0ad/source/lib/sysdep/win/wdbg.cpp

2129 lines
57 KiB
C++
Executable File

// stack trace, improved assert and exception handler for Win32
// Copyright (c) 2002-2005 Jan Wassenberg
//
// This program is free software; you can redistribute it and/or
// modify it under the terms of the GNU General Public License as
// published by the Free Software Foundation; either version 2 of the
// License, or (at your option) any later version.
//
// This program is distributed in the hope that it will be useful, but
// WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
// General Public License for more details.
//
// Contact info:
// Jan.Wassenberg@stud.uni-karlsruhe.de
// http://www.stud.uni-karlsruhe.de/~urkt/
#include "precompiled.h"
#include <stdlib.h>
#include <stdio.h>
#include "lib.h"
#include "win_internal.h"
#define _NO_CVCONST_H // request SymTagEnum be defined
#include "dbghelp.h"
#include <OAIdl.h> // VARIANT
#include "posix.h"
// optional: enables translation of the "unhandled exception" dialog.
#ifdef I18N
#include "ps/i18n.h"
#endif
#include "wdbg.h"
#include "assert_dlg.h"
#ifdef _MSC_VER
#pragma comment(lib, "dbghelp.lib")
#pragma comment(lib, "oleaut32.lib") // VariantChangeType
#endif
// automatic module init (before main) and shutdown (before termination)
#pragma data_seg(".LIB$WCC")
WIN_REGISTER_FUNC(wdbg_init);
#pragma data_seg(".LIB$WTB")
WIN_REGISTER_FUNC(wdbg_shutdown);
#pragma data_seg()
// debug_warn usually uses assert2, but we don't want to call that from
// inside an assert2 (from inside another assert2 (from inside another assert2
// (... etc))), so just use the normal assert
#undef debug_warn
#define debug_warn(str) assert(0 && (str))
// protects dbghelp (which isn't thread-safe) and
// parameter passing to the breakpoint helper thread.
static void lock()
{
win_lock(WDBG_CS);
}
static void unlock()
{
win_unlock(WDBG_CS);
}
//////////////////////////////////////////////////////////////////////////////
// need to shoehorn printf-style variable params into
// the OutputDebugString call.
// - don't want to split into multiple calls - would add newlines to output.
// - fixing Win32 _vsnprintf to return # characters that would be written,
// as required by C99, looks difficult and unnecessary. if any other code
// needs that, implement GNU vasprintf.
// - fixed size buffers aren't nice, but much simpler than vasprintf-style
// allocate+expand_until_it_fits. these calls are for quick debug output,
// not loads of data, anyway.
// max # characters (including \0) output by debug_(w)printf in one call.
static const int MAX_CNT = 512;
void debug_printf(const char* fmt, ...)
{
char buf[MAX_CNT];
buf[MAX_CNT-1] = '\0';
va_list ap;
va_start(ap, fmt);
vsnprintf(buf, MAX_CNT-1, fmt, ap);
va_end(ap);
OutputDebugString(buf);
}
void debug_wprintf(const wchar_t* fmt, ...)
{
wchar_t buf[MAX_CNT];
buf[MAX_CNT-1] = L'\0';
va_list ap;
va_start(ap, fmt);
vsnwprintf(buf, MAX_CNT-1, fmt, ap);
va_end(ap);
OutputDebugStringW(buf);
}
void debug_check_heap()
{
__try
{
_heapchk();
}
__except(EXCEPTION_EXECUTE_HANDLER)
{
}
}
//////////////////////////////////////////////////////////////////////////////
//
// dbghelp symbol engine
//
//////////////////////////////////////////////////////////////////////////////
// passed to all dbghelp symbol query functions. we're not interested in
// resolving symbols in other processes; the purpose here is only to
// generate a stack trace. if that changes, we need to init a local copy
// of these in dump_sym_cb and pass them to all subsequent dump_*.
static HANDLE hProcess;
static ULONG64 mod_base;
// for StackWalk64; taken from PE header by wdbg_init
static WORD machine;
static int sym_init()
{
hProcess = GetCurrentProcess();
SymSetOptions(SYMOPT_DEFERRED_LOADS);
BOOL ok = SymInitialize(hProcess, 0, TRUE);
if(!ok)
display_msg("wdbg_init", "SymInitialize failed");
mod_base = SymGetModuleBase64(hProcess, (u64)&wdbg_init);
IMAGE_NT_HEADERS* header = ImageNtHeader((void*)mod_base);
machine = header->FileHeader.Machine;
return 0;
}
static int sym_shutdown()
{
SymCleanup(hProcess);
return 0;
}
// ~500�s
int debug_resolve_symbol(void* ptr_of_interest, char* sym_name, char* file, int* line)
{
const DWORD64 addr = (DWORD64)ptr_of_interest;
int successes = 0;
lock();
// get symbol name
if(sym_name)
{
sym_name[0] = '\0';
SYMBOL_INFO_PACKAGE sp;
SYMBOL_INFO* sym = &sp.si;
sym->SizeOfStruct = sizeof(sp.si);
sym->MaxNameLen = MAX_SYM_NAME;
if(SymFromAddr(hProcess, addr, 0, sym))
{
snprintf(sym_name, DBG_SYMBOL_LEN, "%s", sym->Name);
successes++;
}
}
// get source file + line number
if(file || line)
{
IMAGEHLP_LINE64 line_info = { sizeof(IMAGEHLP_LINE64) };
DWORD displacement; // unused but required by SymGetLineFromAddr64!
if(SymGetLineFromAddr64(hProcess, addr, &displacement, &line_info))
successes++;
// note: were left zeroed if SymGetLineFromAddr64 failed
if(file)
snprintf(file, DBG_FILE_LEN, "%s", line_info.FileName);
if(line)
*line = line_info.LineNumber;
}
unlock();
return (successes == 0)? -1 : 0;
}
//////////////////////////////////////////////////////////////////////////////
// to avoid deadlock, be VERY CAREFUL to avoid anything that may block,
// including locks taken by the OS (e.g. malloc, GetProcAddress).
typedef int(*WhileSuspendedFunc)(HANDLE hThread, void* user_arg);
struct WhileSuspendedParam
{
HANDLE hThread;
WhileSuspendedFunc func;
void* user_arg;
};
static void* while_suspended_thread_func(void* user_arg)
{
DWORD err;
WhileSuspendedParam* param = (WhileSuspendedParam*)user_arg;
err = SuspendThread(param->hThread);
// abort, since GetThreadContext only works if the target is suspended.
if(err == (DWORD)-1)
{
debug_warn("while_suspended_thread_func: SuspendThread failed");
goto fail;
}
// target is now guaranteed to be suspended,
// since the Windows counter never goes negative.
int ret = param->func(param->hThread, param->user_arg);
err = ResumeThread(param->hThread);
assert(err != 0);
return (void*)(intptr_t)ret;
fail:
return (void*)(intptr_t)-1;
}
static int call_while_suspended(WhileSuspendedFunc func, void* user_arg)
{
int err;
// we need a real HANDLE to the target thread for use with
// Suspend|ResumeThread and GetThreadContext.
// alternative: DuplicateHandle on the current thread pseudo-HANDLE.
// this way is a bit more obvious/simple.
const DWORD access = THREAD_GET_CONTEXT|THREAD_SET_CONTEXT|THREAD_SUSPEND_RESUME;
HANDLE hThread = OpenThread(access, FALSE, GetCurrentThreadId());
if(hThread == INVALID_HANDLE_VALUE)
{
debug_warn("OpenThread failed");
return -1;
}
WhileSuspendedParam param = { hThread, func, user_arg };
pthread_t thread;
err = pthread_create(&thread, 0, while_suspended_thread_func, &param);
assert2(err == 0);
void* ret;
err = pthread_join(thread, &ret);
assert2(err == 0 && ret == 0);
return (int)(intptr_t)ret;
}
//////////////////////////////////////////////////////////////////////////////
//
// breakpoints
//
//////////////////////////////////////////////////////////////////////////////
// breakpoints are set by storing the address of interest in a
// debug register and marking it 'enabled'.
