sdlprocdump.c 25 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587
  1. #include <windows.h>
  2. #include <dbghelp.h>
  3. #include <inttypes.h>
  4. #include <stdarg.h>
  5. #include <stdio.h>
  6. #include <string.h>
  7. #define DUMP_FOLDER "minidumps"
  8. #define APPNAME "SDLPROCDUMP"
  9. #if defined(__i386__) || defined(__i486__) || defined(__i586__) || defined(__i686__) ||defined( __i386) || defined(_M_IX86)
  10. #define SDLPROCDUMP_CPU_X86 1
  11. #elif defined(__amd64__) || defined(__amd64) || defined(__x86_64__) || defined(__x86_64) || defined(_M_X64) || defined(_M_AMD64)
  12. #define SDLPROCDUMP_CPU_X64 1
  13. #elif defined(__aarch64__) || defined(_M_ARM64)
  14. #define SDLPROCDUMP_CPU_ARM64 1
  15. #elif defined(__arm__) || defined(_M_ARM)
  16. #define SDLPROCDUMP_CPU_ARM32 1
  17. #endif
  18. #if defined(SDLPROCDUMP_CPU_X86) || defined(SDLPROCDUMP_CPU_X64) || defined(SDLPROCDUMP_CPU_ARM32) || defined(SDLPROCDUMP_CPU_ARM64)
  19. #define SDLPROCDUMP_PRINTSTACK
  20. #else
  21. #pragma message("Unsupported architecture: don't know how to StackWalk")
  22. #endif
  23. static void printf_message(const char *format, ...) {
  24. va_list ap;
  25. fprintf(stderr, "[" APPNAME "] ");
  26. va_start(ap, format);
  27. vfprintf(stderr, format, ap);
  28. va_end(ap);
  29. fprintf(stderr, "\n");
  30. }
  31. static void printf_windows_message(const char *format, ...) {
  32. va_list ap;
  33. char win_msg[512];
  34. size_t win_msg_len;
  35. FormatMessageA(
  36. FORMAT_MESSAGE_FROM_SYSTEM | FORMAT_MESSAGE_IGNORE_INSERTS,
  37. NULL,
  38. GetLastError(),
  39. MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT),
  40. win_msg, sizeof(win_msg)/sizeof(*win_msg),
  41. NULL);
  42. win_msg_len = strlen(win_msg);
  43. while (win_msg[win_msg_len-1] == '\r' || win_msg[win_msg_len-1] == '\n' || win_msg[win_msg_len-1] == ' ') {
  44. win_msg[win_msg_len-1] = '\0';
  45. win_msg_len--;
  46. }
  47. fprintf(stderr, "[" APPNAME "] ");
  48. va_start(ap, format);
  49. vfprintf(stderr, format, ap);
  50. va_end(ap);
  51. fprintf(stderr, " (%s)\n", win_msg);
  52. }
  53. struct {
  54. HMODULE module;
  55. BOOL (WINAPI *pSymInitialize)(HANDLE hProcess, PCSTR UserSearchPath, BOOL fInvadeProcess);
  56. BOOL (WINAPI *pSymCleanup)(HANDLE hProcess);
  57. BOOL (WINAPI *pMiniDumpWriteDump)(
  58. HANDLE hProcess,
  59. DWORD ProcessId,
  60. HANDLE hFile,
  61. MINIDUMP_TYPE DumpType,
  62. PMINIDUMP_EXCEPTION_INFORMATION ExceptionParam,
  63. PMINIDUMP_USER_STREAM_INFORMATION UserStreamParam,
  64. PMINIDUMP_CALLBACK_INFORMATION CallbackParam);
  65. BOOL (WINAPI *pSymFromAddr)(HANDLE hProcess, DWORD64 Address, PDWORD64 Displacement, PSYMBOL_INFO Symbol);
  66. BOOL (WINAPI *pSymGetLineFromAddr64)(HANDLE hProcess, DWORD64 qwAddr, PDWORD pdwDisplacement, PIMAGEHLP_LINE64 Line);
  67. BOOL (WINAPI *pStackWalk64)(DWORD MachineType, HANDLE hProcess, HANDLE hThread, LPSTACKFRAME64 StackFrame,
