diff options
author | Hidehiko Abe <hidehiko@google.com> | 2018-03-15 00:19:55 +0900 |
---|---|---|
committer | Hidehiko Abe <hidehiko@google.com> | 2018-03-15 11:27:17 +0900 |
commit | b5100e7b19909673199ac27875d72c4949a0604d (patch) | |
tree | 3d768c46a305e440722ad7a383d1ef99ebb55d5d | |
parent | 2dacff534e035a6c5da769632f6369910d7b79dc (diff) | |
download | libmojo-b5100e7b19909673199ac27875d72c4949a0604d.tar.gz |
Remove stack_trace_android.cc.
It is moved into libchrome.
Bug: 73606903
Test: Ran on Treehugger.
Change-Id: I9bbb7af30699b4dccd08ac24d0ea59b431e319aa
-rw-r--r-- | Android.bp | 2 | ||||
-rw-r--r-- | base/debug/proc_maps_linux.cc | 169 | ||||
-rw-r--r-- | base/debug/stack_trace_android.cc | 134 |
3 files changed, 0 insertions, 305 deletions
@@ -250,8 +250,6 @@ cc_library_shared { "base/android/scoped_java_ref.cc", "base/base_paths.cc", "base/base_paths_android.cc", - "base/debug/proc_maps_linux.cc", - "base/debug/stack_trace_android.cc", "base/files/file_util_android.cc", "base/message_loop/message_pump_android.cc", "base/path_service.cc", diff --git a/base/debug/proc_maps_linux.cc b/base/debug/proc_maps_linux.cc deleted file mode 100644 index 0bb44b4..0000000 --- a/base/debug/proc_maps_linux.cc +++ /dev/null @@ -1,169 +0,0 @@ -// Copyright (c) 2013 The Chromium Authors. All rights reserved. -// Use of this source code is governed by a BSD-style license that can be -// found in the LICENSE file. - -#include "base/debug/proc_maps_linux.h" - -#include <fcntl.h> -#include <stddef.h> - -#include "base/files/file_util.h" -#include "base/files/scoped_file.h" -#include "base/strings/string_split.h" -#include "build/build_config.h" - -#if defined(OS_LINUX) || defined(OS_ANDROID) -#include <inttypes.h> -#endif - -#if defined(OS_ANDROID) && !defined(__LP64__) -// In 32-bit mode, Bionic's inttypes.h defines PRI/SCNxPTR as an -// unsigned long int, which is incompatible with Bionic's stdint.h -// defining uintptr_t as an unsigned int: -// https://code.google.com/p/android/issues/detail?id=57218 -#undef SCNxPTR -#define SCNxPTR "x" -#endif - -namespace base { -namespace debug { - -// Scans |proc_maps| starting from |pos| returning true if the gate VMA was -// found, otherwise returns false. -static bool ContainsGateVMA(std::string* proc_maps, size_t pos) { -#if defined(ARCH_CPU_ARM_FAMILY) - // The gate VMA on ARM kernels is the interrupt vectors page. - return proc_maps->find(" [vectors]\n", pos) != std::string::npos; -#elif defined(ARCH_CPU_X86_64) - // The gate VMA on x86 64-bit kernels is the virtual system call page. - return proc_maps->find(" [vsyscall]\n", pos) != std::string::npos; -#else - // Otherwise assume there is no gate VMA in which case we shouldn't - // get duplicate entires. - return false; -#endif -} - -bool ReadProcMaps(std::string* proc_maps) { - // seq_file only writes out a page-sized amount on each call. Refer to header - // file for details. - const long kReadSize = sysconf(_SC_PAGESIZE); - - base::ScopedFD fd(HANDLE_EINTR(open("/proc/self/maps", O_RDONLY))); - if (!fd.is_valid()) { - DPLOG(ERROR) << "Couldn't open /proc/self/maps"; - return false; - } - proc_maps->clear(); - - while (true) { - // To avoid a copy, resize |proc_maps| so read() can write directly into it. - // Compute |buffer| afterwards since resize() may reallocate. - size_t pos = proc_maps->size(); - proc_maps->resize(pos + kReadSize); - void* buffer = &(*proc_maps)[pos]; - - ssize_t bytes_read = HANDLE_EINTR(read(fd.get(), buffer, kReadSize)); - if (bytes_read < 0) { - DPLOG(ERROR) << "Couldn't read /proc/self/maps"; - proc_maps->clear(); - return