mem_dbg.c 22.0 KB
Newer Older
R
Richard Levitte 已提交
1 2
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
 * All rights reserved.
3
 *
R
Richard Levitte 已提交
4 5 6
 * This package is an SSL implementation written
 * by Eric Young (eay@cryptsoft.com).
 * The implementation was written so as to conform with Netscapes SSL.
7
 *
R
Richard Levitte 已提交
8 9 10 11 12 13
 * This library is free for commercial and non-commercial use as long as
 * the following conditions are aheared to.  The following conditions
 * apply to all code found in this distribution, be it the RC4, RSA,
 * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
 * included with this distribution is covered by the same copyright terms
 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
14
 *
R
Richard Levitte 已提交
15 16 17 18 19 20
 * Copyright remains Eric Young's, and as such any Copyright notices in
 * the code are not to be removed.
 * If this package is used in a product, Eric Young should be given attribution
 * as the author of the parts of the library used.
 * This can be in the form of a textual message at program startup or
 * in documentation (online or textual) provided with the package.
21
 *
22 23 24
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions
 * are met:
R
Richard Levitte 已提交
25 26
 * 1. Redistributions of source code must retain the copyright
 *    notice, this list of conditions and the following disclaimer.
27
 * 2. Redistributions in binary form must reproduce the above copyright
R
Richard Levitte 已提交
28 29 30 31 32 33 34 35
 *    notice, this list of conditions and the following disclaimer in the
 *    documentation and/or other materials provided with the distribution.
 * 3. All advertising materials mentioning features or use of this software
 *    must display the following acknowledgement:
 *    "This product includes cryptographic software written by
 *     Eric Young (eay@cryptsoft.com)"
 *    The word 'cryptographic' can be left out if the rouines from the library
 *    being used are not cryptographic related :-).
36
 * 4. If you include any Windows specific code (or a derivative thereof) from
R
Richard Levitte 已提交
37 38
 *    the apps directory (application code) you must include an acknowledgement:
 *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
39
 *
R
Richard Levitte 已提交
40 41 42 43 44 45 46 47 48 49 50
 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
 * SUCH DAMAGE.
51
 *
R
Richard Levitte 已提交
52 53 54 55
 * The licence and distribution terms for any publically available version or
 * derivative of this code cannot be changed.  i.e. this code cannot simply be
 * copied and put under another distribution licence
 * [including the GNU Public Licence.]
56
 */
57 58 59 60 61 62 63 64
/* ====================================================================
 * Copyright (c) 1998-2006 The OpenSSL Project.  All rights reserved.
 *
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions
 * are met:
 *
 * 1. Redistributions of source code must retain the above copyright
65
 *    notice, this list of conditions and the following disclaimer.
66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109
 *
 * 2. Redistributions in binary form must reproduce the above copyright
 *    notice, this list of conditions and the following disclaimer in
 *    the documentation and/or other materials provided with the
 *    distribution.
 *
 * 3. All advertising materials mentioning features or use of this
 *    software must display the following acknowledgment:
 *    "This product includes software developed by the OpenSSL Project
 *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
 *
 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
 *    endorse or promote products derived from this software without
 *    prior written permission. For written permission, please contact
 *    openssl-core@openssl.org.
 *
 * 5. Products derived from this software may not be called "OpenSSL"
 *    nor may "OpenSSL" appear in their names without prior written
 *    permission of the OpenSSL Project.
 *
 * 6. Redistributions of any form whatsoever must retain the following
 *    acknowledgment:
 *    "This product includes software developed by the OpenSSL Project
 *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
 *
 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
 * OF THE POSSIBILITY OF SUCH DAMAGE.
 * ====================================================================
 *
 * This product includes cryptographic software written by Eric Young
 * (eay@cryptsoft.com).  This product includes software written by Tim
 * Hudson (tjh@cryptsoft.com).
 *
 */
110 111 112

#include <stdio.h>
#include <stdlib.h>
113
#include <time.h>
114
#include "internal/cryptlib.h"
115
#include "internal/threads.h"
116 117 118 119
#include <openssl/crypto.h>
#include <openssl/buffer.h>
#include <openssl/bio.h>
#include <openssl/lhash.h>
120 121

#ifndef OPENSSL_NO_CRYPTO_MDEBUG_BACKTRACE
122 123
# include <execinfo.h>
#endif
124

125 126 127 128 129 130 131 132 133 134
/*
 * The state changes to CRYPTO_MEM_CHECK_ON | CRYPTO_MEM_CHECK_ENABLE when
 * the application asks for it (usually after library initialisation for
 * which no book-keeping is desired). State CRYPTO_MEM_CHECK_ON exists only
 * temporarily when the library thinks that certain allocations should not be
 * checked (e.g. the data structures used for memory checking).  It is not
 * suitable as an initial state: the library will unexpectedly enable memory
 * checking when it executes one of those sections that want to disable
 * checking temporarily. State CRYPTO_MEM_CHECK_ENABLE without ..._ON makes
 * no sense whatsoever.
135
 */
136
#ifndef OPENSSL_NO_CRYPTO_MDEBUG
R
Rich Salz 已提交
137
static int mh_mode = CRYPTO_MEM_CHECK_OFF;
138
#endif
139

R
Rich Salz 已提交
140
#ifndef OPENSSL_NO_CRYPTO_MDEBUG
141
static unsigned long order = 0; /* number of memory requests */
B
Ben Laurie 已提交
142

143 144
/*-
 * For application-defined information (static C-string `info')
145 146
 * to be displayed in memory leak list.
 * Each thread has its own stack.  For applications, there is
R
Rich Salz 已提交
147 148
 *   OPENSSL_mem_debug_push("...")     to push an entry,
 *   OPENSSL_mem_debug_pop()     to pop an entry,
149
 */
D
Dr. Stephen Henson 已提交
150
struct app_mem_info_st {
151
    CRYPTO_THREAD_ID threadid;
152 153 154 155 156
    const char *file;
    int line;
    const char *info;
    struct app_mem_info_st *next; /* tail of thread's stack */
    int references;
D
Dr. Stephen Henson 已提交
157
};
158

159 160 161 162
static CRYPTO_ONCE memdbg_init = CRYPTO_ONCE_STATIC_INIT;
static CRYPTO_RWLOCK *malloc_lock = NULL;
static CRYPTO_RWLOCK *long_malloc_lock = NULL;
static CRYPTO_THREAD_LOCAL appinfokey;
163

164
/* memory-block description */
D
Dr. Stephen Henson 已提交
165
struct mem_st {
166 167 168 169
    void *addr;
    int num;
    const char *file;
    int line;
170
    CRYPTO_THREAD_ID threadid;
171 172 173
    unsigned long order;
    time_t time;
    APP_INFO *app_info;
174
#ifndef OPENSSL_NO_CRYPTO_MDEBUG_BACKTRACE
175 176 177
    void *array[30];
    size_t array_siz;
#endif
D
Dr. Stephen Henson 已提交
178 179 180 181
};

static LHASH_OF(MEM) *mh = NULL; /* hash-table of memory requests (address as
                                  * key); access requires MALLOC2 lock */
182

R
Rich Salz 已提交
183 184
/* num_disable > 0 iff mh_mode == CRYPTO_MEM_CHECK_ON (w/o ..._ENABLE) */
static unsigned int num_disable = 0;
185

186
/*
187
 * Valid iff num_disable > 0.  long_malloc_lock is locked exactly in this
188
 * case (by the thread named in disabling_thread).
189
 */
190 191 192 193 194 195 196 197
static CRYPTO_THREAD_ID disabling_threadid;

static void do_memdbg_init(void)
{
    malloc_lock = CRYPTO_THREAD_lock_new();
    long_malloc_lock = CRYPTO_THREAD_lock_new();
    CRYPTO_THREAD_init_local(&appinfokey, NULL);
}
198

199
static void app_info_free(APP_INFO *inf)
200
{
R
Rich Salz 已提交
201 202
    if (!inf)
        return;
203
    if (--(inf->references) <= 0) {
R
Rich Salz 已提交
204
        app_info_free(inf->next);
205 206 207
        OPENSSL_free(inf);
    }
}
R
Rich Salz 已提交
208
#endif
209

210
int CRYPTO_mem_ctrl(int mode)
211
{
212
#ifdef OPENSSL_NO_CRYPTO_MDEBUG
R
Rich Salz 已提交
213 214
    return mode - mode;
#else
215 216
    int ret = mh_mode;

217 218 219
    CRYPTO_THREAD_run_once(&memdbg_init, do_memdbg_init);

    CRYPTO_THREAD_write_lock(malloc_lock);
220
    switch (mode) {
R
Rich Salz 已提交
221 222 223 224
    default:
        break;

    case CRYPTO_MEM_CHECK_ON:
225 226 227
        mh_mode = CRYPTO_MEM_CHECK_ON | CRYPTO_MEM_CHECK_ENABLE;
        num_disable = 0;
        break;
R
Rich Salz 已提交
228 229

    case CRYPTO_MEM_CHECK_OFF:
230
        mh_mode = 0;
R
Rich Salz 已提交
231
        num_disable = 0;
232 233
        break;

R
Rich Salz 已提交
234 235
    /* switch off temporarily (for library-internal use): */
    case CRYPTO_MEM_CHECK_DISABLE:
236
        if (mh_mode & CRYPTO_MEM_CHECK_ON) {
237 238
            CRYPTO_THREAD_ID cur = CRYPTO_THREAD_get_current_id();
            /* see if we don't have long_malloc_lock already */
239
            if (!num_disable
240
                || !CRYPTO_THREAD_compare_id(disabling_threadid, cur)) {
241
                /*
242 243 244
                 * Long-time lock long_malloc_lock must not be claimed
                 * while we're holding malloc_lock, or we'll deadlock
                 * if somebody else holds long_malloc_lock (and cannot
245 246 247 248
                 * release it because we block entry to this function). Give
                 * them a chance, first, and then claim the locks in
                 * appropriate order (long-time lock first).
                 */
249
                CRYPTO_THREAD_unlock(malloc_lock);
250
                /*
251 252
                 * Note that after we have waited for long_malloc_lock and
                 * malloc_lock, we'll still be in the right "case" and
253 254 255
                 * "if" branch because MemCheck_start and MemCheck_stop may
                 * never be used while there are multiple OpenSSL threads.
                 */
256 257
                CRYPTO_THREAD_write_lock(long_malloc_lock);
                CRYPTO_THREAD_write_lock(malloc_lock);
258
                mh_mode &= ~CRYPTO_MEM_CHECK_ENABLE;
259
                disabling_threadid = cur;
260 261 262 263
            }
            num_disable++;
        }
        break;
R
Rich Salz 已提交
264 265

    case CRYPTO_MEM_CHECK_ENABLE:
266 267 268 269 270
        if (mh_mode & CRYPTO_MEM_CHECK_ON) {
            if (num_disable) {  /* always true, or something is going wrong */
                num_disable--;
                if (num_disable == 0) {
                    mh_mode |= CRYPTO_MEM_CHECK_ENABLE;
271
                    CRYPTO_THREAD_unlock(long_malloc_lock);
272 273 274 275 276
                }
            }
        }
        break;
    }
277
    CRYPTO_THREAD_unlock(malloc_lock);
278
    return (ret);
R
Rich Salz 已提交
279
#endif
280
}
281

R
Rich Salz 已提交
282
#ifndef OPENSSL_NO_CRYPTO_MDEBUG
R
Rich Salz 已提交
283 284

static int mem_check_on(void)
285 286
{
    int ret = 0;
287

288
    if (mh_mode & CRYPTO_MEM_CHECK_ON) {
289 290 291 292
        CRYPTO_THREAD_run_once(&memdbg_init, do_memdbg_init);

        CRYPTO_THREAD_ID cur = CRYPTO_THREAD_get_current_id();
        CRYPTO_THREAD_read_lock(malloc_lock);
293

294
        ret = (mh_mode & CRYPTO_MEM_CHECK_ENABLE)
295
            || !CRYPTO_THREAD_compare_id(disabling_threadid, cur);
296

297
        CRYPTO_THREAD_unlock(malloc_lock);
298 299 300
    }
    return (ret);
}
301

B
Ben Laurie 已提交
302
static int mem_cmp(const MEM *a, const MEM *b)
303
{
304
#ifdef _WIN64
305 306 307 308 309 310 311
    const char *ap = (const char *)a->addr, *bp = (const char *)b->addr;
    if (ap == bp)
        return 0;
    else if (ap > bp)
        return 1;
    else
        return -1;
312
#else
313
    return (const char *)a->addr - (const char *)b->addr;
314
#endif
315 316
}

B
Ben Laurie 已提交
317
static unsigned long mem_hash(const MEM *a)
318
{
319
    size_t ret;
320

321
    ret = (size_t)a->addr;
322 323 324 325

    ret = ret * 17851 + (ret >> 14) * 7 + (ret >> 4) * 251;
    return (ret);
}
326

327 328
/* returns 1 if there was an info to pop, 0 if the stack was empty. */
static int pop_info(void)
329
{
330
    APP_INFO *current = NULL;
331

332 333 334 335
    CRYPTO_THREAD_run_once(&memdbg_init, do_memdbg_init);
    current = (APP_INFO *)CRYPTO_THREAD_get_local(&appinfokey);
    if (current != NULL) {
        APP_INFO *next = current->next;
336

337 338 339 340 341 342 343 344 345 346 347
        if (next != NULL) {
            next->references++;
            CRYPTO_THREAD_set_local(&appinfokey, next);
        } else {
            CRYPTO_THREAD_set_local(&appinfokey, NULL);
        }
        if (--(current->references) <= 0) {
            current->next = NULL;
            if (next != NULL)
                next->references--;
            OPENSSL_free(current);
348
        }
349
        return 1;
350
    }
351
    return 0;
352
}
353

R
Rich Salz 已提交
354
int CRYPTO_mem_debug_push(const char *info, const char *file, int line)
355 356 357 358
{
    APP_INFO *ami, *amim;
    int ret = 0;

R
Rich Salz 已提交
359 360
    if (mem_check_on()) {
        CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_DISABLE);
361

362 363
        CRYPTO_THREAD_run_once(&memdbg_init, do_memdbg_init);

R
Rich Salz 已提交
364
        if ((ami = OPENSSL_malloc(sizeof(*ami))) == NULL)
365 366
            goto err;

367
        ami->threadid = CRYPTO_THREAD_get_current_id();
368 369 370 371 372 373
        ami->file = file;
        ami->line = line;
        ami->info = info;
        ami->references = 1;
        ami->next = NULL;

374 375 376 377
        amim = (APP_INFO *)CRYPTO_THREAD_get_local(&appinfokey);
        CRYPTO_THREAD_set_local(&appinfokey, ami);

        if (amim != NULL)
378
            ami->next = amim;
R
Rich Salz 已提交
379
        ret = 1;
380
 err:
R
Rich Salz 已提交
381
        CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ENABLE);
382
    }
383

384 385
    return (ret);
}
386

R
Rich Salz 已提交
387
int CRYPTO_mem_debug_pop(void)
388 389
{
    int ret = 0;
390

R
Rich Salz 已提交
391 392
    if (mem_check_on()) {
        CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_DISABLE);
393
        ret = pop_info();
R
Rich Salz 已提交
394
        CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ENABLE);
395 396 397
    }
    return (ret);
}
398

399
static unsigned long break_order_num = 0;
R
Rich Salz 已提交
400 401 402

void CRYPTO_mem_debug_malloc(void *addr, size_t num, int before_p,
                             const char *file, int line)
403 404
{
    MEM *m, *mm;
405
    APP_INFO *amim;
406 407 408 409 410 411 412 413

    switch (before_p & 127) {
    case 0:
        break;
    case 1:
        if (addr == NULL)
            break;

R
Rich Salz 已提交
414 415
        if (mem_check_on()) {
            CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_DISABLE);
416 417 418

            CRYPTO_THREAD_run_once(&memdbg_init, do_memdbg_init);

R
Rich Salz 已提交
419
            if ((m = OPENSSL_malloc(sizeof(*m))) == NULL) {
420
                OPENSSL_free(addr);
R
Rich Salz 已提交
421
                CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ENABLE);
422 423 424
                return;
            }
            if (mh == NULL) {
D
Dr. Stephen Henson 已提交
425
                if ((mh = lh_MEM_new(mem_hash, mem_cmp)) == NULL) {
426 427 428 429 430 431 432 433 434 435 436
                    OPENSSL_free(addr);
                    OPENSSL_free(m);
                    addr = NULL;
                    goto err;
                }
            }

            m->addr = addr;
            m->file = file;
            m->line = line;
            m->num = num;
437
            m->threadid = CRYPTO_THREAD_get_current_id();
438 439 440 441 442 443

            if (order == break_order_num) {
                /* BREAK HERE */
                m->order = order;
            }
            m->order = order++;
444
# ifndef OPENSSL_NO_CRYPTO_MDEBUG_BACKTRACE
445
            m->array_siz = backtrace(m->array, OSSL_NELEM(m->array));
R
Rich Salz 已提交
446 447
# endif
            m->time = time(NULL);
448

449 450 451
            amim = (APP_INFO *)CRYPTO_THREAD_get_local(&appinfokey);
            m->app_info = amim;
            if (amim != NULL)
452 453 454 455 456 457 458 459 460 461
                amim->references++;

            if ((mm = lh_MEM_insert(mh, m)) != NULL) {
                /* Not good, but don't sweat it */
                if (mm->app_info != NULL) {
                    mm->app_info->references--;
                }
                OPENSSL_free(mm);
            }
 err:
R
Rich Salz 已提交
462
            CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ENABLE);
463 464 465 466 467
        }
        break;
    }
    return;
}
468

469 470
void CRYPTO_mem_debug_free(void *addr, int before_p,
        const char *file, int line)
471 472 473 474 475 476 477 478
{
    MEM m, *mp;

    switch (before_p) {
    case 0:
        if (addr == NULL)
            break;

R
Rich Salz 已提交
479 480
        if (mem_check_on() && (mh != NULL)) {
            CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_DISABLE);
481 482 483 484

            m.addr = addr;
            mp = lh_MEM_delete(mh, &m);
            if (mp != NULL) {
R
Rich Salz 已提交
485
                app_info_free(mp->app_info);
486 487 488
                OPENSSL_free(mp);
            }

R
Rich Salz 已提交
489
            CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ENABLE);
490 491 492 493 494 495
        }
        break;
    case 1:
        break;
    }
}
496

R
Rich Salz 已提交
497 498
void CRYPTO_mem_debug_realloc(void *addr1, void *addr2, size_t num,
                              int before_p, const char *file, int line)
499 500
{
    MEM m, *mp;
501

502 503 504 505 506 507 508 509
    switch (before_p) {
    case 0:
        break;
    case 1:
        if (addr2 == NULL)
            break;

        if (addr1 == NULL) {
R
Rich Salz 已提交
510
            CRYPTO_mem_debug_malloc(addr2, num, 128 | before_p, file, line);
511 512 513
            break;
        }

R
Rich Salz 已提交
514 515
        if (mem_check_on()) {
            CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_DISABLE);
516 517 518 519 520 521

            m.addr = addr1;
            mp = lh_MEM_delete(mh, &m);
            if (mp != NULL) {
                mp->addr = addr2;
                mp->num = num;
522
#ifndef OPENSSL_NO_CRYPTO_MDEBUG_BACKTRACE
523 524
                mp->array_siz = backtrace(mp->array, OSSL_NELEM(mp->array));
#endif
525 526 527
                (void)lh_MEM_insert(mh, mp);
            }

