1.1 --- /dev/null Thu Jan 01 00:00:00 1970 +0000
1.2 +++ b/os/ossrv/ssl/libcrypto/src/crypto/mem_dbg.c Fri Jun 15 03:10:57 2012 +0200
1.3 @@ -0,0 +1,840 @@
1.4 +/* crypto/mem_dbg.c */
1.5 +/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
1.6 + * All rights reserved.
1.7 + *
1.8 + * This package is an SSL implementation written
1.9 + * by Eric Young (eay@cryptsoft.com).
1.10 + * The implementation was written so as to conform with Netscapes SSL.
1.11 + *
1.12 + * This library is free for commercial and non-commercial use as long as
1.13 + * the following conditions are aheared to. The following conditions
1.14 + * apply to all code found in this distribution, be it the RC4, RSA,
1.15 + * lhash, DES, etc., code; not just the SSL code. The SSL documentation
1.16 + * included with this distribution is covered by the same copyright terms
1.17 + * except that the holder is Tim Hudson (tjh@cryptsoft.com).
1.18 + *
1.19 + * Copyright remains Eric Young's, and as such any Copyright notices in
1.20 + * the code are not to be removed.
1.21 + * If this package is used in a product, Eric Young should be given attribution
1.22 + * as the author of the parts of the library used.
1.23 + * This can be in the form of a textual message at program startup or
1.24 + * in documentation (online or textual) provided with the package.
1.25 + *
1.26 + * Redistribution and use in source and binary forms, with or without
1.27 + * modification, are permitted provided that the following conditions
1.28 + * are met:
1.29 + * 1. Redistributions of source code must retain the copyright
1.30 + * notice, this list of conditions and the following disclaimer.
1.31 + * 2. Redistributions in binary form must reproduce the above copyright
1.32 + * notice, this list of conditions and the following disclaimer in the
1.33 + * documentation and/or other materials provided with the distribution.
1.34 + * 3. All advertising materials mentioning features or use of this software
1.35 + * must display the following acknowledgement:
1.36 + * "This product includes cryptographic software written by
1.37 + * Eric Young (eay@cryptsoft.com)"
1.38 + * The word 'cryptographic' can be left out if the rouines from the library
1.39 + * being used are not cryptographic related :-).
1.40 + * 4. If you include any Windows specific code (or a derivative thereof) from
1.41 + * the apps directory (application code) you must include an acknowledgement:
1.42 + * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
1.43 + *
1.44 + * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
1.45 + * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
1.46 + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
1.47 + * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
1.48 + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
1.49 + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
1.50 + * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
1.51 + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
1.52 + * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
1.53 + * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
1.54 + * SUCH DAMAGE.
1.55 + *
1.56 + * The licence and distribution terms for any publically available version or
1.57 + * derivative of this code cannot be changed. i.e. this code cannot simply be
1.58 + * copied and put under another distribution licence
1.59 + * [including the GNU Public Licence.]
1.60 + */
1.61 +/*
1.62 + © Portions copyright (c) 2006 Nokia Corporation. All rights reserved.
1.63 + */
1.64 +
1.65 +#include <stdio.h>
1.66 +#include <stdlib.h>
1.67 +#include <time.h>
1.68 +#include "cryptlib.h"
1.69 +#include <openssl/crypto.h>
1.70 +#include <openssl/buffer.h>
1.71 +#include <openssl/bio.h>
1.72 +#include <openssl/lhash.h>
1.73 +
1.74 +#if (defined(SYMBIAN) && (defined(__WINSCW__) || defined(__WINS__)))
1.75 +#include "libcrypto_wsd_macros.h"
1.76 +#include "libcrypto_wsd.h"
1.77 +#endif
1.78 +
1.79 +#ifndef EMULATOR
1.80 +static int mh_mode=CRYPTO_MEM_CHECK_OFF;
1.81 +/* The state changes to CRYPTO_MEM_CHECK_ON | CRYPTO_MEM_CHECK_ENABLE
1.82 + * when the application asks for it (usually after library initialisation
1.83 + * for which no book-keeping is desired).
1.84 + *
1.85 + * State CRYPTO_MEM_CHECK_ON exists only temporarily when the library
1.86 + * thinks that certain allocations should not be checked (e.g. the data
1.87 + * structures used for memory checking). It is not suitable as an initial
1.88 + * state: the library will unexpectedly enable memory checking when it
1.89 + * executes one of those sections that want to disable checking
1.90 + * temporarily.
1.91 + *
1.92 + * State CRYPTO_MEM_CHECK_ENABLE without ..._ON makes no sense whatsoever.
1.93 + */
1.94 +
1.95 +static unsigned long order = 0; /* number of memory requests */
1.96 +static LHASH *mh=NULL; /* hash-table of memory requests (address as key);
1.97 + * access requires MALLOC2 lock */
1.98 +
1.99 +
1.100 +#endif
1.101 +
1.102 +
1.103 +typedef struct app_mem_info_st
1.104 +/* For application-defined information (static C-string `info')
1.105 + * to be displayed in memory leak list.
1.106 + * Each thread has its own stack. For applications, there is
1.107 + * CRYPTO_push_info("...") to push an entry,
1.108 + * CRYPTO_pop_info() to pop an entry,
1.109 + * CRYPTO_remove_all_info() to pop all entries.
1.110 + */
1.111 + {
1.112 + unsigned long thread;
1.113 + const char *file;
1.114 + int line;
1.115 + const char *info;
1.116 + struct app_mem_info_st *next; /* tail of thread's stack */
1.117 + int references;
1.118 + } APP_INFO;
1.119 +
1.120 +static void app_info_free(APP_INFO *);
1.121 +
1.122 +#ifndef EMULATOR
1.123 +static LHASH *amih=NULL; /* hash-table with those app_mem_info_st's
1.124 + * that are at the top of their thread's stack
1.125 + * (with `thread' as key);
1.126 + * access requires MALLOC2 lock */
1.127 +#else
1.128 + GET_STATIC_VAR_FROM_TLS(amih,mem_dbg,LHASH *)
1.129 + #define amih (*GET_WSD_VAR_NAME(amih,mem_dbg,s)())
1.130 +#endif
1.131 +
1.132 +typedef struct mem_st
1.133 +/* memory-block description */
1.134 + {
1.135 + void *addr;
1.136 + int num;
1.137 + const char *file;
1.138 + int line;
1.139 + unsigned long thread;
1.140 + unsigned long iorder;
1.141 + time_t time;
1.142 + APP_INFO *app_info;
1.143 + } MEM;
1.144 +
1.145 +
1.146 +
1.147 +#ifdef EMULATOR
1.148 + GET_STATIC_VAR_FROM_TLS(mh_mode,mem_dbg,int)
1.149 + #define mh_mode (*GET_WSD_VAR_NAME(mh_mode,mem_dbg,s)())
1.150 + GET_STATIC_VAR_FROM_TLS(order,mem_dbg,unsigned long)
1.151 + #define order (*GET_WSD_VAR_NAME(order,mem_dbg,s)())
1.152 + GET_STATIC_VAR_FROM_TLS(mh,mem_dbg,LHASH*)
1.153 + #define mh (*GET_WSD_VAR_NAME(mh,mem_dbg,s)())
1.154 +#endif
1.155 +
1.156 +#ifndef EMULATOR
1.157 +static long options = /* extra information to be recorded */
1.158 +#if defined(CRYPTO_MDEBUG_TIME) || defined(CRYPTO_MDEBUG_ALL)
1.159 + V_CRYPTO_MDEBUG_TIME |
1.160 +#endif
1.161 +#if defined(CRYPTO_MDEBUG_THREAD) || defined(CRYPTO_MDEBUG_ALL)
1.162 + V_CRYPTO_MDEBUG_THREAD |
1.163 +#endif
1.164 + 0;
1.165 +static unsigned int num_disable = 0; /* num_disable > 0
1.166 + * iff
1.167 + * mh_mode == CRYPTO_MEM_CHECK_ON (w/o ..._ENABLE)
1.168 + */
1.169 +static unsigned long disabling_thread = 0; /* Valid iff num_disable > 0.
1.170 + * CRYPTO_LOCK_MALLOC2 is locked
1.171 + * exactly in this case (by the
1.172 + * thread named in disabling_thread).
