signal_hook_registry/lib.rs
1#![doc(test(attr(deny(warnings))))]
2#![warn(missing_docs)]
3#![allow(unknown_lints, renamed_and_remove_lints, bare_trait_objects)]
4
5//! Backend of the [signal-hook] crate.
6//!
7//! The [signal-hook] crate tries to provide an API to the unix signals, which are a global
8//! resource. Therefore, it is desirable an application contains just one version of the crate
9//! which manages this global resource. But that makes it impossible to make breaking changes in
10//! the API.
11//!
12//! Therefore, this crate provides very minimal and low level API to the signals that is unlikely
13//! to have to change, while there may be multiple versions of the [signal-hook] that all use this
14//! low-level API to provide different versions of the high level APIs.
15//!
16//! It is also possible some other crates might want to build a completely different API. This
17//! split allows these crates to still reuse the same low-level routines in this crate instead of
18//! going to the (much more dangerous) unix calls.
19//!
20//! # What this crate provides
21//!
22//! The only thing this crate does is multiplexing the signals. An application or library can add
23//! or remove callbacks and have multiple callbacks for the same signal.
24//!
25//! It handles dispatching the callbacks and managing them in a way that uses only the
26//! [async-signal-safe] functions inside the signal handler. Note that the callbacks are still run
27//! inside the signal handler, so it is up to the caller to ensure they are also
28//! [async-signal-safe].
29//!
30//! # What this is for
31//!
32//! This is a building block for other libraries creating reasonable abstractions on top of
33//! signals. The [signal-hook] is the generally preferred way if you need to handle signals in your
34//! application and provides several safe patterns of doing so.
35//!
36//! # Rust version compatibility
37//!
38//! Currently builds on 1.26.0 an newer and this is very unlikely to change. However, tests
39//! require dependencies that don't build there, so tests need newer Rust version (they are run on
40//! stable).
41//!
42//! Note that this ancient version of rustc no longer compiles current versions of `libc`. If you
43//! want to use rustc this old, you need to force your dependency resolution to pick old enough
44//! version of `libc` (`0.2.156` was found to work, but newer ones may too).
45//!
46//! # Portability
47//!
48//! This crate includes a limited support for Windows, based on `signal`/`raise` in the CRT.
49//! There are differences in both API and behavior:
50//!
51//! - Due to lack of `siginfo_t`, we don't provide `register_sigaction` or `register_unchecked`.
52//! - Due to lack of signal blocking, there's a race condition.
53//! After the call to `signal`, there's a moment where we miss a signal.
54//! That means when you register a handler, there may be a signal which invokes
55//! neither the default handler or the handler you register.
56//! - Handlers registered by `signal` in Windows are cleared on first signal.
57//! To match behavior in other platforms, we re-register the handler each time the handler is
58//! called, but there's a moment where we miss a handler.
59//! That means when you receive two signals in a row, there may be a signal which invokes
60//! the default handler, nevertheless you certainly have registered the handler.
61//!
62//! [signal-hook]: https://docs.rs/signal-hook
63//! [async-signal-safe]: http://www.man7.org/linux/man-pages/man7/signal-safety.7.html
64
65extern crate errno;
66extern crate libc;
67
68mod half_lock;
69mod vec_map;
70
71use std::io::Error;
72use std::mem;
73use std::ptr;
74use std::sync::atomic::{AtomicPtr, Ordering};
75// Once::new is now a const-fn. But it is not stable in all the rustc versions we want to support
76// yet.
77#[allow(deprecated)]
78use std::sync::ONCE_INIT;
79use std::sync::{Arc, Once};
80
81use errno::Errno;
82#[cfg(not(windows))]
83use libc::{c_int, c_void, sigaction, siginfo_t};
84#[cfg(windows)]
85use libc::{c_int, sighandler_t};
86
87#[cfg(not(windows))]
88use libc::{SIGFPE, SIGILL, SIGKILL, SIGSEGV, SIGSTOP};
89#[cfg(windows)]
90use libc::{SIGFPE, SIGILL, SIGSEGV};
91
92use half_lock::HalfLock;
93use vec_map::VecMap;
94
95// These constants are not defined in the current version of libc, but it actually
96// exists in Windows CRT.
97#[cfg(windows)]
98const SIG_DFL: sighandler_t = 0;
99#[cfg(windows)]
100const SIG_IGN: sighandler_t = 1;
101#[cfg(windows)]
102const SIG_GET: sighandler_t = 2;
103#[cfg(windows)]
104const SIG_ERR: sighandler_t = !0;
105
106// To simplify implementation. Not to be exposed.
107#[cfg(windows)]
108#[allow(non_camel_case_types)]
109struct siginfo_t;
110
111// # Internal workings
112//
113// This uses a form of RCU. There's an atomic pointer to the current action descriptors (in the
114// form of IndependentArcSwap, to be able to track what, if any, signal handlers still use the
115// version). A signal handler takes a copy of the pointer and calls all the relevant actions.
116//
117// Modifications to that are protected by a mutex, to avoid juggling multiple signal handlers at
118// once (eg. not calling sigaction concurrently). This should not be a problem, because modifying
119// the signal actions should be initialization only anyway. To avoid all allocations and also
120// deallocations inside the signal handler, after replacing the pointer, the modification routine
121// needs to busy-wait for the reference count on the old pointer to drop to 1 and take ownership ‒
122// that way the one deallocating is the modification routine, outside of the signal handler.
123
124#[derive(Copy, Clone, Debug, Eq, PartialEq, Ord, PartialOrd, Hash)]
125struct ActionId(u128);
126
127/// An ID of registered action.
128///
129/// This is returned by all the registration routines and can be used to remove the action later on
130/// with a call to [`unregister`].
131#[derive(Copy, Clone, Debug, Eq, PartialEq, Ord, PartialOrd, Hash)]
132pub struct SigId {
133 signal: c_int,
134 action: ActionId,
135}
136
137// This should be dyn Fn(...), but we want to support Rust 1.26.0 and that one doesn't allow dyn
138// yet.
139#[allow(unknown_lints, bare_trait_objects)]
140type Action = Fn(&siginfo_t) + Send + Sync;
141
142#[derive(Clone)]
143struct Slot {
144 prev: Prev,
145 // Actions are stored and executed in the order they were registered.
146 actions: VecMap<ActionId, Arc<Action>>,
147}
148
149impl Slot {
150 #[cfg(windows)]
151 fn new(signal: libc::c_int) -> Result<Self, Error> {
152 let old = unsafe { libc::signal(signal, handler as *const () as sighandler_t) };
153 if old == SIG_ERR {
154 return Err(Error::last_os_error());
155 }
156 Ok(Slot {
157 prev: Prev { signal, info: old },
158 actions: VecMap::new(),
159 })
160 }
161
162 #[cfg(not(windows))]
163 fn new(signal: libc::c_int) -> Result<Self, Error> {
164 // C data structure, expected to be zeroed out.
165 let mut new: libc::sigaction = unsafe { mem::zeroed() };
166
167 // Note: AIX fixed their naming in libc 0.2.171.
168 //
169 // However, if we mandate that _for everyone_, other systems fail to compile on old Rust
170 // versions (eg. 1.26.0), because they are no longer able to compile this new libc.
171 //
172 // There doesn't seem to be a way to make Cargo force the dependency for only one target
173 // (it doesn't compile the ones it doesn't need, but it stills considers the other targets
174 // for version resolution).
175 //
176 // Therefore, we let the user have freedom - if they want AIX, they can upgrade to new
177 // enough libc. If they want ancient rustc, they can force older versions of libc.
178 //
179 // See #169.
180
181 new.sa_sigaction = handler as *const () as usize; // If it doesn't compile on AIX, upgrade the libc dependency
182
183 #[cfg(target_os = "nto")]
184 let flags = 0;
185 // SA_RESTART is not supported by qnx https://www.qnx.com/support/knowledgebase.html?id=50130000000SmiD
186 #[cfg(not(target_os = "nto"))]
187 let flags = libc::SA_RESTART;
188 // Android is broken and uses different int types than the rest (and different depending on
189 // the pointer width). This converts the flags to the proper type no matter what it is on
190 // the given platform.
191 #[allow(unused_assignments)]
192 let mut siginfo = flags;
193 siginfo = libc::SA_SIGINFO as _;
194 let flags = flags | siginfo;
195 new.sa_flags = flags as _;
196 // C data structure, expected to be zeroed out.
197 let mut old: libc::sigaction = unsafe { mem::zeroed() };
198 // FFI ‒ pointers are valid, it doesn't take ownership.
199 if unsafe { libc::sigaction(signal, &new, &mut old) } != 0 {
200 return Err(Error::last_os_error());
201 }
202 Ok(Slot {
203 prev: Prev { signal, info: old },
204 actions: VecMap::new(),
205 })
206 }
207}
208
209#[derive(Clone)]
210struct SignalData {
211 signals: VecMap<c_int, Slot>,
212 next_id: u128,
213}
214
215#[derive(Clone)]
216struct Prev {
217 signal: c_int,
218 #[cfg(windows)]
219 info: sighandler_t,
220 #[cfg(not(windows))]
221 info: sigaction,
222}
223
224impl Prev {
225 #[cfg(windows)]
226 fn detect(signal: c_int) -> Result<Self, Error> {
227 let old = unsafe { libc::signal(signal, SIG_GET) };
228 if old == SIG_ERR {
229 return Err(Error::last_os_error());
230 }
231 Ok(Prev { signal, info: old })
232 }
233
234 #[cfg(not(windows))]
235 fn detect(signal: c_int) -> Result<Self, Error> {
236 // C data structure, expected to be zeroed out.
237 let mut old: libc::sigaction = unsafe { mem::zeroed() };
238 // FFI ‒ pointers are valid, it doesn't take ownership.
239 if unsafe { libc::sigaction(signal, ptr::null(), &mut old) } != 0 {
240 return Err(Error::last_os_error());
241 }
242
243 Ok(Prev { signal, info: old })
244 }
245
246 #[cfg(windows)]
247 fn execute(&self, sig: c_int) {
248 let fptr = self.info;
249 if fptr != 0 && fptr != SIG_DFL && fptr != SIG_IGN {
250 // `sighandler_t` is an integer type. Transmuting it directly from an integer to a
251 // function pointer seems dubious w.r.t. pointer provenance -- at least Miri complains
252 // about it. Casting to a raw pointer first side-steps the issue.
253 let fptr = fptr as *mut ();
254 // FFI ‒ calling the original signal handler.
255 unsafe {
256 let action = mem::transmute::<*mut (), extern "C" fn(c_int)>(fptr);
257 action(sig);
258 }
259 }
260 }
261
262 #[cfg(not(windows))]
263 // libc re-exports the core::ffi::c_void on rustc >= 1.30, else defines its own type
264 // cfg_attr is needed because the `allow(clippy::lint)` syntax was added in Rust 1.31
265 #[cfg_attr(clippy, allow(clippy::incompatible_msrv))]
266 unsafe fn execute(&self, sig: c_int, info: *mut siginfo_t, data: *mut c_void) {
267 let fptr = self.info.sa_sigaction;
268 if fptr != 0 && fptr != libc::SIG_DFL && fptr != libc::SIG_IGN {
269 // `sa_sigaction` is usually stored as integer type. Transmuting it directly from an
270 // integer to a function pointer seems dubious w.r.t. pointer provenance -- at least
271 // Miri complains about it. Casting to a raw pointer first side-steps the issue.
272 let fptr = fptr as *mut ();
273 // Android is broken and uses different int types than the rest (and different
274 // depending on the pointer width). This converts the flags to the proper type no
275 // matter what it is on the given platform.
276 //
277 // The trick is to create the same-typed variable as the sa_flags first and then
278 // set it to the proper value (does Rust have a way to copy a type in a different
279 // way?)
280 #[allow(unused_assignments)]
281 let mut siginfo = self.info.sa_flags;
282 siginfo = libc::SA_SIGINFO as _;
283 if self.info.sa_flags & siginfo == 0 {
284 let action = mem::transmute::<*mut (), extern "C" fn(c_int)>(fptr);
285 action(sig);
286 } else {
287 type SigAction = extern "C" fn(c_int, *mut siginfo_t, *mut c_void);
288 let action = mem::transmute::<*mut (), SigAction>(fptr);
289 action(sig, info, data);
290 }
291 }
292 }
293}
294
295/// Lazy-initiated data structure with our global variables.
296///
297/// Used inside a structure to cut down on boilerplate code to lazy-initialize stuff. We don't dare
298/// use anything fancy like lazy-static or once-cell, since we are not sure they are
299/// async-signal-safe in their access. Our code uses the [Once], but only on the write end outside
300/// of signal handler. The handler assumes it has already been initialized.
301struct GlobalData {
302 /// The data structure describing what needs to be run for each signal.
303 data: HalfLock<SignalData>,
304
305 /// A fallback to fight/minimize a race condition during signal initialization.
306 ///
307 /// See the comment inside [`register_unchecked_impl`].
308 race_fallback: HalfLock<Option<Prev>>,
309}
310
311static GLOBAL_DATA: AtomicPtr<GlobalData> = AtomicPtr::new(ptr::null_mut());
312#[allow(deprecated)]
313static GLOBAL_INIT: Once = ONCE_INIT;
314
315impl GlobalData {
316 fn get() -> &'static Self {
317 let data = GLOBAL_DATA.load(Ordering::Acquire);
318 // # Safety
319 //
320 // * The data actually does live forever - created by Box::into_raw.
321 // * It is _never_ modified (apart for interior mutability, but that one is fine).
322 unsafe { data.as_ref().expect("We shall be set up already") }
323 }
324 fn ensure() -> &'static Self {
325 GLOBAL_INIT.call_once(|| {
326 let data = Box::into_raw(Box::new(GlobalData {
327 data: HalfLock::new(SignalData {
328 signals: VecMap::new(),
329 next_id: 1,
330 }),
331 race_fallback: HalfLock::new(None),
332 }));
333 let old = GLOBAL_DATA.swap(data, Ordering::Release);
334 assert!(old.is_null());
335 });
336 Self::get()
337 }
338}
339
340#[cfg(windows)]
341extern "C" fn handler(sig: c_int) {
342 let _errno = ErrnoGuard::new();
343
344 if sig != SIGFPE {
345 // Windows CRT `signal` resets handler every time, unless for SIGFPE.
346 // Reregister the handler to retain maximal compatibility.
347 // Problems:
348 // - It's racy. But this is inevitably racy in Windows.
349 // - Interacts poorly with handlers outside signal-hook-registry.
350 let old = unsafe { libc::signal(sig, handler as *const () as sighandler_t) };
351 if old == SIG_ERR {
352 // MSDN doesn't describe which errors might occur,
353 // but we can tell from the Linux manpage that
354 // EINVAL (invalid signal number) is mostly the only case.
355 // Therefore, this branch must not occur.
356 // In any case we can do nothing useful in the signal handler,
357 // so we're going to abort silently.
358 unsafe {
359 libc::abort();
360 }
361 }
362 }
363
364 let globals = GlobalData::get();
365 let fallback = globals.race_fallback.read();
366 let sigdata = globals.data.read();
367
368 if let Some(ref slot) = sigdata.signals.get(&sig) {
369 slot.prev.execute(sig);
370
371 for action in slot.actions.values() {
372 action(&siginfo_t);
373 }
374 } else if let Some(prev) = fallback.as_ref() {
375 // In case we get called but don't have the slot for this signal set up yet, we are under
376 // the race condition. We may have the old signal handler stored in the fallback
377 // temporarily.
378 if sig == prev.signal {
379 prev.execute(sig);
380 }
381 // else -> probably should not happen, but races with other threads are possible so
382 // better safe
383 }
384}
385
386#[cfg(not(windows))]
387// libc re-exports the core::ffi::c_void on rustc >= 1.30, else defines its own type
388// cfg_attr is needed because the `allow(clippy::lint)` syntax was added in Rust 1.31
389#[cfg_attr(clippy, allow(clippy::incompatible_msrv))]
390extern "C" fn handler(sig: c_int, info: *mut siginfo_t, data: *mut c_void) {
391 let _errno = ErrnoGuard::new();
392
393 let globals = GlobalData::get();
394 let fallback = globals.race_fallback.read();
395 let sigdata = globals.data.read();
396
397 if let Some(slot) = sigdata.signals.get(&sig) {
398 unsafe { slot.prev.execute(sig, info, data) };
399
400 let info = unsafe { info.as_ref() };
401 let info = info.unwrap_or_else(|| {
402 // The info being null seems to be illegal according to POSIX, but has been observed on
403 // some probably broken platform. We can't do anything about that, that is just broken,
404 // but we are not allowed to panic in a signal handler, so we are left only with simply
405 // aborting. We try to write a message what happens, but using the libc stuff
406 // (`eprintln` is not guaranteed to be async-signal-safe).
407 unsafe {
408 const MSG: &[u8] =
409 b"Platform broken, got NULL as siginfo to signal handler. Aborting";
410 libc::write(2, MSG.as_ptr() as *const _, MSG.len());
411 libc::abort();
412 }
413 });
414
415 for action in slot.actions.values() {
416 action(info);
417 }
418 } else if let Some(prev) = fallback.as_ref() {
419 // In case we get called but don't have the slot for this signal set up yet, we are under
420 // the race condition. We may have the old signal handler stored in the fallback
421 // temporarily.
422 if prev.signal == sig {
423 unsafe { prev.execute(sig, info, data) };
424 }
425 // else -> probably should not happen, but races with other threads are possible so
426 // better safe
427 }
428}
429
430struct ErrnoGuard(Errno);
431
432impl ErrnoGuard {
433 fn new() -> Self {
434 ErrnoGuard(errno::errno())
435 }
436}
437
438impl Drop for ErrnoGuard {
439 fn drop(&mut self) {
440 errno::set_errno(self.0);
441 }
442}
443
444/// List of forbidden signals.
445///
446/// Some signals are impossible to replace according to POSIX and some are so special that this
447/// library refuses to handle them (eg. SIGSEGV). The routines panic in case registering one of
448/// these signals is attempted.
449///
450/// See [`register`].
451pub const FORBIDDEN: &[c_int] = FORBIDDEN_IMPL;
452
453#[cfg(windows)]
454const FORBIDDEN_IMPL: &[c_int] = &[SIGILL, SIGFPE, SIGSEGV];
455#[cfg(not(windows))]
456const FORBIDDEN_IMPL: &[c_int] = &[SIGKILL, SIGSTOP, SIGILL, SIGFPE, SIGSEGV];
457
458/// Registers an arbitrary action for the given signal.
459///
460/// This makes sure there's a signal handler for the given signal. It then adds the action to the
461/// ones called each time the signal is delivered. If multiple actions are set for the same signal,
462/// all are called, in the order of registration.
463///
464/// If there was a previous signal handler for the given signal, it is chained ‒ it will be called
465/// as part of this library's signal handler, before any actions set through this function.
466///
467/// On success, the function returns an ID that can be used to remove the action again with
468/// [`unregister`].
469///
470/// # Panics
471///
472/// If the signal is one of (see [`FORBIDDEN`]):
473///
474/// * `SIGKILL`
475/// * `SIGSTOP`
476/// * `SIGILL`
477/// * `SIGFPE`
478/// * `SIGSEGV`
479///
480/// The first two are not possible to override (and the underlying C functions simply ignore all
481/// requests to do so, which smells of possible bugs, or return errors). The rest can be set, but
482/// generally needs very special handling to do so correctly (direct manipulation of the
483/// application's address space, `longjmp` and similar). Unless you know very well what you're
484/// doing, you'll shoot yourself into the foot and this library won't help you with that.
485///
486/// # Errors
487///
488/// Since the library manipulates signals using the low-level C functions, all these can return
489/// errors. Generally, the errors mean something like the specified signal does not exist on the
490/// given platform ‒ after a program is debugged and tested on a given OS, it should never return
491/// an error.
492///
493/// However, if an error *is* returned, there are no guarantees if the given action was registered
494/// or not.
495///
496/// # Safety
497///
498/// This function is unsafe, because the `action` is run inside a signal handler. While Rust is
499/// somewhat vague about the consequences of such, it is reasonably to assume that similar
500/// restrictions as specified in C or C++ apply.
501///
502/// In particular:
503///
504/// * Calling any OS functions that are not async-signal-safe as specified as POSIX is not allowed.
505/// * Accessing globals or thread-locals without synchronization is not allowed (however, mutexes
506/// are not within the async-signal-safe functions, therefore the synchronization is limited to
507/// using atomics).
508///
509/// The underlying reason is, signals are asynchronous (they can happen at arbitrary time) and are
510/// run in context of arbitrary thread (with some limited control of at which thread they can run).
511/// As a consequence, things like mutexes are prone to deadlocks, memory allocators can likely
512/// contain mutexes and the compiler doesn't expect the interruption during optimizations.
513///
514/// Things that generally are part of the async-signal-safe set (though check specifically) are
515/// routines to terminate the program, to further manipulate signals (by the low-level functions,
516/// not by this library) and to read and write file descriptors. The async-signal-safety is
517/// transitive - that is, a function composed only from computations (with local variables or with
518/// variables accessed with proper synchronizations) and other async-signal-safe functions is also
519/// safe.
