blob: 384baaa0de1b92dfdae2abff1446ca83b2dae192 [file] [log] [blame]
Austin Schuh6c590f82019-09-11 19:23:12 -07001#include "aos/ipc_lib/signalfd.h"
2
Stephan Pleines682928d2024-05-31 20:43:48 -07003#include <string.h>
Austin Schuh6c590f82019-09-11 19:23:12 -07004#include <sys/types.h>
Tyler Chatowbf0609c2021-07-31 16:13:27 -07005
6#include <csignal>
Stephan Pleines682928d2024-05-31 20:43:48 -07007#include <ostream>
Austin Schuh8d2e3fa2020-09-10 23:01:55 -07008#if __has_feature(memory_sanitizer)
9#include <sanitizer/msan_interface.h>
10#endif
Austin Schuh6c590f82019-09-11 19:23:12 -070011#include <unistd.h>
Tyler Chatow85c32c92021-07-31 11:58:51 -070012
Austin Schuh6c590f82019-09-11 19:23:12 -070013#include <initializer_list>
14
Alex Perrycb7da4b2019-08-28 19:35:56 -070015#include "glog/logging.h"
Austin Schuh6c590f82019-09-11 19:23:12 -070016
Stephan Pleinesf63bde82024-01-13 15:59:33 -080017namespace aos::ipc_lib {
Austin Schuh8d2e3fa2020-09-10 23:01:55 -070018namespace {
19
20// Wrapper which propagates msan information.
21// TODO(Brian): Drop this once we have <https://reviews.llvm.org/D82411> to
22// intercept this function natively.
23int wrapped_sigandset(sigset_t *dest, const sigset_t *left,
24 const sigset_t *right) {
25#if __has_feature(memory_sanitizer)
26 if (left) {
27 __msan_check_mem_is_initialized(left, sizeof(*left));
28 }
29 if (right) {
30 __msan_check_mem_is_initialized(right, sizeof(*right));
31 }
32#endif
33 const int r = sigandset(dest, left, right);
34#if __has_feature(memory_sanitizer)
35 if (!r && dest) {
36 __msan_unpoison(dest, sizeof(*dest));
37 }
38#endif
39 return r;
40}
41
42// Wrapper which propagates msan information.
43// TODO(Brian): Drop this once we have
44// <https://reviews.llvm.org/rG89ae290b58e20fc5f56b7bfae4b34e7fef06e1b1> to
45// intercept this function natively.
46int wrapped_pthread_sigmask(int how, const sigset_t *set, sigset_t *oldset) {
47#if __has_feature(memory_sanitizer)
48 if (set) {
49 __msan_check_mem_is_initialized(set, sizeof(*set));
50 }
51#endif
52 const int r = pthread_sigmask(how, set, oldset);
53#if __has_feature(memory_sanitizer)
54 if (!r && oldset) {
55 __msan_unpoison(oldset, sizeof(*oldset));
56 }
57#endif
58 return r;
59}
60
61} // namespace
Austin Schuh6c590f82019-09-11 19:23:12 -070062
Alex Perrycb7da4b2019-08-28 19:35:56 -070063SignalFd::SignalFd(::std::initializer_list<unsigned int> signals) {
Austin Schuh6c590f82019-09-11 19:23:12 -070064 // Build up the mask with the provided signals.
Brian Silverman407cc532019-11-03 11:40:56 -080065 CHECK_EQ(0, sigemptyset(&blocked_mask_));
Austin Schuh6c590f82019-09-11 19:23:12 -070066 for (int signal : signals) {
Brian Silverman407cc532019-11-03 11:40:56 -080067 CHECK_EQ(0, sigaddset(&blocked_mask_, signal));
Austin Schuh6c590f82019-09-11 19:23:12 -070068 }
69 // Then build a signalfd. Make it nonblocking so it works well with an epoll
70 // loop, and have it close on exec.
Brian Silverman407cc532019-11-03 11:40:56 -080071 PCHECK((fd_ = signalfd(-1, &blocked_mask_, SFD_NONBLOCK | SFD_CLOEXEC)) != 0);
Austin Schuh6c590f82019-09-11 19:23:12 -070072 // Now that we have a consumer of the signal, block the signals so the
Brian Silverman407cc532019-11-03 11:40:56 -080073 // signalfd gets them. Record which ones we actually blocked, so we can
74 // unblock just those later.
75 sigset_t old_mask;
Austin Schuh8d2e3fa2020-09-10 23:01:55 -070076 CHECK_EQ(0, wrapped_pthread_sigmask(SIG_BLOCK, &blocked_mask_, &old_mask));
Brian Silverman407cc532019-11-03 11:40:56 -080077 for (int signal : signals) {
78 if (sigismember(&old_mask, signal)) {
79 CHECK_EQ(0, sigdelset(&blocked_mask_, signal));
80 }
81 }
Austin Schuh6c590f82019-09-11 19:23:12 -070082}
83
Tyler Chatow85c32c92021-07-31 11:58:51 -070084namespace {
85// sizeof(sigset_t) is larger than the bytes actually used to represent all
86// signals. This size is only the bytes initialized. _NSIG is 1-indexed.
87static constexpr size_t kSigSetSize = (_NSIG - 1) / 8;
88
89// If the size of the mask changes, we should check that we still have
90// correct behavior.
91static_assert(kSigSetSize == 8 && kSigSetSize <= sizeof(sigset_t));
92} // namespace
93
Austin Schuh6c590f82019-09-11 19:23:12 -070094SignalFd::~SignalFd() {
Brian Silverman407cc532019-11-03 11:40:56 -080095 // Unwind the constructor. Unblock the signals and close the fd. Verify nobody
96 // else unblocked the signals we're supposed to unblock in the meantime.
97 sigset_t old_mask;
Austin Schuh8d2e3fa2020-09-10 23:01:55 -070098 CHECK_EQ(0, wrapped_pthread_sigmask(SIG_UNBLOCK, &blocked_mask_, &old_mask));
Brian Silverman407cc532019-11-03 11:40:56 -080099 sigset_t unblocked_mask;
Austin Schuh8d2e3fa2020-09-10 23:01:55 -0700100 CHECK_EQ(0, wrapped_sigandset(&unblocked_mask, &blocked_mask_, &old_mask));
Tyler Chatow85c32c92021-07-31 11:58:51 -0700101 if (memcmp(&unblocked_mask, &blocked_mask_, kSigSetSize) != 0) {
Brian Silverman407cc532019-11-03 11:40:56 -0800102 LOG(FATAL) << "Some other code unblocked one or more of our signals";
103 }
Alex Perrycb7da4b2019-08-28 19:35:56 -0700104 PCHECK(close(fd_) == 0);
Austin Schuh6c590f82019-09-11 19:23:12 -0700105}
106
107signalfd_siginfo SignalFd::Read() {
108 signalfd_siginfo result;
109
110 const int ret =
111 read(fd_, static_cast<void *>(&result), sizeof(signalfd_siginfo));
112 // If we didn't get the right amount of data, signal that there was a problem
113 // by setting the signal number to 0.
114 if (ret != static_cast<int>(sizeof(signalfd_siginfo))) {
115 result.ssi_signo = 0;
Brian Silverman407cc532019-11-03 11:40:56 -0800116 } else {
117 CHECK_NE(0u, result.ssi_signo);
Austin Schuh6c590f82019-09-11 19:23:12 -0700118 }
119 return result;
120}
121
Stephan Pleinesf63bde82024-01-13 15:59:33 -0800122} // namespace aos::ipc_lib