X-Git-Url: http://info.iut-bm.univ-fcomte.fr/pub/gitweb/simgrid.git/blobdiff_plain/5e472a6023eb14e7396b16fa4eb47c805d8f4acf..21a680050fb52ee9a91716b5fe8aca4ca96e16e5:/src/xbt/backtrace_linux.cpp diff --git a/src/xbt/backtrace_linux.cpp b/src/xbt/backtrace_linux.cpp index 7fa8051de7..7cde5e37c2 100644 --- a/src/xbt/backtrace_linux.cpp +++ b/src/xbt/backtrace_linux.cpp @@ -6,6 +6,8 @@ /* This program is free software; you can redistribute it and/or modify it * under the terms of the license (GNU LGPL) which comes with this package. */ +#include +#include #include #include #include @@ -21,7 +23,6 @@ #include #include "xbt/ex.h" #include "xbt/log.h" -#include "xbt/str.h" #include "xbt/module.h" /* xbt_binary_name */ #include "src/xbt_modinter.h" /* backtrace initialization headers */ #if SIMGRID_HAVE_MC @@ -39,10 +40,9 @@ struct trace_arg { int size; }; -static _Unwind_Reason_Code -backtrace_helper (struct _Unwind_Context *ctx, void *a) +static _Unwind_Reason_Code backtrace_helper(_Unwind_Context* ctx, void* a) { - struct trace_arg *arg = (struct trace_arg *) a; + trace_arg* arg = static_cast(a); /* We are first called with address in the __backtrace function. Skip it. */ @@ -223,9 +223,12 @@ std::vector resolveBacktrace( int found = 0; /* let's look for the offset of this library in our addressing space */ - char* maps_name = bprintf("/proc/%d/maps", (int) getpid()); - FILE* maps = fopen(maps_name, "r"); - + std::string maps_name = std::string("/proc/") + std::to_string(getpid()) + "/maps"; + FILE* maps = fopen(maps_name.c_str(), "r"); + if (maps == nullptr) { + XBT_CRITICAL("fopen(\"%s\") failed: %s", maps_name.c_str(), strerror(errno)); + continue; + } unsigned long int addr = strtoul(addrs[i].c_str(), &p, 16); if (*p != '\0') { XBT_CRITICAL("Cannot parse backtrace address '%s' (addr=%#lx)", addrs[i].c_str(), addr); @@ -255,7 +258,6 @@ std::vector resolveBacktrace( } } fclose(maps); - free(maps_name); addrs[i].clear(); if (not found) { @@ -287,27 +289,26 @@ std::vector resolveBacktrace( *p2 = '\0'; /* Here we go, fire an addr2line up */ - char* subcmd = bprintf("%s -f -e %s %s", ADDR2LINE, p, addrs[i].c_str()); + std::string subcmd = std::string(ADDR2LINE) + " -f -e " + p + " " + addrs[i]; free(p); - XBT_VERB("Fire a new command: '%s'", subcmd); - FILE* subpipe = popen(subcmd, "r"); + XBT_VERB("Fire a new command: '%s'", subcmd.c_str()); + FILE* subpipe = popen(subcmd.c_str(), "r"); if (not subpipe) { xbt_die("Cannot fork addr2line to display the backtrace"); } if (fgets(line_func, 1024, subpipe)) { line_func[strlen(line_func) - 1] = '\0'; } else { - XBT_VERB("Cannot read result of subcommand %s", subcmd); + XBT_VERB("Cannot read result of subcommand %s", subcmd.c_str()); strncpy(line_func, "???",3); } if (fgets(line_pos, 1024, subpipe)) { line_pos[strlen(line_pos) - 1] = '\0'; } else { - XBT_VERB("Cannot read result of subcommand %s", subcmd); + XBT_VERB("Cannot read result of subcommand %s", subcmd.c_str()); strncpy(line_pos, backtrace_syms[i],1024); } pclose(subpipe); - free(subcmd); } /* check whether the trick worked */