1 /**************************************************************************
3 * Copyright 2010-2011 VMware, Inc.
6 * Permission is hereby granted, free of charge, to any person obtaining a copy
7 * of this software and associated documentation files (the "Software"), to deal
8 * in the Software without restriction, including without limitation the rights
9 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
10 * copies of the Software, and to permit persons to whom the Software is
11 * furnished to do so, subject to the following conditions:
13 * The above copyright notice and this permission notice shall be included in
14 * all copies or substantial portions of the Software.
16 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
19 * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
21 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
24 **************************************************************************/
39 #if defined(__linux__)
40 #include <linux/limits.h> // PATH_MAX
44 #include <sys/syslimits.h> // PATH_MAX
45 #include <mach-o/dyld.h>
49 #include <android/log.h>
53 #warning PATH_MAX undefined
58 #include "os_string.hpp"
59 #include "os_backtrace.hpp"
69 size_t size = PATH_MAX;
70 char *buf = path.buf(size);
72 // http://stackoverflow.com/questions/1023306/finding-current-executables-path-without-proc-self-exe
75 if (_NSGetExecutablePath(buf, &len) != 0) {
78 _NSGetExecutablePath(buf, &len);
83 len = readlink("/proc/self/exe", buf, size - 1);
85 // /proc/self/exe is not available on setuid processes, so fallback to
86 // /proc/self/cmdline.
87 int fd = open("/proc/self/cmdline", O_RDONLY);
89 // buf already includes trailing zero
90 len = read(fd, buf, size);
98 // fallback to process ID
99 len = snprintf(buf, size, "%i", (int)getpid());
114 size_t size = PATH_MAX;
115 char *buf = path.buf(size);
125 createDirectory(const String &path)
127 return mkdir(path, 0777) == 0;
131 String::exists(void) const
136 err = stat(str(), &st);
144 int execute(char * const * args)
149 execvp(args[0], args);
150 fprintf(stderr, "error: failed to execute:");
151 for (unsigned i = 0; args[i]; ++i) {
152 fprintf(stderr, " %s", args[i]);
154 fprintf(stderr, "\n");
159 fprintf(stderr, "error: failed to fork\n");
164 waitpid(pid, &status, 0);
165 if (WIFEXITED(status)) {
166 ret = WEXITSTATUS(status);
167 } else if (WIFSIGNALED(status)) {
168 // match shell return code
169 ret = WTERMSIG(status) + 128;
177 static volatile bool logging = false;
180 log(const char *format, ...)
184 va_start(ap, format);
187 __android_log_vprint(ANDROID_LOG_DEBUG, "apitrace", format, ap);
189 static FILE *log = NULL;
191 // Duplicate stderr file descriptor, to prevent applications from
192 // redirecting our debug messages to somewhere else.
194 // Another alternative would be to log to /dev/tty when available.
195 log = fdopen(dup(STDERR_FILENO), "at");
197 vfprintf(log, format, ap);
204 #if defined(__APPLE__)
205 long long timeFrequency = 0LL;
215 static void (*gCallback)(void) = NULL;
217 #define NUM_SIGNALS 16
219 struct sigaction old_actions[NUM_SIGNALS];
224 * - http://sourceware.org/git/?p=glibc.git;a=blob;f=debug/segfault.c
225 * - http://ggi.cvs.sourceforge.net/viewvc/ggi/ggi-core/libgg/gg/cleanup.c?view=markup
228 signalHandler(int sig, siginfo_t *info, void *context)
231 * There are several signals that can happen when logging to stdout/stderr.
232 * For example, SIGPIPE will be emitted if stderr is a pipe with no
233 * readers. Therefore ignore any signal while logging by returning
234 * immediately, to prevent deadlocks.
240 static int recursion_count = 0;
242 log("apitrace: warning: caught signal %i\n", sig);
244 if (recursion_count) {
245 log("apitrace: warning: recursion handling signal %i\n", sig);
250 os::dump_backtrace();
254 struct sigaction *old_action;
255 if (sig >= NUM_SIGNALS) {
256 /* This should never happen */
257 log("error: unexpected signal %i\n", sig);
260 old_action = &old_actions[sig];
262 if (old_action->sa_flags & SA_SIGINFO) {
263 // Handler is in sa_sigaction
264 old_action->sa_sigaction(sig, info, context);
266 if (old_action->sa_handler == SIG_DFL) {
267 log("apitrace: info: taking default action for signal %i\n", sig);
270 struct sigaction dfl_action;
271 dfl_action.sa_handler = SIG_DFL;
272 sigemptyset (&dfl_action.sa_mask);
273 dfl_action.sa_flags = 0;
274 sigaction(sig, &dfl_action, NULL);
280 } else if (old_action->sa_handler == SIG_IGN) {
283 /* dispatch to handler */
284 old_action->sa_handler(sig);
290 setExceptionCallback(void (*callback)(void))
294 gCallback = callback;
296 struct sigaction new_action;
297 new_action.sa_sigaction = signalHandler;
298 sigemptyset(&new_action.sa_mask);
299 new_action.sa_flags = SA_SIGINFO | SA_RESTART;
302 for (int sig = 1; sig < NUM_SIGNALS; ++sig) {
303 // SIGKILL and SIGSTOP can't be handled.
304 if (sig == SIGKILL || sig == SIGSTOP) {
309 * SIGPIPE can be emitted when writing to stderr that is redirected
310 * to a pipe without readers. It is also very unlikely to ocurr
311 * inside graphics APIs, and most applications where it can occur
312 * normally already ignore it. In summary, it is unlikely that a
313 * SIGPIPE will cause abnormal termination, which it is likely that
314 * intercepting here will cause problems, so simple don't intercept
317 if (sig == SIGPIPE) {
321 if (sigaction(sig, NULL, &old_actions[sig]) >= 0) {
322 sigaction(sig, &new_action, NULL);
329 resetExceptionCallback(void)
336 #endif // !defined(_WIN32)