1.173 + */
1.174 +
1.175 +#else
1.176 + GET_STATIC_VAR_FROM_TLS(options,mem_dbg,unsigned long)
1.177 + #define options (*GET_WSD_VAR_NAME(options,mem_dbg,s)())
1.178 + GET_STATIC_VAR_FROM_TLS(num_disable,mem_dbg,unsigned int)
1.179 + #define num_disable (*GET_WSD_VAR_NAME(num_disable,mem_dbg,s)())
1.180 + GET_STATIC_VAR_FROM_TLS(disabling_thread,mem_dbg,unsigned long)
1.181 + #define disabling_thread (*GET_WSD_VAR_NAME(disabling_thread,mem_dbg,s)())
1.182 +#endif
1.183 +
1.184 +
1.185 +
1.186 +static void app_info_free(APP_INFO *inf)
1.187 + {
1.188 + if (--(inf->references) <= 0)
1.189 + {
1.190 + if (inf->next != NULL)
1.191 + {
1.192 + app_info_free(inf->next);
1.193 + }
1.194 + OPENSSL_free(inf);
1.195 + }
1.196 + }
1.197 +
1.198 +EXPORT_C int CRYPTO_mem_ctrl(int mode)
1.199 + {
1.200 + int ret=mh_mode;
1.201 +
1.202 + CRYPTO_w_lock(CRYPTO_LOCK_MALLOC);
1.203 + switch (mode)
1.204 + {
1.205 + /* for applications (not to be called while multiple threads
1.206 + * use the library): */
1.207 + case CRYPTO_MEM_CHECK_ON: /* aka MemCheck_start() */
1.208 + mh_mode = CRYPTO_MEM_CHECK_ON|CRYPTO_MEM_CHECK_ENABLE;
1.209 + num_disable = 0;
1.210 + break;
1.211 + case CRYPTO_MEM_CHECK_OFF: /* aka MemCheck_stop() */
1.212 + mh_mode = 0;
1.213 + num_disable = 0; /* should be true *before* MemCheck_stop is used,
1.214 + or there'll be a lot of confusion */
1.215 + break;
1.216 +
1.217 + /* switch off temporarily (for library-internal use): */
1.218 + case CRYPTO_MEM_CHECK_DISABLE: /* aka MemCheck_off() */
1.219 + if (mh_mode & CRYPTO_MEM_CHECK_ON)
1.220 + {
1.221 + if (!num_disable || (disabling_thread != CRYPTO_thread_id())) /* otherwise we already have the MALLOC2 lock */
1.222 + {
1.223 + /* Long-time lock CRYPTO_LOCK_MALLOC2 must not be claimed while
1.224 + * we're holding CRYPTO_LOCK_MALLOC, or we'll deadlock if
1.225 + * somebody else holds CRYPTO_LOCK_MALLOC2 (and cannot release
1.226 + * it because we block entry to this function).
1.227 + * Give them a chance, first, and then claim the locks in
1.228 + * appropriate order (long-time lock first).
1.229 + */
1.230 + CRYPTO_w_unlock(CRYPTO_LOCK_MALLOC);
1.231 + /* Note that after we have waited for CRYPTO_LOCK_MALLOC2
1.232 + * and CRYPTO_LOCK_MALLOC, we'll still be in the right
1.233 + * "case" and "if" branch because MemCheck_start and
1.234 + * MemCheck_stop may never be used while there are multiple
1.235 + * OpenSSL threads. */
1.236 + CRYPTO_w_lock(CRYPTO_LOCK_MALLOC2);
1.237 + CRYPTO_w_lock(CRYPTO_LOCK_MALLOC);
1.238 + mh_mode &= ~CRYPTO_MEM_CHECK_ENABLE;
1.239 + disabling_thread=CRYPTO_thread_id();
1.240 + }
1.241 + num_disable++;
1.242 + }
1.243 + break;
1.244 + case CRYPTO_MEM_CHECK_ENABLE: /* aka MemCheck_on() */
1.245 + if (mh_mode & CRYPTO_MEM_CHECK_ON)
1.246 + {
1.247 + if (num_disable) /* always true, or something is going wrong */
1.248 + {
1.249 + num_disable--;
1.250 + if (num_disable == 0)
1.251 + {
1.252 + mh_mode|=CRYPTO_MEM_CHECK_ENABLE;
1.253 + CRYPTO_w_unlock(CRYPTO_LOCK_MALLOC2);
1.254 + }
1.255 + }
1.256 + }
1.257 + break;
1.258 +
1.259 + default:
1.260 + break;
1.261 + }
1.262 + CRYPTO_w_unlock(CRYPTO_LOCK_MALLOC);
1.263 + return(ret);
1.264 + }
1.265 +
1.266 +EXPORT_C int CRYPTO_is_mem_check_on(void)
1.267 + {
1.268 + int ret = 0;
1.269 +
1.270 + if (mh_mode & CRYPTO_MEM_CHECK_ON)
1.271 + {
1.272 + CRYPTO_r_lock(CRYPTO_LOCK_MALLOC);
1.273 +
1.274 + ret = (mh_mode & CRYPTO_MEM_CHECK_ENABLE)
1.275 + || (disabling_thread != CRYPTO_thread_id());
1.276 +
1.277 + CRYPTO_r_unlock(CRYPTO_LOCK_MALLOC);
1.278 + }
1.279 + return(ret);
1.280 + }
1.281 +
1.282 +
1.283 +EXPORT_C void CRYPTO_dbg_set_options(long bits)
1.284 + {
1.285 + options = bits;
1.286 + }
1.287 +
1.288 +EXPORT_C long CRYPTO_dbg_get_options(void)
1.289 + {
1.290 + return options;
1.291 + }
1.292 +
1.293 +/* static int mem_cmp(MEM *a, MEM *b) */
1.294 +static int mem_cmp(const void *a_void, const void *b_void)
1.295 + {
1.296 +#ifdef _WIN64
1.297 + const char *a=(const char *)((const MEM *)a_void)->addr,
1.298 + *b=(const char *)((const MEM *)b_void)->addr;
1.299 + if (a==b) return 0;
1.300 + else if (a>b) return 1;
1.301 + else return -1;
1.302 +#else
1.303 + return((const char *)((const MEM *)a_void)->addr
1.304 + - (const char *)((const MEM *)b_void)->addr);
1.305 +#endif
1.306 + }
1.307 +
1.308 +/* static unsigned long mem_hash(MEM *a) */
1.309 +static unsigned long mem_hash(const void *a_void)
1.310 + {
1.311 + unsigned long ret;
1.312 +
1.313 + ret=(unsigned long)((const MEM *)a_void)->addr;
1.314 +
1.315 + ret=ret*17851+(ret>>14)*7+(ret>>4)*251;
1.316 + return(ret);
1.317 + }
1.318 +
1.319 +/* static int app_info_cmp(APP_INFO *a, APP_INFO *b) */
1.320 +static int app_info_cmp(const void *a_void, const void *b_void)
1.321 + {
1.322 + return(((const APP_INFO *)a_void)->thread
1.323 + != ((const APP_INFO *)b_void)->thread);
1.324 + }
1.325 +
1.326 +/* static unsigned long app_info_hash(APP_INFO *a) */
1.327 +static unsigned long app_info_hash(const void *a_void)
1.328 + {
1.329 + unsigned long ret;
1.330 +
1.331 + ret=(unsigned long)((const APP_INFO *)a_void)->thread;
1.332 +
1.333 + ret=ret*17851+(ret>>14)*7+(ret>>4)*251;
1.334 + return(ret);
1.335 + }
1.336 +
1.337 +static APP_INFO *pop_info(void)
1.338 + {
1.339 + APP_INFO tmp;
1.340 + APP_INFO *ret = NULL;
1.341 +
1.342 + if (amih != NULL)
1.343 + {
1.344 + tmp.thread=CRYPTO_thread_id();
1.345 + if ((ret=(APP_INFO *)lh_delete(amih,&tmp)) != NULL)
1.346 + {
1.347 + APP_INFO *next=ret->next;
1.348 +
1.349 + if (next != NULL)
1.350 + {
1.351 + next->references++;
1.352 + lh_insert(amih,(char *)next);
1.353 + }
1.354 +#ifdef LEVITTE_DEBUG_MEM
1.355 + if (ret->thread != tmp.thread)
1.356 + {
1.357 + fprintf(stderr, "pop_info(): deleted info has other thread ID (%lu) than the current thread (%lu)!!!!\n",
1.358 + ret->thread, tmp.thread);
1.359 + abort();
1.360 + }
1.361 +#endif
1.362 + if (--(ret->references) <= 0)
1.363 + {
1.364 + ret->next = NULL;
1.365 + if (next != NULL)
1.366 + next->references--;
1.367 + OPENSSL_free(ret);
1.368 + }
1.369 + }
1.370 + }
1.371 + return(ret);
1.372 + }
1.373 +
1.374 +EXPORT_C int CRYPTO_push_info_(const char *info, const char *file, int line)
1.375 + {
1.376 + APP_INFO *ami=NULL, *amim=NULL;
1.377 + int ret=0;
1.378 +
1.379 + if (is_MemCheck_on())
1.380 + {
1.381 + MemCheck_off(); /* obtain MALLOC2 lock */
1.382 +
1.383 + if ((ami = (APP_INFO *)OPENSSL_malloc(sizeof(APP_INFO))) == NULL)
1.384 + {
1.385 + ret=0;
1.386 + goto err;
1.387 + }
1.388 + if (amih == NULL)
1.389 + {
1.390 + if ((amih=lh_new(app_info_hash, app_info_cmp)) == NULL)
1.391 + {
1.392 + OPENSSL_free(ami);
1.393 + ret=0;
1.394 + goto err;
1.395 + }
1.396 + }
1.397 +
1.398 + ami->thread=CRYPTO_thread_id();
1.399 + ami->file=file;
1.400 + ami->line=line;
1.401 + ami->info=info;
1.402 + ami->references=1;
1.403 + ami->next=NULL;
1.404 +
1.405 + if ((amim=(APP_INFO *)lh_insert(amih,(char *)ami)) != NULL)
1.406 + {
1.407 +#ifdef LEVITTE_DEBUG_MEM
1.408 + if (ami->thread != amim->thread)
1.409 + {
1.410 + fprintf(stderr, "CRYPTO_push_info(): previous info has other thread ID (%lu) than the current thread (%lu)!!!!\n",
1.411 + amim->thread, ami->thread);
1.412 + abort();
1.413 + }
1.414 +#endif
1.415 + ami->next=amim;
1.416 + }
1.417 + err:
1.418 + MemCheck_on(); /* release MALLOC2 lock */
1.419 + }
1.420 +
1.421 + return(ret);
1.422 + }
1.423 +
1.424 +EXPORT_C int CRYPTO_pop_info(void)
1.425 + {
1.426 + int ret=0;
1.427 +
1.428 + if (is_MemCheck_on()) /* _must_ be true, or something went severely wrong */
1.429 + {
1.430 + MemCheck_off(); /* obtain MALLOC2 lock */
1.431 +
1.432 + ret=(pop_info() != NULL);
1.433 +
1.434 + MemCheck_on(); /* release MALLOC2 lock */
1.435 + }
1.436 + return(ret);
1.437 + }
1.438 +
1.439 +EXPORT_C int CRYPTO_remove_all_info(void)
1.440 + {
1.441 + int ret=0;
1.442 +
1.443 + if (is_MemCheck_on()) /* _must_ be true */
1.444 + {
1.445 + MemCheck_off(); /* obtain MALLOC2 lock */
1.446 +
1.447 + while(pop_info() != NULL)
1.448 + ret++;
1.449 +
1.450 + MemCheck_on(); /* release MALLOC2 lock */
1.451 + }
1.452 + return(ret);
1.453 + }
1.454 +
1.455 +#ifndef EMULATOR
1.456 +static unsigned long break_order_num=0;
1.457 +#else
1.458 +static const unsigned long break_order_num=0;
1.459 +#endif
1.460 +EXPORT_C void CRYPTO_dbg_malloc(void *addr, int num, const char *file, int line,
1.461 + int before_p)
1.462 + {
1.463 + MEM *m=NULL,*mm=NULL;
1.464 + APP_INFO tmp,*amim=NULL;
1.465 +
1.466 + switch(before_p & 127)
1.467 + {
1.468 + case 0:
1.469 + break;
1.470 + case 1:
1.471 + if (addr == NULL)
1.472 + break;
1.473 +
1.474 + if (is_MemCheck_on())
1.475 + {
1.476 + MemCheck_off(); /* make sure we hold MALLOC2 lock */
1.477 + if ((m=(MEM *)OPENSSL_malloc(sizeof(MEM))) == NULL)
1.478 + {
1.479 + OPENSSL_free(addr);
1.480 + MemCheck_on(); /* release MALLOC2 lock
1.481 + * if num_disabled drops to 0 */
1.482 + return;
1.483 + }
1.484 + if (mh == NULL)
1.485 + {
1.486 + if ((mh=lh_new(mem_hash, mem_cmp)) == NULL)
1.487 + {
1.488 + OPENSSL_free(addr);
1.489 + OPENSSL_free(m);
1.490 + addr=NULL;
1.491 + goto err;
1.492 + }
1.493 + }
1.494 +
1.495 + m->addr=addr;
1.496 + m->file=file;
1.497 + m->line=line;
1.498 + m->num=num;
1.499 + if (options & V_CRYPTO_MDEBUG_THREAD)
1.500 + m->thread=CRYPTO_thread_id();
1.501 + else
1.502 + m->thread=0;
1.503 +
1.504 + if (order == break_order_num)
1.505 + {
1.506 + /* BREAK HERE */
1.507 + m->iorder=order;
1.508 + }
1.509 + m->iorder=order++;
1.510 +#ifdef LEVITTE_DEBUG_MEM
1.511 + fprintf(stderr, "LEVITTE_DEBUG_MEM: [%5d] %c 0x%p (%d)\n",
1.512 + m->iorder,
1.513 + (before_p & 128) ? '*' : '+',
1.514 + m->addr, m->num);
1.515 +#endif
1.516 + if (options & V_CRYPTO_MDEBUG_TIME)
1.517 + m->time=time(NULL);
1.518 + else
1.519 + m->time=0;
1.520 +
1.521 + tmp.thread=CRYPTO_thread_id();
1.522 + m->app_info=NULL;
1.523 + if (amih != NULL
1.524 + && (amim=(APP_INFO *)lh_retrieve(amih,(char *)&tmp)) != NULL)
1.525 + {
1.526 + m->app_info = amim;
1.527 + amim->references++;
1.528 + }
1.529 +
1.530 + if ((mm=(MEM *)lh_insert(mh,(char *)m)) != NULL)
1.531 + {
1.532 + /* Not good, but don't sweat it */
1.533 + if (mm->app_info != NULL)
1.534 + {
1.535 + mm->app_info->references--;
1.536 + }
1.537 + OPENSSL_free(mm);
1.538 + }
1.539 + err:
1.540 + MemCheck_on(); /* release MALLOC2 lock
1.541 + * if num_disabled drops to 0 */
1.542 + }
1.543 + break;
1.544 + }
1.545 + return;
1.546 + }
1.547 +
1.548 +EXPORT_C void CRYPTO_dbg_free(void *addr, int before_p)
1.549 + {
1.550 + MEM m,*mp=NULL;
1.551 +
1.552 + switch(before_p)
1.553 + {
1.554 + case 0:
1.555 + if (addr == NULL)
1.556 + break;
1.557 +
1.558 + if (is_MemCheck_on() && (mh != NULL))
1.559 + {
1.560 + MemCheck_off(); /* make sure we hold MALLOC2 lock */
1.561 +
1.562 + m.addr=addr;
1.563 + mp=(MEM *)lh_delete(mh,(char *)&m);
1.564 + if (mp != NULL)
1.565 + {
1.566 +#ifdef LEVITTE_DEBUG_MEM
1.567 + fprintf(stderr, "LEVITTE_DEBUG_MEM: [%5d] - 0x%p (%d)\n",
1.568 + mp->order, mp->addr, mp->num);
1.569 +#endif
1.570 + if (mp->app_info != NULL)
1.571 + app_info_free(mp->app_info);
1.572 + OPENSSL_free(mp);
1.573 + }
1.574 +
1.575 + MemCheck_on(); /* release MALLOC2 lock
1.576 + * if num_disabled drops to 0 */
1.577 + }
1.578 + break;
1.579 + case 1:
1.580 + break;
1.581 + }
1.582 + }
1.583 +
1.584 +EXPORT_C void CRYPTO_dbg_realloc(void *addr1, void *addr2, int num,
1.585 + const char *file, int line, int before_p)
1.586 + {
1.587 + MEM m,*mp;
1.588 +
1.589 +#ifdef LEVITTE_DEBUG_MEM
1.590 + fprintf(stderr, "LEVITTE_DEBUG_MEM: --> CRYPTO_dbg_malloc(addr1 = %p, addr2 = %p, num = %d, file = \"%s\", line = %d, before_p = %d)\n",
1.591 + addr1, addr2, num, file, line, before_p);
1.592 +#endif
1.593 +
1.594 + switch(before_p)
1.595 + {
1.596 + case 0:
1.597 + break;
1.598 + case 1:
1.599 + if (addr2 == NULL)
1.600 + break;
1.601 +
1.602 + if (addr1 == NULL)
1.603 + {
1.604 + CRYPTO_dbg_malloc(addr2, num, file, line, 128 | before_p);
1.605 + break;
1.606 + }
1.607 +
1.608 + if (is_MemCheck_on())
1.609 + {
1.610 + MemCheck_off(); /* make sure we hold MALLOC2 lock */
1.611 +
1.612 + m.addr=addr1;
1.613 + mp=(MEM *)lh_delete(mh,(char *)&m);
1.614 + if (mp != NULL)
1.615 + {
1.616 +#ifdef LEVITTE_DEBUG_MEM
1.617 + fprintf(stderr, "LEVITTE_DEBUG_MEM: [%5d] * 0x%p (%d) -> 0x%p (%d)\n",
1.618 + mp->order,
1.619 + mp->addr, mp->num,
1.620 + addr2, num);
1.621 +#endif
1.622 + mp->addr=addr2;
1.623 + mp->num=num;
1.624 + lh_insert(mh,(char *)mp);
1.625 + }
1.626 +
1.627 + MemCheck_on(); /* release MALLOC2 lock
1.628 + * if num_disabled drops to 0 */
1.629 + }
1.630 + break;
1.631 + }
1.632 + return;
1.633 + }
1.634 +
1.635 +
1.636 +typedef struct mem_leak_st
1.637 + {
1.638 + BIO *bio;
1.639 + int chunks;
1.640 + long bytes;
1.641 + } MEM_LEAK;
