// Berkeley Open Infrastructure for Network Computing // http://boinc.berkeley.edu // Copyright (C) 2005 University of California // // This is free software; you can redistribute it and/or // modify it under the terms of the GNU Lesser General Public // License as published by the Free Software Foundation; // either version 2.1 of the License, or (at your option) any later version. // // This software is distributed in the hope that it will be useful, // but WITHOUT ANY WARRANTY; without even the implied warranty of // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. // See the GNU Lesser General Public License for more details. // // To view the GNU Lesser General Public License visit // http://www.gnu.org/copyleft/lesser.html // or write to the Free Software Foundation, Inc., // 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA // interfaces for accessing shared memory segments #if defined(_WIN32) && !defined(__STDWX_H__) && !defined(_BOINC_WIN_) && !defined(_AFX_STDAFX_H_) #include "boinc_win.h" #endif #ifdef __EMX__ #define INCL_DOS #define INCL_DOSERRORS #include extern "C" int debug_printf(const char *fmt, ...); #endif #ifndef _WIN32 #include "config.h" #include #include #include #include #if HAVE_SYS_IPC_H #include #endif #if HAVE_SYS_SHM_H #if __FreeBSD__ #include #endif #include #endif #endif #if(!defined (_WIN32) && !defined (__EMX__)) #include #include #include #include // MAP_FILE isn't defined on most operating systems, and even then, it // is often defined just for the sake of compatibility. On those that // don't define it, we will.... #ifndef MAP_FILE #define MAP_FILE 0 #endif #endif #include "error_numbers.h" #include "shmem.h" #ifdef _USING_FCGI_ #include "fcgi_stdio.h" #endif #ifdef _WIN32 HANDLE create_shmem(LPCTSTR seg_name, int size, void** pp) { HANDLE hMap = NULL; DWORD dwError = 0; DWORD dwRes = 0; PSID pEveryoneSID = NULL; PACL pACL = NULL; PSECURITY_DESCRIPTOR pSD = NULL; EXPLICIT_ACCESS ea; SID_IDENTIFIER_AUTHORITY SIDAuthWorld = SECURITY_WORLD_SID_AUTHORITY; SECURITY_ATTRIBUTES sa; OSVERSIONINFO osvi; char global_seg_name[256]; // Win9X doesn't like any reference to a security descriptor. // So if we detect that we are running on the Win9X platform pass // a NULL value for it. // osvi.dwOSVersionInfoSize = sizeof(osvi); GetVersionEx(&osvi); if (osvi.dwPlatformId == VER_PLATFORM_WIN32_WINDOWS) { hMap = CreateFileMapping(INVALID_HANDLE_VALUE, NULL, PAGE_READWRITE, 0, size, seg_name); dwError = GetLastError(); } else { // Create a well-known SID for the Everyone group. if(!AllocateAndInitializeSid(&SIDAuthWorld, 1, SECURITY_WORLD_RID, 0, 0, 0, 0, 0, 0, 0, &pEveryoneSID) ) { fprintf(stderr, "AllocateAndInitializeSid Error %u\n", GetLastError()); goto Cleanup; } // Initialize an EXPLICIT_ACCESS structure for an ACE. // The ACE will allow Everyone all access to the shared memory object. ZeroMemory(&ea, sizeof(EXPLICIT_ACCESS)); ea.grfAccessPermissions = FILE_MAP_ALL_ACCESS; ea.grfAccessMode = SET_ACCESS; ea.grfInheritance= NO_INHERITANCE; ea.Trustee.TrusteeForm = TRUSTEE_IS_SID; ea.Trustee.TrusteeType = TRUSTEE_IS_WELL_KNOWN_GROUP; ea.Trustee.ptstrName = (LPTSTR) pEveryoneSID; // Create a new ACL that contains the new ACEs. dwRes = SetEntriesInAcl(1, &ea, NULL, &pACL); if (ERROR_SUCCESS != dwRes) { fprintf(stderr, "SetEntriesInAcl Error %u\n", GetLastError()); goto Cleanup; } // Initialize a security descriptor. pSD = (PSECURITY_DESCRIPTOR) LocalAlloc(LPTR, SECURITY_DESCRIPTOR_MIN_LENGTH); if (NULL == pSD) { fprintf(stderr, "LocalAlloc Error %u\n", GetLastError()); goto Cleanup; } if (!InitializeSecurityDescriptor(pSD, SECURITY_DESCRIPTOR_REVISION)) { fprintf(stderr, "InitializeSecurityDescriptor Error %u\n", GetLastError() ); goto Cleanup; } // Add the ACL to the security descriptor. if (!SetSecurityDescriptorDacl(pSD, TRUE, // bDaclPresent flag pACL, FALSE) // not a default DACL ) { fprintf(stderr, "SetSecurityDescriptorDacl Error %u\n", GetLastError() ); goto Cleanup; } // Initialize a security attributes structure. sa.nLength = sizeof (SECURITY_ATTRIBUTES); sa.lpSecurityDescriptor = pSD; sa.bInheritHandle = FALSE; // Use the security attributes to set the security descriptor // when you create a shared file mapping. // The 'Global' prefix must be included in the shared memory // name if the shared memory segment is going to cross // terminal server session boundries. // sprintf(global_seg_name, "Global\\%s", seg_name); // Try using 'Global' so that it can cross terminal server sessions // hMap = CreateFileMapping(INVALID_HANDLE_VALUE, &sa, PAGE_READWRITE, 0, size, global_seg_name); dwError = GetLastError(); if (!hMap && (ERROR_ACCESS_DENIED == dwError)) { // Couldn't use the 'Global' tag, so just attempt to use the original // name. // hMap = CreateFileMapping(INVALID_HANDLE_VALUE, &sa, PAGE_READWRITE, 0, size, seg_name); dwError = GetLastError(); } } if (hMap) { if (GetLastError() == ERROR_ALREADY_EXISTS) { CloseHandle(hMap); hMap = NULL; } else { *pp = MapViewOfFile( hMap, FILE_MAP_ALL_ACCESS, 0, 0, 0 ); } } Cleanup: if (osvi.dwPlatformId != VER_PLATFORM_WIN32_WINDOWS) { if (pEveryoneSID) FreeSid(pEveryoneSID); if (pACL) LocalFree(pACL); if (pSD) LocalFree(pSD); } return hMap; } HANDLE attach_shmem(LPCTSTR seg_name, void** pp) { HANDLE hMap; char global_seg_name[256]; // The 'Global' prefix must be included in the shared memory // name if the shared memory segment is going to cross // terminal server session boundries. // sprintf(global_seg_name, "Global\\%s", seg_name); // Try using 'Global' so that it can cross terminal server sessions // hMap = OpenFileMapping(FILE_MAP_ALL_ACCESS, FALSE, global_seg_name); if (!hMap) { // Couldn't use the 'Global' tag, so just attempt to use the original // name. // hMap = OpenFileMapping(FILE_MAP_ALL_ACCESS, FALSE, seg_name); } if (!hMap) return NULL; if (pp) *pp = MapViewOfFile(hMap, FILE_MAP_ALL_ACCESS, 0, 0, 0); return hMap; } int detach_shmem(HANDLE hMap, void* p) { if (p) UnmapViewOfFile(p); CloseHandle(hMap); return 0; } #elif defined(__EMX__) int create_shmem(key_t key, int size, void** pp) { APIRET rc; char buf[256]; sprintf(buf, "\\SHAREMEM\\BOINC\\%d", key); //debug_printf( "create_shmem %s, %d, %p\n", buf, size, pp); rc = DosAllocSharedMem(pp, (PSZ)buf, size, PAG_READ | PAG_WRITE | PAG_EXECUTE | PAG_COMMIT | OBJ_ANY); if (rc == ERROR_ALREADY_EXISTS) return attach_shmem( key, pp); if (rc) rc = DosAllocSharedMem(pp, (PSZ)buf, size, PAG_READ | PAG_WRITE | PAG_EXECUTE | PAG_COMMIT); if (rc) { //debug_printf( "DosAllocSharedMem %s failed, rc=%d\n", buf, rc); return ERR_SHMGET; } //debug_printf( "create_shmem %p\n", *pp); return 0; } int destroy_shmem(key_t key){ APIRET rc; void* pp; //debug_printf( "destroy_shmem %d\n", key); attach_shmem( key, &pp); rc = DosFreeMem(pp); if (rc) { //debug_printf( "DosFreeMem %d failed, rc=%d\n", key, rc); return ERR_SHMCTL; } //debug_printf( "destroy_shmem %d done\n", key); return 0; } int attach_shmem(key_t key, void** pp){ APIRET rc; char buf[256]; sprintf(buf, "\\SHAREMEM\\BOINC\\%d", key); //debug_printf( "attach_shmem %s, %p\n", buf, pp); rc = DosGetNamedSharedMem(pp, (PSZ) buf, PAG_READ | PAG_WRITE); if (rc) { //debug_printf( "DosGetNamedSharedMem %s failed, rc=%d\n", buf, rc); return ERR_SHMAT; } //debug_printf( "attach_shmem %p\n", *pp); return 0; } int detach_shmem(void* p) { /* dummy */ //debug_printf( "detach_shmem %p not supported\n", p); return 0; } #else // V6 mmap() shared memory for Unix/Linux/Mac // int create_shmem_mmap(char *path, size_t size, void** pp) { int fd, retval; struct stat sbuf; // Return NULL pointer if create_shmem fails *pp = 0; if (size == 0) return ERR_SHMGET; // NOTE: in principle it should be 0660, not 0666 // (i.e. Apache should belong to the same group as the // project admin user, and should therefore be able to access the seg. // However, this doesn't seem to work on some Linux systems. // I don't have time to figure this out (31 July 07) // it's a big headache for anyone it affects, // and it's not a significant security issue. // fd = open(path, O_RDWR | O_CREAT, 0666); if (fd < 0) return ERR_SHMGET; retval = fstat(fd, &sbuf); if (retval) return ERR_SHMGET; if (sbuf.st_size < (long)size) { // The following 2 lines extend the file and clear its new // area to all zeros because they write beyond the old EOF. // See the lseek man page for details. lseek(fd, size-1, SEEK_SET); write(fd, "\0", 1); } *pp = mmap(NULL, size, PROT_READ | PROT_WRITE, MAP_FILE | MAP_SHARED, fd, 0); close(fd); if (*pp == MAP_FAILED) { *pp = 0; return ERR_SHMGET; } return 0; } int destroy_shmem_mmap(key_t key){ return 0; } int attach_shmem_mmap(char *path, void** pp) { int fd, retval; struct stat sbuf; // Return NULL pointer if attach_shmem fails *pp = 0; fd = open(path, O_RDWR); if (fd < 0) return ERR_SHMGET; retval = fstat(fd, &sbuf); if (retval) return ERR_SHMGET; if (sbuf.st_size == 0) return ERR_SHMGET; *pp = mmap(NULL, sbuf.st_size, PROT_READ | PROT_WRITE, MAP_FILE | MAP_SHARED, fd, 0); close(fd); if (*pp == MAP_FAILED) { *pp = 0; return ERR_SHMGET; } return 0; } int detach_shmem_mmap(void* p, size_t size) { return munmap(p, size); } // Compatibility routines for Unix/Linux/Mac V5 applications // int create_shmem(key_t key, int size, gid_t gid, void** pp) { int id; // try 0666, then SHM_R|SHM_W // seems like some platforms require one or the other // (this may be superstition) // // NOTE: in principle it should be 0660, not 0666 // (i.e. Apache should belong to the same group as the // project admin user, and should therefore be able to access the seg. // However, this doesn't seem to work on some Linux systems. // I don't have time to figure this out (31 July 07) // it's a big headache for anyone it affects, // and it's not a significant security issue. // id = shmget(key, size, IPC_CREAT|0666); if (id < 0) { id = shmget(key, size, IPC_CREAT|SHM_R|SHM_W); } if (id < 0) { perror("shmget"); return ERR_SHMGET; } // set group ownership if requested // if (gid) { int retval; struct shmid_ds buf; // Set the shmem segment's group ID retval = shmctl(id, IPC_STAT, &buf); if (retval) { perror("shmget: shmctl STAT"); return ERR_SHMGET; } buf.shm_perm.gid = gid; retval = shmctl(id, IPC_SET, &buf); if (retval) { perror("shmget: shmctl IPC_SET"); return ERR_SHMGET; } } return attach_shmem(key, pp); } // Mark the shared memory segment so it will be released after // the last attached process detaches or exits. // On Mac OS X and some other systems, not doing this causes // shared memory leaks if BOINC crashes or exits suddenly. // On Mac OS X and some other systems, this command also // prevents any more processes from attaching (by clearing // the key in the shared memory structure), so BOINC does it // only after we are completey done with the segment. // int destroy_shmem(key_t key){ struct shmid_ds buf; int id, retval; id = shmget(key, 0, 0); if (id < 0) return 0; // assume it doesn't exist retval = shmctl(id, IPC_STAT, &buf); if (retval) { perror("shmctl STAT"); return ERR_SHMCTL; } retval = shmctl(id, IPC_RMID, 0); if (retval) { perror("shmctl RMID"); return ERR_SHMCTL; } return 0; } int attach_shmem(key_t key, void** pp){ void* p; int id; id = shmget(key, 0, 0); if (id < 0) { perror("shmget in attach_shmem"); return ERR_SHMGET; } p = shmat(id, 0, 0); if ((long)p == -1) { perror("shmat"); return ERR_SHMAT; } *pp = p; return 0; } int detach_shmem(void* p) { int retval; retval = shmdt((char *)p); return retval; } int print_shmem_info(key_t key) { int id; struct shmid_ds buf; id = shmget(key, 0, 0); if (id < 0) { return ERR_SHMGET; } shmctl(id, IPC_STAT, &buf); fprintf( stderr, "shmem key: %x\t\tid: %d, size: %d, nattach: %d\n", (unsigned int)key, id, (int)buf.shm_segsz, (int)buf.shm_nattch ); return 0; } #endif // !defined(_WIN32) && !defined(__EMX__) const char *BOINC_RCSID_f835f078de = "$Id$";