blob: cc1b78dbecef076ba899acedabf52f54035fdf48 [file] [log] [blame]
Dave Allisonf4b80bc2014-05-14 15:41:25 -07001/*
2 * Copyright (C) 2014 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Bilyan Borisovbb661c02016-04-04 16:27:32 +010017#ifdef ART_TARGET_ANDROID
Dave Allisonf4b80bc2014-05-14 15:41:25 -070018#include <android/log.h>
Dave Allison69dfe512014-07-11 17:11:58 +000019#else
20#include <stdarg.h>
21#include <iostream>
22#endif
23
Dave Allisonf4b80bc2014-05-14 15:41:25 -070024#include <dlfcn.h>
Luis Hector Chavez33cac0f2017-04-06 14:18:09 -070025#include <errno.h>
Dave Allisonf4b80bc2014-05-14 15:41:25 -070026#include <signal.h>
27#include <stdio.h>
28#include <stdlib.h>
Luis Hector Chavez33cac0f2017-04-06 14:18:09 -070029#include <string.h>
Josh Gao85a78cf2017-03-20 16:26:42 -070030
Luis Hector Chavez33cac0f2017-04-06 14:18:09 -070031#include <initializer_list>
Josh Gao85a78cf2017-03-20 16:26:42 -070032#include <utility>
Dave Allisonf4b80bc2014-05-14 15:41:25 -070033
Dave Allisoncefcea82014-09-16 10:01:01 -070034#include "sigchain.h"
35
Dave Allison69dfe512014-07-11 17:11:58 +000036#if defined(__APPLE__)
37#define _NSIG NSIG
Dave Allison38680092014-08-29 12:29:34 -070038#define sighandler_t sig_t
Josh Gaodd241ae2017-03-20 14:17:23 -070039
40// Darwin has an #error when ucontext.h is included without _XOPEN_SOURCE defined.
41#define _XOPEN_SOURCE
Dave Allison69dfe512014-07-11 17:11:58 +000042#endif
43
Josh Gaodd241ae2017-03-20 14:17:23 -070044#include <ucontext.h>
45
Josh Gao85a78cf2017-03-20 16:26:42 -070046// libsigchain provides an interception layer for signal handlers, to allow ART and others to give
47// their signal handlers the first stab at handling signals before passing them on to user code.
48//
49// It implements wrapper functions for signal, sigaction, and sigprocmask, and a handler that
50// forwards signals appropriately.
51//
52// In our handler, we start off with all signals blocked, fetch the original signal mask from the
53// passed in ucontext, and then adjust our signal mask appropriately for the user handler.
54//
55// It's somewhat tricky for us to properly handle some flag cases:
56// SA_NOCLDSTOP and SA_NOCLDWAIT: shouldn't matter, we don't have special handlers for SIGCHLD.
57// SA_NODEFER: unimplemented, we can manually change the signal mask appropriately.
58// ~SA_ONSTACK: always silently enable this
59// SA_RESETHAND: unimplemented, but we can probably do this?
60// ~SA_RESTART: unimplemented, maybe we can reserve an RT signal, register an empty handler that
61// doesn't have SA_RESTART, and raise the signal to avoid restarting syscalls that are
62// expected to be interrupted?
Dave Allisonf4b80bc2014-05-14 15:41:25 -070063
Dave Allisonf4b80bc2014-05-14 15:41:25 -070064
65static void log(const char* format, ...) {
66 char buf[256];
67 va_list ap;
68 va_start(ap, format);
69 vsnprintf(buf, sizeof(buf), format, ap);
Bilyan Borisovbb661c02016-04-04 16:27:32 +010070#ifdef ART_TARGET_ANDROID
Dave Allisonf4b80bc2014-05-14 15:41:25 -070071 __android_log_write(ANDROID_LOG_ERROR, "libsigchain", buf);
Dave Allison69dfe512014-07-11 17:11:58 +000072#else
73 std::cout << buf << "\n";
74#endif
Dave Allisonf4b80bc2014-05-14 15:41:25 -070075 va_end(ap);
76}
77
Josh Gao85a78cf2017-03-20 16:26:42 -070078#define fatal(...) log(__VA_ARGS__); abort()
Josh Gao7600fa92017-03-15 17:40:42 -070079
Josh Gao85a78cf2017-03-20 16:26:42 -070080static int sigorset(sigset_t* dest, sigset_t* left, sigset_t* right) {
81 sigemptyset(dest);
82 for (size_t i = 0; i < sizeof(sigset_t) * CHAR_BIT; ++i) {
83 if (sigismember(left, i) == 1 || sigismember(right, i) == 1) {
84 sigaddset(dest, i);
Dave Allisonf4b80bc2014-05-14 15:41:25 -070085 }
Josh Gao85a78cf2017-03-20 16:26:42 -070086 }
87 return 0;
88}
89
90namespace art {
91
92static decltype(&sigaction) linked_sigaction;
93static decltype(&sigprocmask) linked_sigprocmask;
94__thread bool handling_signal;
95
96class SignalChain {
97 public:
98 SignalChain() : claimed_(false) {
Jin Qian33dca562017-03-18 02:51:37 +000099 }
100
Josh Gao85a78cf2017-03-20 16:26:42 -0700101 bool IsClaimed() {
102 return claimed_;
103 }
104
105 void Claim(int signo) {
106 if (!claimed_) {
107 Register(signo);
108 claimed_ = true;
Jin Qian33dca562017-03-18 02:51:37 +0000109 }
Josh Gao85a78cf2017-03-20 16:26:42 -0700110 }
111
112 // Register the signal chain with the kernel if needed.
113 void Register(int signo) {
114 struct sigaction handler_action = {};
115 handler_action.sa_sigaction = SignalChain::Handler;
116 handler_action.sa_flags = SA_RESTART | SA_SIGINFO | SA_ONSTACK;
117 sigfillset(&handler_action.sa_mask);
118 linked_sigaction(signo, &handler_action, &action_);
119 }
120
121 void SetAction(const struct sigaction* action) {
122 action_ = *action;
123 }
124
125 struct sigaction GetAction() {
126 return action_;
127 }
128
129 void AddSpecialHandler(SpecialSignalHandlerFn fn) {
130 for (SpecialSignalHandlerFn& slot : special_handlers_) {
131 if (slot == nullptr) {
132 slot = fn;
133 return;
134 }
135 }
136
137 fatal("too many special signal handlers");
138 }
139
140 void RemoveSpecialHandler(SpecialSignalHandlerFn fn) {
141 // This isn't thread safe, but it's unlikely to be a real problem.
142 size_t len = sizeof(special_handlers_)/sizeof(*special_handlers_);
143 for (size_t i = 0; i < len; ++i) {
144 if (special_handlers_[i] == fn) {
145 for (size_t j = i; j < len - 1; ++j) {
146 special_handlers_[j] = special_handlers_[j + 1];
147 }
148 special_handlers_[len - 1] = nullptr;
149 return;
150 }
151 }
152
153 fatal("failed to find special handler to remove");
154 }
155
156
157 static void Handler(int signo, siginfo_t* siginfo, void*);
158
159 private:
160 bool claimed_;
161 struct sigaction action_;
162 SpecialSignalHandlerFn special_handlers_[2];
163};
164
165static SignalChain chains[_NSIG];
166
Josh Gao90444552017-03-20 14:58:25 -0700167class ScopedFlagRestorer {
Josh Gao85a78cf2017-03-20 16:26:42 -0700168 public:
Josh Gao90444552017-03-20 14:58:25 -0700169 explicit ScopedFlagRestorer(bool* flag) : flag_(flag), original_value_(*flag) {
Josh Gao85a78cf2017-03-20 16:26:42 -0700170 }
171
Josh Gao90444552017-03-20 14:58:25 -0700172 ~ScopedFlagRestorer() {
173 *flag_ = original_value_;
Josh Gao85a78cf2017-03-20 16:26:42 -0700174 }
175
176 private:
177 bool* flag_;
Josh Gao90444552017-03-20 14:58:25 -0700178 bool original_value_;
Josh Gao85a78cf2017-03-20 16:26:42 -0700179};
180
181class ScopedSignalUnblocker {
182 public:
183 explicit ScopedSignalUnblocker(const std::initializer_list<int>& signals) {
184 sigset_t new_mask;
185 sigemptyset(&new_mask);
186 for (int signal : signals) {
187 sigaddset(&new_mask, signal);
188 }
189 if (sigprocmask(SIG_UNBLOCK, &new_mask, &previous_mask_) != 0) {
190 fatal("failed to unblock signals: %s", strerror(errno));
191 }
192 }
193
194 ~ScopedSignalUnblocker() {
195 if (sigprocmask(SIG_SETMASK, &previous_mask_, nullptr) != 0) {
196 fatal("failed to unblock signals: %s", strerror(errno));
197 }
198 }
199
200 private:
201 sigset_t previous_mask_;
202};
203
Josh Gao85a78cf2017-03-20 16:26:42 -0700204void SignalChain::Handler(int signo, siginfo_t* siginfo, void* ucontext_raw) {
Josh Gao90444552017-03-20 14:58:25 -0700205 ScopedFlagRestorer flag(&handling_signal);
206
Josh Gao85a78cf2017-03-20 16:26:42 -0700207 // Try the special handlers first.
208 // If one of them crashes, we'll reenter this handler and pass that crash onto the user handler.
209 if (!handling_signal) {
Josh Gao90444552017-03-20 14:58:25 -0700210 ScopedSignalUnblocker unblocked { SIGABRT, SIGBUS, SIGFPE, SIGILL, SIGSEGV }; // NOLINT
211 handling_signal = true;
Josh Gao85a78cf2017-03-20 16:26:42 -0700212
213 for (const auto& handler : chains[signo].special_handlers_) {
214 if (handler != nullptr && handler(signo, siginfo, ucontext_raw)) {
215 return;
216 }
217 }
218 }
219
220 // Forward to the user's signal handler.
221 int handler_flags = chains[signo].action_.sa_flags;
222 ucontext_t* ucontext = static_cast<ucontext_t*>(ucontext_raw);
223 sigset_t mask;
224 sigorset(&mask, &ucontext->uc_sigmask, &chains[signo].action_.sa_mask);
225 if ((handler_flags & SA_NODEFER)) {
226 sigdelset(&mask, signo);
227 }
228 sigprocmask(SIG_SETMASK, &mask, nullptr);
229
230 if ((handler_flags & SA_SIGINFO)) {
231 chains[signo].action_.sa_sigaction(signo, siginfo, ucontext_raw);
Jin Qian33dca562017-03-18 02:51:37 +0000232 } else {
Josh Gao85a78cf2017-03-20 16:26:42 -0700233 auto handler = chains[signo].action_.sa_handler;
234 if (handler == SIG_IGN) {
235 return;
236 } else if (handler == SIG_DFL) {
Josh Gaofb539a42017-03-20 16:23:41 -0700237 fatal("exiting due to SIG_DFL handler for signal %d", signo);
Jin Qian33dca562017-03-18 02:51:37 +0000238 } else {
Josh Gao85a78cf2017-03-20 16:26:42 -0700239 handler(signo);
Jin Qian33dca562017-03-18 02:51:37 +0000240 }
241 }
242}
243
Dmitriy Ivanovf57874d2014-10-07 13:43:23 -0700244extern "C" int sigaction(int signal, const struct sigaction* new_action, struct sigaction* old_action) {
Dave Allisonf4b80bc2014-05-14 15:41:25 -0700245 // If this signal has been claimed as a signal chain, record the user's
246 // action but don't pass it on to the kernel.
247 // Note that we check that the signal number is in range here. An out of range signal
248 // number should behave exactly as the libc sigaction.
Josh Gao85a78cf2017-03-20 16:26:42 -0700249 if (signal < 0 || signal >= _NSIG) {
250 errno = EINVAL;
251 return -1;
252 }
253
Josh Gao9d631dd2017-03-23 20:04:58 -0700254 if (chains[signal].IsClaimed()) {
Josh Gao85a78cf2017-03-20 16:26:42 -0700255 struct sigaction saved_action = chains[signal].GetAction();
Mathieu Chartier2cebb242015-04-21 16:50:40 -0700256 if (new_action != nullptr) {
Josh Gao85a78cf2017-03-20 16:26:42 -0700257 chains[signal].SetAction(new_action);
Dave Allisonf4b80bc2014-05-14 15:41:25 -0700258 }
Mathieu Chartier2cebb242015-04-21 16:50:40 -0700259 if (old_action != nullptr) {
Dmitriy Ivanovc01683b2015-01-06 14:55:26 -0800260 *old_action = saved_action;
261 }
Dave Allisonf4b80bc2014-05-14 15:41:25 -0700262 return 0;
263 }
264
265 // Will only get here if the signal chain has not been claimed. We want
266 // to pass the sigaction on to the kernel via the real sigaction in libc.
Josh Gao85a78cf2017-03-20 16:26:42 -0700267 InitializeSignalChain();
Dave Allisonf4b80bc2014-05-14 15:41:25 -0700268 return linked_sigaction(signal, new_action, old_action);
269}
270
Josh Gao85a78cf2017-03-20 16:26:42 -0700271extern "C" sighandler_t signal(int signo, sighandler_t handler) {
272 if (signo < 0 || signo > _NSIG) {
273 errno = EINVAL;
274 return SIG_ERR;
275 }
276
277 struct sigaction sa = {};
Dave Allison91a83662014-08-28 16:12:40 -0700278 sigemptyset(&sa.sa_mask);
279 sa.sa_handler = handler;
Josh Gao85a78cf2017-03-20 16:26:42 -0700280 sa.sa_flags = SA_RESTART | SA_ONSTACK;
Dave Allison91a83662014-08-28 16:12:40 -0700281 sighandler_t oldhandler;
282
283 // If this signal has been claimed as a signal chain, record the user's
284 // action but don't pass it on to the kernel.
Josh Gao85a78cf2017-03-20 16:26:42 -0700285 if (chains[signo].IsClaimed()) {
286 oldhandler = reinterpret_cast<sighandler_t>(chains[signo].GetAction().sa_handler);
287 chains[signo].SetAction(&sa);
Dave Allison91a83662014-08-28 16:12:40 -0700288 return oldhandler;
289 }
290
291 // Will only get here if the signal chain has not been claimed. We want
292 // to pass the sigaction on to the kernel via the real sigaction in libc.
Josh Gao85a78cf2017-03-20 16:26:42 -0700293 InitializeSignalChain();
294 if (linked_sigaction(signo, &sa, &sa) == -1) {
Dave Allison91a83662014-08-28 16:12:40 -0700295 return SIG_ERR;
296 }
297
298 return reinterpret_cast<sighandler_t>(sa.sa_handler);
299}
300
Dimitry Ivanov82b67b92016-08-01 11:19:03 -0700301#if !defined(__LP64__)
Josh Gao85a78cf2017-03-20 16:26:42 -0700302extern "C" sighandler_t bsd_signal(int signo, sighandler_t handler) {
303 return signal(signo, handler);
Dimitry Ivanov82b67b92016-08-01 11:19:03 -0700304}
305#endif
306
Dmitriy Ivanovf57874d2014-10-07 13:43:23 -0700307extern "C" int sigprocmask(int how, const sigset_t* bionic_new_set, sigset_t* bionic_old_set) {
Josh Gao90444552017-03-20 14:58:25 -0700308 // When inside a signal handler, forward directly to the actual sigprocmask.
309 if (handling_signal) {
310 return linked_sigprocmask(how, bionic_new_set, bionic_old_set);
311 }
312
Dave Allisonf4b80bc2014-05-14 15:41:25 -0700313 const sigset_t* new_set_ptr = bionic_new_set;
314 sigset_t tmpset;
Mathieu Chartier2cebb242015-04-21 16:50:40 -0700315 if (bionic_new_set != nullptr) {
Dave Allisonf4b80bc2014-05-14 15:41:25 -0700316 tmpset = *bionic_new_set;
317
318 if (how == SIG_BLOCK) {
319 // Don't allow claimed signals in the mask. If a signal chain has been claimed
320 // we can't allow the user to block that signal.
321 for (int i = 0 ; i < _NSIG; ++i) {
Josh Gao85a78cf2017-03-20 16:26:42 -0700322 if (chains[i].IsClaimed() && sigismember(&tmpset, i)) {
Dmitriy Ivanova3164b92015-04-01 11:08:45 -0700323 sigdelset(&tmpset, i);
Dave Allisonf4b80bc2014-05-14 15:41:25 -0700324 }
325 }
326 }
327 new_set_ptr = &tmpset;
328 }
329
Josh Gao85a78cf2017-03-20 16:26:42 -0700330 InitializeSignalChain();
Dave Allisonf4b80bc2014-05-14 15:41:25 -0700331 return linked_sigprocmask(how, new_set_ptr, bionic_old_set);
332}
Dave Allisoncefcea82014-09-16 10:01:01 -0700333
Dmitriy Ivanovf57874d2014-10-07 13:43:23 -0700334extern "C" void InitializeSignalChain() {
Dave Allisoncefcea82014-09-16 10:01:01 -0700335 // Warning.
336 // Don't call this from within a signal context as it makes calls to
337 // dlsym. Calling into the dynamic linker will result in locks being
338 // taken and if it so happens that a signal occurs while one of these
339 // locks is already taken, dlsym will block trying to reenter a
340 // mutex and we will never get out of it.
Josh Gao85a78cf2017-03-20 16:26:42 -0700341 static bool initialized = false;
Dave Allisoncefcea82014-09-16 10:01:01 -0700342 if (initialized) {
343 // Don't initialize twice.
344 return;
345 }
Josh Gao85a78cf2017-03-20 16:26:42 -0700346
347 void* linked_sigaction_sym = dlsym(RTLD_NEXT, "sigaction");
Dave Allisoncefcea82014-09-16 10:01:01 -0700348 if (linked_sigaction_sym == nullptr) {
349 linked_sigaction_sym = dlsym(RTLD_DEFAULT, "sigaction");
350 if (linked_sigaction_sym == nullptr ||
Dmitriy Ivanova3164b92015-04-01 11:08:45 -0700351 linked_sigaction_sym == reinterpret_cast<void*>(sigaction)) {
Josh Gao85a78cf2017-03-20 16:26:42 -0700352 fatal("Unable to find next sigaction in signal chain");
Dave Allisoncefcea82014-09-16 10:01:01 -0700353 }
354 }
355
Josh Gao85a78cf2017-03-20 16:26:42 -0700356 void* linked_sigprocmask_sym = dlsym(RTLD_NEXT, "sigprocmask");
Dave Allisoncefcea82014-09-16 10:01:01 -0700357 if (linked_sigprocmask_sym == nullptr) {
358 linked_sigprocmask_sym = dlsym(RTLD_DEFAULT, "sigprocmask");
359 if (linked_sigprocmask_sym == nullptr ||
360 linked_sigprocmask_sym == reinterpret_cast<void*>(sigprocmask)) {
Josh Gao85a78cf2017-03-20 16:26:42 -0700361 fatal("Unable to find next sigprocmask in signal chain");
Dave Allisoncefcea82014-09-16 10:01:01 -0700362 }
363 }
Josh Gao85a78cf2017-03-20 16:26:42 -0700364
365 linked_sigaction = reinterpret_cast<decltype(linked_sigaction)>(linked_sigaction_sym);
366 linked_sigprocmask = reinterpret_cast<decltype(linked_sigprocmask)>(linked_sigprocmask_sym);
Dave Allisoncefcea82014-09-16 10:01:01 -0700367 initialized = true;
368}
Mathieu Chartierd0004802014-10-15 16:59:47 -0700369
Josh Gao85a78cf2017-03-20 16:26:42 -0700370extern "C" void AddSpecialSignalHandlerFn(int signal, SpecialSignalHandlerFn fn) {
371 if (signal <= 0 || signal >= _NSIG) {
372 fatal("Invalid signal %d", signal);
373 }
Andreas Gampe03c2cc82015-05-22 18:31:50 -0700374
375 // Set the managed_handler.
Josh Gao85a78cf2017-03-20 16:26:42 -0700376 chains[signal].AddSpecialHandler(fn);
377 chains[signal].Claim(signal);
378}
Andreas Gampe03c2cc82015-05-22 18:31:50 -0700379
Josh Gao85a78cf2017-03-20 16:26:42 -0700380extern "C" void RemoveSpecialSignalHandlerFn(int signal, SpecialSignalHandlerFn fn) {
381 if (signal <= 0 || signal >= _NSIG) {
382 fatal("Invalid signal %d", signal);
383 }
384
385 chains[signal].RemoveSpecialHandler(fn);
386}
387
388extern "C" void EnsureFrontOfChain(int signal) {
389 if (signal <= 0 || signal >= _NSIG) {
390 fatal("Invalid signal %d", signal);
391 }
392
393 // Read the current action without looking at the chain, it should be the expected action.
394 struct sigaction current_action;
395 InitializeSignalChain();
396 linked_sigaction(signal, nullptr, &current_action);
397 // If the sigactions don't match then we put the current action on the chain and make ourself as
398 // the main action.
399 if (current_action.sa_sigaction != SignalChain::Handler) {
400 log("Warning: Unexpected sigaction action found %p\n", current_action.sa_sigaction);
401 chains[signal].Register(signal);
Andreas Gampe03c2cc82015-05-22 18:31:50 -0700402 }
403}
404
Dave Allisonf4b80bc2014-05-14 15:41:25 -0700405} // namespace art
406