sewardj | de4a1d0 | 2002-03-22 01:27:54 +0000 | [diff] [blame] | 1 | |
| 2 | /*--------------------------------------------------------------------*/ |
njn | f39e9a3 | 2005-06-12 02:43:17 +0000 | [diff] [blame] | 3 | /*--- Process-related libc stuff. m_libcproc.c ---*/ |
sewardj | de4a1d0 | 2002-03-22 01:27:54 +0000 | [diff] [blame] | 4 | /*--------------------------------------------------------------------*/ |
njn | ed6b824 | 2005-06-01 00:03:17 +0000 | [diff] [blame] | 5 | |
sewardj | de4a1d0 | 2002-03-22 01:27:54 +0000 | [diff] [blame] | 6 | /* |
njn | b9c427c | 2004-12-01 14:14:42 +0000 | [diff] [blame] | 7 | This file is part of Valgrind, a dynamic binary instrumentation |
| 8 | framework. |
sewardj | de4a1d0 | 2002-03-22 01:27:54 +0000 | [diff] [blame] | 9 | |
sewardj | 03f8d3f | 2012-08-05 15:46:46 +0000 | [diff] [blame] | 10 | Copyright (C) 2000-2012 Julian Seward |
sewardj | de4a1d0 | 2002-03-22 01:27:54 +0000 | [diff] [blame] | 11 | jseward@acm.org |
sewardj | de4a1d0 | 2002-03-22 01:27:54 +0000 | [diff] [blame] | 12 | |
| 13 | This program is free software; you can redistribute it and/or |
| 14 | modify it under the terms of the GNU General Public License as |
| 15 | published by the Free Software Foundation; either version 2 of the |
| 16 | License, or (at your option) any later version. |
| 17 | |
| 18 | This program is distributed in the hope that it will be useful, but |
| 19 | WITHOUT ANY WARRANTY; without even the implied warranty of |
| 20 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU |
| 21 | General Public License for more details. |
| 22 | |
| 23 | You should have received a copy of the GNU General Public License |
| 24 | along with this program; if not, write to the Free Software |
| 25 | Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA |
| 26 | 02111-1307, USA. |
| 27 | |
njn25 | e49d8e7 | 2002-09-23 09:36:25 +0000 | [diff] [blame] | 28 | The GNU General Public License is contained in the file COPYING. |
sewardj | de4a1d0 | 2002-03-22 01:27:54 +0000 | [diff] [blame] | 29 | */ |
| 30 | |
njn | c7561b9 | 2005-06-19 01:24:32 +0000 | [diff] [blame] | 31 | #include "pub_core_basics.h" |
sewardj | 291849f | 2012-04-20 23:58:55 +0000 | [diff] [blame] | 32 | #include "pub_core_machine.h" // For VG_(machine_get_VexArchInfo) |
sewardj | 4cfea4f | 2006-10-14 19:26:10 +0000 | [diff] [blame] | 33 | #include "pub_core_vki.h" |
sewardj | d470bfc | 2006-10-17 02:16:44 +0000 | [diff] [blame] | 34 | #include "pub_core_vkiscnums.h" |
njn | 97405b2 | 2005-06-02 03:39:33 +0000 | [diff] [blame] | 35 | #include "pub_core_libcbase.h" |
njn | 132bfcc | 2005-06-04 19:16:06 +0000 | [diff] [blame] | 36 | #include "pub_core_libcassert.h" |
njn | 36a20fa | 2005-06-03 03:08:39 +0000 | [diff] [blame] | 37 | #include "pub_core_libcprint.h" |
njn | f39e9a3 | 2005-06-12 02:43:17 +0000 | [diff] [blame] | 38 | #include "pub_core_libcproc.h" |
sewardj | d470bfc | 2006-10-17 02:16:44 +0000 | [diff] [blame] | 39 | #include "pub_core_libcsignal.h" |
sewardj | d7a02db | 2008-12-12 08:07:49 +0000 | [diff] [blame] | 40 | #include "pub_core_seqmatch.h" |
njn | af1d7df | 2005-06-11 01:31:52 +0000 | [diff] [blame] | 41 | #include "pub_core_mallocfree.h" |
njn | 9abd608 | 2005-06-17 21:31:45 +0000 | [diff] [blame] | 42 | #include "pub_core_syscall.h" |
sewardj | 14c7cc5 | 2007-02-25 15:08:24 +0000 | [diff] [blame] | 43 | #include "pub_core_xarray.h" |
sewardj | 45f4e7c | 2005-09-27 19:20:21 +0000 | [diff] [blame] | 44 | #include "pub_core_clientstate.h" |
sewardj | 1cf558c | 2005-04-25 01:36:56 +0000 | [diff] [blame] | 45 | |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 46 | #if defined(VGO_darwin) |
| 47 | /* --- !!! --- EXTERNAL HEADERS start --- !!! --- */ |
| 48 | #include <mach/mach.h> /* mach_thread_self */ |
| 49 | /* --- !!! --- EXTERNAL HEADERS end --- !!! --- */ |
| 50 | #endif |
| 51 | |
| 52 | /* IMPORTANT: on Darwin it is essential to use the _nocancel versions |
| 53 | of syscalls rather than the vanilla version, if a _nocancel version |
| 54 | is available. See docs/internals/Darwin-notes.txt for the reason |
| 55 | why. */ |
| 56 | |
njn | f39e9a3 | 2005-06-12 02:43:17 +0000 | [diff] [blame] | 57 | /* --------------------------------------------------------------------- |
| 58 | Command line and environment stuff |
| 59 | ------------------------------------------------------------------ */ |
sewardj | de4a1d0 | 2002-03-22 01:27:54 +0000 | [diff] [blame] | 60 | |
njn | f39e9a3 | 2005-06-12 02:43:17 +0000 | [diff] [blame] | 61 | /* As deduced from sp_at_startup, the client's argc, argv[] and |
| 62 | envp[] as extracted from the client's stack at startup-time. */ |
florian | 19f91bb | 2012-11-10 22:29:54 +0000 | [diff] [blame] | 63 | HChar** VG_(client_envp) = NULL; |
njn | f39e9a3 | 2005-06-12 02:43:17 +0000 | [diff] [blame] | 64 | |
njn | 8d9965c | 2005-06-12 17:47:24 +0000 | [diff] [blame] | 65 | /* Path to library directory */ |
florian | 19f91bb | 2012-11-10 22:29:54 +0000 | [diff] [blame] | 66 | const HChar *VG_(libdir) = VG_LIBDIR; |
njn | 8d9965c | 2005-06-12 17:47:24 +0000 | [diff] [blame] | 67 | |
florian | 19f91bb | 2012-11-10 22:29:54 +0000 | [diff] [blame] | 68 | const HChar *VG_(LD_PRELOAD_var_name) = |
sewardj | 6e9de46 | 2011-06-28 07:25:29 +0000 | [diff] [blame] | 69 | #if defined(VGO_linux) |
njn | e323a6b | 2010-07-01 02:35:03 +0000 | [diff] [blame] | 70 | "LD_PRELOAD"; |
| 71 | #elif defined(VGO_darwin) |
| 72 | "DYLD_INSERT_LIBRARIES"; |
| 73 | #else |
| 74 | # error Unknown OS |
| 75 | #endif |
| 76 | |
