Properly redeliver (or don't) signals to the previous handlers.
If none of the installed ExceptionHandlers handle a signal (their FilterCallbacks or HandlerCallbacks all return false), then the signal should be delivered to the signal handlers that were previously installed. This requires that old_handlers_ become a static vector so that we can restore the handlers in the static HandleSignal. Currently it is also restoring signals in ~ExceptionHandler (if there are no others). This should not be required since our documentation states that a process can only have one ExceptionHandler for which install_handlers is true (and so we get the correct behavior if we simply leave our handlers installed forever), but even the tests themselves violate that. Patch by Chris Hopman <cjhopman@chromium.org> Review URL: https://breakpad.appspot.com/440002/ git-svn-id: http://google-breakpad.googlecode.com/svn/trunk@1025 4c0a9323-5329-0410-9bdc-e9ce6186880e
This commit is contained in:
parent
7e3c538af1
commit
343ce73b73
3 changed files with 304 additions and 72 deletions
|
@ -108,17 +108,86 @@ static int tgkill(pid_t tgid, pid_t tid, int sig) {
|
||||||
|
|
||||||
namespace google_breakpad {
|
namespace google_breakpad {
|
||||||
|
|
||||||
|
namespace {
|
||||||
// The list of signals which we consider to be crashes. The default action for
|
// The list of signals which we consider to be crashes. The default action for
|
||||||
// all these signals must be Core (see man 7 signal) because we rethrow the
|
// all these signals must be Core (see man 7 signal) because we rethrow the
|
||||||
// signal after handling it and expect that it'll be fatal.
|
// signal after handling it and expect that it'll be fatal.
|
||||||
static const int kExceptionSignals[] = {
|
const int kExceptionSignals[] = {
|
||||||
SIGSEGV, SIGABRT, SIGFPE, SIGILL, SIGBUS, -1
|
SIGSEGV, SIGABRT, SIGFPE, SIGILL, SIGBUS
|
||||||
};
|
};
|
||||||
|
const int kNumHandledSignals =
|
||||||
|
sizeof(kExceptionSignals) / sizeof(kExceptionSignals[0]);
|
||||||
|
struct sigaction old_handlers[kNumHandledSignals] = {0};
|
||||||
|
bool handlers_installed = false;
|
||||||
|
|
||||||
|
// InstallAlternateStackLocked will store the newly installed stack in new_stack
|
||||||
|
// and (if it exists) the previously installed stack in old_stack.
|
||||||
|
stack_t old_stack;
|
||||||
|
stack_t new_stack;
|
||||||
|
bool stack_installed = false;
|
||||||
|
|
||||||
|
// Create an alternative stack to run the signal handlers on. This is done since
|
||||||
|
// the signal might have been caused by a stack overflow.
|
||||||
|
// Runs before crashing: normal context.
|
||||||
|
void InstallAlternateStackLocked() {
|
||||||
|
if (stack_installed)
|
||||||
|
return;
|
||||||
|
|
||||||
|
memset(&old_stack, 0, sizeof(old_stack));
|
||||||
|
memset(&new_stack, 0, sizeof(new_stack));
|
||||||
|
|
||||||
|
// SIGSTKSZ may be too small to prevent the signal handlers from overrunning
|
||||||
|
// the alternative stack. Ensure that the size of the alternative stack is
|
||||||
|
// large enough.
|
||||||
|
static const unsigned kSigStackSize = std::max(8192, SIGSTKSZ);
|
||||||
|
|
||||||
|
// Only set an alternative stack if there isn't already one, or if the current
|
||||||
|
// one is too small.
|
||||||
|
if (sys_sigaltstack(NULL, &old_stack) == -1 || !old_stack.ss_sp ||
|
||||||
|
old_stack.ss_size < kSigStackSize) {
|
||||||
|
new_stack.ss_sp = malloc(kSigStackSize);
|
||||||
|
new_stack.ss_size = kSigStackSize;
|
||||||
|
|
||||||
|
if (sys_sigaltstack(&new_stack, NULL) == -1) {
|
||||||
|
free(new_stack.ss_sp);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
stack_installed = true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Runs before crashing: normal context.
|
||||||
|
void RestoreAlternateStackLocked() {
|
||||||
|
if (!stack_installed)
|
||||||
|
return;
|
||||||
|
|
||||||
|
stack_t current_stack;
|
||||||
|
if (sys_sigaltstack(NULL, ¤t_stack) == -1)
|
||||||
|
return;
|
||||||
|
|
||||||
|
// Only restore the old_stack if the current alternative stack is the one
|
||||||
|
// installed by the call to InstallAlternateStackLocked.
|
||||||
|
if (current_stack.ss_sp == new_stack.ss_sp) {
|
||||||
|
if (old_stack.ss_sp) {
|
||||||
|
if (sys_sigaltstack(&old_stack, NULL) == -1)
|
||||||
|
return;
|
||||||
|
} else {
|
||||||
|
stack_t disable_stack;
|
||||||
|
disable_stack.ss_flags = SS_DISABLE;
|
||||||
|
if (sys_sigaltstack(&disable_stack, NULL) == -1)
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
free(new_stack.ss_sp);
|
||||||
|
stack_installed = false;
|
||||||
|
}
|
||||||
|
|
||||||
|
} // namespace
|
||||||
|
|
||||||
// We can stack multiple exception handlers. In that case, this is the global
|
// We can stack multiple exception handlers. In that case, this is the global
|
||||||
// which holds the stack.
|
// which holds the stack.
|
||||||
std::vector<ExceptionHandler*>* ExceptionHandler::handler_stack_ = NULL;
|
std::vector<ExceptionHandler*>* ExceptionHandler::handler_stack_ = NULL;
|
||||||
unsigned ExceptionHandler::handler_stack_index_ = 0;
|
|
||||||
pthread_mutex_t ExceptionHandler::handler_stack_mutex_ =
|
pthread_mutex_t ExceptionHandler::handler_stack_mutex_ =
|
||||||
PTHREAD_MUTEX_INITIALIZER;
|
PTHREAD_MUTEX_INITIALIZER;
|
||||||
|
|
||||||
|
@ -137,43 +206,42 @@ ExceptionHandler::ExceptionHandler(const MinidumpDescriptor& descriptor,
|
||||||
if (server_fd >= 0)
|
if (server_fd >= 0)
|
||||||
crash_generation_client_.reset(CrashGenerationClient::TryCreate(server_fd));
|
crash_generation_client_.reset(CrashGenerationClient::TryCreate(server_fd));
|
||||||
|
|
||||||
if (install_handler)
|
|
||||||
InstallHandlers();
|
|
||||||
|
|
||||||
if (!IsOutOfProcess() && !minidump_descriptor_.IsFD())
|
if (!IsOutOfProcess() && !minidump_descriptor_.IsFD())
|
||||||
minidump_descriptor_.UpdatePath();
|
minidump_descriptor_.UpdatePath();
|
||||||
|
|
||||||
pthread_mutex_lock(&handler_stack_mutex_);
|
pthread_mutex_lock(&handler_stack_mutex_);
|
||||||
if (!handler_stack_)
|
if (!handler_stack_)
|
||||||
handler_stack_ = new std::vector<ExceptionHandler*>;
|
handler_stack_ = new std::vector<ExceptionHandler*>;
|
||||||
|
if (install_handler) {
|
||||||
|
InstallAlternateStackLocked();
|
||||||
|
InstallHandlersLocked();
|
||||||
|
}
|
||||||
handler_stack_->push_back(this);
|
handler_stack_->push_back(this);
|
||||||
pthread_mutex_unlock(&handler_stack_mutex_);
|
pthread_mutex_unlock(&handler_stack_mutex_);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Runs before crashing: normal context.
|
// Runs before crashing: normal context.
|
||||||
ExceptionHandler::~ExceptionHandler() {
|
ExceptionHandler::~ExceptionHandler() {
|
||||||
UninstallHandlers();
|
pthread_mutex_lock(&handler_stack_mutex_);
|
||||||
|
std::vector<ExceptionHandler*>::iterator handler =
|
||||||
|
std::find(handler_stack_->begin(), handler_stack_->end(), this);
|
||||||
|
handler_stack_->erase(handler);
|
||||||
|
if (handler_stack_->empty()) {
|
||||||
|
RestoreAlternateStackLocked();
|
||||||
|
RestoreHandlersLocked();
|
||||||
|
}
|
||||||
|
pthread_mutex_unlock(&handler_stack_mutex_);
|
||||||
}
|
}
|
||||||
|
|
||||||
// Runs before crashing: normal context.
