blob: 0c529f3280194e5026267c471350b8c4dc92ae5f [file] [log] [blame]
njn25e49d8e72002-09-23 09:36:25 +00001
2/*
3 ----------------------------------------------------------------
4
5 Notice that the following BSD-style license applies to this one
sewardja81709d2002-12-28 12:55:48 +00006 file (memcheck.h) only. The entire rest of Valgrind is licensed
njn25e49d8e72002-09-23 09:36:25 +00007 under the terms of the GNU General Public License, version 2. See
8 the COPYING file in the source distribution for details.
9
10 ----------------------------------------------------------------
11
nethercote137bc552003-11-14 17:47:54 +000012 This file is part of MemCheck, a heavyweight Valgrind tool for
njnc9539842002-10-02 13:26:35 +000013 detecting memory errors.
njn25e49d8e72002-09-23 09:36:25 +000014
njn53612422005-03-12 16:22:54 +000015 Copyright (C) 2000-2005 Julian Seward. All rights reserved.
njn25e49d8e72002-09-23 09:36:25 +000016
17 Redistribution and use in source and binary forms, with or without
18 modification, are permitted provided that the following conditions
19 are met:
20
21 1. Redistributions of source code must retain the above copyright
22 notice, this list of conditions and the following disclaimer.
23
24 2. The origin of this software must not be misrepresented; you must
25 not claim that you wrote the original software. If you use this
26 software in a product, an acknowledgment in the product
27 documentation would be appreciated but is not required.
28
29 3. Altered source versions must be plainly marked as such, and must
30 not be misrepresented as being the original software.
31
32 4. The name of the author may not be used to endorse or promote
33 products derived from this software without specific prior written
34 permission.
35
36 THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS
37 OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
38 WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
39 ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
40 DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
41 DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
42 GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
43 INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
44 WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
45 NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
46 SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
47
48 ----------------------------------------------------------------
49
50 Notice that the above BSD-style license applies to this one file
sewardja81709d2002-12-28 12:55:48 +000051 (memcheck.h) only. The entire rest of Valgrind is licensed under
njn25e49d8e72002-09-23 09:36:25 +000052 the terms of the GNU General Public License, version 2. See the
53 COPYING file in the source distribution for details.
54
55 ----------------------------------------------------------------
56*/
57
58
njn25cac76cb2002-09-23 11:21:57 +000059#ifndef __MEMCHECK_H
60#define __MEMCHECK_H
njn25e49d8e72002-09-23 09:36:25 +000061
62
63/* This file is for inclusion into client (your!) code.
64
65 You can use these macros to manipulate and query memory permissions
66 inside your own programs.
67
68 See comment near the top of valgrind.h on how to use them.
69*/
70
71#include "valgrind.h"
72
sewardjfb1e9ad2006-03-10 13:41:58 +000073/* !! ABIWARNING !! ABIWARNING !! ABIWARNING !! ABIWARNING !!
74 This enum comprises an ABI exported by Valgrind to programs
75 which use client requests. DO NOT CHANGE THE ORDER OF THESE
76 ENTRIES, NOT DELETE ANY -- add new ones at the end. */
njn25e49d8e72002-09-23 09:36:25 +000077typedef
78 enum {
njnfc26ff92004-11-22 19:12:49 +000079 VG_USERREQ__MAKE_NOACCESS = VG_USERREQ_TOOL_BASE('M','C'),
njn25e49d8e72002-09-23 09:36:25 +000080 VG_USERREQ__MAKE_WRITABLE,
81 VG_USERREQ__MAKE_READABLE,
82 VG_USERREQ__DISCARD,
83 VG_USERREQ__CHECK_WRITABLE,
84 VG_USERREQ__CHECK_READABLE,
njn47363ab2003-04-21 13:24:40 +000085 VG_USERREQ__DO_LEAK_CHECK,
njn10785452003-05-20 16:38:24 +000086 VG_USERREQ__COUNT_LEAKS,
njnd7994182003-10-02 13:44:04 +000087
sewardjee070842003-07-05 17:53:55 +000088 VG_USERREQ__GET_VBITS,
fitzhardinge98abfc72003-12-16 02:05:15 +000089 VG_USERREQ__SET_VBITS,
90
sewardjb5f6f512005-03-10 23:59:00 +000091 VG_USERREQ__CREATE_BLOCK,
92
sewardjfb1e9ad2006-03-10 13:41:58 +000093 VG_USERREQ__MAKE_DEFINED,
94
fitzhardinge98abfc72003-12-16 02:05:15 +000095 /* This is just for memcheck's internal use - don't use it */
njn1f8b3e72005-03-22 04:27:14 +000096 _VG_USERREQ__MEMCHECK_RECORD_OVERLAP_ERROR
97 = VG_USERREQ_TOOL_BASE('M','C') + 256
njn25e49d8e72002-09-23 09:36:25 +000098 } Vg_MemCheckClientRequest;
99
100
101
102/* Client-code macros to manipulate the state of memory. */
103
104/* Mark memory at _qzz_addr as unaddressible and undefined for
sewardjb5f6f512005-03-10 23:59:00 +0000105 _qzz_len bytes. */
njn25e49d8e72002-09-23 09:36:25 +0000106#define VALGRIND_MAKE_NOACCESS(_qzz_addr,_qzz_len) \
sewardj34a257c2003-03-15 19:20:52 +0000107 (__extension__({unsigned int _qzz_res; \
sewardj0ec07f32006-01-12 12:32:32 +0000108 VALGRIND_DO_CLIENT_REQUEST(_qzz_res, 0 /* default return */, \
njn25e49d8e72002-09-23 09:36:25 +0000109 VG_USERREQ__MAKE_NOACCESS, \
sewardj9af10a12006-02-01 14:59:42 +0000110 _qzz_addr, _qzz_len, 0, 0, 0); \
njn25e49d8e72002-09-23 09:36:25 +0000111 _qzz_res; \
sewardj34a257c2003-03-15 19:20:52 +0000112 }))
njn25e49d8e72002-09-23 09:36:25 +0000113
114/* Similarly, mark memory at _qzz_addr as addressible but undefined
115 for _qzz_len bytes. */
116#define VALGRIND_MAKE_WRITABLE(_qzz_addr,_qzz_len) \
sewardj34a257c2003-03-15 19:20:52 +0000117 (__extension__({unsigned int _qzz_res; \
sewardj0ec07f32006-01-12 12:32:32 +0000118 VALGRIND_DO_CLIENT_REQUEST(_qzz_res, 0 /* default return */, \
njn25e49d8e72002-09-23 09:36:25 +0000119 VG_USERREQ__MAKE_WRITABLE, \
sewardj9af10a12006-02-01 14:59:42 +0000120 _qzz_addr, _qzz_len, 0, 0, 0); \
njn25e49d8e72002-09-23 09:36:25 +0000121 _qzz_res; \
sewardj34a257c2003-03-15 19:20:52 +0000122 }))
njn25e49d8e72002-09-23 09:36:25 +0000123
124/* Similarly, mark memory at _qzz_addr as addressible and defined
125 for _qzz_len bytes. */
126#define VALGRIND_MAKE_READABLE(_qzz_addr,_qzz_len) \
sewardj34a257c2003-03-15 19:20:52 +0000127 (__extension__({unsigned int _qzz_res; \
sewardj0ec07f32006-01-12 12:32:32 +0000128 VALGRIND_DO_CLIENT_REQUEST(_qzz_res, 0 /* default return */, \
njn25e49d8e72002-09-23 09:36:25 +0000129 VG_USERREQ__MAKE_READABLE, \
sewardj9af10a12006-02-01 14:59:42 +0000130 _qzz_addr, _qzz_len, 0, 0, 0); \
njn25e49d8e72002-09-23 09:36:25 +0000131 _qzz_res; \
sewardj34a257c2003-03-15 19:20:52 +0000132 }))
njn25e49d8e72002-09-23 09:36:25 +0000133
sewardjfb1e9ad2006-03-10 13:41:58 +0000134/* Similar to mark memory at VALGRIND_MAKE_READABLE except that
135 addressibility is not altered: bytes which are addressible are
136 marked as defined, but those which are not addressible are