R
Rich Salz 已提交
528
            CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ENABLE);
529 530 531 532 533 534 535 536 537
        }
        break;
    }
    return;
}

typedef struct mem_leak_st {
    BIO *bio;
    int chunks;
538
    int seen;
539 540
    long bytes;
} MEM_LEAK;
541

D
Dr. Stephen Henson 已提交
542
static void print_leak(const MEM *m, MEM_LEAK *l)
543 544 545 546 547 548
{
    char buf[1024];
    char *bufp = buf;
    APP_INFO *amip;
    int ami_cnt;
    struct tm *lcl = NULL;
549 550 551 552 553 554 555 556 557 558
    /*
     * Convert between CRYPTO_THREAD_ID (which could be anything at all) and
     * a long. This may not be meaningful depending on what CRYPTO_THREAD_ID is
     * but hopefully should give something sensible on most platforms
     */
    union {
        CRYPTO_THREAD_ID tid;
        unsigned long ltid;
    } tid;
    CRYPTO_THREAD_ID ti;
559

560 561
#define BUF_REMAIN (sizeof buf - (size_t)(bufp - buf))

562 563 564
    /* Is one "leak" the BIO we were given? */
    if (m->addr == (char *)l->bio) {
        l->seen = 1;
565
        return;
566
    }
567

R
Rich Salz 已提交
568 569 570 571
    lcl = localtime(&m->time);
    BIO_snprintf(bufp, BUF_REMAIN, "[%02d:%02d:%02d] ",
                 lcl->tm_hour, lcl->tm_min, lcl->tm_sec);
    bufp += strlen(bufp);
572 573 574 575 576

    BIO_snprintf(bufp, BUF_REMAIN, "%5lu file=%s, line=%d, ",
                 m->order, m->file, m->line);
    bufp += strlen(bufp);

577 578 579
    tid.ltid = 0;
    tid.tid = m->threadid;
    BIO_snprintf(bufp, BUF_REMAIN, "thread=%lu, ", tid.ltid);
R
Rich Salz 已提交
580
    bufp += strlen(bufp);
581

582 583
    BIO_snprintf(bufp, BUF_REMAIN, "number=%d, address=%p\n",
                 m->num, m->addr);
584 585 586 587 588 589 590 591 592
    bufp += strlen(bufp);

    BIO_puts(l->bio, buf);

    l->chunks++;
    l->bytes += m->num;

    amip = m->app_info;
    ami_cnt = 0;
R
Rich Salz 已提交
593

594
    if (amip) {
595
        ti = amip->threadid;
596 597 598 599 600 601 602

        do {
            int buf_len;
            int info_len;

            ami_cnt++;
            memset(buf, '>', ami_cnt);
603 604
            tid.ltid = 0;
            tid.tid = amip->threadid;
605 606
            BIO_snprintf(buf + ami_cnt, sizeof buf - ami_cnt,
                         " thread=%lu, file=%s, line=%d, info=\"",
607
                         tid.ltid, amip->file,
608
                         amip->line);
609
            buf_len = strlen(buf);
610 611 612 613 614
            info_len = strlen(amip->info);
            if (128 - buf_len - 3 < info_len) {
                memcpy(buf + buf_len, amip->info, 128 - buf_len - 3);
                buf_len = 128 - 3;
            } else {
R
Rich Salz 已提交
615
                OPENSSL_strlcpy(buf + buf_len, amip->info, sizeof buf - buf_len);
616 617 618
                buf_len = strlen(buf);
            }
            BIO_snprintf(buf + buf_len, sizeof buf - buf_len, "\"\n");
619

620
            BIO_puts(l->bio, buf);
621

622 623
            amip = amip->next;
        }
624
        while (amip && CRYPTO_THREAD_compare_id(amip->threadid, ti));
625
    }
626

627
#ifndef OPENSSL_NO_CRYPTO_MDEBUG_BACKTRACE
628 629 630
    {
        size_t i;
        char **strings = backtrace_symbols(m->array, m->array_siz);
R
Rich Salz 已提交
631

632 633 634 635 636
        for (i = 0; i < m->array_siz; i++)
            fprintf(stderr, "##> %s\n", strings[i]);
        free(strings);
    }
#endif
637
}
638

D
Dr. Stephen Henson 已提交
639
IMPLEMENT_LHASH_DOALL_ARG_CONST(MEM, MEM_LEAK);
640

641
int CRYPTO_mem_leaks(BIO *b)
642 643 644
{
    MEM_LEAK ml;

645
    /* Ensure all resources are released */
646
    OPENSSL_cleanup();
647

648 649
    CRYPTO_THREAD_run_once(&memdbg_init, do_memdbg_init);

R
Rich Salz 已提交
650
    CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_DISABLE);
651 652 653 654

    ml.bio = b;
    ml.bytes = 0;
    ml.chunks = 0;
655
    ml.seen = 0;
656
    if (mh != NULL)
D
Dr. Stephen Henson 已提交
657
        lh_MEM_doall_MEM_LEAK(mh, print_leak, &ml);
658 659 660 661 662
    /* Don't count the BIO that was passed in as a "leak" */
    if (ml.seen && ml.chunks >= 1 && ml.bytes >= (int)sizeof (*b)) {
        ml.chunks--;
        ml.bytes -= (int)sizeof (*b);
    }
663 664 665 666 667 668 669
    if (ml.chunks != 0) {
        BIO_printf(b, "%ld bytes leaked in %d chunks\n", ml.bytes, ml.chunks);
    } else {
        /*
         * Make sure that, if we found no leaks, memory-leak debugging itself
         * does not introduce memory leaks (which might irritate external
         * debugging tools). (When someone enables leak checking, but does not
R
Rich Salz 已提交
670
         * call this function, we declare it to be their fault.)
671 672 673
         */
        int old_mh_mode;

674
        CRYPTO_THREAD_write_lock(malloc_lock);
675 676

        /*
R
Rich Salz 已提交
677 678
         * avoid deadlock when lh_free() uses CRYPTO_mem_debug_free(), which uses
         * mem_check_on
679 680 681 682
         */
        old_mh_mode = mh_mode;
        mh_mode = CRYPTO_MEM_CHECK_OFF;

R
Rich Salz 已提交
683 684
        lh_MEM_free(mh);
        mh = NULL;
685 686

        mh_mode = old_mh_mode;
687
        CRYPTO_THREAD_unlock(malloc_lock);
688
    }
689 690 691 692 693 694 695 696 697
    CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_OFF);

    /* Clean up locks etc */
    CRYPTO_THREAD_cleanup_local(&appinfokey);
    CRYPTO_THREAD_lock_free(malloc_lock);
    CRYPTO_THREAD_lock_free(long_malloc_lock);
    malloc_lock = NULL;
    long_malloc_lock = NULL;

698
    return ml.chunks == 0 ? 1 : 0;
699
}
700

R
Rich Salz 已提交
701
# ifndef OPENSSL_NO_STDIO
702
int CRYPTO_mem_leaks_fp(FILE *fp)
703 704
{
    BIO *b;
705
    int ret;
706 707 708 709 710 711

    /*
     * Need to turn off memory checking when allocated BIOs ... especially as
     * we're creating them at a time when we're trying to check we've not
     * left anything un-free()'d!!
     */
R
Rich Salz 已提交
712
    CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_DISABLE);
713
    b = BIO_new(BIO_s_file());
R
Rich Salz 已提交
714
    CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ENABLE);
715
    if (b == NULL)
716
        return -1;
717
    BIO_set_fp(b, fp, BIO_NOCLOSE);
718
    ret = CRYPTO_mem_leaks(b);
719
    BIO_free(b);
720
    return ret;
721
}
R
Rich Salz 已提交
722
# endif
723

R
Rich Salz 已提交
724
#endif