2014-05-05 21:30:39 +04:00
|
|
|
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
|
|
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
|
2012-05-21 15:12:37 +04:00
|
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
2007-08-11 01:28:22 +04:00
|
|
|
|
|
|
|
/* API for getting a stack trace of the C/C++ stack on the current thread */
|
|
|
|
|
2015-07-02 23:30:58 +03:00
|
|
|
#include "mozilla/ArrayUtils.h"
|
2013-09-19 22:29:31 +04:00
|
|
|
#include "mozilla/Assertions.h"
|
2019-02-20 08:01:12 +03:00
|
|
|
#include "mozilla/Attributes.h"
|
2013-09-12 21:18:36 +04:00
|
|
|
#include "mozilla/IntegerPrintfMacros.h"
|
|
|
|
#include "mozilla/StackWalk.h"
|
2007-08-11 01:28:22 +04:00
|
|
|
|
2015-10-23 20:50:26 +03:00
|
|
|
#include <string.h>
|
|
|
|
|
2012-02-04 00:13:24 +04:00
|
|
|
using namespace mozilla;
|
|
|
|
|
2014-03-03 19:29:08 +04:00
|
|
|
// for _Unwind_Backtrace from libcxxrt or libunwind
|
|
|
|
// cxxabi.h from libcxxrt implicitly includes unwind.h first
|
|
|
|
#if defined(HAVE__UNWIND_BACKTRACE) && !defined(_GNU_SOURCE)
|
|
|
|
# define _GNU_SOURCE
|
|
|
|
#endif
|
|
|
|
|
2015-02-04 18:50:10 +03:00
|
|
|
#if defined(HAVE_DLOPEN) || defined(XP_DARWIN)
|
2011-12-03 04:26:04 +04:00
|
|
|
# include <dlfcn.h>
|
|
|
|
#endif
|
|
|
|
|
2016-07-20 07:50:02 +03:00
|
|
|
#if (defined(XP_DARWIN) && \
|
|
|
|
(defined(__i386) || defined(__ppc__) || defined(HAVE__UNWIND_BACKTRACE)))
|
|
|
|
# define MOZ_STACKWALK_SUPPORTS_MACOSX 1
|
|
|
|
#else
|
|
|
|
# define MOZ_STACKWALK_SUPPORTS_MACOSX 0
|
|
|
|
#endif
|
2011-12-22 20:00:48 +04:00
|
|
|
|
2016-07-20 07:50:02 +03:00
|
|
|
#if (defined(linux) && \
|
|
|
|
((defined(__GNUC__) && (defined(__i386) || defined(PPC))) || \
|
|
|
|
defined(HAVE__UNWIND_BACKTRACE)))
|
|
|
|
# define MOZ_STACKWALK_SUPPORTS_LINUX 1
|
|
|
|
#else
|
|
|
|
# define MOZ_STACKWALK_SUPPORTS_LINUX 0
|
|
|
|
#endif
|
2011-12-22 20:00:48 +04:00
|
|
|
|
2014-03-29 00:31:15 +04:00
|
|
|
#if __GLIBC__ > 2 || (__GLIBC__ == 2 && __GLIBC_MINOR__ >= 1)
|
|
|
|
# define HAVE___LIBC_STACK_END 1
|
|
|
|
#else
|
|
|
|
# define HAVE___LIBC_STACK_END 0
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#if HAVE___LIBC_STACK_END
|
|
|
|
extern MOZ_EXPORT void* __libc_stack_end; // from ld-linux.so
|
|
|
|
#endif
|
|
|
|
|
2015-12-22 11:19:37 +03:00
|
|
|
#ifdef ANDROID
|
|
|
|
# include <algorithm>
|
|
|
|
# include <unistd.h>
|
|
|
|
# include <pthread.h>
|
|
|
|
#endif
|
|
|
|
|
2017-07-27 05:46:47 +03:00
|
|
|
#if MOZ_STACKWALK_SUPPORTS_WINDOWS
|
2007-08-11 02:20:48 +04:00
|
|
|
|
2007-08-13 23:37:36 +04:00
|
|
|
# include <windows.h>
|
2007-08-28 09:42:04 +04:00
|
|
|
# include <process.h>
|
2007-08-13 23:37:36 +04:00
|
|
|
# include <stdio.h>
|
2012-06-23 00:31:59 +04:00
|
|
|
# include <malloc.h>
|
2013-12-09 06:52:54 +04:00
|
|
|
# include "mozilla/ArrayUtils.h"
|
2017-05-03 19:10:48 +03:00
|
|
|
# include "mozilla/Atomics.h"
|
2016-09-16 07:35:14 +03:00
|
|
|
# include "mozilla/StackWalk_windows.h"
|
2017-05-17 22:26:13 +03:00
|
|
|
# include "mozilla/WindowsVersion.h"
|
2007-08-13 23:37:36 +04:00
|
|
|
|
|
|
|
# include <imagehlp.h>
|
|
|
|
// We need a way to know if we are building for WXP (or later), as if we are, we
|
|
|
|
// need to use the newer 64-bit APIs. API_VERSION_NUMBER seems to fit the bill.
|
|
|
|
// A value of 9 indicates we want to use the new APIs.
|
2012-02-23 18:53:55 +04:00
|
|
|
# if API_VERSION_NUMBER < 9
|
|
|
|
# error Too old imagehlp.h
|
2007-08-13 23:37:36 +04:00
|
|
|
# endif
|
|
|
|
|
2014-05-13 21:41:38 +04:00
|
|
|
struct WalkStackData {
|
2015-01-20 06:19:55 +03:00
|
|
|
// Are we walking the stack of the calling thread? Note that we need to avoid
|
|
|
|
// calling fprintf and friends if this is false, in order to avoid deadlocks.
|
|
|
|
bool walkCallingThread;
|
2012-08-22 19:56:38 +04:00
|
|
|
uint32_t skipFrames;
|
2007-08-13 23:37:36 +04:00
|
|
|
HANDLE thread;
|
|
|
|
HANDLE process;
|
2007-08-28 09:42:04 +04:00
|
|
|
HANDLE eventStart;
|
|
|
|
HANDLE eventEnd;
|
2014-05-13 21:41:38 +04:00
|
|
|
void** pcs;
|
2012-08-22 19:56:38 +04:00
|
|
|
uint32_t pc_size;
|
|
|
|
uint32_t pc_count;
|
2012-12-21 09:31:57 +04:00
|
|
|
uint32_t pc_max;
|
2014-05-13 21:41:38 +04:00
|
|
|
void** sps;
|
2012-08-22 19:56:38 +04:00
|
|
|
uint32_t sp_size;
|
|
|
|
uint32_t sp_count;
|
2017-07-27 05:46:47 +03:00
|
|
|
CONTEXT* context;
|
2007-08-13 23:37:36 +04:00
|
|
|
};
|
|
|
|
|
2007-08-28 09:42:04 +04:00
|
|
|
CRITICAL_SECTION gDbgHelpCS;
|
2007-08-13 23:37:36 +04:00
|
|
|
|
2018-12-19 23:14:17 +03:00
|
|
|
# if defined(_M_AMD64) || defined(_M_ARM64)
|
2017-05-03 19:10:48 +03:00
|
|
|
// Because various Win64 APIs acquire function-table locks, we need a way of
|
|
|
|
// preventing stack walking while those APIs are being called. Otherwise, the
|
|
|
|
// stack walker may suspend a thread holding such a lock, and deadlock when the
|
|
|
|
// stack unwind code attempts to wait for that lock.
|
|
|
|
//
|
|
|
|
// We're using an atomic counter rather than a critical section because we
|
|
|
|
// don't require mutual exclusion with the stack walker. If the stack walker
|
|
|
|
// determines that it's safe to start unwinding the suspended thread (i.e.
|
|
|
|
// there are no suppressions when the unwind begins), then it's safe to
|
|
|
|
// continue unwinding that thread even if other threads request suppressions
|
|
|
|
// in the meantime, because we can't deadlock with those other threads.
|
|
|
|
//
|
|
|
|
// XXX: This global variable is a larger-than-necessary hammer. A more scoped
|
|
|
|
// solution would be to maintain a counter per thread, but then it would be
|
|
|
|
// more difficult for WalkStackMain64 to read the suspended thread's counter.
|
|
|
|
static Atomic<size_t> sStackWalkSuppressions;
|
|
|
|
|
2019-08-14 06:34:52 +03:00
|
|
|
void SuppressStackWalking() { ++sStackWalkSuppressions; }
|
|
|
|
|
|
|
|
void DesuppressStackWalking() { --sStackWalkSuppressions; }
|
|
|
|
|
2017-05-03 19:10:48 +03:00
|
|
|
MFBT_API
|
2019-08-14 06:34:52 +03:00
|
|
|
AutoSuppressStackWalking::AutoSuppressStackWalking() { SuppressStackWalking(); }
|
2017-05-03 19:10:48 +03:00
|
|
|
|
|
|
|
MFBT_API
|
|
|
|
AutoSuppressStackWalking::~AutoSuppressStackWalking() {
|
2019-08-14 06:34:52 +03:00
|
|
|
DesuppressStackWalking();
|
2017-05-03 19:10:48 +03:00
|
|
|
}
|
|
|
|
|
2017-04-19 01:52:04 +03:00
|
|
|
static uint8_t* sJitCodeRegionStart;
|
|
|
|
static size_t sJitCodeRegionSize;
|
2017-05-18 23:15:29 +03:00
|
|
|
uint8_t* sMsMpegJitCodeRegionStart;
|
|
|
|
size_t sMsMpegJitCodeRegionSize;
|
2017-05-03 19:10:48 +03:00
|
|
|
|
|
|
|
MFBT_API void RegisterJitCodeRegion(uint8_t* aStart, size_t aSize) {
|
|
|
|
// Currently we can only handle one JIT code region at a time
|
|
|
|
MOZ_RELEASE_ASSERT(!sJitCodeRegionStart);
|
|
|
|
|
|
|
|
sJitCodeRegionStart = aStart;
|
|
|
|
sJitCodeRegionSize = aSize;
|
|
|
|
}
|
|
|
|
|
|
|
|
MFBT_API void UnregisterJitCodeRegion(uint8_t* aStart, size_t aSize) {
|
|
|
|
// Currently we can only handle one JIT code region at a time
|
|
|
|
MOZ_RELEASE_ASSERT(sJitCodeRegionStart && sJitCodeRegionStart == aStart &&
|
|
|
|
sJitCodeRegionSize == aSize);
|
|
|
|
|
|
|
|
sJitCodeRegionStart = nullptr;
|
|
|
|
sJitCodeRegionSize = 0;
|
|
|
|
}
|
2017-05-04 00:13:31 +03:00
|
|
|
|
2018-12-19 23:14:17 +03:00
|
|
|
# endif // _M_AMD64 || _M_ARM64
|
2017-04-19 01:52:04 +03:00
|
|
|
|
2007-08-13 23:37:36 +04:00
|
|
|
// Routine to print an error message to standard error.
|
2014-05-13 21:41:38 +04:00
|
|
|
static void PrintError(const char* aPrefix) {
|
2016-03-15 03:18:42 +03:00
|
|
|
LPSTR lpMsgBuf;
|
2014-05-05 21:30:39 +04:00
|
|
|
DWORD lastErr = GetLastError();
|
|
|
|
FormatMessageA(FORMAT_MESSAGE_ALLOCATE_BUFFER | FORMAT_MESSAGE_FROM_SYSTEM |
|
|
|
|
FORMAT_MESSAGE_IGNORE_INSERTS,
|
|
|
|
nullptr, lastErr,
|
|
|
|
MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT), // Default language
|
2014-08-25 23:17:15 +04:00
|
|
|
(LPSTR)&lpMsgBuf, 0, nullptr);
|
2014-05-05 21:30:39 +04:00
|
|
|
fprintf(stderr, "### ERROR: %s: %s", aPrefix,
|
2014-05-13 21:41:38 +04:00
|
|
|
lpMsgBuf ? lpMsgBuf : "(null)\n");
|
2014-05-05 21:30:39 +04:00
|
|
|
fflush(stderr);
|
|
|
|
LocalFree(lpMsgBuf);
|
2007-08-13 23:37:36 +04:00
|
|
|
}
|
|
|
|
|
2017-05-01 22:34:50 +03:00
|
|
|
static void InitializeDbgHelpCriticalSection() {
|
|
|
|
static bool initialized = false;
|
|
|
|
if (initialized) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
::InitializeCriticalSection(&gDbgHelpCS);
|
|
|
|
initialized = true;
|
|
|
|
}
|
|
|
|
|
2014-05-13 21:41:38 +04:00
|
|
|
static void WalkStackMain64(struct WalkStackData* aData) {
|
2014-05-05 21:30:39 +04:00
|
|
|
// Get a context for the specified thread.
|
2017-07-27 05:46:47 +03:00
|
|
|
CONTEXT context_buf;
|
|
|
|
CONTEXT* context;
|
|
|
|
if (!aData->context) {
|
|
|
|
context = &context_buf;
|
|
|
|
memset(context, 0, sizeof(CONTEXT));
|
|
|
|
context->ContextFlags = CONTEXT_FULL;
|
2018-06-04 12:23:27 +03:00
|
|
|
if (aData->walkCallingThread) {
|
|
|
|
::RtlCaptureContext(context);
|
|
|
|
} else if (!GetThreadContext(aData->thread, context)) {
|
2014-05-05 21:30:39 +04:00
|
|
|
return;
|
2007-08-13 23:37:36 +04:00
|
|
|
}
|
2014-05-05 21:30:39 +04:00
|
|
|
} else {
|
2017-07-27 05:46:47 +03:00
|
|
|
context = aData->context;
|
2014-05-05 21:30:39 +04:00
|
|
|
}
|
2007-08-13 23:37:36 +04:00
|
|
|
|
2018-12-19 23:14:17 +03:00
|
|
|
# if defined(_M_IX86) || defined(_M_IA64)
|
2015-01-09 03:00:07 +03:00
|
|
|
// Setup initial stack frame to walk from.
|
|
|
|
STACKFRAME64 frame64;
|
2014-05-05 21:30:39 +04:00
|
|
|
memset(&frame64, 0, sizeof(frame64));
|
2007-08-13 23:37:36 +04:00
|
|
|
# ifdef _M_IX86
|
2017-07-27 05:46:47 +03:00
|
|
|
frame64.AddrPC.Offset = context->Eip;
|
|
|
|
frame64.AddrStack.Offset = context->Esp;
|
|
|
|
frame64.AddrFrame.Offset = context->Ebp;
|
2007-08-13 23:37:36 +04:00
|
|
|
# elif defined _M_IA64
|
2017-07-27 05:46:47 +03:00
|
|
|
frame64.AddrPC.Offset = context->StIIP;
|
|
|
|
frame64.AddrStack.Offset = context->SP;
|
|
|
|
frame64.AddrFrame.Offset = context->RsBSP;
|
2007-08-13 23:37:36 +04:00
|
|
|
# endif
|
2014-05-05 21:30:39 +04:00
|
|
|
frame64.AddrPC.Mode = AddrModeFlat;
|
|
|
|
frame64.AddrStack.Mode = AddrModeFlat;
|
|
|
|
frame64.AddrFrame.Mode = AddrModeFlat;
|
|
|
|
frame64.AddrReturn.Mode = AddrModeFlat;
|
2015-01-09 03:00:07 +03:00
|
|
|
# endif
|
|
|
|
|
2018-12-19 23:14:17 +03:00
|
|
|
# if defined(_M_AMD64) || defined(_M_ARM64)
|
2017-05-03 19:10:48 +03:00
|
|
|
// If there are any active suppressions, then at least one thread (we don't
|
|
|
|
// know which) is holding a lock that can deadlock RtlVirtualUnwind. Since
|
|
|
|
// that thread may be the one that we're trying to unwind, we can't proceed.
|
|
|
|
//
|
|
|
|
// But if there are no suppressions, then our target thread can't be holding
|
|
|
|
// a lock, and it's safe to proceed. By virtue of being suspended, the target
|
|
|
|
// thread can't acquire any new locks during the unwind process, so we only
|
|
|
|
// need to do this check once. After that, sStackWalkSuppressions can be
|
|
|
|
// changed by other threads while we're unwinding, and that's fine because
|
|
|
|
// we can't deadlock with those threads.
|
|
|
|
if (sStackWalkSuppressions) {
|
2017-02-17 12:51:11 +03:00
|
|
|
return;
|
|
|
|
}
|
2017-05-04 22:58:12 +03:00
|
|
|
# endif
|
2017-02-17 12:51:11 +03:00
|
|
|
|
2018-12-19 23:14:17 +03:00
|
|
|
# if defined(_M_AMD64) || defined(_M_ARM64)
|
2017-04-19 01:52:06 +03:00
|
|
|
bool firstFrame = true;
|
|
|
|
# endif
|
|
|
|
|
2015-01-09 03:00:07 +03:00
|
|
|
// Skip our own stack walking frames.
