issue: 4409403 Fix heap corruption since c73d96a #337
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description
This PR fixes a critical heap corruption issue in TCP socket timer management
that was introduced in commit c73d96a.
What
Fix race condition between timer thread and socket deletion in TCP socket timers.
Why ?
A race condition was introduced in commit c73d96a that allowed the timer thread
to access socket objects after they had been deleted by the event handler thread,
causing heap corruption and crashes.
How ?
The fix improves synchronization between threads:
after socket cleanup
Change type
What kind of change does this PR introduce?
Check list
Performance impact
We now hold the socket lock a bit longer during cleanup to remove it from timer collections
This is a one-time cost during socket closure, not during normal operation
Only affects the cleanup path, not data transmission or reception.
It can affect CPS tests, but preventing heap corruption far outweighs that minor performance impact imho.
How this bug was found?
attaching a pic for a sequence diagram explaining the faulty flow that was fixed:
