Saturday, Debtember 17, 2016
Really, POSIX? Really? memset() isn't async-signal-safe? How is it not safe? … oh … that's why
Just because,
I found myself rewriting some code that dumps memory.
The current version is too limiting because it only dumps to a file,
and there have been several times I've wanted to dump memory to something other than a file,
like to syslog()
(for instance,
my crashreport()
function which dumps some memory as part of its report).
So I got the new code written,
and the core of it is “async-signal-safe.”
This is important because functions that are not async-signal-safe can not be called from a signal handler
(the cause of my hardest-to-find bug yet).
I got to the point where I needed to add some padding to the output and the easiest way to do that is to call memset()
.
Now a curious thing about memset()
—if you check
the list of async-signal-safe functions one can call,
you will not find memset()
among the listed functions.
Which is odd,
because the function itself does very little,
little more than:
void memset(void *s,int c,size_t n) { unsigned char *m = s; while(n--) *m++ = c; return s; }
This isn't like malloc()
,
which could be interrupted as it's working and leave critical data structures in an indeterminate state such that a subsequent call to malloc()
from within
the signal handler could blow up.
No,
it's self contained and a call to memset()
won't interfere with an already interrupted call to memset()
.
It's curious that memset()
isn't considered async-signal-safe
(along with memcpy()
,
memmove()
and strcpy()
).
It just doesn't make sense.
Here's the upshot: since memset()
is a standard C function,
a C compiler is free to do anything it wants as long as the end result is the same—the memory is set to a given value.
So,
assuming a standard Intel CPU,
it can compile this:
int array[2]; memset(array,0,sizeof(array));
into the following assembly language:
xor eax,eax ; set EAX to 0 mov [array],eax ; zero out array[0] mov [array+4],eax ; zero out array[1]
or (and this is getting close to the issue at hand):
int array[1000]; memset(array,0,sizeof(array));
can be compiled into
mov edi,array ; point to array mov ecx,1000 ; there are 1000 entries xor eax,eax ; each being set to 0 rep stosd ; now do it
The problem is memmove()
,
which can handle copying memory from overlapping regions.
Typically,
you just copy memory from low memory to high but when the regions overlap,
you can't do that.
Instead,
you have to copy from high memory to low.
Again,
the Intel CPU can deal.
So,
code like:
int array[1000]; memmove(&array[100],&array[0],sizeof(int) * 900);
could turn into:
mov esi,array + 999 * 4 ; point to last element in array mov edi,array + 99 * 4 ; point to final destination in array mov ecx,900 ; this many integers std ; !!! make sure we copy from high to low ; HERE BE DRAGONS! rep movsd ; copy data cld ; clear direction flag
And the issue shows itself.
There's a flag in the Intel CPU that tells it which way to copy memory.
If the flag is not set,
then any memory copy (or memory setting) goes from low to high (the index registers ESI
and EDI
are incremented);
otherwise if the flag is set,
then any memory copy (or memory setting) goes from high to low (the index registers are decremented).
Generally,
the flag is usually cleared except for the few cases where it's required to be set.
After the STD
instruction is executed but prior to the CLD
instruction being executed,
if a signal is delivered to the program,
the kernel will interrupt the program and call a signal handler.
And if in the signal handler,
memset()
is called,
the code is probably expecting the direction flag to not be set,
so the memset()
code will now run in the reverse direction.
The real issue here is that the program state (including the direction flag) is saved upon entering the kernel. When the kernel transitions back to usercode, that state is then restored. The signal handler isn't technically a thread (although it executes asynchronously as a thread) so it doesn't have its own state (although in POSIX, a signal handler can have its own stack, but that's entirely optional and I'm digressing). You could argue that a program (technically a process or thread) could have two states—a normal state and a signal handler state, but the problem there is that signal handlers can be interrupted by yet another signal handler and the issue rears its ugly head yet again.
I couldn't find any current information about this problem
(and where is the bug?
Is it in the compiler?
The operating system?
The standards bodies?)
and so alas,
even a simple function like memset()
might not be async-signal-safe.
Sigh.