1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "base/debug/debugger.h"
6 #include "build/build_config.h"
12 #include <sys/param.h>
14 #include <sys/types.h>
19 #if defined(__GLIBCXX__)
23 #if defined(OS_MACOSX)
24 #include <AvailabilityMacros.h>
27 #if defined(OS_MACOSX) || defined(OS_BSD)
28 #include <sys/sysctl.h>
31 #if defined(OS_FREEBSD)
37 #include "base/basictypes.h"
38 #include "base/logging.h"
39 #include "base/memory/scoped_ptr.h"
40 #include "base/posix/eintr_wrapper.h"
41 #include "base/safe_strerror_posix.h"
42 #include "base/strings/string_piece.h"
44 #if defined(USE_SYMBOLIZE)
45 #include "base/third_party/symbolize/symbolize.h"
48 #if defined(OS_ANDROID)
49 #include "base/threading/platform_thread.h"
55 #if defined(OS_MACOSX) || defined(OS_BSD)
57 // Based on Apple's recommended method as described in
58 // http://developer.apple.com/qa/qa2004/qa1361.html
59 bool BeingDebugged() {
60 // NOTE: This code MUST be async-signal safe (it's used by in-process
61 // stack dumping signal handler). NO malloc or stdio is allowed here.
63 // While some code used below may be async-signal unsafe, note how
64 // the result is cached (see |is_set| and |being_debugged| static variables
65 // right below). If this code is properly warmed-up early
66 // in the start-up process, it should be safe to use later.
68 // If the process is sandboxed then we can't use the sysctl, so cache the
70 static bool is_set
= false;
71 static bool being_debugged
= false;
74 return being_debugged
;
76 // Initialize mib, which tells sysctl what info we want. In this case,
77 // we're looking for information about a specific process ID.
83 #if defined(OS_OPENBSD)
84 , sizeof(struct kinfo_proc
),
89 // Caution: struct kinfo_proc is marked __APPLE_API_UNSTABLE. The source and
90 // binary interfaces may change.
91 struct kinfo_proc info
;
92 size_t info_size
= sizeof(info
);
94 #if defined(OS_OPENBSD)
95 if (sysctl(mib
, arraysize(mib
), NULL
, &info_size
, NULL
, 0) < 0)
98 mib
[5] = (info_size
/ sizeof(struct kinfo_proc
));
101 int sysctl_result
= sysctl(mib
, arraysize(mib
), &info
, &info_size
, NULL
, 0);
102 DCHECK_EQ(sysctl_result
, 0);
103 if (sysctl_result
!= 0) {
105 being_debugged
= false;
106 return being_debugged
;
109 // This process is being debugged if the P_TRACED flag is set.
111 #if defined(OS_FREEBSD)
112 being_debugged
= (info
.ki_flag
& P_TRACED
) != 0;
113 #elif defined(OS_BSD)
114 being_debugged
= (info
.p_flag
& P_TRACED
) != 0;
116 being_debugged
= (info
.kp_proc
.p_flag
& P_TRACED
) != 0;
118 return being_debugged
;
121 #elif defined(OS_LINUX) || defined(OS_ANDROID)
123 // We can look in /proc/self/status for TracerPid. We are likely used in crash
124 // handling, so we are careful not to use the heap or have side effects.
125 // Another option that is common is to try to ptrace yourself, but then we
126 // can't detach without forking(), and that's not so great.
128 bool BeingDebugged() {
129 // NOTE: This code MUST be async-signal safe (it's used by in-process
130 // stack dumping signal handler). NO malloc or stdio is allowed here.
132 int status_fd
= open("/proc/self/status", O_RDONLY
);
136 // We assume our line will be in the first 1024 characters and that we can
137 // read this much all at once. In practice this will generally be true.
138 // This simplifies and speeds up things considerably.
141 ssize_t num_read
= HANDLE_EINTR(read(status_fd
, buf
, sizeof(buf
)));
142 if (IGNORE_EINTR(close(status_fd
)) < 0)
148 StringPiece
status(buf
, num_read
);
149 StringPiece
tracer("TracerPid:\t");
151 StringPiece::size_type pid_index
= status
.find(tracer
);
152 if (pid_index
== StringPiece::npos
)
155 // Our pid is 0 without a debugger, assume this for any pid starting with 0.
156 pid_index
+= tracer
.size();
157 return pid_index
< status
.size() && status
[pid_index
] != '0';
162 bool BeingDebugged() {
169 // We want to break into the debugger in Debug mode, and cause a crash dump in
170 // Release mode. Breakpad behaves as follows:
172 // +-------+-----------------+-----------------+
173 // | OS | Dump on SIGTRAP | Dump on SIGABRT |
174 // +-------+-----------------+-----------------+
177 // +-------+-----------------+-----------------+
179 // Thus we do the following:
180 // Linux: Debug mode if a debugger is attached, send SIGTRAP; otherwise send
182 // Mac: Always send SIGTRAP.
184 #if defined(ARCH_CPU_ARMEL)
185 #define DEBUG_BREAK_ASM() asm("bkpt 0")
186 #elif defined(ARCH_CPU_ARM64)
187 #define DEBUG_BREAK_ASM() asm("brk 0")
188 #elif defined(ARCH_CPU_MIPS_FAMILY)
189 #define DEBUG_BREAK_ASM() asm("break 2")
190 #elif defined(ARCH_CPU_X86_FAMILY)
191 #define DEBUG_BREAK_ASM() asm("int3")
194 #if defined(NDEBUG) && !defined(OS_MACOSX) && !defined(OS_ANDROID)
195 #define DEBUG_BREAK() abort()
196 #elif defined(OS_NACL)
197 // The NaCl verifier doesn't let use use int3. For now, we call abort(). We
198 // should ask for advice from some NaCl experts about the optimum thing here.
199 // http://code.google.com/p/nativeclient/issues/detail?id=645
200 #define DEBUG_BREAK() abort()
201 #elif !defined(OS_MACOSX)
202 // Though Android has a "helpful" process called debuggerd to catch native
203 // signals on the general assumption that they are fatal errors. If no debugger
204 // is attached, we call abort since Breakpad needs SIGABRT to create a dump.
205 // When debugger is attached, for ARM platform the bkpt instruction appears
206 // to cause SIGBUS which is trapped by debuggerd, and we've had great
207 // difficulty continuing in a debugger once we stop from SIG triggered by native
208 // code, use GDB to set |go| to 1 to resume execution; for X86 platform, use
209 // "int3" to setup breakpiont and raise SIGTRAP.
211 // On other POSIX architectures, except Mac OS X, we use the same logic to
212 // ensure that breakpad creates a dump on crashes while it is still possible to
216 if (!BeingDebugged()) {
219 #if defined(DEBUG_BREAK_ASM)
224 base::PlatformThread::Sleep(base::TimeDelta::FromMilliseconds(100));
230 #define DEBUG_BREAK() DebugBreak()
231 #elif defined(DEBUG_BREAK_ASM)
232 #define DEBUG_BREAK() DEBUG_BREAK_ASM()
234 #error "Don't know how to debug break on this architecture/OS"
237 void BreakDebugger() {
238 // NOTE: This code MUST be async-signal safe (it's used by in-process
239 // stack dumping signal handler). NO malloc or stdio is allowed here.
242 #if defined(OS_ANDROID) && !defined(OFFICIAL_BUILD)
243 // For Android development we always build release (debug builds are
244 // unmanageably large), so the unofficial build is used for debugging. It is
245 // helpful to be able to insert BreakDebugger() statements in the source,
246 // attach the debugger, inspect the state of the program and then resume it by
247 // setting the 'go' variable above.
248 #elif defined(NDEBUG)
249 // Terminate the program after signaling the debug break.