debugtrap_windows.go 1.5 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546
  1. package daemon // import "github.com/docker/docker/daemon"
  2. import (
  3. "context"
  4. "fmt"
  5. "os"
  6. "unsafe"
  7. "github.com/containerd/log"
  8. "github.com/docker/docker/pkg/stack"
  9. "golang.org/x/sys/windows"
  10. )
  11. func (daemon *Daemon) setupDumpStackTrap(root string) {
  12. // Windows does not support signals like *nix systems. So instead of
  13. // trapping on SIGUSR1 to dump stacks, we wait on a Win32 event to be
  14. // signaled. ACL'd to builtin administrators and local system
  15. event := "Global\\stackdump-" + fmt.Sprint(os.Getpid())
  16. ev, _ := windows.UTF16PtrFromString(event)
  17. sd, err := windows.SecurityDescriptorFromString("D:P(A;;GA;;;BA)(A;;GA;;;SY)")
  18. if err != nil {
  19. log.G(context.TODO()).Errorf("failed to get security descriptor for debug stackdump event %s: %s", event, err.Error())
  20. return
  21. }
  22. var sa windows.SecurityAttributes
  23. sa.Length = uint32(unsafe.Sizeof(sa))
  24. sa.InheritHandle = 1
  25. sa.SecurityDescriptor = sd
  26. h, err := windows.CreateEvent(&sa, 0, 0, ev)
  27. if h == 0 || err != nil {
  28. log.G(context.TODO()).Errorf("failed to create debug stackdump event %s: %s", event, err.Error())
  29. return
  30. }
  31. go func() {
  32. log.G(context.TODO()).Debugf("Stackdump - waiting signal at %s", event)
  33. for {
  34. windows.WaitForSingleObject(h, windows.INFINITE)
  35. path, err := stack.DumpToFile(root)
  36. if err != nil {
  37. log.G(context.TODO()).WithError(err).Error("failed to write goroutines dump")
  38. } else {
  39. log.G(context.TODO()).Infof("goroutine stacks written to %s", path)
  40. }
  41. }
  42. }()
  43. }