source: libcfa/src/interpose.cfa @ 0e398ad

ADTast-experimental
Last change on this file since 0e398ad was e10714a, checked in by Peter A. Buhr <pabuhr@…>, 19 months ago

update interpose code, and document 32-bit interpose bug in glibc

  • Property mode set to 100644
File size: 12.5 KB
RevLine 
[9d944b2]1//
2// Cforall Version 1.0.0 Copyright (C) 2016 University of Waterloo
3//
4// The contents of this file are covered under the licence agreement in the
5// file "LICENCE" distributed with Cforall.
6//
7// interpose.c --
8//
9// Author           : Thierry Delisle
10// Created On       : Wed Mar 29 16:10:31 2017
[6b0b624]11// Last Modified By : Peter A. Buhr
[e10714a]12// Last Modified On : Mon Mar 27 21:09:03 2023
13// Update Count     : 196
[9d944b2]14//
15
[851fd92]16#include <stdio.h>
[7867eb9]17#include <unistd.h>                                                                             // _exit, getpid
[67db067]18extern "C" {
[7867eb9]19#include <dlfcn.h>                                                                              // dlopen, dlsym
20#include <execinfo.h>                                                                   // backtrace, messages
[9d944b2]21}
22
[73abe95]23#include "bits/defs.hfa"
24#include "bits/signal.hfa"                                                              // sigHandler_?
25#include "startup.hfa"                                                                  // STARTUP_PRIORITY_CORE
[1d94116]26#include <assert.h>
[9d944b2]27
[3d5f2ef1]28//=============================================================================================
29// Interposing helpers
30//=============================================================================================
31
[032234bd]32static void preload_libgcc(void) {
[ad64520]33        dlopen( "libgcc_s.so.1", RTLD_NOW );
34        if ( const char * error = dlerror() ) abort( "interpose_symbol : internal error pre-loading libgcc, %s\n", error );
35}
36
[67db067]37typedef void (* generic_fptr_t)(void);
[95dab9e]38
[089a0d7]39static generic_fptr_t do_interpose_symbol( void * library, const char symbol[], const char version[] ) {
[95dab9e]40        union { generic_fptr_t fptr; void * ptr; } originalFunc;
41
[e10714a]42        #if defined( _GNU_SOURCE )
43        if ( version ) {
44                originalFunc.ptr = dlvsym( library, symbol, version );
45        } else {
46                originalFunc.ptr = dlsym( library, symbol );
47        } // if
48        #else
[c910709]49        originalFunc.ptr = dlsym( library, symbol );
[e10714a]50        #endif // _GNU_SOURCE
51
52        if ( ! originalFunc.ptr ) {                                                     // == nullptr
[089a0d7]53                abort( "interpose_symbol : internal error, %s\n", dlerror() );
54        } // if
[95dab9e]55        return originalFunc.fptr;
56}
57
[032234bd]58static generic_fptr_t interpose_symbol( const char symbol[], const char version[] ) {
[8bb46d2]59        void * library;
[e10714a]60
[8bb46d2]61        #if defined( RTLD_NEXT )
62        library = RTLD_NEXT;
63        #else
[089a0d7]64        // missing RTLD_NEXT => must hard-code library name, assuming libstdc++
[8bb46d2]65        library = dlopen( "libc.so.6", RTLD_LAZY );
[089a0d7]66        if ( ! library ) {                                                                      // == nullptr
67                abort( "interpose_symbol : failed to open libc, %s\n", dlerror() );
[9d944b2]68        } // if
[089a0d7]69        #endif // RTLD_NEXT
[9d944b2]70
[089a0d7]71        return do_interpose_symbol( library, symbol, version );
[9d944b2]72}
73
[67db067]74#define INTERPOSE_LIBC( x, ver ) __cabi_libc.x = (typeof(__cabi_libc.x))interpose_symbol( #x, ver )
[3d5f2ef1]75
76//=============================================================================================
[67db067]77// Interposition Startup logic
[3d5f2ef1]78//=============================================================================================
[9d944b2]79
[032234bd]80static void sigHandler_segv( __CFA_SIGPARMS__ );
81static void sigHandler_ill ( __CFA_SIGPARMS__ );
82static void sigHandler_fpe ( __CFA_SIGPARMS__ );
83static void sigHandler_abrt( __CFA_SIGPARMS__ );
84static void sigHandler_term( __CFA_SIGPARMS__ );
[dbe9b08]85
[032234bd]86static struct {
[d7312ac]87        void (* exit)( int ) __attribute__(( __noreturn__ ));
88        void (* abort)( void ) __attribute__(( __noreturn__ ));
[3d5f2ef1]89} __cabi_libc;
90
[032234bd]91libcfa_public int cfa_main_returned;
[7dd98b6]92
[6bfe5cc]93extern "C" {
[95dab9e]94        void __cfathreadabi_interpose_startup( generic_fptr_t (*do_interpose_symbol)( void * library, const char symbol[], const char version[] ) ) __attribute__((weak));
[6bfe5cc]95        void __cfaabi_interpose_startup( void ) {
[8a13c47]96                const char *version = 0p;
[7dd98b6]97                cfa_main_returned = 0;
[9d944b2]98
[ad64520]99                preload_libgcc();
100
[43f29f6]101                #pragma GCC diagnostic push
102                #pragma GCC diagnostic ignored "-Wdiscarded-qualifiers"
[3d5f2ef1]103                INTERPOSE_LIBC( abort, version );
104                INTERPOSE_LIBC( exit , version );
[43f29f6]105                #pragma GCC diagnostic pop
[dbe9b08]106
[95dab9e]107                if(__cfathreadabi_interpose_startup) __cfathreadabi_interpose_startup( do_interpose_symbol );
108
[8bb46d2]109                // SKULLDUGGERY: In Ubuntu 22.04, someone augmented signal.h to allow SIGSTKSZ to be "sysconf(_SC_SIGSTKSZ)" in
110                // sigstksz.h, as well as 8192 in sigstack.h. HOWEVER, they forgot to provide a mechanism to tell signal.h to
111                // use sigstack.h rather than sigstksz.h. (I'm not happy.) By undefining _GNU_SOURCE before signal.h and
112                // redefining it afterwards, you can get 8192, but then nothing works correctly inside of signal.h without
113                // _GNU_SOURCE defined.  So what is needed is a way to get signal.h to use sigstack.h WITH _GNU_SOURCE defined.
114                // Basically something is wrong with features.h and its use in signal.h.
115
116                #undef SIGSTKSZ
117                #define SIGSTKSZ 8192
118
[8a13c47]119                // As a precaution (and necessity), errors that result in termination are delivered on a separate stack because
120                // task stacks might be very small (4K) and the signal delivery corrupts memory to the point that a clean
121                // shutdown is impossible. Also, when a stack overflow encounters the non-accessible sentinel page (debug only)
122                // and generates a segment fault, the signal cannot be delivered on the sentinel page. Finally, calls to abort
123                // print a stack trace that uses substantial stack space.
124
125                #define MINSTKSZ SIGSTKSZ * 8
126                static char stack[MINSTKSZ] __attribute__(( aligned (16) ));
127                static stack_t ss;
128
129                ss.ss_sp = stack;
130                ss.ss_size = MINSTKSZ;
131                ss.ss_flags = 0;
132                if ( sigaltstack( &ss, 0p ) == -1 ) {
133                        abort( "__cfaabi_interpose_startup : internal error, sigaltstack error(%d) %s.", errno, strerror( errno ) );
134                } // if
135
[de94a60]136                // Failure handler
[92bfda0]137                 // internal errors
138                __cfaabi_sigaction( SIGSEGV, sigHandler_segv, SA_SIGINFO | SA_ONSTACK ); // Invalid memory reference (default: Core)
139                __cfaabi_sigaction( SIGBUS , sigHandler_segv, SA_SIGINFO | SA_ONSTACK ); // Bus error, bad memory access (default: Core)
140                __cfaabi_sigaction( SIGILL , sigHandler_ill , SA_SIGINFO | SA_ONSTACK ); // Illegal Instruction (default: Core)
141                __cfaabi_sigaction( SIGFPE , sigHandler_fpe , SA_SIGINFO | SA_ONSTACK ); // Floating-point exception (default: Core)
142
143                // handlers to outside errors
144                // reset in-case they insist and send it over and over
145                __cfaabi_sigaction( SIGTERM, sigHandler_term, SA_SIGINFO | SA_ONSTACK | SA_RESETHAND ); // Termination signal (default: Term)
146                __cfaabi_sigaction( SIGINT , sigHandler_term, SA_SIGINFO | SA_ONSTACK | SA_RESETHAND ); // Interrupt from keyboard (default: Term)
147                __cfaabi_sigaction( SIGHUP , sigHandler_term, SA_SIGINFO | SA_ONSTACK | SA_RESETHAND ); // Hangup detected on controlling terminal or death of controlling process (default: Term)
148                __cfaabi_sigaction( SIGQUIT, sigHandler_term, SA_SIGINFO | SA_ONSTACK | SA_RESETHAND ); // Quit from keyboard (default: Core)
149                __cfaabi_sigaction( SIGABRT, sigHandler_term, SA_SIGINFO | SA_ONSTACK | SA_RESETHAND ); // Abort signal from abort(3) (default: Core)
[6bfe5cc]150        }
[9d944b2]151}
152
[dbe9b08]153//=============================================================================================
154// Terminating Signals logic
155//=============================================================================================
156
[3d5f2ef1]157// Forward declare abort after the __typeof__ call to avoid ambiguities
[032234bd]158libcfa_public void exit( int status, const char fmt[], ... ) __attribute__(( format(printf, 2, 3), __nothrow__, __leaf__, __noreturn__ ));
