blob: c8cfcfaf4d7b11288813cb317e8bb66eb4f9772c [file] [log] [blame]
sewardjde4a1d02002-03-22 01:27:54 +00001
2/*--------------------------------------------------------------------*/
nethercote71980f02004-01-24 18:18:54 +00003/*--- Startup: the real stuff vg_main.c ---*/
sewardjde4a1d02002-03-22 01:27:54 +00004/*--------------------------------------------------------------------*/
5
6/*
njnc9539842002-10-02 13:26:35 +00007 This file is part of Valgrind, an extensible x86 protected-mode
8 emulator for monitoring program execution on x86-Unixes.
sewardjde4a1d02002-03-22 01:27:54 +00009
nethercotebb1c9912004-01-04 16:43:23 +000010 Copyright (C) 2000-2004 Julian Seward
sewardjde4a1d02002-03-22 01:27:54 +000011 jseward@acm.org
sewardjde4a1d02002-03-22 01:27:54 +000012
13 This program is free software; you can redistribute it and/or
14 modify it under the terms of the GNU General Public License as
15 published by the Free Software Foundation; either version 2 of the
16 License, or (at your option) any later version.
17
18 This program is distributed in the hope that it will be useful, but
19 WITHOUT ANY WARRANTY; without even the implied warranty of
20 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
21 General Public License for more details.
22
23 You should have received a copy of the GNU General Public License
24 along with this program; if not, write to the Free Software
25 Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA
26 02111-1307, USA.
27
njn25e49d8e72002-09-23 09:36:25 +000028 The GNU General Public License is contained in the file COPYING.
sewardjde4a1d02002-03-22 01:27:54 +000029*/
30
nethercote71980f02004-01-24 18:18:54 +000031#define _FILE_OFFSET_BITS 64
sewardjde4a1d02002-03-22 01:27:54 +000032
nethercote71980f02004-01-24 18:18:54 +000033#include "vg_include.h"
34#include "ume.h"
35#include "ume_arch.h"
36#include "ume_archdefs.h"
37
38#include <dirent.h>
39#include <dlfcn.h>
40#include <errno.h>
41#include <fcntl.h>
42#include <stdio.h>
fitzhardingeb727d042004-01-06 00:18:21 +000043#include <stdlib.h>
nethercote71980f02004-01-24 18:18:54 +000044#include <string.h>
45#include <sys/mman.h>
46#include <sys/types.h>
47#include <sys/stat.h>
fitzhardingeb727d042004-01-06 00:18:21 +000048#include <sys/ptrace.h>
49#include <sys/signal.h>
fitzhardingeb727d042004-01-06 00:18:21 +000050#include <sys/wait.h>
51#include <unistd.h>
52
thughes74b8de22004-04-22 18:12:31 +000053#ifndef AT_DCACHEBSIZE
54#define AT_DCACHEBSIZE 19
55#endif /* AT_DCACHEBSIZE */
56
57#ifndef AT_ICACHEBSIZE
58#define AT_ICACHEBSIZE 20
59#endif /* AT_ICACHEBSIZE */
60
61#ifndef AT_UCACHEBSIZE
62#define AT_UCACHEBSIZE 21
63#endif /* AT_UCACHEBSIZE */
64
nethercote71980f02004-01-24 18:18:54 +000065#ifndef AT_SYSINFO
66#define AT_SYSINFO 32
67#endif /* AT_SYSINFO */
68
69#ifndef AT_SYSINFO_EHDR
70#define AT_SYSINFO_EHDR 33
71#endif /* AT_SYSINFO_EHDR */
72
73#ifndef AT_SECURE
74#define AT_SECURE 23 /* secure mode boolean */
75#endif /* AT_SECURE */
76
77/* Amount to reserve for Valgrind's internal heap */
78#define VALGRIND_HEAPSIZE (128*1024*1024)
79
80/* Amount to reserve for Valgrind's internal mappings */
81#define VALGRIND_MAPSIZE (128*1024*1024)
82
83/* redzone gap between client address space and shadow */
84#define REDZONE_SIZE (1 * 1024*1024)
85
86/* size multiple for client address space */
87#define CLIENT_SIZE_MULTIPLE (64 * 1024*1024)
88
89#define ISSPACE(cc) ((cc) == ' ' || (cc) == '\t' || (cc) == '\n')
90
91/*====================================================================*/
92/*=== Global entities not referenced from generated code ===*/
93/*====================================================================*/
94
sewardjde4a1d02002-03-22 01:27:54 +000095/* ---------------------------------------------------------------------
nethercote71980f02004-01-24 18:18:54 +000096 Startup stuff
sewardjde4a1d02002-03-22 01:27:54 +000097 ------------------------------------------------------------------ */
nethercote71980f02004-01-24 18:18:54 +000098/* linker-defined base address */
99extern char kickstart_base;
sewardjde4a1d02002-03-22 01:27:54 +0000100
nethercote71980f02004-01-24 18:18:54 +0000101/* Client address space, lowest to highest (see top of ume.c) */
102Addr VG_(client_base); /* client address space limits */
fitzhardinge98abfc72003-12-16 02:05:15 +0000103Addr VG_(client_end);
104Addr VG_(client_mapbase);
fitzhardinge92360792003-12-24 10:11:11 +0000105Addr VG_(client_trampoline_code);
fitzhardinge98abfc72003-12-16 02:05:15 +0000106Addr VG_(clstk_base);
107Addr VG_(clstk_end);
nethercote71980f02004-01-24 18:18:54 +0000108
109Addr VG_(brk_base); /* start of brk */
110Addr VG_(brk_limit); /* current brk */
111
112Addr VG_(shadow_base); /* skin's shadow memory */
fitzhardinge98abfc72003-12-16 02:05:15 +0000113Addr VG_(shadow_end);
nethercote71980f02004-01-24 18:18:54 +0000114
115Addr VG_(valgrind_base); /* valgrind's address range */
116Addr VG_(valgrind_mmap_end); /* valgrind's mmaps are between valgrind_base and here */
fitzhardinge98abfc72003-12-16 02:05:15 +0000117Addr VG_(valgrind_end);
118
fitzhardingeb50068f2004-02-24 23:42:55 +0000119vki_rlimit VG_(client_rlimit_data);
120
nethercote71980f02004-01-24 18:18:54 +0000121/* This is set early to indicate whether this CPU has the
122 SSE/fxsave/fxrestor features. */
123Bool VG_(have_ssestate);
124
125/* Indicates presence, and holds address of client's sysinfo page, a
126 feature of some modern kernels used to provide vsyscalls, etc. */
127Bool VG_(sysinfo_page_exists) = False;
128Addr VG_(sysinfo_page_addr) = 0;
129
fitzhardinge98abfc72003-12-16 02:05:15 +0000130/* stage1 (main) executable */
fitzhardingea49f9b52003-12-16 22:26:45 +0000131Int VG_(vgexecfd) = -1;
132
133/* client executable */
134Int VG_(clexecfd) = -1;
fitzhardinge98abfc72003-12-16 02:05:15 +0000135
136/* Path to library directory */
137const Char *VG_(libdir) = VG_LIBDIR;
138
139/* our argc/argv */
140Int VG_(vg_argc);
141Char **VG_(vg_argv);
142
jsgf855d93d2003-10-13 22:26:55 +0000143/* PID of the main thread */
144Int VG_(main_pid);
145
146/* PGRP of process */
147Int VG_(main_pgrp);
njn25e49d8e72002-09-23 09:36:25 +0000148
fitzhardingef0046f22003-12-18 02:39:22 +0000149/* Maximum allowed application-visible file descriptor */
fitzhardingeb791a192003-12-18 07:22:44 +0000150Int VG_(max_fd) = -1;
fitzhardingef0046f22003-12-18 02:39:22 +0000151
nethercote71980f02004-01-24 18:18:54 +0000152/* As deduced from esp_at_startup, the client's argc, argv[] and
153 envp[] as extracted from the client's stack at startup-time. */
154Int VG_(client_argc);
155Char** VG_(client_argv);
156Char** VG_(client_envp);
sewardjde4a1d02002-03-22 01:27:54 +0000157
158/* ---------------------------------------------------------------------
nethercote71980f02004-01-24 18:18:54 +0000159 Running stuff
sewardjde4a1d02002-03-22 01:27:54 +0000160 ------------------------------------------------------------------ */
nethercote71980f02004-01-24 18:18:54 +0000161/* Our signal delivery stack. */
njn6eba4ef2003-05-01 08:06:41 +0000162UInt VG_(sigstack)[VG_SIGSTACK_SIZE_W];
sewardjde4a1d02002-03-22 01:27:54 +0000163
164/* Saving stuff across system calls. */
sewardjb91ae7f2003-04-29 23:50:00 +0000165__attribute__ ((aligned (16)))
166UInt VG_(real_sse_state_saved_over_syscall)[VG_SIZE_OF_SSESTATE_W];
sewardj43c356f2002-06-02 00:21:08 +0000167Addr VG_(esp_saved_over_syscall);
sewardjde4a1d02002-03-22 01:27:54 +0000168
nethercote71980f02004-01-24 18:18:54 +0000169/* jmp_buf for fatal signals */
170Int VG_(fatal_sigNo) = -1;
171Bool VG_(fatal_signal_set) = False;
172jmp_buf VG_(fatal_signal_jmpbuf);
sewardjde4a1d02002-03-22 01:27:54 +0000173
nethercote71980f02004-01-24 18:18:54 +0000174/* Counts downwards in VG_(run_innerloop). */
175UInt VG_(dispatch_ctr);
sewardjde4a1d02002-03-22 01:27:54 +0000176
177/* 64-bit counter for the number of basic blocks done. */
178ULong VG_(bbs_done);
sewardjde4a1d02002-03-22 01:27:54 +0000179
sewardj7e87e382002-05-03 19:09:05 +0000180/* This is the ThreadId of the last thread the scheduler ran. */
181ThreadId VG_(last_run_tid) = 0;
182
nethercote71980f02004-01-24 18:18:54 +0000183/* Tell the logging mechanism whether we are logging to a file
184 descriptor or a socket descriptor. */
185Bool VG_(logging_to_filedes) = True;
186
187/* This Bool is needed by wrappers in vg_clientmalloc.c to decide how
188 to behave. Initially we say False. */
189Bool VG_(running_on_simd_CPU) = False;
190
njn25e49d8e72002-09-23 09:36:25 +0000191/* This is the argument to __NR_exit() supplied by the first thread to
192 call that syscall. We eventually pass that to __NR_exit() for
193 real. */
njn633de322003-05-12 20:40:13 +0000194Int VG_(exitcode) = 0;
njn25e49d8e72002-09-23 09:36:25 +0000195
sewardj73cf3bc2002-11-03 03:20:15 +0000196
nethercote71980f02004-01-24 18:18:54 +0000197/*====================================================================*/
198/*=== Counters, for profiling purposes only ===*/
199/*====================================================================*/
sewardjde4a1d02002-03-22 01:27:54 +0000200
201/* Number of lookups which miss the fast tt helper. */
202UInt VG_(tt_fast_misses) = 0;
203
204
sewardjc0d8f682002-11-30 00:49:43 +0000205/* Counts for TT/TC informational messages. */
sewardjde4a1d02002-03-22 01:27:54 +0000206
sewardjde4a1d02002-03-22 01:27:54 +0000207/* Number and total o/t size of translations overall. */
208UInt VG_(overall_in_count) = 0;
209UInt VG_(overall_in_osize) = 0;
210UInt VG_(overall_in_tsize) = 0;
211/* Number and total o/t size of discards overall. */
212UInt VG_(overall_out_count) = 0;
213UInt VG_(overall_out_osize) = 0;
214UInt VG_(overall_out_tsize) = 0;
sewardjc0d8f682002-11-30 00:49:43 +0000215/* The number of discards of TT/TC. */
216UInt VG_(number_of_tc_discards) = 0;
sewardj22854b92002-11-30 14:00:47 +0000217/* Counts of chain and unchain operations done. */
218UInt VG_(bb_enchain_count) = 0;
219UInt VG_(bb_dechain_count) = 0;
220/* Number of unchained jumps performed. */
221UInt VG_(unchained_jumps_done) = 0;
sewardjde4a1d02002-03-22 01:27:54 +0000222
223
224/* Counts pertaining to the register allocator. */
225
226/* total number of uinstrs input to reg-alloc */
227UInt VG_(uinstrs_prealloc) = 0;
228
229/* total number of uinstrs added due to spill code */
230UInt VG_(uinstrs_spill) = 0;
231
232/* number of bbs requiring spill code */
233UInt VG_(translations_needing_spill) = 0;
234
235/* total of register ranks over all translations */
236UInt VG_(total_reg_rank) = 0;
237
238
sewardjde4a1d02002-03-22 01:27:54 +0000239/* Counts pertaining to internal sanity checking. */
sewardjde4a1d02002-03-22 01:27:54 +0000240UInt VG_(sanity_fast_count) = 0;
241UInt VG_(sanity_slow_count) = 0;
242
sewardj2e93c502002-04-12 11:12:52 +0000243/* Counts pertaining to the scheduler. */
244UInt VG_(num_scheduling_events_MINOR) = 0;
245UInt VG_(num_scheduling_events_MAJOR) = 0;
sewardjde4a1d02002-03-22 01:27:54 +0000246
247
nethercote71980f02004-01-24 18:18:54 +0000248static __inline__ Int safe_idiv(Int a, Int b)
249{
250 return (b == 0 ? 0 : a / b);
251}
252
253static void show_counts ( void )
254{
255 VG_(message)(Vg_DebugMsg,
256 " TT/TC: %d tc sectors discarded.",
257 VG_(number_of_tc_discards) );
258 VG_(message)(Vg_DebugMsg,
259 " %d chainings, %d unchainings.",
260 VG_(bb_enchain_count), VG_(bb_dechain_count) );
261 VG_(message)(Vg_DebugMsg,
262 "translate: new %d (%d -> %d; ratio %d:10)",
263 VG_(overall_in_count),
264 VG_(overall_in_osize),
265 VG_(overall_in_tsize),
266 safe_idiv(10*VG_(overall_in_tsize), VG_(overall_in_osize)));
267 VG_(message)(Vg_DebugMsg,
268 " discard %d (%d -> %d; ratio %d:10).",
269 VG_(overall_out_count),
270 VG_(overall_out_osize),
271 VG_(overall_out_tsize),
272 safe_idiv(10*VG_(overall_out_tsize), VG_(overall_out_osize)));
273 VG_(message)(Vg_DebugMsg,
274 " dispatch: %llu jumps (bb entries), of which %u (%lu%%) were unchained.",
275 VG_(bbs_done),
276 VG_(unchained_jumps_done),
277 ((ULong)(100) * (ULong)(VG_(unchained_jumps_done)))
278 / ( VG_(bbs_done)==0 ? 1 : VG_(bbs_done) )
279 );
280
281 VG_(message)(Vg_DebugMsg,
282 " %d/%d major/minor sched events. %d tt_fast misses.",
283 VG_(num_scheduling_events_MAJOR),
284 VG_(num_scheduling_events_MINOR),
285 VG_(tt_fast_misses));
286
287 VG_(message)(Vg_DebugMsg,
288 "reg-alloc: %d t-req-spill, "
289 "%d+%d orig+spill uis, %d total-reg-r.",
290 VG_(translations_needing_spill),
291 VG_(uinstrs_prealloc),
292 VG_(uinstrs_spill),
293 VG_(total_reg_rank) );
294 VG_(message)(Vg_DebugMsg,
295 " sanity: %d cheap, %d expensive checks.",
296 VG_(sanity_fast_count),
297 VG_(sanity_slow_count) );
298 VG_(print_ccall_stats)();
299}
300
301
302/*====================================================================*/
303/*=== Miscellaneous global functions ===*/
304/*====================================================================*/
305
nethercote04d0fbc2004-01-26 16:48:06 +0000306/* Start debugger and get it to attach to this process. Called if the
307 user requests this service after an error has been shown, so she can
nethercote71980f02004-01-24 18:18:54 +0000308 poke around and look at parameters, memory, etc. You can't
nethercote04d0fbc2004-01-26 16:48:06 +0000309 meaningfully get the debugger to continue the program, though; to
310 continue, quit the debugger. */
311void VG_(start_debugger) ( Int tid )
nethercote71980f02004-01-24 18:18:54 +0000312{
313 Int pid;
314
315 if ((pid = fork()) == 0) {
316 ptrace(PTRACE_TRACEME, 0, NULL, NULL);
317 VG_(kkill)(VG_(getpid)(), VKI_SIGSTOP);
318
319 } else if (pid > 0) {
320 struct user_regs_struct regs;
321 Int status;
322 Int res;
323
324 if (VG_(is_running_thread)( tid )) {
fitzhardinged65dcad2004-03-13 02:06:58 +0000325 regs.cs = VG_(baseBlock)[VGOFF_(m_cs)];
326 regs.ss = VG_(baseBlock)[VGOFF_(m_ss)];
327 regs.ds = VG_(baseBlock)[VGOFF_(m_ds)];
328 regs.es = VG_(baseBlock)[VGOFF_(m_es)];
329 regs.fs = VG_(baseBlock)[VGOFF_(m_fs)];
330 regs.gs = VG_(baseBlock)[VGOFF_(m_gs)];
nethercote71980f02004-01-24 18:18:54 +0000331 regs.eax = VG_(baseBlock)[VGOFF_(m_eax)];
332 regs.ebx = VG_(baseBlock)[VGOFF_(m_ebx)];
333 regs.ecx = VG_(baseBlock)[VGOFF_(m_ecx)];
334 regs.edx = VG_(baseBlock)[VGOFF_(m_edx)];
335 regs.esi = VG_(baseBlock)[VGOFF_(m_esi)];
336 regs.edi = VG_(baseBlock)[VGOFF_(m_edi)];
337 regs.ebp = VG_(baseBlock)[VGOFF_(m_ebp)];
338 regs.esp = VG_(baseBlock)[VGOFF_(m_esp)];
339 regs.eflags = VG_(baseBlock)[VGOFF_(m_eflags)];
340 regs.eip = VG_(baseBlock)[VGOFF_(m_eip)];
341 } else {
342 ThreadState* tst = & VG_(threads)[ tid ];
343
fitzhardinged65dcad2004-03-13 02:06:58 +0000344 regs.cs = tst->m_cs;
345 regs.ss = tst->m_ss;
346 regs.ds = tst->m_ds;
347 regs.es = tst->m_es;
348 regs.fs = tst->m_fs;
349 regs.gs = tst->m_gs;
nethercote71980f02004-01-24 18:18:54 +0000350 regs.eax = tst->m_eax;
351 regs.ebx = tst->m_ebx;
352 regs.ecx = tst->m_ecx;
353 regs.edx = tst->m_edx;
354 regs.esi = tst->m_esi;
355 regs.edi = tst->m_edi;
356 regs.ebp = tst->m_ebp;
357 regs.esp = tst->m_esp;
358 regs.eflags = tst->m_eflags;
359 regs.eip = tst->m_eip;
360 }
361
362 if ((res = VG_(waitpid)(pid, &status, 0)) == pid &&
363 WIFSTOPPED(status) && WSTOPSIG(status) == SIGSTOP &&
364 ptrace(PTRACE_SETREGS, pid, NULL, &regs) == 0 &&
thughes1d160052004-04-21 15:39:57 +0000365 kill(pid, SIGSTOP) == 0 &&
366 ptrace(PTRACE_DETACH, pid, NULL, 0) == 0) {
nethercote04d0fbc2004-01-26 16:48:06 +0000367 Char pidbuf[15];
368 Char file[30];
369 Char buf[100];
370 Char *bufptr;
371 Char *cmdptr;
372
373 VG_(sprintf)(pidbuf, "%d", pid);
374 VG_(sprintf)(file, "/proc/%d/fd/%d", pid, VG_(clexecfd));
375
376 bufptr = buf;
377 cmdptr = VG_(clo_db_command);
378
379 while (*cmdptr) {
380 switch (*cmdptr) {
381 case '%':
382 switch (*++cmdptr) {
383 case 'f':
384 VG_(memcpy)(bufptr, file, VG_(strlen)(file));
385 bufptr += VG_(strlen)(file);
386 cmdptr++;
387 break;
388 case 'p':
389 VG_(memcpy)(bufptr, pidbuf, VG_(strlen)(pidbuf));
390 bufptr += VG_(strlen)(pidbuf);
391 cmdptr++;
392 break;
393 default:
394 *bufptr++ = *cmdptr++;
395 break;
396 }
397 break;
398 default:
399 *bufptr++ = *cmdptr++;
400 break;
401 }
402 }
403
404 *bufptr++ = '\0';
405
406 VG_(message)(Vg_UserMsg, "starting debugger with cmd: %s", buf);
nethercote71980f02004-01-24 18:18:54 +0000407 res = VG_(system)(buf);
408 if (res == 0) {
409 VG_(message)(Vg_UserMsg, "");
410 VG_(message)(Vg_UserMsg,
nethercote04d0fbc2004-01-26 16:48:06 +0000411 "Debugger has detached. Valgrind regains control. We continue.");
nethercote71980f02004-01-24 18:18:54 +0000412 } else {
413 VG_(message)(Vg_UserMsg, "Apparently failed!");
414 VG_(message)(Vg_UserMsg, "");
415 }
416 }
417
418 VG_(kkill)(pid, VKI_SIGKILL);
419 VG_(waitpid)(pid, &status, 0);
420 }
421}
422
423
424/* Print some helpful-ish text about unimplemented things, and give
425 up. */
426void VG_(unimplemented) ( Char* msg )
427{
428 VG_(message)(Vg_UserMsg, "");
429 VG_(message)(Vg_UserMsg,
430 "Valgrind detected that your program requires");
431 VG_(message)(Vg_UserMsg,
432 "the following unimplemented functionality:");
433 VG_(message)(Vg_UserMsg, " %s", msg);
434 VG_(message)(Vg_UserMsg,
435 "This may be because the functionality is hard to implement,");
436 VG_(message)(Vg_UserMsg,
437 "or because no reasonable program would behave this way,");
438 VG_(message)(Vg_UserMsg,
439 "or because nobody has yet needed it. In any case, let us know at");
440 VG_(message)(Vg_UserMsg,
441 "%s and/or try to work around the problem, if you can.", VG_BUGS_TO);
442 VG_(message)(Vg_UserMsg,
443 "");
444 VG_(message)(Vg_UserMsg,
445 "Valgrind has to exit now. Sorry. Bye!");
446 VG_(message)(Vg_UserMsg,
447 "");
448 VG_(pp_sched_status)();
449 VG_(exit)(1);
450}
451
452Addr VG_(get_stack_pointer) ( void )
453{
454 return VG_(baseBlock)[VGOFF_(m_esp)];
455}
456
457/* Debugging thing .. can be called from assembly with OYNK macro. */
458void VG_(oynk) ( Int n )
459{
460 OINK(n);
461}
462
463/* Initialize the PID and PGRP of scheduler LWP; this is also called
464 in any new children after fork. */
465static void newpid(ThreadId unused)
466{
467 /* PID of scheduler LWP */
468 VG_(main_pid) = VG_(getpid)();
469 VG_(main_pgrp) = VG_(getpgrp)();
470}
471
472/*====================================================================*/
473/*=== Check we were launched by stage 1 ===*/
474/*====================================================================*/
475
476/* Look for our AUXV table */
477static void scan_auxv(void)
478{
479 const struct ume_auxv *auxv = find_auxv((int *)ume_exec_esp);
480 int found = 0;
481
482 for (; auxv->a_type != AT_NULL; auxv++)
483 switch(auxv->a_type) {
484 case AT_UME_PADFD:
485 as_setpadfd(auxv->u.a_val);
486 found |= 1;
487 break;
488
489 case AT_UME_EXECFD:
490 VG_(vgexecfd) = auxv->u.a_val;
491 found |= 2;
492 break;
493 }
494
495 if ( ! (1|2) ) {
496 fprintf(stderr, "stage2 must be launched by stage1\n");
497 exit(127);
498 }
499}
500
501
502/*====================================================================*/
503/*=== Address space determination ===*/
504/*====================================================================*/
505
506/* Pad client space so it doesn't get filled in before the right time */
507static void layout_client_space(Addr argc_addr)
508{
509 VG_(client_base) = CLIENT_BASE;
510 VG_(valgrind_mmap_end) = (addr_t)&kickstart_base; /* end of V's mmaps */
511 VG_(valgrind_base) = VG_(valgrind_mmap_end) - VALGRIND_MAPSIZE;
512 VG_(valgrind_end) = ROUNDUP(argc_addr, 0x10000); /* stack */
513
514 if (0)
515 printf("client base: %x\n"
516 "valgrind base--end: %x--%x (%x)\n"
517 "valgrind mmap end: %x\n\n",
518 VG_(client_base),
519 VG_(valgrind_base), VG_(valgrind_end),
520 VG_(valgrind_end) - VG_(valgrind_base),
521 VG_(valgrind_mmap_end));
522
523 as_pad((void *)VG_(client_base), (void *)VG_(valgrind_base));
524}
525
526static void layout_remaining_space(float ratio)
527{
528 /* This tries to give the client as large as possible address space while
529 * taking into account the tool's shadow needs. */
530 addr_t client_size = ROUNDDN((VG_(valgrind_base) - REDZONE_SIZE) / (1. + ratio),
531 CLIENT_SIZE_MULTIPLE);
532 addr_t shadow_size = PGROUNDUP(client_size * ratio);
533
534 VG_(client_end) = VG_(client_base) + client_size;
535 VG_(client_mapbase) = PGROUNDDN((client_size/4)*3); /* where !FIXED mmap goes */
536 VG_(client_trampoline_code) = VG_(client_end) - VKI_BYTES_PER_PAGE;
537
538 VG_(shadow_base) = VG_(client_end) + REDZONE_SIZE;
539 VG_(shadow_end) = VG_(shadow_base) + shadow_size;
540
541 if (0)
542 printf("client base--end: %x--%x (%x)\n"
543 "client mapbase: %x\n"
544 "shadow base--end: %x--%x (%x)\n\n",
545 VG_(client_base), VG_(client_end), client_size,
546 VG_(client_mapbase),
547 VG_(shadow_base), VG_(shadow_end), shadow_size);
548
549 // Ban redzone
550 mmap((void *)VG_(client_end), REDZONE_SIZE, PROT_NONE,
551 MAP_FIXED|MAP_ANON|MAP_PRIVATE, -1, 0);
552
553 // Make client hole
554 munmap((void*)VG_(client_base), client_size);
555
556 // Map shadow memory.
557 // Initially all inaccessible, incrementally initialized as it is used
558 if (shadow_size != 0)
559 mmap((char *)VG_(shadow_base), shadow_size, PROT_NONE,
560 MAP_PRIVATE|MAP_ANON|MAP_FIXED, -1, 0);
561}
562
563/*====================================================================*/
564/*=== Command line setup ===*/
565/*====================================================================*/
566
567/* Nb: malloc'd memory never freed -- kept throughout like argv, envp */
568static char* get_file_clo(char* dir)
569{
570# define FLEN 512
571 Int fd, n;
572 struct stat s1;
573 char* f_clo = NULL;
574 char filename[FLEN];
575
576 snprintf(filename, FLEN, "%s/.valgrindrc", ( NULL == dir ? "" : dir ) );
577 fd = VG_(open)(filename, 0, VKI_S_IRUSR);
578 if ( fd > 0 ) {
579 if ( 0 == fstat(fd, &s1) ) {
580 f_clo = malloc(s1.st_size+1);
581 vg_assert(f_clo);
582 n = read(fd, f_clo, s1.st_size);
583 if (n == -1) n = 0;
584 f_clo[n] = '\0';
585 }
586 close(fd);
587 }
588 return f_clo;
589# undef FLEN
590}
591
592static Int count_args(char* s)
593{
594 Int n = 0;
595 if (s) {
596 char* cp = s;
597 while (True) {
598 // We have alternating sequences: blanks, non-blanks, blanks...
599 // count the non-blanks sequences.
600 while ( ISSPACE(*cp) ) cp++;
601 if ( !*cp ) break;
602 n++;
603 while ( !ISSPACE(*cp) && *cp ) cp++;
604 }
605 }
606 return n;
607}
608
609/* add args out of environment, skipping multiple spaces and -- args */
610static char** copy_args( char* s, char** to )
611{
612 if (s) {
613 char* cp = s;
614 while (True) {
615 // We have alternating sequences: blanks, non-blanks, blanks...
616 // copy the non-blanks sequences, and add terminating '\0'
617 while ( ISSPACE(*cp) ) cp++;
618 if ( !*cp ) break;
619 *to++ = cp;
620 while ( !ISSPACE(*cp) && *cp ) cp++;
621 if ( *cp ) *cp++ = '\0'; // terminate if necessary
622 if (VG_STREQ(to[-1], "--")) to--; // undo any '--' arg
623 }
624 }
625 return to;
626}
627
628// Augment command line with arguments from environment and .valgrindrc
629// files.
630static void augment_command_line(Int* vg_argc_inout, char*** vg_argv_inout)
631{
632 int vg_argc = *vg_argc_inout;
633 char** vg_argv = *vg_argv_inout;
634
635 char* env_clo = getenv(VALGRINDOPTS);
636 char* f1_clo = get_file_clo( getenv("HOME") );
637 char* f2_clo = get_file_clo(".");
638
639 /* copy any extra args from file or environment, if present */
640 if ( (env_clo && *env_clo) || (f1_clo && *f1_clo) || (f2_clo && *f2_clo) ) {
641 /* ' ' separated extra options */
642 char **from;
643 char **to;
644 int env_arg_count, f1_arg_count, f2_arg_count;
645
646 env_arg_count = count_args(env_clo);
647 f1_arg_count = count_args(f1_clo);
648 f2_arg_count = count_args(f2_clo);
649
650 if (0)
651 printf("extra-argc=%d %d %d\n",
652 env_arg_count, f1_arg_count, f2_arg_count);
653
654 /* +2: +1 for null-termination, +1 for added '--' */
655 from = vg_argv;
656 vg_argv = malloc( (vg_argc + env_arg_count + f1_arg_count
657 + f2_arg_count + 2) * sizeof(char **));
658 to = vg_argv;
659
660 /* copy argv[0] */
661 *to++ = *from++;
662
663 /* Copy extra args from env var and file, in the order: ~/.valgrindrc,
664 * $VALGRIND_OPTS, ./.valgrindrc -- more local options are put later
665 * to override less local ones. */
666 to = copy_args(f1_clo, to);
667 to = copy_args(env_clo, to);
668 to = copy_args(f2_clo, to);
669
670 /* copy original arguments, stopping at command or -- */
671 while (*from) {
672 if (**from != '-')
673 break;
674 if (VG_STREQ(*from, "--")) {
675 from++; /* skip -- */
676 break;
677 }
678 *to++ = *from++;
679 }
680
681 /* add -- */
682 *to++ = "--";
683
684 vg_argc = to - vg_argv;
685
686 /* copy rest of original command line, then NULL */
687 while (*from) *to++ = *from++;
688 *to = NULL;
689 }
690
691 *vg_argc_inout = vg_argc;
692 *vg_argv_inout = vg_argv;
693}
694
695static void get_command_line( int argc, char** argv,
696 Int* vg_argc_out, Char*** vg_argv_out,
697 char*** cl_argv_out )
698{
699 int vg_argc;
700 char** vg_argv;
701 char** cl_argv;
702 char* env_clo = getenv(VALGRINDCLO);
703
704 if (env_clo != NULL && *env_clo != '\0') {
705 char *cp;
706 char **cpp;
707
708 /* OK, we're getting all our arguments from the environment - the
709 entire command line belongs to the client (including argv[0]) */
710 vg_argc = 1; /* argv[0] */
711 for (cp = env_clo; *cp; cp++)
712 if (*cp == '\01')
713 vg_argc++;
714
715 vg_argv = malloc(sizeof(char **) * (vg_argc + 1));
716
717 cpp = vg_argv;
718
719 *cpp++ = "valgrind"; /* nominal argv[0] */
720 *cpp++ = env_clo;
721
722 for (cp = env_clo; *cp; cp++) {
723 if (*cp == '\01') {
724 *cp++ = '\0'; /* chop it up in place */
725 *cpp++ = cp;
726 }
727 }
728 *cpp = NULL;
729 cl_argv = argv;
730
731 } else {
732 /* Count the arguments on the command line. */
733 vg_argv = argv;
734
735 for (vg_argc = 1; vg_argc < argc; vg_argc++) {
736 if (argv[vg_argc][0] != '-') /* exe name */
737 break;
738 if (VG_STREQ(argv[vg_argc], "--")) { /* dummy arg */
739 vg_argc++;
740 break;
741 }
742 }
743 cl_argv = &argv[vg_argc];
744
745 /* Get extra args from VALGRIND_OPTS and .valgrindrc files.
746 * Note we don't do this if getting args from VALGRINDCLO. */
747 augment_command_line(&vg_argc, &vg_argv);
748 }
749
750 if (0) {
751 Int i;
752 for (i = 0; i < vg_argc; i++)
753 printf("vg_argv[%d]=\"%s\"\n", i, vg_argv[i]);
754 }
755
756 *vg_argc_out = vg_argc;
757 *vg_argv_out = (Char**)vg_argv;
758 *cl_argv_out = cl_argv;
759}
760
761
762/*====================================================================*/
763/*=== Environment and stack setup ===*/
764/*====================================================================*/
765
766/* Scan a colon-separated list, and call a function on each element.
767 The string must be mutable, because we insert a temporary '\0', but
768 the string will end up unmodified. (*func) should return 1 if it
769 doesn't need to see any more.
770*/
771static void scan_colsep(char *colsep, int (*func)(const char *))
772{
773 char *cp, *entry;
774 int end;
775
776 if (colsep == NULL ||
777 *colsep == '\0')
778 return;
779
780 entry = cp = colsep;
781
782 do {
783 end = (*cp == '\0');
784
785 if (*cp == ':' || *cp == '\0') {
786 char save = *cp;
787
788 *cp = '\0';
789 if ((*func)(entry))
790 end = 1;
791 *cp = save;
792 entry = cp+1;
793 }
794 cp++;
795 } while(!end);
796}
797
798/* Prepare the client's environment. This is basically a copy of our
799 environment, except:
800 1. LD_LIBRARY_PATH=$VALGRINDLIB:$LD_LIBRARY_PATH
801 2. LD_PRELOAD=$VALGRINDLIB/vg_inject.so:($VALGRINDLIB/vgpreload_TOOL.so:)?$LD_PRELOAD
802
803 If any of these is missing, then it is added.
804
805 Yummy. String hacking in C.
806
807 If this needs to handle any more variables it should be hacked
808 into something table driven.
809 */
810static char **fix_environment(char **origenv, const char *preload)
811{
812 static const char inject_so[] = "vg_inject.so";
813 static const char ld_library_path[] = "LD_LIBRARY_PATH=";
814 static const char ld_preload[] = "LD_PRELOAD=";
815 static const char valgrind_clo[] = VALGRINDCLO "=";
816 static const int ld_library_path_len = sizeof(ld_library_path)-1;
817 static const int ld_preload_len = sizeof(ld_preload)-1;
818 static const int valgrind_clo_len = sizeof(valgrind_clo)-1;
819 int ld_preload_done = 0;
820 int ld_library_path_done = 0;
821 char *inject_path;
822 int inject_path_len;
823 int vgliblen = strlen(VG_(libdir));
824 char **cpp;
825 char **ret;
826 int envc;
827 const int preloadlen = (preload == NULL) ? 0 : strlen(preload);
828
829 /* Find the vg_inject.so; also make room for the tool preload
830 library */
831 inject_path_len = sizeof(inject_so) + vgliblen + preloadlen + 16;
832 inject_path = malloc(inject_path_len);
833
834 if (preload)
835 snprintf(inject_path, inject_path_len, "%s/%s:%s",
836 VG_(libdir), inject_so, preload);
837 else
838 snprintf(inject_path, inject_path_len, "%s/%s",
839 VG_(libdir), inject_so);
840
841 /* Count the original size of the env */
842 envc = 0; /* trailing NULL */
843 for (cpp = origenv; cpp && *cpp; cpp++)
844 envc++;
845
846 /* Allocate a new space */
847 ret = malloc(sizeof(char *) * (envc+3+1)); /* 3 new entries + NULL */
848
849 /* copy it over */
850 for (cpp = ret; *origenv; )
851 *cpp++ = *origenv++;
852 *cpp = NULL;
853
854 vg_assert(envc == (cpp - ret));
855
856 /* Walk over the new environment, mashing as we go */
857 for (cpp = ret; cpp && *cpp; cpp++) {
858 if (memcmp(*cpp, ld_library_path, ld_library_path_len) == 0) {
859 int done = 0;
860 int contains(const char *p) {
861 if (VG_STREQ(p, VG_(libdir))) {
862 done = 1;
863 return 1;
864 }
865 return 0;
866 }
867
868 /* If the LD_LIBRARY_PATH already contains libdir, then don't
869 bother adding it again, even if it isn't the first (it
870 seems that the Java runtime will keep reexecing itself
871 unless its paths are at the front of LD_LIBRARY_PATH) */
872 scan_colsep(*cpp + ld_library_path_len, contains);
873
874 if (!done) {
875 int len = strlen(*cpp) + vgliblen*2 + 16;
876 char *cp = malloc(len);
877
878 snprintf(cp, len, "%s%s:%s",
879 ld_library_path, VG_(libdir),
880 (*cpp)+ld_library_path_len);
881
882 *cpp = cp;
883 }
884
885 ld_library_path_done = 1;
886 } else if (memcmp(*cpp, ld_preload, ld_preload_len) == 0) {
887 int len = strlen(*cpp) + inject_path_len;
888 char *cp = malloc(len);
889
890 snprintf(cp, len, "%s%s:%s",
891 ld_preload, inject_path, (*cpp)+ld_preload_len);
892
893 *cpp = cp;
894
895 ld_preload_done = 1;
896 } else if (memcmp(*cpp, valgrind_clo, valgrind_clo_len) == 0) {
897 *cpp = "";
898 }
899 }
900
901 /* Add the missing bits */
902
903 if (!ld_library_path_done) {
904 int len = ld_library_path_len + vgliblen*2 + 16;
905 char *cp = malloc(len);
906
907 snprintf(cp, len, "%s%s", ld_library_path, VG_(libdir));
908
909 ret[envc++] = cp;
910 }
911
912 if (!ld_preload_done) {
913 int len = ld_preload_len + inject_path_len;
914 char *cp = malloc(len);
915
916 snprintf(cp, len, "%s%s",
917 ld_preload, inject_path);
918
919 ret[envc++] = cp;
920 }
921
922 ret[envc] = NULL;
923
924 return ret;
925}
926
927extern char **environ; /* our environment */
928//#include <error.h>
929
930/* Add a string onto the string table, and return its address */
931static char *copy_str(char **tab, const char *str)
932{
933 char *cp = *tab;
934 char *orig = cp;
935
936 while(*str)
937 *cp++ = *str++;
938 *cp++ = '\0';
939
940 if (0)
941 printf("copied %p \"%s\" len %d\n",
942 orig, orig, cp-orig);
943
944 *tab = cp;
945
946 return orig;
947}
948
949/*
950 This sets up the client's initial stack, containing the args,
951 environment and aux vector.
952
953 The format of the stack is:
954
955 higher address +-----------------+
956 | Trampoline code |
957 +-----------------+
958 | |
959 : string table :
960 | |
961 +-----------------+
962 | AT_NULL |
963 - -
964 | auxv |
965 +-----------------+
966 | NULL |
967 - -
968 | envp |
969 +-----------------+
970 | NULL |
971 - -
972 | argv |
973 +-----------------+
974 | argc |
975 lower address +-----------------+ <- esp
976 | undefined |
977 : :
978 */
979static Addr setup_client_stack(char **orig_argv, char **orig_envp,
980 const struct exeinfo *info,
981 UInt** client_auxv)
982{
983 char **cpp;
984 char *strtab; /* string table */
985 char *stringbase;
986 addr_t *ptr;
987 struct ume_auxv *auxv;
988 const struct ume_auxv *orig_auxv;
989 const struct ume_auxv *cauxv;
990 unsigned stringsize; /* total size of strings in bytes */
991 unsigned auxsize; /* total size of auxv in bytes */
992 int argc; /* total argc */
993 int envc; /* total number of env vars */
994 unsigned stacksize; /* total client stack size */
995 addr_t cl_esp; /* client stack base (initial esp) */
996
997 /* use our own auxv as a prototype */
998 orig_auxv = find_auxv(ume_exec_esp);
999
1000 /* ==================== compute sizes ==================== */
1001
1002 /* first of all, work out how big the client stack will be */
1003 stringsize = 0;
1004
1005 /* paste on the extra args if the loader needs them (ie, the #!
1006 interpreter and its argument) */
1007 argc = 0;
1008 if (info->argv0 != NULL) {
1009 argc++;
1010 stringsize += strlen(info->argv0) + 1;
1011 }
1012 if (info->argv1 != NULL) {
1013 argc++;
1014 stringsize += strlen(info->argv1) + 1;
1015 }
1016
1017 /* now scan the args we're given... */
1018 for (cpp = orig_argv; *cpp; cpp++) {
1019 argc++;
1020 stringsize += strlen(*cpp) + 1;
1021 }
1022
1023 /* ...and the environment */
1024 envc = 0;
1025 for (cpp = orig_envp; cpp && *cpp; cpp++) {
1026 envc++;
1027 stringsize += strlen(*cpp) + 1;
1028 }
1029
1030 /* now, how big is the auxv? */
1031 auxsize = sizeof(*auxv); /* there's always at least one entry: AT_NULL */
1032 for (cauxv = orig_auxv; cauxv->a_type != AT_NULL; cauxv++) {
1033 if (cauxv->a_type == AT_PLATFORM)
1034 stringsize += strlen(cauxv->u.a_ptr) + 1;
1035 auxsize += sizeof(*cauxv);
1036 }
1037
1038 /* OK, now we know how big the client stack is */
1039 stacksize =
1040 sizeof(int) + /* argc */
1041 sizeof(char **)*argc + /* argv */
1042 sizeof(char **) + /* terminal NULL */
1043 sizeof(char **)*envc + /* envp */
1044 sizeof(char **) + /* terminal NULL */
1045 auxsize + /* auxv */
1046 ROUNDUP(stringsize, sizeof(int)) +/* strings (aligned) */
1047 VKI_BYTES_PER_PAGE; /* page for trampoline code */
1048
1049 /* cl_esp is the client's stack pointer */
1050 cl_esp = VG_(client_end) - stacksize;
1051 cl_esp = ROUNDDN(cl_esp, 16); /* make stack 16 byte aligned */
1052
1053 if (0)
1054 printf("stringsize=%d auxsize=%d stacksize=%d\n",
1055 stringsize, auxsize, stacksize);
1056
1057
1058 /* base of the string table (aligned) */
1059 stringbase = strtab = (char *)(VG_(client_trampoline_code) - ROUNDUP(stringsize, sizeof(int)));
1060
1061 VG_(clstk_base) = PGROUNDDN(cl_esp);
1062 VG_(clstk_end) = VG_(client_end);
1063
1064 /* ==================== allocate space ==================== */
1065
1066 /* allocate a stack - mmap enough space for the stack */
1067 mmap((void *)PGROUNDDN(cl_esp),
1068 VG_(client_end) - PGROUNDDN(cl_esp),
1069 PROT_READ | PROT_WRITE | PROT_EXEC,
1070 MAP_PRIVATE | MAP_ANON | MAP_FIXED, -1, 0);
1071
1072
1073 /* ==================== copy client stack ==================== */
1074
1075 ptr = (addr_t *)cl_esp;
1076
1077 /* --- argc --- */
1078 *ptr++ = argc; /* client argc */
1079
1080 /* --- argv --- */
1081 if (info->argv0) {
1082 *ptr++ = (addr_t)copy_str(&strtab, info->argv0);
1083 free(info->argv0);
1084 }
1085 if (info->argv1) {
1086 *ptr++ = (addr_t)copy_str(&strtab, info->argv1);
1087 free(info->argv1);
1088 }
1089 for (cpp = orig_argv; *cpp; ptr++, cpp++) {
1090 *ptr = (addr_t)copy_str(&strtab, *cpp);
1091 }
1092 *ptr++ = 0;
1093
1094 /* --- envp --- */
1095 VG_(client_envp) = (Char **)ptr;
1096 for (cpp = orig_envp; cpp && *cpp; ptr++, cpp++)
1097 *ptr = (addr_t)copy_str(&strtab, *cpp);
1098 *ptr++ = 0;
1099
1100 /* --- auxv --- */
1101 auxv = (struct ume_auxv *)ptr;
1102 *client_auxv = (UInt *)auxv;
1103
1104 for (; orig_auxv->a_type != AT_NULL; auxv++, orig_auxv++) {
1105 /* copy the entry... */
1106 *auxv = *orig_auxv;
1107
1108 /* ...and fix up the copy */
1109 switch(auxv->a_type) {
1110 case AT_PHDR:
1111 if (info->phdr == 0)
1112 auxv->a_type = AT_IGNORE;
1113 else
1114 auxv->u.a_val = info->phdr;
1115 break;
1116
1117 case AT_PHNUM:
1118 if (info->phdr == 0)
1119 auxv->a_type = AT_IGNORE;
1120 else
1121 auxv->u.a_val = info->phnum;
1122 break;
1123
1124 case AT_BASE:
1125 if (info->interp_base == 0)
1126 auxv->a_type = AT_IGNORE;
1127 else
1128 auxv->u.a_val = info->interp_base;
1129 break;
1130
1131 case AT_PLATFORM: /* points to a platform description string */
1132 auxv->u.a_ptr = copy_str(&strtab, orig_auxv->u.a_ptr);
1133 break;
1134
1135 case AT_ENTRY:
1136 auxv->u.a_val = info->entry;
1137 break;
1138
1139 case AT_IGNORE:
1140 case AT_EXECFD:
1141 case AT_PHENT:
1142 case AT_PAGESZ:
1143 case AT_FLAGS:
1144 case AT_NOTELF:
1145 case AT_UID:
1146 case AT_EUID:
1147 case AT_GID:
1148 case AT_EGID:
1149 case AT_CLKTCK:
1150 case AT_HWCAP:
1151 case AT_FPUCW:
1152 case AT_DCACHEBSIZE:
1153 case AT_ICACHEBSIZE:
1154 case AT_UCACHEBSIZE:
1155 /* All these are pointerless, so we don't need to do anything
1156 about them. */
1157 break;
1158
1159 case AT_SECURE:
1160 /* If this is 1, then it means that this program is running
1161 suid, and therefore the dynamic linker should be careful
1162 about LD_PRELOAD, etc. However, since stage1 (the thing
1163 the kernel actually execve's) should never be SUID, and we
1164 need LD_PRELOAD/LD_LIBRARY_PATH to work for the client, we
1165 set AT_SECURE to 0. */
1166 auxv->u.a_val = 0;
1167 break;
1168
1169 case AT_SYSINFO:
1170 /* Leave this unmolested for now, but we'll update it later
1171 when we set up the client trampoline code page */
1172 break;
1173
1174 case AT_SYSINFO_EHDR:
1175 /* Trash this, because we don't reproduce it */
1176 auxv->a_type = AT_IGNORE;
1177 break;
1178
1179 default:
1180 /* stomp out anything we don't know about */
1181 if (0)
1182 printf("stomping auxv entry %d\n", auxv->a_type);
1183 auxv->a_type = AT_IGNORE;
1184 break;
1185
1186 }
1187 }
1188 *auxv = *orig_auxv;
1189 vg_assert(auxv->a_type == AT_NULL);
1190
1191 vg_assert((strtab-stringbase) == stringsize);
1192
1193 return cl_esp;
1194}
1195
1196/*====================================================================*/
1197/*=== Find executable ===*/
1198/*====================================================================*/
1199
1200static const char* find_executable(const char* exec)
1201{
1202 vg_assert(NULL != exec);
1203 if (strchr(exec, '/') == NULL) {
1204 /* no '/' - we need to search the path */
1205 char *path = getenv("PATH");
1206 int pathlen = path ? strlen(path) : 0;
1207
1208 int match_exe(const char *entry) {
1209 char buf[pathlen + strlen(entry) + 3];
1210
1211 /* empty PATH element means . */
1212 if (*entry == '\0')
1213 entry = ".";
1214
1215 snprintf(buf, sizeof(buf), "%s/%s", entry, exec);
1216
1217 if (access(buf, R_OK|X_OK) == 0) {
1218 exec = strdup(buf);
1219 vg_assert(NULL != exec);
1220 return 1;
1221 }
1222 return 0;
1223 }
1224 scan_colsep(path, match_exe);
1225 }
1226 return exec;
1227}
1228
1229
1230/*====================================================================*/
1231/*=== Loading tools ===*/
1232/*====================================================================*/
1233
1234static void list_tools(void)
1235{
1236 DIR *dir = opendir(VG_(libdir));
1237 struct dirent *de;
1238 int first = 1;
1239
1240 if (dir == NULL) {
1241 fprintf(stderr, "Can't open %s: %s (installation problem?)\n",
1242 VG_(libdir), strerror(errno));
1243 return;
1244 }
1245
1246 while((de = readdir(dir)) != NULL) {
1247 int len = strlen(de->d_name);
1248
1249 /* look for vgskin_TOOL.so names */
1250 if (len > (7+1+3) && /* "vgskin_" + at least 1-char toolname + ".so" */
1251 strncmp(de->d_name, "vgskin_", 7) == 0 &&
1252 VG_STREQ(de->d_name + len - 3, ".so")) {
1253 if (first) {
1254 printf("Available tools:\n");
1255 first = 0;
1256 }
1257 de->d_name[len-3] = '\0';
1258 printf("\t%s\n", de->d_name+7);
1259 }
1260 }
1261
1262 closedir(dir);
1263
1264 if (first)
1265 printf("No tools available in \"%s\" (installation problem?)\n",
1266 VG_(libdir));
1267}
1268
1269
1270/* Find and load a tool, and check it looks ok. Also looks to see if there's
1271 * a matching vgpreload_*.so file, and returns its name in *preloadpath. */
1272static void load_tool( const char *toolname, void** handle_out,
1273 ToolInfo** toolinfo_out, char **preloadpath_out )
1274{
1275 Bool ok;
1276 int len = strlen(VG_(libdir)) + strlen(toolname)*2 + 16;
1277 char buf[len];
1278 void* handle;
1279 ToolInfo* toolinfo;
1280 char* preloadpath = NULL;
1281 Int* vg_malloc_redzonep;
1282
1283 // XXX: allowing full paths for --tool option -- does it make sense?
1284 // Doesn't allow for vgpreload_<tool>.so.
1285
1286 if (strchr(toolname, '/') != 0) {
1287 /* toolname contains '/', and so must be a pathname */
1288 handle = dlopen(toolname, RTLD_NOW);
1289 } else {
1290 /* just try in the libdir */
1291 snprintf(buf, len, "%s/vgskin_%s.so", VG_(libdir), toolname);
1292 handle = dlopen(buf, RTLD_NOW);
1293
1294 if (handle != NULL) {
1295 snprintf(buf, len, "%s/vgpreload_%s.so", VG_(libdir), toolname);
1296 if (access(buf, R_OK) == 0) {
1297 preloadpath = strdup(buf);
1298 vg_assert(NULL != preloadpath);
1299 }
1300 }
1301 }
1302
1303 ok = (NULL != handle);
1304 if (!ok) {
1305 fprintf(stderr, "Can't open tool \"%s\": %s\n", toolname, dlerror());
1306 goto bad_load;
1307 }
1308
1309 toolinfo = dlsym(handle, "vgSkin_tool_info");
1310 ok = (NULL != toolinfo);
1311 if (!ok) {
1312 fprintf(stderr, "Tool \"%s\" doesn't define SK_(tool_info) - "
1313 "add VG_DETERMINE_INTERFACE_VERSION?\n", toolname);
1314 goto bad_load;
1315 }
1316
1317 ok = (toolinfo->sizeof_ToolInfo == sizeof(*toolinfo) &&
1318 toolinfo->interface_major_version == VG_CORE_INTERFACE_MAJOR_VERSION &&
1319 toolinfo->sk_pre_clo_init != NULL);
1320 if (!ok) {
1321 fprintf(stderr, "Error:\n"
1322 " Tool and core interface versions do not match.\n"
1323 " Interface version used by core is: %d.%d (size %d)\n"
1324 " Interface version used by tool is: %d.%d (size %d)\n"
1325 " The major version numbers must match.\n",
1326 VG_CORE_INTERFACE_MAJOR_VERSION,
1327 VG_CORE_INTERFACE_MINOR_VERSION,
1328 sizeof(*toolinfo),
1329 toolinfo->interface_major_version,
1330 toolinfo->interface_minor_version,
1331 toolinfo->sizeof_ToolInfo);
1332 fprintf(stderr, " You need to at least recompile, and possibly update,\n");
1333 if (VG_CORE_INTERFACE_MAJOR_VERSION > toolinfo->interface_major_version)
1334 fprintf(stderr, " your skin to work with this version of Valgrind.\n");
1335 else
1336 fprintf(stderr, " your version of Valgrind to work with this skin.\n");
1337 goto bad_load;
1338 }
1339
1340 // Set redzone size for V's allocator
1341 vg_malloc_redzonep = dlsym(handle, STR(VG_(vg_malloc_redzone_szB)));
1342 if ( NULL != vg_malloc_redzonep ) {
1343 VG_(vg_malloc_redzone_szB) = *vg_malloc_redzonep;
1344 }
1345
1346 vg_assert(NULL != handle && NULL != toolinfo);
1347 *handle_out = handle;
1348 *toolinfo_out = toolinfo;
1349 *preloadpath_out = preloadpath;
1350 return;
1351
1352
1353 bad_load:
1354 if (handle != NULL)
1355 dlclose(handle);
1356
1357 fprintf(stderr, "Aborting: couldn't load tool\n");
1358 list_tools();
1359 exit(127);
1360}
1361
1362/*====================================================================*/
1363/*=== Loading the client ===*/
1364/*====================================================================*/
1365
1366static void load_client(char* cl_argv[], const char* exec,
nethercote6c999f22004-01-31 22:55:15 +00001367 /*inout*/Int* need_help,
nethercote71980f02004-01-24 18:18:54 +00001368 /*out*/struct exeinfo* info, /*out*/Addr* client_eip)
1369{
1370 // If they didn't specify an executable with --exec, and didn't specify
1371 // --help, then use client argv[0] (searching $PATH if necessary).
1372 if (NULL == exec && !*need_help) {
1373 if (cl_argv[0] == NULL ||
1374 ( NULL == (exec = find_executable(cl_argv[0])) ) )
1375 {
nethercote6c999f22004-01-31 22:55:15 +00001376 *need_help = 1;
nethercote71980f02004-01-24 18:18:54 +00001377 }
1378 }
1379
1380 info->map_base = VG_(client_mapbase);
nethercote71980f02004-01-24 18:18:54 +00001381
1382 info->exe_base = VG_(client_base);
1383 info->exe_end = VG_(client_end);
1384 info->argv = cl_argv;
1385
1386 if (*need_help) {
1387 VG_(clexecfd) = -1;
1388 info->argv0 = NULL;
1389 info->argv1 = NULL;
1390 } else {
1391 Int ret;
1392 VG_(clexecfd) = VG_(open)(exec, O_RDONLY, VKI_S_IRUSR);
1393 ret = do_exec(exec, info);
1394 if (ret != 0) {
1395 fprintf(stderr, "do_exec(%s) failed: %s\n", exec, strerror(ret));
1396 exit(127);
1397 }
1398 }
1399
1400 /* Copy necessary bits of 'info' that were filled in */
1401 *client_eip = info->init_eip;
1402 VG_(brk_base) = VG_(brk_limit) = info->brkbase;
1403}
1404
1405
1406/*====================================================================*/
1407/*=== Command-line: variables, processing ===*/
1408/*====================================================================*/
sewardjde4a1d02002-03-22 01:27:54 +00001409
njn25e49d8e72002-09-23 09:36:25 +00001410/* Define, and set defaults. */
1411Bool VG_(clo_error_limit) = True;
nethercote04d0fbc2004-01-26 16:48:06 +00001412Bool VG_(clo_db_attach) = False;
1413Char* VG_(clo_db_command) = VG_CLO_DEFAULT_DBCOMMAND;
njn43c799e2003-04-08 00:08:52 +00001414Bool VG_(clo_gen_suppressions) = False;
njn25e49d8e72002-09-23 09:36:25 +00001415Int VG_(sanity_level) = 1;
1416Int VG_(clo_verbosity) = 1;
1417Bool VG_(clo_demangle) = True;
njn25e49d8e72002-09-23 09:36:25 +00001418Bool VG_(clo_trace_children) = False;
sewardj4cf05692002-10-27 20:28:29 +00001419
nethercotee1730692003-11-20 10:38:07 +00001420/* See big comment in vg_include.h for meaning of these three.
