Signals are standardized messages sent to a running program to trigger specific behavior, such as quitting or error handling. They are a limited form of inter-process communication (IPC), typically used in Unix, Unix-like, and other POSIX-compliant operating systems.
A signal is an asynchronous notification sent to a process or to a specific thread within the same process to notify it of an event. Common uses of signals are to interrupt, suspend, terminate or kill a process. Signals originated in 1970s Bell Labs Unix and were later specified in the POSIX standard.
When a signal is sent, the operating system interrupts the target process's normal flow of execution to deliver the signal. Execution can be interrupted during any non-atomic instruction. If the process has previously registered a signal handler, that routine is executed. Otherwise, the default signal handler is executed.
Embedded programs may find signals useful for inter-process communications, as signals are notable for their algorithmic efficiency.
Signals are similar to interrupts, the difference being that interrupts are mediated by the CPU and handled by the kernel while signals are mediated by the kernel (possibly via system calls) and handled by individual processes. The kernel may pass an interrupt as a signal to the process that caused it (typical examples are SIGSEGV, SIGBUS, SIGILL and SIGFPE).
History
- Version 1 Unix (1971) had separate system calls to catch interrupts, quits, and machine traps.
- kill appeared in Version 2 (1972).
- Version 4 (1973) combined all traps into one call, signal.
- Version 5 (1974) could send arbitrary signals.1
- In Version 7 (1979) each numbered trap received a symbolic name.
- Plan 9 from Bell Labs (late 80s) replaced signals with notes, which permit sending short, arbitrary strings.2
Sending signals
The kill(2) system call sends a specified signal to a specified process, if permissions allow. Similarly, the kill(1) command allows a user to send signals to processes. The raise(3) library function sends the specified signal to the current process.
Exceptions such as division by zero, segmentation violation (SIGSEGV), and floating point exception (SIGFPE) will cause a core dump and terminate the program.
The kernel can generate signals to notify processes of events. For example, SIGPIPE will be generated when a process writes to a pipe which has been closed by the reader; by default, this causes the process to terminate, which is convenient when constructing shell pipelines.
Typing certain key combinations at the controlling terminal of a running process causes the system to send it certain signals:3
- Ctrl-C (in older Unixes, DEL) sends an INT signal ("interrupt", SIGINT); by default, this causes the process to terminate.
- Ctrl-Z sends a TSTP signal ("terminal stop", SIGTSTP); by default, this causes the process to suspend execution.4
- Ctrl-\ sends a QUIT signal (SIGQUIT); by default, this causes the process to terminate and dump core.
- Ctrl-T (not supported on all UNIXes) sends an INFO signal (SIGINFO); by default, and if supported by the command, this causes the operating system to show information about the running command.5
These default key combinations with modern operating systems can be changed with the stty command.
Handling signals
Signal handlers can be installed with the signal(2) or sigaction(2) system call. If a signal handler is not installed for a particular signal, the default handler is used. Otherwise the signal is intercepted and the signal handler is invoked. The process can also specify two default behaviors, without creating a handler: ignore the signal (SIG_IGN) and use the default signal handler (SIG_DFL). There are two signals which cannot be intercepted and handled: SIGKILL and SIGSTOP.
Risks
Signal handling is vulnerable to race conditions. As signals are asynchronous, another signal (even of the same type) can be delivered to the process during execution of the signal handling routine.
The sigprocmask(2) call can be used to block and unblock delivery of signals. Blocked signals are not delivered to the process until unblocked. Signals that cannot be ignored (SIGKILL and SIGSTOP) cannot be blocked.
Signals can cause the interruption of a system call in progress, leaving it to the application to manage a non-transparent restart.
Signal handlers should be written in a way that does not result in any unwanted side-effects, e.g. errno alteration, signal mask alteration, signal disposition change, and other global process attribute changes. Use of non-reentrant functions, e.g., malloc or printf, inside signal handlers is also unsafe. In particular, the POSIX specification and the Linux man page signal (7) require that all system functions directly or indirectly called from a signal function are async-signal safe.67 The signal-safety(7) man page gives a list of such async-signal safe system functions (practically the system calls), otherwise it is an undefined behavior.8 It is suggested to simply set some volatile sig_atomic_t variable in a signal handler, and to test it elsewhere.9
Signal handlers can instead put the signal into a queue and immediately return. The main thread will then continue "uninterrupted" until signals are taken from the queue, such as in an event loop. "Uninterrupted" here means that operations that block may return prematurely and must be resumed, as mentioned above. Signals should be processed from the queue on the main thread and not by worker pools, as that reintroduces the problem of asynchronicity. However, managing a queue is not possible in an async-signal safe way with only sig_atomic_t, as only single reads and writes to such variables are guaranteed to be atomic, not increments or (fetch-and)-decrements, as would be required for a queue. Thus, effectively, only one signal per handler can be queued safely with sig_atomic_t until it has been processed.
Relationship with hardware exceptions
A process's execution may result in the generation of a hardware exception, for instance, if the process attempts to divide by zero or incurs a page fault.
In Unix-like operating systems, this event automatically changes the processor context to start executing a kernel exception handler. In case of some exceptions, such as a page fault, the kernel has sufficient information to fully handle the event itself and resume the process's execution.
Other exceptions, however, the kernel cannot process intelligently and it must instead defer the exception handling operation to the faulting process. This deferral is achieved via the signal mechanism, wherein the kernel sends to the process a signal corresponding to the current exception. For example, if a process attempted integer divide by zero on an x86 CPU, a divide error exception would be generated and cause the kernel to send the SIGFPE signal to the process.
Similarly, if the process attempted to access a memory address outside of its virtual address space, the kernel would notify the process of this violation via a SIGSEGV (segmentation violation signal). The exact mapping between signal names and exceptions is obviously dependent upon the CPU, since exception types differ between architectures.
POSIX signals
The list below documents the signals specified in the Single Unix Specification Version 5. All signals are defined as macro constants in the <signal.h> header file. The name of the macro constant consists of a "SIG" prefix followed by a mnemonic name for the signal.
A process can define how to handle incoming POSIX signals. If a process does not define a behaviour for a signal, then the default handler for that signal is being used. The table below lists some default actions for POSIX-compliant UNIX systems, such as FreeBSD, OpenBSD and Linux.
Signal | Portablenumber | Default action | Description |
---|---|---|---|
SIGABRT | 6 | Terminate (core dump) | Process abort signal |
SIGALRM | 14 | Terminate | Alarm clock |
SIGBUS | — | Terminate (core dump) | Access to an undefined portion of a memory object |
SIGCHLD | — | Ignore | Child process terminated, stopped, or continued |
SIGCONT | — | Continue | Continue executing, if stopped |
SIGFPE | 8 | Terminate (core dump) | Erroneous arithmetic operation |
SIGHUP | 1 | Terminate | Hangup |
SIGILL | 4 | Terminate (core dump) | Illegal instruction |
SIGINT | 2 | Terminate | Terminal interrupt signal |
SIGKILL | 9 | Terminate | Kill (cannot be caught or ignored) |
SIGPIPE | 13 | Terminate | Write on a pipe with no one to read it |
SIGQUIT | 3 | Terminate (core dump) | Terminal quit signal |
SIGSEGV | 11 | Terminate (core dump) | Invalid memory reference |
SIGSTOP | — | Stop | Stop executing (cannot be caught or ignored) |
SIGSYS | — | Terminate (core dump) | Bad system call |
SIGTERM | 15 | Terminate | Termination signal |
SIGTRAP | 5 | Terminate (core dump) | Trace/breakpoint trap |
SIGTSTP | — | Stop | Terminal stop signal |
SIGTTIN | — | Stop | Background process attempting read |
SIGTTOU | — | Stop | Background process attempting write |
SIGUSR1 | — | Terminate | User-defined signal 1 |
SIGUSR2 | — | Terminate | User-defined signal 2 |
SIGURG | — | Ignore | Out-of-band data is available at a socket |
SIGVTALRM | — | Terminate | Virtual timer expired |
SIGXCPU | — | Terminate (core dump) | CPU time limit exceeded |
SIGXFSZ | — | Terminate (core dump) | File size limit exceeded |
SIGWINCH | — | Ignore | Terminal window size changed |
- Zombie processes cannot be killed since they are already dead and waiting for their parent processes to reap them.
- Processes that are in the blocked state will not die until they wake up again.
- The init process is special: It does not get signals that it does not want to handle, and thus it can ignore SIGKILL.14 An exception from this rule is while init is ptraced on Linux.1516
- An uninterruptibly sleeping process may not terminate (and free its resources) even when sent SIGKILL. This is one of the few cases in which a UNIX system may have to be rebooted to solve a temporary software problem.
Miscellaneous signals
The following signals are not specified in the POSIX specification. They are, however, sometimes used on various systems.
SIGEMT The SIGEMT signal is sent to a process when an emulator trap occurs. While an emulator usually means software that executes other programs, in this case it means a program executed a supervisor call instruction (EMT was the instruction for this purpose on the DEC PDP-11 series of computers.) SIGINFO The SIGINFO signal is sent to a process when a status (info) request is received from the controlling terminal. SIGPWR The SIGPWR signal is sent to a process when the system experiences a power failure. SIGLOST The SIGLOST signal is sent to a process when a file lock is lost. SIGSTKFLT The SIGSTKFLT signal is sent to a process when the coprocessor experiences a stack fault (i.e. popping when the stack is empty or pushing when it is full).23 It is defined by, but not used on Linux, where a x87 coprocessor stack fault will generate SIGFPE instead.24 SIGUNUSED The SIGUNUSED signal is sent to a process when a system call with an unused system call number is made. It is synonymous with SIGSYS on most architectures.25 SIGCLD The SIGCLD signal is synonymous with SIGCHLD.26See also
- Stevens, W. Richard (1992). Advanced Programming in the UNIX® Environment. Reading, Massachusetts: Addison Wesley. ISBN 0-201-56317-7.
- "The ®Open Group Base Specifications Issue 8, IEEE Std 1003.1™-2024 Edition". The Open Group. Retrieved 2 March 2025.
External links
- Unix Signals Table, Ali Alanjawi, University of Pittsburgh
- Man7.org Signal Man Page
- Introduction To Unix Signals Programming Introduction To Unix Signals Programming at the Wayback Machine (archived 26 September 2013)
- Another Introduction to Unix Signals Programming (blog post, 2009)
- UNIX and Reliable POSIX Signals[usurped] by Baris Simsek (stored by the Internet Archive)
- Signal Handlers by Henning Brauer
References
McIlroy, M. D. (1987). A Research Unix reader: annotated excerpts from the Programmer's Manual, 1971–1986 (PDF) (Technical report). CSTR. Bell Labs. 139. /wiki/Doug_McIlroy ↩
Gagliardi, Pietro. "C Programming in Plan 9 from Bell Labs". doc.cat-v.org. Retrieved 22 January 2022. https://doc.cat-v.org/plan_9/programming/c_programming_in_plan_9 ↩
"Termination Signals". The GNU C Library). https://www.gnu.org/software/libc/manual/html_node/Termination-Signals.html ↩
"Job Control Signals". The GNU C Library. https://www.gnu.org/software/libc/manual/html_node/Job-Control-Signals.html ↩
"Miscellaneous Signals". The GNU C Library. https://www.gnu.org/software/libc/manual/html_node/Miscellaneous-Signals.html ↩
"The Open Group Base Specifications Issue 6, IEEE Std 1003.1, 2004 Edition: System Interfaces Chapter 2". pubs.opengroup.org. Retrieved 20 December 2020. https://pubs.opengroup.org/onlinepubs/009695399/functions/xsh_chap02_04.html#tag_02_04 ↩
"signal(7) - Linux manual page". man7.org. Retrieved 20 December 2020. https://man7.org/linux/man-pages/man7/signal.7.html ↩
