Home | History | Annotate | Download | only in lib
      1 /***************************************************************************
      2  *                                  _   _ ____  _
      3  *  Project                     ___| | | |  _ \| |
      4  *                             / __| | | | |_) | |
      5  *                            | (__| |_| |  _ <| |___
      6  *                             \___|\___/|_| \_\_____|
      7  *
      8  * Copyright (C) 1998 - 2019, Daniel Stenberg, <daniel (at) haxx.se>, et al.
      9  *
     10  * This software is licensed as described in the file COPYING, which
     11  * you should have received as part of this distribution. The terms
     12  * are also available at https://curl.haxx.se/docs/copyright.html.
     13  *
     14  * You may opt to use, copy, modify, merge, publish, distribute and/or sell
     15  * copies of the Software, and permit persons to whom the Software is
     16  * furnished to do so, under the terms of the COPYING file.
     17  *
     18  * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
     19  * KIND, either express or implied.
     20  *
     21  ***************************************************************************/
     22 
     23 #include "curl_setup.h"
     24 
     25 #ifdef CURLDEBUG
     26 
     27 #include <curl/curl.h>
     28 
     29 #include "urldata.h"
     30 
     31 #define MEMDEBUG_NODEFINES /* don't redefine the standard functions */
     32 
     33 /* The last 3 #include files should be in this order */
     34 #include "curl_printf.h"
     35 #include "curl_memory.h"
     36 #include "memdebug.h"
     37 
     38 /*
     39  * Until 2011-08-17 libcurl's Memory Tracking feature also performed
     40  * automatic malloc and free filling operations using 0xA5 and 0x13
     41  * values. Our own preinitialization of dynamically allocated memory
     42  * might be useful when not using third party memory debuggers, but
     43  * on the other hand this would fool memory debuggers into thinking
     44  * that all dynamically allocated memory is properly initialized.
     45  *
     46  * As a default setting, libcurl's Memory Tracking feature no longer
     47  * performs preinitialization of dynamically allocated memory on its
     48  * own. If you know what you are doing, and really want to retain old
     49  * behavior, you can achieve this compiling with preprocessor symbols
     50  * CURL_MT_MALLOC_FILL and CURL_MT_FREE_FILL defined with appropriate
     51  * values.
     52  */
     53 
     54 #ifdef CURL_MT_MALLOC_FILL
     55 # if (CURL_MT_MALLOC_FILL < 0) || (CURL_MT_MALLOC_FILL > 0xff)
     56 #   error "invalid CURL_MT_MALLOC_FILL or out of range"
     57 # endif
     58 #endif
     59 
     60 #ifdef CURL_MT_FREE_FILL
     61 # if (CURL_MT_FREE_FILL < 0) || (CURL_MT_FREE_FILL > 0xff)
     62 #   error "invalid CURL_MT_FREE_FILL or out of range"
     63 # endif
     64 #endif
     65 
     66 #if defined(CURL_MT_MALLOC_FILL) && defined(CURL_MT_FREE_FILL)
     67 # if (CURL_MT_MALLOC_FILL == CURL_MT_FREE_FILL)
     68 #   error "CURL_MT_MALLOC_FILL same as CURL_MT_FREE_FILL"
     69 # endif
     70 #endif
     71 
     72 #ifdef CURL_MT_MALLOC_FILL
     73 #  define mt_malloc_fill(buf,len) memset((buf), CURL_MT_MALLOC_FILL, (len))
     74 #else
     75 #  define mt_malloc_fill(buf,len) Curl_nop_stmt
     76 #endif
     77 
     78 #ifdef CURL_MT_FREE_FILL
     79 #  define mt_free_fill(buf,len) memset((buf), CURL_MT_FREE_FILL, (len))
     80 #else
     81 #  define mt_free_fill(buf,len) Curl_nop_stmt
     82 #endif
     83 
     84 struct memdebug {
     85   size_t size;
     86   union {
     87     curl_off_t o;
     88     double d;
     89     void *p;
     90   } mem[1];
     91   /* I'm hoping this is the thing with the strictest alignment
     92    * requirements.  That also means we waste some space :-( */
     93 };
     94 
     95 /*
     96  * Note that these debug functions are very simple and they are meant to
     97  * remain so. For advanced analysis, record a log file and write perl scripts
     98  * to analyze them!
