mirror of
https://github.com/LadybirdBrowser/ladybird.git
synced 2025-06-07 21:17:07 +09:00

When a `VERIFY()` assertion fails `ak_verification_failed` is invoked which means the program will invoke `__builtin_trap` and immediately quit. But with this change we have now allowed for an optional hook into `ak_*_failed` that lets us perform some custom action before program exits. This foundation is what we will (ab)use to implement death tests without the process cloning CrashTest infrastructure.
172 lines
5 KiB
C++
172 lines
5 KiB
C++
/*
|
|
* Copyright (c) 2018-2020, Andreas Kling <andreas@ladybird.org>
|
|
*
|
|
* SPDX-License-Identifier: BSD-2-Clause
|
|
*/
|
|
|
|
#include <AK/Assertions.h>
|
|
#include <AK/Backtrace.h>
|
|
#include <AK/Format.h>
|
|
#include <AK/Platform.h>
|
|
|
|
#ifdef AK_OS_WINDOWS
|
|
# include <Windows.h>
|
|
#endif
|
|
|
|
#if defined(AK_OS_ANDROID) && (__ANDROID_API__ >= 33)
|
|
# include <android/log.h>
|
|
# define EXECINFO_BACKTRACE
|
|
# define PRINT_ERROR(s) __android_log_write(ANDROID_LOG_WARN, "AK", (s))
|
|
#else
|
|
# include <stdio.h>
|
|
# define PRINT_ERROR(s) (void)::fputs((s), stderr)
|
|
#endif
|
|
|
|
#if defined(AK_HAS_STD_STACKTRACE)
|
|
# include <stacktrace>
|
|
# include <string>
|
|
#elif defined(AK_HAS_BACKTRACE_HEADER)
|
|
# include <AK/StringBuilder.h>
|
|
# include <AK/StringView.h>
|
|
# include <cxxabi.h>
|
|
#endif
|
|
|
|
#if defined(AK_OS_SERENITY)
|
|
# define ERRORLN dbgln
|
|
#else
|
|
# define ERRORLN warnln
|
|
#endif
|
|
|
|
extern "C" {
|
|
|
|
#if defined(AK_HAS_STD_STACKTRACE)
|
|
void dump_backtrace()
|
|
{
|
|
// We assume the stacktrace implementation demangles symbols, as does microsoft/STL
|
|
PRINT_ERROR(std::to_string(std::stacktrace::current(2)).c_str());
|
|
PRINT_ERROR("\n");
|
|
}
|
|
#elif defined(AK_HAS_BACKTRACE_HEADER)
|
|
void dump_backtrace()
|
|
{
|
|
// Grab symbols and dso name for up to 256 frames
|
|
void* trace[256] = {};
|
|
int const num_frames = backtrace(trace, array_size(trace));
|
|
char** syms = backtrace_symbols(trace, num_frames);
|
|
|
|
for (auto i = 0; i < num_frames; ++i) {
|
|
// If there is a C++ symbol name in the line of the backtrace, demangle it
|
|
StringView sym(syms[i], strlen(syms[i]));
|
|
StringBuilder error_builder;
|
|
if (auto idx = sym.find("_Z"sv); idx.has_value()) {
|
|
// Play C games with the original string so we can print before and after the mangled symbol with a C API
|
|
// We don't want to call dbgln() here on substring StringView because we might VERIFY() within AK::Format
|
|
syms[i][idx.value() - 1] = '\0';
|
|
error_builder.append(syms[i], strlen(syms[i]));
|
|
error_builder.append(' ');
|
|
|
|
auto sym_substring = sym.substring_view(idx.value());
|
|
auto end_of_sym = sym_substring.find_any_of("+ "sv).value_or(sym_substring.length() - 1);
|
|
syms[i][idx.value() + end_of_sym] = '\0';
|
|
|
|
size_t buf_size = 128u;
|
|
char* buf = static_cast<char*>(malloc(buf_size));
|
|
auto* raw_str = &syms[i][idx.value()];
|
|
buf = abi::__cxa_demangle(raw_str, buf, &buf_size, nullptr);
|
|
|
|
auto* buf_to_print = buf ? buf : raw_str;
|
|
error_builder.append(buf_to_print, strlen(buf_to_print));
|
|
free(buf);
|
|
|
|
error_builder.append(' ');
|
|
auto* end_of_line = &syms[i][idx.value() + end_of_sym + 1];
|
|
error_builder.append(end_of_line, strlen(end_of_line));
|
|
} else {
|
|
error_builder.append(sym);
|
|
}
|
|
# if !defined(AK_OS_ANDROID)
|
|
error_builder.append('\n');
|
|
# endif
|
|
error_builder.append('\0');
|
|
PRINT_ERROR(error_builder.string_view().characters_without_null_termination());
|
|
}
|
|
free(syms);
|
|
}
|
|
#else
|
|
void dump_backtrace()
|
|
{
|
|
PRINT_ERROR("dump_backtrace() is not supported with the current compilation options.\n");
|
|
}
|
|
#endif
|
|
|
|
bool ak_colorize_output(void)
|
|
{
|
|
#if defined(AK_OS_SERENITY) || defined(AK_OS_ANDROID)
|
|
return true;
|
|
#elif defined(AK_OS_WINDOWS)
|
|
return false;
|
|
#else
|
|
return isatty(STDERR_FILENO) == 1;
|
|
#endif
|
|
}
|
|
|
|
void ak_trap(void)
|
|
{
|
|
#if defined(AK_HAS_BACKTRACE_HEADER) || defined(AK_HAS_STD_STACKTRACE)
|
|
dump_backtrace();
|
|
#endif
|
|
__builtin_trap();
|
|
}
|
|
|
|
#ifndef AK_OS_WINDOWS
|
|
[[gnu::weak]] void ak_assertion_handler(char const* message);
|
|
#endif
|
|
|
|
using AssertionHandlerFunc = void (*)(char const*);
|
|
static AssertionHandlerFunc get_custom_assertion_handler()
|
|
{
|
|
#ifndef AK_OS_WINDOWS
|
|
return ak_assertion_handler;
|
|
#else
|
|
// Windows doesn't support weak symbols as nicely as ELF platforms.
|
|
// Instead, rely on the fact that we only want this to be overridden from
|
|
// the main executable, and grab it from there if present.
|
|
if (HMODULE module = GetModuleHandle(nullptr)) {
|
|
# pragma clang diagnostic push
|
|
# pragma clang diagnostic ignored "-Wcast-function-type-mismatch"
|
|
auto handler = reinterpret_cast<AssertionHandlerFunc>(GetProcAddress(module, "ak_assertion_handler"));
|
|
# pragma clang diagnostic pop
|
|
FreeLibrary(module);
|
|
return handler;
|
|
}
|
|
return nullptr;
|
|
|
|
#endif
|
|
}
|
|
|
|
void ak_verification_failed(char const* message)
|
|
{
|
|
if (auto assertion_handler = get_custom_assertion_handler()) {
|
|
assertion_handler(message);
|
|
}
|
|
if (ak_colorize_output())
|
|
ERRORLN("\033[31;1mVERIFICATION FAILED\033[0m: {}", message);
|
|
else
|
|
ERRORLN("VERIFICATION FAILED: {}", message);
|
|
|
|
ak_trap();
|
|
}
|
|
|
|
void ak_assertion_failed(char const* message)
|
|
{
|
|
if (auto assertion_handler = get_custom_assertion_handler()) {
|
|
assertion_handler(message);
|
|
}
|
|
if (ak_colorize_output())
|
|
ERRORLN("\033[31;1mASSERTION FAILED\033[0m: {}", message);
|
|
else
|
|
ERRORLN("ASSERTION FAILED: {}", message);
|
|
|
|
ak_trap();
|
|
}
|
|
}
|