blob: f23d0bea694609d4ae6e733474ec932bbe71fc7e [file] [log] [blame]
Austin Schuh6c590f82019-09-11 19:23:12 -07001#include "aos/ipc_lib/signalfd.h"
2
Austin Schuh6c590f82019-09-11 19:23:12 -07003#include <sys/types.h>
Tyler Chatowbf0609c2021-07-31 16:13:27 -07004
5#include <csignal>
Austin Schuh8d2e3fa2020-09-10 23:01:55 -07006#if __has_feature(memory_sanitizer)
7#include <sanitizer/msan_interface.h>
8#endif
Austin Schuh6c590f82019-09-11 19:23:12 -07009#include <unistd.h>
Tyler Chatow85c32c92021-07-31 11:58:51 -070010
Austin Schuh6c590f82019-09-11 19:23:12 -070011#include <initializer_list>
12
Alex Perrycb7da4b2019-08-28 19:35:56 -070013#include "glog/logging.h"
Austin Schuh6c590f82019-09-11 19:23:12 -070014
15namespace aos {
16namespace ipc_lib {
Austin Schuh8d2e3fa2020-09-10 23:01:55 -070017namespace {
18
19// Wrapper which propagates msan information.
20// TODO(Brian): Drop this once we have <https://reviews.llvm.org/D82411> to
21// intercept this function natively.
22int wrapped_sigandset(sigset_t *dest, const sigset_t *left,
23 const sigset_t *right) {
24#if __has_feature(memory_sanitizer)
25 if (left) {
26 __msan_check_mem_is_initialized(left, sizeof(*left));
27 }
28 if (right) {
29 __msan_check_mem_is_initialized(right, sizeof(*right));
30 }
31#endif
32 const int r = sigandset(dest, left, right);
33#if __has_feature(memory_sanitizer)
34 if (!r && dest) {
35 __msan_unpoison(dest, sizeof(*dest));
36 }
37#endif
38 return r;
39}
40
41// Wrapper which propagates msan information.
42// TODO(Brian): Drop this once we have
43// <https://reviews.llvm.org/rG89ae290b58e20fc5f56b7bfae4b34e7fef06e1b1> to
44// intercept this function natively.
45int wrapped_pthread_sigmask(int how, const sigset_t *set, sigset_t *oldset) {
46#if __has_feature(memory_sanitizer)
47 if (set) {
48 __msan_check_mem_is_initialized(set, sizeof(*set));
49 }
50#endif
51 const int r = pthread_sigmask(how, set, oldset);
52#if __has_feature(memory_sanitizer)
53 if (!r && oldset) {
54 __msan_unpoison(oldset, sizeof(*oldset));
55 }
56#endif
57 return r;
58}
59
60} // namespace
Austin Schuh6c590f82019-09-11 19:23:12 -070061
Alex Perrycb7da4b2019-08-28 19:35:56 -070062SignalFd::SignalFd(::std::initializer_list<unsigned int> signals) {
Austin Schuh6c590f82019-09-11 19:23:12 -070063 // Build up the mask with the provided signals.
Brian Silverman407cc532019-11-03 11:40:56 -080064 CHECK_EQ(0, sigemptyset(&blocked_mask_));
Austin Schuh6c590f82019-09-11 19:23:12 -070065 for (int signal : signals) {
Brian Silverman407cc532019-11-03 11:40:56 -080066 CHECK_EQ(0, sigaddset(&blocked_mask_, signal));
Austin Schuh6c590f82019-09-11 19:23:12 -070067 }
68 // Then build a signalfd. Make it nonblocking so it works well with an epoll
69 // loop, and have it close on exec.
Brian Silverman407cc532019-11-03 11:40:56 -080070 PCHECK((fd_ = signalfd(-1, &blocked_mask_, SFD_NONBLOCK | SFD_CLOEXEC)) != 0);
Austin Schuh6c590f82019-09-11 19:23:12 -070071 // Now that we have a consumer of the signal, block the signals so the
Brian Silverman407cc532019-11-03 11:40:56 -080072 // signalfd gets them. Record which ones we actually blocked, so we can
73 // unblock just those later.
74 sigset_t old_mask;
Austin Schuh8d2e3fa2020-09-10 23:01:55 -070075 CHECK_EQ(0, wrapped_pthread_sigmask(SIG_BLOCK, &blocked_mask_, &old_mask));
Brian Silverman407cc532019-11-03 11:40:56 -080076 for (int signal : signals) {
77 if (sigismember(&old_mask, signal)) {
78 CHECK_EQ(0, sigdelset(&blocked_mask_, signal));
79 }
80 }
Austin Schuh6c590f82019-09-11 19:23:12 -070081}
82
Tyler Chatow85c32c92021-07-31 11:58:51 -070083namespace {
84// sizeof(sigset_t) is larger than the bytes actually used to represent all
85// signals. This size is only the bytes initialized. _NSIG is 1-indexed.
86static constexpr size_t kSigSetSize = (_NSIG - 1) / 8;
87
88// If the size of the mask changes, we should check that we still have
89// correct behavior.
90static_assert(kSigSetSize == 8 && kSigSetSize <= sizeof(sigset_t));
91} // namespace
92
Austin Schuh6c590f82019-09-11 19:23:12 -070093SignalFd::~SignalFd() {
Brian Silverman407cc532019-11-03 11:40:56 -080094 // Unwind the constructor. Unblock the signals and close the fd. Verify nobody
95 // else unblocked the signals we're supposed to unblock in the meantime.
96 sigset_t old_mask;
Austin Schuh8d2e3fa2020-09-10 23:01:55 -070097 CHECK_EQ(0, wrapped_pthread_sigmask(SIG_UNBLOCK, &blocked_mask_, &old_mask));
Brian Silverman407cc532019-11-03 11:40:56 -080098 sigset_t unblocked_mask;
Austin Schuh8d2e3fa2020-09-10 23:01:55 -070099 CHECK_EQ(0, wrapped_sigandset(&unblocked_mask, &blocked_mask_, &old_mask));
Tyler Chatow85c32c92021-07-31 11:58:51 -0700100 if (memcmp(&unblocked_mask, &blocked_mask_, kSigSetSize) != 0) {
Brian Silverman407cc532019-11-03 11:40:56 -0800101 LOG(FATAL) << "Some other code unblocked one or more of our signals";
102 }
Alex Perrycb7da4b2019-08-28 19:35:56 -0700103 PCHECK(close(fd_) == 0);
Austin Schuh6c590f82019-09-11 19:23:12 -0700104}
105
106signalfd_siginfo SignalFd::Read() {
107 signalfd_siginfo result;
108
109 const int ret =
110 read(fd_, static_cast<void *>(&result), sizeof(signalfd_siginfo));
111 // If we didn't get the right amount of data, signal that there was a problem
112 // by setting the signal number to 0.
113 if (ret != static_cast<int>(sizeof(signalfd_siginfo))) {
114 result.ssi_signo = 0;
Brian Silverman407cc532019-11-03 11:40:56 -0800115 } else {
116 CHECK_NE(0u, result.ssi_signo);
Austin Schuh6c590f82019-09-11 19:23:12 -0700117 }
118 return result;
119}
120
121} // namespace ipc_lib
122} // namespace aos