From patchwork Tue Feb 19 21:51:10 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Kevin Buettner X-Patchwork-Id: 31529 Received: (qmail 43400 invoked by alias); 19 Feb 2019 21:51:15 -0000 Mailing-List: contact gdb-patches-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Unsubscribe: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: gdb-patches-owner@sourceware.org Delivered-To: mailing list gdb-patches@sourceware.org Received: (qmail 43389 invoked by uid 89); 19 Feb 2019 21:51:14 -0000 Authentication-Results: sourceware.org; auth=none X-Spam-SWARE-Status: No, score=-26.9 required=5.0 tests=BAYES_00, GIT_PATCH_0, GIT_PATCH_1, GIT_PATCH_2, GIT_PATCH_3, SPF_HELO_PASS autolearn=ham version=3.3.2 spammy=2013, ongoing, os* X-HELO: mx1.redhat.com Received: from mx1.redhat.com (HELO mx1.redhat.com) (209.132.183.28) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP; Tue, 19 Feb 2019 21:51:12 +0000 Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.phx2.redhat.com [10.5.11.15]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 845BDAC2E1 for ; Tue, 19 Feb 2019 21:51:11 +0000 (UTC) Received: from f29-4.lan (ovpn-117-11.phx2.redhat.com [10.3.117.11]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 5DEAE5D70E for ; Tue, 19 Feb 2019 21:51:11 +0000 (UTC) Date: Tue, 19 Feb 2019 14:51:10 -0700 From: Kevin Buettner To: gdb-patches@sourceware.org Subject: [PATCH] Use Python 2.[67] / 3.X / PEP 3118 buffer protocol Message-ID: <20190219145110.03bccce6@f29-4.lan> MIME-Version: 1.0 X-IsSubscribed: yes This patch removes the non-IS_PY3K code in infpy_write_memory() and infpy_search_memory(). In both cases, the remaining code from these ifdefs is related to use of the PEP 3118 buffer protocol. (Deleted code is either due to simplification or related to use of the old buffer protocol.) PEP 3118 is sometimes referred to as the "new" buffer protocol, though it's not that new anymore. The link below describes new features in Python 2.6. In particular, it says that the buffer protocol described by PEP 3118 is in Python 2.6. It also says (at the top of the page) that Python 2.6 was released on Oct 1, 2008. https://docs.python.org/3/whatsnew/2.6.html#pep-3118-revised-buffer-protocol The last security release for the Python 2.6 series was 2.6.9. It was released on Oct 29, 2013. According to this document... https://www.python.org/download/releases/2.6.9/ ...support for the 2.6 series has ended: With the 2.6.9 release, and five years after its first release, the Python 2.6 series is now officially retired. All official maintenance for Python 2.6, including security patches, has ended. For ongoing maintenance releases, please see the Python 2.7 series. As noted earlier, Python 2.6, Python 2.7, and Python 3.X all have support for the PEP 3118 buffer protocol. Python releases prior to 2.6 use an older buffer protocol. Since Python 2.6 has been retired for a good while now, it seems reasonable to me to remove code using the older buffer protocol from GDB. I have also simplified some of the code via use of the Py_buffer unique_ptr specialization which I introduced in the two argument gdb.Value constructor patch series. Therefore, there is a dependency on patch #1 from that series. I have tested against both Python 2.7.15 and 3.7.2. I see no regressions among the non-racy tests. I've also verified that PyBuffer_Release is being called when the affected functions exit while running the tests in gdb.python/py-inferior.exp by hand. I've also tried running valgrind on GDB while running this test, but I'm puzzled by the results that I'm seeing - I'm seeing no additional leaks when I comment out the Py_buffer_up lines that I introduced. That said, I'm not seeing any leaks that obviously originate from either infpy_write_memory() or infpy_search_memory(). gdb/ChangeLog: * python/py-inferior.c (infpy_write_memory): Remove non-IS_PY3K code from these functions. Remove corresponding ifdefs. Use Py_buffer_up instead of explicit calls to PyBuffer_Release. Remove gotos and target of gotos. (infpy_search_memory): Likewise. --- gdb/python/py-inferior.c | 64 ++++++------------------------------------------ 1 file changed, 8 insertions(+), 56 deletions(-) diff --git a/gdb/python/py-inferior.c b/gdb/python/py-inferior.c index 6fc6093f3a..eb6be23471 100644 --- a/gdb/python/py-inferior.c +++ b/gdb/python/py-inferior.c @@ -596,31 +596,23 @@ infpy_write_memory (PyObject *self, PyObject *args, PyObject *kw) CORE_ADDR addr, length; PyObject *addr_obj, *length_obj = NULL; static const char *keywords[] = { "address", "buffer", "length", NULL }; -#ifdef IS_PY3K Py_buffer pybuf; if (!gdb_PyArg_ParseTupleAndKeywords (args, kw, "Os*|O", keywords, &addr_obj, &pybuf, &length_obj)) return NULL; + Py_buffer_up buffer_up (&pybuf); buffer = (const gdb_byte *) pybuf.buf; buf_len = pybuf.len; -#else - if (!gdb_PyArg_ParseTupleAndKeywords (args, kw, "Os#|O", keywords, - &addr_obj, &buffer, &buf_len, - &length_obj)) - return NULL; - - buffer = (const gdb_byte *) buffer; -#endif if (get_addr_from_python (addr_obj, &addr) < 0) - goto fail; + return nullptr; if (!length_obj) length = buf_len; else if (get_addr_from_python (length_obj, &length) < 0) - goto fail; + return nullptr; TRY { @@ -632,18 +624,9 @@ infpy_write_memory (PyObject *self, PyObject *args, PyObject *kw) } END_CATCH -#ifdef IS_PY3K - PyBuffer_Release (&pybuf); -#endif GDB_PY_HANDLE_EXCEPTION (except); Py_RETURN_NONE; - - fail: -#ifdef IS_PY3K - PyBuffer_Release (&pybuf); -#endif - return NULL; } /* Destructor of Membuf objects. */ @@ -752,7 +735,6 @@ infpy_search_memory (PyObject *self, PyObject *args, PyObject *kw) const gdb_byte *buffer; CORE_ADDR found_addr; int found = 0; -#ifdef IS_PY3K Py_buffer pybuf; if (!gdb_PyArg_ParseTupleAndKeywords (args, kw, "OOs*", keywords, @@ -760,42 +742,21 @@ infpy_search_memory (PyObject *self, PyObject *args, PyObject *kw) &pybuf)) return NULL; + Py_buffer_up buffer_up (&pybuf); buffer = (const gdb_byte *) pybuf.buf; pattern_size = pybuf.len; -#else - PyObject *pattern; - const void *vbuffer; - - if (!gdb_PyArg_ParseTupleAndKeywords (args, kw, "OOO", keywords, - &start_addr_obj, &length_obj, - &pattern)) - return NULL; - - if (!PyObject_CheckReadBuffer (pattern)) - { - PyErr_SetString (PyExc_RuntimeError, - _("The pattern is not a Python buffer.")); - - return NULL; - } - - if (PyObject_AsReadBuffer (pattern, &vbuffer, &pattern_size) == -1) - return NULL; - - buffer = (const gdb_byte *) vbuffer; -#endif if (get_addr_from_python (start_addr_obj, &start_addr) < 0) - goto fail; + return nullptr; if (get_addr_from_python (length_obj, &length) < 0) - goto fail; + return nullptr; if (!length) { PyErr_SetString (PyExc_ValueError, _("Search range is empty.")); - goto fail; + return nullptr; } /* Watch for overflows. */ else if (length > CORE_ADDR_MAX @@ -803,7 +764,7 @@ infpy_search_memory (PyObject *self, PyObject *args, PyObject *kw) { PyErr_SetString (PyExc_ValueError, _("The search range is too large.")); - goto fail; + return nullptr; } TRY @@ -818,21 +779,12 @@ infpy_search_memory (PyObject *self, PyObject *args, PyObject *kw) } END_CATCH -#ifdef IS_PY3K - PyBuffer_Release (&pybuf); -#endif GDB_PY_HANDLE_EXCEPTION (except); if (found) return PyLong_FromLong (found_addr); else Py_RETURN_NONE; - - fail: -#ifdef IS_PY3K - PyBuffer_Release (&pybuf); -#endif - return NULL; } /* Implementation of gdb.Inferior.is_valid (self) -> Boolean.