1421 fd is initially stdout, for --help, but gets moved to stderr by default
1422 immediately afterwards. */
sewardj4cf05692002-10-27 20:28:29 +00001423VgLogTo VG_(clo_log_to) = VgLogTo_Fd;
nethercotee1730692003-11-20 10:38:07 +00001424Int VG_(clo_logfile_fd) = 1;
sewardj4cf05692002-10-27 20:28:29 +00001425Char* VG_(clo_logfile_name) = NULL;
1426
sewardj6024b212003-07-13 10:54:33 +00001427Int VG_(clo_input_fd) = 0; /* stdin */
njn25e49d8e72002-09-23 09:36:25 +00001428Int VG_(clo_n_suppressions) = 0;
sewardjde4a1d02002-03-22 01:27:54 +00001429Char* VG_(clo_suppressions)[VG_CLO_MAX_SFILES];
njn25e49d8e72002-09-23 09:36:25 +00001430Bool VG_(clo_profile) = False;
1431Bool VG_(clo_single_step) = False;
1432Bool VG_(clo_optimise) = True;
1433UChar VG_(clo_trace_codegen) = 0; // 00000000b
1434Bool VG_(clo_trace_syscalls) = False;
1435Bool VG_(clo_trace_signals) = False;
1436Bool VG_(clo_trace_symtab) = False;
njn25e49d8e72002-09-23 09:36:25 +00001437Bool VG_(clo_trace_sched) = False;
1438Int VG_(clo_trace_pthread_level) = 0;
njn25e49d8e72002-09-23 09:36:25 +00001439Int VG_(clo_dump_error) = 0;
1440Int VG_(clo_backtrace_size) = 4;
1441Char* VG_(clo_weird_hacks) = NULL;
sewardj858964b2002-10-05 14:15:43 +00001442Bool VG_(clo_run_libc_freeres) = True;
rjwalshf5f536f2003-11-17 17:45:00 +00001443Bool VG_(clo_track_fds) = False;
sewardj22854b92002-11-30 14:00:47 +00001444Bool VG_(clo_chain_bb) = True;
nethercote77eba602003-11-13 17:35:04 +00001445Bool VG_(clo_show_below_main) = False;
fitzhardinge98abfc72003-12-16 02:05:15 +00001446Bool VG_(clo_pointercheck) = True;
fitzhardinge462f4f92003-12-18 02:10:54 +00001447Bool VG_(clo_branchpred) = False;
sewardj2370f3b2002-11-30 15:01:01 +00001448
jsgf855d93d2003-10-13 22:26:55 +00001449static Bool VG_(clo_wait_for_gdb) = False;
1450
1451/* If we're doing signal routing, poll for signals every 50mS by
1452 default. */
1453Int VG_(clo_signal_polltime) = 50;
1454
1455/* These flags reduce thread wakeup latency on syscall completion and
1456 signal delivery, respectively. The downside is possible unfairness. */
1457Bool VG_(clo_lowlat_syscalls) = False; /* low-latency syscalls */
1458Bool VG_(clo_lowlat_signals) = False; /* low-latency signals */
1459
sewardjde4a1d02002-03-22 01:27:54 +00001460
njn25e49d8e72002-09-23 09:36:25 +00001461void VG_(bad_option) ( Char* opt )
sewardjde4a1d02002-03-22 01:27:54 +00001462{
1463 VG_(shutdown_logging)();
sewardj4cf05692002-10-27 20:28:29 +00001464 VG_(clo_log_to) = VgLogTo_Fd;
sewardjde4a1d02002-03-22 01:27:54 +00001465 VG_(clo_logfile_fd) = 2; /* stderr */
1466 VG_(printf)("valgrind.so: Bad option `%s'; aborting.\n", opt);
1467 VG_(exit)(1);
1468}
1469
1470static void config_error ( Char* msg )
1471{
1472 VG_(shutdown_logging)();
sewardj4cf05692002-10-27 20:28:29 +00001473 VG_(clo_log_to) = VgLogTo_Fd;
sewardjde4a1d02002-03-22 01:27:54 +00001474 VG_(clo_logfile_fd) = 2; /* stderr */
sewardj19d81412002-06-03 01:10:40 +00001475 VG_(printf)(
fitzhardinge98abfc72003-12-16 02:05:15 +00001476 "valgrind: Startup or configuration error:\n %s\n", msg);
sewardj19d81412002-06-03 01:10:40 +00001477 VG_(printf)(
fitzhardinge98abfc72003-12-16 02:05:15 +00001478 "valgrind: Unable to start up properly. Giving up.\n");
sewardjde4a1d02002-03-22 01:27:54 +00001479 VG_(exit)(1);
1480}
1481
nethercote6c999f22004-01-31 22:55:15 +00001482void usage ( Bool debug_help )
njn7cf0bd32002-06-08 13:36:03 +00001483{
njn25e49d8e72002-09-23 09:36:25 +00001484 Char* usage1 =
nethercote71980f02004-01-24 18:18:54 +00001485"usage: valgrind --tool=<toolname> [options] prog-and-args\n"
njn25e49d8e72002-09-23 09:36:25 +00001486"\n"
nethercote2b0793f2003-12-02 10:41:18 +00001487" common user options for all Valgrind tools, with defaults in [ ]:\n"
nethercote71980f02004-01-24 18:18:54 +00001488" --tool=<name> Use the Valgrind tool named <name>\n"
njn25e49d8e72002-09-23 09:36:25 +00001489" --help show this message\n"
nethercote6c999f22004-01-31 22:55:15 +00001490" --help-debug show this message, plus debugging options\n"
njn25e49d8e72002-09-23 09:36:25 +00001491" --version show version\n"
njn25e49d8e72002-09-23 09:36:25 +00001492" -q --quiet run silently; only print error msgs\n"
1493" -v --verbose be more verbose, incl counts of errors\n"
nethercote77eba602003-11-13 17:35:04 +00001494" --trace-children=no|yes Valgrind-ise child processes? [no]\n"
rjwalshf5f536f2003-11-17 17:45:00 +00001495" --track-fds=no|yes Track open file descriptors? [no]\n"
nethercote2b0793f2003-12-02 10:41:18 +00001496"\n"
1497" uncommon user options for all Valgrind tools:\n"
nethercote77eba602003-11-13 17:35:04 +00001498" --run-libc-freeres=no|yes Free up glibc memory at exit? [yes]\n"
1499" --weird-hacks=hack1,hack2,... [none]\n"
sewardj3d652a32002-10-20 18:11:49 +00001500" recognised hacks are: ioctl-VTIME truncate-writes lax-ioctls\n"
jsgf855d93d2003-10-13 22:26:55 +00001501" --signal-polltime=<time> time, in mS, we should poll for signals.\n"
1502" Only applies for older kernels which need\n"
1503" signal routing [50]\n"
1504" --lowlat-signals=no|yes improve wake-up latency when a thread receives\n"
1505" a signal [no]\n"
1506" --lowlat-syscalls=no|yes improve wake-up latency when a thread's\n"
1507" syscall completes [no]\n"
fitzhardinge98abfc72003-12-16 02:05:15 +00001508" --pointercheck=no|yes enforce client address space limits [yes]\n"
njn25e49d8e72002-09-23 09:36:25 +00001509"\n"
nethercote2b0793f2003-12-02 10:41:18 +00001510" user options for Valgrind tools that report errors:\n"
1511" --logfile-fd=<number> file descriptor for messages [2=stderr]\n"
1512" --logfile=<file> log messages to <file>.pid<pid>\n"
1513" --logsocket=ipaddr:port log messages to socket ipaddr:port\n"
1514" --demangle=no|yes automatically demangle C++ names? [yes]\n"
1515" --num-callers=<number> show <num> callers in stack traces [4]\n"
1516" --error-limit=no|yes stop showing new errors if too many? [yes]\n"
1517" --show-below-main=no|yes continue stack traces below main() [no]\n"
1518" --suppressions=<filename> suppress errors described in <filename>\n"
1519" --gen-suppressions=no|yes print suppressions for errors detected [no]\n"
njn7cf0bd32002-06-08 13:36:03 +00001520
nethercote04d0fbc2004-01-26 16:48:06 +00001521" --db-attach=no|yes start debugger when errors detected? [no]\n"
1522" --db-command=<command> command to start debugger [gdb -nw %%f %%p]\n"
1523" --input-fd=<number> file descriptor for input [0=stdin]\n"
fitzhardinge98abfc72003-12-16 02:05:15 +00001524"\n";
njn7cf0bd32002-06-08 13:36:03 +00001525
njn25e49d8e72002-09-23 09:36:25 +00001526 Char* usage2 =
1527"\n"
nethercote2b0793f2003-12-02 10:41:18 +00001528" debugging options for all Valgrind tools:\n"
njn25e49d8e72002-09-23 09:36:25 +00001529" --sanity-level=<number> level of sanity checking to do [1]\n"
1530" --single-step=no|yes translate each instr separately? [no]\n"
1531" --optimise=no|yes improve intermediate code? [yes]\n"
nethercote137bc552003-11-14 17:47:54 +00001532" --profile=no|yes profile? (tool must be built for it) [no]\n"
sewardj22854b92002-11-30 14:00:47 +00001533" --chain-bb=no|yes do basic-block chaining? [yes]\n"
fitzhardinge462f4f92003-12-18 02:10:54 +00001534" --branchpred=yes|no generate branch prediction hints [no]\n"
njn25e49d8e72002-09-23 09:36:25 +00001535" --trace-codegen=<XXXXX> show generated code? (X = 0|1) [00000]\n"
1536" --trace-syscalls=no|yes show all system calls? [no]\n"
1537" --trace-signals=no|yes show signal handling details? [no]\n"
1538" --trace-symtab=no|yes show symbol table details? [no]\n"
njn25e49d8e72002-09-23 09:36:25 +00001539" --trace-sched=no|yes show thread scheduler details? [no]\n"
njn3e884182003-04-15 13:03:23 +00001540" --trace-pthread=none|some|all show pthread event details? [none]\n"
jsgf855d93d2003-10-13 22:26:55 +00001541" --wait-for-gdb=yes|no pause on startup to wait for gdb attach\n"
njn25e49d8e72002-09-23 09:36:25 +00001542"\n"
nethercote2b0793f2003-12-02 10:41:18 +00001543" debugging options for Valgrind tools that report errors\n"
1544" --dump-error=<number> show translation for basic block associated\n"
1545" with <number>'th error context [0=show none]\n"
fitzhardinge98abfc72003-12-16 02:05:15 +00001546"\n";
njn3e884182003-04-15 13:03:23 +00001547
1548 Char* usage3 =
1549"\n"
nethercote71980f02004-01-24 18:18:54 +00001550" Extra options read from ~/.valgrindrc, $VALGRIND_OPTS, ./.valgrindrc\n"
njn25e49d8e72002-09-23 09:36:25 +00001551"\n"
nethercotebb1c9912004-01-04 16:43:23 +00001552" Valgrind is Copyright (C) 2000-2004 Julian Seward\n"
njn25e49d8e72002-09-23 09:36:25 +00001553" and licensed under the GNU General Public License, version 2.\n"
1554" Bug reports, feedback, admiration, abuse, etc, to: %s.\n"
njnd04b7c62002-10-03 14:05:52 +00001555"\n"
nethercote137bc552003-11-14 17:47:54 +00001556" Tools are copyright and licensed by their authors. See each\n"
1557" tool's start-up message for more information.\n"
njn25e49d8e72002-09-23 09:36:25 +00001558"\n";
njn7cf0bd32002-06-08 13:36:03 +00001559
fitzhardinge98abfc72003-12-16 02:05:15 +00001560 VG_(printf)(usage1);
1561 if (VG_(details).name) {
1562 VG_(printf)(" user options for %s:\n", VG_(details).name);
1563 /* Don't print skin string directly for security, ha! */
1564 if (VG_(needs).command_line_options)
1565 SK_(print_usage)();
1566 else
1567 VG_(printf)(" (none)\n");
1568 }
nethercote6c999f22004-01-31 22:55:15 +00001569 if (debug_help) {
1570 VG_(printf)(usage2);
fitzhardinge98abfc72003-12-16 02:05:15 +00001571
nethercote6c999f22004-01-31 22:55:15 +00001572 if (VG_(details).name) {
1573 VG_(printf)(" debugging options for %s:\n", VG_(details).name);
1574
1575 if (VG_(needs).command_line_options)
1576 SK_(print_debug_usage)();
1577 else
1578 VG_(printf)(" (none)\n");
1579 }
fitzhardinge98abfc72003-12-16 02:05:15 +00001580 }
nethercote421281e2003-11-20 16:20:55 +00001581 VG_(printf)(usage3, VG_BUGS_TO);
njn7cf0bd32002-06-08 13:36:03 +00001582
njn25e49d8e72002-09-23 09:36:25 +00001583 VG_(shutdown_logging)();
sewardj4cf05692002-10-27 20:28:29 +00001584 VG_(clo_log_to) = VgLogTo_Fd;
njn25e49d8e72002-09-23 09:36:25 +00001585 VG_(clo_logfile_fd) = 2; /* stderr */
1586 VG_(exit)(1);
njn7cf0bd32002-06-08 13:36:03 +00001587}
sewardjde4a1d02002-03-22 01:27:54 +00001588
nethercote71980f02004-01-24 18:18:54 +00001589static void pre_process_cmd_line_options
nethercote6c999f22004-01-31 22:55:15 +00001590 ( Int* need_help, const char** tool, const char** exec )
sewardj1c1b1162003-02-23 01:25:51 +00001591{
nethercote71980f02004-01-24 18:18:54 +00001592 UInt i;
sewardjde4a1d02002-03-22 01:27:54 +00001593
nethercote71980f02004-01-24 18:18:54 +00001594 /* parse the options we have (only the options we care about now) */
1595 for (i = 1; i < VG_(vg_argc); i++) {
1596
1597 if (strcmp(VG_(vg_argv)[i], "--version") == 0) {
1598 printf("valgrind-" VERSION "\n");
1599 exit(1);
1600
1601 } else if (strcmp(VG_(vg_argv)[i], "--help") == 0) {
nethercote6c999f22004-01-31 22:55:15 +00001602 *need_help = 1;
1603
1604 } else if (strcmp(VG_(vg_argv)[i], "--help-debug") == 0) {
1605 *need_help = 2;
nethercote71980f02004-01-24 18:18:54 +00001606
1607 } else if (strncmp(VG_(vg_argv)[i], "--tool=", 7) == 0 ||
1608 strncmp(VG_(vg_argv)[i], "--skin=", 7) == 0) {
1609 *tool = &VG_(vg_argv)[i][7];
1610
1611 } else if (strncmp(VG_(vg_argv)[i], "--exec=", 7) == 0) {
1612 *exec = &VG_(vg_argv)[i][7];
1613 }
1614 }
1615
1616 /* If no tool specified, can give usage message without loading tool */
1617 if (*tool == NULL) {
1618 if (!need_help)
1619 list_tools();
nethercote6c999f22004-01-31 22:55:15 +00001620 usage(/*help-debug?*/False);
nethercote71980f02004-01-24 18:18:54 +00001621 }
1622}
1623
1624static void process_cmd_line_options
1625 ( UInt* client_auxv, Addr esp_at_startup,
nethercote6c999f22004-01-31 22:55:15 +00001626 const char* toolname, Int need_help )
nethercote71980f02004-01-24 18:18:54 +00001627{
1628 Int i, eventually_logfile_fd;
1629 Int *auxp;
1630 Int toolname_len = VG_(strlen)(toolname);
sewardjde4a1d02002-03-22 01:27:54 +00001631
nethercotee1730692003-11-20 10:38:07 +00001632 /* log to stderr by default, but usage message goes to stdout */
1633 eventually_logfile_fd = 2;
sewardjde4a1d02002-03-22 01:27:54 +00001634
1635 /* Once logging is started, we can safely send messages pertaining
1636 to failures in initialisation. */
1637 VG_(startup_logging)();
1638
sewardj19d81412002-06-03 01:10:40 +00001639 /* Check for sane path in ./configure --prefix=... */
fitzhardinge98abfc72003-12-16 02:05:15 +00001640 if (VG_LIBDIR[0] != '/')
sewardj19d81412002-06-03 01:10:40 +00001641 config_error("Please use absolute paths in "
1642 "./configure --prefix=... or --libdir=...");
sewardj38170912002-05-10 21:07:22 +00001643
nethercote71980f02004-01-24 18:18:54 +00001644 for (auxp = client_auxv; auxp[0] != VKI_AT_NULL; auxp += 2) {
fitzhardinge98abfc72003-12-16 02:05:15 +00001645 switch(auxp[0]) {
1646 case VKI_AT_SYSINFO:
1647 VG_(sysinfo_page_exists) = True;
fitzhardinge92360792003-12-24 10:11:11 +00001648 auxp[1] = (Int)(VG_(client_trampoline_code) + VG_(tramp_syscall_offset));
fitzhardinge98abfc72003-12-16 02:05:15 +00001649 VG_(sysinfo_page_addr) = auxp[1];
1650 break;
sewardjde4a1d02002-03-22 01:27:54 +00001651 }
fitzhardinge98abfc72003-12-16 02:05:15 +00001652 }
sewardjde4a1d02002-03-22 01:27:54 +00001653
nethercote71980f02004-01-24 18:18:54 +00001654 if (need_help)
nethercote6c999f22004-01-31 22:55:15 +00001655 usage(/*--help-debug?*/need_help == 2);
fitzhardinge98abfc72003-12-16 02:05:15 +00001656
1657 /* We know the initial ESP is pointing at argc/argv */
nethercote71980f02004-01-24 18:18:54 +00001658 VG_(client_argc) = *(Int *)esp_at_startup;
1659 VG_(client_argv) = (Char **)(esp_at_startup + sizeof(Int));
fitzhardinge98abfc72003-12-16 02:05:15 +00001660
nethercote71980f02004-01-24 18:18:54 +00001661 for (i = 1; i < VG_(vg_argc); i++) {
1662
1663 Char* arg = VG_(vg_argv)[i];
1664
1665 // XXX: allow colons in options, for Josef
1666
1667 /* Look for matching "--toolname:foo" */
1668 if (VG_(strstr)(arg, ":")) {
1669 if (VG_CLO_STREQN(2, arg, "--") &&
1670 VG_CLO_STREQN(toolname_len, arg+2, toolname) &&
1671 VG_CLO_STREQN(1, arg+2+toolname_len, ":"))
1672 {
1673 // prefix matches, convert "--toolname:foo" to "--foo"
1674 if (0)
1675 VG_(printf)("tool-specific arg: %s\n", arg);
1676 arg += toolname_len + 1;
1677 arg[0] = '-';
1678 arg[1] = '-';
1679
1680 } else {
1681 // prefix doesn't match, skip to next arg
1682 continue;
1683 }
1684 }
1685
fitzhardinge98abfc72003-12-16 02:05:15 +00001686 /* Ignore these options - they've already been handled */
nethercote71980f02004-01-24 18:18:54 +00001687 if (VG_CLO_STREQN(7, arg, "--tool=") ||
1688 VG_CLO_STREQN(7, arg, "--skin="))
fitzhardinge98abfc72003-12-16 02:05:15 +00001689 continue;
nethercote71980f02004-01-24 18:18:54 +00001690 if (VG_CLO_STREQN(7, arg, "--exec="))
fitzhardinge98abfc72003-12-16 02:05:15 +00001691 continue;
1692
nethercote71980f02004-01-24 18:18:54 +00001693 if ( VG_CLO_STREQ(arg, "--"))
fitzhardinge98abfc72003-12-16 02:05:15 +00001694 continue;
nethercote71980f02004-01-24 18:18:54 +00001695 else if (VG_CLO_STREQ(arg, "-v") ||
1696 VG_CLO_STREQ(arg, "--verbose"))
sewardjde4a1d02002-03-22 01:27:54 +00001697 VG_(clo_verbosity)++;
nethercote71980f02004-01-24 18:18:54 +00001698 else if (VG_CLO_STREQ(arg, "-q") ||
1699 VG_CLO_STREQ(arg, "--quiet"))
sewardjde4a1d02002-03-22 01:27:54 +00001700 VG_(clo_verbosity)--;
1701
nethercote71980f02004-01-24 18:18:54 +00001702 else if (VG_CLO_STREQ(arg, "--error-limit=yes"))
sewardj2e432902002-06-13 20:44:00 +00001703 VG_(clo_error_limit) = True;
nethercote71980f02004-01-24 18:18:54 +00001704 else if (VG_CLO_STREQ(arg, "--error-limit=no"))
sewardj2e432902002-06-13 20:44:00 +00001705 VG_(clo_error_limit) = False;
sewardj72f98ff2002-06-13 17:23:38 +00001706
nethercote04d0fbc2004-01-26 16:48:06 +00001707 else if (VG_CLO_STREQ(arg, "--db-attach=yes"))
1708 VG_(clo_db_attach) = True;
1709 else if (VG_CLO_STREQ(arg, "--db-attach=no"))
1710 VG_(clo_db_attach) = False;
sewardjde4a1d02002-03-22 01:27:54 +00001711
nethercote04d0fbc2004-01-26 16:48:06 +00001712 else if (VG_CLO_STREQN(13,arg, "--db-command="))
1713 VG_(clo_db_command) = &arg[13];
sewardj6024b212003-07-13 10:54:33 +00001714
nethercote71980f02004-01-24 18:18:54 +00001715 else if (VG_CLO_STREQ(arg, "--gen-suppressions=yes"))
njn43c799e2003-04-08 00:08:52 +00001716 VG_(clo_gen_suppressions) = True;
nethercote71980f02004-01-24 18:18:54 +00001717 else if (VG_CLO_STREQ(arg, "--gen-suppressions=no"))
njn43c799e2003-04-08 00:08:52 +00001718 VG_(clo_gen_suppressions) = False;
1719
nethercote71980f02004-01-24 18:18:54 +00001720 else if (VG_CLO_STREQ(arg, "--show-below-main=yes"))
nethercote77eba602003-11-13 17:35:04 +00001721 VG_(clo_show_below_main) = True;
nethercote71980f02004-01-24 18:18:54 +00001722 else if (VG_CLO_STREQ(arg, "--show-below-main=no"))
nethercote77eba602003-11-13 17:35:04 +00001723 VG_(clo_show_below_main) = False;
1724
nethercote71980f02004-01-24 18:18:54 +00001725 else if (VG_CLO_STREQ(arg, "--pointercheck=yes"))
fitzhardinge98abfc72003-12-16 02:05:15 +00001726 VG_(clo_pointercheck) = True;
nethercote71980f02004-01-24 18:18:54 +00001727 else if (VG_CLO_STREQ(arg, "--pointercheck=no"))
fitzhardinge98abfc72003-12-16 02:05:15 +00001728 VG_(clo_pointercheck) = False;
1729
nethercote71980f02004-01-24 18:18:54 +00001730 else if (VG_CLO_STREQ(arg, "--demangle=yes"))
sewardjde4a1d02002-03-22 01:27:54 +00001731 VG_(clo_demangle) = True;
nethercote71980f02004-01-24 18:18:54 +00001732 else if (VG_CLO_STREQ(arg, "--demangle=no"))
sewardjde4a1d02002-03-22 01:27:54 +00001733 VG_(clo_demangle) = False;
1734
nethercote71980f02004-01-24 18:18:54 +00001735 else if (VG_CLO_STREQ(arg, "--trace-children=yes"))
sewardjde4a1d02002-03-22 01:27:54 +00001736 VG_(clo_trace_children) = True;
nethercote71980f02004-01-24 18:18:54 +00001737 else if (VG_CLO_STREQ(arg, "--trace-children=no"))
sewardjde4a1d02002-03-22 01:27:54 +00001738 VG_(clo_trace_children) = False;
1739
nethercote71980f02004-01-24 18:18:54 +00001740 else if (VG_CLO_STREQ(arg, "--run-libc-freeres=yes"))
sewardj858964b2002-10-05 14:15:43 +00001741 VG_(clo_run_libc_freeres) = True;
nethercote71980f02004-01-24 18:18:54 +00001742 else if (VG_CLO_STREQ(arg, "--run-libc-freeres=no"))
sewardj858964b2002-10-05 14:15:43 +00001743 VG_(clo_run_libc_freeres) = False;
1744
nethercote71980f02004-01-24 18:18:54 +00001745 else if (VG_CLO_STREQ(arg, "--track-fds=yes"))
rjwalshf5f536f2003-11-17 17:45:00 +00001746 VG_(clo_track_fds) = True;
nethercote71980f02004-01-24 18:18:54 +00001747 else if (VG_CLO_STREQ(arg, "--track-fds=no"))
rjwalshf5f536f2003-11-17 17:45:00 +00001748 VG_(clo_track_fds) = False;
1749
nethercote71980f02004-01-24 18:18:54 +00001750 else if (VG_CLO_STREQN(15, arg, "--sanity-level="))
1751 VG_(sanity_level) = (Int)VG_(atoll)(&arg[15]);
sewardjde4a1d02002-03-22 01:27:54 +00001752
nethercote71980f02004-01-24 18:18:54 +00001753 else if (VG_CLO_STREQN(13, arg, "--logfile-fd=")) {
sewardj4cf05692002-10-27 20:28:29 +00001754 VG_(clo_log_to) = VgLogTo_Fd;
1755 VG_(clo_logfile_name) = NULL;
nethercote71980f02004-01-24 18:18:54 +00001756 eventually_logfile_fd = (Int)VG_(atoll)(&arg[13]);
sewardj4cf05692002-10-27 20:28:29 +00001757 }
1758
nethercote71980f02004-01-24 18:18:54 +00001759 else if (VG_CLO_STREQN(10, arg, "--logfile=")) {
sewardj4cf05692002-10-27 20:28:29 +00001760 VG_(clo_log_to) = VgLogTo_File;
nethercote71980f02004-01-24 18:18:54 +00001761 VG_(clo_logfile_name) = &arg[10];
sewardj4cf05692002-10-27 20:28:29 +00001762 }
sewardjde4a1d02002-03-22 01:27:54 +00001763
nethercote71980f02004-01-24 18:18:54 +00001764 else if (VG_CLO_STREQN(12, arg, "--logsocket=")) {
sewardj73cf3bc2002-11-03 03:20:15 +00001765 VG_(clo_log_to) = VgLogTo_Socket;
nethercote71980f02004-01-24 18:18:54 +00001766 VG_(clo_logfile_name) = &arg[12];
sewardj73cf3bc2002-11-03 03:20:15 +00001767 }
1768
nethercote71980f02004-01-24 18:18:54 +00001769 else if (VG_CLO_STREQN(11, arg, "--input-fd="))
1770 VG_(clo_input_fd) = (Int)VG_(atoll)(&arg[11]);
sewardj6024b212003-07-13 10:54:33 +00001771
nethercote71980f02004-01-24 18:18:54 +00001772 else if (VG_CLO_STREQN(15, arg, "--suppressions=")) {
sewardjde4a1d02002-03-22 01:27:54 +00001773 if (VG_(clo_n_suppressions) >= VG_CLO_MAX_SFILES) {
njn25e49d8e72002-09-23 09:36:25 +00001774 VG_(message)(Vg_UserMsg, "Too many suppression files specified.");
sewardjde4a1d02002-03-22 01:27:54 +00001775 VG_(message)(Vg_UserMsg,
1776 "Increase VG_CLO_MAX_SFILES and recompile.");
nethercote71980f02004-01-24 18:18:54 +00001777 VG_(bad_option)(arg);
sewardjde4a1d02002-03-22 01:27:54 +00001778 }
nethercote71980f02004-01-24 18:18:54 +00001779 VG_(clo_suppressions)[VG_(clo_n_suppressions)] = &arg[15];
sewardjde4a1d02002-03-22 01:27:54 +00001780 VG_(clo_n_suppressions)++;
1781 }
nethercote71980f02004-01-24 18:18:54 +00001782 else if (VG_CLO_STREQ(arg, "--profile=yes"))
njn25e49d8e72002-09-23 09:36:25 +00001783 VG_(clo_profile) = True;
nethercote71980f02004-01-24 18:18:54 +00001784 else if (VG_CLO_STREQ(arg, "--profile=no"))
njn25e49d8e72002-09-23 09:36:25 +00001785 VG_(clo_profile) = False;
1786
nethercote71980f02004-01-24 18:18:54 +00001787 else if (VG_CLO_STREQ(arg, "--chain-bb=yes"))
sewardj22854b92002-11-30 14:00:47 +00001788 VG_(clo_chain_bb) = True;
nethercote71980f02004-01-24 18:18:54 +00001789 else if (VG_CLO_STREQ(arg, "--chain-bb=no"))
sewardj22854b92002-11-30 14:00:47 +00001790 VG_(clo_chain_bb) = False;
1791
nethercote71980f02004-01-24 18:18:54 +00001792 else if (VG_CLO_STREQ(arg, "--branchpred=yes"))
fitzhardinge462f4f92003-12-18 02:10:54 +00001793 VG_(clo_branchpred) = True;
nethercote71980f02004-01-24 18:18:54 +00001794 else if (VG_CLO_STREQ(arg, "--branchpred=no"))
fitzhardinge462f4f92003-12-18 02:10:54 +00001795 VG_(clo_branchpred) = False;
1796
nethercote71980f02004-01-24 18:18:54 +00001797 else if (VG_CLO_STREQ(arg, "--single-step=yes"))
sewardjde4a1d02002-03-22 01:27:54 +00001798 VG_(clo_single_step) = True;
nethercote71980f02004-01-24 18:18:54 +00001799 else if (VG_CLO_STREQ(arg, "--single-step=no"))
sewardjde4a1d02002-03-22 01:27:54 +00001800 VG_(clo_single_step) = False;
1801
nethercote71980f02004-01-24 18:18:54 +00001802 else if (VG_CLO_STREQ(arg, "--optimise=yes"))
sewardjde4a1d02002-03-22 01:27:54 +00001803 VG_(clo_optimise) = True;
nethercote71980f02004-01-24 18:18:54 +00001804 else if (VG_CLO_STREQ(arg, "--optimise=no"))
sewardjde4a1d02002-03-22 01:27:54 +00001805 VG_(clo_optimise) = False;
1806
njn25e49d8e72002-09-23 09:36:25 +00001807 /* "vwxyz" --> 000zyxwv (binary) */
nethercote71980f02004-01-24 18:18:54 +00001808 else if (VG_CLO_STREQN(16, arg, "--trace-codegen=")) {
njn25e49d8e72002-09-23 09:36:25 +00001809 Int j;
nethercote71980f02004-01-24 18:18:54 +00001810 char* opt = & arg[16];
njn25e49d8e72002-09-23 09:36:25 +00001811
1812 if (5 != VG_(strlen)(opt)) {
1813 VG_(message)(Vg_UserMsg,
1814 "--trace-codegen argument must have 5 digits");
nethercote71980f02004-01-24 18:18:54 +00001815 VG_(bad_option)(arg);
njn25e49d8e72002-09-23 09:36:25 +00001816 }
1817 for (j = 0; j < 5; j++) {
1818 if ('0' == opt[j]) { /* do nothing */ }
1819 else if ('1' == opt[j]) VG_(clo_trace_codegen) |= (1 << j);
1820 else {
1821 VG_(message)(Vg_UserMsg, "--trace-codegen argument can only "
1822 "contain 0s and 1s");
nethercote71980f02004-01-24 18:18:54 +00001823 VG_(bad_option)(arg);
njn25e49d8e72002-09-23 09:36:25 +00001824 }
1825 }
1826 }
sewardjde4a1d02002-03-22 01:27:54 +00001827
nethercote71980f02004-01-24 18:18:54 +00001828 else if (VG_CLO_STREQ(arg, "--trace-syscalls=yes"))
sewardjde4a1d02002-03-22 01:27:54 +00001829 VG_(clo_trace_syscalls) = True;
nethercote71980f02004-01-24 18:18:54 +00001830 else if (VG_CLO_STREQ(arg, "--trace-syscalls=no"))
sewardjde4a1d02002-03-22 01:27:54 +00001831 VG_(clo_trace_syscalls) = False;
1832
nethercote71980f02004-01-24 18:18:54 +00001833 else if (VG_CLO_STREQ(arg, "--trace-signals=yes"))
sewardjde4a1d02002-03-22 01:27:54 +00001834 VG_(clo_trace_signals) = True;
nethercote71980f02004-01-24 18:18:54 +00001835 else if (VG_CLO_STREQ(arg, "--trace-signals=no"))
sewardjde4a1d02002-03-22 01:27:54 +00001836 VG_(clo_trace_signals) = False;
1837
nethercote71980f02004-01-24 18:18:54 +00001838 else if (VG_CLO_STREQ(arg, "--trace-symtab=yes"))
sewardjde4a1d02002-03-22 01:27:54 +00001839 VG_(clo_trace_symtab) = True;
nethercote71980f02004-01-24 18:18:54 +00001840 else if (VG_CLO_STREQ(arg, "--trace-symtab=no"))
sewardjde4a1d02002-03-22 01:27:54 +00001841 VG_(clo_trace_symtab) = False;
1842
nethercote71980f02004-01-24 18:18:54 +00001843 else if (VG_CLO_STREQ(arg, "--trace-sched=yes"))
sewardj8937c812002-04-12 20:12:20 +00001844 VG_(clo_trace_sched) = True;
nethercote71980f02004-01-24 18:18:54 +00001845 else if (VG_CLO_STREQ(arg, "--trace-sched=no"))
sewardj8937c812002-04-12 20:12:20 +00001846 VG_(clo_trace_sched) = False;
1847
nethercote71980f02004-01-24 18:18:54 +00001848 else if (VG_CLO_STREQ(arg, "--trace-pthread=none"))
sewardj45b4b372002-04-16 22:50:32 +00001849 VG_(clo_trace_pthread_level) = 0;
nethercote71980f02004-01-24 18:18:54 +00001850 else if (VG_CLO_STREQ(arg, "--trace-pthread=some"))
sewardj45b4b372002-04-16 22:50:32 +00001851 VG_(clo_trace_pthread_level) = 1;
nethercote71980f02004-01-24 18:18:54 +00001852 else if (VG_CLO_STREQ(arg, "--trace-pthread=all"))
sewardj45b4b372002-04-16 22:50:32 +00001853 VG_(clo_trace_pthread_level) = 2;
sewardj8937c812002-04-12 20:12:20 +00001854
nethercote71980f02004-01-24 18:18:54 +00001855 else if (VG_CLO_STREQN(14, arg, "--weird-hacks="))
1856 VG_(clo_weird_hacks) = &arg[14];
sewardj3984b852002-05-12 03:00:17 +00001857
nethercote71980f02004-01-24 18:18:54 +00001858 else if (VG_CLO_STREQN(17, arg, "--signal-polltime="))
1859 VG_(clo_signal_polltime) = VG_(atoll)(&arg[17]);
jsgf855d93d2003-10-13 22:26:55 +00001860
nethercote71980f02004-01-24 18:18:54 +00001861 else if (VG_CLO_STREQ(arg, "--lowlat-signals=yes"))
jsgf855d93d2003-10-13 22:26:55 +00001862 VG_(clo_lowlat_signals) = True;
nethercote71980f02004-01-24 18:18:54 +00001863 else if (VG_CLO_STREQ(arg, "--lowlat-signals=no"))
jsgf855d93d2003-10-13 22:26:55 +00001864 VG_(clo_lowlat_signals) = False;
1865
nethercote71980f02004-01-24 18:18:54 +00001866 else if (VG_CLO_STREQ(arg, "--lowlat-syscalls=yes"))
jsgf855d93d2003-10-13 22:26:55 +00001867 VG_(clo_lowlat_syscalls) = True;
nethercote71980f02004-01-24 18:18:54 +00001868 else if (VG_CLO_STREQ(arg, "--lowlat-syscalls=no"))
jsgf855d93d2003-10-13 22:26:55 +00001869 VG_(clo_lowlat_syscalls) = False;
1870
nethercote71980f02004-01-24 18:18:54 +00001871 else if (VG_CLO_STREQN(13, arg, "--dump-error="))
1872 VG_(clo_dump_error) = (Int)VG_(atoll)(&arg[13]);
sewardjde4a1d02002-03-22 01:27:54 +00001873
nethercote71980f02004-01-24 18:18:54 +00001874 else if (VG_CLO_STREQ(arg, "--wait-for-gdb=yes"))
jsgf855d93d2003-10-13 22:26:55 +00001875 VG_(clo_wait_for_gdb) = True;
nethercote71980f02004-01-24 18:18:54 +00001876 else if (VG_CLO_STREQ(arg, "--wait-for-gdb=no"))
jsgf855d93d2003-10-13 22:26:55 +00001877 VG_(clo_wait_for_gdb) = False;
1878
nethercote71980f02004-01-24 18:18:54 +00001879 else if (VG_CLO_STREQN(14, arg, "--num-callers=")) {
sewardjde4a1d02002-03-22 01:27:54 +00001880 /* Make sure it's sane. */
nethercote71980f02004-01-24 18:18:54 +00001881 VG_(clo_backtrace_size) = (Int)VG_(atoll)(&arg[14]);
njn6c846552003-09-16 07:41:43 +00001882 if (VG_(clo_backtrace_size) < 1)
1883 VG_(clo_backtrace_size) = 1;
sewardjde4a1d02002-03-22 01:27:54 +00001884 if (VG_(clo_backtrace_size) >= VG_DEEPEST_BACKTRACE)
1885 VG_(clo_backtrace_size) = VG_DEEPEST_BACKTRACE;
1886 }
1887
nethercote71980f02004-01-24 18:18:54 +00001888 else if ( ! VG_(needs).command_line_options
1889 || ! SK_(process_cmd_line_option)(arg) ) {
nethercote6c999f22004-01-31 22:55:15 +00001890 usage(/*--help-debug?*/need_help == 2);
njn25e49d8e72002-09-23 09:36:25 +00001891 }
sewardjde4a1d02002-03-22 01:27:54 +00001892 }
1893
njnf9ebf672003-05-12 21:41:30 +00001894 if (VG_(clo_verbosity) < 0)
sewardjde4a1d02002-03-22 01:27:54 +00001895 VG_(clo_verbosity) = 0;
1896
nethercote04d0fbc2004-01-26 16:48:06 +00001897 if (VG_(clo_db_attach) && VG_(clo_trace_children)) {
sewardjde4a1d02002-03-22 01:27:54 +00001898 VG_(message)(Vg_UserMsg, "");
1899 VG_(message)(Vg_UserMsg,
nethercote04d0fbc2004-01-26 16:48:06 +00001900 "--db-attach=yes conflicts with --trace-children=yes");
sewardjde4a1d02002-03-22 01:27:54 +00001901 VG_(message)(Vg_UserMsg,
1902 "Please choose one or the other, but not both.");
nethercote04d0fbc2004-01-26 16:48:06 +00001903 VG_(bad_option)("--db-attach=yes and --trace-children=yes");
sewardjde4a1d02002-03-22 01:27:54 +00001904 }
1905
sewardj4cf05692002-10-27 20:28:29 +00001906 /* Set up logging now. After this is done, VG_(clo_logfile_fd)
1907 should be connected to whatever sink has been selected, and we
1908 indiscriminately chuck stuff into it without worrying what the
1909 nature of it is. Oh the wonder of Unix streams. */
1910
nethercotee1730692003-11-20 10:38:07 +00001911 /* So far we should be still attached to stdout, so we can show on
sewardj4cf05692002-10-27 20:28:29 +00001912 the terminal any problems to do with processing command line
1913 opts. */
nethercotee1730692003-11-20 10:38:07 +00001914 vg_assert(VG_(clo_logfile_fd) == 1 /* stdout */);
sewardj73cf3bc2002-11-03 03:20:15 +00001915 vg_assert(VG_(logging_to_filedes) == True);
sewardj4cf05692002-10-27 20:28:29 +00001916
1917 switch (VG_(clo_log_to)) {
sewardj73cf3bc2002-11-03 03:20:15 +00001918
sewardj4cf05692002-10-27 20:28:29 +00001919 case VgLogTo_Fd:
1920 vg_assert(VG_(clo_logfile_name) == NULL);
1921 VG_(clo_logfile_fd) = eventually_logfile_fd;
1922 break;
sewardj73cf3bc2002-11-03 03:20:15 +00001923
sewardj4cf05692002-10-27 20:28:29 +00001924 case VgLogTo_File: {
1925 Char logfilename[1000];
jsgff3c3f1a2003-10-14 22:13:28 +00001926 Int seq = 0;
1927 Int pid = VG_(getpid)();
1928
sewardj4cf05692002-10-27 20:28:29 +00001929 vg_assert(VG_(clo_logfile_name) != NULL);
1930 vg_assert(VG_(strlen)(VG_(clo_logfile_name)) <= 900); /* paranoia */
jsgff3c3f1a2003-10-14 22:13:28 +00001931
nethercote71980f02004-01-24 18:18:54 +00001932 for (;;) {
jsgff3c3f1a2003-10-14 22:13:28 +00001933 if (seq == 0)
1934 VG_(sprintf)(logfilename, "%s.pid%d",
1935 VG_(clo_logfile_name), pid );
1936 else
1937 VG_(sprintf)(logfilename, "%s.pid%d.%d",
1938 VG_(clo_logfile_name), pid, seq );
1939 seq++;
1940
1941 eventually_logfile_fd
1942 = VG_(open)(logfilename,
1943 VKI_O_CREAT|VKI_O_WRONLY|VKI_O_EXCL|VKI_O_TRUNC,
1944 VKI_S_IRUSR|VKI_S_IWUSR);
1945 if (eventually_logfile_fd >= 0) {
fitzhardinge9b8c2f32004-01-06 00:15:26 +00001946 VG_(clo_logfile_fd) = VG_(safe_fd)(eventually_logfile_fd);
jsgff3c3f1a2003-10-14 22:13:28 +00001947 break;
1948 } else {
1949 if (eventually_logfile_fd != -VKI_EEXIST) {
1950 VG_(message)(Vg_UserMsg,
1951 "Can't create/open log file `%s.pid%d'; giving up!",
1952 VG_(clo_logfile_name), pid);
1953 VG_(bad_option)(
1954 "--logfile=<file> didn't work out for some reason.");
1955 break;
1956 }
1957 }
1958 }
sewardj4cf05692002-10-27 20:28:29 +00001959 break;
sewardj73cf3bc2002-11-03 03:20:15 +00001960 }
1961
1962 case VgLogTo_Socket: {
1963 vg_assert(VG_(clo_logfile_name) != NULL);
1964 vg_assert(VG_(strlen)(VG_(clo_logfile_name)) <= 900); /* paranoia */
1965 eventually_logfile_fd
1966 = VG_(connect_via_socket)( VG_(clo_logfile_name) );
1967 if (eventually_logfile_fd == -1) {
1968 VG_(message)(Vg_UserMsg,
1969 "Invalid --logsocket=ipaddr or --logsocket=ipaddr:port spec");
1970 VG_(message)(Vg_UserMsg,
1971 "of `%s'; giving up!", VG_(clo_logfile_name) );
1972 VG_(bad_option)(
1973 "--logsocket=");
sewardj4cf05692002-10-27 20:28:29 +00001974 }
sewardj73cf3bc2002-11-03 03:20:15 +00001975 if (eventually_logfile_fd == -2) {
1976 VG_(message)(Vg_UserMsg,
sewardj570f8902002-11-03 11:44:36 +00001977 "valgrind: failed to connect to logging server `%s'.",
sewardj73cf3bc2002-11-03 03:20:15 +00001978 VG_(clo_logfile_name) );
sewardj570f8902002-11-03 11:44:36 +00001979 VG_(message)(Vg_UserMsg,
1980 "Log messages will sent to stderr instead." );
1981 VG_(message)(Vg_UserMsg,
1982 "" );
1983 /* We don't change anything here. */
1984 } else {
1985 vg_assert(eventually_logfile_fd > 0);
1986 VG_(clo_logfile_fd) = eventually_logfile_fd;
1987 VG_(logging_to_filedes) = False;
1988 }
sewardj73cf3bc2002-11-03 03:20:15 +00001989 break;
1990 }
1991
sewardj4cf05692002-10-27 20:28:29 +00001992 }
1993
jsgf855d93d2003-10-13 22:26:55 +00001994 /* Move logfile_fd into the safe range, so it doesn't conflict with any app fds */
fitzhardingef0046f22003-12-18 02:39:22 +00001995 eventually_logfile_fd = VG_(fcntl)(VG_(clo_logfile_fd), VKI_F_DUPFD, VG_(max_fd)+1);
jsgf855d93d2003-10-13 22:26:55 +00001996 if (eventually_logfile_fd < 0)
1997 VG_(message)(Vg_UserMsg, "valgrind: failed to move logfile fd into safe range");
1998 else {
1999 VG_(clo_logfile_fd) = eventually_logfile_fd;
2000 VG_(fcntl)(VG_(clo_logfile_fd), VKI_F_SETFD, VKI_FD_CLOEXEC);
2001 }
2002
sewardj4cf05692002-10-27 20:28:29 +00002003 /* Ok, the logging sink is running now. Print a suitable preamble.
2004 If logging to file or a socket, write details of parent PID and
2005 command line args, to help people trying to interpret the
2006 results of a run which encompasses multiple processes. */
sewardjde4a1d02002-03-22 01:27:54 +00002007
sewardj83adf412002-05-01 01:25:45 +00002008 if (VG_(clo_verbosity > 0)) {
njnd04b7c62002-10-03 14:05:52 +00002009 /* Skin details */
2010 VG_(message)(Vg_UserMsg, "%s%s%s, %s for x86-linux.",
2011 VG_(details).name,
2012 NULL == VG_(details).version ? "" : "-",
2013 NULL == VG_(details).version
2014 ? (Char*)"" : VG_(details).version,
2015 VG_(details).description);
2016 VG_(message)(Vg_UserMsg, "%s", VG_(details).copyright_author);
sewardj3b2736a2002-03-24 12:18:35 +00002017
njnd04b7c62002-10-03 14:05:52 +00002018 /* Core details */
2019 VG_(message)(Vg_UserMsg,
njn3e884182003-04-15 13:03:23 +00002020 "Using valgrind-%s, a program supervision framework for x86-linux.",
sewardj4aa62ba2002-10-05 15:49:27 +00002021 VERSION);
sewardjde4a1d02002-03-22 01:27:54 +00002022 VG_(message)(Vg_UserMsg,
nethercotebb1c9912004-01-04 16:43:23 +00002023 "Copyright (C) 2000-2004, and GNU GPL'd, by Julian Seward.");
njnd04b7c62002-10-03 14:05:52 +00002024 }
2025
nethercotec1e395d2003-11-10 13:26:49 +00002026 if (VG_(clo_verbosity) > 0 && VG_(clo_log_to) != VgLogTo_Fd) {
sewardj4cf05692002-10-27 20:28:29 +00002027 VG_(message)(Vg_UserMsg, "");
2028 VG_(message)(Vg_UserMsg,
2029 "My PID = %d, parent PID = %d. Prog and args are:",
2030 VG_(getpid)(), VG_(getppid)() );
2031 for (i = 0; i < VG_(client_argc); i++)
2032 VG_(message)(Vg_UserMsg, " %s", VG_(client_argv)[i]);
2033 }
2034
sewardjde4a1d02002-03-22 01:27:54 +00002035 if (VG_(clo_verbosity) > 1) {
nethercotea70f7352004-04-18 12:08:46 +00002036 Int fd;
sewardj4cf05692002-10-27 20:28:29 +00002037 if (VG_(clo_log_to) != VgLogTo_Fd)
2038 VG_(message)(Vg_UserMsg, "");
fitzhardinge98abfc72003-12-16 02:05:15 +00002039 VG_(message)(Vg_UserMsg, "Valgrind library directory: %s", VG_(libdir));
njn86dc2bc2003-09-09 07:26:21 +00002040 VG_(message)(Vg_UserMsg, "Command line");
2041 for (i = 0; i < VG_(client_argc); i++)
2042 VG_(message)(Vg_UserMsg, " %s", VG_(client_argv)[i]);
2043
sewardjde4a1d02002-03-22 01:27:54 +00002044 VG_(message)(Vg_UserMsg, "Startup, with flags:");
nethercote71980f02004-01-24 18:18:54 +00002045 for (i = 1; i < VG_(vg_argc); i++) {
2046 VG_(message)(Vg_UserMsg, " %s", VG_(vg_argv)[i]);
sewardjde4a1d02002-03-22 01:27:54 +00002047 }
nethercotea70f7352004-04-18 12:08:46 +00002048
2049 VG_(message)(Vg_UserMsg, "Contents of /proc/version:");
2050 fd = VG_(open) ( "/proc/version", VKI_O_RDONLY, 0 );
2051 if (fd < 0) {
2052 VG_(message)(Vg_UserMsg, " can't open /proc/version");
2053 } else {
2054 #define BUF_LEN 256
2055 Char version_buf[BUF_LEN];
2056 Int n = VG_(read) ( fd, version_buf, BUF_LEN );
2057 vg_assert(n <= 256);
2058 if (n > 0) {
2059 version_buf[n-1] = '\0';
2060 VG_(message)(Vg_UserMsg, " %s", version_buf);
2061 } else {
2062 VG_(message)(Vg_UserMsg, " (empty?)");
2063 }
2064 VG_(close)(fd);
2065 #undef BUF_LEN
2066 }
sewardjde4a1d02002-03-22 01:27:54 +00002067 }
2068
fitzhardinge98abfc72003-12-16 02:05:15 +00002069 if (VG_(clo_n_suppressions) < VG_CLO_MAX_SFILES-1 &&
njn25e49d8e72002-09-23 09:36:25 +00002070 (VG_(needs).core_errors || VG_(needs).skin_errors)) {
fitzhardinge98abfc72003-12-16 02:05:15 +00002071 /* If there are no suppression files specified and the skin
2072 needs one, load the default */
2073 static const Char default_supp[] = "default.supp";
2074 Int len = VG_(strlen)(VG_(libdir)) + 1 + sizeof(default_supp);
2075 Char *buf = VG_(arena_malloc)(VG_AR_CORE, len);
2076 VG_(sprintf)(buf, "%s/%s", VG_(libdir), default_supp);
2077 VG_(clo_suppressions)[VG_(clo_n_suppressions)] = buf;
2078 VG_(clo_n_suppressions)++;
sewardjde4a1d02002-03-22 01:27:54 +00002079 }
sewardj4cf05692002-10-27 20:28:29 +00002080
njn6a230532003-07-21 10:38:23 +00002081 if (VG_(clo_gen_suppressions) &&
2082 !VG_(needs).core_errors && !VG_(needs).skin_errors) {
2083 config_error("Can't use --gen-suppressions=yes with this skin,\n"
2084 " as it doesn't generate errors.");
2085 }
sewardjde4a1d02002-03-22 01:27:54 +00002086}
2087
sewardjde4a1d02002-03-22 01:27:54 +00002088
nethercote71980f02004-01-24 18:18:54 +00002089/*====================================================================*/
2090/*=== File descriptor setup ===*/
2091/*====================================================================*/
2092
2093static void setup_file_descriptors(void)
2094{
2095 struct vki_rlimit rl;
2096
2097 /* Get the current file descriptor limits. */
2098 if (VG_(getrlimit)(VKI_RLIMIT_NOFILE, &rl) < 0) {
2099 rl.rlim_cur = 1024;
2100 rl.rlim_max = 1024;
2101 }
2102
2103 /* Work out where to move the soft limit to. */
2104 if (rl.rlim_cur + VG_N_RESERVED_FDS <= rl.rlim_max) {
2105 rl.rlim_cur = rl.rlim_cur + VG_N_RESERVED_FDS;
2106 } else {
2107 rl.rlim_cur = rl.rlim_max;
2108 }
2109
2110 /* Reserve some file descriptors for our use. */
2111 VG_(max_fd) = rl.rlim_cur - VG_N_RESERVED_FDS;
2112
2113 /* Update the soft limit. */
2114 VG_(setrlimit)(VKI_RLIMIT_NOFILE, &rl);
2115
2116 if (VG_(vgexecfd) != -1)
2117 VG_(vgexecfd) = VG_(safe_fd)( VG_(vgexecfd) );
2118 if (VG_(clexecfd) != -1)
2119 VG_(clexecfd) = VG_(safe_fd)( VG_(clexecfd) );
2120}
2121
2122
2123/*====================================================================*/
nethercote1d447092004-02-01 17:29:59 +00002124/*=== baseBlock: definition + setup ===*/
nethercote71980f02004-01-24 18:18:54 +00002125/*====================================================================*/
2126
2127/* The variables storing offsets. */
2128
2129#define INVALID_OFFSET (-1)
2130
2131Int VGOFF_(m_eax) = INVALID_OFFSET;
2132Int VGOFF_(m_ecx) = INVALID_OFFSET;
2133Int VGOFF_(m_edx) = INVALID_OFFSET;
2134Int VGOFF_(m_ebx) = INVALID_OFFSET;
2135Int VGOFF_(m_esp) = INVALID_OFFSET;
2136Int VGOFF_(m_ebp) = INVALID_OFFSET;
2137Int VGOFF_(m_esi) = INVALID_OFFSET;
2138Int VGOFF_(m_edi) = INVALID_OFFSET;
2139Int VGOFF_(m_eflags) = INVALID_OFFSET;
2140Int VGOFF_(m_dflag) = INVALID_OFFSET;
2141Int VGOFF_(m_ssestate) = INVALID_OFFSET;
2142Int VGOFF_(ldt) = INVALID_OFFSET;
2143Int VGOFF_(tls) = INVALID_OFFSET;
2144Int VGOFF_(m_cs) = INVALID_OFFSET;
2145Int VGOFF_(m_ss) = INVALID_OFFSET;
2146Int VGOFF_(m_ds) = INVALID_OFFSET;
2147Int VGOFF_(m_es) = INVALID_OFFSET;
2148Int VGOFF_(m_fs) = INVALID_OFFSET;
2149Int VGOFF_(m_gs) = INVALID_OFFSET;
2150Int VGOFF_(m_eip) = INVALID_OFFSET;
2151Int VGOFF_(spillslots) = INVALID_OFFSET;
2152Int VGOFF_(sh_eax) = INVALID_OFFSET;
2153Int VGOFF_(sh_ecx) = INVALID_OFFSET;
2154Int VGOFF_(sh_edx) = INVALID_OFFSET;
2155Int VGOFF_(sh_ebx) = INVALID_OFFSET;
2156Int VGOFF_(sh_esp) = INVALID_OFFSET;
2157Int VGOFF_(sh_ebp) = INVALID_OFFSET;
2158Int VGOFF_(sh_esi) = INVALID_OFFSET;
2159Int VGOFF_(sh_edi) = INVALID_OFFSET;
2160Int VGOFF_(sh_eflags) = INVALID_OFFSET;
2161
2162Int VGOFF_(helper_idiv_64_32) = INVALID_OFFSET;
2163Int VGOFF_(helper_div_64_32) = INVALID_OFFSET;
2164Int VGOFF_(helper_idiv_32_16) = INVALID_OFFSET;
2165Int VGOFF_(helper_div_32_16) = INVALID_OFFSET;
2166Int VGOFF_(helper_idiv_16_8) = INVALID_OFFSET;
2167Int VGOFF_(helper_div_16_8) = INVALID_OFFSET;
2168Int VGOFF_(helper_imul_32_64) = INVALID_OFFSET;
2169Int VGOFF_(helper_mul_32_64) = INVALID_OFFSET;
2170Int VGOFF_(helper_imul_16_32) = INVALID_OFFSET;
2171Int VGOFF_(helper_mul_16_32) = INVALID_OFFSET;
2172Int VGOFF_(helper_imul_8_16) = INVALID_OFFSET;
2173Int VGOFF_(helper_mul_8_16) = INVALID_OFFSET;
2174Int VGOFF_(helper_CLD) = INVALID_OFFSET;
2175Int VGOFF_(helper_STD) = INVALID_OFFSET;
2176Int VGOFF_(helper_get_dirflag) = INVALID_OFFSET;
2177Int VGOFF_(helper_CLC) = INVALID_OFFSET;
2178Int VGOFF_(helper_STC) = INVALID_OFFSET;
nethercote1018bdd2004-02-11 23:33:29 +00002179Int VGOFF_(helper_CMC) = INVALID_OFFSET;
nethercote71980f02004-01-24 18:18:54 +00002180Int VGOFF_(helper_shldl) = INVALID_OFFSET;
2181Int VGOFF_(helper_shldw) = INVALID_OFFSET;
2182Int VGOFF_(helper_shrdl) = INVALID_OFFSET;
2183Int VGOFF_(helper_shrdw) = INVALID_OFFSET;
2184Int VGOFF_(helper_IN) = INVALID_OFFSET;
2185Int VGOFF_(helper_OUT) = INVALID_OFFSET;
2186Int VGOFF_(helper_RDTSC) = INVALID_OFFSET;
2187Int VGOFF_(helper_CPUID) = INVALID_OFFSET;
2188Int VGOFF_(helper_BSWAP) = INVALID_OFFSET;
nethercote1018bdd2004-02-11 23:33:29 +00002189Int VGOFF_(helper_bsfw) = INVALID_OFFSET;
2190Int VGOFF_(helper_bsfl) = INVALID_OFFSET;
2191Int VGOFF_(helper_bsrw) = INVALID_OFFSET;
2192Int VGOFF_(helper_bsrl) = INVALID_OFFSET;
nethercote71980f02004-01-24 18:18:54 +00002193Int VGOFF_(helper_fstsw_AX) = INVALID_OFFSET;
2194Int VGOFF_(helper_SAHF) = INVALID_OFFSET;
2195Int VGOFF_(helper_LAHF) = INVALID_OFFSET;
2196Int VGOFF_(helper_DAS) = INVALID_OFFSET;
2197Int VGOFF_(helper_DAA) = INVALID_OFFSET;
nethercote1018bdd2004-02-11 23:33:29 +00002198Int VGOFF_(helper_AAS) = INVALID_OFFSET;
2199Int VGOFF_(helper_AAA) = INVALID_OFFSET;
2200Int VGOFF_(helper_AAD) = INVALID_OFFSET;
2201Int VGOFF_(helper_AAM) = INVALID_OFFSET;
nethercote71980f02004-01-24 18:18:54 +00002202Int VGOFF_(helper_cmpxchg8b) = INVALID_OFFSET;
2203Int VGOFF_(helper_undefined_instruction) = INVALID_OFFSET;
2204
2205/* MAX_NONCOMPACT_HELPERS can be increased easily. If MAX_COMPACT_HELPERS is
2206 * increased too much, they won't really be compact any more... */
2207#define MAX_COMPACT_HELPERS 8
2208#define MAX_NONCOMPACT_HELPERS 50
2209
2210UInt VG_(n_compact_helpers) = 0;
2211UInt VG_(n_noncompact_helpers) = 0;
2212
2213Addr VG_(compact_helper_addrs) [MAX_COMPACT_HELPERS];
2214Int VG_(compact_helper_offsets)[MAX_COMPACT_HELPERS];
2215Addr VG_(noncompact_helper_addrs) [MAX_NONCOMPACT_HELPERS];
2216Int VG_(noncompact_helper_offsets)[MAX_NONCOMPACT_HELPERS];
2217
2218/* This is the actual defn of baseblock. */
2219UInt VG_(baseBlock)[VG_BASEBLOCK_WORDS];
2220
nethercote71980f02004-01-24 18:18:54 +00002221/* Words. */
2222static Int baB_off = 0;
2223
2224
sewardjfa492d42002-12-08 18:20:01 +00002225UInt VG_(insertDflag)(UInt eflags, Int d)
2226{
2227 vg_assert(d == 1 || d == -1);
2228 eflags &= ~EFlagD;
2229
2230 if (d < 0)
2231 eflags |= EFlagD;
2232
2233 return eflags;
2234}
2235
2236Int VG_(extractDflag)(UInt eflags)
2237{
2238 Int ret;
2239
2240 if (eflags & EFlagD)
2241 ret = -1;
2242 else
2243 ret = 1;
2244
2245 return ret;
2246}
2247
nethercote71980f02004-01-24 18:18:54 +00002248/* Returns the offset, in words. */
2249static Int alloc_BaB ( Int words )
sewardjde4a1d02002-03-22 01:27:54 +00002250{
nethercote71980f02004-01-24 18:18:54 +00002251 Int off = baB_off;
2252 baB_off += words;
2253 if (baB_off >= VG_BASEBLOCK_WORDS)
2254 VG_(core_panic)( "alloc_BaB: baseBlock is too small");
sewardjde4a1d02002-03-22 01:27:54 +00002255
nethercote71980f02004-01-24 18:18:54 +00002256 return off;
sewardjde4a1d02002-03-22 01:27:54 +00002257}
2258
nethercote71980f02004-01-24 18:18:54 +00002259/* Align offset, in *bytes* */
2260static void align_BaB ( UInt align )
njn25e49d8e72002-09-23 09:36:25 +00002261{
nethercote71980f02004-01-24 18:18:54 +00002262 vg_assert(2 == align || 4 == align || 8 == align || 16 == align);
2263 baB_off += (align-1);
2264 baB_off &= ~(align-1);
njn25e49d8e72002-09-23 09:36:25 +00002265}
2266
nethercote71980f02004-01-24 18:18:54 +00002267/* Allocate 1 word in baseBlock and set it to the given value. */
2268static Int alloc_BaB_1_set ( Addr a )
njn25e49d8e72002-09-23 09:36:25 +00002269{
nethercote71980f02004-01-24 18:18:54 +00002270 Int off = alloc_BaB(1);
2271 VG_(baseBlock)[off] = (UInt)a;
2272 return off;
njn25e49d8e72002-09-23 09:36:25 +00002273}
2274
nethercote71980f02004-01-24 18:18:54 +00002275/* Registers a function in compact_helper_addrs; compact_helper_offsets is
2276 filled in later. */
2277void VG_(register_compact_helper)(Addr a)
sewardjde4a1d02002-03-22 01:27:54 +00002278{
nethercote71980f02004-01-24 18:18:54 +00002279 if (MAX_COMPACT_HELPERS <= VG_(n_compact_helpers)) {
2280 VG_(printf)("Can only register %d compact helpers\n",
2281 MAX_COMPACT_HELPERS);
2282 VG_(core_panic)("Too many compact helpers registered");
2283 }
2284 VG_(compact_helper_addrs)[VG_(n_compact_helpers)] = a;
2285 VG_(n_compact_helpers)++;
2286}
2287
2288/* Registers a function in noncompact_helper_addrs; noncompact_helper_offsets
2289 * is filled in later.
2290 */
2291void VG_(register_noncompact_helper)(Addr a)
2292{
2293 if (MAX_NONCOMPACT_HELPERS <= VG_(n_noncompact_helpers)) {
2294 VG_(printf)("Can only register %d non-compact helpers\n",
2295 MAX_NONCOMPACT_HELPERS);
2296 VG_(printf)("Try increasing MAX_NON_COMPACT_HELPERS\n");
2297 VG_(core_panic)("Too many non-compact helpers registered");
2298 }
2299 VG_(noncompact_helper_addrs)[VG_(n_noncompact_helpers)] = a;
2300 VG_(n_noncompact_helpers)++;
2301}
2302
2303/* Allocate offsets in baseBlock for the skin helpers */
2304static
2305void assign_helpers_in_baseBlock(UInt n, Int offsets[], Addr addrs[])
2306{
2307 UInt i;
2308 for (i = 0; i < n; i++)
2309 offsets[i] = alloc_BaB_1_set( addrs[i] );
2310}
2311
2312Bool VG_(need_to_handle_esp_assignment)(void)
2313{
2314 return ( VG_(defined_new_mem_stack_4)() ||
2315 VG_(defined_die_mem_stack_4)() ||
2316 VG_(defined_new_mem_stack_8)() ||
2317 VG_(defined_die_mem_stack_8)() ||
2318 VG_(defined_new_mem_stack_12)() ||
2319 VG_(defined_die_mem_stack_12)() ||
2320 VG_(defined_new_mem_stack_16)() ||
2321 VG_(defined_die_mem_stack_16)() ||
2322 VG_(defined_new_mem_stack_32)() ||
2323 VG_(defined_die_mem_stack_32)() ||
2324 VG_(defined_new_mem_stack)() ||
2325 VG_(defined_die_mem_stack)()
2326 );
2327}
2328
2329/* Here we assign actual offsets. It's important to get the most
2330 popular referents within 128 bytes of the start, so we can take
2331 advantage of short addressing modes relative to %ebp. Popularity
2332 of offsets was measured on 22 Feb 02 running a KDE application, and
2333 the slots rearranged accordingly, with a 1.5% reduction in total
2334 size of translations. */
2335static void init_baseBlock ( Addr client_eip, Addr esp_at_startup )
2336{
2337 /* Those with offsets under 128 are carefully chosen. */
2338
2339 /* WORD offsets in this column */
2340 /* 0 */ VGOFF_(m_eax) = alloc_BaB_1_set(0);
2341 /* 1 */ VGOFF_(m_ecx) = alloc_BaB_1_set(0);
2342 /* 2 */ VGOFF_(m_edx) = alloc_BaB_1_set(0);
2343 /* 3 */ VGOFF_(m_ebx) = alloc_BaB_1_set(0);
2344 /* 4 */ VGOFF_(m_esp) = alloc_BaB_1_set(esp_at_startup);
2345 /* 5 */ VGOFF_(m_ebp) = alloc_BaB_1_set(0);
2346 /* 6 */ VGOFF_(m_esi) = alloc_BaB_1_set(0);
2347 /* 7 */ VGOFF_(m_edi) = alloc_BaB_1_set(0);
2348 /* 8 */ VGOFF_(m_eflags) = alloc_BaB_1_set(0);
2349
2350 if (VG_(needs).shadow_regs) {
2351 /* 9 */ VGOFF_(sh_eax) = alloc_BaB_1_set(0);
2352 /* 10 */ VGOFF_(sh_ecx) = alloc_BaB_1_set(0);
2353 /* 11 */ VGOFF_(sh_edx) = alloc_BaB_1_set(0);
2354 /* 12 */ VGOFF_(sh_ebx) = alloc_BaB_1_set(0);
2355 /* 13 */ VGOFF_(sh_esp) = alloc_BaB_1_set(0);
2356 /* 14 */ VGOFF_(sh_ebp) = alloc_BaB_1_set(0);
2357 /* 15 */ VGOFF_(sh_esi) = alloc_BaB_1_set(0);
2358 /* 16 */ VGOFF_(sh_edi) = alloc_BaB_1_set(0);
2359 /* 17 */ VGOFF_(sh_eflags) = alloc_BaB_1_set(0);
2360 VG_TRACK( post_regs_write_init );
2361 }
2362
2363 /* 9,10,11 or 18,19,20... depends on number whether shadow regs are used
2364 * and on compact helpers registered */
2365
2366 /* Make these most-frequently-called specialised ones compact, if they
2367 are used. */
2368 if (VG_(defined_new_mem_stack_4)())
2369 VG_(register_compact_helper)( (Addr) VG_(tool_interface).track_new_mem_stack_4);
2370
2371 if (VG_(defined_die_mem_stack_4)())
2372 VG_(register_compact_helper)( (Addr) VG_(tool_interface).track_die_mem_stack_4);
2373
2374 /* (9 or 18) + n_compact_helpers */
2375 /* Allocate slots for compact helpers */
2376 assign_helpers_in_baseBlock(VG_(n_compact_helpers),
2377 VG_(compact_helper_offsets),
2378 VG_(compact_helper_addrs));
2379
2380 /* (9/10 or 18/19) + n_compact_helpers */
2381 VGOFF_(m_eip) = alloc_BaB_1_set(client_eip);
2382
2383 /* There are currently 24 spill slots */
2384 /* (11+/20+ .. 32+/43+) + n_compact_helpers. This can overlap the magic
2385 * boundary at >= 32 words, but most spills are to low numbered spill
2386 * slots, so the ones above the boundary don't see much action. */
2387 VGOFF_(spillslots) = alloc_BaB(VG_MAX_SPILLSLOTS);
2388
2389 /* I gave up counting at this point. Since they're above the
2390 short-amode-boundary, there's no point. */
2391
2392 VGOFF_(m_dflag) = alloc_BaB_1_set(1); // 1 == forward D-flag
2393
2394 /* The FPU/SSE state. This _must_ be 16-byte aligned. Initial
2395 state doesn't matter much, as long as it's not totally borked. */
2396 align_BaB(16);
2397 VGOFF_(m_ssestate) = alloc_BaB(VG_SIZE_OF_SSESTATE_W);
2398 vg_assert(
2399 0 == ( ((UInt)(& VG_(baseBlock)[VGOFF_(m_ssestate)])) % 16 )
sewardj22854b92002-11-30 14:00:47 +00002400 );
2401
fitzhardingec2dbbac2004-01-23 23:09:01 +00002402 /* I assume that if we have SSE2 we also have SSE */
2403 VG_(have_ssestate) =
2404 VG_(cpu_has_feature)(VG_X86_FEAT_FXSR) &&
2405 VG_(cpu_has_feature)(VG_X86_FEAT_SSE);
2406
fitzhardinge98abfc72003-12-16 02:05:15 +00002407 /* set up an initial FPU state (doesn't really matter what it is,
2408 so long as it's somewhat valid) */
2409 if (!VG_(have_ssestate))
nethercote71980f02004-01-24 18:18:54 +00002410 asm volatile("fwait; fnsave %0; fwait; frstor %0; fwait"
2411 :
2412 : "m" (VG_(baseBlock)[VGOFF_(m_ssestate)])
2413 : "cc", "memory");
fitzhardinge98abfc72003-12-16 02:05:15 +00002414 else
nethercote71980f02004-01-24 18:18:54 +00002415 asm volatile("fwait; fxsave %0; fwait; andl $0xffbf, %1;"
2416 "fxrstor %0; fwait"
2417 :
2418 : "m" (VG_(baseBlock)[VGOFF_(m_ssestate)]),
2419 "m" (VG_(baseBlock)[VGOFF_(m_ssestate)+(24/4)])
2420 : "cc", "memory");
fitzhardinge98abfc72003-12-16 02:05:15 +00002421
njn0c7a5b52003-04-30 09:00:33 +00002422 if (0) {
2423 if (VG_(have_ssestate))
2424 VG_(printf)("Looks like a SSE-capable CPU\n");
2425 else
2426 VG_(printf)("Looks like a MMX-only CPU\n");
2427 }
sewardjb91ae7f2003-04-29 23:50:00 +00002428
nethercote71980f02004-01-24 18:18:54 +00002429 /* LDT pointer: pretend the root thread has an empty LDT to start with. */
2430 VGOFF_(ldt) = alloc_BaB_1_set((UInt)NULL);
jsgf855d93d2003-10-13 22:26:55 +00002431
nethercote71980f02004-01-24 18:18:54 +00002432 /* TLS pointer: pretend the root thread has no TLS array for now. */
2433 VGOFF_(tls) = alloc_BaB_1_set((UInt)NULL);
fitzhardingef0046f22003-12-18 02:39:22 +00002434
nethercote71980f02004-01-24 18:18:54 +00002435 /* segment registers */
2436 VGOFF_(m_cs) = alloc_BaB_1_set(0);
2437 VGOFF_(m_ss) = alloc_BaB_1_set(0);
2438 VGOFF_(m_ds) = alloc_BaB_1_set(0);
2439 VGOFF_(m_es) = alloc_BaB_1_set(0);
2440 VGOFF_(m_fs) = alloc_BaB_1_set(0);
2441 VGOFF_(m_gs) = alloc_BaB_1_set(0);
fitzhardingef0046f22003-12-18 02:39:22 +00002442
thughes35cec982004-04-21 15:16:43 +00002443 /* initialise %cs, %ds and %ss to point at the operating systems
2444 default code, data and stack segments */
2445 asm volatile("movw %%cs, %0"
2446 :
2447 : "m" (VG_(baseBlock)[VGOFF_(m_cs)]));
2448 asm volatile("movw %%ds, %0"
2449 :
2450 : "m" (VG_(baseBlock)[VGOFF_(m_ds)]));
2451 asm volatile("movw %%ss, %0"
2452 :
2453 : "m" (VG_(baseBlock)[VGOFF_(m_ss)]));
2454
nethercote71980f02004-01-24 18:18:54 +00002455 VG_(register_noncompact_helper)( (Addr) & VG_(do_useseg) );
fitzhardingef0046f22003-12-18 02:39:22 +00002456
nethercote71980f02004-01-24 18:18:54 +00002457#define REG(kind, size) \
2458 if (VG_(defined_##kind##_mem_stack##size)()) \
2459 VG_(register_noncompact_helper)( \
2460 (Addr) VG_(tool_interface).track_##kind##_mem_stack##size );
2461 REG(new, _8);
2462 REG(new, _12);
2463 REG(new, _16);
2464 REG(new, _32);
2465 REG(new, );
2466 REG(die, _8);
2467 REG(die, _12);
2468 REG(die, _16);
2469 REG(die, _32);
2470 REG(die, );
2471#undef REG
fitzhardingef0046f22003-12-18 02:39:22 +00002472
nethercote71980f02004-01-24 18:18:54 +00002473 if (VG_(need_to_handle_esp_assignment)())
2474 VG_(register_noncompact_helper)((Addr) VG_(unknown_esp_update));
fitzhardingeb791a192003-12-18 07:22:44 +00002475
nethercote71980f02004-01-24 18:18:54 +00002476# define HELPER(name) \
2477 VGOFF_(helper_##name) = alloc_BaB_1_set( (Addr) & VG_(helper_##name))
njn3e884182003-04-15 13:03:23 +00002478
nethercote71980f02004-01-24 18:18:54 +00002479 /* Helper functions. */
2480 HELPER(idiv_64_32); HELPER(div_64_32);
2481 HELPER(idiv_32_16); HELPER(div_32_16);
2482 HELPER(idiv_16_8); HELPER(div_16_8);
fitzhardinge98abfc72003-12-16 02:05:15 +00002483
nethercote71980f02004-01-24 18:18:54 +00002484 HELPER(imul_32_64); HELPER(mul_32_64);
2485 HELPER(imul_16_32); HELPER(mul_16_32);
2486 HELPER(imul_8_16); HELPER(mul_8_16);
njn25e49d8e72002-09-23 09:36:25 +00002487
nethercote71980f02004-01-24 18:18:54 +00002488 HELPER(CLD); HELPER(STD);
2489 HELPER(get_dirflag);
sewardjde4a1d02002-03-22 01:27:54 +00002490
nethercote71980f02004-01-24 18:18:54 +00002491 HELPER(CLC); HELPER(STC);
nethercote1018bdd2004-02-11 23:33:29 +00002492 HELPER(CMC);
jsgf855d93d2003-10-13 22:26:55 +00002493
nethercote71980f02004-01-24 18:18:54 +00002494 HELPER(shldl); HELPER(shldw);
2495 HELPER(shrdl); HELPER(shrdw);
njncc7bb472002-10-14 09:25:19 +00002496
nethercote71980f02004-01-24 18:18:54 +00002497 HELPER(RDTSC); HELPER(CPUID);
njncc7bb472002-10-14 09:25:19 +00002498
nethercote1018bdd2004-02-11 23:33:29 +00002499 HELPER(bsfw); HELPER(bsfl);
2500 HELPER(bsrw); HELPER(bsrl);
rjwalshf5f536f2003-11-17 17:45:00 +00002501
nethercote71980f02004-01-24 18:18:54 +00002502 HELPER(fstsw_AX);
2503 HELPER(SAHF); HELPER(LAHF);
2504 HELPER(DAS); HELPER(DAA);
nethercote1018bdd2004-02-11 23:33:29 +00002505 HELPER(AAS); HELPER(AAA);
2506 HELPER(AAD); HELPER(AAM);
nethercote71980f02004-01-24 18:18:54 +00002507 HELPER(IN); HELPER(OUT);
2508 HELPER(cmpxchg8b);
sewardj018f7622002-05-15 21:13:39 +00002509
nethercote71980f02004-01-24 18:18:54 +00002510 HELPER(undefined_instruction);
jsgf855d93d2003-10-13 22:26:55 +00002511
nethercote71980f02004-01-24 18:18:54 +00002512# undef HELPER
sewardjde4a1d02002-03-22 01:27:54 +00002513
nethercote71980f02004-01-24 18:18:54 +00002514 /* Allocate slots for noncompact helpers */
2515 assign_helpers_in_baseBlock(VG_(n_noncompact_helpers),
2516 VG_(noncompact_helper_offsets),
2517 VG_(noncompact_helper_addrs));
2518}
sewardjde4a1d02002-03-22 01:27:54 +00002519
sewardj5f07b662002-04-23 16:52:51 +00002520
nethercote71980f02004-01-24 18:18:54 +00002521/*====================================================================*/
2522/*=== Setup pointercheck ===*/
2523/*====================================================================*/
njn25e49d8e72002-09-23 09:36:25 +00002524
nethercote71980f02004-01-24 18:18:54 +00002525static void setup_pointercheck(void)
2526{
2527 int ret;
sewardj2e93c502002-04-12 11:12:52 +00002528
fitzhardinge98abfc72003-12-16 02:05:15 +00002529 if (VG_(clo_pointercheck)) {
nethercote71980f02004-01-24 18:18:54 +00002530 vki_modify_ldt_t ldt = {
2531 VG_POINTERCHECK_SEGIDX, // entry_number
2532 VG_(client_base), // base_addr
2533 (VG_(client_end)-VG_(client_base)) / VKI_BYTES_PER_PAGE, // limit
2534 1, // seg_32bit
2535 0, // contents: data, RW, non-expanding
2536 0, // ! read_exec_only
2537 1, // limit_in_pages
2538 0, // ! seg not present
2539 1, // useable
fitzhardinge98abfc72003-12-16 02:05:15 +00002540 };
nethercote71980f02004-01-24 18:18:54 +00002541 ret = VG_(do_syscall)(__NR_modify_ldt, 1, &ldt, sizeof(ldt));
fitzhardinge98abfc72003-12-16 02:05:15 +00002542 if (ret < 0) {
2543 VG_(message)(Vg_UserMsg,
2544 "Warning: ignoring --pointercheck=yes, "
2545 "because modify_ldt failed (errno=%d)", -ret);
2546 VG_(clo_pointercheck) = False;
2547 }
2548 }
sewardjde4a1d02002-03-22 01:27:54 +00002549}
2550
nethercote71980f02004-01-24 18:18:54 +00002551/*====================================================================*/
2552/*=== Initialise program data/text, etc. ===*/
2553/*====================================================================*/
sewardjde4a1d02002-03-22 01:27:54 +00002554
nethercote71980f02004-01-24 18:18:54 +00002555static void build_valgrind_map_callback
2556 ( Addr start, UInt size, Char rr, Char ww, Char xx,
2557 UInt dev, UInt ino, ULong foffset, const UChar* filename )
sewardjde4a1d02002-03-22 01:27:54 +00002558{
nethercote71980f02004-01-24 18:18:54 +00002559 UInt prot = 0;
2560 UInt flags = SF_MMAP|SF_NOSYMS;
2561 Bool is_stack_segment;
2562
2563 is_stack_segment =
2564 (start == VG_(clstk_base) && (start+size) == VG_(clstk_end));
2565
2566 /* Only record valgrind mappings for now, without loading any
2567 symbols. This is so we know where the free space is before we
2568 start allocating more memory (note: heap is OK, it's just mmap
2569 which is the problem here). */
2570 if (start >= VG_(valgrind_base) && (start+size) <= VG_(valgrind_end)) {
2571 flags |= SF_VALGRIND;
2572 VG_(map_file_segment)(start, size, prot, flags, dev, ino, foffset, filename);
2573 }
sewardjde4a1d02002-03-22 01:27:54 +00002574}
2575
nethercote71980f02004-01-24 18:18:54 +00002576// Global var used to pass local data to callback
2577Addr esp_at_startup___global_arg = 0;
sewardjde4a1d02002-03-22 01:27:54 +00002578
nethercote71980f02004-01-24 18:18:54 +00002579static void build_segment_map_callback
2580 ( Addr start, UInt size, Char rr, Char ww, Char xx,
2581 UInt dev, UInt ino, ULong foffset, const UChar* filename )
sewardj45b672d2003-07-25 19:58:11 +00002582{
nethercote71980f02004-01-24 18:18:54 +00002583 UInt prot = 0;
2584 UInt flags;
2585 Bool is_stack_segment;
2586 Addr r_esp;
sewardj45b672d2003-07-25 19:58:11 +00002587
nethercote71980f02004-01-24 18:18:54 +00002588 is_stack_segment
2589 = (start == VG_(clstk_base) && (start+size) == VG_(clstk_end));
fitzhardinge98abfc72003-12-16 02:05:15 +00002590
nethercote71980f02004-01-24 18:18:54 +00002591 if (rr == 'r') prot |= VKI_PROT_READ;
2592 if (ww == 'w') prot |= VKI_PROT_WRITE;
2593 if (xx == 'x') prot |= VKI_PROT_EXEC;
fitzhardinge98abfc72003-12-16 02:05:15 +00002594
nethercote71980f02004-01-24 18:18:54 +00002595 if (is_stack_segment)
2596 flags = SF_STACK | SF_GROWDOWN;
2597 else
2598 flags = SF_EXEC|SF_MMAP;
fitzhardinge98abfc72003-12-16 02:05:15 +00002599
nethercote71980f02004-01-24 18:18:54 +00002600 if (filename != NULL)
2601 flags |= SF_FILE;
fitzhardinge98abfc72003-12-16 02:05:15 +00002602
nethercote71980f02004-01-24 18:18:54 +00002603 if (start >= VG_(valgrind_base) && (start+size) <= VG_(valgrind_end))
2604 flags |= SF_VALGRIND;
fitzhardinge98abfc72003-12-16 02:05:15 +00002605
nethercote71980f02004-01-24 18:18:54 +00002606 VG_(map_file_segment)(start, size, prot, flags, dev, ino, foffset, filename);
fitzhardinge98abfc72003-12-16 02:05:15 +00002607
nethercote71980f02004-01-24 18:18:54 +00002608 if (VG_(is_client_addr)(start) && VG_(is_client_addr)(start+size-1))
2609 VG_TRACK( new_mem_startup, start, size, rr=='r', ww=='w', xx=='x' );
sewardj3e1eb1f2002-05-18 13:14:17 +00002610
nethercote71980f02004-01-24 18:18:54 +00002611 /* If this is the stack segment mark all below %esp as noaccess. */
2612 r_esp = esp_at_startup___global_arg;
2613 vg_assert(0 != r_esp);
2614 if (is_stack_segment) {
2615 if (0)
2616 VG_(message)(Vg_DebugMsg, "invalidating stack area: %x .. %x",
2617 start,r_esp);
2618 VG_TRACK( die_mem_stack, start, r_esp-start );
sewardjde4a1d02002-03-22 01:27:54 +00002619 }
sewardjde4a1d02002-03-22 01:27:54 +00002620}
2621
2622
nethercote71980f02004-01-24 18:18:54 +00002623/*====================================================================*/
2624/*=== Sanity check machinery (permanently engaged) ===*/
2625/*====================================================================*/
njn25e49d8e72002-09-23 09:36:25 +00002626
2627/* A fast sanity check -- suitable for calling circa once per
2628 millisecond. */
2629
2630void VG_(do_sanity_checks) ( Bool force_expensive )
2631{
njn37cea302002-09-30 11:24:00 +00002632 VGP_PUSHCC(VgpCoreCheapSanity);
2633
njn25e49d8e72002-09-23 09:36:25 +00002634 if (VG_(sanity_level) < 1) return;
2635
2636 /* --- First do all the tests that we can do quickly. ---*/
2637
2638 VG_(sanity_fast_count)++;
2639
njn25e49d8e72002-09-23 09:36:25 +00002640 /* Check stuff pertaining to the memory check system. */
2641
2642 /* Check that nobody has spuriously claimed that the first or
2643 last 16 pages of memory have become accessible [...] */
njn37cea302002-09-30 11:24:00 +00002644 if (VG_(needs).sanity_checks) {
2645 VGP_PUSHCC(VgpSkinCheapSanity);
njn25e49d8e72002-09-23 09:36:25 +00002646 vg_assert(SK_(cheap_sanity_check)());
njn37cea302002-09-30 11:24:00 +00002647 VGP_POPCC(VgpSkinCheapSanity);
2648 }
njn25e49d8e72002-09-23 09:36:25 +00002649
2650 /* --- Now some more expensive checks. ---*/
2651
2652 /* Once every 25 times, check some more expensive stuff. */
2653 if ( force_expensive
2654 || VG_(sanity_level) > 1
2655 || (VG_(sanity_level) == 1 && (VG_(sanity_fast_count) % 25) == 0)) {
2656
njn37cea302002-09-30 11:24:00 +00002657 VGP_PUSHCC(VgpCoreExpensiveSanity);
njn25e49d8e72002-09-23 09:36:25 +00002658 VG_(sanity_slow_count)++;
2659
jsgf855d93d2003-10-13 22:26:55 +00002660 VG_(proxy_sanity)();
2661
njn25e49d8e72002-09-23 09:36:25 +00002662# if 0
2663 { void zzzmemscan(void); zzzmemscan(); }
2664# endif
2665
2666 if ((VG_(sanity_fast_count) % 250) == 0)
2667 VG_(sanity_check_tc_tt)();
2668
2669 if (VG_(needs).sanity_checks) {
njn37cea302002-09-30 11:24:00 +00002670 VGP_PUSHCC(VgpSkinExpensiveSanity);
njn25e49d8e72002-09-23 09:36:25 +00002671 vg_assert(SK_(expensive_sanity_check)());
njn37cea302002-09-30 11:24:00 +00002672 VGP_POPCC(VgpSkinExpensiveSanity);
njn25e49d8e72002-09-23 09:36:25 +00002673 }
2674 /*
2675 if ((VG_(sanity_fast_count) % 500) == 0) VG_(mallocSanityCheckAll)();
2676 */
njn37cea302002-09-30 11:24:00 +00002677 VGP_POPCC(VgpCoreExpensiveSanity);
njn25e49d8e72002-09-23 09:36:25 +00002678 }
2679
2680 if (VG_(sanity_level) > 1) {
njn37cea302002-09-30 11:24:00 +00002681 VGP_PUSHCC(VgpCoreExpensiveSanity);
njn25e49d8e72002-09-23 09:36:25 +00002682 /* Check sanity of the low-level memory manager. Note that bugs
2683 in the client's code can cause this to fail, so we don't do
2684 this check unless specially asked for. And because it's
2685 potentially very expensive. */
2686 VG_(mallocSanityCheckAll)();
njn37cea302002-09-30 11:24:00 +00002687 VGP_POPCC(VgpCoreExpensiveSanity);
njn25e49d8e72002-09-23 09:36:25 +00002688 }
njn37cea302002-09-30 11:24:00 +00002689 VGP_POPCC(VgpCoreCheapSanity);
njn25e49d8e72002-09-23 09:36:25 +00002690}
nethercote71980f02004-01-24 18:18:54 +00002691
2692
2693/*====================================================================*/
2694/*=== main() ===*/
2695/*====================================================================*/
2696
2697int main(int argc, char **argv)
2698{
2699 char **cl_argv;
2700 const char *tool = NULL;
2701 const char *exec = NULL;
2702 char *preload; /* tool-specific LD_PRELOAD .so */
2703 char **env;
nethercote6c999f22004-01-31 22:55:15 +00002704 Int need_help = 0; // 0 = no, 1 = --help, 2 = --help-debug
nethercote71980f02004-01-24 18:18:54 +00002705 struct exeinfo info;
2706 ToolInfo *toolinfo = NULL;
2707 void *tool_dlhandle;
2708 Addr client_eip;
2709 Addr esp_at_startup; /* client's %esp at the point we gained control. */
2710 UInt * client_auxv;
2711 VgSchedReturnCode src;
fitzhardingeb50068f2004-02-24 23:42:55 +00002712 vki_rlimit zero = { 0, 0 };
nethercote71980f02004-01-24 18:18:54 +00002713
2714 //============================================================
2715 // Nb: startup is complex. Prerequisites are shown at every step.
