blob: b5c8f50ef575035b6660c7d1793e2023575b4919 [file] [log] [blame]
/*--------------------------------------------------------------------*/
/*--- Startup: the real stuff m_main.c ---*/
/*--------------------------------------------------------------------*/
/*
This file is part of Valgrind, a dynamic binary instrumentation
framework.
Copyright (C) 2000-2009 Julian Seward
jseward@acm.org
This program is free software; you can redistribute it and/or
modify it under the terms of the GNU General Public License as
published by the Free Software Foundation; either version 2 of the
License, or (at your option) any later version.
This program is distributed in the hope that it will be useful, but
WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA
02111-1307, USA.
The GNU General Public License is contained in the file COPYING.
*/
#include "pub_core_basics.h"
#include "pub_core_vki.h"
#include "pub_core_vkiscnums.h"
#include "pub_core_threadstate.h"
#include "pub_core_xarray.h"
#include "pub_core_clientstate.h"
#include "pub_core_aspacemgr.h"
#include "pub_core_aspacehl.h"
#include "pub_core_commandline.h"
#include "pub_core_debuglog.h"
#include "pub_core_errormgr.h"
#include "pub_core_execontext.h"
#include "pub_core_initimg.h"
#include "pub_core_libcbase.h"
#include "pub_core_libcassert.h"
#include "pub_core_libcfile.h"
#include "pub_core_libcprint.h"
#include "pub_core_libcproc.h"
#include "pub_core_libcsignal.h"
#include "pub_core_syscall.h" // VG_(strerror)
#include "pub_core_mach.h"
#include "pub_core_machine.h"
#include "pub_core_mallocfree.h"
#include "pub_core_options.h"
#include "pub_core_debuginfo.h"
#include "pub_core_redir.h"
#include "pub_core_scheduler.h"
#include "pub_core_signals.h"
#include "pub_core_stacks.h" // For VG_(register_stack)
#include "pub_core_syswrap.h"
#include "pub_core_tooliface.h"
#include "pub_core_translate.h" // For VG_(translate)
#include "pub_core_trampoline.h"
#include "pub_core_transtab.h"
/* Stuff for reading AIX5 /proc/<pid>/sysent files */
#if defined(VGO_aix5)
/* --- !!! --- EXTERNAL HEADERS start --- !!! --- */
# include <sys/procfs.h> /* prsysent_t */
/* --- !!! --- EXTERNAL HEADERS end --- !!! --- */
# define VG_AIX5_SYSENT_SIZE 100000
static UChar aix5_sysent_buf[VG_AIX5_SYSENT_SIZE];
#endif
/*====================================================================*/
/*=== Counters, for profiling purposes only ===*/
/*====================================================================*/
static void print_all_stats ( void )
{
VG_(print_translation_stats)();
VG_(print_tt_tc_stats)();
VG_(print_scheduler_stats)();
VG_(print_ExeContext_stats)();
VG_(print_errormgr_stats)();
// Memory stats
if (VG_(clo_verbosity) > 2) {
VG_(message)(Vg_DebugMsg, "\n");
VG_(message)(Vg_DebugMsg,
"------ Valgrind's internal memory use stats follow ------\n" );
VG_(sanity_check_malloc_all)();
VG_(message)(Vg_DebugMsg, "------\n" );
VG_(print_all_arena_stats)();
VG_(message)(Vg_DebugMsg, "\n");
}
}
/*====================================================================*/
/*=== Command-line: variables, processing, etc ===*/
/*====================================================================*/
// See pub_{core,tool}_options.h for explanations of all these.
static void usage_NORETURN ( Bool debug_help )
{
/* 'usage1' contains a %s for the name of the GDB executable, which
must be supplied when it is VG_(printf)'d. */
Char* usage1 =
"usage: valgrind [options] prog-and-args\n"
"\n"
" common user options for all Valgrind tools, with defaults in [ ]:\n"
" --tool=<name> use the Valgrind tool named <name> [memcheck]\n"
" -h --help show this message\n"
" --help-debug show this message, plus debugging options\n"
" --version show version\n"
" -q --quiet run silently; only print error msgs\n"
" -v --verbose be more verbose, incl counts of errors\n"
" --trace-children=no|yes Valgrind-ise child processes (follow execve)? [no]\n"
" --child-silent-after-fork=no|yes omit child output between fork & exec? [no]\n"
" --track-fds=no|yes track open file descriptors? [no]\n"
" --time-stamp=no|yes add timestamps to log messages? [no]\n"
" --log-fd=<number> log messages to file descriptor [2=stderr]\n"
" --log-file=<file> log messages to <file>\n"
" --log-socket=ipaddr:port log messages to socket ipaddr:port\n"
"\n"
" uncommon user options for all Valgrind tools:\n"
" --run-libc-freeres=no|yes free up glibc memory at exit? [yes]\n"
" --sim-hints=hint1,hint2,... known hints:\n"
" lax-ioctls, enable-outer [none]\n"
" --show-emwarns=no|yes show warnings about emulation limits? [no]\n"
" --smc-check=none|stack|all checks for self-modifying code: none,\n"
" only for code found in stacks, or all [stack]\n"
" --kernel-variant=variant1,variant2,... known variants: bproc [none]\n"
" handle non-standard kernel variants\n"
" --read-var-info=yes|no read debug info on stack and global variables\n"
" and use it to print better error messages in\n"
" tools that make use of it (Memcheck, Helgrind,\n"
" DRD)\n"
"\n"
" user options for Valgrind tools that report errors:\n"
" --xml=yes emit error output in XML (some tools only)\n"
" --xml-fd=<number> XML output to file descriptor\n"
" --xml-file=<file> XML output to <file>\n"
" --xml-socket=ipaddr:port XML output to socket ipaddr:port\n"
" --xml-user-comment=STR copy STR verbatim into XML output\n"
" --demangle=no|yes automatically demangle C++ names? [yes]\n"
" --num-callers=<number> show <number> callers in stack traces [12]\n"
" --error-limit=no|yes stop showing new errors if too many? [yes]\n"
" --error-exitcode=<number> exit code to return if errors found [0=disable]\n"
" --show-below-main=no|yes continue stack traces below main() [no]\n"
" --suppressions=<filename> suppress errors described in <filename>\n"
" --gen-suppressions=no|yes|all print suppressions for errors? [no]\n"
" --db-attach=no|yes start debugger when errors detected? [no]\n"
" --db-command=<command> command to start debugger [%s -nw %%f %%p]\n"
" --input-fd=<number> file descriptor for input [0=stdin]\n"
" --max-stackframe=<number> assume stack switch for SP changes larger\n"
" than <number> bytes [2000000]\n"
" --main-stacksize=<number> set size of main thread's stack (in bytes)\n"
" [use current 'ulimit' value]\n"
"\n";
Char* usage2 =
"\n"
" debugging options for all Valgrind tools:\n"
" --sanity-level=<number> level of sanity checking to do [1]\n"
" --trace-flags=<XXXXXXXX> show generated code? (X = 0|1) [00000000]\n"
" --profile-flags=<XXXXXXXX> ditto, but for profiling (X = 0|1) [00000000]\n"
" --trace-notbelow=<number> only show BBs above <number> [999999999]\n"
" --trace-syscalls=no|yes show all system calls? [no]\n"
" --trace-signals=no|yes show signal handling details? [no]\n"
" --trace-symtab=no|yes show symbol table details? [no]\n"
" --trace-symtab-patt=<patt> limit debuginfo tracing to obj name <patt>\n"
" --trace-cfi=no|yes show call-frame-info details? [no]\n"
" --debug-dump=syms mimic /usr/bin/readelf --syms\n"
" --debug-dump=line mimic /usr/bin/readelf --debug-dump=line\n"
" --debug-dump=frames mimic /usr/bin/readelf --debug-dump=frames\n"
" --trace-redir=no|yes show redirection details? [no]\n"
" --trace-sched=no|yes show thread scheduler details? [no]\n"
" --profile-heap=no|yes profile Valgrind's own space use\n"
" --wait-for-gdb=yes|no pause on startup to wait for gdb attach\n"
" --sym-offsets=yes|no show syms in form 'name+offset' ? [no]\n"
" --command-line-only=no|yes only use command line options [no]\n"
"\n"
" --vex-iropt-verbosity 0 .. 9 [0]\n"
" --vex-iropt-level 0 .. 2 [2]\n"
" --vex-iropt-precise-memory-exns [no]\n"
" --vex-iropt-unroll-thresh 0 .. 400 [120]\n"
" --vex-guest-max-insns 1 .. 100 [50]\n"
" --vex-guest-chase-thresh 0 .. 99 [10]\n"
"\n"
" --trace-flags and --profile-flags values (omit the middle space):\n"
" 1000 0000 show conversion into IR\n"
" 0100 0000 show after initial opt\n"
" 0010 0000 show after instrumentation\n"
" 0001 0000 show after second opt\n"
" 0000 1000 show after tree building\n"
" 0000 0100 show selecting insns\n"
" 0000 0010 show after reg-alloc\n"
" 0000 0001 show final assembly\n"
" (Nb: you need --trace-notbelow with --trace-flags for full details)\n"
"\n"
" debugging options for Valgrind tools that report errors\n"
" --dump-error=<number> show translation for basic block associated\n"
" with <number>'th error context [0=show none]\n"
"\n";
Char* usage3 =
"\n"
" Extra options read from ~/.valgrindrc, $VALGRIND_OPTS, ./.valgrindrc\n"
"\n"
" %s is %s\n"
" Valgrind is Copyright (C) 2000-2009, and GNU GPL'd, by Julian Seward et al.\n"
" LibVEX is Copyright (C) 2004-2009, and GNU GPL'd, by OpenWorks LLP.\n"
"\n"
" Bug reports, feedback, admiration, abuse, etc, to: %s.\n"
"\n";
Char* gdb_path = GDB_PATH;
// Ensure the message goes to stdout
VG_(log_output_sink).fd = 1;
VG_(log_output_sink).is_socket = False;
/* 'usage1' expects one char* argument */
VG_(printf)(usage1, gdb_path);
if (VG_(details).name) {
VG_(printf)(" user options for %s:\n", VG_(details).name);
if (VG_(needs).command_line_options)
VG_TDICT_CALL(tool_print_usage);
else
VG_(printf)(" (none)\n");
}
if (debug_help) {
VG_(printf)("%s", usage2);
if (VG_(details).name) {
VG_(printf)(" debugging options for %s:\n", VG_(details).name);
if (VG_(needs).command_line_options)
VG_TDICT_CALL(tool_print_debug_usage);
else
VG_(printf)(" (none)\n");
}
}
VG_(printf)(usage3, VG_(details).name, VG_(details).copyright_author,
VG_BUGS_TO);
VG_(exit)(0);
}
/* Peer at previously set up VG_(args_for_valgrind) and do some
minimal command line processing that must happen early on:
- show the version string, if requested (-v)
- extract any request for help (--help, -h, --help-debug)
- get the toolname (--tool=)
- set VG_(clo_max_stackframe) (--max-stackframe=)
- set VG_(clo_main_stacksize) (--main-stacksize=)
That's all it does. The main command line processing is done below
by main_process_cmd_line_options. Note that
main_process_cmd_line_options has to handle but ignore the ones we
have handled here.
*/
static void early_process_cmd_line_options ( /*OUT*/Int* need_help,
/*OUT*/HChar** tool )
{
UInt i;
HChar* str;
vg_assert( VG_(args_for_valgrind) );
/* parse the options we have (only the options we care about now) */
for (i = 0; i < VG_(sizeXA)( VG_(args_for_valgrind) ); i++) {
str = * (HChar**) VG_(indexXA)( VG_(args_for_valgrind), i );
vg_assert(str);
// Nb: the version string goes to stdout.
if VG_XACT_CLO(str, "--version", VG_(log_output_sink).fd, 1) {
VG_(log_output_sink).is_socket = False;
VG_(printf)("valgrind-" VERSION "\n");
VG_(exit)(0);
}
else if VG_XACT_CLO(str, "--help", *need_help, 1) {}
else if VG_XACT_CLO(str, "-h", *need_help, 1) {}
else if VG_XACT_CLO(str, "--help-debug", *need_help, 2) {}
// The tool has already been determined, but we need to know the name
// here.
else if VG_STR_CLO(str, "--tool", *tool) {}
// Set up VG_(clo_max_stackframe) and VG_(clo_main_stacksize).
// These are needed by VG_(ii_create_image), which happens
// before main_process_cmd_line_options().
else if VG_INT_CLO(str, "--max-stackframe", VG_(clo_max_stackframe)) {}
else if VG_INT_CLO(str, "--main-stacksize", VG_(clo_main_stacksize)) {}
}
}
/* The main processing for command line options. See comments above
on early_process_cmd_line_options.
Comments on how the logging options are handled:
User can specify:
--log-fd= for a fd to write to (default setting, fd = 2)
--log-file= for a file name to write to
--log-socket= for a socket to write to
As a result of examining these and doing relevant socket/file
opening, a final fd is established. This is stored in
VG_(log_output_sink) in m_libcprint. Also, if --log-file=STR was
specified, then STR, after expansion of %p and %q templates within
it, is stored in VG_(clo_log_fname_expanded), in m_options, just in
case anybody wants to know what it is.
When printing, VG_(log_output_sink) is consulted to find the
fd to send output to.
Exactly analogous actions are undertaken for the XML output
channel, with the one difference that the default fd is -1, meaning
the channel is disabled by default.
*/
static
void main_process_cmd_line_options ( /*OUT*/Bool* logging_to_fd,
/*OUT*/Char** xml_fname_unexpanded,
const HChar* toolname )
{
// VG_(clo_log_fd) is used by all the messaging. It starts as 2 (stderr)
// and we cannot change it until we know what we are changing it to is
// ok. So we have tmp_log_fd to hold the tmp fd prior to that point.
SysRes sres;
Int i, tmp_log_fd, tmp_xml_fd;
Int toolname_len = VG_(strlen)(toolname);
Char* tmp_str; // Used in a couple of places.
enum {
VgLogTo_Fd,
VgLogTo_File,
VgLogTo_Socket
} log_to = VgLogTo_Fd, // Where is logging output to be sent?
xml_to = VgLogTo_Fd; // Where is XML output to be sent?
/* Temporarily holds the string STR specified with
--{log,xml}-{name,socket}=STR. 'fs' stands for
file-or-socket. */
Char* log_fsname_unexpanded = NULL;
Char* xml_fsname_unexpanded = NULL;
/* Log to stderr by default, but usage message goes to stdout. XML
output is initially disabled. */
tmp_log_fd = 2;
tmp_xml_fd = -1;
/* Check for sane path in ./configure --prefix=... */
if (VG_LIBDIR[0] != '/')
VG_(err_config_error)("Please use absolute paths in "
"./configure --prefix=... or --libdir=...");
vg_assert( VG_(args_for_valgrind) );
/* BEGIN command-line processing loop */
for (i = 0; i < VG_(sizeXA)( VG_(args_for_valgrind) ); i++) {
HChar* arg = * (HChar**) VG_(indexXA)( VG_(args_for_valgrind), i );
HChar* colon = arg;
// Look for a colon in the option name.
while (*colon && *colon != ':' && *colon != '=')
colon++;
// Does it have the form "--toolname:foo"? We have to do it at the start
// in case someone has combined a prefix with a core-specific option,
// eg. "--memcheck:verbose".
if (*colon == ':') {
if (VG_STREQN(2, arg, "--") &&
VG_STREQN(toolname_len, arg+2, toolname) &&
VG_STREQN(1, arg+2+toolname_len, ":"))
{
// Prefix matches, convert "--toolname:foo" to "--foo".
// Two things to note:
// - We cannot modify the option in-place. If we did, and then
// a child was spawned with --trace-children=yes, the
// now-non-prefixed option would be passed and could screw up
// the child.
// - We create copies, and never free them. Why? Non-prefixed
// options hang around forever, so tools need not make copies
// of strings within them. We need to have the same behaviour
// for prefixed options. The pointer to the copy will be lost
// once we leave this function (although a tool may keep a
// pointer into it), but the space wasted is insignificant.
// (In bug #142197, the copies were being freed, which caused
// problems for tools that reasonably assumed that arguments
// wouldn't disappear on them.)
if (0)
VG_(printf)("tool-specific arg: %s\n", arg);
arg = VG_(strdup)("main.mpclo.1", arg + toolname_len + 1);
arg[0] = '-';
arg[1] = '-';
} else {
// prefix doesn't match, skip to next arg
continue;
}
}
/* Ignore these options - they've already been handled */
if VG_STREQN( 7, arg, "--tool=") {}
else if VG_STREQN(20, arg, "--command-line-only=") {}
else if VG_STREQ( arg, "--") {}
else if VG_STREQ( arg, "-d") {}
else if VG_STREQN(16, arg, "--max-stackframe") {}
else if VG_STREQN(16, arg, "--main-stacksize") {}
else if VG_STREQN(14, arg, "--profile-heap") {}
// These options are new.
else if (VG_STREQ(arg, "-v") ||
VG_STREQ(arg, "--verbose"))
VG_(clo_verbosity)++;
else if (VG_STREQ(arg, "-q") ||
VG_STREQ(arg, "--quiet"))
VG_(clo_verbosity)--;
else if VG_BOOL_CLO(arg, "--xml", VG_(clo_xml)) {}
else if VG_BOOL_CLO(arg, "--db-attach", VG_(clo_db_attach)) {}
else if VG_BOOL_CLO(arg, "--demangle", VG_(clo_demangle)) {}
else if VG_BOOL_CLO(arg, "--error-limit", VG_(clo_error_limit)) {}
else if VG_INT_CLO (arg, "--error-exitcode", VG_(clo_error_exitcode)) {}
else if VG_BOOL_CLO(arg, "--show-emwarns", VG_(clo_show_emwarns)) {}
else if VG_BOOL_CLO(arg, "--run-libc-freeres", VG_(clo_run_libc_freeres)) {}
else if VG_BOOL_CLO(arg, "--show-below-main", VG_(clo_show_below_main)) {}
else if VG_BOOL_CLO(arg, "--time-stamp", VG_(clo_time_stamp)) {}
else if VG_BOOL_CLO(arg, "--track-fds", VG_(clo_track_fds)) {}
else if VG_BOOL_CLO(arg, "--trace-children", VG_(clo_trace_children)) {}
else if VG_BOOL_CLO(arg, "--child-silent-after-fork",
VG_(clo_child_silent_after_fork)) {}
else if VG_BOOL_CLO(arg, "--trace-sched", VG_(clo_trace_sched)) {}
else if VG_BOOL_CLO(arg, "--trace-signals", VG_(clo_trace_signals)) {}
else if VG_BOOL_CLO(arg, "--trace-symtab", VG_(clo_trace_symtab)) {}
else if VG_STR_CLO (arg, "--trace-symtab-patt", VG_(clo_trace_symtab_patt)) {}
else if VG_BOOL_CLO(arg, "--trace-cfi", VG_(clo_trace_cfi)) {}
else if VG_XACT_CLO(arg, "--debug-dump=syms", VG_(clo_debug_dump_syms),
True) {}
else if VG_XACT_CLO(arg, "--debug-dump=line", VG_(clo_debug_dump_line),
True) {}
else if VG_XACT_CLO(arg, "--debug-dump=frames",
VG_(clo_debug_dump_frames), True) {}
else if VG_BOOL_CLO(arg, "--trace-redir", VG_(clo_trace_redir)) {}
else if VG_BOOL_CLO(arg, "--trace-syscalls", VG_(clo_trace_syscalls)) {}
else if VG_BOOL_CLO(arg, "--wait-for-gdb", VG_(clo_wait_for_gdb)) {}
else if VG_STR_CLO (arg, "--db-command", VG_(clo_db_command)) {}
else if VG_STR_CLO (arg, "--sim-hints", VG_(clo_sim_hints)) {}
else if VG_BOOL_CLO(arg, "--sym-offsets", VG_(clo_sym_offsets)) {}
else if VG_BOOL_CLO(arg, "--read-var-info", VG_(clo_read_var_info)) {}
else if VG_INT_CLO (arg, "--dump-error", VG_(clo_dump_error)) {}
else if VG_INT_CLO (arg, "--input-fd", VG_(clo_input_fd)) {}
else if VG_INT_CLO (arg, "--sanity-level", VG_(clo_sanity_level)) {}
else if VG_BINT_CLO(arg, "--num-callers", VG_(clo_backtrace_size), 1,
VG_DEEPEST_BACKTRACE) {}
else if VG_XACT_CLO(arg, "--smc-check=none", VG_(clo_smc_check),
Vg_SmcNone);
else if VG_XACT_CLO(arg, "--smc-check=stack", VG_(clo_smc_check),
Vg_SmcStack);
else if VG_XACT_CLO(arg, "--smc-check=all", VG_(clo_smc_check),
Vg_SmcAll);
else if VG_STR_CLO (arg, "--kernel-variant", VG_(clo_kernel_variant)) {}
else if VG_BOOL_CLO(arg, "--auto-run-dsymutil",
VG_(clo_auto_run_dsymutil)) {}
else if VG_BINT_CLO(arg, "--vex-iropt-verbosity",
VG_(clo_vex_control).iropt_verbosity, 0, 10) {}
else if VG_BINT_CLO(arg, "--vex-iropt-level",
VG_(clo_vex_control).iropt_level, 0, 2) {}
else if VG_BOOL_CLO(arg, "--vex-iropt-precise-memory-exns",
VG_(clo_vex_control).iropt_precise_memory_exns) {}
else if VG_BINT_CLO(arg, "--vex-iropt-unroll-thresh",
VG_(clo_vex_control).iropt_unroll_thresh, 0, 400) {}
else if VG_BINT_CLO(arg, "--vex-guest-max-insns",
VG_(clo_vex_control).guest_max_insns, 1, 100) {}
else if VG_BINT_CLO(arg, "--vex-guest-chase-thresh",
VG_(clo_vex_control).guest_chase_thresh, 0, 99) {}
else if VG_INT_CLO(arg, "--log-fd", tmp_log_fd) {
log_to = VgLogTo_Fd;
log_fsname_unexpanded = NULL;
}
else if VG_INT_CLO(arg, "--xml-fd", tmp_xml_fd) {
xml_to = VgLogTo_Fd;
xml_fsname_unexpanded = NULL;
}
else if VG_STR_CLO(arg, "--log-file", log_fsname_unexpanded) {
log_to = VgLogTo_File;
}
else if VG_STR_CLO(arg, "--xml-file", xml_fsname_unexpanded) {
xml_to = VgLogTo_File;
}
else if VG_STR_CLO(arg, "--log-socket", log_fsname_unexpanded) {
log_to = VgLogTo_Socket;
}
else if VG_STR_CLO(arg, "--xml-socket", xml_fsname_unexpanded) {
xml_to = VgLogTo_Socket;
}
else if VG_STR_CLO(arg, "--xml-user-comment",
VG_(clo_xml_user_comment)) {}
else if VG_STR_CLO(arg, "--suppressions", tmp_str) {
if (VG_(clo_n_suppressions) >= VG_CLO_MAX_SFILES) {
VG_(message)(Vg_UserMsg, "Too many suppression files specified.\n");
VG_(message)(Vg_UserMsg,
"Increase VG_CLO_MAX_SFILES and recompile.\n");
VG_(err_bad_option)(arg);
}
VG_(clo_suppressions)[VG_(clo_n_suppressions)] = tmp_str;
VG_(clo_n_suppressions)++;
}
/* "stuvwxyz" --> stuvwxyz (binary) */
else if VG_STR_CLO(arg, "--trace-flags", tmp_str) {
Int j;
if (8 != VG_(strlen)(tmp_str)) {
VG_(message)(Vg_UserMsg,
"--trace-flags argument must have 8 digits\n");
VG_(err_bad_option)(arg);
}
for (j = 0; j < 8; j++) {
if ('0' == tmp_str[j]) { /* do nothing */ }
else if ('1' == tmp_str[j]) VG_(clo_trace_flags) |= (1 << (7-j));
else {
VG_(message)(Vg_UserMsg, "--trace-flags argument can only "
"contain 0s and 1s\n");
VG_(err_bad_option)(arg);
}
}
}
/* "stuvwxyz" --> stuvwxyz (binary) */
else if VG_STR_CLO(arg, "--profile-flags", tmp_str) {
Int j;
if (8 != VG_(strlen)(tmp_str)) {
VG_(message)(Vg_UserMsg,
"--profile-flags argument must have 8 digits\n");
VG_(err_bad_option)(arg);
}
for (j = 0; j < 8; j++) {
if ('0' == tmp_str[j]) { /* do nothing */ }
else if ('1' == tmp_str[j]) VG_(clo_profile_flags) |= (1 << (7-j));
else {
VG_(message)(Vg_UserMsg, "--profile-flags argument can only "
"contain 0s and 1s\n");
VG_(err_bad_option)(arg);
}
}
}
else if VG_INT_CLO (arg, "--trace-notbelow", VG_(clo_trace_notbelow)) {}
else if VG_XACT_CLO(arg, "--gen-suppressions=no",
VG_(clo_gen_suppressions), 0) {}
else if VG_XACT_CLO(arg, "--gen-suppressions=yes",
VG_(clo_gen_suppressions), 1) {}
else if VG_XACT_CLO(arg, "--gen-suppressions=all",
VG_(clo_gen_suppressions), 2) {}
else if ( ! VG_(needs).command_line_options
|| ! VG_TDICT_CALL(tool_process_cmd_line_option, arg) ) {
VG_(err_bad_option)(arg);
}
}
/* END command-line processing loop */
/* Make VEX control parameters sane */
if (VG_(clo_vex_control).guest_chase_thresh
>= VG_(clo_vex_control).guest_max_insns)
VG_(clo_vex_control).guest_chase_thresh
= VG_(clo_vex_control).guest_max_insns - 1;
if (VG_(clo_vex_control).guest_chase_thresh < 0)
VG_(clo_vex_control).guest_chase_thresh = 0;
/* Check various option values */
if (VG_(clo_verbosity) < 0)
VG_(clo_verbosity) = 0;
if (VG_(clo_gen_suppressions) > 0 &&
!VG_(needs).core_errors && !VG_(needs).tool_errors) {
VG_(message)(Vg_UserMsg,
"Can't use --gen-suppressions= with this tool,\n");
VG_(message)(Vg_UserMsg,
"as it doesn't generate errors.\n");
VG_(err_bad_option)("--gen-suppressions=");
}
/* If XML output is requested, check that the tool actually
supports it. */
if (VG_(clo_xml) && !VG_(needs).xml_output) {
VG_(clo_xml) = False;
VG_(message)(Vg_UserMsg,
"%s does not support XML output.\n", VG_(details).name);
VG_(err_bad_option)("--xml=yes");
/*NOTREACHED*/
}
vg_assert( VG_(clo_gen_suppressions) >= 0 );
vg_assert( VG_(clo_gen_suppressions) <= 2 );
/* If we've been asked to emit XML, mash around various other
options so as to constrain the output somewhat, and to remove
any need for user input during the run.
*/
if (VG_(clo_xml)) {
/* We can't allow --gen-suppressions=yes, since that requires us
to print the error and then ask the user if she wants a
suppression for it, but in XML mode we won't print it until
we know whether we also need to print a suppression. Hence a
circular dependency. So disallow this.
(--gen-suppressions=all is still OK since we don't need any
user interaction in this case.) */
if (VG_(clo_gen_suppressions) == 1) {
VG_(umsg)(
"When --xml=yes is specified, only --gen-suppressions=no\n"
"or --gen-suppressions=all are allowed, but not "
"--gen-suppressions=yes.\n");
/* FIXME: this is really a misuse of VG_(err_bad_option). */
VG_(err_bad_option)(
"--xml=yes together with --gen-suppressions=yes");
}
/* We can't allow DB attaching (or we maybe could, but results
could be chaotic ..) since it requires user input. Hence
disallow. */
if (VG_(clo_db_attach)) {
VG_(umsg)("--db-attach=yes is not allowed in XML mode,\n"
"as it would require user input.\n");
/* FIXME: this is really a misuse of VG_(err_bad_option). */
VG_(err_bad_option)(
"--xml=yes together with --db-attach=yes");
}
/* Disallow dump_error in XML mode; sounds like a recipe for
chaos. No big deal; dump_error is a flag for debugging V
itself. */
if (VG_(clo_dump_error) > 0) {
/* FIXME: this is really a misuse of VG_(err_bad_option). */
VG_(err_bad_option)(
"--xml=yes together with --dump-error=");
}
/* Disable error limits (this might be a bad idea!) */
VG_(clo_error_limit) = False;
/* Disable emulation warnings */
/* Also, we want to set options for the leak checker, but that
will have to be done in Memcheck's flag-handling code, not
here. */
}
/* All non-logging-related options have been checked. If the logging
option specified is ok, we can switch to it, as we know we won't
have to generate any other command-line-related error messages.
(So far we should be still attached to stderr, so we can show on
the terminal any problems to do with processing command line
opts.)
So set up logging now. After this is done, VG_(log_output_sink)
and (if relevant) VG_(xml_output_sink) should be connected to
whatever sink has been selected, and we indiscriminately chuck
stuff into it without worrying what the nature of it is. Oh the
wonder of Unix streams. */
vg_assert(VG_(log_output_sink).fd == 2 /* stderr */);
vg_assert(VG_(log_output_sink).is_socket == False);
vg_assert(VG_(clo_log_fname_expanded) == NULL);
vg_assert(VG_(xml_output_sink).fd == -1 /* disabled */);
vg_assert(VG_(xml_output_sink).is_socket == False);
vg_assert(VG_(clo_xml_fname_expanded) == NULL);
/* --- set up the normal text output channel --- */
switch (log_to) {
case VgLogTo_Fd:
vg_assert(log_fsname_unexpanded == NULL);
break;
case VgLogTo_File: {
Char* logfilename;
vg_assert(log_fsname_unexpanded != NULL);
vg_assert(VG_(strlen)(log_fsname_unexpanded) <= 900); /* paranoia */
// Nb: we overwrite an existing file of this name without asking
// any questions.
logfilename = VG_(expand_file_name)("--log-file",
log_fsname_unexpanded);
sres = VG_(open)(logfilename,
VKI_O_CREAT|VKI_O_WRONLY|VKI_O_TRUNC,
VKI_S_IRUSR|VKI_S_IWUSR);
if (!sr_isError(sres)) {
tmp_log_fd = sr_Res(sres);
VG_(clo_log_fname_expanded) = logfilename;
} else {
VG_(message)(Vg_UserMsg,
"Can't create log file '%s' (%s); giving up!\n",
logfilename, VG_(strerror)(sr_Err(sres)));
VG_(err_bad_option)(
"--log-file=<file> (didn't work out for some reason.)");
/*NOTREACHED*/
}
break;
}
case VgLogTo_Socket: {
vg_assert(log_fsname_unexpanded != NULL);
vg_assert(VG_(strlen)(log_fsname_unexpanded) <= 900); /* paranoia */
tmp_log_fd = VG_(connect_via_socket)( log_fsname_unexpanded );
if (tmp_log_fd == -1) {
VG_(message)(Vg_UserMsg,
"Invalid --log-socket=ipaddr or "
"--log-socket=ipaddr:port spec\n");
VG_(message)(Vg_UserMsg,
"of '%s'; giving up!\n", log_fsname_unexpanded );
VG_(err_bad_option)(
"--log-socket=");
/*NOTREACHED*/
}
if (tmp_log_fd == -2) {
VG_(message)(Vg_UserMsg,
"valgrind: failed to connect to logging server '%s'.\n",
log_fsname_unexpanded );
VG_(message)(Vg_UserMsg,
"Log messages will sent to stderr instead.\n" );
VG_(message)(Vg_UserMsg,
"\n" );
/* We don't change anything here. */
vg_assert(VG_(log_output_sink).fd == 2);
tmp_log_fd = 2;
} else {
vg_assert(tmp_log_fd > 0);
VG_(log_output_sink).is_socket = True;
}
break;
}
}
/* --- set up the XML output channel --- */
switch (xml_to) {
case VgLogTo_Fd:
vg_assert(xml_fsname_unexpanded == NULL);
break;
case VgLogTo_File: {
Char* xmlfilename;
vg_assert(xml_fsname_unexpanded != NULL);
vg_assert(VG_(strlen)(xml_fsname_unexpanded) <= 900); /* paranoia */
// Nb: we overwrite an existing file of this name without asking
// any questions.
xmlfilename = VG_(expand_file_name)("--xml-file",
xml_fsname_unexpanded);
sres = VG_(open)(xmlfilename,
VKI_O_CREAT|VKI_O_WRONLY|VKI_O_TRUNC,
VKI_S_IRUSR|VKI_S_IWUSR);
if (!sr_isError(sres)) {
tmp_xml_fd = sr_Res(sres);
VG_(clo_xml_fname_expanded) = xmlfilename;
/* strdup here is probably paranoid overkill, but ... */
*xml_fname_unexpanded = VG_(strdup)( "main.mpclo.2",
xml_fsname_unexpanded );
} else {
VG_(message)(Vg_UserMsg,
"Can't create XML file '%s' (%s); giving up!\n",
xmlfilename, VG_(strerror)(sr_Err(sres)));
VG_(err_bad_option)(
"--xml-file=<file> (didn't work out for some reason.)");
/*NOTREACHED*/
}
break;
}
case VgLogTo_Socket: {
vg_assert(xml_fsname_unexpanded != NULL);
vg_assert(VG_(strlen)(xml_fsname_unexpanded) <= 900); /* paranoia */
tmp_xml_fd = VG_(connect_via_socket)( xml_fsname_unexpanded );
if (tmp_xml_fd == -1) {
VG_(message)(Vg_UserMsg,
"Invalid --xml-socket=ipaddr or "
"--xml-socket=ipaddr:port spec\n");
VG_(message)(Vg_UserMsg,
"of '%s'; giving up!\n", xml_fsname_unexpanded );
VG_(err_bad_option)(
"--xml-socket=");
/*NOTREACHED*/
}
if (tmp_xml_fd == -2) {
VG_(message)(Vg_UserMsg,
"valgrind: failed to connect to XML logging server '%s'.\n",
xml_fsname_unexpanded );
VG_(message)(Vg_UserMsg,
"XML output will sent to stderr instead.\n" );
VG_(message)(Vg_UserMsg,
"\n" );
/* We don't change anything here. */
vg_assert(VG_(xml_output_sink).fd == 2);
tmp_xml_fd = 2;
} else {
vg_assert(tmp_xml_fd > 0);
VG_(xml_output_sink).is_socket = True;
}
break;
}
}
/* If we've got this far, and XML mode was requested, but no XML
output channel appears to have been specified, just stop. We
could continue, and XML output will simply vanish into nowhere,
but that is likely to confuse the hell out of users, which is
distinctly Ungood. */
if (VG_(clo_xml) && tmp_xml_fd == -1) {
VG_(umsg)(
"--xml=yes has been specified, but there is no XML output\n"
"destination. You must specify an XML output destination\n"
"using --xml-fd=, --xml-file= or --xml=socket=.\n" );
/* FIXME: this is really a misuse of VG_(err_bad_option). */
VG_(err_bad_option)(
"--xml=yes, but no XML destination specified");
}
// Finalise the output fds: the log fd ..
if (tmp_log_fd >= 0) {
// Move log_fd into the safe range, so it doesn't conflict with
// any app fds.
tmp_log_fd = VG_(fcntl)(tmp_log_fd, VKI_F_DUPFD, VG_(fd_hard_limit));
if (tmp_log_fd < 0) {
VG_(message)(Vg_UserMsg, "valgrind: failed to move logfile fd "
"into safe range, using stderr\n");
VG_(log_output_sink).fd = 2; // stderr
VG_(log_output_sink).is_socket = False;
} else {
VG_(log_output_sink).fd = tmp_log_fd;
VG_(fcntl)(VG_(log_output_sink).fd, VKI_F_SETFD, VKI_FD_CLOEXEC);
}
} else {
// If they said --log-fd=-1, don't print anything. Plausible for use in
// regression testing suites that use client requests to count errors.
VG_(log_output_sink).fd = -1;
VG_(log_output_sink).is_socket = False;
}
// Finalise the output fds: and the XML fd ..
if (tmp_xml_fd >= 0) {
// Move xml_fd into the safe range, so it doesn't conflict with
// any app fds.
tmp_xml_fd = VG_(fcntl)(tmp_xml_fd, VKI_F_DUPFD, VG_(fd_hard_limit));
if (tmp_xml_fd < 0) {
VG_(message)(Vg_UserMsg, "valgrind: failed to move XML file fd "
"into safe range, using stderr\n");
VG_(xml_output_sink).fd = 2; // stderr
VG_(xml_output_sink).is_socket = False;
} else {
VG_(xml_output_sink).fd = tmp_xml_fd;
VG_(fcntl)(VG_(xml_output_sink).fd, VKI_F_SETFD, VKI_FD_CLOEXEC);
}
} else {
// If they said --xml-fd=-1, don't print anything. Plausible for use in
// regression testing suites that use client requests to count errors.
VG_(xml_output_sink).fd = -1;
VG_(xml_output_sink).is_socket = False;
}
// Suppressions related stuff
if (VG_(clo_n_suppressions) < VG_CLO_MAX_SFILES-1 &&
(VG_(needs).core_errors || VG_(needs).tool_errors)) {
/* If we haven't reached the max number of suppressions, load
the default one. */
static const Char default_supp[] = "default.supp";
Int len = VG_(strlen)(VG_(libdir)) + 1 + sizeof(default_supp);
Char *buf = VG_(arena_malloc)(VG_AR_CORE, "main.mpclo.3", len);
VG_(sprintf)(buf, "%s/%s", VG_(libdir), default_supp);
VG_(clo_suppressions)[VG_(clo_n_suppressions)] = buf;
VG_(clo_n_suppressions)++;
}
*logging_to_fd = log_to == VgLogTo_Fd || log_to == VgLogTo_Socket;
}
// Write the name and value of log file qualifiers to the xml file.
static void print_file_vars(Char* format)
{
Int i = 0;
while (format[i]) {
if (format[i] == '%') {
// We saw a '%'. What's next...
i++;
if ('q' == format[i]) {
i++;
if ('{' == format[i]) {
// Get the env var name, print its contents.
Char* qualname;
Char* qual;
i++;
qualname = &format[i];
while (True) {
if ('}' == format[i]) {
// Temporarily replace the '}' with NUL to extract var
// name.
format[i] = 0;
qual = VG_(getenv)(qualname);
break;
}
i++;
}
VG_(message_no_f_c)(Vg_UserMsg,
"<logfilequalifier> <var>%t</var> "
"<value>%t</value> </logfilequalifier>\n",
qualname,qual);
format[i] = '}';
i++;
}
}
} else {
i++;
}
}
}
/*====================================================================*/
/*=== Printing the preamble ===*/
/*====================================================================*/
/* Ok, the logging sink is running now. Print a suitable preamble.