  68. PVOID ContextRecord, PREAD_PROCESS_MEMORY_ROUTINE64 ReadMemoryRoutine,
  69. PFUNCTION_TABLE_ACCESS_ROUTINE64 FunctionTableAccessRoutine,
  70. PGET_MODULE_BASE_ROUTINE64 GetModuleBaseRoutine, PTRANSLATE_ADDRESS_ROUTINE64 TranslateAddress);
  71. PVOID (WINAPI *pSymFunctionTableAccess64)(HANDLE hProcess, DWORD64 AddrBase);
  72. DWORD64 (WINAPI *pSymGetModuleBase64)(HANDLE hProcess, DWORD64 qwAddr);
  73. BOOL (WINAPI *pSymGetModuleInfo64)(HANDLE hProcess, DWORD64 qwAddr, PIMAGEHLP_MODULE64 ModuleInfo);
  74. BOOL (WINAPI *pSymRefreshModuleList)(HANDLE hProcess);
  75. } dyn_dbghelp;
  76. static void load_dbghelp(void) {
  77. if (dyn_dbghelp.module) {
  78. return;
  79. }
  80. dyn_dbghelp.module = LoadLibraryA("dbghelp.dll");
  81. if (!dyn_dbghelp.module) {
  82. printf_message("Failed to load dbghelp.dll");
  83. goto failed;
  84. }
  85. dyn_dbghelp.pSymInitialize = (void *)GetProcAddress(dyn_dbghelp.module, "SymInitialize");
  86. dyn_dbghelp.pSymCleanup = (void *)GetProcAddress(dyn_dbghelp.module, "SymCleanup");
  87. dyn_dbghelp.pMiniDumpWriteDump = (void *)GetProcAddress(dyn_dbghelp.module, "MiniDumpWriteDump");
  88. dyn_dbghelp.pSymFromAddr = (void *)GetProcAddress(dyn_dbghelp.module, "SymFromAddr");
  89. dyn_dbghelp.pStackWalk64 = (void *)GetProcAddress(dyn_dbghelp.module, "StackWalk64");
  90. dyn_dbghelp.pSymGetLineFromAddr64 = (void *)GetProcAddress(dyn_dbghelp.module, "SymGetLineFromAddr64");
  91. dyn_dbghelp.pSymFunctionTableAccess64 = (void *)GetProcAddress(dyn_dbghelp.module, "SymFunctionTableAccess64");
  92. dyn_dbghelp.pSymGetModuleBase64 = (void *)GetProcAddress(dyn_dbghelp.module, "SymGetModuleBase64");
  93. dyn_dbghelp.pSymGetModuleInfo64 = (void *)GetProcAddress(dyn_dbghelp.module, "SymGetModuleInfo64");
  94. dyn_dbghelp.pSymRefreshModuleList = (void *)GetProcAddress(dyn_dbghelp.module, "SymRefreshModuleList");
  95. return;
  96. failed:
  97. if (dyn_dbghelp.module) {
  98. FreeLibrary(dyn_dbghelp.module);
  99. dyn_dbghelp.module = NULL;
  100. }
  101. }
  102. static void unload_dbghelp(void) {
  103. if (!dyn_dbghelp.module) {
  104. return;
  105. }
  106. FreeLibrary(dyn_dbghelp.module);
  107. memset(&dyn_dbghelp, 0, sizeof(dyn_dbghelp));
  108. }
  109. #define FOREACH_EXCEPTION_CODES(X) \
  110. X(EXCEPTION_ACCESS_VIOLATION) \
  111. X(EXCEPTION_DATATYPE_MISALIGNMENT) \
  112. X(EXCEPTION_BREAKPOINT) \
  113. X(EXCEPTION_SINGLE_STEP) \
  114. X(EXCEPTION_ARRAY_BOUNDS_EXCEEDED) \
  115. X(EXCEPTION_FLT_DENORMAL_OPERAND) \
  116. X(EXCEPTION_FLT_DIVIDE_BY_ZERO) \
  117. X(EXCEPTION_FLT_INEXACT_RESULT) \
  118. X(EXCEPTION_FLT_INVALID_OPERATION) \
  119. X(EXCEPTION_FLT_OVERFLOW) \
  120. X(EXCEPTION_FLT_STACK_CHECK) \
  121. X(EXCEPTION_FLT_UNDERFLOW) \
  122. X(EXCEPTION_INT_DIVIDE_BY_ZERO) \
  123. X(EXCEPTION_INT_OVERFLOW) \
  124. X(EXCEPTION_PRIV_INSTRUCTION) \
  125. X(EXCEPTION_IN_PAGE_ERROR) \
  126. X(EXCEPTION_ILLEGAL_INSTRUCTION) \
  127. X(EXCEPTION_NONCONTINUABLE_EXCEPTION) \
