mirror of
https://github.com/autc04/Retro68.git
synced 2024-10-31 00:30:17 +00:00
74 lines
2.3 KiB
C++
74 lines
2.3 KiB
C++
|
//===-- sanitizer_unwind_win.cc -------------------------------------------===//
|
||
|
//
|
||
|
// This file is distributed under the University of Illinois Open Source
|
||
|
// License. See LICENSE.TXT for details.
|
||
|
//
|
||
|
//===----------------------------------------------------------------------===//
|
||
|
//
|
||
|
/// Sanitizer unwind Windows specific functions.
|
||
|
//
|
||
|
//===----------------------------------------------------------------------===//
|
||
|
|
||
|
#include "sanitizer_platform.h"
|
||
|
#if SANITIZER_WINDOWS
|
||
|
|
||
|
#define WIN32_LEAN_AND_MEAN
|
||
|
#define NOGDI
|
||
|
#include <windows.h>
|
||
|
|
||
|
#include "sanitizer_dbghelp.h" // for StackWalk64
|
||
|
#include "sanitizer_stacktrace.h"
|
||
|
#include "sanitizer_symbolizer.h" // for InitializeDbgHelpIfNeeded
|
||
|
|
||
|
using namespace __sanitizer;
|
||
|
|
||
|
#if !SANITIZER_GO
|
||
|
void BufferedStackTrace::SlowUnwindStack(uptr pc, u32 max_depth) {
|
||
|
CHECK_GE(max_depth, 2);
|
||
|
// FIXME: CaptureStackBackTrace might be too slow for us.
|
||
|
// FIXME: Compare with StackWalk64.
|
||
|
// FIXME: Look at LLVMUnhandledExceptionFilter in Signals.inc
|
||
|
size = CaptureStackBackTrace(1, Min(max_depth, kStackTraceMax),
|
||
|
(void **)&trace_buffer[0], 0);
|
||
|
if (size == 0)
|
||
|
return;
|
||
|
|
||
|
// Skip the RTL frames by searching for the PC in the stacktrace.
|
||
|
uptr pc_location = LocatePcInTrace(pc);
|
||
|
PopStackFrames(pc_location);
|
||
|
}
|
||
|
|
||
|
void BufferedStackTrace::SlowUnwindStackWithContext(uptr pc, void *context,
|
||
|
u32 max_depth) {
|
||
|
CONTEXT ctx = *(CONTEXT *)context;
|
||
|
STACKFRAME64 stack_frame;
|
||
|
memset(&stack_frame, 0, sizeof(stack_frame));
|
||
|
|
||
|
InitializeDbgHelpIfNeeded();
|
||
|
|
||
|
size = 0;
|
||
|
#if defined(_WIN64)
|
||
|
int machine_type = IMAGE_FILE_MACHINE_AMD64;
|
||
|
stack_frame.AddrPC.Offset = ctx.Rip;
|
||
|
stack_frame.AddrFrame.Offset = ctx.Rbp;
|
||
|
stack_frame.AddrStack.Offset = ctx.Rsp;
|
||
|
#else
|
||
|
int machine_type = IMAGE_FILE_MACHINE_I386;
|
||
|
stack_frame.AddrPC.Offset = ctx.Eip;
|
||
|
stack_frame.AddrFrame.Offset = ctx.Ebp;
|
||
|
stack_frame.AddrStack.Offset = ctx.Esp;
|
||
|
#endif
|
||
|
stack_frame.AddrPC.Mode = AddrModeFlat;
|
||
|
stack_frame.AddrFrame.Mode = AddrModeFlat;
|
||
|
stack_frame.AddrStack.Mode = AddrModeFlat;
|
||
|
while (StackWalk64(machine_type, GetCurrentProcess(), GetCurrentThread(),
|
||
|
&stack_frame, &ctx, NULL, SymFunctionTableAccess64,
|
||
|
SymGetModuleBase64, NULL) &&
|
||
|
size < Min(max_depth, kStackTraceMax)) {
|
||
|
trace_buffer[size++] = (uptr)stack_frame.AddrPC.Offset;
|
||
|
}
|
||
|
}
|
||
|
#endif // #if !SANITIZER_GO
|
||
|
|
||
|
#endif // SANITIZER_WINDOWS
|