xref: /aosp_15_r20/external/mesa3d/src/util/u_debug_symbol.c (revision 6104692788411f58d303aa86923a9ff6ecaded22)
1*61046927SAndroid Build Coastguard Worker /**************************************************************************
2*61046927SAndroid Build Coastguard Worker  *
3*61046927SAndroid Build Coastguard Worker  * Copyright 2009 VMware, Inc.
4*61046927SAndroid Build Coastguard Worker  * All Rights Reserved.
5*61046927SAndroid Build Coastguard Worker  *
6*61046927SAndroid Build Coastguard Worker  * Permission is hereby granted, free of charge, to any person obtaining a
7*61046927SAndroid Build Coastguard Worker  * copy of this software and associated documentation files (the
8*61046927SAndroid Build Coastguard Worker  * "Software"), to deal in the Software without restriction, including
9*61046927SAndroid Build Coastguard Worker  * without limitation the rights to use, copy, modify, merge, publish,
10*61046927SAndroid Build Coastguard Worker  * distribute, sub license, and/or sell copies of the Software, and to
11*61046927SAndroid Build Coastguard Worker  * permit persons to whom the Software is furnished to do so, subject to
12*61046927SAndroid Build Coastguard Worker  * the following conditions:
13*61046927SAndroid Build Coastguard Worker  *
14*61046927SAndroid Build Coastguard Worker  * The above copyright notice and this permission notice (including the
15*61046927SAndroid Build Coastguard Worker  * next paragraph) shall be included in all copies or substantial portions
16*61046927SAndroid Build Coastguard Worker  * of the Software.
17*61046927SAndroid Build Coastguard Worker  *
18*61046927SAndroid Build Coastguard Worker  * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
19*61046927SAndroid Build Coastguard Worker  * OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
20*61046927SAndroid Build Coastguard Worker  * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT.
21*61046927SAndroid Build Coastguard Worker  * IN NO EVENT SHALL VMWARE AND/OR ITS SUPPLIERS BE LIABLE FOR
22*61046927SAndroid Build Coastguard Worker  * ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
23*61046927SAndroid Build Coastguard Worker  * TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
24*61046927SAndroid Build Coastguard Worker  * SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
25*61046927SAndroid Build Coastguard Worker  *
26*61046927SAndroid Build Coastguard Worker  **************************************************************************/
27*61046927SAndroid Build Coastguard Worker 
28*61046927SAndroid Build Coastguard Worker /**
29*61046927SAndroid Build Coastguard Worker  * @file
30*61046927SAndroid Build Coastguard Worker  * Symbol lookup.
31*61046927SAndroid Build Coastguard Worker  *
32*61046927SAndroid Build Coastguard Worker  * @author Jose Fonseca <[email protected]>
33*61046927SAndroid Build Coastguard Worker  */
34*61046927SAndroid Build Coastguard Worker 
35*61046927SAndroid Build Coastguard Worker #include "util/compiler.h"
36*61046927SAndroid Build Coastguard Worker #include "util/u_thread.h"
37*61046927SAndroid Build Coastguard Worker #include "util/simple_mtx.h"
38*61046927SAndroid Build Coastguard Worker #include "util/u_string.h"
39*61046927SAndroid Build Coastguard Worker 
40*61046927SAndroid Build Coastguard Worker #include "util/u_debug.h"
41*61046927SAndroid Build Coastguard Worker #include "u_debug_symbol.h"
42*61046927SAndroid Build Coastguard Worker #include "util/hash_table.h"
43*61046927SAndroid Build Coastguard Worker 
44*61046927SAndroid Build Coastguard Worker 
45*61046927SAndroid Build Coastguard Worker #if DETECT_OS_WINDOWS
46*61046927SAndroid Build Coastguard Worker 
47*61046927SAndroid Build Coastguard Worker #include <windows.h>
48*61046927SAndroid Build Coastguard Worker #include <stddef.h>
49*61046927SAndroid Build Coastguard Worker 
50*61046927SAndroid Build Coastguard Worker #include "dbghelp.h"
51*61046927SAndroid Build Coastguard Worker 
52*61046927SAndroid Build Coastguard Worker 
53*61046927SAndroid Build Coastguard Worker /**
54*61046927SAndroid Build Coastguard Worker  * SymInitialize() must be called once for each process (in this case, the
55*61046927SAndroid Build Coastguard Worker  * current process), before any of the other functions can be called.
56*61046927SAndroid Build Coastguard Worker  */
57*61046927SAndroid Build Coastguard Worker static BOOL g_bSymInitialized = false;
58*61046927SAndroid Build Coastguard Worker 
59*61046927SAndroid Build Coastguard Worker 
60*61046927SAndroid Build Coastguard Worker /**
61*61046927SAndroid Build Coastguard Worker  * Lookup the address of a DbgHelp function.
62*61046927SAndroid Build Coastguard Worker  */
63*61046927SAndroid Build Coastguard Worker static FARPROC WINAPI
getDbgHelpProcAddress(LPCSTR lpProcName)64*61046927SAndroid Build Coastguard Worker getDbgHelpProcAddress(LPCSTR lpProcName)
65*61046927SAndroid Build Coastguard Worker {
66*61046927SAndroid Build Coastguard Worker    static HMODULE hModule = NULL;
67*61046927SAndroid Build Coastguard Worker 
68*61046927SAndroid Build Coastguard Worker    if (!hModule) {
69*61046927SAndroid Build Coastguard Worker       static bool bail = false;
70*61046927SAndroid Build Coastguard Worker 
71*61046927SAndroid Build Coastguard Worker       if (bail) {
72*61046927SAndroid Build Coastguard Worker          return NULL;
73*61046927SAndroid Build Coastguard Worker       }
74*61046927SAndroid Build Coastguard Worker 
75*61046927SAndroid Build Coastguard Worker #if DETECT_CC_GCC
76*61046927SAndroid Build Coastguard Worker       /*
77*61046927SAndroid Build Coastguard Worker        * DbgHelp does not understand the debug information generated by MinGW toolchain.
78*61046927SAndroid Build Coastguard Worker        *
79*61046927SAndroid Build Coastguard Worker        * mgwhelp.dll is a dbghelp.dll look-alike replacement, which is able to
80*61046927SAndroid Build Coastguard Worker        * understand MinGW symbols, including on 64-bit builds.
81*61046927SAndroid Build Coastguard Worker        */
82*61046927SAndroid Build Coastguard Worker       if (!hModule) {
83*61046927SAndroid Build Coastguard Worker          hModule = LoadLibraryA("mgwhelp.dll");
84*61046927SAndroid Build Coastguard Worker          if (!hModule) {
85*61046927SAndroid Build Coastguard Worker             _debug_printf("warning: mgwhelp.dll not found: symbol names will not be resolved\n"
86*61046927SAndroid Build Coastguard Worker                           "warning: download it from https://github.com/jrfonseca/drmingw/#mgwhelp\n");
87*61046927SAndroid Build Coastguard Worker          }
88*61046927SAndroid Build Coastguard Worker       }
89*61046927SAndroid Build Coastguard Worker #endif
90*61046927SAndroid Build Coastguard Worker 
91*61046927SAndroid Build Coastguard Worker       /*
92*61046927SAndroid Build Coastguard Worker        * Fallback to the real DbgHelp.
93*61046927SAndroid Build Coastguard Worker        */
94*61046927SAndroid Build Coastguard Worker       if (!hModule) {
95*61046927SAndroid Build Coastguard Worker          hModule = LoadLibraryA("dbghelp.dll");
96*61046927SAndroid Build Coastguard Worker       }
97*61046927SAndroid Build Coastguard Worker 
98*61046927SAndroid Build Coastguard Worker       if (!hModule) {
99*61046927SAndroid Build Coastguard Worker          bail = true;
100*61046927SAndroid Build Coastguard Worker          return NULL;
101*61046927SAndroid Build Coastguard Worker       }
102*61046927SAndroid Build Coastguard Worker    }
103*61046927SAndroid Build Coastguard Worker 
104*61046927SAndroid Build Coastguard Worker    return GetProcAddress(hModule, lpProcName);
105*61046927SAndroid Build Coastguard Worker }
106*61046927SAndroid Build Coastguard Worker 
107*61046927SAndroid Build Coastguard Worker 
108*61046927SAndroid Build Coastguard Worker /**
109*61046927SAndroid Build Coastguard Worker  * Generic macro to dispatch a DbgHelp functions.
110*61046927SAndroid Build Coastguard Worker  */
111*61046927SAndroid Build Coastguard Worker #define DBGHELP_DISPATCH(_name, _ret_type, _ret_default, _arg_types, _arg_names) \
112*61046927SAndroid Build Coastguard Worker    static _ret_type WINAPI \
113*61046927SAndroid Build Coastguard Worker    j_##_name _arg_types \
114*61046927SAndroid Build Coastguard Worker    { \
115*61046927SAndroid Build Coastguard Worker       typedef BOOL (WINAPI *PFN) _arg_types; \
116*61046927SAndroid Build Coastguard Worker       static PFN pfn = NULL; \
117*61046927SAndroid Build Coastguard Worker       if (!pfn) { \
118*61046927SAndroid Build Coastguard Worker          pfn = (PFN) getDbgHelpProcAddress(#_name); \
119*61046927SAndroid Build Coastguard Worker          if (!pfn) { \
120*61046927SAndroid Build Coastguard Worker             return _ret_default; \
121*61046927SAndroid Build Coastguard Worker          } \
122*61046927SAndroid Build Coastguard Worker       } \
123*61046927SAndroid Build Coastguard Worker       return pfn _arg_names; \
124*61046927SAndroid Build Coastguard Worker    }
125*61046927SAndroid Build Coastguard Worker 
126*61046927SAndroid Build Coastguard Worker DBGHELP_DISPATCH(SymInitialize,
127*61046927SAndroid Build Coastguard Worker                  BOOL, 0,
128*61046927SAndroid Build Coastguard Worker                  (HANDLE hProcess, PSTR UserSearchPath, BOOL fInvadeProcess),
129*61046927SAndroid Build Coastguard Worker                  (hProcess, UserSearchPath, fInvadeProcess))
130*61046927SAndroid Build Coastguard Worker 
131*61046927SAndroid Build Coastguard Worker DBGHELP_DISPATCH(SymSetOptions,
132*61046927SAndroid Build Coastguard Worker                  DWORD, false,
133*61046927SAndroid Build Coastguard Worker                  (DWORD SymOptions),
134*61046927SAndroid Build Coastguard Worker                  (SymOptions))
135*61046927SAndroid Build Coastguard Worker 
136*61046927SAndroid Build Coastguard Worker #ifndef _GAMING_XBOX
137*61046927SAndroid Build Coastguard Worker DBGHELP_DISPATCH(SymFromAddr,
138*61046927SAndroid Build Coastguard Worker                  BOOL, false,
139*61046927SAndroid Build Coastguard Worker                  (HANDLE hProcess, DWORD64 Address, PDWORD64 Displacement, PSYMBOL_INFO Symbol),
140*61046927SAndroid Build Coastguard Worker                  (hProcess, Address, Displacement, Symbol))
141*61046927SAndroid Build Coastguard Worker #endif
142*61046927SAndroid Build Coastguard Worker 
143*61046927SAndroid Build Coastguard Worker DBGHELP_DISPATCH(SymGetLineFromAddr64,
144*61046927SAndroid Build Coastguard Worker                  BOOL, false,
145*61046927SAndroid Build Coastguard Worker                  (HANDLE hProcess, DWORD64 dwAddr, PDWORD pdwDisplacement, PIMAGEHLP_LINE64 Line),
146*61046927SAndroid Build Coastguard Worker                  (hProcess, dwAddr, pdwDisplacement, Line))
147*61046927SAndroid Build Coastguard Worker 
148*61046927SAndroid Build Coastguard Worker DBGHELP_DISPATCH(SymCleanup, BOOL, false, (HANDLE hProcess), (hProcess))
149*61046927SAndroid Build Coastguard Worker 
150*61046927SAndroid Build Coastguard Worker 
151*61046927SAndroid Build Coastguard Worker #undef DBGHELP_DISPATCH
152*61046927SAndroid Build Coastguard Worker 
153*61046927SAndroid Build Coastguard Worker 
154*61046927SAndroid Build Coastguard Worker static inline bool
debug_symbol_name_dbghelp(const void * addr,char * buf,unsigned size)155*61046927SAndroid Build Coastguard Worker debug_symbol_name_dbghelp(const void *addr, char* buf, unsigned size)
156*61046927SAndroid Build Coastguard Worker {
157*61046927SAndroid Build Coastguard Worker #ifndef _GAMING_XBOX
158*61046927SAndroid Build Coastguard Worker    DWORD64 dwAddr = (DWORD64)(uintptr_t)addr;
159*61046927SAndroid Build Coastguard Worker    HANDLE hProcess = GetCurrentProcess();
160*61046927SAndroid Build Coastguard Worker 
161*61046927SAndroid Build Coastguard Worker    /* General purpose buffer, to back pSymbol and other temporary stuff.
162*61046927SAndroid Build Coastguard Worker     * Must not be too memory hungry here to avoid stack overflows.
163*61046927SAndroid Build Coastguard Worker     */
164*61046927SAndroid Build Coastguard Worker    CHAR buffer[512];
165*61046927SAndroid Build Coastguard Worker 
166*61046927SAndroid Build Coastguard Worker    PSYMBOL_INFO pSymbol = (PSYMBOL_INFO) buffer;
167*61046927SAndroid Build Coastguard Worker    DWORD64 dwDisplacement = 0;  /* Displacement of the input address, relative to the start of the symbol */
168*61046927SAndroid Build Coastguard Worker    DWORD dwLineDisplacement = 0;
169*61046927SAndroid Build Coastguard Worker    IMAGEHLP_LINE64 Line;
170*61046927SAndroid Build Coastguard Worker 
171*61046927SAndroid Build Coastguard Worker    memset(pSymbol, 0, sizeof *pSymbol);
172*61046927SAndroid Build Coastguard Worker    pSymbol->SizeOfStruct = sizeof *pSymbol;
173*61046927SAndroid Build Coastguard Worker    pSymbol->MaxNameLen = sizeof buffer - offsetof(SYMBOL_INFO, Name);
174*61046927SAndroid Build Coastguard Worker 
175*61046927SAndroid Build Coastguard Worker    if (!g_bSymInitialized) {
176*61046927SAndroid Build Coastguard Worker       /* Some components (e.g. Java) will init dbghelp before we're loaded, causing the "invade process"
177*61046927SAndroid Build Coastguard Worker        * option to be invalid when attempting to re-init. But without it, we'd have to manually
178*61046927SAndroid Build Coastguard Worker        * load symbols for all modules in the stack. For simplicity, we can just uninit and then
179*61046927SAndroid Build Coastguard Worker        * re-"invade".
180*61046927SAndroid Build Coastguard Worker        */
181*61046927SAndroid Build Coastguard Worker       if (debug_get_bool_option("GALLIUM_SYMBOL_FORCE_REINIT", false))
182*61046927SAndroid Build Coastguard Worker          j_SymCleanup(hProcess);
183*61046927SAndroid Build Coastguard Worker 
184*61046927SAndroid Build Coastguard Worker       j_SymSetOptions(/* SYMOPT_UNDNAME | */ SYMOPT_LOAD_LINES);
185*61046927SAndroid Build Coastguard Worker       if (j_SymInitialize(hProcess, NULL, true)) {
186*61046927SAndroid Build Coastguard Worker          g_bSymInitialized = true;
187*61046927SAndroid Build Coastguard Worker       }
188*61046927SAndroid Build Coastguard Worker    }
189*61046927SAndroid Build Coastguard Worker 
190*61046927SAndroid Build Coastguard Worker    /* Lookup symbol name */
191*61046927SAndroid Build Coastguard Worker    if (!g_bSymInitialized ||
192*61046927SAndroid Build Coastguard Worker        !j_SymFromAddr(hProcess, dwAddr, &dwDisplacement, pSymbol)) {
193*61046927SAndroid Build Coastguard Worker       /*
194*61046927SAndroid Build Coastguard Worker        * We couldn't obtain symbol information.  At least tell which module the address belongs.
195*61046927SAndroid Build Coastguard Worker        */
196*61046927SAndroid Build Coastguard Worker 
197*61046927SAndroid Build Coastguard Worker       HMODULE hModule = NULL;
198*61046927SAndroid Build Coastguard Worker 
199*61046927SAndroid Build Coastguard Worker       if (!GetModuleHandleEx(GET_MODULE_HANDLE_EX_FLAG_FROM_ADDRESS,
200*61046927SAndroid Build Coastguard Worker                              (LPCTSTR)addr,
201*61046927SAndroid Build Coastguard Worker                              &hModule)) {
202*61046927SAndroid Build Coastguard Worker          return false;
203*61046927SAndroid Build Coastguard Worker       }
204*61046927SAndroid Build Coastguard Worker 
205*61046927SAndroid Build Coastguard Worker       if (GetModuleFileNameA(hModule, buffer, sizeof buffer) == sizeof buffer) {
206*61046927SAndroid Build Coastguard Worker          return false;
207*61046927SAndroid Build Coastguard Worker       }
208*61046927SAndroid Build Coastguard Worker       snprintf(buf, size, "%p at %s+0x%lx",
209*61046927SAndroid Build Coastguard Worker                addr, buffer,
210*61046927SAndroid Build Coastguard Worker                (unsigned long)((uintptr_t)addr - (uintptr_t)hModule));
211*61046927SAndroid Build Coastguard Worker 
212*61046927SAndroid Build Coastguard Worker       return true;
213*61046927SAndroid Build Coastguard Worker    }
214*61046927SAndroid Build Coastguard Worker 
215*61046927SAndroid Build Coastguard Worker    /*
216*61046927SAndroid Build Coastguard Worker     * Try to get filename and line number.
217*61046927SAndroid Build Coastguard Worker     */
218*61046927SAndroid Build Coastguard Worker    memset(&Line, 0, sizeof Line);
219*61046927SAndroid Build Coastguard Worker    Line.SizeOfStruct = sizeof Line;
220*61046927SAndroid Build Coastguard Worker    if (!j_SymGetLineFromAddr64(hProcess, dwAddr, &dwLineDisplacement, &Line)) {
221*61046927SAndroid Build Coastguard Worker       Line.FileName = NULL;
222*61046927SAndroid Build Coastguard Worker    }
223*61046927SAndroid Build Coastguard Worker 
224*61046927SAndroid Build Coastguard Worker    if (Line.FileName) {
225*61046927SAndroid Build Coastguard Worker       snprintf(buf, size, "%s at %s:%lu", pSymbol->Name, Line.FileName, Line.LineNumber);
226*61046927SAndroid Build Coastguard Worker    } else {
227*61046927SAndroid Build Coastguard Worker       snprintf(buf, size, "%s", pSymbol->Name);
228*61046927SAndroid Build Coastguard Worker    }
229*61046927SAndroid Build Coastguard Worker 
230*61046927SAndroid Build Coastguard Worker    return true;
231*61046927SAndroid Build Coastguard Worker #else
232*61046927SAndroid Build Coastguard Worker    return false;
233*61046927SAndroid Build Coastguard Worker #endif /* _GAMING_XBOX */
234*61046927SAndroid Build Coastguard Worker }
235*61046927SAndroid Build Coastguard Worker 
236*61046927SAndroid Build Coastguard Worker #endif /* DETECT_OS_WINDOWS */
237*61046927SAndroid Build Coastguard Worker 
238*61046927SAndroid Build Coastguard Worker void
debug_symbol_name(const void * addr,char * buf,unsigned size)239*61046927SAndroid Build Coastguard Worker debug_symbol_name(const void *addr, char* buf, unsigned size)
240*61046927SAndroid Build Coastguard Worker {
241*61046927SAndroid Build Coastguard Worker #if DETECT_OS_WINDOWS
242*61046927SAndroid Build Coastguard Worker    if (debug_symbol_name_dbghelp(addr, buf, size)) {
243*61046927SAndroid Build Coastguard Worker       return;
244*61046927SAndroid Build Coastguard Worker    }
245*61046927SAndroid Build Coastguard Worker #endif
246*61046927SAndroid Build Coastguard Worker 
247*61046927SAndroid Build Coastguard Worker    snprintf(buf, size, "%p", addr);
248*61046927SAndroid Build Coastguard Worker    buf[size - 1] = 0;
249*61046927SAndroid Build Coastguard Worker }
250*61046927SAndroid Build Coastguard Worker 
251*61046927SAndroid Build Coastguard Worker void
debug_symbol_print(const void * addr)252*61046927SAndroid Build Coastguard Worker debug_symbol_print(const void *addr)
253*61046927SAndroid Build Coastguard Worker {
254*61046927SAndroid Build Coastguard Worker    char buf[1024];
255*61046927SAndroid Build Coastguard Worker    debug_symbol_name(addr, buf, sizeof(buf));
256*61046927SAndroid Build Coastguard Worker    debug_printf("\t%s\n", buf);
257*61046927SAndroid Build Coastguard Worker }
258*61046927SAndroid Build Coastguard Worker 
259*61046927SAndroid Build Coastguard Worker static struct hash_table* symbols_hash;
260*61046927SAndroid Build Coastguard Worker static simple_mtx_t symbols_mutex = SIMPLE_MTX_INITIALIZER;
261*61046927SAndroid Build Coastguard Worker 
262*61046927SAndroid Build Coastguard Worker const char*
debug_symbol_name_cached(const void * addr)263*61046927SAndroid Build Coastguard Worker debug_symbol_name_cached(const void *addr)
264*61046927SAndroid Build Coastguard Worker {
265*61046927SAndroid Build Coastguard Worker    const char* name;
266*61046927SAndroid Build Coastguard Worker    simple_mtx_lock(&symbols_mutex);
267*61046927SAndroid Build Coastguard Worker    if(!symbols_hash)
268*61046927SAndroid Build Coastguard Worker       symbols_hash = _mesa_pointer_hash_table_create(NULL);
269*61046927SAndroid Build Coastguard Worker    struct hash_entry *entry = _mesa_hash_table_search(symbols_hash, addr);
270*61046927SAndroid Build Coastguard Worker    if (!entry) {
271*61046927SAndroid Build Coastguard Worker       char buf[1024];
272*61046927SAndroid Build Coastguard Worker       debug_symbol_name(addr, buf, sizeof(buf));
273*61046927SAndroid Build Coastguard Worker       name = strdup(buf);
274*61046927SAndroid Build Coastguard Worker 
275*61046927SAndroid Build Coastguard Worker       entry = _mesa_hash_table_insert(symbols_hash, addr, (void*)name);
276*61046927SAndroid Build Coastguard Worker    }
277*61046927SAndroid Build Coastguard Worker    simple_mtx_unlock(&symbols_mutex);
278*61046927SAndroid Build Coastguard Worker    return entry->data;
279*61046927SAndroid Build Coastguard Worker }
280