* cl_argv[], const char* exec, Int need_help,
nethercote71980f02004-01-24 18:18:54 +00001412 /*out*/struct exeinfo* info, /*out*/Addr* client_eip)
1413{
1414 // If they didn't specify an executable with --exec, and didn't specify
1415 // --help, then use client argv[0] (searching $PATH if necessary).
nethercotef4928da2004-06-15 10:54:40 +00001416 if (NULL == exec && !need_help) {
nethercote71980f02004-01-24 18:18:54 +00001417 if (cl_argv[0] == NULL ||
1418 ( NULL == (exec = find_executable(cl_argv[0])) ) )
1419 {
nethercotef4928da2004-06-15 10:54:40 +00001420 missing_prog();
nethercote71980f02004-01-24 18:18:54 +00001421 }
1422 }
1423
1424 info->map_base = VG_(client_mapbase);
nethercote71980f02004-01-24 18:18:54 +00001425
1426 info->exe_base = VG_(client_base);
1427 info->exe_end = VG_(client_end);
1428 info->argv = cl_argv;
1429
nethercotef4928da2004-06-15 10:54:40 +00001430 if (need_help) {
nethercote71980f02004-01-24 18:18:54 +00001431 VG_(clexecfd) = -1;
1432 info->argv0 = NULL;
1433 info->argv1 = NULL;
1434 } else {
1435 Int ret;
1436 VG_(clexecfd) = VG_(open)(exec, O_RDONLY, VKI_S_IRUSR);
1437 ret = do_exec(exec, info);
1438 if (ret != 0) {
nethercotef4928da2004-06-15 10:54:40 +00001439 fprintf(stderr, "valgrind: do_exec(%s) failed: %s\n", exec, strerror(ret));
nethercote71980f02004-01-24 18:18:54 +00001440 exit(127);
1441 }
1442 }
1443
1444 /* Copy necessary bits of 'info' that were filled in */
1445 *client_eip = info->init_eip;
1446 VG_(brk_base) = VG_(brk_limit) = info->brkbase;
1447}
1448
1449
1450/*====================================================================*/
1451/*=== Command-line: variables, processing ===*/
1452/*====================================================================*/
sewardjde4a1d02002-03-22 01:27:54 +00001453
njn25e49d8e72002-09-23 09:36:25 +00001454/* Define, and set defaults. */
1455Bool VG_(clo_error_limit) = True;
nethercote04d0fbc2004-01-26 16:48:06 +00001456Bool VG_(clo_db_attach) = False;
1457Char* VG_(clo_db_command) = VG_CLO_DEFAULT_DBCOMMAND;
njn43c799e2003-04-08 00:08:52 +00001458Bool VG_(clo_gen_suppressions) = False;
nethercote27fec902004-06-16 21:26:32 +00001459Int VG_(clo_sanity_level) = 1;
njn25e49d8e72002-09-23 09:36:25 +00001460Int VG_(clo_verbosity) = 1;
1461Bool VG_(clo_demangle) = True;
njn25e49d8e72002-09-23 09:36:25 +00001462Bool VG_(clo_trace_children) = False;
sewardj4cf05692002-10-27 20:28:29 +00001463
nethercotee1730692003-11-20 10:38:07 +00001464/* See big comment in vg_include.h for meaning of these three.
1465 fd is initially stdout, for --help, but gets moved to stderr by default
1466 immediately afterwards. */
sewardj4cf05692002-10-27 20:28:29 +00001467VgLogTo VG_(clo_log_to) = VgLogTo_Fd;
nethercotef8548672004-06-21 12:42:35 +00001468Int VG_(clo_log_fd) = 1;
1469Char* VG_(clo_log_name) = NULL;
sewardj4cf05692002-10-27 20:28:29 +00001470
sewardj6024b212003-07-13 10:54:33 +00001471Int VG_(clo_input_fd) = 0; /* stdin */
njn25e49d8e72002-09-23 09:36:25 +00001472Int VG_(clo_n_suppressions) = 0;
sewardjde4a1d02002-03-22 01:27:54 +00001473Char* VG_(clo_suppressions)[VG_CLO_MAX_SFILES];
njn25e49d8e72002-09-23 09:36:25 +00001474Bool VG_(clo_profile) = False;
1475Bool VG_(clo_single_step) = False;
1476Bool VG_(clo_optimise) = True;
1477UChar VG_(clo_trace_codegen) = 0; // 00000000b
1478Bool VG_(clo_trace_syscalls) = False;
1479Bool VG_(clo_trace_signals) = False;
1480Bool VG_(clo_trace_symtab) = False;
njn25e49d8e72002-09-23 09:36:25 +00001481Bool VG_(clo_trace_sched) = False;
1482Int VG_(clo_trace_pthread_level) = 0;
njn25e49d8e72002-09-23 09:36:25 +00001483Int VG_(clo_dump_error) = 0;
1484Int VG_(clo_backtrace_size) = 4;
1485Char* VG_(clo_weird_hacks) = NULL;
sewardj858964b2002-10-05 14:15:43 +00001486Bool VG_(clo_run_libc_freeres) = True;
rjwalshf5f536f2003-11-17 17:45:00 +00001487Bool VG_(clo_track_fds) = False;
sewardj22854b92002-11-30 14:00:47 +00001488Bool VG_(clo_chain_bb) = True;
nethercote77eba602003-11-13 17:35:04 +00001489Bool VG_(clo_show_below_main) = False;
fitzhardinge98abfc72003-12-16 02:05:15 +00001490Bool VG_(clo_pointercheck) = True;
fitzhardinge462f4f92003-12-18 02:10:54 +00001491Bool VG_(clo_branchpred) = False;
sewardj2370f3b2002-11-30 15:01:01 +00001492
jsgf855d93d2003-10-13 22:26:55 +00001493static Bool VG_(clo_wait_for_gdb) = False;
1494
1495/* If we're doing signal routing, poll for signals every 50mS by
1496 default. */
1497Int VG_(clo_signal_polltime) = 50;
1498
1499/* These flags reduce thread wakeup latency on syscall completion and
1500 signal delivery, respectively. The downside is possible unfairness. */
1501Bool VG_(clo_lowlat_syscalls) = False; /* low-latency syscalls */
1502Bool VG_(clo_lowlat_signals) = False; /* low-latency signals */
1503
sewardjde4a1d02002-03-22 01:27:54 +00001504
nethercote6c999f22004-01-31 22:55:15 +00001505void usage ( Bool debug_help )
njn7cf0bd32002-06-08 13:36:03 +00001506{
njn25e49d8e72002-09-23 09:36:25 +00001507 Char* usage1 =
nethercote71980f02004-01-24 18:18:54 +00001508"usage: valgrind --tool=<toolname> [options] prog-and-args\n"
njn25e49d8e72002-09-23 09:36:25 +00001509"\n"
nethercote2b0793f2003-12-02 10:41:18 +00001510" common user options for all Valgrind tools, with defaults in [ ]:\n"
nethercote0d588502004-06-21 13:27:11 +00001511" --tool=<name> use the Valgrind tool named <name>\n"
nethercotea76368b2004-06-16 11:56:29 +00001512" -h --help show this message\n"
nethercote6c999f22004-01-31 22:55:15 +00001513" --help-debug show this message, plus debugging options\n"
njn25e49d8e72002-09-23 09:36:25 +00001514" --version show version\n"
njn25e49d8e72002-09-23 09:36:25 +00001515" -q --quiet run silently; only print error msgs\n"
1516" -v --verbose be more verbose, incl counts of errors\n"
nethercote77eba602003-11-13 17:35:04 +00001517" --trace-children=no|yes Valgrind-ise child processes? [no]\n"
nethercote0d588502004-06-21 13:27:11 +00001518" --track-fds=no|yes track open file descriptors? [no]\n"
nethercote2b0793f2003-12-02 10:41:18 +00001519"\n"
1520" uncommon user options for all Valgrind tools:\n"
nethercote0d588502004-06-21 13:27:11 +00001521" --run-libc-freeres=no|yes free up glibc memory at exit? [yes]\n"
1522" --weird-hacks=hack1,hack2,... recognised hacks: lax-ioctls [none]\n"
1523" --signal-polltime=<time> signal poll period (mS) for older kernels [50]\n"
1524" --lowlat-signals=no|yes improve thread signal wake-up latency [no]\n"
1525" --lowlat-syscalls=no|yes improve thread syscall wake-up latency [no]\n"
fitzhardinge98abfc72003-12-16 02:05:15 +00001526" --pointercheck=no|yes enforce client address space limits [yes]\n"
njn25e49d8e72002-09-23 09:36:25 +00001527"\n"
nethercote2b0793f2003-12-02 10:41:18 +00001528" user options for Valgrind tools that report errors:\n"
nethercotef8548672004-06-21 12:42:35 +00001529" --log-fd=<number> log messages to file descriptor [2=stderr]\n"
1530" --log-file=<file> log messages to <file>.pid<pid>\n"
1531" --log-socket=ipaddr:port log messages to socket ipaddr:port\n"
nethercote2b0793f2003-12-02 10:41:18 +00001532" --demangle=no|yes automatically demangle C++ names? [yes]\n"
1533" --num-callers=<number> show <num> callers in stack traces [4]\n"
1534" --error-limit=no|yes stop showing new errors if too many? [yes]\n"
1535" --show-below-main=no|yes continue stack traces below main() [no]\n"
1536" --suppressions=<filename> suppress errors described in <filename>\n"
1537" --gen-suppressions=no|yes print suppressions for errors detected [no]\n"
nethercote04d0fbc2004-01-26 16:48:06 +00001538" --db-attach=no|yes start debugger when errors detected? [no]\n"
1539" --db-command=<command> command to start debugger [gdb -nw %%f %%p]\n"
1540" --input-fd=<number> file descriptor for input [0=stdin]\n"
fitzhardinge98abfc72003-12-16 02:05:15 +00001541"\n";
njn7cf0bd32002-06-08 13:36:03 +00001542
njn25e49d8e72002-09-23 09:36:25 +00001543 Char* usage2 =
1544"\n"
nethercote2b0793f2003-12-02 10:41:18 +00001545" debugging options for all Valgrind tools:\n"
njn25e49d8e72002-09-23 09:36:25 +00001546" --sanity-level=<number> level of sanity checking to do [1]\n"
1547" --single-step=no|yes translate each instr separately? [no]\n"
1548" --optimise=no|yes improve intermediate code? [yes]\n"
nethercote137bc552003-11-14 17:47:54 +00001549" --profile=no|yes profile? (tool must be built for it) [no]\n"
sewardj22854b92002-11-30 14:00:47 +00001550" --chain-bb=no|yes do basic-block chaining? [yes]\n"
fitzhardinge462f4f92003-12-18 02:10:54 +00001551" --branchpred=yes|no generate branch prediction hints [no]\n"
njn25e49d8e72002-09-23 09:36:25 +00001552" --trace-codegen=<XXXXX> show generated code? (X = 0|1) [00000]\n"
1553" --trace-syscalls=no|yes show all system calls? [no]\n"
1554" --trace-signals=no|yes show signal handling details? [no]\n"
1555" --trace-symtab=no|yes show symbol table details? [no]\n"
njn25e49d8e72002-09-23 09:36:25 +00001556" --trace-sched=no|yes show thread scheduler details? [no]\n"
njn3e884182003-04-15 13:03:23 +00001557" --trace-pthread=none|some|all show pthread event details? [none]\n"
jsgf855d93d2003-10-13 22:26:55 +00001558" --wait-for-gdb=yes|no pause on startup to wait for gdb attach\n"
njn25e49d8e72002-09-23 09:36:25 +00001559"\n"
nethercote2b0793f2003-12-02 10:41:18 +00001560" debugging options for Valgrind tools that report errors\n"
1561" --dump-error=<number> show translation for basic block associated\n"
1562" with <number>'th error context [0=show none]\n"
fitzhardinge98abfc72003-12-16 02:05:15 +00001563"\n";
njn3e884182003-04-15 13:03:23 +00001564
1565 Char* usage3 =
1566"\n"
nethercote71980f02004-01-24 18:18:54 +00001567" Extra options read from ~/.valgrindrc, $VALGRIND_OPTS, ./.valgrindrc\n"
njn25e49d8e72002-09-23 09:36:25 +00001568"\n"
nethercotebb1c9912004-01-04 16:43:23 +00001569" Valgrind is Copyright (C) 2000-2004 Julian Seward\n"