|
// Runs before crashing: normal context.
|
||||||
bool ExceptionHandler::InstallHandlers() {
|
// static
|
||||||
// We run the signal handlers on an alternative stack because we might have
|
bool ExceptionHandler::InstallHandlersLocked() {
|
||||||
// crashed because of a stack overflow.
|
if (handlers_installed)
|
||||||
|
return false;
|
||||||
|
|
||||||
// We use this value rather than SIGSTKSZ because we would end up overrunning
|
// Fail if unable to store all the old handlers.
|
||||||
// such a small stack.
|
for (unsigned i = 0; i < kNumHandledSignals; ++i) {
|
||||||
static const unsigned kSigStackSize = 8192;
|
if (sigaction(kExceptionSignals[i], NULL, &old_handlers[i]) == -1)
|
||||||
|
|
||||||
stack_t stack;
|
|
||||||
// Only set an alternative stack if there isn't already one, or if the current
|
|
||||||
// one is too small.
|
|
||||||
if (sys_sigaltstack(NULL, &stack) == -1 || !stack.ss_sp ||
|
|
||||||
stack.ss_size < kSigStackSize) {
|
|
||||||
memset(&stack, 0, sizeof(stack));
|
|
||||||
stack.ss_sp = malloc(kSigStackSize);
|
|
||||||
stack.ss_size = kSigStackSize;
|
|
||||||
|
|
||||||
if (sys_sigaltstack(&stack, NULL) == -1)
|
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -181,36 +249,36 @@ bool ExceptionHandler::InstallHandlers() {
|
||||||
memset(&sa, 0, sizeof(sa));
|
memset(&sa, 0, sizeof(sa));
|
||||||
sigemptyset(&sa.sa_mask);
|
sigemptyset(&sa.sa_mask);
|
||||||
|
|
||||||
// mask all exception signals when we're handling one of them.
|
// Mask all exception signals when we're handling one of them.
|
||||||
for (unsigned i = 0; kExceptionSignals[i] != -1; ++i)
|
for (unsigned i = 0; i < kNumHandledSignals; ++i)
|
||||||
sigaddset(&sa.sa_mask, kExceptionSignals[i]);
|
sigaddset(&sa.sa_mask, kExceptionSignals[i]);
|
||||||
|
|
||||||
sa.sa_sigaction = SignalHandler;
|
sa.sa_sigaction = SignalHandler;
|
||||||
sa.sa_flags = SA_ONSTACK | SA_SIGINFO;
|
sa.sa_flags = SA_ONSTACK | SA_SIGINFO;
|
||||||
|
|
||||||
for (unsigned i = 0; kExceptionSignals[i] != -1; ++i) {
|
for (unsigned i = 0; i < kNumHandledSignals; ++i) {
|
||||||
struct sigaction* old = new struct sigaction;
|
if (sigaction(kExceptionSignals[i], &sa, NULL) == -1) {
|
||||||
if (sigaction(kExceptionSignals[i], &sa, old) == -1)
|
// At this point it is impractical to back out changes, and so failure to
|
||||||
return false;
|
// install a signal is intentionally ignored.
|
||||||
old_handlers_.push_back(std::make_pair(kExceptionSignals[i], old));
|
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
handlers_installed = true;
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
|
|
||||||
// Runs before crashing: normal context.
|
// This function runs in a compromised context: see the top of the file.
|
||||||
void ExceptionHandler::UninstallHandlers() {
|
// Runs on the crashing thread.
|
||||||
for (unsigned i = 0; i < old_handlers_.size(); ++i) {
|
// static
|
||||||
struct sigaction *action =
|
void ExceptionHandler::RestoreHandlersLocked() {
|
||||||
reinterpret_cast<struct sigaction*>(old_handlers_[i].second);
|
if (!handlers_installed)
|
||||||
sigaction(old_handlers_[i].first, action, NULL);
|
return;
|
||||||
delete action;
|
|
||||||
|
for (unsigned i = 0; i < kNumHandledSignals; ++i) {
|
||||||
|
if (sigaction(kExceptionSignals[i], &old_handlers[i], NULL) == -1) {
|
||||||
|
signal(kExceptionSignals[i], SIG_DFL);
|
||||||
}
|
}
|
||||||
pthread_mutex_lock(&handler_stack_mutex_);
|
}
|
||||||
std::vector<ExceptionHandler*>::iterator handler =
|
handlers_installed = false;
|
||||||
std::find(handler_stack_->begin(), handler_stack_->end(), this);
|
|
||||||
handler_stack_->erase(handler);
|
|
||||||
pthread_mutex_unlock(&handler_stack_mutex_);
|
|
||||||
old_handlers_.clear();
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// void ExceptionHandler::set_crash_handler(HandlerCallback callback) {
|
// void ExceptionHandler::set_crash_handler(HandlerCallback callback) {
|
||||||
|
@ -224,18 +292,20 @@ void ExceptionHandler::SignalHandler(int sig, siginfo_t* info, void* uc) {
|
||||||
// All the exception signals are blocked at this point.
|
// All the exception signals are blocked at this point.
|
||||||
pthread_mutex_lock(&handler_stack_mutex_);
|
pthread_mutex_lock(&handler_stack_mutex_);
|
||||||
|
|
||||||
if (!handler_stack_->size()) {
|
bool handled = false;
|
||||||
pthread_mutex_unlock(&handler_stack_mutex_);
|
for (int i = handler_stack_->size() - 1; !handled && i >= 0; --i) {
|
||||||
return;
|
handled = (*handler_stack_)[i]->HandleSignal(sig, info, uc);
|
||||||
}
|
}
|
||||||
|
|
||||||
for (int i = handler_stack_->size() - 1; i >= 0; --i) {
|
// Upon returning from this signal handler, sig will become unmasked and then
|
||||||
if ((*handler_stack_)[i]->HandleSignal(sig, info, uc)) {
|
// it will be retriggered. If one of the ExceptionHandlers handled it
|
||||||
// successfully handled: We are in an invalid state since an exception
|
// successfully, restore the default handler. Otherwise, restore the
|
||||||
// signal has been delivered. We don't call the exit handlers because
|
// previously installed handler. Then, when the signal is retriggered, it will
|
||||||
// they could end up corrupting on-disk state.
|
// be delivered to the appropriate handler.
|
||||||
break;
|
if (handled) {
|
||||||
}
|
signal(sig, SIG_DFL);
|
||||||
|
} else {
|
||||||
|
RestoreHandlersLocked();
|
||||||
}
|
}
|
||||||
|
|
||||||
pthread_mutex_unlock(&handler_stack_mutex_);
|
pthread_mutex_unlock(&handler_stack_mutex_);
|
||||||
|
@ -255,13 +325,6 @@ void ExceptionHandler::SignalHandler(int sig, siginfo_t* info, void* uc) {
|
||||||
// No need to reissue the signal. It will automatically trigger again,
|
// No need to reissue the signal. It will automatically trigger again,
|
||||||
// when we return from the signal handler.
|
// when we return from the signal handler.
|
||||||
}
|
}
|
||||||
|
|
||||||
// As soon as we return from the signal handler, our signal will become
|
|
||||||
// unmasked. At that time, we will get terminated with the same signal that
|
|
||||||
// was triggered originally. This allows our parent to know that we crashed.
|
|
||||||
// The default action for all the signals which we catch is Core, so
|
|
||||||
// this is the end of us.