//
// the first problem is, they are only accessible from Ring0;
// we get around this by updating their values via SetThreadContext.
// that in turn requires we suspend the current thread,
// spawn a helper to change the registers, and resume.
// parameter passing to helper thread. currently static storage,
// but the struct simplifies switching to a queue later.
static struct BreakInfo
{
uintptr_t addr;
DbgBreakType type;
// determines what brk_thread_func will do.
// set/reset by debug_remove_all_breaks.
bool want_all_disabled;
}
brk_info;
// Local Enable bits of all registers we enabled (used when restoring all).
static DWORD brk_all_local_enables;
static const uint MAX_BREAKPOINTS = 4;
// IA-32 limit; if this changes, make sure brk_enable still works!
// (we assume CONTEXT has contiguous Dr0..Dr3 register fields)
// remove all breakpoints enabled by debug_set_break from <context>.
// called while target is suspended.
static int brk_disable_all_in_ctx(BreakInfo* bi, CONTEXT* context)
{
context->Dr7 &= ~brk_all_local_enables;
return 0;
}
// find a free register, set type according to <bi> and
// mark it as enabled in <context>.
// called while target is suspended.
static int brk_enable_in_ctx(BreakInfo* bi, CONTEXT* context)
{
int reg; // index (0..3) of first free reg
uint LE; // local enable bit for <reg>
// find free debug register.
for(reg = 0; reg < MAX_BREAKPOINTS; reg++)
{
LE = BIT(reg*2);
// .. this one is currently not in use.
if((context->Dr7 & LE) == 0)
goto have_reg;
}
debug_warn("brk_enable_in_ctx: no register available");
return ERR_LIMIT;
have_reg:
// set value and mark as enabled.
(&context->Dr0)[reg] = (DWORD)bi->addr; // see MAX_BREAKPOINTS
context->Dr7 |= LE;
brk_all_local_enables |= LE;
// build Debug Control Register value.
// .. type
uint rw = 0;
switch(bi->type)
{
case DBG_BREAK_CODE:
rw = 0; break;
case DBG_BREAK_DATA:
rw = 1; break;
case DBG_BREAK_DATA_WRITE:
rw = 3; break;
default:
debug_warn("brk_enable_in_ctx: invalid type");
}
// .. length (determined from addr's alignment).
// note: IA-32 requires len=0 for code breakpoints.
uint len = 0;
if(bi->type != DBG_BREAK_CODE)
{
const uint alignment = (uint)(bi->addr % 4);
// assume 2 byte range
if(alignment == 2)
len = 1;
// assume 4 byte range
else if(alignment == 0)
len = 3;
// else: 1 byte range; len already set to 0
}
const uint shift = (16 + reg*4);
const uint field = (len << 2) | rw;
// clear previous contents of this reg's field
// (in case the previous user didn't do so on disabling).
const uint mask = 0xFu << shift;
context->Dr7 &= ~mask;
context->Dr7 |= field << shift;
return 0;
}
// carry out the request stored in the BreakInfo* parameter.
// called while target is suspended.
static int brk_do_request(HANDLE hThread, void* arg)
{
int ret;
BreakInfo* bi = (BreakInfo*)arg;
CONTEXT context;
context.ContextFlags = CONTEXT_DEBUG_REGISTERS;
if(!GetThreadContext(hThread, &context))
{
debug_warn("brk_do_request: GetThreadContext failed");
goto fail;
}
#if defined(_M_IX86)
if(bi->want_all_disabled)
ret = brk_disable_all_in_ctx(bi, &context);
else
ret = brk_enable_in_ctx (bi, &context);
if(!SetThreadContext(hThread, &context))
{
debug_warn("brk_do_request: SetThreadContext failed");
goto fail;
}
#else
#error "port"
#endif
return 0;
fail:
return -1;
}
// arrange for a debug exception to be raised when <addr> is accessed
// according to <type>.
// for simplicity, the length (range of bytes to be checked) is
// derived from addr's alignment, and is typically 1 machine word.
// breakpoints are a limited resource (4 on IA-32); abort and
// return ERR_LIMIT if none are available.
int debug_set_break(void* p, DbgBreakType type)
{
lock();
brk_info.addr = (uintptr_t)p;
brk_info.type = type;
int ret = call_while_suspended(brk_do_request, &brk_info);
unlock();
return ret;
}
// remove all breakpoints that were set by debug_set_break.
// important, since these are a limited resource.
int debug_remove_all_breaks()
{
lock();
brk_info.want_all_disabled = true;
int ret = call_while_suspended(brk_do_request, &brk_info);
brk_info.want_all_disabled = false;
unlock();
return ret;
}
//////////////////////////////////////////////////////////////////////////////
//
// stack walk via dbghelp
//
//////////////////////////////////////////////////////////////////////////////
/*
call win32 context retrieval mechanisms return context deeper than what we want
tracing up to their caller (i.e. walk_stack) is a circular problem.
besides, CONTEXT is nonportable - we'd still have to copy out its fields
// called from an SEH filter expression
static LONG WINAPI latch_context(EXCEPTION_POINTERS* ep, CONTEXT* dest_context)
{
memcpy(dest_context, ep->ContextRecord, sizeof(CONTEXT));
return EXCEPTION_CONTINUE_EXECUTION;
}
static int store_current_context(HANDLE hThread, void* user_arg)
{
CONTEXT* pcontext = (CONTEXT*)user_arg;
memset(pcontext, 0, sizeof(CONTEXT));
pcontext->ContextFlags = CONTEXT_ALL;
BOOL ok = GetThreadContext(hThread, pcontext);
assert(ok);
return 0;
}
if(!pcontext)
{
#if 0
call_while_suspended(store_current_context, &context);
#elif 0
EXCEPTION_POINTERS* ep;
__try
{
RaiseException(0x10000, 0, 0,0);
}
__except(memcpy(&context, GetExceptionInformation()->ContextRecord, sizeof(CONTEXT)), EXCEPTION_CONTINUE_EXECUTION)
{
assert(0); // never reached
}
#elif 0
context.ContextFlags = CONTEXT_CONTROL;
GetThreadContext(hThread, &context);
#endif
pcontext = &context;
}
/**/
/*
the intrinsics only give us EIP reliably. AoRA - 4 is a hack
#ifdef __cplusplus
#define EXTERNC extern "C"
#else
#define EXTERNC
#endif
// _ReturnAddress and _AddressOfReturnAddress should be prototyped before use
EXTERNC void * _AddressOfReturnAddress(void);
EXTERNC void * _ReturnAddress(void);
#pragma intrinsic(_AddressOfReturnAddress)
#pragma intrinsic(_ReturnAddress)
pc = (DWORD64)_ReturnAddress();
fp = (DWORD64)_AddressOfReturnAddress()-sizeof(void*);
*/
// _ReturnAddress and _AddressOfReturnAddress should be prototyped before use
EXTERN_C void* _ReturnAddress(void);
#pragma intrinsic(_ReturnAddress)
// rationale: we don't want this to clutter up walk_stack, but it must not
// be a regular function call (because that would add a stack frame.
// could work around this by incrementing <skip>, but that increases
// coupling and breaks if the function is inlined); __forceinline
// isn't inlined in debug builds (go figure), macros require ugly multiline breaks, so go with __forceinline.
// macros don't accept multiline asm
#if defined(_M_AMD64)
# define PC_ Rip
# define FP_ Rbp
# define SP_ Rsp
# define GET_FP __asm mov [fp], rbp
# define GET_SP __asm mov [sp], rsp
#elif defined(_M_IX86)
# define PC_ Eip
# define FP_ Ebp
# define SP_ Esp
# define GET_FP\
__asm mov dword ptr [fp], ebp\
__asm xor eax, eax\
__asm mov dword ptr [fp+4], eax
# define GET_SP\
__asm mov dword ptr [sp], esp\
__asm xor eax, eax\
__asm mov dword ptr [sp+4], eax
#else
# error "port"
#endif
// we need to set STACKFRAME64.AddrPC and AddrFrame for the initial
// StackWalk call in our loop. if the caller passed in a thread context
// (e.g. if calling from an exception handler), we use that; otherwise,
// determine the current PC / frame pointer ourselves.
// GetThreadContext is documented not to work if the current thread
// is running, but that seems to be widespread practice. regardless, we
// avoid using it, since simple asm code is safer. deliberately raising
// an exception to retrieve the CONTEXT is too slow (due to jump to
// ring0), since this is called from mmgr for each allocation.
__declspec(noinline) static void init_STACKFRAME64(STACKFRAME64* sf, const CONTEXT* pcontext, DWORD64 fp, DWORD64 sp)
{
memset(sf, 0, sizeof(STACKFRAME64));
DWORD64 pc;
if(!pcontext)
{
pc = (DWORD64)_ReturnAddress();
// note: fp and sp already given as parameter
}
else
{
pc = pcontext->PC_;
fp = pcontext->FP_;
sp = pcontext->SP_;
}
/*
char buf[100];
sprintf(buf, "pc=%I64p, fp=%I64p, sp=%I64p", pc, fp, sp);
display_msg("init stackframe", buf);
*/
sf->AddrPC.Offset = pc;
sf->AddrPC.Mode = AddrModeFlat;
sf->AddrFrame.Offset = fp;
sf->AddrFrame.Mode = AddrModeFlat;
sf->AddrStack.Offset = sp;
sf->AddrStack.Mode = AddrModeFlat;
}
// called for each stack frame found by walk_stack, passing information
// about the frame and <user_arg>.
// return <= 0 to stop immediately and have walk_stack return that;
// otherwise, > 0 to continue.
//
// rationale: we can't just pass function's address to the callback -
// dump_frame_cb needs the frame pointer for reg-relative variables.
typedef int (*StackFrameCallback)(const STACKFRAME64*, void*);
// iterate over a call stack, calling back for each frame encountered.
// if <pcontext> != 0, we start there; otherwise, at the current context.
// return -1 if callback never succeeded (returned 0).
static int walk_stack(StackFrameCallback cb, void* user_arg = 0, uint skip = 0, const CONTEXT* pcontext = 0)
{
const HANDLE hThread = GetCurrentThread();
// rationale: see above.
STACKFRAME64 sf;
DWORD64 fp, sp; GET_FP; GET_SP;
init_STACKFRAME64(&sf, pcontext, fp, sp);
// if we don't get a CONTEXT, we retrieve PC and FP for this frame;
// prevent it from being displayed.
if(!pcontext)
skip++;
/*
CONTEXT context;
EXCEPTION_POINTERS* ep;
__try
{
RaiseException(0x10000, 0, 0,0);
}
__except(ep = GetExceptionInformation(), memcpy(&context, ep->ContextRecord, sizeof(CONTEXT)), EXCEPTION_CONTINUE_EXECUTION)
{
assert(0); // never reached
}
pcontext = &context;
*/
// StackWalk64 may write to pcontext, but there's no mention of
// EXCEPTION_POINTERS.ContextRecord being read-only, so don't copy it.
// for each stack frame found:
for(;;)
{
lock();
BOOL ok = StackWalk64(machine, hProcess, hThread, &sf, (void*)pcontext, 0, SymFunctionTableAccess64, SymGetModuleBase64, 0);
unlock();
/*
char buf[100];
sprintf(buf, "pc=%I64p, ret=%I64p, fp=%I64p, sp=%I64p", sf.AddrPC.Offset, sf.AddrReturn.Offset, sf.AddrFrame.Offset, sf.AddrStack.Offset);
display_msg("after StackWalk", buf);
*/
// callback never indicated success and no (more) frames found: abort.
// note: also test FP because StackWalk64 sometimes erroneously
// reports success. unfortunately it doesn't SetLastError either,
// so we can't indicate the cause of fialure *sigh*.
if(!ok || !sf.AddrFrame.Offset)
return -911; // distinctive error value
if(skip)
{
skip--;
continue;
}
int ret = cb(&sf, user_arg);
// callback reports it's done; stop calling it and return that value.
// (can be 0 for success, or a negative error code)
if(ret <= 0)
return ret;
}
}
//
// get address of Nth function above us on the call stack (uses walk_stack)
//
// called by walk_stack for each stack frame
static int nth_caller_cb(const STACKFRAME64* sf, void* user_arg)
{
void** pfunc = (void**)user_arg;
// return its address
*pfunc = (void*)sf->AddrPC.Offset;
return 0;
}
// n starts at 1
void* debug_get_nth_caller(uint n)
{
void* func; // set by callback
const uint skip = n-1 + 3;
// make 0-based; skip walk_stack, debug_get_nth_caller and its caller.
if(walk_stack(nth_caller_cb, &func, skip) == 0)
return func;
return 0;
}
//////////////////////////////////////////////////////////////////////////////
//
// helper routines for symbol value dump
//
//////////////////////////////////////////////////////////////////////////////
// overflow is impossible in practice. keep in sync with DumpState.
static const uint MAX_INDIRECTION = 256;
static const uint MAX_LEVEL = 256;
struct DumpState
{
// keep in sync with MAX_* above
uint level : 8;
uint indirection : 8;
DumpState()
{
level = 0;
indirection = 0;
}
};
static const size_t DUMP_BUF_SIZE = 64*KiB;
static wchar_t dump_buf[DUMP_BUF_SIZE];
static wchar_t* dump_buf_pos;
static void out(const wchar_t* fmt, ...)
{
// Don't overflow the buffer (and abort if we're about to)
if (dump_buf_pos-dump_buf+1000 > DUMP_BUF_SIZE)
{
debug_warn("out: buffer about to overflow");
return;
};
va_list args;
va_start(args, fmt);
dump_buf_pos += vswprintf(dump_buf_pos, 1000, fmt, args);
va_end(args);
}
static void out_erase(size_t num_chars)
{
dump_buf_pos -= num_chars;
assert2(dump_buf_pos >= dump_buf); // check for underrun
*dump_buf_pos = '\0';
// make sure it's 0-terminated in case there is no further output.
}
static void out_reset()
{
dump_buf_pos = dump_buf;
}
#define INDENT STMT(for(uint i = 0; i <= state.level+1; i++) out(L" ");)
// does it look like an ASCII string is located at <addr>?
// set <stride> to 2 to search for WCS-2 strings (of western characters!).
// called by dump_array for its string special-case.
//
// algorithm: scan the "string" and count # text chars vs. garbage.
static bool is_string_array(const u8* p, size_t num_elements, size_t stride)
{
int score = 0;
for(size_t i = 0; i < num_elements; i++)
{
// current character is:
const int c = *p & 0xff; // prevent sign extension
// .. text
if(isalnum(c))
score += 2;
// .. end of string
else if(!c)
break;
// .. garbage
else if(!isprint(c))
score -= 5;
// too much garbage found, probably not a string => abort.
// we don't want to unnecessarily scan huge binary arrays (slow).
if(score <= -10)
break;
p += stride;
}
return (score > 0);
}
static bool is_bogus_pointer(const void* p)
{
#ifdef _M_IX86
if(p < (void*)0x1000)
return true;
if(p > (void*)(uintptr_t)0xc0000000)
return true;
#endif
return IsBadReadPtr(p, 1) != 0;
}
//////////////////////////////////////////////////////////////////////////////
//
// output values of specific types of local variables
//
//////////////////////////////////////////////////////////////////////////////
// forward decl; called by dump_UDT.
static int dump_data_sym(DWORD data_idx, const u8* p, DumpState state);
// forward decl; called by dump_array, dump_pointer and dump_typedef.
static int dump_type_sym(DWORD type_idx, const u8* p, DumpState state);
// these functions return -1 if they're not able to produce any reasonable
// output; dump_data_sym will display value as "?"
// <type_id> is a SymTagPointerType; output its value.
// called by dump_type_sym; lock is held.
static int dump_pointer(DWORD type_idx, const u8* p, size_t size, DumpState state)
{
// read+output pointer's value.
p = (const u8*)movzx_64le(p, size);
out(L"0x%p", p);
// bail if it's obvious the pointer is bogus
// (=> can't display what it's pointing to)
if(is_bogus_pointer(p))
return 0;
// display what the pointer is pointing to. if the pointer is invalid
// (despite "bogus" check above), dump_type_sym recovers via SEH and
// returns < 0; dump_data_sym will print "?".
out(L" -> "); // we out_erase this if it's a void* pointer
if(!SymGetTypeInfo(hProcess, mod_base, type_idx, TI_GET_TYPEID, &type_idx))
return -1;
state.indirection++;
return dump_type_sym(type_idx, p, state);
}
//////////////////////////////////////////////////////////////////////////////
// <type_id> is a SymTagBaseType; output its value.
// called by dump_type_sym; lock is held.
static int dump_base_type(DWORD type_idx, const u8* p, size_t size, DumpState state)
{
DWORD base_type;
if(!SymGetTypeInfo(hProcess, mod_base, type_idx, TI_GET_BASETYPE, &base_type))
return -1;
u64 data = movzx_64le(p, size);
// single out() call. note: we pass a single u64 for all sizes,
// which will only work on little-endian systems.
const wchar_t* fmt;
switch(base_type)
{
case btBool:
assert(size == sizeof(bool));
fmt = L"%hs";
data = (u64)(data? "true " : "false");
break;
case btFloat:
if(size == sizeof(float))
fmt = L"%f";
else if(size == sizeof(double))
fmt = L"%lf";
else
debug_warn("dump_base_type: invalid float size");
break;
// signed integers
case btInt:
case btLong:
data = movsx_64le(p, size);
if(size == 1 || size == 2 || size == 4)
fmt = L"%d";
else if(size == 8)
fmt = L"%I64d";
else
debug_warn("dump_base_type: invalid int size");
break;
// unsigned integers (displayed as hex)
case btUInt:
case btULong:
// note: 0x00000000 can get annoying (0 would be nicer),
// but it indicates the variable size and makes for consistently
// formatted structs/arrays. (0x1234 0 0x5678 is ugly)
if(size == 1)
fmt = L"0x%02X";
else if(size == 2)
fmt = L"0x%04X";
else if(size == 4)
fmt = L"0x%08X";
else if(size == 8)
fmt = L"0x%016I64X";
else
debug_warn("dump_base_type: invalid uint size");
break;
case btChar:
case btWChar:
assert(size == sizeof(char) || size == sizeof(wchar_t));
// char*, wchar_t*
if(state.indirection)
{
fmt = (base_type == btChar)? L"%hs" : L"%s";
data = (u64)p;
}
// either integer or character;
// if printable, the character will be appended below.
else
fmt = L"%d";
break;
// note: void* is sometimes indicated as (pointer, btNoType).
case btVoid:
case btNoType:
// void* - cannot display what it's pointing to (type unknown).
if(state.indirection)
{
out_erase(4); // " -> "
fmt = L"";
}
else
debug_warn("dump_base_type: non-pointer btVoid or btNoType");
break;
default:
debug_warn("dump_base_type: unknown type");
//-fallthrough
// unsupported complex types
case btBCD:
case btCurrency:
case btDate:
case btVariant:
case btComplex:
case btBit:
case btBSTR:
case btHresult:
return -1;
}
out(fmt, data);
// if the current value is a printable character, display in that form.
// this isn't only done in btChar because sometimes ints store characters.
if(data < 0x100)
{
int c = (int)data;
if(isprint(c))
out(L" ('%hc')", c);
}
return 0;
}
//////////////////////////////////////////////////////////////////////////////
// <type_id> is a SymTagEnum; output its value.
// called by dump_type_sym; lock is held.
static int dump_enum(DWORD type_idx, const u8* p, size_t size, DumpState state)
{
const i64 current_value = movsx_64le(p, size);
DWORD num_children;
if(!SymGetTypeInfo(hProcess, mod_base, type_idx, TI_GET_CHILDRENCOUNT, &num_children))
goto name_unavailable;
// alloc an array to hold child IDs
const size_t MAX_CHILDREN = 1000;
char child_buf[sizeof(TI_FINDCHILDREN_PARAMS)+MAX_CHILDREN*sizeof(DWORD)];
TI_FINDCHILDREN_PARAMS* fcp = (TI_FINDCHILDREN_PARAMS*)child_buf;
fcp->Start = 0;
fcp->Count = MIN(num_children, MAX_CHILDREN);
if(!SymGetTypeInfo(hProcess, mod_base, type_idx, TI_FINDCHILDREN, fcp))
goto name_unavailable;
for(uint i = 0; i < fcp->Count; i++)
{
DWORD child_data_idx = fcp->ChildId[i];
// get enum value. don't make any assumptions about the
// variant's type (i.e. size) - no restriction is documented.
// also don't do this manually - it's tedious and we might not
// cover everything. OLE DLL is already pulled in anyway.
VARIANT v;
SymGetTypeInfo(hProcess, mod_base, child_data_idx, TI_GET_VALUE, &v);
if(VariantChangeType(&v, &v, 0, VT_I8) != S_OK)
continue;
if(current_value == v.llVal)
{
WCHAR* name;
if(!SymGetTypeInfo(hProcess, mod_base, child_data_idx, TI_GET_SYMNAME, &name))
goto name_unavailable;
out(L"%s", name);
LocalFree(name);
return 0;
}
}
name_unavailable:
// we can produce reasonable output (the numeric value),
// but weren't able to retrieve the matching enum name.
out(L"%I64d", current_value);
return 1;
}
//////////////////////////////////////////////////////////////////////////////
// <type_id> is a SymTagArrayType; output its value.
// called by dump_type_sym; lock is held.
static int dump_array(DWORD type_idx, const u8* p, size_t size, DumpState state)
{
// get element count and size
DWORD el_type_idx = 0;
if(!SymGetTypeInfo(hProcess, mod_base, type_idx, TI_GET_TYPEID, &el_type_idx))
return -1;
// .. workaround: TI_GET_COUNT returns total struct size for
// arrays-of-struct. therefore, calculate as size / el_size.
ULONG64 el_size_;
if(!SymGetTypeInfo(hProcess, mod_base, el_type_idx, TI_GET_LENGTH, &el_size_))
return -1;
const size_t el_size = (size_t)el_size_;
const uint num_elements = (uint)(size / el_size);
assert2(num_elements != 0);
// display element count
out_erase(3); // " = "
out(L"[%d] = ", num_elements);
const bool fits_on_one_line = (num_elements <= 8) && (el_size <= sizeof(int));
// special case for character arrays: display as string
if(el_size == sizeof(char) || el_size == sizeof(wchar_t))
if(is_string_array(p, num_elements, el_size))
{
out(el_size == sizeof(char)? L"\"%hs\"" : L"\"%s\"", p);
return 0;
}
// regular array:
out(fits_on_one_line? L"{ " : L"\r\n");
state.level++;
int err = 0;
const uint num_elements_to_show = MIN(20, num_elements);
for(uint i = 0; i < num_elements_to_show; i++)
{
if(!fits_on_one_line)
INDENT;
int ret = dump_type_sym(el_type_idx, p + i*el_size, state);
if(err == 0) // remember first error
err = ret;
// add separator unless this is the last element
if(i != num_elements_to_show-1)
out(fits_on_one_line? L", " : L",\r\n");
}
// we truncated some
if(num_elements != num_elements_to_show)
out(L" ...");
if(fits_on_one_line)
out(L" }");
return err;
}
//////////////////////////////////////////////////////////////////////////////
// <type_id> is a SymTagTypedef; output its value.
// called by dump_type_sym; lock is held.
static int dump_typedef(DWORD type_idx, const u8* p, size_t size, DumpState state)
{
if(!SymGetTypeInfo(hProcess, mod_base, type_idx, TI_GET_TYPEID, &type_idx))
return -1;
return dump_type_sym(type_idx, p, state);
}
//////////////////////////////////////////////////////////////////////////////
// <type_id> is a SymTagFunction; output its value.
// called by dump_type_sym; lock is held.
static int dump_function_type(DWORD type_idx, const u8* p, size_t size, DumpState state)
{
// this symbol gives class parent, return type, and parameter count.
// unfortunately the one thing we care about, its name,
// isn't exposed via TI_GET_SYMNAME, so we resolve it ourselves.
// output address in case resolve below fails.
out(L"0x%p", p);
char name[DBG_SYMBOL_LEN];
int err = debug_resolve_symbol((void*)p, name, 0, 0);
if(err == 0)
out(L" (%hs)", name);
return 0;
}
//////////////////////////////////////////////////////////////////////////////
// <type_id> is a SymTagUDT; output its value.
// called by dump_type_sym; lock is held.
static int dump_UDT(DWORD type_idx, const u8* p, size_t size, DumpState state)
{
// get array of child symbols (one for each member, plus base class).
DWORD num_children;
if(!SymGetTypeInfo(hProcess, mod_base, type_idx, TI_GET_CHILDRENCOUNT, &num_children))
return -1;
const size_t MAX_CHILDREN = 1000;
char child_buf[sizeof(TI_FINDCHILDREN_PARAMS)+MAX_CHILDREN*sizeof(DWORD)];
TI_FINDCHILDREN_PARAMS* fcp = (TI_FINDCHILDREN_PARAMS*)child_buf;
fcp->Start = 0;
fcp->Count = MIN(num_children, MAX_CHILDREN);
if(!SymGetTypeInfo(hProcess, mod_base, type_idx, TI_FINDCHILDREN, fcp))
return -1;
const size_t avg_size = size / num_children;
const bool fits_on_one_line = (num_children <= 3) && (avg_size <= sizeof(int));
if(!fits_on_one_line)
out(L"\r\n");
// recursively display each child (call back to dump_data_sym)
state.level++;
int err = 0;
for(uint i = 0; i < fcp->Count; i++)
{
DWORD child_data_idx = fcp->ChildId[i];
// make sure this is a data member (avoids confusing dump_data_sym and
// messing up indentation).
DWORD type_tag;
if(!SymGetTypeInfo(hProcess, mod_base, child_data_idx, TI_GET_SYMTAG, &type_tag))
continue;
if(type_tag != SymTagData)
continue;
DWORD ofs;
if(!SymGetTypeInfo(hProcess, mod_base, child_data_idx, TI_GET_OFFSET, &ofs))
return -1;
if(!fits_on_one_line)
INDENT;
int ret = dump_data_sym(child_data_idx, p+ofs, state);
if(err == 0) // remember first error
err = ret;
out(fits_on_one_line? L"; " : L"\r\n");
}
// note: we can't prevent this from being written by checking
// if i == fcp->Count-1: that symbol may not be a data member.
out_erase(2); // "; " or "\r\n"
return err;
}
//////////////////////////////////////////////////////////////////////////////
static int dump_unknown(DWORD type_idx, const u8* p, size_t size, DumpState state)
{
// redundant (already done in dump_type_sym), but this is rare.
DWORD type_tag;
if(!SymGetTypeInfo(hProcess, mod_base, type_idx, TI_GET_SYMTAG, &type_tag))
{
debug_warn("dump_unknown: tag query failed");
return -1;
}
debug_printf("Unknown tag: %d\n", type_tag);
return -1;
}
//////////////////////////////////////////////////////////////////////////////
//
// stack trace
//
//////////////////////////////////////////////////////////////////////////////
static bool suppress_UDT(WCHAR* type_name)
{
// specialized HANDLEs are defined as pointers to structs by
// DECLARE_HANDLE. we only want the numerical value (pointer address),
// so prevent these structs from being displayed.
// note: no need to check for indirection; these are only found in
// HANDLEs (which are pointers).
// removed obsolete defs: HEVENT, HFILE, HUMPD
#define SUPPRESS_HANDLE(name) if(!wcscmp(type_name, L#name L"__")) return true;
if(type_name[0] != 'H')
goto not_handle;
SUPPRESS_HANDLE(HACCEL);
SUPPRESS_HANDLE(HBITMAP);
SUPPRESS_HANDLE(HBRUSH);
SUPPRESS_HANDLE(HCOLORSPACE);
SUPPRESS_HANDLE(HCURSOR);
SUPPRESS_HANDLE(HDC);
SUPPRESS_HANDLE(HENHMETAFILE);
SUPPRESS_HANDLE(HFONT);
SUPPRESS_HANDLE(HGDIOBJ);
SUPPRESS_HANDLE(HGLOBAL);
SUPPRESS_HANDLE(HGLRC);
SUPPRESS_HANDLE(HHOOK);
SUPPRESS_HANDLE(HICON);
SUPPRESS_HANDLE(HIMAGELIST);
SUPPRESS_HANDLE(HIMC);
SUPPRESS_HANDLE(HINSTANCE);
SUPPRESS_HANDLE(HKEY);
SUPPRESS_HANDLE(HKL);
SUPPRESS_HANDLE(HKLOCAL);
SUPPRESS_HANDLE(HMENU);
SUPPRESS_HANDLE(HMETAFILE);
SUPPRESS_HANDLE(HMODULE);
SUPPRESS_HANDLE(HMONITOR);
SUPPRESS_HANDLE(HPALETTE);
SUPPRESS_HANDLE(HPEN);
SUPPRESS_HANDLE(HRGN);
SUPPRESS_HANDLE(HRSRC);
SUPPRESS_HANDLE(HSTR);
SUPPRESS_HANDLE(HTASK);
SUPPRESS_HANDLE(HWINEVENTHOOK);
SUPPRESS_HANDLE(HWINSTA);
SUPPRESS_HANDLE(HWND);
not_handle:
return false;
}
// given a data symbol's type identifier, output its type name (if
// applicable), determine what kind of variable it describes, and
// call the appropriate dump_* routine.
//
// split out of dump_data_sym so we can recurse for typedefs (cleaner than
// 'restart' via goto or loop). lock is held.
static int dump_type_sym(DWORD type_idx, const u8* p, DumpState state)
{
DWORD type_tag;
if(!SymGetTypeInfo(hProcess, mod_base, type_idx, TI_GET_SYMTAG, &type_tag))
return -1;
// get "type name" (only available for SymTagUDT, SymTagEnum, and
// SymTagTypedef types).
// note: can't use SymFromIndex to get tag as well as name, because it
// fails when name isn't available (e.g. if this is a SymTagBaseType).
WCHAR* type_name;
if(SymGetTypeInfo(hProcess, mod_base, type_idx, TI_GET_SYMNAME, &type_name))
{
bool suppress = suppress_UDT(type_name);
LocalFree(type_name);
if(suppress)
{
// remove " -> " if it was a pointer
if(state.indirection)
out_erase(4);
return 0;
}
}
ULONG64 size_ = 0;
SymGetTypeInfo(hProcess, mod_base, type_idx, TI_GET_LENGTH, &size_);
// note: fails when type_tag == SymTagFunction
const size_t size = (size_t)size_;
switch(type_tag)
{
case SymTagUDT:
return dump_UDT (type_idx, p, size, state);
case SymTagEnum:
return dump_enum (type_idx, p, size, state);
case SymTagFunctionType:
return dump_function_type (type_idx, p, size, state);
case SymTagPointerType:
return dump_pointer (type_idx, p, size, state);
case SymTagArrayType:
return dump_array (type_idx, p, size, state);
case SymTagBaseType:
return dump_base_type (type_idx, p, size, state);
case SymTagTypedef:
return dump_typedef (type_idx, p, size, state);
default:
return dump_unknown (type_idx, p, size, state);
}
}
//////////////////////////////////////////////////////////////////////////////
// xxx indent to current nesting level, display name, and output value via
// dump_type_sym.
//
// split out of dump_sym_cb so dump_UDT can call back here for its members.
// lock is held.
static int dump_data_sym(DWORD data_idx, const u8* p, DumpState state)
{
// return both type_idx and name in one call for convenience.
// this is also more efficient than TI_GET_SYMNAME (avoids 1 LocalAlloc).
