Commit Graph

698 Commits

Author SHA1 Message Date
Rich Felker 50304f2eef overhaul rwlocks to address several issues
like mutexes and semaphores, rwlocks suffered from a race condition
where the unlock operation could access the lock memory after another
thread successfully obtained the lock (and possibly destroyed or
unmapped the object). this has been fixed in the same way it was fixed
for other lock types.

in addition, the previous implementation favored writers over readers.
in the absence of other considerations, that is the best behavior for
rwlocks, and posix explicitly allows it. however posix also requires
read locks to be recursive. if writers are favored, any attempt to
obtain a read lock while a writer is waiting for the lock will fail,
causing "recursive" read locks to deadlock. this can be avoided by
keeping track of which threads already hold read locks, but doing so
requires unbounded memory usage, and there must be a fallback case
that favors readers in case memory allocation failed. and all of this
must be synchronized. the cost, complexity, and risk of errors in
getting it right is too great, so we simply favor readers.

tracking of the owner of write locks has been removed, as it was not
useful for anything. it could allow deadlock detection, but it's not
clear to me that returning EDEADLK (which a buggy program is likely to
ignore) is better than deadlocking; at least the latter behavior
prevents further data corruption. a correct program cannot invoke this
situation anyway.

the reader count and write lock state, as well as the "last minute"
waiter flag have all been combined into a single atomic lock. this
means all state transitions for the lock are atomic compare-and-swap
operations. this makes establishing correctness much easier and may
improve performance.

finally, some code duplication has been cleaned up. more is called
for, especially the standard __timedwait idiom repeated in all locks.
2011-08-03 10:21:32 -04:00
Rich Felker 8aeee8db21 timedwait: play it safe for now
it's unclear whether EINVAL or ENOSYS is used when the operation is
not supported, so check for both...
2011-08-03 08:36:13 -04:00
Rich Felker 4f5ba9211e fix stubbed-out reboot call 2011-08-02 21:22:56 -04:00
Rich Felker 4717bfec70 correctly handle old kernels without FUTEX_WAIT_BITSET
futex returns EINVAL, not ENOSYS, when op is not supported.
unfortunately this looks just like EINVAL from other causes, and we
end up running the fallback code and getting EINVAL again. fortunately
this case should be rare since correct code should not generate EINVAL
anyway.
2011-08-02 21:18:43 -04:00
Rich Felker bdd893377f fix sem_timedwait bug introduced in timedwait unification
this dec used to be performed by the cancellation handler, which was
called when popped.
2011-08-02 21:15:20 -04:00
Rich Felker ec381af902 unify and overhaul timed futex waits
new features:

- FUTEX_WAIT_BITSET op will be used for timed waits if available. this
  saves a call to clock_gettime.

- error checking for the timespec struct is now inside __timedwait so
  it doesn't need to be duplicated everywhere. cond_timedwait still
  needs to duplicate it to avoid unlocking the mutex, though.

- pushing and popping the cancellation handler is delegated to
  __timedwait, and cancellable/non-cancellable waits are unified.
2011-08-02 21:11:36 -04:00
Rich Felker c68de0be2f avoid accessing mutex memory after atomic unlock
this change is needed to fix a race condition and ensure that it's
possible to unlock and destroy or unmap the mutex as soon as
pthread_mutex_lock succeeds. POSIX explicitly gives such an example in
the rationale and requires an implementation to allow such usage.
2011-08-02 20:31:15 -04:00
Rich Felker 344ea14885 fix breakage in cancellation due to signal functions overhaul
sigaddset was not accepting SIGCANCEL as a valid signal number.
2011-08-02 19:59:56 -04:00
Rich Felker 88c4e72031 overhaul posix semaphores to fix destructability race
the race condition these changes address is described in glibc bug
report number 12674:

http://sourceware.org/bugzilla/show_bug.cgi?id=12674

up until now, musl has shared the bug, and i had not been able to
figure out how to eliminate it. in short, the problem is that it's not
valid for sem_post to inspect the waiters count after incrementing the
semaphore value, because another thread may have already successfully
returned from sem_wait, (rightly) deemed itself the only remaining
user of the semaphore, and chosen to destroy and free it (or unmap the
shared memory it's stored in). POSIX is not explicit in blessing this
usage, but it gives a very explicit analogous example with mutexes
(which, in musl and glibc, also suffer from the same race condition
bug) in the rationale for pthread_mutex_destroy.

