public inbox for libc-alpha@sourceware.org
 help / color / mirror / Atom feed
From: Adhemerval Zanella <adhemerval.zanella@linaro.org>
To: libc-alpha@sourceware.org
Subject: Re: [PATCH v2 1/2] sysvipc: Fix IPC_INFO and SHM_INFO handling [BZ #26636]
Date: Mon, 12 Oct 2020 13:47:43 -0300	[thread overview]
Message-ID: <0d288b39-1069-0a83-a087-432a6d28c867@linaro.org> (raw)
In-Reply-To: <20201005171152.676380-1-adhemerval.zanella@linaro.org>

If no one opposes I will commit this shortly.

On 05/10/2020 14:11, Adhemerval Zanella wrote:
> Changes from previous version:
> 
>   - Read the shm /proc tunables as 64-bit values to handle 32-bit
>     binaries running on 64-bit kernels.
>   - Handle shmmax value larger than INT_MAX.
>   - Move SHM_STAT_ANY prior SHM_STAT to avoid the test finish early.
> 
> --
> 
> Both commands are Linux extensions where the third argument is either
> a 'struct shminfo' (IPC_INFO) or a 'struct shm_info' (SHM_INFO) instead
> of 'struct shmid_ds'.  And their information does not contain any time
> related fields, so there is no need to extra conversion for __IPC_TIME64.
> 
> The regression testcase checks for Linux specifix SysV ipc message
> control extension.  For SHM_INFO it tries to match the values against the
> tunable /proc values and for MSG_STAT/MSG_STAT_ANY it check if the create\
> shared memory is within the global list returned by the kernel.
> 
> Checked on x86_64-linux-gnu and on i686-linux-gnu (Linux v5.4 and on
> Linux v4.15).
> ---
>  sysdeps/unix/sysv/linux/Makefile            |   2 +-
>  sysdeps/unix/sysv/linux/shmctl.c            |  24 ++-
>  sysdeps/unix/sysv/linux/tst-sysvshm-linux.c | 184 ++++++++++++++++++++
>  3 files changed, 203 insertions(+), 7 deletions(-)
>  create mode 100644 sysdeps/unix/sysv/linux/tst-sysvshm-linux.c
> 
> diff --git a/sysdeps/unix/sysv/linux/Makefile b/sysdeps/unix/sysv/linux/Makefile
> index a54eb75d74..5a78614457 100644
> --- a/sysdeps/unix/sysv/linux/Makefile
> +++ b/sysdeps/unix/sysv/linux/Makefile
> @@ -101,7 +101,7 @@ tests += tst-clone tst-clone2 tst-clone3 tst-fanotify tst-personality \
>  	 tst-quota tst-sync_file_range tst-sysconf-iov_max tst-ttyname \
>  	 test-errno-linux tst-memfd_create tst-mlock2 tst-pkey \
>  	 tst-rlimit-infinity tst-ofdlocks tst-gettid tst-gettid-kill \
> -	 tst-tgkill tst-sysvsem-linux tst-sysvmsg-linux
> +	 tst-tgkill tst-sysvsem-linux tst-sysvmsg-linux tst-sysvshm-linux
>  tests-internal += tst-ofdlocks-compat tst-sigcontext-get_pc
>  
>  CFLAGS-tst-sigcontext-get_pc.c = -fasynchronous-unwind-tables
> diff --git a/sysdeps/unix/sysv/linux/shmctl.c b/sysdeps/unix/sysv/linux/shmctl.c
> index 76d88441f1..1d19a798b1 100644
> --- a/sysdeps/unix/sysv/linux/shmctl.c
> +++ b/sysdeps/unix/sysv/linux/shmctl.c
> @@ -90,8 +90,15 @@ __shmctl64 (int shmid, int cmd, struct __shmid64_ds *buf)
>    struct kernel_shmid64_ds kshmid, *arg = NULL;
>    if (buf != NULL)
>      {
> -      shmid64_to_kshmid64 (buf, &kshmid);
> -      arg = &kshmid;
> +      /* This is a Linux extension where kernel expects either a
> +	 'struct shminfo' (IPC_INFO) or 'struct shm_info' (SHM_INFO).  */
> +      if (cmd == IPC_INFO || cmd == SHM_INFO)
> +	arg = (struct kernel_shmid64_ds *) buf;
> +      else
> +	{
> +	  shmid64_to_kshmid64 (buf, &kshmid);
> +	  arg = &kshmid;
> +	}
>      }
>  # ifdef __ASSUME_SYSVIPC_BROKEN_MODE_T
>    if (cmd == IPC_SET)
> @@ -107,7 +114,6 @@ __shmctl64 (int shmid, int cmd, struct __shmid64_ds *buf)
>  
>    switch (cmd)
>      {
> -      case IPC_INFO:
>        case IPC_STAT:
>        case SHM_STAT:
>        case SHM_STAT_ANY:
> @@ -168,8 +174,15 @@ __shmctl (int shmid, int cmd, struct shmid_ds *buf)
>    struct __shmid64_ds shmid64, *buf64 = NULL;
>    if (buf != NULL)
>      {
> -      shmid_to_shmid64 (&shmid64, buf);
> -      buf64 = &shmid64;
> +      /* This is a Linux extension where kernel expects either a
> +	 'struct shminfo' (IPC_INFO) or 'struct shm_info' (SHM_INFO).  */
> +      if (cmd == IPC_INFO || cmd == SHM_INFO)
> +	buf64 = (struct __shmid64_ds *) buf;
> +      else
> +	{
> +	  shmid_to_shmid64 (&shmid64, buf);
> +	  buf64 = &shmid64;
> +	}
>      }
>  
>    int ret = __shmctl64 (shmid, cmd, buf64);
> @@ -178,7 +191,6 @@ __shmctl (int shmid, int cmd, struct shmid_ds *buf)
>  
>    switch (cmd)
>      {
> -      case IPC_INFO:
>        case IPC_STAT:
>        case SHM_STAT:
>        case SHM_STAT_ANY:
> diff --git a/sysdeps/unix/sysv/linux/tst-sysvshm-linux.c b/sysdeps/unix/sysv/linux/tst-sysvshm-linux.c
> new file mode 100644
> index 0000000000..1a6f389d64
> --- /dev/null
> +++ b/sysdeps/unix/sysv/linux/tst-sysvshm-linux.c
> @@ -0,0 +1,184 @@
> +/* Basic tests for Linux SYSV shared memory extensions.
> +   Copyright (C) 2020 Free Software Foundation, Inc.
> +   This file is part of the GNU C Library.
> +
> +   The GNU C Library is free software; you can redistribute it and/or
> +   modify it under the terms of the GNU Lesser General Public
> +   License as published by the Free Software Foundation; either
> +   version 2.1 of the License, or (at your option) any later version.
> +
> +   The GNU C Library is distributed in the hope that it will be useful,
> +   but WITHOUT ANY WARRANTY; without even the implied warranty of
> +   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
> +   Lesser General Public License for more details.
> +
> +   You should have received a copy of the GNU Lesser General Public
> +   License along with the GNU C Library; if not, see
> +   <https://www.gnu.org/licenses/>.  */
> +
> +#include <sys/ipc.h>
> +#include <sys/shm.h>
> +#include <errno.h>
> +#include <stdlib.h>
> +#include <stdbool.h>
> +#include <stdio.h>
> +#include <unistd.h>
> +#include <inttypes.h>
> +#include <limits.h>
> +
> +#include <support/check.h>
> +#include <support/temp_file.h>
> +
> +#define SHM_MODE 0644
> +
> +/* These are for the temporary file we generate.  */
> +static char *name;
> +static int shmid;
> +static long int pgsz;
> +
> +static void
> +remove_shm (void)
> +{
> +  /* Enforce message queue removal in case of early test failure.
> +     Ignore error since the shm may already have being removed.  */
> +  shmctl (shmid, IPC_RMID, NULL);
> +}
> +
> +static void
> +do_prepare (int argc, char *argv[])
> +{
> +  TEST_VERIFY_EXIT (create_temp_file ("tst-sysvshm.", &name) != -1);
> +}
> +
> +#define PREPARE do_prepare
> +
> +struct test_shminfo
> +{
> +  unsigned long int shmall;
> +  unsigned long int shmmax;
> +  unsigned long int shmmni;
> +};
> +
> +/* It tries to obtain some system-wide SysV shared memory information from
> +   /proc to check against IPC_INFO/SHM_INFO.  The /proc only returns the
> +   tunables value of SHMALL, SHMMAX, and SHMMNI.  */
> +
> +static uint64_t
> +read_proc_file (const char *file)
> +{
> +  FILE *f = fopen (file, "r");
> +  if (f == NULL)
> +    FAIL_UNSUPPORTED ("/proc is not mounted or %s is not available", file);
> +
> +  /* Handle 32-bit binaries running on 64-bit kernels.  */
> +  uint64_t v;
> +  int r = fscanf (f, "%" SCNu64, &v);
> +  TEST_VERIFY_EXIT (r == 1);
> +
> +  fclose (f);
> +  return v;
> +}
> +
> +
> +/* Check if the message queue with IDX (index into the kernel's internal
> +   array) matches the one with KEY.  The CMD is either SHM_STAT or
> +   SHM_STAT_ANY.  */
> +
> +static bool
> +check_shminfo (int idx, key_t key, int cmd)
> +{
> +  struct shmid_ds shminfo;
> +  int sid = shmctl (idx, cmd, &shminfo);
> +  /* Ignore unused array slot returned by the kernel or information from
> +     unknown message queue.  */
> +  if ((sid == -1 && errno == EINVAL) || sid != shmid)
> +    return false;
> +
> +  if (sid == -1)
> +    FAIL_EXIT1 ("shmctl with %s failed: %m",
> +		cmd == SHM_STAT ? "SHM_STAT" : "SHM_STAT_ANY");
> +
> +  TEST_COMPARE (shminfo.shm_perm.__key, key);
> +  TEST_COMPARE (shminfo.shm_perm.mode, SHM_MODE);
> +  TEST_COMPARE (shminfo.shm_segsz, pgsz);
> +
> +  return true;
> +}
> +
> +static int
> +do_test (void)
> +{
> +  atexit (remove_shm);
> +
> +  pgsz = sysconf (_SC_PAGESIZE);
> +  if (pgsz == -1)
> +    FAIL_EXIT1 ("sysconf (_SC_PAGESIZE) failed: %m");
> +
> +  key_t key = ftok (name, 'G');
> +  if (key == -1)
> +    FAIL_EXIT1 ("ftok failed: %m");
> +
> +  shmid = shmget (key, pgsz, IPC_CREAT | IPC_EXCL | SHM_MODE);
> +  if (shmid == -1)
> +    FAIL_EXIT1 ("shmget failed: %m");
> +
> +  struct test_shminfo tipcinfo;
> +  {
> +    uint64_t v = read_proc_file ("/proc/sys/kernel/shmmax");
> +#if LONG_MAX == INT_MAX
> +    /* Kernel explicit clamp the value for shmmax on compat symbol (32-bit
> +       binaries running on 64-bit kernels).  */
> +    if (v > INT_MAX)
> +      v = INT_MAX;
> +#endif
> +    tipcinfo.shmmax = v;
> +  }
> +  tipcinfo.shmall = read_proc_file ("/proc/sys/kernel/shmall");
> +  tipcinfo.shmmni = read_proc_file ("/proc/sys/kernel/shmmni");
> +
> +  int shmidx;
> +
> +  /* Note: SHM_INFO does not return a shminfo, but rather a 'struct shm_info'
> +     and it is tricky to verify it since it returns system resources consumed
> +     by shared memory.  The shmctl implementation handles SHM_INFO as
> +     IPC_INFO, so the IPC_INFO test should validate SHM_INFO as well.  */
> +
> +  {
> +    struct shminfo ipcinfo;
> +    shmidx = shmctl (shmid, IPC_INFO, (struct shmid_ds *) &ipcinfo);
> +    if (shmidx == -1)
> +      FAIL_EXIT1 ("shmctl with IPC_INFO failed: %m");
> +
> +    TEST_COMPARE (ipcinfo.shmall, tipcinfo.shmall);
> +    TEST_COMPARE (ipcinfo.shmmax, tipcinfo.shmmax);
> +    TEST_COMPARE (ipcinfo.shmmni, tipcinfo.shmmni);
> +  }
> +
> +  /* We check if the created shared memory shows in the global list.  */
> +  bool found = false;
> +  for (int i = 0; i <= shmidx; i++)
> +    {
> +      /* We can't tell apart if SHM_STAT_ANY is not supported (kernel older
> +	 than 4.17) or if the index used is invalid.  So it just check if
> +	 value returned from a valid call matches the created message
> +	 queue.  */
> +      check_shminfo (i, key, SHM_STAT_ANY);
> +
> +      if (check_shminfo (i, key, SHM_STAT))
> +	{
> +	  found = true;
> +	  break;
> +	}
> +    }
> +
> +  if (!found)
> +    FAIL_EXIT1 ("shmctl with SHM_STAT/SHM_STAT_ANY could not find the "
> +		"created shared memory");
> +
> +  if (shmctl (shmid, IPC_RMID, NULL) == -1)
> +    FAIL_EXIT1 ("shmctl failed");
> +
> +  return 0;
> +}
> +
> +#include <support/test-driver.c>
> 

  parent reply	other threads:[~2020-10-12 16:47 UTC|newest]

Thread overview: 7+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-10-05 17:11 Adhemerval Zanella
2020-10-05 17:11 ` [PATCH v2 2/2] sysvipc: Return EINVAL for invalid shmctl commands Adhemerval Zanella
2020-10-05 18:35   ` Andreas Schwab
2020-10-06 19:14     ` Adhemerval Zanella
2020-10-12 16:48   ` Adhemerval Zanella
2020-10-12 16:47 ` Adhemerval Zanella [this message]
2020-10-15 14:43 ` [PATCH v2 1/2] sysvipc: Fix IPC_INFO and SHM_INFO handling [BZ #26636] H.J. Lu

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=0d288b39-1069-0a83-a087-432a6d28c867@linaro.org \
    --to=adhemerval.zanella@linaro.org \
    --cc=libc-alpha@sourceware.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).