| #![doc(test(attr(deny(warnings))))] | 
 | #![warn(missing_docs)] | 
 | #![allow(unknown_lints, renamed_and_remove_lints, bare_trait_objects)] | 
 |  | 
 | //! Backend of the [signal-hook] crate. | 
 | //! | 
 | //! The [signal-hook] crate tries to provide an API to the unix signals, which are a global | 
 | //! resource. Therefore, it is desirable an application contains just one version of the crate | 
 | //! which manages this global resource. But that makes it impossible to make breaking changes in | 
 | //! the API. | 
 | //! | 
 | //! Therefore, this crate provides very minimal and low level API to the signals that is unlikely | 
 | //! to have to change, while there may be multiple versions of the [signal-hook] that all use this | 
 | //! low-level API to provide different versions of the high level APIs. | 
 | //! | 
 | //! It is also possible some other crates might want to build a completely different API. This | 
 | //! split allows these crates to still reuse the same low-level routines in this crate instead of | 
 | //! going to the (much more dangerous) unix calls. | 
 | //! | 
 | //! # What this crate provides | 
 | //! | 
 | //! The only thing this crate does is multiplexing the signals. An application or library can add | 
 | //! or remove callbacks and have multiple callbacks for the same signal. | 
 | //! | 
 | //! It handles dispatching the callbacks and managing them in a way that uses only the | 
 | //! [async-signal-safe] functions inside the signal handler. Note that the callbacks are still run | 
 | //! inside the signal handler, so it is up to the caller to ensure they are also | 
 | //! [async-signal-safe]. | 
 | //! | 
 | //! # What this is for | 
 | //! | 
 | //! This is a building block for other libraries creating reasonable abstractions on top of | 
 | //! signals. The [signal-hook] is the generally preferred way if you need to handle signals in your | 
 | //! application and provides several safe patterns of doing so. | 
 | //! | 
 | //! # Rust version compatibility | 
 | //! | 
 | //! Currently builds on 1.26.0 an newer and this is very unlikely to change. However, tests | 
 | //! require dependencies that don't build there, so tests need newer Rust version (they are run on | 
 | //! stable). | 
 | //! | 
 | //! # Portability | 
 | //! | 
 | //! This crate includes a limited support for Windows, based on `signal`/`raise` in the CRT. | 
 | //! There are differences in both API and behavior: | 
 | //! | 
 | //! - Due to lack of `siginfo_t`, we don't provide `register_sigaction` or `register_unchecked`. | 
 | //! - Due to lack of signal blocking, there's a race condition. | 
 | //!   After the call to `signal`, there's a moment where we miss a signal. | 
 | //!   That means when you register a handler, there may be a signal which invokes | 
 | //!   neither the default handler or the handler you register. | 
 | //! - Handlers registered by `signal` in Windows are cleared on first signal. | 
 | //!   To match behavior in other platforms, we re-register the handler each time the handler is | 
 | //!   called, but there's a moment where we miss a handler. | 
 | //!   That means when you receive two signals in a row, there may be a signal which invokes | 
 | //!   the default handler, nevertheless you certainly have registered the handler. | 
 | //! | 
 | //! [signal-hook]: https://docs.rs/signal-hook | 
 | //! [async-signal-safe]: http://www.man7.org/linux/man-pages/man7/signal-safety.7.html | 
 |  | 
 | extern crate libc; | 
 |  | 
 | mod half_lock; | 
 |  | 
 | use std::collections::hash_map::Entry; | 
 | use std::collections::{BTreeMap, HashMap}; | 
 | use std::io::Error; | 
 | use std::mem; | 
 | #[cfg(not(windows))] | 
 | use std::ptr; | 
 | // Once::new is now a const-fn. But it is not stable in all the rustc versions we want to support | 
 | // yet. | 
 | #[allow(deprecated)] | 
 | use std::sync::ONCE_INIT; | 
 | use std::sync::{Arc, Once}; | 
 |  | 
 | #[cfg(not(windows))] | 
 | use libc::{c_int, c_void, sigaction, siginfo_t}; | 
 | #[cfg(windows)] | 
 | use libc::{c_int, sighandler_t}; | 
 |  | 
 | #[cfg(not(windows))] | 
 | use libc::{SIGFPE, SIGILL, SIGKILL, SIGSEGV, SIGSTOP}; | 
 | #[cfg(windows)] | 
 | use libc::{SIGFPE, SIGILL, SIGSEGV}; | 
 |  | 
 | use half_lock::HalfLock; | 
 |  | 
 | // These constants are not defined in the current version of libc, but it actually | 
 | // exists in Windows CRT. | 
 | #[cfg(windows)] | 
 | const SIG_DFL: sighandler_t = 0; | 
 | #[cfg(windows)] | 
 | const SIG_IGN: sighandler_t = 1; | 
 | #[cfg(windows)] | 
 | const SIG_GET: sighandler_t = 2; | 
 | #[cfg(windows)] | 
 | const SIG_ERR: sighandler_t = !0; | 
 |  | 
 | // To simplify implementation. Not to be exposed. | 
 | #[cfg(windows)] | 
 | #[allow(non_camel_case_types)] | 
 | struct siginfo_t; | 
 |  | 
 | // # Internal workings | 
 | // | 
 | // This uses a form of RCU. There's an atomic pointer to the current action descriptors (in the | 
 | // form of IndependentArcSwap, to be able to track what, if any, signal handlers still use the | 
 | // version). A signal handler takes a copy of the pointer and calls all the relevant actions. | 
 | // | 
 | // Modifications to that are protected by a mutex, to avoid juggling multiple signal handlers at | 
 | // once (eg. not calling sigaction concurrently). This should not be a problem, because modifying | 
 | // the signal actions should be initialization only anyway. To avoid all allocations and also | 
 | // deallocations inside the signal handler, after replacing the pointer, the modification routine | 
 | // needs to busy-wait for the reference count on the old pointer to drop to 1 and take ownership ‒ | 
 | // that way the one deallocating is the modification routine, outside of the signal handler. | 
 |  | 
 | #[derive(Copy, Clone, Debug, Eq, PartialEq, Ord, PartialOrd, Hash)] | 
 | struct ActionId(u128); | 
 |  | 
 | /// An ID of registered action. | 
 | /// | 
 | /// This is returned by all the registration routines and can be used to remove the action later on | 
 | /// with a call to [`unregister`]. | 
 | #[derive(Copy, Clone, Debug, Eq, PartialEq, Ord, PartialOrd, Hash)] | 
 | pub struct SigId { | 
 |     signal: c_int, | 
 |     action: ActionId, | 
 | } | 
 |  | 
 | // This should be dyn Fn(...), but we want to support Rust 1.26.0 and that one doesn't allow dyn | 
 | // yet. | 
 | #[allow(unknown_lints, bare_trait_objects)] | 
 | type Action = Fn(&siginfo_t) + Send + Sync; | 
 |  | 
 | #[derive(Clone)] | 
 | struct Slot { | 
 |     prev: Prev, | 
 |     // We use BTreeMap here, because we want to run the actions in the order they were inserted. | 
 |     // This works, because the ActionIds are assigned in an increasing order. | 
 |     actions: BTreeMap<ActionId, Arc<Action>>, | 
 | } | 
 |  | 
 | impl Slot { | 
 |     #[cfg(windows)] | 
 |     fn new(signal: libc::c_int) -> Result<Self, Error> { | 
 |         let old = unsafe { libc::signal(signal, handler as sighandler_t) }; | 
 |         if old == SIG_ERR { | 
 |             return Err(Error::last_os_error()); | 
 |         } | 
 |         Ok(Slot { | 
 |             prev: Prev { signal, info: old }, | 
 |             actions: BTreeMap::new(), | 
 |         }) | 
 |     } | 
 |  | 
 |     #[cfg(not(windows))] | 
 |     fn new(signal: libc::c_int) -> Result<Self, Error> { | 
 |         // C data structure, expected to be zeroed out. | 
 |         let mut new: libc::sigaction = unsafe { mem::zeroed() }; | 
 |         #[cfg(not(target_os = "aix"))] | 
 |         { new.sa_sigaction = handler as usize; } | 
 |         #[cfg(target_os = "aix")] | 
 |         { new.sa_union.__su_sigaction = handler; } | 
 |         // Android is broken and uses different int types than the rest (and different depending on | 
 |         // the pointer width). This converts the flags to the proper type no matter what it is on | 
 |         // the given platform. | 
 |         let flags = libc::SA_RESTART; | 
 |         #[allow(unused_assignments)] | 
 |         let mut siginfo = flags; | 
 |         siginfo = libc::SA_SIGINFO as _; | 
 |         let flags = flags | siginfo; | 
 |         new.sa_flags = flags as _; | 
 |         // C data structure, expected to be zeroed out. | 
 |         let mut old: libc::sigaction = unsafe { mem::zeroed() }; | 
 |         // FFI ‒ pointers are valid, it doesn't take ownership. | 
 |         if unsafe { libc::sigaction(signal, &new, &mut old) } != 0 { | 
 |             return Err(Error::last_os_error()); | 
 |         } | 
 |         Ok(Slot { | 
 |             prev: Prev { signal, info: old }, | 
 |             actions: BTreeMap::new(), | 
 |         }) | 
 |     } | 
 | } | 
 |  | 
 | #[derive(Clone)] | 
 | struct SignalData { | 
 |     signals: HashMap<c_int, Slot>, | 
 |     next_id: u128, | 
 | } | 
 |  | 
 | #[derive(Clone)] | 
 | struct Prev { | 
 |     signal: c_int, | 
 |     #[cfg(windows)] | 
 |     info: sighandler_t, | 
 |     #[cfg(not(windows))] | 
 |     info: sigaction, | 
 | } | 
 |  | 
 | impl Prev { | 
 |     #[cfg(windows)] | 
 |     fn detect(signal: c_int) -> Result<Self, Error> { | 
 |         let old = unsafe { libc::signal(signal, SIG_GET) }; | 
 |         if old == SIG_ERR { | 
 |             return Err(Error::last_os_error()); | 
 |         } | 
 |         Ok(Prev { signal, info: old }) | 
 |     } | 
 |  | 
 |     #[cfg(not(windows))] | 
 |     fn detect(signal: c_int) -> Result<Self, Error> { | 
 |         // C data structure, expected to be zeroed out. | 
 |         let mut old: libc::sigaction = unsafe { mem::zeroed() }; | 
 |         // FFI ‒ pointers are valid, it doesn't take ownership. | 
 |         if unsafe { libc::sigaction(signal, ptr::null(), &mut old) } != 0 { | 
 |             return Err(Error::last_os_error()); | 
 |         } | 
 |  | 
 |         Ok(Prev { signal, info: old }) | 
 |     } | 
 |  | 
 |     #[cfg(windows)] | 
 |     fn execute(&self, sig: c_int) { | 
 |         let fptr = self.info; | 
 |         if fptr != 0 && fptr != SIG_DFL && fptr != SIG_IGN { | 
 |             // FFI ‒ calling the original signal handler. | 
 |             unsafe { | 
 |                 let action = mem::transmute::<usize, extern "C" fn(c_int)>(fptr); | 
 |                 action(sig); | 
 |             } | 
 |         } | 
 |     } | 
 |  | 
 |     #[cfg(not(windows))] | 
 |     unsafe fn execute(&self, sig: c_int, info: *mut siginfo_t, data: *mut c_void) { | 
 |         #[cfg(not(target_os = "aix"))] | 
 |         let fptr = self.info.sa_sigaction; | 
 |         #[cfg(target_os = "aix")] | 
 |         let fptr = self.info.sa_union.__su_sigaction as usize; | 
 |         if fptr != 0 && fptr != libc::SIG_DFL && fptr != libc::SIG_IGN { | 
 |             // Android is broken and uses different int types than the rest (and different | 
 |             // depending on the pointer width). This converts the flags to the proper type no | 
 |             // matter what it is on the given platform. | 
 |             // | 
 |             // The trick is to create the same-typed variable as the sa_flags first and then | 
 |             // set it to the proper value (does Rust have a way to copy a type in a different | 
 |             // way?) | 
 |             #[allow(unused_assignments)] | 
 |             let mut siginfo = self.info.sa_flags; | 
 |             siginfo = libc::SA_SIGINFO as _; | 
 |             if self.info.sa_flags & siginfo == 0 { | 
 |                 let action = mem::transmute::<usize, extern "C" fn(c_int)>(fptr); | 
 |                 action(sig); | 
 |             } else { | 
 |                 type SigAction = extern "C" fn(c_int, *mut siginfo_t, *mut c_void); | 
 |                 let action = mem::transmute::<usize, SigAction>(fptr); | 
 |                 action(sig, info, data); | 
 |             } | 
 |         } | 
 |     } | 
 | } | 
 |  | 
 | /// Lazy-initiated data structure with our global variables. | 
 | /// | 
 | /// Used inside a structure to cut down on boilerplate code to lazy-initialize stuff. We don't dare | 
 | /// use anything fancy like lazy-static or once-cell, since we are not sure they are | 
 | /// async-signal-safe in their access. Our code uses the [Once], but only on the write end outside | 
 | /// of signal handler. The handler assumes it has already been initialized. | 
 | struct GlobalData { | 
 |     /// The data structure describing what needs to be run for each signal. | 
 |     data: HalfLock<SignalData>, | 
 |  | 
 |     /// A fallback to fight/minimize a race condition during signal initialization. | 
 |     /// | 
 |     /// See the comment inside [`register_unchecked_impl`]. | 
 |     race_fallback: HalfLock<Option<Prev>>, | 
 | } | 
 |  | 
 | static mut GLOBAL_DATA: Option<GlobalData> = None; | 
 | #[allow(deprecated)] | 
 | static GLOBAL_INIT: Once = ONCE_INIT; | 
 |  | 
 | impl GlobalData { | 
 |     fn get() -> &'static Self { | 
 |         unsafe { GLOBAL_DATA.as_ref().unwrap() } | 
 |     } | 
 |     fn ensure() -> &'static Self { | 
 |         GLOBAL_INIT.call_once(|| unsafe { | 
 |             GLOBAL_DATA = Some(GlobalData { | 
 |                 data: HalfLock::new(SignalData { | 
 |                     signals: HashMap::new(), | 
 |                     next_id: 1, | 
 |                 }), | 
 |                 race_fallback: HalfLock::new(None), | 
 |             }); | 
 |         }); | 
 |         Self::get() | 
 |     } | 
 | } | 
 |  | 
 | #[cfg(windows)] | 
 | extern "C" fn handler(sig: c_int) { | 
 |     if sig != SIGFPE { | 
 |         // Windows CRT `signal` resets handler every time, unless for SIGFPE. | 
 |         // Reregister the handler to retain maximal compatibility. | 
 |         // Problems: | 
 |         // - It's racy. But this is inevitably racy in Windows. | 
 |         // - Interacts poorly with handlers outside signal-hook-registry. | 
 |         let old = unsafe { libc::signal(sig, handler as sighandler_t) }; | 
 |         if old == SIG_ERR { | 
 |             // MSDN doesn't describe which errors might occur, | 
 |             // but we can tell from the Linux manpage that | 
 |             // EINVAL (invalid signal number) is mostly the only case. | 
 |             // Therefore, this branch must not occur. | 
 |             // In any case we can do nothing useful in the signal handler, | 
 |             // so we're going to abort silently. | 
 |             unsafe { | 
 |                 libc::abort(); | 
 |             } | 
 |         } | 
 |     } | 
 |  | 
 |     let globals = GlobalData::get(); | 
 |     let fallback = globals.race_fallback.read(); | 
 |     let sigdata = globals.data.read(); | 
 |  | 
 |     if let Some(ref slot) = sigdata.signals.get(&sig) { | 
 |         slot.prev.execute(sig); | 
 |  | 
 |         for action in slot.actions.values() { | 
 |             action(&siginfo_t); | 
 |         } | 
 |     } else if let Some(prev) = fallback.as_ref() { | 
 |         // In case we get called but don't have the slot for this signal set up yet, we are under | 
 |         // the race condition. We may have the old signal handler stored in the fallback | 
 |         // temporarily. | 
 |         if sig == prev.signal { | 
 |             prev.execute(sig); | 
 |         } | 
 |         // else -> probably should not happen, but races with other threads are possible so | 
 |         // better safe | 
 |     } | 
 | } | 
 |  | 
 | #[cfg(not(windows))] | 
 | extern "C" fn handler(sig: c_int, info: *mut siginfo_t, data: *mut c_void) { | 
 |     let globals = GlobalData::get(); | 
 |     let fallback = globals.race_fallback.read(); | 
 |     let sigdata = globals.data.read(); | 
 |  | 
 |     if let Some(slot) = sigdata.signals.get(&sig) { | 
 |         unsafe { slot.prev.execute(sig, info, data) }; | 
 |  | 
 |         let info = unsafe { info.as_ref() }; | 
 |         let info = info.unwrap_or_else(|| { | 
 |             // The info being null seems to be illegal according to POSIX, but has been observed on | 
 |             // some probably broken platform. We can't do anything about that, that is just broken, | 
 |             // but we are not allowed to panic in a signal handler, so we are left only with simply | 
 |             // aborting. We try to write a message what happens, but using the libc stuff | 
 |             // (`eprintln` is not guaranteed to be async-signal-safe). | 
 |             unsafe { | 
 |                 const MSG: &[u8] = | 
 |                     b"Platform broken, got NULL as siginfo to signal handler. Aborting"; | 
 |                 libc::write(2, MSG.as_ptr() as *const _, MSG.len()); | 
 |                 libc::abort(); | 
 |             } | 
 |         }); | 
 |  | 
 |         for action in slot.actions.values() { | 
 |             action(info); | 
 |         } | 
 |     } else if let Some(prev) = fallback.as_ref() { | 
 |         // In case we get called but don't have the slot for this signal set up yet, we are under | 
 |         // the race condition. We may have the old signal handler stored in the fallback | 
 |         // temporarily. | 
 |         if prev.signal == sig { | 
 |             unsafe { prev.execute(sig, info, data) }; | 
 |         } | 
 |         // else -> probably should not happen, but races with other threads are possible so | 
 |         // better safe | 
 |     } | 
 | } | 
 |  | 
 | /// List of forbidden signals. | 
 | /// | 
 | /// Some signals are impossible to replace according to POSIX and some are so special that this | 
 | /// library refuses to handle them (eg. SIGSEGV). The routines panic in case registering one of | 
 | /// these signals is attempted. | 
 | /// | 
 | /// See [`register`]. | 
 | pub const FORBIDDEN: &[c_int] = FORBIDDEN_IMPL; | 
 |  | 
 | #[cfg(windows)] | 
 | const FORBIDDEN_IMPL: &[c_int] = &[SIGILL, SIGFPE, SIGSEGV]; | 
 | #[cfg(not(windows))] | 
 | const FORBIDDEN_IMPL: &[c_int] = &[SIGKILL, SIGSTOP, SIGILL, SIGFPE, SIGSEGV]; | 
 |  | 
 | /// Registers an arbitrary action for the given signal. | 
 | /// | 
 | /// This makes sure there's a signal handler for the given signal. It then adds the action to the | 
 | /// ones called each time the signal is delivered. If multiple actions are set for the same signal, | 
 | /// all are called, in the order of registration. | 
 | /// | 
 | /// If there was a previous signal handler for the given signal, it is chained ‒ it will be called | 
 | /// as part of this library's signal handler, before any actions set through this function. | 
 | /// | 
 | /// On success, the function returns an ID that can be used to remove the action again with | 
 | /// [`unregister`]. | 
 | /// | 
 | /// # Panics | 
 | /// | 
 | /// If the signal is one of (see [`FORBIDDEN`]): | 
 | /// | 
 | /// * `SIGKILL` | 
 | /// * `SIGSTOP` | 
 | /// * `SIGILL` | 
 | /// * `SIGFPE` | 
 | /// * `SIGSEGV` | 
 | /// | 
 | /// The first two are not possible to override (and the underlying C functions simply ignore all | 
 | /// requests to do so, which smells of possible bugs, or return errors). The rest can be set, but | 
 | /// generally needs very special handling to do so correctly (direct manipulation of the | 
 | /// application's address space, `longjmp` and similar). Unless you know very well what you're | 
 | /// doing, you'll shoot yourself into the foot and this library won't help you with that. | 
 | /// | 
 | /// # Errors | 
 | /// | 
 | /// Since the library manipulates signals using the low-level C functions, all these can return | 
 | /// errors. Generally, the errors mean something like the specified signal does not exist on the | 
 | /// given platform ‒ after a program is debugged and tested on a given OS, it should never return | 
 | /// an error. | 
 | /// | 
 | /// However, if an error *is* returned, there are no guarantees if the given action was registered | 
 | /// or not. | 
 | /// | 
 | /// # Safety | 
 | /// | 
 | /// This function is unsafe, because the `action` is run inside a signal handler. The set of | 
 | /// functions allowed to be called from within is very limited (they are called async-signal-safe | 
 | /// functions by POSIX). These specifically do *not* contain mutexes and memory | 
 | /// allocation/deallocation. They *do* contain routines to terminate the program, to further | 
 | /// manipulate signals (by the low-level functions, not by this library) and to read and write file | 
 | /// descriptors. Calling program's own functions consisting only of these is OK, as is manipulating | 
 | /// program's variables ‒ however, as the action can be called on any thread that does not have the | 
 | /// given signal masked (by default no signal is masked on any thread), and mutexes are a no-go, | 
 | /// this is harder than it looks like at first. | 
 | /// | 
 | /// As panicking from within a signal handler would be a panic across FFI boundary (which is | 
 | /// undefined behavior), the passed handler must not panic. | 
 | /// | 
 | /// If you find these limitations hard to satisfy, choose from the helper functions in the | 
 | /// [signal-hook](https://docs.rs/signal-hook) crate ‒ these provide safe interface to use some | 
 | /// common signal handling patters. | 
 | /// | 
 | /// # Race condition | 
 | /// | 
 | /// Upon registering the first hook for a given signal into this library, there's a short race | 
 | /// condition under the following circumstances: | 
 | /// | 
 | /// * The program already has a signal handler installed for this particular signal (through some | 
 | ///   other library, possibly). | 
 | /// * Concurrently, some other thread installs a different signal handler while it is being | 
 | ///   installed by this library. | 
 | /// * At the same time, the signal is delivered. | 
 | /// | 
 | /// Under such conditions signal-hook might wrongly "chain" to the older signal handler for a short | 
 | /// while (until the registration is fully complete). | 
 | /// | 
 | /// Note that the exact conditions of the race condition might change in future versions of the | 
 | /// library. The recommended way to avoid it is to register signals before starting any additional | 
 | /// threads, or at least not to register signals concurrently. | 
 | /// | 
 | /// Alternatively, make sure all signals are handled through this library. | 
 | /// | 
 | /// # Performance | 
 | /// | 
 | /// Even when it is possible to repeatedly install and remove actions during the lifetime of a | 
 | /// program, the installation and removal is considered a slow operation and should not be done | 
 | /// very often. Also, there's limited (though huge) amount of distinct IDs (they are `u128`). | 
 | /// | 
 | /// # Examples | 
 | /// | 
 | /// ```rust | 
 | /// extern crate signal_hook_registry; | 
 | /// | 
 | /// use std::io::Error; | 
 | /// use std::process; | 
 | /// | 
 | /// fn main() -> Result<(), Error> { | 
 | ///     let signal = unsafe { | 
 | ///         signal_hook_registry::register(signal_hook::consts::SIGTERM, || process::abort()) | 
 | ///     }?; | 
 | ///     // Stuff here... | 
 | ///     signal_hook_registry::unregister(signal); // Not really necessary. | 
 | ///     Ok(()) | 
 | /// } | 
 | /// ``` | 
 | pub unsafe fn register<F>(signal: c_int, action: F) -> Result<SigId, Error> | 
 | where | 
 |     F: Fn() + Sync + Send + 'static, | 
 | { | 
 |     register_sigaction_impl(signal, move |_: &_| action()) | 
 | } | 
 |  | 
 | /// Register a signal action. | 
 | /// | 
 | /// This acts in the same way as [`register`], including the drawbacks, panics and performance | 
 | /// characteristics. The only difference is the provided action accepts a [`siginfo_t`] argument, | 
 | /// providing information about the received signal. | 
 | /// | 
 | /// # Safety | 
 | /// | 
 | /// See the details of [`register`]. | 
 | #[cfg(not(windows))] | 
 | pub unsafe fn register_sigaction<F>(signal: c_int, action: F) -> Result<SigId, Error> | 
 | where | 
 |     F: Fn(&siginfo_t) + Sync + Send + 'static, | 
 | { | 
 |     register_sigaction_impl(signal, action) | 
 | } | 
 |  | 
 | unsafe fn register_sigaction_impl<F>(signal: c_int, action: F) -> Result<SigId, Error> | 
 | where | 
 |     F: Fn(&siginfo_t) + Sync + Send + 'static, | 
 | { | 
 |     assert!( | 
 |         !FORBIDDEN.contains(&signal), | 
 |         "Attempted to register forbidden signal {}", | 
 |         signal, | 
 |     ); | 
 |     register_unchecked_impl(signal, action) | 
 | } | 
 |  | 
 | /// Register a signal action without checking for forbidden signals. | 
 | /// | 
 | /// This acts in the same way as [`register_unchecked`], including the drawbacks, panics and | 
 | /// performance characteristics. The only difference is the provided action doesn't accept a | 
 | /// [`siginfo_t`] argument. | 
 | /// | 
 | /// # Safety | 
 | /// | 
 | /// See the details of [`register`]. | 
 | pub unsafe fn register_signal_unchecked<F>(signal: c_int, action: F) -> Result<SigId, Error> | 
 | where | 
 |     F: Fn() + Sync + Send + 'static, | 
 | { | 
 |     register_unchecked_impl(signal, move |_: &_| action()) | 
 | } | 
 |  | 
 | /// Register a signal action without checking for forbidden signals. | 
 | /// | 
 | /// This acts the same way as [`register_sigaction`], but without checking for the [`FORBIDDEN`] | 
 | /// signals. All the signals passed are registered and it is up to the caller to make some sense of | 
 | /// them. | 
 | /// | 
 | /// Note that you really need to know what you're doing if you change eg. the `SIGSEGV` signal | 
 | /// handler. Generally, you don't want to do that. But unlike the other functions here, this | 
 | /// function still allows you to do it. | 
 | /// | 
 | /// # Safety | 
 | /// | 
 | /// See the details of [`register`]. | 
 | #[cfg(not(windows))] | 
 | pub unsafe fn register_unchecked<F>(signal: c_int, action: F) -> Result<SigId, Error> | 
 | where | 
 |     F: Fn(&siginfo_t) + Sync + Send + 'static, | 
 | { | 
 |     register_unchecked_impl(signal, action) | 
 | } | 
 |  | 
 | unsafe fn register_unchecked_impl<F>(signal: c_int, action: F) -> Result<SigId, Error> | 
 | where | 
 |     F: Fn(&siginfo_t) + Sync + Send + 'static, | 
 | { | 
 |     let globals = GlobalData::ensure(); | 
 |     let action = Arc::from(action); | 
 |  | 
 |     let mut lock = globals.data.write(); | 
 |  | 
 |     let mut sigdata = SignalData::clone(&lock); | 
 |     let id = ActionId(sigdata.next_id); | 
 |     sigdata.next_id += 1; | 
 |  | 
 |     match sigdata.signals.entry(signal) { | 
 |         Entry::Occupied(mut occupied) => { | 
 |             assert!(occupied.get_mut().actions.insert(id, action).is_none()); | 
 |         } | 
 |         Entry::Vacant(place) => { | 
 |             // While the sigaction/signal exchanges the old one atomically, we are not able to | 
 |             // atomically store it somewhere a signal handler could read it. That poses a race | 
 |             // condition where we could lose some signals delivered in between changing it and | 
 |             // storing it. | 
 |             // | 
 |             // Therefore we first store the old one in the fallback storage. The fallback only | 
 |             // covers the cases where the slot is not yet active and becomes "inert" after that, | 
 |             // even if not removed (it may get overwritten by some other signal, but for that the | 
 |             // mutex in globals.data must be unlocked here - and by that time we already stored the | 
 |             // slot. | 
 |             // | 
 |             // And yes, this still leaves a short race condition when some other thread could | 
 |             // replace the signal handler and we would be calling the outdated one for a short | 
 |             // time, until we install the slot. | 
 |             globals | 
 |                 .race_fallback | 
 |                 .write() | 
 |                 .store(Some(Prev::detect(signal)?)); | 
 |  | 
 |             let mut slot = Slot::new(signal)?; | 
 |             slot.actions.insert(id, action); | 
 |             place.insert(slot); | 
 |         } | 
 |     } | 
 |  | 
 |     lock.store(sigdata); | 
 |  | 
 |     Ok(SigId { signal, action: id }) | 
 | } | 
 |  | 
 | /// Removes a previously installed action. | 
 | /// | 
 | /// This function does nothing if the action was already removed. It returns true if it was removed | 
 | /// and false if the action wasn't found. | 
 | /// | 
 | /// It can unregister all the actions installed by [`register`] as well as the ones from downstream | 
 | /// crates (like [`signal-hook`](https://docs.rs/signal-hook)). | 
 | /// | 
 | /// # Warning | 
 | /// | 
 | /// This does *not* currently return the default/previous signal handler if the last action for a | 
 | /// signal was just unregistered. That means that if you replaced for example `SIGTERM` and then | 
 | /// removed the action, the program will effectively ignore `SIGTERM` signals from now on, not | 
 | /// terminate on them as is the default action. This is OK if you remove it as part of a shutdown, | 
 | /// but it is not recommended to remove termination actions during the normal runtime of | 
 | /// application (unless the desired effect is to create something that can be terminated only by | 
 | /// SIGKILL). | 
 | pub fn unregister(id: SigId) -> bool { | 
 |     let globals = GlobalData::ensure(); | 
 |     let mut replace = false; | 
 |     let mut lock = globals.data.write(); | 
 |     let mut sigdata = SignalData::clone(&lock); | 
 |     if let Some(slot) = sigdata.signals.get_mut(&id.signal) { | 
 |         replace = slot.actions.remove(&id.action).is_some(); | 
 |     } | 
 |     if replace { | 
 |         lock.store(sigdata); | 
 |     } | 
 |     replace | 
 | } | 
 |  | 
 | // We keep this one here for strict backwards compatibility, but the API is kind of bad. One can | 
 | // delete actions that don't belong to them, which is kind of against the whole idea of not | 
 | // breaking stuff for others. | 
 | #[deprecated( | 
 |     since = "1.3.0", | 
 |     note = "Don't use. Can influence unrelated parts of program / unknown actions" | 
 | )] | 
 | #[doc(hidden)] | 
 | pub fn unregister_signal(signal: c_int) -> bool { | 
 |     let globals = GlobalData::ensure(); | 
 |     let mut replace = false; | 
 |     let mut lock = globals.data.write(); | 
 |     let mut sigdata = SignalData::clone(&lock); | 
 |     if let Some(slot) = sigdata.signals.get_mut(&signal) { | 
 |         if !slot.actions.is_empty() { | 
 |             slot.actions.clear(); | 
 |             replace = true; | 
 |         } | 
 |     } | 
 |     if replace { | 
 |         lock.store(sigdata); | 
 |     } | 
 |     replace | 
 | } | 
 |  | 
 | #[cfg(test)] | 
 | mod tests { | 
 |     use std::sync::atomic::{AtomicUsize, Ordering}; | 
 |     use std::sync::Arc; | 
 |     use std::thread; | 
 |     use std::time::Duration; | 
 |  | 
 |     #[cfg(not(windows))] | 
 |     use libc::{pid_t, SIGUSR1, SIGUSR2}; | 
 |  | 
 |     #[cfg(windows)] | 
 |     use libc::SIGTERM as SIGUSR1; | 
 |     #[cfg(windows)] | 
 |     use libc::SIGTERM as SIGUSR2; | 
 |  | 
 |     use super::*; | 
 |  | 
 |     #[test] | 
 |     #[should_panic] | 
 |     fn panic_forbidden() { | 
 |         let _ = unsafe { register(SIGILL, || ()) }; | 
 |     } | 
 |  | 
 |     /// Registering the forbidden signals is allowed in the _unchecked version. | 
 |     #[test] | 
 |     #[allow(clippy::redundant_closure)] // Clippy, you're wrong. Because it changes the return value. | 
 |     fn forbidden_raw() { | 
 |         unsafe { register_signal_unchecked(SIGFPE, || std::process::abort()).unwrap() }; | 
 |     } | 
 |  | 
 |     #[test] | 
 |     fn signal_without_pid() { | 
 |         let status = Arc::new(AtomicUsize::new(0)); | 
 |         let action = { | 
 |             let status = Arc::clone(&status); | 
 |             move || { | 
 |                 status.store(1, Ordering::Relaxed); | 
 |             } | 
 |         }; | 
 |         unsafe { | 
 |             register(SIGUSR2, action).unwrap(); | 
 |             libc::raise(SIGUSR2); | 
 |         } | 
 |         for _ in 0..10 { | 
 |             thread::sleep(Duration::from_millis(100)); | 
 |             let current = status.load(Ordering::Relaxed); | 
 |             match current { | 
 |                 // Not yet | 
 |                 0 => continue, | 
 |                 // Good, we are done with the correct result | 
 |                 _ if current == 1 => return, | 
 |                 _ => panic!("Wrong result value {}", current), | 
 |             } | 
 |         } | 
 |         panic!("Timed out waiting for the signal"); | 
 |     } | 
 |  | 
 |     #[test] | 
 |     #[cfg(not(windows))] | 
 |     fn signal_with_pid() { | 
 |         let status = Arc::new(AtomicUsize::new(0)); | 
 |         let action = { | 
 |             let status = Arc::clone(&status); | 
 |             move |siginfo: &siginfo_t| { | 
 |                 // Hack: currently, libc exposes only the first 3 fields of siginfo_t. The pid | 
 |                 // comes somewhat later on. Therefore, we do a Really Ugly Hack and define our | 
 |                 // own structure (and hope it is correct on all platforms). But hey, this is | 
 |                 // only the tests, so we are going to get away with this. | 
 |                 #[repr(C)] | 
 |                 struct SigInfo { | 
 |                     _fields: [c_int; 3], | 
 |                     #[cfg(all(target_pointer_width = "64", target_os = "linux"))] | 
 |                     _pad: c_int, | 
 |                     pid: pid_t, | 
 |                 } | 
 |                 let s: &SigInfo = unsafe { | 
 |                     (siginfo as *const _ as usize as *const SigInfo) | 
 |                         .as_ref() | 
 |                         .unwrap() | 
 |                 }; | 
 |                 status.store(s.pid as usize, Ordering::Relaxed); | 
 |             } | 
 |         }; | 
 |         let pid; | 
 |         unsafe { | 
 |             pid = libc::getpid(); | 
 |             register_sigaction(SIGUSR2, action).unwrap(); | 
 |             libc::raise(SIGUSR2); | 
 |         } | 
 |         for _ in 0..10 { | 
 |             thread::sleep(Duration::from_millis(100)); | 
 |             let current = status.load(Ordering::Relaxed); | 
 |             match current { | 
 |                 // Not yet (PID == 0 doesn't happen) | 
 |                 0 => continue, | 
 |                 // Good, we are done with the correct result | 
 |                 _ if current == pid as usize => return, | 
 |                 _ => panic!("Wrong status value {}", current), | 
 |             } | 
 |         } | 
 |         panic!("Timed out waiting for the signal"); | 
 |     } | 
 |  | 
 |     /// Check that registration works as expected and that unregister tells if it did or not. | 
 |     #[test] | 
 |     fn register_unregister() { | 
 |         let signal = unsafe { register(SIGUSR1, || ()).unwrap() }; | 
 |         // It was there now, so we can unregister | 
 |         assert!(unregister(signal)); | 
 |         // The next time unregistering does nothing and tells us so. | 
 |         assert!(!unregister(signal)); | 
 |     } | 
 | } |