     99  *
    100  * Don't use these with multithreaded test programs!
    101  */
    102 
    103 FILE *curl_dbg_logfile = NULL;
    104 static bool memlimit = FALSE; /* enable memory limit */
    105 static long memsize = 0;  /* set number of mallocs allowed */
    106 
    107 /* this sets the log file name */
    108 void curl_dbg_memdebug(const char *logname)
    109 {
    110   if(!curl_dbg_logfile) {
    111     if(logname && *logname)
    112       curl_dbg_logfile = fopen(logname, FOPEN_WRITETEXT);
    113     else
    114       curl_dbg_logfile = stderr;
    115 #ifdef MEMDEBUG_LOG_SYNC
    116     /* Flush the log file after every line so the log isn't lost in a crash */
    117     if(logfile)
    118       setbuf(logfile, (char *)NULL);
    119 #endif
    120   }
    121 }
    122 
    123 /* This function sets the number of malloc() calls that should return
    124    successfully! */
    125 void curl_dbg_memlimit(long limit)
    126 {
    127   if(!memlimit) {
    128     memlimit = TRUE;
    129     memsize = limit;
    130   }
    131 }
    132 
    133 /* returns TRUE if this isn't allowed! */
    134 static bool countcheck(const char *func, int line, const char *source)
    135 {
    136   /* if source is NULL, then the call is made internally and this check
    137      should not be made */
    138   if(memlimit && source) {
    139     if(!memsize) {
    140       if(source) {
    141         /* log to file */
    142         curl_dbg_log("LIMIT %s:%d %s reached memlimit\n",
    143                      source, line, func);
    144         /* log to stderr also */
    145         fprintf(stderr, "LIMIT %s:%d %s reached memlimit\n",
    146                 source, line, func);
    147         fflush(curl_dbg_logfile); /* because it might crash now */
    148       }
    149       errno = ENOMEM;
    150       return TRUE; /* RETURN ERROR! */
    151     }
    152     else
    153       memsize--; /* countdown */
    154 
    155 
    156   }
    157 
    158   return FALSE; /* allow this */
    159 }
    160 
    161 void *curl_dbg_malloc(size_t wantedsize, int line, const char *source)
    162 {
    163   struct memdebug *mem;
    164   size_t size;
    165 
    166   DEBUGASSERT(wantedsize != 0);
    167 
    168   if(countcheck("malloc", line, source))
    169     return NULL;
    170 
    171   /* alloc at least 64 bytes */
    172   size = sizeof(struct memdebug) + wantedsize;
    173 
    174   mem = (Curl_cmalloc)(size);
    175   if(mem) {
    176     /* fill memory with junk */
    177     mt_malloc_fill(mem->mem, wantedsize);
    178     mem->size = wantedsize;
    179   }
    180 
    181   if(source)
    182     curl_dbg_log("MEM %s:%d malloc(%zu) = %p\n",
    183                  source, line, wantedsize,
    184                  mem ? (void *)mem->mem : (void *)0);
    185 
    186   return (mem ? mem->mem : NULL);
    187 }
    188 
    189 void *curl_dbg_calloc(size_t wanted_elements, size_t wanted_size,
    190                       int line, const char *source)
    191 {
    192   struct memdebug *mem;
    193   size_t size, user_size;
    194 
    195   DEBUGASSERT(wanted_elements != 0);
    196   DEBUGASSERT(wanted_size != 0);
    197 
    198   if(countcheck("calloc", line, source))
    199     return NULL;
    200 
    201   /* alloc at least 64 bytes */
    202   user_size = wanted_size * wanted_elements;
    203   size = sizeof(struct memdebug) + user_size;
    204 
    205   mem = (Curl_ccalloc)(1, size);
    206   if(mem)
    207     mem->size = user_size;
    208 
    209   if(source)
    210     curl_dbg_log("MEM %s:%d calloc(%zu,%zu) = %p\n",
    211                  source, line, wanted_elements, wanted_size,
    212                  mem ? (void *)mem->mem : (void *)0);
    213 
    214   return (mem ? mem->mem : NULL);
    215 }
    216 
    217 char *curl_dbg_strdup(const char *str, int line, const char *source)
    218 {
    219   char *mem;
    220   size_t len;
    221 
    222   DEBUGASSERT(str != NULL);
    223 
    224   if(countcheck("strdup", line, source))
    225     return NULL;
    226 
    227   len = strlen(str) + 1;
    228 
    229   mem = curl_dbg_malloc(len, 0, NULL); /* NULL prevents logging */
    230   if(mem)
    231     memcpy(mem, str, len);
    232 
    233   if(source)
    234     curl_dbg_log("MEM %s:%d strdup(%p) (%zu) = %p\n",
    235                  source, line, (const void *)str, len, (const void *)mem);
    236 
    237   return mem;
    238 }
    239 
    240 #if defined(WIN32) && defined(UNICODE)
    241 wchar_t *curl_dbg_wcsdup(const wchar_t *str, int line, const char *source)
    242 {
    243   wchar_t *mem;
    244   size_t wsiz, bsiz;
    245 
    246   DEBUGASSERT(str != NULL);
    247 
    248   if(countcheck("wcsdup", line, source))
    249     return NULL;
    250 
    251   wsiz = wcslen(str) + 1;
    252   bsiz = wsiz * sizeof(wchar_t);
    253 
    254   mem = curl_dbg_malloc(bsiz, 0, NULL); /* NULL prevents logging */
    255   if(mem)
    256     memcpy(mem, str, bsiz);
    257 
    258   if(source)
    259     curl_dbg_log("MEM %s:%d wcsdup(%p) (%zu) = %p\n",
    260                 source, line, (void *)str, bsiz, (void *)mem);
    261 
    262   return mem;
    263 }
    264 #endif
    265 
    266 /* We provide a realloc() that accepts a NULL as pointer, which then
    267    performs a malloc(). In order to work with ares. */
    268 void *curl_dbg_realloc(void *ptr, size_t wantedsize,
    269                       int line, const char *source)
    270 {
    271   struct memdebug *mem = NULL;
    272 
    273   size_t size = sizeof(struct memdebug) + wantedsize;
    274 
    275   DEBUGASSERT(wantedsize != 0);
    276 
    277   if(countcheck("realloc", line, source))
    278     return NULL;
    279 
    280 #ifdef __INTEL_COMPILER
    281 #  pragma warning(push)
    282 #  pragma warning(disable:1684)
    283    /* 1684: conversion from pointer to same-sized integral type */
    284 #endif
    285 
    286   if(ptr)
    287     mem = (void *)((char *)ptr - offsetof(struct memdebug, mem));
    288 
    289 #ifdef __INTEL_COMPILER
    290 #  pragma warning(pop)
    291 #endif
    292 
    293   mem = (Curl_crealloc)(mem, size);
    294   if(source)
    295     curl_dbg_log("MEM %s:%d realloc(%p, %zu) = %p\n",
    296                 source, line, (void *)ptr, wantedsize,
    297                 mem ? (void *)mem->mem : (void *)0);
    298 
    299   if(mem) {
    300     mem->size = wantedsize;
    301     return mem->mem;
    302   }
    303 
    304   return NULL;
    305 }
    306 
    307 void curl_dbg_free(void *ptr, int line, const char *source)
    308 {
    309   struct memdebug *mem;
    310 
    311   if(ptr) {
    312 
    313 #ifdef __INTEL_COMPILER
    314 #  pragma warning(push)
    315 #  pragma warning(disable:1684)
    316    /* 1684: conversion from pointer to same-sized integral type */
    317 #endif
    318 
    319     mem = (void *)((char *)ptr - offsetof(struct memdebug, mem));
    320 
    321 #ifdef __INTEL_COMPILER
    322 #  pragma warning(pop)
    323 #endif
    324 
    325     /* destroy */
    326     mt_free_fill(mem->mem, mem->size);
    327 
    328     /* free for real */
    329     (Curl_cfree)(mem);
    330   }
    331 
    332   if(source)
    333     curl_dbg_log("MEM %s:%d free(%p)\n", source, line, (void *)ptr);
    334 }
    335 
    336 curl_socket_t curl_dbg_socket(int domain, int type, int protocol,
    337                              int line, const char *source)
    338 {
    339   const char *fmt = (sizeof(curl_socket_t) == sizeof(int)) ?