159libcfa_public void abort( const char fmt[], ... ) __attribute__(( format(printf, 1, 2), __nothrow__, __leaf__, __noreturn__ ));
160libcfa_public void abort( bool signalAbort, const char fmt[], ... ) __attribute__(( format(printf, 2, 3), __nothrow__, __leaf__, __noreturn__ ));
161libcfa_public void __abort( bool signalAbort, const char fmt[], va_list args ) __attribute__(( __nothrow__, __leaf__, __noreturn__ ));
[3d5f2ef1]162
[9d944b2]163extern "C" {
[032234bd]164        libcfa_public void abort( void ) __attribute__(( __nothrow__, __leaf__, __noreturn__ )) {
[1d94116]165                abort( false, "%s", "" );
[9d944b2]166        }
167
[032234bd]168        libcfa_public void __cabi_abort( const char fmt[], ... ) __attribute__(( format(printf, 1, 2), __nothrow__, __leaf__, __noreturn__ )) {
[3d5f2ef1]169                va_list argp;
170                va_start( argp, fmt );
[d870df3]171                __abort( false, fmt, argp );
[3d5f2ef1]172                va_end( argp );
[9d944b2]173        }
174
[032234bd]175        libcfa_public void exit( int status ) __attribute__(( __nothrow__, __leaf__, __noreturn__ )) {
[169d944]176                __cabi_libc.exit( status );
[3d5f2ef1]177        }
[9d944b2]178}
179
[92bfda0]180// See concurrency/kernel.cfa and concurrency/preemption.cfa for strong definition used in multi-processor mode.
181void __kernel_abort_lock( void ) __attribute__(( __nothrow__, __leaf__, __weak__ )) {}
182void __kernel_abort_msg( char buffer[], int size ) __attribute__(( __nothrow__, __leaf__, __weak__ )) {}
183int __kernel_abort_lastframe( void ) __attribute__(( __nothrow__, __leaf__, __weak__ )) { return 4; }
[9d944b2]184
185enum { abort_text_size = 1024 };
186static char abort_text[ abort_text_size ];
187
[8a13c47]188static void __cfaabi_backtrace( int start ) {
[74330e7]189        enum { Frames = 50, };                                                          // maximum number of stack frames
[92bfda0]190        int last = __kernel_abort_lastframe();                          // skip last N stack frames
[dbe9b08]191
192        void * array[Frames];
[6bfe5cc]193        size_t size = backtrace( array, Frames );
[74330e7]194        char ** messages = backtrace_symbols( array, size ); // does not demangle names
[dbe9b08]195
[8a13c47]196        *index( messages[0], '(' ) = '\0';                                      // find executable name
[1c40091]197        __cfaabi_bits_print_nolock( STDERR_FILENO, "Stack back trace for: %s\n", messages[0]);
[dbe9b08]198
[8a13c47]199        for ( unsigned int i = start; i < size - last && messages != 0p; i += 1 ) {
[524627e]200                char * name = 0p, * offset_begin = 0p, * offset_end = 0p;
[dbe9b08]201
[74330e7]202                for ( char * p = messages[i]; *p; p += 1 ) {    // find parantheses and +offset
[1c40091]203                        //__cfaabi_bits_print_nolock( "X %s\n", p);
[dbe9b08]204                        if ( *p == '(' ) {
205                                name = p;
[4f37255]206                        } else if ( *p == '+' ) {
[dbe9b08]207                                offset_begin = p;
[4f37255]208                        } else if ( *p == ')' ) {
[dbe9b08]209                                offset_end = p;
210                                break;
211                        }
212                }
213
[8a13c47]214                // if line contains symbol, print it
215                int frameNo = i - start;
[dbe9b08]216                if ( name && offset_begin && offset_end && name < offset_begin ) {
[8a13c47]217                        *name++ = '\0';                                                         // delimit strings
[dbe9b08]218                        *offset_begin++ = '\0';
219                        *offset_end++ = '\0';
220
[1c40091]221                        __cfaabi_bits_print_nolock( STDERR_FILENO, "(%i) %s : %s + %s %s\n", frameNo, messages[i], name, offset_begin, offset_end);
[4f37255]222                } else {                                                                                // otherwise, print the whole line
[1c40091]223                        __cfaabi_bits_print_nolock( STDERR_FILENO, "(%i) %s\n", frameNo, messages[i] );
[dbe9b08]224                }
225        }
226        free( messages );
227}
228
[8a13c47]229void exit( int status, const char fmt[], ... ) {
230        va_list args;
231        va_start( args, fmt );
232        vfprintf( stderr, fmt, args );
233        va_end( args );
234        __cabi_libc.exit( status );
235}
236
[92bfda0]237static volatile bool __abort_first = 0;
[6011658]238
[d870df3]239// Cannot forward va_list.
