3 /* backtrace_windows - backtrace displaying on windows platform */
4 /* This file is included by ex.c on need (windows x86) */
6 /* Copyright (c) 2007 The SimGrid team */
7 /* All rights reserved. */
9 /* This program is free software; you can redistribute it and/or modify it
10 * under the terms of the license (GNU LGPL) which comes with this package. */
13 * Win32 (x86) implementation backtrace, backtrace_symbols:
14 * support for application self-debugging.
20 /* Pointer function to SymInitialize() */
21 typedef BOOL(WINAPI * xbt_pfn_sym_initialize_t) (HANDLE, PSTR, BOOL);
23 /* Pointer function to SymCleanup() */
24 typedef BOOL(WINAPI * xbt_pfn_sym_cleanup_t) (HANDLE hProcess);
26 /* Pointer function to SymFunctionTableAccess() */
27 typedef PVOID(WINAPI * xbt_pfn_sym_function_table_access_t) (HANDLE, DWORD);
29 /* Pointer function to SymGetLineFromAddr() */
30 typedef BOOL(WINAPI * xbt_pfn_sym_get_line_from_addr_t) (HANDLE, DWORD,
34 /* Pointer function to SymGetModuleBase() */
35 typedef DWORD(WINAPI * xbt_pfn_sym_get_module_base_t) (HANDLE, DWORD);
37 /* Pointer function to SymGetOptions() */
38 typedef DWORD(WINAPI * xbt_pfn_sym_get_options_t) (VOID);
40 /* Pointer function to SymGetSymFromAddr() */
41 typedef BOOL(WINAPI * xbt_pfn_sym_get_sym_from_addr_t) (HANDLE, DWORD, PDWORD,
42 OUT PIMAGEHLP_SYMBOL);
44 /* Pointer function to SymSetOptions() */
45 typedef DWORD(WINAPI * xbt_pfn_sym_set_options_t) (DWORD);
47 /* Pointer function to StackWalk() */
48 typedef BOOL(WINAPI * xbt_pfn_stack_walk_t) (DWORD, HANDLE, HANDLE,
50 PREAD_PROCESS_MEMORY_ROUTINE,
51 PFUNCTION_TABLE_ACCESS_ROUTINE,
52 PGET_MODULE_BASE_ROUTINE,
53 PTRANSLATE_ADDRESS_ROUTINE);
55 /* This structure represents the debug_help library used interface */
56 typedef struct s_xbt_debug_help {
58 HANDLE process_handle;
59 xbt_pfn_sym_initialize_t sym_initialize;
60 xbt_pfn_sym_cleanup_t sym_cleanup;
61 xbt_pfn_sym_function_table_access_t sym_function_table_access;
62 xbt_pfn_sym_get_line_from_addr_t sym_get_line_from_addr;
63 xbt_pfn_sym_get_module_base_t sym_get_module_base;
64 xbt_pfn_sym_get_options_t sym_get_options;
65 xbt_pfn_sym_get_sym_from_addr_t sym_get_sym_from_addr;
66 xbt_pfn_sym_set_options_t sym_set_options;
67 xbt_pfn_stack_walk_t stack_walk;
68 } s_xbt_debug_hlp_t, *xbt_debug_hlp_t;
71 /* the address to the unique reference to the debug help library interface */
72 static xbt_debug_hlp_t dbg_hlp = NULL;
74 /* Module creation/destruction: nothing to do on linux */
75 void xbt_backtrace_init(void) {
76 HANDLE process_handle = GetCurrentProcess();
79 /* debug help is already loaded */
84 dbg_hlp = xbt_new0(s_xbt_debug_hlp_t, 1);
86 /* load the library */
87 dbg_hlp->instance = LoadLibraryA("Dbghelp.dll");
89 if (!dbg_hlp->instance) {
95 /* get the pointers to debug help library exported functions */
96 dbg_hlp->sym_initialize =
97 (xbt_pfn_sym_initialize_t) GetProcAddress(dbg_hlp->instance, "SymInitialize");
99 dbg_hlp->sym_cleanup =
100 (xbt_pfn_sym_cleanup_t) GetProcAddress(dbg_hlp->instance, "SymCleanup");
102 dbg_hlp->sym_function_table_access =
103 (xbt_pfn_sym_function_table_access_t) GetProcAddress(dbg_hlp->instance, "SymFunctionTableAccess");
105 dbg_hlp->sym_get_line_from_addr =
106 (xbt_pfn_sym_get_line_from_addr_t) GetProcAddress(dbg_hlp->instance, "SymGetLineFromAddr");
108 dbg_hlp->sym_get_module_base =
109 (xbt_pfn_sym_get_module_base_t) GetProcAddress(dbg_hlp->instance, "SymGetModuleBase");
111 dbg_hlp->sym_get_options =
112 (xbt_pfn_sym_get_options_t) GetProcAddress(dbg_hlp->instance, "SymGetOptions");
114 dbg_hlp->sym_get_sym_from_addr =
115 (xbt_pfn_sym_get_sym_from_addr_t) GetProcAddress(dbg_hlp->instance, "SymGetSymFromAddr");
117 dbg_hlp->sym_set_options =
118 (xbt_pfn_sym_set_options_t) GetProcAddress(dbg_hlp->instance, "SymSetOptions");
120 dbg_hlp->stack_walk =
121 (xbt_pfn_stack_walk_t) GetProcAddress(dbg_hlp->instance, "StackWalk");
123 /* Check that everything worked well */
124 if (!dbg_hlp->sym_initialize ||
125 !dbg_hlp->sym_cleanup ||
126 !dbg_hlp->sym_function_table_access ||
127 !dbg_hlp->sym_get_line_from_addr ||
128 !dbg_hlp->sym_get_module_base ||
129 !dbg_hlp->sym_get_options ||
130 !dbg_hlp->sym_get_sym_from_addr ||
131 !dbg_hlp->sym_set_options ||
134 FreeLibrary(dbg_hlp->instance);
140 dbg_hlp->process_handle = process_handle;
142 (*(dbg_hlp->sym_set_options)) ((*(dbg_hlp->sym_get_options)) () |
143 SYMOPT_LOAD_LINES | SYMOPT_DEFERRED_LOADS);
145 if (!(*(dbg_hlp->sym_initialize)) (dbg_hlp->process_handle, 0, 1)) {
146 FreeLibrary(dbg_hlp->instance);
151 void xbt_backtrace_exit(void) {
155 if ((dbg_hlp->sym_cleanup) (dbg_hlp->process_handle))
156 FreeLibrary(dbg_hlp->instance);
164 * backtrace() function.
166 * Returns a backtrace for the calling program, in the array
167 * pointed to by buffer. A backtrace is the series of currently active
168 * function calls for the program. Each item in the array pointed to by
169 * buffer is of type void *, and is the return address from the corre-
170 * sponding stack frame. The size argument specifies the maximum number
171 * of addresses that can be stored in buffer. If the backtrace is larger
172 * than size, then the addresses corresponding to the size most recent
173 * function calls are returned; to obtain the complete backtrace, make
174 * sure that buffer and size are large enough.
177 int backtrace(void **buffer, int size);
180 * backtrace_symbols() function.
182 * Given the set of addresses returned by backtrace() in buffer, back-
183 * trace_symbols() translates the addresses into an array of strings containing
184 * the name, the source file and the line number or the las called functions.