njn25e49d8e72002-09-23 09:36:25 +00001570" and licensed under the GNU General Public License, version 2.\n"
1571" Bug reports, feedback, admiration, abuse, etc, to: %s.\n"
njnd04b7c62002-10-03 14:05:52 +00001572"\n"
nethercote137bc552003-11-14 17:47:54 +00001573" Tools are copyright and licensed by their authors. See each\n"
1574" tool's start-up message for more information.\n"
njn25e49d8e72002-09-23 09:36:25 +00001575"\n";
njn7cf0bd32002-06-08 13:36:03 +00001576
fitzhardinge98abfc72003-12-16 02:05:15 +00001577 VG_(printf)(usage1);
1578 if (VG_(details).name) {
1579 VG_(printf)(" user options for %s:\n", VG_(details).name);
fitzhardinge98abfc72003-12-16 02:05:15 +00001580 if (VG_(needs).command_line_options)
1581 SK_(print_usage)();
1582 else
1583 VG_(printf)(" (none)\n");
1584 }
nethercote6c999f22004-01-31 22:55:15 +00001585 if (debug_help) {
1586 VG_(printf)(usage2);
fitzhardinge98abfc72003-12-16 02:05:15 +00001587
nethercote6c999f22004-01-31 22:55:15 +00001588 if (VG_(details).name) {
1589 VG_(printf)(" debugging options for %s:\n", VG_(details).name);
1590
1591 if (VG_(needs).command_line_options)
1592 SK_(print_debug_usage)();
1593 else
1594 VG_(printf)(" (none)\n");
1595 }
fitzhardinge98abfc72003-12-16 02:05:15 +00001596 }
nethercote421281e2003-11-20 16:20:55 +00001597 VG_(printf)(usage3, VG_BUGS_TO);
nethercotef4928da2004-06-15 10:54:40 +00001598 VG_(exit)(0);
njn7cf0bd32002-06-08 13:36:03 +00001599}
sewardjde4a1d02002-03-22 01:27:54 +00001600
nethercote71980f02004-01-24 18:18:54 +00001601static void pre_process_cmd_line_options
nethercote6c999f22004-01-31 22:55:15 +00001602 ( Int* need_help, const char** tool, const char** exec )
sewardj1c1b1162003-02-23 01:25:51 +00001603{
nethercote71980f02004-01-24 18:18:54 +00001604 UInt i;
sewardjde4a1d02002-03-22 01:27:54 +00001605
nethercote71980f02004-01-24 18:18:54 +00001606 /* parse the options we have (only the options we care about now) */
1607 for (i = 1; i < VG_(vg_argc); i++) {
1608
1609 if (strcmp(VG_(vg_argv)[i], "--version") == 0) {
1610 printf("valgrind-" VERSION "\n");
nethercotef4928da2004-06-15 10:54:40 +00001611 exit(0);
nethercote71980f02004-01-24 18:18:54 +00001612
nethercotea76368b2004-06-16 11:56:29 +00001613 } else if (VG_CLO_STREQ(VG_(vg_argv)[i], "--help") ||
1614 VG_CLO_STREQ(VG_(vg_argv)[i], "-h")) {
nethercote6c999f22004-01-31 22:55:15 +00001615 *need_help = 1;
1616
nethercotef4928da2004-06-15 10:54:40 +00001617 } else if (VG_CLO_STREQ(VG_(vg_argv)[i], "--help-debug")) {
nethercote6c999f22004-01-31 22:55:15 +00001618 *need_help = 2;
nethercote71980f02004-01-24 18:18:54 +00001619
nethercotef4928da2004-06-15 10:54:40 +00001620 } else if (VG_CLO_STREQN(7, VG_(vg_argv)[i], "--tool=") ||
1621 VG_CLO_STREQN(7, VG_(vg_argv)[i], "--skin=")) {
nethercote71980f02004-01-24 18:18:54 +00001622 *tool = &VG_(vg_argv)[i][7];
1623
nethercotef4928da2004-06-15 10:54:40 +00001624 } else if (VG_CLO_STREQN(7, VG_(vg_argv)[i], "--exec=")) {
nethercote71980f02004-01-24 18:18:54 +00001625 *exec = &VG_(vg_argv)[i][7];
1626 }
1627 }
1628
nethercotef4928da2004-06-15 10:54:40 +00001629 /* If no tool specified, can act appropriately without loading tool */
nethercote71980f02004-01-24 18:18:54 +00001630 if (*tool == NULL) {
nethercotef4928da2004-06-15 10:54:40 +00001631 if (0 == *need_help) {
1632 // neither --tool nor --help/--help-debug specified
1633 missing_tool_option();
1634 } else {
1635 // Give help message, without any tool-specific help
1636 usage(/*help-debug?*/2 == *need_help);
1637 }
nethercote71980f02004-01-24 18:18:54 +00001638 }
1639}
1640
nethercotef4928da2004-06-15 10:54:40 +00001641static void process_cmd_line_options
1642 ( UInt* client_auxv, Addr esp_at_startup, const char* toolname )
nethercote71980f02004-01-24 18:18:54 +00001643{
nethercotef8548672004-06-21 12:42:35 +00001644 Int i, eventually_log_fd;
nethercote71980f02004-01-24 18:18:54 +00001645 Int *auxp;
1646 Int toolname_len = VG_(strlen)(toolname);
sewardjde4a1d02002-03-22 01:27:54 +00001647
nethercotee1730692003-11-20 10:38:07 +00001648 /* log to stderr by default, but usage message goes to stdout */
nethercotef8548672004-06-21 12:42:35 +00001649 eventually_log_fd = 2;
sewardjde4a1d02002-03-22 01:27:54 +00001650
sewardj19d81412002-06-03 01:10:40 +00001651 /* Check for sane path in ./configure --prefix=... */
fitzhardinge98abfc72003-12-16 02:05:15 +00001652 if (VG_LIBDIR[0] != '/')
sewardj19d81412002-06-03 01:10:40 +00001653 config_error("Please use absolute paths in "
1654 "./configure --prefix=... or --libdir=...");
sewardj38170912002-05-10 21:07:22 +00001655
nethercote71980f02004-01-24 18:18:54 +00001656 for (auxp = client_auxv; auxp[0] != VKI_AT_NULL; auxp += 2) {
fitzhardinge98abfc72003-12-16 02:05:15 +00001657 switch(auxp[0]) {
1658 case VKI_AT_SYSINFO:
1659 VG_(sysinfo_page_exists) = True;
fitzhardinge92360792003-12-24 10:11:11 +00001660 auxp[1] = (Int)(VG_(client_trampoline_code) + VG_(tramp_syscall_offset));
fitzhardinge98abfc72003-12-16 02:05:15 +00001661 VG_(sysinfo_page_addr) = auxp[1];
1662 break;
sewardjde4a1d02002-03-22 01:27:54 +00001663 }
fitzhardinge98abfc72003-12-16 02:05:15 +00001664 }
sewardjde4a1d02002-03-22 01:27:54 +00001665
fitzhardinge98abfc72003-12-16 02:05:15 +00001666 /* We know the initial ESP is pointing at argc/argv */
nethercote71980f02004-01-24 18:18:54 +00001667 VG_(client_argc) = *(Int *)esp_at_startup;
1668 VG_(client_argv) = (Char **)(esp_at_startup + sizeof(Int));
fitzhardinge98abfc72003-12-16 02:05:15 +00001669
nethercote71980f02004-01-24 18:18:54 +00001670 for (i = 1; i < VG_(vg_argc); i++) {
1671
1672 Char* arg = VG_(vg_argv)[i];
1673
1674 // XXX: allow colons in options, for Josef
1675
1676 /* Look for matching "--toolname:foo" */
1677 if (VG_(strstr)(arg, ":")) {
1678 if (VG_CLO_STREQN(2, arg, "--") &&
1679 VG_CLO_STREQN(toolname_len, arg+2, toolname) &&
1680 VG_CLO_STREQN(1, arg+2+toolname_len, ":"))
1681 {
1682 // prefix matches, convert "--toolname:foo" to "--foo"
1683 if (0)
1684 VG_(printf)("tool-specific arg: %s\n", arg);
1685 arg += toolname_len + 1;
1686 arg[0] = '-';
1687 arg[1] = '-';
1688
1689 } else {
1690 // prefix doesn't match, skip to next arg
1691 continue;
1692 }
1693 }
1694
fitzhardinge98abfc72003-12-16 02:05:15 +00001695 /* Ignore these options - they've already been handled */
nethercote71980f02004-01-24 18:18:54 +00001696 if (VG_CLO_STREQN(7, arg, "--tool=") ||
1697 VG_CLO_STREQN(7, arg, "--skin="))
fitzhardinge98abfc72003-12-16 02:05:15 +00001698 continue;
nethercote71980f02004-01-24 18:18:54 +00001699 if (VG_CLO_STREQN(7, arg, "--exec="))
fitzhardinge98abfc72003-12-16 02:05:15 +00001700 continue;
1701
nethercote71980f02004-01-24 18:18:54 +00001702 if ( VG_CLO_STREQ(arg, "--"))
fitzhardinge98abfc72003-12-16 02:05:15 +00001703 continue;
nethercote27fec902004-06-16 21:26:32 +00001704
nethercote71980f02004-01-24 18:18:54 +00001705 else if (VG_CLO_STREQ(arg, "-v") ||
1706 VG_CLO_STREQ(arg, "--verbose"))
sewardjde4a1d02002-03-22 01:27:54 +00001707 VG_(clo_verbosity)++;
nethercote27fec902004-06-16 21:26:32 +00001708
nethercote71980f02004-01-24 18:18:54 +00001709 else if (VG_CLO_STREQ(arg, "-q") ||
1710 VG_CLO_STREQ(arg, "--quiet"))
sewardjde4a1d02002-03-22 01:27:54 +00001711 VG_(clo_verbosity)--;
1712
nethercote27fec902004-06-16 21:26:32 +00001713 else VG_BOOL_CLO("--branchpred", VG_(clo_branchpred))
1714 else VG_BOOL_CLO("--chain-bb", VG_(clo_chain_bb))
1715 else VG_BOOL_CLO("--db-attach", VG_(clo_db_attach))
1716 else VG_BOOL_CLO("--demangle", VG_(clo_demangle))
1717 else VG_BOOL_CLO("--error-limit", VG_(clo_error_limit))
1718 else VG_BOOL_CLO("--gen-suppressions", VG_(clo_gen_suppressions))
1719 else VG_BOOL_CLO("--lowlat-signals", VG_(clo_lowlat_signals))
1720 else VG_BOOL_CLO("--lowlat-syscalls", VG_(clo_lowlat_syscalls))
1721 else VG_BOOL_CLO("--optimise", VG_(clo_optimise))
1722 else VG_BOOL_CLO("--pointercheck", VG_(clo_pointercheck))
1723 else VG_BOOL_CLO("--profile", VG_(clo_profile))
1724 else VG_BOOL_CLO("--run-libc-freeres", VG_(clo_run_libc_freeres))
1725 else VG_BOOL_CLO("--show-below-main", VG_(clo_show_below_main))
1726 else VG_BOOL_CLO("--single-step", VG_(clo_single_step))
1727 else VG_BOOL_CLO("--track-fds", VG_(clo_track_fds))
1728 else VG_BOOL_CLO("--trace-children", VG_(clo_trace_children))
1729 else VG_BOOL_CLO("--trace-sched", VG_(clo_trace_sched))
1730 else VG_BOOL_CLO("--trace-signals", VG_(clo_trace_signals))
1731 else VG_BOOL_CLO("--trace-symtab", VG_(clo_trace_symtab))
1732 else VG_BOOL_CLO("--trace-syscalls", VG_(clo_trace_syscalls))
1733 else VG_BOOL_CLO("--wait-for-gdb", VG_(clo_wait_for_gdb))
sewardj72f98ff2002-06-13 17:23:38 +00001734
nethercote27fec902004-06-16 21:26:32 +00001735 else VG_STR_CLO ("--db-command", VG_(clo_db_command))
1736 else VG_STR_CLO ("--weird-hacks", VG_(clo_weird_hacks))
sewardjde4a1d02002-03-22 01:27:54 +00001737
nethercote27fec902004-06-16 21:26:32 +00001738 else VG_NUM_CLO ("--dump-error", VG_(clo_dump_error))
1739 else VG_NUM_CLO ("--input-fd", VG_(clo_input_fd))
1740 else VG_NUM_CLO ("--sanity-level", VG_(clo_sanity_level))
1741 else VG_NUM_CLO ("--signal­polltime", VG_(clo_signal_polltime))
1742 else VG_BNUM_CLO("--num-callers", VG_(clo_backtrace_size), 1,
1743 VG_DEEPEST_BACKTRACE)
sewardjde4a1d02002-03-22 01:27:54 +00001744
nethercotef8548672004-06-21 12:42:35 +00001745 // for backwards compatibility, replaced by --log-fd
nethercote71980f02004-01-24 18:18:54 +00001746 else if (VG_CLO_STREQN(13, arg, "--logfile-fd=")) {
nethercotef8548672004-06-21 12:42:35 +00001747 VG_(clo_log_to) = VgLogTo_Fd;
1748 VG_(clo_log_name) = NULL;
1749 eventually_log_fd = (Int)VG_(atoll)(&arg[13]);
1750 }
1751 else if (VG_CLO_STREQN(9, arg, "--log-fd=")) {
1752 VG_(clo_log_to) = VgLogTo_Fd;
1753 VG_(clo_log_name) = NULL;
1754 eventually_log_fd = (Int)VG_(atoll)(&arg[9]);
sewardj4cf05692002-10-27 20:28:29 +00001755 }
1756
