Skip to content

Conversation

matt335672
Copy link
Member

The signal handlers for SIGTERM are put in place before the sigterm object is created. If a SIGTERM is received between the two, it is ignored and chansrv will not exit.

(cherry picked from commit 343e84a)

@metalefty - this is a minor issue for V0.10.x and probably isn't a priority for v0.10.3 now. It can go into v0.10.4. I found it while I was testing some improvements to sesexec.

The signal handlers for SIGTERM are put in place before the
sigterm object is created. If a SIGTERM is received between the
two, it is ignored and chansrv will not exit.

(cherry picked from commit 343e84a)
@metalefty
Copy link
Member

I have no time to look into this before the v0.10.3 release, let's merge this after v0.10.3.

@matt335672 matt335672 merged commit 600dfd6 into neutrinolabs:v0.10 May 6, 2025
13 checks passed
@matt335672 matt335672 deleted the v0_10_chansrv_race_condition branch May 6, 2025 10:34
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants