2020-01-23 21:04:46 +01:00
|
|
|
// Copyright (c) 2019-2020 Alexander Medvednikov. All rights reserved.
|
2019-11-13 09:05:06 +01:00
|
|
|
// Use of this source code is governed by an MIT license
|
|
|
|
// that can be found in the LICENSE file.
|
|
|
|
|
|
|
|
module builtin
|
|
|
|
|
2020-04-16 11:29:36 +02:00
|
|
|
// dbghelp.h is already included in cheaders.v
|
2019-11-13 09:05:06 +01:00
|
|
|
#flag windows -l dbghelp
|
|
|
|
|
|
|
|
pub struct SymbolInfo {
|
|
|
|
pub mut:
|
|
|
|
f_size_of_struct u32 // must be 88 to be recognised by SymFromAddr
|
|
|
|
f_type_index u32 // Type Index of symbol
|
|
|
|
f_reserved [2]u64
|
|
|
|
f_index u32
|
|
|
|
f_size u32
|
|
|
|
f_mod_base u64 // Base Address of module comtaining this symbol
|
|
|
|
f_flags u32
|
|
|
|
f_value u64 // Value of symbol, ValuePresent should be 1
|
|
|
|
f_address u64 // Address of symbol including base address of module
|
|
|
|
f_register u32 // register holding value or pointer to value
|
|
|
|
f_scope u32 // scope of the symbol
|
|
|
|
f_tag u32 // pdb classification
|
|
|
|
f_name_len u32 // Actual length of name
|
|
|
|
f_max_name_len u32 // must be manually set
|
|
|
|
f_name byte // must be calloc(f_max_name_len)
|
|
|
|
}
|
|
|
|
|
|
|
|
pub struct SymbolInfoContainer {
|
|
|
|
pub mut:
|
|
|
|
syminfo SymbolInfo
|
|
|
|
f_name_rest [254]char
|
|
|
|
}
|
|
|
|
|
|
|
|
pub struct Line64 {
|
2020-04-27 22:53:26 +02:00
|
|
|
pub mut:
|
2019-11-13 09:05:06 +01:00
|
|
|
f_size_of_struct u32
|
|
|
|
f_key voidptr
|
|
|
|
f_line_number u32
|
|
|
|
f_file_name byteptr
|
|
|
|
f_address u64
|
|
|
|
}
|
|
|
|
|
|
|
|
fn C.SymSetOptions(symoptions u32) u32 // returns the current options mask
|
|
|
|
fn C.GetCurrentProcess() voidptr // returns handle
|
|
|
|
fn C.SymInitialize(h_process voidptr, p_user_search_path byteptr, b_invade_process int) int
|
|
|
|
fn C.CaptureStackBackTrace(frames_to_skip u32, frames_to_capture u32, p_backtrace voidptr, p_backtrace_hash voidptr) u16
|
|
|
|
fn C.SymFromAddr(h_process voidptr, address u64, p_displacement voidptr, p_symbol voidptr) int
|
|
|
|
fn C.SymGetLineFromAddr64(h_process voidptr, address u64, p_displacement voidptr, p_line &Line64) int
|
|
|
|
|
|
|
|
// Ref - https://docs.microsoft.com/en-us/windows/win32/api/dbghelp/nf-dbghelp-symsetoptions
|
|
|
|
const (
|
2020-05-22 17:36:09 +02:00
|
|
|
symopt_undname = 0x00000002
|
|
|
|
symopt_deferred_loads = 0x00000004
|
|
|
|
symopt_no_cpp = 0x00000008
|
|
|
|
symopt_load_lines = 0x00000010
|
|
|
|
symopt_include_32bit_modules = 0x00002000
|
|
|
|
symopt_allow_zero_address = 0x01000000
|
|
|
|
symopt_debug = 0x80000000
|
2019-11-13 09:05:06 +01:00
|
|
|
)
|
|
|
|
|
2020-04-05 16:08:16 +02:00
|
|
|
fn builtin_init() {
|
2020-04-03 13:27:19 +02:00
|
|
|
if is_atty(1) > 0 {
|
2020-05-22 17:36:09 +02:00
|
|
|
C.SetConsoleMode(C.GetStdHandle(C.STD_OUTPUT_HANDLE), C.ENABLE_PROCESSED_OUTPUT | 0x0004) // enable_virtual_terminal_processing
|
2020-04-03 13:27:19 +02:00
|
|
|
C.setbuf(C.stdout, 0)
|
|
|
|
}
|
2020-05-29 03:06:27 +02:00
|
|
|
add_unhandled_exception_handler()
|
2020-04-03 13:27:19 +02:00
|
|
|
}
|
|
|
|
|
2020-04-20 20:59:08 +02:00
|
|
|
fn print_backtrace_skipping_top_frames(skipframes int) bool {
|
|
|
|
$if msvc {
|
|
|
|
return print_backtrace_skipping_top_frames_msvc(skipframes)
|
|
|
|
}
|
|
|
|
$if mingw {
|
|
|
|
return print_backtrace_skipping_top_frames_mingw(skipframes)
|
|
|
|
}
|
2020-05-04 10:21:25 +02:00
|
|
|
eprintln('print_backtrace_skipping_top_frames is not implemented')
|
2020-04-20 20:59:08 +02:00
|
|
|
return false
|
|
|
|
}
|
2019-11-13 09:05:06 +01:00
|
|
|
|
2020-04-20 20:59:08 +02:00
|
|
|
fn print_backtrace_skipping_top_frames_msvc(skipframes int) bool {
|
2019-11-13 09:05:06 +01:00
|
|
|
$if msvc {
|
|
|
|
mut offset := u64(0)
|
|
|
|
backtraces := [100]voidptr
|
|
|
|
sic := SymbolInfoContainer{}
|
|
|
|
mut si := &sic.syminfo
|
|
|
|
si.f_size_of_struct = sizeof(SymbolInfo) // Note: C.SYMBOL_INFO is 88
|
|
|
|
si.f_max_name_len = sizeof(SymbolInfoContainer) - sizeof(SymbolInfo) - 1
|
2019-12-01 08:33:26 +01:00
|
|
|
fname := charptr( &si.f_name )
|
2019-11-13 09:05:06 +01:00
|
|
|
mut sline64 := Line64{}
|
|
|
|
sline64.f_size_of_struct = sizeof(Line64)
|
|
|
|
|
|
|
|
handle := C.GetCurrentProcess()
|
|
|
|
defer { C.SymCleanup(handle) }
|
2019-12-12 02:09:31 +01:00
|
|
|
|
2020-05-22 17:36:09 +02:00
|
|
|
C.SymSetOptions(symopt_debug | symopt_load_lines | symopt_undname)
|
2020-04-22 01:52:56 +02:00
|
|
|
|
2019-11-13 09:05:06 +01:00
|
|
|
syminitok := C.SymInitialize( handle, 0, 1)
|
|
|
|
if syminitok != 1 {
|
2020-05-04 10:21:25 +02:00
|
|
|
eprintln('Failed getting process: Aborting backtrace.\n')
|
2019-11-13 09:05:06 +01:00
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2020-04-20 20:59:08 +02:00
|
|
|
frames := int(C.CaptureStackBackTrace(skipframes + 1, 100, backtraces, 0))
|
|
|
|
for i in 0..frames {
|
|
|
|
frame_addr := backtraces[i]
|
|
|
|
if C.SymFromAddr(handle, frame_addr, &offset, si) == 1 {
|
2019-11-13 09:05:06 +01:00
|
|
|
nframe := frames - i - 1
|
|
|
|
mut lineinfo := ''
|
2020-04-20 20:59:08 +02:00
|
|
|
if C.SymGetLineFromAddr64(handle, frame_addr, &offset, &sline64) == 1 {
|
|
|
|
file_name := tos3(sline64.f_file_name)
|
|
|
|
lineinfo = '${file_name}:${sline64.f_line_number}'
|
|
|
|
} else {
|
|
|
|
addr :
|
2020-05-05 07:35:26 +02:00
|
|
|
lineinfo = '?? : address = 0x${(&frame_addr):x}'
|
2019-11-13 09:05:06 +01:00
|
|
|
}
|
|
|
|
sfunc := tos3(fname)
|
2020-05-04 10:21:25 +02:00
|
|
|
eprintln('${nframe:-2d}: ${sfunc:-25s} $lineinfo')
|
2020-04-20 20:59:08 +02:00
|
|
|
} else {
|
2019-11-13 09:05:06 +01:00
|
|
|
// https://docs.microsoft.com/en-us/windows/win32/debug/system-error-codes
|
|
|
|
cerr := int(C.GetLastError())
|
2020-03-28 10:19:38 +01:00
|
|
|
if cerr == 87 {
|
2020-05-04 10:21:25 +02:00
|
|
|
eprintln('SymFromAddr failure: $cerr = The parameter is incorrect)')
|
2020-04-20 20:59:08 +02:00
|
|
|
} else if cerr == 487 {
|
2019-11-13 09:05:06 +01:00
|
|
|
// probably caused because the .pdb isn't in the executable folder
|
2020-05-04 10:21:25 +02:00
|
|
|
eprintln('SymFromAddr failure: $cerr = Attempt to access invalid address (Verify that you have the .pdb file in the right folder.)')
|
2020-04-20 20:59:08 +02:00
|
|
|
} else {
|
2020-05-04 10:21:25 +02:00
|
|
|
eprintln('SymFromAddr failure: $cerr (see https://docs.microsoft.com/en-us/windows/win32/debug/system-error-codes)')
|
2019-11-13 09:05:06 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
2020-04-20 20:59:08 +02:00
|
|
|
} $else {
|
2020-05-04 10:21:25 +02:00
|
|
|
eprintln('print_backtrace_skipping_top_frames_msvc must be called only when the compiler is msvc')
|
2019-11-13 09:05:06 +01:00
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
fn print_backtrace_skipping_top_frames_mingw(skipframes int) bool {
|
2020-05-04 10:21:25 +02:00
|
|
|
eprintln('print_backtrace_skipping_top_frames_mingw is not implemented')
|
2019-11-13 09:05:06 +01:00
|
|
|
return false
|
|
|
|
}
|
2020-05-29 03:06:27 +02:00
|
|
|
|
|
|
|
|
|
|
|
//TODO copypaste from os
|
|
|
|
// we want to be able to use this here without having to `import os`
|
|
|
|
struct ExceptionRecord {
|
|
|
|
pub:
|
|
|
|
// status_ constants
|
|
|
|
code u32
|
|
|
|
flags u32
|
|
|
|
|
|
|
|
record &ExceptionRecord
|
|
|
|
address voidptr
|
|
|
|
param_count u32
|
|
|
|
// params []voidptr
|
|
|
|
}
|
|
|
|
|
|
|
|
struct ContextRecord {
|
|
|
|
// TODO
|
|
|
|
}
|
|
|
|
|
|
|
|
struct ExceptionPointers {
|
|
|
|
pub:
|
|
|
|
exception_record &ExceptionRecord
|
|
|
|
context_record &ContextRecord
|
|
|
|
}
|
|
|
|
|
|
|
|
type VectoredExceptionHandler fn(&ExceptionPointers)u32
|
|
|
|
|
|
|
|
fn C.AddVectoredExceptionHandler(u32, VectoredExceptionHandler)
|
|
|
|
fn add_vectored_exception_handler(handler VectoredExceptionHandler) {
|
|
|
|
C.AddVectoredExceptionHandler(1, handler)
|
|
|
|
}
|
|
|
|
|
|
|
|
[windows_stdcall]
|
|
|
|
fn unhandled_exception_handler(e &ExceptionPointers) u32 {
|
|
|
|
match e.exception_record.code {
|
|
|
|
// These are 'used' by the backtrace printer
|
|
|
|
// so we dont want to catch them...
|
|
|
|
0x4001000A, 0x40010006 {
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
println('Unhandled Exception 0x${e.exception_record.code:X}')
|
|
|
|
print_backtrace_skipping_top_frames(5)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
pub fn add_unhandled_exception_handler() {
|
|
|
|
add_vectored_exception_handler(unhandled_exception_handler)
|
|
|
|
}
|