NetBSD-Bugs archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: kern/59498: Add missing POSIX O_CLOFORK flag
The following reply was made to PR kern/59498; it has been noted by GNATS.
From: Robert Elz <kre%munnari.OZ.AU@localhost>
To: Ricardo Branco <rbranco%suse.de@localhost>
Cc: gnats-bugs%netbsd.org@localhost, kern-bug-people%netbsd.org@localhost, netbsd-bugs%netbsd.org@localhost
Subject: Re: kern/59498: Add missing POSIX O_CLOFORK flag
Date: Wed, 02 Jul 2025 02:05:35 +0700
Date: Tue, 1 Jul 2025 19:20:47 +0200
From: Ricardo Branco <rbranco=40suse.de>
Message-ID: <78c4992b-b5b6-493b-8eb2-594df8990ad6=40suse.de>
=7C In this implementation, O_CLOFORK is cleared on exec,
That's fine, but not related to what I asked.
Typically O_CLOFORK is set by library functions to guard against
possible other threads forking while a temporary fd is open.
Those temporary fd's can last for noticeable time, and can be
revealed to the application code.
The application might want to see if close-on-exec has been set
for the fd (for some reason) and use fcntl(F_GETFD) to do it, and
never having heard of O_CLOFORK (or FD_CLOFORK) simply assumes that
the non-zero return means O_CLOEXEC is set on the fd.
I think we need an audit of applications (which includes library code
that they might call) to examine all fcntl(F_GETFD) (and fcntl(F_SETFD))
calls, and make sure they are doing the right thing, before the
O_CLOFORK mechanism is exposed to user space in any way (it doesn't hurt
to have it in the kernel, as long as nothing, tests excepted, ever
sets it).
kre
Home |
Main Index |
Thread Index |
Old Index