This commit adds a `#[link]` annotation to the block defining symbols coming from a native static library that we build and link. This is required by rustc to get symbols to get exported correctly when linking wasmtime into a Rust dynamic library instead of always as an rlib. While I was at it I went ahead and renamed the symbols now that they're no longer in C++ and they're doing setjmp/longjmp and not much else. Closes #3006
256 lines
10 KiB
Rust
256 lines
10 KiB
Rust
use crate::traphandlers::{tls, wasmtime_longjmp, Trap};
|
|
use std::cell::RefCell;
|
|
use std::convert::TryInto;
|
|
use std::io;
|
|
use std::mem::{self, MaybeUninit};
|
|
use std::ptr::{self, null_mut};
|
|
|
|
/// Function which may handle custom signals while processing traps.
|
|
pub type SignalHandler<'a> =
|
|
dyn Fn(libc::c_int, *const libc::siginfo_t, *const libc::c_void) -> bool + Send + Sync + 'a;
|
|
|
|
static mut PREV_SIGSEGV: MaybeUninit<libc::sigaction> = MaybeUninit::uninit();
|
|
static mut PREV_SIGBUS: MaybeUninit<libc::sigaction> = MaybeUninit::uninit();
|
|
static mut PREV_SIGILL: MaybeUninit<libc::sigaction> = MaybeUninit::uninit();
|
|
static mut PREV_SIGFPE: MaybeUninit<libc::sigaction> = MaybeUninit::uninit();
|
|
|
|
pub unsafe fn platform_init() {
|
|
let register = |slot: &mut MaybeUninit<libc::sigaction>, signal: i32| {
|
|
let mut handler: libc::sigaction = mem::zeroed();
|
|
// The flags here are relatively careful, and they are...
|
|
//
|
|
// SA_SIGINFO gives us access to information like the program
|
|
// counter from where the fault happened.
|
|
//
|
|
// SA_ONSTACK allows us to handle signals on an alternate stack,
|
|
// so that the handler can run in response to running out of
|
|
// stack space on the main stack. Rust installs an alternate
|
|
// stack with sigaltstack, so we rely on that.
|
|
//
|
|
// SA_NODEFER allows us to reenter the signal handler if we
|
|
// crash while handling the signal, and fall through to the
|
|
// Breakpad handler by testing handlingSegFault.
|
|
handler.sa_flags = libc::SA_SIGINFO | libc::SA_NODEFER | libc::SA_ONSTACK;
|
|
handler.sa_sigaction = trap_handler as usize;
|
|
libc::sigemptyset(&mut handler.sa_mask);
|
|
if libc::sigaction(signal, &handler, slot.as_mut_ptr()) != 0 {
|
|
panic!(
|
|
"unable to install signal handler: {}",
|
|
io::Error::last_os_error(),
|
|
);
|
|
}
|
|
};
|
|
|
|
// Allow handling OOB with signals on all architectures
|
|
register(&mut PREV_SIGSEGV, libc::SIGSEGV);
|
|
|
|
// Handle `unreachable` instructions which execute `ud2` right now
|
|
register(&mut PREV_SIGILL, libc::SIGILL);
|
|
|
|
// x86 and s390x use SIGFPE to report division by zero
|
|
if cfg!(target_arch = "x86") || cfg!(target_arch = "x86_64") || cfg!(target_arch = "s390x") {
|
|
register(&mut PREV_SIGFPE, libc::SIGFPE);
|
|
}
|
|
|
|
// On ARM, handle Unaligned Accesses.
|
|
if cfg!(target_arch = "arm") || cfg!(target_os = "freebsd") {
|
|
register(&mut PREV_SIGBUS, libc::SIGBUS);
|
|
}
|
|
}
|
|
|
|
unsafe extern "C" fn trap_handler(
|
|
signum: libc::c_int,
|
|
siginfo: *mut libc::siginfo_t,
|
|
context: *mut libc::c_void,
|
|
) {
|
|
let previous = match signum {
|
|
libc::SIGSEGV => &PREV_SIGSEGV,
|
|
libc::SIGBUS => &PREV_SIGBUS,
|
|
libc::SIGFPE => &PREV_SIGFPE,
|
|
libc::SIGILL => &PREV_SIGILL,
|
|
_ => panic!("unknown signal: {}", signum),
|
|
};
|
|
let handled = tls::with(|info| {
|
|
// If no wasm code is executing, we don't handle this as a wasm
|
|
// trap.
|
|
let info = match info {
|
|
Some(info) => info,
|
|
None => return false,
|
|
};
|
|
|
|
// If we hit an exception while handling a previous trap, that's
|
|
// quite bad, so bail out and let the system handle this
|
|
// recursive segfault.
|
|
//
|
|
// Otherwise flag ourselves as handling a trap, do the trap
|
|
// handling, and reset our trap handling flag. Then we figure
|
|
// out what to do based on the result of the trap handling.
|
|
let pc = get_pc(context, signum);
|
|
let jmp_buf = info.jmp_buf_if_trap(pc, |handler| handler(signum, siginfo, context));
|
|
|
|
// Figure out what to do based on the result of this handling of
|
|
// the trap. Note that our sentinel value of 1 means that the
|
|
// exception was handled by a custom exception handler, so we
|
|
// keep executing.
|
|
if jmp_buf.is_null() {
|
|
return false;
|
|
}
|
|
if jmp_buf as usize == 1 {
|
|
return true;
|
|
}
|
|
info.capture_backtrace(pc);
|
|
wasmtime_longjmp(jmp_buf)
|
|
});
|
|
|
|
if handled {
|
|
return;
|
|
}
|
|
|
|
// This signal is not for any compiled wasm code we expect, so we
|
|
// need to forward the signal to the next handler. If there is no
|
|
// next handler (SIG_IGN or SIG_DFL), then it's time to crash. To do
|
|
// this, we set the signal back to its original disposition and
|
|
// return. This will cause the faulting op to be re-executed which
|
|
// will crash in the normal way. If there is a next handler, call
|
|
// it. It will either crash synchronously, fix up the instruction
|
|
// so that execution can continue and return, or trigger a crash by
|
|
// returning the signal to it's original disposition and returning.
|
|
let previous = &*previous.as_ptr();
|
|
if previous.sa_flags & libc::SA_SIGINFO != 0 {
|
|
mem::transmute::<usize, extern "C" fn(libc::c_int, *mut libc::siginfo_t, *mut libc::c_void)>(
|
|
previous.sa_sigaction,
|
|
)(signum, siginfo, context)
|
|
} else if previous.sa_sigaction == libc::SIG_DFL || previous.sa_sigaction == libc::SIG_IGN {
|
|
libc::sigaction(signum, previous, ptr::null_mut());
|
|
} else {
|
|
mem::transmute::<usize, extern "C" fn(libc::c_int)>(previous.sa_sigaction)(signum)
|
|
}
|
|
}
|
|
|
|
unsafe fn get_pc(cx: *mut libc::c_void, _signum: libc::c_int) -> *const u8 {
|
|
cfg_if::cfg_if! {
|
|
if #[cfg(all(target_os = "linux", target_arch = "x86_64"))] {
|
|
let cx = &*(cx as *const libc::ucontext_t);
|
|
cx.uc_mcontext.gregs[libc::REG_RIP as usize] as *const u8
|
|
} else if #[cfg(all(target_os = "linux", target_arch = "x86"))] {
|
|
let cx = &*(cx as *const libc::ucontext_t);
|
|
cx.uc_mcontext.gregs[libc::REG_EIP as usize] as *const u8
|
|
} else if #[cfg(all(any(target_os = "linux", target_os = "android"), target_arch = "aarch64"))] {
|
|
let cx = &*(cx as *const libc::ucontext_t);
|
|
cx.uc_mcontext.pc as *const u8
|
|
} else if #[cfg(all(target_os = "linux", target_arch = "s390x"))] {
|
|
// On s390x, SIGILL and SIGFPE are delivered with the PSW address
|
|
// pointing *after* the faulting instruction, while SIGSEGV and
|
|
// SIGBUS are delivered with the PSW address pointing *to* the
|
|
// faulting instruction. To handle this, the code generator registers
|
|
// any trap that results in one of "late" signals on the last byte
|
|
// of the instruction, and any trap that results in one of the "early"
|
|
// signals on the first byte of the instruction (as usual). This
|
|
// means we simply need to decrement the reported PSW address by
|
|
// one in the case of a "late" signal here to ensure we always
|
|
// correctly find the associated trap handler.
|
|
let trap_offset = match _signum {
|
|
libc::SIGILL | libc::SIGFPE => 1,
|
|
_ => 0,
|
|
};
|
|
let cx = &*(cx as *const libc::ucontext_t);
|
|
(cx.uc_mcontext.psw.addr - trap_offset) as *const u8
|
|
} else if #[cfg(all(target_os = "freebsd", target_arch = "x86_64"))] {
|
|
let cx = &*(cx as *const libc::ucontext_t);
|
|
cx.uc_mcontext.mc_rip as *const u8
|
|
} else {
|
|
compile_error!("unsupported platform");
|
|
}
|
|
}
|
|
}
|
|
|
|
/// A function for registering a custom alternate signal stack (sigaltstack).
|
|
///
|
|
/// Rust's libstd installs an alternate stack with size `SIGSTKSZ`, which is not
|
|
/// always large enough for our signal handling code. Override it by creating
|
|
/// and registering our own alternate stack that is large enough and has a guard
|
|
/// page.
|
|
pub fn lazy_per_thread_init() -> Result<(), Trap> {
|
|
// This thread local is purely used to register a `Stack` to get deallocated
|
|
// when the thread exists. Otherwise this function is only ever called at
|
|
// most once per-thread.
|
|
thread_local! {
|
|
static STACK: RefCell<Option<Stack>> = RefCell::new(None);
|
|
}
|
|
|
|
/// The size of the sigaltstack (not including the guard, which will be
|
|
/// added). Make this large enough to run our signal handlers.
|
|
const MIN_STACK_SIZE: usize = 16 * 4096;
|
|
|
|
struct Stack {
|
|
mmap_ptr: *mut libc::c_void,
|
|
mmap_size: usize,
|
|
}
|
|
|
|
return STACK.with(|s| {
|
|
*s.borrow_mut() = unsafe { allocate_sigaltstack()? };
|
|
Ok(())
|
|
});
|
|
|
|
unsafe fn allocate_sigaltstack() -> Result<Option<Stack>, Trap> {
|
|
// Check to see if the existing sigaltstack, if it exists, is big
|
|
// enough. If so we don't need to allocate our own.
|
|
let mut old_stack = mem::zeroed();
|
|
let r = libc::sigaltstack(ptr::null(), &mut old_stack);
|
|
assert_eq!(r, 0, "learning about sigaltstack failed");
|
|
if old_stack.ss_flags & libc::SS_DISABLE == 0 && old_stack.ss_size >= MIN_STACK_SIZE {
|
|
return Ok(None);
|
|
}
|
|
|
|
// ... but failing that we need to allocate our own, so do all that
|
|
// here.
|
|
let page_size: usize = libc::sysconf(libc::_SC_PAGESIZE).try_into().unwrap();
|
|
let guard_size = page_size;
|
|
let alloc_size = guard_size + MIN_STACK_SIZE;
|
|
|
|
let ptr = libc::mmap(
|
|
null_mut(),
|
|
alloc_size,
|
|
libc::PROT_NONE,
|
|
libc::MAP_PRIVATE | libc::MAP_ANON,
|
|
-1,
|
|
0,
|
|
);
|
|
if ptr == libc::MAP_FAILED {
|
|
return Err(Trap::oom());
|
|
}
|
|
|
|
// Prepare the stack with readable/writable memory and then register it
|
|
// with `sigaltstack`.
|
|
let stack_ptr = (ptr as usize + guard_size) as *mut libc::c_void;
|
|
let r = libc::mprotect(
|
|
stack_ptr,
|
|
MIN_STACK_SIZE,
|
|
libc::PROT_READ | libc::PROT_WRITE,
|
|
);
|
|
assert_eq!(r, 0, "mprotect to configure memory for sigaltstack failed");
|
|
let new_stack = libc::stack_t {
|
|
ss_sp: stack_ptr,
|
|
ss_flags: 0,
|
|
ss_size: MIN_STACK_SIZE,
|
|
};
|
|
let r = libc::sigaltstack(&new_stack, ptr::null_mut());
|
|
assert_eq!(r, 0, "registering new sigaltstack failed");
|
|
|
|
Ok(Some(Stack {
|
|
mmap_ptr: ptr,
|
|
mmap_size: alloc_size,
|
|
}))
|
|
}
|
|
|
|
impl Drop for Stack {
|
|
fn drop(&mut self) {
|
|
unsafe {
|
|
// Deallocate the stack memory.
|
|
let r = libc::munmap(self.mmap_ptr, self.mmap_size);
|
|
debug_assert_eq!(r, 0, "munmap failed during thread shutdown");
|
|
}
|
|
}
|
|
}
|
|
}
|