    340     "FD %s:%d socket() = %d\n" :
    341     (sizeof(curl_socket_t) == sizeof(long)) ?
    342     "FD %s:%d socket() = %ld\n" :
    343     "FD %s:%d socket() = %zd\n";
    344 
    345   curl_socket_t sockfd;
    346 
    347   if(countcheck("socket", line, source))
    348     return CURL_SOCKET_BAD;
    349 
    350   sockfd = socket(domain, type, protocol);
    351 
    352   if(source && (sockfd != CURL_SOCKET_BAD))
    353     curl_dbg_log(fmt, source, line, sockfd);
    354 
    355   return sockfd;
    356 }
    357 
    358 SEND_TYPE_RETV curl_dbg_send(SEND_TYPE_ARG1 sockfd,
    359                             SEND_QUAL_ARG2 SEND_TYPE_ARG2 buf,
    360                             SEND_TYPE_ARG3 len, SEND_TYPE_ARG4 flags, int line,
    361                             const char *source)
    362 {
    363   SEND_TYPE_RETV rc;
    364   if(countcheck("send", line, source))
    365     return -1;
    366   rc = send(sockfd, buf, len, flags);
    367   if(source)
    368     curl_dbg_log("SEND %s:%d send(%lu) = %ld\n",
    369                 source, line, (unsigned long)len, (long)rc);
    370   return rc;
    371 }
    372 
    373 RECV_TYPE_RETV curl_dbg_recv(RECV_TYPE_ARG1 sockfd, RECV_TYPE_ARG2 buf,
    374                             RECV_TYPE_ARG3 len, RECV_TYPE_ARG4 flags, int line,
    375                             const char *source)
    376 {
    377   RECV_TYPE_RETV rc;
    378   if(countcheck("recv", line, source))
    379     return -1;
    380   rc = recv(sockfd, buf, len, flags);
    381   if(source)
    382     curl_dbg_log("RECV %s:%d recv(%lu) = %ld\n",
    383                 source, line, (unsigned long)len, (long)rc);
    384   return rc;
    385 }
    386 
    387 #ifdef HAVE_SOCKETPAIR
    388 int curl_dbg_socketpair(int domain, int type, int protocol,
    389                        curl_socket_t socket_vector[2],
    390                        int line, const char *source)
    391 {
    392   const char *fmt = (sizeof(curl_socket_t) == sizeof(int)) ?
    393     "FD %s:%d socketpair() = %d %d\n" :
    394     (sizeof(curl_socket_t) == sizeof(long)) ?
