Signals offer a unique, low-level way of communicating with processes. But under certain circumstances, they can kill processes, even when they should work.
This article is a deep dive on a classic race condition issue. If you’re hoping for an elegant and interesting article on how I identified a critical vulnerability in
tar, I’m sorry to say - there’s no such vulnerability. It all boils down to a simple race condition issue.
Signals are a special, but very primitive way for processes to communicate functionality. Signals are useful as they are
a standardized interface available to 99.99% of programs run on UNIX systems (in existence). Interaction can be done
with just the
While the signals API can be quite bare bones and simple, it’s technically much less complex compared to a network interface, usage of STDIN/STDOUT, a file, or even a shared memory segment. These other options might have a lot more features, but none of them are perfectly standardized, completely secure, or simple to use.
If you’re looking to allow basic communication with your program for very specific use cases and don’t need complexity or I/O, signals can be a great way to go.
This section is a bit of a tangent, but it’s a great example of how signals can be used in practice, as well as how I came across this issue. Skip to the next section if you just want to hear the error & solution.
tar command is a ubiquitous tool for creating and extracting archives. It’s a very simple tool, but it’s
extremely powerful. It’s also a great example of a program that uses signals.
A couple months ago, I was writing software to help bootstrap embedded devices. The software would use
tar to extract
a filesystem onto the device’s eMMC. Due to the size of the filesystem and the speed of the device, this process could
take some time - I wanted to add a progress bar to confirm that the process was still running & progress was being made.
tar doesn’t emit progress information under normal circumstances, and no alternatives were available
in my language of choice that maintained the speed of
tar. But looking into the documentation,
tar could receive
specific, designated signals to emit progress information for both archival and extraction
tar with the
--totals flag, it would emit a statistic when the operation completes. But to request
information during the operation, a signal must be chosen, like so
tar -x -f archive.tar --totals=SIGUSR1.
Emitting a signal can be done with the
kill command, like so:
kill -USR1 <pid>. This will send the
to the process with the given PID. The
USR1 signal is a user-defined signal, and is not used by the system.
And so, my plan was to start a tar process as usual with the
--totals flag, and then send the
USR1 signal to the
process occasionally to query an extraction operation’s progress. In Python, I used the
subprocess module to start
and manage the process.
import os import subprocess import signal import time import sys # Define the command to execute command = ["tar", "-xpf", sys.argv, "-C", sys.argv, "--totals=SIGUSR1"] # Start the subprocess print(' '.join(command)) process = subprocess.Popen(command, preexec_fn=os.setsid, stderr=subprocess.PIPE) try: while True: # Ping the subprocess with SIGUSR1 signal # NOTWORK: process.send_signal(signal.SIGUSR1) # NOTWORK: os.killpg(os.getpgid(process.pid), signal.SIGUSR1) subprocess.Popen(["kill", "-SIGUSR1", str(process.pid)]) print(process.stderr.readline().decode("utf-8").strip()) # print(process.stdout.readline().decode("utf-8").strip()) # Wait for a specified interval time.sleep(1.9) # Adjust the interval as needed except KeyboardInterrupt: # Handle Ctrl+C to gracefully terminate the script process.terminate() # Wait for the subprocess to complete process.wait()
You’ll notice I have three different ways to send signals shown, but only one of them is working. Moreover, instead of the signal not working like expected, the signal actually kills the process. When checked the exit code, one will find that the status code is the same as the signal number, but negated.
SIGUSR1 exits with
SIGUSR2 exits with
SIGHUP exits with
-2. In fact,
when you look into signals, this is the default behavior for processes exited by signals.
Signal Handlers Aren’t Instant
To my surprise, the handlers that programs like
tar provide aren’t available instantly - so much so that even Python
can send a signal before they’re registered.
I am still not sure as to how signal handlers are implemented - I would’ve assumed they are static, unchanging, and registered at program start, but that doesn’t seem to be the case - or at least, Python can beat them to the punch.
Whatever the case, the issue with my implementation is that the signal is sent before the handler is registered, and the default behavior of the signal takes over. For many signals (including the one[s] I was using), this is to terminate the process.
How to wait for Signal Handlers
Besides just waiting for a second, there’s a way to wait for signal handlers to be registered. Or rather, there’s a way to check whether signal handlers have been provided or a process.
On Unix systems (which is the only place you’re going to find Unix signals), there’s a special pseudo-filesystem that provides intimate details on a process. This includes things like the process’s name, state, PID, memory usage, threads, and of course: signal handlers.
See below, the contents of
/proc/<pid>/status for a process:
File: /proc/100162/status 1 │ Name: Isolated Web Co 2 │ Umask: 0002 3 │ State: S (sleeping) 4 │ Tgid: 100162 5 │ Ngid: 0 6 │ Pid: 100162 7 │ PPid: 6225 8 │ TracerPid: 0 9 │ Uid: 1000 1000 1000 1000 10 │ Gid: 1000 1000 1000 1000 11 │ FDSize: 512 12 │ Groups: 4 27 123 1000 1001 13 │ NStgid: 100162 14 │ NSpid: 100162 ... ... ... 33 │ CoreDumping: 0 34 │ THP_enabled: 1 35 │ Threads: 27 36 │ SigQ: 0/62382 37 │ SigPnd: 0000000000000000 38 │ ShdPnd: 0000000000000000 39 │ SigBlk: 0000000000000000 40 │ SigIgn: 0000000001011002 41 │ SigCgt: 0000000f40800ef8 <--- Focus on this line. 42 │ CapInh: 0000000000000000 43 │ CapPrm: 0000000000000000
We’re interested in
SigCgt (line 41), which is a bitmask of signals that are caught by the process. The specific bit depends on the platform, but in Python, this can be found in the signal module:
>>> from signal import SIGUSR1 >>> print(SIGUSR1) 10
We can parse the
SigCgt value using the the
int function and setting the radix to 16 (hexadecimal).
>>> int("0000000f40800ef8", 16) 65506643704
Checking whether or not the Nth bit is set can be done with the bitwise AND operator (
&) and a bitshift (
>>> sigcgt = int("0000000f40800ef8", 16) >>> mask = 1 << (SIGUSR1 - 1) >>> sigcgt & mask 512
If the result is non-zero, the bit is set. If the result is zero, the bit is not set.
By simply polling the process’s signal handlers, we can wait for the signal handler to be registered before sending the
Signal handlers are typically registered quickly, and they’re
Credit to Eryk Sun for explaining the issue and providing an immaculate solution to signal handlers in Python.