SYMBOL_INFO_PACKAGEW sp;
SYMBOL_INFOW* sym = &sp.si;
sym->SizeOfStruct = sizeof(sp.si);
sym->MaxNameLen = MAX_SYM_NAME;
if(!SymFromIndexW(hProcess, mod_base, data_idx, sym))
return -1;
if(sym->Tag != SymTagData)
{
debug_warn("dump_data_sym: unexpected tag");
return -1;
}
out(L"%s = ", sym->Name);
int ret;
__try
{
ret = dump_type_sym(sym->TypeIndex, p, state);
}
__except(EXCEPTION_EXECUTE_HANDLER)
{
ret = -1;
}
// couldn't produce any reasonable output; show value as "?"
if(ret < 0)
out(L"?");
return ret;
}
//////////////////////////////////////////////////////////////////////////////
struct DumpSymParams
{
const STACKFRAME64* sf;
bool locals_active;
};
// get actual address of what the symbol represents (may be relative
// to frame pointer); demarcate local/param sections; output name+value via
// dump_data_sym.
//
// called from dump_frame_cb for each local symbol; lock is held.
static BOOL CALLBACK dump_sym_cb(SYMBOL_INFO* sym, ULONG sym_size, void* ctx)
{
UNUSED(sym_size);
DumpSymParams* p = (DumpSymParams*)ctx;
assert(mod_base == sym->ModBase);
// get address
ULONG64 addr = sym->Address;
// .. relative to a register; we assume it's the frame pointer,
// since sym->Register is undocumented.
if(sym->Flags & SYMF_REGREL || sym->Flags & SYMF_FRAMEREL)
addr += p->sf->AddrFrame.Offset;
// .. in register; we can't reliably retrieve it (since undocumented)
else if(sym->Flags & SYMF_REGISTER)
return 1;
// .. global variable (address already set)
// demarcate local / parameter report sections - this is nicer than
// printing e.g. "local" in front of each variable. we assume that
// symbols are sorted by group (local/param); if not, we waste space
// with redundant "locals:"/"params:" tags.
// note that both flags can be set, so we can't combine the if pairs.
if(sym->Flags & SYMF_PARAMETER)
{
if(p->locals_active)
{
out(L" params:\r\n");
p->locals_active = false;
}
}
else if(sym->Flags & SYMF_LOCAL)
{
if(!p->locals_active)
{
out(L" locals:\r\n ");
p->locals_active = true;
}
}
DumpState state;
INDENT;
dump_data_sym(sym->Index, (const u8*)addr, state);
out(L"\r\n");
return TRUE; // continue
}
//////////////////////////////////////////////////////////////////////////////
// called by walk_stack for each stack frame
static int dump_frame_cb(const STACKFRAME64* sf, void* user_arg)
{
UNUSED(user_arg);
void* func = (void*)sf->AddrPC.Offset;
// don't trace back into kernel32: we need a defined stop point,
// or walk_stack will end up returning -1; stopping here also
// reduces the risk of confusing the stack dump code below.
wchar_t path[MAX_PATH];
wchar_t* module_filename = get_module_filename(func, path);
if(!wcscmp(module_filename, L"kernel32.dll"))
return 0; // done
lock();
char func_name[1000]; char file[100]; int line;
if(debug_resolve_symbol(func, func_name, file, &line) == 0)
out(L"%hs (%hs:%lu)", func_name, file, line);
else
out(L"%p", func);
out(L"\r\n");
// only enumerate symbols for this stack frame
// (i.e. its locals and parameters)
// problem: debug info is scope-aware, so we won't see any variables
// declared in sub-blocks. we'd have to pass an address in that block,
// which isn't worth the trouble. since
IMAGEHLP_STACK_FRAME imghlp_frame;
imghlp_frame.InstructionOffset = (DWORD64)func;
SymSetContext(hProcess, &imghlp_frame, 0); // last param is ignored
DumpSymParams params = { sf, true };
SymEnumSymbols(hProcess, 0, 0, dump_sym_cb, &params);
// 2nd and 3rd params indicate scope set by SymSetContext
// should be used.
out(L"\r\n");
unlock();
return 1; // keep calling
}
//////////////////////////////////////////////////////////////////////////////
// most recent <skip> stack frames will be skipped
// (we don't want to show e.g. GetThreadContext / this call)
static const wchar_t* dump_stack(uint skip, const CONTEXT* pcontext = 0)
{
// if we don't get a CONTEXT, our function frame will be in the trace;
// prevent it from being displayed. note: don't do this only in
// walk_stack, because it may be called from different depths.
if(!pcontext)
skip++;
int err = walk_stack(dump_frame_cb, 0, skip, pcontext);
if(err != 0)
out(L"(error while building stack trace: %d)", err);
return dump_buf;
}
//////////////////////////////////////////////////////////////////////////////
//
// "program error" dialog (triggered by assert and exception)
//
//////////////////////////////////////////////////////////////////////////////
enum DialogType
{
ASSERT,
EXCEPTION
};
//
// support for resizing the dialog / its controls
// (have to do this manually - grr)
//
static POINTS dlg_client_origin;
static POINTS dlg_prev_client_size;
const int ANCHOR_LEFT = 0x01;
const int ANCHOR_RIGHT = 0x02;
const int ANCHOR_TOP = 0x04;
const int ANCHOR_BOTTOM = 0x08;
const int ANCHOR_ALL = 0x0f;
static void dlg_resize_control(HWND hDlg, int dlg_item, int dx,int dy, int anchors)
{
HWND hControl = GetDlgItem(hDlg, dlg_item);
RECT r;
GetWindowRect(hControl, &r);
int w = r.right - r.left, h = r.bottom - r.top;
int x = r.left - dlg_client_origin.x, y = r.top - dlg_client_origin.y;
if(anchors & ANCHOR_RIGHT)
{
// right only
if(!(anchors & ANCHOR_LEFT))
x += dx;
// horizontal (stretch width)
else
w += dx;
}
if(anchors & ANCHOR_BOTTOM)
{
// bottom only
if(!(anchors & ANCHOR_TOP))
y += dy;
// vertical (stretch height)
else
h += dy;
}
SetWindowPos(hControl, 0, x,y, w,h, SWP_NOZORDER);
}
static void dlg_resize(HWND hDlg, WPARAM wParam, LPARAM lParam)
{
// 'minimize' was clicked. we need to ignore this, otherwise
// dx/dy would reduce some control positions to less than 0.
// since Windows clips them, we wouldn't later be able to
// reconstruct the previous values when 'restoring'.
if(wParam == SIZE_MINIMIZED)
return;
// first call for this dialog instance. WM_MOVE hasn't been sent yet,
// so dlg_client_origin are invalid => must not call resize_control().
// we need to set dlg_prev_client_size for the next call before exiting.
bool first_call = (dlg_prev_client_size.y == 0);
POINTS dlg_client_size = MAKEPOINTS(lParam);
int dx = dlg_client_size.x - dlg_prev_client_size.x;
int dy = dlg_client_size.y - dlg_prev_client_size.y;
dlg_prev_client_size = dlg_client_size;
if(first_call)
return;
dlg_resize_control(hDlg, IDC_CONTINUE, dx,dy, ANCHOR_LEFT|ANCHOR_BOTTOM);
dlg_resize_control(hDlg, IDC_SUPPRESS, dx,dy, ANCHOR_LEFT|ANCHOR_BOTTOM);
dlg_resize_control(hDlg, IDC_BREAK , dx,dy, ANCHOR_LEFT|ANCHOR_BOTTOM);
dlg_resize_control(hDlg, IDC_EXIT , dx,dy, ANCHOR_LEFT|ANCHOR_BOTTOM);
dlg_resize_control(hDlg, IDC_COPY , dx,dy, ANCHOR_RIGHT|ANCHOR_BOTTOM);
dlg_resize_control(hDlg, IDC_EDIT1 , dx,dy, ANCHOR_ALL);
}
static int CALLBACK dlgproc(HWND hDlg, unsigned int msg, WPARAM wParam, LPARAM lParam)
{
switch(msg)
{
case WM_INITDIALOG:
{
// need to reset for new instance of dialog
dlg_client_origin.x = dlg_client_origin.y = 0;
dlg_prev_client_size.x = dlg_prev_client_size.y = 0;
// disable inappropriate buttons
DialogType type = (DialogType)lParam;
if(type != ASSERT)
{
HWND h;
h = GetDlgItem(hDlg, IDC_CONTINUE);
EnableWindow(h, FALSE);
h = GetDlgItem(hDlg, IDC_SUPPRESS);
EnableWindow(h, FALSE);
h = GetDlgItem(hDlg, IDC_BREAK);
EnableWindow(h, FALSE);
}
SetDlgItemTextW(hDlg, IDC_EDIT1, dump_buf);
return TRUE; // set default keyboard focus
}
case WM_SYSCOMMAND:
// close dialog if [X] is clicked (doesn't happen automatically)
// note: lower 4 bits are reserved
if((wParam & 0xFFF0) == SC_CLOSE)
{
EndDialog(hDlg, 0);
return 0; // processed
}
break;
// return 0 if processed, otherwise break
case WM_COMMAND:
switch(wParam)
{
case IDC_COPY:
clipboard_set(dump_buf);
return 0;
case IDC_CONTINUE:
EndDialog(hDlg, ASSERT_CONTINUE);
return 0;
case IDC_SUPPRESS:
EndDialog(hDlg, ASSERT_SUPPRESS);
return 0;
case IDC_BREAK:
EndDialog(hDlg, ASSERT_BREAK);
return 0;
case IDC_EXIT:
exit(0);
return 0;
default:
break;
}
break;
case WM_MOVE:
dlg_client_origin = MAKEPOINTS(lParam);
break;
case WM_GETMINMAXINFO:
{
// we must make sure resize_control will never set negative coords -
// Windows would clip them, and its real position would be lost.
// restrict to a reasonable and good looking minimum size [pixels].
MINMAXINFO* mmi = (MINMAXINFO*)lParam;
mmi->ptMinTrackSize.x = 407;
mmi->ptMinTrackSize.y = 159; // determined experimentally
return 0;
}
case WM_SIZE:
dlg_resize(hDlg, wParam, lParam);
break;
default:
break;
}
// we didn't process the message; caller will perform default action.
return FALSE;
}
// show error dialog with stack trace (must be stored in dump_buf[])
// exits directly if 'exit' is clicked.
static int dialog(DialogType type)
{
const HINSTANCE hInstance = GetModuleHandle(0);
const HWND hParent = GetDesktopWindow();
// we don't know if the enclosing app has a hwnd, so use the desktop.
return (int)DialogBoxParam(hInstance, MAKEINTRESOURCE(IDD_DIALOG1), hParent, dlgproc, (LPARAM)type);
}
static LONG WINAPI unhandled_exception_filter(EXCEPTION_POINTERS* ep);
// notify the user that an assertion failed; displays a
// stack trace with local variables.
// returns one of FailedAssertUserChoice or exits the program.
int debug_assert_failed(const char* file, int line, const char* expr)
{
out_reset();
out(L"Assertion failed in %hs, line %d: \"%hs\"\r\n", file, line, expr);
out(L"\r\nCall stack:\r\n\r\n");
dump_stack(+1); // skip the current frame (debug_assert_failed)
#if defined(SCED) && !(defined(NDEBUG)||defined(TESTING))
// ScEd keeps running while the dialog is showing, and tends to crash before
// there's a chance to read the assert message. So, just break immediately.
debug_break();
#endif
return dialog(ASSERT);
/*
__try
{
RaiseException(0x10000, 0, 0,0);
}
__except(unhandled_exception_filter(GetExceptionInformation()))
{
}
return ASSERT_CONTINUE;
*/
}
//////////////////////////////////////////////////////////////////////////////
//
// exception handler
//
//////////////////////////////////////////////////////////////////////////////
// return localized version of <text>, if i18n functionality is available.
// this is used to translate the "unhandled exception" dialog strings.
// WARNING: leaks memory returned by wcsdup, but that's ok since the
// program will terminate soon after. fixing this is hard and senseless.
static const wchar_t* translate(const wchar_t* text)
{
#ifdef HAVE_I18N
// make sure i18n system is (already|still) initialized.
if(g_CurrentLocale)
{
// be prepared for this to fail, because translation potentially
// involves script code and the JS context might be corrupted.
__try
{
const wchar_t* text2 = wcsdup(I18n::translate(text).c_str());
// only overwrite if wcsdup succeeded, i.e. not out of memory.
if(text2)
text = text2;
}
__except(EXCEPTION_EXECUTE_HANDLER)
{
}
}
#endif
return text;
}
// convenience wrapper using translate.
static void translate_and_display_msg(const wchar_t* caption, const wchar_t* text)
{
wdisplay_msg(translate(caption), translate(text));
}
// write out a "minidump" containing register and stack state; this enables
// examining the crash in a debugger. called by unhandled_exception_filter.
// heavily modified from http://www.codeproject.com/debug/XCrashReportPt3.asp
static void write_minidump(EXCEPTION_POINTERS* exception_pointers)
{
HANDLE hFile = CreateFile("crashlog.dmp", GENERIC_WRITE, FILE_SHARE_WRITE, 0, CREATE_ALWAYS, 0, 0);
if(hFile == INVALID_HANDLE_VALUE)
goto fail;
MINIDUMP_EXCEPTION_INFORMATION mei;
mei.ThreadId = GetCurrentThreadId();
mei.ExceptionPointers = exception_pointers;
mei.ClientPointers = FALSE;
// exception_pointers is not in our address space.
// note: we don't store other crashlog info within the dump file
// (UserStreamParam), since we will need to generate a plain text file on
// non-Windows platforms. users will just have to send us both files.
HANDLE hProcess = GetCurrentProcess(); DWORD pid = GetCurrentProcessId();
if(!MiniDumpWriteDump(hProcess, pid, hFile, MiniDumpNormal, &mei, 0, 0))
{
fail:
translate_and_display_msg(L"Error", L"Unable to generate minidump.");
}
CloseHandle(hFile);
}
//
// analyze exceptions; determine their type and locus
//
// storage for strings built by get_SEH_exception_description and get_cpp_exception_description.
static wchar_t description[128];
// VC++ exception handling internals.
// see http://www.codeproject.com/cpp/exceptionhandler.asp
struct XTypeInfo
{
DWORD _;
const std::type_info* ti;
// ..
};
struct XTypeInfoArray
{
DWORD count;
const XTypeInfo* types[1];
};
struct XInfo
{
DWORD _[3];
const XTypeInfoArray* array;
};
// if <er> is not a C++ exception, return 0. otherwise, return a description
// of the exception type and cause (in English). uses static storage.
static const wchar_t* get_cpp_exception_description(const EXCEPTION_RECORD* er)
{
const ULONG_PTR* const ei = er->ExceptionInformation;
// bail if not a C++ exception (magic numbers defined in VC exsup.inc)
if(er->ExceptionCode != 0xe06d7363 ||
er->NumberParameters != 3 ||
ei[0] != 0x19930520)
return 0;
// VC's C++ exception implementation stores the following:
// ei[0] - magic number
// ei[1] -> object that was thrown
// ei[2] -> XInfo
//
// note: we can't share a __try below - the failure of
// one attempt must not abort the others.
// get std::type_info
char type_buf[100] = {'\0'};
const char* type_name = type_buf;
__try
{
const XInfo* xi = (XInfo*)ei[2];
const XTypeInfoArray* xta = xi->array;
const XTypeInfo* xti = xta->types[0];
const std::type_info* ti = xti->ti;
// strip "class " from start of string (clutter)
strcpy_s(type_buf, ARRAY_SIZE(type_buf), ti->name());
if(!strncmp(type_buf, "class ", 6))
type_name += 6;
}
__except(EXCEPTION_EXECUTE_HANDLER)
{
}
// std::exception.what()
char what[100] = {'\0'};
__try
{
std::exception* e = (std::exception*)ei[1];
strcpy_s(what, ARRAY_SIZE(what), e->what());
}
__except(EXCEPTION_EXECUTE_HANDLER)
{
}
// we got meaningful data; format and return it.
if(type_name[0] != '\0' || what[0] != '\0')
{
swprintf(description, ARRAY_SIZE(description), L"%hs(\"%hs\")", type_name, what);
return description;
}
// not a C++ exception; we can't say anything about it.
return 0;
}
// return a description of the exception type (in English).
// uses static storage.
static const wchar_t* get_SEH_exception_description(const EXCEPTION_RECORD* er)
{
const DWORD code = er->ExceptionCode;
const ULONG_PTR* ei = er->ExceptionInformation;
// special case for access violations: display type and address.
if(code == EXCEPTION_ACCESS_VIOLATION)
{
const wchar_t* op = (ei[0])? L"writing" : L"reading";
const wchar_t* fmt = L"Access violation %s 0x%08X";
swprintf(description, ARRAY_SIZE(description), translate(fmt), translate(op), ei[1]);
return description;
}
// rationale: we don't use FormatMessage because it is unclear whether
// NTDLL's symbol table will always include English-language strings
// (we don't want crashlogs in foreign gobbledygook).
// it also adds unwanted formatting (e.g. {EXCEPTION} and trailing .).
switch(code)
{
// case EXCEPTION_ACCESS_VIOLATION: return L"Access violation";
case EXCEPTION_DATATYPE_MISALIGNMENT: return L"Datatype misalignment";
case EXCEPTION_BREAKPOINT: return L"Breakpoint";
case EXCEPTION_SINGLE_STEP: return L"Single step";
case EXCEPTION_ARRAY_BOUNDS_EXCEEDED: return L"Array bounds exceeded";
case EXCEPTION_FLT_DENORMAL_OPERAND: return L"FPU denormal operand";
case EXCEPTION_FLT_DIVIDE_BY_ZERO: return L"FPU divide by zero";
case EXCEPTION_FLT_INEXACT_RESULT: return L"FPU inexact result";
case EXCEPTION_FLT_INVALID_OPERATION: return L"FPU invalid operation";
case EXCEPTION_FLT_OVERFLOW: return L"FPU overflow";
case EXCEPTION_FLT_STACK_CHECK: return L"FPU stack check";
case EXCEPTION_FLT_UNDERFLOW: return L"FPU underflow";
case EXCEPTION_INT_DIVIDE_BY_ZERO: return L"Integer divide by zero";
case EXCEPTION_INT_OVERFLOW: return L"Integer overflow";
case EXCEPTION_PRIV_INSTRUCTION: return L"Privileged instruction";
case EXCEPTION_IN_PAGE_ERROR: return L"In page error";
case EXCEPTION_ILLEGAL_INSTRUCTION: return L"Illegal instruction";
case EXCEPTION_NONCONTINUABLE_EXCEPTION: return L"Noncontinuable exception";
case EXCEPTION_STACK_OVERFLOW: return L"Stack overflow";
case EXCEPTION_INVALID_DISPOSITION: return L"Invalid disposition";
case EXCEPTION_GUARD_PAGE: return L"Guard page";
case EXCEPTION_INVALID_HANDLE: return L"Invalid handle";
}
// anything else => unknown; display its exception code.
// we don't punt to get_exception_description because anything
// we get called for will actually be a SEH exception.
swprintf(description, ARRAY_SIZE(description), L"Unknown exception(0x%08X)", code);
return description;
}
// return a description of the exception <er> (in English).
// it is only valid until the next call, since static storage is used.
static const wchar_t* get_exception_description(const EXCEPTION_RECORD* er)
{
// note: more specific than SEH, so try it first.
const wchar_t* d = get_cpp_exception_description(er);
if(d)
return d;
return get_SEH_exception_description(er);
}
// return an indication of where the exception <er> occurred (lang. neutral).
// it is only valid until the next call, since static storage is used.
static const wchar_t* get_exception_locus(const EXCEPTION_RECORD* er)
{
void* addr = er->ExceptionAddress;
wchar_t path[MAX_PATH];
wchar_t* module_filename = get_module_filename(er->ExceptionAddress, path);
char func_name[DBG_SYMBOL_LEN];
debug_resolve_symbol(addr, func_name, 0, 0);
static wchar_t locus[100];
swprintf(locus, ARRAY_SIZE(locus), L"%s!%p(%hs)", module_filename, addr, func_name);
return locus;
}
// called when an SEH exception was not caught by the app;
// provides detailed debugging information and exits.
// this overrides the normal OS "program error" dialog; see rationale below.
static LONG WINAPI unhandled_exception_filter(EXCEPTION_POINTERS* ep)
{
const EXCEPTION_RECORD* const er = ep->ExceptionRecord;
// note: we risk infinite recursion if someone raises an SEH exception
// from within this function. therefore, abort immediately if we've
// already been called; the first error is the most important, anyway.
static bool already_crashed = false;
if(already_crashed)
return EXCEPTION_EXECUTE_HANDLER;
already_crashed = true;
// build and display error message
const wchar_t* locus = get_exception_locus (er);
const wchar_t* description = get_exception_description(er);
static const wchar_t fmt[] =
L"Much to our regret we must report the program has encountered an error and cannot continue.\r\n"
L"\n"
L"Please let us know at http://bugs.wildfiregames.com/ and attach the crashlog.txt and crashlog.dmp files.\r\n"
L"\n"
L"Details: %s at %s.";
wchar_t text[1000];
swprintf(text, ARRAY_SIZE(text), translate(fmt), description, locus);
wdisplay_msg(translate(L"Problem"), text);
// write out crash log and minidump.
write_minidump(ep);
out_reset();
const wchar_t* stack_trace = dump_stack(+0, ep->ContextRecord);
debug_write_crashlog(description, locus, stack_trace);
// disable memory-leak reporting to avoid a flood of warnings
// (lots of stuff will leak since we exit abnormally).
#ifdef HAVE_DEBUGALLOC
uint flags = _CrtSetDbgFlag(_CRTDBG_REPORT_FLAG);
_CrtSetDbgFlag(flags & ~_CRTDBG_LEAK_CHECK_DF);
#endif
// invoke the default exception handler - it calls ExitProcess for
// most exception types.
return EXCEPTION_EXECUTE_HANDLER;
}
// called from wdbg_init.
//
// rationale: we want to replace the OS "program error" dialog box because
// it is not all too helpful in debugging. to that end, there are
// 4 ways to make sure unhandled exceptions are caught:
// - via WaitForDebugEvent; the app is run from a separate debugger process.
// this complicates analysis, since the exception is in another
// address space. also, we are basically implementing a full-featured
// debugger - overkill.
// - wrapping all threads in __try (necessary since the handler chain
// is in TLS) is very difficult to guarantee; it would also pollute main().
// - vectored exception handlers work across threads, but
// are only available on WinXP (unacceptable).
// - setting the per-process unhandled exception filter does the job,
// with the following caveat: it is never called when a debugger is active.
// workaround: call from a regular SEH __except, e.g. wrapped around main().
//
// note: this also catches regular C++ exceptions!
static void set_exception_handler()
{
void* prev_filter = SetUnhandledExceptionFilter(unhandled_exception_filter);
if(prev_filter)
assert2("conflict with SetUnhandledExceptionFilter. must implement chaining to previous handler");
struct Small
{
int i1;
int i2;
};
struct Large
{
double d1;
double d2;
double d3;
double d4;
};
Large large_array_of_large_structs[8] = { { 0.0,0.0,0.0,0.0 } };
Large small_array_of_large_structs[2] = { { 0.0,0.0,0.0,0.0 } };
Small large_array_of_small_structs[8] = { { 1,2 } };
Small small_array_of_small_structs[2] = { { 1,2 } };
int ar1[] = { 1,2,3,4,5 };
char ar2[] = { 't','e','s','t', 0 };
// tests
// __try
{
//assert2(0 && "test assert2"); // not exception (works when run from debugger)
//__asm xor edx,edx __asm div edx // named SEH
//RaiseException(0x87654321, 0, 0, 0); // unknown SEH
//throw std::bad_exception("what() is ok"); // C++
}
// __except(unhandled_exception_filter(GetExceptionInformation()))
{
}
}
static int wdbg_init()
{
RETURN_ERR(sym_init());
// rationale: see definition. note: unhandled_exception_filter uses the
// dbghelp symbol engine, so it must be initialized first.
set_exception_handler();
return 0;
}
static int wdbg_shutdown(void)
{
return sym_shutdown();
}