  128. X(EXCEPTION_STACK_OVERFLOW) \
  129. X(EXCEPTION_INVALID_DISPOSITION) \
  130. X(EXCEPTION_GUARD_PAGE) \
  131. X(EXCEPTION_INVALID_HANDLE) \
  132. X(STATUS_HEAP_CORRUPTION)
  133. static const char *exceptionCode_to_string(DWORD dwCode) {
  134. #define SWITCH_CODE_STR(V) case V: return #V;
  135. switch (dwCode) {
  136. case 0xe06d7363: return "MS Visual C++ Exception";
  137. FOREACH_EXCEPTION_CODES(SWITCH_CODE_STR)
  138. default: {
  139. return "unknown";
  140. }
  141. }
  142. #undef SWITCH_CODE_STR
  143. }
  144. static BOOL IsCXXException(DWORD dwCode) {
  145. /* https://devblogs.microsoft.com/oldnewthing/20100730-00/?p=13273 */
  146. return dwCode == 0xe06d7363; /* FOURCC(0xe0, 'm', 's', 'c') */
  147. }
  148. static BOOL IsFatalExceptionCode(DWORD dwCode) {
  149. switch (dwCode) {
  150. case EXCEPTION_ACCESS_VIOLATION:
  151. case EXCEPTION_ARRAY_BOUNDS_EXCEEDED:
  152. case EXCEPTION_IN_PAGE_ERROR:
  153. case EXCEPTION_ILLEGAL_INSTRUCTION:
  154. case EXCEPTION_INT_DIVIDE_BY_ZERO:
  155. case EXCEPTION_STACK_OVERFLOW:
  156. case STATUS_HEAP_CORRUPTION:
  157. case STATUS_STACK_BUFFER_OVERRUN:
  158. case EXCEPTION_GUARD_PAGE:
  159. case EXCEPTION_INVALID_HANDLE:
  160. return TRUE;
  161. default:
  162. return FALSE;
  163. }
  164. }
  165. static const char *get_simple_basename(const char *path) {
  166. const char *pos = strrchr(path, '\\');
  167. if (pos) {
  168. return pos + 1;
  169. }
  170. pos = strrchr(path, '/');
  171. if (pos) {
  172. return pos + 1;
  173. }
  174. return path;
  175. }
  176. static void write_minidump(const char *child_file_path, const LPPROCESS_INFORMATION process_information, DWORD dwThreadId, PEXCEPTION_RECORD exception_record, PCONTEXT context) {
  177. BOOL success;
  178. char dump_file_path[MAX_PATH];
  179. char child_file_name[64];
  180. EXCEPTION_POINTERS exception_pointers;
  181. HANDLE hFile = INVALID_HANDLE_VALUE;
  182. HMODULE dbghelp_module = NULL;
  183. MINIDUMP_EXCEPTION_INFORMATION minidump_exception_information;
  184. SYSTEMTIME system_time;
  185. if (!dyn_dbghelp.pMiniDumpWriteDump) {
  186. printf_message("Cannot find pMiniDumpWriteDump in dbghelp.dll: no minidump");
  187. return;
  188. }
  189. success = CreateDirectoryA(DUMP_FOLDER, NULL);
  190. if (!success && GetLastError() != ERROR_ALREADY_EXISTS) {
  191. printf_windows_message("Failed to create minidump directory");
  192. goto post_dump;
  193. }
  194. _splitpath_s(child_file_path, NULL, 0, NULL, 0, child_file_name, sizeof(child_file_name), NULL, 0);
  195. GetLocalTime(&system_time);
  196. snprintf(dump_file_path, sizeof(dump_file_path), "minidumps/%s_%04d-%02d-%02d_%d-%02d-%02d.dmp",
  197. child_file_name,
  198. system_time.wYear, system_time.wMonth, system_time.wDay,
  199. system_time.wHour, system_time.wMinute, system_time.wSecond);
  200. printf_message("");
  201. printf_message("Writing minidump to \"%s\"", dump_file_path);
  202. hFile = CreateFileA(
