78 lines
1.9 KiB
C++
78 lines
1.9 KiB
C++
/*
|
|
* Copyright (C) 2018-2023 Intel Corporation
|
|
*
|
|
* SPDX-License-Identifier: MIT
|
|
*
|
|
*/
|
|
|
|
#pragma once
|
|
#include "shared/source/helpers/abort.h"
|
|
|
|
#include <cstdio>
|
|
#include <cstdlib>
|
|
#include <execinfo.h>
|
|
#include <setjmp.h>
|
|
#include <signal.h>
|
|
|
|
static jmp_buf jmpbuf;
|
|
|
|
class SafetyGuardLinux {
|
|
public:
|
|
SafetyGuardLinux() {
|
|
struct sigaction sigact {};
|
|
|
|
sigact.sa_sigaction = sigAction;
|
|
sigact.sa_flags = SA_RESTART | SA_SIGINFO;
|
|
sigaction(SIGSEGV, &sigact, &previousSigSegvAction);
|
|
sigaction(SIGILL, &sigact, &previousSigIllvAction);
|
|
}
|
|
|
|
~SafetyGuardLinux() {
|
|
if (previousSigSegvAction.sa_sigaction) {
|
|
sigaction(SIGSEGV, &previousSigSegvAction, NULL);
|
|
}
|
|
if (previousSigIllvAction.sa_sigaction) {
|
|
sigaction(SIGILL, &previousSigIllvAction, NULL);
|
|
}
|
|
}
|
|
|
|
static void sigAction(int sigNum, siginfo_t *info, void *ucontext) {
|
|
const int callstackDepth = 30;
|
|
void *addresses[callstackDepth];
|
|
char **callstack;
|
|
int backtraceSize = 0;
|
|
|
|
backtraceSize = backtrace(addresses, callstackDepth);
|
|
callstack = backtrace_symbols(addresses, backtraceSize);
|
|
|
|
for (int i = 0; i < backtraceSize; ++i) {
|
|
printf("[%d]: %s\n", i, callstack[i]);
|
|
}
|
|
|
|
free(callstack);
|
|
longjmp(jmpbuf, 1);
|
|
}
|
|
|
|
template <typename T, typename Object, typename Method>
|
|
T call(Object *object, Method method, T retValueOnCrash) {
|
|
int jump = 0;
|
|
jump = setjmp(jmpbuf);
|
|
|
|
if (jump == 0) {
|
|
return (object->*method)();
|
|
} else {
|
|
if (onSigSegv) {
|
|
onSigSegv();
|
|
} else {
|
|
NEO::abortExecution();
|
|
}
|
|
}
|
|
return retValueOnCrash;
|
|
}
|
|
|
|
typedef void (*callbackFunction)();
|
|
callbackFunction onSigSegv = nullptr;
|
|
struct sigaction previousSigSegvAction {};
|
|
struct sigaction previousSigIllvAction {};
|
|
};
|