Changes in libcfa/src/interpose.cfa [8a13c47:1469a8a]
- File:
-
- 1 edited
-
libcfa/src/interpose.cfa (modified) (11 diffs)
Legend:
- Unmodified
- Added
- Removed
-
libcfa/src/interpose.cfa
r8a13c47 r1469a8a 10 10 // Created On : Wed Mar 29 16:10:31 2017 11 11 // Last Modified By : Peter A. Buhr 12 // Last Modified On : Thu Jan 30 17:47:32 202013 // Update Count : 1 5612 // Last Modified On : Fri Dec 13 13:45:21 2019 13 // Update Count : 121 14 14 // 15 15 … … 95 95 void __cfaabi_interpose_startup(void) __attribute__(( constructor( STARTUP_PRIORITY_CORE ) )); 96 96 void __cfaabi_interpose_startup( void ) { 97 const char *version = 0p;97 const char *version = NULL; 98 98 99 99 preload_libgcc(); … … 105 105 #pragma GCC diagnostic pop 106 106 107 // As a precaution (and necessity), errors that result in termination are delivered on a separate stack because108 // task stacks might be very small (4K) and the signal delivery corrupts memory to the point that a clean109 // shutdown is impossible. Also, when a stack overflow encounters the non-accessible sentinel page (debug only)110 // and generates a segment fault, the signal cannot be delivered on the sentinel page. Finally, calls to abort111 // print a stack trace that uses substantial stack space.112 113 #define MINSTKSZ SIGSTKSZ * 8114 static char stack[MINSTKSZ] __attribute__(( aligned (16) ));115 static stack_t ss;116 117 ss.ss_sp = stack;118 ss.ss_size = MINSTKSZ;119 ss.ss_flags = 0;120 if ( sigaltstack( &ss, 0p ) == -1 ) {121 abort( "__cfaabi_interpose_startup : internal error, sigaltstack error(%d) %s.", errno, strerror( errno ) );122 } // if123 124 107 // Failure handler 125 __cfaabi_sigaction( SIGSEGV, sigHandler_segv, SA_SIGINFO | SA_ONSTACK ); 126 __cfaabi_sigaction( SIGBUS , sigHandler_segv, SA_SIGINFO | SA_ONSTACK ); 127 __cfaabi_sigaction( SIGILL , sigHandler_ill , SA_SIGINFO | SA_ONSTACK ); 128 __cfaabi_sigaction( SIGFPE , sigHandler_fpe , SA_SIGINFO | SA_ONSTACK ); 129 __cfaabi_sigaction( SIGTERM, sigHandler_term, SA_SIGINFO | SA_ONSTACK | SA_RESETHAND ); // one shot handler, return to default 130 __cfaabi_sigaction( SIGINT , sigHandler_term, SA_SIGINFO | SA_ONSTACK | SA_RESETHAND ); 131 __cfaabi_sigaction( SIGABRT, sigHandler_term, SA_SIGINFO | SA_ONSTACK | SA_RESETHAND ); 132 __cfaabi_sigaction( SIGHUP , sigHandler_term, SA_SIGINFO | SA_ONSTACK | SA_RESETHAND ); // terminal hangup 108 __cfaabi_sigaction( SIGSEGV, sigHandler_segv , SA_SIGINFO ); 109 __cfaabi_sigaction( SIGBUS , sigHandler_segv , SA_SIGINFO ); 110 __cfaabi_sigaction( SIGILL , sigHandler_ill , SA_SIGINFO ); 111 __cfaabi_sigaction( SIGFPE , sigHandler_fpe , SA_SIGINFO ); 112 __cfaabi_sigaction( SIGABRT, sigHandler_abrt, SA_SIGINFO | SA_RESETHAND); 113 __cfaabi_sigaction( SIGTERM, sigHandler_term , SA_SIGINFO ); 114 __cfaabi_sigaction( SIGINT , sigHandler_term , SA_SIGINFO ); 133 115 } 134 116 } … … 141 123 void exit( int status, const char fmt[], ... ) __attribute__(( format(printf, 2, 3), __nothrow__, __leaf__, __noreturn__ )); 142 124 void abort( const char fmt[], ... ) __attribute__(( format(printf, 1, 2), __nothrow__, __leaf__, __noreturn__ )); 143 void abort( bool signalAbort, const char fmt[], ... ) __attribute__(( format(printf, 2, 3), __nothrow__, __leaf__, __noreturn__ ));144 125 145 126 extern "C" { 146 127 void abort( void ) __attribute__(( __nothrow__, __leaf__, __noreturn__ )) { 147 abort( false, NULL ); // FIX ME: 0p does not work128 abort( NULL ); 148 129 } 149 130 … … 151 132 va_list argp; 152 133 va_start( argp, fmt ); 153 abort( f alse, fmt, argp );134 abort( fmt, argp ); 154 135 va_end( argp ); 155 136 } … … 160 141 } 161 142 162 void * kernel_abort( void ) __attribute__(( __nothrow__, __leaf__, __weak__ )) { return 0p; } 163 void kernel_abort_msg( void * data, char * buffer, int size ) __attribute__(( __nothrow__, __leaf__, __weak__ )) {} 164 // See concurrency/kernel.cfa for strong definition used in multi-processor mode. 143 void * kernel_abort ( void ) __attribute__(( __nothrow__, __leaf__, __weak__ )) { return NULL; } 144 void kernel_abort_msg( void * data, char * buffer, int size ) __attribute__(( __nothrow__, __leaf__, __weak__ )) {} 165 145 int kernel_abort_lastframe( void ) __attribute__(( __nothrow__, __leaf__, __weak__ )) { return 4; } 166 146 167 147 enum { abort_text_size = 1024 }; 168 148 static char abort_text[ abort_text_size ]; 169 170 static void __cfaabi_backtrace( int start ) { 149 static int abort_lastframe; 150 151 void exit( int status, const char fmt[], ... ) __attribute__(( format(printf, 2, 3), __nothrow__, __leaf__, __noreturn__ )) { 152 va_list args; 153 va_start( args, fmt ); 154 vfprintf( stderr, fmt, args ); 155 va_end( args ); 156 __cabi_libc.exit( status ); 157 } 158 159 void abort( const char fmt[], ... ) __attribute__(( format(printf, 1, 2), __nothrow__, __leaf__, __noreturn__ )) { 160 void * kernel_data = kernel_abort(); // must be done here to lock down kernel 161 int len; 162 163 abort_lastframe = kernel_abort_lastframe(); 164 len = snprintf( abort_text, abort_text_size, "Cforall Runtime error (UNIX pid:%ld) ", (long int)getpid() ); // use UNIX pid (versus getPid) 165 __cfaabi_dbg_write( abort_text, len ); 166 167 if ( fmt ) { 168 va_list args; 169 va_start( args, fmt ); 170 171 len = vsnprintf( abort_text, abort_text_size, fmt, args ); 172 va_end( args ); 173 __cfaabi_dbg_write( abort_text, len ); 174 175 if ( fmt[strlen( fmt ) - 1] != '\n' ) { // add optional newline if missing at the end of the format text 176 __cfaabi_dbg_write( "\n", 1 ); 177 } 178 } 179 180 kernel_abort_msg( kernel_data, abort_text, abort_text_size ); 181 __cabi_libc.abort(); 182 } 183 184 static void __cfaabi_backtrace() { 171 185 enum { 172 186 Frames = 50, // maximum number of stack frames 187 Start = 8, // skip first N stack frames 173 188 }; 174 int last = kernel_abort_lastframe(); // skip last N stack frames175 189 176 190 void * array[Frames]; … … 178 192 char ** messages = backtrace_symbols( array, size ); 179 193 180 *index( messages[0], '(' ) = '\0'; // find executable name 194 // find executable name 195 *index( messages[0], '(' ) = '\0'; 181 196 __cfaabi_bits_print_nolock( STDERR_FILENO, "Stack back trace for: %s\n", messages[0]); 182 197 183 for ( unsigned int i = start; i < size - last&& messages != 0p; i += 1 ) {198 for ( int i = Start; i < size - abort_lastframe && messages != 0p; i += 1 ) { 184 199 char * name = 0p, * offset_begin = 0p, * offset_end = 0p; 185 200 186 for ( char * p = messages[i]; *p; ++p ) { // find parantheses and +offset201 for ( char * p = messages[i]; *p; ++p ) { 187 202 //__cfaabi_bits_print_nolock( "X %s\n", p); 203 // find parantheses and +offset 188 204 if ( *p == '(' ) { 189 205 name = p; … … 196 212 } 197 213 198 // if line contains symbol ,print it199 int frameNo = i - start;214 // if line contains symbol print it 215 int frameNo = i - Start; 200 216 if ( name && offset_begin && offset_end && name < offset_begin ) { 201 *name++ = '\0'; // delimit strings 217 // delimit strings 218 *name++ = '\0'; 202 219 *offset_begin++ = '\0'; 203 220 *offset_end++ = '\0'; … … 211 228 } 212 229 213 void exit( int status, const char fmt[], ... ) {214 va_list args;215 va_start( args, fmt );216 vfprintf( stderr, fmt, args );217 va_end( args );218 __cabi_libc.exit( status );219 }220 221 void abort( bool signalAbort, const char fmt[], ... ) {222 void * kernel_data = kernel_abort(); // must be done here to lock down kernel223 int len;224 225 signal( SIGABRT, SIG_DFL ); // prevent final "real" abort from recursing to handler226 227 len = snprintf( abort_text, abort_text_size, "Cforall Runtime error (UNIX pid:%ld) ", (long int)getpid() ); // use UNIX pid (versus getPid)228 __cfaabi_bits_write( STDERR_FILENO, abort_text, len );229 230 if ( fmt ) {231 va_list args;232 va_start( args, fmt );233 234 len = vsnprintf( abort_text, abort_text_size, fmt, args );235 va_end( args );236 __cfaabi_bits_write( STDERR_FILENO, abort_text, len );237 238 if ( fmt[strlen( fmt ) - 1] != '\n' ) { // add optional newline if missing at the end of the format text239 __cfaabi_dbg_write( "\n", 1 );240 }241 }242 243 kernel_abort_msg( kernel_data, abort_text, abort_text_size );244 __cfaabi_backtrace( signalAbort ? 4 : 3 );245 246 __cabi_libc.abort(); // print stack trace in handler247 }248 249 void abort( const char fmt[], ... ) {250 va_list args;251 va_start( args, fmt );252 abort( false, fmt, args );253 va_end( args );254 }255 256 230 void sigHandler_segv( __CFA_SIGPARMS__ ) { 257 if ( sfp->si_addr == 0p) {258 abort( true,"Null pointer (0p) dereference.\n" );231 if ( sfp->si_addr == NULL ) { 232 abort( "Null pointer (0p) dereference.\n" ); 259 233 } else { 260 abort( true,"%s at memory location %p.\n"234 abort( "%s at memory location %p.\n" 261 235 "Possible cause is reading outside the address space or writing to a protected area within the address space with an invalid pointer or subscript.\n", 262 236 (sig == SIGSEGV ? "Segment fault" : "Bus error"), sfp->si_addr ); … … 265 239 266 240 void sigHandler_ill( __CFA_SIGPARMS__ ) { 267 abort( true,"Executing illegal instruction at location %p.\n"241 abort( "Executing illegal instruction at location %p.\n" 268 242 "Possible cause is stack corruption.\n", 269 243 sfp->si_addr ); … … 281 255 default: msg = "unknown"; 282 256 } // choose 283 abort( true, "Computation error %s at location %p.\n", msg, sfp->si_addr ); 257 abort( "Computation error %s at location %p.\n", msg, sfp->si_addr ); 258 } 259 260 void sigHandler_abrt( __CFA_SIGPARMS__ ) { 261 __cfaabi_backtrace(); 262 263 // reset default signal handler 264 __cfaabi_sigdefault( SIGABRT ); 265 266 raise( SIGABRT ); 284 267 } 285 268 286 269 void sigHandler_term( __CFA_SIGPARMS__ ) { 287 abort( true, "Application interrupted by signal: %s.\n", strsignal( sig ));270 abort( "Application stopped by %s signal.", sig == SIGINT ? "an interrupt (SIGINT)" : "a terminate (SIGTERM)" ); 288 271 } 289 272
Note:
See TracChangeset
for help on using the changeset viewer.