  203. dump_file_path,
  204. GENERIC_WRITE,
  205. FILE_SHARE_WRITE,
  206. NULL,
  207. CREATE_ALWAYS,
  208. FILE_ATTRIBUTE_NORMAL,
  209. NULL);
  210. if (hFile == INVALID_HANDLE_VALUE) {
  211. printf_windows_message("Failed to open file for minidump");
  212. goto post_dump;
  213. }
  214. memset(&exception_pointers, 0, sizeof(exception_pointers));
  215. exception_pointers.ContextRecord = context;
  216. exception_pointers.ExceptionRecord = exception_record;
  217. minidump_exception_information.ClientPointers = FALSE;
  218. minidump_exception_information.ExceptionPointers = &exception_pointers;
  219. minidump_exception_information.ThreadId = dwThreadId;
  220. success = dyn_dbghelp.pMiniDumpWriteDump(
  221. process_information->hProcess, /* HANDLE hProcess */
  222. process_information->dwProcessId, /* DWORD ProcessId */
  223. hFile, /* HANDLE hFile */
  224. MiniDumpWithFullMemory, /* MINIDUMP_TYPE DumpType */
  225. &minidump_exception_information, /* PMINIDUMP_EXCEPTION_INFORMATION ExceptionParam */
  226. NULL, /* PMINIDUMP_USER_STREAM_INFORMATION UserStreamParam */
  227. NULL); /* PMINIDUMP_CALLBACK_INFORMATION CallbackParam */
  228. if (!success) {
  229. printf_windows_message("Failed to write minidump");
  230. }
  231. post_dump:
  232. if (hFile != INVALID_HANDLE_VALUE) {
  233. CloseHandle(hFile);
  234. }
  235. if (dbghelp_module != NULL) {
  236. FreeLibrary(dbghelp_module);
  237. }
  238. }
  239. static void print_stacktrace(const LPPROCESS_INFORMATION process_information, PCONTEXT context, LPVOID address) {
  240. STACKFRAME64 stack_frame;
  241. DWORD machine_type;
  242. if (!context) {
  243. printf_message("Cannot create a stacktrace without a context");
  244. return;
  245. }
  246. if (!dyn_dbghelp.pStackWalk64) {
  247. printf_message("Cannot find StackWalk64 in dbghelp.dll: no stacktrace");
  248. return;
  249. }
  250. if (!dyn_dbghelp.pSymFunctionTableAccess64) {
  251. printf_message("Cannot find SymFunctionTableAccess64 in dbghelp.dll: no stacktrace");
  252. return;
  253. }
  254. if (!dyn_dbghelp.pSymGetModuleBase64) {
  255. printf_message("Cannot find SymGetModuleBase64 in dbghelp.dll: no stacktrace");
  256. return;
  257. }
  258. if (!dyn_dbghelp.pSymFromAddr) {
  259. printf_message("Cannot find pSymFromAddr in dbghelp.dll: no stacktrace");
  260. return;
  261. }
  262. if (!dyn_dbghelp.pSymGetLineFromAddr64) {
  263. printf_message("Cannot find SymGetLineFromAddr64 in dbghelp.dll: no stacktrace");
  264. return;
  265. }
  266. if (!dyn_dbghelp.pSymGetModuleInfo64) {
  267. printf_message("Cannot find SymGetModuleInfo64 in dbghelp.dll: no stacktrace");
  268. return;
  269. }
  270. if (!dyn_dbghelp.pSymRefreshModuleList || !dyn_dbghelp.pSymRefreshModuleList(process_information->hProcess)) {
  271. printf_windows_message("SymRefreshModuleList failed: maybe no stacktrace");
  272. }
  273. memset(&stack_frame, 0, sizeof(stack_frame));
  274. stack_frame.AddrPC.Mode = AddrModeFlat;
  275. stack_frame.AddrFrame.Mode = AddrModeFlat;
  276. stack_frame.AddrStack.Mode = AddrModeFlat;
  277. #if defined(SDLPROCDUMP_CPU_X86)
  278. machine_type = IMAGE_FILE_MACHINE_I386;
  279. stack_frame.AddrFrame.Offset = context->Ebp;
  280. stack_frame.AddrStack.Offset = context->Esp;
  281. stack_frame.AddrPC.Offset = context->Eip;
  282. #elif defined(SDLPROCDUMP_CPU_X64)
  283. machine_type = IMAGE_FILE_MACHINE_AMD64;
  284. stack_frame.AddrFrame.Offset = context->Rbp;
  285. stack_frame.AddrStack.Offset = context->Rsp;
  286. stack_frame.AddrPC.Offset = context->Rip;
  287. #elif defined(SDLPROCDUMP_CPU_ARM32)
  288. machine_type = IMAGE_FILE_MACHINE_ARM;
  289. stack_frame.AddrFrame.Offset = context->Lr;
  290. stack_frame.AddrStack.Offset = context->Sp;
  291. stack_frame.AddrPC.Offset = context->Pc;
  292. #elif defined(SDLPROCDUMP_CPU_ARM64)
  293. machine_type = IMAGE_FILE_MACHINE_ARM64;
  294. stack_frame.AddrFrame.Offset = context->Fp;
  295. stack_frame.AddrStack.Offset = context->Sp;
  296. stack_frame.AddrPC.Offset = context->Pc;
  297. #endif
  298. while (dyn_dbghelp.pStackWalk64(machine_type, /* DWORD MachineType */
  299. process_information->hProcess, /* HANDLE hProcess */
  300. process_information->hThread, /* HANDLE hThread */
  301. &stack_frame, /* LPSTACKFRAME64 StackFrame */
  302. &context, /* PVOID ContextRecord */
  303. NULL, /* PREAD_PROCESS_MEMORY_ROUTINE64 ReadMemoryRoutine */
  304. dyn_dbghelp.pSymFunctionTableAccess64, /* PFUNCTION_TABLE_ACCESS_ROUTINE64 FunctionTableAccessRoutine */
  305. dyn_dbghelp.pSymGetModuleBase64, /* PGET_MODULE_BASE_ROUTINE64 GetModuleBaseRoutine */
  306. NULL)) { /* PTRANSLATE_ADDRESS_ROUTINE64 TranslateAddress */
  307. IMAGEHLP_MODULE64 module_info;
  308. union {
  309. char buffer[sizeof(SYMBOL_INFO) + MAX_SYM_NAME * sizeof(CHAR)];
  310. SYMBOL_INFO symbol_info;
  311. } symbol;
  312. DWORD64 dwDisplacement;
  313. DWORD lineColumn = 0;
  314. IMAGEHLP_LINE64 line;
  315. const char *image_file_name;
  316. const char *symbol_name;
  317. const char *file_name;
  318. char line_number[16];
  319. if (stack_frame.AddrPC.Offset == stack_frame.AddrReturn.Offset) {
  320. printf_message("PC == Return Address => Possible endless callstack");
  321. break;
  322. }
  323. memset(&module_info, 0, sizeof(module_info));
  324. module_info.SizeOfStruct = sizeof(module_info);
  325. if (!dyn_dbghelp.pSymGetModuleInfo64(process_information->hProcess, stack_frame.AddrPC.Offset, &module_info)) {
  326. image_file_name = "?";
  327. } else {
  328. image_file_name = get_simple_basename(module_info.ImageName);
  329. }
  330. memset(&symbol, 0, sizeof(symbol));
  331. symbol.symbol_info.SizeOfStruct = sizeof(symbol.symbol_info);
  332. symbol.symbol_info.MaxNameLen = MAX_SYM_NAME;
  333. if (!dyn_dbghelp.pSymFromAddr(process_information->hProcess, (DWORD64)(uintptr_t)stack_frame.AddrPC.Offset, &dwDisplacement, &symbol.symbol_info)) {