186 char **backtrace_symbols(void *const *buffer, int size);
188 void xbt_ex_setup_backtrace(xbt_ex_t * e)
191 char **backtrace_syms = backtrace_symbols(e->bt, e->used);
193 e->used = backtrace((void **) e->bt, XBT_BACKTRACE_SIZE);
194 e->bt_strings = NULL;
195 /* parse the output and build a new backtrace */
196 e->bt_strings = xbt_new(char *, e->used);
199 for (i = 0; i < e->used; i++) {
200 e->bt_strings[i] = xbt_strdup(backtrace_syms[i]);
201 free(backtrace_syms[i]);
204 free(backtrace_syms);
207 int backtrace(void **buffer, int size)
210 STACKFRAME *stack_frame;
213 IMAGEHLP_SYMBOL *pSym;
214 unsigned long offset = 0;
215 IMAGEHLP_LINE line_info = { 0 };
217 __buffer[(sizeof(SYMBOL_INFO) + MAX_SYM_NAME * sizeof(TCHAR) +
218 sizeof(ULONG64) - 1) / sizeof(ULONG64)];
220 CONTEXT context = { CONTEXT_FULL };
221 GetThreadContext(GetCurrentThread(), &context);
223 /* ebp points on stack base */
224 /* esp points on stack pointer, ie on last stacked element (current element) */
227 _asm mov context.Eip, eax
229 _asm mov context.Esp, eax
230 _asm mov context.Ebp, ebp
232 if ((NULL == dbg_hlp) || (size <= 0) || (NULL == buffer)) {
237 for (pos = 0; pos < size; pos++)
242 pSym = (IMAGEHLP_SYMBOL *) __buffer;
244 pSym->SizeOfStruct = sizeof(IMAGEHLP_SYMBOL);
245 pSym->MaxNameLength = MAX_SYM_NAME;
248 line_info.SizeOfStruct = sizeof(IMAGEHLP_LINE);
252 stack_frame = (void *) xbt_new0(STACKFRAME, 1);
254 stack_frame->AddrPC.Offset = context.Eip;
255 stack_frame->AddrPC.Mode = AddrModeFlat;
257 stack_frame->AddrFrame.Offset = context.Ebp;
258 stack_frame->AddrFrame.Mode = AddrModeFlat;
260 stack_frame->AddrStack.Offset = context.Esp;
261 stack_frame->AddrStack.Mode = AddrModeFlat;
263 if ((*(dbg_hlp->stack_walk)) (IMAGE_FILE_MACHINE_I386,
264 dbg_hlp->process_handle,
269 dbg_hlp->sym_function_table_access,
270 dbg_hlp->sym_get_module_base, NULL)
272 if (stack_frame->AddrReturn.Offset) {
274 if ((*(dbg_hlp->sym_get_sym_from_addr))
275 (dbg_hlp->process_handle, stack_frame->AddrPC.Offset, &offset,
277 if ((*(dbg_hlp->sym_get_line_from_addr))
278 (dbg_hlp->process_handle, stack_frame->AddrPC.Offset, &offset,
280 buffer[pos++] = (void *) stack_frame;
283 free(stack_frame); /* no symbol or no line info */
299 char **backtrace_symbols(void *const *buffer, int size)
304 STACKFRAME *stack_frame;
305 IMAGEHLP_SYMBOL *pSym;
306 unsigned long offset = 0;
307 IMAGEHLP_LINE line_info = { 0 };
308 IMAGEHLP_MODULE module = { 0 };
310 __buffer[(sizeof(SYMBOL_INFO) + MAX_SYM_NAME * sizeof(TCHAR) +
311 sizeof(ULONG64) - 1) / sizeof(ULONG64)];
313 if ((NULL == dbg_hlp) || (size <= 0) || (NULL == buffer)) {
318 strings = xbt_new0(char *, size);
320 pSym = (IMAGEHLP_SYMBOL *) __buffer;
322 pSym->SizeOfStruct = sizeof(IMAGEHLP_SYMBOL);
323 pSym->MaxNameLength = MAX_SYM_NAME;
326 line_info.SizeOfStruct = sizeof(IMAGEHLP_LINE);
327 module.SizeOfStruct = sizeof(IMAGEHLP_MODULE);
329 for (pos = 0; pos < size; pos++) {
330 stack_frame = (STACKFRAME *) (buffer[pos]);
332 if (NULL != stack_frame) {
334 if ((*(dbg_hlp->sym_get_sym_from_addr))
335 (dbg_hlp->process_handle, stack_frame->AddrPC.Offset, &offset,
337 if ((*(dbg_hlp->sym_get_line_from_addr))
338 (dbg_hlp->process_handle, stack_frame->AddrPC.Offset, &offset,
341 bprintf("** In %s() at %s:%d", pSym->Name, line_info.FileName,
342 line_info.LineNumber);
344 strings[pos] = bprintf("** In %s()", pSym->Name);
348 strings[pos] = xbt_strdup("** <no symbol>");