No atexit()
-registered handler should terminate in any way other than by returning. It is important and potentially safety-critical for all the atexit()
handlers to be allowed to perform their cleanup actions. This is particularly true because the application programmer does not always know about handlers that may have been installed by support libraries. Two specific issues include nested calls to exit()
and terminating a call to an atexit()
registered handler by invoking longjmp
.
The C exit()
function is used for normal program termination. (See ERR04-C. Choose an appropriate termination strategy.) Nested calls to exit()
result in undefined behavior. (See also undefined behavior 182 in Annex J.) This can occur only when exit()
is invoked from a function registered with atexit()
or when exit()
is called from within a signal handler. (See SIG30-C. Call only asynchronous-safe functions within signal handlers.)
If a call to the longjmp
function is made that would terminate the call to a function registered with atexit()
, the behavior is undefined.
Noncompliant Code Example
In this noncompliant code example, the exit1()
and exit2()
functions are registered by atexit()
to perform required cleanup upon program termination. However, if condition
evaluates to true, exit()
is called a second time, resulting in undefined behavior.
#include <stdlib.h> void exit1(void) { /* ...cleanup code... */ return; } void exit2(void) { extern int some_condition; if (some_condition) { /* ...more cleanup code... */ exit(0); } return; } int main(void) { if (atexit(exit1) != 0) { /* Handle error */ } if (atexit(exit2) != 0) { /* Handle error */ } /* ...program code... */ return 0; }
Because all functions registered by the atexit()
function are called in the reverse order of their registration, if exit2()
exits in any way other than by returning, exit1()
will not be executed. This may also be true for atexit()
handlers installed by support libraries.
Compliant Solution
A function that is registered as an exit handler by atexit()
must exit by returning, and not in any other manner:
#include <stdlib.h> void exit1(void) { /* ...cleanup code... */ return; } void exit2(void) { extern int some_condition; if (some_condition) { /* ...more cleanup code... */ } return; } int main(void) { if (atexit(exit1) != 0) { /* Handle error */ } if (atexit(exit2) != 0) { /* Handle error */ } /* ...program code... */ return 0; }
Noncompliant Code Example
The function exit1()
is registered by atexit()
, so upon program termination, exit1()
is called. Execution will jump back to main()
and return, with undefined results.
#include <stdlib.h> #include <setjmp.h> jmp_buf env; int val; void exit1(void) { longjmp(env, 1); } int main(void) { if (atexit(exit1) != 0) { /* Handle error */ } if (setjmp(env) == 0) { exit(0); } else { return 0; } }
Compliant Solution
Careful thought about program flow is the best prevention for an invalid call to longjmp()
. After the exit
function has been called, avoid using longjmp()
where it will cause a function to terminate.
#include <stdlib.h> void exit1(void) { return; } int main(void) { if (atexit(exit1) != 0) { /* Handle error */ } return 0; }
Risk Assessment
Terminating a call to an atexit()
-registered handler in any way other than by returning results in undefined behavior and may result in abnormal program termination or other unpredictable behavior. It may also prevent other registered handlers from being invoked.
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
ENV32-C | medium | likely | medium | P12 | L1 |
Automated Detection
Tool | Version | Checker | Description |
---|---|---|---|
Compass/ROSE |
|
| Can detect violations of this rule. In particular, it ensures that all functions registered with |
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Related Guidelines
CERT C++ Secure Coding Standard | ENV32-CPP. All atexit handlers must return normally |
ISO/IEC TR 24772:2013 | Structured Programming [EWD] Termination Strategy [REU] |
MITRE CWE | CWE-705, Incorrect control flow scoping |