2 Unix SMB/CIFS implementation.
3 Critical Fault handling
4 Copyright (C) Andrew Tridgell 1992-1998
5 Copyright (C) Tim Prouty 2009
6 Copyright (C) James Peach 2006
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program. If not, see <http://www.gnu.org/licenses/>.
23 #include "system/filesys.h"
24 #include "system/wait.h"
27 #ifdef HAVE_SYS_SYSCTL_H
28 #include <sys/sysctl.h>
32 #ifdef HAVE_SYS_PRCTL_H
33 #include <sys/prctl.h>
37 #include "lib/util/signal.h" /* Avoid /usr/include/signal.h */
38 #include "substitute.h"
43 smb_panic_handler_t panic_handler
;
47 /*******************************************************************
48 setup variables used for fault handling
49 ********************************************************************/
50 void fault_configure(smb_panic_handler_t panic_handler
)
52 fault_state
.panic_handler
= panic_handler
;
57 disable setting up fault handlers
58 This is used for the bind9 dlz module, as we
59 don't want a Samba module in bind9 to override the bind
62 _PUBLIC_
void fault_setup_disable(void)
64 fault_state
.disabled
= true;
68 /*******************************************************************
70 ********************************************************************/
71 static void fault_report(int sig
)
75 if (counter
) _exit(1);
80 DEBUG(0,("INTERNAL ERROR: Signal %d in pid %d (%s)",sig
,(int)getpid(),SAMBA_VERSION_STRING
));
81 DEBUG(0,("\nIf you are running a recent Samba version, and "
82 "if you think this problem is not yet fixed in the "
83 "latest versions, please consider reporting this "
85 "https://wiki.samba.org/index.php/Bug_Reporting\n"));
88 smb_panic("internal error");
90 /* smb_panic() never returns, so this is really redundant */
94 /****************************************************************************
96 ****************************************************************************/
97 static void sig_fault(int sig
)
102 /*******************************************************************
103 setup our fault handlers
104 ********************************************************************/
105 void fault_setup(void)
107 if (fault_state
.disabled
) {
110 #if !defined(HAVE_DISABLE_FAULT_HANDLING)
112 CatchSignal(SIGSEGV
, sig_fault
);
115 CatchSignal(SIGBUS
, sig_fault
);
118 CatchSignal(SIGABRT
, sig_fault
);
123 _PUBLIC_
const char *panic_action
= NULL
;
126 default smb_panic() implementation
128 static void smb_panic_default(const char *why
) _NORETURN_
;
129 static void smb_panic_default(const char *why
)
131 DBG_ERR("PANIC (pid %llu): %s\n",
132 (unsigned long long)getpid(), why
);
135 #if defined(HAVE_PRCTL) && defined(PR_SET_PTRACER)
137 * Make sure all children can attach a debugger.
139 prctl(PR_SET_PTRACER
, getpid(), 0, 0, 0);
142 if (panic_action
&& *panic_action
) {
144 if (strlcpy(cmdstring
, panic_action
, sizeof(cmdstring
)) < sizeof(cmdstring
)) {
147 snprintf(pidstr
, sizeof(pidstr
), "%d", (int) getpid());
148 all_string_sub(cmdstring
, "%d", pidstr
, sizeof(cmdstring
));
149 DEBUG(0, ("smb_panic(): calling panic action [%s]\n", cmdstring
));
150 result
= system(cmdstring
);
153 DEBUG(0, ("smb_panic(): fork failed in panic action: %s\n",
156 DEBUG(0, ("smb_panic(): action returned status %d\n",
157 WEXITSTATUS(result
)));
162 CatchSignal(SIGABRT
, SIG_DFL
);
169 Something really nasty happened - panic !
171 _PUBLIC_
void smb_panic(const char *why
)
173 if (fault_state
.panic_handler
) {
174 fault_state
.panic_handler(why
);
177 smb_panic_default(why
);
180 /*******************************************************************
181 Print a backtrace of the stack to the debug log. This function
182 DELIBERATELY LEAKS MEMORY. The expectation is that you should
183 exit shortly after calling it.
184 ********************************************************************/
186 /* Buffer size to use when printing backtraces */
187 #define BACKTRACE_STACK_SIZE 64
190 #ifdef HAVE_LIBUNWIND_H
191 #include <libunwind.h>
194 #ifdef HAVE_EXECINFO_H
195 #include <execinfo.h>
198 void log_stack_trace(void)
200 #ifdef HAVE_LIBUNWIND
201 /* Try to use libunwind before any other technique since on ia64
202 * libunwind correctly walks the stack in more circumstances than
210 unw_word_t ip
, sp
, off
;
212 procname
[sizeof(procname
) - 1] = '\0';
214 if (unw_getcontext(&uc
) != 0) {
215 goto libunwind_failed
;
218 if (unw_init_local(&cursor
, &uc
) != 0) {
219 goto libunwind_failed
;
222 DEBUG(0, ("BACKTRACE:\n"));
226 unw_get_reg(&cursor
, UNW_REG_IP
, &ip
);
227 unw_get_reg(&cursor
, UNW_REG_SP
, &sp
);
229 switch (unw_get_proc_name(&cursor
,
230 procname
, sizeof(procname
) - 1, &off
) ) {
234 /* Name truncated. */
235 DEBUGADD(0, (" #%u %s + %#llx [ip=%#llx] [sp=%#llx]\n",
236 i
, procname
, (long long)off
,
237 (long long)ip
, (long long) sp
));
240 /* case -UNW_ENOINFO: */
241 /* case -UNW_EUNSPEC: */
242 /* No symbol name found. */
243 DEBUGADD(0, (" #%u %s [ip=%#llx] [sp=%#llx]\n",
244 i
, "<unknown symbol>",
245 (long long)ip
, (long long) sp
));
248 } while (unw_step(&cursor
) > 0);
253 DEBUG(0, ("unable to produce a stack trace with libunwind\n"));
255 #elif defined(HAVE_BACKTRACE_SYMBOLS)
256 void *backtrace_stack
[BACKTRACE_STACK_SIZE
];
257 size_t backtrace_size
;
258 char **backtrace_strings
;
260 /* get the backtrace (stack frames) */
261 backtrace_size
= backtrace(backtrace_stack
,BACKTRACE_STACK_SIZE
);
262 backtrace_strings
= backtrace_symbols(backtrace_stack
, backtrace_size
);
264 DEBUG(0, ("BACKTRACE: %lu stack frames:\n",
265 (unsigned long)backtrace_size
));
267 if (backtrace_strings
) {
270 for (i
= 0; i
< backtrace_size
; i
++)
271 DEBUGADD(0, (" #%zu %s\n", i
, backtrace_strings
[i
]));
273 /* Leak the backtrace_strings, rather than risk what free() might do */
277 DEBUG(0, ("unable to produce a stack trace on this platform\n"));