1.642 +
1.643 +static void print_leak(const MEM *m, MEM_LEAK *l)
1.644 + {
1.645 +#ifndef SYMBIAN
1.646 + char buf[1024];
1.647 +#else
1.648 + char buf[512];
1.649 +#endif
1.650 + char *bufp = buf;
1.651 + APP_INFO *amip;
1.652 + int ami_cnt;
1.653 + struct tm *lcl = NULL;
1.654 + unsigned long ti;
1.655 +
1.656 +#define BUF_REMAIN (sizeof buf - (size_t)(bufp - buf))
1.657 +
1.658 + if(m->addr == (char *)l->bio)
1.659 + return;
1.660 +
1.661 + if (options & V_CRYPTO_MDEBUG_TIME)
1.662 + {
1.663 + lcl = localtime(&m->time);
1.664 +
1.665 + BIO_snprintf(bufp, BUF_REMAIN, "[%02d:%02d:%02d] ",
1.666 + lcl->tm_hour,lcl->tm_min,lcl->tm_sec);
1.667 + bufp += strlen(bufp);
1.668 + }
1.669 +
1.670 + BIO_snprintf(bufp, BUF_REMAIN, "%5lu file=%s, line=%d, ",
1.671 + m->iorder,m->file,m->line);
1.672 + bufp += strlen(bufp);
1.673 +
1.674 + if (options & V_CRYPTO_MDEBUG_THREAD)
1.675 + {
1.676 + BIO_snprintf(bufp, BUF_REMAIN, "thread=%lu, ", m->thread);
1.677 + bufp += strlen(bufp);
1.678 + }
1.679 +
1.680 + BIO_snprintf(bufp, BUF_REMAIN, "number=%d, address=%08lX\n",
1.681 + m->num,(unsigned long)m->addr);
1.682 + bufp += strlen(bufp);
1.683 +
1.684 + BIO_puts(l->bio,buf);
1.685 +
1.686 + l->chunks++;
1.687 + l->bytes+=m->num;
1.688 +
1.689 + amip=m->app_info;
1.690 + ami_cnt=0;
1.691 + if (!amip)
1.692 + return;
1.693 + ti=amip->thread;
1.694 +
1.695 + do
1.696 + {
1.697 + int buf_len;
1.698 + int info_len;
1.699 +
1.700 + ami_cnt++;
1.701 + memset(buf,'>',ami_cnt);
1.702 + BIO_snprintf(buf + ami_cnt, sizeof buf - ami_cnt,
1.703 + " thread=%lu, file=%s, line=%d, info=\"",
1.704 + amip->thread, amip->file, amip->line);
1.705 + buf_len=strlen(buf);
1.706 + info_len=strlen(amip->info);
1.707 + if (128 - buf_len - 3 < info_len)
1.708 + {
1.709 + memcpy(buf + buf_len, amip->info, 128 - buf_len - 3);
1.710 + buf_len = 128 - 3;
1.711 + }
1.712 + else
1.713 + {
1.714 + BUF_strlcpy(buf + buf_len, amip->info,
1.715 + sizeof buf - buf_len);
1.716 + buf_len = strlen(buf);
1.717 + }
1.718 + BIO_snprintf(buf + buf_len, sizeof buf - buf_len, "\"\n");
1.719 +
1.720 + BIO_puts(l->bio,buf);
1.721 +
1.722 + amip = amip->next;
1.723 + }
1.724 + while(amip && amip->thread == ti);
1.725 +
1.726 +#ifdef LEVITTE_DEBUG_MEM
1.727 + if (amip)
1.728 + {
1.729 + fprintf(stderr, "Thread switch detected in backtrace!!!!\n");
1.730 + abort();
1.731 + }
1.732 +#endif
1.733 + }
1.734 +
1.735 +static IMPLEMENT_LHASH_DOALL_ARG_FN(print_leak, const MEM *, MEM_LEAK *)
1.736 +
1.737 +EXPORT_C void CRYPTO_mem_leaks(BIO *b)
1.738 + {
1.739 + MEM_LEAK ml;
1.740 +
1.741 + if (mh == NULL && amih == NULL)
1.742 + return;
1.743 +
1.744 + MemCheck_off(); /* obtain MALLOC2 lock */
1.745 +
1.746 + ml.bio=b;
1.747 + ml.bytes=0;
1.748 + ml.chunks=0;
1.749 + if (mh != NULL)
1.750 + lh_doall_arg(mh, LHASH_DOALL_ARG_FN(print_leak),
1.751 + (char *)&ml);
1.752 + if (ml.chunks != 0)
1.753 + {
1.754 + BIO_printf(b,"%ld bytes leaked in %d chunks\n",
1.755 + ml.bytes,ml.chunks);
1.756 + }
1.757 + else
1.758 + {
1.759 + /* Make sure that, if we found no leaks, memory-leak debugging itself
1.760 + * does not introduce memory leaks (which might irritate
1.761 + * external debugging tools).
1.762 + * (When someone enables leak checking, but does not call
1.763 + * this function, we declare it to be their fault.)
1.764 + *
1.765 + * XXX This should be in CRYPTO_mem_leaks_cb,
1.766 + * and CRYPTO_mem_leaks should be implemented by
1.767 + * using CRYPTO_mem_leaks_cb.
1.768 + * (Also their should be a variant of lh_doall_arg
1.769 + * that takes a function pointer instead of a void *;
1.770 + * this would obviate the ugly and illegal
1.771 + * void_fn_to_char kludge in CRYPTO_mem_leaks_cb.
1.772 + * Otherwise the code police will come and get us.)
1.773 + */
1.774 + int old_mh_mode;
1.775 +
1.776 + CRYPTO_w_lock(CRYPTO_LOCK_MALLOC);
1.777 +
1.778 + /* avoid deadlock when lh_free() uses CRYPTO_dbg_free(),
1.779 + * which uses CRYPTO_is_mem_check_on */
1.780 + old_mh_mode = mh_mode;
1.781 + mh_mode = CRYPTO_MEM_CHECK_OFF;
1.782 +
1.783 + if (mh != NULL)
1.784 + {
1.785 + lh_free(mh);
1.786 + mh = NULL;
1.787 + }
1.788 + if (amih != NULL)
1.789 + {
1.790 + if (lh_num_items(amih) == 0)
1.791 + {
1.792 + lh_free(amih);
1.793 + amih = NULL;
1.794 + }
1.795 + }
1.796 +
1.797 + mh_mode = old_mh_mode;
1.798 + CRYPTO_w_unlock(CRYPTO_LOCK_MALLOC);
1.799 + }
1.800 + MemCheck_on(); /* release MALLOC2 lock */
1.801 + }
1.802 +
1.803 +#ifndef OPENSSL_NO_FP_API
1.804 +EXPORT_C void CRYPTO_mem_leaks_fp(FILE *fp)
1.805 + {
1.806 + BIO *b=NULL;
1.807 +
1.808 + if (mh == NULL) return;
1.809 + /* Need to turn off memory checking when allocated BIOs ... especially
1.810 + * as we're creating them at a time when we're trying to check we've not
1.811 + * left anything un-free()'d!! */
1.812 + MemCheck_off();
1.813 + b = BIO_new(BIO_s_file());
1.814 + MemCheck_on();
1.815 + if(!b) return;
1.816 + BIO_set_fp(b,fp,BIO_NOCLOSE);
1.817 + CRYPTO_mem_leaks(b);
1.818 + BIO_free(b);
1.819 + }
1.820 +#endif
1.821 +
1.822 +
1.823 +
1.824 +/* FIXME: We really don't allow much to the callback. For example, it has
1.825 + no chance of reaching the info stack for the item it processes. Should
1.826 + it really be this way? -- Richard Levitte */
1.827 +/* NB: The prototypes have been typedef'd to CRYPTO_MEM_LEAK_CB inside crypto.h
1.828 + * If this code is restructured, remove the callback type if it is no longer
1.829 + * needed. -- Geoff Thorpe */
1.830 +static void cb_leak(const MEM *m, CRYPTO_MEM_LEAK_CB **cb)
1.831 + {
1.832 + (**cb)(m->iorder,m->file,m->line,m->num,m->addr);
1.833 + }
1.834 +
1.835 +static IMPLEMENT_LHASH_DOALL_ARG_FN(cb_leak, const MEM *, CRYPTO_MEM_LEAK_CB **)
1.836 +
1.837 +EXPORT_C void CRYPTO_mem_leaks_cb(CRYPTO_MEM_LEAK_CB *cb)
1.838 + {
1.839 + if (mh == NULL) return;
1.840 + CRYPTO_w_lock(CRYPTO_LOCK_MALLOC2);
1.841 + lh_doall_arg(mh, LHASH_DOALL_ARG_FN(cb_leak), &cb);
1.842 + CRYPTO_w_unlock(CRYPTO_LOCK_MALLOC2);
1.843 + }