Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "base/debug/stack_trace.h" | 5 #include "base/debug/stack_trace.h" |
| 6 | 6 |
| 7 #include <signal.h> | 7 #include <signal.h> |
| 8 #include <sys/types.h> | 8 #include <sys/types.h> |
| 9 #include <unistd.h> | 9 #include <unistd.h> |
| 10 #include <unwind.h> // TODO(dmikurube): Remove. See http://crbug.com/236855. | 10 #include <unwind.h> // TODO(dmikurube): Remove. See http://crbug.com/236855. |
| 11 #include <iomanip> | |
| 11 | 12 |
| 12 #include "base/logging.h" | 13 #include "base/third_party/symbolize/demangle.h" |
| 14 #include "base/third_party/symbolize/symbolize.h" | |
| 13 | 15 |
| 14 #ifdef __MIPSEL__ | 16 #ifdef __MIPSEL__ |
| 15 // SIGSTKFLT is not defined for MIPS. | 17 // SIGSTKFLT is not defined for MIPS. |
| 16 #define SIGSTKFLT SIGSEGV | 18 #define SIGSTKFLT SIGSEGV |
| 17 #endif | 19 #endif |
| 18 | 20 |
| 19 // TODO(dmikurube): Remove when Bionic's get_backtrace() gets popular. | 21 // TODO(dmikurube): Remove when Bionic's get_backtrace() gets popular. |
| 20 // See http://crbug.com/236855. | 22 // See http://crbug.com/236855. |
| 21 namespace { | 23 namespace { |
| 22 | 24 |
| (...skipping 66 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 89 // See http://crbug.com/236855. | 91 // See http://crbug.com/236855. |
| 90 stack_crawl_state_t state(reinterpret_cast<uintptr_t*>(trace_), kMaxTraces); | 92 stack_crawl_state_t state(reinterpret_cast<uintptr_t*>(trace_), kMaxTraces); |
| 91 _Unwind_Backtrace(tracer, &state); | 93 _Unwind_Backtrace(tracer, &state); |
| 92 count_ = state.frame_count; | 94 count_ = state.frame_count; |
| 93 // TODO(dmikurube): Symbolize in Chrome. | 95 // TODO(dmikurube): Symbolize in Chrome. |
| 94 } | 96 } |
| 95 | 97 |
| 96 // Sends fake SIGSTKFLT signals to let the Android linker and debuggerd dump | 98 // Sends fake SIGSTKFLT signals to let the Android linker and debuggerd dump |
| 97 // stack. See inlined comments and Android bionic/linker/debugger.c and | 99 // stack. See inlined comments and Android bionic/linker/debugger.c and |
| 98 // system/core/debuggerd/debuggerd.c for details. | 100 // system/core/debuggerd/debuggerd.c for details. |
| 99 void StackTrace::PrintBacktrace() const { | 101 void StackTrace::PrintBacktrace() const { |
|
satorux1
2013/06/12 05:43:42
PrintBacktrace() and OutputToStream() will behave
scherkus (not reviewing)
2013/06/13 01:27:44
I noticed this too -- I filed a bug and am trying
| |
| 100 // Get the current handler of SIGSTKFLT for later use. | 102 // Get the current handler of SIGSTKFLT for later use. |
| 101 sighandler_t sig_handler = signal(SIGSTKFLT, SIG_DFL); | 103 sighandler_t sig_handler = signal(SIGSTKFLT, SIG_DFL); |
| 102 signal(SIGSTKFLT, sig_handler); | 104 signal(SIGSTKFLT, sig_handler); |
| 103 | 105 |
| 104 // The Android linker will handle this signal and send a stack dumping request | 106 // The Android linker will handle this signal and send a stack dumping request |
| 105 // to debuggerd which will ptrace_attach this process. Before returning from | 107 // to debuggerd which will ptrace_attach this process. Before returning from |
| 106 // the signal handler, the linker sets the signal handler to SIG_IGN. | 108 // the signal handler, the linker sets the signal handler to SIG_IGN. |
| 107 kill(gettid(), SIGSTKFLT); | 109 kill(gettid(), SIGSTKFLT); |
| 108 | 110 |
| 109 // Because debuggerd will wait for the process to be stopped by the actual | 111 // Because debuggerd will wait for the process to be stopped by the actual |
| 110 // signal in crashing scenarios, signal is sent again to met the expectation. | 112 // signal in crashing scenarios, signal is sent again to met the expectation. |
| 111 // Debuggerd will dump stack into the system log and /data/tombstones/ files. | 113 // Debuggerd will dump stack into the system log and /data/tombstones/ files. |
| 112 // NOTE: If this process runs in the interactive shell, it will be put | 114 // NOTE: If this process runs in the interactive shell, it will be put |
| 113 // in the background. To resume it in the foreground, use 'fg' command. | 115 // in the background. To resume it in the foreground, use 'fg' command. |
| 114 kill(gettid(), SIGSTKFLT); | 116 kill(gettid(), SIGSTKFLT); |
| 115 | 117 |
| 116 // Restore the signal handler so that this method can work the next time. | 118 // Restore the signal handler so that this method can work the next time. |
| 117 signal(SIGSTKFLT, sig_handler); | 119 signal(SIGSTKFLT, sig_handler); |
| 118 } | 120 } |
| 119 | 121 |
| 122 static int OnSymbolizeCallback(int fd, | |
| 123 void* pc, | |
| 124 char* out, | |
| 125 size_t out_size, | |
| 126 uint64 relocation) { | |
| 127 // Maximum string length of an int is 10 characters. | |
| 128 char path[32]; | |
| 129 int size = snprintf(path, sizeof(path), "/proc/self/fd/%d", fd); | |
| 130 if (size < 0 || static_cast<size_t>(size) >= sizeof(path)) | |
| 131 return -1; | |
| 132 | |
| 133 char buf[1024]; | |
| 134 size = readlink(path, buf, sizeof(buf)); | |
|
scherkus (not reviewing)
2013/06/12 00:43:43
satorux: this is also kind of unnecessary since sy
satorux1
2013/06/12 05:43:42
I think it's easy to change symbolize.cc to provid
| |
| 135 if (size < 0 || static_cast<size_t>(size) >= sizeof(buf)) | |
| 136 return -1; | |
| 137 buf[size] = '\0'; // readlink() doesn't null-terminate strings. | |
| 138 | |
| 139 uintptr_t rel_pc = reinterpret_cast<uintptr_t>(pc) - relocation; | |
| 140 size = snprintf(out, out_size, "pc %08x %s ", rel_pc, buf); | |
| 141 return size; | |
| 142 } | |
| 143 | |
| 120 void StackTrace::OutputToStream(std::ostream* os) const { | 144 void StackTrace::OutputToStream(std::ostream* os) const { |
| 121 NOTIMPLEMENTED(); | 145 // TODO(scherkus): HACK - is this thread/async safe and/or proper usage? |
| 146 google::InstallSymbolizeCallback(&OnSymbolizeCallback); | |
|
scherkus (not reviewing)
2013/06/12 00:43:43
satorux: is this intended usage? I couldn't find a
satorux1
2013/06/12 05:43:42
IIRC, this awkward callback hook was introduced to
| |
| 147 | |
| 148 for (size_t i = 0; i < count_; ++i) { | |
| 149 // NOTE: Native libraries in APKs are stripped before installing. Print out | |
| 150 // the relocatable address and library names so host computers can use tools | |
| 151 // to symbolize and demangle (e.g., addr2line, c++filt). | |
| 152 char buf[1024]; | |
| 153 strncpy(buf, "<unknown>", sizeof(buf)); | |
| 154 | |
| 155 // Subtract by one as return address of function may be in the next | |
| 156 // function when a function is annotated as noreturn. | |
| 157 void* address = static_cast<char*>(trace_[i]) - 1; | |
| 158 google::Symbolize(address, buf, sizeof(buf)); | |
| 159 | |
| 160 // TODO(scherkus): HACK - we blindly print contents of |buf| knowing that | |
|
scherkus (not reviewing)
2013/06/12 00:43:43
satorux: this is also really gross
I want to use
satorux1
2013/06/12 05:43:42
If Symbolize() fails most of the time, using this
scherkus (not reviewing)
2013/06/13 01:27:44
I went with (2) -- let me know if you think it's t
| |
| 161 // it's initialized to "<unknown>" and that our callback will be executed to | |
| 162 // fill the contents with the executable path and offset. | |
| 163 | |
| 164 *os << " #" << std::setfill('0') << std::setw(2) << i << " " << buf | |
| 165 << "\n"; | |
| 166 } | |
| 167 | |
| 168 google::InstallSymbolizeCallback(NULL); | |
| 122 } | 169 } |
| 123 | 170 |
| 124 } // namespace debug | 171 } // namespace debug |
| 125 } // namespace base | 172 } // namespace base |
| OLD | NEW |