the new semaphore implementation augments the waiter count with a
redundant waiter indication in the semaphore value itself,
representing the presence of "last minute" waiters that may have
arrived after sem_post read the waiter count. this allows sem_post to
read the waiter count prior to incrementing the semaphore value,
rather than after incrementing it, so as to avoid accessing the
semaphore memory whatsoever after the increment takes place.

a similar, but much simpler, fix should be possible for mutexes and
other locking primitives whose usage rules are stricter than
semaphores.
2011-08-02 19:19:09 -04:00
Rich Felker 88798393ca fix wrong messages in gai_strerror
i had missed the fact that a couple values were unassigned...
2011-08-01 00:31:15 -04:00
Rich Felker f4e8e64b82 port numbers should always be interpreted as decimal
per POSIX and RFC 3493:

If the specified address family is AF_INET, AF_INET6, or AF_UNSPEC,
the service can be specified as a string specifying a decimal port
number.

021 is a valid decimal number, therefore, interpreting it as octal
seems to be non-conformant.
2011-08-01 00:11:25 -04:00
Rich Felker e95b0a9d10 fix crash in dns code with new stdio locking code 2011-08-01 00:03:50 -04:00
Rich Felker acfd06df17 consistency: use struct __ucontext instead of ucontext_t in prototypes
this is necessary to avoid build errors if feature test macros are not
properly defined when including ucontext.h
2011-07-31 00:10:29 -04:00
Rich Felker 07827d1a82 fix race condition in sigqueue
this race is fundamentally due to linux's bogus requirement that
userspace, rather than kernelspace, fill in the siginfo structure. an
intervening signal handler that calls fork could cause both the parent
and child process to send signals claiming to be from the parent,
which could in turn have harmful effects depending on what the
recipient does with the signal. we simply block all signals for the
interval between getuid and sigqueue syscalls (much like what raise()
does already) to prevent the race and make the getuid/sigqueue pair
atomic.

this will be a non-issue if linux is fixed to validate the siginfo
structure or fill it in from kernelspace.
2011-07-30 21:11:31 -04:00
Rich Felker ad5881842e clean up pthread_sigmask/sigprocmask dependency order
it's nicer for the function that doesn't use errno to be independent,
and have the other one call it. saves some time and avoids clobbering
errno.
2011-07-30 21:09:14 -04:00
Rich Felker 544ee752cd fix some bugs in setxid and update setrlimit to use __synccall
setrlimit is supposed to be per-process, not per-thread, but again
linux gets it wrong. work around this in userspace. not only is it
needed for correctness; setxid also depends on the resource limits for
all threads being the same to avoid situations where temporarily
unlimiting the limit succeeds in some threads but fails in others.
2011-07-30 08:19:31 -04:00
Rich Felker dba68bf98f add proper fuxed-based locking for stdio
previously, stdio used spinlocks, which would be unacceptable if we
ever add support for thread priorities, and which yielded
pathologically bad performance if an application attempted to use
flockfile on a key file as a major/primary locking mechanism.

i had held off on making this change for fear that it would hurt
performance in the non-threaded case, but actually support for
recursive locking had already inflicted that cost. by having the
internal locking functions store a flag indicating whether they need
to perform unlocking, rather than using the actual recursive lock
counter, i was able to combine the conditionals at unlock time,
eliminating any additional cost, and also avoid a nasty corner case
where a huge number of calls to ftrylockfile could cause deadlock
later at the point of internal locking.

