master
1const std = @import("../std.zig");
2const testing = std.testing;
3const valgrind = std.valgrind;
4
5pub const ClientRequest = enum(usize) {
6 MakeMemNoAccess = valgrind.ToolBase("MC".*),
7 MakeMemUndefined,
8 MakeMemDefined,
9 Discard,
10 CheckMemIsAddressable,
11 CheckMemIsDefined,
12 DoLeakCheck,
13 CountLeaks,
14 GetVbits,
15 SetVbits,
16 CreateBlock,
17 MakeMemDefinedIfAddressable,
18 CountLeakBlocks,
19 EnableAddrErrorReportingInRange,
20 DisableAddrErrorReportingInRange,
21};
22
23fn doClientRequestExpr(default: usize, request: ClientRequest, a1: usize, a2: usize, a3: usize, a4: usize, a5: usize) usize {
24 return valgrind.doClientRequest(default, @as(usize, @intCast(@intFromEnum(request))), a1, a2, a3, a4, a5);
25}
26
27fn doClientRequestStmt(request: ClientRequest, a1: usize, a2: usize, a3: usize, a4: usize, a5: usize) void {
28 _ = doClientRequestExpr(0, request, a1, a2, a3, a4, a5);
29}
30
31/// Mark memory at qzz.ptr as unaddressable for qzz.len bytes.
32pub fn makeMemNoAccess(qzz: []const u8) void {
33 _ = doClientRequestExpr(0, // default return
34 .MakeMemNoAccess, @intFromPtr(qzz.ptr), qzz.len, 0, 0, 0);
35}
36
37/// Mark memory at qzz.ptr as addressable but undefined for qzz.len bytes.
38pub fn makeMemUndefined(qzz: []const u8) void {
39 _ = doClientRequestExpr(0, // default return
40 .MakeMemUndefined, @intFromPtr(qzz.ptr), qzz.len, 0, 0, 0);
41}
42
43/// Mark memory at qzz.ptr as addressable and defined or qzz.len bytes.
44pub fn makeMemDefined(qzz: []const u8) void {
45 _ = doClientRequestExpr(0, // default return
46 .MakeMemDefined, @intFromPtr(qzz.ptr), qzz.len, 0, 0, 0);
47}
48
49/// Similar to makeMemDefined except that addressability is
50/// not altered: bytes which are addressable are marked as defined,
51/// but those which are not addressable are left unchanged.
52pub fn makeMemDefinedIfAddressable(qzz: []const u8) void {
53 _ = doClientRequestExpr(0, // default return
54 .MakeMemDefinedIfAddressable, @intFromPtr(qzz.ptr), qzz.len, 0, 0, 0);
55}
56
57/// Create a block-description handle. The description is an ascii
58/// string which is included in any messages pertaining to addresses
59/// within the specified memory range. Has no other effect on the
60/// properties of the memory range.
61pub fn createBlock(qzz: []const u8, desc: [*:0]const u8) usize {
62 return doClientRequestExpr(0, // default return
63 .CreateBlock, @intFromPtr(qzz.ptr), qzz.len, @intFromPtr(desc), 0, 0);
64}
65
66/// Discard a block-description-handle. Returns 1 for an
67/// invalid handle, 0 for a valid handle.
68pub fn discard(blkindex: usize) bool {
69 return doClientRequestExpr(0, // default return
70 .Discard, 0, blkindex, 0, 0, 0) != 0;
71}
72
73/// Check that memory at qzz.ptr is addressable for qzz.len bytes.
74/// If suitable addressability is not established, Valgrind prints an
75/// error message and returns the address of the first offending byte.
76/// Otherwise it returns zero.
77pub fn checkMemIsAddressable(qzz: []const u8) usize {
78 return doClientRequestExpr(0, .CheckMemIsAddressable, @intFromPtr(qzz.ptr), qzz.len, 0, 0, 0);
79}
80
81/// Check that memory at qzz.ptr is addressable and defined for
82/// qzz.len bytes. If suitable addressability and definedness are not
83/// established, Valgrind prints an error message and returns the
84/// address of the first offending byte. Otherwise it returns zero.
85pub fn checkMemIsDefined(qzz: []const u8) usize {
86 return doClientRequestExpr(0, .CheckMemIsDefined, @intFromPtr(qzz.ptr), qzz.len, 0, 0, 0);
87}
88
89/// Do a full memory leak check (like --leak-check=full) mid-execution.
90pub fn doLeakCheck() void {
91 doClientRequestStmt(.DoLeakCheck, 0, 0, 0, 0, 0);
92}
93
94/// Same as doLeakCheck() but only showing the entries for
95/// which there was an increase in leaked bytes or leaked nr of blocks
96/// since the previous leak search.
97pub fn doAddedLeakCheck() void {
98 doClientRequestStmt(.DoLeakCheck, 0, 1, 0, 0, 0);
99}
100
101/// Same as doAddedLeakCheck() but showing entries with
102/// increased or decreased leaked bytes/blocks since previous leak
103/// search.
104pub fn doChangedLeakCheck() void {
105 doClientRequestStmt(.DoLeakCheck, 0, 2, 0, 0, 0);
106}
107
108/// Do a summary memory leak check (like --leak-check=summary) mid-execution.
109pub fn doQuickLeakCheck() void {
110 doClientRequestStmt(.DoLeakCheck, 1, 0, 0, 0, 0);
111}
112
113/// Return number of leaked, dubious, reachable and suppressed bytes found by
114/// all previous leak checks.
115const CountResult = struct {
116 leaked: usize,
117 dubious: usize,
118 reachable: usize,
119 suppressed: usize,
120};
121
122pub fn countLeaks() CountResult {
123 var res: CountResult = .{
124 .leaked = 0,
125 .dubious = 0,
126 .reachable = 0,
127 .suppressed = 0,
128 };
129 doClientRequestStmt(
130 .CountLeaks,
131 @intFromPtr(&res.leaked),
132 @intFromPtr(&res.dubious),
133 @intFromPtr(&res.reachable),
134 @intFromPtr(&res.suppressed),
135 0,
136 );
137 return res;
138}
139
140test countLeaks {
141 try testing.expectEqual(
142 @as(CountResult, .{
143 .leaked = 0,
144 .dubious = 0,
145 .reachable = 0,
146 .suppressed = 0,
147 }),
148 countLeaks(),
149 );
150}
151
152pub fn countLeakBlocks() CountResult {
153 var res: CountResult = .{
154 .leaked = 0,
155 .dubious = 0,
156 .reachable = 0,
157 .suppressed = 0,
158 };
159 doClientRequestStmt(
160 .CountLeakBlocks,
161 @intFromPtr(&res.leaked),
162 @intFromPtr(&res.dubious),
163 @intFromPtr(&res.reachable),
164 @intFromPtr(&res.suppressed),
165 0,
166 );
167 return res;
168}
169
170test countLeakBlocks {
171 try testing.expectEqual(
172 @as(CountResult, .{
173 .leaked = 0,
174 .dubious = 0,
175 .reachable = 0,
176 .suppressed = 0,
177 }),
178 countLeakBlocks(),
179 );
180}
181
182/// Get the validity data for addresses zza and copy it
183/// into the provided zzvbits array. Return values:
184/// 0 if not running on valgrind
185/// 1 success
186/// 2 [previously indicated unaligned arrays; these are now allowed]
187/// 3 if any parts of zzsrc/zzvbits are not addressable.
188/// The metadata is not copied in cases 0, 2 or 3 so it should be
189/// impossible to segfault your system by using this call.
190pub fn getVbits(zza: []u8, zzvbits: []u8) u2 {
191 std.debug.assert(zzvbits.len >= zza.len / 8);
192 return @as(u2, @intCast(doClientRequestExpr(0, .GetVbits, @intFromPtr(zza.ptr), @intFromPtr(zzvbits.ptr), zza.len, 0, 0)));
193}
194
195/// Set the validity data for addresses zza, copying it
196/// from the provided zzvbits array. Return values:
197/// 0 if not running on valgrind
198/// 1 success
199/// 2 [previously indicated unaligned arrays; these are now allowed]
200/// 3 if any parts of zza/zzvbits are not addressable.
201/// The metadata is not copied in cases 0, 2 or 3 so it should be
202/// impossible to segfault your system by using this call.
203pub fn setVbits(zzvbits: []u8, zza: []u8) u2 {
204 std.debug.assert(zzvbits.len >= zza.len / 8);
205 return @as(u2, @intCast(doClientRequestExpr(0, .SetVbits, @intFromPtr(zza.ptr), @intFromPtr(zzvbits.ptr), zza.len, 0, 0)));
206}
207
208/// Disable and re-enable reporting of addressing errors in the
209/// specified address range.
210pub fn disableAddrErrorReportingInRange(qzz: []u8) usize {
211 return doClientRequestExpr(0, // default return
212 .DisableAddrErrorReportingInRange, @intFromPtr(qzz.ptr), qzz.len, 0, 0, 0);
213}
214
215pub fn enableAddrErrorReportingInRange(qzz: []u8) usize {
216 return doClientRequestExpr(0, // default return
217 .EnableAddrErrorReportingInRange, @intFromPtr(qzz.ptr), qzz.len, 0, 0, 0);
218}