    395     "FD %s:%d socketpair() = %ld %ld\n" :
    396     "FD %s:%d socketpair() = %zd %zd\n";
    397 
    398   int res = socketpair(domain, type, protocol, socket_vector);
    399 
    400   if(source && (0 == res))
    401     curl_dbg_log(fmt, source, line, socket_vector[0], socket_vector[1]);
    402 
    403   return res;
    404 }
    405 #endif
    406 
    407 curl_socket_t curl_dbg_accept(curl_socket_t s, void *saddr, void *saddrlen,
    408                              int line, const char *source)
    409 {
    410   const char *fmt = (sizeof(curl_socket_t) == sizeof(int)) ?
    411     "FD %s:%d accept() = %d\n" :
    412     (sizeof(curl_socket_t) == sizeof(long)) ?
    413     "FD %s:%d accept() = %ld\n" :
    414     "FD %s:%d accept() = %zd\n";
    415 
    416   struct sockaddr *addr = (struct sockaddr *)saddr;
    417   curl_socklen_t *addrlen = (curl_socklen_t *)saddrlen;
    418 
    419   curl_socket_t sockfd = accept(s, addr, addrlen);
    420 
    421   if(source && (sockfd != CURL_SOCKET_BAD))
    422     curl_dbg_log(fmt, source, line, sockfd);
    423 
    424   return sockfd;
    425 }
    426 
    427 /* separate function to allow libcurl to mark a "faked" close */
    428 void curl_dbg_mark_sclose(curl_socket_t sockfd, int line, const char *source)
    429 {
    430   const char *fmt = (sizeof(curl_socket_t) == sizeof(int)) ?
    431     "FD %s:%d sclose(%d)\n":
    432     (sizeof(curl_socket_t) == sizeof(long)) ?
    433     "FD %s:%d sclose(%ld)\n":
    434     "FD %s:%d sclose(%zd)\n";
    435 
    436   if(source)
    437     curl_dbg_log(fmt, source, line, sockfd);
    438 }
    439 
    440 /* this is our own defined way to close sockets on *ALL* platforms */
    441 int curl_dbg_sclose(curl_socket_t sockfd, int line, const char *source)
    442 {
    443   int res = sclose(sockfd);
    444   curl_dbg_mark_sclose(sockfd, line, source);
    445   return res;
    446 }
    447 
    448 FILE *curl_dbg_fopen(const char *file, const char *mode,
    449                     int line, const char *source)
    450 {
    451   FILE *res = fopen(file, mode);
    452 
    453   if(source)
    454     curl_dbg_log("FILE %s:%d fopen(\"%s\",\"%s\") = %p\n",
    455                 source, line, file, mode, (void *)res);
    456 
    457   return res;
    458 }
    459 
    460 int curl_dbg_fclose(FILE *file, int line, const char *source)
    461 {
    462   int res;
    463 
    464   DEBUGASSERT(file != NULL);
    465 
    466   if(source)
    467     curl_dbg_log("FILE %s:%d fclose(%p)\n",
    468                  source, line, (void *)file);
    469 
    470   res = fclose(file);
    471 
    472   return res;
    473 }
    474 
    475 #define LOGLINE_BUFSIZE  1024
    476 
    477 /* this does the writing to the memory tracking log file */
    478 void curl_dbg_log(const char *format, ...)
    479 {
    480   char *buf;
    481   int nchars;
    482   va_list ap;
    483 
    484   if(!curl_dbg_logfile)
    485     return;
    486 
    487   buf = (Curl_cmalloc)(LOGLINE_BUFSIZE);
    488   if(!buf)
    489     return;
    490 
    491   va_start(ap, format);
    492   nchars = mvsnprintf(buf, LOGLINE_BUFSIZE, format, ap);
    493   va_end(ap);
    494 
    495   if(nchars > LOGLINE_BUFSIZE - 1)
    496     nchars = LOGLINE_BUFSIZE - 1;
    497 
    498   if(nchars > 0)
    499     fwrite(buf, 1, (size_t)nchars, curl_dbg_logfile);
    500 
    501   (Curl_cfree)(buf);
    502 }
    503 
    504 #endif /* CURLDEBUG */
    505