我需要 glibc 的异步信号安全函数列表
非系统调用的包装器,但类似 snprintf()、dprintf()
Non syscall's wrappers but something like snprintf(), dprintf()
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
非系统调用的包装器,但类似 snprintf()、dprintf()
Non syscall's wrappers but something like snprintf(), dprintf()
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
接受
或继续使用网站,即表示您同意使用 Cookies 和您的相关数据。
发布评论
评论(4)
我很确定你必须看到文档编辑:
来自
人信号
:I am pretty sure you have to see the documentationEdit:
How about this list then?
From
man signal
:最后最新版本的
man 7 signal-safety
包含感兴趣的列表:signal-safety.7.htmlFinally latest versions of
man 7 signal-safety
contain interested list: signal-safety.7.html这似乎很难确定,因为您不知道库例程可能决定调用什么随机不安全函数。该列表在不同版本的 glibc 之间也可能有所不同,或者如果您将其带到另一个类 Unix 系统中。似乎您必须分析大量调用堆栈才能找到答案,甚至从版本到版本、发行版到发行版,这可能有点不稳定。
也许您并不是在寻找替代的设计方法,但似乎更好的策略是:如果您的程序有事件循环,则使信号处理程序非常愚蠢,并仅设置事件循环将拾取的某些状态。这样您就可以在信号处理程序之外完成有意义的工作。
示例:假设您在某处有一个
poll()
循环。也许您可以包含信号处理程序可以写入的管道。然后,poll() 循环根据收到的信号执行一些重要的工作。This seems hard to determine, as you don't know what random unsafe function a library routine might decide to call. The list also might different between different versions of glibc, or if you take it to another Unix-like system. Seems like you'd have to analyze a lot of call stacks to find the answer, and even that may be a bit shaky from version to version, distro to distro.
Maybe you are not looking for alternative design approaches, but it seems like a better strategy would be: if your program has an event loop, make the signal handler very stupid and just setting some state that the event loop will pick up. That way you do the meaningful work outside of the signal handler.
Example: Let's say you've got a
poll()
loop somewhere. Maybe you could include a pipe that the signal handler can write to. Then thepoll()
loop does some non-trivial work based on being signaled by that.如果您尝试捕获堆栈跟踪:
通常
中止
会导致核心转储,可以通过调试器运行该核心转储以生成堆栈跟踪。或者,一种粗略的(但信号安全的)方法是
fork
和exec
一个单独的实用程序(例如“pstack”)来输出堆栈您崩溃的任务的踪迹。当exec
-ing 时(在fork
-ing 之后,在子进程中),您需要使用getppid
传递进程 ID;在父级中,您需要等待
它完成,然后再调用abort
。另一方面,如果您尝试在 SIGSEGV 之后执行“干净”退出(例如,确保调用 C++ 析构函数等),则应该警告您 POSIX 会说:
http://pubs.opengroup.org/onlinepubs/9699919799/functions/V2_chap02.html#tag_15_04_03_02 :
和 http://pubs.opengroup.org/onlinepubs/9699919799/functions /V2_chap02.html#tag_15_04_03_03:
If you're trying to capture a stack trace:
Typically
abort
would cause a core dump, which can be run through a debugger to produce the stack trace.Alternatively, a crude (but signal-safe) way of doing so would be to
fork
andexec
a separate utility (e.g. "pstack") to output a stack trace of your crashed task. Whenexec
-ing (afterfork
-ing, in the child), you'll need to pass your process ID usinggetppid
; and in the parent you'll need towait
for it to finish, before callingabort
.On the other hand, if you're trying to do a "clean" exit after SIGSEGV (e.g. ensuring C++ destructors get called, etc.) -- then you should be warned that POSIX says:
http://pubs.opengroup.org/onlinepubs/9699919799/functions/V2_chap02.html#tag_15_04_03_02:
and http://pubs.opengroup.org/onlinepubs/9699919799/functions/V2_chap02.html#tag_15_04_03_03: