mirror of
https://github.com/ziglang/zig.git
synced 2024-11-15 08:33:06 +00:00
487ee79ec9
getIntrinsic gets the return type wrong so we have to add the function manually
1850 lines
70 KiB
Zig
1850 lines
70 KiB
Zig
const std = @import("std.zig");
|
|
const builtin = @import("builtin");
|
|
const math = std.math;
|
|
const mem = std.mem;
|
|
const io = std.io;
|
|
const os = std.os;
|
|
const fs = std.fs;
|
|
const process = std.process;
|
|
const testing = std.testing;
|
|
const elf = std.elf;
|
|
const DW = std.dwarf;
|
|
const macho = std.macho;
|
|
const coff = std.coff;
|
|
const pdb = std.pdb;
|
|
const ArrayList = std.ArrayList;
|
|
const root = @import("root");
|
|
const maxInt = std.math.maxInt;
|
|
const File = std.fs.File;
|
|
const windows = std.os.windows;
|
|
const native_arch = builtin.cpu.arch;
|
|
const native_os = builtin.os.tag;
|
|
const native_endian = native_arch.endian();
|
|
|
|
pub const runtime_safety = switch (builtin.mode) {
|
|
.Debug, .ReleaseSafe => true,
|
|
.ReleaseFast, .ReleaseSmall => false,
|
|
};
|
|
|
|
pub const LineInfo = struct {
|
|
line: u64,
|
|
column: u64,
|
|
file_name: []const u8,
|
|
allocator: ?mem.Allocator,
|
|
|
|
pub fn deinit(self: LineInfo) void {
|
|
const allocator = self.allocator orelse return;
|
|
allocator.free(self.file_name);
|
|
}
|
|
};
|
|
|
|
pub const SymbolInfo = struct {
|
|
symbol_name: []const u8 = "???",
|
|
compile_unit_name: []const u8 = "???",
|
|
line_info: ?LineInfo = null,
|
|
|
|
pub fn deinit(self: @This()) void {
|
|
if (self.line_info) |li| {
|
|
li.deinit();
|
|
}
|
|
}
|
|
};
|
|
const PdbOrDwarf = union(enum) {
|
|
pdb: pdb.Pdb,
|
|
dwarf: DW.DwarfInfo,
|
|
};
|
|
|
|
var stderr_mutex = std.Thread.Mutex{};
|
|
|
|
pub const warn = @compileError("deprecated; use `std.log` functions for logging or `std.debug.print` for 'printf debugging'");
|
|
|
|
/// Print to stderr, unbuffered, and silently returning on failure. Intended
|
|
/// for use in "printf debugging." Use `std.log` functions for proper logging.
|
|
pub fn print(comptime fmt: []const u8, args: anytype) void {
|
|
stderr_mutex.lock();
|
|
defer stderr_mutex.unlock();
|
|
const stderr = io.getStdErr().writer();
|
|
nosuspend stderr.print(fmt, args) catch return;
|
|
}
|
|
|
|
/// Indicates code that is unfinshed. It will throw a compiler error by default in Release mode.
|
|
/// This behaviour can be controlled with `root.allow_todo_in_release`.
|
|
pub fn todo(comptime desc: []const u8) noreturn {
|
|
if (builtin.mode != .Debug and !(@hasDecl(root, "allow_todo_in_release") and root.allow_todo_in_release)) {
|
|
@compileError("TODO: " ++ desc);
|
|
}
|
|
@panic("TODO: " ++ desc);
|
|
}
|
|
|
|
pub fn getStderrMutex() *std.Thread.Mutex {
|
|
return &stderr_mutex;
|
|
}
|
|
|
|
/// TODO multithreaded awareness
|
|
var self_debug_info: ?DebugInfo = null;
|
|
|
|
pub fn getSelfDebugInfo() !*DebugInfo {
|
|
if (self_debug_info) |*info| {
|
|
return info;
|
|
} else {
|
|
self_debug_info = try openSelfDebugInfo(getDebugInfoAllocator());
|
|
return &self_debug_info.?;
|
|
}
|
|
}
|
|
|
|
pub fn detectTTYConfig() TTY.Config {
|
|
if (process.hasEnvVarConstant("ZIG_DEBUG_COLOR")) {
|
|
return .escape_codes;
|
|
} else if (process.hasEnvVarConstant("NO_COLOR")) {
|
|
return .no_color;
|
|
} else {
|
|
const stderr_file = io.getStdErr();
|
|
if (stderr_file.supportsAnsiEscapeCodes()) {
|
|
return .escape_codes;
|
|
} else if (native_os == .windows and stderr_file.isTty()) {
|
|
return .windows_api;
|
|
} else {
|
|
return .no_color;
|
|
}
|
|
}
|
|
}
|
|
|
|
/// Tries to print the current stack trace to stderr, unbuffered, and ignores any error returned.
|
|
/// TODO multithreaded awareness
|
|
pub fn dumpCurrentStackTrace(start_addr: ?usize) void {
|
|
nosuspend {
|
|
const stderr = io.getStdErr().writer();
|
|
if (builtin.strip_debug_info) {
|
|
stderr.print("Unable to dump stack trace: debug info stripped\n", .{}) catch return;
|
|
return;
|
|
}
|
|
const debug_info = getSelfDebugInfo() catch |err| {
|
|
stderr.print("Unable to dump stack trace: Unable to open debug info: {s}\n", .{@errorName(err)}) catch return;
|
|
return;
|
|
};
|
|
writeCurrentStackTrace(stderr, debug_info, detectTTYConfig(), start_addr) catch |err| {
|
|
stderr.print("Unable to dump stack trace: {s}\n", .{@errorName(err)}) catch return;
|
|
return;
|
|
};
|
|
}
|
|
}
|
|
|
|
/// Tries to print the stack trace starting from the supplied base pointer to stderr,
|
|
/// unbuffered, and ignores any error returned.
|
|
/// TODO multithreaded awareness
|
|
pub fn dumpStackTraceFromBase(bp: usize, ip: usize) void {
|
|
nosuspend {
|
|
const stderr = io.getStdErr().writer();
|
|
if (builtin.strip_debug_info) {
|
|
stderr.print("Unable to dump stack trace: debug info stripped\n", .{}) catch return;
|
|
return;
|
|
}
|
|
const debug_info = getSelfDebugInfo() catch |err| {
|
|
stderr.print("Unable to dump stack trace: Unable to open debug info: {s}\n", .{@errorName(err)}) catch return;
|
|
return;
|
|
};
|
|
const tty_config = detectTTYConfig();
|
|
printSourceAtAddress(debug_info, stderr, ip, tty_config) catch return;
|
|
var it = StackIterator.init(null, bp);
|
|
while (it.next()) |return_address| {
|
|
printSourceAtAddress(debug_info, stderr, return_address - 1, tty_config) catch return;
|
|
}
|
|
}
|
|
}
|
|
|
|
/// Returns a slice with the same pointer as addresses, with a potentially smaller len.
|
|
/// On Windows, when first_address is not null, we ask for at least 32 stack frames,
|
|
/// and then try to find the first address. If addresses.len is more than 32, we
|
|
/// capture that many stack frames exactly, and then look for the first address,
|
|
/// chopping off the irrelevant frames and shifting so that the returned addresses pointer
|
|
/// equals the passed in addresses pointer.
|
|
pub fn captureStackTrace(first_address: ?usize, stack_trace: *std.builtin.StackTrace) void {
|
|
if (native_os == .windows) {
|
|
const addrs = stack_trace.instruction_addresses;
|
|
const u32_addrs_len = @intCast(u32, addrs.len);
|
|
const first_addr = first_address orelse {
|
|
stack_trace.index = windows.ntdll.RtlCaptureStackBackTrace(
|
|
0,
|
|
u32_addrs_len,
|
|
@ptrCast(**anyopaque, addrs.ptr),
|
|
null,
|
|
);
|
|
return;
|
|
};
|
|
var addr_buf_stack: [32]usize = undefined;
|
|
const addr_buf = if (addr_buf_stack.len > addrs.len) addr_buf_stack[0..] else addrs;
|
|
const n = windows.ntdll.RtlCaptureStackBackTrace(0, u32_addrs_len, @ptrCast(**anyopaque, addr_buf.ptr), null);
|
|
const first_index = for (addr_buf[0..n]) |addr, i| {
|
|
if (addr == first_addr) {
|
|
break i;
|
|
}
|
|
} else {
|
|
stack_trace.index = 0;
|
|
return;
|
|
};
|
|
const slice = addr_buf[first_index..n];
|
|
// We use a for loop here because slice and addrs may alias.
|
|
for (slice) |addr, i| {
|
|
addrs[i] = addr;
|
|
}
|
|
stack_trace.index = slice.len;
|
|
} else {
|
|
var it = StackIterator.init(first_address, null);
|
|
for (stack_trace.instruction_addresses) |*addr, i| {
|
|
addr.* = it.next() orelse {
|
|
stack_trace.index = i;
|
|
return;
|
|
};
|
|
}
|
|
stack_trace.index = stack_trace.instruction_addresses.len;
|
|
}
|
|
}
|
|
|
|
/// Tries to print a stack trace to stderr, unbuffered, and ignores any error returned.
|
|
/// TODO multithreaded awareness
|
|
pub fn dumpStackTrace(stack_trace: std.builtin.StackTrace) void {
|
|
nosuspend {
|
|
const stderr = io.getStdErr().writer();
|
|
if (builtin.strip_debug_info) {
|
|
stderr.print("Unable to dump stack trace: debug info stripped\n", .{}) catch return;
|
|
return;
|
|
}
|
|
const debug_info = getSelfDebugInfo() catch |err| {
|
|
stderr.print("Unable to dump stack trace: Unable to open debug info: {s}\n", .{@errorName(err)}) catch return;
|
|
return;
|
|
};
|
|
writeStackTrace(stack_trace, stderr, getDebugInfoAllocator(), debug_info, detectTTYConfig()) catch |err| {
|
|
stderr.print("Unable to dump stack trace: {s}\n", .{@errorName(err)}) catch return;
|
|
return;
|
|
};
|
|
}
|
|
}
|
|
|
|
/// This function invokes undefined behavior when `ok` is `false`.
|
|
/// In Debug and ReleaseSafe modes, calls to this function are always
|
|
/// generated, and the `unreachable` statement triggers a panic.
|
|
/// In ReleaseFast and ReleaseSmall modes, calls to this function are
|
|
/// optimized away, and in fact the optimizer is able to use the assertion
|
|
/// in its heuristics.
|
|
/// Inside a test block, it is best to use the `std.testing` module rather
|
|
/// than this function, because this function may not detect a test failure
|
|
/// in ReleaseFast and ReleaseSmall mode. Outside of a test block, this assert
|
|
/// function is the correct function to use.
|
|
pub fn assert(ok: bool) void {
|
|
if (!ok) unreachable; // assertion failure
|
|
}
|
|
|
|
pub fn panic(comptime format: []const u8, args: anytype) noreturn {
|
|
@setCold(true);
|
|
|
|
panicExtra(null, format, args);
|
|
}
|
|
|
|
/// `panicExtra` is useful when you want to print out an `@errorReturnTrace`
|
|
/// and also print out some values.
|
|
pub fn panicExtra(
|
|
trace: ?*std.builtin.StackTrace,
|
|
comptime format: []const u8,
|
|
args: anytype,
|
|
) noreturn {
|
|
@setCold(true);
|
|
|
|
const size = 0x1000;
|
|
const trunc_msg = "(msg truncated)";
|
|
var buf: [size + trunc_msg.len]u8 = undefined;
|
|
// a minor annoyance with this is that it will result in the NoSpaceLeft
|
|
// error being part of the @panic stack trace (but that error should
|
|
// only happen rarely)
|
|
const msg = std.fmt.bufPrint(buf[0..size], format, args) catch |err| switch (err) {
|
|
std.fmt.BufPrintError.NoSpaceLeft => blk: {
|
|
std.mem.copy(u8, buf[size..], trunc_msg);
|
|
break :blk &buf;
|
|
},
|
|
};
|
|
std.builtin.panic(msg, trace);
|
|
}
|
|
|
|
/// Non-zero whenever the program triggered a panic.
|
|
/// The counter is incremented/decremented atomically.
|
|
var panicking: u8 = 0;
|
|
|
|
// Locked to avoid interleaving panic messages from multiple threads.
|
|
var panic_mutex = std.Thread.Mutex{};
|
|
|
|
/// Counts how many times the panic handler is invoked by this thread.
|
|
/// This is used to catch and handle panics triggered by the panic handler.
|
|
threadlocal var panic_stage: usize = 0;
|
|
|
|
// `panicImpl` could be useful in implementing a custom panic handler which
|
|
// calls the default handler (on supported platforms)
|
|
pub fn panicImpl(trace: ?*const std.builtin.StackTrace, first_trace_addr: ?usize, msg: []const u8) noreturn {
|
|
@setCold(true);
|
|
|
|
if (enable_segfault_handler) {
|
|
// If a segfault happens while panicking, we want it to actually segfault, not trigger
|
|
// the handler.
|
|
resetSegfaultHandler();
|
|
}
|
|
|
|
nosuspend switch (panic_stage) {
|
|
0 => {
|
|
panic_stage = 1;
|
|
|
|
_ = @atomicRmw(u8, &panicking, .Add, 1, .SeqCst);
|
|
|
|
// Make sure to release the mutex when done
|
|
{
|
|
panic_mutex.lock();
|
|
defer panic_mutex.unlock();
|
|
|
|
const stderr = io.getStdErr().writer();
|
|
if (builtin.single_threaded) {
|
|
stderr.print("panic: ", .{}) catch os.abort();
|
|
} else {
|
|
const current_thread_id = std.Thread.getCurrentId();
|
|
stderr.print("thread {} panic: ", .{current_thread_id}) catch os.abort();
|
|
}
|
|
stderr.print("{s}\n", .{msg}) catch os.abort();
|
|
if (trace) |t| {
|
|
dumpStackTrace(t.*);
|
|
}
|
|
dumpCurrentStackTrace(first_trace_addr);
|
|
}
|
|
|
|
if (@atomicRmw(u8, &panicking, .Sub, 1, .SeqCst) != 1) {
|
|
// Another thread is panicking, wait for the last one to finish
|
|
// and call abort()
|
|
|
|
// Sleep forever without hammering the CPU
|
|
var event: std.Thread.StaticResetEvent = .{};
|
|
event.wait();
|
|
unreachable;
|
|
}
|
|
},
|
|
1 => {
|
|
panic_stage = 2;
|
|
|
|
// A panic happened while trying to print a previous panic message,
|
|
// we're still holding the mutex but that's fine as we're going to
|
|
// call abort()
|
|
const stderr = io.getStdErr().writer();
|
|
stderr.print("Panicked during a panic. Aborting.\n", .{}) catch os.abort();
|
|
},
|
|
else => {
|
|
// Panicked while printing "Panicked during a panic."
|
|
},
|
|
};
|
|
|
|
os.abort();
|
|
}
|
|
|
|
const RED = "\x1b[31;1m";
|
|
const GREEN = "\x1b[32;1m";
|
|
const CYAN = "\x1b[36;1m";
|
|
const WHITE = "\x1b[37;1m";
|
|
const BOLD = "\x1b[1m";
|
|
const DIM = "\x1b[2m";
|
|
const RESET = "\x1b[0m";
|
|
|
|
pub fn writeStackTrace(
|
|
stack_trace: std.builtin.StackTrace,
|
|
out_stream: anytype,
|
|
allocator: mem.Allocator,
|
|
debug_info: *DebugInfo,
|
|
tty_config: TTY.Config,
|
|
) !void {
|
|
_ = allocator;
|
|
if (builtin.strip_debug_info) return error.MissingDebugInfo;
|
|
var frame_index: usize = 0;
|
|
var frames_left: usize = std.math.min(stack_trace.index, stack_trace.instruction_addresses.len);
|
|
|
|
while (frames_left != 0) : ({
|
|
frames_left -= 1;
|
|
frame_index = (frame_index + 1) % stack_trace.instruction_addresses.len;
|
|
}) {
|
|
const return_address = stack_trace.instruction_addresses[frame_index];
|
|
try printSourceAtAddress(debug_info, out_stream, return_address - 1, tty_config);
|
|
}
|
|
}
|
|
|
|
pub const StackIterator = struct {
|
|
// Skip every frame before this address is found.
|
|
first_address: ?usize,
|
|
// Last known value of the frame pointer register.
|
|
fp: usize,
|
|
|
|
pub fn init(first_address: ?usize, fp: ?usize) StackIterator {
|
|
if (native_arch == .sparcv9) {
|
|
// Flush all the register windows on stack.
|
|
asm volatile (
|
|
\\ flushw
|
|
::: "memory");
|
|
}
|
|
|
|
return StackIterator{
|
|
.first_address = first_address,
|
|
.fp = fp orelse @frameAddress(),
|
|
};
|
|
}
|
|
|
|
// Offset of the saved BP wrt the frame pointer.
|
|
const fp_offset = if (native_arch.isRISCV())
|
|
// On RISC-V the frame pointer points to the top of the saved register
|
|
// area, on pretty much every other architecture it points to the stack
|
|
// slot where the previous frame pointer is saved.
|
|
2 * @sizeOf(usize)
|
|
else if (native_arch.isSPARC())
|
|
// On SPARC the previous frame pointer is stored at 14 slots past %fp+BIAS.
|
|
14 * @sizeOf(usize)
|
|
else
|
|
0;
|
|
|
|
const fp_bias = if (native_arch.isSPARC())
|
|
// On SPARC frame pointers are biased by a constant.
|
|
2047
|
|
else
|
|
0;
|
|
|
|
// Positive offset of the saved PC wrt the frame pointer.
|
|
const pc_offset = if (native_arch == .powerpc64le)
|
|
2 * @sizeOf(usize)
|
|
else
|
|
@sizeOf(usize);
|
|
|
|
pub fn next(self: *StackIterator) ?usize {
|
|
var address = self.next_internal() orelse return null;
|
|
|
|
if (self.first_address) |first_address| {
|
|
while (address != first_address) {
|
|
address = self.next_internal() orelse return null;
|
|
}
|
|
self.first_address = null;
|
|
}
|
|
|
|
return address;
|
|
}
|
|
|
|
fn isValidMemory(address: usize) bool {
|
|
// We are unable to determine validity of memory for freestanding targets
|
|
if (native_os == .freestanding) return true;
|
|
|
|
const aligned_address = address & ~@intCast(usize, (mem.page_size - 1));
|
|
|
|
// If the address does not span 2 pages, query only the first one
|
|
const length: usize = if (aligned_address == address) mem.page_size else 2 * mem.page_size;
|
|
|
|
const aligned_memory = @intToPtr([*]align(mem.page_size) u8, aligned_address)[0..length];
|
|
|
|
if (native_os != .windows) {
|
|
if (native_os != .wasi) {
|
|
os.msync(aligned_memory, os.MSF.ASYNC) catch |err| {
|
|
switch (err) {
|
|
os.MSyncError.UnmappedMemory => {
|
|
return false;
|
|
},
|
|
else => unreachable,
|
|
}
|
|
};
|
|
}
|
|
|
|
return true;
|
|
} else {
|
|
const w = os.windows;
|
|
var memory_info: w.MEMORY_BASIC_INFORMATION = undefined;
|
|
//const memory_info_ptr = @ptrCast(w.PMEMORY_BASIC_INFORMATION, buffer);
|
|
|
|
// The only error this function can throw is ERROR_INVALID_PARAMETER.
|
|
// supply an address that invalid i'll be thrown.
|
|
const rc = w.VirtualQuery(aligned_memory.ptr, &memory_info, aligned_memory.len) catch {
|
|
return false;
|
|
};
|
|
|
|
// Result code has to be bigger than zero (number of bytes written)
|
|
if (rc == 0) {
|
|
return false;
|
|
}
|
|
|
|
// Free pages cannot be read, they are unmapped
|
|
if (memory_info.State == w.MEM_FREE) {
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
}
|
|
|
|
fn next_internal(self: *StackIterator) ?usize {
|
|
const fp = if (comptime native_arch.isSPARC())
|
|
// On SPARC the offset is positive. (!)
|
|
math.add(usize, self.fp, fp_offset) catch return null
|
|
else
|
|
math.sub(usize, self.fp, fp_offset) catch return null;
|
|
|
|
// Sanity check.
|
|
if (fp == 0 or !mem.isAligned(fp, @alignOf(usize)) or !isValidMemory(fp))
|
|
return null;
|
|
|
|
const new_fp = math.add(usize, @intToPtr(*const usize, fp).*, fp_bias) catch return null;
|
|
|
|
// Sanity check: the stack grows down thus all the parent frames must be
|
|
// be at addresses that are greater (or equal) than the previous one.
|
|
// A zero frame pointer often signals this is the last frame, that case
|
|
// is gracefully handled by the next call to next_internal.
|
|
if (new_fp != 0 and new_fp < self.fp)
|
|
return null;
|
|
|
|
const new_pc = @intToPtr(
|
|
*const usize,
|
|
math.add(usize, fp, pc_offset) catch return null,
|
|
).*;
|
|
|
|
self.fp = new_fp;
|
|
|
|
return new_pc;
|
|
}
|
|
};
|
|
|
|
pub fn writeCurrentStackTrace(
|
|
out_stream: anytype,
|
|
debug_info: *DebugInfo,
|
|
tty_config: TTY.Config,
|
|
start_addr: ?usize,
|
|
) !void {
|
|
if (native_os == .windows) {
|
|
return writeCurrentStackTraceWindows(out_stream, debug_info, tty_config, start_addr);
|
|
}
|
|
var it = StackIterator.init(start_addr, null);
|
|
while (it.next()) |return_address| {
|
|
// On arm64 macOS, the address of the last frame is 0x0 rather than 0x1 as on x86_64 macOS,
|
|
// therefore, we do a check for `return_address == 0` before subtracting 1 from it to avoid
|
|
// an overflow. We do not need to signal `StackIterator` as it will correctly detect this
|
|
// condition on the subsequent iteration and return `null` thus terminating the loop.
|
|
const address = if (return_address == 0) return_address else return_address - 1;
|
|
try printSourceAtAddress(debug_info, out_stream, address, tty_config);
|
|
}
|
|
}
|
|
|
|
pub fn writeCurrentStackTraceWindows(
|
|
out_stream: anytype,
|
|
debug_info: *DebugInfo,
|
|
tty_config: TTY.Config,
|
|
start_addr: ?usize,
|
|
) !void {
|
|
var addr_buf: [1024]usize = undefined;
|
|
const n = windows.ntdll.RtlCaptureStackBackTrace(0, addr_buf.len, @ptrCast(**anyopaque, &addr_buf), null);
|
|
const addrs = addr_buf[0..n];
|
|
var start_i: usize = if (start_addr) |saddr| blk: {
|
|
for (addrs) |addr, i| {
|
|
if (addr == saddr) break :blk i;
|
|
}
|
|
return;
|
|
} else 0;
|
|
for (addrs[start_i..]) |addr| {
|
|
try printSourceAtAddress(debug_info, out_stream, addr - 1, tty_config);
|
|
}
|
|
}
|
|
|
|
pub const TTY = struct {
|
|
pub const Color = enum {
|
|
Red,
|
|
Green,
|
|
Cyan,
|
|
White,
|
|
Dim,
|
|
Bold,
|
|
Reset,
|
|
};
|
|
|
|
pub const Config = enum {
|
|
no_color,
|
|
escape_codes,
|
|
// TODO give this a payload of file handle
|
|
windows_api,
|
|
|
|
pub fn setColor(conf: Config, out_stream: anytype, color: Color) void {
|
|
nosuspend switch (conf) {
|
|
.no_color => return,
|
|
.escape_codes => switch (color) {
|
|
.Red => out_stream.writeAll(RED) catch return,
|
|
.Green => out_stream.writeAll(GREEN) catch return,
|
|
.Cyan => out_stream.writeAll(CYAN) catch return,
|
|
.White => out_stream.writeAll(WHITE) catch return,
|
|
.Dim => out_stream.writeAll(DIM) catch return,
|
|
.Bold => out_stream.writeAll(BOLD) catch return,
|
|
.Reset => out_stream.writeAll(RESET) catch return,
|
|
},
|
|
.windows_api => if (native_os == .windows) {
|
|
const stderr_file = io.getStdErr();
|
|
const S = struct {
|
|
var attrs: windows.WORD = undefined;
|
|
var init_attrs = false;
|
|
};
|
|
if (!S.init_attrs) {
|
|
S.init_attrs = true;
|
|
var info: windows.CONSOLE_SCREEN_BUFFER_INFO = undefined;
|
|
// TODO handle error
|
|
_ = windows.kernel32.GetConsoleScreenBufferInfo(stderr_file.handle, &info);
|
|
S.attrs = info.wAttributes;
|
|
}
|
|
|
|
// TODO handle errors
|
|
switch (color) {
|
|
.Red => {
|
|
_ = windows.SetConsoleTextAttribute(stderr_file.handle, windows.FOREGROUND_RED | windows.FOREGROUND_INTENSITY) catch {};
|
|
},
|
|
.Green => {
|
|
_ = windows.SetConsoleTextAttribute(stderr_file.handle, windows.FOREGROUND_GREEN | windows.FOREGROUND_INTENSITY) catch {};
|
|
},
|
|
.Cyan => {
|
|
_ = windows.SetConsoleTextAttribute(stderr_file.handle, windows.FOREGROUND_GREEN | windows.FOREGROUND_BLUE | windows.FOREGROUND_INTENSITY) catch {};
|
|
},
|
|
.White, .Bold => {
|
|
_ = windows.SetConsoleTextAttribute(stderr_file.handle, windows.FOREGROUND_RED | windows.FOREGROUND_GREEN | windows.FOREGROUND_BLUE | windows.FOREGROUND_INTENSITY) catch {};
|
|
},
|
|
.Dim => {
|
|
_ = windows.SetConsoleTextAttribute(stderr_file.handle, windows.FOREGROUND_INTENSITY) catch {};
|
|
},
|
|
.Reset => {
|
|
_ = windows.SetConsoleTextAttribute(stderr_file.handle, S.attrs) catch {};
|
|
},
|
|
}
|
|
} else {
|
|
unreachable;
|
|
},
|
|
};
|
|
}
|
|
};
|
|
};
|
|
|
|
fn machoSearchSymbols(symbols: []const MachoSymbol, address: usize) ?*const MachoSymbol {
|
|
var min: usize = 0;
|
|
var max: usize = symbols.len - 1;
|
|
while (min < max) {
|
|
const mid = min + (max - min) / 2;
|
|
const curr = &symbols[mid];
|
|
const next = &symbols[mid + 1];
|
|
if (address >= next.address()) {
|
|
min = mid + 1;
|
|
} else if (address < curr.address()) {
|
|
max = mid;
|
|
} else {
|
|
return curr;
|
|
}
|
|
}
|
|
|
|
const max_sym = &symbols[symbols.len - 1];
|
|
if (address >= max_sym.address())
|
|
return max_sym;
|
|
|
|
return null;
|
|
}
|
|
|
|
test "machoSearchSymbols" {
|
|
const symbols = [_]MachoSymbol{
|
|
.{ .addr = 100, .strx = undefined, .size = undefined, .ofile = undefined },
|
|
.{ .addr = 200, .strx = undefined, .size = undefined, .ofile = undefined },
|
|
.{ .addr = 300, .strx = undefined, .size = undefined, .ofile = undefined },
|
|
};
|
|
|
|
try testing.expectEqual(@as(?*const MachoSymbol, null), machoSearchSymbols(&symbols, 0));
|
|
try testing.expectEqual(@as(?*const MachoSymbol, null), machoSearchSymbols(&symbols, 99));
|
|
try testing.expectEqual(&symbols[0], machoSearchSymbols(&symbols, 100).?);
|
|
try testing.expectEqual(&symbols[0], machoSearchSymbols(&symbols, 150).?);
|
|
try testing.expectEqual(&symbols[0], machoSearchSymbols(&symbols, 199).?);
|
|
|
|
try testing.expectEqual(&symbols[1], machoSearchSymbols(&symbols, 200).?);
|
|
try testing.expectEqual(&symbols[1], machoSearchSymbols(&symbols, 250).?);
|
|
try testing.expectEqual(&symbols[1], machoSearchSymbols(&symbols, 299).?);
|
|
|
|
try testing.expectEqual(&symbols[2], machoSearchSymbols(&symbols, 300).?);
|
|
try testing.expectEqual(&symbols[2], machoSearchSymbols(&symbols, 301).?);
|
|
try testing.expectEqual(&symbols[2], machoSearchSymbols(&symbols, 5000).?);
|
|
}
|
|
|
|
/// TODO resources https://github.com/ziglang/zig/issues/4353
|
|
pub fn printSourceAtAddress(debug_info: *DebugInfo, out_stream: anytype, address: usize, tty_config: TTY.Config) !void {
|
|
const module = debug_info.getModuleForAddress(address) catch |err| switch (err) {
|
|
error.MissingDebugInfo, error.InvalidDebugInfo => {
|
|
return printLineInfo(
|
|
out_stream,
|
|
null,
|
|
address,
|
|
"???",
|
|
"???",
|
|
tty_config,
|
|
printLineFromFileAnyOs,
|
|
);
|
|
},
|
|
else => return err,
|
|
};
|
|
|
|
const symbol_info = try module.getSymbolAtAddress(address);
|
|
defer symbol_info.deinit();
|
|
|
|
return printLineInfo(
|
|
out_stream,
|
|
symbol_info.line_info,
|
|
address,
|
|
symbol_info.symbol_name,
|
|
symbol_info.compile_unit_name,
|
|
tty_config,
|
|
printLineFromFileAnyOs,
|
|
);
|
|
}
|
|
|
|
fn printLineInfo(
|
|
out_stream: anytype,
|
|
line_info: ?LineInfo,
|
|
address: usize,
|
|
symbol_name: []const u8,
|
|
compile_unit_name: []const u8,
|
|
tty_config: TTY.Config,
|
|
comptime printLineFromFile: anytype,
|
|
) !void {
|
|
nosuspend {
|
|
tty_config.setColor(out_stream, .Bold);
|
|
|
|
if (line_info) |*li| {
|
|
try out_stream.print("{s}:{d}:{d}", .{ li.file_name, li.line, li.column });
|
|
} else {
|
|
try out_stream.writeAll("???:?:?");
|
|
}
|
|
|
|
tty_config.setColor(out_stream, .Reset);
|
|
try out_stream.writeAll(": ");
|
|
tty_config.setColor(out_stream, .Dim);
|
|
try out_stream.print("0x{x} in {s} ({s})", .{ address, symbol_name, compile_unit_name });
|
|
tty_config.setColor(out_stream, .Reset);
|
|
try out_stream.writeAll("\n");
|
|
|
|
// Show the matching source code line if possible
|
|
if (line_info) |li| {
|
|
if (printLineFromFile(out_stream, li)) {
|
|
if (li.column > 0) {
|
|
// The caret already takes one char
|
|
const space_needed = @intCast(usize, li.column - 1);
|
|
|
|
try out_stream.writeByteNTimes(' ', space_needed);
|
|
tty_config.setColor(out_stream, .Green);
|
|
try out_stream.writeAll("^");
|
|
tty_config.setColor(out_stream, .Reset);
|
|
}
|
|
try out_stream.writeAll("\n");
|
|
} else |err| switch (err) {
|
|
error.EndOfFile, error.FileNotFound => {},
|
|
error.BadPathName => {},
|
|
error.AccessDenied => {},
|
|
else => return err,
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// TODO use this
|
|
pub const OpenSelfDebugInfoError = error{
|
|
MissingDebugInfo,
|
|
OutOfMemory,
|
|
UnsupportedOperatingSystem,
|
|
};
|
|
|
|
/// TODO resources https://github.com/ziglang/zig/issues/4353
|
|
pub fn openSelfDebugInfo(allocator: mem.Allocator) anyerror!DebugInfo {
|
|
nosuspend {
|
|
if (builtin.strip_debug_info)
|
|
return error.MissingDebugInfo;
|
|
if (@hasDecl(root, "os") and @hasDecl(root.os, "debug") and @hasDecl(root.os.debug, "openSelfDebugInfo")) {
|
|
return root.os.debug.openSelfDebugInfo(allocator);
|
|
}
|
|
switch (native_os) {
|
|
.linux,
|
|
.freebsd,
|
|
.netbsd,
|
|
.dragonfly,
|
|
.openbsd,
|
|
.macos,
|
|
.windows,
|
|
.solaris,
|
|
=> return DebugInfo.init(allocator),
|
|
else => return error.UnsupportedDebugInfo,
|
|
}
|
|
}
|
|
}
|
|
|
|
/// This takes ownership of coff_file: users of this function should not close
|
|
/// it themselves, even on error.
|
|
/// TODO resources https://github.com/ziglang/zig/issues/4353
|
|
/// TODO it's weird to take ownership even on error, rework this code.
|
|
fn readCoffDebugInfo(allocator: mem.Allocator, coff_file: File) !ModuleDebugInfo {
|
|
nosuspend {
|
|
errdefer coff_file.close();
|
|
|
|
const coff_obj = try allocator.create(coff.Coff);
|
|
coff_obj.* = coff.Coff.init(allocator, coff_file);
|
|
|
|
var di = ModuleDebugInfo{
|
|
.base_address = undefined,
|
|
.coff = coff_obj,
|
|
.debug_data = undefined,
|
|
};
|
|
|
|
try di.coff.loadHeader();
|
|
try di.coff.loadSections();
|
|
if (di.coff.getSection(".debug_info")) |sec| {
|
|
// This coff file has embedded DWARF debug info
|
|
_ = sec;
|
|
// TODO: free the section data slices
|
|
const debug_info_data = di.coff.getSectionData(".debug_info", allocator) catch null;
|
|
const debug_abbrev_data = di.coff.getSectionData(".debug_abbrev", allocator) catch null;
|
|
const debug_str_data = di.coff.getSectionData(".debug_str", allocator) catch null;
|
|
const debug_line_data = di.coff.getSectionData(".debug_line", allocator) catch null;
|
|
const debug_ranges_data = di.coff.getSectionData(".debug_ranges", allocator) catch null;
|
|
|
|
var dwarf = DW.DwarfInfo{
|
|
.endian = native_endian,
|
|
.debug_info = debug_info_data orelse return error.MissingDebugInfo,
|
|
.debug_abbrev = debug_abbrev_data orelse return error.MissingDebugInfo,
|
|
.debug_str = debug_str_data orelse return error.MissingDebugInfo,
|
|
.debug_line = debug_line_data orelse return error.MissingDebugInfo,
|
|
.debug_ranges = debug_ranges_data,
|
|
};
|
|
try DW.openDwarfDebugInfo(&dwarf, allocator);
|
|
di.debug_data = PdbOrDwarf{ .dwarf = dwarf };
|
|
return di;
|
|
}
|
|
|
|
var path_buf: [windows.MAX_PATH]u8 = undefined;
|
|
const len = try di.coff.getPdbPath(path_buf[0..]);
|
|
const raw_path = path_buf[0..len];
|
|
|
|
const path = try fs.path.resolve(allocator, &[_][]const u8{raw_path});
|
|
defer allocator.free(path);
|
|
|
|
di.debug_data = PdbOrDwarf{ .pdb = undefined };
|
|
di.debug_data.pdb = try pdb.Pdb.init(allocator, path);
|
|
try di.debug_data.pdb.parseInfoStream();
|
|
try di.debug_data.pdb.parseDbiStream();
|
|
|
|
if (!mem.eql(u8, &di.coff.guid, &di.debug_data.pdb.guid) or di.coff.age != di.debug_data.pdb.age)
|
|
return error.InvalidDebugInfo;
|
|
|
|
return di;
|
|
}
|
|
}
|
|
|
|
fn chopSlice(ptr: []const u8, offset: u64, size: u64) ![]const u8 {
|
|
const start = try math.cast(usize, offset);
|
|
const end = start + try math.cast(usize, size);
|
|
return ptr[start..end];
|
|
}
|
|
|
|
/// This takes ownership of elf_file: users of this function should not close
|
|
/// it themselves, even on error.
|
|
/// TODO resources https://github.com/ziglang/zig/issues/4353
|
|
/// TODO it's weird to take ownership even on error, rework this code.
|
|
pub fn readElfDebugInfo(allocator: mem.Allocator, elf_file: File) !ModuleDebugInfo {
|
|
nosuspend {
|
|
const mapped_mem = try mapWholeFile(elf_file);
|
|
const hdr = @ptrCast(*const elf.Ehdr, &mapped_mem[0]);
|
|
if (!mem.eql(u8, hdr.e_ident[0..4], "\x7fELF")) return error.InvalidElfMagic;
|
|
if (hdr.e_ident[elf.EI_VERSION] != 1) return error.InvalidElfVersion;
|
|
|
|
const endian: std.builtin.Endian = switch (hdr.e_ident[elf.EI_DATA]) {
|
|
elf.ELFDATA2LSB => .Little,
|
|
elf.ELFDATA2MSB => .Big,
|
|
else => return error.InvalidElfEndian,
|
|
};
|
|
assert(endian == native_endian); // this is our own debug info
|
|
|
|
const shoff = hdr.e_shoff;
|
|
const str_section_off = shoff + @as(u64, hdr.e_shentsize) * @as(u64, hdr.e_shstrndx);
|
|
const str_shdr = @ptrCast(
|
|
*const elf.Shdr,
|
|
@alignCast(@alignOf(elf.Shdr), &mapped_mem[try math.cast(usize, str_section_off)]),
|
|
);
|
|
const header_strings = mapped_mem[str_shdr.sh_offset .. str_shdr.sh_offset + str_shdr.sh_size];
|
|
const shdrs = @ptrCast(
|
|
[*]const elf.Shdr,
|
|
@alignCast(@alignOf(elf.Shdr), &mapped_mem[shoff]),
|
|
)[0..hdr.e_shnum];
|
|
|
|
var opt_debug_info: ?[]const u8 = null;
|
|
var opt_debug_abbrev: ?[]const u8 = null;
|
|
var opt_debug_str: ?[]const u8 = null;
|
|
var opt_debug_line: ?[]const u8 = null;
|
|
var opt_debug_ranges: ?[]const u8 = null;
|
|
|
|
for (shdrs) |*shdr| {
|
|
if (shdr.sh_type == elf.SHT_NULL) continue;
|
|
|
|
const name = std.mem.span(std.meta.assumeSentinel(header_strings[shdr.sh_name..].ptr, 0));
|
|
if (mem.eql(u8, name, ".debug_info")) {
|
|
opt_debug_info = try chopSlice(mapped_mem, shdr.sh_offset, shdr.sh_size);
|
|
} else if (mem.eql(u8, name, ".debug_abbrev")) {
|
|
opt_debug_abbrev = try chopSlice(mapped_mem, shdr.sh_offset, shdr.sh_size);
|
|
} else if (mem.eql(u8, name, ".debug_str")) {
|
|
opt_debug_str = try chopSlice(mapped_mem, shdr.sh_offset, shdr.sh_size);
|
|
} else if (mem.eql(u8, name, ".debug_line")) {
|
|
opt_debug_line = try chopSlice(mapped_mem, shdr.sh_offset, shdr.sh_size);
|
|
} else if (mem.eql(u8, name, ".debug_ranges")) {
|
|
opt_debug_ranges = try chopSlice(mapped_mem, shdr.sh_offset, shdr.sh_size);
|
|
}
|
|
}
|
|
|
|
var di = DW.DwarfInfo{
|
|
.endian = endian,
|
|
.debug_info = opt_debug_info orelse return error.MissingDebugInfo,
|
|
.debug_abbrev = opt_debug_abbrev orelse return error.MissingDebugInfo,
|
|
.debug_str = opt_debug_str orelse return error.MissingDebugInfo,
|
|
.debug_line = opt_debug_line orelse return error.MissingDebugInfo,
|
|
.debug_ranges = opt_debug_ranges,
|
|
};
|
|
|
|
try DW.openDwarfDebugInfo(&di, allocator);
|
|
|
|
return ModuleDebugInfo{
|
|
.base_address = undefined,
|
|
.dwarf = di,
|
|
.mapped_memory = mapped_mem,
|
|
};
|
|
}
|
|
}
|
|
|
|
/// TODO resources https://github.com/ziglang/zig/issues/4353
|
|
/// This takes ownership of macho_file: users of this function should not close
|
|
/// it themselves, even on error.
|
|
/// TODO it's weird to take ownership even on error, rework this code.
