blob: 852edb3861cc83e0c30eee78ad6c94d65ca65b23 [file] [log] [blame]
njn5c004e42002-11-18 11:04:50 +00001
2/*--------------------------------------------------------------------*/
3/*--- Code that is shared between MemCheck and AddrCheck. ---*/
njn43c799e2003-04-08 00:08:52 +00004/*--- mac_needs.c ---*/
njn5c004e42002-11-18 11:04:50 +00005/*--------------------------------------------------------------------*/
6
7/*
8 This file is part of MemCheck, a heavyweight Valgrind skin for
9 detecting memory errors, and AddrCheck, a lightweight Valgrind skin
10 for detecting memory errors.
11
njn0e1b5142003-04-15 14:58:06 +000012 Copyright (C) 2000-2003 Julian Seward
njn5c004e42002-11-18 11:04:50 +000013 jseward@acm.org
14
15 This program is free software; you can redistribute it and/or
16 modify it under the terms of the GNU General Public License as
17 published by the Free Software Foundation; either version 2 of the
18 License, or (at your option) any later version.
19
20 This program is distributed in the hope that it will be useful, but
21 WITHOUT ANY WARRANTY; without even the implied warranty of
22 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
23 General Public License for more details.
24
25 You should have received a copy of the GNU General Public License
26 along with this program; if not, write to the Free Software
27 Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA
28 02111-1307, USA.
29
30 The GNU General Public License is contained in the file COPYING.
31*/
32
33
njn43c799e2003-04-08 00:08:52 +000034#include "mac_shared.h"
njn5c004e42002-11-18 11:04:50 +000035
njn47363ab2003-04-21 13:24:40 +000036#include "memcheck.h" /* for VG_USERREQ__* */
37
njn5c004e42002-11-18 11:04:50 +000038/*------------------------------------------------------------*/
39/*--- Defns ---*/
40/*------------------------------------------------------------*/
41
42/* These many bytes below %ESP are considered addressible if we're
43 doing the --workaround-gcc296-bugs hack. */
44#define VG_GCC296_BUG_STACK_SLOP 1024
45
46/*------------------------------------------------------------*/
47/*--- Command line options ---*/
48/*------------------------------------------------------------*/
49
njn43c799e2003-04-08 00:08:52 +000050Bool MAC_(clo_partial_loads_ok) = True;
51Int MAC_(clo_freelist_vol) = 1000000;
52Bool MAC_(clo_leak_check) = False;
53VgRes MAC_(clo_leak_resolution) = Vg_LowRes;
54Bool MAC_(clo_show_reachable) = False;
55Bool MAC_(clo_workaround_gcc296_bugs) = False;
njn5c004e42002-11-18 11:04:50 +000056
njn43c799e2003-04-08 00:08:52 +000057Bool MAC_(process_common_cmd_line_option)(Char* arg)
njn5c004e42002-11-18 11:04:50 +000058{
njn43c799e2003-04-08 00:08:52 +000059 if (VG_CLO_STREQ(arg, "--partial-loads-ok=yes"))
60 MAC_(clo_partial_loads_ok) = True;
61 else if (VG_CLO_STREQ(arg, "--partial-loads-ok=no"))
62 MAC_(clo_partial_loads_ok) = False;
njn5c004e42002-11-18 11:04:50 +000063
njn43c799e2003-04-08 00:08:52 +000064 else if (VG_CLO_STREQN(15, arg, "--freelist-vol=")) {
65 MAC_(clo_freelist_vol) = (Int)VG_(atoll)(&arg[15]);
66 if (MAC_(clo_freelist_vol) < 0) MAC_(clo_freelist_vol) = 0;
njn5c004e42002-11-18 11:04:50 +000067 }
68
njn43c799e2003-04-08 00:08:52 +000069 else if (VG_CLO_STREQ(arg, "--leak-check=yes"))
70 MAC_(clo_leak_check) = True;
71 else if (VG_CLO_STREQ(arg, "--leak-check=no"))
72 MAC_(clo_leak_check) = False;
njn5c004e42002-11-18 11:04:50 +000073
njn43c799e2003-04-08 00:08:52 +000074 else if (VG_CLO_STREQ(arg, "--leak-resolution=low"))
75 MAC_(clo_leak_resolution) = Vg_LowRes;
76 else if (VG_CLO_STREQ(arg, "--leak-resolution=med"))
77 MAC_(clo_leak_resolution) = Vg_MedRes;
78 else if (VG_CLO_STREQ(arg, "--leak-resolution=high"))
79 MAC_(clo_leak_resolution) = Vg_HighRes;
njn5c004e42002-11-18 11:04:50 +000080
njn43c799e2003-04-08 00:08:52 +000081 else if (VG_CLO_STREQ(arg, "--show-reachable=yes"))
82 MAC_(clo_show_reachable) = True;
83 else if (VG_CLO_STREQ(arg, "--show-reachable=no"))
84 MAC_(clo_show_reachable) = False;
njn5c004e42002-11-18 11:04:50 +000085
njn43c799e2003-04-08 00:08:52 +000086 else if (VG_CLO_STREQ(arg, "--workaround-gcc296-bugs=yes"))
87 MAC_(clo_workaround_gcc296_bugs) = True;
88 else if (VG_CLO_STREQ(arg, "--workaround-gcc296-bugs=no"))
89 MAC_(clo_workaround_gcc296_bugs) = False;