2716 //
2717 // *** Be very careful when messing with the order ***
2718 //============================================================
2719
fitzhardingeb50068f2004-02-24 23:42:55 +00002720 // Get the current process datasize rlimit, and set it to zero.
2721 // This prevents any internal uses of brk() from having any effect.
2722 // We remember the old value so we can restore it on exec, so that
2723 // child processes will have a reasonable brk value.
2724 VG_(getrlimit)(VKI_RLIMIT_DATA, &VG_(client_rlimit_data));
2725 zero.rlim_max = VG_(client_rlimit_data).rlim_max;
2726 VG_(setrlimit)(VKI_RLIMIT_DATA, &zero);
2727
nethercote71980f02004-01-24 18:18:54 +00002728 //--------------------------------------------------------------
2729 // Check we were launched by stage1
2730 // p: n/a [must be first step]
2731 //--------------------------------------------------------------
2732 scan_auxv();
2733
2734 if (0) {
2735 int prmap(void *start, void *end, const char *perm, off_t off,
2736 int maj, int min, int ino) {
2737 printf("mapping %10p-%10p %s %02x:%02x %d\n",
2738 start, end, perm, maj, min, ino);
2739 return True;
2740 }
2741 printf("========== main() ==========\n");
2742 foreach_map(prmap);
2743 }
2744
2745 //--------------------------------------------------------------
2746 // Look for alternative libdir
2747 // p: n/a
2748 //--------------------------------------------------------------
2749 { char *cp = getenv(VALGRINDLIB);
2750 if (cp != NULL)
2751 VG_(libdir) = cp;
2752 }
2753
2754 //--------------------------------------------------------------
2755 // Begin working out address space layout
2756 // p: n/a
2757 //--------------------------------------------------------------
2758 layout_client_space( (Addr) & argc );
2759
2760 //--------------------------------------------------------------
2761 // Get valgrind args + client args (inc. from VALGRIND_OPTS/.valgrindrc).
2762 // Pre-process the command line.
2763 // p: n/a
2764 //--------------------------------------------------------------
2765 get_command_line(argc, argv, &VG_(vg_argc), &VG_(vg_argv), &cl_argv);
2766 pre_process_cmd_line_options(&need_help, &tool, &exec);
2767
2768 //==============================================================
2769 // Nb: once a tool is specified, the tool.so must be loaded even if
2770 // they specified --help or didn't specify a client program.
2771 //==============================================================
2772
2773 //--------------------------------------------------------------
2774 // With client padded out, map in tool
2775 // p: layout_client_space() [for padding]
2776 // p: set-libdir [for VG_(libdir)]
2777 // p: pre_process_cmd_line_options() [for 'tool']
2778 //--------------------------------------------------------------
2779 load_tool(tool, &tool_dlhandle, &toolinfo, &preload);
2780
2781 //==============================================================
2782 // Can use VG_(malloc)() and VG_(arena_malloc)() only after load_tool()
2783 // -- redzone size is now set.
2784 //==============================================================
2785
2786 //--------------------------------------------------------------
2787 // Finalise address space layout
2788 // p: layout_client_space(), load_tool() [for 'toolinfo']
2789 //--------------------------------------------------------------
2790 layout_remaining_space( toolinfo->shadow_ratio );
2791
2792 //--------------------------------------------------------------
2793 // Load client executable, finding in $PATH if necessary
2794 // p: layout_client_space() [so there's space]
2795 // p: pre_process_cmd_line_options() [for 'exec', 'need_help']
2796 // p: layout_remaining_space [so there's space]
2797 //--------------------------------------------------------------
2798 load_client(cl_argv, exec, /*inout*/&need_help, &info, &client_eip);
2799
2800 //--------------------------------------------------------------
2801 // Everything in place, unpad us
2802 // p: layout_remaining_space() [everything must be mapped in before now]
2803 // p: load_client() [ditto]
2804 //--------------------------------------------------------------
2805 as_unpad((void *)VG_(shadow_end), (void *)~0);
2806 as_closepadfile(); /* no more padding */
2807
2808 //--------------------------------------------------------------
2809 // Set up client's environment
2810 // p: set-libdir [for VG_(libdir)]
2811 // p: load_tool() [for 'preload']
2812 //--------------------------------------------------------------
2813 env = fix_environment(environ, preload);
2814
2815 //--------------------------------------------------------------
2816 // Setup client stack and eip
2817 // p: load_client() [for 'info']
2818 // p: fix_environment() [for 'env']
2819 //--------------------------------------------------------------
2820 esp_at_startup = setup_client_stack(cl_argv, env, &info, &client_auxv);
2821
2822 if (0)
2823 printf("entry=%x client esp=%x vg_argc=%d brkbase=%x\n",
2824 client_eip, esp_at_startup, VG_(vg_argc), VG_(brk_base));
2825
2826 //==============================================================
2827 // Finished setting up operating environment. Now initialise
2828 // Valgrind. (This is where the old VG_(main)() started.)
2829 //==============================================================
2830
2831 //--------------------------------------------------------------
2832 // Read /proc/self/maps into a buffer
2833 // p: all memory layout, environment setup [so memory maps are right]
2834 //--------------------------------------------------------------
2835 VG_(read_procselfmaps)();
2836
2837 //--------------------------------------------------------------
2838 // atfork
2839 // p: n/a
2840 //--------------------------------------------------------------
2841 VG_(atfork)(NULL, NULL, newpid);
2842 newpid(VG_INVALID_THREADID);
2843
2844 //--------------------------------------------------------------
2845 // setup file descriptors
2846 // p: n/a
2847 //--------------------------------------------------------------
2848 setup_file_descriptors();
2849
2850 //--------------------------------------------------------------
2851 // Setup tool
2852 // p: VG_(read_procselfmaps)() [so if sk_pre_clo_init calls
2853 // VG_(malloc), any mmap'd superblocks aren't erroneously
2854 // identified later as being owned by the client]
2855 // XXX: is that necessary, now that we look for V's segments separately?
2856 // XXX: alternatively, if sk_pre_clo_init does use VG_(malloc)(), is it
2857 // wrong to ignore any segments that might add in parse_procselfmaps?
2858 //--------------------------------------------------------------
2859 (*toolinfo->sk_pre_clo_init)();
2860 VG_(tool_init_dlsym)(tool_dlhandle);
2861 VG_(sanity_check_needs)();
2862
2863 //--------------------------------------------------------------
2864 // Process Valgrind's + tool's command-line options
2865 // p: load_tool() [for 'tool']
2866 // p: load_client() [for 'need_help']
2867 // p: setup_file_descriptors() [for 'VG_(max_fd)']
2868 // p: sk_pre_clo_init [to set 'command_line_options' need]
2869 //--------------------------------------------------------------
2870 process_cmd_line_options(client_auxv, esp_at_startup, tool, need_help);
2871
2872 //--------------------------------------------------------------
2873 // Allow GDB attach
2874 // p: process_cmd_line_options() [for VG_(clo_wait_for_gdb)]
2875 //--------------------------------------------------------------
2876 /* Hook to delay things long enough so we can get the pid and
2877 attach GDB in another shell. */
2878 if (VG_(clo_wait_for_gdb)) {
2879 VG_(printf)("pid=%d\n", VG_(getpid)());
2880 /* do "jump *$eip" to skip this in gdb */
2881 VG_(do_syscall)(__NR_pause);
2882 }
2883
2884 //--------------------------------------------------------------
2885 // Setup tool, post command-line processing
2886 // p: process_cmd_line_options [tool assumes it]
2887 //--------------------------------------------------------------
2888 SK_(post_clo_init)();
2889
2890 //--------------------------------------------------------------
nethercote1d447092004-02-01 17:29:59 +00002891 // Set up baseBlock
nethercote71980f02004-01-24 18:18:54 +00002892 // p: {pre,post}_clo_init() [for tool helper registration]
2893 // load_client() [for 'client_eip']
2894 // setup_client_stack() [for 'esp_at_startup']
2895 //--------------------------------------------------------------
2896 init_baseBlock(client_eip, esp_at_startup);
2897
2898 //--------------------------------------------------------------
2899 // Search for file descriptors that are inherited from our parent
2900 // p: process_cmd_line_options [for VG_(clo_track_fds)]
2901 //--------------------------------------------------------------
2902 if (VG_(clo_track_fds))
2903 VG_(init_preopened_fds)();
2904
2905 //--------------------------------------------------------------
2906 // Initialise the scheduler
2907 // p: init_baseBlock() [baseBlock regs copied into VG_(threads)[1]]
2908 // p: setup_file_descriptors() [else VG_(safe_fd)() breaks]
2909 //--------------------------------------------------------------
2910 VG_(scheduler_init)();
2911
2912 //--------------------------------------------------------------
2913 // Set up the ProxyLWP machinery
2914 // p: VG_(scheduler_init)()? [XXX: subtle dependency?]
2915 // - subs: VG_(sigstartup_actions)()?
2916 //--------------------------------------------------------------
2917 VG_(proxy_init)();
2918
2919 //--------------------------------------------------------------
2920 // Initialise the signal handling subsystem
2921 // p: VG_(atfork)(NULL, NULL, newpid) [else problems with sigmasks]
2922 // p: VG_(proxy_init)() [else breaks...]
2923 //--------------------------------------------------------------
2924 // Nb: temporarily parks the saved blocking-mask in saved_sigmask.
2925 VG_(sigstartup_actions)();
2926
2927 //--------------------------------------------------------------
2928 // Perhaps we're profiling Valgrind?
2929 // p: process_cmd_line_options() [for VG_(clo_profile)]
2930 // p: others?
2931 //
2932 // XXX: this seems to be broken? It always says the tool wasn't built
2933 // for profiling; vg_profile.c's functions don't seem to be overriding
2934 // vg_dummy_profile.c's?
2935 //
2936 // XXX: want this as early as possible. Looking for --profile
2937 // in pre_process_cmd_line_options() could get it earlier.
2938 //--------------------------------------------------------------
2939 if (VG_(clo_profile))
2940 VGP_(init_profiling)();
2941
2942 VGP_PUSHCC(VgpStartup);
2943
2944 //--------------------------------------------------------------
nethercote71980f02004-01-24 18:18:54 +00002945 // Reserve Valgrind's kickstart, heap and stack
2946 // p: XXX ???
2947 //--------------------------------------------------------------
2948 VG_(map_segment)(VG_(valgrind_mmap_end),
2949 VG_(valgrind_end)-VG_(valgrind_mmap_end),
2950 VKI_PROT_NONE, SF_VALGRIND|SF_FIXED);
2951
2952 //--------------------------------------------------------------
2953 // Identify Valgrind's segments
2954 // p: read proc/self/maps
2955 // p: VG_(map_segment) [XXX ???]
2956 // p: sk_pre_clo_init() [to setup new_mem_startup tracker]
2957 //--------------------------------------------------------------
2958 VG_(parse_procselfmaps) ( build_valgrind_map_callback );
2959
2960 // XXX: I can't see why these two need to be separate; could they be
2961 // folded together? If not, need a comment explaining why.
2962 //
2963 // XXX: can we merge reading and parsing of /proc/self/maps?
2964 //
2965 // XXX: can we dynamically allocate the /proc/self/maps buffer? (or mmap
2966 // it?) Or does that disturb its contents...
2967
2968 //--------------------------------------------------------------
2969 // Build segment map (all segments)
2970 // p: setup_client_stack() [for 'esp_at_startup']
2971 //--------------------------------------------------------------
2972 esp_at_startup___global_arg = esp_at_startup;
2973 VG_(parse_procselfmaps) ( build_segment_map_callback ); /* everything */
2974 esp_at_startup___global_arg = 0;
2975
2976 //==============================================================
2977 // Can only use VG_(map)() after VG_(map_segment)() [XXX ???]
2978 //==============================================================
2979
2980 //--------------------------------------------------------------
2981 // Build segment map (all segments)
2982 // p: setup_client_stack() [for 'esp_at_startup']
2983 //--------------------------------------------------------------
2984 /* Initialize our trampoline page (which is also sysinfo stuff) */
2985 VG_(memcpy)( (void *)VG_(client_trampoline_code),
2986 &VG_(trampoline_code_start), VG_(trampoline_code_length) );
2987 VG_(mprotect)( (void *)VG_(client_trampoline_code),
2988 VG_(trampoline_code_length), VKI_PROT_READ|VKI_PROT_EXEC );
2989
2990 //--------------------------------------------------------------
2991 // Read suppression file
2992 // p: process_cmd_line_options() [for VG_(clo_suppressions)]
2993 //--------------------------------------------------------------
2994 if (VG_(needs).core_errors || VG_(needs).skin_errors)
2995 VG_(load_suppressions)();
2996
2997 //--------------------------------------------------------------
nethercote71980f02004-01-24 18:18:54 +00002998 // Initialise translation table and translation cache
2999 // p: read_procselfmaps [so the anonymous mmaps for the TT/TC
3000 // aren't identified as part of the client, which would waste
3001 // > 20M of virtual address space.]
3002 //--------------------------------------------------------------
3003 VG_(init_tt_tc)();
3004
3005 //--------------------------------------------------------------
3006 // Read debug info to find glibc entry points to intercept
3007 // p: parse_procselfmaps? [XXX for debug info?]
3008 // p: init_tt_tc? [XXX ???]
3009 //--------------------------------------------------------------
3010 VG_(setup_code_redirect_table)();
3011
3012 //--------------------------------------------------------------
3013 // Verbosity message
3014 // p: end_rdtsc_calibration [so startup message is printed first]
3015 //--------------------------------------------------------------
3016 if (VG_(clo_verbosity) == 1)
3017 VG_(message)(Vg_UserMsg, "For more details, rerun with: -v");
3018 if (VG_(clo_verbosity) > 0)
3019 VG_(message)(Vg_UserMsg, "");
3020
3021 //--------------------------------------------------------------
3022 // Setup pointercheck
3023 // p: process_cmd_line_options() [for VG_(clo_pointercheck)]
3024 //--------------------------------------------------------------
3025 setup_pointercheck();
3026
3027
3028
3029 //--------------------------------------------------------------
3030 // Run!
3031 //--------------------------------------------------------------
3032 VG_(running_on_simd_CPU) = True;
3033 VGP_POPCC(VgpStartup);
3034 VGP_PUSHCC(VgpSched);
3035
3036 if (__builtin_setjmp(&VG_(fatal_signal_jmpbuf)) == 0) {
3037 VG_(fatal_signal_set) = True;
3038 src = VG_(scheduler)();
3039 } else
3040 src = VgSrc_FatalSig;
3041
3042 VGP_POPCC(VgpSched);
3043 VG_(running_on_simd_CPU) = False;
3044
3045
3046
3047 //--------------------------------------------------------------
3048 // Finalisation: cleanup, messages, etc. Order no so important, only
3049 // affects what order the messages come.
3050 //--------------------------------------------------------------
3051 if (VG_(clo_verbosity) > 0)
3052 VG_(message)(Vg_UserMsg, "");
3053
3054 if (src == VgSrc_Deadlock) {
3055 VG_(message)(Vg_UserMsg,
3056 "Warning: pthread scheduler exited due to deadlock");
3057 }
3058
3059 /* Print out file descriptor summary and stats. */
3060 if (VG_(clo_track_fds))
3061 VG_(fd_stats)();
3062
3063 if (VG_(needs).core_errors || VG_(needs).skin_errors)
3064 VG_(show_all_errors)();
3065
3066 SK_(fini)( VG_(exitcode) );
3067
3068 VG_(do_sanity_checks)( True /*include expensive checks*/ );
3069
3070 if (VG_(clo_verbosity) > 1)
3071 show_counts();
3072
3073 if (VG_(clo_verbosity) > 3)
3074 VG_(print_UInstr_histogram)();
3075
3076 if (0) {
3077 VG_(message)(Vg_DebugMsg, "");
3078 VG_(message)(Vg_DebugMsg,
3079 "------ Valgrind's internal memory use stats follow ------" );
3080 VG_(mallocSanityCheckAll)();
3081 VG_(show_all_arena_stats)();
3082 VG_(message)(Vg_DebugMsg,
3083 "------ Valgrind's ExeContext management stats follow ------" );
3084 VG_(show_ExeContext_stats)();
3085 }
3086
3087 if (VG_(clo_profile))
3088 VGP_(done_profiling)();
3089
3090 /* Must be after all messages are done */
3091 VG_(shutdown_logging)();
3092
3093 /* We're exiting, so nuke all the threads and clean up the proxy LWPs */
3094 vg_assert(src == VgSrc_FatalSig ||
3095 VG_(threads)[VG_(last_run_tid)].status == VgTs_Runnable ||
3096 VG_(threads)[VG_(last_run_tid)].status == VgTs_WaitJoiner);
3097 VG_(nuke_all_threads_except)(VG_INVALID_THREADID);
3098
3099 //--------------------------------------------------------------
3100 // Exit, according to the scheduler's return code
3101 //--------------------------------------------------------------
3102 switch (src) {
3103 case VgSrc_ExitSyscall: /* the normal way out */
3104 vg_assert(VG_(last_run_tid) > 0
3105 && VG_(last_run_tid) < VG_N_THREADS);
3106 VG_(proxy_shutdown)();
3107
3108 /* The thread's %EBX at the time it did __NR_exit() will hold
3109 the arg to __NR_exit(), so we just do __NR_exit() with
3110 that arg. */
3111 VG_(exit)( VG_(exitcode) );
3112 /* NOT ALIVE HERE! */
3113 VG_(core_panic)("entered the afterlife in main() -- ExitSyscall");
3114 break; /* what the hell :) */
3115
3116 case VgSrc_Deadlock:
3117 /* Just exit now. No point in continuing. */
3118 VG_(proxy_shutdown)();
3119 VG_(exit)(0);
3120 VG_(core_panic)("entered the afterlife in main() -- Deadlock");
3121 break;
3122
nethercote71980f02004-01-24 18:18:54 +00003123 case VgSrc_FatalSig:
3124 /* We were killed by a fatal signal, so replicate the effect */
3125 vg_assert(VG_(fatal_sigNo) != -1);
3126 VG_(kill_self)(VG_(fatal_sigNo));
3127 VG_(core_panic)("main(): signal was supposed to be fatal");
3128 break;
3129
3130 default:
3131 VG_(core_panic)("main(): unexpected scheduler return code");
3132 }
3133
3134 abort();
3135}
3136
3137
sewardjde4a1d02002-03-22 01:27:54 +00003138/*--------------------------------------------------------------------*/
3139/*--- end vg_main.c ---*/
3140/*--------------------------------------------------------------------*/