Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 8 Jul 2007 13:14:31 -0500 (CDT)
From:      "Sean C. Farley" <scf@FreeBSD.org>
To:        Andrey Chernov <ache@nagual.pp.ru>
Cc:        freebsd-current <freebsd-current@FreeBSD.org>, Robert Watson <rwatson@FreeBSD.org>, Michal Mertl <mime@traveller.cz>
Subject:   Re: Environment handling broken in /bin/sh with changes to {get,set,put}env()
Message-ID:  <20070708125905.F14065@thor.farley.org>
In-Reply-To: <20070708171727.GA90490@nagual.pp.ru>
References:  <20070704235630.GA42227@nagual.pp.ru> <20070704215154.O77978@thor.farley.org> <20070705115816.GA50506@nagual.pp.ru> <20070705105922.F98700@thor.farley.org> <20070707130859.GA96605@nagual.pp.ru> <20070707131359.GB96605@nagual.pp.ru> <20070707133102.C14065@thor.farley.org> <20070707191835.GA4368@nagual.pp.ru> <20070707205410.B14065@thor.farley.org> <20070708020940.GA80166@nagual.pp.ru> <20070708171727.GA90490@nagual.pp.ru>

next in thread | previous in thread | raw e-mail | index | archive | help
On Sun, 8 Jul 2007, Andrey Chernov wrote:

> On Sun, Jul 08, 2007 at 06:09:40AM +0400, Andrey Chernov wrote:
>> On Sat, Jul 07, 2007 at 09:03:59PM -0500, Sean C. Farley wrote:
>>>
>>> Surprisingly, keeping the pointers saved time even if calling
>>> setenv().
>>
>> Ok. It feels like time to commit comes :)
>
> Hmm. I just think a bit more and feel worry about that place in the
> merge code:
>
> 	*equals = '\0';
>        if (setenv(*env, equals + 1, 1) == -1)
>                return (-1);
>        *equals = '=';
> because it modifies memory which may be treated like const one.
>
> Consider following scenario: getenv() is not thread-safe, but may be
> called by thread-safe app if it is sure no other *env() calls in
> progress.  In the same time another thread of this app use environ
> directly say for exec(), assuming it is const. In the middle of that
> getenv() modifies environ by *equals = '\0';

SUSv3 states that that is not a safe assumption to make.  Read the
paragraph starting with "Conforming multi-threaded" from exec(3)[1].  It
basically equates direct use of the environ variable as the same as any
*env() call.

> Could you please make setenv() wrapper like that to avoid modifying
> merged environ in the middle?
> 	__lsetenv(str, str_len, value)

I could add this as a feature later.  Unfortunately, unless I can lock
the use of environ, an application could do this even with the 6-STABLE
version of *env() functions.  I have been pondering about thread-safety
in a future release of these functions (8-CURRENT), but it may not be
possible since environ is exposed.

Sean
   1. http://www.opengroup.org/onlinepubs/000095399/functions/exec.html
-- 
scf@FreeBSD.org



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20070708125905.F14065>