mirror of
https://github.com/samba-team/samba.git
synced 2024-12-24 21:34:56 +03:00
db5bda56bf
This adds optional support for locking based on shared robust mutexes. The caller can use the TDB_MUTEX_LOCKING flag together with TDB_CLEAR_IF_FIRST after verifying with tdb_runtime_check_for_robust_mutexes() that it's supported by the current system. The caller should be aware that using TDB_MUTEX_LOCKING implies some limitations, e.g. it's not possible to have multiple read chainlocks on a given hash chain from multiple processes. Note: that this doesn't make tdb thread safe! Pair-Programmed-With: Stefan Metzmacher <metze@samba.org> Pair-Programmed-With: Michael Adam <obnox@samba.org> Signed-off-by: Volker Lendecke <vl@samba.org> Signed-off-by: Stefan Metzmacher <metze@samba.org> Signed-off-by: Michael Adam <obnox@samba.org> Reviewed-by: Jeremy Allison <jra@samba.org>
133 lines
3.4 KiB
C
133 lines
3.4 KiB
C
#include "../common/tdb_private.h"
|
|
#include "../common/io.c"
|
|
#include "../common/tdb.c"
|
|
#include "../common/lock.c"
|
|
#include "../common/freelist.c"
|
|
#include "../common/traverse.c"
|
|
#include "../common/transaction.c"
|
|
#include "../common/error.c"
|
|
#include "../common/open.c"
|
|
#include "../common/check.c"
|
|
#include "../common/hash.c"
|
|
#include "../common/mutex.c"
|
|
#include "tap-interface.h"
|
|
#include <stdlib.h>
|
|
#include "logging.h"
|
|
|
|
static int check(TDB_DATA key, TDB_DATA data, void *private)
|
|
{
|
|
unsigned int *sizes = private;
|
|
|
|
if (key.dsize > strlen("hello"))
|
|
return -1;
|
|
if (memcmp(key.dptr, "hello", key.dsize) != 0)
|
|
return -1;
|
|
|
|
if (data.dsize != strlen("world"))
|
|
return -1;
|
|
if (memcmp(data.dptr, "world", data.dsize) != 0)
|
|
return -1;
|
|
|
|
sizes[0] += key.dsize;
|
|
sizes[1] += data.dsize;
|
|
return 0;
|
|
}
|
|
|
|
static void tdb_flip_bit(struct tdb_context *tdb, unsigned int bit)
|
|
{
|
|
unsigned int off = bit / CHAR_BIT;
|
|
unsigned char mask = (1 << (bit % CHAR_BIT));
|
|
|
|
if (tdb->map_ptr)
|
|
((unsigned char *)tdb->map_ptr)[off] ^= mask;
|
|
else {
|
|
unsigned char c;
|
|
if (pread(tdb->fd, &c, 1, off) != 1) {
|
|
fprintf(stderr, "pread: %s\n", strerror(errno));
|
|
exit(1);
|
|
}
|
|
c ^= mask;
|
|
if (pwrite(tdb->fd, &c, 1, off) != 1) {
|
|
fprintf(stderr, "pwrite: %s\n", strerror(errno));
|
|
exit(1);
|
|
}
|
|
}
|
|
}
|
|
|
|
static void check_test(struct tdb_context *tdb)
|
|
{
|
|
TDB_DATA key, data;
|
|
unsigned int i, verifiable, corrupt, sizes[2], dsize, ksize;
|
|
|
|
ok1(tdb_check(tdb, NULL, NULL) == 0);
|
|
|
|
key.dptr = discard_const_p(uint8_t, "hello");
|
|
data.dsize = strlen("world");
|
|
data.dptr = discard_const_p(uint8_t, "world");
|
|
|
|
/* Key and data size respectively. */
|
|
dsize = ksize = 0;
|
|
|
|
/* 5 keys in hash size 2 means we'll have multichains. */
|
|
for (key.dsize = 1; key.dsize <= 5; key.dsize++) {
|
|
ksize += key.dsize;
|
|
dsize += data.dsize;
|
|
if (tdb_store(tdb, key, data, TDB_INSERT) != 0)
|
|
abort();
|
|
}
|
|
|
|
/* This is how many bytes we expect to be verifiable. */
|
|
/* From the file header. */
|
|
verifiable = strlen(TDB_MAGIC_FOOD) + 1
|
|
+ 2 * sizeof(uint32_t) + 2 * sizeof(tdb_off_t)
|
|
+ 2 * sizeof(uint32_t);
|
|
/* From the free list chain and hash chains. */
|
|
verifiable += 3 * sizeof(tdb_off_t);
|
|
/* From the record headers & tailer */
|
|
verifiable += 5 * (sizeof(struct tdb_record) + sizeof(uint32_t));
|
|
/* The free block: we ignore datalen, keylen, full_hash. */
|
|
verifiable += sizeof(struct tdb_record) - 3*sizeof(uint32_t) +
|
|
sizeof(uint32_t);
|
|
/* Our check function verifies the key and data. */
|
|
verifiable += ksize + dsize;
|
|
|
|
/* Flip one bit at a time, make sure it detects verifiable bytes. */
|
|
for (i = 0, corrupt = 0; i < tdb->map_size * CHAR_BIT; i++) {
|
|
tdb_flip_bit(tdb, i);
|
|
memset(sizes, 0, sizeof(sizes));
|
|
if (tdb_check(tdb, check, sizes) != 0)
|
|
corrupt++;
|
|
else if (sizes[0] != ksize || sizes[1] != dsize)
|
|
corrupt++;
|
|
tdb_flip_bit(tdb, i);
|
|
}
|
|
ok(corrupt == verifiable * CHAR_BIT, "corrupt %u should be %u",
|
|
corrupt, verifiable * CHAR_BIT);
|
|
}
|
|
|
|
int main(int argc, char *argv[])
|
|
{
|
|
struct tdb_context *tdb;
|
|
|
|
plan_tests(4);
|
|
/* This should use mmap. */
|
|
tdb = tdb_open_ex("run-corrupt.tdb", 2, TDB_CLEAR_IF_FIRST,
|
|
O_CREAT|O_TRUNC|O_RDWR, 0600, &taplogctx, NULL);
|
|
|
|
if (!tdb)
|
|
abort();
|
|
check_test(tdb);
|
|
tdb_close(tdb);
|
|
|
|
/* This should not. */
|
|
tdb = tdb_open_ex("run-corrupt.tdb", 2, TDB_CLEAR_IF_FIRST|TDB_NOMMAP,
|
|
O_CREAT|O_TRUNC|O_RDWR, 0600, &taplogctx, NULL);
|
|
|
|
if (!tdb)
|
|
abort();
|
|
check_test(tdb);
|
|
tdb_close(tdb);
|
|
|
|
return exit_status();
|
|
}
|