  334. symbol_name = "???";
  335. dwDisplacement = 0;
  336. } else {
  337. symbol_name = symbol.symbol_info.Name;
  338. }
  339. line.SizeOfStruct = sizeof(line);
  340. if (!dyn_dbghelp.pSymGetLineFromAddr64(process_information->hProcess, (DWORD64)(uintptr_t)stack_frame.AddrPC.Offset, &lineColumn, &line)) {
  341. file_name = "";
  342. line_number[0] = '\0';
  343. } else {
  344. file_name = line.FileName;
  345. snprintf(line_number, sizeof(line_number), "Line %u", (unsigned int)line.LineNumber);
  346. }
  347. printf_message("%s!%s+0x%x %s %s", image_file_name, symbol_name, dwDisplacement, file_name, line_number);
  348. }
  349. }
  350. static PCONTEXT FillInThreadContext(LPPROCESS_INFORMATION process_information, PCONTEXT context_buffer) {
  351. HANDLE thread_handle = NULL;
  352. thread_handle = OpenThread(THREAD_ALL_ACCESS, FALSE, process_information->dwThreadId);
  353. if (!thread_handle) {
  354. printf_windows_message("OpenThread failed: no stacktrace");
  355. return NULL;
  356. }
  357. memset(context_buffer, 0, sizeof(*context_buffer));
  358. context_buffer->ContextFlags = CONTEXT_ALL;
  359. if (!GetThreadContext(thread_handle, context_buffer)) {
  360. printf_windows_message("GetThreadContext failed: no stacktrace");
  361. CloseHandle(thread_handle);
  362. return NULL;
  363. }
  364. CloseHandle(thread_handle);
  365. return context_buffer;
  366. }
  367. static void GetMSCExceptionName(HANDLE hProcess, ULONG_PTR *parameters, DWORD count_parameters, char *buffer, size_t buffer_size) {
  368. #define FIXUP_DWORD_POINTER(ADDR) ((sizeof(void *) == 8) ? (parameters[3] + (ADDR)) : (ADDR))
  369. #define CHECKED_ReadProcessMemory(PROCESS, ADDRESS, BUFFER, COUNT, WHAT) \
  370. do { \
  371. SIZE_T actual_count; \
  372. BOOL res = ReadProcessMemory((PROCESS), (ADDRESS), (BUFFER), (COUNT), &actual_count); \
  373. if (!res) { \
  374. printf_windows_message(WHAT ": ReadProcessMemory failed"); \
  375. strncpy_s(buffer, buffer_size, "<error>", buffer_size); \
  376. return; \
  377. } \
  378. if ((COUNT) != (actual_count)) { \
  379. printf_message(WHAT ": ReadProcessMemory did not read enough data actual=%lu expected=%lu", \
  380. (unsigned long) (actual_count), (unsigned long) (COUNT)); \
  381. strncpy_s(buffer, buffer_size, "<error>", buffer_size); \
  382. return; \
  383. } \
  384. } while (0)
  385. DWORD depth0;
  386. char *ptr_depth0;
  387. DWORD depth1;
  388. char *ptr_depth1;
  389. DWORD depth2;
  390. char *ptr_depth2;
  391. CHECKED_ReadProcessMemory(hProcess, (void *)(parameters[2] + 3 * sizeof(DWORD)), &depth0, sizeof(depth0), "depth 0");
  392. ptr_depth0 = (char *)FIXUP_DWORD_POINTER(depth0);
  393. CHECKED_ReadProcessMemory(hProcess, ptr_depth0 + 1 * sizeof(DWORD), &depth1, sizeof(depth1), "depth 1");
  394. ptr_depth1 = (char *)FIXUP_DWORD_POINTER(depth1);
  395. CHECKED_ReadProcessMemory(hProcess, ptr_depth1 + 1 * sizeof(DWORD), &depth2, sizeof(depth2), "depth 2");
  396. ptr_depth2 = (char *)FIXUP_DWORD_POINTER(depth2);
  397. CHECKED_ReadProcessMemory(hProcess, ptr_depth2 + 2 * sizeof(void*), buffer, buffer_size, "data");
  398. buffer[buffer_size - 1] = '\0';
  399. #undef FIXUP_DWORD_POINTER
  400. #undef CHECKED_ReadProcessMemory
  401. }
  402. int main(int argc, char *argv[]) {
  403. int i;
  404. size_t command_line_len = 0;
  405. char *command_line;
  406. STARTUPINFOA startup_info;
  407. PROCESS_INFORMATION process_information;
  408. BOOL success;
  409. BOOL debugger_present;
  410. DWORD exit_code;
  411. DWORD creation_flags;
  412. if (argc < 2) {
  413. fprintf(stderr, "Usage: %s PROGRAM [ARG1 [ARG2 [ARG3 ... ]]]\n", argv[0]);
  414. return 1;
  415. }
  416. for (i = 1; i < argc; i++) {
  417. command_line_len += strlen(argv[i]) + 1;
  418. }
  419. command_line = malloc(command_line_len + 1);
  420. if (!command_line) {
  421. printf_message("Failed to allocate memory for command line");
  422. return 1;
  423. }
  424. command_line[0] = '\0';
  425. for (i = 1; i < argc; i++) {
  426. strcat_s(command_line, command_line_len, argv[i]);
  427. if (i != argc - 1) {
  428. strcat_s(command_line, command_line_len, " ");
  429. }
  430. }
  431. memset(&startup_info, 0, sizeof(startup_info));
  432. startup_info.cb = sizeof(startup_info);
  433. debugger_present = IsDebuggerPresent();
  434. creation_flags = NORMAL_PRIORITY_CLASS;
  435. if (!debugger_present) {
  436. creation_flags |= DEBUG_PROCESS | DEBUG_ONLY_THIS_PROCESS;
  437. }
  438. success = CreateProcessA(
  439. argv[1], /* LPCSTR lpApplicationName, */
  440. command_line, /* LPSTR lpCommandLine, */
  441. NULL, /* LPSECURITY_ATTRIBUTES lpProcessAttributes, */
  442. NULL, /* LPSECURITY_ATTRIBUTES lpThreadAttributes, */
  443. TRUE, /* BOOL bInheritHandles, */
  444. creation_flags, /* DWORD dwCreationFlags, */
  445. NULL, /* LPVOID lpEnvironment, */
  446. NULL, /* LPCSTR lpCurrentDirectory, */
  447. &startup_info, /* LPSTARTUPINFOA lpStartupInfo, */
  448. &process_information); /* LPPROCESS_INFORMATION lpProcessInformation */
  449. if (!success) {
  450. printf_windows_message("Failed to start application");
  451. return 1;
  452. }
  453. if (debugger_present) {
  454. WaitForSingleObject(process_information.hProcess, INFINITE);
  455. } else {
  456. int process_alive = 1;
  457. DEBUG_EVENT event;
  458. while (process_alive) {
  459. DWORD continue_status = DBG_CONTINUE;
  460. success = WaitForDebugEvent(&event, INFINITE);
  461. if (!success) {
  462. printf_message("Failed to get a debug event");
  463. return 1;
  464. }
  465. switch (event.dwDebugEventCode) {
  466. case EXCEPTION_DEBUG_EVENT:
  467. printf_message("EXCEPTION_DEBUG_EVENT");
  468. printf_message(" ExceptionCode: 0x%08lx (%s)",
  469. event.u.Exception.ExceptionRecord.ExceptionCode,
  470. exceptionCode_to_string(event.u.Exception.ExceptionRecord.ExceptionCode));
  471. printf_message(" ExceptionFlags: 0x%08lx",