|
|
||||||
signal(sig, SIG_DFL);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
struct ThreadArgument {
|
struct ThreadArgument {
|
||||||
|
@ -313,8 +376,7 @@ bool ExceptionHandler::HandleSignal(int sig, siginfo_t* info, void* uc) {
|
||||||
#endif
|
#endif
|
||||||
context.tid = syscall(__NR_gettid);
|
context.tid = syscall(__NR_gettid);
|
||||||
if (crash_handler_ != NULL) {
|
if (crash_handler_ != NULL) {
|
||||||
if (crash_handler_(&context, sizeof(context),
|
if (crash_handler_(&context, sizeof(context), callback_context_)) {
|
||||||
callback_context_)) {
|
|
||||||
return true;
|
return true;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -46,8 +46,6 @@
|
||||||
#include "google_breakpad/common/minidump_format.h"
|
#include "google_breakpad/common/minidump_format.h"
|
||||||
#include "processor/scoped_ptr.h"
|
#include "processor/scoped_ptr.h"
|
||||||
|
|
||||||
struct sigaction;
|
|
||||||
|
|
||||||
namespace google_breakpad {
|
namespace google_breakpad {
|
||||||
|
|
||||||
// ExceptionHandler
|
// ExceptionHandler
|
||||||
|
@ -194,8 +192,11 @@ class ExceptionHandler {
|
||||||
// Force signal handling for the specified signal.
|
// Force signal handling for the specified signal.
|
||||||
bool SimulateSignalDelivery(int sig);
|
bool SimulateSignalDelivery(int sig);
|
||||||
private:
|
private:
|
||||||
bool InstallHandlers();
|
// Save the old signal handlers and install new ones.
|
||||||
void UninstallHandlers();
|
static bool InstallHandlersLocked();
|
||||||
|
// Restore the old signal handlers.
|
||||||
|
static void RestoreHandlersLocked();
|
||||||
|
|
||||||
void PreresolveSymbols();
|
void PreresolveSymbols();
|
||||||
bool GenerateDump(CrashContext *context);
|
bool GenerateDump(CrashContext *context);
|
||||||
void SendContinueSignalToChild();
|
void SendContinueSignalToChild();
|
||||||
|
@ -221,13 +222,8 @@ class ExceptionHandler {
|
||||||
// multiple ExceptionHandler instances in a process. Each will have itself
|
// multiple ExceptionHandler instances in a process. Each will have itself
|
||||||
// registered in this stack.
|
// registered in this stack.
|
||||||
static std::vector<ExceptionHandler*> *handler_stack_;
|
static std::vector<ExceptionHandler*> *handler_stack_;
|
||||||
// The index of the handler that should handle the next exception.
|
|
||||||
static unsigned handler_stack_index_;
|
|
||||||
static pthread_mutex_t handler_stack_mutex_;
|
static pthread_mutex_t handler_stack_mutex_;
|
||||||
|
|
||||||
// A vector of the old signal handlers.
|
|
||||||
std::vector<std::pair<int, struct sigaction *> > old_handlers_;
|
|
||||||
|
|
||||||
// We need to explicitly enable ptrace of parent processes on some
|
// We need to explicitly enable ptrace of parent processes on some
|
||||||
// kernels, but we need to know the PID of the cloned process before we
|
// kernels, but we need to know the PID of the cloned process before we
|
||||||
// can do this. We create a pipe which we can use to block the
|
// can do this. We create a pipe which we can use to block the
|
||||||
|
|
|
@ -202,6 +202,180 @@ TEST(ExceptionHandlerTest, ChildCrashWithFD) {
|
||||||
ASSERT_NO_FATAL_FAILURE(ChildCrash(true));
|
ASSERT_NO_FATAL_FAILURE(ChildCrash(true));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static bool DoneCallbackReturnFalse(const MinidumpDescriptor& descriptor,
|
||||||
|
void* context,
|
||||||
|
bool succeeded) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
static bool DoneCallbackReturnTrue(const MinidumpDescriptor& descriptor,
|
||||||
|
void* context,
|
||||||
|
bool succeeded) {
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
static bool DoneCallbackRaiseSIGKILL(const MinidumpDescriptor& descriptor,
|
||||||
|
void* context,
|
||||||
|
bool succeeded) {
|
||||||
|
raise(SIGKILL);
|
||||||
|
}
|
||||||
|
|
||||||
|
static bool FilterCallbackReturnFalse(void* context) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
static bool FilterCallbackReturnTrue(void* context) {
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
// SIGKILL cannot be blocked and a handler cannot be installed for it. In the
|
||||||
|
// following tests, if the child dies with signal SIGKILL, then the signal was
|
||||||
|
// redelivered to this handler. If the child dies with SIGSEGV then it wasn't.
|
||||||
|
static void RaiseSIGKILL(int sig) {
|
||||||
|
raise(SIGKILL);
|
||||||
|
}
|
||||||
|
|
||||||
|
static bool InstallRaiseSIGKILL() {
|
||||||
|
struct sigaction sa;
|
||||||
|
memset(&sa, 0, sizeof(sa));
|
||||||
|
sa.sa_handler = RaiseSIGKILL;
|
||||||
|
return sigaction(SIGSEGV, &sa, NULL) != -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
static void CrashWithCallbacks(ExceptionHandler::FilterCallback filter,
|
||||||
|
ExceptionHandler::MinidumpCallback done,
|
||||||
|
string path) {
|
||||||
|
ExceptionHandler handler(
|
||||||
|
MinidumpDescriptor(path), filter, done, NULL, true, -1);
|
||||||
|
// Crash with the exception handler in scope.
|
||||||
|
*reinterpret_cast<volatile int*>(NULL) = 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
TEST(ExceptionHandlerTest, RedeliveryOnFilterCallbackFalse) {
|
||||||
|
AutoTempDir temp_dir;
|
||||||
|
|
||||||
|
const pid_t child = fork();
|
||||||
|
if (child == 0) {
|
||||||
|
ASSERT_TRUE(InstallRaiseSIGKILL());
|
||||||
|
CrashWithCallbacks(FilterCallbackReturnFalse, NULL, temp_dir.path());
|
||||||
|
}
|
||||||
|
|
||||||
|
ASSERT_NO_FATAL_FAILURE(WaitForProcessToTerminate(child, SIGKILL));
|
||||||
|
}
|
||||||
|
|
||||||
|
TEST(ExceptionHandlerTest, RedeliveryOnDoneCallbackFalse) {
|
||||||
|
AutoTempDir temp_dir;
|
||||||
|
|
||||||
|
const pid_t child = fork();
|
||||||
|
if (child == 0) {
|
||||||
|
ASSERT_TRUE(InstallRaiseSIGKILL());
|
||||||
|
CrashWithCallbacks(NULL, DoneCallbackReturnFalse, temp_dir.path());
|
||||||
|
}
|
||||||
|
|
||||||
|
ASSERT_NO_FATAL_FAILURE(WaitForProcessToTerminate(child, SIGKILL));
|
||||||
|
}
|
||||||
|
|
||||||
|
TEST(ExceptionHandlerTest, NoRedeliveryOnDoneCallbackTrue) {
|
||||||
|
AutoTempDir temp_dir;
|
||||||
|
|
||||||
|
const pid_t child = fork();
|
||||||
|
if (child == 0) {
|
||||||
|
ASSERT_TRUE(InstallRaiseSIGKILL());
|
||||||
|
CrashWithCallbacks(NULL, DoneCallbackReturnTrue, temp_dir.path());
|
||||||
|
}
|
||||||
|
|
||||||
|
ASSERT_NO_FATAL_FAILURE(WaitForProcessToTerminate(child, SIGSEGV));
|
||||||
|
}
|
||||||
|
|
||||||
|
TEST(ExceptionHandlerTest, NoRedeliveryOnFilterCallbackTrue) {
|
||||||
|
AutoTempDir temp_dir;
|
||||||
|
|
||||||
|
const pid_t child = fork();
|
||||||
|
if (child == 0) {
|
||||||
|
ASSERT_TRUE(InstallRaiseSIGKILL());
|
||||||
|
CrashWithCallbacks(FilterCallbackReturnTrue, NULL, temp_dir.path());
|
||||||
|
}
|
||||||
|
|
||||||
|
ASSERT_NO_FATAL_FAILURE(WaitForProcessToTerminate(child, SIGSEGV));
|
||||||
|
}
|
||||||
|
|
||||||
|
TEST(ExceptionHandlerTest, RedeliveryToDefaultHandler) {
|
||||||
|
AutoTempDir temp_dir;
|
||||||
|
|
||||||
|
const pid_t child = fork();
|
||||||
|
if (child == 0) {
|
||||||
|
CrashWithCallbacks(FilterCallbackReturnFalse, NULL, temp_dir.path());
|
||||||
|
}
|
||||||
|
|
||||||
|
// As RaiseSIGKILL wasn't installed, the redelivery should just kill the child
|
||||||
|
// with SIGSEGV.
