Calling the signal()
function in a multithreaded program is undefined behavior according to the C Standard, subclause 7.14.1.1, paragraph 7 [ISO/IEC 9899:2011].
This rule is a specific instance of SIG02-C. Avoid using signals to implement normal functionality.
Noncompliant Code Example
This code sets a signal handler, while also setting a child thread to do work. This results in undefined behavior.
#include <signal.h> #include <threads.h> volatile sig_atomic_t flag = 0; void handler(int signum) { flag = 1; } /* Runs until user sends SIGUSR1. */ int func(void *data) { while (!flag) { /* ... */ } return 0; } int main(void) { signal(SIGUSR1, handler); /* Undefined! */ thrd_t tid; if (thrd_success != thrd_create(&tid, func, NULL)) { /* Handle Error */ } /* ... */ return 0; }
Compliant Solution
This code dispenses with the signal handler, and uses an atomic_flag
to indicate when the child thread should terminate its loop.
#include <stdatomic.h> #include <threads.h> atomic_flag flag = ATOMIC_VAR_INIT(0); int func(void *data) { while (!flag) { /* ... */ } return 0; } int main(void) { int result; thrd_t tid; if (thrd_success != thrd_create(&tid, func, NULL)) { /* Handle Error */ } /* ... */ /* Set flag when done. */ while (!atomic_flag_test_and_set(&flag)) ; /* Continue attempts. */ return 0; }
Exceptions
CON37-EX0: Platforms that provide defined behavior when multithreaded programs use custom signal handlers are exempt from this rule. This would include POSIX, for example.
Risk Assessment
Mixing signals and threads causes undefined behavior.
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
CON37-C | low | probable | low | P6 | L2 |
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
Bibliography
[ISO/IEC 9899:2011] | Subclause 7.14.1.1, "The signal function" |