If logging to file or a socket, write details of parent PID and
command line args, to help people trying to interpret the
results of a run which encompasses multiple processes. */
static void print_preamble ( Bool logging_to_fd,
Char* xml_fname_unexpanded,
const HChar* toolname )
{
Int i;
HChar* xpre = VG_(clo_xml) ? " <line>" : "";
HChar* xpost = VG_(clo_xml) ? "</line>" : "";
UInt (*umsg_or_xml)( const HChar*, ... )
= VG_(clo_xml) ? VG_(printf_xml) : VG_(umsg);
vg_assert( VG_(args_for_client) );
vg_assert( VG_(args_for_valgrind) );
vg_assert( toolname );
if (VG_(clo_xml)) {
VG_(printf_xml)("<?xml version=\"1.0\"?>\n");
VG_(printf_xml)("\n");
VG_(printf_xml)("<valgrindoutput>\n");
VG_(printf_xml)("\n");
VG_(printf_xml)("<protocolversion>4</protocolversion>\n");
VG_(printf_xml)("<protocoltool>%s</protocoltool>\n", toolname);
VG_(printf_xml)("\n");
}
if (VG_(clo_xml) || VG_(clo_verbosity > 0)) {
if (VG_(clo_xml))
VG_(printf_xml)("<preamble>\n");
/* Tool details */
umsg_or_xml( "%s%s%s%s, %s.%s\n",
xpre,
VG_(details).name,
NULL == VG_(details).version ? "" : "-",
NULL == VG_(details).version
? (Char*)"" : VG_(details).version,
VG_(details).description,
xpost );
if (VG_(strlen)(toolname) >= 4 && VG_STREQN(4, toolname, "exp-")) {
umsg_or_xml(
"%sNOTE: This is an Experimental-Class Valgrind Tool.%s\n",
xpre, xpost
);
}
umsg_or_xml("%s%s%s\n",
xpre, VG_(details).copyright_author, xpost);
/* Core details */
umsg_or_xml(
"%sUsing Valgrind-%s and LibVEX; rerun with -h for copyright info%s\n",
xpre, VERSION, xpost
);
if (VG_(clo_xml))
VG_(printf_xml)("</preamble>\n");
}
if (!VG_(clo_xml) && VG_(clo_verbosity) > 0 && !logging_to_fd) {
VG_(umsg)("\n");
VG_(umsg)("My PID = %d, parent PID = %d. Prog and args are:\n",
VG_(getpid)(), VG_(getppid)() );
if (VG_(args_the_exename))
VG_(umsg)(" %s\n", VG_(args_the_exename));
for (i = 0; i < VG_(sizeXA)( VG_(args_for_client) ); i++)
VG_(umsg)(" %s\n",
* (HChar**) VG_(indexXA)( VG_(args_for_client), i ));
}
else
if (VG_(clo_xml)) {
VG_(printf_xml)("\n");
VG_(printf_xml)("<pid>%d</pid>\n", VG_(getpid)());
VG_(printf_xml)("<ppid>%d</ppid>\n", VG_(getppid)());
VG_(printf_xml_no_f_c)("<tool>%t</tool>\n", toolname);
if (xml_fname_unexpanded)
print_file_vars(xml_fname_unexpanded);
if (VG_(clo_xml_user_comment)) {
/* Note: the user comment itself is XML and is therefore to
be passed through verbatim (%s) rather than escaped
(%t). */
VG_(printf_xml)("<usercomment>%s</usercomment>\n",
VG_(clo_xml_user_comment));
}
VG_(printf_xml)("\n");
VG_(printf_xml)("<args>\n");
VG_(printf_xml)(" <vargv>\n");
if (VG_(name_of_launcher))
VG_(printf_xml_no_f_c)(" <exe>%t</exe>\n",
VG_(name_of_launcher));
else
VG_(printf_xml_no_f_c)(Vg_UserMsg, " <exe>%t</exe>\n",
"(launcher name unknown)");
for (i = 0; i < VG_(sizeXA)( VG_(args_for_valgrind) ); i++) {
VG_(printf_xml_no_f_c)(
" <arg>%t</arg>\n",
* (HChar**) VG_(indexXA)( VG_(args_for_valgrind), i )
);
}
VG_(printf_xml)(" </vargv>\n");
VG_(printf_xml)(" <argv>\n");
if (VG_(args_the_exename))
VG_(printf_xml_no_f_c)(" <exe>%t</exe>\n",
VG_(args_the_exename));
for (i = 0; i < VG_(sizeXA)( VG_(args_for_client) ); i++) {
VG_(printf_xml_no_f_c)(
" <arg>%t</arg>\n",
* (HChar**) VG_(indexXA)( VG_(args_for_client), i )
);
}
VG_(printf_xml)(" </argv>\n");
VG_(printf_xml)("</args>\n");
}
// Empty line after the preamble
if (VG_(clo_verbosity) > 0)
VG_(message)(Vg_UserMsg, "\n");
if (VG_(clo_xml))
VG_(printf_xml)("\n");
if (VG_(clo_verbosity) > 1) {
SysRes fd;
VexArch vex_arch;
VexArchInfo vex_archinfo;
if (!logging_to_fd)
VG_(message)(Vg_DebugMsg, "\n");
VG_(message)(Vg_DebugMsg, "Command line\n");
if (VG_(args_the_exename))
VG_(message)(Vg_DebugMsg, " %s\n", VG_(args_the_exename));
for (i = 0; i < VG_(sizeXA)( VG_(args_for_client) ); i++)
VG_(message)(Vg_DebugMsg,
" %s\n",
* (HChar**) VG_(indexXA)( VG_(args_for_client), i ));
VG_(message)(Vg_DebugMsg, "Startup, with flags:\n");
for (i = 0; i < VG_(sizeXA)( VG_(args_for_valgrind) ); i++) {
VG_(message)(Vg_DebugMsg,
" %s\n",
* (HChar**) VG_(indexXA)( VG_(args_for_valgrind), i ));
}
VG_(message)(Vg_DebugMsg, "Contents of /proc/version:\n");
fd = VG_(open) ( "/proc/version", VKI_O_RDONLY, 0 );
if (sr_isError(fd)) {
VG_(message)(Vg_DebugMsg, " can't open /proc/version\n");
} else {
# define BUF_LEN 256
Char version_buf[BUF_LEN];
Int n = VG_(read) ( sr_Res(fd), version_buf, BUF_LEN );
vg_assert(n <= BUF_LEN);
if (n > 0) {
version_buf[n-1] = '\0';
VG_(message)(Vg_DebugMsg, " %s\n", version_buf);
} else {
VG_(message)(Vg_DebugMsg, " (empty?)\n");
}
VG_(close)(sr_Res(fd));
# undef BUF_LEN
}
VG_(machine_get_VexArchInfo)( &vex_arch, &vex_archinfo );
VG_(message)(
Vg_DebugMsg,
"Arch and hwcaps: %s, %s\n",
LibVEX_ppVexArch ( vex_arch ),
LibVEX_ppVexHwCaps ( vex_arch, vex_archinfo.hwcaps )
);
VG_(message)(
Vg_DebugMsg,
"Page sizes: currently %d, max supported %d\n",
(Int)VKI_PAGE_SIZE, (Int)VKI_MAX_PAGE_SIZE
);
VG_(message)(Vg_DebugMsg,
"Valgrind library directory: %s\n", VG_(libdir));
}
}
/*====================================================================*/
/*=== File descriptor setup ===*/
/*====================================================================*/
/* Number of file descriptors that Valgrind tries to reserve for
it's own use - just a small constant. */
#define N_RESERVED_FDS (10)
static void setup_file_descriptors(void)
{
struct vki_rlimit rl;
Bool show = False;
/* Get the current file descriptor limits. */
if (VG_(getrlimit)(VKI_RLIMIT_NOFILE, &rl) < 0) {
rl.rlim_cur = 1024;
rl.rlim_max = 1024;
}
# if defined(VGO_darwin)
/* Darwin lies. It reports file max as RLIM_INFINITY but
silently disallows anything bigger than 10240. */
if (rl.rlim_cur >= 10240 && rl.rlim_max == 0x7fffffffffffffffULL) {
rl.rlim_max = 10240;
}
# endif
if (show)
VG_(printf)("fd limits: host, before: cur %lu max %lu\n",
(UWord)rl.rlim_cur, (UWord)rl.rlim_max);
# if defined(VGP_ppc32_aix5) || defined(VGP_ppc64_aix5)
/* I don't know why this kludge is needed; however if rl.rlim_cur
is RLIM_INFINITY, then VG_(safe_fd)'s attempts using VG_(fcntl)
to lift V's file descriptors above the threshold RLIM_INFINITY -
N_RESERVED_FDS fail. So just use a relatively conservative
value in this case. */
if (rl.rlim_cur > 1024)
rl.rlim_cur = 1024;
# endif
/* Work out where to move the soft limit to. */
if (rl.rlim_cur + N_RESERVED_FDS <= rl.rlim_max) {
rl.rlim_cur = rl.rlim_cur + N_RESERVED_FDS;
} else {
rl.rlim_cur = rl.rlim_max;
}
/* Reserve some file descriptors for our use. */
VG_(fd_soft_limit) = rl.rlim_cur - N_RESERVED_FDS;
VG_(fd_hard_limit) = rl.rlim_cur - N_RESERVED_FDS;
/* Update the soft limit. */
VG_(setrlimit)(VKI_RLIMIT_NOFILE, &rl);
if (show) {
VG_(printf)("fd limits: host, after: cur %lu max %lu\n",
(UWord)rl.rlim_cur, (UWord)rl.rlim_max);
VG_(printf)("fd limits: guest : cur %u max %u\n",
VG_(fd_soft_limit), VG_(fd_hard_limit));
}
if (VG_(cl_exec_fd) != -1)
VG_(cl_exec_fd) = VG_(safe_fd)( VG_(cl_exec_fd) );
}
/*====================================================================*/
/*=== BB profiling ===*/
/*====================================================================*/
static
void show_BB_profile ( BBProfEntry tops[], UInt n_tops, ULong score_total )
{
ULong score_cumul, score_here;
Char buf_cumul[10], buf_here[10];
Char name[64];
Int r;
VG_(printf)("\n");
VG_(printf)("-----------------------------------------------------------\n");
VG_(printf)("--- BEGIN BB Profile (summary of scores) ---\n");
VG_(printf)("-----------------------------------------------------------\n");
VG_(printf)("\n");
VG_(printf)("Total score = %lld\n\n", score_total);
score_cumul = 0;
for (r = 0; r < n_tops; r++) {
if (tops[r].addr == 0)
continue;
name[0] = 0;
VG_(get_fnname_w_offset)(tops[r].addr, name, 64);
name[63] = 0;
score_here = tops[r].score;
score_cumul += score_here;
VG_(percentify)(score_cumul, score_total, 2, 6, buf_cumul);
VG_(percentify)(score_here, score_total, 2, 6, buf_here);
VG_(printf)("%3d: (%9lld %s) %9lld %s 0x%llx %s\n",
r,
score_cumul, buf_cumul,
score_here, buf_here, tops[r].addr, name );
}
VG_(printf)("\n");
VG_(printf)("-----------------------------------------------------------\n");
VG_(printf)("--- BB Profile (BB details) ---\n");
VG_(printf)("-----------------------------------------------------------\n");
VG_(printf)("\n");
score_cumul = 0;
for (r = 0; r < n_tops; r++) {
if (tops[r].addr == 0)
continue;
name[0] = 0;
VG_(get_fnname_w_offset)(tops[r].addr, name, 64);
name[63] = 0;
score_here = tops[r].score;
score_cumul += score_here;
VG_(percentify)(score_cumul, score_total, 2, 6, buf_cumul);
VG_(percentify)(score_here, score_total, 2, 6, buf_here);
VG_(printf)("\n");
VG_(printf)("=-=-=-=-=-=-=-=-=-=-=-=-=-= begin BB rank %d "
"=-=-=-=-=-=-=-=-=-=-=-=-=-=\n\n", r);
VG_(printf)("%3d: (%9lld %s) %9lld %s 0x%llx %s\n",
r,
score_cumul, buf_cumul,
score_here, buf_here, tops[r].addr, name );
VG_(printf)("\n");
VG_(discard_translations)(tops[r].addr, 1, "bb profile");
VG_(translate)(0, tops[r].addr, True, VG_(clo_profile_flags), 0, True);
VG_(printf)("=-=-=-=-=-=-=-=-=-=-=-=-=-= end BB rank %d "
"=-=-=-=-=-=-=-=-=-=-=-=-=-=\n\n", r);
}
VG_(printf)("\n");
VG_(printf)("-----------------------------------------------------------\n");
VG_(printf)("--- END BB Profile ---\n");
VG_(printf)("-----------------------------------------------------------\n");
VG_(printf)("\n");
}
/*====================================================================*/
/*=== main() ===*/
/*====================================================================*/
/* When main() is entered, we should be on the following stack, not
the one the kernel gave us. We will run on this stack until
simulation of the root thread is started, at which point a transfer
is made to a dynamically allocated stack. This is for the sake of
uniform overflow detection for all Valgrind threads. This is
marked global even though it isn't, because assembly code below
needs to reference the name. */
/*static*/ VgStack VG_(interim_stack);
/* These are the structures used to hold info for creating the initial
client image.
'iicii' mostly holds important register state present at system
startup (_start_valgrind). valgrind_main() then fills in the rest
of it and passes it to VG_(ii_create_image)(). That produces
'iifii', which is later handed to VG_(ii_finalise_image). */
/* In all OS-instantiations, the_iicii has a field .sp_at_startup.
This should get some address inside the stack on which we gained
control (eg, it could be the SP at startup). It doesn't matter
exactly where in the stack it is. This value is passed to the
address space manager at startup. On Linux, aspacem then uses it
to identify the initial stack segment and hence the upper end of
the usable address space. */
static IICreateImageInfo the_iicii;
static IIFinaliseImageInfo the_iifii;
/* A simple pair structure, used for conveying debuginfo handles to
calls to VG_TRACK(new_mem_startup, ...). */
typedef struct { Addr a; ULong ull; } Addr_n_ULong;
/* --- Forwards decls to do with shutdown --- */
static void final_tidyup(ThreadId tid);
/* Do everything which needs doing when the last thread exits */
static
void shutdown_actions_NORETURN( ThreadId tid,
VgSchedReturnCode tids_schedretcode );
/* --- end of Forwards decls to do with shutdown --- */
/* By the time we get to valgrind_main, the_iicii should already have
been filled in with any important details as required by whatever
OS we have been built for.
*/
static
Int valgrind_main ( Int argc, HChar **argv, HChar **envp )
{
HChar* toolname = "memcheck"; // default to Memcheck
Int need_help = 0; // 0 = no, 1 = --help, 2 = --help-debug
ThreadId tid_main = VG_INVALID_THREADID;
Bool logging_to_fd = False;
Char* xml_fname_unexpanded = NULL;
Int loglevel, i;
struct vki_rlimit zero = { 0, 0 };
XArray* addr2dihandle = NULL;
//============================================================
//
// Nb: startup is complex. Prerequisites are shown at every step.
// *** Be very careful when messing with the order ***
//
// The first order of business is to get debug logging, the address
// space manager and the dynamic memory manager up and running.
// Once that's done, we can relax a bit.
//
//============================================================
/* This is needed to make VG_(getenv) usable early. */
VG_(client_envp) = (Char**)envp;
//--------------------------------------------------------------
// Start up Mach kernel interface, if any
// p: none
//--------------------------------------------------------------
# if defined(VGO_darwin)
VG_(mach_init)();
# endif
//--------------------------------------------------------------
// Start up the logging mechanism
// p: none
//--------------------------------------------------------------
/* Start the debugging-log system ASAP. First find out how many
"-d"s were specified. This is a pre-scan of the command line. Also
get --profile-heap=yes which is needed by the time we start up dynamic
memory management. */
loglevel = 0;
for (i = 1; i < argc; i++) {
if (argv[i][0] != '-') break;
if VG_STREQ(argv[i], "--") break;
if VG_STREQ(argv[i], "-d") loglevel++;
if VG_BOOL_CLO(argv[i], "--profile-heap", VG_(clo_profile_heap)) {}
}
/* ... and start the debug logger. Now we can safely emit logging
messages all through startup. */
VG_(debugLog_startup)(loglevel, "Stage 2 (main)");
VG_(debugLog)(1, "main", "Welcome to Valgrind version "
VERSION " debug logging\n");
//--------------------------------------------------------------
// AIX5 only: register the system call numbers
// p: logging
// p: that the initial few syscall numbers stated in the
// bootblock have been installed (else we can't
// open/read/close).
//--------------------------------------------------------------
# if defined(VGO_aix5)
VG_(debugLog)(1, "main", "aix5: registering syscalls ..\n");
{ UChar sysent_name[50];
SysRes fd;
Bool ok;
Int n_unregd, sysent_used = 0;
prsysent_t* sysent_hdr;
VG_(sprintf)(sysent_name, "/proc/%d/sysent", VG_(getpid)());
fd = VG_(open)(sysent_name, VKI_O_RDONLY, 0);
if (fd.isError)
VG_(err_config_error)("aix5: can't open /proc/<pid>/sysent");
sysent_used = VG_(read)(fd.res, aix5_sysent_buf, VG_AIX5_SYSENT_SIZE);
if (sysent_used < 0)
VG_(err_config_error)("aix5: error reading /proc/<pid>/sysent");
if (sysent_used >= VG_AIX5_SYSENT_SIZE)
VG_(err_config_error)("aix5: VG_AIX5_SYSENT_SIZE is too low; "
"increase and recompile");
VG_(close)(fd.res);
vg_assert(sysent_used > 0 && sysent_used < VG_AIX5_SYSENT_SIZE);
sysent_hdr = (prsysent_t*)&aix5_sysent_buf[0];
n_unregd = 0;
for (i = 0; i < sysent_hdr->pr_nsyscalls; i++) {
UChar* name = &aix5_sysent_buf[ sysent_hdr
->pr_syscall[i].pr_nameoff ];
UInt nmbr = sysent_hdr->pr_syscall[i].pr_number;
VG_(debugLog)(3, "main", "aix5: bind syscall %d to \"%s\"\n",
nmbr, name);
ok = VG_(aix5_register_syscall)(nmbr, name);
if (!ok)
n_unregd++;
if (!ok)
VG_(debugLog)(3, "main",
"aix5: bind FAILED: %d to \"%s\"\n",
nmbr, name);
}
VG_(debugLog)(1, "main", "aix5: .. %d syscalls known, %d unknown\n",
sysent_hdr->pr_nsyscalls - n_unregd, n_unregd );
VG_(debugLog)(1, "main", "aix5: __NR_AIX5_FAKE_SIGRETURN = %d\n",
__NR_AIX5_FAKE_SIGRETURN );
}
# endif
//--------------------------------------------------------------
// Darwin only: munmap address-space-filling segments
// (oversized pagezero or stack)
// p: none
//--------------------------------------------------------------
// DDD: comments from Greg Parker why these address-space-filling segments
// are necessary:
//
// The memory maps are there to make sure that Valgrind's copies of libc
// and dyld load in a non-default location, so that the inferior's own
// libc and dyld do load in the default locations. (The kernel performs
// the work of loading several things as described by the executable's
// load commands, including the executable itself, dyld, the main
// thread's stack, and the page-zero segment.) There might be a way to
// fine-tune it so the maps are smaller but still do the job.
//
// The post-launch mmap behavior can be cleaned up - looks like we don't
// unmap as much as we should - which would improve post-launch
// performance.
//
// Hmm, there might be an extra-clever way to give Valgrind a custom
// MH_DYLINKER that performs the "bootloader" work of loading dyld in an
// acceptable place and then unloading itself. Then no mmaps would be
// needed. I'll have to think about that one.
//
// [I can't work out where the address-space-filling segments are
// created in the first place. --njn]
//
#if defined(VGO_darwin)
# if VG_WORDSIZE == 4
VG_(do_syscall2)(__NR_munmap, 0x00000000, 0xf0000000);
# else
// open up client space
VG_(do_syscall2)(__NR_munmap, 0x100000000, 0x700000000000-0x100000000);
// open up client stack and dyld
VG_(do_syscall2)(__NR_munmap, 0x7fff5c000000, 0x4000000);
# endif
#endif
//--------------------------------------------------------------
// Ensure we're on a plausible stack.
// p: logging
//--------------------------------------------------------------
#if defined(VGO_darwin)
// Darwin doesn't use the interim stack.
#else
VG_(debugLog)(1, "main", "Checking current stack is plausible\n");
{ HChar* limLo = (HChar*)(&VG_(interim_stack).bytes[0]);
HChar* limHi = limLo + sizeof(VG_(interim_stack));
HChar* aLocal = (HChar*)&zero; /* any auto local will do */
if (aLocal < limLo || aLocal >= limHi) {
/* something's wrong. Stop. */
VG_(debugLog)(0, "main", "Root stack %p to %p, a local %p\n",
limLo, limHi, aLocal );
VG_(debugLog)(0, "main", "Valgrind: FATAL: "
"Initial stack switched failed.\n");
VG_(debugLog)(0, "main", " Cannot continue. Sorry.\n");
VG_(exit)(1);
}
}
//--------------------------------------------------------------
// Ensure we have a plausible pointer to the stack on which
// we gained control (not the current stack!)
// p: logging
//--------------------------------------------------------------
VG_(debugLog)(1, "main", "Checking initial stack was noted\n");
if (the_iicii.sp_at_startup == 0) {
VG_(debugLog)(0, "main", "Valgrind: FATAL: "
"Initial stack was not noted.\n");
VG_(debugLog)(0, "main", " Cannot continue. Sorry.\n");
VG_(exit)(1);
}
#endif
//--------------------------------------------------------------
// Start up the address space manager, and determine the
// approximate location of the client's stack
// p: logging, plausible-stack, darwin-munmap
//--------------------------------------------------------------
VG_(debugLog)(1, "main", "Starting the address space manager\n");
vg_assert(VKI_PAGE_SIZE == 4096 || VKI_PAGE_SIZE == 65536);
vg_assert(VKI_MAX_PAGE_SIZE == 4096 || VKI_MAX_PAGE_SIZE == 65536);
vg_assert(VKI_PAGE_SIZE <= VKI_MAX_PAGE_SIZE);
vg_assert(VKI_PAGE_SIZE == (1 << VKI_PAGE_SHIFT));
vg_assert(VKI_MAX_PAGE_SIZE == (1 << VKI_MAX_PAGE_SHIFT));
the_iicii.clstack_top = VG_(am_startup)( the_iicii.sp_at_startup );
VG_(debugLog)(1, "main", "Address space manager is running\n");
//--------------------------------------------------------------
// Start up the dynamic memory manager
// p: address space management
// p: getting --profile-heap
// In fact m_mallocfree is self-initialising, so there's no
// initialisation call to do. Instead, try a simple malloc/
// free pair right now to check that nothing is broken.
//--------------------------------------------------------------
VG_(debugLog)(1, "main", "Starting the dynamic memory manager\n");
{ void* p = VG_(malloc)( "main.vm.1", 12345 );
if (p) VG_(free)( p );
}
VG_(debugLog)(1, "main", "Dynamic memory manager is running\n");
//============================================================
//
// Dynamic memory management is now available.
//
//============================================================
//--------------------------------------------------------------
// Initialise m_debuginfo
// p: dynamic memory allocation
VG_(debugLog)(1, "main", "Initialise m_debuginfo\n");
VG_(di_initialise)();
//--------------------------------------------------------------
// Look for alternative libdir
{ HChar *cp = VG_(getenv)(VALGRIND_LIB);
if (cp != NULL)
VG_(libdir) = cp;
VG_(debugLog)(1, "main", "VG_(libdir) = %s\n", VG_(libdir));
}
//--------------------------------------------------------------
// Extract the launcher name from the environment.
VG_(debugLog)(1, "main", "Getting launcher's name ...\n");
VG_(name_of_launcher) = VG_(getenv)(VALGRIND_LAUNCHER);
if (VG_(name_of_launcher) == NULL) {
VG_(printf)("valgrind: You cannot run '%s' directly.\n", argv[0]);
VG_(printf)("valgrind: You should use $prefix/bin/valgrind.\n");
VG_(exit)(1);
}
VG_(debugLog)(1, "main", "... %s\n", VG_(name_of_launcher));
//--------------------------------------------------------------
// Get the current process datasize rlimit, and set it to zero.
// This prevents any internal uses of brk() from having any effect.
// We remember the old value so we can restore it on exec, so that
// child processes will have a reasonable brk value.
VG_(getrlimit)(VKI_RLIMIT_DATA, &VG_(client_rlimit_data));
zero.rlim_max = VG_(client_rlimit_data).rlim_max;
VG_(setrlimit)(VKI_RLIMIT_DATA, &zero);
// Get the current process stack rlimit.
VG_(getrlimit)(VKI_RLIMIT_STACK, &VG_(client_rlimit_stack));
//--------------------------------------------------------------
// Figure out what sort of CPU we're on, and whether it is
// able to run V.
VG_(debugLog)(1, "main", "Get hardware capabilities ...\n");
{ VexArch vex_arch;
VexArchInfo vex_archinfo;
Bool ok = VG_(machine_get_hwcaps)();
if (!ok) {
VG_(printf)("\n");
VG_(printf)("valgrind: fatal error: unsupported CPU.\n");
VG_(printf)(" Supported CPUs are:\n");
VG_(printf)(" * x86 (practically any; Pentium-I or above), "
"AMD Athlon or above)\n");
VG_(printf)(" * AMD Athlon64/Opteron\n");
VG_(printf)(" * PowerPC (most; ppc405 and above)\n");
VG_(printf)("\n");
VG_(exit)(1);
}
VG_(machine_get_VexArchInfo)( &vex_arch, &vex_archinfo );
VG_(debugLog)(
1, "main", "... arch = %s, hwcaps = %s\n",
LibVEX_ppVexArch ( vex_arch ),
LibVEX_ppVexHwCaps ( vex_arch, vex_archinfo.hwcaps )
);
}
//--------------------------------------------------------------
// Record the working directory at startup
// p: none (Linux), getenv and sys_getpid work (AIX)
VG_(debugLog)(1, "main", "Getting the working directory at startup\n");
{ Bool ok = VG_(record_startup_wd)();
if (!ok)
VG_(err_config_error)( "Can't establish current working "
"directory at startup");
}
{ Char buf[VKI_PATH_MAX+1];
Bool ok = VG_(get_startup_wd)( buf, sizeof(buf) );
vg_assert(ok);
buf[VKI_PATH_MAX] = 0;
VG_(debugLog)(1, "main", "... %s\n", buf );
}
//============================================================
// Command line argument handling order:
// * If --help/--help-debug are present, show usage message
// (including the tool-specific usage)
// * (If no --tool option given, default to Memcheck)
// * Then, if client is missing, abort with error msg
// * Then, if any cmdline args are bad, abort with error msg
//============================================================
//--------------------------------------------------------------
// Split up argv into: C args, V args, V extra args, and exename.
// p: dynamic memory allocation
//--------------------------------------------------------------
VG_(debugLog)(1, "main", "Split up command line\n");
VG_(split_up_argv)( argc, argv );
vg_assert( VG_(args_for_valgrind) );
vg_assert( VG_(args_for_client) );
if (0) {
for (i = 0; i < VG_(sizeXA)( VG_(args_for_valgrind) ); i++)
VG_(printf)(
"varg %s\n",
* (HChar**) VG_(indexXA)( VG_(args_for_valgrind), i )
);
VG_(printf)(" exe %s\n", VG_(args_the_exename));
for (i = 0; i < VG_(sizeXA)( VG_(args_for_client) ); i++)
VG_(printf)(
"carg %s\n",
* (HChar**) VG_(indexXA)( VG_(args_for_client), i )
);
}
# if defined(VGO_aix5)
/* Tolerate ptraced-based launchers. They can't run 'no program'
if the user types "valgrind --help", so they run a do-nothing
program $prefix/bin/no_op_client_for_valgrind, and we catch that
here and turn it the exe name back into NULL. Then --help,
--version etc work as they should. */
if (VG_(args_the_exename)
&& VG_(strstr)( VG_(args_the_exename), "/no_op_client_for_valgrind" )) {
VG_(args_the_exename) = NULL;
}
# endif
//--------------------------------------------------------------
// Extract tool name and whether help has been requested.
// Note we can't print the help message yet, even if requested,
// because the tool has not been initialised.
// p: split_up_argv [for VG_(args_for_valgrind)]
//--------------------------------------------------------------
VG_(debugLog)(1, "main",
"(early_) Process Valgrind's command line options\n");
early_process_cmd_line_options(&need_help, &toolname);
// Set default vex control params
LibVEX_default_VexControl(& VG_(clo_vex_control));
//--------------------------------------------------------------
// Load client executable, finding in $PATH if necessary
// p: early_process_cmd_line_options() [for 'exec', 'need_help',
// clo_max_stackframe,
// clo_main_stacksize]
// p: layout_remaining_space [so there's space]
//
// Set up client's environment
// p: set-libdir [for VG_(libdir)]
// p: early_process_cmd_line_options [for toolname]
//
// Setup client stack, eip, and VG_(client_arg[cv])
// p: load_client() [for 'info']
// p: fix_environment() [for 'env']
//
// Setup client data (brk) segment. Initially a 1-page segment
// which abuts a shrinkable reservation.
// p: load_client() [for 'info' and hence VG_(brk_base)]
//
// p: _start_in_C (for zeroing out the_iicii and putting some
// initial values into it)
//--------------------------------------------------------------
if (!need_help) {
VG_(debugLog)(1, "main", "Create initial image\n");
# if defined(VGO_linux) || defined(VGO_darwin)
the_iicii.argv = argv;
the_iicii.envp = envp;
the_iicii.toolname = toolname;
# elif defined(VGO_aix5)
/* the_iicii.intregs37 already set up */
/* the_iicii.bootblock already set up */
/* the_iicii.adler32_exp already set up */
/* the_iicii.sp_at_startup is irrelevant */
/* the_iicii.clstack_top is irrelevant */
the_iicii.toolname = toolname;
# else
# error "Unknown platform"
# endif
/* NOTE: this call reads VG_(clo_main_stacksize). */
the_iifii = VG_(ii_create_image)( the_iicii );
# if defined(VGO_aix5)
/* Tell aspacem where the initial client stack is, so that it
can later produce a faked-up NSegment in response to
VG_(am_find_nsegment) for that address range, if asked. */
/* NOTE: this call reads VG_(clo_main_stacksize). */
VG_(am_aix5_set_initial_client_sp)( the_iifii.initial_client_SP );
/* Now have a look at said fake segment, so we can find out
the size of it. */
{ SizeT sz;
NSegment const* seg
= VG_(am_find_nsegment)( the_iifii.initial_client_SP );
vg_assert(seg);
sz = seg->end - seg->start + 1;
vg_assert(sz >= 0 && sz <= (256+1)*1024*1024); /* stay sane */
the_iifii.clstack_max_size = sz;
}
# endif
}
//==============================================================
//
// Finished loading/setting up the client address space.
//
//==============================================================
//--------------------------------------------------------------
// setup file descriptors
// p: n/a
//--------------------------------------------------------------
VG_(debugLog)(1, "main", "Setup file descriptors\n");
setup_file_descriptors();
//--------------------------------------------------------------
// create the fake /proc/<pid>/cmdline file and then unlink it,
// but hold onto the fd, so we can hand it out to the client
// when it tries to open /proc/<pid>/cmdline for itself.
// p: setup file descriptors
//--------------------------------------------------------------
#if !HAVE_PROC
// client shouldn't be using /proc!
VG_(cl_cmdline_fd) = -1;
#else
if (!need_help) {
HChar buf[50], buf2[50+64];
HChar nul[1];
Int fd, r;
HChar* exename;
VG_(debugLog)(1, "main", "Create fake /proc/<pid>/cmdline\n");
VG_(sprintf)(buf, "proc_%d_cmdline", VG_(getpid)());
fd = VG_(mkstemp)( buf, buf2 );
if (fd == -1)
VG_(err_config_error)("Can't create client cmdline file in /tmp.");
nul[0] = 0;
exename = VG_(args_the_exename) ? VG_(args_the_exename)
: "unknown_exename";
VG_(write)(fd, VG_(args_the_exename),
VG_(strlen)( VG_(args_the_exename) ));
VG_(write)(fd, nul, 1);
for (i = 0; i < VG_(sizeXA)( VG_(args_for_client) ); i++) {
HChar* arg = * (HChar**) VG_(indexXA)( VG_(args_for_client), i );
VG_(write)(fd, arg, VG_(strlen)( arg ));
VG_(write)(fd, nul, 1);
}
/* Don't bother to seek the file back to the start; instead do
it every time a copy of it is given out (by PRE(sys_open)).
That is probably more robust across fork() etc. */
/* Now delete it, but hang on to the fd. */
r = VG_(unlink)( buf2 );
if (r)
VG_(err_config_error)("Can't delete client cmdline file in /tmp.");
VG_(cl_cmdline_fd) = fd;
}
#endif
//--------------------------------------------------------------
// Init tool part 1: pre_clo_init
// p: setup_client_stack() [for 'VG_(client_arg[cv]']
// p: setup_file_descriptors() [for 'VG_(fd_xxx_limit)']
//--------------------------------------------------------------
VG_(debugLog)(1, "main", "Initialise the tool part 1 (pre_clo_init)\n");
VG_(tl_pre_clo_init)();
//--------------------------------------------------------------
// If --tool and --help/--help-debug was given, now give the core+tool
// help message
// p: early_process_cmd_line_options() [for 'need_help']
// p: tl_pre_clo_init [for 'VG_(tdict).usage']
//--------------------------------------------------------------
VG_(debugLog)(1, "main", "Print help and quit, if requested\n");
if (need_help) {
usage_NORETURN(/*--help-debug?*/2 == need_help);
}
//--------------------------------------------------------------
// Process command line options to Valgrind + tool
// p: setup_client_stack() [for 'VG_(client_arg[cv]']
// p: setup_file_descriptors() [for 'VG_(fd_xxx_limit)']
//--------------------------------------------------------------
VG_(debugLog)(1, "main",
"(main_) Process Valgrind's command line options, "
"setup logging\n");
main_process_cmd_line_options ( &logging_to_fd, &xml_fname_unexpanded,
toolname );
//--------------------------------------------------------------
// Zeroise the millisecond counter by doing a first read of it.
// p: none
//--------------------------------------------------------------
(void) VG_(read_millisecond_timer)();
//--------------------------------------------------------------
// Print the preamble
// p: tl_pre_clo_init [for 'VG_(details).name' and friends]
// p: main_process_cmd_line_options()
// [for VG_(clo_verbosity), VG_(clo_xml),
// logging_to_fd, xml_fname_unexpanded]
//--------------------------------------------------------------
VG_(debugLog)(1, "main", "Print the preamble...\n");
print_preamble(logging_to_fd, xml_fname_unexpanded, toolname);
VG_(debugLog)(1, "main", "...finished the preamble\n");
//--------------------------------------------------------------
// Init tool part 2: post_clo_init
// p: setup_client_stack() [for 'VG_(client_arg[cv]']
// p: setup_file_descriptors() [for 'VG_(fd_xxx_limit)']
// p: print_preamble() [so any warnings printed in post_clo_init
// are shown after the preamble]
//--------------------------------------------------------------
VG_(debugLog)(1, "main", "Initialise the tool part 2 (post_clo_init)\n");
VG_TDICT_CALL(tool_post_clo_init);
{
/* The tool's "needs" will by now be finalised, since it has no
further opportunity to specify them. So now sanity check
them. */
Char* s;
Bool ok;
ok = VG_(sanity_check_needs)( &s );
if (!ok) {
VG_(tool_panic)(s);
}
}
//--------------------------------------------------------------
// Initialise translation table and translation cache
// p: aspacem [??]
// p: tl_pre_clo_init [for 'VG_(details).avg_translation_sizeB']
//--------------------------------------------------------------
VG_(debugLog)(1, "main", "Initialise TT/TC\n");
VG_(init_tt_tc)();
//--------------------------------------------------------------
// Initialise the redirect table.
// p: init_tt_tc [so it can call VG_(search_transtab) safely]
// p: aspacem [so can change ownership of sysinfo pages]
//--------------------------------------------------------------
VG_(debugLog)(1, "main", "Initialise redirects\n");
VG_(redir_initialise)();
//--------------------------------------------------------------
// Allow GDB attach
// p: main_process_cmd_line_options() [for VG_(clo_wait_for_gdb)]
//--------------------------------------------------------------
/* Hook to delay things long enough so we can get the pid and
attach GDB in another shell. */
if (VG_(clo_wait_for_gdb)) {
Long iters;
volatile Long q;
VG_(debugLog)(1, "main", "Wait for GDB\n");
VG_(printf)("pid=%d, entering delay loop\n", VG_(getpid)());
# if defined(VGP_x86_linux)
iters = 5;
# elif defined(VGP_amd64_linux) || defined(VGP_ppc64_linux)
iters = 10;
# elif defined(VGP_ppc32_linux)
iters = 5;
# elif defined(VGP_ppc32_aix5) || defined(VGP_ppc64_aix5)
iters = 4;
# elif defined(VGO_darwin)
iters = 3;
# else
# error "Unknown plat"
# endif
iters *= 1000*1000*1000;
for (q = 0; q < iters; q++)
;
}
//--------------------------------------------------------------
// Search for file descriptors that are inherited from our parent
// p: main_process_cmd_line_options [for VG_(clo_track_fds)]
//--------------------------------------------------------------
if (VG_(clo_track_fds)) {
VG_(debugLog)(1, "main", "Init preopened fds\n");
VG_(init_preopened_fds)();
}
//--------------------------------------------------------------
// Load debug info for the existing segments.
// p: setup_code_redirect_table [so that redirs can be recorded]
// p: mallocfree
// p: probably: setup fds and process CLOs, so that logging works
// p: initialise m_debuginfo
//
// While doing this, make a note of the debuginfo-handles that
// come back from VG_(di_notify_mmap)/VG_(di_aix5_notify_segchange).
// Later, in "Tell the tool about the initial client memory permissions"
// (just below) we can then hand these handles off to the tool in
// calls to VG_TRACK(new_mem_startup, ...). This gives the tool the
// opportunity to make further queries to m_debuginfo before the
// client is started, if it wants. We put this information into an
// XArray, each handle along with the associated segment start address,
// and search the XArray for the handles later, when calling
// VG_TRACK(new_mem_startup, ...).
//--------------------------------------------------------------
VG_(debugLog)(1, "main", "Load initial debug info\n");
tl_assert(!addr2dihandle);
addr2dihandle = VG_(newXA)( VG_(malloc), "main.vm.2",
VG_(free), sizeof(Addr_n_ULong) );
tl_assert(addr2dihandle);
# if defined(VGO_linux)
{ Addr* seg_starts;
Int n_seg_starts;
Addr_n_ULong anu;
seg_starts = VG_(get_segment_starts)( &n_seg_starts );
vg_assert(seg_starts && n_seg_starts >= 0);
/* show them all to the debug info reader. allow_SkFileV has to
be True here so that we read info from the valgrind executable
itself. */
for (i = 0; i < n_seg_starts; i++) {
anu.ull = VG_(di_notify_mmap)( seg_starts[i], True/*allow_SkFileV*/ );
/* anu.ull holds the debuginfo handle returned by di_notify_mmap,
if any. */
if (anu.ull > 0) {
anu.a = seg_starts[i];
VG_(addToXA)( addr2dihandle, &anu );
}
}
VG_(free)( seg_starts );
}
# elif defined(VGO_aix5)
{ AixCodeSegChange* changes;
Int changes_size, changes_used;
Addr_n_ULong anu;
/* Find out how many AixCodeSegChange records we will need,
and acquire them. */
changes_size = VG_(am_aix5_reread_procmap_howmany_directives)();
changes = VG_(malloc)("main.vm.3", changes_size * sizeof(AixCodeSegChange));
vg_assert(changes);
/* Now re-read /proc/<pid>/map and acquire a change set */
VG_(am_aix5_reread_procmap)( changes, &changes_used );
vg_assert(changes_used >= 0 && changes_used <= changes_size);
/* And notify m_debuginfo of the changes. */
for (i = 0; i < changes_used; i++) {
anu.ull = VG_(di_aix5_notify_segchange)(
changes[i].code_start,
changes[i].code_len,
changes[i].data_start,
changes[i].data_len,
changes[i].file_name,
changes[i].mem_name,
changes[i].is_mainexe,
changes[i].acquire
);
if (anu.ull > 0) {
tl_assert(changes[i].acquire);
anu.a = changes[i].code_start; /* is this correct? */
VG_(addToXA)( addr2dihandle, &anu );
}
}
VG_(free)(changes);
}
# elif defined(VGO_darwin)
{ Addr* seg_starts;
Int n_seg_starts;
seg_starts = VG_(get_segment_starts)( &n_seg_starts );
vg_assert(seg_starts && n_seg_starts >= 0);
/* show them all to the debug info reader.
Don't read from V segments (unlike Linux) */
// GrP fixme really?
for (i = 0; i < n_seg_starts; i++)
VG_(di_notify_mmap)( seg_starts[i], False/*don't allow_SkFileV*/ );
VG_(free)( seg_starts );
}
# else
# error Unknown OS
# endif
//--------------------------------------------------------------
// Tell aspacem of ownership change of the asm helpers, so that
// m_translate allows them to be translated. However, only do this
// after the initial debug info read, since making a hole in the
// address range for the stage2 binary confuses the debug info reader.
// p: aspacem
//--------------------------------------------------------------
{ Bool change_ownership_v_c_OK;
Addr co_start = VG_PGROUNDDN( (Addr)&VG_(trampoline_stuff_start) );
Addr co_endPlus = VG_PGROUNDUP( (Addr)&VG_(trampoline_stuff_end) );
VG_(debugLog)(1,"redir",
"transfer ownership V -> C of 0x%llx .. 0x%llx\n",
(ULong)co_start, (ULong)co_endPlus-1 );
change_ownership_v_c_OK
= VG_(am_change_ownership_v_to_c)( co_start, co_endPlus - co_start );
vg_assert(change_ownership_v_c_OK);
}
//--------------------------------------------------------------
// Initialise the scheduler (phase 1) [generates tid_main]
// p: none, afaics
//--------------------------------------------------------------
VG_(debugLog)(1, "main", "Initialise scheduler (phase 1)\n");
tid_main = VG_(scheduler_init_phase1)();
vg_assert(tid_main >= 0 && tid_main < VG_N_THREADS
&& tid_main != VG_INVALID_THREADID);
/* Tell the tool about tid_main */
VG_TRACK( pre_thread_ll_create, VG_INVALID_THREADID, tid_main );
//--------------------------------------------------------------
// Tell the tool about the initial client memory permissions
// p: aspacem
// p: mallocfree
// p: setup_client_stack
// p: setup_client_dataseg
//
// For each segment we tell the client about, look up in
// addr2dihandle as created above, to see if there's a debuginfo
// handle associated with the segment, that we can hand along
// to the tool, to be helpful.
//--------------------------------------------------------------
VG_(debugLog)(1, "main", "Tell tool about initial permissions\n");
{ Addr* seg_starts;
Int n_seg_starts;
tl_assert(addr2dihandle);
/* Mark the main thread as running while we tell the tool about
the client memory so that the tool can associate that memory
with the main thread. */
tl_assert(VG_(running_tid) == VG_INVALID_THREADID);
VG_(running_tid) = tid_main;
seg_starts = VG_(get_segment_starts)( &n_seg_starts );
vg_assert(seg_starts && n_seg_starts >= 0);
/* show interesting ones to the tool */
for (i = 0; i < n_seg_starts; i++) {
Word j, n;
NSegment const* seg
= VG_(am_find_nsegment)( seg_starts[i] );
vg_assert(seg);
if (seg->kind == SkFileC || seg->kind == SkAnonC) {
/* This next assertion is tricky. If it is placed
immediately before this 'if', it very occasionally fails.
Why? Because previous iterations of the loop may have
caused tools (via the new_mem_startup calls) to do
dynamic memory allocation, and that may affect the mapped
segments; in particular it may cause segment merging to
happen. Hence we cannot assume that seg_starts[i], which
reflects the state of the world before we started this
loop, is the same as seg->start, as the latter reflects
the state of the world (viz, mappings) at this particular
iteration of the loop.
Why does moving it inside the 'if' make it safe? Because
any dynamic memory allocation done by the tools will
affect only the state of Valgrind-owned segments, not of
Client-owned segments. And the 'if' guards against that
-- we only get in here for Client-owned segments.
In other words: the loop may change the state of
Valgrind-owned segments as it proceeds. But it should
not cause the Client-owned segments to change. */
vg_assert(seg->start == seg_starts[i]);
VG_(debugLog)(2, "main",
"tell tool about %010lx-%010lx %c%c%c\n",
seg->start, seg->end,
seg->hasR ? 'r' : '-',
seg->hasW ? 'w' : '-',
seg->hasX ? 'x' : '-' );
/* search addr2dihandle to see if we have an entry
matching seg->start. */
n = VG_(sizeXA)( addr2dihandle );
for (j = 0; j < n; j++) {
Addr_n_ULong* anl = VG_(indexXA)( addr2dihandle, j );
if (anl->a == seg->start) {
tl_assert(anl->ull > 0); /* check it's a valid handle */
break;
}
}
vg_assert(j >= 0 && j <= n);
VG_TRACK( new_mem_startup, seg->start, seg->end+1-seg->start,
seg->hasR, seg->hasW, seg->hasX,
/* and the retrieved debuginfo handle, if any */
j < n
? ((Addr_n_ULong*)VG_(indexXA)( addr2dihandle, j ))->ull
: 0 );
}
}
VG_(free)( seg_starts );
VG_(deleteXA)( addr2dihandle );
/* Also do the initial stack permissions. */
{ NSegment const* seg
= VG_(am_find_nsegment)( the_iifii.initial_client_SP );
vg_assert(seg);
vg_assert(seg->kind == SkAnonC);
vg_assert(the_iifii.initial_client_SP >= seg->start);
vg_assert(the_iifii.initial_client_SP <= seg->end);
# if defined(VGO_aix5)
VG_(clstk_base) = seg->start;
VG_(clstk_end) = seg->end;
# endif
/* Stuff below the initial SP is unaddressable. Take into
account any ABI-mandated space below the stack pointer that
is required (VG_STACK_REDZONE_SZB). setup_client_stack()
will have allocated an extra page if a red zone is required,
to be on the safe side. */
vg_assert(the_iifii.initial_client_SP - VG_STACK_REDZONE_SZB
>= seg->start);
VG_TRACK( die_mem_stack,
seg->start,
the_iifii.initial_client_SP - VG_STACK_REDZONE_SZB
- seg->start );
VG_(debugLog)(2, "main", "mark stack inaccessible %010lx-%010lx\n",
seg->start,
the_iifii.initial_client_SP-1 - VG_STACK_REDZONE_SZB);
}
/* Also the assembly helpers. */
VG_TRACK( new_mem_startup,
(Addr)&VG_(trampoline_stuff_start),
(Addr)&VG_(trampoline_stuff_end)
- (Addr)&VG_(trampoline_stuff_start),
False, /* readable? */
False, /* writable? */
True /* executable? */,
0 /* di_handle: no associated debug info */ );
/* Clear the running thread indicator */
VG_(running_tid) = VG_INVALID_THREADID;
tl_assert(VG_(running_tid) == VG_INVALID_THREADID);
}
//--------------------------------------------------------------
// Initialise the scheduler (phase 2)
// p: Initialise the scheduler (phase 1) [for tid_main]
// p: setup_file_descriptors() [else VG_(safe_fd)() breaks]
// p: setup_client_stack
//--------------------------------------------------------------
VG_(debugLog)(1, "main", "Initialise scheduler (phase 2)\n");
{ NSegment const* seg
= VG_(am_find_nsegment)( the_iifii.initial_client_SP );
vg_assert(seg);
vg_assert(seg->kind == SkAnonC);
vg_assert(the_iifii.initial_client_SP >= seg->start);
vg_assert(the_iifii.initial_client_SP <= seg->end);
VG_(scheduler_init_phase2)( tid_main,
seg->end, the_iifii.clstack_max_size );
}
//--------------------------------------------------------------
// Set up state for the root thread
// p: ?
// setup_scheduler() [for sched-specific thread 1 stuff]
// VG_(ii_create_image) [for 'the_iicii' initial info]
//--------------------------------------------------------------
VG_(debugLog)(1, "main", "Finalise initial image\n");
VG_(ii_finalise_image)( the_iifii );
//--------------------------------------------------------------
// Initialise the signal handling subsystem
// p: n/a
//--------------------------------------------------------------
// Nb: temporarily parks the saved blocking-mask in saved_sigmask.
VG_(debugLog)(1, "main", "Initialise signal management\n");
/* Check that the kernel-interface signal definitions look sane */
VG_(vki_do_initial_consistency_checks)();
/* .. and go on to use them. */
VG_(sigstartup_actions)();
//--------------------------------------------------------------
// Read suppression file
// p: main_process_cmd_line_options() [for VG_(clo_suppressions)]
//--------------------------------------------------------------
if (VG_(needs).core_errors || VG_(needs).tool_errors) {
VG_(debugLog)(1, "main", "Load suppressions\n");
VG_(load_suppressions)();
}
//--------------------------------------------------------------
// register client stack
//--------------------------------------------------------------
VG_(clstk_id) = VG_(register_stack)(VG_(clstk_base), VG_(clstk_end));
//--------------------------------------------------------------
// Show the address space state so far
//--------------------------------------------------------------
VG_(debugLog)(1, "main", "\n");
VG_(debugLog)(1, "main", "\n");
VG_(am_show_nsegments)(1,"Memory layout at client startup");
VG_(debugLog)(1, "main", "\n");
VG_(debugLog)(1, "main", "\n");
//--------------------------------------------------------------
// Run!
//--------------------------------------------------------------
if (VG_(clo_xml)) {
HChar buf[50];
VG_(elapsed_wallclock_time)(buf);
VG_(printf_xml_no_f_c)( "<status>\n"
" <state>RUNNING</state>\n"
" <time>%t</time>\n"
"</status>\n",
buf );
VG_(printf_xml_no_f_c)( "\n" );
}
VG_(debugLog)(1, "main", "Running thread 1\n");
/* As a result of the following call, the last thread standing
eventually winds up running shutdown_actions_NORETURN
just below. Unfortunately, simply exporting said function
causes m_main to be part of a module cycle, which is pretty
nonsensical. So instead of doing that, the address of said
function is stored in a global variable 'owned' by m_syswrap,
and it uses that function pointer to get back here when it needs
to. */
/* Set continuation address. */
VG_(address_of_m_main_shutdown_actions_NORETURN)
= & shutdown_actions_NORETURN;
/* Run the first thread, eventually ending up at the continuation
address. */
VG_(main_thread_wrapper_NORETURN)(1);
/*NOTREACHED*/
vg_assert(0);
}
/* Do everything which needs doing when the last thread exits or when
a thread exits requesting a complete process exit (exit on AIX).
We enter here holding The Lock. For the case VgSrc_ExitProcess we
must never release it, because to do so would allow other threads
to continue after the system is ostensibly shut down. So we must
go to our grave, so to speak, holding the lock.
In fact, there is never any point in releasing the lock at this
point - we have it, we're shutting down the entire system, and
for the case VgSrc_ExitProcess doing so positively causes trouble.
So don't.
The final_tidyup call makes a bit of a nonsense of the ExitProcess
case, since it will run the libc_freeres function, thus allowing
other lurking threads to run again. Hmm. */
static
void shutdown_actions_NORETURN( ThreadId tid,
VgSchedReturnCode tids_schedretcode )
{
VG_(debugLog)(1, "main", "entering VG_(shutdown_actions_NORETURN)\n");
VG_(am_show_nsegments)(1,"Memory layout at client shutdown");
vg_assert(VG_(is_running_thread)(tid));
vg_assert(tids_schedretcode == VgSrc_ExitThread
|| tids_schedretcode == VgSrc_ExitProcess
|| tids_schedretcode == VgSrc_FatalSig );
if (tids_schedretcode == VgSrc_ExitThread) {
// We are the last surviving thread. Right?
vg_assert( VG_(count_living_threads)() == 1 );
// Wait for all other threads to exit.
// jrs: Huh? but they surely are already gone
VG_(reap_threads)(tid);
// Clean the client up before the final report
// this causes the libc_freeres function to run
final_tidyup(tid);
/* be paranoid */
vg_assert(VG_(is_running_thread)(tid));
vg_assert(VG_(count_living_threads)() == 1);
} else {
// We may not be the last surviving thread. However, we
// want to shut down the entire process. We hold the lock
// and we need to keep hold of it all the way out, in order
// that none of the other threads ever run again.
vg_assert( VG_(count_living_threads)() >= 1 );
// Clean the client up before the final report
// this causes the libc_freeres function to run
// perhaps this is unsafe, as per comment above
final_tidyup(tid);
/* be paranoid */
vg_assert(VG_(is_running_thread)(tid));
vg_assert(VG_(count_living_threads)() >= 1);
}
VG_(threads)[tid].status = VgTs_Empty;
//--------------------------------------------------------------
// Finalisation: cleanup, messages, etc. Order not so important, only
// affects what order the messages come.
//--------------------------------------------------------------
if (VG_(clo_verbosity) > 0)
VG_(message)(Vg_UserMsg, "\n");
if (VG_(clo_xml))
VG_(printf_xml)("\n");
if (VG_(clo_xml)) {
HChar buf[50];
VG_(elapsed_wallclock_time)(buf);
VG_(printf_xml_no_f_c)( "<status>\n"
" <state>FINISHED</state>\n"
" <time>%t</time>\n"
"</status>\n",
buf);
}
/* Print out file descriptor summary and stats. */
if (VG_(clo_track_fds))
VG_(show_open_fds)();
/* ** HACK ALERT ** HACK ALERT ** HACK ALERT ** HACK ALERT ** */
if (VG_(clo_xml)) {
/* THIS IS WHAT WE SHOULD CHANGE IT TO */
/* For the moment, do it like this (the "right way") in XML
mode, so that output is as described in XML Protocol 4. */
/* A good test is memcheck/tests/amd64/defcfaexpr; ensure
the output does not change */
VG_TDICT_CALL(tool_fini, 0/*exitcode*/);
/* Show the error counts. */
if (VG_(needs).core_errors || VG_(needs).tool_errors) {
VG_(printf_xml)( "\n" );
VG_(show_error_counts_as_XML)();
VG_(printf_xml)( "\n" );
}
/* In XML mode, this merely prints the used suppressions. */
if (VG_(needs).core_errors || VG_(needs).tool_errors)
VG_(show_all_errors)();
} else {
/* THIS IS WHAT IT HAS ALWAYS BEEN,
resulting in https://bugs.kde.org/show_bug.cgi?id=186790 */
if (VG_(needs).core_errors || VG_(needs).tool_errors)
VG_(show_all_errors)();
VG_TDICT_CALL(tool_fini, 0/*exitcode*/);
}
/* END ** HACK ALERT ** HACK ALERT ** HACK ALERT ** HACK ALERT ** */
if (VG_(clo_xml)) {
VG_(printf_xml)("\n");
VG_(printf_xml)("</valgrindoutput>\n");
VG_(printf_xml)("\n");
}
VG_(sanity_check_general)( True /*include expensive checks*/ );
if (VG_(clo_verbosity) > 1)
print_all_stats();
/* Show a profile of the heap(s) at shutdown. Optionally, first
throw away all the debug info, as that makes it easy to spot
leaks in the debuginfo reader. */
if (VG_(clo_profile_heap)) {
if (0) VG_(di_discard_ALL_debuginfo)();
VG_(print_arena_cc_analysis)();
}
if (VG_(clo_profile_flags) > 0) {
#define N_MAX 200
BBProfEntry tops[N_MAX];
ULong score_total = VG_(get_BB_profile) (tops, N_MAX);
show_BB_profile(tops, N_MAX, score_total);
}
/* Print Vex storage stats */
if (0)
LibVEX_ShowAllocStats();
/* Flush any output cached by previous calls to VG_(message). */
VG_(message_flush)();
/* Ok, finally exit in the os-specific way, according to the scheduler's
return code. In short, if the (last) thread exited by calling
sys_exit, do likewise; if the (last) thread stopped due to a fatal
signal, terminate the entire system with that same fatal signal. */
VG_(debugLog)(1, "core_os",
"VG_(terminate_NORETURN)(tid=%lld)\n", (ULong)tid);
switch (tids_schedretcode) {
case VgSrc_ExitThread: /* the normal way out (Linux) */
case VgSrc_ExitProcess: /* the normal way out (AIX) */
/* Change the application return code to user's return code,
if an error was found */
if (VG_(clo_error_exitcode) > 0
&& VG_(get_n_errs_found)() > 0) {
VG_(exit)( VG_(clo_error_exitcode) );
} else {
/* otherwise, return the client's exit code, in the normal
way. */
VG_(exit)( VG_(threads)[tid].os_state.exitcode );
}
/* NOT ALIVE HERE! */
VG_(core_panic)("entered the afterlife in main() -- ExitT/P");
break; /* what the hell :) */
case VgSrc_FatalSig:
/* We were killed by a fatal signal, so replicate the effect */
vg_assert(VG_(threads)[tid].os_state.fatalsig != 0);
VG_(kill_self)(VG_(threads)[tid].os_state.fatalsig);
/* we shouldn't be alive at this point. But VG_(kill_self)
sometimes fails with EPERM on Darwin, for unclear reasons. */
# if defined(VGO_darwin)
VG_(debugLog)(0, "main", "VG_(kill_self) failed. Exiting normally.\n");
VG_(exit)(0); /* bogus, but we really need to exit now */
/* fall through .. */
# endif
VG_(core_panic)("main(): signal was supposed to be fatal");
break;
default:
VG_(core_panic)("main(): unexpected scheduler return code");
}
}
/* -------------------- */
/* Final clean-up before terminating the process.
Clean up the client by calling __libc_freeres() (if requested)
This is Linux-specific?
GrP fixme glibc-specific, anyway
*/
static void final_tidyup(ThreadId tid)
{
#if !defined(VGO_darwin)
# if defined(VGP_ppc64_linux)
Addr r2;
# endif
Addr __libc_freeres_wrapper = VG_(client___libc_freeres_wrapper);
vg_assert(VG_(is_running_thread)(tid));
if ( !VG_(needs).libc_freeres ||
!VG_(clo_run_libc_freeres) ||
0 == __libc_freeres_wrapper )
return; /* can't/won't do it */
# if defined(VGO_aix5)
return; /* inapplicable on non-Linux platforms */
# endif
# if defined(VGP_ppc64_linux)
r2 = VG_(get_tocptr)( __libc_freeres_wrapper );
if (r2 == 0) {
VG_(message)(Vg_UserMsg,
"Caught __NR_exit, but can't run __libc_freeres()\n");
VG_(message)(Vg_UserMsg,
" since cannot establish TOC pointer for it.\n");
return;
}
# endif
if (VG_(clo_verbosity) > 2 ||
VG_(clo_trace_syscalls) ||
VG_(clo_trace_sched))
VG_(message)(Vg_DebugMsg,
"Caught __NR_exit; running __libc_freeres()\n");
/* set thread context to point to libc_freeres_wrapper */
/* ppc64-linux note: __libc_freeres_wrapper gives us the real
function entry point, not a fn descriptor, so can use it
directly. However, we need to set R2 (the toc pointer)
appropriately. */
VG_(set_IP)(tid, __libc_freeres_wrapper);
# if defined(VGP_ppc64_linux)
VG_(threads)[tid].arch.vex.guest_GPR2 = r2;
# endif
/* Block all blockable signals by copying the real block state into
the thread's block state*/
VG_(sigprocmask)(VKI_SIG_BLOCK, NULL, &VG_(threads)[tid].sig_mask);
VG_(threads)[tid].tmp_sig_mask = VG_(threads)[tid].sig_mask;
/* and restore handlers to default */
VG_(set_default_handler)(VKI_SIGSEGV);
VG_(set_default_handler)(VKI_SIGBUS);
VG_(set_default_handler)(VKI_SIGILL);
VG_(set_default_handler)(VKI_SIGFPE);
// We were exiting, so assert that...
vg_assert(VG_(is_exiting)(tid));
// ...but now we're not again
VG_(threads)[tid].exitreason = VgSrc_None;
// run until client thread exits - ideally with LIBC_FREERES_DONE,
// but exit/exitgroup/signal will do
VG_(scheduler)(tid);
vg_assert(VG_(is_exiting)(tid));
#endif
}
/*====================================================================*/
/*=== Getting to main() alive: LINUX ===*/
/*====================================================================*/
#if defined(VGO_linux)
/* If linking of the final executables is done with glibc present,
then Valgrind starts at main() above as usual, and all of the
following code is irrelevant.
However, this is not the intended mode of use. The plan is to
avoid linking against glibc, by giving gcc the flags
-nodefaultlibs -lgcc -nostartfiles at startup.
From this derive two requirements:
1. gcc may emit calls to memcpy and memset to deal with structure
assignments etc. Since we have chosen to ignore all the
"normal" supporting libraries, we have to provide our own
implementations of them. No problem.
2. We have to provide a symbol "_start", to which the kernel
hands control at startup. Hence the code below.
*/
/* ---------------- Requirement 1 ---------------- */
void* memcpy(void *dest, const void *src, SizeT n);
void* memcpy(void *dest, const void *src, SizeT n) {
return VG_(memcpy)(dest,src,n);
}
void* memset(void *s, int c, SizeT n);
void* memset(void *s, int c, SizeT n) {
return VG_(memset)(s,c,n);
}
/* ---------------- Requirement 2 ---------------- */
/* Glibc's sysdeps/i386/elf/start.S has the following gem of a
comment, which explains how the stack looks right at process start
(when _start is jumped to). Hence _start passes %esp to
_start_in_C_linux, which extracts argc/argv/envp and starts up
correctly. */
/* This is the canonical entry point, usually the first thing in the text
segment. The SVR4/i386 ABI (pages 3-31, 3-32) says that when the entry
point runs, most registers' values are unspecified, except for:
%edx Contains a function pointer to be registered with `atexit'.
This is how the dynamic linker arranges to have DT_FINI
functions called for shared libraries that have been loaded
before this code runs.
%esp The stack contains the arguments and environment:
0(%esp) argc
4(%esp) argv[0]
...
(4*argc)(%esp) NULL
(4*(argc+1))(%esp) envp[0]
...
NULL
*/
/* The kernel hands control to _start, which extracts the initial
stack pointer and calls onwards to _start_in_C_linux. This also switches
the new stack. */
#if defined(VGP_x86_linux)
asm("\n"
".text\n"
"\t.globl _start\n"
"\t.type _start,@function\n"
"_start:\n"
/* set up the new stack in %eax */
"\tmovl $vgPlain_interim_stack, %eax\n"
"\taddl $"VG_STRINGIFY(VG_STACK_GUARD_SZB)", %eax\n"
"\taddl $"VG_STRINGIFY(VG_STACK_ACTIVE_SZB)", %eax\n"
"\tsubl $16, %eax\n"
"\tandl $~15, %eax\n"
/* install it, and collect the original one */
"\txchgl %eax, %esp\n"
/* call _start_in_C_linux, passing it the startup %esp */
"\tpushl %eax\n"
"\tcall _start_in_C_linux\n"
"\thlt\n"
".previous\n"
);
#elif defined(VGP_amd64_linux)
asm("\n"
".text\n"
"\t.globl _start\n"
"\t.type _start,@function\n"
"_start:\n"
/* set up the new stack in %rdi */
"\tmovq $vgPlain_interim_stack, %rdi\n"
"\taddq $"VG_STRINGIFY(VG_STACK_GUARD_SZB)", %rdi\n"
"\taddq $"VG_STRINGIFY(VG_STACK_ACTIVE_SZB)", %rdi\n"
"\tandq $~15, %rdi\n"
/* install it, and collect the original one */
"\txchgq %rdi, %rsp\n"
/* call _start_in_C_linux, passing it the startup %rsp */
"\tcall _start_in_C_linux\n"
"\thlt\n"
".previous\n"
);
#elif defined(VGP_ppc32_linux)
asm("\n"
".text\n"
"\t.globl _start\n"
"\t.type _start,@function\n"
"_start:\n"
/* set up the new stack in r16 */
"\tlis 16,vgPlain_interim_stack@ha\n"
"\tla 16,vgPlain_interim_stack@l(16)\n"
"\tlis 17,("VG_STRINGIFY(VG_STACK_GUARD_SZB)" >> 16)\n"
"\tori 17,17,("VG_STRINGIFY(VG_STACK_GUARD_SZB)" & 0xFFFF)\n"
"\tlis 18,("VG_STRINGIFY(VG_STACK_ACTIVE_SZB)" >> 16)\n"
"\tori 18,18,("VG_STRINGIFY(VG_STACK_ACTIVE_SZB)" & 0xFFFF)\n"
"\tadd 16,17,16\n"
"\tadd 16,18,16\n"
"\trlwinm 16,16,0,0,27\n"
/* now r16 = &vgPlain_interim_stack + VG_STACK_GUARD_SZB +
VG_STACK_ACTIVE_SZB rounded down to the nearest 16-byte
boundary. And r1 is the original SP. Set the SP to r16 and
call _start_in_C_linux, passing it the initial SP. */
"\tmr 3,1\n"
"\tmr 1,16\n"
"\tbl _start_in_C_linux\n"
"\ttrap\n"
".previous\n"
);
#elif defined(VGP_ppc64_linux)
asm("\n"
/* PPC64 ELF ABI says '_start' points to a function descriptor.
So we must have one, and that is what goes into the .opd section. */
"\t.align 2\n"
"\t.global _start\n"
"\t.section \".opd\",\"aw\"\n"
"\t.align 3\n"
"_start:\n"
"\t.quad ._start,.TOC.@tocbase,0\n"
"\t.previous\n"
"\t.type ._start,@function\n"
"\t.global ._start\n"
"._start:\n"
/* set up the new stack in r16 */
"\tlis 16, vgPlain_interim_stack@highest\n"
"\tori 16,16,vgPlain_interim_stack@higher\n"
"\tsldi 16,16,32\n"
"\toris 16,16,vgPlain_interim_stack@h\n"
"\tori 16,16,vgPlain_interim_stack@l\n"
"\txor 17,17,17\n"
"\tlis 17,("VG_STRINGIFY(VG_STACK_GUARD_SZB)" >> 16)\n"
"\tori 17,17,("VG_STRINGIFY(VG_STACK_GUARD_SZB)" & 0xFFFF)\n"
"\txor 18,18,18\n"
"\tlis 18,("VG_STRINGIFY(VG_STACK_ACTIVE_SZB)" >> 16)\n"
"\tori 18,18,("VG_STRINGIFY(VG_STACK_ACTIVE_SZB)" & 0xFFFF)\n"
"\tadd 16,17,16\n"
"\tadd 16,18,16\n"
"\trldicr 16,16,0,59\n"
/* now r16 = &vgPlain_interim_stack + VG_STACK_GUARD_SZB +
VG_STACK_ACTIVE_SZB rounded down to the nearest 16-byte
boundary. And r1 is the original SP. Set the SP to r16 and
call _start_in_C_linux, passing it the initial SP. */
"\tmr 3,1\n"
"\tmr 1,16\n"
"\tbl ._start_in_C_linux\n"
"\tnop\n"
"\ttrap\n"
);
#else
# error "Unknown linux platform"
#endif
/* --- !!! --- EXTERNAL HEADERS start --- !!! --- */
#define _GNU_SOURCE
#define _FILE_OFFSET_BITS 64
/* This is in order to get AT_NULL and AT_PAGESIZE. */
#include <elf.h>
/* --- !!! --- EXTERNAL HEADERS end --- !!! --- */
/* Avoid compiler warnings: this fn _is_ used, but labelling it
'static' causes gcc to complain it isn't. */
void _start_in_C_linux ( UWord* pArgc );
void _start_in_C_linux ( UWord* pArgc )
{
Int r;
Word argc = pArgc[0];
HChar** argv = (HChar**)&pArgc[1];
HChar** envp = (HChar**)&pArgc[1+argc+1];
VG_(memset)( &the_iicii, 0, sizeof(the_iicii) );
VG_(memset)( &the_iifii, 0, sizeof(the_iifii) );
the_iicii.sp_at_startup = (Addr)pArgc;
# if defined(VGP_ppc32_linux) || defined(VGP_ppc64_linux)
{
/* ppc/ppc64 can be configured with different page sizes.
Determine this early. This is an ugly hack and really should
be moved into valgrind_main. */
UWord *sp = &pArgc[1+argc+1];
while (*sp++ != 0)
;
for (; *sp != AT_NULL && *sp != AT_PAGESZ; sp += 2);
if (*sp == AT_PAGESZ) {
VKI_PAGE_SIZE = sp[1];
for (VKI_PAGE_SHIFT = 12;
VKI_PAGE_SHIFT <= VKI_MAX_PAGE_SHIFT; VKI_PAGE_SHIFT++)
if (VKI_PAGE_SIZE == (1UL << VKI_PAGE_SHIFT))
break;
}
}
# endif
r = valgrind_main( (Int)argc, argv, envp );
/* NOTREACHED */
VG_(exit)(r);
}
/*====================================================================*/
/*=== Getting to main() alive: AIX5 ===*/
/*====================================================================*/
#elif defined(VGO_aix5)
/* This is somewhat simpler than the Linux case. _start_valgrind
receives control from the magic piece of code created in this
process' address space by the launcher, via use of ptrace(). At
the point of entry:
- the initial client process image is in memory and ready to roll,
except that we've partially trashed its integer register state
in order to get this far. So ..
- intregs37 holds the client's initial integer register state, so
we can restore it before starting the client on the VCPU.
- we're on the client's stack. This is not good; therefore the
first order of business is to switch to our temporary stack.
- the client's initial argc/v/envp is in r3/r4/r5 (32 bit mode) or
r14/r15/r16 (64 bit mode). They are pulled out of the stashed
integer register state and passed to our main().
The launcher will have played some games with argv. If the launcher
($prefix/bin/valgrind) was started like this
valgrind [args-for-V] app [args-for-app]
then the launcher will have started the client as
app [args-for-V] app [args-for-app]
m_initimg will have to mess with the client's initial r4/r5
(32-bit) or r15/r16 (64-bit) so that it believes it was execd as
"app [args-for-app]". Well, that's no big deal.
*/
#include "launcher-aix5-bootblock.h"
void _start_in_C_aix5 ( AIX5Bootblock* bootblock );
void _start_in_C_aix5 ( AIX5Bootblock* bootblock )
{
Int r;
ULong* intregs37;
UWord argc, argv, envp;
__NR_getpid = bootblock->__NR_getpid;
__NR_write = bootblock->__NR_write;
__NR_exit = bootblock->__NR_exit;
__NR_open = bootblock->__NR_open;
__NR_read = bootblock->__NR_read;
__NR_close = bootblock->__NR_close;
VG_(memset)( &the_iicii, 0, sizeof(the_iicii) );
VG_(memset)( &the_iifii, 0, sizeof(the_iifii) );
intregs37 = &bootblock->iregs_pc_cr_lr_ctr_xer[0];
the_iicii.intregs37 = intregs37;
the_iicii.bootblock = (void*)bootblock;
the_iicii.adler32_exp = bootblock->adler32;
/* Not important on AIX. */
the_iicii.sp_at_startup = (Addr)0x31415927ULL;
# if defined(VGP_ppc32_aix5)
argc = (UWord)intregs37[3]; /* client's r3 == argc */
argv = (UWord)intregs37[4];
envp = (UWord)intregs37[5];
# else /* defined(VGP_ppc64_aix5) */
argc = (UWord)intregs37[14]; /* client's r14 == argc */
argv = (UWord)intregs37[15];
envp = (UWord)intregs37[16];
# endif
r = valgrind_main( (Int)argc, (HChar**)argv, (HChar**)envp );
/* NOTREACHED */
VG_(exit)(r);
}
/* THE ENTRY POINT */
void _start_valgrind ( AIX5Bootblock* bootblock );
void _start_valgrind ( AIX5Bootblock* bootblock )
{
/* Switch immediately to our temporary stack, and continue. This
is pretty dodgy in that it assumes that gcc does not place on
the stack, anything needed to form the _start_in_C_aix5 call,
since it will be on the old stack. */
register UWord new_r1;
new_r1 = (UWord)&VG_(interim_stack);
new_r1 += VG_STACK_GUARD_SZB; /* step over lower guard page */
new_r1 += VG_STACK_ACTIVE_SZB; /* step to top of active area */
new_r1 -= 512; /* paranoia */
__asm__ __volatile__("mr 1,%0" :/*wr*/
:/*rd*/ "b"(new_r1)
:/*trash*/"r1","memory");
_start_in_C_aix5(bootblock);
/*NOTREACHED*/
VG_(exit)(0);
}
/* At some point in Oct 2008, static linking appeared to stop working
on AIX 5.3. This breaks the build since we link statically. The
linking fails citing absence of the following five symbols as the
reason. In the absence of a better solution, here are stand-ins
for them. Kludge appears to work; presumably said functions,
assuming they are indeed functions, are never called. */
void encrypted_pw_passlen ( void ) { vg_assert(0); }
void crypt_r ( void ) { vg_assert(0); }
void max_history_size ( void ) { vg_assert(0); }
void getpass_auto ( void ) { vg_assert(0); }
void max_pw_passlen ( void ) { vg_assert(0); }
/*====================================================================*/
/*=== Getting to main() alive: darwin ===*/
/*====================================================================*/
#elif defined(VGO_darwin)
void* __memcpy_chk(void *dest, const void *src, SizeT n, SizeT n2);
void* __memcpy_chk(void *dest, const void *src, SizeT n, SizeT n2) {
// skip check
return VG_(memcpy)(dest,src,n);
}
void* __memset_chk(void *s, int c, SizeT n, SizeT n2);
void* __memset_chk(void *s, int c, SizeT n, SizeT n2) {
// skip check
return VG_(memset)(s,c,n);
}
void bzero(void *s, SizeT n);
void bzero(void *s, SizeT n) {
VG_(memset)(s,0,n);
}
void* memcpy(void *dest, const void *src, SizeT n);
void* memcpy(void *dest, const void *src, SizeT n) {
return VG_(memcpy)(dest,src,n);
}
void* memset(void *s, int c, SizeT n);
void* memset(void *s, int c, SizeT n) {
return VG_(memset)(s,c,n);
}
/* _start in m_start-<arch>-darwin.S calls _start_in_C_darwin(). */
/* Avoid compiler warnings: this fn _is_ used, but labelling it
'static' causes gcc to complain it isn't. */
void _start_in_C_darwin ( UWord* pArgc );
void _start_in_C_darwin ( UWord* pArgc )
{
Int r;
Int argc = *(Int *)pArgc; // not pArgc[0] on LP64
HChar** argv = (HChar**)&pArgc[1];
HChar** envp = (HChar**)&pArgc[1+argc+1];
VG_(memset)( &the_iicii, 0, sizeof(the_iicii) );
VG_(memset)( &the_iifii, 0, sizeof(the_iifii) );
the_iicii.sp_at_startup = (Addr)pArgc;
r = valgrind_main( (Int)argc, argv, envp );
/* NOTREACHED */
VG_(exit)(r);
}
#else
# error "Unknown OS"
#endif
/*--------------------------------------------------------------------*/
/*--- end ---*/
/*--------------------------------------------------------------------*/