520///
521/// As panicking from within a signal handler would be a panic across FFI boundary (which is
522/// undefined behavior), the passed handler must not panic.
523///
524/// Note that many innocently-looking functions do contain some of the forbidden routines (a lot of
525/// things lock or allocate).
526///
527/// If you find these limitations hard to satisfy, choose from the helper functions in the
528/// [signal-hook](https://docs.rs/signal-hook) crate ‒ these provide safe interface to use some
529/// common signal handling patters.
530///
531/// # Race condition
532///
533/// Upon registering the first hook for a given signal into this library, there's a short race
534/// condition under the following circumstances:
535///
536/// * The program already has a signal handler installed for this particular signal (through some
537/// other library, possibly).
538/// * Concurrently, some other thread installs a different signal handler while it is being
539/// installed by this library.
540/// * At the same time, the signal is delivered.
541///
542/// Under such conditions signal-hook might wrongly "chain" to the older signal handler for a short
543/// while (until the registration is fully complete).
544///
545/// Note that the exact conditions of the race condition might change in future versions of the
546/// library. The recommended way to avoid it is to register signals before starting any additional
547/// threads, or at least not to register signals concurrently.
548///
549/// Alternatively, make sure all signals are handled through this library.
550///
551/// # Performance
552///
553/// Even when it is possible to repeatedly install and remove actions during the lifetime of a
554/// program, the installation and removal is considered a slow operation and should not be done
555/// very often. Also, there's limited (though huge) amount of distinct IDs (they are `u128`).
556///
557/// # Examples
558///
559/// ```rust
560/// extern crate signal_hook_registry;
561///
562/// use std::io::Error;
563/// use std::process;
564///
565/// fn main() -> Result<(), Error> {
566/// let signal = unsafe {
567/// signal_hook_registry::register(signal_hook::consts::SIGTERM, || process::abort())
568/// }?;
569/// // Stuff here...
570/// signal_hook_registry::unregister(signal); // Not really necessary.
571/// Ok(())
572/// }
573/// ```
574pub unsafe fn register<F>(signal: c_int, action: F) -> Result<SigId, Error>
575where
576 F: Fn() + Sync + Send + 'static,
577{
578 register_sigaction_impl(signal, Arc::new(move |_: &_| action()))
579}
580
581/// Register a signal action.
582///
583/// This acts in the same way as [`register`], including the drawbacks, panics and performance
584/// characteristics. The only difference is the provided action accepts a [`siginfo_t`] argument,
585/// providing information about the received signal.
586///
587/// # Safety
588///
589/// See the details of [`register`].
590#[cfg(not(windows))]
591pub unsafe fn register_sigaction<F>(signal: c_int, action: F) -> Result<SigId, Error>
592where
593 F: Fn(&siginfo_t) + Sync + Send + 'static,
594{
595 register_sigaction_impl(signal, Arc::new(action))
596}
597
598unsafe fn register_sigaction_impl(signal: c_int, action: Arc<Action>) -> Result<SigId, Error> {
599 assert!(
600 !FORBIDDEN.contains(&signal),
601 "Attempted to register forbidden signal {}",
602 signal,
603 );
604 register_unchecked_impl(signal, action)
605}
606
607/// Register a signal action without checking for forbidden signals.
608///
609/// This acts in the same way as [`register_unchecked`], including the drawbacks, panics and
610/// performance characteristics. The only difference is the provided action doesn't accept a
611/// [`siginfo_t`] argument.
612///
613/// # Safety
614///
615/// See the details of [`register`].
616pub unsafe fn register_signal_unchecked<F>(signal: c_int, action: F) -> Result<SigId, Error>
617where
618 F: Fn() + Sync + Send + 'static,
619{
620 register_unchecked_impl(signal, Arc::new(move |_: &_| action()))
621}
622
623/// Register a signal action without checking for forbidden signals.
624///
625/// This acts the same way as [`register_sigaction`], but without checking for the [`FORBIDDEN`]
626/// signals. All the signals passed are registered and it is up to the caller to make some sense of
627/// them.
628///
629/// Note that you really need to know what you're doing if you change eg. the `SIGSEGV` signal
630/// handler. Generally, you don't want to do that. But unlike the other functions here, this
631/// function still allows you to do it.
632///
633/// # Safety
634///
635/// See the details of [`register`].
636#[cfg(not(windows))]
637pub unsafe fn register_unchecked<F>(signal: c_int, action: F) -> Result<SigId, Error>
638where
639 F: Fn(&siginfo_t) + Sync + Send + 'static,
640{
641 register_unchecked_impl(signal, Arc::new(action))
642}
643
644unsafe fn register_unchecked_impl(signal: c_int, action: Arc<Action>) -> Result<SigId, Error> {
645 let globals = GlobalData::ensure();
646
647 let mut lock = globals.data.write();
648
649 let mut sigdata = SignalData::clone(&lock);
650 let id = ActionId(sigdata.next_id);
651 sigdata.next_id += 1;
652
653 if sigdata.signals.contains(&signal) {
654 let slot = sigdata.signals.get_mut(&signal).unwrap();
655 assert!(slot.actions.insert(id, action).is_none());
656 } else {
657 // While the sigaction/signal exchanges the old one atomically, we are not able to
658 // atomically store it somewhere a signal handler could read it. That poses a race
659 // condition where we could lose some signals delivered in between changing it and
660 // storing it.
661 //
662 // Therefore we first store the old one in the fallback storage. The fallback only
663 // covers the cases where the slot is not yet active and becomes "inert" after that,
664 // even if not removed (it may get overwritten by some other signal, but for that the
665 // mutex in globals.data must be unlocked here - and by that time we already stored the
666 // slot.
667 //
668 // And yes, this still leaves a short race condition when some other thread could
669 // replace the signal handler and we would be calling the outdated one for a short
670 // time, until we install the slot.
671 globals
672 .race_fallback
673 .write()
674 .store(Some(Prev::detect(signal)?));
675
676 let mut slot = Slot::new(signal)?;
677 slot.actions.insert(id, action);
678 sigdata.signals.insert(signal, slot);
679 }
680
681 lock.store(sigdata);
682
683 Ok(SigId { signal, action: id })
684}
685
686/// Removes a previously installed action.
687///
688/// This function does nothing if the action was already removed. It returns true if it was removed
689/// and false if the action wasn't found.
690///
691/// It can unregister all the actions installed by [`register`] as well as the ones from downstream
692/// crates (like [`signal-hook`](https://docs.rs/signal-hook)).
693///
694/// # Warning
695///
696/// This does *not* currently return the default/previous signal handler if the last action for a
697/// signal was just unregistered. That means that if you replaced for example `SIGTERM` and then
698/// removed the action, the program will effectively ignore `SIGTERM` signals from now on, not
699/// terminate on them as is the default action. This is OK if you remove it as part of a shutdown,
700/// but it is not recommended to remove termination actions during the normal runtime of
701/// application (unless the desired effect is to create something that can be terminated only by
702/// SIGKILL).
703pub fn unregister(id: SigId) -> bool {
704 let globals = GlobalData::ensure();
705 let mut replace = false;
706 let mut lock = globals.data.write();
707 let mut sigdata = SignalData::clone(&lock);
708 if let Some(slot) = sigdata.signals.get_mut(&id.signal) {
709 replace = slot.actions.remove(&id.action).is_some();
710 }
711 if replace {
712 lock.store(sigdata);
713 }
714 replace
715}
716
717// We keep this one here for strict backwards compatibility, but the API is kind of bad. One can
718// delete actions that don't belong to them, which is kind of against the whole idea of not
719// breaking stuff for others.
720#[deprecated(
721 since = "1.3.0",
722 note = "Don't use. Can influence unrelated parts of program / unknown actions"
723)]
724#[doc(hidden)]
725pub fn unregister_signal(signal: c_int) -> bool {
726 let globals = GlobalData::ensure();
727 let mut replace = false;
728 let mut lock = globals.data.write();
729 let mut sigdata = SignalData::clone(&lock);
730 if let Some(slot) = sigdata.signals.get_mut(&signal) {
731 if !slot.actions.is_empty() {
732 slot.actions.clear();
733 replace = true;
734 }
735 }
736 if replace {
737 lock.store(sigdata);
738 }
739 replace
740}
741
742#[cfg(test)]
743mod tests {
744 use std::sync::atomic::{AtomicUsize, Ordering};
745 use std::sync::Arc;
746 use std::thread;
747 use std::time::Duration;
748
749 #[cfg(not(windows))]
750 use libc::{pid_t, SIGUSR1, SIGUSR2};
751
752 #[cfg(windows)]
753 use libc::SIGTERM as SIGUSR1;
754 #[cfg(windows)]
755 use libc::SIGTERM as SIGUSR2;
756
757 use super::*;
758
759 #[test]
760 #[should_panic]
761 fn panic_forbidden() {
762 let _ = unsafe { register(SIGILL, || ()) };
763 }
764
765 /// Registering the forbidden signals is allowed in the _unchecked version.
