|
Message-ID: <20220912142231.GJ9709@brightrain.aerifal.cx> Date: Mon, 12 Sep 2022 10:22:31 -0400 From: Rich Felker <dalias@...c.org> To: Alexey Izbyshev <izbyshev@...ras.ru> Cc: musl@...ts.openwall.com Subject: Re: [PATCH] fix thread leak on timer_create(SIGEV_THREAD) failure On Thu, Sep 08, 2022 at 12:18:56PM +0300, Alexey Izbyshev wrote: > After commit 5b74eed3b301e2227385f3bf26d3bb7c2d822cf8 the timer thread > doesn't check whether timer_create() actually created the timer, > proceeding to wait for a signal that might never arrive. We can't fix > this by simply checking for a negative timer_id after > pthread_barrier_wait() because we have no way to distinguish a timer > creation failure and a request to delete a timer with INT_MAX id if it > happens to arrive quickly (a variation of this bug existed before > 5b74eed3b301e2227385f3bf26d3bb7c2d822cf8, where the timer would be > leaked in this case). So (ab)use cancel field of pthread_t instead. > --- > src/time/timer_create.c | 6 +++++- > 1 file changed, 5 insertions(+), 1 deletion(-) > > diff --git a/src/time/timer_create.c b/src/time/timer_create.c > index 4bef2390..cd32c945 100644 > --- a/src/time/timer_create.c > +++ b/src/time/timer_create.c > @@ -43,6 +43,8 @@ static void *start(void *arg) > union sigval val = args->sev->sigev_value; > > pthread_barrier_wait(&args->b); > + if (self->cancel) > + return 0; > for (;;) { > siginfo_t si; > while (sigwaitinfo(SIGTIMER_SET, &si) < 0); > @@ -113,8 +115,10 @@ int timer_create(clockid_t clk, struct sigevent *restrict evp, timer_t *restrict > ksev.sigev_signo = SIGTIMER; > ksev.sigev_notify = SIGEV_THREAD_ID; > ksev.sigev_tid = td->tid; > - if (syscall(SYS_timer_create, clk, &ksev, &timerid) < 0) > + if (syscall(SYS_timer_create, clk, &ksev, &timerid) < 0) { > timerid = -1; > + td->cancel = 1; > + } > td->timer_id = timerid; > pthread_barrier_wait(&args.b); > if (timerid < 0) return -1; > -- > 2.37.2 I'm not really happy with overloading td->cancel like this, but it's probably the best fix at present. The long-term direction for this functionality is hopefully removing the use of kernel timer objects entirely for SIGEV_THREAD timers and instead implementing them with clock_nanosleep, which would eliminate the possibility of SYS_timer_create failure, the possibility of leak, the td->timer_id member, the SIGTIMER reserved signal, and basically all the hacks going on here. Rich
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.