|
||||||
|
ASSERT_NO_FATAL_FAILURE(WaitForProcessToTerminate(child, SIGSEGV));
|
||||||
|
}
|
||||||
|
|
||||||
|
TEST(ExceptionHandlerTest, StackedHandlersDeliveredToTop) {
|
||||||
|
AutoTempDir temp_dir;
|
||||||
|
|
||||||
|
const pid_t child = fork();
|
||||||
|
if (child == 0) {
|
||||||
|
ExceptionHandler bottom(MinidumpDescriptor(temp_dir.path()),
|
||||||
|
NULL,
|
||||||
|
NULL,
|
||||||
|
NULL,
|
||||||
|
true,
|
||||||
|
-1);
|
||||||
|
CrashWithCallbacks(NULL, DoneCallbackRaiseSIGKILL, temp_dir.path());
|
||||||
|
}
|
||||||
|
ASSERT_NO_FATAL_FAILURE(WaitForProcessToTerminate(child, SIGKILL));
|
||||||
|
}
|
||||||
|
|
||||||
|
TEST(ExceptionHandlerTest, StackedHandlersNotDeliveredToBottom) {
|
||||||
|
AutoTempDir temp_dir;
|
||||||
|
|
||||||
|
const pid_t child = fork();
|
||||||
|
if (child == 0) {
|
||||||
|
ExceptionHandler bottom(MinidumpDescriptor(temp_dir.path()),
|
||||||
|
NULL,
|
||||||
|
DoneCallbackRaiseSIGKILL,
|
||||||
|
NULL,
|
||||||
|
true,
|
||||||
|
-1);
|
||||||
|
CrashWithCallbacks(NULL, NULL, temp_dir.path());
|
||||||
|
}
|
||||||
|
ASSERT_NO_FATAL_FAILURE(WaitForProcessToTerminate(child, SIGSEGV));
|
||||||
|
}
|
||||||
|
|
||||||
|
TEST(ExceptionHandlerTest, StackedHandlersFilteredToBottom) {
|
||||||
|
AutoTempDir temp_dir;
|
||||||
|
|
||||||
|
const pid_t child = fork();
|
||||||
|
if (child == 0) {
|
||||||
|
ExceptionHandler bottom(MinidumpDescriptor(temp_dir.path()),
|
||||||
|
NULL,
|
||||||
|
DoneCallbackRaiseSIGKILL,
|
||||||
|
NULL,
|
||||||
|
true,
|
||||||
|
-1);
|
||||||
|
CrashWithCallbacks(FilterCallbackReturnFalse, NULL, temp_dir.path());
|
||||||
|
}
|
||||||
|
ASSERT_NO_FATAL_FAILURE(WaitForProcessToTerminate(child, SIGKILL));
|
||||||
|
}
|
||||||
|
|
||||||
|
TEST(ExceptionHandlerTest, StackedHandlersUnhandledToBottom) {
|
||||||
|
AutoTempDir temp_dir;
|
||||||
|
|
||||||
|
const pid_t child = fork();
|
||||||
|
if (child == 0) {
|
||||||
|
ExceptionHandler bottom(MinidumpDescriptor(temp_dir.path()),
|
||||||
|
NULL,
|
||||||
|
DoneCallbackRaiseSIGKILL,
|
||||||
|
NULL,
|
||||||
|
true,
|
||||||
|
-1);
|
||||||
|
CrashWithCallbacks(NULL, DoneCallbackReturnFalse, temp_dir.path());
|
||||||
|
}
|
||||||
|
ASSERT_NO_FATAL_FAILURE(WaitForProcessToTerminate(child, SIGKILL));
|
||||||
|
}
|
||||||
|
|
||||||
// Test that memory around the instruction pointer is written
|
// Test that memory around the instruction pointer is written
|
||||||
// to the dump as a MinidumpMemoryRegion.
|
// to the dump as a MinidumpMemoryRegion.
|
||||||
TEST(ExceptionHandlerTest, InstructionPointerMemory) {
|
TEST(ExceptionHandlerTest, InstructionPointerMemory) {
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue