297 lines
7.3 KiB
C
297 lines
7.3 KiB
C
/*
|
|
* (c) Copyright 1990 Conor P. Cahill (uunet!virtech!cpcahil).
|
|
* You may copy, distribute, and use this software as long as this
|
|
* copyright statement is not removed.
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include "malloc.h"
|
|
#include "debug.h"
|
|
|
|
#ifndef lint
|
|
static
|
|
char rcs_hdr[] = "$Id: mlc_chk.c,v 1.1.1.1 2000-09-22 15:33:26 hr Exp $";
|
|
#endif
|
|
|
|
extern struct mlist malloc_start;
|
|
extern struct mlist * malloc_end;
|
|
extern char * malloc_data_start;
|
|
extern char * malloc_data_end;
|
|
|
|
/*
|
|
* Function: malloc_in_arena()
|
|
*
|
|
* Purpose: to verify address is within malloc arena.
|
|
*
|
|
* Arguments: ptr - pointer to verify
|
|
*
|
|
* Returns: TRUE - if pointer is within malloc area
|
|
* FALSE - otherwise
|
|
*
|
|
* Narrative:
|
|
* IF pointer is >= malloc area start AND <= malloc area end
|
|
* return TRUE
|
|
* ELSE
|
|
* return FALSE
|
|
*
|
|
* Mod History:
|
|
* 90/01/24 cpcahil Initial revision.
|
|
*/
|
|
int
|
|
malloc_in_arena(ptr)
|
|
char * ptr;
|
|
{
|
|
extern char * malloc_data_start;
|
|
extern char * malloc_data_end;
|
|
int rtn = 0;
|
|
|
|
if( ptr >= malloc_data_start && ptr <= malloc_data_end )
|
|
{
|
|
rtn = 1;
|
|
}
|
|
|
|
return(rtn);
|
|
}
|
|
|
|
/*
|
|
* Function: malloc_check_str()
|
|
*
|
|
* Arguments: func - name of function calling this routine
|
|
* str - pointer to area to check
|
|
*
|
|
* Purpose: to verify that if str is within the malloc arena, the data
|
|
* it points to does not extend beyond the applicable region.
|
|
*
|
|
* Returns: Nothing of any use (function is void).
|
|
*
|
|
* Narrative:
|
|
* IF pointer is within malloc arena
|
|
* determin length of string
|
|
* call malloc_verify() to verify data is withing applicable region
|
|
* return
|
|
*
|
|
* Mod History:
|
|
* 90/01/24 cpcahil Initial revision.
|
|
* 90/01/29 cpcahil Added code to ignore recursive calls.
|
|
*/
|
|
void
|
|
malloc_check_str(func,str)
|
|
char * func;
|
|
char * str;
|
|
{
|
|
static int layers;
|
|
register char * s;
|
|
|
|
if( (layers++ == 0) && malloc_in_arena(str) )
|
|
{
|
|
for( s=str; *s; s++)
|
|
{
|
|
}
|
|
|
|
malloc_verify(func,str,s-str+1);
|
|
}
|
|
|
|
layers--;
|
|
}
|
|
|
|
/*
|
|
* Function: malloc_check_strn()
|
|
*
|
|
* Arguments: func - name of function calling this routine
|
|
* str - pointer to area to check
|
|
* len - max length of string
|
|
*
|
|
* Purpose: to verify that if str is within the malloc arena, the data
|
|
* it points to does not extend beyond the applicable region.
|
|
*
|
|
* Returns: Nothing of any use (function is void).
|
|
*
|
|
* Narrative:
|
|
* IF pointer is within malloc arena
|
|
* determin length of string
|
|
* call malloc_verify() to verify data is withing applicable region
|
|
* return
|
|
*
|
|
* Mod History:
|
|
* 90/01/24 cpcahil Initial revision.
|
|
* 90/01/29 cpcahil Added code to ignore recursive calls.
|
|
* 90/08/29 cpcahil added length (for strn* functions)
|
|
*/
|
|
void
|
|
malloc_check_strn(func,str,len)
|
|
char * func;
|
|
char * str;
|
|
int len;
|
|
{
|
|
register int i;
|
|
static int layers;
|
|
register char * s;
|
|
|
|
if( (layers++ == 0) && malloc_in_arena(str) )
|
|
{
|
|
for( s=str,i=0; (i < len) && *s; s++)
|
|
{
|
|
}
|
|
|
|
malloc_verify(func,str,s-str+1);
|
|
}
|
|
|
|
layers--;
|
|
}
|
|
|
|
/*
|
|
* Function: malloc_check_data()
|
|
*
|
|
* Arguments: func - name of function calling this routine
|
|
* ptr - pointer to area to check
|
|
* len - length to verify
|
|
*
|
|
* Purpose: to verify that if ptr is within the malloc arena, the data
|
|
* it points to does not extend beyond the applicable region.
|
|
*
|
|
* Returns: Nothing of any use (function is void).
|
|
*
|
|
* Narrative:
|
|
* IF pointer is within malloc arena
|
|
* call malloc_verify() to verify data is withing applicable region
|
|
* return
|
|
*
|
|
* Mod History:
|
|
* 90/01/24 cpcahil Initial revision.
|
|
* 90/01/29 cpcahil Added code to ignore recursive calls.
