source: libcfa/src/interpose.cfa @ 640b3df

ADTast-experimental
Last change on this file since 640b3df was c910709, checked in by Peter A. Buhr <pabuhr@…>, 20 months ago

remove use of _GNU_SOURCE and RTLD_NEXT to provide alternate means for interposing

  • Property mode set to 100644
File size: 12.0 KB
RevLine 
[9d944b2]1//
2// Cforall Version 1.0.0 Copyright (C) 2016 University of Waterloo
3//
4// The contents of this file are covered under the licence agreement in the
5// file "LICENCE" distributed with Cforall.
6//
7// interpose.c --
8//
9// Author           : Thierry Delisle
10// Created On       : Wed Mar 29 16:10:31 2017
[6b0b624]11// Last Modified By : Peter A. Buhr
[c910709]12// Last Modified On : Sun Feb 19 17:09:16 2023
13// Update Count     : 183
[9d944b2]14//
15
[7867eb9]16#include <stdarg.h>                                                                             // va_start, va_end
[851fd92]17#include <stdio.h>
[7867eb9]18#include <string.h>                                                                             // strlen
19#include <unistd.h>                                                                             // _exit, getpid
[58b6d1b]20#include <signal.h>
[67db067]21extern "C" {
[7867eb9]22#include <dlfcn.h>                                                                              // dlopen, dlsym
23#include <execinfo.h>                                                                   // backtrace, messages
[9d944b2]24}
25
[73abe95]26#include "bits/debug.hfa"
27#include "bits/defs.hfa"
28#include "bits/signal.hfa"                                                              // sigHandler_?
29#include "startup.hfa"                                                                  // STARTUP_PRIORITY_CORE
[1d94116]30#include <assert.h>
[9d944b2]31
[3d5f2ef1]32//=============================================================================================
33// Interposing helpers
34//=============================================================================================
35
[032234bd]36static void preload_libgcc(void) {
[ad64520]37        dlopen( "libgcc_s.so.1", RTLD_NOW );
38        if ( const char * error = dlerror() ) abort( "interpose_symbol : internal error pre-loading libgcc, %s\n", error );
39}
40
[67db067]41typedef void (* generic_fptr_t)(void);
[95dab9e]42static generic_fptr_t do_interpose_symbol( void * library, const char symbol[], const char version[] ) {
43        const char * error;
44
45        union { generic_fptr_t fptr; void * ptr; } originalFunc;
46
[c910709]47        originalFunc.ptr = dlsym( library, symbol );
[95dab9e]48        error = dlerror();
49        if ( error ) abort( "interpose_symbol : internal error, %s\n", error );
50
51        return originalFunc.fptr;
52}
53
[032234bd]54static generic_fptr_t interpose_symbol( const char symbol[], const char version[] ) {
[9d944b2]55        static void * library;
[a7d696f]56        static void * pthread_library;
[fbdfcd8]57
[9d944b2]58        if ( ! library ) {
[c910709]59                library = dlopen( "libc.so.6", RTLD_LAZY );
60                const char * error = dlerror();
61                if ( error ) {
62                        abort( "interpose_symbol : failed to open libc, %s\n", error );
63                } // if
[9d944b2]64        } // if
[a7d696f]65        if ( ! pthread_library ) {
[c910709]66                pthread_library = dlopen( "libpthread.so", RTLD_LAZY );
67                const char * error = dlerror();
68                if ( error ) {
69                        abort( "interpose_symbol : failed to open libpthread, %s\n", error );
70                } // if
[a7d696f]71        } // if
[9d944b2]72
[95dab9e]73        return do_interpose_symbol(library, symbol, version);
[9d944b2]74}
75
[67db067]76#define INTERPOSE_LIBC( x, ver ) __cabi_libc.x = (typeof(__cabi_libc.x))interpose_symbol( #x, ver )
[3d5f2ef1]77
78//=============================================================================================
[67db067]79// Interposition Startup logic
[3d5f2ef1]80//=============================================================================================
[9d944b2]81
[032234bd]82static void sigHandler_segv( __CFA_SIGPARMS__ );
83static void sigHandler_ill ( __CFA_SIGPARMS__ );
84static void sigHandler_fpe ( __CFA_SIGPARMS__ );
85static void sigHandler_abrt( __CFA_SIGPARMS__ );
86static void sigHandler_term( __CFA_SIGPARMS__ );
[dbe9b08]87
[032234bd]88static struct {
[d7312ac]89        void (* exit)( int ) __attribute__(( __noreturn__ ));
90        void (* abort)( void ) __attribute__(( __noreturn__ ));
[3d5f2ef1]91} __cabi_libc;
92
[032234bd]93libcfa_public int cfa_main_returned;
[7dd98b6]94
[6bfe5cc]95extern "C" {
[95dab9e]96        void __cfathreadabi_interpose_startup( generic_fptr_t (*do_interpose_symbol)( void * library, const char symbol[], const char version[] ) ) __attribute__((weak));
[6bfe5cc]97        void __cfaabi_interpose_startup( void ) {
[8a13c47]98                const char *version = 0p;
[7dd98b6]99                cfa_main_returned = 0;
[9d944b2]100
[ad64520]101                preload_libgcc();
102
[d7312ac]103#pragma GCC diagnostic push
104#pragma GCC diagnostic ignored "-Wdiscarded-qualifiers"
[3d5f2ef1]105                INTERPOSE_LIBC( abort, version );
106                INTERPOSE_LIBC( exit , version );
[d7312ac]107#pragma GCC diagnostic pop
[dbe9b08]108
[95dab9e]109                if(__cfathreadabi_interpose_startup) __cfathreadabi_interpose_startup( do_interpose_symbol );
110
[8a13c47]111                // As a precaution (and necessity), errors that result in termination are delivered on a separate stack because
112                // task stacks might be very small (4K) and the signal delivery corrupts memory to the point that a clean
113                // shutdown is impossible. Also, when a stack overflow encounters the non-accessible sentinel page (debug only)
114                // and generates a segment fault, the signal cannot be delivered on the sentinel page. Finally, calls to abort
115                // print a stack trace that uses substantial stack space.
116
117                #define MINSTKSZ SIGSTKSZ * 8
118                static char stack[MINSTKSZ] __attribute__(( aligned (16) ));
119                static stack_t ss;
120
121                ss.ss_sp = stack;
122                ss.ss_size = MINSTKSZ;
123                ss.ss_flags = 0;
124                if ( sigaltstack( &ss, 0p ) == -1 ) {
125                        abort( "__cfaabi_interpose_startup : internal error, sigaltstack error(%d) %s.", errno, strerror( errno ) );
126                } // if
127
[de94a60]128                // Failure handler
[92bfda0]129                 // internal errors
130                __cfaabi_sigaction( SIGSEGV, sigHandler_segv, SA_SIGINFO | SA_ONSTACK ); // Invalid memory reference (default: Core)
131                __cfaabi_sigaction( SIGBUS , sigHandler_segv, SA_SIGINFO | SA_ONSTACK ); // Bus error, bad memory access (default: Core)
132                __cfaabi_sigaction( SIGILL , sigHandler_ill , SA_SIGINFO | SA_ONSTACK ); // Illegal Instruction (default: Core)
133                __cfaabi_sigaction( SIGFPE , sigHandler_fpe , SA_SIGINFO | SA_ONSTACK ); // Floating-point exception (default: Core)
134
135                // handlers to outside errors
136                // reset in-case they insist and send it over and over
137                __cfaabi_sigaction( SIGTERM, sigHandler_term, SA_SIGINFO | SA_ONSTACK | SA_RESETHAND ); // Termination signal (default: Term)
138                __cfaabi_sigaction( SIGINT , sigHandler_term, SA_SIGINFO | SA_ONSTACK | SA_RESETHAND ); // Interrupt from keyboard (default: Term)
139                __cfaabi_sigaction( SIGHUP , sigHandler_term, SA_SIGINFO | SA_ONSTACK | SA_RESETHAND ); // Hangup detected on controlling terminal or death of controlling process (default: Term)
140                __cfaabi_sigaction( SIGQUIT, sigHandler_term, SA_SIGINFO | SA_ONSTACK | SA_RESETHAND ); // Quit from keyboard (default: Core)
141                __cfaabi_sigaction( SIGABRT, sigHandler_term, SA_SIGINFO | SA_ONSTACK | SA_RESETHAND ); // Abort signal from abort(3) (default: Core)
[6bfe5cc]142        }
[9d944b2]143}
144
[dbe9b08]145//=============================================================================================
146// Terminating Signals logic
147//=============================================================================================
148
[3d5f2ef1]149// Forward declare abort after the __typeof__ call to avoid ambiguities
[032234bd]150libcfa_public void exit( int status, const char fmt[], ... ) __attribute__(( format(printf, 2, 3), __nothrow__, __leaf__, __noreturn__ ));
151libcfa_public void abort( const char fmt[], ... ) __attribute__(( format(printf, 1, 2), __nothrow__, __leaf__, __noreturn__ ));
152libcfa_public void abort( bool signalAbort, const char fmt[], ... ) __attribute__(( format(printf, 2, 3), __nothrow__, __leaf__, __noreturn__ ));
153libcfa_public void __abort( bool signalAbort, const char fmt[], va_list args ) __attribute__(( __nothrow__, __leaf__, __noreturn__ ));
[3d5f2ef1]154
[9d944b2]155extern "C" {
[032234bd]156        libcfa_public void abort( void ) __attribute__(( __nothrow__, __leaf__, __noreturn__ )) {
[1d94116]157                abort( false, "%s", "" );
[9d944b2]158        }
159
[032234bd]160        libcfa_public void __cabi_abort( const char fmt[], ... ) __attribute__(( format(printf, 1, 2), __nothrow__, __leaf__, __noreturn__ )) {
[3d5f2ef1]161                va_list argp;
162                va_start( argp, fmt );
[d870df3]163                __abort( false, fmt, argp );
[3d5f2ef1]164                va_end( argp );
[9d944b2]165        }
166
[032234bd]167        libcfa_public void exit( int status ) __attribute__(( __nothrow__, __leaf__, __noreturn__ )) {
[169d944]168                __cabi_libc.exit( status );
[3d5f2ef1]169        }
[9d944b2]170}
171
[92bfda0]172// See concurrency/kernel.cfa and concurrency/preemption.cfa for strong definition used in multi-processor mode.
173void __kernel_abort_lock( void ) __attribute__(( __nothrow__, __leaf__, __weak__ )) {}
174void __kernel_abort_msg( char buffer[], int size ) __attribute__(( __nothrow__, __leaf__, __weak__ )) {}
175int __kernel_abort_lastframe( void ) __attribute__(( __nothrow__, __leaf__, __weak__ )) { return 4; }
[9d944b2]176
177enum { abort_text_size = 1024 };
178static char abort_text[ abort_text_size ];
179
[8a13c47]180static void __cfaabi_backtrace( int start ) {
[74330e7]181        enum { Frames = 50, };                                                          // maximum number of stack frames
[92bfda0]182        int last = __kernel_abort_lastframe();                          // skip last N stack frames
[dbe9b08]183
184        void * array[Frames];
[6bfe5cc]185        size_t size = backtrace( array, Frames );
[74330e7]186        char ** messages = backtrace_symbols( array, size ); // does not demangle names
[dbe9b08]187
[8a13c47]188        *index( messages[0], '(' ) = '\0';                                      // find executable name
[1c40091]189        __cfaabi_bits_print_nolock( STDERR_FILENO, "Stack back trace for: %s\n", messages[0]);
[dbe9b08]190
[8a13c47]191        for ( unsigned int i = start; i < size - last && messages != 0p; i += 1 ) {
[524627e]192                char * name = 0p, * offset_begin = 0p, * offset_end = 0p;
[dbe9b08]193
[74330e7]194                for ( char * p = messages[i]; *p; p += 1 ) {    // find parantheses and +offset
[1c40091]195                        //__cfaabi_bits_print_nolock( "X %s\n", p);
[dbe9b08]196                        if ( *p == '(' ) {
197                                name = p;
[4f37255]198                        } else if ( *p == '+' ) {
[dbe9b08]199                                offset_begin = p;
[4f37255]200                        } else if ( *p == ')' ) {
[dbe9b08]201                                offset_end = p;
202                                break;
203                        }
204                }
205
[8a13c47]206                // if line contains symbol, print it
207                int frameNo = i - start;
[dbe9b08]208                if ( name && offset_begin && offset_end && name < offset_begin ) {
[8a13c47]209                        *name++ = '\0';                                                         // delimit strings
[dbe9b08]210                        *offset_begin++ = '\0';
211                        *offset_end++ = '\0';
212
[1c40091]213                        __cfaabi_bits_print_nolock( STDERR_FILENO, "(%i) %s : %s + %s %s\n", frameNo, messages[i], name, offset_begin, offset_end);
[4f37255]214                } else {                                                                                // otherwise, print the whole line
[1c40091]215                        __cfaabi_bits_print_nolock( STDERR_FILENO, "(%i) %s\n", frameNo, messages[i] );
[dbe9b08]216                }
217        }
218        free( messages );
219}
220
[8a13c47]221void exit( int status, const char fmt[], ... ) {
222        va_list args;
223        va_start( args, fmt );
224        vfprintf( stderr, fmt, args );
225        va_end( args );
226        __cabi_libc.exit( status );
227}
228
[92bfda0]229static volatile bool __abort_first = 0;
[6011658]230
[d870df3]231// Cannot forward va_list.
