You can't safely use the C setenv()
or unsetenv()
functions in a program that uses threads. Those functions modify global state, and can cause other threads calling getenv()
to crash. This also causes crashes in other languages that use those C standard library functions, such as Go's os.Setenv
(Go issue) and Rust's std::env::set_var()
(Rust issue). I ran into this in a Go program, because Go's built-in DNS resolver can call C's getaddrinfo()
, which uses environment variables. This cost me 2 days to track down and file the Go bug. Sadly, this problem has been known for decades. For example, an article from January 2017 said: "None of this is new, but we do re-discover it roughly every five years. See you in 2022." This was only one year off! (She wrote an update in October 2023 after I emailed her about my Go bug.)
This is a flaw in the POSIX standard, which extends the C Standard to allow modifying environment varibles. The most infuriating part is that many people who could influence the standard or maintain the C libraries don't see this as a problem. The argument is that the specification clearly documents that setenv()
cannot be used with threads. Therefore, if someone does this, the crashes are their fault. We should apparently read every function's specification carefully, not use software written by others, and not use threads. These are unrealistic assumptions in modern software. I think we should instead strive to create APIs that are hard to screw up, and evolve as the ecosystem changes. The C language and standard library continue to play an important role at the base of most software. We either need to figure out how to improve it, or we need to figure out how to abandon it.
The biggest problem is that getenv()
returns a char*
, with no need for applications to free it later. One thread could be using this pointer when another thread changes the same environment variable using setenv()
or unsetenv()
. The getenv()
function is perfect if environment variables never change. For example, for accessing a process's initial table of environment variables (see the System V ABI: AMD64 Section 3.4.1). It turns out the C Standard only includes getenv()
, so according to C, that is exactly how this should work. However, most implementations also follow the POSIX standard (e.g. POSIX.1-2017), which extends C to include functions that modify the environment. This means the current getenv()
API is problematic.
Even worse, putenv()
adds a char*
to the set of environment variables. It is explicitly required that if the application modifies the memory after putenv()
returns, it modifies the environment variables. This means applications can modify the value passed to putenv()
at any time, without any synchronization. FreeBSD used to implement putenv()
by copying the value, but it changed it with FreeBSD 7 in 2008, which suggests some programs really do depend on modifying the environment in this fashion (see FreeBSD putenv man page).
As a final problem, environ
is a NULL-terminated array of pointers (char**
) that an application can read and assign to (see definition in POSIX.1-2017). This is how applications can iterate over all environment variables. Accesses to this array are not thread-safe. However, in my experience many fewer applications use this than getenv()
and setenv()
. However, this does cause some libraries to not maintain the set of environment variables in a thread-safe way, since they directly update this table.
Implementations need to choose what to do when an application overwrites an existing variable. I looked at glibc, musl, Solaris/Illumos, and FreeBSD/Apple's C standard libraries, and they make the following choices:
setenv()
repeatedly is effectively a memory leak. However, once a value is returned from getenv()
, it is immutable and can be used by threads safely.getenv()
after another thread calls setenv()
can crash.A second problem is ensuring the set of environment variables is updated in a thread-safe fashion. This is what causes crashes in glibc. glibc uses an array to hold pointers to the "NAME=value"
strings. It holds a lock in setenv()
when changing this array, but not in getenv()
. If a thread calling setenv()
needs to resize the array of pointers, it copies the values to a new array and frees the previous one. This can cause other threads executing getenv()
to crash, since they are now iterating deallocated memory. This is particularly annoying since glibc already leaks environment variables, and holds a lock in setenv()
. All it needs to do is hold the lock inside getenv()
, and it would no longer crash. This would make getenv()
slightly slower. However, getenv()
already uses a linear search of the array, so performance does not appear to be a concern. More sophisticated implementations are possible if this is a problem, such as Solaris/Illumos's lock-free implementation.
Environment variables useful for configuring shared libraries or language runtimes that are included in other programs. This allows users to change the configuration, without program authors needing to explicitly pass the configuration in. One alternative is command line flags, which requires programs to parse them and pass them in to the libraries. Another alternative are configuration files, which then need some other way to disable or configure, to be able to test new configurations. Environment variables are a simple solution. AS a result, many libraries call getenv() (see a partial list below).
Since many libraries are configured through environment variables, a program may need to change these variables to configure the libraries it uses. This is common at application startup. This causes programs to need to call setenv()
. Given this issue, it seems like libraries should also provide a way to explicitly configure any settings, and avoid using environment variables.
In my opinion, it is rediculous that this has been a known problem for so long. It has wasted thousands of hours of people's time, either debugging the problems, or debating what to do about it. We know how to fix the problem. First, we can make a thread-safe implementation, like Illumos/Solaris. This has some limitations: it leaks memory in setenv()
, and is still unsafe if a program uses putenv()
or the environ
variable. However, this is an improvement over the current Linux and Apple implementations. The second solution is to add new APIs to get one and get all environment variables that are thread-safe by design, like Microsoft's getenv_s()
(see below for the controversy around C11's "Annex K"). My preferred solution would be to do both. This would reduce the chances of hitting this problem for existing programs and libraries, and also provide a path to avoid the problems entirely for new code or languages like Go and Rust. My rough idea would be the following:
getenv_s()
.getenv()
as deprecated, recommending the new thread-safe getenv()
function instead.putenv()
as deprecated, recommending setenv()
instead.environ
as deprecated, recommending environment variable functions instead.getenv()
is used on a variable, but we can detect if the old functions are used, and only leak memory in that case. This means programs written in other languages will avoid these problems as soon as their runtimes are updated.This would be progress.
Microsoft provides getenv_s()
, which copies the environment variable into a caller-provided buffer. This is easy to make thread-safe by holding a read lock while copying the variable. After the function returns, future changes to the environment have no effect. This is included in the C11 Standard as Annex K "Bounds Checking Interfaces". The C standard Annexes are optional features. This Annex includes new functions intended to make it harder to make mistakes with buffers that are the wrong size. The first draft of this extension was published in 2003. This is when Microsoft was focusing on "Trustworthy Computing" after a January 2002 memo from Bill Gates. Basically, Windows wasn't designed to be connected to the Internet, and now that it was, people were finding many security problems. Lots of them were caused by buffer handling mistakes. Microsoft developed new versions of a number of problematic functions, and added checks to the Visual C++ compiler to warn about using the old ones. They then attempted to standardize these functions. My understanding is the people responsible for the Unix POSIX standards did not like the design of these functions, so they refused to implement them. For more details, see Field Experience With Annex K published in September 2015, Stack Overflow: Why didn't glibc implement _s functions? updated March 2023, and Rich Felker of musl on both technical and social reasons for not implementing Annex K from February 2019.
I haven't looked at the rest of the functions, but having spent way too long looking at getenv()
, the general idea of getenv_s()
seems like a good idea to me. Standardizing this would help avoid this problem.
This is a list of some uses of environment variables from fairly widely used libraries and services. This shows that environment variables are pretty widely used.