Changes in libcfa/src/interpose.cfa [5ccee64:4f37255]
- File:
-
- 1 edited
-
libcfa/src/interpose.cfa (modified) (11 diffs)
Legend:
- Unmodified
- Added
- Removed
-
libcfa/src/interpose.cfa
r5ccee64 r4f37255 10 10 // Created On : Wed Mar 29 16:10:31 2017 11 11 // Last Modified By : Peter A. Buhr 12 // Last Modified On : Mon Feb 17 10:18:53 202013 // Update Count : 1 6612 // Last Modified On : Sun Jul 14 22:57:16 2019 13 // Update Count : 116 14 14 // 15 15 … … 29 29 #include "bits/signal.hfa" // sigHandler_? 30 30 #include "startup.hfa" // STARTUP_PRIORITY_CORE 31 #include <assert.h>32 31 33 32 //============================================================================================= … … 41 40 42 41 typedef void (* generic_fptr_t)(void); 43 generic_fptr_t interpose_symbol( const char symbol[], const char version[]) {42 generic_fptr_t interpose_symbol( const char * symbol, const char * version ) { 44 43 const char * error; 45 44 … … 96 95 void __cfaabi_interpose_startup(void) __attribute__(( constructor( STARTUP_PRIORITY_CORE ) )); 97 96 void __cfaabi_interpose_startup( void ) { 98 const char *version = 0p;97 const char *version = NULL; 99 98 100 99 preload_libgcc(); … … 106 105 #pragma GCC diagnostic pop 107 106 108 // As a precaution (and necessity), errors that result in termination are delivered on a separate stack because109 // task stacks might be very small (4K) and the signal delivery corrupts memory to the point that a clean110 // shutdown is impossible. Also, when a stack overflow encounters the non-accessible sentinel page (debug only)111 // and generates a segment fault, the signal cannot be delivered on the sentinel page. Finally, calls to abort112 // print a stack trace that uses substantial stack space.113 114 #define MINSTKSZ SIGSTKSZ * 8115 static char stack[MINSTKSZ] __attribute__(( aligned (16) ));116 static stack_t ss;117 118 ss.ss_sp = stack;119 ss.ss_size = MINSTKSZ;120 ss.ss_flags = 0;121 if ( sigaltstack( &ss, 0p ) == -1 ) {122 abort( "__cfaabi_interpose_startup : internal error, sigaltstack error(%d) %s.", errno, strerror( errno ) );123 } // if124 125 107 // Failure handler 126 __cfaabi_sigaction( SIGSEGV, sigHandler_segv, SA_SIGINFO | SA_ONSTACK ); 127 __cfaabi_sigaction( SIGBUS , sigHandler_segv, SA_SIGINFO | SA_ONSTACK ); 128 __cfaabi_sigaction( SIGILL , sigHandler_ill , SA_SIGINFO | SA_ONSTACK ); 129 __cfaabi_sigaction( SIGFPE , sigHandler_fpe , SA_SIGINFO | SA_ONSTACK ); 130 __cfaabi_sigaction( SIGTERM, sigHandler_term, SA_SIGINFO | SA_ONSTACK | SA_RESETHAND ); // one shot handler, return to default 131 __cfaabi_sigaction( SIGINT , sigHandler_term, SA_SIGINFO | SA_ONSTACK | SA_RESETHAND ); 132 __cfaabi_sigaction( SIGABRT, sigHandler_term, SA_SIGINFO | SA_ONSTACK | SA_RESETHAND ); 133 __cfaabi_sigaction( SIGHUP , sigHandler_term, SA_SIGINFO | SA_ONSTACK | SA_RESETHAND ); // terminal hangup 108 __cfaabi_sigaction( SIGSEGV, sigHandler_segv , SA_SIGINFO ); 109 __cfaabi_sigaction( SIGBUS , sigHandler_segv , SA_SIGINFO ); 110 __cfaabi_sigaction( SIGILL , sigHandler_ill , SA_SIGINFO ); 111 __cfaabi_sigaction( SIGFPE , sigHandler_fpe , SA_SIGINFO ); 112 __cfaabi_sigaction( SIGABRT, sigHandler_abrt, SA_SIGINFO | SA_RESETHAND); 113 __cfaabi_sigaction( SIGTERM, sigHandler_term , SA_SIGINFO ); 114 __cfaabi_sigaction( SIGINT , sigHandler_term , SA_SIGINFO ); 134 115 } 135 116 } … … 142 123 void exit( int status, const char fmt[], ... ) __attribute__(( format(printf, 2, 3), __nothrow__, __leaf__, __noreturn__ )); 143 124 void abort( const char fmt[], ... ) __attribute__(( format(printf, 1, 2), __nothrow__, __leaf__, __noreturn__ )); 144 void abort( bool signalAbort, const char fmt[], ... ) __attribute__(( format(printf, 2, 3), __nothrow__, __leaf__, __noreturn__ ));145 125 146 126 extern "C" { 147 127 void abort( void ) __attribute__(( __nothrow__, __leaf__, __noreturn__ )) { 148 abort( false, "%s", "");128 abort( NULL ); 149 129 } 150 130 … … 152 132 va_list argp; 153 133 va_start( argp, fmt ); 154 abort( f alse, fmt, argp );134 abort( fmt, argp ); 155 135 va_end( argp ); 156 136 } … … 161 141 } 162 142 163 void * kernel_abort( void ) __attribute__(( __nothrow__, __leaf__, __weak__ )) { return 0p; } 164 void kernel_abort_msg( void * data, char buffer[], int size ) __attribute__(( __nothrow__, __leaf__, __weak__ )) {} 165 // See concurrency/kernel.cfa for strong definition used in multi-processor mode. 143 void * kernel_abort ( void ) __attribute__(( __nothrow__, __leaf__, __weak__ )) { return NULL; } 144 void kernel_abort_msg( void * data, char * buffer, int size ) __attribute__(( __nothrow__, __leaf__, __weak__ )) {} 166 145 int kernel_abort_lastframe( void ) __attribute__(( __nothrow__, __leaf__, __weak__ )) { return 4; } 167 146 168 147 enum { abort_text_size = 1024 }; 169 148 static char abort_text[ abort_text_size ]; 170 171 static void __cfaabi_backtrace( int start ) { 172 enum { Frames = 50, }; // maximum number of stack frames 173 int last = kernel_abort_lastframe(); // skip last N stack frames 149 static int abort_lastframe; 150 151 void exit( int status, const char fmt[], ... ) __attribute__(( format(printf, 2, 3), __nothrow__, __leaf__, __noreturn__ )) { 152 va_list args; 153 va_start( args, fmt ); 154 vfprintf( stderr, fmt, args ); 155 va_end( args ); 156 __cabi_libc.exit( status ); 157 } 158 159 void abort( const char fmt[], ... ) __attribute__(( format(printf, 1, 2), __nothrow__, __leaf__, __noreturn__ )) { 160 void * kernel_data = kernel_abort(); // must be done here to lock down kernel 161 int len; 162 163 abort_lastframe = kernel_abort_lastframe(); 164 len = snprintf( abort_text, abort_text_size, "Cforall Runtime error (UNIX pid:%ld) ", (long int)getpid() ); // use UNIX pid (versus getPid) 165 __cfaabi_dbg_bits_write( abort_text, len ); 166 167 if ( fmt ) { 168 va_list args; 169 va_start( args, fmt ); 170 171 len = vsnprintf( abort_text, abort_text_size, fmt, args ); 172 va_end( args ); 173 __cfaabi_dbg_bits_write( abort_text, len ); 174 175 if ( fmt[strlen( fmt ) - 1] != '\n' ) { // add optional newline if missing at the end of the format text 176 __cfaabi_dbg_bits_write( "\n", 1 ); 177 } 178 } 179 180 kernel_abort_msg( kernel_data, abort_text, abort_text_size ); 181 __cabi_libc.abort(); 182 } 183 184 static void __cfaabi_backtrace() { 185 enum { 186 Frames = 50, // maximum number of stack frames 187 Start = 8, // skip first N stack frames 188 }; 174 189 175 190 void * array[Frames]; 176 191 size_t size = backtrace( array, Frames ); 177 char ** messages = backtrace_symbols( array, size ); // does not demangle names 178 179 *index( messages[0], '(' ) = '\0'; // find executable name 180 __cfaabi_bits_print_nolock( STDERR_FILENO, "Stack back trace for: %s\n", messages[0]); 181 182 for ( unsigned int i = start; i < size - last && messages != 0p; i += 1 ) { 183 char * name = 0p, * offset_begin = 0p, * offset_end = 0p; 184 185 for ( char * p = messages[i]; *p; p += 1 ) { // find parantheses and +offset 186 //__cfaabi_bits_print_nolock( "X %s\n", p); 192 char ** messages = backtrace_symbols( array, size ); 193 194 // find executable name 195 *index( messages[0], '(' ) = '\0'; 196 __cfaabi_dbg_bits_print_nolock( "Stack back trace for: %s\n", messages[0]); 197 198 for ( int i = Start; i < size - abort_lastframe && messages != NULL; i += 1 ) { 199 char * name = NULL, * offset_begin = NULL, * offset_end = NULL; 200 201 for ( char * p = messages[i]; *p; ++p ) { 202 //__cfaabi_dbg_bits_print_nolock( "X %s\n", p); 203 // find parantheses and +offset 187 204 if ( *p == '(' ) { 188 205 name = p; … … 195 212 } 196 213 197 // if line contains symbol ,print it198 