766 #[test]
767 #[allow(clippy::redundant_closure)] // Clippy, you're wrong. Because it changes the return value.
768 fn forbidden_raw() {
769 unsafe { register_signal_unchecked(SIGFPE, || std::process::abort()).unwrap() };
770 }
771
772 #[test]
773 fn signal_without_pid() {
774 let status = Arc::new(AtomicUsize::new(0));
775 let action = {
776 let status = Arc::clone(&status);
777 move || {
778 status.store(1, Ordering::Relaxed);
779 }
780 };
781 unsafe {
782 register(SIGUSR2, action).unwrap();
783 libc::raise(SIGUSR2);
784 }
785 for _ in 0..10 {
786 thread::sleep(Duration::from_millis(100));
787 let current = status.load(Ordering::Relaxed);
788 match current {
789 // Not yet
790 0 => continue,
791 // Good, we are done with the correct result
792 _ if current == 1 => return,
793 _ => panic!("Wrong result value {}", current),
794 }
795 }
796 panic!("Timed out waiting for the signal");
797 }
798
799 #[test]
800 #[cfg(not(windows))]
801 fn signal_with_pid() {
802 let status = Arc::new(AtomicUsize::new(0));
803 let action = {
804 let status = Arc::clone(&status);
805 move |siginfo: &siginfo_t| {
806 // Hack: currently, libc exposes only the first 3 fields of siginfo_t. The pid
807 // comes somewhat later on. Therefore, we do a Really Ugly Hack and define our
808 // own structure (and hope it is correct on all platforms). But hey, this is
809 // only the tests, so we are going to get away with this.
810 #[repr(C)]
811 struct SigInfo {
812 _fields: [c_int; 3],
813 #[cfg(all(target_pointer_width = "64", target_os = "linux"))]
814 _pad: c_int,
815 pid: pid_t,
816 }
817 let s: &SigInfo = unsafe {
818 (siginfo as *const _ as usize as *const SigInfo)
819 .as_ref()
820 .unwrap()
821 };
822 status.store(s.pid as usize, Ordering::Relaxed);
823 }
824 };
825 let pid;
826 unsafe {
827 pid = libc::getpid();
828 register_sigaction(SIGUSR2, action).unwrap();
829 libc::raise(SIGUSR2);
830 }
831 for _ in 0..10 {
832 thread::sleep(Duration::from_millis(100));
833 let current = status.load(Ordering::Relaxed);
834 match current {
835 // Not yet (PID == 0 doesn't happen)
836 0 => continue,
837 // Good, we are done with the correct result
838 _ if current == pid as usize => return,
839 _ => panic!("Wrong status value {}", current),
840 }
841 }
842 panic!("Timed out waiting for the signal");
843 }
844
845 /// Check that registration works as expected and that unregister tells if it did or not.
846 #[test]
847 fn register_unregister() {
848 let signal = unsafe { register(SIGUSR1, || ()).unwrap() };
849 // It was there now, so we can unregister
850 assert!(unregister(signal));
851 // The next time unregistering does nothing and tells us so.
852 assert!(!unregister(signal));
853 }
854
855 /// Check that errno is not clobbered by the signal handler.
856 #[test]
857 fn save_restore_errno() {
858 const MAGIC_ERRNO: i32 = 123456;
859 let action = move || {
860 errno::set_errno(Errno(MAGIC_ERRNO));
861 };
862 unsafe {
863 register(SIGUSR1, action).unwrap();
864 libc::raise(SIGUSR1);
865 }
866 // NB: raise() might clobber errno on some platforms, so this test isn't waterproof. But it
867 // fails at least sometimes on some platforms if the errno save/restore is removed.
868 assert!(errno::errno().0 != MAGIC_ERRNO);
869 }
870}