137 left unchanged. */
138#define VALGRIND_MAKE_DEFINED(_qzz_addr,_qzz_len) \
139 (__extension__({unsigned int _qzz_res; \
140 VALGRIND_DO_CLIENT_REQUEST(_qzz_res, 0 /* default return */, \
141 VG_USERREQ__MAKE_DEFINED, \
142 _qzz_addr, _qzz_len, 0, 0, 0); \
143 _qzz_res; \
144 }))
145
sewardjb5f6f512005-03-10 23:59:00 +0000146/* Create a block-description handle. The description is an ascii
147 string which is included in any messages pertaining to addresses
148 within the specified memory range. Has no other effect on the
149 properties of the memory range. */
sewardj0ec07f32006-01-12 12:32:32 +0000150#define VALGRIND_CREATE_BLOCK(_qzz_addr,_qzz_len, _qzz_desc) \
151 (__extension__({unsigned int _qzz_res; \
152 VALGRIND_DO_CLIENT_REQUEST(_qzz_res, 0 /* default return */, \
153 VG_USERREQ__CREATE_BLOCK, \
sewardj9af10a12006-02-01 14:59:42 +0000154 _qzz_addr, _qzz_len, _qzz_desc, \
155 0, 0); \
sewardj0ec07f32006-01-12 12:32:32 +0000156 _qzz_res; \
sewardjb5f6f512005-03-10 23:59:00 +0000157 }))
158
159/* Discard a block-description-handle. Returns 1 for an
160 invalid handle, 0 for a valid handle. */
njn25e49d8e72002-09-23 09:36:25 +0000161#define VALGRIND_DISCARD(_qzz_blkindex) \
sewardj34a257c2003-03-15 19:20:52 +0000162 (__extension__ ({unsigned int _qzz_res; \
sewardj0ec07f32006-01-12 12:32:32 +0000163 VALGRIND_DO_CLIENT_REQUEST(_qzz_res, 0 /* default return */, \
njn25e49d8e72002-09-23 09:36:25 +0000164 VG_USERREQ__DISCARD, \
sewardj9af10a12006-02-01 14:59:42 +0000165 0, _qzz_blkindex, 0, 0, 0); \
njn25e49d8e72002-09-23 09:36:25 +0000166 _qzz_res; \
sewardj34a257c2003-03-15 19:20:52 +0000167 }))
njn25e49d8e72002-09-23 09:36:25 +0000168
169
170/* Client-code macros to check the state of memory. */
171
172/* Check that memory at _qzz_addr is addressible for _qzz_len bytes.
173 If suitable addressibility is not established, Valgrind prints an
174 error message and returns the address of the first offending byte.
175 Otherwise it returns zero. */
sewardj0ec07f32006-01-12 12:32:32 +0000176#define VALGRIND_CHECK_WRITABLE(_qzz_addr,_qzz_len) \
177 (__extension__({unsigned int _qzz_res; \
178 VALGRIND_DO_CLIENT_REQUEST(_qzz_res, 0, \
179 VG_USERREQ__CHECK_WRITABLE, \
sewardj9af10a12006-02-01 14:59:42 +0000180 _qzz_addr, _qzz_len, 0, 0, 0); \
sewardj0ec07f32006-01-12 12:32:32 +0000181 _qzz_res; \
sewardj34a257c2003-03-15 19:20:52 +0000182 }))
njn25e49d8e72002-09-23 09:36:25 +0000183
184/* Check that memory at _qzz_addr is addressible and defined for
185 _qzz_len bytes. If suitable addressibility and definedness are not
186 established, Valgrind prints an error message and returns the
187 address of the first offending byte. Otherwise it returns zero. */
sewardj0ec07f32006-01-12 12:32:32 +0000188#define VALGRIND_CHECK_READABLE(_qzz_addr,_qzz_len) \
189 (__extension__({unsigned int _qzz_res; \
190 VALGRIND_DO_CLIENT_REQUEST(_qzz_res, 0, \
191 VG_USERREQ__CHECK_READABLE, \
sewardj9af10a12006-02-01 14:59:42 +0000192 _qzz_addr, _qzz_len, 0, 0, 0); \
sewardj0ec07f32006-01-12 12:32:32 +0000193 _qzz_res; \
sewardj34a257c2003-03-15 19:20:52 +0000194 }))
njn25e49d8e72002-09-23 09:36:25 +0000195
196/* Use this macro to force the definedness and addressibility of a
197 value to be checked. If suitable addressibility and definedness
198 are not established, Valgrind prints an error message and returns
199 the address of the first offending byte. Otherwise it returns
200 zero. */
sewardj0ec07f32006-01-12 12:32:32 +0000201#define VALGRIND_CHECK_DEFINED(__lvalue) \
202 VALGRIND_CHECK_READABLE( \
203 (volatile unsigned char *)&(__lvalue), \
njn25e49d8e72002-09-23 09:36:25 +0000204 (unsigned int)(sizeof (__lvalue)))
205
njn6e69ecd2003-10-02 13:25:02 +0000206/* Do a memory leak check mid-execution. */
sewardj0ec07f32006-01-12 12:32:32 +0000207#define VALGRIND_DO_LEAK_CHECK \
208 {unsigned int _qzz_res; \
209 VALGRIND_DO_CLIENT_REQUEST(_qzz_res, 0, \
210 VG_USERREQ__DO_LEAK_CHECK, \
sewardj9af10a12006-02-01 14:59:42 +0000211 0, 0, 0, 0, 0); \
njn6e69ecd2003-10-02 13:25:02 +0000212 }
213
sewardjb5f6f512005-03-10 23:59:00 +0000214/* Just display summaries of leaked memory, rather than all the
215 details */
sewardj0ec07f32006-01-12 12:32:32 +0000216#define VALGRIND_DO_QUICK_LEAK_CHECK \
217 {unsigned int _qzz_res; \
218 VALGRIND_DO_CLIENT_REQUEST(_qzz_res, 0, \
219 VG_USERREQ__DO_LEAK_CHECK, \
sewardj9af10a12006-02-01 14:59:42 +0000220 1, 0, 0, 0, 0); \
sewardjb5f6f512005-03-10 23:59:00 +0000221 }
222
njn6e69ecd2003-10-02 13:25:02 +0000223/* Return number of leaked, dubious, reachable and suppressed bytes found by
224 all previous leak checks. They must be lvalues. */
sewardj0ec07f32006-01-12 12:32:32 +0000225#define VALGRIND_COUNT_LEAKS(leaked, dubious, reachable, suppressed) \
226 {unsigned int _qzz_res; \
227 VALGRIND_DO_CLIENT_REQUEST(_qzz_res, 0, \
228 VG_USERREQ__COUNT_LEAKS, \
sewardj9af10a12006-02-01 14:59:42 +0000229 &leaked, &dubious, &reachable, &suppressed, \
230 0); \
njn6e69ecd2003-10-02 13:25:02 +0000231 }
232
njn6e69ecd2003-10-02 13:25:02 +0000233
sewardjee070842003-07-05 17:53:55 +0000234/* Get in zzvbits the validity data for the zznbytes starting at
235 zzsrc. Return values:
236 0 if not running on valgrind
237 1 success
238 2 if zzsrc/zzvbits arrays are not aligned 0 % 4, or
239 zznbytes is not 0 % 4.
240 3 if any parts of zzsrc/zzvbits are not addressible.
241 The metadata is not copied in cases 0, 2 or 3 so it should be
242 impossible to segfault your system by using this call.
243*/
244#define VALGRIND_GET_VBITS(zzsrc,zzvbits,zznbytes) \
245 (__extension__({unsigned int _qzz_res; \
246 char* czzsrc = (char*)zzsrc; \
247 char* czzvbits = (char*)zzvbits; \
sewardj0ec07f32006-01-12 12:32:32 +0000248 VALGRIND_DO_CLIENT_REQUEST(_qzz_res, 0, \
sewardjee070842003-07-05 17:53:55 +0000249 VG_USERREQ__GET_VBITS, \
sewardj9af10a12006-02-01 14:59:42 +0000250 czzsrc, czzvbits, zznbytes, 0, 0); \
sewardjee070842003-07-05 17:53:55 +0000251 _qzz_res; \
252 }))
253
254/* Apply the validity data in zzvbits to the zznbytes starting at
255 zzdst. Return values:
256 0 if not running on valgrind
257 1 success
258 2 if zzdst/zzvbits arrays are not aligned 0 % 4, or
259 zznbytes is not 0 % 4.
260 3 if any parts of zzdst/zzvbits are not addressible.
261 The metadata is not copied in cases 0, 2 or 3 so it should be
262 impossible to segfault your system by using this call.
263*/
264#define VALGRIND_SET_VBITS(zzdst,zzvbits,zznbytes) \
265 (__extension__({unsigned int _qzz_res; \
266 char* czzdst = (char*)zzdst; \
267 char* czzvbits = (char*)zzvbits; \
sewardj0ec07f32006-01-12 12:32:32 +0000268 VALGRIND_DO_CLIENT_REQUEST(_qzz_res, 0, \
sewardjee070842003-07-05 17:53:55 +0000269 VG_USERREQ__SET_VBITS, \
sewardj9af10a12006-02-01 14:59:42 +0000270 czzdst, czzvbits, zznbytes, 0, 0); \
sewardjee070842003-07-05 17:53:55 +0000271 _qzz_res; \
272 }))
njnd7994182003-10-02 13:44:04 +0000273
274#endif
275