1 # vim: set ts=8 sts=4 et sw=4 tw=79:
2 # This Source Code Form is subject to the terms of the Mozilla Public
3 # License, v. 2.0. If a copy of the MPL was not distributed with this
4 # file, You can obtain one at http://mozilla.org/MPL/2.0/.
6 # ----------------------------------------------------------------------------
7 # All heap allocations in SpiderMonkey must go through js_malloc, js_calloc,
8 # js_realloc, and js_free. This is so that any embedder who uses a custom
9 # allocator (by defining JS_USE_CUSTOM_ALLOCATOR) will see all heap allocation
10 # go through that custom allocator.
12 # Therefore, the presence of any calls to "vanilla" allocation/free functions
13 # from within SpiderMonkey itself (e.g. malloc(), free()) is a bug. Calls from
14 # within mozglue and non-SpiderMonkey locations are fine; there is a list of
15 # exceptions that can be added to as the need arises.
17 # This script checks for the presence of such disallowed vanilla
18 # allocation/free function in SpiderMonkey when it's built as a library. It
19 # relies on |nm| from the GNU binutils, and so only works on Linux, but one
20 # platform is good enough to catch almost all violations.
22 # This checking is only 100% reliable in a JS_USE_CUSTOM_ALLOCATOR build in
23 # which the default definitions of js_malloc et al (in Utility.h) -- which call
24 # malloc et al -- are replaced with empty definitions. This is because the
25 # presence and possible inlining of the default js_malloc et al can cause
26 # malloc/calloc/realloc/free calls show up in unpredictable places.
28 # Unfortunately, that configuration cannot be tested on Mozilla's standard
29 # testing infrastructure. Instead, by default this script only tests that none
30 # of the other vanilla allocation/free functions (operator new, memalign, etc)
31 # are present. If given the --aggressive flag, it will also check for
32 # malloc/calloc/realloc/free.
34 # Note: We don't check for |operator delete| and |operator delete[]|. These
35 # can be present somehow due to virtual destructors, but this is not too
36 # because vanilla delete/delete[] calls don't make sense without corresponding
37 # vanilla new/new[] calls, and any explicit calls will be caught by Valgrind's
38 # mismatched alloc/free checking.
39 # ----------------------------------------------------------------------------
48 # The obvious way to implement this script is to search for occurrences of
49 # malloc et al, succeed if none are found, and fail is some are found.
50 # However, "none are found" does not necessarily mean "none are present" --
51 # this script could be buggy. (Or the output format of |nm| might change in
54 # So util/Utility.cpp deliberately contains a (never-called) function that
55 # contains a single use of all the vanilla allocation/free functions. And this
56 # script fails if it (a) finds uses of those functions in files other than
57 # util/Utility.cpp, *or* (b) fails to find them in util/Utility.cpp.
59 # Tracks overall success of the test.
64 print("TEST-UNEXPECTED-FAIL | check_vanilla_allocations.py |", msg
)
70 parser
= argparse
.ArgumentParser()
74 help="also check for malloc, calloc, realloc and free",
76 parser
.add_argument("file", type=str, help="name of the file to check")
77 args
= parser
.parse_args()
80 # -u: show only undefined symbols
81 # -C: demangle symbol names
82 # -A: show an object filename for each undefined symbol
83 nm
= buildconfig
.substs
.get("NM") or "nm"
84 cmd
= [nm
, "-u", "-C", "-A", args
.file]
85 lines
= subprocess
.check_output(
86 cmd
, universal_newlines
=True, stderr
=subprocess
.PIPE
89 # alloc_fns contains all the vanilla allocation/free functions that we look
90 # for. Regexp chars are escaped appropriately.
93 # Matches |operator new(unsigned T)|, where |T| is |int| or |long|.
94 r
"operator new\(unsigned",
95 # Matches |operator new[](unsigned T)|, where |T| is |int| or |long|.
96 r
"operator new\[\]\(unsigned",
98 # These three aren't available on all Linux configurations.
105 alloc_fns
+= [r
"malloc", r
"calloc", r
"realloc", r
"free", r
"strdup"]
107 # This is like alloc_fns, but regexp chars are not escaped.
108 alloc_fns_unescaped
= [fn
.replace("\\", "") for fn
in alloc_fns
]
110 # This regexp matches the relevant lines in the output of |nm|, which look
111 # like the following.
113 # js/src/libjs_static.a:Utility.o: U malloc
115 alloc_fns_re
= r
"([^:/ ]+):\s+U (" + r
"|".join(alloc_fns
) + r
")"
117 # This tracks which allocation/free functions have been seen in
119 util_Utility_cpp
= set([])
121 # Would it be helpful to emit detailed line number information after a failure?
122 emit_line_info
= False
125 m
= re
.search(alloc_fns_re
, line
)
129 filename
= m
.group(1)
131 # The stdc++compat library has an implicit call to operator new in
132 # thread::_M_start_thread.
133 if "stdc++compat" in filename
:
136 # The memory allocator code contains calls to memalign. These are ok, so
138 if "_memory_" in filename
:
141 # Ignore the fuzzing code imported from m-c
142 if "Fuzzer" in filename
:
145 # Ignore the profiling pseudo-stack, since it needs to run even when
146 # SpiderMonkey's allocator isn't initialized.
147 if "ProfilingStack" in filename
:
150 # Ignore implicit call to operator new in std::condition_variable_any.
152 # From intl/icu/source/common/umutex.h:
153 # On Linux, the default constructor of std::condition_variable_any
154 # produces an in-line reference to global operator new(), [...].
155 if filename
== "umutex.o":
158 # Ignore allocations from decimal conversion functions inside mozglue.
159 if filename
== "Decimal.o":
162 # Ignore allocations from the m-c intl/components implementations.
163 if "intl_components" in filename
:
166 # Ignore use of std::string in regexp AST debug output.
167 if filename
== "regexp-ast.o":
171 if filename
== "Utility.o":
172 util_Utility_cpp
.add(fn
)
174 # An allocation is present in a non-special file. Fail!
175 fail("'" + fn
+ "' present in " + filename
)
176 # Try to give more precise information about the offending code.
177 emit_line_info
= True
179 # Check that all functions we expect are used in util/Utility.cpp. (This
180 # will fail if the function-detection code breaks at any point.)
181 for fn
in alloc_fns_unescaped
:
182 if fn
not in util_Utility_cpp
:
183 fail("'" + fn
+ "' isn't used as expected in util/Utility.cpp")
185 util_Utility_cpp
.remove(fn
)
187 # This should never happen, but check just in case.
190 "unexpected allocation fns used in util/Utility.cpp: "
191 + ", ".join(util_Utility_cpp
)
194 # If we found any improper references to allocation functions, try to use
195 # DWARF debug info to get more accurate line number information about the
196 # bad calls. This is a lot slower than 'nm -A', and it is not always
197 # precise when building with --enable-optimized.
199 print("check_vanilla_allocations.py: Source lines with allocation calls:")
201 "check_vanilla_allocations.py: Accurate in unoptimized builds; "
202 "util/Utility.cpp expected."
206 # -u: show only undefined symbols
207 # -C: demangle symbol names
208 # -l: show line number information for each undefined symbol
209 cmd
= ["nm", "-u", "-C", "-l", args
.file]
210 lines
= subprocess
.check_output(
211 cmd
, universal_newlines
=True, stderr
=subprocess
.PIPE
214 # This regexp matches the relevant lines in the output of |nm -l|,
215 # which look like the following.
217 # U malloc util/Utility.cpp:117
219 alloc_lines_re
= r
"U ((" + r
"|".join(alloc_fns
) + r
").*)\s+(\S+:\d+)$"
222 m
= re
.search(alloc_lines_re
, line
)
225 "check_vanilla_allocations.py:", m
.group(1), "called at", m
.group(3)
231 print("TEST-PASS | check_vanilla_allocations.py | ok")
235 if __name__
== "__main__":