|
|
fn readMachODebugInfo(allocator: mem.Allocator, macho_file: File) !ModuleDebugInfo {
|
|
const mapped_mem = try mapWholeFile(macho_file);
|
|
|
|
const hdr = @ptrCast(
|
|
*const macho.mach_header_64,
|
|
@alignCast(@alignOf(macho.mach_header_64), mapped_mem.ptr),
|
|
);
|
|
if (hdr.magic != macho.MH_MAGIC_64)
|
|
return error.InvalidDebugInfo;
|
|
|
|
const hdr_base = @ptrCast([*]const u8, hdr);
|
|
var ptr = hdr_base + @sizeOf(macho.mach_header_64);
|
|
var ncmd: u32 = hdr.ncmds;
|
|
const symtab = while (ncmd != 0) : (ncmd -= 1) {
|
|
const lc = @ptrCast(*const std.macho.load_command, ptr);
|
|
switch (lc.cmd) {
|
|
.SYMTAB => break @ptrCast(*const std.macho.symtab_command, ptr),
|
|
else => {},
|
|
}
|
|
ptr = @alignCast(@alignOf(std.macho.load_command), ptr + lc.cmdsize);
|
|
} else {
|
|
return error.MissingDebugInfo;
|
|
};
|
|
const syms = @ptrCast(
|
|
[*]const macho.nlist_64,
|
|
@alignCast(@alignOf(macho.nlist_64), hdr_base + symtab.symoff),
|
|
)[0..symtab.nsyms];
|
|
const strings = @ptrCast([*]const u8, hdr_base + symtab.stroff)[0 .. symtab.strsize - 1 :0];
|
|
|
|
const symbols_buf = try allocator.alloc(MachoSymbol, syms.len);
|
|
|
|
var ofile: u32 = undefined;
|
|
var last_sym: MachoSymbol = undefined;
|
|
var symbol_index: usize = 0;
|
|
var state: enum {
|
|
init,
|
|
oso_open,
|
|
oso_close,
|
|
bnsym,
|
|
fun_strx,
|
|
fun_size,
|
|
ensym,
|
|
} = .init;
|
|
|
|
for (syms) |*sym| {
|
|
if (!sym.stab()) continue;
|
|
|
|
// TODO handle globals N_GSYM, and statics N_STSYM
|
|
switch (sym.n_type) {
|
|
macho.N_OSO => {
|
|
switch (state) {
|
|
.init, .oso_close => {
|
|
state = .oso_open;
|
|
ofile = sym.n_strx;
|
|
},
|
|
else => return error.InvalidDebugInfo,
|
|
}
|
|
},
|
|
macho.N_BNSYM => {
|
|
switch (state) {
|
|
.oso_open, .ensym => {
|
|
state = .bnsym;
|
|
last_sym = .{
|
|
.strx = 0,
|
|
.addr = sym.n_value,
|
|
.size = 0,
|
|
.ofile = ofile,
|
|
};
|
|
},
|
|
else => return error.InvalidDebugInfo,
|
|
}
|
|
},
|
|
macho.N_FUN => {
|
|
switch (state) {
|
|
.bnsym => {
|
|
state = .fun_strx;
|
|
last_sym.strx = sym.n_strx;
|
|
},
|
|
.fun_strx => {
|
|
state = .fun_size;
|
|
last_sym.size = @intCast(u32, sym.n_value);
|
|
},
|
|
else => return error.InvalidDebugInfo,
|
|
}
|
|
},
|
|
macho.N_ENSYM => {
|
|
switch (state) {
|
|
.fun_size => {
|
|
state = .ensym;
|
|
symbols_buf[symbol_index] = last_sym;
|
|
symbol_index += 1;
|
|
},
|
|
else => return error.InvalidDebugInfo,
|
|
}
|
|
},
|
|
macho.N_SO => {
|
|
switch (state) {
|
|
.init, .oso_close => {},
|
|
.oso_open, .ensym => {
|
|
state = .oso_close;
|
|
},
|
|
else => return error.InvalidDebugInfo,
|
|
}
|
|
},
|
|
else => {},
|
|
}
|
|
}
|
|
assert(state == .oso_close);
|
|
|
|
const symbols = allocator.shrink(symbols_buf, symbol_index);
|
|
|
|
// Even though lld emits symbols in ascending order, this debug code
|
|
// should work for programs linked in any valid way.
|
|
// This sort is so that we can binary search later.
|
|
std.sort.sort(MachoSymbol, symbols, {}, MachoSymbol.addressLessThan);
|
|
|
|
return ModuleDebugInfo{
|
|
.base_address = undefined,
|
|
.mapped_memory = mapped_mem,
|
|
.ofiles = ModuleDebugInfo.OFileTable.init(allocator),
|
|
.symbols = symbols,
|
|
.strings = strings,
|
|
};
|
|
}
|
|
|
|
fn printLineFromFileAnyOs(out_stream: anytype, line_info: LineInfo) !void {
|
|
// Need this to always block even in async I/O mode, because this could potentially
|
|
// be called from e.g. the event loop code crashing.
|
|
var f = try fs.cwd().openFile(line_info.file_name, .{ .intended_io_mode = .blocking });
|
|
defer f.close();
|
|
// TODO fstat and make sure that the file has the correct size
|
|
|
|
var buf: [mem.page_size]u8 = undefined;
|
|
var line: usize = 1;
|
|
var column: usize = 1;
|
|
while (true) {
|
|
const amt_read = try f.read(buf[0..]);
|
|
const slice = buf[0..amt_read];
|
|
|
|
for (slice) |byte| {
|
|
if (line == line_info.line) {
|
|
try out_stream.writeByte(byte);
|
|
if (byte == '\n') {
|
|
return;
|
|
}
|
|
}
|
|
if (byte == '\n') {
|
|
line += 1;
|
|
column = 1;
|
|
} else {
|
|
column += 1;
|
|
}
|
|
}
|
|
|
|
if (amt_read < buf.len) return error.EndOfFile;
|
|
}
|
|
}
|
|
|
|
const MachoSymbol = struct {
|
|
strx: u32,
|
|
addr: u64,
|
|
size: u32,
|
|
ofile: u32,
|
|
|
|
/// Returns the address from the macho file
|
|
fn address(self: MachoSymbol) u64 {
|
|
return self.addr;
|
|
}
|
|
|
|
fn addressLessThan(context: void, lhs: MachoSymbol, rhs: MachoSymbol) bool {
|
|
_ = context;
|
|
return lhs.addr < rhs.addr;
|
|
}
|
|
};
|
|
|
|
/// `file` is expected to have been opened with .intended_io_mode == .blocking.
|
|
/// Takes ownership of file, even on error.
|
|
/// TODO it's weird to take ownership even on error, rework this code.
|
|
fn mapWholeFile(file: File) ![]align(mem.page_size) const u8 {
|
|
nosuspend {
|
|
defer file.close();
|
|
|
|
const file_len = try math.cast(usize, try file.getEndPos());
|
|
const mapped_mem = try os.mmap(
|
|
null,
|
|
file_len,
|
|
os.PROT.READ,
|
|
os.MAP.SHARED,
|
|
file.handle,
|
|
0,
|
|
);
|
|
errdefer os.munmap(mapped_mem);
|
|
|
|
return mapped_mem;
|
|
}
|
|
}
|
|
|
|
pub const DebugInfo = struct {
|
|
allocator: mem.Allocator,
|
|
address_map: std.AutoHashMap(usize, *ModuleDebugInfo),
|
|
|
|
pub fn init(allocator: mem.Allocator) DebugInfo {
|
|
return DebugInfo{
|
|
.allocator = allocator,
|
|
.address_map = std.AutoHashMap(usize, *ModuleDebugInfo).init(allocator),
|
|
};
|
|
}
|
|
|
|
pub fn deinit(self: *DebugInfo) void {
|
|
// TODO: resources https://github.com/ziglang/zig/issues/4353
|
|
self.address_map.deinit();
|
|
}
|
|
|
|
pub fn getModuleForAddress(self: *DebugInfo, address: usize) !*ModuleDebugInfo {
|
|
if (comptime builtin.target.isDarwin()) {
|
|
return self.lookupModuleDyld(address);
|
|
} else if (native_os == .windows) {
|
|
return self.lookupModuleWin32(address);
|
|
} else if (native_os == .haiku) {
|
|
return self.lookupModuleHaiku(address);
|
|
} else {
|
|
return self.lookupModuleDl(address);
|
|
}
|
|
}
|
|
|
|
fn lookupModuleDyld(self: *DebugInfo, address: usize) !*ModuleDebugInfo {
|
|
const image_count = std.c._dyld_image_count();
|
|
|
|
var i: u32 = 0;
|
|
while (i < image_count) : (i += 1) {
|
|
const base_address = std.c._dyld_get_image_vmaddr_slide(i);
|
|
|
|
if (address < base_address) continue;
|
|
|
|
const header = std.c._dyld_get_image_header(i) orelse continue;
|
|
// The array of load commands is right after the header
|
|
var cmd_ptr = @intToPtr([*]u8, @ptrToInt(header) + @sizeOf(macho.mach_header_64));
|
|
|
|
var cmds = header.ncmds;
|
|
while (cmds != 0) : (cmds -= 1) {
|
|
const lc = @ptrCast(
|
|
*macho.load_command,
|
|
@alignCast(@alignOf(macho.load_command), cmd_ptr),
|
|
);
|
|
cmd_ptr += lc.cmdsize;
|
|
if (lc.cmd != .SEGMENT_64) continue;
|
|
|
|
const segment_cmd = @ptrCast(
|
|
*const std.macho.segment_command_64,
|
|
@alignCast(@alignOf(std.macho.segment_command_64), lc),
|
|
);
|
|
|
|
const rebased_address = address - base_address;
|
|
const seg_start = segment_cmd.vmaddr;
|
|
const seg_end = seg_start + segment_cmd.vmsize;
|
|
|
|
if (rebased_address >= seg_start and rebased_address < seg_end) {
|
|
if (self.address_map.get(base_address)) |obj_di| {
|
|
return obj_di;
|
|
}
|
|
|
|
const obj_di = try self.allocator.create(ModuleDebugInfo);
|
|
errdefer self.allocator.destroy(obj_di);
|
|
|
|
const macho_path = mem.sliceTo(std.c._dyld_get_image_name(i), 0);
|
|
const macho_file = fs.cwd().openFile(macho_path, .{ .intended_io_mode = .blocking }) catch |err| switch (err) {
|
|
error.FileNotFound => return error.MissingDebugInfo,
|
|
else => return err,
|
|
};
|
|
obj_di.* = try readMachODebugInfo(self.allocator, macho_file);
|
|
obj_di.base_address = base_address;
|
|
|
|
try self.address_map.putNoClobber(base_address, obj_di);
|
|
|
|
return obj_di;
|
|
}
|
|
}
|
|
}
|
|
|
|
return error.MissingDebugInfo;
|
|
}
|
|
|
|
fn lookupModuleWin32(self: *DebugInfo, address: usize) !*ModuleDebugInfo {
|
|
const process_handle = windows.kernel32.GetCurrentProcess();
|
|
|
|
// Find how many modules are actually loaded
|
|
var dummy: windows.HMODULE = undefined;
|
|
var bytes_needed: windows.DWORD = undefined;
|
|
if (windows.kernel32.K32EnumProcessModules(
|
|
process_handle,
|
|
@ptrCast([*]windows.HMODULE, &dummy),
|
|
0,
|
|
&bytes_needed,
|
|
) == 0)
|
|
return error.MissingDebugInfo;
|
|
|
|
const needed_modules = bytes_needed / @sizeOf(windows.HMODULE);
|
|
|
|
// Fetch the complete module list
|
|
var modules = try self.allocator.alloc(windows.HMODULE, needed_modules);
|
|
defer self.allocator.free(modules);
|
|
if (windows.kernel32.K32EnumProcessModules(
|
|
process_handle,
|
|
modules.ptr,
|
|
try math.cast(windows.DWORD, modules.len * @sizeOf(windows.HMODULE)),
|
|
&bytes_needed,
|
|
) == 0)
|
|
return error.MissingDebugInfo;
|
|
|
|
// There's an unavoidable TOCTOU problem here, the module list may have
|
|
// changed between the two EnumProcessModules call.
|
|
// Pick the smallest amount of elements to avoid processing garbage.
|
|
const needed_modules_after = bytes_needed / @sizeOf(windows.HMODULE);
|
|
const loaded_modules = math.min(needed_modules, needed_modules_after);
|
|
|
|
for (modules[0..loaded_modules]) |module| {
|
|
var info: windows.MODULEINFO = undefined;
|
|
if (windows.kernel32.K32GetModuleInformation(
|
|
process_handle,
|
|
module,
|
|
&info,
|
|
@sizeOf(@TypeOf(info)),
|
|
) == 0)
|
|
return error.MissingDebugInfo;
|
|
|
|
const seg_start = @ptrToInt(info.lpBaseOfDll);
|
|
const seg_end = seg_start + info.SizeOfImage;
|
|
|
|
if (address >= seg_start and address < seg_end) {
|
|
if (self.address_map.get(seg_start)) |obj_di| {
|
|
return obj_di;
|
|
}
|
|
|
|
var name_buffer: [windows.PATH_MAX_WIDE + 4:0]u16 = undefined;
|
|
// openFileAbsoluteW requires the prefix to be present
|
|
mem.copy(u16, name_buffer[0..4], &[_]u16{ '\\', '?', '?', '\\' });
|
|
const len = windows.kernel32.K32GetModuleFileNameExW(
|
|
process_handle,
|
|
module,
|
|
@ptrCast(windows.LPWSTR, &name_buffer[4]),
|
|
windows.PATH_MAX_WIDE,
|
|
);
|
|
assert(len > 0);
|
|
|
|
const obj_di = try self.allocator.create(ModuleDebugInfo);
|
|
errdefer self.allocator.destroy(obj_di);
|
|
|
|
const coff_file = fs.openFileAbsoluteW(name_buffer[0 .. len + 4 :0], .{}) catch |err| switch (err) {
|
|
error.FileNotFound => return error.MissingDebugInfo,
|
|
else => return err,
|
|
};
|
|
obj_di.* = try readCoffDebugInfo(self.allocator, coff_file);
|
|
obj_di.base_address = seg_start;
|
|
|
|
try self.address_map.putNoClobber(seg_start, obj_di);
|
|
|
|
return obj_di;
|
|
}
|
|
}
|
|
|
|
return error.MissingDebugInfo;
|
|
}
|
|
|
|
fn lookupModuleDl(self: *DebugInfo, address: usize) !*ModuleDebugInfo {
|
|
var ctx: struct {
|
|
// Input
|
|
address: usize,
|
|
// Output
|
|
base_address: usize = undefined,
|
|
name: []const u8 = undefined,
|
|
} = .{ .address = address };
|
|
const CtxTy = @TypeOf(ctx);
|
|
|
|
if (os.dl_iterate_phdr(&ctx, anyerror, struct {
|
|
fn callback(info: *os.dl_phdr_info, size: usize, context: *CtxTy) !void {
|
|
_ = size;
|
|
// The base address is too high
|
|
if (context.address < info.dlpi_addr)
|
|
return;
|
|
|
|
const phdrs = info.dlpi_phdr[0..info.dlpi_phnum];
|
|
for (phdrs) |*phdr| {
|
|
if (phdr.p_type != elf.PT_LOAD) continue;
|
|
|
|
const seg_start = info.dlpi_addr + phdr.p_vaddr;
|
|
const seg_end = seg_start + phdr.p_memsz;
|
|
|
|
if (context.address >= seg_start and context.address < seg_end) {
|
|
// Android libc uses NULL instead of an empty string to mark the
|
|
// main program
|
|
context.name = mem.sliceTo(info.dlpi_name, 0) orelse "";
|
|
context.base_address = info.dlpi_addr;
|
|
// Stop the iteration
|
|
return error.Found;
|
|
}
|
|
}
|
|
}
|
|
}.callback)) {
|
|
return error.MissingDebugInfo;
|
|
} else |err| switch (err) {
|
|
error.Found => {},
|
|
else => return error.MissingDebugInfo,
|
|
}
|
|
|
|
if (self.address_map.get(ctx.base_address)) |obj_di| {
|
|
return obj_di;
|
|
}
|
|
|
|
const obj_di = try self.allocator.create(ModuleDebugInfo);
|
|
errdefer self.allocator.destroy(obj_di);
|
|
|
|
// TODO https://github.com/ziglang/zig/issues/5525
|
|
const copy = if (ctx.name.len > 0)
|
|
fs.cwd().openFile(ctx.name, .{ .intended_io_mode = .blocking })
|
|
else
|
|
fs.openSelfExe(.{ .intended_io_mode = .blocking });
|
|
|
|
const elf_file = copy catch |err| switch (err) {
|
|
error.FileNotFound => return error.MissingDebugInfo,
|
|
else => return err,
|
|
};
|
|
|
|
obj_di.* = try readElfDebugInfo(self.allocator, elf_file);
|
|
obj_di.base_address = ctx.base_address;
|
|
|
|
try self.address_map.putNoClobber(ctx.base_address, obj_di);
|
|
|
|
return obj_di;
|
|
}
|
|
|
|
fn lookupModuleHaiku(self: *DebugInfo, address: usize) !*ModuleDebugInfo {
|
|
_ = self;
|
|
_ = address;
|
|
@panic("TODO implement lookup module for Haiku");
|
|
}
|
|
};
|
|
|
|
pub const ModuleDebugInfo = switch (native_os) {
|
|
.macos, .ios, .watchos, .tvos => struct {
|
|
base_address: usize,
|
|
mapped_memory: []const u8,
|
|
symbols: []const MachoSymbol,
|
|
strings: [:0]const u8,
|
|
ofiles: OFileTable,
|
|
|
|
const OFileTable = std.StringHashMap(OFileInfo);
|
|
const OFileInfo = struct {
|
|
di: DW.DwarfInfo,
|
|
addr_table: std.StringHashMap(u64),
|
|
};
|
|
|
|
pub fn allocator(self: @This()) mem.Allocator {
|
|
return self.ofiles.allocator;
|
|
}
|
|
|
|
fn loadOFile(self: *@This(), o_file_path: []const u8) !OFileInfo {
|
|
const o_file = try fs.cwd().openFile(o_file_path, .{ .intended_io_mode = .blocking });
|
|
const mapped_mem = try mapWholeFile(o_file);
|
|
|
|
const hdr = @ptrCast(
|
|
*const macho.mach_header_64,
|
|
@alignCast(@alignOf(macho.mach_header_64), mapped_mem.ptr),
|
|
);
|
|
if (hdr.magic != std.macho.MH_MAGIC_64)
|
|
return error.InvalidDebugInfo;
|
|
|
|
const hdr_base = @ptrCast([*]const u8, hdr);
|
|
var ptr = hdr_base + @sizeOf(macho.mach_header_64);
|
|
var segptr = ptr;
|
|
var ncmd: u32 = hdr.ncmds;
|
|
var segcmd: ?*const macho.segment_command_64 = null;
|
|
var symtabcmd: ?*const macho.symtab_command = null;
|
|
|
|
while (ncmd != 0) : (ncmd -= 1) {
|
|
const lc = @ptrCast(*const std.macho.load_command, ptr);
|
|
switch (lc.cmd) {
|
|
.SEGMENT_64 => {
|
|
segcmd = @ptrCast(
|
|
*const std.macho.segment_command_64,
|
|
@alignCast(@alignOf(std.macho.segment_command_64), ptr),
|
|
);
|
|
segptr = ptr;
|
|
},
|
|
.SYMTAB => {
|
|
symtabcmd = @ptrCast(
|
|
*const std.macho.symtab_command,
|
|
@alignCast(@alignOf(std.macho.symtab_command), ptr),
|
|
);
|
|
},
|
|
else => {},
|
|
}
|
|
ptr = @alignCast(@alignOf(std.macho.load_command), ptr + lc.cmdsize);
|
|
}
|
|
|
|
if (segcmd == null or symtabcmd == null) return error.MissingDebugInfo;
|
|
|
|
// Parse symbols
|
|
const strtab = @ptrCast(
|
|
[*]const u8,
|
|
hdr_base + symtabcmd.?.stroff,
|
|
)[0 .. symtabcmd.?.strsize - 1 :0];
|
|
const symtab = @ptrCast(
|
|
[*]const macho.nlist_64,
|
|
@alignCast(@alignOf(macho.nlist_64), hdr_base + symtabcmd.?.symoff),
|
|
)[0..symtabcmd.?.nsyms];
|
|
|
|
// TODO handle tentative (common) symbols
|
|
var addr_table = std.StringHashMap(u64).init(self.allocator());
|
|
try addr_table.ensureTotalCapacity(@intCast(u32, symtab.len));
|
|
for (symtab) |sym| {
|
|
if (sym.n_strx == 0) continue;
|
|
if (sym.undf() or sym.tentative() or sym.abs()) continue;
|
|
const sym_name = mem.sliceTo(strtab[sym.n_strx..], 0);
|
|
// TODO is it possible to have a symbol collision?
|
|
addr_table.putAssumeCapacityNoClobber(sym_name, sym.n_value);
|
|
}
|
|
|
|
var opt_debug_line: ?*const macho.section_64 = null;
|
|
var opt_debug_info: ?*const macho.section_64 = null;
|
|
var opt_debug_abbrev: ?*const macho.section_64 = null;
|
|
var opt_debug_str: ?*const macho.section_64 = null;
|
|
var opt_debug_ranges: ?*const macho.section_64 = null;
|
|
|
|
const sections = @ptrCast(
|
|
[*]const macho.section_64,
|
|
@alignCast(@alignOf(macho.section_64), segptr + @sizeOf(std.macho.segment_command_64)),
|
|
)[0..segcmd.?.nsects];
|
|
for (sections) |*sect| {
|
|
// The section name may not exceed 16 chars and a trailing null may
|
|
// not be present
|
|
const name = if (mem.indexOfScalar(u8, sect.sectname[0..], 0)) |last|
|
|
sect.sectname[0..last]
|
|
else
|
|
sect.sectname[0..];
|
|
|
|
if (mem.eql(u8, name, "__debug_line")) {
|
|
opt_debug_line = sect;
|
|
} else if (mem.eql(u8, name, "__debug_info")) {
|
|
opt_debug_info = sect;
|
|
} else if (mem.eql(u8, name, "__debug_abbrev")) {
|
|
opt_debug_abbrev = sect;
|
|
} else if (mem.eql(u8, name, "__debug_str")) {
|
|
opt_debug_str = sect;
|
|
} else if (mem.eql(u8, name, "__debug_ranges")) {
|
|
opt_debug_ranges = sect;
|
|
}
|
|
}
|
|
|
|
const debug_line = opt_debug_line orelse
|
|
return error.MissingDebugInfo;
|
|
const debug_info = opt_debug_info orelse
|
|
return error.MissingDebugInfo;
|
|
const debug_str = opt_debug_str orelse
|
|
return error.MissingDebugInfo;
|
|
const debug_abbrev = opt_debug_abbrev orelse
|
|
return error.MissingDebugInfo;
|
|
|
|
var di = DW.DwarfInfo{
|
|
.endian = .Little,
|
|
.debug_info = try chopSlice(mapped_mem, debug_info.offset, debug_info.size),
|
|
.debug_abbrev = try chopSlice(mapped_mem, debug_abbrev.offset, debug_abbrev.size),
|
|
.debug_str = try chopSlice(mapped_mem, debug_str.offset, debug_str.size),
|
|
.debug_line = try chopSlice(mapped_mem, debug_line.offset, debug_line.size),
|
|
.debug_ranges = if (opt_debug_ranges) |debug_ranges|
|
|
try chopSlice(mapped_mem, debug_ranges.offset, debug_ranges.size)
|
|
else
|
|
null,
|
|
};
|
|
|
|
try DW.openDwarfDebugInfo(&di, self.allocator());
|
|
var info = OFileInfo{
|
|
.di = di,
|
|
.addr_table = addr_table,
|
|
};
|
|
|
|
// Add the debug info to the cache
|
|
try self.ofiles.putNoClobber(o_file_path, info);
|
|
|
|
return info;
|
|
}
|
|
|
|
pub fn getSymbolAtAddress(self: *@This(), address: usize) !SymbolInfo {
|
|
nosuspend {
|
|
// Translate the VA into an address into this object
|
|
const relocated_address = address - self.base_address;
|
|
|
|
// Find the .o file where this symbol is defined
|
|
const symbol = machoSearchSymbols(self.symbols, relocated_address) orelse
|
|
return SymbolInfo{};
|
|
const addr_off = relocated_address - symbol.addr;
|
|
|
|
// Take the symbol name from the N_FUN STAB entry, we're going to
|
|
// use it if we fail to find the DWARF infos
|
|
const stab_symbol = mem.sliceTo(self.strings[symbol.strx..], 0);
|
|
const o_file_path = mem.sliceTo(self.strings[symbol.ofile..], 0);
|
|
|
|
// Check if its debug infos are already in the cache
|
|
var o_file_info = self.ofiles.get(o_file_path) orelse
|
|
(self.loadOFile(o_file_path) catch |err| switch (err) {
|
|
error.FileNotFound,
|
|
error.MissingDebugInfo,
|
|
error.InvalidDebugInfo,
|
|
=> {
|
|
return SymbolInfo{ .symbol_name = stab_symbol };
|
|
},
|
|
else => return err,
|
|
});
|
|
const o_file_di = &o_file_info.di;
|
|
|
|
// Translate again the address, this time into an address inside the
|
|
// .o file
|
|
const relocated_address_o = o_file_info.addr_table.get(stab_symbol) orelse return SymbolInfo{
|
|
.symbol_name = "???",
|
|
};
|
|
|
|
if (o_file_di.findCompileUnit(relocated_address_o)) |compile_unit| {
|
|
return SymbolInfo{
|
|
.symbol_name = o_file_di.getSymbolName(relocated_address_o) orelse "???",
|
|
.compile_unit_name = compile_unit.die.getAttrString(o_file_di, DW.AT.name) catch |err| switch (err) {
|
|
error.MissingDebugInfo, error.InvalidDebugInfo => "???",
|
|
else => return err,
|
|
},
|
|
.line_info = o_file_di.getLineNumberInfo(compile_unit.*, relocated_address_o + addr_off) catch |err| switch (err) {
|
|
error.MissingDebugInfo, error.InvalidDebugInfo => null,
|
|
else => return err,
|
|
},
|
|
};
|
|
} else |err| switch (err) {
|
|
error.MissingDebugInfo, error.InvalidDebugInfo => {
|
|
return SymbolInfo{ .symbol_name = stab_symbol };
|
|
},
|
|
else => return err,
|
|
}
|
|
|
|
unreachable;
|
|
}
|
|
}
|
|
},
|
|
.uefi, .windows => struct {
|
|
base_address: usize,
|
|
debug_data: PdbOrDwarf,
|
|
coff: *coff.Coff,
|
|
|
|
pub fn allocator(self: @This()) mem.Allocator {
|
|
return self.coff.allocator;
|
|
}
|
|
|
|
pub fn getSymbolAtAddress(self: *@This(), address: usize) !SymbolInfo {
|
|
// Translate the VA into an address into this object
|
|
const relocated_address = address - self.base_address;
|
|
|
|
switch (self.debug_data) {
|
|
.dwarf => |*dwarf| {
|
|
const dwarf_address = relocated_address + self.coff.pe_header.image_base;
|
|
return getSymbolFromDwarf(dwarf_address, dwarf);
|
|
},
|
|
.pdb => {
|
|
// fallthrough to pdb handling
|
|
},
|
|
}
|
|
|
|
var coff_section: *coff.Section = undefined;
|
|
const mod_index = for (self.debug_data.pdb.sect_contribs) |sect_contrib| {
|
|
if (sect_contrib.Section > self.coff.sections.items.len) continue;
|
|
// Remember that SectionContribEntry.Section is 1-based.
|
|
coff_section = &self.coff.sections.items[sect_contrib.Section - 1];
|
|
|
|
const vaddr_start = coff_section.header.virtual_address + sect_contrib.Offset;
|
|
const vaddr_end = vaddr_start + sect_contrib.Size;
|
|
if (relocated_address >= vaddr_start and relocated_address < vaddr_end) {
|
|
break sect_contrib.ModuleIndex;
|
|
}
|
|
} else {
|
|
// we have no information to add to the address
|
|
return SymbolInfo{};
|
|
};
|
|
|
|
const module = (try self.debug_data.pdb.getModule(mod_index)) orelse
|
|
return error.InvalidDebugInfo;
|
|
const obj_basename = fs.path.basename(module.obj_file_name);
|
|
|
|
const symbol_name = self.debug_data.pdb.getSymbolName(
|
|
module,
|
|
relocated_address - coff_section.header.virtual_address,
|
|
) orelse "???";
|
|
const opt_line_info = try self.debug_data.pdb.getLineNumberInfo(
|
|
module,
|
|
relocated_address - coff_section.header.virtual_address,
|
|
);
|
|
|
|
return SymbolInfo{
|
|
.symbol_name = symbol_name,
|
|
.compile_unit_name = obj_basename,
|
|
.line_info = opt_line_info,
|
|
};
|
|
}
|
|
},
|
|
.linux, .netbsd, .freebsd, .dragonfly, .openbsd, .haiku, .solaris => struct {
|
|
base_address: usize,
|
|
dwarf: DW.DwarfInfo,
|
|
mapped_memory: []const u8,
|
|
|
|
pub fn getSymbolAtAddress(self: *@This(), address: usize) !SymbolInfo {
|
|
// Translate the VA into an address into this object
|
|
const relocated_address = address - self.base_address;
|
|
return getSymbolFromDwarf(relocated_address, &self.dwarf);
|
|
}
|
|
},
|
|
else => DW.DwarfInfo,
|
|
};
|
|
|
|
fn getSymbolFromDwarf(address: u64, di: *DW.DwarfInfo) !SymbolInfo {
|
|
if (nosuspend di.findCompileUnit(address)) |compile_unit| {
|
|
return SymbolInfo{
|
|
.symbol_name = nosuspend di.getSymbolName(address) orelse "???",
|
|
.compile_unit_name = compile_unit.die.getAttrString(di, DW.AT.name) catch |err| switch (err) {
|
|
error.MissingDebugInfo, error.InvalidDebugInfo => "???",
|
|
},
|
|
.line_info = nosuspend di.getLineNumberInfo(compile_unit.*, address) catch |err| switch (err) {
|
|
error.MissingDebugInfo, error.InvalidDebugInfo => null,
|
|
else => return err,
|
|
},
|
|
};
|
|
} else |err| switch (err) {
|
|
error.MissingDebugInfo, error.InvalidDebugInfo => {
|
|
return SymbolInfo{};
|
|
},
|
|
else => return err,
|
|
}
|
|
}
|
|
|
|
/// TODO multithreaded awareness
|
|
var debug_info_allocator: ?mem.Allocator = null;
|
|
var debug_info_arena_allocator: std.heap.ArenaAllocator = undefined;
|
|
fn getDebugInfoAllocator() mem.Allocator {
|
|
if (debug_info_allocator) |a| return a;
|
|
|
|
debug_info_arena_allocator = std.heap.ArenaAllocator.init(std.heap.page_allocator);
|
|
const allocator = debug_info_arena_allocator.allocator();
|
|
debug_info_allocator = allocator;
|
|
return allocator;
|
|
}
|
|
|
|
/// Whether or not the current target can print useful debug information when a segfault occurs.
|
|
pub const have_segfault_handling_support = switch (native_os) {
|
|
.linux,
|
|
.macos,
|
|
.netbsd,
|
|
.solaris,
|
|
.windows,
|
|
=> true,
|
|
|
|
.freebsd, .openbsd => @hasDecl(os.system, "ucontext_t"),
|
|
else => false,
|
|
};
|
|
pub const enable_segfault_handler: bool = if (@hasDecl(root, "enable_segfault_handler"))
|
|
root.enable_segfault_handler
|
|
else
|
|
runtime_safety and have_segfault_handling_support;
|
|
|
|
pub fn maybeEnableSegfaultHandler() void {
|
|
if (enable_segfault_handler) {
|
|
std.debug.attachSegfaultHandler();
|
|
}
|
|
}
|
|
|
|
var windows_segfault_handle: ?windows.HANDLE = null;
|
|
|
|
/// Attaches a global SIGSEGV handler which calls @panic("segmentation fault");
|
|
pub fn attachSegfaultHandler() void {
|
|
if (!have_segfault_handling_support) {
|
|
@compileError("segfault handler not supported for this target");
|
|
}
|
|
if (native_os == .windows) {
|
|
windows_segfault_handle = windows.kernel32.AddVectoredExceptionHandler(0, handleSegfaultWindows);
|
|
return;
|
|
}
|
|
var act = os.Sigaction{
|
|
.handler = .{ .sigaction = handleSegfaultPosix },
|
|
.mask = os.empty_sigset,
|
|
.flags = (os.SA.SIGINFO | os.SA.RESTART | os.SA.RESETHAND),
|
|
};
|
|
|
|
os.sigaction(os.SIG.SEGV, &act, null);
|
|
os.sigaction(os.SIG.ILL, &act, null);
|
|
os.sigaction(os.SIG.BUS, &act, null);
|
|
}
|
|
|
|
fn resetSegfaultHandler() void {
|
|
if (native_os == .windows) {
|
|
if (windows_segfault_handle) |handle| {
|
|
assert(windows.kernel32.RemoveVectoredExceptionHandler(handle) != 0);
|
|
windows_segfault_handle = null;
|
|
}
|
|
return;
|
|
}
|
|
var act = os.Sigaction{
|
|
.handler = .{ .sigaction = os.SIG.DFL },
|
|
.mask = os.empty_sigset,
|
|
.flags = 0,
|
|
};
|
|
os.sigaction(os.SIG.SEGV, &act, null);
|
|
os.sigaction(os.SIG.ILL, &act, null);
|
|
os.sigaction(os.SIG.BUS, &act, null);
|
|
}
|
|
|
|
fn handleSegfaultPosix(sig: i32, info: *const os.siginfo_t, ctx_ptr: ?*const anyopaque) callconv(.C) noreturn {
|
|
// Reset to the default handler so that if a segfault happens in this handler it will crash
|
|
// the process. Also when this handler returns, the original instruction will be repeated
|
|
// and the resulting segfault will crash the process rather than continually dump stack traces.
|
|
resetSegfaultHandler();
|
|
|
|
const addr = switch (native_os) {
|
|
.linux => @ptrToInt(info.fields.sigfault.addr),
|
|
.freebsd, .macos => @ptrToInt(info.addr),
|
|
.netbsd => @ptrToInt(info.info.reason.fault.addr),
|
|
.openbsd => @ptrToInt(info.data.fault.addr),
|
|
.solaris => @ptrToInt(info.reason.fault.addr),
|
|
else => unreachable,
|
|
};
|
|
|
|
// Don't use std.debug.print() as stderr_mutex may still be locked.
|
|
nosuspend {
|
|
const stderr = io.getStdErr().writer();
|
|
_ = switch (sig) {
|
|
os.SIG.SEGV => stderr.print("Segmentation fault at address 0x{x}\n", .{addr}),
|
|
os.SIG.ILL => stderr.print("Illegal instruction at address 0x{x}\n", .{addr}),
|
|
os.SIG.BUS => stderr.print("Bus error at address 0x{x}\n", .{addr}),
|
|
else => unreachable,
|
|
} catch os.abort();
|
|
}
|
|
|
|
switch (native_arch) {
|
|
.i386 => {
|
|
const ctx = @ptrCast(*const os.ucontext_t, @alignCast(@alignOf(os.ucontext_t), ctx_ptr));
|
|
const ip = @intCast(usize, ctx.mcontext.gregs[os.REG.EIP]);
|
|
const bp = @intCast(usize, ctx.mcontext.gregs[os.REG.EBP]);
|
|
dumpStackTraceFromBase(bp, ip);
|
|
},
|
|
.x86_64 => {
|
|
const ctx = @ptrCast(*const os.ucontext_t, @alignCast(@alignOf(os.ucontext_t), ctx_ptr));
|
|
const ip = switch (native_os) {
|
|
.linux, .netbsd, .solaris => @intCast(usize, ctx.mcontext.gregs[os.REG.RIP]),
|
|
.freebsd => @intCast(usize, ctx.mcontext.rip),
|
|
.openbsd => @intCast(usize, ctx.sc_rip),
|
|
.macos => @intCast(usize, ctx.mcontext.ss.rip),
|
|
else => unreachable,
|
|
};
|
|
const bp = switch (native_os) {
|
|
.linux, .netbsd, .solaris => @intCast(usize, ctx.mcontext.gregs[os.REG.RBP]),
|
|
.openbsd => @intCast(usize, ctx.sc_rbp),
|
|
.freebsd => @intCast(usize, ctx.mcontext.rbp),
|
|
.macos => @intCast(usize, ctx.mcontext.ss.rbp),
|
|
else => unreachable,
|
|
};
|
|
dumpStackTraceFromBase(bp, ip);
|
|
},
|
|
.arm => {
|
|
const ctx = @ptrCast(*const os.ucontext_t, @alignCast(@alignOf(os.ucontext_t), ctx_ptr));
|
|
const ip = @intCast(usize, ctx.mcontext.arm_pc);
|
|
const bp = @intCast(usize, ctx.mcontext.arm_fp);
|
|
dumpStackTraceFromBase(bp, ip);
|
|
},
|
|
.aarch64 => {
|
|
const ctx = @ptrCast(*const os.ucontext_t, @alignCast(@alignOf(os.ucontext_t), ctx_ptr));
|
|
const ip = switch (native_os) {
|
|
.macos => @intCast(usize, ctx.mcontext.ss.pc),
|
|
else => @intCast(usize, ctx.mcontext.pc),
|
|
};
|
|
// x29 is the ABI-designated frame pointer
|
|
const bp = switch (native_os) {
|
|
.macos => @intCast(usize, ctx.mcontext.ss.fp),
|
|
else => @intCast(usize, ctx.mcontext.regs[29]),
|
|
};
|
|
dumpStackTraceFromBase(bp, ip);
|
|
},
|
|
else => {},
|
|
}
|
|
|
|
// We cannot allow the signal handler to return because when it runs the original instruction
|
|
// again, the memory may be mapped and undefined behavior would occur rather than repeating
|
|
// the segfault. So we simply abort here.
|
|
os.abort();
|
|
}
|
|
|
|
fn handleSegfaultWindows(info: *windows.EXCEPTION_POINTERS) callconv(windows.WINAPI) c_long {
|
|
switch (info.ExceptionRecord.ExceptionCode) {
|
|
windows.EXCEPTION_DATATYPE_MISALIGNMENT => handleSegfaultWindowsExtra(info, 0, "Unaligned Memory Access"),
|
|
windows.EXCEPTION_ACCESS_VIOLATION => handleSegfaultWindowsExtra(info, 1, null),
|
|
windows.EXCEPTION_ILLEGAL_INSTRUCTION => handleSegfaultWindowsExtra(info, 2, null),
|
|
windows.EXCEPTION_STACK_OVERFLOW => handleSegfaultWindowsExtra(info, 0, "Stack Overflow"),
|
|
else => return windows.EXCEPTION_CONTINUE_SEARCH,
|
|
}
|
|
}
|
|
|
|
// zig won't let me use an anon enum here https://github.com/ziglang/zig/issues/3707
|
|
fn handleSegfaultWindowsExtra(info: *windows.EXCEPTION_POINTERS, comptime msg: u8, comptime format: ?[]const u8) noreturn {
|
|
const exception_address = @ptrToInt(info.ExceptionRecord.ExceptionAddress);
|
|
if (@hasDecl(windows, "CONTEXT")) {
|
|
const regs = info.ContextRecord.getRegs();
|
|
// Don't use std.debug.print() as stderr_mutex may still be locked.
|
|
nosuspend {
|
|
const stderr = io.getStdErr().writer();
|
|
_ = switch (msg) {
|
|
0 => stderr.print("{s}\n", .{format.?}),
|
|
1 => stderr.print("Segmentation fault at address 0x{x}\n", .{info.ExceptionRecord.ExceptionInformation[1]}),
|
|
2 => stderr.print("Illegal instruction at address 0x{x}\n", .{regs.ip}),
|
|
else => unreachable,
|
|
} catch os.abort();
|
|
}
|
|
|
|
dumpStackTraceFromBase(regs.bp, regs.ip);
|
|
os.abort();
|
|
} else {
|
|
switch (msg) {
|
|
0 => panicImpl(null, exception_address, format.?),
|
|
1 => {
|
|
const format_item = "Segmentation fault at address 0x{x}";
|
|
var buf: [format_item.len + 64]u8 = undefined; // 64 is arbitrary, but sufficiently large
|
|
const to_print = std.fmt.bufPrint(buf[0..buf.len], format_item, .{info.ExceptionRecord.ExceptionInformation[1]}) catch unreachable;
|
|
panicImpl(null, exception_address, to_print);
|
|
},
|
|
2 => panicImpl(null, exception_address, "Illegal Instruction"),
|
|
else => unreachable,
|
|
}
|
|
}
|
|
}
|
|
|
|
pub fn dumpStackPointerAddr(prefix: []const u8) void {
|
|
const sp = asm (""
|
|
: [argc] "={rsp}" (-> usize),
|
|
);
|
|
std.debug.print("{} sp = 0x{x}\n", .{ prefix, sp });
|
|
}
|