static volatile const char *BOINCrcsid="$Id$"; // $Id$ // // The contents of this file are subject to the BOINC Public License // Version 1.0 (the "License"); you may not use this file except in // compliance with the License. You may obtain a copy of the License at // http://boinc.berkeley.edu/license_1.0.txt // // Software distributed under the License is distributed on an "AS IS" // basis, WITHOUT WARRANTY OF ANY KIND, either express or implied. See the // License for the specific language governing rights and limitations // under the License. // // The Original Code is the Berkeley Open Infrastructure for Network Computing. // // The Initial Developer of the Original Code is the SETI@home project. // Portions created by the SETI@home project are Copyright (C) 2002 // University of California at Berkeley. All Rights Reserved. // // Purpose: // // // // Contributor(s): // // Stuff related to stderr/stdout direction and exception handling; // used by both core client and by apps #ifdef _WIN32 #include "boinc_win.h" #endif #ifndef _WIN32 #include #include #include #include "config.h" #endif #ifdef __GLIBC__ #include #endif #include "diagnostics.h" #include "error_numbers.h" #include "filesys.h" #include "util.h" static int flags; #ifdef _WIN32 LONG CALLBACK boinc_catch_signal(EXCEPTION_POINTERS *ExceptionInfo); int __cdecl boinc_message_reporting( int reportType, char *szMsg, int *retVal ); #else static void boinc_catch_signal(int signal); //static void boinc_quit(int sig); #endif // initialize the diagnostics environment. // int boinc_init_diagnostics(int _flags) { void* lpRetVal; flags = _flags; // Archive any old stderr.txt and stdout.txt files, if requested if ( flags & BOINC_DIAG_ARCHIVESTDERR ) { boinc_copy(BOINC_DIAG_STDERR, BOINC_DIAG_STDERROLD); } if ( flags & BOINC_DIAG_ARCHIVESTDOUT) { boinc_copy( BOINC_DIAG_STDOUT, BOINC_DIAG_STDOUTOLD ); } // Redirect stderr and/or stdout streams, if requested if (flags & BOINC_DIAG_REDIRECTSTDERR ) { lpRetVal = (void*) freopen(BOINC_DIAG_STDERR, "a", stderr); if ( NULL == lpRetVal ) { BOINCFILEERROR("Failed to reopen stderr for diagnostics redirection" ); } } if (flags & BOINC_DIAG_REDIRECTSTDERROVERWRITE ) { lpRetVal = (void*) freopen(BOINC_DIAG_STDERR, "w", stderr); if ( NULL == lpRetVal ) { BOINCFILEERROR("Failed to reopen stderr for diagnostics redirection (overwrite)" ); } } if (flags & BOINC_DIAG_REDIRECTSTDOUT ) { lpRetVal = (void*) freopen(BOINC_DIAG_STDOUT, "a", stdout); if ( NULL == lpRetVal ) { BOINCFILEERROR( "Failed to reopen stdout for diagnostics redirection" ); } } if (flags & BOINC_DIAG_REDIRECTSTDOUTOVERWRITE ) { lpRetVal = (void*) freopen(BOINC_DIAG_STDOUT, "w", stdout); if ( NULL == lpRetVal ) BOINCFILEERROR( "Failed to reopen stdout for diagnostics redirection (overwrite)" ); } #if defined(_WIN32) && defined(_DEBUG) #ifndef _CONSOLE // MFC by default, configures itself for the memory leak detection on exit // //if (flags & BOINC_DIAG_MEMORYLEAKCHECKENABLED ) // SET_CRT_DEBUG_FIELD( _CRTDBG_LEAK_CHECK_DF ); if (flags & BOINC_DIAG_HEAPCHECKENABLED ) { AfxEnableMemoryTracking(TRUE); afxMemDF = allocMemDF | checkAlwaysMemDF; } #else _CrtSetReportHook( boinc_message_reporting ); if (flags & BOINC_DIAG_MEMORYLEAKCHECKENABLED ) SET_CRT_DEBUG_FIELD( _CRTDBG_LEAK_CHECK_DF ); if (flags & BOINC_DIAG_HEAPCHECKENABLED ) SET_CRT_DEBUG_FIELD( _CRTDBG_CHECK_EVERY_1024_DF ); #endif // _CONSOLE #endif // defined(_WIN32) && defined(_DEBUG) // Install unhandled exception filters and signal traps. if ( BOINC_SUCCESS != boinc_install_signal_handlers() ) BOINCSIGNALERROR( "Failed to install signal handlers" ); return BOINC_SUCCESS; } // Used to cleanup the diagnostics environment. // int boinc_finish_diag() { return BOINC_SUCCESS; } // to setup an unhandled exception filter on Windows // int boinc_install_signal_handlers() { #ifdef _WIN32 SetUnhandledExceptionFilter( boinc_catch_signal ); #else //_WIN32 // register handlers for fatal internal signals // so that they get reported in stderr.txt // Do NOT catch SIGQUIT because core client uses that to kill app // boinc_set_signal_handler(SIGILL, boinc_catch_signal); boinc_set_signal_handler(SIGABRT, boinc_catch_signal); boinc_set_signal_handler(SIGBUS, boinc_catch_signal); boinc_set_signal_handler(SIGSEGV, boinc_catch_signal); boinc_set_signal_handler(SIGSYS, boinc_catch_signal); boinc_set_signal_handler(SIGPIPE, boinc_catch_signal); #endif //_WIN32 return 0; } #ifdef _WIN32 // Used to unwind the stack and spew the callstack to stderr. Terminate the // process afterwards and return the exception code as the exit code. // LONG CALLBACK boinc_catch_signal(EXCEPTION_POINTERS *pExPtrs) { // Removed due to a nested exception problem // RTW: 09/30/2004 /* // Snagged from the latest stackwalker code base. This allows us to grab // callstacks even in a stack overflow scenario if ( pExPtrs->ExceptionRecord->ExceptionCode == EXCEPTION_STACK_OVERFLOW ) { static char MyStack[1024*128]; // be sure that we have enought space... // it assumes that DS and SS are the same!!! (this is the case for Win32) // change the stack only if the selectors are the same (this is the case for Win32) //__asm push offset MyStack[1024*128]; //__asm pop esp; __asm mov eax,offset MyStack[1024*128]; __asm mov esp,eax; } */ #ifdef _DEBUG #ifndef _CONSOLE // MFC by default, configures itself for the memory leak detection on exit // //if (flags & BOINC_DIAG_MEMORYLEAKCHECKENABLED ) // CLEAR_CRT_DEBUG_FIELD( _CRTDBG_LEAK_CHECK_DF ); if (flags & BOINC_DIAG_HEAPCHECKENABLED ) { AfxEnableMemoryTracking(FALSE); } #else if (flags & BOINC_DIAG_MEMORYLEAKCHECKENABLED ) CLEAR_CRT_DEBUG_FIELD( _CRTDBG_LEAK_CHECK_DF ); if (flags & BOINC_DIAG_HEAPCHECKENABLED ) CLEAR_CRT_DEBUG_FIELD( _CRTDBG_CHECK_EVERY_1024_DF ); #endif // _CONSOLE #endif // _DEBUG PVOID exceptionAddr = pExPtrs->ExceptionRecord->ExceptionAddress; DWORD exceptionCode = pExPtrs->ExceptionRecord->ExceptionCode; LONG lReturnValue = NULL; char status[256]; char substatus[256]; static long lDetectNestedException = 0; // If we've been in this procedure before, something went wrong so we immediately exit if ( InterlockedIncrement(&lDetectNestedException) > 1 ) { TerminateProcess( GetCurrentProcess(), ERR_NESTED_UNHANDLED_EXCEPTION_DETECTED ); } switch ( exceptionCode ) { case EXCEPTION_ACCESS_VIOLATION: safe_strncpy( status, "Access Violation", sizeof(status) ); if ( pExPtrs->ExceptionRecord->NumberParameters == 2 ) { switch( pExPtrs->ExceptionRecord->ExceptionInformation[0] ) { case 0: // read attempt sprintf( substatus, "read attempt to address 0x%8.8X", pExPtrs->ExceptionRecord->ExceptionInformation[1] ); break; case 1: // write attempt sprintf( substatus, "write attempt to address 0x%8.8X", pExPtrs->ExceptionRecord->ExceptionInformation[1] ); break; } } break; case EXCEPTION_DATATYPE_MISALIGNMENT: safe_strncpy( status, "Data Type Misalignment", sizeof(status) ); break; case EXCEPTION_BREAKPOINT: safe_strncpy( status, "Breakpoint Encountered", sizeof(status) ); break; case EXCEPTION_SINGLE_STEP: safe_strncpy( status, "Single Instruction Executed", sizeof(status) ); break; case EXCEPTION_ARRAY_BOUNDS_EXCEEDED: safe_strncpy( status, "Array Bounds Exceeded", sizeof(status) ); break; case EXCEPTION_FLT_DENORMAL_OPERAND: safe_strncpy( status, "Float Denormal Operand", sizeof(status) ); break; case EXCEPTION_FLT_DIVIDE_BY_ZERO: safe_strncpy( status, "Divide by Zero", sizeof(status) ); break; case EXCEPTION_FLT_INEXACT_RESULT: safe_strncpy( status, "Float Inexact Result", sizeof(status) ); break; case EXCEPTION_FLT_INVALID_OPERATION: safe_strncpy( status, "Float Invalid Operation", sizeof(status) ); break; case EXCEPTION_FLT_OVERFLOW: safe_strncpy( status, "Float Overflow", sizeof(status) ); break; case EXCEPTION_FLT_STACK_CHECK: safe_strncpy( status, "Float Stack Check", sizeof(status) ); break; case EXCEPTION_FLT_UNDERFLOW: safe_strncpy( status, "Float Underflow", sizeof(status) ); break; case EXCEPTION_INT_DIVIDE_BY_ZERO: safe_strncpy( status, "Integer Divide by Zero", sizeof(status) ); break; case EXCEPTION_INT_OVERFLOW: safe_strncpy( status, "Integer Overflow", sizeof(status) ); break; case EXCEPTION_PRIV_INSTRUCTION: safe_strncpy( status, "Privileged Instruction", sizeof(status) ); break; case EXCEPTION_IN_PAGE_ERROR: safe_strncpy( status, "In Page Error", sizeof(status) ); break; case EXCEPTION_ILLEGAL_INSTRUCTION: safe_strncpy( status, "Illegal Instruction", sizeof(status) ); break; case EXCEPTION_NONCONTINUABLE_EXCEPTION: safe_strncpy( status, "Noncontinuable Exception", sizeof(status) ); break; case EXCEPTION_STACK_OVERFLOW: safe_strncpy( status, "Stack Overflow", sizeof(status) ); break; case EXCEPTION_INVALID_DISPOSITION: safe_strncpy( status, "Invalid Disposition", sizeof(status) ); break; case EXCEPTION_GUARD_PAGE: safe_strncpy( status, "Guard Page Violation", sizeof(status) ); break; case EXCEPTION_INVALID_HANDLE: safe_strncpy( status, "Invalid Handle", sizeof(status) ); break; case CONTROL_C_EXIT: safe_strncpy( status, "Ctrl+C Exit", sizeof(status) ); break; default: safe_strncpy( status, "Unknown exception", sizeof(status) ); break; } fprintf( stderr, "\n***UNHANDLED EXCEPTION****\n" ); if ( EXCEPTION_ACCESS_VIOLATION == exceptionCode ) { fprintf( stderr, "Reason: %s (0x%x) at address 0x%p %s\n\n", status, exceptionCode, exceptionAddr, substatus ); } else { fprintf( stderr, "Reason: %s (0x%x) at address 0x%p\n\n", status, exceptionCode, exceptionAddr ); } fflush( stderr ); // Unwind the stack and spew it to stderr if (flags & BOINC_DIAG_DUMPCALLSTACKENABLED ) StackwalkFilter( pExPtrs, EXCEPTION_EXECUTE_HANDLER, NULL ); fprintf( stderr, "Exiting...\n" ); fflush( stderr ); // Force terminate the app letting BOINC know an exception has occurred. TerminateProcess( GetCurrentProcess(), pExPtrs->ExceptionRecord->ExceptionCode ); // We won't make it to this point, but make the compiler happy anyway. return 1; } #ifdef _DEBUG // Trap ASSERTs and TRACEs from the CRT and spew them to stderr. // int __cdecl boinc_message_reporting( int reportType, char *szMsg, int *retVal ){ (*retVal) = 0; switch(reportType){ case _CRT_WARN: case _CRT_ERROR: OutputDebugString(szMsg); // Reports string to the debugger output window if (flags & BOINC_DIAG_TRACETOSTDERR ) { fprintf( stderr, szMsg ); fflush( stderr ); } if (flags & BOINC_DIAG_TRACETOSTDOUT ) { fprintf( stdout, szMsg ); fflush( stdout ); } break; case _CRT_ASSERT: OutputDebugString("ASSERT: "); // Reports string to the debugger output window OutputDebugString(szMsg); // Reports string to the debugger output window OutputDebugString("\n"); // Reports string to the debugger output window fprintf( stderr, "ASSERT: %s\n", szMsg ); fflush( stderr ); (*retVal) = 1; break; } return(TRUE); } // Converts the BOINCTRACE macro into a single string and report it // to the CRT so it can be reported via the normal means. // void boinc_trace(const char *pszFormat, ...) { static char szBuffer[1024]; // Trace messages should only be reported if running as a standalone // application or told too. if ((flags & BOINC_DIAG_TRACETOSTDERR) || (flags & BOINC_DIAG_TRACETOSTDOUT) ) { memset(szBuffer, 0, sizeof(szBuffer)); va_list ptr; va_start(ptr, pszFormat); BOINCASSERT( -1 != _vsnprintf(szBuffer, sizeof(szBuffer), pszFormat, ptr) ); va_end(ptr); _CrtDbgReport(_CRT_WARN, NULL, NULL, NULL, "TRACE: %s", szBuffer); } } // Converts the BOINCINFO macro into a single string and report it // to stderr so it can be reported via the normal means. // void boinc_info_debug(const char *pszFormat, ...) { static char szBuffer[1024]; memset(szBuffer, 0, sizeof(szBuffer)); va_list ptr; va_start(ptr, pszFormat); BOINCASSERT( -1 != _vsnprintf(szBuffer, sizeof(szBuffer), pszFormat, ptr) ); va_end(ptr); _CrtDbgReport(_CRT_WARN, NULL, NULL, NULL, "%s", szBuffer); } #else // _DEBUG // Converts the BOINCINFO macro into a single string and report it // to stderr so it can be reported via the normal means. // void boinc_info_release(const char *pszFormat, ...) { static char szBuffer[1024]; memset(szBuffer, 0, sizeof(szBuffer)); va_list ptr; va_start(ptr, pszFormat); _vsnprintf(szBuffer, sizeof(szBuffer), pszFormat, ptr); va_end(ptr); fprintf( stderr, "%s", szBuffer ); fflush( stderr ); } #endif // _DEBUG #endif // _WIN32 // Diagnostics for POSIX Compatible systems. // #ifdef HAVE_SIGNAL_H // Set a signal handler only if it is not currently ignored // void boinc_set_signal_handler(int sig, void(*handler)(int)) { #ifdef HAVE_SIGACTION struct sigaction temp; sigaction(sig, NULL, &temp); if (temp.sa_handler != SIG_IGN) { temp.sa_handler = handler; sigemptyset(&temp.sa_mask); sigaction(sig, &temp, NULL); } #else void (*temp)(int); temp = signal(sig, boinc_catch_signal); if (temp == SIG_IGN) { signal(sig, SIG_IGN); } #endif /* HAVE_SIGACTION */ } // Set a signal handler even if it is currently ignored // void boinc_set_signal_handler_force(int sig, void(*handler)(int)) { #ifdef HAVE_SIGACTION struct sigaction temp; sigaction(sig, NULL, &temp); temp.sa_handler = handler; sigemptyset(&temp.sa_mask); sigaction(sig, &temp, NULL); #else void (*temp)(int); temp = signal(sig, boinc_catch_signal); signal(sig, SIG_IGN); #endif /* HAVE_SIGACTION */ } void boinc_catch_signal(int signal) { switch(signal) { case SIGHUP: fprintf(stderr, "SIGHUP: terminal line hangup"); return; case SIGINT: fprintf(stderr, "SIGINT: interrupt program"); break; case SIGILL: fprintf(stderr, "SIGILL: illegal instruction"); break; case SIGABRT: fprintf(stderr, "SIGABRT: abort called"); break; case SIGBUS: fprintf(stderr, "SIGBUS: bus error"); break; case SIGSEGV: fprintf(stderr, "SIGSEGV: segmentation violation"); break; case SIGSYS: fprintf(stderr, "SIGSYS: system call given invalid argument"); break; case SIGPIPE: fprintf(stderr, "SIGPIPE: write on a pipe with no reader"); return; default: fprintf(stderr, "unknown signal %d", signal); break; } #ifdef __GLIBC__ void *array[64]; size_t size; size = backtrace (array, 64); fprintf(stderr, "Stack trace ($d frames):\n", size); backtrace_symbols_fd(array, size, fileno(stderr)); #endif fprintf(stderr, "\nExiting...\n"); exit(ERR_SIGNAL_CATCH); } /* void boinc_quit(int sig) { signal(SIGQUIT, boinc_quit); // reset signal time_to_quit = true; } */ #endif