int frameNo = i - start;214 // if line contains symbol print it 215 int frameNo = i - Start; 199 216 if ( name && offset_begin && offset_end && name < offset_begin ) { 200 *name++ = '\0'; // delimit strings 217 // delimit strings 218 *name++ = '\0'; 201 219 *offset_begin++ = '\0'; 202 220 *offset_end++ = '\0'; 203 221 204 __cfaabi_ bits_print_nolock( STDERR_FILENO,"(%i) %s : %s + %s %s\n", frameNo, messages[i], name, offset_begin, offset_end);222 __cfaabi_dbg_bits_print_nolock( "(%i) %s : %s + %s %s\n", frameNo, messages[i], name, offset_begin, offset_end); 205 223 } else { // otherwise, print the whole line 206 __cfaabi_ bits_print_nolock( STDERR_FILENO,"(%i) %s\n", frameNo, messages[i] );224 __cfaabi_dbg_bits_print_nolock( "(%i) %s\n", frameNo, messages[i] ); 207 225 } 208 226 } … … 210 228 } 211 229 212 void exit( int status, const char fmt[], ... ) {213 va_list args;214 va_start( args, fmt );215 vfprintf( stderr, fmt, args );216 va_end( args );217 __cabi_libc.exit( status );218 }219 220 void abort( bool signalAbort, const char fmt[], ... ) {221 void * kernel_data = kernel_abort(); // must be done here to lock down kernel222 int len;223 224 signal( SIGABRT, SIG_DFL ); // prevent final "real" abort from recursing to handler225 226 len = snprintf( abort_text, abort_text_size, "Cforall Runtime error (UNIX pid:%ld) ", (long int)getpid() ); // use UNIX pid (versus getPid)227 __cfaabi_bits_write( STDERR_FILENO, abort_text, len );228 229 assert( fmt );230 va_list args;231 va_start( args, fmt );232 233 len = vsnprintf( abort_text, abort_text_size, fmt, args );234 va_end( args );235 __cfaabi_bits_write( STDERR_FILENO, abort_text, len );236 237 if ( fmt[strlen( fmt ) - 1] != '\n' ) { // add optional newline if missing at the end of the format text238 __cfaabi_dbg_write( "\n", 1 );239 } // if240 kernel_abort_msg( kernel_data, abort_text, abort_text_size );241 242 __cfaabi_backtrace( signalAbort ? 4 : 2 );243 244 __cabi_libc.abort(); // print stack trace in handler245 }246 247 void abort( const char fmt[], ... ) {248 va_list args;249 va_start( args, fmt );250 abort( false, fmt, args );251 va_end( args );252 }253 254 230 void sigHandler_segv( __CFA_SIGPARMS__ ) { 255 if ( sfp->si_addr == 0p ) { 256 abort( true, "Null pointer (0p) dereference.\n" ); 257 } else { 258 abort( true, "%s at memory location %p.\n" 259 "Possible cause is reading outside the address space or writing to a protected area within the address space with an invalid pointer or subscript.\n", 260 (sig == SIGSEGV ? "Segment fault" : "Bus error"), sfp->si_addr ); 261 } 231 abort( "Addressing invalid memory at location %p\n" 232 "Possible cause is reading outside the address space or writing to a protected area within the address space with an invalid pointer or subscript.\n", 233 sfp->si_addr ); 262 234 } 263 235 264 236 void sigHandler_ill( __CFA_SIGPARMS__ ) { 265 abort( true,"Executing illegal instruction at location %p.\n"237 abort( "Executing illegal instruction at location %p.\n" 266 238 "Possible cause is stack corruption.\n", 267 239 sfp->si_addr ); … … 279 251 default: msg = "unknown"; 280 252 } // choose 281 abort( true, "Computation error %s at location %p.\n", msg, sfp->si_addr ); 253 abort( "Computation error %s at location %p.\n", msg, sfp->si_addr ); 254 } 255 256 void sigHandler_abrt( __CFA_SIGPARMS__ ) { 257 __cfaabi_backtrace(); 258 259 // reset default signal handler 260 __cfaabi_sigdefault( SIGABRT ); 261 262 raise( SIGABRT ); 282 263 } 283 264 284 265 void sigHandler_term( __CFA_SIGPARMS__ ) { 285 abort( true, "Application interrupted by signal: %s.\n", strsignal( sig ));266 abort( "Application stopped by %s signal.", sig == SIGINT ? "an interrupt (SIGINT)" : "a terminate (SIGTERM)" ); 286 267 } 287 268
Note:
See TracChangeset
for help on using the changeset viewer.