|
|
|
|
int skip = (aData->walkCallingThread ? 3 : 0) + aData->skipFrames;
|
2007-08-13 23:37:36 +04:00
|
|
|
|
2015-01-09 03:00:07 +03:00
|
|
|
// Now walk the stack.
|
|
|
|
while (true) {
|
|
|
|
DWORD64 addr;
|
|
|
|
DWORD64 spaddr;
|
2007-08-13 23:37:36 +04:00
|
|
|
|
2018-12-19 23:14:17 +03:00
|
|
|
# if defined(_M_IX86) || defined(_M_IA64)
|
2015-01-09 03:00:07 +03:00
|
|
|
// 32-bit frame unwinding.
|
|
|
|
// Debug routines are not threadsafe, so grab the lock.
|
2014-05-05 21:30:39 +04:00
|
|
|
EnterCriticalSection(&gDbgHelpCS);
|
2015-01-09 03:00:07 +03:00
|
|
|
BOOL ok = StackWalk64(
|
|
|
|
# if defined _M_IA64
|
2014-05-05 21:30:39 +04:00
|
|
|
IMAGE_FILE_MACHINE_IA64,
|
2007-08-13 23:37:36 +04:00
|
|
|
# elif defined _M_IX86
|
2014-05-05 21:30:39 +04:00
|
|
|
IMAGE_FILE_MACHINE_I386,
|
2007-08-13 23:37:36 +04:00
|
|
|
# endif
|
2015-01-09 03:00:07 +03:00
|
|
|
aData->process, aData->thread, &frame64, context, nullptr,
|
2014-05-05 21:30:39 +04:00
|
|
|
SymFunctionTableAccess64, // function table access routine
|
|
|
|
SymGetModuleBase64, // module base routine
|
|
|
|
0);
|
|
|
|
LeaveCriticalSection(&gDbgHelpCS);
|
2007-08-13 23:37:36 +04:00
|
|
|
|
2014-05-05 21:30:39 +04:00
|
|
|
if (ok) {
|
|
|
|
addr = frame64.AddrPC.Offset;
|
|
|
|
spaddr = frame64.AddrStack.Offset;
|
|
|
|
} else {
|
|
|
|
addr = 0;
|
|
|
|
spaddr = 0;
|
2014-05-13 21:41:38 +04:00
|
|
|
if (aData->walkCallingThread) {
|
2014-05-05 21:30:39 +04:00
|
|
|
PrintError("WalkStack64");
|
|
|
|
}
|
|
|
|
}
|
2007-08-13 23:37:36 +04:00
|
|
|
|
2015-01-09 03:00:07 +03:00
|
|
|
if (!ok) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2018-12-19 23:14:17 +03:00
|
|
|
# elif defined(_M_AMD64) || defined(_M_ARM64)
|
|
|
|
|
|
|
|
# if defined(_M_AMD64)
|
|
|
|
auto currentInstr = context->Rip;
|
|
|
|
# elif defined(_M_ARM64)
|
|
|
|
auto currentInstr = context->Pc;
|
|
|
|
# endif
|
|
|
|
|
2017-04-19 01:52:04 +03:00
|
|
|
// If we reach a frame in JIT code, we don't have enough information to
|
|
|
|
// unwind, so we have to give up.
|
2018-12-19 23:14:17 +03:00
|
|
|
if (sJitCodeRegionStart && (uint8_t*)currentInstr >= sJitCodeRegionStart &&
|
|
|
|
(uint8_t*)currentInstr < sJitCodeRegionStart + sJitCodeRegionSize) {
|
2017-04-19 01:52:04 +03:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2017-05-18 23:15:29 +03:00
|
|
|
// We must also avoid msmpeg2vdec.dll's JIT region: they don't generate
|
|
|
|
// unwind data, so their JIT unwind callback just throws up its hands and
|
|
|
|
// terminates the process.
|
|
|
|
if (sMsMpegJitCodeRegionStart &&
|
2018-12-19 23:14:17 +03:00
|
|
|
(uint8_t*)currentInstr >= sMsMpegJitCodeRegionStart &&
|
|
|
|
(uint8_t*)currentInstr <
|
2017-07-27 05:46:47 +03:00
|
|
|
sMsMpegJitCodeRegionStart + sMsMpegJitCodeRegionSize) {
|
2017-05-18 23:15:29 +03:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2015-01-09 03:00:07 +03:00
|
|
|
// 64-bit frame unwinding.
|
|
|
|
// Try to look up unwind metadata for the current function.
|
|
|
|
ULONG64 imageBase;
|
|
|
|
PRUNTIME_FUNCTION runtimeFunction =
|
2018-12-19 23:14:17 +03:00
|
|
|
RtlLookupFunctionEntry(currentInstr, &imageBase, NULL);
|
2015-01-09 03:00:07 +03:00
|
|
|
|
2017-04-19 01:52:06 +03:00
|
|
|
if (runtimeFunction) {
|
|
|
|
PVOID dummyHandlerData;
|
|
|
|
ULONG64 dummyEstablisherFrame;
|
2018-12-19 23:14:17 +03:00
|
|
|
RtlVirtualUnwind(UNW_FLAG_NHANDLER, imageBase, currentInstr,
|
2017-04-19 01:52:06 +03:00
|
|
|
runtimeFunction, context, &dummyHandlerData,
|
|
|
|
&dummyEstablisherFrame, nullptr);
|
|
|
|
} else if (firstFrame) {
|
|
|
|
// Leaf functions can be unwound by hand.
|
2018-12-19 23:14:17 +03:00
|
|
|
# if defined(_M_AMD64)
|
2017-07-27 05:46:47 +03:00
|
|
|
context->Rip = *reinterpret_cast<DWORD64*>(context->Rsp);
|
|
|
|
context->Rsp += sizeof(void*);
|
2018-12-19 23:14:17 +03:00
|
|
|
# elif defined(_M_ARM64)
|
|
|
|
context->Pc = *reinterpret_cast<DWORD64*>(context->Sp);
|
|
|
|
context->Sp += sizeof(void*);
|
|
|
|
# endif
|
2017-04-19 01:52:06 +03:00
|
|
|
} else {
|
|
|
|
// Something went wrong.
|
2015-01-09 03:00:07 +03:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2018-12-19 23:14:17 +03:00
|
|
|
# if defined(_M_AMD64)
|
2017-07-27 05:46:47 +03:00
|
|
|
addr = context->Rip;
|
|
|
|
spaddr = context->Rsp;
|
2018-12-19 23:14:17 +03:00
|
|
|
# elif defined(_M_ARM64)
|
|
|
|
addr = context->Pc;
|
|
|
|
spaddr = context->Sp;
|
|
|
|
# endif
|
2017-04-19 01:52:06 +03:00
|
|
|
firstFrame = false;
|
2015-01-09 03:00:07 +03:00
|
|
|
# else
|
|
|
|
# error "unknown platform"
|
|
|
|
# endif
|
|
|
|
|
|
|
|
if (addr == 0) {
|
2014-05-05 21:30:39 +04:00
|
|
|
break;
|
|
|
|
}
|
2007-08-13 23:37:36 +04:00
|
|
|
|
2014-05-05 21:30:39 +04:00
|
|
|
if (skip-- > 0) {
|
|
|
|
continue;
|
|
|
|
}
|
2007-08-13 23:37:36 +04:00
|
|
|
|
2014-05-13 21:41:38 +04:00
|
|
|
if (aData->pc_count < aData->pc_size) {
|
|
|
|
aData->pcs[aData->pc_count] = (void*)addr;
|
|
|
|
}
|
|
|
|
++aData->pc_count;
|
2012-06-28 00:08:21 +04:00
|
|
|
|
2014-05-13 21:41:38 +04:00
|
|
|
if (aData->sp_count < aData->sp_size) {
|
|
|
|
aData->sps[aData->sp_count] = (void*)spaddr;
|
|
|
|
}
|
|
|
|
++aData->sp_count;
|
2012-12-21 09:31:57 +04:00
|
|
|
|
2014-05-13 21:41:38 +04:00
|
|
|
if (aData->pc_max != 0 && aData->pc_count == aData->pc_max) {
|
2014-05-05 21:30:39 +04:00
|
|
|
break;
|
2014-05-13 21:41:38 +04:00
|
|
|
}
|
2014-05-05 21:30:39 +04:00
|
|
|
|
2015-01-09 03:00:07 +03:00
|
|
|
# if defined(_M_IX86) || defined(_M_IA64)
|
2014-05-13 21:41:38 +04:00
|
|
|
if (frame64.AddrReturn.Offset == 0) {
|
2014-05-05 21:30:39 +04:00
|
|
|
break;
|
2014-05-13 21:41:38 +04:00
|
|
|
}
|
2015-01-09 03:00:07 +03:00
|
|
|
# endif
|
2014-05-05 21:30:39 +04:00
|
|
|
}
|
2007-08-13 23:37:36 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Walk the stack, translating PC's found into strings and recording the
|
|
|
|
* chain in aBuffer. For this to work properly, the DLLs must be rebased
|
|
|
|
* so that the address in the file agrees with the address in memory.
|
|
|
|
* Otherwise StackWalk will return FALSE when it hits a frame in a DLL
|
|
|
|
* whose in memory address doesn't match its in-file address.
|
|
|
|
*/
|
|
|
|
|
2017-07-27 05:46:47 +03:00
|
|
|
MFBT_API void MozStackWalkThread(MozWalkStackCallback aCallback,
|
|
|
|
uint32_t aSkipFrames, uint32_t aMaxFrames,
|
|
|
|
void* aClosure, HANDLE aThread,
|
|
|
|
CONTEXT* aContext) {
|
2014-05-05 21:30:39 +04:00
|
|
|
static HANDLE myProcess = nullptr;
|
|
|
|
HANDLE myThread;
|
|
|
|
struct WalkStackData data;
|
|
|
|
|
2017-06-14 01:30:48 +03:00
|
|
|
InitializeDbgHelpCriticalSection();
|
|
|
|
|
2018-06-04 12:17:32 +03:00
|
|
|
HANDLE targetThread = aThread;
|
|
|
|
if (!aThread) {
|
|
|
|
targetThread = ::GetCurrentThread();
|
|
|
|
data.walkCallingThread = true;
|
|
|
|
} else {
|
|
|
|
DWORD threadId = ::GetThreadId(aThread);
|
|
|
|
DWORD currentThreadId = ::GetCurrentThreadId();
|
|
|
|
data.walkCallingThread = (threadId == currentThreadId);
|
|
|
|
}
|
2014-05-05 21:30:39 +04:00
|
|
|
|
|
|
|
// Have to duplicate handle to get a real handle.
|
|
|
|
if (!myProcess) {
|
2007-08-13 23:37:36 +04:00
|
|
|
if (!::DuplicateHandle(::GetCurrentProcess(), ::GetCurrentProcess(),
|
2014-05-05 21:30:39 +04:00
|
|
|
::GetCurrentProcess(), &myProcess,
|
|
|
|
PROCESS_ALL_ACCESS, FALSE, 0)) {
|
2015-01-20 06:19:55 +03:00
|
|
|
if (data.walkCallingThread) {
|
2014-05-05 21:30:39 +04:00
|
|
|
PrintError("DuplicateHandle (process)");
|
|
|
|
}
|
2017-07-27 09:46:55 +03:00
|
|
|
return;
|
2007-08-13 23:37:36 +04:00
|
|
|
}
|
2014-05-05 21:30:39 +04:00
|
|
|
}
|
|
|
|
if (!::DuplicateHandle(::GetCurrentProcess(), targetThread,
|
|
|
|
::GetCurrentProcess(), &myThread, THREAD_ALL_ACCESS,
|
|
|
|
FALSE, 0)) {
|
2015-01-20 06:19:55 +03:00
|
|
|
if (data.walkCallingThread) {
|
2014-05-05 21:30:39 +04:00
|
|
|
PrintError("DuplicateHandle (thread)");
|
|
|
|
}
|
2017-07-27 09:46:55 +03:00
|
|
|
return;
|
2014-05-05 21:30:39 +04:00
|
|
|
}
|
2007-08-13 23:37:36 +04:00
|
|
|
|
2014-05-05 21:30:39 +04:00
|
|
|
data.skipFrames = aSkipFrames;
|
|
|
|
data.thread = myThread;
|
|
|
|
data.process = myProcess;
|
2014-05-13 21:41:38 +04:00
|
|
|
void* local_pcs[1024];
|
2014-05-05 21:30:39 +04:00
|
|
|
data.pcs = local_pcs;
|
|
|
|
data.pc_count = 0;
|
|
|
|
data.pc_size = ArrayLength(local_pcs);
|
|
|
|
data.pc_max = aMaxFrames;
|
2014-05-13 21:41:38 +04:00
|
|
|
void* local_sps[1024];
|
2014-05-05 21:30:39 +04:00
|
|
|
data.sps = local_sps;
|
|
|
|
data.sp_count = 0;
|
|
|
|
data.sp_size = ArrayLength(local_sps);
|
2017-07-27 05:46:47 +03:00
|
|
|
data.context = aContext;
|
2014-05-05 21:30:39 +04:00
|
|
|
|
2018-06-04 12:23:27 +03:00
|
|
|
WalkStackMain64(&data);
|
2014-05-05 21:30:39 +04:00
|
|
|
|
2018-06-04 12:23:27 +03:00
|
|
|
if (data.pc_count > data.pc_size) {
|
|
|
|
data.pcs = (void**)_alloca(data.pc_count * sizeof(void*));
|
|
|
|
data.pc_size = data.pc_count;
|
|
|
|
data.pc_count = 0;
|
|
|
|
data.sps = (void**)_alloca(data.sp_count * sizeof(void*));
|
|
|
|
data.sp_size = data.sp_count;
|
|
|
|
data.sp_count = 0;
|
|
|
|
WalkStackMain64(&data);
|
2014-05-05 21:30:39 +04:00
|
|
|
}
|
2007-08-28 09:42:04 +04:00
|
|
|
|
2014-05-05 21:30:39 +04:00
|
|
|
::CloseHandle(myThread);
|
2007-08-28 09:42:04 +04:00
|
|
|
|
2014-05-13 21:41:38 +04:00
|
|
|
for (uint32_t i = 0; i < data.pc_count; ++i) {
|
2014-09-11 08:47:01 +04:00
|
|
|
(*aCallback)(i + 1, data.pcs[i], data.sps[i], aClosure);
|
2014-05-13 21:41:38 +04:00
|
|
|
}
|
2007-08-13 23:37:36 +04:00
|
|
|
}
|
|
|
|
|
2017-07-27 05:46:47 +03:00
|
|
|
MFBT_API void MozStackWalk(MozWalkStackCallback aCallback, uint32_t aSkipFrames,
|
|
|
|
uint32_t aMaxFrames, void* aClosure) {
|
2017-07-27 09:46:55 +03:00
|
|
|
MozStackWalkThread(aCallback, aSkipFrames, aMaxFrames, aClosure, nullptr,
|
|
|
|
nullptr);
|
2017-07-27 05:46:47 +03:00
|
|
|
}
|
2007-08-13 23:37:36 +04:00
|
|
|
|
2014-05-13 21:41:38 +04:00
|
|
|
static BOOL CALLBACK callbackEspecial64(PCSTR aModuleName, DWORD64 aModuleBase,
|
2007-08-13 23:37:36 +04:00
|
|
|
ULONG aModuleSize, PVOID aUserContext) {
|
2014-05-05 21:30:39 +04:00
|
|
|
BOOL retval = TRUE;
|
|
|
|
DWORD64 addr = *(DWORD64*)aUserContext;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* You'll want to control this if we are running on an
|
|
|
|
* architecture where the addresses go the other direction.
|
|
|
|
* Not sure this is even a realistic consideration.
|
|
|
|
*/
|
|
|
|
const BOOL addressIncreases = TRUE;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If it falls in side the known range, load the symbols.
|
|
|
|
*/
|
|
|
|
if (addressIncreases
|
|
|
|
? (addr >= aModuleBase && addr <= (aModuleBase + aModuleSize))
|
|
|
|
: (addr <= aModuleBase && addr >= (aModuleBase - aModuleSize))) {
|
|
|
|
retval = !!SymLoadModule64(GetCurrentProcess(), nullptr, (PSTR)aModuleName,
|
|
|
|
nullptr, aModuleBase, aModuleSize);
|
2014-05-13 21:41:38 +04:00
|
|
|
if (!retval) {
|
2014-05-05 21:30:39 +04:00
|
|
|
PrintError("SymLoadModule64");
|
2014-05-13 21:41:38 +04:00
|
|
|
}
|
2014-05-05 21:30:39 +04:00
|
|
|
}
|
2007-08-13 23:37:36 +04:00
|
|
|
|
2014-05-05 21:30:39 +04:00
|
|
|
return retval;
|
2007-08-13 23:37:36 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* SymGetModuleInfoEspecial
|
|
|
|
*
|
|
|
|
* Attempt to determine the module information.
|
|
|
|
* Bug 112196 says this DLL may not have been loaded at the time
|
|
|
|
* SymInitialize was called, and thus the module information
|
|
|
|
* and symbol information is not available.
|
|
|
|
* This code rectifies that problem.
|
|
|
|
*/
|
|
|
|
|
2007-08-20 01:38:31 +04:00
|
|
|
// New members were added to IMAGEHLP_MODULE64 (that show up in the
|
|
|
|
// Platform SDK that ships with VC8, but not the Platform SDK that ships
|
|
|
|
// with VC7.1, i.e., between DbgHelp 6.0 and 6.1), but we don't need to
|
|
|
|
// use them, and it's useful to be able to function correctly with the
|
|
|
|
// older library. (Stock Windows XP SP2 seems to ship with dbghelp.dll
|
|
|
|
// version 5.1.) Since Platform SDK version need not correspond to
|
|
|
|
// compiler version, and the version number in debughlp.h was NOT bumped
|
|
|
|
// when these changes were made, ifdef based on a constant that was
|
|
|
|
// added between these versions.
|
|
|
|
# ifdef SSRVOPT_SETCONTEXT
|
|
|
|
# define NS_IMAGEHLP_MODULE64_SIZE \
|
|
|
|
(((offsetof(IMAGEHLP_MODULE64, LoadedPdbName) + sizeof(DWORD64) - 1) / \
|
|
|
|
sizeof(DWORD64)) * \
|
|
|
|
sizeof(DWORD64))
|
|
|
|
# else
|
|
|
|
# define NS_IMAGEHLP_MODULE64_SIZE sizeof(IMAGEHLP_MODULE64)
|
|
|
|
# endif
|
|
|
|
|
2014-05-13 21:41:38 +04:00
|
|
|
BOOL SymGetModuleInfoEspecial64(HANDLE aProcess, DWORD64 aAddr,
|
|
|
|
PIMAGEHLP_MODULE64 aModuleInfo,
|
|
|
|
PIMAGEHLP_LINE64 aLineInfo) {
|
2014-05-05 21:30:39 +04:00
|
|
|
BOOL retval = FALSE;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Init the vars if we have em.
|
|
|
|
*/
|
|
|
|
aModuleInfo->SizeOfStruct = NS_IMAGEHLP_MODULE64_SIZE;
|
2014-05-13 21:41:38 +04:00
|
|
|
if (aLineInfo) {
|
2014-05-05 21:30:39 +04:00
|
|
|
aLineInfo->SizeOfStruct = sizeof(IMAGEHLP_LINE64);
|
|
|
|
}
|
2007-08-13 23:37:36 +04:00
|
|
|
|
2014-05-05 21:30:39 +04:00
|
|
|
/*
|
|
|
|
* Give it a go.
|
|
|
|
* It may already be loaded.
|
|
|
|
*/
|
|
|
|
retval = SymGetModuleInfo64(aProcess, aAddr, aModuleInfo);
|
2014-05-13 21:41:38 +04:00
|
|
|
if (retval == FALSE) {
|
2007-08-13 23:37:36 +04:00
|
|
|
/*
|
2014-05-05 21:30:39 +04:00
|
|
|
* Not loaded, here's the magic.
|
|
|
|
* Go through all the modules.
|
2007-08-13 23:37:36 +04:00
|
|
|
*/
|
2014-05-05 21:30:39 +04:00
|
|
|
// Need to cast to PENUMLOADED_MODULES_CALLBACK64 because the
|
|
|
|
// constness of the first parameter of
|
|
|
|
// PENUMLOADED_MODULES_CALLBACK64 varies over SDK versions (from
|
|
|
|
// non-const to const over time). See bug 391848 and bug
|
|
|
|
// 415426.
|
2014-05-13 21:41:38 +04:00
|
|
|
BOOL enumRes = EnumerateLoadedModules64(
|
|
|
|
aProcess, (PENUMLOADED_MODULES_CALLBACK64)callbackEspecial64,
|
|
|
|
(PVOID)&aAddr);
|
|
|
|
if (enumRes != FALSE) {
|
2014-05-05 21:30:39 +04:00
|
|
|
/*
|
|
|
|
* One final go.
|
|
|
|
* If it fails, then well, we have other problems.
|
|
|
|
*/
|
|
|
|
retval = SymGetModuleInfo64(aProcess, aAddr, aModuleInfo);
|
2007-08-13 23:37:36 +04:00
|
|
|
}
|
2014-05-05 21:30:39 +04:00
|
|
|
}
|
2007-08-13 23:37:36 +04:00
|
|
|
|
2014-05-05 21:30:39 +04:00
|
|
|
/*
|
|
|
|
* If we got module info, we may attempt line info as well.
|
|
|
|
* We will not report failure if this does not work.
|
|
|
|
*/
|
2014-05-13 21:41:38 +04:00
|
|
|
if (retval != FALSE && aLineInfo) {
|
2014-05-05 21:30:39 +04:00
|
|
|
DWORD displacement = 0;
|
|
|
|
BOOL lineRes = FALSE;
|
|
|
|
lineRes = SymGetLineFromAddr64(aProcess, aAddr, &displacement, aLineInfo);
|
|
|
|
if (!lineRes) {
|
|
|
|
// Clear out aLineInfo to indicate that it's not valid
|
|
|
|
memset(aLineInfo, 0, sizeof(*aLineInfo));
|
2007-08-13 23:37:36 +04:00
|
|
|
}
|
2014-05-05 21:30:39 +04:00
|
|
|
}
|
2007-08-13 23:37:36 +04:00
|
|
|
|
2014-05-05 21:30:39 +04:00
|
|
|
return retval;
|
2007-08-13 23:37:36 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
static bool EnsureSymInitialized() {
|
2014-05-05 21:30:39 +04:00
|
|
|
static bool gInitialized = false;
|
|
|
|
bool retStat;
|
2007-08-13 23:37:36 +04:00
|
|
|
|
2014-05-13 21:41:38 +04:00
|
|
|
if (gInitialized) {
|
2014-05-05 21:30:39 +04:00
|
|
|
return gInitialized;
|
2014-05-13 21:41:38 +04:00
|
|
|
}
|
2007-08-13 23:37:36 +04:00
|
|
|
|
2017-05-01 22:34:50 +03:00
|
|
|
InitializeDbgHelpCriticalSection();
|
2007-08-13 23:37:36 +04:00
|
|
|
|
2014-05-05 21:30:39 +04:00
|
|
|
SymSetOptions(SYMOPT_LOAD_LINES | SYMOPT_UNDNAME);
|
|
|
|
retStat = SymInitialize(GetCurrentProcess(), nullptr, TRUE);
|
2014-05-13 21:41:38 +04:00
|
|
|
if (!retStat) {
|
2014-05-05 21:30:39 +04:00
|
|
|
PrintError("SymInitialize");
|
2014-05-13 21:41:38 +04:00
|
|
|
}
|
2007-08-13 23:37:36 +04:00
|
|
|
|
2014-05-05 21:30:39 +04:00
|
|
|
gInitialized = retStat;
|
|
|
|
/* XXX At some point we need to arrange to call SymCleanup */
|
2007-08-13 23:37:36 +04:00
|
|
|
|
2014-05-05 21:30:39 +04:00
|
|
|
return retStat;
|
2007-08-13 23:37:36 +04:00
|
|
|
}
|
|
|
|
|
2015-06-10 23:32:45 +03:00
|
|
|
MFBT_API bool MozDescribeCodeAddress(void* aPC,
|
|
|
|
MozCodeAddressDetails* aDetails) {
|
2014-05-05 21:30:39 +04:00
|
|
|
aDetails->library[0] = '\0';
|
|
|
|
aDetails->loffset = 0;
|
|
|
|
aDetails->filename[0] = '\0';
|
|
|
|
aDetails->lineno = 0;
|
|
|
|
aDetails->function[0] = '\0';
|
|
|
|
aDetails->foffset = 0;
|
2007-08-13 23:37:36 +04:00
|
|
|
|
2014-05-13 21:41:38 +04:00
|
|
|
if (!EnsureSymInitialized()) {
|
2015-06-10 23:32:45 +03:00
|
|
|
return false;
|
2014-05-13 21:41:38 +04:00
|
|
|
}
|
2007-08-13 23:37:36 +04:00
|
|
|
|
2014-05-05 21:30:39 +04:00
|
|
|
HANDLE myProcess = ::GetCurrentProcess();
|
|
|
|
BOOL ok;
|
2007-08-13 23:37:36 +04:00
|
|
|
|
2014-05-05 21:30:39 +04:00
|
|
|
// debug routines are not threadsafe, so grab the lock.
|
|
|
|
EnterCriticalSection(&gDbgHelpCS);
|
2007-08-13 23:37:36 +04:00
|
|
|
|
2014-05-05 21:30:39 +04:00
|
|
|
//
|
|
|
|
// Attempt to load module info before we attempt to resolve the symbol.
|
|
|
|
// This just makes sure we get good info if available.
|
|
|
|
//
|
2007-08-13 23:37:36 +04:00
|
|
|
|
2014-05-05 21:30:39 +04:00
|
|
|
DWORD64 addr = (DWORD64)aPC;
|
|
|
|
IMAGEHLP_MODULE64 modInfo;
|
|
|
|
IMAGEHLP_LINE64 lineInfo;
|
|
|
|
BOOL modInfoRes;
|
|
|
|
modInfoRes = SymGetModuleInfoEspecial64(myProcess, addr, &modInfo, &lineInfo);
|
2012-02-09 01:04:21 +04:00
|
|
|
|
2014-05-05 21:30:39 +04:00
|
|
|
if (modInfoRes) {
|
2015-10-29 23:25:03 +03:00
|
|
|
strncpy(aDetails->library, modInfo.LoadedImageName,
|
2014-05-05 21:30:39 +04:00
|
|
|
sizeof(aDetails->library));
|
2015-07-02 23:30:58 +03:00
|
|
|
aDetails->library[mozilla::ArrayLength(aDetails->library) - 1] = '\0';
|
2014-05-13 21:41:38 +04:00
|
|
|
aDetails->loffset = (char*)aPC - (char*)modInfo.BaseOfImage;
|
2007-08-13 23:37:36 +04:00
|
|
|
|
2014-05-05 21:30:39 +04:00
|
|
|
if (lineInfo.FileName) {
|
2015-06-10 23:32:45 +03:00
|
|
|
strncpy(aDetails->filename, lineInfo.FileName,
|
2014-05-05 21:30:39 +04:00
|
|
|
sizeof(aDetails->filename));
|
2015-07-02 23:30:58 +03:00
|
|
|
aDetails->filename[mozilla::ArrayLength(aDetails->filename) - 1] = '\0';
|
2014-05-05 21:30:39 +04:00
|
|
|
aDetails->lineno = lineInfo.LineNumber;
|
2007-08-13 23:37:36 +04:00
|
|
|
}
|
2014-05-05 21:30:39 +04:00
|
|
|
}
|
2007-08-13 23:37:36 +04:00
|
|
|
|
2014-05-13 21:41:38 +04:00
|
|
|
ULONG64 buffer[(sizeof(SYMBOL_INFO) + MAX_SYM_NAME * sizeof(TCHAR) +
|
|
|
|
sizeof(ULONG64) - 1) /
|
|
|
|
sizeof(ULONG64)];
|
2014-05-05 21:30:39 +04:00
|
|
|
PSYMBOL_INFO pSymbol = (PSYMBOL_INFO)buffer;
|
|
|
|
pSymbol->SizeOfStruct = sizeof(SYMBOL_INFO);
|
|
|
|
pSymbol->MaxNameLen = MAX_SYM_NAME;
|
|
|
|
|
|
|
|
DWORD64 displacement;
|
|
|
|
ok = SymFromAddr(myProcess, addr, &displacement, pSymbol);
|
|
|
|
|
|
|
|
if (ok) {
|
2015-06-10 23:32:45 +03:00
|
|
|
strncpy(aDetails->function, pSymbol->Name, sizeof(aDetails->function));
|
2015-07-02 23:30:58 +03:00
|
|
|
aDetails->function[mozilla::ArrayLength(aDetails->function) - 1] = '\0';
|
2014-05-05 21:30:39 +04:00
|
|
|
aDetails->foffset = static_cast<ptrdiff_t>(displacement);
|
|
|
|
}
|
|
|
|
|
|
|
|
LeaveCriticalSection(&gDbgHelpCS); // release our lock
|
2015-06-10 23:32:45 +03:00
|
|
|
return true;
|
2007-08-13 23:37:36 +04:00
|
|
|
}
|
|
|
|
|
2014-09-11 06:46:54 +04:00
|
|
|
// i386 or PPC Linux stackwalking code
|
2015-06-10 23:32:45 +03:00
|
|
|
#elif HAVE_DLADDR && \
|
|
|
|
(HAVE__UNWIND_BACKTRACE || MOZ_STACKWALK_SUPPORTS_LINUX || \
|
|
|
|
MOZ_STACKWALK_SUPPORTS_MACOSX)
|
2007-08-13 23:37:36 +04:00
|
|
|
|
|
|
|
# include <stdlib.h>
|
|
|
|
# include <string.h>
|
|
|
|
# include <stdio.h>
|
|
|
|
|
|
|
|
// On glibc 2.1, the Dl_info api defined in <dlfcn.h> is only exposed
|
|
|
|
// if __USE_GNU is defined. I suppose its some kind of standards
|
|
|
|
// adherence thing.
|
|
|
|
//
|
|
|
|
# if (__GLIBC_MINOR__ >= 1) && !defined(__USE_GNU)
|
|
|
|
# define __USE_GNU
|
|
|
|
# endif
|
|
|
|
|
|
|
|
// This thing is exported by libstdc++
|
|
|
|
// Yes, this is a gcc only hack
|
|
|
|
# if defined(MOZ_DEMANGLE_SYMBOLS)
|
|
|
|
# include <cxxabi.h>
|
|
|
|
# endif // MOZ_DEMANGLE_SYMBOLS
|
|
|
|
|
2014-05-13 21:41:38 +04:00
|
|
|
void DemangleSymbol(const char* aSymbol, char* aBuffer, int aBufLen) {
|
2014-05-05 21:30:39 +04:00
|
|
|
aBuffer[0] = '\0';
|
2007-08-13 23:37:36 +04:00
|
|
|
|
|
|
|
# if defined(MOZ_DEMANGLE_SYMBOLS)
|
2014-05-05 21:30:39 +04:00
|
|
|
/* See demangle.h in the gcc source for the voodoo */
|
2014-05-13 21:41:38 +04:00
|
|
|
char* demangled = abi::__cxa_demangle(aSymbol, 0, 0, 0);
|
2014-04-15 00:25:04 +04:00
|
|
|
|
2014-05-13 21:41:38 +04:00
|
|
|
if (demangled) {
|
2015-06-10 23:32:45 +03:00
|
|
|
strncpy(aBuffer, demangled, aBufLen);
|
2015-07-02 23:30:58 +03:00
|
|
|
aBuffer[aBufLen - 1] = '\0';
|
2014-05-05 21:30:39 +04:00
|
|
|
free(demangled);
|
|
|
|
}
|
2007-08-13 23:37:36 +04:00
|
|
|
# endif // MOZ_DEMANGLE_SYMBOLS
|
|
|
|
}
|
|
|
|
|
2016-07-20 07:50:02 +03:00
|
|
|
// {x86, ppc} x {Linux, Mac} stackwalking code.
