From 4710c53dcad1ebf3755f3efb9e80ac24bd72a9b2 Mon Sep 17 00:00:00 2001 From: darylm503 Date: Mon, 16 Apr 2012 22:12:42 +0000 Subject: AppPkg/Applications/Python: Add Python 2.7.2 sources since the release of Python 2.7.3 made them unavailable from the python.org web site. These files are a subset of the python-2.7.2.tgz distribution from python.org. Changed files from PyMod-2.7.2 have been copied into the corresponding directories of this tree, replacing the original files in the distribution. Signed-off-by: daryl.mcdaniel@intel.com git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@13197 6f19259b-4bc3-4df7-8a09-765794883524 --- .../Python/Python-2.7.2/Lib/test/crashers/README | 16 ++++++++ .../Lib/test/crashers/bogus_code_obj.py | 19 +++++++++ .../Lib/test/crashers/borrowed_ref_1.py | 29 +++++++++++++ .../Lib/test/crashers/borrowed_ref_2.py | 38 +++++++++++++++++ .../Lib/test/crashers/compiler_recursion.py | 5 +++ .../Lib/test/crashers/gc_has_finalizer.py | 36 +++++++++++++++++ .../Lib/test/crashers/gc_inspection.py | 32 +++++++++++++++ .../Lib/test/crashers/infinite_loop_re.py | 16 ++++++++ .../Lib/test/crashers/loosing_mro_ref.py | 35 ++++++++++++++++ .../Lib/test/crashers/mutation_inside_cyclegc.py | 31 ++++++++++++++ .../Lib/test/crashers/nasty_eq_vs_dict.py | 47 ++++++++++++++++++++++ .../Lib/test/crashers/recursion_limit_too_high.py | 16 ++++++++ .../Lib/test/crashers/recursive_call.py | 15 +++++++ 13 files changed, 335 insertions(+) create mode 100644 AppPkg/Applications/Python/Python-2.7.2/Lib/test/crashers/README create mode 100644 AppPkg/Applications/Python/Python-2.7.2/Lib/test/crashers/bogus_code_obj.py create mode 100644 AppPkg/Applications/Python/Python-2.7.2/Lib/test/crashers/borrowed_ref_1.py create mode 100644 AppPkg/Applications/Python/Python-2.7.2/Lib/test/crashers/borrowed_ref_2.py create mode 100644 AppPkg/Applications/Python/Python-2.7.2/Lib/test/crashers/compiler_recursion.py create mode 100644 AppPkg/Applications/Python/Python-2.7.2/Lib/test/crashers/gc_has_finalizer.py create mode 100644 AppPkg/Applications/Python/Python-2.7.2/Lib/test/crashers/gc_inspection.py create mode 100644 AppPkg/Applications/Python/Python-2.7.2/Lib/test/crashers/infinite_loop_re.py create mode 100644 AppPkg/Applications/Python/Python-2.7.2/Lib/test/crashers/loosing_mro_ref.py create mode 100644 AppPkg/Applications/Python/Python-2.7.2/Lib/test/crashers/mutation_inside_cyclegc.py create mode 100644 AppPkg/Applications/Python/Python-2.7.2/Lib/test/crashers/nasty_eq_vs_dict.py create mode 100644 AppPkg/Applications/Python/Python-2.7.2/Lib/test/crashers/recursion_limit_too_high.py create mode 100644 AppPkg/Applications/Python/Python-2.7.2/Lib/test/crashers/recursive_call.py (limited to 'AppPkg/Applications/Python/Python-2.7.2/Lib/test/crashers') diff --git a/AppPkg/Applications/Python/Python-2.7.2/Lib/test/crashers/README b/AppPkg/Applications/Python/Python-2.7.2/Lib/test/crashers/README new file mode 100644 index 0000000000..afd4855767 --- /dev/null +++ b/AppPkg/Applications/Python/Python-2.7.2/Lib/test/crashers/README @@ -0,0 +1,16 @@ +This directory only contains tests for outstanding bugs that cause the +interpreter to segfault. Ideally this directory should always be empty, but +sometimes it may not be easy to fix the underlying cause and the bug is deemed +too obscure to invest the effort. + +Each test should fail when run from the command line: + + ./python Lib/test/crashers/weakref_in_del.py + +Put as much info into a docstring or comments to help determine the cause of the +failure, as well as a bugs.python.org issue number if it exists. Particularly +note if the cause is system or environment dependent and what the variables are. + +Once the crash is fixed, the test case should be moved into an appropriate test +(even if it was originally from the test suite). This ensures the regression +doesn't happen again. And if it does, it should be easier to track down. diff --git a/AppPkg/Applications/Python/Python-2.7.2/Lib/test/crashers/bogus_code_obj.py b/AppPkg/Applications/Python/Python-2.7.2/Lib/test/crashers/bogus_code_obj.py new file mode 100644 index 0000000000..65968f14d3 --- /dev/null +++ b/AppPkg/Applications/Python/Python-2.7.2/Lib/test/crashers/bogus_code_obj.py @@ -0,0 +1,19 @@ +""" +Broken bytecode objects can easily crash the interpreter. + +This is not going to be fixed. It is generally agreed that there is no +point in writing a bytecode verifier and putting it in CPython just for +this. Moreover, a verifier is bound to accept only a subset of all safe +bytecodes, so it could lead to unnecessary breakage. + +For security purposes, "restricted" interpreters are not going to let +the user build or load random bytecodes anyway. Otherwise, this is a +"won't fix" case. + +""" + +import types + +co = types.CodeType(0, 0, 0, 0, '\x04\x71\x00\x00', (), + (), (), '', '', 1, '') +exec co diff --git a/AppPkg/Applications/Python/Python-2.7.2/Lib/test/crashers/borrowed_ref_1.py b/AppPkg/Applications/Python/Python-2.7.2/Lib/test/crashers/borrowed_ref_1.py new file mode 100644 index 0000000000..26d55b728f --- /dev/null +++ b/AppPkg/Applications/Python/Python-2.7.2/Lib/test/crashers/borrowed_ref_1.py @@ -0,0 +1,29 @@ +""" +_PyType_Lookup() returns a borrowed reference. +This attacks the call in dictobject.c. +""" + +class A(object): + pass + +class B(object): + def __del__(self): + print 'hi' + del D.__missing__ + +class D(dict): + class __missing__: + def __init__(self, *args): + pass + + +d = D() +a = A() +a.cycle = a +a.other = B() +del a + +prev = None +while 1: + d[5] + prev = (prev,) diff --git a/AppPkg/Applications/Python/Python-2.7.2/Lib/test/crashers/borrowed_ref_2.py b/AppPkg/Applications/Python/Python-2.7.2/Lib/test/crashers/borrowed_ref_2.py new file mode 100644 index 0000000000..fea33f8225 --- /dev/null +++ b/AppPkg/Applications/Python/Python-2.7.2/Lib/test/crashers/borrowed_ref_2.py @@ -0,0 +1,38 @@ +""" +_PyType_Lookup() returns a borrowed reference. +This attacks PyObject_GenericSetAttr(). + +NB. on my machine this crashes in 2.5 debug but not release. +""" + +class A(object): + pass + +class B(object): + def __del__(self): + print "hi" + del C.d + +class D(object): + def __set__(self, obj, value): + self.hello = 42 + +class C(object): + d = D() + + def g(): + pass + + +c = C() +a = A() +a.cycle = a +a.other = B() + +lst = [None] * 1000000 +i = 0 +del a +while 1: + c.d = 42 # segfaults in PyMethod_New(im_func=D.__set__, im_self=d) + lst[i] = c.g # consume the free list of instancemethod objects + i += 1 diff --git a/AppPkg/Applications/Python/Python-2.7.2/Lib/test/crashers/compiler_recursion.py b/AppPkg/Applications/Python/Python-2.7.2/Lib/test/crashers/compiler_recursion.py new file mode 100644 index 0000000000..7f00150c9f --- /dev/null +++ b/AppPkg/Applications/Python/Python-2.7.2/Lib/test/crashers/compiler_recursion.py @@ -0,0 +1,5 @@ +""" +The compiler (>= 2.5) recurses happily. +""" + +compile('()'*9**5, '?', 'exec') diff --git a/AppPkg/Applications/Python/Python-2.7.2/Lib/test/crashers/gc_has_finalizer.py b/AppPkg/Applications/Python/Python-2.7.2/Lib/test/crashers/gc_has_finalizer.py new file mode 100644 index 0000000000..10b6124702 --- /dev/null +++ b/AppPkg/Applications/Python/Python-2.7.2/Lib/test/crashers/gc_has_finalizer.py @@ -0,0 +1,36 @@ +""" +The gc module can still invoke arbitrary Python code and crash. +This is an attack against _PyInstance_Lookup(), which is documented +as follows: + + The point of this routine is that it never calls arbitrary Python + code, so is always "safe": all it does is dict lookups. + +But of course dict lookups can call arbitrary Python code. +The following code causes mutation of the object graph during +the call to has_finalizer() in gcmodule.c, and that might +segfault. +""" + +import gc + + +class A: + def __hash__(self): + return hash("__del__") + def __eq__(self, other): + del self.other + return False + +a = A() +b = A() + +a.__dict__[b] = 'A' + +a.other = b +b.other = a + +gc.collect() +del a, b + +gc.collect() diff --git a/AppPkg/Applications/Python/Python-2.7.2/Lib/test/crashers/gc_inspection.py b/AppPkg/Applications/Python/Python-2.7.2/Lib/test/crashers/gc_inspection.py new file mode 100644 index 0000000000..96be97724f --- /dev/null +++ b/AppPkg/Applications/Python/Python-2.7.2/Lib/test/crashers/gc_inspection.py @@ -0,0 +1,32 @@ +""" +gc.get_referrers() can be used to see objects before they are fully built. + +Note that this is only an example. There are many ways to crash Python +by using gc.get_referrers(), as well as many extension modules (even +when they are using perfectly documented patterns to build objects). + +Identifying and removing all places that expose to the GC a +partially-built object is a long-term project. A patch was proposed on +SF specifically for this example but I consider fixing just this single +example a bit pointless (#1517042). + +A fix would include a whole-scale code review, possibly with an API +change to decouple object creation and GC registration, and according +fixes to the documentation for extension module writers. It's unlikely +to happen, though. So this is currently classified as +"gc.get_referrers() is dangerous, use only for debugging". +""" + +import gc + + +def g(): + marker = object() + yield marker + # now the marker is in the tuple being constructed + [tup] = [x for x in gc.get_referrers(marker) if type(x) is tuple] + print tup + print tup[1] + + +tuple(g()) diff --git a/AppPkg/Applications/Python/Python-2.7.2/Lib/test/crashers/infinite_loop_re.py b/AppPkg/Applications/Python/Python-2.7.2/Lib/test/crashers/infinite_loop_re.py new file mode 100644 index 0000000000..ffa4d7b5e3 --- /dev/null +++ b/AppPkg/Applications/Python/Python-2.7.2/Lib/test/crashers/infinite_loop_re.py @@ -0,0 +1,16 @@ + +# This was taken from http://python.org/sf/1541697 +# It's not technically a crasher. It may not even truly be infinite, +# however, I haven't waited a long time to see the result. It takes +# 100% of CPU while running this and should be fixed. + +import re +starttag = re.compile(r'<[a-zA-Z][-_.:a-zA-Z0-9]*\s*(' + r'\s*([a-zA-Z_][-:.a-zA-Z_0-9]*)(\s*=\s*' + r'(\'[^\']*\'|"[^"]*"|[-a-zA-Z0-9./,:;+*%?!&$\(\)_#=~@]' + r'[][\-a-zA-Z0-9./,:;+*%?!&$\(\)_#=~\'"@]*(?=[\s>/<])))?' + r')*\s*/?\s*(?=[<>])') + +if __name__ == '__main__': + foo = '