sl@0: /* crypto/mem_dbg.c */ sl@0: /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) sl@0: * All rights reserved. sl@0: * sl@0: * This package is an SSL implementation written sl@0: * by Eric Young (eay@cryptsoft.com). sl@0: * The implementation was written so as to conform with Netscapes SSL. sl@0: * sl@0: * This library is free for commercial and non-commercial use as long as sl@0: * the following conditions are aheared to. The following conditions sl@0: * apply to all code found in this distribution, be it the RC4, RSA, sl@0: * lhash, DES, etc., code; not just the SSL code. The SSL documentation sl@0: * included with this distribution is covered by the same copyright terms sl@0: * except that the holder is Tim Hudson (tjh@cryptsoft.com). sl@0: * sl@0: * Copyright remains Eric Young's, and as such any Copyright notices in sl@0: * the code are not to be removed. sl@0: * If this package is used in a product, Eric Young should be given attribution sl@0: * as the author of the parts of the library used. sl@0: * This can be in the form of a textual message at program startup or sl@0: * in documentation (online or textual) provided with the package. sl@0: * sl@0: * Redistribution and use in source and binary forms, with or without sl@0: * modification, are permitted provided that the following conditions sl@0: * are met: sl@0: * 1. Redistributions of source code must retain the copyright sl@0: * notice, this list of conditions and the following disclaimer. sl@0: * 2. Redistributions in binary form must reproduce the above copyright sl@0: * notice, this list of conditions and the following disclaimer in the sl@0: * documentation and/or other materials provided with the distribution. sl@0: * 3. All advertising materials mentioning features or use of this software sl@0: * must display the following acknowledgement: sl@0: * "This product includes cryptographic software written by sl@0: * Eric Young (eay@cryptsoft.com)" sl@0: * The word 'cryptographic' can be left out if the rouines from the library sl@0: * being used are not cryptographic related :-). sl@0: * 4. If you include any Windows specific code (or a derivative thereof) from sl@0: * the apps directory (application code) you must include an acknowledgement: sl@0: * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" sl@0: * sl@0: * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND sl@0: * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE sl@0: * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE sl@0: * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE sl@0: * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL sl@0: * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS sl@0: * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) sl@0: * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT sl@0: * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY sl@0: * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF sl@0: * SUCH DAMAGE. sl@0: * sl@0: * The licence and distribution terms for any publically available version or sl@0: * derivative of this code cannot be changed. i.e. this code cannot simply be sl@0: * copied and put under another distribution licence sl@0: * [including the GNU Public Licence.] sl@0: */ sl@0: /* sl@0: © Portions copyright (c) 2006 Nokia Corporation. All rights reserved. sl@0: */ sl@0: sl@0: #include sl@0: #include sl@0: #include sl@0: #include "cryptlib.h" sl@0: #include sl@0: #include sl@0: #include sl@0: #include sl@0: sl@0: #if (defined(SYMBIAN) && (defined(__WINSCW__) || defined(__WINS__))) sl@0: #include "libcrypto_wsd_macros.h" sl@0: #include "libcrypto_wsd.h" sl@0: #endif sl@0: sl@0: #ifndef EMULATOR sl@0: static int mh_mode=CRYPTO_MEM_CHECK_OFF; sl@0: /* The state changes to CRYPTO_MEM_CHECK_ON | CRYPTO_MEM_CHECK_ENABLE sl@0: * when the application asks for it (usually after library initialisation sl@0: * for which no book-keeping is desired). sl@0: * sl@0: * State CRYPTO_MEM_CHECK_ON exists only temporarily when the library sl@0: * thinks that certain allocations should not be checked (e.g. the data sl@0: * structures used for memory checking). It is not suitable as an initial sl@0: * state: the library will unexpectedly enable memory checking when it sl@0: * executes one of those sections that want to disable checking sl@0: * temporarily. sl@0: * sl@0: * State CRYPTO_MEM_CHECK_ENABLE without ..._ON makes no sense whatsoever. sl@0: */ sl@0: sl@0: static unsigned long order = 0; /* number of memory requests */ sl@0: static LHASH *mh=NULL; /* hash-table of memory requests (address as key); sl@0: * access requires MALLOC2 lock */ sl@0: sl@0: sl@0: #endif sl@0: sl@0: sl@0: typedef struct app_mem_info_st sl@0: /* For application-defined information (static C-string `info') sl@0: * to be displayed in memory leak list. sl@0: * Each thread has its own stack. For applications, there is sl@0: * CRYPTO_push_info("...") to push an entry, sl@0: * CRYPTO_pop_info() to pop an entry, sl@0: * CRYPTO_remove_all_info() to pop all entries. sl@0: */ sl@0: { sl@0: unsigned long thread; sl@0: const char *file; sl@0: int line; sl@0: const char *info; sl@0: struct app_mem_info_st *next; /* tail of thread's stack */ sl@0: int references; sl@0: } APP_INFO; sl@0: sl@0: static void app_info_free(APP_INFO *); sl@0: sl@0: #ifndef EMULATOR sl@0: static LHASH *amih=NULL; /* hash-table with those app_mem_info_st's sl@0: * that are at the top of their thread's stack sl@0: * (with `thread' as key); sl@0: * access requires MALLOC2 lock */ sl@0: #else sl@0: GET_STATIC_VAR_FROM_TLS(amih,mem_dbg,LHASH *) sl@0: #define amih (*GET_WSD_VAR_NAME(amih,mem_dbg,s)()) sl@0: #endif sl@0: sl@0: typedef struct mem_st sl@0: /* memory-block description */ sl@0: { sl@0: void *addr; sl@0: int num; sl@0: const char *file; sl@0: int line; sl@0: unsigned long thread; sl@0: unsigned long iorder; sl@0: time_t time; sl@0: APP_INFO *app_info; sl@0: } MEM; sl@0: sl@0: sl@0: sl@0: #ifdef EMULATOR sl@0: GET_STATIC_VAR_FROM_TLS(mh_mode,mem_dbg,int) sl@0: #define mh_mode (*GET_WSD_VAR_NAME(mh_mode,mem_dbg,s)()) sl@0: GET_STATIC_VAR_FROM_TLS(order,mem_dbg,unsigned long) sl@0: #define order (*GET_WSD_VAR_NAME(order,mem_dbg,s)()) sl@0: GET_STATIC_VAR_FROM_TLS(mh,mem_dbg,LHASH*) sl@0: #define mh (*GET_WSD_VAR_NAME(mh,mem_dbg,s)()) sl@0: #endif sl@0: sl@0: #ifndef EMULATOR sl@0: static long options = /* extra information to be recorded */ sl@0: #if defined(CRYPTO_MDEBUG_TIME) || defined(CRYPTO_MDEBUG_ALL) sl@0: V_CRYPTO_MDEBUG_TIME | sl@0: #endif sl@0: #if defined(CRYPTO_MDEBUG_THREAD) || defined(CRYPTO_MDEBUG_ALL) sl@0: V_CRYPTO_MDEBUG_THREAD | sl@0: #endif sl@0: 0; sl@0: static unsigned int num_disable = 0; /* num_disable > 0 sl@0: * iff sl@0: * mh_mode == CRYPTO_MEM_CHECK_ON (w/o ..._ENABLE) sl@0: */ sl@0: static unsigned long disabling_thread = 0; /* Valid iff num_disable > 0. sl@0: * CRYPTO_LOCK_MALLOC2 is locked sl@0: * exactly in this case (by the sl@0: * thread named in disabling_thread). sl@0: */ sl@0: sl@0: #else sl@0: GET_STATIC_VAR_FROM_TLS(options,mem_dbg,unsigned long) sl@0: #define options (*GET_WSD_VAR_NAME(options,mem_dbg,s)()) sl@0: GET_STATIC_VAR_FROM_TLS(num_disable,mem_dbg,unsigned int) sl@0: #define num_disable (*GET_WSD_VAR_NAME(num_disable,mem_dbg,s)()) sl@0: GET_STATIC_VAR_FROM_TLS(disabling_thread,mem_dbg,unsigned long) sl@0: #define disabling_thread (*GET_WSD_VAR_NAME(disabling_thread,mem_dbg,s)()) sl@0: #endif sl@0: sl@0: sl@0: sl@0: static void app_info_free(APP_INFO *inf) sl@0: { sl@0: if (--(inf->references) <= 0) sl@0: { sl@0: if (inf->next != NULL) sl@0: { sl@0: app_info_free(inf->next); sl@0: } sl@0: OPENSSL_free(inf); sl@0: } sl@0: } sl@0: sl@0: EXPORT_C int CRYPTO_mem_ctrl(int mode) sl@0: { sl@0: int ret=mh_mode; sl@0: sl@0: CRYPTO_w_lock(CRYPTO_LOCK_MALLOC); sl@0: switch (mode) sl@0: { sl@0: /* for applications (not to be called while multiple threads sl@0: * use the library): */ sl@0: case CRYPTO_MEM_CHECK_ON: /* aka MemCheck_start() */ sl@0: mh_mode = CRYPTO_MEM_CHECK_ON|CRYPTO_MEM_CHECK_ENABLE; sl@0: num_disable = 0; sl@0: break; sl@0: case CRYPTO_MEM_CHECK_OFF: /* aka MemCheck_stop() */ sl@0: mh_mode = 0; sl@0: num_disable = 0; /* should be true *before* MemCheck_stop is used, sl@0: or there'll be a lot of confusion */ sl@0: break; sl@0: sl@0: /* switch off temporarily (for library-internal use): */ sl@0: case CRYPTO_MEM_CHECK_DISABLE: /* aka MemCheck_off() */ sl@0: if (mh_mode & CRYPTO_MEM_CHECK_ON) sl@0: { sl@0: if (!num_disable || (disabling_thread != CRYPTO_thread_id())) /* otherwise we already have the MALLOC2 lock */ sl@0: { sl@0: /* Long-time lock CRYPTO_LOCK_MALLOC2 must not be claimed while sl@0: * we're holding CRYPTO_LOCK_MALLOC, or we'll deadlock if sl@0: * somebody else holds CRYPTO_LOCK_MALLOC2 (and cannot release sl@0: * it because we block entry to this function). sl@0: * Give them a chance, first, and then claim the locks in sl@0: * appropriate order (long-time lock first). sl@0: */ sl@0: CRYPTO_w_unlock(CRYPTO_LOCK_MALLOC); sl@0: /* Note that after we have waited for CRYPTO_LOCK_MALLOC2 sl@0: * and CRYPTO_LOCK_MALLOC, we'll still be in the right sl@0: * "case" and "if" branch because MemCheck_start and sl@0: * MemCheck_stop may never be used while there are multiple sl@0: * OpenSSL threads. */ sl@0: CRYPTO_w_lock(CRYPTO_LOCK_MALLOC2); sl@0: CRYPTO_w_lock(CRYPTO_LOCK_MALLOC); sl@0: mh_mode &= ~CRYPTO_MEM_CHECK_ENABLE; sl@0: disabling_thread=CRYPTO_thread_id(); sl@0: } sl@0: num_disable++; sl@0: } sl@0: break; sl@0: case CRYPTO_MEM_CHECK_ENABLE: /* aka MemCheck_on() */ sl@0: if (mh_mode & CRYPTO_MEM_CHECK_ON) sl@0: { sl@0: if (num_disable) /* always true, or something is going wrong */ sl@0: { sl@0: num_disable--; sl@0: if (num_disable == 0) sl@0: { sl@0: mh_mode|=CRYPTO_MEM_CHECK_ENABLE; sl@0: CRYPTO_w_unlock(CRYPTO_LOCK_MALLOC2); sl@0: } sl@0: } sl@0: } sl@0: break; sl@0: sl@0: default: sl@0: break; sl@0: } sl@0: CRYPTO_w_unlock(CRYPTO_LOCK_MALLOC); sl@0: return(ret); sl@0: } sl@0: sl@0: EXPORT_C int CRYPTO_is_mem_check_on(void) sl@0: { sl@0: int ret = 0; sl@0: sl@0: if (mh_mode & CRYPTO_MEM_CHECK_ON) sl@0: { sl@0: CRYPTO_r_lock(CRYPTO_LOCK_MALLOC); sl@0: sl@0: ret = (mh_mode & CRYPTO_MEM_CHECK_ENABLE) sl@0: || (disabling_thread != CRYPTO_thread_id()); sl@0: sl@0: CRYPTO_r_unlock(CRYPTO_LOCK_MALLOC); sl@0: } sl@0: return(ret); sl@0: } sl@0: sl@0: sl@0: EXPORT_C void CRYPTO_dbg_set_options(long bits) sl@0: { sl@0: options = bits; sl@0: } sl@0: sl@0: EXPORT_C long CRYPTO_dbg_get_options(void) sl@0: { sl@0: return options; sl@0: } sl@0: sl@0: /* static int mem_cmp(MEM *a, MEM *b) */ sl@0: static int mem_cmp(const void *a_void, const void *b_void) sl@0: { sl@0: #ifdef _WIN64 sl@0: const char *a=(const char *)((const MEM *)a_void)->addr, sl@0: *b=(const char *)((const MEM *)b_void)->addr; sl@0: if (a==b) return 0; sl@0: else if (a>b) return 1; sl@0: else return -1; sl@0: #else sl@0: return((const char *)((const MEM *)a_void)->addr sl@0: - (const char *)((const MEM *)b_void)->addr); sl@0: #endif sl@0: } sl@0: sl@0: /* static unsigned long mem_hash(MEM *a) */ sl@0: static unsigned long mem_hash(const void *a_void) sl@0: { sl@0: unsigned long ret; sl@0: sl@0: ret=(unsigned long)((const MEM *)a_void)->addr; sl@0: sl@0: ret=ret*17851+(ret>>14)*7+(ret>>4)*251; sl@0: return(ret); sl@0: } sl@0: sl@0: /* static int app_info_cmp(APP_INFO *a, APP_INFO *b) */ sl@0: static int app_info_cmp(const void *a_void, const void *b_void) sl@0: { sl@0: return(((const APP_INFO *)a_void)->thread sl@0: != ((const APP_INFO *)b_void)->thread); sl@0: } sl@0: sl@0: /* static unsigned long app_info_hash(APP_INFO *a) */ sl@0: static unsigned long app_info_hash(const void *a_void) sl@0: { sl@0: unsigned long ret; sl@0: sl@0: ret=(unsigned long)((const APP_INFO *)a_void)->thread; sl@0: sl@0: ret=ret*17851+(ret>>14)*7+(ret>>4)*251; sl@0: return(ret); sl@0: } sl@0: sl@0: static APP_INFO *pop_info(void) sl@0: { sl@0: APP_INFO tmp; sl@0: APP_INFO *ret = NULL; sl@0: sl@0: if (amih != NULL) sl@0: { sl@0: tmp.thread=CRYPTO_thread_id(); sl@0: if ((ret=(APP_INFO *)lh_delete(amih,&tmp)) != NULL) sl@0: { sl@0: APP_INFO *next=ret->next; sl@0: sl@0: if (next != NULL) sl@0: { sl@0: next->references++; sl@0: lh_insert(amih,(char *)next); sl@0: } sl@0: #ifdef LEVITTE_DEBUG_MEM sl@0: if (ret->thread != tmp.thread) sl@0: { sl@0: fprintf(stderr, "pop_info(): deleted info has other thread ID (%lu) than the current thread (%lu)!!!!\n", sl@0: ret->thread, tmp.thread); sl@0: abort(); sl@0: } sl@0: #endif sl@0: if (--(ret->references) <= 0) sl@0: { sl@0: ret->next = NULL; sl@0: if (next != NULL) sl@0: next->references--; sl@0: OPENSSL_free(ret); sl@0: } sl@0: } sl@0: } sl@0: return(ret); sl@0: } sl@0: sl@0: EXPORT_C int CRYPTO_push_info_(const char *info, const char *file, int line) sl@0: { sl@0: APP_INFO *ami=NULL, *amim=NULL; sl@0: int ret=0; sl@0: sl@0: if (is_MemCheck_on()) sl@0: { sl@0: MemCheck_off(); /* obtain MALLOC2 lock */ sl@0: sl@0: if ((ami = (APP_INFO *)OPENSSL_malloc(sizeof(APP_INFO))) == NULL) sl@0: { sl@0: ret=0; sl@0: goto err; sl@0: } sl@0: if (amih == NULL) sl@0: { sl@0: if ((amih=lh_new(app_info_hash, app_info_cmp)) == NULL) sl@0: { sl@0: OPENSSL_free(ami); sl@0: ret=0; sl@0: goto err; sl@0: } sl@0: } sl@0: sl@0: ami->thread=CRYPTO_thread_id(); sl@0: ami->file=file; sl@0: ami->line=line; sl@0: ami->info=info; sl@0: ami->references=1; sl@0: ami->next=NULL; sl@0: sl@0: if ((amim=(APP_INFO *)lh_insert(amih,(char *)ami)) != NULL) sl@0: { sl@0: #ifdef LEVITTE_DEBUG_MEM sl@0: if (ami->thread != amim->thread) sl@0: { sl@0: fprintf(stderr, "CRYPTO_push_info(): previous info has other thread ID (%lu) than the current thread (%lu)!!!!\n", sl@0: amim->thread, ami->thread); sl@0: abort(); sl@0: } sl@0: #endif sl@0: ami->next=amim; sl@0: } sl@0: err: sl@0: MemCheck_on(); /* release MALLOC2 lock */ sl@0: } sl@0: sl@0: return(ret); sl@0: } sl@0: sl@0: EXPORT_C int CRYPTO_pop_info(void) sl@0: { sl@0: int ret=0; sl@0: sl@0: if (is_MemCheck_on()) /* _must_ be true, or something went severely wrong */ sl@0: { sl@0: MemCheck_off(); /* obtain MALLOC2 lock */ sl@0: sl@0: ret=(pop_info() != NULL); sl@0: sl@0: MemCheck_on(); /* release MALLOC2 lock */ sl@0: } sl@0: return(ret); sl@0: } sl@0: sl@0: EXPORT_C int CRYPTO_remove_all_info(void) sl@0: { sl@0: int ret=0; sl@0: sl@0: if (is_MemCheck_on()) /* _must_ be true */ sl@0: { sl@0: MemCheck_off(); /* obtain MALLOC2 lock */ sl@0: sl@0: while(pop_info() != NULL) sl@0: ret++; sl@0: sl@0: MemCheck_on(); /* release MALLOC2 lock */ sl@0: } sl@0: return(ret); sl@0: } sl@0: sl@0: #ifndef EMULATOR sl@0: static unsigned long break_order_num=0; sl@0: #else sl@0: static const unsigned long break_order_num=0; sl@0: #endif sl@0: EXPORT_C void CRYPTO_dbg_malloc(void *addr, int num, const char *file, int line, sl@0: int before_p) sl@0: { sl@0: MEM *m=NULL,*mm=NULL; sl@0: APP_INFO tmp,*amim=NULL; sl@0: sl@0: switch(before_p & 127) sl@0: { sl@0: case 0: sl@0: break; sl@0: case 1: sl@0: if (addr == NULL) sl@0: break; sl@0: sl@0: if (is_MemCheck_on()) sl@0: { sl@0: MemCheck_off(); /* make sure we hold MALLOC2 lock */ sl@0: if ((m=(MEM *)OPENSSL_malloc(sizeof(MEM))) == NULL) sl@0: { sl@0: OPENSSL_free(addr); sl@0: MemCheck_on(); /* release MALLOC2 lock sl@0: * if num_disabled