Hi Team,

Thanks Philippe for your response. I have now used these
macros VALGRIND_MAKE_MEM_DEFINED after wherever i am attaching to the
shared memory to mark it valid from valgrind perspective. These shared
memory locations are anyway memsetted to 0 as part of initialisations once
created. With this i don't see further invalid read errors. Is this
fix/macro use fine?

Thanks & Regards,
Kiran H.

On Wed, Apr 23, 2025 at 2:09 AM Philippe Waroquiers <
philippe.waroqui...@skynet.be> wrote:

> If you use some piece of shared memory in a process X and this piece of
> shared memory is
> initialized by another process Y, valgrind/X has no way to know that
> process Y has
> initialized this memory.
>
> The typical solution is to have process X marking the memory as
> initialized just
> after it has attached to it.
>
> Thanks
> Philippe
>
> On Wed, 2025-04-23 at 01:24 +0530, kiran hardas wrote:
> > Hi Team,
> >
> > Thanks John Reiser for your observations. In continuation of further
> valgrind testing, i
> > am seeing below type of errors from my application code many times
> (around 200-300
> > times).
> >
> > ==3534== Invalid write of size 4
> > ==3534==    at 0xF5FAD71: <application backtrace>
> > ==3534==    by 0xF5FAD71:  <application backtrace>
> > ==3534==    by 0xF1F073F:  <application backtrace>
> > ==3534==  Address 0xf7fb1ce4 is not stack'd, malloc'd or (recently)
> free'd
> >
> >
> > The line nos. pointed by these errors are places in code where i am
> using structure
> > pointer variables to access structure members. This structure data is
> present in shared
> > memory location. On printing the structure member values using pointers
> in debug logs, i
> > dont see any problem with value.
> >
> > My suspicion is that since we are skipping address advisory logic in
> valgrind wrapper
> > during shmat attach call (passed with shmaddr as NULL), it is attaching
> to different
> > memory location provided by kernel which the valgrind may be detecting
> as invalid. There
> > are many similar errors coming from different parts of application code
> but relating to
> > the same action of structure member access from shared memory.
> >
> > One approach i was thinking is to suppress these invalid read errors
> using suppression
> > option of valgrind because i dont see any related symptom of this error,
> as in no crash
> > observed (seg fault). Will it be a proper approach? Would appreciate any
> > sugestions/advice for this issue. Or should i need to check any
> particular code area or
> > approach? Please do advice as it would be helpful. Thanks in advance!
> >
> >
> > Thanks & Regards,
> > Kiran H.
> >
> > On Tue, Apr 15, 2025 at 1:35 AM John Reiser <jrei...@bitwagon.com>
> wrote:
> > > On 4/14/25 7:13 AM, kiran hardas wrote:
> > > > Hi Team,
> > > >
> > > > I haven't received any suggestion or advice to my shmat valgrind
> wrapper
> > > > behaviour mentioned in previous mail.
> > >
> > > > --- a/valgrind/coregrind/m_syswrap/syswrap-generic.c
> > > > +++ b/valgrind/coregrind/m_syswrap/syswrap-generic.c
> > > > @@ -2052,7 +2052,7 @@ ML_(generic_PRE_sys_shmat) ( ThreadId tid,
> > > >    {
> > > >       /* void *shmat(int shmid, const void *shmaddr, int shmflg); */
> > > >       SizeT  segmentSize = get_shm_size ( arg0 );
> > > > -   UWord tmp;
> > > > +   UWord tmp = 0;
> > > >       Bool  ok;
> > > >       if (arg1 == 0) {
> > > >          /* arm-linux only: work around the fact that
> > >
> > > In the current git source for
> > > valgrind/coregrind/m_syswrap/syswrap-generic.c at function
> > > ML_(generic_PRE_sys_shmat) (line 2346), I see
> > > =====
> > >     if (arg1 == 0) {
> > >        /* arm-linux only: work around the fact that
> > >           VG_(am_get_advisory_client_simple) produces something that is
> > >           VKI_PAGE_SIZE aligned, whereas what we want is something
> > >           VKI_SHMLBA aligned, and VKI_SHMLBA >= VKI_PAGE_SIZE.  Hence
> > >           increase the request size by VKI_SHMLBA - VKI_PAGE_SIZE and
> > >           then round the result up to the next VKI_SHMLBA boundary.
> > >           See bug 222545 comment 15.  So far, arm-linux is the only
> > >           platform where this is known to be necessary. */
> > > =====
> > > where "git blame" for the first two lines says
> > > =====
> > > cc8ccbbfb4 coregrind/m_syswrap/syswrap-generic.c   (Julian Seward
> > > 2005-09-27 19:20:21 +0000 2346)    if (arg1 == 0) {
> > > 566a25cf7e coregrind/m_syswrap/syswrap-generic.c   (Julian Seward
> > > 2010-10-06 15:24:39 +0000 2347)       /* arm-linux only: work around
> the
> > > fact that
> > > =====
> > > but I do not see any guard that tests for arm-linux only.  So I would
> > > say that the current source has a bug!
> > >
> > > Thus your change
> > > > With this change, my shmat functions calls are working fine as
> different adresses
> > > > are picked up for attach.
> > >
> > > is not only OK; it should be propagated into the official source.
> > >
> > >
> > >
> > >
> > > _______________________________________________
> > > Valgrind-users mailing list
> > > Valgrind-users@lists.sourceforge.net
> > > https://lists.sourceforge.net/lists/listinfo/valgrind-users
> > _______________________________________________
> > Valgrind-users mailing list
> > Valgrind-users@lists.sourceforge.net
> > https://lists.sourceforge.net/lists/listinfo/valgrind-users
>
>
_______________________________________________
Valgrind-users mailing list
Valgrind-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/valgrind-users

Reply via email to