240void __abort( bool signalAbort, const char fmt[], va_list args ) {
[92bfda0]241        // Multiple threads can come here from multiple paths
242        // To make sure this is safe any concurrent/subsequent call to abort is redirected to libc-abort
243        bool first = ! __atomic_test_and_set( &__abort_first, __ATOMIC_SEQ_CST);
[8a13c47]244
[92bfda0]245        // Prevent preemption from kicking-in and messing with the abort
246        __kernel_abort_lock();
[8a13c47]247
[92bfda0]248        // first to abort ?
249        if ( !first ) {
250                // We aren't the first to abort just let C handle it
251                signal( SIGABRT, SIG_DFL );     // restore default in case we came here through the function.
252                __cabi_libc.abort();
253        }
[8a13c47]254
[92bfda0]255        int len = snprintf( abort_text, abort_text_size, "Cforall Runtime error (UNIX pid:%ld) ", (long int)getpid() ); // use UNIX pid (versus getPid)
256        __cfaabi_bits_write( STDERR_FILENO, abort_text, len );
[8a13c47]257
[92bfda0]258        // print the cause of the error
259        assert( fmt );
260        len = vsnprintf( abort_text, abort_text_size, fmt, args );
261        __cfaabi_bits_write( STDERR_FILENO, abort_text, len );
[6011658]262
[92bfda0]263        // add optional newline if missing at the end of the format text
264        if ( fmt[strlen( fmt ) - 1] != '\n' ) {
265                __cfaabi_bits_write( STDERR_FILENO, "\n", 1 );
266        } // if
[6011658]267
[92bfda0]268        // Give the kernel the chance to add some data in here
269        __kernel_abort_msg( abort_text, abort_text_size );
[6011658]270
[92bfda0]271        // print stack trace in handler
272        __cfaabi_backtrace( signalAbort ? 4 : 2 );
[6011658]273
[92bfda0]274        // Finally call abort
275        __cabi_libc.abort();
[5ccee64]276
[8a13c47]277}
278
279void abort( const char fmt[], ... ) {
280        va_list args;
281        va_start( args, fmt );
[d870df3]282        __abort( false, fmt, args );
[f883ef1]283        // CONTROL NEVER REACHES HERE!
[8a13c47]284        va_end( args );
285}
286
[d870df3]287void abort( bool signalAbort, const char fmt[], ... ) {
[f883ef1]288        va_list args;
289        va_start( args, fmt );
290        __abort( signalAbort, fmt, args );
291        // CONTROL NEVER REACHES HERE!
292        va_end( args );
[d870df3]293}
294
[dbe9b08]295void sigHandler_segv( __CFA_SIGPARMS__ ) {
[8a13c47]296                if ( sfp->si_addr == 0p ) {
297                        abort( true, "Null pointer (0p) dereference.\n" );
[1469a8a]298                } else {
[8a13c47]299                        abort( true, "%s at memory location %p.\n"
[1469a8a]300                                   "Possible cause is reading outside the address space or writing to a protected area within the address space with an invalid pointer or subscript.\n",
301                                   (sig == SIGSEGV ? "Segment fault" : "Bus error"), sfp->si_addr );
302                }
[2b8bc41]303}
304
305void sigHandler_ill( __CFA_SIGPARMS__ ) {
[8a13c47]306        abort( true, "Executing illegal instruction at location %p.\n"
[2b8bc41]307                        "Possible cause is stack corruption.\n",
308                        sfp->si_addr );
309}
310
311void sigHandler_fpe( __CFA_SIGPARMS__ ) {
312        const char * msg;
313
[a424315d]314        choose( sfp->si_code ) {
315          case FPE_INTDIV, FPE_FLTDIV: msg = "divide by zero";
316          case FPE_FLTOVF: msg = "overflow";
317          case FPE_FLTUND: msg = "underflow";
318          case FPE_FLTRES: msg = "inexact result";
319          case FPE_FLTINV: msg = "invalid operation";
[2b8bc41]320          default: msg = "unknown";
[a424315d]321        } // choose
[8a13c47]322        abort( true, "Computation error %s at location %p.\n", msg, sfp->si_addr );
[dbe9b08]323}
324
[94dea96]325void sigHandler_term( __CFA_SIGPARMS__ ) {
[8a13c47]326        abort( true, "Application interrupted by signal: %s.\n", strsignal( sig ) );
[94dea96]327}
328
[6b0b624]329// Local Variables: //
330// mode: c //
331// tab-width: 4 //
332// End: //
Note: See TracBrowser for help on using the repository browser.