drops to 0 */ sl@0: return; sl@0: } sl@0: if (mh == NULL) sl@0: { sl@0: if ((mh=lh_new(mem_hash, mem_cmp)) == NULL) sl@0: { sl@0: OPENSSL_free(addr); sl@0: OPENSSL_free(m); sl@0: addr=NULL; sl@0: goto err; sl@0: } sl@0: } sl@0: sl@0: m->addr=addr; sl@0: m->file=file; sl@0: m->line=line; sl@0: m->num=num; sl@0: if (options & V_CRYPTO_MDEBUG_THREAD) sl@0: m->thread=CRYPTO_thread_id(); sl@0: else sl@0: m->thread=0; sl@0: sl@0: if (order == break_order_num) sl@0: { sl@0: /* BREAK HERE */ sl@0: m->iorder=order; sl@0: } sl@0: m->iorder=order++; sl@0: #ifdef LEVITTE_DEBUG_MEM sl@0: fprintf(stderr, "LEVITTE_DEBUG_MEM: [%5d] %c 0x%p (%d)\n", sl@0: m->iorder, sl@0: (before_p & 128) ? '*' : '+', sl@0: m->addr, m->num); sl@0: #endif sl@0: if (options & V_CRYPTO_MDEBUG_TIME) sl@0: m->time=time(NULL); sl@0: else sl@0: m->time=0; sl@0: sl@0: tmp.thread=CRYPTO_thread_id(); sl@0: m->app_info=NULL; sl@0: if (amih != NULL sl@0: && (amim=(APP_INFO *)lh_retrieve(amih,(char *)&tmp)) != NULL) sl@0: { sl@0: m->app_info = amim; sl@0: amim->references++; sl@0: } sl@0: sl@0: if ((mm=(MEM *)lh_insert(mh,(char *)m)) != NULL) sl@0: { sl@0: /* Not good, but don't sweat it */ sl@0: if (mm->app_info != NULL) sl@0: { sl@0: mm->app_info->references--; sl@0: } sl@0: OPENSSL_free(mm); sl@0: } sl@0: err: sl@0: MemCheck_on(); /* release MALLOC2 lock sl@0: * if num_disabled drops to 0 */ sl@0: } sl@0: break; sl@0: } sl@0: return; sl@0: } sl@0: sl@0: EXPORT_C void CRYPTO_dbg_free(void *addr, int before_p) sl@0: { sl@0: MEM m,*mp=NULL; sl@0: sl@0: switch(before_p) sl@0: { sl@0: case 0: sl@0: if (addr == NULL) sl@0: break; sl@0: sl@0: if (is_MemCheck_on() && (mh != NULL)) sl@0: { sl@0: MemCheck_off(); /* make sure we hold MALLOC2 lock */ sl@0: sl@0: m.addr=addr; sl@0: mp=(MEM *)lh_delete(mh,(char *)&m); sl@0: if (mp != NULL) sl@0: { sl@0: #ifdef LEVITTE_DEBUG_MEM sl@0: fprintf(stderr, "LEVITTE_DEBUG_MEM: [%5d] - 0x%p (%d)\n", sl@0: mp->order, mp->addr, mp->num); sl@0: #endif sl@0: if (mp->app_info != NULL) sl@0: app_info_free(mp->app_info); sl@0: OPENSSL_free(mp); sl@0: } sl@0: sl@0: MemCheck_on(); /* release MALLOC2 lock sl@0: * if num_disabled drops to 0 */ sl@0: } sl@0: break; sl@0: case 1: sl@0: break; sl@0: } sl@0: } sl@0: sl@0: EXPORT_C void CRYPTO_dbg_realloc(void *addr1, void *addr2, int num, sl@0: const char *file, int line, int before_p) sl@0: { sl@0: MEM m,*mp; sl@0: sl@0: #ifdef LEVITTE_DEBUG_MEM sl@0: fprintf(stderr, "LEVITTE_DEBUG_MEM: --> CRYPTO_dbg_malloc(addr1 = %p, addr2 = %p, num = %d, file = \"%s\", line = %d, before_p = %d)\n", sl@0: addr1, addr2, num, file, line, before_p); sl@0: #endif sl@0: sl@0: switch(before_p) sl@0: { sl@0: case 0: sl@0: break; sl@0: case 1: sl@0: if (addr2 == NULL) sl@0: break; sl@0: sl@0: if (addr1 == NULL) sl@0: { sl@0: CRYPTO_dbg_malloc(addr2, num, file, line, 128 | before_p); sl@0: break; sl@0: } sl@0: sl@0: if (is_MemCheck_on()) sl@0: { sl@0: MemCheck_off(); /* make sure we hold MALLOC2 lock */ sl@0: sl@0: m.addr=addr1; sl@0: mp=(MEM *)lh_delete(mh,(char *)&m); sl@0: if (mp != NULL) sl@0: { sl@0: #ifdef LEVITTE_DEBUG_MEM sl@0: fprintf(stderr, "LEVITTE_DEBUG_MEM: [%5d] * 0x%p (%d) -> 0x%p (%d)\n", sl@0: mp->order, sl@0: mp->addr, mp->num, sl@0: addr2, num); sl@0: #endif sl@0: mp->addr=addr2; sl@0: mp->num=num; sl@0: lh_insert(mh,(char *)mp); sl@0: } sl@0: sl@0: MemCheck_on(); /* release MALLOC2 lock sl@0: * if num_disabled drops to 0 */ sl@0: } sl@0: break; sl@0: } sl@0: return; sl@0: } sl@0: sl@0: sl@0: typedef struct mem_leak_st sl@0: { sl@0: BIO *bio; sl@0: int chunks; sl@0: long bytes; sl@0: } MEM_LEAK; sl@0: sl@0: static void print_leak(const MEM *m, MEM_LEAK *l) sl@0: { sl@0: #ifndef SYMBIAN sl@0: char buf[1024]; sl@0: #else sl@0: char buf[512]; sl@0: #endif sl@0: char *bufp = buf; sl@0: APP_INFO *amip; sl@0: int ami_cnt; sl@0: struct tm *lcl = NULL; sl@0: unsigned long ti; sl@0: sl@0: #define BUF_REMAIN (sizeof buf - (size_t)(bufp - buf)) sl@0: sl@0: if(m->addr == (char *)l->bio) sl@0: return; sl@0: sl@0: if (options & V_CRYPTO_MDEBUG_TIME) sl@0: { sl@0: lcl = localtime(&m->time); sl@0: sl@0: BIO_snprintf(bufp, BUF_REMAIN, "[%02d:%02d:%02d] ", sl@0: lcl->tm_hour,lcl->tm_min,lcl->tm_sec); sl@0: bufp += strlen(bufp); sl@0: } sl@0: sl@0: BIO_snprintf(bufp, BUF_REMAIN, "%5lu file=%s, line=%d, ", sl@0: m->iorder,m->file,m->line); sl@0: bufp += strlen(bufp); sl@0: sl@0: if (options & V_CRYPTO_MDEBUG_THREAD) sl@0: { sl@0: BIO_snprintf(bufp, BUF_REMAIN, "thread=%lu, ", m->thread); sl@0: bufp += strlen(bufp); sl@0: } sl@0: sl@0: BIO_snprintf(bufp, BUF_REMAIN, "number=%d, address=%08lX\n", sl@0: m->num,(unsigned long)m->addr); sl@0: bufp += strlen(bufp); sl@0: sl@0: BIO_puts(l->bio,buf); sl@0: sl@0: l->chunks++; sl@0: l->bytes+=m->num; sl@0: sl@0: amip=m->app_info; sl@0: ami_cnt=0; sl@0: if (!amip) sl@0: return; sl@0: ti=amip->thread; sl@0: sl@0: do sl@0: { sl@0: int buf_len; sl@0: int info_len; sl@0: sl@0: ami_cnt++; sl@0: memset(buf,'>',ami_cnt); sl@0: BIO_snprintf(buf + ami_cnt, sizeof buf - ami_cnt, sl@0: " thread=%lu, file=%s, line=%d, info=\"", sl@0: amip->thread, amip->file, amip->line); sl@0: buf_len=strlen(buf); sl@0: info_len=strlen(amip->info); sl@0: if (128 - buf_len - 3 < info_len) sl@0: { sl@0: memcpy(buf + buf_len, amip->info, 128 - buf_len - 3); sl@0: buf_len = 128 - 3; sl@0: } sl@0: else sl@0: { sl@0: BUF_strlcpy(buf + buf_len, amip->info, sl@0: sizeof buf - buf_len); sl@0: buf_len = strlen(buf); sl@0: } sl@0: BIO_snprintf(buf + buf_len, sizeof buf - buf_len, "\"\n"); sl@0: sl@0: BIO_puts(l->bio,buf); sl@0: sl@0: amip = amip->next; sl@0: } sl@0: while(amip && amip->thread == ti); sl@0: sl@0: #ifdef LEVITTE_DEBUG_MEM sl@0: if (amip) sl@0: { sl@0: fprintf(stderr, "Thread switch detected in backtrace!!!!\n"); sl@0: abort(); sl@0: } sl@0: #endif sl@0: } sl@0: sl@0: static IMPLEMENT_LHASH_DOALL_ARG_FN(print_leak, const MEM *, MEM_LEAK *) sl@0: sl@0: EXPORT_C void CRYPTO_mem_leaks(BIO *b) sl@0: { sl@0: MEM_LEAK ml; sl@0: sl@0: if (mh == NULL && amih == NULL) sl@0: return; sl@0: sl@0: MemCheck_off(); /* obtain MALLOC2 lock */ sl@0: sl@0: ml.bio=b; sl@0: ml.bytes=0; sl@0: ml.chunks=0; sl@0: if (mh != NULL) sl@0: lh_doall_arg(mh, LHASH_DOALL_ARG_FN(print_leak), sl@0: (char *)&ml); sl@0: if (ml.chunks != 0) sl@0: { sl@0: BIO_printf(b,"%ld bytes leaked in %d chunks\n", sl@0: ml.bytes,ml.chunks); sl@0: } sl@0: else sl@0: { sl@0: /* Make sure that, if we found no leaks, memory-leak debugging itself sl@0: * does not introduce memory leaks (which might irritate sl@0: * external debugging tools). sl@0: * (When someone enables leak checking, but does not call sl@0: * this function, we declare it to be their fault.) sl@0: * sl@0: * XXX This should be in CRYPTO_mem_leaks_cb, sl@0: * and CRYPTO_mem_leaks should be implemented by sl@0: * using CRYPTO_mem_leaks_cb. sl@0: * (Also their should be a variant of lh_doall_arg sl@0: * that takes a function pointer instead of a void *; sl@0: * this would obviate the ugly and illegal sl@0: * void_fn_to_char kludge in CRYPTO_mem_leaks_cb. sl@0: * Otherwise the code police will come and get us.) sl@0: */ sl@0: int old_mh_mode; sl@0: sl@0: CRYPTO_w_lock(CRYPTO_LOCK_MALLOC); sl@0: sl@0: /* avoid deadlock when lh_free() uses CRYPTO_dbg_free(), sl@0: * which uses CRYPTO_is_mem_check_on */ sl@0: old_mh_mode = mh_mode; sl@0: mh_mode = CRYPTO_MEM_CHECK_OFF; sl@0: sl@0: if (mh != NULL) sl@0: { sl@0: lh_free(mh); sl@0: mh = NULL; sl@0: } sl@0: if (amih != NULL) sl@0: { sl@0: if (lh_num_items(amih) == 0) sl@0: { sl@0: lh_free(amih); sl@0: amih = NULL; sl@0: } sl@0: } sl@0: sl@0: mh_mode = old_mh_mode; sl@0: CRYPTO_w_unlock(CRYPTO_LOCK_MALLOC); sl@0: } sl@0: MemCheck_on(); /* release MALLOC2 lock */ sl@0: } sl@0: sl@0: #ifndef OPENSSL_NO_FP_API sl@0: EXPORT_C void CRYPTO_mem_leaks_fp(FILE *fp) sl@0: { sl@0: BIO *b=NULL; sl@0: sl@0: if (mh == NULL) return; sl@0: /* Need to turn off memory checking when allocated BIOs ... especially sl@0: * as we're creating them at a time when we're trying to check we've not sl@0: * left anything un-free()'d!! */ sl@0: MemCheck_off(); sl@0: b = BIO_new(BIO_s_file()); sl@0: MemCheck_on(); sl@0: if(!b) return; sl@0: BIO_set_fp(b,fp,BIO_NOCLOSE); sl@0: CRYPTO_mem_leaks(b); sl@0: BIO_free(b); sl@0: } sl@0: #endif sl@0: sl@0: sl@0: sl@0: /* FIXME: We really don't allow much to the callback. For example, it has sl@0: no chance of reaching the info stack for the item it processes. Should sl@0: it really be this way? -- Richard Levitte */ sl@0: /* NB: The prototypes have been typedef'd to CRYPTO_MEM_LEAK_CB inside crypto.h sl@0: * If this code is restructured, remove the callback type if it is no longer sl@0: * needed. -- Geoff Thorpe */ sl@0: static void cb_leak(const MEM *m, CRYPTO_MEM_LEAK_CB **cb) sl@0: { sl@0: (**cb)(m->iorder,m->file,m->line,m->num,m->addr); sl@0: } sl@0: sl@0: static IMPLEMENT_LHASH_DOALL_ARG_FN(cb_leak, const MEM *, CRYPTO_MEM_LEAK_CB **) sl@0: sl@0: EXPORT_C void CRYPTO_mem_leaks_cb(CRYPTO_MEM_LEAK_CB *cb) sl@0: { sl@0: if (mh == NULL) return; sl@0: CRYPTO_w_lock(CRYPTO_LOCK_MALLOC2); sl@0: lh_doall_arg(mh, LHASH_DOALL_ARG_FN(cb_leak), &cb); sl@0: CRYPTO_w_unlock(CRYPTO_LOCK_MALLOC2); sl@0: }