|
|
|
|
# if ((defined(__i386) || defined(PPC) || defined(__ppc__)) && \
|
|
|
|
(MOZ_STACKWALK_SUPPORTS_MACOSX || MOZ_STACKWALK_SUPPORTS_LINUX))
|
2012-02-04 00:13:24 +04:00
|
|
|
|
2015-06-10 23:32:45 +03:00
|
|
|
MFBT_API void MozStackWalk(MozWalkStackCallback aCallback, uint32_t aSkipFrames,
|
2017-07-27 05:46:47 +03:00
|
|
|
uint32_t aMaxFrames, void* aClosure) {
|
2012-02-04 00:13:24 +04:00
|
|
|
// Get the frame pointer
|
2015-12-22 12:24:33 +03:00
|
|
|
void** bp = (void**)__builtin_frame_address(0);
|
2012-02-15 09:17:34 +04:00
|
|
|
|
2014-05-13 21:41:38 +04:00
|
|
|
void* stackEnd;
|
2012-02-15 09:17:34 +04:00
|
|
|
# if HAVE___LIBC_STACK_END
|
|
|
|
stackEnd = __libc_stack_end;
|
2015-12-22 11:19:37 +03:00
|
|
|
# elif defined(XP_DARWIN)
|
|
|
|
stackEnd = pthread_get_stackaddr_np(pthread_self());
|
|
|
|
# elif defined(ANDROID)
|
|
|
|
pthread_attr_t sattr;
|
|
|
|
pthread_attr_init(&sattr);
|
|
|
|
pthread_getattr_np(pthread_self(), &sattr);
|
|
|
|
void* stackBase = stackEnd = nullptr;
|
|
|
|
size_t stackSize = 0;
|
|
|
|
if (gettid() != getpid()) {
|
|
|
|
// bionic's pthread_attr_getstack doesn't tell the truth for the main
|
|
|
|
// thread (see bug 846670). So don't use it for the main thread.
|
|
|
|
if (!pthread_attr_getstack(&sattr, &stackBase, &stackSize)) {
|
|
|
|
stackEnd = static_cast<char*>(stackBase) + stackSize;
|
|
|
|
} else {
|
|
|
|
stackEnd = nullptr;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!stackEnd) {
|
|
|
|
// So consider the current frame pointer + an arbitrary size of 8MB
|
|
|
|
// (modulo overflow ; not really arbitrary as it's the default stack
|
|
|
|
// size for the main thread) if pthread_attr_getstack failed for
|
|
|
|
// some reason (or was skipped).
|
|
|
|
static const uintptr_t kMaxStackSize = 8 * 1024 * 1024;
|
|
|
|
uintptr_t maxStackStart = uintptr_t(-1) - kMaxStackSize;
|
|
|
|
uintptr_t stackStart = std::max(maxStackStart, uintptr_t(bp));
|
|
|
|
stackEnd = reinterpret_cast<void*>(stackStart + kMaxStackSize);
|
|
|
|
}
|
2012-02-15 09:17:34 +04:00
|
|
|
# else
|
2015-12-22 11:19:37 +03:00
|
|
|
# error Unsupported configuration
|
2012-02-15 09:17:34 +04:00
|
|
|
# endif
|
2017-07-27 09:46:55 +03:00
|
|
|
FramePointerStackWalk(aCallback, aSkipFrames, aMaxFrames, aClosure, bp,
|
|
|
|
stackEnd);
|
2012-02-04 00:13:24 +04:00
|
|
|
}
|
|
|
|
|
2007-11-12 07:45:40 +03:00
|
|
|
# elif defined(HAVE__UNWIND_BACKTRACE)
|
|
|
|
|
|
|
|
// libgcc_s.so symbols _Unwind_Backtrace@@GCC_3.3 and _Unwind_GetIP@@GCC_3.0
|
|
|
|
# include <unwind.h>
|
|
|
|
|
2014-05-13 21:41:38 +04:00
|
|
|
struct unwind_info {
|
2015-06-10 23:32:45 +03:00
|
|
|
MozWalkStackCallback callback;
|
2014-05-05 21:30:39 +04:00
|
|
|
int skip;
|
|
|
|
int maxFrames;
|
|
|
|
int numFrames;
|
2014-05-13 21:41:38 +04:00
|
|
|
void* closure;
|
2007-11-12 07:45:40 +03:00
|
|
|
};
|
|
|
|
|
2014-05-13 21:41:38 +04:00
|
|
|
static _Unwind_Reason_Code unwind_callback(struct _Unwind_Context* context,
|
|
|
|
void* closure) {
|
|
|
|
unwind_info* info = static_cast<unwind_info*>(closure);
|
|
|
|
void* pc = reinterpret_cast<void*>(_Unwind_GetIP(context));
|
2014-05-05 21:30:39 +04:00
|
|
|
// TODO Use something like '_Unwind_GetGR()' to get the stack pointer.
|
|
|
|
if (--info->skip < 0) {
|
|
|
|
info->numFrames++;
|
2014-09-11 08:47:01 +04:00
|
|
|
(*info->callback)(info->numFrames, pc, nullptr, info->closure);
|
2014-05-05 21:30:39 +04:00
|
|
|
if (info->maxFrames != 0 && info->numFrames == info->maxFrames) {
|
|
|
|
// Again, any error code that stops the walk will do.
|
|
|
|
return _URC_FOREIGN_EXCEPTION_CAUGHT;
|
2012-12-21 09:31:57 +04:00
|
|
|
}
|
2014-05-05 21:30:39 +04:00
|
|
|
}
|
|
|
|
return _URC_NO_REASON;
|
2007-11-12 07:45:40 +03:00
|
|
|
}
|
|
|
|
|
2015-06-10 23:32:45 +03:00
|
|
|
MFBT_API void MozStackWalk(MozWalkStackCallback aCallback, uint32_t aSkipFrames,
|
2017-07-27 05:46:47 +03:00
|
|
|
uint32_t aMaxFrames, void* aClosure) {
|
2014-05-05 21:30:39 +04:00
|
|
|
unwind_info info;
|
|
|
|
info.callback = aCallback;
|
|
|
|
info.skip = aSkipFrames + 1;
|
|
|
|
info.maxFrames = aMaxFrames;
|
|
|
|
info.numFrames = 0;
|
|
|
|
info.closure = aClosure;
|
|
|
|
|
2017-07-27 09:46:55 +03:00
|
|
|
// We ignore the return value from _Unwind_Backtrace. There are three main
|
|
|
|
// reasons for this.
|
2014-05-05 21:30:39 +04:00
|
|
|
// - On ARM/Android bionic's _Unwind_Backtrace usually (always?) returns
|
|
|
|
// _URC_FAILURE. See
|
|
|
|
// https://bugzilla.mozilla.org/show_bug.cgi?id=717853#c110.
|
|
|
|
// - If aMaxFrames != 0, we want to stop early, and the only way to do that
|
|
|
|
// is to make unwind_callback return something other than _URC_NO_REASON,
|
|
|
|
// which causes _Unwind_Backtrace to return a non-success code.
|
2017-07-27 09:46:55 +03:00
|
|
|
// - MozStackWalk doesn't have a return value anyway.
|
|
|
|
(void)_Unwind_Backtrace(unwind_callback, &info);
|
2007-11-12 07:45:40 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
# endif
|
|
|
|
|
2015-06-10 23:32:45 +03:00
|
|
|
bool MFBT_API MozDescribeCodeAddress(void* aPC,
|
|
|
|
MozCodeAddressDetails* aDetails) {
|
2007-11-12 07:45:40 +03:00
|
|
|
aDetails->library[0] = '\0';
|
|
|
|
aDetails->loffset = 0;
|
|
|
|
aDetails->filename[0] = '\0';
|
|
|
|
aDetails->lineno = 0;
|
|
|
|
aDetails->function[0] = '\0';
|
|
|
|
aDetails->foffset = 0;
|
|
|
|
|
|
|
|
Dl_info info;
|
|
|
|
int ok = dladdr(aPC, &info);
|
|
|
|
if (!ok) {
|
2015-06-10 23:32:45 +03:00
|
|
|
return true;
|
2007-11-12 07:45:40 +03:00
|
|
|
}
|
|
|
|
|
2015-06-10 23:32:45 +03:00
|
|
|
strncpy(aDetails->library, info.dli_fname, sizeof(aDetails->library));
|
2015-07-02 23:30:58 +03:00
|
|
|
aDetails->library[mozilla::ArrayLength(aDetails->library) - 1] = '\0';
|
2007-11-12 07:45:40 +03:00
|
|
|
aDetails->loffset = (char*)aPC - (char*)info.dli_fbase;
|
|
|
|
|
2014-05-13 21:41:38 +04:00
|
|
|
const char* symbol = info.dli_sname;
|
2014-04-15 00:25:04 +04:00
|
|
|
if (!symbol || symbol[0] == '\0') {
|
2015-06-10 23:32:45 +03:00
|
|
|
return true;
|
2007-11-12 07:45:40 +03:00
|
|
|
}
|
|
|
|
|
2014-04-15 00:25:04 +04:00
|
|
|
DemangleSymbol(symbol, aDetails->function, sizeof(aDetails->function));
|
2007-11-12 07:45:40 +03:00
|
|
|
|
2014-04-15 00:25:04 +04:00
|
|
|
if (aDetails->function[0] == '\0') {
|
|
|
|
// Just use the mangled symbol if demangling failed.
|
2015-06-10 23:32:45 +03:00
|
|
|
strncpy(aDetails->function, symbol, sizeof(aDetails->function));
|
2015-07-02 23:30:58 +03:00
|
|
|
aDetails->function[mozilla::ArrayLength(aDetails->function) - 1] = '\0';
|
2007-11-12 07:45:40 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
aDetails->foffset = (char*)aPC - (char*)info.dli_saddr;
|
2015-06-10 23:32:45 +03:00
|
|
|
return true;
|
2007-11-12 07:45:40 +03:00
|
|
|
}
|
|
|
|
|
2007-08-11 01:28:22 +04:00
|
|
|
#else // unsupported platform.
|
|
|
|
|
2015-06-10 23:32:45 +03:00
|
|
|
MFBT_API void MozStackWalk(MozWalkStackCallback aCallback, uint32_t aSkipFrames,
|
2017-07-27 05:46:47 +03:00
|
|
|
uint32_t aMaxFrames, void* aClosure) {}
|
2007-08-11 01:28:22 +04:00
|
|
|
|
2015-06-10 23:32:45 +03:00
|
|
|
MFBT_API bool MozDescribeCodeAddress(void* aPC,
|
|
|
|
MozCodeAddressDetails* aDetails) {
|
2014-05-05 21:30:39 +04:00
|
|
|
aDetails->library[0] = '\0';
|
|
|
|
aDetails->loffset = 0;
|
|
|
|
aDetails->filename[0] = '\0';
|
|
|
|
aDetails->lineno = 0;
|
|
|
|
aDetails->function[0] = '\0';
|
|
|
|
aDetails->foffset = 0;
|
2015-06-10 23:32:45 +03:00
|
|
|
return false;
|
2007-08-11 01:29:37 +04:00
|
|
|
}
|
|
|
|
|
2014-09-02 09:56:05 +04:00
|
|
|
#endif
|
|
|
|
|
2014-03-29 00:31:15 +04:00
|
|
|
#if defined(XP_WIN) || defined(XP_MACOSX) || defined(XP_LINUX)
|
|
|
|
namespace mozilla {
|
2019-02-20 08:01:12 +03:00
|
|
|
MOZ_ASAN_BLACKLIST
|
2014-03-29 00:31:15 +04:00
|
|
|
void FramePointerStackWalk(MozWalkStackCallback aCallback, uint32_t aSkipFrames,
|
2017-07-27 09:46:33 +03:00
|
|
|
uint32_t aMaxFrames, void* aClosure, void** aBp,
|
2014-03-29 00:31:15 +04:00
|
|
|
void* aStackEnd) {
|
|
|
|
// Stack walking code courtesy Kipp's "leaky".
|
|
|
|
|
|
|
|
int32_t skip = aSkipFrames;
|
|
|
|
uint32_t numFrames = 0;
|
2017-07-27 09:46:33 +03:00
|
|
|
while (aBp) {
|
|
|
|
void** next = (void**)*aBp;
|
|
|
|
// aBp may not be a frame pointer on i386 if code was compiled with
|
2014-03-29 00:31:15 +04:00
|
|
|
// -fomit-frame-pointer, so do some sanity checks.
|
2017-07-27 09:46:33 +03:00
|
|
|
// (aBp should be a frame pointer on ppc(64) but checking anyway may help
|
2014-03-29 00:31:15 +04:00
|
|
|
// a little if the stack has been corrupted.)
|
|
|
|
// We don't need to check against the begining of the stack because
|
2017-07-27 09:46:33 +03:00
|
|
|
// we can assume that aBp > sp
|
2019-02-08 23:22:21 +03:00
|
|
|
if (next <= aBp || next >= aStackEnd || (uintptr_t(next) & 3)) {
|
2014-03-29 00:31:15 +04:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
# if (defined(__ppc__) && defined(XP_MACOSX)) || defined(__powerpc64__)
|
|
|
|
// ppc mac or powerpc64 linux
|
2017-07-27 09:46:33 +03:00
|
|
|
void* pc = *(aBp + 2);
|
|
|
|
aBp += 3;
|
2014-03-29 00:31:15 +04:00
|
|
|
# else // i386 or powerpc32 linux
|
2017-07-27 09:46:33 +03:00
|
|
|
void* pc = *(aBp + 1);
|
|
|
|
aBp += 2;
|
2014-03-29 00:31:15 +04:00
|
|
|
# endif
|
|
|
|
if (--skip < 0) {
|
|
|
|
// Assume that the SP points to the BP of the function
|
|
|
|
// it called. We can't know the exact location of the SP
|
|
|
|
// but this should be sufficient for our use the SP
|
|
|
|
// to order elements on the stack.
|
|
|
|
numFrames++;
|
2017-07-27 09:46:33 +03:00
|
|
|
(*aCallback)(numFrames, pc, aBp, aClosure);
|
2014-03-29 00:31:15 +04:00
|
|
|
if (aMaxFrames != 0 && numFrames == aMaxFrames) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2017-07-27 09:46:33 +03:00
|
|
|
aBp = next;
|
2014-03-29 00:31:15 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
} // namespace mozilla
|
|
|
|
|
|
|
|
#else
|
|
|
|
|
|
|
|
namespace mozilla {
|
|
|
|
MFBT_API void FramePointerStackWalk(MozWalkStackCallback aCallback,
|
|
|
|
uint32_t aSkipFrames, uint32_t aMaxFrames,
|
2017-07-27 09:46:33 +03:00
|
|
|
void* aClosure, void** aBp,
|
|
|
|
void* aStackEnd) {}
|
2014-03-29 00:31:15 +04:00
|
|
|
} // namespace mozilla
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
2015-06-10 23:32:45 +03:00
|
|
|
MFBT_API void MozFormatCodeAddressDetails(
|
|
|
|
char* aBuffer, uint32_t aBufferSize, uint32_t aFrameNumber, void* aPC,
|
|
|
|
const MozCodeAddressDetails* aDetails) {
|
|
|
|
MozFormatCodeAddress(aBuffer, aBufferSize, aFrameNumber, aPC,
|
2014-09-02 09:56:05 +04:00
|
|
|
aDetails->function, aDetails->library, aDetails->loffset,
|
|
|
|
aDetails->filename, aDetails->lineno);
|
|
|
|
}
|
|
|
|
|
2015-06-10 23:32:45 +03:00
|
|
|
MFBT_API void MozFormatCodeAddress(char* aBuffer, uint32_t aBufferSize,
|
|
|
|
uint32_t aFrameNumber, const void* aPC,
|
2014-09-02 09:56:05 +04:00
|
|
|
const char* aFunction, const char* aLibrary,
|
|
|
|
ptrdiff_t aLOffset, const char* aFileName,
|
|
|
|
uint32_t aLineNo) {
|
|
|
|
const char* function = aFunction && aFunction[0] ? aFunction : "???";
|
|
|
|
if (aFileName && aFileName[0]) {
|
|
|
|
// We have a filename and (presumably) a line number. Use them.
|
|
|
|
snprintf(aBuffer, aBufferSize, "#%02u: %s (%s:%u)", aFrameNumber, function,
|
|
|
|
aFileName, aLineNo);
|
|
|
|
} else if (aLibrary && aLibrary[0]) {
|
|
|
|
// We have no filename, but we do have a library name. Use it and the
|
|
|
|
// library offset, and print them in a way that scripts like
|
|
|
|
// fix_{linux,macosx}_stacks.py can easily post-process.
|
|
|
|
snprintf(aBuffer, aBufferSize, "#%02u: %s[%s +0x%" PRIxPTR "]",
|
2015-01-26 00:49:06 +03:00
|
|
|
aFrameNumber, function, aLibrary,
|
|
|
|
static_cast<uintptr_t>(aLOffset));
|
2014-09-02 09:56:05 +04:00
|
|
|
} else {
|
|
|
|
// We have nothing useful to go on. (The format string is split because
|
|
|
|
// '??)' is a trigraph and causes a warning, sigh.)
|
|
|
|
snprintf(aBuffer, aBufferSize,
|
|
|
|
"#%02u: ??? (???:???"
|
|
|
|
")",
|
|
|
|
aFrameNumber);
|
|
|
|
}
|
2007-08-11 01:29:37 +04:00
|
|
|
}
|