"signal-safety(7) - Linux manual page". man7.org. Retrieved 20 December 2020. https://man7.org/linux/man-pages/man7/signal-safety.7.html ↩
"The Open Group Base Specifications Issue 6, IEEE Std 1003.1, 2004 Edition:
". pubs.opengroup.org. Retrieved 20 December 2020. https://pubs.opengroup.org/onlinepubs/009695399/basedefs/signal.h.html ↩ "IEEE Std 1003.1-2017 - kill". IEEE, Open Group. The correspondence between integer values and the sig value used is shown in the following list. The effects of specifying any signal_number other than those listed below are undefined. https://pubs.opengroup.org/onlinepubs/9699919799/utilities/kill.html ↩
Michael Kerrisk (25 July 2009). "signal(7)". Linux Programmer's Manual (version 3.22). The Linux Kernel Archives. Retrieved 23 September 2009. https://www.kernel.org/doc/man-pages/online/pages/man7/signal.7.html ↩
"perlipc(1)". Perl Programmers Reference Guide, version 5.18. perldoc.perl.org - Official documentation for the Perl programming language. Retrieved 21 September 2013. https://perldoc.perl.org/perlipc.html#Handling-the-SIGHUP-Signal-in-Daemons ↩
"Proper handling of SIGINT and SIGQUIT". Retrieved 6 October 2012. https://www.cons.org/cracauer/sigint.html ↩
https://manpages.ubuntu.com/manpages/zesty/man2/kill.2.html Archived 28 January 2018 at the Wayback Machine section NOTES https://manpages.ubuntu.com/manpages/zesty/man2/kill.2.html ↩
"SIGKILL init process (PID 1)". Stack Overflow. https://stackoverflow.com/a/21031583 ↩
"Can root kill init process?". Unix & Linux Stack Exchange. https://unix.stackexchange.com/a/308429 ↩
"Mac Dev Center: What's New in Mac OS X: Mac OS X v10.6". 28 August 2009. Retrieved 18 November 2017. https://developer.apple.com/mac/library/releasenotes/MacOSX/WhatsNewInOSX/Articles/MacOSX10_6.html#//apple_ref/doc/uid/TP40008898-SW22 ↩
"ioctl - controls a STREAM device". POSIX system call specification. The Open Group. Retrieved 19 June 2015. https://pubs.opengroup.org/onlinepubs/9699919799/functions/ioctl.html ↩
"What is a "segmentation violation"?". support.microfocus.com. Retrieved 22 November 2018. https://support.microfocus.com/kb/doc.php?id=7001662 ↩
"Syscall User Dispatch – The Linux Kernel documentation". kernel.org. Retrieved 11 February 2021. https://www.kernel.org/doc/html/latest/admin-guide/syscall-user-dispatch.html ↩
"getrlimit, setrlimit - control maximum resource consumption". POSIX system call specification. The Open Group. Retrieved 10 September 2009. https://pubs.opengroup.org/onlinepubs/009695399/functions/getrlimit.html ↩
Clausecker, Robert (19 June 2017). "0001151: Introduce new signal SIGWINCH and functions tcsetsize(), tcgetsize() to get/set terminal window size". Austin Group Defect Tracker. Austin Group. Retrieved 12 October 2017. Accepted As Marked http://austingroupbugs.net/view.php?id=1151 ↩
"signal(7) — Linux manual pages". manpages.courier-mta.org. Retrieved 22 November 2018. https://manpages.courier-mta.org/htmlman7/signal.7.html ↩
"Linux 3.0 x86_64: When is SIGSTKFLT raised?". Stack Overflow. https://stackoverflow.com/questions/9332864/linux-3-0-x86-64-when-is-sigstkflt-raised#comment51557777_9333099 ↩
"signal(7) — Linux manual pages". manpages.courier-mta.org. Retrieved 22 November 2018. https://manpages.courier-mta.org/htmlman7/signal.7.html ↩
"signal(7) — Linux manual pages". manpages.courier-mta.org. Retrieved 22 November 2018. https://manpages.courier-mta.org/htmlman7/signal.7.html ↩