* limitations under the License.
*/
#include <config.h>
+#include "backtrace.h"
#include "fatal-signal.h"
#include <errno.h>
#include <signal.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
-#include "poll-loop.h"
-#include "shash.h"
+#include "ovs-thread.h"
+#include "openvswitch/poll-loop.h"
+#include "openvswitch/shash.h"
#include "sset.h"
#include "signals.h"
#include "socket-util.h"
#include "util.h"
-#include "vlog.h"
+#include "openvswitch/vlog.h"
-#include "type-props.h"
+#include "openvswitch/type-props.h"
+
+#ifdef HAVE_UNWIND
+#include "daemon-private.h"
+#endif
#ifndef SIG_ATOMIC_MAX
#define SIG_ATOMIC_MAX TYPE_MAXIMUM(sig_atomic_t)
VLOG_DEFINE_THIS_MODULE(fatal_signal);
/* Signals to catch. */
-static const int fatal_signals[] = { SIGTERM, SIGINT, SIGHUP, SIGALRM };
+#ifndef _WIN32
+static const int fatal_signals[] = { SIGTERM, SIGINT, SIGHUP, SIGALRM,
+ SIGSEGV };
+#else
+static const int fatal_signals[] = { SIGTERM };
+#endif
/* Hooks to call upon catching a signal */
struct hook {
static int signal_fds[2];
static volatile sig_atomic_t stored_sig_nr = SIG_ATOMIC_MAX;
-static void fatal_signal_init(void);
-static void atexit_handler(void);
+#ifdef _WIN32
+static HANDLE wevent;
+#endif
+
+static struct ovs_mutex mutex;
+
static void call_hooks(int sig_nr);
+#ifdef _WIN32
+static BOOL WINAPI ConsoleHandlerRoutine(DWORD dwCtrlType);
+#endif
-static void
+/* Initializes the fatal signal handling module. Calling this function is
+ * optional, because calling any other function in the module will also
+ * initialize it. However, in a multithreaded program, the module must be
+ * initialized while the process is still single-threaded. */
+void
fatal_signal_init(void)
{
static bool inited = false;
if (!inited) {
size_t i;
+ assert_single_threaded();
inited = true;
+ ovs_mutex_init_recursive(&mutex);
+#ifndef _WIN32
xpipe_nonblocking(signal_fds);
+#else
+ wevent = CreateEvent(NULL, TRUE, FALSE, NULL);
+ if (!wevent) {
+ char *msg_buf = ovs_lasterror_to_string();
+ VLOG_FATAL("Failed to create a event (%s).", msg_buf);
+ }
+
+ /* Register a function to handle Ctrl+C. */
+ SetConsoleCtrlHandler(ConsoleHandlerRoutine, true);
+#endif
for (i = 0; i < ARRAY_SIZE(fatal_signals); i++) {
int sig_nr = fatal_signals[i];
+#ifndef _WIN32
struct sigaction old_sa;
xsigaction(sig_nr, NULL, &old_sa);
&& signal(sig_nr, fatal_signal_handler) == SIG_ERR) {
VLOG_FATAL("signal failed (%s)", ovs_strerror(errno));
}
+#else
+ if (signal(sig_nr, fatal_signal_handler) == SIG_ERR) {
+ VLOG_FATAL("signal failed (%s)", ovs_strerror(errno));
+ }
+#endif
}
- atexit(atexit_handler);
+ atexit(fatal_signal_atexit_handler);
}
}
-/* Registers 'hook_cb' to be called when a process termination signal is
- * raised. If 'run_at_exit' is true, 'hook_cb' is also called during normal
- * process termination, e.g. when exit() is called or when main() returns.
+/* Registers 'hook_cb' to be called from inside poll_block() following a fatal
+ * signal. 'hook_cb' does not need to be async-signal-safe. In a
+ * multithreaded program 'hook_cb' might be called from any thread, with
+ * threads other than the one running 'hook_cb' in unknown states.
*
- * 'hook_cb' is not called immediately from the signal handler but rather the
- * next time the poll loop iterates, so it is freed from the usual restrictions
- * on signal handler functions.
+ * If 'run_at_exit' is true, 'hook_cb' is also called during normal process
+ * termination, e.g. when exit() is called or when main() returns.
*
* If the current process forks, fatal_signal_fork() may be called to clear the
* parent process's fatal signal hooks, so that 'hook_cb' is only called when
{
fatal_signal_init();
+ ovs_mutex_lock(&mutex);
ovs_assert(n_hooks < MAX_HOOKS);
hooks[n_hooks].hook_cb = hook_cb;
hooks[n_hooks].cancel_cb = cancel_cb;
hooks[n_hooks].aux = aux;
hooks[n_hooks].run_at_exit = run_at_exit;
n_hooks++;
+ ovs_mutex_unlock(&mutex);
}
+#ifdef HAVE_UNWIND
+/* Convert unsigned long long to string. This is needed because
+ * using snprintf() is not async signal safe. */
+static inline int
+llong_to_hex_str(unsigned long long value, char *str)
+{
+ int i = 0, res;
+
+ if (value / 16 > 0) {
+ i = llong_to_hex_str(value / 16, str);
+ }
+
+ res = value % 16;
+ str[i] = "0123456789abcdef"[res];
+
+ return i + 1;
+}
+
+/* Send the backtrace buffer to monitor thread.
+ *
+ * Note that this runs in the signal handling context, any system
+ * library functions used here must be async-signal-safe.
+ */
+static inline void
+send_backtrace_to_monitor(void) {
+ /* volatile added to prevent a "clobbered" error on ppc64le with gcc */
+ volatile int dep;
+ struct unw_backtrace unw_bt[UNW_MAX_DEPTH];
+ unw_cursor_t cursor;
+ unw_context_t uc;
+
+ if (daemonize_fd == -1) {
+ return;
+ }
+
+ dep = 0;
+ unw_getcontext(&uc);
+ unw_init_local(&cursor, &uc);
+
+ while (dep < UNW_MAX_DEPTH && unw_step(&cursor)) {
+ memset(unw_bt[dep].func, 0, UNW_MAX_FUNCN);
+ unw_get_reg(&cursor, UNW_REG_IP, &unw_bt[dep].ip);
+ unw_get_proc_name(&cursor, unw_bt[dep].func, UNW_MAX_FUNCN,
+ &unw_bt[dep].offset);
+ dep++;
+ }
+
+ if (monitor) {
+ ignore(write(daemonize_fd, unw_bt,
+ dep * sizeof(struct unw_backtrace)));
+ } else {
+ /* Since there is no monitor daemon running, write backtrace
+ * in current process.
+ */
+ char str[] = "SIGSEGV detected, backtrace:\n";
+ char ip_str[16], offset_str[6];
+ char line[64], fn_name[UNW_MAX_FUNCN];
+
+ vlog_direct_write_to_log_file_unsafe(str);
+
+ for (int i = 0; i < dep; i++) {
+ memset(line, 0, sizeof line);
+ memset(fn_name, 0, sizeof fn_name);
+ memset(offset_str, 0, sizeof offset_str);
+ memset(ip_str, ' ', sizeof ip_str);
+ ip_str[sizeof(ip_str) - 1] = 0;
+
+ llong_to_hex_str(unw_bt[i].ip, ip_str);
+ llong_to_hex_str(unw_bt[i].offset, offset_str);
+
+ strcat(line, "0x");
+ strcat(line, ip_str);
+ strcat(line, "<");
+ memcpy(fn_name, unw_bt[i].func, UNW_MAX_FUNCN - 1);
+ strcat(line, fn_name);
+ strcat(line, "+0x");
+ strcat(line, offset_str);
+ strcat(line, ">\n");
+ vlog_direct_write_to_log_file_unsafe(line);
+ }
+ }
+}
+#else
+static inline void
+send_backtrace_to_monitor(void) {
+ /* Nothing. */
+}
+#endif
+
/* Handles fatal signal number 'sig_nr'.
*
* Ordinarily this is the actual signal handler. When other code needs to
void
fatal_signal_handler(int sig_nr)
{
+#ifndef _WIN32
+ if (sig_nr == SIGSEGV) {
+ signal(sig_nr, SIG_DFL); /* Set it back immediately. */
+ send_backtrace_to_monitor();
+ raise(sig_nr);
+ }
ignore(write(signal_fds[1], "", 1));
+#else
+ SetEvent(wevent);
+#endif
stored_sig_nr = sig_nr;
}
if (sig_nr != SIG_ATOMIC_MAX) {
char namebuf[SIGNAL_NAME_BUFSIZE];
+ ovs_mutex_lock(&mutex);
+
+#ifndef _WIN32
VLOG_WARN("terminating with signal %d (%s)",
(int)sig_nr, signal_name(sig_nr, namebuf, sizeof namebuf));
+#else
+ VLOG_WARN("terminating with signal %d", (int)sig_nr);
+#endif
call_hooks(sig_nr);
+ fflush(stderr);
/* Re-raise the signal with the default handling so that the program
* termination status reflects that we were killed by this signal */
signal(sig_nr, SIG_DFL);
raise(sig_nr);
+
+ ovs_mutex_unlock(&mutex);
+ OVS_NOT_REACHED();
}
}
fatal_signal_wait(void)
{
fatal_signal_init();
+#ifdef _WIN32
+ poll_wevent_wait(wevent);
+#else
poll_fd_wait(signal_fds[0], POLLIN);
+#endif
}
-static void
-atexit_handler(void)
+void
+fatal_ignore_sigpipe(void)
+{
+#ifndef _WIN32
+ signal(SIGPIPE, SIG_IGN);
+#endif
+}
+
+void
+fatal_signal_atexit_handler(void)
{
call_hooks(0);
}
}
}
}
+
+#ifdef _WIN32
+BOOL WINAPI ConsoleHandlerRoutine(DWORD dwCtrlType)
+{
+ stored_sig_nr = SIGINT;
+ SetEvent(wevent);
+ return true;
+}
+#endif
\f
/* Files to delete on exit. */
static struct sset files = SSET_INITIALIZER(&files);
void
fatal_signal_add_file_to_unlink(const char *file)
{
+ fatal_signal_init();
+
+ ovs_mutex_lock(&mutex);
if (!added_hook) {
added_hook = true;
fatal_signal_add_hook(unlink_files, cancel_files, NULL, true);
}
sset_add(&files, file);
+ ovs_mutex_unlock(&mutex);
}
/* Unregisters 'file' from being unlinked when the program terminates via
void
fatal_signal_remove_file_to_unlink(const char *file)
{
+ fatal_signal_init();
+
+ ovs_mutex_lock(&mutex);
sset_find_and_delete(&files, file);
+ ovs_mutex_unlock(&mutex);
}
/* Like fatal_signal_remove_file_to_unlink(), but also unlinks 'file'.
int
fatal_signal_unlink_file_now(const char *file)
{
- int error = unlink(file) ? errno : 0;
+ int error;
+
+ fatal_signal_init();
+
+ ovs_mutex_lock(&mutex);
+
+ error = unlink(file) ? errno : 0;
if (error) {
VLOG_WARN("could not unlink \"%s\" (%s)", file, ovs_strerror(error));
}
fatal_signal_remove_file_to_unlink(file);
+ ovs_mutex_unlock(&mutex);
+
return error;
}
{
size_t i;
+ assert_single_threaded();
+
for (i = 0; i < n_hooks; i++) {
struct hook *h = &hooks[i];
if (h->cancel_cb) {
raise(stored_sig_nr);
}
}
+
+#ifndef _WIN32
+/* Blocks all fatal signals and returns previous signal mask into
+ * 'prev_mask'. */
+void
+fatal_signal_block(sigset_t *prev_mask)
+{
+ int i;
+ sigset_t block_mask;
+
+ sigemptyset(&block_mask);
+ for (i = 0; i < ARRAY_SIZE(fatal_signals); i++) {
+ int sig_nr = fatal_signals[i];
+ sigaddset(&block_mask, sig_nr);
+ }
+ xpthread_sigmask(SIG_BLOCK, &block_mask, prev_mask);
+}
+#endif