nethercotef8548672004-06-21 12:42:35 +00001757 // for backwards compatibility, replaced by --log-file
nethercote71980f02004-01-24 18:18:54 +00001758 else if (VG_CLO_STREQN(10, arg, "--logfile=")) {
nethercotef8548672004-06-21 12:42:35 +00001759 VG_(clo_log_to) = VgLogTo_File;
1760 VG_(clo_log_name) = &arg[10];
1761 }
1762 else if (VG_CLO_STREQN(11, arg, "--log-file=")) {
1763 VG_(clo_log_to) = VgLogTo_File;
1764 VG_(clo_log_name) = &arg[11];
sewardj4cf05692002-10-27 20:28:29 +00001765 }
sewardjde4a1d02002-03-22 01:27:54 +00001766
nethercotef8548672004-06-21 12:42:35 +00001767 // for backwards compatibility, replaced by --log-socket
nethercote71980f02004-01-24 18:18:54 +00001768 else if (VG_CLO_STREQN(12, arg, "--logsocket=")) {
nethercotef8548672004-06-21 12:42:35 +00001769 VG_(clo_log_to) = VgLogTo_Socket;
1770 VG_(clo_log_name) = &arg[12];
1771 }
1772 else if (VG_CLO_STREQN(13, arg, "--log-socket=")) {
1773 VG_(clo_log_to) = VgLogTo_Socket;
1774 VG_(clo_log_name) = &arg[13];
sewardj73cf3bc2002-11-03 03:20:15 +00001775 }
1776
nethercote71980f02004-01-24 18:18:54 +00001777 else if (VG_CLO_STREQN(15, arg, "--suppressions=")) {
sewardjde4a1d02002-03-22 01:27:54 +00001778 if (VG_(clo_n_suppressions) >= VG_CLO_MAX_SFILES) {
njn25e49d8e72002-09-23 09:36:25 +00001779 VG_(message)(Vg_UserMsg, "Too many suppression files specified.");
sewardjde4a1d02002-03-22 01:27:54 +00001780 VG_(message)(Vg_UserMsg,
1781 "Increase VG_CLO_MAX_SFILES and recompile.");
nethercote71980f02004-01-24 18:18:54 +00001782 VG_(bad_option)(arg);
sewardjde4a1d02002-03-22 01:27:54 +00001783 }
nethercote71980f02004-01-24 18:18:54 +00001784 VG_(clo_suppressions)[VG_(clo_n_suppressions)] = &arg[15];
sewardjde4a1d02002-03-22 01:27:54 +00001785 VG_(clo_n_suppressions)++;
1786 }
sewardjde4a1d02002-03-22 01:27:54 +00001787
njn25e49d8e72002-09-23 09:36:25 +00001788 /* "vwxyz" --> 000zyxwv (binary) */
nethercote71980f02004-01-24 18:18:54 +00001789 else if (VG_CLO_STREQN(16, arg, "--trace-codegen=")) {
njn25e49d8e72002-09-23 09:36:25 +00001790 Int j;
nethercote71980f02004-01-24 18:18:54 +00001791 char* opt = & arg[16];
njn25e49d8e72002-09-23 09:36:25 +00001792
1793 if (5 != VG_(strlen)(opt)) {
1794 VG_(message)(Vg_UserMsg,
1795 "--trace-codegen argument must have 5 digits");
nethercote71980f02004-01-24 18:18:54 +00001796 VG_(bad_option)(arg);
njn25e49d8e72002-09-23 09:36:25 +00001797 }
1798 for (j = 0; j < 5; j++) {
1799 if ('0' == opt[j]) { /* do nothing */ }
1800 else if ('1' == opt[j]) VG_(clo_trace_codegen) |= (1 << j);
1801 else {
1802 VG_(message)(Vg_UserMsg, "--trace-codegen argument can only "
1803 "contain 0s and 1s");
nethercote71980f02004-01-24 18:18:54 +00001804 VG_(bad_option)(arg);
njn25e49d8e72002-09-23 09:36:25 +00001805 }
1806 }
1807 }
sewardjde4a1d02002-03-22 01:27:54 +00001808
nethercote71980f02004-01-24 18:18:54 +00001809 else if (VG_CLO_STREQ(arg, "--trace-pthread=none"))
sewardj45b4b372002-04-16 22:50:32 +00001810 VG_(clo_trace_pthread_level) = 0;
nethercote71980f02004-01-24 18:18:54 +00001811 else if (VG_CLO_STREQ(arg, "--trace-pthread=some"))
sewardj45b4b372002-04-16 22:50:32 +00001812 VG_(clo_trace_pthread_level) = 1;
nethercote71980f02004-01-24 18:18:54 +00001813 else if (VG_CLO_STREQ(arg, "--trace-pthread=all"))
sewardj45b4b372002-04-16 22:50:32 +00001814 VG_(clo_trace_pthread_level) = 2;
sewardj8937c812002-04-12 20:12:20 +00001815
nethercote71980f02004-01-24 18:18:54 +00001816 else if ( ! VG_(needs).command_line_options
1817 || ! SK_(process_cmd_line_option)(arg) ) {
nethercotef4928da2004-06-15 10:54:40 +00001818 VG_(bad_option)(arg);
njn25e49d8e72002-09-23 09:36:25 +00001819 }
sewardjde4a1d02002-03-22 01:27:54 +00001820 }
1821
nethercote27fec902004-06-16 21:26:32 +00001822 // Check various option values
1823
njnf9ebf672003-05-12 21:41:30 +00001824 if (VG_(clo_verbosity) < 0)
sewardjde4a1d02002-03-22 01:27:54 +00001825 VG_(clo_verbosity) = 0;
1826
nethercote04d0fbc2004-01-26 16:48:06 +00001827 if (VG_(clo_db_attach) && VG_(clo_trace_children)) {
sewardjde4a1d02002-03-22 01:27:54 +00001828 VG_(message)(Vg_UserMsg, "");
1829 VG_(message)(Vg_UserMsg,
nethercote04d0fbc2004-01-26 16:48:06 +00001830 "--db-attach=yes conflicts with --trace-children=yes");
sewardjde4a1d02002-03-22 01:27:54 +00001831 VG_(message)(Vg_UserMsg,
1832 "Please choose one or the other, but not both.");
nethercote04d0fbc2004-01-26 16:48:06 +00001833 VG_(bad_option)("--db-attach=yes and --trace-children=yes");
sewardjde4a1d02002-03-22 01:27:54 +00001834 }
1835
nethercotef8548672004-06-21 12:42:35 +00001836 /* Set up logging now. After this is done, VG_(clo_log_fd)
sewardj4cf05692002-10-27 20:28:29 +00001837 should be connected to whatever sink has been selected, and we
1838 indiscriminately chuck stuff into it without worrying what the
1839 nature of it is. Oh the wonder of Unix streams. */
1840
nethercotee1730692003-11-20 10:38:07 +00001841 /* So far we should be still attached to stdout, so we can show on
sewardj4cf05692002-10-27 20:28:29 +00001842 the terminal any problems to do with processing command line
1843 opts. */
nethercotef8548672004-06-21 12:42:35 +00001844 vg_assert(VG_(clo_log_fd) == 1 /* stdout */);
sewardj73cf3bc2002-11-03 03:20:15 +00001845 vg_assert(VG_(logging_to_filedes) == True);
sewardj4cf05692002-10-27 20:28:29 +00001846
1847 switch (VG_(clo_log_to)) {
sewardj73cf3bc2002-11-03 03:20:15 +00001848
sewardj4cf05692002-10-27 20:28:29 +00001849 case VgLogTo_Fd:
nethercotef8548672004-06-21 12:42:35 +00001850 vg_assert(VG_(clo_log_name) == NULL);
1851 VG_(clo_log_fd) = eventually_log_fd;
sewardj4cf05692002-10-27 20:28:29 +00001852 break;
sewardj73cf3bc2002-11-03 03:20:15 +00001853
sewardj4cf05692002-10-27 20:28:29 +00001854 case VgLogTo_File: {
1855 Char logfilename[1000];
jsgff3c3f1a2003-10-14 22:13:28 +00001856 Int seq = 0;
1857 Int pid = VG_(getpid)();
1858
nethercotef8548672004-06-21 12:42:35 +00001859 vg_assert(VG_(clo_log_name) != NULL);
1860 vg_assert(VG_(strlen)(VG_(clo_log_name)) <= 900); /* paranoia */
jsgff3c3f1a2003-10-14 22:13:28 +00001861
nethercote71980f02004-01-24 18:18:54 +00001862 for (;;) {
jsgff3c3f1a2003-10-14 22:13:28 +00001863 if (seq == 0)
1864 VG_(sprintf)(logfilename, "%s.pid%d",
nethercotef8548672004-06-21 12:42:35 +00001865 VG_(clo_log_name), pid );
jsgff3c3f1a2003-10-14 22:13:28 +00001866 else
1867 VG_(sprintf)(logfilename, "%s.pid%d.%d",
nethercotef8548672004-06-21 12:42:35 +00001868 VG_(clo_log_name), pid, seq );
jsgff3c3f1a2003-10-14 22:13:28 +00001869 seq++;
1870
nethercotef8548672004-06-21 12:42:35 +00001871 eventually_log_fd
jsgff3c3f1a2003-10-14 22:13:28 +00001872 = VG_(open)(logfilename,
1873 VKI_O_CREAT|VKI_O_WRONLY|VKI_O_EXCL|VKI_O_TRUNC,
1874 VKI_S_IRUSR|VKI_S_IWUSR);
nethercotef8548672004-06-21 12:42:35 +00001875 if (eventually_log_fd >= 0) {
1876 VG_(clo_log_fd) = VG_(safe_fd)(eventually_log_fd);
jsgff3c3f1a2003-10-14 22:13:28 +00001877 break;
1878 } else {
nethercotef8548672004-06-21 12:42:35 +00001879 if (eventually_log_fd != -VKI_EEXIST) {
jsgff3c3f1a2003-10-14 22:13:28 +00001880 VG_(message)(Vg_UserMsg,
1881 "Can't create/open log file `%s.pid%d'; giving up!",
nethercotef8548672004-06-21 12:42:35 +00001882 VG_(clo_log_name), pid);
jsgff3c3f1a2003-10-14 22:13:28 +00001883 VG_(bad_option)(
nethercotef8548672004-06-21 12:42:35 +00001884 "--log-file=<file> didn't work out for some reason.");
jsgff3c3f1a2003-10-14 22:13:28 +00001885 break;
1886 }
1887 }
1888 }
sewardj4cf05692002-10-27 20:28:29 +00001889 break;
sewardj73cf3bc2002-11-03 03:20:15 +00001890 }
1891
1892 case VgLogTo_Socket: {
nethercotef8548672004-06-21 12:42:35 +00001893 vg_assert(VG_(clo_log_name) != NULL);
1894 vg_assert(VG_(strlen)(VG_(clo_log_name)) <= 900); /* paranoia */
1895 eventually_log_fd = VG_(connect_via_socket)( VG_(clo_log_name) );
1896 if (eventually_log_fd == -1) {
sewardj73cf3bc2002-11-03 03:20:15 +00001897 VG_(message)(Vg_UserMsg,
nethercotef8548672004-06-21 12:42:35 +00001898 "Invalid --log-socket=ipaddr or --log-socket=ipaddr:port spec");
sewardj73cf3bc2002-11-03 03:20:15 +00001899 VG_(message)(Vg_UserMsg,
nethercotef8548672004-06-21 12:42:35 +00001900 "of `%s'; giving up!", VG_(clo_log_name) );
sewardj73cf3bc2002-11-03 03:20:15 +00001901 VG_(bad_option)(
nethercotef8548672004-06-21 12:42:35 +00001902 "--log-socket=");
sewardj4cf05692002-10-27 20:28:29 +00001903 }
nethercotef8548672004-06-21 12:42:35 +00001904 if (eventually_log_fd == -2) {
sewardj73cf3bc2002-11-03 03:20:15 +00001905 VG_(message)(Vg_UserMsg,
sewardj570f8902002-11-03 11:44:36 +00001906 "valgrind: failed to connect to logging server `%s'.",
nethercotef8548672004-06-21 12:42:35 +00001907 VG_(clo_log_name) );
sewardj570f8902002-11-03 11:44:36 +00001908 VG_(message)(Vg_UserMsg,
1909 "Log messages will sent to stderr instead." );
1910 VG_(message)(Vg_UserMsg,
1911 "" );
1912 /* We don't change anything here. */
1913 } else {
nethercotef8548672004-06-21 12:42:35 +00001914 vg_assert(eventually_log_fd > 0);
1915 VG_(clo_log_fd) = eventually_log_fd;
sewardj570f8902002-11-03 11:44:36 +00001916 VG_(logging_to_filedes) = False;
1917 }
sewardj73cf3bc2002-11-03 03:20:15 +00001918 break;
1919 }
1920
sewardj4cf05692002-10-27 20:28:29 +00001921 }
1922
nethercotef8548672004-06-21 12:42:35 +00001923 /* Move log_fd into the safe range, so it doesn't conflict with any app fds */
1924 eventually_log_fd = VG_(fcntl)(VG_(clo_log_fd), VKI_F_DUPFD, VG_(max_fd)+1);
1925 if (eventually_log_fd < 0)
jsgf855d93d2003-10-13 22:26:55 +00001926 VG_(message)(Vg_UserMsg, "valgrind: failed to move logfile fd into safe range");
1927 else {
nethercotef8548672004-06-21 12:42:35 +00001928 VG_(clo_log_fd) = eventually_log_fd;
1929 VG_(fcntl)(VG_(clo_log_fd), VKI_F_SETFD, VKI_FD_CLOEXEC);
jsgf855d93d2003-10-13 22:26:55 +00001930 }
1931
sewardj4cf05692002-10-27 20:28:29 +00001932 /* Ok, the logging sink is running now. Print a suitable preamble.
1933 If logging to file or a socket, write details of parent PID and
1934 command line args, to help people trying to interpret the
1935 results of a run which encompasses multiple processes. */
sewardjde4a1d02002-03-22 01:27:54 +00001936
sewardj83adf412002-05-01 01:25:45 +00001937 if (VG_(clo_verbosity > 0)) {
njnd04b7c62002-10-03 14:05:52 +00001938 /* Skin details */
1939 VG_(message)(Vg_UserMsg, "%s%s%s, %s for x86-linux.",
1940 VG_(details).name,
1941 NULL == VG_(details).version ? "" : "-",
1942 NULL == VG_(details).version
1943 ? (Char*)"" : VG_(details).version,
1944 VG_(details).description);
1945 VG_(message)(Vg_UserMsg, "%s", VG_(details).copyright_author);
sewardj3b2736a2002-03-24 12:18:35 +00001946
njnd04b7c62002-10-03 14:05:52 +00001947 /* Core details */
1948 VG_(message)(Vg_UserMsg,
njn3e884182003-04-15 13:03:23 +00001949 "Using valgrind-%s, a program supervision framework for x86-linux.",
sewardj4aa62ba2002-10-05 15:49:27 +00001950 VERSION);
sewardjde4a1d02002-03-22 01:27:54 +00001951 VG_(message)(Vg_UserMsg,
nethercotebb1c9912004-01-04 16:43:23 +00001952 "Copyright (C) 2000-2004, and GNU GPL'd, by Julian Seward.");
njnd04b7c62002-10-03 14:05:52 +00001953 }
1954
nethercotec1e395d2003-11-10 13:26:49 +00001955 if (VG_(clo_verbosity) > 0 && VG_(clo_log_to) != VgLogTo_Fd) {
sewardj4cf05692002-10-27 20:28:29 +00001956 VG_(message)(Vg_UserMsg, "");
1957 VG_(message)(Vg_UserMsg,
1958 "My PID = %d, parent PID = %d. Prog and args are:",
1959 VG_(getpid)(), VG_(getppid)() );
1960 for (i = 0; i < VG_(client_argc); i++)
1961 VG_(message)(Vg_UserMsg, " %s", VG_(client_argv)[i]);
1962 }
1963
sewardjde4a1d02002-03-22 01:27:54 +00001964 if (VG_(clo_verbosity) > 1) {
nethercotea70f7352004-04-18 12:08:46 +00001965 Int fd;
sewardj4cf05692002-10-27 20:28:29 +00001966 if (VG_(clo_log_to) != VgLogTo_Fd)
1967 VG_(message)(Vg_UserMsg, "");
fitzhardinge98abfc72003-12-16 02:05:15 +00001968 VG_(message)(Vg_UserMsg, "Valgrind library directory: %s", VG_(libdir));
njn86dc2bc2003-09-09 07:26:21 +00001969 VG_(message)(Vg_UserMsg, "Command line");
1970 for (i = 0; i < VG_(client_argc); i++)
1971 VG_(message)(Vg_UserMsg, " %s", VG_(client_argv)[i]);
1972
sewardjde4a1d02002-03-22 01:27:54 +00001973 VG_(message)(Vg_UserMsg, "Startup, with flags:");
nethercote71980f02004-01-24 18:18:54 +00001974 for (i = 1; i < VG_(vg_argc); i++) {
1975 VG_(message)(Vg_UserMsg, " %s", VG_(vg_argv)[i]);
sewardjde4a1d02002-03-22 01:27:54 +00001976 }
nethercotea70f7352004-04-18 12:08:46 +00001977
1978 VG_(message)(Vg_UserMsg, "Contents of /proc/version:");
1979 fd = VG_(open) ( "/proc/version", VKI_O_RDONLY, 0 );
1980 if (fd < 0) {
1981 VG_(message)(Vg_UserMsg, " can't open /proc/version");
1982 } else {
1983 #define BUF_LEN 256
1984 Char version_buf[BUF_LEN];
1985 Int n = VG_(read) ( fd, version_buf, BUF_LEN );
1986 vg_assert(n <= 256);
1987 if (n > 0) {
1988 version_buf[n-1] = '\0';
1989 VG_(message)(Vg_UserMsg, " %s", version_buf);
1990 } else {
1991 VG_(message)(Vg_UserMsg, " (empty?)");
1992 }
1993 VG_(close)(fd);
1994 #undef BUF_LEN
1995 }
sewardjde4a1d02002-03-22 01:27:54 +00001996 }
1997
fitzhardinge98abfc72003-12-16 02:05:15 +00001998 if (VG_(clo_n_suppressions) < VG_CLO_MAX_SFILES-1 &&
njn25e49d8e72002-09-23 09:36:25 +00001999 (VG_(needs).core_errors || VG_(needs).skin_errors)) {
fitzhardinge98abfc72003-12-16 02:05:15 +00002000 /* If there are no suppression files specified and the skin
2001 needs one, load the default */
2002 static const Char default_supp[] = "default.supp";
2003 Int len = VG_(strlen)(VG_(libdir)) + 1 + sizeof(default_supp);
2004 Char *buf = VG_(arena_malloc)(VG_AR_CORE, len);
2005 VG_(sprintf)(buf, "%s/%s", VG_(libdir), default_supp);
2006 VG_(clo_suppressions)[VG_(clo_n_suppressions)] = buf;
2007 VG_(clo_n_suppressions)++;
sewardjde4a1d02002-03-22 01:27:54 +00002008 }
sewardj4cf05692002-10-27 20:28:29 +00002009
njn6a230532003-07-21 10:38:23 +00002010 if (VG_(clo_gen_suppressions) &&
2011 !VG_(needs).core_errors && !VG_(needs).skin_errors) {
nethercotef4928da2004-06-15 10:54:40 +00002012 VG_(message)(Vg_UserMsg,
2013 "Can't use --gen-suppressions=yes with this tool,");
2014 VG_(message)(Vg_UserMsg,
2015 "as it doesn't generate errors.");
2016 VG_(bad_option)("--gen-suppressions=yes");
njn6a230532003-07-21 10:38:23 +00002017 }
sewardjde4a1d02002-03-22 01:27:54 +00002018}
2019
sewardjde4a1d02002-03-22 01:27:54 +00002020
nethercote71980f02004-01-24 18:18:54 +00002021/*====================================================================*/
2022/*=== File descriptor setup ===*/
2023/*====================================================================*/
2024
2025static void setup_file_descriptors(void)
2026{
2027 struct vki_rlimit rl;
2028
2029 /* Get the current file descriptor limits. */
2030 if (VG_(getrlimit)(VKI_RLIMIT_NOFILE, &rl) < 0) {
2031 rl.rlim_cur = 1024;
2032 rl.rlim_max = 1024;
2033 }
2034
2035 /* Work out where to move the soft limit to. */
2036 if (rl.rlim_cur + VG_N_RESERVED_FDS <= rl.rlim_max) {
2037 rl.rlim_cur = rl.rlim_cur + VG_N_RESERVED_FDS;
2038 } else {
2039 rl.rlim_cur = rl.rlim_max;
2040 }
2041
2042 /* Reserve some file descriptors for our use. */
2043 VG_(max_fd) = rl.rlim_cur - VG_N_RESERVED_FDS;
2044
2045 /* Update the soft limit. */
2046 VG_(setrlimit)(VKI_RLIMIT_NOFILE, &rl);
2047
2048 if (VG_(vgexecfd) != -1)
2049 VG_(vgexecfd) = VG_(safe_fd)( VG_(vgexecfd) );
2050 if (VG_(clexecfd) != -1)
2051 VG_(clexecfd) = VG_(safe_fd)( VG_(clexecfd) );
2052}
2053
2054
2055/*====================================================================*/
nethercote1d447092004-02-01 17:29:59 +00002056/*=== baseBlock: definition + setup ===*/
nethercote71980f02004-01-24 18:18:54 +00002057/*====================================================================*/
2058
2059/* The variables storing offsets. */
2060
2061#define INVALID_OFFSET (-1)
2062
2063Int VGOFF_(m_eax) = INVALID_OFFSET;
2064Int VGOFF_(m_ecx) = INVALID_OFFSET;
2065Int VGOFF_(m_edx) = INVALID_OFFSET;
2066Int VGOFF_(m_ebx) = INVALID_OFFSET;
2067Int VGOFF_(m_esp) = INVALID_OFFSET;
2068Int VGOFF_(m_ebp) = INVALID_OFFSET;
2069Int VGOFF_(m_esi) = INVALID_OFFSET;
2070Int VGOFF_(m_edi) = INVALID_OFFSET;
2071Int VGOFF_(m_eflags) = INVALID_OFFSET;
2072Int VGOFF_(m_dflag) = INVALID_OFFSET;
2073Int VGOFF_(m_ssestate) = INVALID_OFFSET;
2074Int VGOFF_(ldt) = INVALID_OFFSET;
2075Int VGOFF_(tls) = INVALID_OFFSET;
2076Int VGOFF_(m_cs) = INVALID_OFFSET;
2077Int VGOFF_(m_ss) = INVALID_OFFSET;
2078Int VGOFF_(m_ds) = INVALID_OFFSET;
2079Int VGOFF_(m_es) = INVALID_OFFSET;
2080Int VGOFF_(m_fs) = INVALID_OFFSET;
2081Int VGOFF_(m_gs) = INVALID_OFFSET;
2082Int VGOFF_(m_eip) = INVALID_OFFSET;
2083Int VGOFF_(spillslots) = INVALID_OFFSET;
2084Int VGOFF_(sh_eax) = INVALID_OFFSET;
2085Int VGOFF_(sh_ecx) = INVALID_OFFSET;
2086Int VGOFF_(sh_edx) = INVALID_OFFSET;
2087Int VGOFF_(sh_ebx) = INVALID_OFFSET;
2088Int VGOFF_(sh_esp) = INVALID_OFFSET;
2089Int VGOFF_(sh_ebp) = INVALID_OFFSET;
2090Int VGOFF_(sh_esi) = INVALID_OFFSET;
2091Int VGOFF_(sh_edi) = INVALID_OFFSET;
2092Int VGOFF_(sh_eflags) = INVALID_OFFSET;
2093
2094Int VGOFF_(helper_idiv_64_32) = INVALID_OFFSET;
2095Int VGOFF_(helper_div_64_32) = INVALID_OFFSET;
2096Int VGOFF_(helper_idiv_32_16) = INVALID_OFFSET;
2097Int VGOFF_(helper_div_32_16) = INVALID_OFFSET;
2098Int VGOFF_(helper_idiv_16_8) = INVALID_OFFSET;
2099Int VGOFF_(helper_div_16_8) = INVALID_OFFSET;
2100Int VGOFF_(helper_imul_32_64) = INVALID_OFFSET;
2101Int VGOFF_(helper_mul_32_64) = INVALID_OFFSET;
2102Int VGOFF_(helper_imul_16_32) = INVALID_OFFSET;
2103Int VGOFF_(helper_mul_16_32) = INVALID_OFFSET;
2104Int VGOFF_(helper_imul_8_16) = INVALID_OFFSET;
2105Int VGOFF_(helper_mul_8_16) = INVALID_OFFSET;
2106Int VGOFF_(helper_CLD) = INVALID_OFFSET;
2107Int VGOFF_(helper_STD) = INVALID_OFFSET;
2108Int VGOFF_(helper_get_dirflag) = INVALID_OFFSET;
2109Int VGOFF_(helper_CLC) = INVALID_OFFSET;
2110Int VGOFF_(helper_STC) = INVALID_OFFSET;
nethercote1018bdd2004-02-11 23:33:29 +00002111Int VGOFF_(helper_CMC) = INVALID_OFFSET;
nethercote71980f02004-01-24 18:18:54 +00002112Int VGOFF_(helper_shldl) = INVALID_OFFSET;
2113Int VGOFF_(helper_shldw) = INVALID_OFFSET;
2114Int VGOFF_(helper_shrdl) = INVALID_OFFSET;
2115Int VGOFF_(helper_shrdw) = INVALID_OFFSET;
2116Int VGOFF_(helper_IN) = INVALID_OFFSET;
2117Int VGOFF_(helper_OUT) = INVALID_OFFSET;
2118Int VGOFF_(helper_RDTSC) = INVALID_OFFSET;
2119Int VGOFF_(helper_CPUID) = INVALID_OFFSET;
2120Int VGOFF_(helper_BSWAP) = INVALID_OFFSET;
nethercote1018bdd2004-02-11 23:33:29 +00002121Int VGOFF_(helper_bsfw) = INVALID_OFFSET;
2122Int VGOFF_(helper_bsfl) = INVALID_OFFSET;
2123Int VGOFF_(helper_bsrw) = INVALID_OFFSET;
2124Int VGOFF_(helper_bsrl) = INVALID_OFFSET;
nethercote71980f02004-01-24 18:18:54 +00002125Int VGOFF_(helper_fstsw_AX) = INVALID_OFFSET;
2126Int VGOFF_(helper_SAHF) = INVALID_OFFSET;
2127Int VGOFF_(helper_LAHF) = INVALID_OFFSET;
2128Int VGOFF_(helper_DAS) = INVALID_OFFSET;
2129Int VGOFF_(helper_DAA) = INVALID_OFFSET;
nethercote1018bdd2004-02-11 23:33:29 +00002130Int VGOFF_(helper_AAS) = INVALID_OFFSET;
2131Int VGOFF_(helper_AAA) = INVALID_OFFSET;
2132Int VGOFF_(helper_AAD) = INVALID_OFFSET;
2133Int VGOFF_(helper_AAM) = INVALID_OFFSET;
nethercote71980f02004-01-24 18:18:54 +00002134Int VGOFF_(helper_cmpxchg8b) = INVALID_OFFSET;
2135Int VGOFF_(helper_undefined_instruction) = INVALID_OFFSET;
2136
2137/* MAX_NONCOMPACT_HELPERS can be increased easily. If MAX_COMPACT_HELPERS is
2138 * increased too much, they won't really be compact any more... */
2139#define MAX_COMPACT_HELPERS 8
2140#define MAX_NONCOMPACT_HELPERS 50
2141
2142UInt VG_(n_compact_helpers) = 0;
2143UInt VG_(n_noncompact_helpers) = 0;
2144
2145Addr VG_(compact_helper_addrs) [MAX_COMPACT_HELPERS];
2146Int VG_(compact_helper_offsets)[MAX_COMPACT_HELPERS];
2147Addr VG_(noncompact_helper_addrs) [MAX_NONCOMPACT_HELPERS];
2148Int VG_(noncompact_helper_offsets)[MAX_NONCOMPACT_HELPERS];
2149
2150/* This is the actual defn of baseblock. */
2151UInt VG_(baseBlock)[VG_BASEBLOCK_WORDS];
2152
nethercote71980f02004-01-24 18:18:54 +00002153/* Words. */
2154static Int baB_off = 0;
2155
2156
sewardjfa492d42002-12-08 18:20:01 +00002157UInt VG_(insertDflag)(UInt eflags, Int d)
2158{
2159 vg_assert(d == 1 || d == -1);
2160 eflags &= ~EFlagD;
2161
2162 if (d < 0)
2163 eflags |= EFlagD;
2164
2165 return eflags;
2166}
2167
2168Int VG_(extractDflag)(UInt eflags)
2169{
2170 Int ret;
2171
2172 if (eflags & EFlagD)
2173 ret = -1;
2174 else
2175 ret = 1;
2176
2177 return ret;
2178}
2179
nethercote71980f02004-01-24 18:18:54 +00002180/* Returns the offset, in words. */
2181static Int alloc_BaB ( Int words )
sewardjde4a1d02002-03-22 01:27:54 +00002182{
nethercote71980f02004-01-24 18:18:54 +00002183 Int off = baB_off;
2184 baB_off += words;
2185 if (baB_off >= VG_BASEBLOCK_WORDS)
2186 VG_(core_panic)( "alloc_BaB: baseBlock is too small");
sewardjde4a1d02002-03-22 01:27:54 +00002187
nethercote71980f02004-01-24 18:18:54 +00002188 return off;
sewardjde4a1d02002-03-22 01:27:54 +00002189}
2190
nethercote71980f02004-01-24 18:18:54 +00002191/* Align offset, in *bytes* */
2192static void align_BaB ( UInt align )
njn25e49d8e72002-09-23 09:36:25 +00002193{
nethercote71980f02004-01-24 18:18:54 +00002194 vg_assert(2 == align || 4 == align || 8 == align || 16 == align);
2195 baB_off += (align-1);
2196 baB_off &= ~(align-1);
njn25e49d8e72002-09-23 09:36:25 +00002197}
2198
nethercote71980f02004-01-24 18:18:54 +00002199/* Allocate 1 word in baseBlock and set it to the given value. */
2200static Int alloc_BaB_1_set ( Addr a )
njn25e49d8e72002-09-23 09:36:25 +00002201{
nethercote71980f02004-01-24 18:18:54 +00002202 Int off = alloc_BaB(1);
2203 VG_(baseBlock)[off] = (UInt)a;
2204 return off;
njn25e49d8e72002-09-23 09:36:25 +00002205}
2206
nethercote71980f02004-01-24 18:18:54 +00002207/* Registers a function in compact_helper_addrs; compact_helper_offsets is
2208 filled in later. */
2209void VG_(register_compact_helper)(Addr a)
sewardjde4a1d02002-03-22 01:27:54 +00002210{
nethercote71980f02004-01-24 18:18:54 +00002211 if (MAX_COMPACT_HELPERS <= VG_(n_compact_helpers)) {
2212 VG_(printf)("Can only register %d compact helpers\n",
2213 MAX_COMPACT_HELPERS);
2214 VG_(core_panic)("Too many compact helpers registered");
2215 }
2216 VG_(compact_helper_addrs)[VG_(n_compact_helpers)] = a;
2217 VG_(n_compact_helpers)++;
2218}
2219
2220/* Registers a function in noncompact_helper_addrs; noncompact_helper_offsets
2221 * is filled in later.
2222 */
2223void VG_(register_noncompact_helper)(Addr a)
2224{
2225 if (MAX_NONCOMPACT_HELPERS <= VG_(n_noncompact_helpers)) {
2226 VG_(printf)("Can only register %d non-compact helpers\n",
2227 MAX_NONCOMPACT_HELPERS);
2228 VG_(printf)("Try increasing MAX_NON_COMPACT_HELPERS\n");
2229 VG_(core_panic)("Too many non-compact helpers registered");
2230 }
2231 VG_(noncompact_helper_addrs)[VG_(n_noncompact_helpers)] = a;
2232 VG_(n_noncompact_helpers)++;
2233}
2234
2235/* Allocate offsets in baseBlock for the skin helpers */
2236static
2237void assign_helpers_in_baseBlock(UInt n, Int offsets[], Addr addrs[])
2238{
2239 UInt i;
2240 for (i = 0; i < n; i++)
2241 offsets[i] = alloc_BaB_1_set( addrs[i] );
2242}
2243
2244Bool VG_(need_to_handle_esp_assignment)(void)
2245{
2246 return ( VG_(defined_new_mem_stack_4)() ||
2247 VG_(defined_die_mem_stack_4)() ||
2248 VG_(defined_new_mem_stack_8)() ||
2249 VG_(defined_die_mem_stack_8)() ||
2250 VG_(defined_new_mem_stack_12)() ||
2251 VG_(defined_die_mem_stack_12)() ||
2252 VG_(defined_new_mem_stack_16)() ||
2253 VG_(defined_die_mem_stack_16)() ||
2254 VG_(defined_new_mem_stack_32)() ||
2255 VG_(defined_die_mem_stack_32)() ||
2256 VG_(defined_new_mem_stack)() ||
2257 VG_(defined_die_mem_stack)()
2258 );
2259}
2260
2261/* Here we assign actual offsets. It's important to get the most
2262 popular referents within 128 bytes of the start, so we can take
2263 advantage of short addressing modes relative to %ebp. Popularity
2264 of offsets was measured on 22 Feb 02 running a KDE application, and
2265 the slots rearranged accordingly, with a 1.5% reduction in total
2266 size of translations. */
2267static void init_baseBlock ( Addr client_eip, Addr esp_at_startup )
2268{
2269 /* Those with offsets under 128 are carefully chosen. */
2270
2271 /* WORD offsets in this column */
2272 /* 0 */ VGOFF_(m_eax) = alloc_BaB_1_set(0);
2273 /* 1 */ VGOFF_(m_ecx) = alloc_BaB_1_set(0);
2274 /* 2 */ VGOFF_(m_edx) = alloc_BaB_1_set(0);
2275 /* 3 */ VGOFF_(m_ebx) = alloc_BaB_1_set(0);
2276 /* 4 */ VGOFF_(m_esp) = alloc_BaB_1_set(esp_at_startup);
2277 /* 5 */ VGOFF_(m_ebp) = alloc_BaB_1_set(0);
2278 /* 6 */ VGOFF_(m_esi) = alloc_BaB_1_set(0);
2279 /* 7 */ VGOFF_(m_edi) = alloc_BaB_1_set(0);
2280 /* 8 */ VGOFF_(m_eflags) = alloc_BaB_1_set(0);
2281
2282 if (VG_(needs).shadow_regs) {
2283 /* 9 */ VGOFF_(sh_eax) = alloc_BaB_1_set(0);
2284 /* 10 */ VGOFF_(sh_ecx) = alloc_BaB_1_set(0);
2285 /* 11 */ VGOFF_(sh_edx) = alloc_BaB_1_set(0);
2286 /* 12 */ VGOFF_(sh_ebx) = alloc_BaB_1_set(0);
2287 /* 13 */ VGOFF_(sh_esp) = alloc_BaB_1_set(0);
2288 /* 14 */ VGOFF_(sh_ebp) = alloc_BaB_1_set(0);
2289 /* 15 */ VGOFF_(sh_esi) = alloc_BaB_1_set(0);
2290 /* 16 */ VGOFF_(sh_edi) = alloc_BaB_1_set(0);
2291 /* 17 */ VGOFF_(sh_eflags) = alloc_BaB_1_set(0);
2292 VG_TRACK( post_regs_write_init );
2293 }
2294
2295 /* 9,10,11 or 18,19,20... depends on number whether shadow regs are used
2296 * and on compact helpers registered */
2297
2298 /* Make these most-frequently-called specialised ones compact, if they
2299 are used. */
2300 if (VG_(defined_new_mem_stack_4)())
2301 VG_(register_compact_helper)( (Addr) VG_(tool_interface).track_new_mem_stack_4);
2302
2303 if (VG_(defined_die_mem_stack_4)())
2304 VG_(register_compact_helper)( (Addr) VG_(tool_interface).track_die_mem_stack_4);
2305
2306 /* (9 or 18) + n_compact_helpers */
2307 /* Allocate slots for compact helpers */
2308 assign_helpers_in_baseBlock(VG_(n_compact_helpers),
2309 VG_(compact_helper_offsets),
2310 VG_(compact_helper_addrs));
2311
2312 /* (9/10 or 18/19) + n_compact_helpers */
2313 VGOFF_(m_eip) = alloc_BaB_1_set(client_eip);
2314
2315 /* There are currently 24 spill slots */
2316 /* (11+/20+ .. 32+/43+) + n_compact_helpers. This can overlap the magic
2317 * boundary at >= 32 words, but most spills are to low numbered spill
2318 * slots, so the ones above the boundary don't see much action. */
2319 VGOFF_(spillslots) = alloc_BaB(VG_MAX_SPILLSLOTS);
2320
2321 /* I gave up counting at this point. Since they're above the
2322 short-amode-boundary, there's no point. */
2323
2324 VGOFF_(m_dflag) = alloc_BaB_1_set(1); // 1 == forward D-flag
2325
2326 /* The FPU/SSE state. This _must_ be 16-byte aligned. Initial
2327 state doesn't matter much, as long as it's not totally borked. */
2328 align_BaB(16);
2329 VGOFF_(m_ssestate) = alloc_BaB(VG_SIZE_OF_SSESTATE_W);
2330 vg_assert(
2331 0 == ( ((UInt)(& VG_(baseBlock)[VGOFF_(m_ssestate)])) % 16 )
sewardj22854b92002-11-30 14:00:47 +00002332 );
2333
fitzhardingec2dbbac2004-01-23 23:09:01 +00002334 /* I assume that if we have SSE2 we also have SSE */
2335 VG_(have_ssestate) =
2336 VG_(cpu_has_feature)(VG_X86_FEAT_FXSR) &&
2337 VG_(cpu_has_feature)(VG_X86_FEAT_SSE);
2338
fitzhardinge98abfc72003-12-16 02:05:15 +00002339 /* set up an initial FPU state (doesn't really matter what it is,
2340 so long as it's somewhat valid) */
2341 if (!VG_(have_ssestate))
nethercote71980f02004-01-24 18:18:54 +00002342 asm volatile("fwait; fnsave %0; fwait; frstor %0; fwait"
2343 :
2344 : "m" (VG_(baseBlock)[VGOFF_(m_ssestate)])
2345 : "cc", "memory");
fitzhardinge98abfc72003-12-16 02:05:15 +00002346 else
nethercote71980f02004-01-24 18:18:54 +00002347 asm volatile("fwait; fxsave %0; fwait; andl $0xffbf, %1;"
2348 "fxrstor %0; fwait"
2349 :
2350 : "m" (VG_(baseBlock)[VGOFF_(m_ssestate)]),
2351 "m" (VG_(baseBlock)[VGOFF_(m_ssestate)+(24/4)])
2352 : "cc", "memory");
fitzhardinge98abfc72003-12-16 02:05:15 +00002353
njn0c7a5b52003-04-30 09:00:33 +00002354 if (0) {
2355 if (VG_(have_ssestate))
2356 VG_(printf)("Looks like a SSE-capable CPU\n");
2357 else
2358 VG_(printf)("Looks like a MMX-only CPU\n");
2359 }
sewardjb91ae7f2003-04-29 23:50:00 +00002360
nethercote71980f02004-01-24 18:18:54 +00002361 /* LDT pointer: pretend the root thread has an empty LDT to start with. */
2362 VGOFF_(ldt) = alloc_BaB_1_set((UInt)NULL);
jsgf855d93d2003-10-13 22:26:55 +00002363
nethercote71980f02004-01-24 18:18:54 +00002364 /* TLS pointer: pretend the root thread has no TLS array for now. */
2365 VGOFF_(tls) = alloc_BaB_1_set((UInt)NULL);
fitzhardingef0046f22003-12-18 02:39:22 +00002366
nethercote71980f02004-01-24 18:18:54 +00002367 /* segment registers */
2368 VGOFF_(m_cs) = alloc_BaB_1_set(0);
2369 VGOFF_(m_ss) = alloc_BaB_1_set(0);
2370 VGOFF_(m_ds) = alloc_BaB_1_set(0);
2371 VGOFF_(m_es) = alloc_BaB_1_set(0);
2372 VGOFF_(m_fs) = alloc_BaB_1_set(0);
2373 VGOFF_(m_gs) = alloc_BaB_1_set(0);
fitzhardingef0046f22003-12-18 02:39:22 +00002374
thughes35cec982004-04-21 15:16:43 +00002375 /* initialise %cs, %ds and %ss to point at the operating systems
2376 default code, data and stack segments */
2377 asm volatile("movw %%cs, %0"
2378 :
2379 : "m" (VG_(baseBlock)[VGOFF_(m_cs)]));
2380 asm volatile("movw %%ds, %0"
2381 :
2382 : "m" (VG_(baseBlock)[VGOFF_(m_ds)]));
2383 asm volatile("movw %%ss, %0"
2384 :
2385 : "m" (VG_(baseBlock)[VGOFF_(m_ss)]));
2386
nethercote71980f02004-01-24 18:18:54 +00002387 VG_(register_noncompact_helper)( (Addr) & VG_(do_useseg) );
fitzhardingef0046f22003-12-18 02:39:22 +00002388
nethercote71980f02004-01-24 18:18:54 +00002389#define REG(kind, size) \
2390 if (VG_(defined_##kind##_mem_stack##size)()) \
2391 VG_(register_noncompact_helper)( \
2392 (Addr) VG_(tool_interface).track_##kind##_mem_stack##size );
2393 REG(new, _8);
2394 REG(new, _12);
2395 REG(new, _16);
2396 REG(new, _32);
2397 REG(new, );
2398 REG(die, _8);
2399 REG(die, _12);
2400 REG(die, _16);
2401 REG(die, _32);
2402 REG(die, );
2403#undef REG
fitzhardingef0046f22003-12-18 02:39:22 +00002404
nethercote71980f02004-01-24 18:18:54 +00002405 if (VG_(need_to_handle_esp_assignment)())
2406 VG_(register_noncompact_helper)((Addr) VG_(unknown_esp_update));
fitzhardingeb791a192003-12-18 07:22:44 +00002407
nethercote71980f02004-01-24 18:18:54 +00002408# define HELPER(name) \
2409 VGOFF_(helper_##name) = alloc_BaB_1_set( (Addr) & VG_(helper_##name))
njn3e884182003-04-15 13:03:23 +00002410
nethercote71980f02004-01-24 18:18:54 +00002411 /* Helper functions. */
2412 HELPER(idiv_64_32); HELPER(div_64_32);
2413 HELPER(idiv_32_16); HELPER(div_32_16);
2414 HELPER(idiv_16_8); HELPER(div_16_8);
fitzhardinge98abfc72003-12-16 02:05:15 +00002415
nethercote71980f02004-01-24 18:18:54 +00002416 HELPER(imul_32_64); HELPER(mul_32_64);
2417 HELPER(imul_16_32); HELPER(mul_16_32);
2418 HELPER(imul_8_16); HELPER(mul_8_16);
njn25e49d8e72002-09-23 09:36:25 +00002419
nethercote71980f02004-01-24 18:18:54 +00002420 HELPER(CLD); HELPER(STD);
2421 HELPER(get_dirflag);
sewardjde4a1d02002-03-22 01:27:54 +00002422
nethercote71980f02004-01-24 18:18:54 +00002423 HELPER(CLC); HELPER(STC);
nethercote1018bdd2004-02-11 23:33:29 +00002424 HELPER(CMC);
jsgf855d93d2003-10-13 22:26:55 +00002425
nethercote71980f02004-01-24 18:18:54 +00002426 HELPER(shldl); HELPER(shldw);
2427 HELPER(shrdl); HELPER(shrdw);
njncc7bb472002-10-14 09:25:19 +00002428
nethercote71980f02004-01-24 18:18:54 +00002429 HELPER(RDTSC); HELPER(CPUID);
njncc7bb472002-10-14 09:25:19 +00002430
nethercote1018bdd2004-02-11 23:33:29 +00002431 HELPER(bsfw); HELPER(bsfl);
2432 HELPER(bsrw); HELPER(bsrl);
rjwalshf5f536f2003-11-17 17:45:00 +00002433
nethercote71980f02004-01-24 18:18:54 +00002434 HELPER(fstsw_AX);
2435 HELPER(SAHF); HELPER(LAHF);
2436 HELPER(DAS); HELPER(DAA);
nethercote1018bdd2004-02-11 23:33:29 +00002437 HELPER(AAS); HELPER(AAA);
2438 HELPER(AAD); HELPER(AAM);
nethercote71980f02004-01-24 18:18:54 +00002439 HELPER(IN); HELPER(OUT);
2440 HELPER(cmpxchg8b);
sewardj018f7622002-05-15 21:13:39 +00002441
nethercote71980f02004-01-24 18:18:54 +00002442 HELPER(undefined_instruction);
jsgf855d93d2003-10-13 22:26:55 +00002443
nethercote71980f02004-01-24 18:18:54 +00002444# undef HELPER
sewardjde4a1d02002-03-22 01:27:54 +00002445
nethercote71980f02004-01-24 18:18:54 +00002446 /* Allocate slots for noncompact helpers */
2447 assign_helpers_in_baseBlock(VG_(n_noncompact_helpers),
2448 VG_(noncompact_helper_offsets),
2449 VG_(noncompact_helper_addrs));
2450}
sewardjde4a1d02002-03-22 01:27:54 +00002451
sewardj5f07b662002-04-23 16:52:51 +00002452
nethercote71980f02004-01-24 18:18:54 +00002453/*====================================================================*/
2454/*=== Setup pointercheck ===*/
2455/*====================================================================*/
njn25e49d8e72002-09-23 09:36:25 +00002456
nethercote71980f02004-01-24 18:18:54 +00002457static void setup_pointercheck(void)
2458{
2459 int ret;
sewardj2e93c502002-04-12 11:12:52 +00002460
fitzhardinge98abfc72003-12-16 02:05:15 +00002461 if (VG_(clo_pointercheck)) {
nethercote71980f02004-01-24 18:18:54 +00002462 vki_modify_ldt_t ldt = {
2463 VG_POINTERCHECK_SEGIDX, // entry_number
2464 VG_(client_base), // base_addr
2465 (VG_(client_end)-VG_(client_base)) / VKI_BYTES_PER_PAGE, // limit
2466 1, // seg_32bit
2467 0, // contents: data, RW, non-expanding
2468 0, // ! read_exec_only
2469 1, // limit_in_pages
2470 0, // ! seg not present
2471 1, // useable
fitzhardinge98abfc72003-12-16 02:05:15 +00002472 };
nethercote71980f02004-01-24 18:18:54 +00002473 ret = VG_(do_syscall)(__NR_modify_ldt, 1, &ldt, sizeof(ldt));
fitzhardinge98abfc72003-12-16 02:05:15 +00002474 if (ret < 0) {
2475 VG_(message)(Vg_UserMsg,
2476 "Warning: ignoring --pointercheck=yes, "
2477 "because modify_ldt failed (errno=%d)", -ret);
2478 VG_(clo_pointercheck) = False;
2479 }
2480 }
sewardjde4a1d02002-03-22 01:27:54 +00002481}
2482
nethercote71980f02004-01-24 18:18:54 +00002483/*====================================================================*/
2484/*=== Initialise program data/text, etc. ===*/
2485/*====================================================================*/
sewardjde4a1d02002-03-22 01:27:54 +00002486
nethercote71980f02004-01-24 18:18:54 +00002487static void build_valgrind_map_callback
2488 ( Addr start, UInt size, Char rr, Char ww, Char xx,
2489 UInt dev, UInt ino, ULong foffset, const UChar* filename )
sewardjde4a1d02002-03-22 01:27:54 +00002490{
nethercote71980f02004-01-24 18:18:54 +00002491 UInt prot = 0;
2492 UInt flags = SF_MMAP|SF_NOSYMS;
2493 Bool is_stack_segment;
2494
2495 is_stack_segment =
2496 (start == VG_(clstk_base) && (start+size) == VG_(clstk_end));
2497
2498 /* Only record valgrind mappings for now, without loading any
2499 symbols. This is so we know where the free space is before we
2500 start allocating more memory (note: heap is OK, it's just mmap
2501 which is the problem here). */
2502 if (start >= VG_(valgrind_base) && (start+size) <= VG_(valgrind_end)) {
2503 flags |= SF_VALGRIND;
2504 VG_(map_file_segment)(start, size, prot, flags, dev, ino, foffset, filename);
2505 }
sewardjde4a1d02002-03-22 01:27:54 +00002506}
2507
nethercote71980f02004-01-24 18:18:54 +00002508// Global var used to pass local data to callback
2509Addr esp_at_startup___global_arg = 0;
sewardjde4a1d02002-03-22 01:27:54 +00002510
nethercote71980f02004-01-24 18:18:54 +00002511static void build_segment_map_callback
2512 ( Addr start, UInt size, Char rr, Char ww, Char xx,
2513 UInt dev, UInt ino, ULong foffset, const UChar* filename )
sewardj45b672d2003-07-25 19:58:11 +00002514{
nethercote71980f02004-01-24 18:18:54 +00002515 UInt prot = 0;
2516 UInt flags;
2517 Bool is_stack_segment;
2518 Addr r_esp;
sewardj45b672d2003-07-25 19:58:11 +00002519
nethercote71980f02004-01-24 18:18:54 +00002520 is_stack_segment
2521 = (start == VG_(clstk_base) && (start+size) == VG_(clstk_end));
fitzhardinge98abfc72003-12-16 02:05:15 +00002522
nethercote71980f02004-01-24 18:18:54 +00002523 if (rr == 'r') prot |= VKI_PROT_READ;
2524 if (ww == 'w') prot |= VKI_PROT_WRITE;
2525 if (xx == 'x') prot |= VKI_PROT_EXEC;
fitzhardinge98abfc72003-12-16 02:05:15 +00002526
nethercote71980f02004-01-24 18:18:54 +00002527 if (is_stack_segment)
2528 flags = SF_STACK | SF_GROWDOWN;
2529 else
2530 flags = SF_EXEC|SF_MMAP;
fitzhardinge98abfc72003-12-16 02:05:15 +00002531
nethercote71980f02004-01-24 18:18:54 +00002532 if (filename != NULL)
2533 flags |= SF_FILE;
fitzhardinge98abfc72003-12-16 02:05:15 +00002534
nethercote71980f02004-01-24 18:18:54 +00002535 if (start >= VG_(valgrind_base) && (start+size) <= VG_(valgrind_end))
2536 flags |= SF_VALGRIND;
fitzhardinge98abfc72003-12-16 02:05:15 +00002537
nethercote71980f02004-01-24 18:18:54 +00002538 VG_(map_file_segment)(start, size, prot, flags, dev, ino, foffset, filename);
fitzhardinge98abfc72003-12-16 02:05:15 +00002539
nethercote71980f02004-01-24 18:18:54 +00002540 if (VG_(is_client_addr)(start) && VG_(is_client_addr)(start+size-1))
2541 VG_TRACK( new_mem_startup, start, size, rr=='r', ww=='w', xx=='x' );
sewardj3e1eb1f2002-05-18 13:14:17 +00002542
nethercote71980f02004-01-24 18:18:54 +00002543 /* If this is the stack segment mark all below %esp as noaccess. */
2544 r_esp = esp_at_startup___global_arg;
2545 vg_assert(0 != r_esp);
2546 if (is_stack_segment) {
2547 if (0)
2548 VG_(message)(Vg_DebugMsg, "invalidating stack area: %x .. %x",
2549 start,r_esp);
2550 VG_TRACK( die_mem_stack, start, r_esp-start );
sewardjde4a1d02002-03-22 01:27:54 +00002551 }
sewardjde4a1d02002-03-22 01:27:54 +00002552}
2553
2554
nethercote71980f02004-01-24 18:18:54 +00002555/*====================================================================*/
2556/*=== Sanity check machinery (permanently engaged) ===*/
2557/*====================================================================*/
njn25e49d8e72002-09-23 09:36:25 +00002558
2559/* A fast sanity check -- suitable for calling circa once per
2560 millisecond. */
2561
2562void VG_(do_sanity_checks) ( Bool force_expensive )
2563{
njn37cea302002-09-30 11:24:00 +00002564 VGP_PUSHCC(VgpCoreCheapSanity);
2565
nethercote27fec902004-06-16 21:26:32 +00002566 if (VG_(clo_sanity_level) < 1) return;
njn25e49d8e72002-09-23 09:36:25 +00002567
2568 /* --- First do all the tests that we can do quickly. ---*/
2569
2570 VG_(sanity_fast_count)++;
2571
njn25e49d8e72002-09-23 09:36:25 +00002572 /* Check stuff pertaining to the memory check system. */
2573
2574 /* Check that nobody has spuriously claimed that the first or
2575 last 16 pages of memory have become accessible [...] */
njn37cea302002-09-30 11:24:00 +00002576 if (VG_(needs).sanity_checks) {
2577 VGP_PUSHCC(VgpSkinCheapSanity);
njn25e49d8e72002-09-23 09:36:25 +00002578 vg_assert(SK_(cheap_sanity_check)());
njn37cea302002-09-30 11:24:00 +00002579 VGP_POPCC(VgpSkinCheapSanity);
2580 }
njn25e49d8e72002-09-23 09:36:25 +00002581
2582 /* --- Now some more expensive checks. ---*/
2583
2584 /* Once every 25 times, check some more expensive stuff. */
2585 if ( force_expensive
nethercote27fec902004-06-16 21:26:32 +00002586 || VG_(clo_sanity_level) > 1
2587 || (VG_(clo_sanity_level) == 1 && (VG_(sanity_fast_count) % 25) == 0)) {
njn25e49d8e72002-09-23 09:36:25 +00002588
njn37cea302002-09-30 11:24:00 +00002589 VGP_PUSHCC(VgpCoreExpensiveSanity);
njn25e49d8e72002-09-23 09:36:25 +00002590 VG_(sanity_slow_count)++;
2591
jsgf855d93d2003-10-13 22:26:55 +00002592 VG_(proxy_sanity)();
2593
njn25e49d8e72002-09-23 09:36:25 +00002594# if 0
2595 { void zzzmemscan(void); zzzmemscan(); }
2596# endif
2597
2598 if ((VG_(sanity_fast_count) % 250) == 0)
2599 VG_(sanity_check_tc_tt)();
2600
2601 if (VG_(needs).sanity_checks) {
njn37cea302002-09-30 11:24:00 +00002602 VGP_PUSHCC(VgpSkinExpensiveSanity);
njn25e49d8e72002-09-23 09:36:25 +00002603 vg_assert(SK_(expensive_sanity_check)());
njn37cea302002-09-30 11:24:00 +00002604 VGP_POPCC(VgpSkinExpensiveSanity);
njn25e49d8e72002-09-23 09:36:25 +00002605 }
2606 /*
2607 if ((VG_(sanity_fast_count) % 500) == 0) VG_(mallocSanityCheckAll)();
2608 */
njn37cea302002-09-30 11:24:00 +00002609 VGP_POPCC(VgpCoreExpensiveSanity);
njn25e49d8e72002-09-23 09:36:25 +00002610 }
2611
nethercote27fec902004-06-16 21:26:32 +00002612 if (VG_(clo_sanity_level) > 1) {
njn37cea302002-09-30 11:24:00 +00002613 VGP_PUSHCC(VgpCoreExpensiveSanity);
njn25e49d8e72002-09-23 09:36:25 +00002614 /* Check sanity of the low-level memory manager. Note that bugs
2615 in the client's code can cause this to fail, so we don't do
2616 this check unless specially asked for. And because it's
2617 potentially very expensive. */
2618 VG_(mallocSanityCheckAll)();
njn37cea302002-09-30 11:24:00 +00002619 VGP_POPCC(VgpCoreExpensiveSanity);
njn25e49d8e72002-09-23 09:36:25 +00002620 }
njn37cea302002-09-30 11:24:00 +00002621 VGP_POPCC(VgpCoreCheapSanity);
njn25e49d8e72002-09-23 09:36:25 +00002622}
nethercote71980f02004-01-24 18:18:54 +00002623
2624
2625/*====================================================================*/
2626/*=== main() ===*/
2627/*====================================================================*/
2628
2629int main(int argc, char **argv)
2630{
2631 char **cl_argv;
2632 const char *tool = NULL;
2633 const char *exec = NULL;
2634 char *preload; /* tool-specific LD_PRELOAD .so */
2635 char **env;
nethercote6c999f22004-01-31 22:55:15 +00002636 Int need_help = 0; // 0 = no, 1 = --help, 2 = --help-debug
nethercote71980f02004-01-24 18:18:54 +00002637 struct exeinfo info;
2638 ToolInfo *toolinfo = NULL;
2639 void *tool_dlhandle;
2640 Addr client_eip;
2641 Addr esp_at_startup; /* client's %esp at the point we gained control. */
2642 UInt * client_auxv;
2643 VgSchedReturnCode src;
fitzhardingeb50068f2004-02-24 23:42:55 +00002644 vki_rlimit zero = { 0, 0 };
nethercote71980f02004-01-24 18:18:54 +00002645
2646 //============================================================
2647 // Nb: startup is complex. Prerequisites are shown at every step.
2648 //
2649 // *** Be very careful when messing with the order ***
2650 //============================================================
2651
nethercotef4928da2004-06-15 10:54:40 +00002652 //============================================================
2653 // Command line argument handling order:
2654 // * If --help/--help-debug are present, show usage message
2655 // (if --tool is also present, that includes the tool-specific usage)
2656 // * Then, if --tool is missing, abort with error msg
2657 // * Then, if client is missing, abort with error msg
2658 // * Then, if any cmdline args are bad, abort with error msg
2659 //============================================================
2660
fitzhardingeb50068f2004-02-24 23:42:55 +00002661 // Get the current process datasize rlimit, and set it to zero.
2662 // This prevents any internal uses of brk() from having any effect.
2663 // We remember the old value so we can restore it on exec, so that
2664 // child processes will have a reasonable brk value.
2665 VG_(getrlimit)(VKI_RLIMIT_DATA, &VG_(client_rlimit_data));
2666 zero.rlim_max = VG_(client_rlimit_data).rlim_max;
2667 VG_(setrlimit)(VKI_RLIMIT_DATA, &zero);
2668
nethercote71980f02004-01-24 18:18:54 +00002669 //--------------------------------------------------------------
2670 // Check we were launched by stage1
2671 // p: n/a [must be first step]
2672 //--------------------------------------------------------------
2673 scan_auxv();
2674
2675 if (0) {
2676 int prmap(void *start, void *end, const char *perm, off_t off,
2677 int maj, int min, int ino) {
2678 printf("mapping %10p-%10p %s %02x:%02x %d\n",
2679 start, end, perm, maj, min, ino);
2680 return True;
2681 }
2682 printf("========== main() ==========\n");
2683 foreach_map(prmap);
2684 }
2685
2686 //--------------------------------------------------------------
2687 // Look for alternative libdir
2688 // p: n/a
2689 //--------------------------------------------------------------
2690 { char *cp = getenv(VALGRINDLIB);
2691 if (cp != NULL)
2692 VG_(libdir) = cp;
2693 }
2694
2695 //--------------------------------------------------------------
2696 // Begin working out address space layout
2697 // p: n/a
2698 //--------------------------------------------------------------
2699 layout_client_space( (Addr) & argc );
2700
2701 //--------------------------------------------------------------
2702 // Get valgrind args + client args (inc. from VALGRIND_OPTS/.valgrindrc).
2703 // Pre-process the command line.
2704 // p: n/a
2705 //--------------------------------------------------------------
2706 get_command_line(argc, argv, &VG_(vg_argc), &VG_(vg_argv), &cl_argv);
2707 pre_process_cmd_line_options(&need_help, &tool, &exec);
2708
2709 //==============================================================
2710 // Nb: once a tool is specified, the tool.so must be loaded even if
2711 // they specified --help or didn't specify a client program.
2712 //==============================================================
2713
2714 //--------------------------------------------------------------
2715 // With client padded out, map in tool
2716 // p: layout_client_space() [for padding]
2717 // p: set-libdir [for VG_(libdir)]
2718 // p: pre_process_cmd_line_options() [for 'tool']
2719 //--------------------------------------------------------------
2720 load_tool(tool, &tool_dlhandle, &toolinfo, &preload);
2721
2722 //==============================================================
2723 // Can use VG_(malloc)() and VG_(arena_malloc)() only after load_tool()
2724 // -- redzone size is now set.
2725 //==============================================================
2726
2727 //--------------------------------------------------------------
2728 // Finalise address space layout
2729 // p: layout_client_space(), load_tool() [for 'toolinfo']
2730 //--------------------------------------------------------------
2731 layout_remaining_space( toolinfo->shadow_ratio );
2732
2733 //--------------------------------------------------------------
2734 // Load client executable, finding in $PATH if necessary
2735 // p: layout_client_space() [so there's space]
2736 // p: pre_process_cmd_line_options() [for 'exec', 'need_help']
2737 // p: layout_remaining_space [so there's space]
2738 //--------------------------------------------------------------
nethercotef4928da2004-06-15 10:54:40 +00002739 load_client(cl_argv, exec, need_help, &info, &client_eip);
nethercote71980f02004-01-24 18:18:54 +00002740
2741 //--------------------------------------------------------------
2742 // Everything in place, unpad us
2743 // p: layout_remaining_space() [everything must be mapped in before now]
2744 // p: load_client() [ditto]
2745 //--------------------------------------------------------------
2746 as_unpad((void *)VG_(shadow_end), (void *)~0);
2747 as_closepadfile(); /* no more padding */
2748
2749 //--------------------------------------------------------------
2750 // Set up client's environment
2751 // p: set-libdir [for VG_(libdir)]
2752 // p: load_tool() [for 'preload']
2753 //--------------------------------------------------------------
2754 env = fix_environment(environ, preload);
2755
2756 //--------------------------------------------------------------
2757 // Setup client stack and eip
2758 // p: load_client() [for 'info']
2759 // p: fix_environment() [for 'env']
2760 //--------------------------------------------------------------
2761 esp_at_startup = setup_client_stack(cl_argv, env, &info, &client_auxv);
2762
2763 if (0)
2764 printf("entry=%x client esp=%x vg_argc=%d brkbase=%x\n",
2765 client_eip, esp_at_startup, VG_(vg_argc), VG_(brk_base));
2766
2767 //==============================================================
2768 // Finished setting up operating environment. Now initialise
2769 // Valgrind. (This is where the old VG_(main)() started.)
2770 //==============================================================
2771
2772 //--------------------------------------------------------------
2773 // Read /proc/self/maps into a buffer
2774 // p: all memory layout, environment setup [so memory maps are right]
2775 //--------------------------------------------------------------
2776 VG_(read_procselfmaps)();
2777
2778 //--------------------------------------------------------------
2779 // atfork
2780 // p: n/a
2781 //--------------------------------------------------------------
2782 VG_(atfork)(NULL, NULL, newpid);
2783 newpid(VG_INVALID_THREADID);
2784
2785 //--------------------------------------------------------------
2786 // setup file descriptors
2787 // p: n/a
2788 //--------------------------------------------------------------
2789 setup_file_descriptors();
2790
2791 //--------------------------------------------------------------
2792 // Setup tool
2793 // p: VG_(read_procselfmaps)() [so if sk_pre_clo_init calls
2794 // VG_(malloc), any mmap'd superblocks aren't erroneously
2795 // identified later as being owned by the client]
2796 // XXX: is that necessary, now that we look for V's segments separately?
2797 // XXX: alternatively, if sk_pre_clo_init does use VG_(malloc)(), is it
2798 // wrong to ignore any segments that might add in parse_procselfmaps?
2799 //--------------------------------------------------------------
2800 (*toolinfo->sk_pre_clo_init)();
2801 VG_(tool_init_dlsym)(tool_dlhandle);
2802 VG_(sanity_check_needs)();
2803
2804 //--------------------------------------------------------------
nethercotef4928da2004-06-15 10:54:40 +00002805 // If --tool and --help/--help-debug was given, now give the core+tool
2806 // help message
2807 // p: pre_clo_init()
2808 //--------------------------------------------------------------
2809 if (need_help) {
2810 usage(/*--help-debug?*/2 == need_help);
2811 }
2812
2813 //--------------------------------------------------------------
nethercote71980f02004-01-24 18:18:54 +00002814 // Process Valgrind's + tool's command-line options
2815 // p: load_tool() [for 'tool']
nethercote71980f02004-01-24 18:18:54 +00002816 // p: setup_file_descriptors() [for 'VG_(max_fd)']
2817 // p: sk_pre_clo_init [to set 'command_line_options' need]
2818 //--------------------------------------------------------------
nethercotef4928da2004-06-15 10:54:40 +00002819 process_cmd_line_options(client_auxv, esp_at_startup, tool);
nethercote71980f02004-01-24 18:18:54 +00002820
2821 //--------------------------------------------------------------
2822 // Allow GDB attach
2823 // p: process_cmd_line_options() [for VG_(clo_wait_for_gdb)]
2824 //--------------------------------------------------------------
2825 /* Hook to delay things long enough so we can get the pid and
2826 attach GDB in another shell. */
2827 if (VG_(clo_wait_for_gdb)) {
2828 VG_(printf)("pid=%d\n", VG_(getpid)());
2829 /* do "jump *$eip" to skip this in gdb */
2830 VG_(do_syscall)(__NR_pause);
2831 }
2832
2833 //--------------------------------------------------------------
2834 // Setup tool, post command-line processing
2835 // p: process_cmd_line_options [tool assumes it]
2836 //--------------------------------------------------------------
2837 SK_(post_clo_init)();
2838
2839 //--------------------------------------------------------------
nethercote1d447092004-02-01 17:29:59 +00002840 // Set up baseBlock
nethercote71980f02004-01-24 18:18:54 +00002841 // p: {pre,post}_clo_init() [for tool helper registration]
2842 // load_client() [for 'client_eip']
2843 // setup_client_stack() [for 'esp_at_startup']
2844 //--------------------------------------------------------------
2845 init_baseBlock(client_eip, esp_at_startup);
2846
2847 //--------------------------------------------------------------
2848 // Search for file descriptors that are inherited from our parent
2849 // p: process_cmd_line_options [for VG_(clo_track_fds)]
2850 //--------------------------------------------------------------
2851 if (VG_(clo_track_fds))
2852 VG_(init_preopened_fds)();
2853
2854 //--------------------------------------------------------------
2855 // Initialise the scheduler
2856 // p: init_baseBlock() [baseBlock regs copied into VG_(threads)[1]]
2857 // p: setup_file_descriptors() [else VG_(safe_fd)() breaks]
2858 //--------------------------------------------------------------
2859 VG_(scheduler_init)();
2860
2861 //--------------------------------------------------------------
2862 // Set up the ProxyLWP machinery
2863 // p: VG_(scheduler_init)()? [XXX: subtle dependency?]
2864 // - subs: VG_(sigstartup_actions)()?
2865 //--------------------------------------------------------------
2866 VG_(proxy_init)();
2867
2868 //--------------------------------------------------------------
2869 // Initialise the signal handling subsystem
2870 // p: VG_(atfork)(NULL, NULL, newpid) [else problems with sigmasks]
2871 // p: VG_(proxy_init)() [else breaks...]
2872 //--------------------------------------------------------------
2873 // Nb: temporarily parks the saved blocking-mask in saved_sigmask.
2874 VG_(sigstartup_actions)();
2875
2876 //--------------------------------------------------------------
2877 // Perhaps we're profiling Valgrind?
2878 // p: process_cmd_line_options() [for VG_(clo_profile)]
2879 // p: others?
2880 //
2881 // XXX: this seems to be broken? It always says the tool wasn't built
2882 // for profiling; vg_profile.c's functions don't seem to be overriding
2883 // vg_dummy_profile.c's?
2884 //
2885 // XXX: want this as early as possible. Looking for --profile
2886 // in pre_process_cmd_line_options() could get it earlier.
2887 //--------------------------------------------------------------
2888 if (VG_(clo_profile))
2889 VGP_(init_profiling)();
2890
2891 VGP_PUSHCC(VgpStartup);
2892
2893 //--------------------------------------------------------------
nethercote71980f02004-01-24 18:18:54 +00002894 // Reserve Valgrind's kickstart, heap and stack
2895 // p: XXX ???
2896 //--------------------------------------------------------------
2897 VG_(map_segment)(VG_(valgrind_mmap_end),
2898 VG_(valgrind_end)-VG_(valgrind_mmap_end),
2899 VKI_PROT_NONE, SF_VALGRIND|SF_FIXED);
2900
2901 //--------------------------------------------------------------
2902 // Identify Valgrind's segments
2903 // p: read proc/self/maps
2904 // p: VG_(map_segment) [XXX ???]
2905 // p: sk_pre_clo_init() [to setup new_mem_startup tracker]
2906 //--------------------------------------------------------------
2907 VG_(parse_procselfmaps) ( build_valgrind_map_callback );
2908
2909 // XXX: I can't see why these two need to be separate; could they be
2910 // folded together? If not, need a comment explaining why.
2911 //
2912 // XXX: can we merge reading and parsing of /proc/self/maps?
2913 //
2914 // XXX: can we dynamically allocate the /proc/self/maps buffer? (or mmap
2915 // it?) Or does that disturb its contents...
2916
2917 //--------------------------------------------------------------
2918 // Build segment map (all segments)
2919 // p: setup_client_stack() [for 'esp_at_startup']
2920 //--------------------------------------------------------------
2921 esp_at_startup___global_arg = esp_at_startup;
2922 VG_(parse_procselfmaps) ( build_segment_map_callback ); /* everything */
2923 esp_at_startup___global_arg = 0;
2924
2925 //==============================================================
2926 // Can only use VG_(map)() after VG_(map_segment)() [XXX ???]
2927 //==============================================================
2928
2929 //--------------------------------------------------------------
2930 // Build segment map (all segments)
2931 // p: setup_client_stack() [for 'esp_at_startup']
2932 //--------------------------------------------------------------
2933 /* Initialize our trampoline page (which is also sysinfo stuff) */
2934 VG_(memcpy)( (void *)VG_(client_trampoline_code),
2935 &VG_(trampoline_code_start), VG_(trampoline_code_length) );
2936 VG_(mprotect)( (void *)VG_(client_trampoline_code),
2937 VG_(trampoline_code_length), VKI_PROT_READ|VKI_PROT_EXEC );
2938
2939 //--------------------------------------------------------------
2940 // Read suppression file
2941 // p: process_cmd_line_options() [for VG_(clo_suppressions)]
2942 //--------------------------------------------------------------
2943 if (VG_(needs).core_errors || VG_(needs).skin_errors)
2944 VG_(load_suppressions)();
2945
2946 //--------------------------------------------------------------
nethercote71980f02004-01-24 18:18:54 +00002947 // Initialise translation table and translation cache
2948 // p: read_procselfmaps [so the anonymous mmaps for the TT/TC
2949 // aren't identified as part of the client, which would waste
2950 // > 20M of virtual address space.]
2951 //--------------------------------------------------------------
2952 VG_(init_tt_tc)();
2953
2954 //--------------------------------------------------------------
2955 // Read debug info to find glibc entry points to intercept
2956 // p: parse_procselfmaps? [XXX for debug info?]
2957 // p: init_tt_tc? [XXX ???]
2958 //--------------------------------------------------------------
2959 VG_(setup_code_redirect_table)();
2960
2961 //--------------------------------------------------------------
2962 // Verbosity message
2963 // p: end_rdtsc_calibration [so startup message is printed first]
2964 //--------------------------------------------------------------
2965 if (VG_(clo_verbosity) == 1)
2966 VG_(message)(Vg_UserMsg, "For more details, rerun with: -v");
2967 if (VG_(clo_verbosity) > 0)
2968 VG_(message)(Vg_UserMsg, "");
2969
2970 //--------------------------------------------------------------
2971 // Setup pointercheck
2972 // p: process_cmd_line_options() [for VG_(clo_pointercheck)]
2973 //--------------------------------------------------------------
2974 setup_pointercheck();
2975
2976
2977
2978 //--------------------------------------------------------------
2979 // Run!
2980 //--------------------------------------------------------------
2981 VG_(running_on_simd_CPU) = True;
2982 VGP_POPCC(VgpStartup);
2983 VGP_PUSHCC(VgpSched);
2984
2985 if (__builtin_setjmp(&VG_(fatal_signal_jmpbuf)) == 0) {
2986 VG_(fatal_signal_set) = True;
2987 src = VG_(scheduler)();
2988 } else
2989 src = VgSrc_FatalSig;
2990
2991 VGP_POPCC(VgpSched);
2992 VG_(running_on_simd_CPU) = False;
2993
2994
2995
2996 //--------------------------------------------------------------
2997 // Finalisation: cleanup, messages, etc. Order no so important, only
2998 // affects what order the messages come.
2999 //--------------------------------------------------------------
3000 if (VG_(clo_verbosity) > 0)
3001 VG_(message)(Vg_UserMsg, "");
3002
3003 if (src == VgSrc_Deadlock) {
3004 VG_(message)(Vg_UserMsg,
3005 "Warning: pthread scheduler exited due to deadlock");
3006 }
3007
3008 /* Print out file descriptor summary and stats. */
3009 if (VG_(clo_track_fds))
3010 VG_(fd_stats)();
3011
3012 if (VG_(needs).core_errors || VG_(needs).skin_errors)
3013 VG_(show_all_errors)();
3014
3015 SK_(fini)( VG_(exitcode) );
3016
3017 VG_(do_sanity_checks)( True /*include expensive checks*/ );
3018
3019 if (VG_(clo_verbosity) > 1)
3020 show_counts();
3021
3022 if (VG_(clo_verbosity) > 3)
3023 VG_(print_UInstr_histogram)();
3024
3025 if (0) {
3026 VG_(message)(Vg_DebugMsg, "");
3027 VG_(message)(Vg_DebugMsg,
3028 "------ Valgrind's internal memory use stats follow ------" );
3029 VG_(mallocSanityCheckAll)();
3030 VG_(show_all_arena_stats)();
3031 VG_(message)(Vg_DebugMsg,
3032 "------ Valgrind's ExeContext management stats follow ------" );
3033 VG_(show_ExeContext_stats)();
3034 }
3035
3036 if (VG_(clo_profile))
3037 VGP_(done_profiling)();
3038
nethercote71980f02004-01-24 18:18:54 +00003039 /* We're exiting, so nuke all the threads and clean up the proxy LWPs */
3040 vg_assert(src == VgSrc_FatalSig ||
3041 VG_(threads)[VG_(last_run_tid)].status == VgTs_Runnable ||
3042 VG_(threads)[VG_(last_run_tid)].status == VgTs_WaitJoiner);
3043 VG_(nuke_all_threads_except)(VG_INVALID_THREADID);
3044
3045 //--------------------------------------------------------------
3046 // Exit, according to the scheduler's return code
3047 //--------------------------------------------------------------
3048 switch (src) {
3049 case VgSrc_ExitSyscall: /* the normal way out */
3050 vg_assert(VG_(last_run_tid) > 0
3051 && VG_(last_run_tid) < VG_N_THREADS);
3052 VG_(proxy_shutdown)();
3053
3054 /* The thread's %EBX at the time it did __NR_exit() will hold
3055 the arg to __NR_exit(), so we just do __NR_exit() with
3056 that arg. */
3057 VG_(exit)( VG_(exitcode) );
3058 /* NOT ALIVE HERE! */
3059 VG_(core_panic)("entered the afterlife in main() -- ExitSyscall");
3060 break; /* what the hell :) */
3061
3062 case VgSrc_Deadlock:
3063 /* Just exit now. No point in continuing. */
3064 VG_(proxy_shutdown)();
3065 VG_(exit)(0);
3066 VG_(core_panic)("entered the afterlife in main() -- Deadlock");
3067 break;
3068
nethercote71980f02004-01-24 18:18:54 +00003069 case VgSrc_FatalSig:
3070 /* We were killed by a fatal signal, so replicate the effect */
3071 vg_assert(VG_(fatal_sigNo) != -1);
3072 VG_(kill_self)(VG_(fatal_sigNo));
3073 VG_(core_panic)("main(): signal was supposed to be fatal");
3074 break;
3075
3076 default:
3077 VG_(core_panic)("main(): unexpected scheduler return code");
3078 }
3079
3080 abort();
3081}
3082
3083
sewardjde4a1d02002-03-22 01:27:54 +00003084/*--------------------------------------------------------------------*/
3085/*--- end vg_main.c ---*/
3086/*--------------------------------------------------------------------*/