mirror of
https://github.com/MariaDB/server.git
synced 2025-01-15 19:42:28 +01:00
f56dd32bf7
Essentially, the problem is that safemalloc is excruciatingly slow as it checks all allocated blocks for overrun at each memory management primitive, yielding a almost exponential slowdown for the memory management functions (malloc, realloc, free). The overrun check basically consists of verifying some bytes of a block for certain magic keys, which catches some simple forms of overrun. Another minor problem is violation of aliasing rules and that its own internal list of blocks is prone to corruption. Another issue with safemalloc is rather the maintenance cost as the tool has a significant impact on the server code. Given the magnitude of memory debuggers available nowadays, especially those that are provided with the platform malloc implementation, maintenance of a in-house and largely obsolete memory debugger becomes a burden that is not worth the effort due to its slowness and lack of support for detecting more common forms of heap corruption. Since there are third-party tools that can provide the same functionality at a lower or comparable performance cost, the solution is to simply remove safemalloc. Third-party tools can provide the same functionality at a lower or comparable performance cost. The removal of safemalloc also allows a simplification of the malloc wrappers, removing quite a bit of kludge: redefinition of my_malloc, my_free and the removal of the unused second argument of my_free. Since free() always check whether the supplied pointer is null, redudant checks are also removed. Also, this patch adds unit testing for my_malloc and moves my_realloc implementation into the same file as the other memory allocation primitives. client/mysqldump.c: Pass my_free directly as its signature is compatible with the callback type -- which wasn't the case for free_table_ent.
155 lines
3.8 KiB
C
155 lines
3.8 KiB
C
/* Copyright (C) 2000 MySQL AB
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; version 2 of the License.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program; if not, write to the Free Software
|
|
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA */
|
|
|
|
#include <my_global.h>
|
|
#ifdef HAVE_OPENSSL
|
|
#include <my_sys.h>
|
|
#include <m_string.h>
|
|
#include <m_ctype.h>
|
|
#include "mysql.h"
|
|
#include "errmsg.h"
|
|
#include <my_dir.h>
|
|
#include <my_getopt.h>
|
|
#include <signal.h>
|
|
#include <violite.h>
|
|
|
|
const char *VER="0.2";
|
|
|
|
|
|
#ifndef DBUG_OFF
|
|
const char *default_dbug_option="d:t:O,-";
|
|
#endif
|
|
|
|
#if 0
|
|
static void
|
|
fatal_error( const char* r)
|
|
{
|
|
perror(r);
|
|
exit(0);
|
|
}
|
|
#endif
|
|
|
|
typedef struct {
|
|
int sd;
|
|
struct st_VioSSLFd* ssl_acceptor;
|
|
} TH_ARGS;
|
|
|
|
static void
|
|
do_ssl_stuff( TH_ARGS* args)
|
|
{
|
|
const char* s = "Huhuhuhuuu";
|
|
Vio* server_vio;
|
|
int err;
|
|
DBUG_ENTER("do_ssl_stuff");
|
|
|
|
server_vio = vio_new(args->sd, VIO_TYPE_TCPIP, TRUE);
|
|
|
|
/* ----------------------------------------------- */
|
|
/* TCP connection is ready. Do server side SSL. */
|
|
|
|
err = write(server_vio->sd,(uchar*)s, strlen(s));
|
|
sslaccept(args->ssl_acceptor,server_vio,60L);
|
|
err = server_vio->write(server_vio,(uchar*)s, strlen(s));
|
|
DBUG_VOID_RETURN;
|
|
}
|
|
|
|
static void*
|
|
client_thread( void* arg)
|
|
{
|
|
my_thread_init();
|
|
do_ssl_stuff((TH_ARGS*)arg);
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
main(int argc __attribute__((unused)), char** argv)
|
|
{
|
|
char server_key[] = "../SSL/server-key.pem",
|
|
server_cert[] = "../SSL/server-cert.pem";
|
|
char ca_file[] = "../SSL/cacert.pem",
|
|
*ca_path = 0,
|
|
*cipher = 0;
|
|
struct st_VioSSLFd* ssl_acceptor;
|
|
pthread_t th;
|
|
TH_ARGS th_args;
|
|
|
|
|
|
struct sockaddr_in sa_serv;
|
|
struct sockaddr_in sa_cli;
|
|
int listen_sd;
|
|
int err;
|
|
size_socket client_len;
|
|
int reuseaddr = 1; /* better testing, uh? */
|
|
|
|
MY_INIT(argv[0]);
|
|
DBUG_PROCESS(argv[0]);
|
|
DBUG_PUSH(default_dbug_option);
|
|
|
|
printf("Server key/cert : %s/%s\n", server_key, server_cert);
|
|
if (ca_file!=0)
|
|
|
|
printf("CAfile : %s\n", ca_file);
|
|
if (ca_path!=0)
|
|
printf("CApath : %s\n", ca_path);
|
|
|
|
th_args.ssl_acceptor = ssl_acceptor = new_VioSSLAcceptorFd(server_key, server_cert, ca_file, ca_path,cipher);
|
|
|
|
/* ----------------------------------------------- */
|
|
/* Prepare TCP socket for receiving connections */
|
|
|
|
listen_sd = socket (AF_INET, SOCK_STREAM, 0);
|
|
setsockopt(listen_sd, SOL_SOCKET, SO_REUSEADDR, &reuseaddr, sizeof(&reuseaddr));
|
|
|
|
memset (&sa_serv, '\0', sizeof(sa_serv));
|
|
sa_serv.sin_family = AF_INET;
|
|
sa_serv.sin_addr.s_addr = INADDR_ANY;
|
|
sa_serv.sin_port = htons (1111); /* Server Port number */
|
|
|
|
err = bind(listen_sd, (struct sockaddr*) &sa_serv,
|
|
sizeof (sa_serv));
|
|
|
|
/* Receive a TCP connection. */
|
|
|
|
err = listen (listen_sd, 5);
|
|
client_len = sizeof(sa_cli);
|
|
th_args.sd = accept (listen_sd, (struct sockaddr*) &sa_cli, &client_len);
|
|
close (listen_sd);
|
|
|
|
printf ("Connection from %lx, port %x\n",
|
|
(long)sa_cli.sin_addr.s_addr, sa_cli.sin_port);
|
|
|
|
/* ----------------------------------------------- */
|
|
/* TCP connection is ready. Do server side SSL. */
|
|
|
|
err = pthread_create(&th, NULL, client_thread, (void*)&th_args);
|
|
DBUG_PRINT("info", ("pthread_create: %d", err));
|
|
pthread_join(th, NULL);
|
|
|
|
#if 0
|
|
if (err<=0) {
|
|
my_free(ssl_acceptor);
|
|
fatal_error("server:SSL_write");
|
|
}
|
|
#endif /* 0 */
|
|
|
|
my_free(ssl_acceptor);
|
|
return 0;
|
|
}
|
|
#else /* HAVE_OPENSSL */
|
|
|
|
int main() {
|
|
return 0;
|
|
}
|
|
#endif /* HAVE_OPENSSL */
|