source: libcfa/src/interpose.cfa@ a5294af

ast-experimental
Last change on this file since a5294af was e10714a, checked in by Peter A. Buhr <pabuhr@…>, 2 years ago

update interpose code, and document 32-bit interpose bug in glibc

  • Property mode set to 100644
File size: 12.5 KB
RevLine 
[9d944b2]1//
2// Cforall Version 1.0.0 Copyright (C) 2016 University of Waterloo
3//
4// The contents of this file are covered under the licence agreement in the
5// file "LICENCE" distributed with Cforall.
6//
7// interpose.c --
8//
9// Author : Thierry Delisle
10// Created On : Wed Mar 29 16:10:31 2017
[6b0b624]11// Last Modified By : Peter A. Buhr
[e10714a]12// Last Modified On : Mon Mar 27 21:09:03 2023
13// Update Count : 196
[9d944b2]14//
15
[851fd92]16#include <stdio.h>
[7867eb9]17#include <unistd.h> // _exit, getpid
[67db067]18extern "C" {
[7867eb9]19#include <dlfcn.h> // dlopen, dlsym
20#include <execinfo.h> // backtrace, messages
[9d944b2]21}
22
[73abe95]23#include "bits/defs.hfa"
24#include "bits/signal.hfa" // sigHandler_?
25#include "startup.hfa" // STARTUP_PRIORITY_CORE
[1d94116]26#include <assert.h>
[9d944b2]27
[3d5f2ef1]28//=============================================================================================
29// Interposing helpers
30//=============================================================================================
31
[032234bd]32static void preload_libgcc(void) {
[ad64520]33 dlopen( "libgcc_s.so.1", RTLD_NOW );
34 if ( const char * error = dlerror() ) abort( "interpose_symbol : internal error pre-loading libgcc, %s\n", error );
35}
36
[67db067]37typedef void (* generic_fptr_t)(void);
[95dab9e]38
[089a0d7]39static generic_fptr_t do_interpose_symbol( void * library, const char symbol[], const char version[] ) {
[95dab9e]40 union { generic_fptr_t fptr; void * ptr; } originalFunc;
41
[e10714a]42 #if defined( _GNU_SOURCE )
43 if ( version ) {
44 originalFunc.ptr = dlvsym( library, symbol, version );
45 } else {
46 originalFunc.ptr = dlsym( library, symbol );
47 } // if
48 #else
[c910709]49 originalFunc.ptr = dlsym( library, symbol );
[e10714a]50 #endif // _GNU_SOURCE
51
52 if ( ! originalFunc.ptr ) { // == nullptr
[089a0d7]53 abort( "interpose_symbol : internal error, %s\n", dlerror() );
54 } // if
[95dab9e]55 return originalFunc.fptr;
56}
57
[032234bd]58static generic_fptr_t interpose_symbol( const char symbol[], const char version[] ) {
[8bb46d2]59 void * library;
[e10714a]60
[8bb46d2]61 #if defined( RTLD_NEXT )
62 library = RTLD_NEXT;
63 #else
[089a0d7]64 // missing RTLD_NEXT => must hard-code library name, assuming libstdc++
[8bb46d2]65 library = dlopen( "libc.so.6", RTLD_LAZY );
[089a0d7]66 if ( ! library ) { // == nullptr
67 abort( "interpose_symbol : failed to open libc, %s\n", dlerror() );
[9d944b2]68 } // if
[089a0d7]69 #endif // RTLD_NEXT
[9d944b2]70
[089a0d7]71 return do_interpose_symbol( library, symbol, version );
[9d944b2]72}
73
[67db067]74#define INTERPOSE_LIBC( x, ver ) __cabi_libc.x = (typeof(__cabi_libc.x))interpose_symbol( #x, ver )
[3d5f2ef1]75
76//=============================================================================================
[67db067]77// Interposition Startup logic
[3d5f2ef1]78//=============================================================================================
[9d944b2]79
[032234bd]80static void sigHandler_segv( __CFA_SIGPARMS__ );
81static void sigHandler_ill ( __CFA_SIGPARMS__ );
82static void sigHandler_fpe ( __CFA_SIGPARMS__ );
83static void sigHandler_abrt( __CFA_SIGPARMS__ );
84static void sigHandler_term( __CFA_SIGPARMS__ );
[dbe9b08]85
[032234bd]86static struct {
[d7312ac]87 void (* exit)( int ) __attribute__(( __noreturn__ ));
88 void (* abort)( void ) __attribute__(( __noreturn__ ));
[3d5f2ef1]89} __cabi_libc;
90
[032234bd]91libcfa_public int cfa_main_returned;
[7dd98b6]92
[6bfe5cc]93extern "C" {
[95dab9e]94 void __cfathreadabi_interpose_startup( generic_fptr_t (*do_interpose_symbol)( void * library, const char symbol[], const char version[] ) ) __attribute__((weak));
[6bfe5cc]95 void __cfaabi_interpose_startup( void ) {
[8a13c47]96 const char *version = 0p;
[7dd98b6]97 cfa_main_returned = 0;
[9d944b2]98
[ad64520]99 preload_libgcc();
100
[43f29f6]101 #pragma GCC diagnostic push
102 #pragma GCC diagnostic ignored "-Wdiscarded-qualifiers"
[3d5f2ef1]103 INTERPOSE_LIBC( abort, version );
104 INTERPOSE_LIBC( exit , version );
[43f29f6]105 #pragma GCC diagnostic pop
[dbe9b08]106
[95dab9e]107 if(__cfathreadabi_interpose_startup) __cfathreadabi_interpose_startup( do_interpose_symbol );
108
[8bb46d2]109 // SKULLDUGGERY: In Ubuntu 22.04, someone augmented signal.h to allow SIGSTKSZ to be "sysconf(_SC_SIGSTKSZ)" in
110 // sigstksz.h, as well as 8192 in sigstack.h. HOWEVER, they forgot to provide a mechanism to tell signal.h to
111 // use sigstack.h rather than sigstksz.h. (I'm not happy.) By undefining _GNU_SOURCE before signal.h and
112 // redefining it afterwards, you can get 8192, but then nothing works correctly inside of signal.h without
113 // _GNU_SOURCE defined. So what is needed is a way to get signal.h to use sigstack.h WITH _GNU_SOURCE defined.
114 // Basically something is wrong with features.h and its use in signal.h.
115
116 #undef SIGSTKSZ
117 #define SIGSTKSZ 8192
118
[8a13c47]119 // As a precaution (and necessity), errors that result in termination are delivered on a separate stack because
120 // task stacks might be very small (4K) and the signal delivery corrupts memory to the point that a clean
121 // shutdown is impossible. Also, when a stack overflow encounters the non-accessible sentinel page (debug only)
122 // and generates a segment fault, the signal cannot be delivered on the sentinel page. Finally, calls to abort
123 // print a stack trace that uses substantial stack space.
124
125 #define MINSTKSZ SIGSTKSZ * 8
126 static char stack[MINSTKSZ] __attribute__(( aligned (16) ));
127 static stack_t ss;
128
129 ss.ss_sp = stack;
130 ss.ss_size = MINSTKSZ;
131 ss.ss_flags = 0;
132 if ( sigaltstack( &ss, 0p ) == -1 ) {
133 abort( "__cfaabi_interpose_startup : internal error, sigaltstack error(%d) %s.", errno, strerror( errno ) );
134 } // if
135
[de94a60]136 // Failure handler
[92bfda0]137 // internal errors
138 __cfaabi_sigaction( SIGSEGV, sigHandler_segv, SA_SIGINFO | SA_ONSTACK ); // Invalid memory reference (default: Core)
139 __cfaabi_sigaction( SIGBUS , sigHandler_segv, SA_SIGINFO | SA_ONSTACK ); // Bus error, bad memory access (default: Core)
140 __cfaabi_sigaction( SIGILL , sigHandler_ill , SA_SIGINFO | SA_ONSTACK ); // Illegal Instruction (default: Core)
141 __cfaabi_sigaction( SIGFPE , sigHandler_fpe , SA_SIGINFO | SA_ONSTACK ); // Floating-point exception (default: Core)
142
143 // handlers to outside errors
144 // reset in-case they insist and send it over and over
145 __cfaabi_sigaction( SIGTERM, sigHandler_term, SA_SIGINFO | SA_ONSTACK | SA_RESETHAND ); // Termination signal (default: Term)
146 __cfaabi_sigaction( SIGINT , sigHandler_term, SA_SIGINFO | SA_ONSTACK | SA_RESETHAND ); // Interrupt from keyboard (default: Term)
147 __cfaabi_sigaction( SIGHUP , sigHandler_term, SA_SIGINFO | SA_ONSTACK | SA_RESETHAND ); // Hangup detected on controlling terminal or death of controlling process (default: Term)
148 __cfaabi_sigaction( SIGQUIT, sigHandler_term, SA_SIGINFO | SA_ONSTACK | SA_RESETHAND ); // Quit from keyboard (default: Core)
149 __cfaabi_sigaction( SIGABRT, sigHandler_term, SA_SIGINFO | SA_ONSTACK | SA_RESETHAND ); // Abort signal from abort(3) (default: Core)
[6bfe5cc]150 }
[9d944b2]151}
152
[dbe9b08]153//=============================================================================================
154// Terminating Signals logic
155//=============================================================================================
156
[3d5f2ef1]157// Forward declare abort after the __typeof__ call to avoid ambiguities
[032234bd]158libcfa_public void exit( int status, const char fmt[], ... ) __attribute__(( format(printf, 2, 3), __nothrow__, __leaf__, __noreturn__ ));
159libcfa_public void abort( const char fmt[], ... ) __attribute__(( format(printf, 1, 2), __nothrow__, __leaf__, __noreturn__ ));
160libcfa_public void abort( bool signalAbort, const char fmt[], ... ) __attribute__(( format(printf, 2, 3), __nothrow__, __leaf__, __noreturn__ ));
161libcfa_public void __abort( bool signalAbort, const char fmt[], va_list args ) __attribute__(( __nothrow__, __leaf__, __noreturn__ ));
[3d5f2ef1]162
[9d944b2]163extern "C" {
[032234bd]164 libcfa_public void abort( void ) __attribute__(( __nothrow__, __leaf__, __noreturn__ )) {
[1d94116]165 abort( false, "%s", "" );
[9d944b2]166 }
167
[032234bd]168 libcfa_public void __cabi_abort( const char fmt[], ... ) __attribute__(( format(printf, 1, 2), __nothrow__, __leaf__, __noreturn__ )) {
[3d5f2ef1]169 va_list argp;
170 va_start( argp, fmt );
[d870df3]171 __abort( false, fmt, argp );
[3d5f2ef1]172 va_end( argp );
[9d944b2]173 }
174
[032234bd]175 libcfa_public void exit( int status ) __attribute__(( __nothrow__, __leaf__, __noreturn__ )) {
[169d944]176 __cabi_libc.exit( status );
[3d5f2ef1]177 }
[9d944b2]178}
179
[92bfda0]180// See concurrency/kernel.cfa and concurrency/preemption.cfa for strong definition used in multi-processor mode.
181void __kernel_abort_lock( void ) __attribute__(( __nothrow__, __leaf__, __weak__ )) {}
182void __kernel_abort_msg( char buffer[], int size ) __attribute__(( __nothrow__, __leaf__, __weak__ )) {}
183int __kernel_abort_lastframe( void ) __attribute__(( __nothrow__, __leaf__, __weak__ )) { return 4; }
[9d944b2]184
185enum { abort_text_size = 1024 };
186static char abort_text[ abort_text_size ];
187
[8a13c47]188static void __cfaabi_backtrace( int start ) {
[74330e7]189 enum { Frames = 50, }; // maximum number of stack frames
[92bfda0]190 int last = __kernel_abort_lastframe(); // skip last N stack frames
[dbe9b08]191
192 void * array[Frames];
[6bfe5cc]193 size_t size = backtrace( array, Frames );
[74330e7]194 char ** messages = backtrace_symbols( array, size ); // does not demangle names
[dbe9b08]195
[8a13c47]196 *index( messages[0], '(' ) = '\0'; // find executable name
[1c40091]197 __cfaabi_bits_print_nolock( STDERR_FILENO, "Stack back trace for: %s\n", messages[0]);
[dbe9b08]198
[8a13c47]199 for ( unsigned int i = start; i < size - last && messages != 0p; i += 1 ) {
[524627e]200 char * name = 0p, * offset_begin = 0p, * offset_end = 0p;
[dbe9b08]201
[74330e7]202 for ( char * p = messages[i]; *p; p += 1 ) { // find parantheses and +offset
[1c40091]203 //__cfaabi_bits_print_nolock( "X %s\n", p);
[dbe9b08]204 if ( *p == '(' ) {
205 name = p;
[4f37255]206 } else if ( *p == '+' ) {
[dbe9b08]207 offset_begin = p;
[4f37255]208 } else if ( *p == ')' ) {
[dbe9b08]209 offset_end = p;
210 break;
211 }
212 }
213
[8a13c47]214 // if line contains symbol, print it
215 int frameNo = i - start;
[dbe9b08]216 if ( name && offset_begin && offset_end && name < offset_begin ) {
[8a13c47]217 *name++ = '\0'; // delimit strings
[dbe9b08]218 *offset_begin++ = '\0';
219 *offset_end++ = '\0';
220
[1c40091]221 __cfaabi_bits_print_nolock( STDERR_FILENO, "(%i) %s : %s + %s %s\n", frameNo, messages[i], name, offset_begin, offset_end);
[4f37255]222 } else { // otherwise, print the whole line
[1c40091]223 __cfaabi_bits_print_nolock( STDERR_FILENO, "(%i) %s\n", frameNo, messages[i] );
[dbe9b08]224 }
225 }
226 free( messages );
227}
228
[8a13c47]229void exit( int status, const char fmt[], ... ) {
230 va_list args;
231 va_start( args, fmt );
232 vfprintf( stderr, fmt, args );
233 va_end( args );
234 __cabi_libc.exit( status );
235}
236
[92bfda0]237static volatile bool __abort_first = 0;
[6011658]238
[d870df3]239// Cannot forward va_list.
240void __abort( bool signalAbort, const char fmt[], va_list args ) {
[92bfda0]241 // Multiple threads can come here from multiple paths
242 // To make sure this is safe any concurrent/subsequent call to abort is redirected to libc-abort
243 bool first = ! __atomic_test_and_set( &__abort_first, __ATOMIC_SEQ_CST);
[8a13c47]244
[92bfda0]245 // Prevent preemption from kicking-in and messing with the abort
246 __kernel_abort_lock();
[8a13c47]247
[92bfda0]248 // first to abort ?
249 if ( !first ) {
250 // We aren't the first to abort just let C handle it
251 signal( SIGABRT, SIG_DFL ); // restore default in case we came here through the function.
252 __cabi_libc.abort();
253 }
[8a13c47]254
[92bfda0]255 int len = snprintf( abort_text, abort_text_size, "Cforall Runtime error (UNIX pid:%ld) ", (long int)getpid() ); // use UNIX pid (versus getPid)
256 __cfaabi_bits_write( STDERR_FILENO, abort_text, len );
[8a13c47]257
[92bfda0]258 // print the cause of the error
259 assert( fmt );
260 len = vsnprintf( abort_text, abort_text_size, fmt, args );
261 __cfaabi_bits_write( STDERR_FILENO, abort_text, len );
[6011658]262
[92bfda0]263 // add optional newline if missing at the end of the format text
264 if ( fmt[strlen( fmt ) - 1] != '\n' ) {
265 __cfaabi_bits_write( STDERR_FILENO, "\n", 1 );
266 } // if
[6011658]267
[92bfda0]268 // Give the kernel the chance to add some data in here
269 __kernel_abort_msg( abort_text, abort_text_size );
[6011658]270
[92bfda0]271 // print stack trace in handler
272 __cfaabi_backtrace( signalAbort ? 4 : 2 );
[6011658]273
[92bfda0]274 // Finally call abort
275 __cabi_libc.abort();
[5ccee64]276
[8a13c47]277}
278
279void abort( const char fmt[], ... ) {
280 va_list args;
281 va_start( args, fmt );
[d870df3]282 __abort( false, fmt, args );
[f883ef1]283 // CONTROL NEVER REACHES HERE!
[8a13c47]284 va_end( args );
285}
286
[d870df3]287void abort( bool signalAbort, const char fmt[], ... ) {
[f883ef1]288 va_list args;
289 va_start( args, fmt );
290 __abort( signalAbort, fmt, args );
291 // CONTROL NEVER REACHES HERE!
292 va_end( args );
[d870df3]293}
294
[dbe9b08]295void sigHandler_segv( __CFA_SIGPARMS__ ) {
[8a13c47]296 if ( sfp->si_addr == 0p ) {
297 abort( true, "Null pointer (0p) dereference.\n" );
[1469a8a]298 } else {
[8a13c47]299 abort( true, "%s at memory location %p.\n"
[1469a8a]300 "Possible cause is reading outside the address space or writing to a protected area within the address space with an invalid pointer or subscript.\n",
301 (sig == SIGSEGV ? "Segment fault" : "Bus error"), sfp->si_addr );
302 }
[2b8bc41]303}
304
305void sigHandler_ill( __CFA_SIGPARMS__ ) {
[8a13c47]306 abort( true, "Executing illegal instruction at location %p.\n"
[2b8bc41]307 "Possible cause is stack corruption.\n",
308 sfp->si_addr );
309}
310
311void sigHandler_fpe( __CFA_SIGPARMS__ ) {
312 const char * msg;
313
[a424315d]314 choose( sfp->si_code ) {
315 case FPE_INTDIV, FPE_FLTDIV: msg = "divide by zero";
316 case FPE_FLTOVF: msg = "overflow";
317 case FPE_FLTUND: msg = "underflow";
318 case FPE_FLTRES: msg = "inexact result";
319 case FPE_FLTINV: msg = "invalid operation";
[2b8bc41]320 default: msg = "unknown";
[a424315d]321 } // choose
[8a13c47]322 abort( true, "Computation error %s at location %p.\n", msg, sfp->si_addr );
[dbe9b08]323}
324
[94dea96]325void sigHandler_term( __CFA_SIGPARMS__ ) {
[8a13c47]326 abort( true, "Application interrupted by signal: %s.\n", strsignal( sig ) );
[94dea96]327}
328
[6b0b624]329// Local Variables: //
330// mode: c //
331// tab-width: 4 //
332// End: //
Note: See TracBrowser for help on using the repository browser.