Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(78)

Side by Side Diff: base/debug/stack_trace_posix.cc

Issue 136033004: Use posix version of stack_trace on iOS (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Rebase & remove incorrect comment Created 6 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « base/debug/stack_trace_ios.mm ('k') | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "base/debug/stack_trace.h" 5 #include "base/debug/stack_trace.h"
6 6
7 #include <errno.h> 7 #include <errno.h>
8 #include <execinfo.h> 8 #include <execinfo.h>
9 #include <fcntl.h> 9 #include <fcntl.h>
10 #include <signal.h> 10 #include <signal.h>
(...skipping 161 matching lines...) Expand 10 before | Expand all | Expand 10 after
172 } 172 }
173 #endif // defined(USE_SYMBOLIZE) 173 #endif // defined(USE_SYMBOLIZE)
174 } 174 }
175 175
176 void PrintToStderr(const char* output) { 176 void PrintToStderr(const char* output) {
177 // NOTE: This code MUST be async-signal safe (it's used by in-process 177 // NOTE: This code MUST be async-signal safe (it's used by in-process
178 // stack dumping signal handler). NO malloc or stdio is allowed here. 178 // stack dumping signal handler). NO malloc or stdio is allowed here.
179 ignore_result(HANDLE_EINTR(write(STDERR_FILENO, output, strlen(output)))); 179 ignore_result(HANDLE_EINTR(write(STDERR_FILENO, output, strlen(output))));
180 } 180 }
181 181
182 #if !defined(OS_IOS)
183 void StackDumpSignalHandler(int signal, siginfo_t* info, void* void_context) { 182 void StackDumpSignalHandler(int signal, siginfo_t* info, void* void_context) {
184 // NOTE: This code MUST be async-signal safe. 183 // NOTE: This code MUST be async-signal safe.
185 // NO malloc or stdio is allowed here. 184 // NO malloc or stdio is allowed here.
186 185
187 // Record the fact that we are in the signal handler now, so that the rest 186 // Record the fact that we are in the signal handler now, so that the rest
188 // of StackTrace can behave in an async-signal-safe manner. 187 // of StackTrace can behave in an async-signal-safe manner.
189 in_signal_handler = 1; 188 in_signal_handler = 1;
190 189
191 if (BeingDebugged()) 190 if (BeingDebugged())
192 BreakDebugger(); 191 BreakDebugger();
(...skipping 130 matching lines...) Expand 10 before | Expand all | Expand 10 after
323 internal::itoa_r(registers[i].value, buf, sizeof(buf), 322 internal::itoa_r(registers[i].value, buf, sizeof(buf),
324 16, kRegisterPadding); 323 16, kRegisterPadding);
325 PrintToStderr(buf); 324 PrintToStderr(buf);
326 325
327 if ((i + 1) % 4 == 0) 326 if ((i + 1) % 4 == 0)
328 PrintToStderr("\n"); 327 PrintToStderr("\n");
329 } 328 }
330 PrintToStderr("\n"); 329 PrintToStderr("\n");
331 #endif 330 #endif
332 #elif defined(OS_MACOSX) 331 #elif defined(OS_MACOSX)
333 // TODO(shess): Port to 64-bit. 332 // TODO(shess): Port to 64-bit, and ARM architecture (32 and 64-bit).
334 #if ARCH_CPU_X86_FAMILY && ARCH_CPU_32_BITS 333 #if ARCH_CPU_X86_FAMILY && ARCH_CPU_32_BITS
335 ucontext_t* context = reinterpret_cast<ucontext_t*>(void_context); 334 ucontext_t* context = reinterpret_cast<ucontext_t*>(void_context);
336 size_t len; 335 size_t len;
337 336
338 // NOTE: Even |snprintf()| is not on the approved list for signal 337 // NOTE: Even |snprintf()| is not on the approved list for signal
339 // handlers, but buffered I/O is definitely not on the list due to 338 // handlers, but buffered I/O is definitely not on the list due to
340 // potential for |malloc()|. 339 // potential for |malloc()|.
341 len = static_cast<size_t>( 340 len = static_cast<size_t>(
342 snprintf(buf, sizeof(buf), 341 snprintf(buf, sizeof(buf),
343 "ax: %x, bx: %x, cx: %x, dx: %x\n", 342 "ax: %x, bx: %x, cx: %x, dx: %x\n",
(...skipping 21 matching lines...) Expand all
365 context->uc_mcontext->__ss.__cs, 364 context->uc_mcontext->__ss.__cs,
366 context->uc_mcontext->__ss.__ds, 365 context->uc_mcontext->__ss.__ds,
367 context->uc_mcontext->__ss.__es, 366 context->uc_mcontext->__ss.__es,
368 context->uc_mcontext->__ss.__fs, 367 context->uc_mcontext->__ss.__fs,
369 context->uc_mcontext->__ss.__gs)); 368 context->uc_mcontext->__ss.__gs));
370 write(STDERR_FILENO, buf, std::min(len, sizeof(buf) - 1)); 369 write(STDERR_FILENO, buf, std::min(len, sizeof(buf) - 1));
371 #endif // ARCH_CPU_32_BITS 370 #endif // ARCH_CPU_32_BITS
372 #endif // defined(OS_MACOSX) 371 #endif // defined(OS_MACOSX)
373 _exit(1); 372 _exit(1);
374 } 373 }
375 #endif // !defined(OS_IOS)
376 374
377 class PrintBacktraceOutputHandler : public BacktraceOutputHandler { 375 class PrintBacktraceOutputHandler : public BacktraceOutputHandler {
378 public: 376 public:
379 PrintBacktraceOutputHandler() {} 377 PrintBacktraceOutputHandler() {}
380 378
381 virtual void HandleOutput(const char* output) OVERRIDE { 379 virtual void HandleOutput(const char* output) OVERRIDE {
382 // NOTE: This code MUST be async-signal safe (it's used by in-process 380 // NOTE: This code MUST be async-signal safe (it's used by in-process
383 // stack dumping signal handler). NO malloc or stdio is allowed here. 381 // stack dumping signal handler). NO malloc or stdio is allowed here.
384 PrintToStderr(output); 382 PrintToStderr(output);
385 } 383 }
(...skipping 10 matching lines...) Expand all
396 virtual void HandleOutput(const char* output) OVERRIDE { 394 virtual void HandleOutput(const char* output) OVERRIDE {
397 (*os_) << output; 395 (*os_) << output;
398 } 396 }
399 397
400 private: 398 private:
401 std::ostream* os_; 399 std::ostream* os_;
402 400
403 DISALLOW_COPY_AND_ASSIGN(StreamBacktraceOutputHandler); 401 DISALLOW_COPY_AND_ASSIGN(StreamBacktraceOutputHandler);
404 }; 402 };
405 403
406 #if !defined(OS_IOS)
407 void WarmUpBacktrace() { 404 void WarmUpBacktrace() {
408 // Warm up stack trace infrastructure. It turns out that on the first 405 // Warm up stack trace infrastructure. It turns out that on the first
409 // call glibc initializes some internal data structures using pthread_once, 406 // call glibc initializes some internal data structures using pthread_once,
410 // and even backtrace() can call malloc(), leading to hangs. 407 // and even backtrace() can call malloc(), leading to hangs.
411 // 408 //
412 // Example stack trace snippet (with tcmalloc): 409 // Example stack trace snippet (with tcmalloc):
413 // 410 //
414 // #8 0x0000000000a173b5 in tc_malloc 411 // #8 0x0000000000a173b5 in tc_malloc
415 // at ./third_party/tcmalloc/chromium/src/debugallocation.cc:1161 412 // at ./third_party/tcmalloc/chromium/src/debugallocation.cc:1161
416 // #9 0x00007ffff7de7900 in _dl_map_object_deps at dl-deps.c:517 413 // #9 0x00007ffff7de7900 in _dl_map_object_deps at dl-deps.c:517
(...skipping 12 matching lines...) Expand all
429 // #19 0x00007ffff61efa14 in __GI___backtrace 426 // #19 0x00007ffff61efa14 in __GI___backtrace
430 // at ../sysdeps/x86_64/../ia64/backtrace.c:104 427 // at ../sysdeps/x86_64/../ia64/backtrace.c:104
431 // #20 0x0000000000752a54 in base::debug::StackTrace::StackTrace 428 // #20 0x0000000000752a54 in base::debug::StackTrace::StackTrace
432 // at base/debug/stack_trace_posix.cc:175 429 // at base/debug/stack_trace_posix.cc:175
433 // #21 0x00000000007a4ae5 in 430 // #21 0x00000000007a4ae5 in
434 // base::(anonymous namespace)::StackDumpSignalHandler 431 // base::(anonymous namespace)::StackDumpSignalHandler
435 // at base/process_util_posix.cc:172 432 // at base/process_util_posix.cc:172
436 // #22 <signal handler called> 433 // #22 <signal handler called>
437 StackTrace stack_trace; 434 StackTrace stack_trace;
438 } 435 }
439 #endif // !defined(OS_IOS)
440 436
441 } // namespace 437 } // namespace
442 438
443 #if !defined(OS_IOS)
444 bool EnableInProcessStackDumping() { 439 bool EnableInProcessStackDumping() {
445 // When running in an application, our code typically expects SIGPIPE 440 // When running in an application, our code typically expects SIGPIPE
446 // to be ignored. Therefore, when testing that same code, it should run 441 // to be ignored. Therefore, when testing that same code, it should run
447 // with SIGPIPE ignored as well. 442 // with SIGPIPE ignored as well.
448 struct sigaction sigpipe_action; 443 struct sigaction sigpipe_action;
449 memset(&sigpipe_action, 0, sizeof(sigpipe_action)); 444 memset(&sigpipe_action, 0, sizeof(sigpipe_action));
450 sigpipe_action.sa_handler = SIG_IGN; 445 sigpipe_action.sa_handler = SIG_IGN;
451 sigemptyset(&sigpipe_action.sa_mask); 446 sigemptyset(&sigpipe_action.sa_mask);
452 bool success = (sigaction(SIGPIPE, &sigpipe_action, NULL) == 0); 447 bool success = (sigaction(SIGPIPE, &sigpipe_action, NULL) == 0);
453 448
454 // Avoid hangs during backtrace initialization, see above. 449 // Avoid hangs during backtrace initialization, see above.
455 WarmUpBacktrace(); 450 WarmUpBacktrace();
456 451
457 struct sigaction action; 452 struct sigaction action;
458 memset(&action, 0, sizeof(action)); 453 memset(&action, 0, sizeof(action));
459 action.sa_flags = SA_RESETHAND | SA_SIGINFO; 454 action.sa_flags = SA_RESETHAND | SA_SIGINFO;
460 action.sa_sigaction = &StackDumpSignalHandler; 455 action.sa_sigaction = &StackDumpSignalHandler;
461 sigemptyset(&action.sa_mask); 456 sigemptyset(&action.sa_mask);
462 457
463 success &= (sigaction(SIGILL, &action, NULL) == 0); 458 success &= (sigaction(SIGILL, &action, NULL) == 0);
464 success &= (sigaction(SIGABRT, &action, NULL) == 0); 459 success &= (sigaction(SIGABRT, &action, NULL) == 0);
465 success &= (sigaction(SIGFPE, &action, NULL) == 0); 460 success &= (sigaction(SIGFPE, &action, NULL) == 0);
466 success &= (sigaction(SIGBUS, &action, NULL) == 0); 461 success &= (sigaction(SIGBUS, &action, NULL) == 0);
467 success &= (sigaction(SIGSEGV, &action, NULL) == 0); 462 success &= (sigaction(SIGSEGV, &action, NULL) == 0);
468 success &= (sigaction(SIGSYS, &action, NULL) == 0); 463 success &= (sigaction(SIGSYS, &action, NULL) == 0);
469 464
470 return success; 465 return success;
471 } 466 }
472 #endif // !defined(OS_IOS)
473 467
474 StackTrace::StackTrace() { 468 StackTrace::StackTrace() {
475 // NOTE: This code MUST be async-signal safe (it's used by in-process 469 // NOTE: This code MUST be async-signal safe (it's used by in-process
476 // stack dumping signal handler). NO malloc or stdio is allowed here. 470 // stack dumping signal handler). NO malloc or stdio is allowed here.
477 471
478 // Though the backtrace API man page does not list any possible negative 472 // Though the backtrace API man page does not list any possible negative
479 // return values, we take no chance. 473 // return values, we take no chance.
480 count_ = std::max(backtrace(trace_, arraysize(trace_)), 0); 474 count_ = std::max(backtrace(trace_, arraysize(trace_)), 0);
481 } 475 }
482 476
(...skipping 70 matching lines...) Expand 10 before | Expand all | Expand 10 after
553 *ptr = *start; 547 *ptr = *start;
554 *start++ = ch; 548 *start++ = ch;
555 } 549 }
556 return buf; 550 return buf;
557 } 551 }
558 552
559 } // namespace internal 553 } // namespace internal
560 554
561 } // namespace debug 555 } // namespace debug
562 } // namespace base 556 } // namespace base
OLDNEW
« no previous file with comments | « base/debug/stack_trace_ios.mm ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698