  472. event.u.Exception.ExceptionRecord.ExceptionFlags);
  473. printf_message(" FirstChance: %ld", event.u.Exception.dwFirstChance);
  474. printf_message(" ExceptionAddress: 0x%08lx",
  475. event.u.Exception.ExceptionRecord.ExceptionAddress);
  476. if (IsCXXException(event.u.Exception.ExceptionRecord.ExceptionCode)) {
  477. char exception_name[256];
  478. GetMSCExceptionName(process_information.hProcess, event.u.Exception.ExceptionRecord.ExceptionInformation, event.u.Exception.ExceptionRecord.NumberParameters,
  479. exception_name, sizeof(exception_name));
  480. printf_message(" Exception name: %s", exception_name);
  481. } else if (IsFatalExceptionCode(event.u.Exception.ExceptionRecord.ExceptionCode) || (event.u.Exception.ExceptionRecord.ExceptionFlags & EXCEPTION_NONCONTINUABLE)) {
  482. CONTEXT context_buffer;
  483. PCONTEXT context;
  484. printf_message(" (Non-continuable exception debug event)");
  485. context = FillInThreadContext(&process_information, &context_buffer);
  486. write_minidump(argv[1], &process_information, event.dwThreadId, &event.u.Exception.ExceptionRecord, context);
  487. printf_message("");
  488. #ifdef SDLPROCDUMP_PRINTSTACK
  489. print_stacktrace(&process_information, event.u.Exception.ExceptionRecord.ExceptionAddress, context);
  490. #else
  491. printf_message("No support for printing stacktrack for current architecture");
  492. #endif
  493. DebugActiveProcessStop(event.dwProcessId);
  494. process_alive = 0;
  495. }
  496. continue_status = DBG_EXCEPTION_HANDLED;
  497. break;
  498. case CREATE_PROCESS_DEBUG_EVENT:
  499. load_dbghelp();
  500. if (!dyn_dbghelp.pSymInitialize) {
  501. printf_message("Cannot find pSymInitialize in dbghelp.dll: no stacktrace");
  502. break;
  503. }
  504. /* Don't invade process on CI: downloading symbols will cause test timeouts */
  505. if (!dyn_dbghelp.pSymInitialize(process_information.hProcess, NULL, FALSE)) {
  506. printf_windows_message("pSymInitialize failed: no stacktrace");
  507. break;
  508. }
  509. break;
  510. case EXIT_PROCESS_DEBUG_EVENT:
  511. exit_code = event.u.ExitProcess.dwExitCode;
  512. if (event.dwProcessId == process_information.dwProcessId) {
  513. process_alive = 0;
  514. DebugActiveProcessStop(event.dwProcessId);
  515. }
  516. break;
  517. }
  518. success = ContinueDebugEvent(event.dwProcessId, event.dwThreadId, continue_status);
  519. if (!process_alive) {
  520. DebugActiveProcessStop(event.dwProcessId);
  521. }
  522. }
  523. }
  524. if (dyn_dbghelp.pSymCleanup) {
  525. dyn_dbghelp.pSymCleanup(process_information.hProcess);
  526. }
  527. unload_dbghelp();
  528. exit_code = 1;
  529. success = GetExitCodeProcess(process_information.hProcess, &exit_code);
  530. if (!success) {
  531. printf_message("Failed to get process exit code");
  532. return 1;
  533. }
  534. CloseHandle(process_information.hThread);
  535. CloseHandle(process_information.hProcess);
  536. return exit_code;
  537. }