// Copyright (c) 2012 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "base/debug/stack_trace.h" #include #include #include #include "base/basictypes.h" #include "base/logging.h" #include "base/memory/singleton.h" #include "base/process_util.h" #include "base/synchronization/lock.h" namespace base { namespace debug { namespace { // Previous unhandled filter. Will be called if not NULL when we intercept an // exception. Only used in unit tests. LPTOP_LEVEL_EXCEPTION_FILTER g_previous_filter = NULL; // Prints the exception call stack. // This is the unit tests exception filter. long WINAPI StackDumpExceptionFilter(EXCEPTION_POINTERS* info) { debug::StackTrace(info).PrintBacktrace(); if (g_previous_filter) return g_previous_filter(info); return EXCEPTION_CONTINUE_SEARCH; } // SymbolContext is a threadsafe singleton that wraps the DbgHelp Sym* family // of functions. The Sym* family of functions may only be invoked by one // thread at a time. SymbolContext code may access a symbol server over the // network while holding the lock for this singleton. In the case of high // latency, this code will adversely affect performance. // // There is also a known issue where this backtrace code can interact // badly with breakpad if breakpad is invoked in a separate thread while // we are using the Sym* functions. This is because breakpad does now // share a lock with this function. See this related bug: // // http://code.google.com/p/google-breakpad/issues/detail?id=311 // // This is a very unlikely edge case, and the current solution is to // just ignore it. class SymbolContext { public: static SymbolContext* GetInstance() { // We use a leaky singleton because code may call this during process // termination. return Singleton >::get(); } // Returns the error code of a failed initialization. DWORD init_error() const { return init_error_; } // For the given trace, attempts to resolve the symbols, and output a trace // to the ostream os. The format for each line of the backtrace is: // // SymbolName[0xAddress+Offset] (FileName:LineNo) // // This function should only be called if Init() has been called. We do not // LOG(FATAL) here because this code is called might be triggered by a // LOG(FATAL) itself. void OutputTraceToStream(const void* const* trace, size_t count, std::ostream* os) { base::AutoLock lock(lock_); for (size_t i = 0; (i < count) && os->good(); ++i) { const int kMaxNameLength = 256; DWORD_PTR frame = reinterpret_cast(trace[i]); // Code adapted from MSDN example: // http://msdn.microsoft.com/en-us/library/ms680578(VS.85).aspx ULONG64 buffer[ (sizeof(SYMBOL_INFO) + kMaxNameLength * sizeof(wchar_t) + sizeof(ULONG64) - 1) / sizeof(ULONG64)]; memset(buffer, 0, sizeof(buffer)); // Initialize symbol information retrieval structures. DWORD64 sym_displacement = 0; PSYMBOL_INFO symbol = reinterpret_cast(&buffer[0]); symbol->SizeOfStruct = sizeof(SYMBOL_INFO); symbol->MaxNameLen = kMaxNameLength - 1; BOOL has_symbol = SymFromAddr(GetCurrentProcess(), frame, &sym_displacement, symbol); // Attempt to retrieve line number information. DWORD line_displacement = 0; IMAGEHLP_LINE64 line = {}; line.SizeOfStruct = sizeof(IMAGEHLP_LINE64); BOOL has_line = SymGetLineFromAddr64(GetCurrentProcess(), frame, &line_displacement, &line); // Output the backtrace line. (*os) << "\t"; if (has_symbol) { (*os) << symbol->Name << " [0x" << trace[i] << "+" << sym_displacement << "]"; } else { // If there is no symbol information, add a spacer. (*os) << "(No symbol) [0x" << trace[i] << "]"; } if (has_line) { (*os) << " (" << line.FileName << ":" << line.LineNumber << ")"; } (*os) << "\n"; } } private: friend struct DefaultSingletonTraits; SymbolContext() : init_error_(ERROR_SUCCESS) { // Initializes the symbols for the process. // Defer symbol load until they're needed, use undecorated names, and // get line numbers. SymSetOptions(SYMOPT_DEFERRED_LOADS | SYMOPT_UNDNAME | SYMOPT_LOAD_LINES); if (SymInitialize(GetCurrentProcess(), NULL, TRUE)) { init_error_ = ERROR_SUCCESS; } else { init_error_ = GetLastError(); // TODO(awong): Handle error: SymInitialize can fail with // ERROR_INVALID_PARAMETER. // When it fails, we should not call debugbreak since it kills the current // process (prevents future tests from running or kills the browser // process). DLOG(ERROR) << "SymInitialize failed: " << init_error_; } } DWORD init_error_; base::Lock lock_; DISALLOW_COPY_AND_ASSIGN(SymbolContext); }; } // namespace bool EnableInProcessStackDumping() { // Add stack dumping support on exception on windows. Similar to OS_POSIX // signal() handling in process_util_posix.cc. g_previous_filter = SetUnhandledExceptionFilter(&StackDumpExceptionFilter); RouteStdioToConsole(); return true; } // Disable optimizations for the StackTrace::StackTrace function. It is // important to disable at least frame pointer optimization ("y"), since // that breaks CaptureStackBackTrace() and prevents StackTrace from working // in Release builds (it may still be janky if other frames are using FPO, // but at least it will make it further). #if defined(COMPILER_MSVC) #pragma optimize("", off) #endif StackTrace::StackTrace() { // When walking our own stack, use CaptureStackBackTrace(). count_ = CaptureStackBackTrace(0, arraysize(trace_), trace_, NULL); } #if defined(COMPILER_MSVC) #pragma optimize("", on) #endif StackTrace::StackTrace(EXCEPTION_POINTERS* exception_pointers) { // When walking an exception stack, we need to use StackWalk64(). count_ = 0; // Initialize stack walking. STACKFRAME64 stack_frame; memset(&stack_frame, 0, sizeof(stack_frame)); #if defined(_WIN64) int machine_type = IMAGE_FILE_MACHINE_AMD64; stack_frame.AddrPC.Offset = exception_pointers->ContextRecord->Rip; stack_frame.AddrFrame.Offset = exception_pointers->ContextRecord->Rbp; stack_frame.AddrStack.Offset = exception_pointers->ContextRecord->Rsp; #else int machine_type = IMAGE_FILE_MACHINE_I386; stack_frame.AddrPC.Offset = exception_pointers->ContextRecord->Eip; stack_frame.AddrFrame.Offset = exception_pointers->ContextRecord->Ebp; stack_frame.AddrStack.Offset = exception_pointers->ContextRecord->Esp; #endif stack_frame.AddrPC.Mode = AddrModeFlat; stack_frame.AddrFrame.Mode = AddrModeFlat; stack_frame.AddrStack.Mode = AddrModeFlat; while (StackWalk64(machine_type, GetCurrentProcess(), GetCurrentThread(), &stack_frame, exception_pointers->ContextRecord, NULL, &SymFunctionTableAccess64, &SymGetModuleBase64, NULL) && count_ < arraysize(trace_)) { trace_[count_++] = reinterpret_cast(stack_frame.AddrPC.Offset); } for (size_t i = count_; i < arraysize(trace_); ++i) trace_[i] = NULL; } void StackTrace::PrintBacktrace() const { OutputToStream(&std::cerr); } void StackTrace::OutputToStream(std::ostream* os) const { SymbolContext* context = SymbolContext::GetInstance(); DWORD error = context->init_error(); if (error != ERROR_SUCCESS) { (*os) << "Error initializing symbols (" << error << "). Dumping unresolved backtrace:\n"; for (int i = 0; (i < count_) && os->good(); ++i) { (*os) << "\t" << trace_[i] << "\n"; } } else { (*os) << "Backtrace:\n"; context->OutputTraceToStream(trace_, count_, os); } } } // namespace debug } // namespace base