Skip to content

Commit e326c41

Browse files
addaleaxTrott
authored andcommitted
src: shutdown libuv before exit()
This ensures that no operations will be running on the libuv threadpool, which is important because they may run into race conditions with the global destructors being triggered from `exit()`, such as in the added test example here. PR-URL: #35021 Reviewed-By: James M Snell <jasnell@gmail.com> Reviewed-By: Gus Caplan <me@gus.host> Reviewed-By: Santiago Gimeno <santiago.gimeno@gmail.com> Reviewed-By: Colin Ihrig <cjihrig@gmail.com> Reviewed-By: Richard Lau <riclau@uk.ibm.com> Reviewed-By: David Carlier <devnexen@gmail.com> Reviewed-By: Zeyu Yang <himself65@outlook.com> Reviewed-By: Gerhard Stöbich <deb2001-github@yahoo.de> Reviewed-By: Juan José Arboleda <soyjuanarbol@gmail.com> Reviewed-By: Rich Trott <rtrott@gmail.com>
1 parent ec5958f commit e326c41

File tree

2 files changed

+29
-0
lines changed

2 files changed

+29
-0
lines changed

src/api/environment.cc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -705,6 +705,7 @@ void DefaultProcessExitHandler(Environment* env, int exit_code) {
705705
env->set_can_call_into_js(false);
706706
env->stop_sub_worker_contexts();
707707
DisposePlatform();
708+
uv_library_shutdown();
708709
exit(exit_code);
709710
}
710711

Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
'use strict';
2+
const common = require('../common');
3+
if (!common.hasCrypto) { common.skip('missing crypto'); }
4+
const assert = require('assert');
5+
const { generateKeyPair } = require('crypto');
6+
7+
if (common.isWindows) {
8+
// Remove this conditional once the libuv change is in Node.js.
9+
common.skip('crashing due to https://github.com/libuv/libuv/pull/2983');
10+
}
11+
12+
// Regression test for a race condition: process.exit() might lead to OpenSSL
13+
// cleaning up state from the exit() call via calling its destructor, but
14+
// running OpenSSL operations on another thread might lead to them attempting
15+
// to initialize OpenSSL, leading to a crash.
16+
// This test crashed consistently on x64 Linux on Node v14.9.0.
17+
18+
generateKeyPair('rsa', {
19+
modulusLength: 2048,
20+
privateKeyEncoding: {
21+
type: 'pkcs1',
22+
format: 'pem'
23+
}
24+
}, (err/* , publicKey, privateKey */) => {
25+
assert.ifError(err);
26+
});
27+
28+
setTimeout(() => process.exit(), common.platformTimeout(10));

0 commit comments

Comments
 (0)