mirror of
https://github.com/python/cpython.git
synced 2025-12-08 06:10:17 +00:00
gh-98896: resource_tracker: use json&base64 to allow arbitrary shared memory names (GH-138473)
This commit is contained in:
parent
70748bdbea
commit
c6f3dd6a50
3 changed files with 97 additions and 8 deletions
|
|
@ -15,6 +15,7 @@
|
|||
# this resource tracker process, "killall python" would probably leave unlinked
|
||||
# resources.
|
||||
|
||||
import base64
|
||||
import os
|
||||
import signal
|
||||
import sys
|
||||
|
|
@ -22,6 +23,8 @@
|
|||
import warnings
|
||||
from collections import deque
|
||||
|
||||
import json
|
||||
|
||||
from . import spawn
|
||||
from . import util
|
||||
|
||||
|
|
@ -196,6 +199,17 @@ def _launch(self):
|
|||
finally:
|
||||
os.close(r)
|
||||
|
||||
def _make_probe_message(self):
|
||||
"""Return a JSON-encoded probe message."""
|
||||
return (
|
||||
json.dumps(
|
||||
{"cmd": "PROBE", "rtype": "noop"},
|
||||
ensure_ascii=True,
|
||||
separators=(",", ":"),
|
||||
)
|
||||
+ "\n"
|
||||
).encode("ascii")
|
||||
|
||||
def _ensure_running_and_write(self, msg=None):
|
||||
with self._lock:
|
||||
if self._lock._recursion_count() > 1:
|
||||
|
|
@ -207,7 +221,7 @@ def _ensure_running_and_write(self, msg=None):
|
|||
if self._fd is not None:
|
||||
# resource tracker was launched before, is it still running?
|
||||
if msg is None:
|
||||
to_send = b'PROBE:0:noop\n'
|
||||
to_send = self._make_probe_message()
|
||||
else:
|
||||
to_send = msg
|
||||
try:
|
||||
|
|
@ -234,7 +248,7 @@ def _check_alive(self):
|
|||
try:
|
||||
# We cannot use send here as it calls ensure_running, creating
|
||||
# a cycle.
|
||||
os.write(self._fd, b'PROBE:0:noop\n')
|
||||
os.write(self._fd, self._make_probe_message())
|
||||
except OSError:
|
||||
return False
|
||||
else:
|
||||
|
|
@ -253,11 +267,25 @@ def _write(self, msg):
|
|||
assert nbytes == len(msg), f"{nbytes=} != {len(msg)=}"
|
||||
|
||||
def _send(self, cmd, name, rtype):
|
||||
msg = f"{cmd}:{name}:{rtype}\n".encode("ascii")
|
||||
if len(msg) > 512:
|
||||
# posix guarantees that writes to a pipe of less than PIPE_BUF
|
||||
# bytes are atomic, and that PIPE_BUF >= 512
|
||||
raise ValueError('msg too long')
|
||||
# POSIX guarantees that writes to a pipe of less than PIPE_BUF (512 on Linux)
|
||||
# bytes are atomic. Therefore, we want the message to be shorter than 512 bytes.
|
||||
# POSIX shm_open() and sem_open() require the name, including its leading slash,
|
||||
# to be at most NAME_MAX bytes (255 on Linux)
|
||||
# With json.dump(..., ensure_ascii=True) every non-ASCII byte becomes a 6-char
|
||||
# escape like \uDC80.
|
||||
# As we want the overall message to be kept atomic and therefore smaller than 512,
|
||||
# we encode encode the raw name bytes with URL-safe Base64 - so a 255 long name
|
||||
# will not exceed 340 bytes.
|
||||
b = name.encode('utf-8', 'surrogateescape')
|
||||
if len(b) > 255:
|
||||
raise ValueError('shared memory name too long (max 255 bytes)')
|
||||
b64 = base64.urlsafe_b64encode(b).decode('ascii')
|
||||
|
||||
payload = {"cmd": cmd, "rtype": rtype, "base64_name": b64}
|
||||
msg = (json.dumps(payload, ensure_ascii=True, separators=(",", ":")) + "\n").encode("ascii")
|
||||
|
||||
# The entire JSON message is guaranteed < PIPE_BUF (512 bytes) by construction.
|
||||
assert len(msg) <= 512, f"internal error: message too long ({len(msg)} bytes)"
|
||||
|
||||
self._ensure_running_and_write(msg)
|
||||
|
||||
|
|
@ -290,7 +318,23 @@ def main(fd):
|
|||
with open(fd, 'rb') as f:
|
||||
for line in f:
|
||||
try:
|
||||
cmd, name, rtype = line.strip().decode('ascii').split(':')
|
||||
try:
|
||||
obj = json.loads(line.decode('ascii'))
|
||||
except Exception as e:
|
||||
raise ValueError("malformed resource_tracker message: %r" % (line,)) from e
|
||||
|
||||
cmd = obj["cmd"]
|
||||
rtype = obj["rtype"]
|
||||
b64 = obj.get("base64_name", "")
|
||||
|
||||
if not isinstance(cmd, str) or not isinstance(rtype, str) or not isinstance(b64, str):
|
||||
raise ValueError("malformed resource_tracker fields: %r" % (obj,))
|
||||
|
||||
try:
|
||||
name = base64.urlsafe_b64decode(b64).decode('utf-8', 'surrogateescape')
|
||||
except ValueError as e:
|
||||
raise ValueError("malformed resource_tracker base64_name: %r" % (b64,)) from e
|
||||
|
||||
cleanup_func = _CLEANUP_FUNCS.get(rtype, None)
|
||||
if cleanup_func is None:
|
||||
raise ValueError(
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue