gecko-dev/xpcom/base/IntentionalCrash.h
Ehsan Akhgari e5e885ae31 Bug 1521000 - Part 2: Adjust our clang-format rules to include spaces after the hash for nested preprocessor directives r=sylvestre
# ignore-this-changeset

--HG--
extra : amend_source : 7221c8d15a765df71171099468e7c7faa648f37c
extra : histedit_source : a0cce6015636202bff09e35a13f72e03257a7695
2019-01-18 10:16:18 +01:00

64 lines
1.6 KiB
C++

/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
#include <string>
#include <sstream>
#include <stdlib.h>
#include <stdio.h>
#ifdef XP_WIN
# include <process.h>
# define getpid _getpid
#else
# include <unistd.h>
#endif
#ifndef mozilla_IntentionalCrash_h
# define mozilla_IntentionalCrash_h
namespace mozilla {
inline void NoteIntentionalCrash(const char* aProcessType) {
// In opt builds we don't actually have the leak checking enabled, and the
// sandbox doesn't allow writing to this path, so we just disable this
// function's behaviour.
# ifdef MOZ_DEBUG
char* f = getenv("XPCOM_MEM_BLOAT_LOG");
if (!f) {
return;
}
fprintf(stderr, "XPCOM_MEM_BLOAT_LOG: %s\n", f);
std::string bloatLog(f);
bool hasExt = false;
if (bloatLog.size() >= 4 &&
bloatLog.compare(bloatLog.size() - 4, 4, ".log", 4) == 0) {
hasExt = true;
bloatLog.erase(bloatLog.size() - 4, 4);
}
std::ostringstream bloatName;
bloatName << bloatLog << "_" << aProcessType << "_pid" << getpid();
if (hasExt) {
bloatName << ".log";
}
fprintf(stderr, "Writing to log: %s\n", bloatName.str().c_str());
FILE* processfd = fopen(bloatName.str().c_str(), "a");
if (processfd) {
fprintf(processfd, "==> process %d will purposefully crash\n", getpid());
fclose(processfd);
}
# endif
}
} // namespace mozilla
#endif // mozilla_IntentionalCrash_h