this commit also fixes some issues with usage of pthread_self
conflicting with __attribute__((const)) which resulted in crashes with
some compiler versions/optimizations, mainly in flockfile prior to
pthread_create.
2011-07-30 08:02:14 -04:00
Rich Felker 7683fceede eliminate dependence of perror on printf 2011-07-30 06:11:16 -04:00
Rich Felker 7dd60b80f9 fix bug in synccall with no threads: lock was taken but never released 2011-07-30 00:24:26 -04:00
Rich Felker afade2356e add setxid.c for new set*id() framework. missed in last commit. 2011-07-29 23:10:07 -04:00
Rich Felker acb0480662 new attempt at making set*id() safe and robust
changing credentials in a multi-threaded program is extremely
difficult on linux because it requires synchronizing the change
between all threads, which have their own thread-local credentials on
the kernel side. this is further complicated by the fact that changing
the real uid can fail due to exceeding RLIMIT_NPROC, making it
possible that the syscall will succeed in some threads but fail in
others.

the old __rsyscall approach being replaced was robust in that it would
report failure if any one thread failed, but in this case, the program
would be left in an inconsistent state where individual threads might
have different uid. (this was not as bad as glibc, which would
sometimes even fail to report the failure entirely!)

the new approach being committed refuses to change real user id when
it cannot temporarily set the rlimit to infinity. this is completely
POSIX conformant since POSIX does not require an implementation to
allow real-user-id changes for non-privileged processes whatsoever.
still, setting the real uid can fail due to memory allocation in the
kernel, but this can only happen if there is not already a cached
object for the target user. thus, we forcibly serialize the syscalls
attempts, and fail the entire operation on the first failure. this
*should* lead to an all-or-nothing success/failure result, but it's
still fragile and highly dependent on kernel developers not breaking
things worse than they're already broken.

ideally linux will eventually add a CLONE_USERCRED flag that would
give POSIX conformant credential changes without any hacks from
userspace, and all of this code would become redundant and could be
removed ~10 years down the line when everyone has abandoned the old
broken kernels. i'm not holding my breath...
2011-07-29 22:59:44 -04:00
Rich Felker aed707f679 remove ugly prng from mk*temp and just re-poll time on retry 2011-07-28 22:03:54 -04:00
Rich Felker bbdcc403ca eliminate mk*temp dependency on snprintf
this helps some tiny programs be even more tiny, and barly increases
code size even if both are used.
2011-07-28 21:48:53 -04:00
Rich Felker 649af9f73a fix for setenv bogus var argument handling
thanks to mikachu

per POSIX:

The setenv() function shall fail if:

[EINVAL] The name argument is a null pointer, points to an empty
string, or points to a string containing an '=' character.
2011-07-28 20:43:40 -04:00
Rich Felker e01ac67599 when resolving symbols with only weak defs, use first def, not last def 2011-07-25 09:22:05 -04:00
Rich Felker dd92a09eca comment non-obvious de bruijn sequence code in int parser 2011-07-25 09:21:40 -04:00
Rich Felker 427173b932 fix resolution of weak symbols (hopefully right now) and vdso 2011-07-24 02:19:47 -04:00
Rich Felker e91c375fd0 workaround for gcc's optimizer breaking dynamic symbol resolution 2011-07-24 01:10:01 -04:00
Rich Felker 6ab444d97a load vdso, if present, into the dso list 2011-07-24 00:54:55 -04:00
Rich Felker f7adc39e37 const correctness on function pointer 2011-07-24 00:54:36 -04:00
Rich Felker a53de812d2 simplify dynamic linker startup
instead of creating temp dso objects on the stack and moving them to
the heap if dlopen/dlsym are used, use static objects to begin with,
and just donate them to malloc if we no longer need them.
2011-07-24 00:26:12 -04:00
Rich Felker e3eb49321c some preliminaries for vdso clock support
these changes also make it so clock_gettime(CLOCK_REALTIME, &ts) works
even on pre-2.6 kernels, emulated via the gettimeofday syscall. there
is no cost for the fallback check, as it falls under the error case
that already must be checked for storing the error code in errno, but
which would normally be hidden inside __syscall_ret.
2011-07-23 23:45:33 -04:00
Rich Felker c0fe5b9da9 check for fd exhaustion in forkpty
we cannot report failure after forking, so the idea is to ensure prior
to fork that fd 0,1,2 exist. this will prevent dup2 from possibly
hitting a resource limit and failing in the child process. fcntl
rather than dup2 is used prior to forking to avoid race conditions.
2011-07-22 00:25:56 -04:00
Rich Felker d40e344f7b incorrect check for open failure in openpty function
-1, not 0, indicates failure
2011-07-22 00:23:36 -04:00
Rich Felker 63d447e2a3 socket headers macro adjustment - workaround for buggy programs
some program was undefining AF_NETLINK and thereby breaking AF_ROUTE...
2011-07-21 22:44:05 -04:00
Rich Felker fa845669ce fix errno value when fdopendir is given an invalid file descriptor
this resolves an issue reported by Vasiliy Kulikov
2011-07-21 21:15:14 -04:00
Rich Felker 4ec07e1f60 ensure in fork that child gets its own new robust mutex list 2011-07-16 23:17:17 -04:00
Rich Felker 94a0171d80 fix logic error in fread
fread was calling f->read without checking that the file was in
reading mode. this could:
1. crash, if f->read was a null pointer
2. cause unwanted blocking on a terminal already at eof
3. allow reading on a write-only file
2011-07-16 21:24:02 -04:00
Rich Felker 47d027ee1a fix various bugs in new integer parser framework
1. my interpretation of subject sequence definition was wrong. adjust
parser to conform to the standard.

2. some code for handling tail overflow case was missing (forgot to
finish writing it).

3. typo (= instead of ==) caused ERANGE to wrongly behave like EINVAL
2011-07-14 22:11:00 -04:00
Rich Felker d3fd192523 fix wcsto[iu]max with high characters
stopping without letting the parser see a stop character prevented
getting a result. so treat all high chars as the null character and
pass them into the parser.

also eliminated ugly tmp var using compound literals.
2011-07-14 01:12:05 -04:00
Rich Felker ecc9c5fcfa new restartable integer parsing framework.
this fixes a number of bugs in integer parsing due to lazy haphazard
wrapping, as well as some misinterpretations of the standard. the new
parser is able to work character-at-a-time or on whole strings, making
it easy to support the wide functions without unbounded space for
conversion. it will also be possible to update scanf to use the new
parser.
2011-07-14 00:51:45 -04:00
Rich Felker 0e2331c9b6 gb18030 support in iconv (only from, not to)
also support (and restrict to subsets) older chinese sets, and
explicitly refuse to convert to cjk (since there's no code for it yet)
2011-07-12 20:30:04 -04:00
Rich Felker c3c5e88c31 "implement" getnetbyaddr and getnetbyname
these are useless legacy functions but some old software contains
cruft that expects them to exist...
2011-07-12 02:52:06 -04:00
Rich Felker 95a85e047e legacy japanese charset support in iconv (only from, not to) 2011-07-12 02:43:24 -04:00
Rich Felker 594b16e004 simplify iconv and support more legacy codepages 2011-07-12 00:31:39 -04:00
Rich Felker 6b1d3817cf add missing signalfd flags 2011-07-09 18:06:59 -04:00
Rich Felker a9e6d01114 printf: "if a precision is specified, the '0' flag shall be ignored." 2011-07-04 11:55:52 -04:00
Rich Felker cc44d9f201 zero precision with zero value should not inhibit prefix/width printing 2011-07-04 01:57:00 -04:00
Rich Felker 3d54adbe47 printf("%#x",0) should print 0 not 0x0 2011-07-04 01:01:58 -04:00
Rich Felker 2f0c415ceb iconv was not returning -1 on most failure
this broke most uses of iconv in real-world programs, especially
glib's iconv wrappers.
2011-07-03 19:26:12 -04:00