232void __abort( bool signalAbort, const char fmt[], va_list args ) {
[92bfda0]233        // Multiple threads can come here from multiple paths
234        // To make sure this is safe any concurrent/subsequent call to abort is redirected to libc-abort
235        bool first = ! __atomic_test_and_set( &__abort_first, __ATOMIC_SEQ_CST);
[8a13c47]236
[92bfda0]237        // Prevent preemption from kicking-in and messing with the abort
238        __kernel_abort_lock();
[8a13c47]239
[92bfda0]240        // first to abort ?
241        if ( !first ) {
242                // We aren't the first to abort just let C handle it
243                signal( SIGABRT, SIG_DFL );     // restore default in case we came here through the function.
244                __cabi_libc.abort();
245        }
[8a13c47]246
[92bfda0]247        int len = snprintf( abort_text, abort_text_size, "Cforall Runtime error (UNIX pid:%ld) ", (long int)getpid() ); // use UNIX pid (versus getPid)
248        __cfaabi_bits_write( STDERR_FILENO, abort_text, len );
[8a13c47]249
[92bfda0]250        // print the cause of the error
251        assert( fmt );
252        len = vsnprintf( abort_text, abort_text_size, fmt, args );
253        __cfaabi_bits_write( STDERR_FILENO, abort_text, len );
[6011658]254
[92bfda0]255        // add optional newline if missing at the end of the format text
256        if ( fmt[strlen( fmt ) - 1] != '\n' ) {
257                __cfaabi_bits_write( STDERR_FILENO, "\n", 1 );
258        } // if
[6011658]259
[92bfda0]260        // Give the kernel the chance to add some data in here
261        __kernel_abort_msg( abort_text, abort_text_size );
[6011658]262
[92bfda0]263        // print stack trace in handler
264        __cfaabi_backtrace( signalAbort ? 4 : 2 );
[6011658]265
[92bfda0]266        // Finally call abort
267        __cabi_libc.abort();
[5ccee64]268
[8a13c47]269}
270
271void abort( const char fmt[], ... ) {
272        va_list args;
273        va_start( args, fmt );
[d870df3]274        __abort( false, fmt, args );
275    // CONTROL NEVER REACHES HERE!
[8a13c47]276        va_end( args );
277}
278
[d870df3]279void abort( bool signalAbort, const char fmt[], ... ) {
280    va_list args;
281    va_start( args, fmt );
282    __abort( signalAbort, fmt, args );
283    // CONTROL NEVER REACHES HERE!
284    va_end( args );
285}
286
[dbe9b08]287void sigHandler_segv( __CFA_SIGPARMS__ ) {
[8a13c47]288                if ( sfp->si_addr == 0p ) {
289                        abort( true, "Null pointer (0p) dereference.\n" );
[1469a8a]290                } else {
[8a13c47]291                        abort( true, "%s at memory location %p.\n"
[1469a8a]292                                   "Possible cause is reading outside the address space or writing to a protected area within the address space with an invalid pointer or subscript.\n",
293                                   (sig == SIGSEGV ? "Segment fault" : "Bus error"), sfp->si_addr );
294                }
[2b8bc41]295}
296
297void sigHandler_ill( __CFA_SIGPARMS__ ) {
[8a13c47]298        abort( true, "Executing illegal instruction at location %p.\n"
[2b8bc41]299                        "Possible cause is stack corruption.\n",
300                        sfp->si_addr );
301}
302
303void sigHandler_fpe( __CFA_SIGPARMS__ ) {
304        const char * msg;
305
[a424315d]306        choose( sfp->si_code ) {
307          case FPE_INTDIV, FPE_FLTDIV: msg = "divide by zero";
308          case FPE_FLTOVF: msg = "overflow";
309          case FPE_FLTUND: msg = "underflow";
310          case FPE_FLTRES: msg = "inexact result";
311          case FPE_FLTINV: msg = "invalid operation";
[2b8bc41]312          default: msg = "unknown";
[a424315d]313        } // choose
[8a13c47]314        abort( true, "Computation error %s at location %p.\n", msg, sfp->si_addr );
[dbe9b08]315}
316
[94dea96]317void sigHandler_term( __CFA_SIGPARMS__ ) {
[8a13c47]318        abort( true, "Application interrupted by signal: %s.\n", strsignal( sig ) );
[94dea96]319}
320
[6b0b624]321// Local Variables: //
322// mode: c //
323// tab-width: 4 //
324// End: //
Note: See TracBrowser for help on using the repository browser.