public inbox for libc-alpha@sourceware.org
 help / color / mirror / Atom feed
From: Adhemerval Zanella <adhemerval.zanella@linaro.org>
To: libc-alpha@sourceware.org, Paul Eggert <eggert@cs.ucla.edu>,
	Florian Weimer <fweimer@redhat.com>,
	Siddhesh Poyarekar <siddhesh@gotplt.org>
Subject: Re: [PATCH] free: preserve errno [BZ#17924]
Date: Wed, 23 Dec 2020 16:19:18 -0300	[thread overview]
Message-ID: <11ae3757-fe3b-4bd8-92d2-a8d0a1af9ad4@linaro.org> (raw)
In-Reply-To: <a8473ef7-777a-da95-f4d9-4a5620c8a9ce@cs.ucla.edu>



On 23/12/2020 02:30, Paul Eggert wrote:
> Thanks for the comment about the test case's compiler barrier, and about the test case's too-long lines. I fixed those, and also fixed the BZ# in the Subject line. Revised patch attached.

> From a994c467ce04abfe102809812156cb30810eaa95 Mon Sep 17 00:00:00 2001
> From: Paul Eggert <eggert@cs.ucla.edu>
> Date: Tue, 22 Dec 2020 21:17:20 -0800
> Subject: [PATCH] free: preserve errno [BZ#17924]
> 
> In the next release of POSIX, free must preserve errno
> <https://www.austingroupbugs.net/view.php?id=385>.
> Modify __libc_free to save and restore errno, so that
> any internal munmap etc. syscalls do not disturb the caller's errno.
> Add a test malloc/tst-free-errno.c (almost all by Bruno Haible),
> and document that free preserves errno.
> ---
>  malloc/Makefile         |   1 +
>  malloc/malloc.c         |  13 +++-
>  malloc/tst-free-errno.c | 168 ++++++++++++++++++++++++++++++++++++++++
>  manual/memory.texi      |   9 +++
>  4 files changed, 187 insertions(+), 4 deletions(-)
>  create mode 100644 malloc/tst-free-errno.c
> 
> diff --git a/malloc/Makefile b/malloc/Makefile
> index ab64dcfd73..4b3975f90d 100644
> --- a/malloc/Makefile
> +++ b/malloc/Makefile
> @@ -34,6 +34,7 @@ tests := mallocbug tst-malloc tst-valloc tst-calloc tst-obstack \
>  	 tst-interpose-nothread \
>  	 tst-interpose-thread \
>  	 tst-alloc_buffer \
> +	 tst-free-errno \
>  	 tst-malloc-tcache-leak \
>  	 tst-malloc_info tst-mallinfo2 \
>  	 tst-malloc-too-large \
> diff --git a/malloc/malloc.c b/malloc/malloc.c
> index a3e914fa8a..3b151f44f7 100644
> --- a/malloc/malloc.c
> +++ b/malloc/malloc.c
> @@ -3278,6 +3278,8 @@ __libc_free (void *mem)
>    *(volatile char *)mem;
>  #endif
>  
> +  int err = errno;
> +
>    p = mem2chunk (mem);
>  
>    /* Mark the chunk as belonging to the library again.  */
> @@ -3298,13 +3300,16 @@ __libc_free (void *mem)
>                        mp_.mmap_threshold, mp_.trim_threshold);
>          }
>        munmap_chunk (p);
> -      return;
>      }
> +  else
> +    {
> +      MAYBE_INIT_TCACHE ();
>  
> -  MAYBE_INIT_TCACHE ();
> +      ar_ptr = arena_for_chunk (p);
> +      _int_free (ar_ptr, p, 0);
> +    }
>  
> -  ar_ptr = arena_for_chunk (p);
> -  _int_free (ar_ptr, p, 0);
> +  __set_errno (err);
>  }
>  libc_hidden_def (__libc_free)
>  

I am not very found on adding a errno set/restore on *every* free, specially
because it is extra overhead on small allocations that won't touch mmap/munmap
(specially for tcache case).

Fixing in a more fine grained would require a lot of more work to check if
the shared routines that calls mmap, madvise or brk won't interfere with other
symbols; so maybe it should be ok to use this large hammer for now.

> diff --git a/malloc/tst-free-errno.c b/malloc/tst-free-errno.c
> new file mode 100644
> index 0000000000..a612bbb3bf
> --- /dev/null
> +++ b/malloc/tst-free-errno.c
> @@ -0,0 +1,168 @@
> +/* Test that free preserves errno.
> +   Copyright (C) 2020 Free Software Foundation, Inc.
> +   This file is part of the GNU C Library.
> +
> +   The GNU C Library is free software; you can redistribute it and/or
> +   modify it under the terms of the GNU Lesser General Public
> +   License as published by the Free Software Foundation; either
> +   version 2.1 of the License, or (at your option) any later version.
> +
> +   The GNU C Library is distributed in the hope that it will be useful,
> +   but WITHOUT ANY WARRANTY; without even the implied warranty of
> +   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
> +   Lesser General Public License for more details.
> +
> +   You should have received a copy of the GNU Lesser General Public
> +   License along with the GNU C Library; if not, see
> +   <https://www.gnu.org/licenses/>.  */
> +
> +#include <errno.h>
> +#include <stdlib.h>
> +#include <string.h>
> +#include <unistd.h>
> +#if defined __linux__
> +# include <fcntl.h>
> +# include <stdint.h>
> +# include <string.h>
> +# include <sys/mman.h>
> +#endif

Why do you need to include this solely for Linux? I think all of the headers
should be provided by glibc on all supported systems.

> +
> +#define ASSERT_NO_STDIO(expr) \
> +  do                                                        \
> +    {                                                       \
> +      if (!(expr))                                          \
> +        {                                                   \
> +          WRITE_TO_STDERR (__FILE__);                       \
> +          WRITE_TO_STDERR (":");                            \
> +          WRITE_MACROEXPANDED_INTEGER_TO_STDERR (__LINE__); \
> +          WRITE_TO_STDERR (": assertion '");                \
> +          WRITE_TO_STDERR (#expr);                          \
> +          WRITE_TO_STDERR ("' failed\n");                   \
> +          abort ();                                         \
> +        }                                                   \
> +    }                                                       \
> +  while (0)
> +#define WRITE_MACROEXPANDED_INTEGER_TO_STDERR(integer) \
> +  WRITE_INTEGER_TO_STDERR(integer)
> +#define WRITE_INTEGER_TO_STDERR(integer) \
> +  WRITE_TO_STDERR (#integer)
> +#define WRITE_TO_STDERR(string_literal) \
> +  {                                     \
> +    const char *s = string_literal;     \
> +    int ret = write (2, s, strlen (s)); \
> +    (void) ret;                         \
> +  }

Why can't you use support/check.h instead?

> +
> +/* The __attribute__ ((weak)) prevents a GCC optimization.  Without
> +   it, GCC would "know" that errno is unchanged by calling free (ptr),
> +   when ptr was the result of a malloc call in the same function.  */
> +int __attribute__ ((weak))
> +get_errno (void)
> +{
> +  return errno;
> +}
> +
> +static int
> +do_test (void)
> +{
> +  /* Check that free() preserves errno.  */
> +  {
> +    errno = 1789; /* Liberté, égalité, fraternité.  */
> +    free (NULL);
> +    ASSERT_NO_STDIO (get_errno () == 1789);
> +  }
> +  { /* Large memory allocations.  */

Maybe add a comment that it is forcing a mmap with the large allocation.

> +    #define N 2
> +    void * volatile ptrs[N];
> +    size_t i;
> +    for (i = 0; i < N; i++)
> +      ptrs[i] = malloc (5318153);
> +    for (i = 0; i < N; i++)
> +      {
> +        errno = 1789;
> +        free (ptrs[i]);
> +        ASSERT_NO_STDIO (get_errno () == 1789);
> +      }
> +    #undef N
> +  }

No need to set/unset N here.

> +
> +  /* Test a less common code path.
> +     When malloc() is based on mmap(), free() can sometimes call munmap().
> +     munmap() usually succeeds, but fails in a particular situation: when
> +       - it has to unmap the middle part of a VMA, and
> +       - the number of VMAs of a process is limited and the limit is
> +         already reached.
> +     The latter condition is fulfilled on Linux, when the file
> +     /proc/sys/vm/max_map_count exists.  This file contains the limit
> +       - for Linux >= 2.4.19: 65536
> +         (DEFAULT_MAX_MAP_COUNT in linux/include/linux/sched.h)
> +       - for Linux >= 2.6.31: 65530
> +         (DEFAULT_MAX_MAP_COUNT in linux/include/linux/mm.h).

I think there is no need to reference old and unsupported kernel such as
2.4.

> +   */
> +  #if defined __linux__
> +  if (open ("/proc/sys/vm/max_map_count", O_RDONLY) >= 0)
> +    {
> +      /* Preparations.  */
> +      size_t pagesize = getpagesize ();
> +      void *firstpage_backup = malloc (pagesize);
> +      void *lastpage_backup = malloc (pagesize);

Use xmalloc here, so there is no need to check if the allocation has succeded
(they are small enough we can assume a failure means something wrong).

> +      /* Allocate a large memory area, as a bumper, so that the MAP_FIXED
> +         allocation later will not overwrite parts of the memory areas
> +         allocated to ld.so or libc.so.  */
> +      void *bumper_region =
> +        mmap (NULL, 0x1000000, PROT_READ, MAP_ANONYMOUS | MAP_PRIVATE, -1, 0);
> +      /* A file descriptor pointing to a regular file.  */

Use xmmap.

> +      int fd = open ("/etc/hosts", O_RDONLY);
> +

I think it is better to use a temporary file from support/create_temp_file.h.

> +      if (firstpage_backup != NULL && lastpage_backup != NULL
> +          && bumper_region != (void *)(-1)
> +          && fd >= 0)
> +        {
> +          /* Do a large memory allocation.  */
> +          size_t big_size = 0x1000000;
> +          void * volatile ptr = malloc (big_size - 0x100);

User xmalloc.

> +          char *ptr_aligned = (char *) ((uintptr_t) ptr & ~(pagesize - 1));
> +          /* This large memory allocation allocated a memory area
> +             from ptr_aligned to ptr_aligned + big_size.
> +             Enlarge this memory area by adding a page before and a page
> +             after it.  */
> +          memcpy (firstpage_backup, ptr_aligned, pagesize);
> +          memcpy (lastpage_backup, ptr_aligned + big_size - pagesize,
> +		  pagesize);
> +          if (mmap (ptr_aligned - pagesize, pagesize + big_size + pagesize,
> +                    PROT_READ | PROT_WRITE,
> +                    MAP_ANONYMOUS | MAP_PRIVATE | MAP_FIXED, -1, 0)
> +              != (void *)(-1))

Use xmmap.

> +            {
> +              memcpy (ptr_aligned, firstpage_backup, pagesize);
> +              memcpy (ptr_aligned + big_size - pagesize, lastpage_backup,
> +		      pagesize);
> +
> +              /* Now add as many mappings as we can.
> +                 Stop at 65536, in order not to crash the machine (in case the
> +                 limit has been increased by the system administrator).  */
> +              size_t i;
> +              for (i = 0; i < 65536; i++)
> +                if (mmap (NULL, pagesize, PROT_READ,
> +			  MAP_FILE | MAP_PRIVATE, fd, 0)
> +                    == (void *)(-1))
> +                  break;
> +              /* Now the number of VMAs of this process has hopefully attained
> +                 its limit.  */
> +
> +              errno = 1789;
> +              /* This call to free() is supposed to call
> +                   munmap (ptr_aligned, big_size);
> +                 which increases the number of VMAs by 1, which is supposed
> +                 to fail.  */
> +              free (ptr);
> +              ASSERT_NO_STDIO (get_errno () == 1789);
> +            }
> +        }
> +    }
> +  #endif
> +
> +  return 0;
> +}
> +
> +#include <support/test-driver.c>

Ok.

> diff --git a/manual/memory.texi b/manual/memory.texi
> index c132261084..b2cc65228a 100644
> --- a/manual/memory.texi
> +++ b/manual/memory.texi
> @@ -738,6 +738,12 @@ later call to @code{malloc} to reuse the space.  In the meantime, the
>  space remains in your program as part of a free-list used internally by
>  @code{malloc}.
>  
> +The @code{free} function preserves the value of @code{errno}, so that
> +cleanup code need not worry about saving and restoring @code{errno}
> +around a call to @code{free}.  Although neither @w{ISO C} nor
> +POSIX.1-2017 requires @code{free} to preserve @code{errno}, a future
> +version of POSIX is planned to require it.
> +
>  There is no point in freeing blocks at the end of a program, because all
>  of the program's space is given back to the system when the process
>  terminates.

Not sure if this is worth to add, since we will need to update the manual
once the POSIX does require it.

> @@ -1935,6 +1941,9 @@ linking against @code{libc.a} (explicitly or implicitly).
>  functions (that is, all the functions used by the application,
>  @theglibc{}, and other linked-in libraries) can lead to static linking
>  failures, and, at run time, to heap corruption and application crashes.
> +Replacement functions should implement the behavior documented for
> +their counterparts in @theglibc{}; for example, the replacement
> +@code{free} should also preserve @code{errno}.
>  
>  The minimum set of functions which has to be provided by a custom
>  @code{malloc} is given in the table below.
> -- 
> 2.29.2

  reply	other threads:[~2020-12-23 19:19 UTC|newest]

Thread overview: 14+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-12-20 20:25 Paul Eggert
2020-12-21  2:03 ` Siddhesh Poyarekar
2020-12-21  4:27 ` Carlos O'Donell
2020-12-21  7:20   ` Paul Eggert
2020-12-21  7:43     ` Siddhesh Poyarekar
2020-12-21  9:33     ` Florian Weimer
2020-12-21 10:03       ` Siddhesh Poyarekar
2020-12-21 10:05         ` Siddhesh Poyarekar
2020-12-23  5:30       ` Paul Eggert
2020-12-23 19:19         ` Adhemerval Zanella [this message]
2020-12-24  1:03           ` Paul Eggert
2020-12-28 19:24             ` Adhemerval Zanella
2020-12-29 13:38               ` H.J. Lu
2020-12-29 18:32                 ` Adhemerval Zanella

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=11ae3757-fe3b-4bd8-92d2-a8d0a1af9ad4@linaro.org \
    --to=adhemerval.zanella@linaro.org \
    --cc=eggert@cs.ucla.edu \
    --cc=fweimer@redhat.com \
    --cc=libc-alpha@sourceware.org \
    --cc=siddhesh@gotplt.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).