From 84d061d5a31c9c773e29e1e2b1ffe8cb9557bc58 Mon Sep 17 00:00:00 2001 From: Rich Felker Date: Mon, 17 Sep 2018 23:33:03 -0400 Subject: [PATCH] fix deletion of pthread tsd keys that still have non-null values stored per POSIX, deletion of a key for which some threads still have values stored is permitted, and newly created keys must initially hold the null value in all threads. these properties were not met by our implementation; if a key was deleted with values left and a new key was created in the same slot, the old values were still visible. moreover, due to lack of any synchronization in pthread_key_delete, there was a TOCTOU race whereby a concurrent pthread_exit could attempt to call a null destructor pointer for the newly orphaned value. this commit introduces a solution based on __synccall, stopping the world to zero out the values for deleted keys, but only does so lazily when all key slots have been exhausted. pthread_key_delete is split off into a separate translation unit so that static-linked programs which only create keys but never delete them will not pull in the __synccall machinery. a global rwlock is added to synchronize creation and deletion of keys with dtor execution. since the dtor execution loop now has to release and retake the lock around its call to each dtor, checks are made not to call the nodtor dummy function for keys which lack a dtor. --- src/internal/pthread_impl.h | 3 + src/thread/pthread_key_create.c | 105 ++++++++++++++++++++++++++------ src/thread/pthread_key_delete.c | 14 +++++ 3 files changed, 104 insertions(+), 18 deletions(-) create mode 100644 src/thread/pthread_key_delete.c diff --git a/src/internal/pthread_impl.h b/src/internal/pthread_impl.h index 052a5475..26e6e1df 100644 --- a/src/internal/pthread_impl.h +++ b/src/internal/pthread_impl.h @@ -148,6 +148,9 @@ hidden void __do_cleanup_push(struct __ptcb *); hidden void __do_cleanup_pop(struct __ptcb *); hidden void __pthread_tsd_run_dtors(); +hidden void __pthread_key_delete_synccall(void (*)(void *), void *); +hidden int __pthread_key_delete_impl(pthread_key_t); + extern hidden volatile int __block_new_threads; extern hidden volatile size_t __pthread_tsd_size; extern hidden void *__pthread_tsd_main[]; diff --git a/src/thread/pthread_key_create.c b/src/thread/pthread_key_create.c index a78e507a..e26f199c 100644 --- a/src/thread/pthread_key_create.c +++ b/src/thread/pthread_key_create.c @@ -3,54 +3,123 @@ volatile size_t __pthread_tsd_size = sizeof(void *) * PTHREAD_KEYS_MAX; void *__pthread_tsd_main[PTHREAD_KEYS_MAX] = { 0 }; -static void (*volatile keys[PTHREAD_KEYS_MAX])(void *); +static void (*keys[PTHREAD_KEYS_MAX])(void *); + +static pthread_rwlock_t key_lock = PTHREAD_RWLOCK_INITIALIZER; + +static pthread_key_t next_key; static void nodtor(void *dummy) { } +static void dirty(void *dummy) +{ +} + +struct cleanup_args { + pthread_t caller; + int ret; +}; + +static void clean_dirty_tsd_callback(void *p) +{ + struct cleanup_args *args = p; + pthread_t self = __pthread_self(); + pthread_key_t i; + for (i=0; itsd[i]) + self->tsd[i] = 0; + } + /* Arbitrary choice to avoid data race. */ + if (args->caller == self) args->ret = 0; +} + +static int clean_dirty_tsd(void) +{ + struct cleanup_args args = { + .caller = __pthread_self(), + .ret = EAGAIN + }; + __pthread_key_delete_synccall(clean_dirty_tsd_callback, &args); + return args.ret; +} + int __pthread_key_create(pthread_key_t *k, void (*dtor)(void *)) { - unsigned i = (uintptr_t)&k / 16 % PTHREAD_KEYS_MAX; - unsigned j = i; + pthread_key_t j = next_key; pthread_t self = __pthread_self(); + int found_dirty = 0; /* This can only happen in the main thread before * pthread_create has been called. */ if (!self->tsd) self->tsd = __pthread_tsd_main; + /* Purely a sentinel value since null means slot is free. */ if (!dtor) dtor = nodtor; + + pthread_rwlock_wrlock(&key_lock); do { - if (!a_cas_p(keys+j, 0, (void *)dtor)) { - *k = j; + if (!keys[j]) { + keys[next_key = *k = j] = dtor; + pthread_rwlock_unlock(&key_lock); return 0; + } else if (keys[j] == dirty) { + found_dirty = 1; } - } while ((j=(j+1)%PTHREAD_KEYS_MAX) != i); - return EAGAIN; + } while ((j=(j+1)%PTHREAD_KEYS_MAX) != next_key); + + /* It's possible that all slots are in use or __synccall fails. */ + if (!found_dirty || clean_dirty_tsd()) { + pthread_rwlock_unlock(&key_lock); + return EAGAIN; + } + + /* If this point is reached there is necessarily a newly-cleaned + * slot to allocate to satisfy the caller's request. Find it and + * mark any additional previously-dirty slots clean. */ + for (j=0; jtsd_used; - for (j=0; not_finished && jtsd_used && jtsd_used = 0; for (i=0; itsd[i] && keys[i]) { - void *tmp = self->tsd[i]; - self->tsd[i] = 0; - keys[i](tmp); - not_finished = 1; + void *val = self->tsd[i]; + void (*dtor)(void *) = keys[i]; + self->tsd[i] = 0; + if (val && dtor && dtor != nodtor && dtor != dirty) { + pthread_rwlock_unlock(&key_lock); + dtor(val); + pthread_rwlock_rdlock(&key_lock); } } + pthread_rwlock_unlock(&key_lock); } } -weak_alias(__pthread_key_delete, pthread_key_delete); weak_alias(__pthread_key_create, pthread_key_create); diff --git a/src/thread/pthread_key_delete.c b/src/thread/pthread_key_delete.c new file mode 100644 index 00000000..012fe2da --- /dev/null +++ b/src/thread/pthread_key_delete.c @@ -0,0 +1,14 @@ +#include "pthread_impl.h" +#include "libc.h" + +void __pthread_key_delete_synccall(void (*f)(void *), void *p) +{ + __synccall(f, p); +} + +int __pthread_key_delete(pthread_key_t k) +{ + return __pthread_key_delete_impl(k); +} + +weak_alias(__pthread_key_delete, pthread_key_delete); -- GitLab