njn5c004e42002-11-18 11:04:50 +000090
91 else
njn3e884182003-04-15 13:03:23 +000092 return VG_(replacement_malloc_process_cmd_line_option)(arg);
njn5c004e42002-11-18 11:04:50 +000093
94 return True;
njn43c799e2003-04-08 00:08:52 +000095}
njn5c004e42002-11-18 11:04:50 +000096
njn3e884182003-04-15 13:03:23 +000097void MAC_(print_common_usage)(void)
njn43c799e2003-04-08 00:08:52 +000098{
njn3e884182003-04-15 13:03:23 +000099 VG_(printf)(
100" --partial-loads-ok=no|yes too hard to explain here; see manual [yes]\n"
101" --freelist-vol=<number> volume of freed blocks queue [1000000]\n"
102" --leak-check=no|yes search for memory leaks at exit? [no]\n"
103" --leak-resolution=low|med|high how much bt merging in leak check [low]\n"
104" --show-reachable=no|yes show reachable blocks in leak check? [no]\n"
105" --workaround-gcc296-bugs=no|yes self explanatory [no]\n"
106 );
107 VG_(replacement_malloc_print_usage)();
njn43c799e2003-04-08 00:08:52 +0000108}
109
njn3e884182003-04-15 13:03:23 +0000110void MAC_(print_common_debug_usage)(void)
njn43c799e2003-04-08 00:08:52 +0000111{
njn3e884182003-04-15 13:03:23 +0000112 VG_(replacement_malloc_print_debug_usage)();
njn5c004e42002-11-18 11:04:50 +0000113}
114
115/*------------------------------------------------------------*/
116/*--- Comparing and printing errors ---*/
117/*------------------------------------------------------------*/
118
119static __inline__
120void clear_AddrInfo ( AddrInfo* ai )
121{
122 ai->akind = Unknown;
123 ai->blksize = 0;
124 ai->rwoffset = 0;
125 ai->lastchange = NULL;
126 ai->stack_tid = VG_INVALID_THREADID;
127 ai->maybe_gcc = False;
128}
129
njn43c799e2003-04-08 00:08:52 +0000130void MAC_(clear_MAC_Error) ( MAC_Error* err_extra )
njn5c004e42002-11-18 11:04:50 +0000131{
132 err_extra->axskind = ReadAxs;
133 err_extra->size = 0;
134 clear_AddrInfo ( &err_extra->addrinfo );
135 err_extra->isWrite = False;
136}
137
138__attribute__ ((unused))
139static Bool eq_AddrInfo ( VgRes res, AddrInfo* ai1, AddrInfo* ai2 )
140{
141 if (ai1->akind != Undescribed
142 && ai2->akind != Undescribed
143 && ai1->akind != ai2->akind)
144 return False;
145 if (ai1->akind == Freed || ai1->akind == Mallocd) {
146 if (ai1->blksize != ai2->blksize)
147 return False;
148 if (!VG_(eq_ExeContext)(res, ai1->lastchange, ai2->lastchange))
149 return False;
150 }
151 return True;
152}
153
154/* Compare error contexts, to detect duplicates. Note that if they
155 are otherwise the same, the faulting addrs and associated rwoffsets
156 are allowed to be different. */
157
158Bool SK_(eq_SkinError) ( VgRes res, Error* e1, Error* e2 )
159{
njn43c799e2003-04-08 00:08:52 +0000160 MAC_Error* e1_extra = VG_(get_error_extra)(e1);
161 MAC_Error* e2_extra = VG_(get_error_extra)(e2);
njn7cc53a82002-11-19 16:19:32 +0000162
163 /* Guaranteed by calling function */
164 sk_assert(VG_(get_error_kind)(e1) == VG_(get_error_kind)(e2));
njn5c004e42002-11-18 11:04:50 +0000165
166 switch (VG_(get_error_kind)(e1)) {
167 case CoreMemErr: {
168 Char *e1s, *e2s;
169 if (e1_extra->isWrite != e2_extra->isWrite) return False;
njn5c004e42002-11-18 11:04:50 +0000170 e1s = VG_(get_error_string)(e1);
171 e2s = VG_(get_error_string)(e2);
172 if (e1s == e2s) return True;
173 if (0 == VG_(strcmp)(e1s, e2s)) return True;
174 return False;
175 }
176
177 case UserErr:
178 case ParamErr:
179 if (e1_extra->isWrite != e2_extra->isWrite) return False;
180 if (VG_(get_error_kind)(e1) == ParamErr
181 && 0 != VG_(strcmp)(VG_(get_error_string)(e1),
182 VG_(get_error_string)(e2))) return False;
183 return True;
184
185 case FreeErr:
186 case FreeMismatchErr:
187 /* JRS 2002-Aug-26: comparing addrs seems overkill and can
188 cause excessive duplication of errors. Not even AddrErr
189 below does that. So don't compare either the .addr field
190 or the .addrinfo fields. */
191 /* if (e1->addr != e2->addr) return False; */
192 /* if (!eq_AddrInfo(res, &e1_extra->addrinfo, &e2_extra->addrinfo))
193 return False;
194 */
195 return True;
196
197 case AddrErr:
198 /* if (e1_extra->axskind != e2_extra->axskind) return False; */
199 if (e1_extra->size != e2_extra->size) return False;
200 /*
201 if (!eq_AddrInfo(res, &e1_extra->addrinfo, &e2_extra->addrinfo))
202 return False;
203 */
204 return True;
205
206 case ValueErr:
207 if (e1_extra->size != e2_extra->size) return False;
208 return True;
209
njn34419c12003-05-02 17:24:29 +0000210 case OverlapErr:
211 return True;
212
njn43c799e2003-04-08 00:08:52 +0000213 case LeakErr:
214 VG_(skin_panic)("Shouldn't get LeakErr in SK_(eq_SkinError),\n"
215 "since it's handled with VG_(unique_error)()!");
216
njn5c004e42002-11-18 11:04:50 +0000217 default:
218 VG_(printf)("Error:\n unknown error code %d\n",
219 VG_(get_error_kind)(e1));
220 VG_(skin_panic)("unknown error code in SK_(eq_SkinError)");
221 }
222}
223
njn43c799e2003-04-08 00:08:52 +0000224void MAC_(pp_AddrInfo) ( Addr a, AddrInfo* ai )
njn5c004e42002-11-18 11:04:50 +0000225{
226 switch (ai->akind) {
227 case Stack:
228 VG_(message)(Vg_UserMsg,
229 " Address 0x%x is on thread %d's stack",
230 a, ai->stack_tid);
231 break;
232 case Unknown:
233 if (ai->maybe_gcc) {
234 VG_(message)(Vg_UserMsg,
235 " Address 0x%x is just below %%esp. Possibly a bug in GCC/G++",
236 a);
237 VG_(message)(Vg_UserMsg,
238 " v 2.96 or 3.0.X. To suppress, use: --workaround-gcc296-bugs=yes");
239 } else {
240 VG_(message)(Vg_UserMsg,
241 " Address 0x%x is not stack'd, malloc'd or free'd", a);
242 }
243 break;
sewardja81709d2002-12-28 12:55:48 +0000244 case Freed: case Mallocd: case UserG: {
njn5c004e42002-11-18 11:04:50 +0000245 UInt delta;
246 UChar* relative;
247 if (ai->rwoffset < 0) {
248 delta = (UInt)(- ai->rwoffset);
249 relative = "before";
250 } else if (ai->rwoffset >= ai->blksize) {
251 delta = ai->rwoffset - ai->blksize;
252 relative = "after";
253 } else {
254 delta = ai->rwoffset;
255 relative = "inside";
256 }
sewardja81709d2002-12-28 12:55:48 +0000257 VG_(message)(Vg_UserMsg,
258 " Address 0x%x is %d bytes %s a block of size %d %s",
259 a, delta, relative,
260 ai->blksize,
261 ai->akind==Mallocd ? "alloc'd"
262 : ai->akind==Freed ? "free'd"
263 : "client-defined");
njn5c004e42002-11-18 11:04:50 +0000264 VG_(pp_ExeContext)(ai->lastchange);
265 break;
266 }
267 default:
njn43c799e2003-04-08 00:08:52 +0000268 VG_(skin_panic)("MAC_(pp_AddrInfo)");
269 }
270}
271
272/* This prints out the message for the error types where Memcheck and
273 Addrcheck have identical messages */
274void MAC_(pp_shared_SkinError) ( Error* err )
275{
276 MAC_Error* err_extra = VG_(get_error_extra)(err);
277
278 switch (VG_(get_error_kind)(err)) {
279 case FreeErr:
njn10785452003-05-20 16:38:24 +0000280 VG_(message)(Vg_UserMsg, "Invalid free() / delete / delete[]");
njn43c799e2003-04-08 00:08:52 +0000281 /* fall through */
282 case FreeMismatchErr:
283 if (VG_(get_error_kind)(err) == FreeMismatchErr)
284 VG_(message)(Vg_UserMsg,
285 "Mismatched free() / delete / delete []");
286 VG_(pp_ExeContext)( VG_(get_error_where)(err) );
287 MAC_(pp_AddrInfo)(VG_(get_error_address)(err), &err_extra->addrinfo);
288 break;
289
njn66fe05a2003-07-22 09:12:33 +0000290 case OverlapErr:
291 VG_(message)(Vg_UserMsg,
292 "Source and destination overlap in %s",
293 VG_(get_error_string)(err));
294 VG_(pp_ExeContext)( VG_(get_error_where)(err) );
295 break;
296
njn43c799e2003-04-08 00:08:52 +0000297 case LeakErr: {
298 /* Totally abusing the types of these spare fields... oh well. */
299 UInt n_this_record = (UInt)VG_(get_error_address)(err);
300 UInt n_total_records = (UInt)VG_(get_error_string) (err);
301
302 MAC_(pp_LeakError)(err_extra, n_this_record, n_total_records);
303 break;
304 }
305
306 default:
307 VG_(printf)("Error:\n unknown Memcheck/Addrcheck error code %d\n",
308 VG_(get_error_kind)(err));
309 VG_(skin_panic)("unknown error code in MAC_(pp_shared_SkinError)");
njn5c004e42002-11-18 11:04:50 +0000310 }
311}
312
313/*------------------------------------------------------------*/
314/*--- Recording errors ---*/
315/*------------------------------------------------------------*/
316
njn43c799e2003-04-08 00:08:52 +0000317/* Additional description function for describe_addr(); used by
318 MemCheck for user blocks, which Addrcheck doesn't support. */
319Bool (*MAC_(describe_addr_supp)) ( Addr a, AddrInfo* ai ) = NULL;
320
njn43c799e2003-04-08 00:08:52 +0000321/* Describe an address as best you can, for error messages,
322 putting the result in ai. */
323static void describe_addr ( Addr a, AddrInfo* ai )
324{
njn3e884182003-04-15 13:03:23 +0000325 MAC_Chunk* sc;
326 ThreadId tid;
njn43c799e2003-04-08 00:08:52 +0000327
328 /* Nested functions, yeah. Need the lexical scoping of 'a'. */
njn3e884182003-04-15 13:03:23 +0000329
njn43c799e2003-04-08 00:08:52 +0000330 /* Closure for searching thread stacks */
331 Bool addr_is_in_bounds(Addr stack_min, Addr stack_max)
332 {
333 return (stack_min <= a && a <= stack_max);
334 }
njn3e884182003-04-15 13:03:23 +0000335 /* Closure for searching free'd list */
336 Bool addr_is_in_MAC_Chunk(MAC_Chunk* mc)
njn43c799e2003-04-08 00:08:52 +0000337 {
njn3e884182003-04-15 13:03:23 +0000338 return VG_(addr_is_in_block)( a, mc->data, mc->size );
339 }
340 /* Closure for searching malloc'd lists */
341 Bool addr_is_in_HashNode(VgHashNode* sh_ch)
342 {
343 return addr_is_in_MAC_Chunk( (MAC_Chunk*)sh_ch );
njn43c799e2003-04-08 00:08:52 +0000344 }
345
346 /* Perhaps it's a user-def'd block ? (only check if requested, though) */
347 if (NULL != MAC_(describe_addr_supp)) {
348 if (MAC_(describe_addr_supp)( a, ai ))
349 return;
350 }
351 /* Perhaps it's on a thread's stack? */
352 tid = VG_(first_matching_thread_stack)(addr_is_in_bounds);
353 if (tid != VG_INVALID_THREADID) {
354 ai->akind = Stack;
355 ai->stack_tid = tid;
356 return;
357 }
358 /* Search for a recently freed block which might bracket it. */
njn3e884182003-04-15 13:03:23 +0000359 sc = MAC_(first_matching_freed_MAC_Chunk)(addr_is_in_MAC_Chunk);
360 if (NULL != sc) {
njn43c799e2003-04-08 00:08:52 +0000361 ai->akind = Freed;
njn3e884182003-04-15 13:03:23 +0000362 ai->blksize = sc->size;
363 ai->rwoffset = (Int)a - (Int)sc->data;
364 ai->lastchange = sc->where;
njn43c799e2003-04-08 00:08:52 +0000365 return;
366 }
367 /* Search for a currently malloc'd block which might bracket it. */
njn3e884182003-04-15 13:03:23 +0000368 sc = (MAC_Chunk*)VG_(HT_first_match)(MAC_(malloc_list), addr_is_in_HashNode);
njn43c799e2003-04-08 00:08:52 +0000369 if (NULL != sc) {
370 ai->akind = Mallocd;
njn3e884182003-04-15 13:03:23 +0000371 ai->blksize = sc->size;
372 ai->rwoffset = (Int)(a) - (Int)sc->data;
373 ai->lastchange = sc->where;
njn43c799e2003-04-08 00:08:52 +0000374 return;
375 }
376 /* Clueless ... */
377 ai->akind = Unknown;
378 return;
379}
380
njn5c004e42002-11-18 11:04:50 +0000381/* Is this address within some small distance below %ESP? Used only
382 for the --workaround-gcc296-bugs kludge. */
383static Bool is_just_below_ESP( Addr esp, Addr aa )
384{
385 if ((UInt)esp > (UInt)aa
386 && ((UInt)esp - (UInt)aa) <= VG_GCC296_BUG_STACK_SLOP)
387 return True;
388 else
389 return False;
390}
391
sewardjaf48a602003-07-06 00:54:47 +0000392/* This one called from generated code and non-generated code. */
njn5c004e42002-11-18 11:04:50 +0000393
sewardjaf48a602003-07-06 00:54:47 +0000394void MAC_(record_address_error) ( ThreadState* tst, Addr a, Int size,
395 Bool isWrite )
njn5c004e42002-11-18 11:04:50 +0000396{
njn43c799e2003-04-08 00:08:52 +0000397 MAC_Error err_extra;
398 Bool just_below_esp;
njn5c004e42002-11-18 11:04:50 +0000399
400 just_below_esp = is_just_below_ESP( VG_(get_stack_pointer)(), a );
401
402 /* If this is caused by an access immediately below %ESP, and the
403 user asks nicely, we just ignore it. */
njn43c799e2003-04-08 00:08:52 +0000404 if (MAC_(clo_workaround_gcc296_bugs) && just_below_esp)
njn5c004e42002-11-18 11:04:50 +0000405 return;
406
njn43c799e2003-04-08 00:08:52 +0000407 MAC_(clear_MAC_Error)( &err_extra );
njn5c004e42002-11-18 11:04:50 +0000408 err_extra.axskind = isWrite ? WriteAxs : ReadAxs;
409 err_extra.size = size;
410 err_extra.addrinfo.akind = Undescribed;
411 err_extra.addrinfo.maybe_gcc = just_below_esp;
sewardjaf48a602003-07-06 00:54:47 +0000412 VG_(maybe_record_error)( tst, AddrErr, a, /*s*/NULL, &err_extra );
njn5c004e42002-11-18 11:04:50 +0000413}
414
415/* These ones are called from non-generated code */
416
417/* This is for memory errors in pthread functions, as opposed to pthread API
418 errors which are found by the core. */
njn43c799e2003-04-08 00:08:52 +0000419void MAC_(record_core_mem_error) ( ThreadState* tst, Bool isWrite, Char* msg )
njn5c004e42002-11-18 11:04:50 +0000420{
njn43c799e2003-04-08 00:08:52 +0000421 MAC_Error err_extra;
njn5c004e42002-11-18 11:04:50 +0000422
njn43c799e2003-04-08 00:08:52 +0000423 MAC_(clear_MAC_Error)( &err_extra );
njn5c004e42002-11-18 11:04:50 +0000424 err_extra.isWrite = isWrite;
425 VG_(maybe_record_error)( tst, CoreMemErr, /*addr*/0, msg, &err_extra );
426}
427
njn43c799e2003-04-08 00:08:52 +0000428void MAC_(record_param_error) ( ThreadState* tst, Addr a, Bool isWrite,
njn5c004e42002-11-18 11:04:50 +0000429 Char* msg )
430{
njn43c799e2003-04-08 00:08:52 +0000431 MAC_Error err_extra;
njn5c004e42002-11-18 11:04:50 +0000432
433 sk_assert(NULL != tst);
njn43c799e2003-04-08 00:08:52 +0000434 MAC_(clear_MAC_Error)( &err_extra );
njn5c004e42002-11-18 11:04:50 +0000435 err_extra.addrinfo.akind = Undescribed;
436 err_extra.isWrite = isWrite;
437 VG_(maybe_record_error)( tst, ParamErr, a, msg, &err_extra );
438}
439
njn43c799e2003-04-08 00:08:52 +0000440void MAC_(record_jump_error) ( ThreadState* tst, Addr a )
njn5c004e42002-11-18 11:04:50 +0000441{
njn43c799e2003-04-08 00:08:52 +0000442 MAC_Error err_extra;
njn5c004e42002-11-18 11:04:50 +0000443
444 sk_assert(NULL != tst);
445
njn43c799e2003-04-08 00:08:52 +0000446 MAC_(clear_MAC_Error)( &err_extra );
njn5c004e42002-11-18 11:04:50 +0000447 err_extra.axskind = ExecAxs;
448 err_extra.addrinfo.akind = Undescribed;
449 VG_(maybe_record_error)( tst, AddrErr, a, /*s*/NULL, &err_extra );
450}
451
njn43c799e2003-04-08 00:08:52 +0000452void MAC_(record_free_error) ( ThreadState* tst, Addr a )
njn5c004e42002-11-18 11:04:50 +0000453{
njn43c799e2003-04-08 00:08:52 +0000454 MAC_Error err_extra;
njn5c004e42002-11-18 11:04:50 +0000455
456 sk_assert(NULL != tst);
457
njn43c799e2003-04-08 00:08:52 +0000458 MAC_(clear_MAC_Error)( &err_extra );
njn5c004e42002-11-18 11:04:50 +0000459 err_extra.addrinfo.akind = Undescribed;
460 VG_(maybe_record_error)( tst, FreeErr, a, /*s*/NULL, &err_extra );
461}
462
njn43c799e2003-04-08 00:08:52 +0000463void MAC_(record_freemismatch_error) ( ThreadState* tst, Addr a )
njn5c004e42002-11-18 11:04:50 +0000464{
njn43c799e2003-04-08 00:08:52 +0000465 MAC_Error err_extra;
njn5c004e42002-11-18 11:04:50 +0000466
467 sk_assert(NULL != tst);
468
njn43c799e2003-04-08 00:08:52 +0000469 MAC_(clear_MAC_Error)( &err_extra );
njn5c004e42002-11-18 11:04:50 +0000470 err_extra.addrinfo.akind = Undescribed;
471 VG_(maybe_record_error)( tst, FreeMismatchErr, a, /*s*/NULL, &err_extra );
472}
473
njn66fe05a2003-07-22 09:12:33 +0000474
475void MAC_(record_overlap_error) ( ThreadState* tst, Char* function )
476{
477 MAC_Error err_extra;
478
479 MAC_(clear_MAC_Error)( &err_extra );
480 VG_(maybe_record_error)( tst, OverlapErr, /*addr*/0, function, &err_extra );
481}
482
483
njn43c799e2003-04-08 00:08:52 +0000484/* Updates the copy with address info if necessary (but not for LeakErrs). */
485UInt SK_(update_extra)( Error* err )
486{
487 MAC_Error* extra;
488
489 /* Don't need to return the correct size -- LeakErrs are always shown with
490 VG_(unique_error)() so they're not copied anyway. */
491 if (LeakErr == VG_(get_error_kind)(err))
492 return 0;
493
494 extra = (MAC_Error*)VG_(get_error_extra)(err);
495
496 if (extra != NULL && Undescribed == extra->addrinfo.akind) {
497 describe_addr ( VG_(get_error_address)(err), &(extra->addrinfo) );
498 }
499
500 return sizeof(MAC_Error);
501}
502
503
njn5c004e42002-11-18 11:04:50 +0000504/*------------------------------------------------------------*/
505/*--- Suppressions ---*/
506/*------------------------------------------------------------*/
507
njn43c799e2003-04-08 00:08:52 +0000508Bool MAC_(shared_recognised_suppression) ( Char* name, Supp* su )
509{
510 SuppKind skind;
511
512 if (VG_STREQ(name, "Param")) skind = ParamSupp;
513 else if (VG_STREQ(name, "CoreMem")) skind = CoreMemSupp;
514 else if (VG_STREQ(name, "Addr1")) skind = Addr1Supp;
515 else if (VG_STREQ(name, "Addr2")) skind = Addr2Supp;
516 else if (VG_STREQ(name, "Addr4")) skind = Addr4Supp;
517 else if (VG_STREQ(name, "Addr8")) skind = Addr8Supp;
njnc0616662003-06-12 09:58:41 +0000518 else if (VG_STREQ(name, "Addr16")) skind = Addr16Supp;
njn43c799e2003-04-08 00:08:52 +0000519 else if (VG_STREQ(name, "Free")) skind = FreeSupp;
520 else if (VG_STREQ(name, "Leak")) skind = LeakSupp;
521 else
522 return False;
523
524 VG_(set_supp_kind)(su, skind);
525 return True;
526}
527
njn5c004e42002-11-18 11:04:50 +0000528Bool SK_(read_extra_suppression_info) ( Int fd, Char* buf, Int nBuf, Supp *su )
529{
530 Bool eof;
531
532 if (VG_(get_supp_kind)(su) == ParamSupp) {
533 eof = VG_(get_line) ( fd, buf, nBuf );
534 if (eof) return False;
535 VG_(set_supp_string)(su, VG_(strdup)(buf));
536 }
537 return True;
538}
539
sewardj99aac972002-12-26 01:53:45 +0000540Bool SK_(error_matches_suppression)(Error* err, Supp* su)
njn5c004e42002-11-18 11:04:50 +0000541{
sewardj05bcdcb2003-05-18 10:05:38 +0000542 Int su_size;
njn43c799e2003-04-08 00:08:52 +0000543 MAC_Error* err_extra = VG_(get_error_extra)(err);
544 ErrorKind ekind = VG_(get_error_kind )(err);
njn5c004e42002-11-18 11:04:50 +0000545
546 switch (VG_(get_supp_kind)(su)) {
547 case ParamSupp:
548 return (ekind == ParamErr
njn43c799e2003-04-08 00:08:52 +0000549 && VG_STREQ(VG_(get_error_string)(err),
550 VG_(get_supp_string)(su)));
njn5c004e42002-11-18 11:04:50 +0000551
552 case CoreMemSupp:
553 return (ekind == CoreMemErr
njn43c799e2003-04-08 00:08:52 +0000554 && VG_STREQ(VG_(get_error_string)(err),
555 VG_(get_supp_string)(su)));
njn5c004e42002-11-18 11:04:50 +0000556
557 case Value0Supp: su_size = 0; goto value_case;
558 case Value1Supp: su_size = 1; goto value_case;
559 case Value2Supp: su_size = 2; goto value_case;
560 case Value4Supp: su_size = 4; goto value_case;
561 case Value8Supp: su_size = 8; goto value_case;
njnc0616662003-06-12 09:58:41 +0000562 case Value16Supp:su_size =16; goto value_case;
njn5c004e42002-11-18 11:04:50 +0000563 value_case:
564 return (ekind == ValueErr && err_extra->size == su_size);
565
566 case Addr1Supp: su_size = 1; goto addr_case;
567 case Addr2Supp: su_size = 2; goto addr_case;
568 case Addr4Supp: su_size = 4; goto addr_case;
569 case Addr8Supp: su_size = 8; goto addr_case;
njnc0616662003-06-12 09:58:41 +0000570 case Addr16Supp:su_size =16; goto addr_case;
njn5c004e42002-11-18 11:04:50 +0000571 addr_case:
572 return (ekind == AddrErr && err_extra->size == su_size);
573
574 case FreeSupp:
575 return (ekind == FreeErr || ekind == FreeMismatchErr);
576
njn34419c12003-05-02 17:24:29 +0000577 case OverlapSupp:
578 return (ekind = OverlapErr);
579
sewardj4a19e2f2002-12-26 11:50:21 +0000580 case LeakSupp:
njn43c799e2003-04-08 00:08:52 +0000581 return (ekind == LeakErr);
sewardj4a19e2f2002-12-26 11:50:21 +0000582
njn5c004e42002-11-18 11:04:50 +0000583 default:
584 VG_(printf)("Error:\n"
585 " unknown suppression type %d\n",
586 VG_(get_supp_kind)(su));
587 VG_(skin_panic)("unknown suppression type in "
588 "SK_(error_matches_suppression)");
589 }
590}
591
njn43c799e2003-04-08 00:08:52 +0000592Char* SK_(get_error_name) ( Error* err )
593{
594 Char* s;
595 switch (VG_(get_error_kind)(err)) {
596 case ParamErr: return "Param";
597 case UserErr: return NULL; /* Can't suppress User errors */
598 case FreeMismatchErr: return "Free";
599 case FreeErr: return "Free";
600 case AddrErr:
601 switch ( ((MAC_Error*)VG_(get_error_extra)(err))->size ) {
602 case 1: return "Addr1";
603 case 2: return "Addr2";
604 case 4: return "Addr4";
605 case 8: return "Addr8";
njnc0616662003-06-12 09:58:41 +0000606 case 16: return "Addr16";
njn43c799e2003-04-08 00:08:52 +0000607 default: VG_(skin_panic)("unexpected size for Addr");
608 }
609
610 case ValueErr:
611 switch ( ((MAC_Error*)VG_(get_error_extra)(err))->size ) {
612 case 0: return "Cond";
613 case 1: return "Value1";
614 case 2: return "Value2";
615 case 4: return "Value4";
616 case 8: return "Value8";
njnc0616662003-06-12 09:58:41 +0000617 case 16: return "Value16";
njn43c799e2003-04-08 00:08:52 +0000618 default: VG_(skin_panic)("unexpected size for Value");
619 }
620 case CoreMemErr: return "CoreMem";
njn34419c12003-05-02 17:24:29 +0000621 case OverlapErr: return "Overlap";
njn43c799e2003-04-08 00:08:52 +0000622 case LeakErr: return "Leak";
623 default: VG_(skin_panic)("get_error_name: unexpected type");
624 }
625 VG_(printf)(s);
626}
627
628void SK_(print_extra_suppression_info) ( Error* err )
629{
630 if (ParamErr == VG_(get_error_kind)(err)) {
631 VG_(printf)(" %s\n", VG_(get_error_string)(err));
632 }
633}
njn5c004e42002-11-18 11:04:50 +0000634
635/*------------------------------------------------------------*/
636/*--- Crude profiling machinery. ---*/
637/*------------------------------------------------------------*/
638
639/* Event index. If just the name of the fn is given, this means the
640 number of calls to the fn. Otherwise it is the specified event.
641 Ones marked 'M' are MemCheck only. Ones marked 'A' are AddrCheck only.
642 The rest are shared.
643
644 10 alloc_secondary_map
645
646 20 get_abit
647M 21 get_vbyte
648 22 set_abit
649M 23 set_vbyte
650 24 get_abits4_ALIGNED
651M 25 get_vbytes4_ALIGNED
652
653 30 set_address_range_perms
654 31 set_address_range_perms(lower byte loop)
655 32 set_address_range_perms(quadword loop)
656 33 set_address_range_perms(upper byte loop)
657
658 35 make_noaccess
659 36 make_writable
660 37 make_readable
661A 38 make_accessible
662
663 40 copy_address_range_state
664 41 copy_address_range_state(byte loop)
665 42 check_writable
666 43 check_writable(byte loop)
667 44 check_readable
668 45 check_readable(byte loop)
669 46 check_readable_asciiz
670 47 check_readable_asciiz(byte loop)
671A 48 check_accessible
672A 49 check_accessible(byte loop)
673
674 50 make_noaccess_aligned
675 51 make_writable_aligned
676
677M 60 helperc_LOADV4
678M 61 helperc_STOREV4
679M 62 helperc_LOADV2
680M 63 helperc_STOREV2
681M 64 helperc_LOADV1
682M 65 helperc_STOREV1
683
684A 66 helperc_ACCESS4
685A 67 helperc_ACCESS2
686A 68 helperc_ACCESS1
687
688M 70 rim_rd_V4_SLOWLY
689M 71 rim_wr_V4_SLOWLY
690M 72 rim_rd_V2_SLOWLY
691M 73 rim_wr_V2_SLOWLY
692M 74 rim_rd_V1_SLOWLY
693M 75 rim_wr_V1_SLOWLY
694
695A 76 ACCESS4_SLOWLY
696A 77 ACCESS2_SLOWLY
697A 78 ACCESS1_SLOWLY
698
699 80 fpu_read
700 81 fpu_read aligned 4
701 82 fpu_read aligned 8
702 83 fpu_read 2
703 84 fpu_read 10/28/108
704
705M 85 fpu_write
706M 86 fpu_write aligned 4
707M 87 fpu_write aligned 8
708M 88 fpu_write 2
709M 89 fpu_write 10/28/108
710
711 90 fpu_access
712 91 fpu_access aligned 4
713 92 fpu_access aligned 8
714 93 fpu_access 2
715 94 fpu_access 10/28/108
716
717 100 fpu_access_check_SLOWLY
718 101 fpu_access_check_SLOWLY(byte loop)
njn9b007f62003-04-07 14:40:25 +0000719
720 110 new_mem_stack_4
721 111 new_mem_stack_8
722 112 new_mem_stack_12
723 113 new_mem_stack_16
724 114 new_mem_stack_32
725 115 new_mem_stack
726
727 120 die_mem_stack_4
728 121 die_mem_stack_8
729 122 die_mem_stack_12
730 123 die_mem_stack_16
731 124 die_mem_stack_32
732 125 die_mem_stack
njn5c004e42002-11-18 11:04:50 +0000733*/
734
njn43c799e2003-04-08 00:08:52 +0000735#ifdef MAC_PROFILE_MEMORY
njn5c004e42002-11-18 11:04:50 +0000736
njn43c799e2003-04-08 00:08:52 +0000737UInt MAC_(event_ctr)[N_PROF_EVENTS];
njn5c004e42002-11-18 11:04:50 +0000738
njnb4aee052003-04-15 14:09:58 +0000739static void init_prof_mem ( void )
njn5c004e42002-11-18 11:04:50 +0000740{
741 Int i;
742 for (i = 0; i < N_PROF_EVENTS; i++)
njn43c799e2003-04-08 00:08:52 +0000743 MAC_(event_ctr)[i] = 0;
njn5c004e42002-11-18 11:04:50 +0000744}
745
njnb4aee052003-04-15 14:09:58 +0000746static void done_prof_mem ( void )
njn5c004e42002-11-18 11:04:50 +0000747{
748 Int i;
749 for (i = 0; i < N_PROF_EVENTS; i++) {
750 if ((i % 10) == 0)
751 VG_(printf)("\n");
njn43c799e2003-04-08 00:08:52 +0000752 if (MAC_(event_ctr)[i] > 0)
753 VG_(printf)( "prof mem event %2d: %d\n", i, MAC_(event_ctr)[i] );
njn5c004e42002-11-18 11:04:50 +0000754 }
755 VG_(printf)("\n");
756}
757
758#else
759
njnb4aee052003-04-15 14:09:58 +0000760static void init_prof_mem ( void ) { }
761static void done_prof_mem ( void ) { }
njn5c004e42002-11-18 11:04:50 +0000762
njn5c004e42002-11-18 11:04:50 +0000763#endif
764
765/*------------------------------------------------------------*/
njn3e884182003-04-15 13:03:23 +0000766/*--- Common initialisation + finalisation ---*/
767/*------------------------------------------------------------*/
768
769void MAC_(common_pre_clo_init)(void)
770{
771 MAC_(malloc_list) = VG_(HT_construct)();
772 init_prof_mem();
773}
774
775void MAC_(common_fini)(void (*leak_check)(void))
776{
777 MAC_(print_malloc_stats)();
778
779 if (VG_(clo_verbosity) == 1) {
780 if (!MAC_(clo_leak_check))
781 VG_(message)(Vg_UserMsg,
782 "For a detailed leak analysis, rerun with: --leak-check=yes");
783
784 VG_(message)(Vg_UserMsg,
785 "For counts of detected errors, rerun with: -v");
786 }
787 if (MAC_(clo_leak_check)) leak_check();
788
789 done_prof_mem();
790}
791
792/*------------------------------------------------------------*/
njn47363ab2003-04-21 13:24:40 +0000793/*--- Common client request handling ---*/
794/*------------------------------------------------------------*/
795
796Bool MAC_(handle_common_client_requests)(ThreadState* tst, UInt* arg,
797 UInt* ret )
798{
njn10785452003-05-20 16:38:24 +0000799 UInt* argv = (UInt*)arg;
njn47363ab2003-04-21 13:24:40 +0000800
801 switch (arg[0]) {
njn10785452003-05-20 16:38:24 +0000802 case VG_USERREQ__COUNT_LEAKS: { /* count leaked bytes */
803 UInt** argp = (UInt**)arg;
njne8b5c052003-07-22 22:03:58 +0000804 // MAC_(bytes_leaked) et al were set by the last leak check (or zero
805 // if no prior leak checks performed).
806 *argp[1] = MAC_(bytes_leaked);
807 *argp[2] = MAC_(bytes_dubious);
808 *argp[3] = MAC_(bytes_reachable);
809 *argp[4] = MAC_(bytes_suppressed);
njn47363ab2003-04-21 13:24:40 +0000810 *ret = 0;
811 return True;
njn10785452003-05-20 16:38:24 +0000812 }
813 case VG_USERREQ__MALLOCLIKE_BLOCK: {
814 Addr p = (Addr)argv[1];
815 UInt sizeB = argv[2];
816 UInt rzB = argv[3];
817 Bool is_zeroed = (Bool)argv[4];
njn47363ab2003-04-21 13:24:40 +0000818
njn10785452003-05-20 16:38:24 +0000819 MAC_(new_block) ( tst, p, sizeB, rzB, is_zeroed, MAC_AllocCustom );
820 return True;
821 }
822 case VG_USERREQ__FREELIKE_BLOCK: {
823 Addr p = (Addr)argv[1];
824 UInt rzB = argv[2];
825
826 MAC_(handle_free) ( tst, p, rzB, MAC_AllocCustom );
827 return True;
828 }
njn47363ab2003-04-21 13:24:40 +0000829 default:
830 return False;
831 }
832}
833
834/*------------------------------------------------------------*/
njn5c004e42002-11-18 11:04:50 +0000835/*--- Syscall wrappers ---*/
836/*------------------------------------------------------------*/
837
838void* SK_(pre_syscall) ( ThreadId tid, UInt syscallno, Bool isBlocking )
839{
840 Int sane = SK_(cheap_sanity_check)();
841 return (void*)sane;
842}
843
844void SK_(post_syscall) ( ThreadId tid, UInt syscallno,
845 void* pre_result, Int res, Bool isBlocking )
846{
847 Int sane_before_call = (Int)pre_result;
848 Bool sane_after_call = SK_(cheap_sanity_check)();
849
850 if ((Int)sane_before_call && (!sane_after_call)) {
851 VG_(message)(Vg_DebugMsg, "post-syscall: ");
852 VG_(message)(Vg_DebugMsg,
853 "probable sanity check failure for syscall number %d\n",
854 syscallno );
855 VG_(skin_panic)("aborting due to the above ... bye!");
856 }
857}
858
njn5c004e42002-11-18 11:04:50 +0000859/*--------------------------------------------------------------------*/
njn43c799e2003-04-08 00:08:52 +0000860/*--- end mac_needs.c ---*/
njn5c004e42002-11-18 11:04:50 +0000861/*--------------------------------------------------------------------*/