Coverage Report

Created: 2024-05-21 06:52

/src/curl/lib/memdebug.c
Line
Count
Source (jump to first uncovered line)
1
/***************************************************************************
2
 *                                  _   _ ____  _
3
 *  Project                     ___| | | |  _ \| |
4
 *                             / __| | | | |_) | |
5
 *                            | (__| |_| |  _ <| |___
6
 *                             \___|\___/|_| \_\_____|
7
 *
8
 * Copyright (C) Daniel Stenberg, <daniel@haxx.se>, et al.
9
 *
10
 * This software is licensed as described in the file COPYING, which
11
 * you should have received as part of this distribution. The terms
12
 * are also available at https://curl.se/docs/copyright.html.
13
 *
14
 * You may opt to use, copy, modify, merge, publish, distribute and/or sell
15
 * copies of the Software, and permit persons to whom the Software is
16
 * furnished to do so, under the terms of the COPYING file.
17
 *
18
 * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
19
 * KIND, either express or implied.
20
 *
21
 * SPDX-License-Identifier: curl
22
 *
23
 ***************************************************************************/
24
25
#include "curl_setup.h"
26
27
#ifdef CURLDEBUG
28
29
#include <curl/curl.h>
30
31
#include "urldata.h"
32
33
#define MEMDEBUG_NODEFINES /* don't redefine the standard functions */
34
35
/* The last 3 #include files should be in this order */
36
#include "curl_printf.h"
37
#include "curl_memory.h"
38
#include "memdebug.h"
39
40
struct memdebug {
41
  size_t size;
42
  union {
43
    curl_off_t o;
44
    double d;
45
    void *p;
46
  } mem[1];
47
  /* I'm hoping this is the thing with the strictest alignment
48
   * requirements.  That also means we waste some space :-( */
49
};
50
51
/*
52
 * Note that these debug functions are very simple and they are meant to
53
 * remain so. For advanced analysis, record a log file and write perl scripts
54
 * to analyze them!
55
 *
56
 * Don't use these with multithreaded test programs!
57
 */
58
59
FILE *curl_dbg_logfile = NULL;
60
static bool registered_cleanup = FALSE; /* atexit registered cleanup */
61
static bool memlimit = FALSE; /* enable memory limit */
62
static long memsize = 0;  /* set number of mallocs allowed */
63
64
/* LeakSantizier (LSAN) calls _exit() instead of exit() when a leak is detected
65
   on exit so the logfile must be closed explicitly or data could be lost.
66
   Though _exit() does not call atexit handlers such as this, LSAN's call to
67
   _exit() comes after the atexit handlers are called. curl/curl#6620 */
68
static void curl_dbg_cleanup(void)
69
0
{
70
0
  if(curl_dbg_logfile &&
71
0
     curl_dbg_logfile != stderr &&
72
0
     curl_dbg_logfile != stdout) {
73
0
    fclose(curl_dbg_logfile);
74
0
  }
75
0
  curl_dbg_logfile = NULL;
76
0
}
77
78
/* this sets the log file name */
79
void curl_dbg_memdebug(const char *logname)
80
0
{
81
0
  if(!curl_dbg_logfile) {
82
0
    if(logname && *logname)
83
0
      curl_dbg_logfile = fopen(logname, FOPEN_WRITETEXT);
84
0
    else
85
0
      curl_dbg_logfile = stderr;
86
#ifdef MEMDEBUG_LOG_SYNC
87
    /* Flush the log file after every line so the log isn't lost in a crash */
88
    if(curl_dbg_logfile)
89
      setbuf(curl_dbg_logfile, (char *)NULL);
90
#endif
91
0
  }
92
0
  if(!registered_cleanup)
93
0
    registered_cleanup = !atexit(curl_dbg_cleanup);
94
0
}
95
96
/* This function sets the number of malloc() calls that should return
97
   successfully! */
98
void curl_dbg_memlimit(long limit)
99
0
{
100
0
  if(!memlimit) {
101
0
    memlimit = TRUE;
102
0
    memsize = limit;
103
0
  }
104
0
}
105
106
/* returns TRUE if this isn't allowed! */
107
static bool countcheck(const char *func, int line, const char *source)
108
67.7M
{
109
  /* if source is NULL, then the call is made internally and this check
110
     should not be made */
111
67.7M
  if(memlimit && source) {
112
0
    if(!memsize) {
113
      /* log to file */
114
0
      curl_dbg_log("LIMIT %s:%d %s reached memlimit\n",
115
0
                   source, line, func);
116
      /* log to stderr also */
117
0
      fprintf(stderr, "LIMIT %s:%d %s reached memlimit\n",
118
0
              source, line, func);
119
0
      fflush(curl_dbg_logfile); /* because it might crash now */
120
0
      errno = ENOMEM;
121
0
      return TRUE; /* RETURN ERROR! */
122
0
    }
123
0
    else
124
0
      memsize--; /* countdown */
125
126
127
0
  }
128
129
67.7M
  return FALSE; /* allow this */
130
67.7M
}
131
132
ALLOC_FUNC void *curl_dbg_malloc(size_t wantedsize,
133
                                 int line, const char *source)
134
17.3M
{
135
17.3M
  struct memdebug *mem;
136
17.3M
  size_t size;
137
138
17.3M
  DEBUGASSERT(wantedsize != 0);
139
140
17.3M
  if(countcheck("malloc", line, source))
141
0
    return NULL;
142
143
  /* alloc at least 64 bytes */
144
17.3M
  size = sizeof(struct memdebug) + wantedsize;
145
146
17.3M
  mem = (Curl_cmalloc)(size);
147
17.3M
  if(mem) {
148
17.3M
    mem->size = wantedsize;
149
17.3M
  }
150
151
17.3M
  if(source)
152
13.0M
    curl_dbg_log("MEM %s:%d malloc(%zu) = %p\n",
153
13.0M
                 source, line, wantedsize,
154
13.0M
                 mem ? (void *)mem->mem : (void *)0);
155
156
17.3M
  return (mem ? mem->mem : NULL);
157
17.3M
}
158
159
ALLOC_FUNC void *curl_dbg_calloc(size_t wanted_elements, size_t wanted_size,
160
                                 int line, const char *source)
161
3.31M
{
162
3.31M
  struct memdebug *mem;
163
3.31M
  size_t size, user_size;
164
165
3.31M
  DEBUGASSERT(wanted_elements != 0);
166
3.31M
  DEBUGASSERT(wanted_size != 0);
167
168
3.31M
  if(countcheck("calloc", line, source))
169
0
    return NULL;
170
171
  /* alloc at least 64 bytes */
172
3.31M
  user_size = wanted_size * wanted_elements;
173
3.31M
  size = sizeof(struct memdebug) + user_size;
174
175
3.31M
  mem = (Curl_ccalloc)(1, size);
176
3.31M
  if(mem)
177
3.31M
    mem->size = user_size;
178
179
3.31M
  if(source)
180
3.31M
    curl_dbg_log("MEM %s:%d calloc(%zu,%zu) = %p\n",
181
3.31M
                 source, line, wanted_elements, wanted_size,
182
3.31M
                 mem ? (void *)mem->mem : (void *)0);
183
184
3.31M
  return (mem ? mem->mem : NULL);
185
3.31M
}
186
187
ALLOC_FUNC char *curl_dbg_strdup(const char *str,
188
                                 int line, const char *source)
189
4.31M
{
190
4.31M
  char *mem;
191
4.31M
  size_t len;
192
193
4.31M
  DEBUGASSERT(str != NULL);
194
195
4.31M
  if(countcheck("strdup", line, source))
196
0
    return NULL;
197
198
4.31M
  len = strlen(str) + 1;
199
200
4.31M
  mem = curl_dbg_malloc(len, 0, NULL); /* NULL prevents logging */
201
4.31M
  if(mem)
202
4.31M
    memcpy(mem, str, len);
203
204
4.31M
  if(source)
205
4.31M
    curl_dbg_log("MEM %s:%d strdup(%p) (%zu) = %p\n",
206
4.31M
                 source, line, (const void *)str, len, (const void *)mem);
207
208
4.31M
  return mem;
209
4.31M
}
210
211
#if defined(_WIN32) && defined(UNICODE)
212
ALLOC_FUNC wchar_t *curl_dbg_wcsdup(const wchar_t *str,
213
                                    int line, const char *source)
214
{
215
  wchar_t *mem;
216
  size_t wsiz, bsiz;
217
218
  DEBUGASSERT(str != NULL);
219
220
  if(countcheck("wcsdup", line, source))
221
    return NULL;
222
223
  wsiz = wcslen(str) + 1;
224
  bsiz = wsiz * sizeof(wchar_t);
225
226
  mem = curl_dbg_malloc(bsiz, 0, NULL); /* NULL prevents logging */
227
  if(mem)
228
    memcpy(mem, str, bsiz);
229
230
  if(source)
231
    curl_dbg_log("MEM %s:%d wcsdup(%p) (%zu) = %p\n",
232
                source, line, (void *)str, bsiz, (void *)mem);
233
234
  return mem;
235
}
236
#endif
237
238
/* We provide a realloc() that accepts a NULL as pointer, which then
239
   performs a malloc(). In order to work with ares. */
240
void *curl_dbg_realloc(void *ptr, size_t wantedsize,
241
                      int line, const char *source)
242
11.7M
{
243
11.7M
  struct memdebug *mem = NULL;
244
245
11.7M
  size_t size = sizeof(struct memdebug) + wantedsize;
246
247
11.7M
  DEBUGASSERT(wantedsize != 0);
248
249
11.7M
  if(countcheck("realloc", line, source))
250
0
    return NULL;
251
252
#ifdef __INTEL_COMPILER
253
#  pragma warning(push)
254
#  pragma warning(disable:1684)
255
   /* 1684: conversion from pointer to same-sized integral type */
256
#endif
257
258
11.7M
  if(ptr)
259
1.71M
    mem = (void *)((char *)ptr - offsetof(struct memdebug, mem));
260
261
#ifdef __INTEL_COMPILER
262
#  pragma warning(pop)
263
#endif
264
265
11.7M
  mem = (Curl_crealloc)(mem, size);
266
11.7M
  if(source)
267
11.7M
    curl_dbg_log("MEM %s:%d realloc(%p, %zu) = %p\n",
268
11.7M
                source, line, (void *)ptr, wantedsize,
269
11.7M
                mem ? (void *)mem->mem : (void *)0);
270
271
11.7M
  if(mem) {
272
11.7M
    mem->size = wantedsize;
273
11.7M
    return mem->mem;
274
11.7M
  }
275
276
0
  return NULL;
277
11.7M
}
278
279
void curl_dbg_free(void *ptr, int line, const char *source)
280
92.1M
{
281
92.1M
  if(ptr) {
282
30.7M
    struct memdebug *mem;
283
284
#ifdef __INTEL_COMPILER
285
#  pragma warning(push)
286
#  pragma warning(disable:1684)
287
   /* 1684: conversion from pointer to same-sized integral type */
288
#endif
289
290
30.7M
    mem = (void *)((char *)ptr - offsetof(struct memdebug, mem));
291
292
#ifdef __INTEL_COMPILER
293
#  pragma warning(pop)
294
#endif
295
296
    /* free for real */
297
30.7M
    (Curl_cfree)(mem);
298
30.7M
  }
299
300
92.1M
  if(source && ptr)
301
30.7M
    curl_dbg_log("MEM %s:%d free(%p)\n", source, line, (void *)ptr);
302
92.1M
}
303
304
curl_socket_t curl_dbg_socket(int domain, int type, int protocol,
305
                             int line, const char *source)
306
0
{
307
0
  curl_socket_t sockfd;
308
309
0
  if(countcheck("socket", line, source))
310
0
    return CURL_SOCKET_BAD;
311
312
0
  sockfd = socket(domain, type, protocol);
313
314
0
  if(source && (sockfd != CURL_SOCKET_BAD))
315
0
    curl_dbg_log("FD %s:%d socket() = %" CURL_FORMAT_SOCKET_T "\n",
316
0
                 source, line, sockfd);
317
318
0
  return sockfd;
319
0
}
320
321
SEND_TYPE_RETV curl_dbg_send(SEND_TYPE_ARG1 sockfd,
322
                            SEND_QUAL_ARG2 SEND_TYPE_ARG2 buf,
323
                            SEND_TYPE_ARG3 len, SEND_TYPE_ARG4 flags, int line,
324
                            const char *source)
325
114k
{
326
114k
  SEND_TYPE_RETV rc;
327
114k
  if(countcheck("send", line, source))
328
0
    return -1;
329
114k
  rc = send(sockfd, buf, len, flags);
330
114k
  if(source)
331
114k
    curl_dbg_log("SEND %s:%d send(%lu) = %ld\n",
332
114k
                source, line, (unsigned long)len, (long)rc);
333
114k
  return rc;
334
114k
}
335
336
RECV_TYPE_RETV curl_dbg_recv(RECV_TYPE_ARG1 sockfd, RECV_TYPE_ARG2 buf,
337
                            RECV_TYPE_ARG3 len, RECV_TYPE_ARG4 flags, int line,
338
                            const char *source)
339
30.9M
{
340
30.9M
  RECV_TYPE_RETV rc;
341
30.9M
  if(countcheck("recv", line, source))
342
0
    return -1;
343
30.9M
  rc = recv(sockfd, buf, len, flags);
344
30.9M
  if(source)
345
30.9M
    curl_dbg_log("RECV %s:%d recv(%lu) = %ld\n",
346
30.9M
                source, line, (unsigned long)len, (long)rc);
347
30.9M
  return rc;
348
30.9M
}
349
350
#ifdef HAVE_SOCKETPAIR
351
int curl_dbg_socketpair(int domain, int type, int protocol,
352
                       curl_socket_t socket_vector[2],
353
                       int line, const char *source)
354
0
{
355
0
  int res = socketpair(domain, type, protocol, socket_vector);
356
357
0
  if(source && (0 == res))
358
0
    curl_dbg_log("FD %s:%d socketpair() = "
359
0
      "%" CURL_FORMAT_SOCKET_T " %" CURL_FORMAT_SOCKET_T "\n",
360
0
      source, line, socket_vector[0], socket_vector[1]);
361
362
0
  return res;
363
0
}
364
#endif
365
366
curl_socket_t curl_dbg_accept(curl_socket_t s, void *saddr, void *saddrlen,
367
                             int line, const char *source)
368
0
{
369
0
  struct sockaddr *addr = (struct sockaddr *)saddr;
370
0
  curl_socklen_t *addrlen = (curl_socklen_t *)saddrlen;
371
372
0
  curl_socket_t sockfd = accept(s, addr, addrlen);
373
374
0
  if(source && (sockfd != CURL_SOCKET_BAD))
375
0
    curl_dbg_log("FD %s:%d accept() = %" CURL_FORMAT_SOCKET_T "\n",
376
0
                 source, line, sockfd);
377
378
0
  return sockfd;
379
0
}
380
381
/* separate function to allow libcurl to mark a "faked" close */
382
void curl_dbg_mark_sclose(curl_socket_t sockfd, int line, const char *source)
383
58.2k
{
384
58.2k
  if(source)
385
58.2k
    curl_dbg_log("FD %s:%d sclose(%" CURL_FORMAT_SOCKET_T ")\n",
386
58.2k
                 source, line, sockfd);
387
58.2k
}
388
389
/* this is our own defined way to close sockets on *ALL* platforms */
390
int curl_dbg_sclose(curl_socket_t sockfd, int line, const char *source)
391
58.2k
{
392
58.2k
  int res = sclose(sockfd);
393
58.2k
  curl_dbg_mark_sclose(sockfd, line, source);
394
58.2k
  return res;
395
58.2k
}
396
397
ALLOC_FUNC FILE *curl_dbg_fopen(const char *file, const char *mode,
398
                                int line, const char *source)
399
465k
{
400
465k
  FILE *res = fopen(file, mode);
401
402
465k
  if(source)
403
465k
    curl_dbg_log("FILE %s:%d fopen(\"%s\",\"%s\") = %p\n",
404
465k
                source, line, file, mode, (void *)res);
405
406
465k
  return res;
407
465k
}
408
409
ALLOC_FUNC FILE *curl_dbg_fdopen(int filedes, const char *mode,
410
                                 int line, const char *source)
411
0
{
412
0
  FILE *res = fdopen(filedes, mode);
413
0
  if(source)
414
0
    curl_dbg_log("FILE %s:%d fdopen(\"%d\",\"%s\") = %p\n",
415
0
                 source, line, filedes, mode, (void *)res);
416
0
  return res;
417
0
}
418
419
int curl_dbg_fclose(FILE *file, int line, const char *source)
420
465k
{
421
465k
  int res;
422
423
465k
  DEBUGASSERT(file != NULL);
424
425
465k
  if(source)
426
465k
    curl_dbg_log("FILE %s:%d fclose(%p)\n",
427
465k
                 source, line, (void *)file);
428
429
465k
  res = fclose(file);
430
431
465k
  return res;
432
465k
}
433
434
0
#define LOGLINE_BUFSIZE  1024
435
436
/* this does the writing to the memory tracking log file */
437
void curl_dbg_log(const char *format, ...)
438
95.1M
{
439
95.1M
  char *buf;
440
95.1M
  int nchars;
441
95.1M
  va_list ap;
442
443
95.1M
  if(!curl_dbg_logfile)
444
95.1M
    return;
445
446
0
  buf = (Curl_cmalloc)(LOGLINE_BUFSIZE);
447
0
  if(!buf)
448
0
    return;
449
450
0
  va_start(ap, format);
451
0
  nchars = mvsnprintf(buf, LOGLINE_BUFSIZE, format, ap);
452
0
  va_end(ap);
453
454
0
  if(nchars > LOGLINE_BUFSIZE - 1)
455
0
    nchars = LOGLINE_BUFSIZE - 1;
456
457
0
  if(nchars > 0)
458
0
    fwrite(buf, 1, (size_t)nchars, curl_dbg_logfile);
459
460
0
  (Curl_cfree)(buf);
461
0
}
462
463
#endif /* CURLDEBUG */