false; - } - - // ... and don't forget to trim off excess bytes. - proc_maps->resize(pos + bytes_read); - - if (bytes_read == 0) - break; - - // The gate VMA is handled as a special case after seq_file has finished - // iterating through all entries in the virtual memory table. - // - // Unfortunately, if additional entries are added at this point in time - // seq_file gets confused and the next call to read() will return duplicate - // entries including the gate VMA again. - // - // Avoid this by searching for the gate VMA and breaking early. - if (ContainsGateVMA(proc_maps, pos)) - break; - } - - return true; -} - -bool ParseProcMaps(const std::string& input, - std::vector<MappedMemoryRegion>* regions_out) { - CHECK(regions_out); - std::vector<MappedMemoryRegion> regions; - - // This isn't async safe nor terribly efficient, but it doesn't need to be at - // this point in time. - std::vector<std::string> lines = SplitString( - input, "\n", base::TRIM_WHITESPACE, base::SPLIT_WANT_ALL); - - for (size_t i = 0; i < lines.size(); ++i) { - // Due to splitting on '\n' the last line should be empty. - if (i == lines.size() - 1) { - if (!lines[i].empty()) { - DLOG(WARNING) << "Last line not empty"; - return false; - } - break; - } - - MappedMemoryRegion region; - const char* line = lines[i].c_str(); - char permissions[5] = {'\0'}; // Ensure NUL-terminated string. - uint8_t dev_major = 0; - uint8_t dev_minor = 0; - long inode = 0; - int path_index = 0; - - // Sample format from man 5 proc: - // - // address perms offset dev inode pathname - // 08048000-08056000 r-xp 00000000 03:0c 64593 /usr/sbin/gpm - // - // The final %n term captures the offset in the input string, which is used - // to determine the path name. It *does not* increment the return value. - // Refer to man 3 sscanf for details. - if (sscanf(line, "%" SCNxPTR "-%" SCNxPTR " %4c %llx %hhx:%hhx %ld %n", - ®ion.start, ®ion.end, permissions, ®ion.offset, - &dev_major, &dev_minor, &inode, &path_index) < 7) { - DPLOG(WARNING) << "sscanf failed for line: " << line; - return false; - } - - region.permissions = 0; - - if (permissions[0] == 'r') - region.permissions |= MappedMemoryRegion::READ; - else if (permissions[0] != '-') - return false; - - if (permissions[1] == 'w') - region.permissions |= MappedMemoryRegion::WRITE; - else if (permissions[1] != '-') - return false; - - if (permissions[2] == 'x') - region.permissions |= MappedMemoryRegion::EXECUTE; - else if (permissions[2] != '-') - return false; - - if (permissions[3] == 'p') - region.permissions |= MappedMemoryRegion::PRIVATE; - else if (permissions[3] != 's' && permissions[3] != 'S') // Shared memory. - return false; - - // Pushing then assigning saves us a string copy. - regions.push_back(region); - regions.back().path.assign(line + path_index); - } - - regions_out->swap(regions); - return true; -} - -} // namespace debug -} // namespace base diff --git a/base/debug/stack_trace_android.cc b/base/debug/stack_trace_android.cc deleted file mode 100644 index 329204c..0000000 --- a/base/debug/stack_trace_android.cc +++ /dev/null @@ -1,134 +0,0 @@ -// Copyright (c) 2012 The Chromium Authors. All rights reserved. -// Use of this source code is governed by a BSD-style license that can be -// found in the LICENSE file. - -#include "base/debug/stack_trace.h" - -#include <android/log.h> -#include <stddef.h> -#include <unwind.h> - -#include <algorithm> -#include <ostream> - -#include "base/debug/proc_maps_linux.h" -#include "base/strings/stringprintf.h" -#include "base/threading/thread_restrictions.h" - -#ifdef __LP64__ -#define FMT_ADDR "0x%016lx" -#else -#define FMT_ADDR "0x%08x" -#endif - -namespace { - -struct StackCrawlState { - StackCrawlState(uintptr_t* frames, size_t max_depth) - : frames(frames), - frame_count(0), - max_depth(max_depth), - have_skipped_self(false) {} - - uintptr_t* frames; - size_t frame_count; - size_t max_depth; - bool have_skipped_self; -}; - -_Unwind_Reason_Code TraceStackFrame(_Unwind_Context* context, void* arg) { - StackCrawlState* state = static_cast<StackCrawlState*>(arg); - uintptr_t ip = _Unwind_GetIP(context); - - // The first stack frame is this function itself. Skip it. - if (ip != 0 && !state->have_skipped_self) { - state->have_skipped_self = true; - return _URC_NO_REASON; - } - - state->frames[state->frame_count++] = ip; - if (state->frame_count >= state->max_depth) - return _URC_END_OF_STACK; - return _URC_NO_REASON; -} - -} // namespace - -namespace base { -namespace debug { - -bool EnableInProcessStackDumping() { - // When running in an application, our code typically expects SIGPIPE - // to be ignored. Therefore, when testing that same code, it should run - // with SIGPIPE ignored as well. - // TODO(phajdan.jr): De-duplicate this SIGPIPE code. - struct sigaction action; - memset(&action, 0, sizeof(action)); - action.sa_handler = SIG_IGN; - sigemptyset(&action.sa_mask); - return (sigaction(SIGPIPE, &action, NULL) == 0); -} - -StackTrace::StackTrace(size_t count) { - count = std::min(arraysize(trace_), count); - - StackCrawlState state(reinterpret_cast<uintptr_t*>(trace_), count); - _Unwind_Backtrace(&TraceStackFrame, &state); - count_ = state.frame_count; -} - -void StackTrace::Print() const { - std::string backtrace = ToString(); - __android_log_write(ANDROID_LOG_ERROR, "chromium", backtrace.c_str()); -} - -// NOTE: Native libraries in APKs are stripped before installing. Print out the -// relocatable address and library names so host computers can use tools to -// symbolize and demangle (e.g., addr2line, c++filt). -void StackTrace::OutputToStream(std::ostream* os) const { - std::string proc_maps; - std::vector<MappedMemoryRegion> regions; - // Allow IO to read /proc/self/maps. Reading this file doesn't hit the disk - // since it lives in procfs, and this is currently used to print a stack trace - // on fatal log messages in debug builds only. If the restriction is enabled - // then it will recursively trigger fatal failures when this enters on the - // UI thread. - base::ThreadRestrictions::ScopedAllowIO allow_io; - if (!ReadProcMaps(&proc_maps)) { - __android_log_write( - ANDROID_LOG_ERROR, "chromium", "Failed to read /proc/self/maps"); - } else if (!ParseProcMaps(proc_maps, ®ions)) { - __android_log_write( - ANDROID_LOG_ERROR, "chromium", "Failed to parse /proc/self/maps"); - } - - for (size_t i = 0; i < count_; ++i) { - // Subtract one as return address of function may be in the next - // function when a function is annotated as noreturn. - uintptr_t address = reinterpret_cast<uintptr_t>(trace_[i]) - 1; - - std::vector<MappedMemoryRegion>::iterator iter = regions.begin(); - while (iter != regions.end()) { - if (address >= iter->start && address < iter->end && - !iter->path.empty()) { - break; - } - ++iter; - } - - *os << base::StringPrintf("#%02zd " FMT_ADDR " ", i, address); - - if (iter != regions.end()) { - uintptr_t rel_pc = address - iter->start + iter->offset; - const char* path = iter->path.c_str(); - *os << base::StringPrintf("%s+" FMT_ADDR, path, rel_pc); - } else { - *os << "<unknown>"; - } - - *os << "\n"; - } -} - -} // namespace debug -} // namespace base |