njn | f39e9a3 | 2005-06-12 02:43:17 +0000 | [diff] [blame] | 77 | /* We do getenv without libc's help by snooping around in |
| 78 | VG_(client_envp) as determined at startup time. */ |
florian | 19f91bb | 2012-11-10 22:29:54 +0000 | [diff] [blame] | 79 | HChar *VG_(getenv)(const HChar *varname) |
jsgf | 855d93d | 2003-10-13 22:26:55 +0000 | [diff] [blame] | 80 | { |
njn | f39e9a3 | 2005-06-12 02:43:17 +0000 | [diff] [blame] | 81 | Int i, n; |
sewardj | 198f34f | 2007-07-09 23:13:07 +0000 | [diff] [blame] | 82 | vg_assert( VG_(client_envp) ); |
njn | f39e9a3 | 2005-06-12 02:43:17 +0000 | [diff] [blame] | 83 | n = VG_(strlen)(varname); |
| 84 | for (i = 0; VG_(client_envp)[i] != NULL; i++) { |
florian | 19f91bb | 2012-11-10 22:29:54 +0000 | [diff] [blame] | 85 | HChar* s = VG_(client_envp)[i]; |
njn | f39e9a3 | 2005-06-12 02:43:17 +0000 | [diff] [blame] | 86 | if (VG_(strncmp)(varname, s, n) == 0 && s[n] == '=') { |
| 87 | return & s[n+1]; |
thughes | 8ef6d96 | 2004-10-16 10:46:01 +0000 | [diff] [blame] | 88 | } |
| 89 | } |
njn | f39e9a3 | 2005-06-12 02:43:17 +0000 | [diff] [blame] | 90 | return NULL; |
nethercote | ff9721d | 2004-01-26 17:10:01 +0000 | [diff] [blame] | 91 | } |
| 92 | |
florian | 19f91bb | 2012-11-10 22:29:54 +0000 | [diff] [blame] | 93 | void VG_(env_unsetenv) ( HChar **env, const HChar *varname ) |
fitzhardinge | 98abfc7 | 2003-12-16 02:05:15 +0000 | [diff] [blame] | 94 | { |
florian | 19f91bb | 2012-11-10 22:29:54 +0000 | [diff] [blame] | 95 | HChar **from, **to; |
sewardj | dc41309 | 2011-05-04 09:01:58 +0000 | [diff] [blame] | 96 | vg_assert(env); |
| 97 | vg_assert(varname); |
| 98 | to = NULL; |
fitzhardinge | 98abfc7 | 2003-12-16 02:05:15 +0000 | [diff] [blame] | 99 | Int len = VG_(strlen)(varname); |
| 100 | |
sewardj | 45f4e7c | 2005-09-27 19:20:21 +0000 | [diff] [blame] | 101 | for (from = to = env; from && *from; from++) { |
fitzhardinge | 98abfc7 | 2003-12-16 02:05:15 +0000 | [diff] [blame] | 102 | if (!(VG_(strncmp)(varname, *from, len) == 0 && (*from)[len] == '=')) { |
| 103 | *to = *from; |
| 104 | to++; |
| 105 | } |
| 106 | } |
| 107 | *to = *from; |
| 108 | } |
| 109 | |
| 110 | /* set the environment; returns the old env if a new one was allocated */ |
florian | 19f91bb | 2012-11-10 22:29:54 +0000 | [diff] [blame] | 111 | HChar **VG_(env_setenv) ( HChar ***envp, const HChar* varname, |
| 112 | const HChar *val ) |
fitzhardinge | 98abfc7 | 2003-12-16 02:05:15 +0000 | [diff] [blame] | 113 | { |
florian | 19f91bb | 2012-11-10 22:29:54 +0000 | [diff] [blame] | 114 | HChar **env = (*envp); |
| 115 | HChar **cpp; |
fitzhardinge | 98abfc7 | 2003-12-16 02:05:15 +0000 | [diff] [blame] | 116 | Int len = VG_(strlen)(varname); |
florian | 19f91bb | 2012-11-10 22:29:54 +0000 | [diff] [blame] | 117 | HChar *valstr = VG_(arena_malloc)(VG_AR_CORE, "libcproc.es.1", |
| 118 | len + VG_(strlen)(val) + 2); |
| 119 | HChar **oldenv = NULL; |
fitzhardinge | 98abfc7 | 2003-12-16 02:05:15 +0000 | [diff] [blame] | 120 | |
| 121 | VG_(sprintf)(valstr, "%s=%s", varname, val); |
| 122 | |
sewardj | 45f4e7c | 2005-09-27 19:20:21 +0000 | [diff] [blame] | 123 | for (cpp = env; cpp && *cpp; cpp++) { |
fitzhardinge | 98abfc7 | 2003-12-16 02:05:15 +0000 | [diff] [blame] | 124 | if (VG_(strncmp)(varname, *cpp, len) == 0 && (*cpp)[len] == '=') { |
| 125 | *cpp = valstr; |
| 126 | return oldenv; |
| 127 | } |
| 128 | } |
| 129 | |
| 130 | if (env == NULL) { |
florian | 19f91bb | 2012-11-10 22:29:54 +0000 | [diff] [blame] | 131 | env = VG_(arena_malloc)(VG_AR_CORE, "libcproc.es.2", sizeof(HChar *) * 2); |
fitzhardinge | 98abfc7 | 2003-12-16 02:05:15 +0000 | [diff] [blame] | 132 | env[0] = valstr; |
| 133 | env[1] = NULL; |
| 134 | |
| 135 | *envp = env; |
| 136 | |
| 137 | } else { |
| 138 | Int envlen = (cpp-env) + 2; |
florian | 19f91bb | 2012-11-10 22:29:54 +0000 | [diff] [blame] | 139 | HChar **newenv = VG_(arena_malloc)(VG_AR_CORE, "libcproc.es.3", |
| 140 | envlen * sizeof(HChar *)); |
fitzhardinge | 98abfc7 | 2003-12-16 02:05:15 +0000 | [diff] [blame] | 141 | |
sewardj | 45f4e7c | 2005-09-27 19:20:21 +0000 | [diff] [blame] | 142 | for (cpp = newenv; *env; ) |
fitzhardinge | 98abfc7 | 2003-12-16 02:05:15 +0000 | [diff] [blame] | 143 | *cpp++ = *env++; |
| 144 | *cpp++ = valstr; |
| 145 | *cpp++ = NULL; |
| 146 | |
| 147 | oldenv = *envp; |
| 148 | |
| 149 | *envp = newenv; |
| 150 | } |
| 151 | |
| 152 | return oldenv; |
| 153 | } |
| 154 | |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 155 | |
nethercote | 60a96c5 | 2004-08-03 13:08:31 +0000 | [diff] [blame] | 156 | /* Walk through a colon-separated environment variable, and remove the |
| 157 | entries which match remove_pattern. It slides everything down over |
| 158 | the removed entries, and pads the remaining space with '\0'. It |
| 159 | modifies the entries in place (in the client address space), but it |
| 160 | shouldn't matter too much, since we only do this just before an |
| 161 | execve(). |
| 162 | |
| 163 | This is also careful to mop up any excess ':'s, since empty strings |
| 164 | delimited by ':' are considered to be '.' in a path. |
| 165 | */ |
florian | 19f91bb | 2012-11-10 22:29:54 +0000 | [diff] [blame] | 166 | static void mash_colon_env(HChar *varp, const HChar *remove_pattern) |
nethercote | 60a96c5 | 2004-08-03 13:08:31 +0000 | [diff] [blame] | 167 | { |
florian | 19f91bb | 2012-11-10 22:29:54 +0000 | [diff] [blame] | 168 | HChar *const start = varp; |
| 169 | HChar *entry_start = varp; |
| 170 | HChar *output = varp; |
nethercote | 60a96c5 | 2004-08-03 13:08:31 +0000 | [diff] [blame] | 171 | |
| 172 | if (varp == NULL) |
| 173 | return; |
| 174 | |
| 175 | while(*varp) { |
| 176 | if (*varp == ':') { |
florian | 19f91bb | 2012-11-10 22:29:54 +0000 | [diff] [blame] | 177 | HChar prev; |
nethercote | 60a96c5 | 2004-08-03 13:08:31 +0000 | [diff] [blame] | 178 | Bool match; |
| 179 | |
| 180 | /* This is a bit subtle: we want to match against the entry |
| 181 | we just copied, because it may have overlapped with |
| 182 | itself, junking the original. */ |
| 183 | |
| 184 | prev = *output; |
| 185 | *output = '\0'; |
| 186 | |
| 187 | match = VG_(string_match)(remove_pattern, entry_start); |
| 188 | |
| 189 | *output = prev; |
| 190 | |
| 191 | if (match) { |
| 192 | output = entry_start; |
| 193 | varp++; /* skip ':' after removed entry */ |
| 194 | } else |
| 195 | entry_start = output+1; /* entry starts after ':' */ |
| 196 | } |
| 197 | |
tom | 149ede9 | 2010-06-15 12:49:07 +0000 | [diff] [blame] | 198 | if (*varp) |
| 199 | *output++ = *varp++; |
nethercote | 60a96c5 | 2004-08-03 13:08:31 +0000 | [diff] [blame] | 200 | } |
| 201 | |
tom | 149ede9 | 2010-06-15 12:49:07 +0000 | [diff] [blame] | 202 | /* make sure last entry is nul terminated */ |
| 203 | *output = '\0'; |
| 204 | |
nethercote | 60a96c5 | 2004-08-03 13:08:31 +0000 | [diff] [blame] | 205 | /* match against the last entry */ |
| 206 | if (VG_(string_match)(remove_pattern, entry_start)) { |
| 207 | output = entry_start; |
| 208 | if (output > start) { |
| 209 | /* remove trailing ':' */ |
| 210 | output--; |
| 211 | vg_assert(*output == ':'); |
| 212 | } |
| 213 | } |
| 214 | |
| 215 | /* pad out the left-overs with '\0' */ |
| 216 | while(output < varp) |
| 217 | *output++ = '\0'; |
| 218 | } |
| 219 | |
| 220 | |
| 221 | // Removes all the Valgrind-added stuff from the passed environment. Used |
| 222 | // when starting child processes, so they don't see that added stuff. |
florian | 19f91bb | 2012-11-10 22:29:54 +0000 | [diff] [blame] | 223 | void VG_(env_remove_valgrind_env_stuff)(HChar** envp) |
nethercote | 60a96c5 | 2004-08-03 13:08:31 +0000 | [diff] [blame] | 224 | { |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 225 | |
| 226 | #if defined(VGO_darwin) |
| 227 | |
| 228 | // Environment cleanup is also handled during parent launch |
| 229 | // in vg_preloaded.c:vg_cleanup_env(). |
| 230 | |
| 231 | #endif |
| 232 | |
nethercote | 60a96c5 | 2004-08-03 13:08:31 +0000 | [diff] [blame] | 233 | Int i; |
florian | 19f91bb | 2012-11-10 22:29:54 +0000 | [diff] [blame] | 234 | HChar* ld_preload_str = NULL; |
| 235 | HChar* ld_library_path_str = NULL; |
| 236 | HChar* dyld_insert_libraries_str = NULL; |
| 237 | HChar* buf; |
nethercote | 60a96c5 | 2004-08-03 13:08:31 +0000 | [diff] [blame] | 238 | |
| 239 | // Find LD_* variables |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 240 | // DDD: should probably conditionally compiled some of this: |
| 241 | // - LD_LIBRARY_PATH is universal? |
| 242 | // - LD_PRELOAD is on Linux, not on Darwin, not sure about AIX |
| 243 | // - DYLD_INSERT_LIBRARIES and DYLD_SHARED_REGION are Darwin-only |
nethercote | 60a96c5 | 2004-08-03 13:08:31 +0000 | [diff] [blame] | 244 | for (i = 0; envp[i] != NULL; i++) { |
philippe | 2aeaf8e | 2011-12-11 16:29:43 +0000 | [diff] [blame] | 245 | if (VG_(strncmp)(envp[i], "LD_PRELOAD=", 11) == 0) { |
| 246 | envp[i] = VG_(arena_strdup)(VG_AR_CORE, "libcproc.erves.1", envp[i]); |
| 247 | ld_preload_str = &envp[i][11]; |
| 248 | } |
| 249 | if (VG_(strncmp)(envp[i], "LD_LIBRARY_PATH=", 16) == 0) { |
| 250 | envp[i] = VG_(arena_strdup)(VG_AR_CORE, "libcproc.erves.2", envp[i]); |
| 251 | ld_library_path_str = &envp[i][16]; |
| 252 | } |
| 253 | if (VG_(strncmp)(envp[i], "DYLD_INSERT_LIBRARIES=", 22) == 0) { |
| 254 | envp[i] = VG_(arena_strdup)(VG_AR_CORE, "libcproc.erves.3", envp[i]); |
| 255 | dyld_insert_libraries_str = &envp[i][22]; |
| 256 | } |
nethercote | 60a96c5 | 2004-08-03 13:08:31 +0000 | [diff] [blame] | 257 | } |
| 258 | |
tom | be2fe8d | 2011-08-23 10:11:02 +0000 | [diff] [blame] | 259 | buf = VG_(arena_malloc)(VG_AR_CORE, "libcproc.erves.4", |
sewardj | 9c606bd | 2008-09-18 18:12:50 +0000 | [diff] [blame] | 260 | VG_(strlen)(VG_(libdir)) + 20); |
nethercote | 60a96c5 | 2004-08-03 13:08:31 +0000 | [diff] [blame] | 261 | |
| 262 | // Remove Valgrind-specific entries from LD_*. |
nethercote | 60a96c5 | 2004-08-03 13:08:31 +0000 | [diff] [blame] | 263 | VG_(sprintf)(buf, "%s*/vgpreload_*.so", VG_(libdir)); |
| 264 | mash_colon_env(ld_preload_str, buf); |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 265 | mash_colon_env(dyld_insert_libraries_str, buf); |
nethercote | 60a96c5 | 2004-08-03 13:08:31 +0000 | [diff] [blame] | 266 | VG_(sprintf)(buf, "%s*", VG_(libdir)); |
| 267 | mash_colon_env(ld_library_path_str, buf); |
| 268 | |
sewardj | 45f4e7c | 2005-09-27 19:20:21 +0000 | [diff] [blame] | 269 | // Remove VALGRIND_LAUNCHER variable. |
| 270 | VG_(env_unsetenv)(envp, VALGRIND_LAUNCHER); |
nethercote | 60a96c5 | 2004-08-03 13:08:31 +0000 | [diff] [blame] | 271 | |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 272 | // Remove DYLD_SHARED_REGION variable. |
| 273 | VG_(env_unsetenv)(envp, "DYLD_SHARED_REGION"); |
| 274 | |
nethercote | 60a96c5 | 2004-08-03 13:08:31 +0000 | [diff] [blame] | 275 | // XXX if variable becomes empty, remove it completely? |
| 276 | |
| 277 | VG_(arena_free)(VG_AR_CORE, buf); |
| 278 | } |
| 279 | |
njn | f39e9a3 | 2005-06-12 02:43:17 +0000 | [diff] [blame] | 280 | /* --------------------------------------------------------------------- |
| 281 | Various important syscall wrappers |
| 282 | ------------------------------------------------------------------ */ |
| 283 | |
| 284 | Int VG_(waitpid)(Int pid, Int *status, Int options) |
| 285 | { |
sewardj | d470bfc | 2006-10-17 02:16:44 +0000 | [diff] [blame] | 286 | # if defined(VGO_linux) |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 287 | SysRes res = VG_(do_syscall4)(__NR_wait4, |
| 288 | pid, (UWord)status, options, 0); |
| 289 | return sr_isError(res) ? -1 : sr_Res(res); |
| 290 | # elif defined(VGO_darwin) |
| 291 | SysRes res = VG_(do_syscall4)(__NR_wait4_nocancel, |
| 292 | pid, (UWord)status, options, 0); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 293 | return sr_isError(res) ? -1 : sr_Res(res); |
sewardj | d470bfc | 2006-10-17 02:16:44 +0000 | [diff] [blame] | 294 | # else |
| 295 | # error Unknown OS |
| 296 | # endif |
njn | f39e9a3 | 2005-06-12 02:43:17 +0000 | [diff] [blame] | 297 | } |
| 298 | |
njn | f39e9a3 | 2005-06-12 02:43:17 +0000 | [diff] [blame] | 299 | /* clone the environment */ |
florian | 19f91bb | 2012-11-10 22:29:54 +0000 | [diff] [blame] | 300 | HChar **VG_(env_clone) ( HChar **oldenv ) |
njn | f39e9a3 | 2005-06-12 02:43:17 +0000 | [diff] [blame] | 301 | { |
florian | 19f91bb | 2012-11-10 22:29:54 +0000 | [diff] [blame] | 302 | HChar **oldenvp; |
| 303 | HChar **newenvp; |
| 304 | HChar **newenv; |
njn | f39e9a3 | 2005-06-12 02:43:17 +0000 | [diff] [blame] | 305 | Int envlen; |
| 306 | |
sewardj | dc41309 | 2011-05-04 09:01:58 +0000 | [diff] [blame] | 307 | vg_assert(oldenv); |
njn | f39e9a3 | 2005-06-12 02:43:17 +0000 | [diff] [blame] | 308 | for (oldenvp = oldenv; oldenvp && *oldenvp; oldenvp++); |
| 309 | |
| 310 | envlen = oldenvp - oldenv + 1; |
| 311 | |
sewardj | 9c606bd | 2008-09-18 18:12:50 +0000 | [diff] [blame] | 312 | newenv = VG_(arena_malloc)(VG_AR_CORE, "libcproc.ec.1", |
florian | 19f91bb | 2012-11-10 22:29:54 +0000 | [diff] [blame] | 313 | envlen * sizeof(HChar *)); |
njn | f39e9a3 | 2005-06-12 02:43:17 +0000 | [diff] [blame] | 314 | |
| 315 | oldenvp = oldenv; |
| 316 | newenvp = newenv; |
| 317 | |
| 318 | while (oldenvp && *oldenvp) { |
| 319 | *newenvp++ = *oldenvp++; |
| 320 | } |
| 321 | |
| 322 | *newenvp = *oldenvp; |
| 323 | |
| 324 | return newenv; |
| 325 | } |
| 326 | |
florian | 19f91bb | 2012-11-10 22:29:54 +0000 | [diff] [blame] | 327 | void VG_(execv) ( const HChar* filename, HChar** argv ) |
njn | e9ba34a | 2008-10-13 04:19:15 +0000 | [diff] [blame] | 328 | { |
florian | 19f91bb | 2012-11-10 22:29:54 +0000 | [diff] [blame] | 329 | HChar** envp; |
njn | e9ba34a | 2008-10-13 04:19:15 +0000 | [diff] [blame] | 330 | SysRes res; |
| 331 | |
| 332 | /* restore the DATA rlimit for the child */ |
| 333 | VG_(setrlimit)(VKI_RLIMIT_DATA, &VG_(client_rlimit_data)); |
| 334 | |
| 335 | envp = VG_(env_clone)(VG_(client_envp)); |
| 336 | VG_(env_remove_valgrind_env_stuff)( envp ); |
| 337 | |
| 338 | res = VG_(do_syscall3)(__NR_execve, |
| 339 | (UWord)filename, (UWord)argv, (UWord)envp); |
| 340 | |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 341 | VG_(printf)("EXEC failed, errno = %lld\n", (Long)sr_Err(res)); |
njn | e9ba34a | 2008-10-13 04:19:15 +0000 | [diff] [blame] | 342 | } |
| 343 | |
sewardj | e6a2524 | 2002-04-21 22:03:07 +0000 | [diff] [blame] | 344 | /* Return -1 if error, else 0. NOTE does not indicate return code of |
| 345 | child! */ |
florian | 19f91bb | 2012-11-10 22:29:54 +0000 | [diff] [blame] | 346 | Int VG_(system) ( const HChar* cmd ) |
sewardj | e6a2524 | 2002-04-21 22:03:07 +0000 | [diff] [blame] | 347 | { |
njn | e9ba34a | 2008-10-13 04:19:15 +0000 | [diff] [blame] | 348 | Int pid; |
sewardj | e6a2524 | 2002-04-21 22:03:07 +0000 | [diff] [blame] | 349 | if (cmd == NULL) |
| 350 | return 1; |
njn | e9ba34a | 2008-10-13 04:19:15 +0000 | [diff] [blame] | 351 | pid = VG_(fork)(); |
| 352 | if (pid < 0) |
sewardj | e6a2524 | 2002-04-21 22:03:07 +0000 | [diff] [blame] | 353 | return -1; |
| 354 | if (pid == 0) { |
| 355 | /* child */ |
florian | 19f91bb | 2012-11-10 22:29:54 +0000 | [diff] [blame] | 356 | const HChar* argv[4] = { "/bin/sh", "-c", cmd, 0 }; |
florian | 654b542 | 2012-11-18 00:36:15 +0000 | [diff] [blame] | 357 | VG_(execv)(argv[0], (HChar **)argv); |
nethercote | ff9721d | 2004-01-26 17:10:01 +0000 | [diff] [blame] | 358 | |
florian | 654b542 | 2012-11-18 00:36:15 +0000 | [diff] [blame] | 359 | /* If we're still alive here, execv failed. */ |
fitzhardinge | abab839 | 2004-03-02 21:38:51 +0000 | [diff] [blame] | 360 | VG_(exit)(1); |
sewardj | e6a2524 | 2002-04-21 22:03:07 +0000 | [diff] [blame] | 361 | } else { |
| 362 | /* parent */ |
sewardj | d470bfc | 2006-10-17 02:16:44 +0000 | [diff] [blame] | 363 | /* We have to set SIGCHLD to its default behaviour in order that |
| 364 | VG_(waitpid) works (at least on AIX). According to the Linux |
| 365 | man page for waitpid: |
| 366 | |
| 367 | POSIX.1-2001 specifies that if the disposition of SIGCHLD is |
| 368 | set to SIG_IGN or the SA_NOCLDWAIT flag is set for SIGCHLD |
| 369 | (see sigaction(2)), then children that terminate do not |
| 370 | become zombies and a call to wait() or waitpid() will block |
| 371 | until all children have terminated, and then fail with errno |
| 372 | set to ECHILD. (The original POSIX standard left the |
| 373 | behaviour of setting SIGCHLD to SIG_IGN unspecified.) |
| 374 | */ |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 375 | Int ir, zzz; |
| 376 | vki_sigaction_toK_t sa, sa2; |
| 377 | vki_sigaction_fromK_t saved_sa; |
| 378 | VG_(memset)( &sa, 0, sizeof(sa) ); |
sewardj | d470bfc | 2006-10-17 02:16:44 +0000 | [diff] [blame] | 379 | VG_(sigemptyset)(&sa.sa_mask); |
| 380 | sa.ksa_handler = VKI_SIG_DFL; |
| 381 | sa.sa_flags = 0; |
| 382 | ir = VG_(sigaction)(VKI_SIGCHLD, &sa, &saved_sa); |
| 383 | vg_assert(ir == 0); |
| 384 | |
| 385 | zzz = VG_(waitpid)(pid, NULL, 0); |
| 386 | |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 387 | VG_(convert_sigaction_fromK_to_toK)( &saved_sa, &sa2 ); |
| 388 | ir = VG_(sigaction)(VKI_SIGCHLD, &sa2, NULL); |
sewardj | d470bfc | 2006-10-17 02:16:44 +0000 | [diff] [blame] | 389 | vg_assert(ir == 0); |
sewardj | a8d8e23 | 2005-06-07 20:04:56 +0000 | [diff] [blame] | 390 | return zzz == -1 ? -1 : 0; |
sewardj | e6a2524 | 2002-04-21 22:03:07 +0000 | [diff] [blame] | 391 | } |
| 392 | } |
| 393 | |
njn | f39e9a3 | 2005-06-12 02:43:17 +0000 | [diff] [blame] | 394 | /* --------------------------------------------------------------------- |
| 395 | Resource limits |
| 396 | ------------------------------------------------------------------ */ |
| 397 | |
njn | f39e9a3 | 2005-06-12 02:43:17 +0000 | [diff] [blame] | 398 | /* Support for getrlimit. */ |
| 399 | Int VG_(getrlimit) (Int resource, struct vki_rlimit *rlim) |
| 400 | { |
| 401 | SysRes res = VG_(mk_SysRes_Error)(VKI_ENOSYS); |
| 402 | /* res = getrlimit( resource, rlim ); */ |
| 403 | # ifdef __NR_ugetrlimit |
| 404 | res = VG_(do_syscall2)(__NR_ugetrlimit, resource, (UWord)rlim); |
| 405 | # endif |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 406 | if (sr_isError(res) && sr_Err(res) == VKI_ENOSYS) |
njn | f39e9a3 | 2005-06-12 02:43:17 +0000 | [diff] [blame] | 407 | res = VG_(do_syscall2)(__NR_getrlimit, resource, (UWord)rlim); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 408 | return sr_isError(res) ? -1 : sr_Res(res); |
njn | f39e9a3 | 2005-06-12 02:43:17 +0000 | [diff] [blame] | 409 | } |
| 410 | |
| 411 | |
| 412 | /* Support for setrlimit. */ |
| 413 | Int VG_(setrlimit) (Int resource, const struct vki_rlimit *rlim) |
| 414 | { |
| 415 | SysRes res; |
| 416 | /* res = setrlimit( resource, rlim ); */ |
| 417 | res = VG_(do_syscall2)(__NR_setrlimit, resource, (UWord)rlim); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 418 | return sr_isError(res) ? -1 : sr_Res(res); |
njn | f39e9a3 | 2005-06-12 02:43:17 +0000 | [diff] [blame] | 419 | } |
sewardj | e6a2524 | 2002-04-21 22:03:07 +0000 | [diff] [blame] | 420 | |
sewardj | 3b29048 | 2011-05-06 21:02:55 +0000 | [diff] [blame] | 421 | /* Support for prctl. */ |
| 422 | Int VG_(prctl) (Int option, |
| 423 | ULong arg2, ULong arg3, ULong arg4, ULong arg5) |
| 424 | { |
| 425 | SysRes res = VG_(mk_SysRes_Error)(VKI_ENOSYS); |
| 426 | # if defined(VGO_linux) |
| 427 | /* res = prctl( option, arg2, arg3, arg4, arg5 ); */ |
| 428 | res = VG_(do_syscall5)(__NR_prctl, (UWord) option, |
| 429 | (UWord) arg2, (UWord) arg3, (UWord) arg4, |
| 430 | (UWord) arg5); |
| 431 | # endif |
| 432 | |
| 433 | return sr_isError(res) ? -1 : sr_Res(res); |
| 434 | } |
| 435 | |
sewardj | de4a1d0 | 2002-03-22 01:27:54 +0000 | [diff] [blame] | 436 | /* --------------------------------------------------------------------- |
njn | f39e9a3 | 2005-06-12 02:43:17 +0000 | [diff] [blame] | 437 | pids, etc |
| 438 | ------------------------------------------------------------------ */ |
| 439 | |
| 440 | Int VG_(gettid)(void) |
| 441 | { |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 442 | # if defined(VGO_linux) |
njn | f39e9a3 | 2005-06-12 02:43:17 +0000 | [diff] [blame] | 443 | SysRes res = VG_(do_syscall0)(__NR_gettid); |
| 444 | |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 445 | if (sr_isError(res) && sr_Res(res) == VKI_ENOSYS) { |
florian | 19f91bb | 2012-11-10 22:29:54 +0000 | [diff] [blame] | 446 | HChar pid[16]; |
njn | f39e9a3 | 2005-06-12 02:43:17 +0000 | [diff] [blame] | 447 | /* |
| 448 | * The gettid system call does not exist. The obvious assumption |
| 449 | * to make at this point would be that we are running on an older |
| 450 | * system where the getpid system call actually returns the ID of |
| 451 | * the current thread. |
| 452 | * |
| 453 | * Unfortunately it seems that there are some systems with a kernel |
| 454 | * where getpid has been changed to return the ID of the thread group |
| 455 | * leader but where the gettid system call has not yet been added. |
| 456 | * |
| 457 | * So instead of calling getpid here we use readlink to see where |
| 458 | * the /proc/self link is pointing... |
| 459 | */ |
| 460 | |
| 461 | res = VG_(do_syscall3)(__NR_readlink, (UWord)"/proc/self", |
| 462 | (UWord)pid, sizeof(pid)); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 463 | if (!sr_isError(res) && sr_Res(res) > 0) { |
florian | 19f91bb | 2012-11-10 22:29:54 +0000 | [diff] [blame] | 464 | HChar* s; |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 465 | pid[sr_Res(res)] = '\0'; |
| 466 | res = VG_(mk_SysRes_Success)( VG_(strtoll10)(pid, &s) ); |
njn | 83df0b6 | 2009-02-25 01:01:05 +0000 | [diff] [blame] | 467 | if (*s != '\0') { |
| 468 | VG_(message)(Vg_DebugMsg, |
sewardj | 738856f | 2009-07-15 14:48:32 +0000 | [diff] [blame] | 469 | "Warning: invalid file name linked to by /proc/self: %s\n", |
| 470 | pid); |
njn | 83df0b6 | 2009-02-25 01:01:05 +0000 | [diff] [blame] | 471 | } |
njn | f39e9a3 | 2005-06-12 02:43:17 +0000 | [diff] [blame] | 472 | } |
| 473 | } |
| 474 | |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 475 | return sr_Res(res); |
| 476 | |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 477 | # elif defined(VGO_darwin) |
| 478 | // Darwin's gettid syscall is something else. |
| 479 | // Use Mach thread ports for lwpid instead. |
| 480 | return mach_thread_self(); |
| 481 | |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 482 | # else |
| 483 | # error "Unknown OS" |
sewardj | d470bfc | 2006-10-17 02:16:44 +0000 | [diff] [blame] | 484 | # endif |
njn | f39e9a3 | 2005-06-12 02:43:17 +0000 | [diff] [blame] | 485 | } |
| 486 | |
| 487 | /* You'd be amazed how many places need to know the current pid. */ |
| 488 | Int VG_(getpid) ( void ) |
| 489 | { |
| 490 | /* ASSUMES SYSCALL ALWAYS SUCCEEDS */ |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 491 | return sr_Res( VG_(do_syscall0)(__NR_getpid) ); |
njn | f39e9a3 | 2005-06-12 02:43:17 +0000 | [diff] [blame] | 492 | } |
| 493 | |
| 494 | Int VG_(getpgrp) ( void ) |
| 495 | { |
| 496 | /* ASSUMES SYSCALL ALWAYS SUCCEEDS */ |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 497 | return sr_Res( VG_(do_syscall0)(__NR_getpgrp) ); |
njn | f39e9a3 | 2005-06-12 02:43:17 +0000 | [diff] [blame] | 498 | } |
| 499 | |
| 500 | Int VG_(getppid) ( void ) |
| 501 | { |
| 502 | /* ASSUMES SYSCALL ALWAYS SUCCEEDS */ |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 503 | return sr_Res( VG_(do_syscall0)(__NR_getppid) ); |
njn | f39e9a3 | 2005-06-12 02:43:17 +0000 | [diff] [blame] | 504 | } |
| 505 | |
sewardj | 45f4e7c | 2005-09-27 19:20:21 +0000 | [diff] [blame] | 506 | Int VG_(geteuid) ( void ) |
njn | f39e9a3 | 2005-06-12 02:43:17 +0000 | [diff] [blame] | 507 | { |
| 508 | /* ASSUMES SYSCALL ALWAYS SUCCEEDS */ |
sewardj | 6e9de46 | 2011-06-28 07:25:29 +0000 | [diff] [blame] | 509 | # if defined(__NR_geteuid32) |
njn | a8b1c48 | 2007-10-23 22:26:12 +0000 | [diff] [blame] | 510 | // We use the 32-bit version if it's supported. Otherwise, IDs greater |
| 511 | // than 65536 cause problems, as bug #151209 showed. |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 512 | return sr_Res( VG_(do_syscall0)(__NR_geteuid32) ); |
sewardj | d470bfc | 2006-10-17 02:16:44 +0000 | [diff] [blame] | 513 | # else |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 514 | return sr_Res( VG_(do_syscall0)(__NR_geteuid) ); |
sewardj | d470bfc | 2006-10-17 02:16:44 +0000 | [diff] [blame] | 515 | # endif |
sewardj | 45f4e7c | 2005-09-27 19:20:21 +0000 | [diff] [blame] | 516 | } |
| 517 | |
| 518 | Int VG_(getegid) ( void ) |
| 519 | { |
| 520 | /* ASSUMES SYSCALL ALWAYS SUCCEEDS */ |
sewardj | 6e9de46 | 2011-06-28 07:25:29 +0000 | [diff] [blame] | 521 | # if defined(__NR_getegid32) |
njn | a8b1c48 | 2007-10-23 22:26:12 +0000 | [diff] [blame] | 522 | // We use the 32-bit version if it's supported. Otherwise, IDs greater |
| 523 | // than 65536 cause problems, as bug #151209 showed. |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 524 | return sr_Res( VG_(do_syscall0)(__NR_getegid32) ); |
sewardj | d470bfc | 2006-10-17 02:16:44 +0000 | [diff] [blame] | 525 | # else |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 526 | return sr_Res( VG_(do_syscall0)(__NR_getegid) ); |
sewardj | d470bfc | 2006-10-17 02:16:44 +0000 | [diff] [blame] | 527 | # endif |
sewardj | 45f4e7c | 2005-09-27 19:20:21 +0000 | [diff] [blame] | 528 | } |
| 529 | |
| 530 | /* Get supplementary groups into list[0 .. size-1]. Returns the |
| 531 | number of groups written, or -1 if error. Note that in order to be |
| 532 | portable, the groups are 32-bit unsigned ints regardless of the |
| 533 | platform. */ |
| 534 | Int VG_(getgroups)( Int size, UInt* list ) |
| 535 | { |
sewardj | a48a493 | 2005-09-29 11:09:56 +0000 | [diff] [blame] | 536 | # if defined(VGP_x86_linux) || defined(VGP_ppc32_linux) |
sewardj | 45f4e7c | 2005-09-27 19:20:21 +0000 | [diff] [blame] | 537 | Int i; |
| 538 | SysRes sres; |
sewardj | 3ae3dd3 | 2005-12-27 02:08:03 +0000 | [diff] [blame] | 539 | UShort list16[64]; |
sewardj | 45f4e7c | 2005-09-27 19:20:21 +0000 | [diff] [blame] | 540 | if (size < 0) return -1; |
sewardj | 3ae3dd3 | 2005-12-27 02:08:03 +0000 | [diff] [blame] | 541 | if (size > 64) size = 64; |
sewardj | 45f4e7c | 2005-09-27 19:20:21 +0000 | [diff] [blame] | 542 | sres = VG_(do_syscall2)(__NR_getgroups, size, (Addr)list16); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 543 | if (sr_isError(sres)) |
sewardj | 45f4e7c | 2005-09-27 19:20:21 +0000 | [diff] [blame] | 544 | return -1; |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 545 | if (sr_Res(sres) > size) |
sewardj | 45f4e7c | 2005-09-27 19:20:21 +0000 | [diff] [blame] | 546 | return -1; |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 547 | for (i = 0; i < sr_Res(sres); i++) |
sewardj | 45f4e7c | 2005-09-27 19:20:21 +0000 | [diff] [blame] | 548 | list[i] = (UInt)list16[i]; |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 549 | return sr_Res(sres); |
sewardj | 45f4e7c | 2005-09-27 19:20:21 +0000 | [diff] [blame] | 550 | |
sewardj | 59570ff | 2010-01-01 11:59:33 +0000 | [diff] [blame] | 551 | # elif defined(VGP_amd64_linux) || defined(VGP_ppc64_linux) \ |
| 552 | || defined(VGP_arm_linux) \ |
sewardj | 5db1540 | 2012-06-07 09:13:21 +0000 | [diff] [blame] | 553 | || defined(VGO_darwin) || defined(VGP_s390x_linux) \ |
| 554 | || defined(VGP_mips32_linux) |
sewardj | 45f4e7c | 2005-09-27 19:20:21 +0000 | [diff] [blame] | 555 | SysRes sres; |
| 556 | sres = VG_(do_syscall2)(__NR_getgroups, size, (Addr)list); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 557 | if (sr_isError(sres)) |
sewardj | 45f4e7c | 2005-09-27 19:20:21 +0000 | [diff] [blame] | 558 | return -1; |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 559 | return sr_Res(sres); |
sewardj | 45f4e7c | 2005-09-27 19:20:21 +0000 | [diff] [blame] | 560 | |
| 561 | # else |
| 562 | # error "VG_(getgroups): needs implementation on this platform" |
| 563 | # endif |
| 564 | } |
| 565 | |
| 566 | /* --------------------------------------------------------------------- |
| 567 | Process tracing |
| 568 | ------------------------------------------------------------------ */ |
| 569 | |
| 570 | Int VG_(ptrace) ( Int request, Int pid, void *addr, void *data ) |
| 571 | { |
| 572 | SysRes res; |
| 573 | res = VG_(do_syscall4)(__NR_ptrace, request, pid, (UWord)addr, (UWord)data); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 574 | if (sr_isError(res)) |
sewardj | 45f4e7c | 2005-09-27 19:20:21 +0000 | [diff] [blame] | 575 | return -1; |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 576 | return sr_Res(res); |
sewardj | 45f4e7c | 2005-09-27 19:20:21 +0000 | [diff] [blame] | 577 | } |
| 578 | |
| 579 | /* --------------------------------------------------------------------- |
| 580 | Fork |
| 581 | ------------------------------------------------------------------ */ |
| 582 | |
| 583 | Int VG_(fork) ( void ) |
| 584 | { |
sewardj | 6e9de46 | 2011-06-28 07:25:29 +0000 | [diff] [blame] | 585 | # if defined(VGO_linux) |
sewardj | 45f4e7c | 2005-09-27 19:20:21 +0000 | [diff] [blame] | 586 | SysRes res; |
| 587 | res = VG_(do_syscall0)(__NR_fork); |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 588 | if (sr_isError(res)) |
sewardj | 45f4e7c | 2005-09-27 19:20:21 +0000 | [diff] [blame] | 589 | return -1; |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 590 | return sr_Res(res); |
| 591 | |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 592 | # elif defined(VGO_darwin) |
| 593 | SysRes res; |
| 594 | res = VG_(do_syscall0)(__NR_fork); /* __NR_fork is UX64 */ |
| 595 | if (sr_isError(res)) |
| 596 | return -1; |
| 597 | /* on success: wLO = child pid; wHI = 1 for child, 0 for parent */ |
| 598 | if (sr_ResHI(res) != 0) { |
| 599 | return 0; /* this is child: return 0 instead of child pid */ |
| 600 | } |
| 601 | return sr_Res(res); |
| 602 | |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 603 | # else |
| 604 | # error "Unknown OS" |
| 605 | # endif |
njn | f39e9a3 | 2005-06-12 02:43:17 +0000 | [diff] [blame] | 606 | } |
| 607 | |
| 608 | /* --------------------------------------------------------------------- |
| 609 | Timing stuff |
sewardj | 5f07b66 | 2002-04-23 16:52:51 +0000 | [diff] [blame] | 610 | ------------------------------------------------------------------ */ |
| 611 | |
sewardj | 5f07b66 | 2002-04-23 16:52:51 +0000 | [diff] [blame] | 612 | UInt VG_(read_millisecond_timer) ( void ) |
| 613 | { |
sewardj | d470bfc | 2006-10-17 02:16:44 +0000 | [diff] [blame] | 614 | /* 'now' and 'base' are in microseconds */ |
fitzhardinge | 426f9e6 | 2004-01-25 03:44:18 +0000 | [diff] [blame] | 615 | static ULong base = 0; |
sewardj | a8d8e23 | 2005-06-07 20:04:56 +0000 | [diff] [blame] | 616 | ULong now; |
sewardj | 5f07b66 | 2002-04-23 16:52:51 +0000 | [diff] [blame] | 617 | |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 618 | # if defined(VGO_linux) |
| 619 | { SysRes res; |
| 620 | struct vki_timespec ts_now; |
| 621 | res = VG_(do_syscall2)(__NR_clock_gettime, VKI_CLOCK_MONOTONIC, |
| 622 | (UWord)&ts_now); |
| 623 | if (sr_isError(res) == 0) { |
| 624 | now = ts_now.tv_sec * 1000000ULL + ts_now.tv_nsec / 1000; |
| 625 | } else { |
| 626 | struct vki_timeval tv_now; |
| 627 | res = VG_(do_syscall2)(__NR_gettimeofday, (UWord)&tv_now, (UWord)NULL); |
| 628 | vg_assert(! sr_isError(res)); |
| 629 | now = tv_now.tv_sec * 1000000ULL + tv_now.tv_usec; |
| 630 | } |
| 631 | } |
| 632 | |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 633 | # elif defined(VGO_darwin) |
njn | be7e31a | 2009-07-22 02:52:14 +0000 | [diff] [blame] | 634 | // Weird: it seems that gettimeofday() doesn't fill in the timeval, but |
| 635 | // rather returns the tv_sec as the low 32 bits of the result and the |
| 636 | // tv_usec as the high 32 bits of the result. (But the timeval cannot be |
| 637 | // NULL!) See bug 200990. |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 638 | { SysRes res; |
bart | 8f99259 | 2009-07-21 17:46:56 +0000 | [diff] [blame] | 639 | struct vki_timeval tv_now = { 0, 0 }; |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 640 | res = VG_(do_syscall2)(__NR_gettimeofday, (UWord)&tv_now, (UWord)NULL); |
| 641 | vg_assert(! sr_isError(res)); |
njn | be7e31a | 2009-07-22 02:52:14 +0000 | [diff] [blame] | 642 | now = sr_Res(res) * 1000000ULL + sr_ResHI(res); |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 643 | } |
| 644 | |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 645 | # else |
| 646 | # error "Unknown OS" |
sewardj | d470bfc | 2006-10-17 02:16:44 +0000 | [diff] [blame] | 647 | # endif |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 648 | |
| 649 | /* COMMON CODE */ |
fitzhardinge | 6687169 | 2004-01-25 03:32:58 +0000 | [diff] [blame] | 650 | if (base == 0) |
| 651 | base = now; |
sewardj | 5f07b66 | 2002-04-23 16:52:51 +0000 | [diff] [blame] | 652 | |
fitzhardinge | 6687169 | 2004-01-25 03:32:58 +0000 | [diff] [blame] | 653 | return (now - base) / 1000; |
sewardj | 5f07b66 | 2002-04-23 16:52:51 +0000 | [diff] [blame] | 654 | } |
| 655 | |
njn | cda2f0f | 2009-05-18 02:12:08 +0000 | [diff] [blame] | 656 | |
sewardj | 5f07b66 | 2002-04-23 16:52:51 +0000 | [diff] [blame] | 657 | /* --------------------------------------------------------------------- |
njn | e9ba34a | 2008-10-13 04:19:15 +0000 | [diff] [blame] | 658 | atfork() |
sewardj | a8d8e23 | 2005-06-07 20:04:56 +0000 | [diff] [blame] | 659 | ------------------------------------------------------------------ */ |
| 660 | |
njn | e9ba34a | 2008-10-13 04:19:15 +0000 | [diff] [blame] | 661 | struct atfork { |
| 662 | vg_atfork_t pre; |
| 663 | vg_atfork_t parent; |
| 664 | vg_atfork_t child; |
| 665 | }; |
sewardj | a8d8e23 | 2005-06-07 20:04:56 +0000 | [diff] [blame] | 666 | |
njn | e9ba34a | 2008-10-13 04:19:15 +0000 | [diff] [blame] | 667 | #define VG_MAX_ATFORK 10 |
sewardj | a8d8e23 | 2005-06-07 20:04:56 +0000 | [diff] [blame] | 668 | |
njn | e9ba34a | 2008-10-13 04:19:15 +0000 | [diff] [blame] | 669 | static struct atfork atforks[VG_MAX_ATFORK]; |
| 670 | static Int n_atfork = 0; |
| 671 | |
| 672 | void VG_(atfork)(vg_atfork_t pre, vg_atfork_t parent, vg_atfork_t child) |
sewardj | a8d8e23 | 2005-06-07 20:04:56 +0000 | [diff] [blame] | 673 | { |
njn | e9ba34a | 2008-10-13 04:19:15 +0000 | [diff] [blame] | 674 | Int i; |
sewardj | a8d8e23 | 2005-06-07 20:04:56 +0000 | [diff] [blame] | 675 | |
njn | e9ba34a | 2008-10-13 04:19:15 +0000 | [diff] [blame] | 676 | for (i = 0; i < n_atfork; i++) { |
| 677 | if (atforks[i].pre == pre && |
| 678 | atforks[i].parent == parent && |
| 679 | atforks[i].child == child) |
| 680 | return; |
| 681 | } |
| 682 | |
| 683 | if (n_atfork >= VG_MAX_ATFORK) |
| 684 | VG_(core_panic)( |
| 685 | "Too many VG_(atfork) handlers requested: raise VG_MAX_ATFORK"); |
| 686 | |
| 687 | atforks[n_atfork].pre = pre; |
| 688 | atforks[n_atfork].parent = parent; |
| 689 | atforks[n_atfork].child = child; |
| 690 | |
| 691 | n_atfork++; |
| 692 | } |
| 693 | |
| 694 | void VG_(do_atfork_pre)(ThreadId tid) |
| 695 | { |
| 696 | Int i; |
| 697 | |
| 698 | for (i = 0; i < n_atfork; i++) |
| 699 | if (atforks[i].pre != NULL) |
| 700 | (*atforks[i].pre)(tid); |
| 701 | } |
| 702 | |
| 703 | void VG_(do_atfork_parent)(ThreadId tid) |
| 704 | { |
| 705 | Int i; |
| 706 | |
| 707 | for (i = 0; i < n_atfork; i++) |
| 708 | if (atforks[i].parent != NULL) |
| 709 | (*atforks[i].parent)(tid); |
sewardj | a8d8e23 | 2005-06-07 20:04:56 +0000 | [diff] [blame] | 710 | } |
| 711 | |
| 712 | void VG_(do_atfork_child)(ThreadId tid) |
| 713 | { |
njn | e9ba34a | 2008-10-13 04:19:15 +0000 | [diff] [blame] | 714 | Int i; |
| 715 | |
| 716 | for (i = 0; i < n_atfork; i++) |
| 717 | if (atforks[i].child != NULL) |
| 718 | (*atforks[i].child)(tid); |
sewardj | a8d8e23 | 2005-06-07 20:04:56 +0000 | [diff] [blame] | 719 | } |
| 720 | |
njn | f76d27a | 2009-05-28 01:53:07 +0000 | [diff] [blame] | 721 | |
sewardj | 291849f | 2012-04-20 23:58:55 +0000 | [diff] [blame] | 722 | /* --------------------------------------------------------------------- |
| 723 | icache invalidation |
| 724 | ------------------------------------------------------------------ */ |
| 725 | |
| 726 | void VG_(invalidate_icache) ( void *ptr, SizeT nbytes ) |
| 727 | { |
florian | 7862701 | 2012-10-07 19:47:04 +0000 | [diff] [blame] | 728 | if (nbytes == 0) return; // nothing to do |
| 729 | |
| 730 | // Get cache info |
| 731 | VexArchInfo vai; |
| 732 | VG_(machine_get_VexArchInfo)(NULL, &vai); |
| 733 | |
| 734 | // If I-caches are coherent, nothing needs to be done here |
| 735 | if (vai.hwcache_info.icaches_maintain_coherence) return; |
| 736 | |
sewardj | 291849f | 2012-04-20 23:58:55 +0000 | [diff] [blame] | 737 | # if defined(VGA_ppc32) || defined(VGA_ppc64) |
| 738 | Addr startaddr = (Addr) ptr; |
| 739 | Addr endaddr = startaddr + nbytes; |
| 740 | Addr cls; |
| 741 | Addr addr; |
sewardj | 291849f | 2012-04-20 23:58:55 +0000 | [diff] [blame] | 742 | |
sewardj | 291849f | 2012-04-20 23:58:55 +0000 | [diff] [blame] | 743 | VG_(machine_get_VexArchInfo)( NULL, &vai ); |
| 744 | cls = vai.ppc_cache_line_szB; |
| 745 | |
| 746 | /* Stay sane .. */ |
| 747 | vg_assert(cls == 32 || cls == 64 || cls == 128); |
| 748 | |
| 749 | startaddr &= ~(cls - 1); |
| 750 | for (addr = startaddr; addr < endaddr; addr += cls) { |
| 751 | __asm__ __volatile__("dcbst 0,%0" : : "r" (addr)); |
| 752 | } |
| 753 | __asm__ __volatile__("sync"); |
| 754 | for (addr = startaddr; addr < endaddr; addr += cls) { |
| 755 | __asm__ __volatile__("icbi 0,%0" : : "r" (addr)); |
| 756 | } |
| 757 | __asm__ __volatile__("sync; isync"); |
| 758 | |
sewardj | 291849f | 2012-04-20 23:58:55 +0000 | [diff] [blame] | 759 | # elif defined(VGP_arm_linux) |
| 760 | /* ARM cache flushes are privileged, so we must defer to the kernel. */ |
| 761 | Addr startaddr = (Addr) ptr; |
| 762 | Addr endaddr = startaddr + nbytes; |
| 763 | VG_(do_syscall2)(__NR_ARM_cacheflush, startaddr, endaddr); |
| 764 | |
sewardj | 5db1540 | 2012-06-07 09:13:21 +0000 | [diff] [blame] | 765 | # elif defined(VGA_mips32) |
| 766 | SysRes sres = VG_(do_syscall3)(__NR_cacheflush, (UWord) ptr, |
| 767 | (UWord) nbytes, (UWord) 3); |
| 768 | vg_assert( sres._isError == 0 ); |
| 769 | |
sewardj | 291849f | 2012-04-20 23:58:55 +0000 | [diff] [blame] | 770 | # endif |
| 771 | } |
| 772 | |
| 773 | |
sewardj | de4a1d0 | 2002-03-22 01:27:54 +0000 | [diff] [blame] | 774 | /*--------------------------------------------------------------------*/ |
njn | c616819 | 2004-11-29 13:54:10 +0000 | [diff] [blame] | 775 | /*--- end ---*/ |
sewardj | de4a1d0 | 2002-03-22 01:27:54 +0000 | [diff] [blame] | 776 | /*--------------------------------------------------------------------*/ |