1
0
mirror of https://github.com/samba-team/samba.git synced 2024-12-25 23:21:54 +03:00
samba-mirror/lib/util/fault.c
Andrew Bartlett 3109899299 lib/fault: During smb_panic() print process comment and setprocname() title
The purpose of this is to make it clear which part of the AD DC (in particular)
has faulted without having to deduce it from the stacktrace.

Signed-off-by: Andrew Bartlett <abartlet@samba.org>
Reviewed-by: Ralph Boehme <slow@samba.org>
2023-07-21 01:25:37 +00:00

319 lines
7.8 KiB
C

/*
Unix SMB/CIFS implementation.
Critical Fault handling
Copyright (C) Andrew Tridgell 1992-1998
Copyright (C) Tim Prouty 2009
Copyright (C) James Peach 2006
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#include "replace.h"
#include "system/filesys.h"
#include "system/wait.h"
#include "version.h"
#ifdef HAVE_SYS_SYSCTL_H
#include <sys/sysctl.h>
#endif
#ifdef HAVE_SYS_PRCTL_H
#include <sys/prctl.h>
#endif
#include "debug.h"
#include "lib/util/signal.h" /* Avoid /usr/include/signal.h */
#include "fault.h"
#include "util_process.h"
static struct {
bool disabled;
smb_panic_handler_t panic_handler;
} fault_state;
/*******************************************************************
setup variables used for fault handling
********************************************************************/
void fault_configure(smb_panic_handler_t panic_handler)
{
fault_state.panic_handler = panic_handler;
}
/**
disable setting up fault handlers
This is used for the bind9 dlz module, as we
don't want a Samba module in bind9 to override the bind
fault handling
**/
_PUBLIC_ void fault_setup_disable(void)
{
fault_state.disabled = true;
}
#if !defined(HAVE_DISABLE_FAULT_HANDLING)
/*******************************************************************
report a fault
********************************************************************/
static void fault_report(int sig)
{
static int counter;
char signal_string[128];
if (counter) _exit(1);
counter++;
snprintf(signal_string, sizeof(signal_string),
"Signal %d: %s", sig, strsignal(sig));
smb_panic(signal_string);
/* smb_panic() never returns, so this is really redundant */
exit(1);
}
/****************************************************************************
catch serious errors
****************************************************************************/
static void sig_fault(int sig)
{
fault_report(sig);
}
#endif
/*******************************************************************
setup our fault handlers
********************************************************************/
void fault_setup(void)
{
if (fault_state.disabled) {
return;
}
#if !defined(HAVE_DISABLE_FAULT_HANDLING)
#ifdef SIGSEGV
CatchSignal(SIGSEGV, sig_fault);
#endif
#ifdef SIGBUS
CatchSignal(SIGBUS, sig_fault);
#endif
#ifdef SIGABRT
CatchSignal(SIGABRT, sig_fault);
#endif
#endif
}
_PUBLIC_ const char *panic_action = NULL;
/*
default smb_panic() implementation
*/
static void smb_panic_default(const char *why) _NORETURN_;
static void smb_panic_default(const char *why)
{
#if defined(HAVE_PRCTL) && defined(PR_SET_PTRACER)
/*
* Make sure all children can attach a debugger.
*/
prctl(PR_SET_PTRACER, getpid(), 0, 0, 0);
#endif
if (panic_action && *panic_action) {
char cmdstring[200];
if (strlcpy(cmdstring, panic_action, sizeof(cmdstring)) < sizeof(cmdstring)) {
int result;
char pidstr[20];
char subst[200];
char *p = NULL;
snprintf(pidstr, sizeof(pidstr), "%d", (int) getpid());
p = strstr(cmdstring, "%d");
if (p != NULL) {
snprintf(subst,
sizeof(subst),
"%.*s%s%s",
(int)(p-cmdstring),
cmdstring,
pidstr,
p+2);
strlcpy(cmdstring, subst, sizeof(cmdstring));
}
DEBUG(0, ("smb_panic(): calling panic action [%s]\n", cmdstring));
result = system(cmdstring);
if (result == -1)
DEBUG(0, ("smb_panic(): fork failed in panic action: %s\n",
strerror(errno)));
else
DEBUG(0, ("smb_panic(): action returned status %d\n",
WEXITSTATUS(result)));
}
}
#ifdef SIGABRT
CatchSignal(SIGABRT, SIG_DFL);
#endif
abort();
}
_PUBLIC_ void smb_panic_log(const char *why)
{
const char *binary_name = process_get_saved_binary_name();
const char *short_title = process_get_short_title();
const char *long_title = process_get_long_title();
DEBUGSEP(0);
DEBUG(0,("INTERNAL ERROR: %s in %s (%s) (%s) pid %lld (%s)\n",
why,
binary_name,
short_title,
long_title,
(unsigned long long)getpid(),
SAMBA_VERSION_STRING));
DEBUG(0,("If you are running a recent Samba version, and "
"if you think this problem is not yet fixed in the "
"latest versions, please consider reporting this "
"bug, see "
"https://wiki.samba.org/index.php/Bug_Reporting\n"));
DEBUGSEP(0);
DEBUG(0,("PANIC (pid %llu): %s in " SAMBA_VERSION_STRING "\n",
(unsigned long long)getpid(), why));
log_stack_trace();
}
/**
Something really nasty happened - panic !
This function is in this file to allow sharing the last set process
title into the logs before the backtrace
**/
_PUBLIC_ void smb_panic(const char *why)
{
smb_panic_log(why);
if (fault_state.panic_handler) {
fault_state.panic_handler(why);
_exit(1);
}
smb_panic_default(why);
}
/*******************************************************************
Print a backtrace of the stack to the debug log. This function
DELIBERATELY LEAKS MEMORY. The expectation is that you should
exit shortly after calling it.
********************************************************************/
/* Buffer size to use when printing backtraces */
#define BACKTRACE_STACK_SIZE 64
#ifdef HAVE_LIBUNWIND_H
#include <libunwind.h>
#endif
#ifdef HAVE_EXECINFO_H
#include <execinfo.h>
#endif
void log_stack_trace(void)
{
#ifdef HAVE_LIBUNWIND
/*
* --with-libunwind is required to use libunwind, the
* backtrace_symbols() code below is the default.
*
* This code is available because a previous version of this
* comment asserted that on ia64 libunwind correctly walks the
* stack in more circumstances than backtrace.
*/
unw_cursor_t cursor;
unw_context_t uc;
unsigned i = 0;
char procname[256];
unw_word_t ip, sp, off;
procname[sizeof(procname) - 1] = '\0';
if (unw_getcontext(&uc) != 0) {
goto libunwind_failed;
}
if (unw_init_local(&cursor, &uc) != 0) {
goto libunwind_failed;
}
DEBUG(0, ("BACKTRACE:\n"));
do {
ip = sp = 0;
unw_get_reg(&cursor, UNW_REG_IP, &ip);
unw_get_reg(&cursor, UNW_REG_SP, &sp);
switch (unw_get_proc_name(&cursor,
procname, sizeof(procname) - 1, &off) ) {
case 0:
/* Name found. */
case -UNW_ENOMEM:
/* Name truncated. */
DEBUGADD(0, (" #%u %s + %#llx [ip=%#llx] [sp=%#llx]\n",
i, procname, (long long)off,
(long long)ip, (long long) sp));
break;
default:
/* case -UNW_ENOINFO: */
/* case -UNW_EUNSPEC: */
/* No symbol name found. */
DEBUGADD(0, (" #%u %s [ip=%#llx] [sp=%#llx]\n",
i, "<unknown symbol>",
(long long)ip, (long long) sp));
}
++i;
} while (unw_step(&cursor) > 0);
return;
libunwind_failed:
DEBUG(0, ("unable to produce a stack trace with libunwind\n"));
#elif defined(HAVE_BACKTRACE_SYMBOLS)
void *backtrace_stack[BACKTRACE_STACK_SIZE];
size_t backtrace_size;
char **backtrace_strings;
/* get the backtrace (stack frames) */
backtrace_size = backtrace(backtrace_stack,BACKTRACE_STACK_SIZE);
backtrace_strings = backtrace_symbols(backtrace_stack, backtrace_size);
DEBUG(0, ("BACKTRACE: %lu stack frames:\n",
(unsigned long)backtrace_size));
if (backtrace_strings) {
size_t i;
for (i = 0; i < backtrace_size; i++)
DEBUGADD(0, (" #%zu %s\n", i, backtrace_strings[i]));
/* Leak the backtrace_strings, rather than risk what free() might do */
}
#else
DEBUG(0, ("unable to produce a stack trace on this platform\n"));
#endif
}