|
|
*/
|
|
void
|
|
malloc_check_data(func,ptr,len)
|
|
char * func;
|
|
char * ptr;
|
|
int len;
|
|
{
|
|
static int layers;
|
|
|
|
if( layers++ == 0 )
|
|
{
|
|
DEBUG3(40,"malloc_check_data(%s,0x%x,%d) called...",
|
|
func,ptr,len);
|
|
if( malloc_in_arena(ptr) )
|
|
{
|
|
DEBUG0(10,"pointer in malloc arena, verifying...");
|
|
malloc_verify(func,ptr,len);
|
|
}
|
|
}
|
|
|
|
layers--;
|
|
}
|
|
|
|
/*
|
|
* Function: malloc_verify()
|
|
*
|
|
* Arguments: func - name of function calling the malloc check routines
|
|
* ptr - pointer to area to check
|
|
* len - length to verify
|
|
*
|
|
* Purpose: to verify that the data ptr points to does not extend beyond
|
|
* the applicable malloc region. This function is only called
|
|
* if it has been determined that ptr points into the malloc arena.
|
|
*
|
|
* Returns: Nothing of any use (function is void).
|
|
*
|
|
* Narrative:
|
|
*
|
|
* Mod History:
|
|
* 90/01/24 cpcahil Initial revision.
|
|
*/
|
|
void
|
|
malloc_verify(func,ptr,len)
|
|
char * func;
|
|
char * ptr;
|
|
int len;
|
|
{
|
|
extern struct mlist * malloc_end;
|
|
extern int malloc_errno;
|
|
extern struct mlist malloc_start;
|
|
struct mlist * mptr;
|
|
|
|
DEBUG3(40,"malloc_verify(%s,0x%x,%d) called...", func,ptr,len);
|
|
/*
|
|
* Find the malloc block that includes this pointer
|
|
*/
|
|
mptr = &malloc_start;
|
|
while( mptr &&
|
|
! (((char *)mptr < ptr) && ((mptr->data+mptr->s.size) > ptr) ) )
|
|
{
|
|
mptr = mptr->next;
|
|
}
|
|
|
|
/*
|
|
* if ptr was not in a malloc block, it must be part of
|
|
* some direct sbrk() stuff, so just return.
|
|
*/
|
|
if( ! mptr )
|
|
{
|
|
DEBUG1(10,"ptr (0x%x) not found in malloc search", ptr);
|
|
return;
|
|
}
|
|
|
|
/*
|
|
* Now we have a valid malloc block that contains the indicated
|
|
* pointer. We must verify that it is withing the requested block
|
|
* size (as opposed to the real block size which is rounded up to
|
|
* allow for correct alignment).
|
|
*/
|
|
|
|
DEBUG4(60,"Checking 0x%x-0x%x, 0x%x-0x%x",
|
|
ptr, ptr+len, mptr->data, mptr->data+mptr->r_size);
|
|
|
|
if( (ptr < mptr->data) || ((ptr+len) > (mptr->data+mptr->r_size)) )
|
|
{
|
|
DEBUG4(0,"pointer not within region 0x%x-0x%x, 0x%x-0x%x",
|
|
ptr, ptr+len, mptr->data, mptr->data+mptr->r_size);
|
|
|
|
malloc_errno = M_CODE_OUTOF_BOUNDS;
|
|
malloc_warning(func);
|
|
}
|
|
|
|
return;
|
|
}
|
|
|
|
/*
|
|
* $Log: not supported by cvs2svn $
|
|
* Revision 1.1.1.1 1997/09/22 14:51:11 hjs
|
|
* dmake 4.1 orginal sourcen
|
|
*
|
|
* Revision 1.1.1.1 1997/07/15 16:02:26 dvadura
|
|
* dmake gold 4.1.00 initial import
|
|
*
|
|
* Revision 1.1.1.1 1996/10/27 07:30:14 dvadura
|
|
* Dmake 4.1 Initial Import
|
|
*
|
|
* Revision 1.1.1.1 1996/10/24 05:33:14 dvadura
|
|
* Initial import for final release of dmake 4.1
|
|
*
|
|
* Revision 1.1 1994/10/06 17:43:15 dvadura
|
|
* dmake Release Version 4.0, Initial revision
|
|
*
|
|
* Revision 1.1 1994/10/06 03:45:24 dvadura
|
|
* dmake Release Version 4.0, Initial revision
|
|
*
|
|
* Revision 1.1 1992/01/24 03:29:09 dvadura
|
|
* dmake Version 3.8, Initial revision
|
|
*
|
|
* Revision 1.5 90/08/29 22:23:48 cpcahil
|
|
* added new function to check on strings up to a specified length
|
|
* and used it within several strn* functions.
|
|
*
|
|
* Revision 1.4 90/05/11 00:13:09 cpcahil
|
|
* added copyright statment
|
|
*
|
|
* Revision 1.3 90/02/24 21:50:22 cpcahil
|
|
* lots of lint fixes
|
|
*
|
|
* Revision 1.2 90/02/24 17:29:38 cpcahil
|
|
* changed $Header to $Id so full path wouldnt be included as part of rcs
|
|
* id string
|
|
*
|
|
* Revision 1.1 90/02/24 14:57:03 cpcahil
|
|
* Initial revision
|
|
*
|
|
*/
|