forked from pytorch/pytorch
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathBacktrace.cpp
404 lines (342 loc) · 12.7 KB
/
Backtrace.cpp
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
#include <c10/util/Backtrace.h>
#include <c10/util/Optional.h>
#include <c10/util/Type.h>
#include <c10/util/irange.h>
#include <functional>
#include <memory>
#include <sstream>
#include <string>
#include <vector>
#ifdef _MSC_VER
#include <c10/util/win32-headers.h>
#include <iomanip>
#pragma comment(lib, "Dbghelp.lib")
#endif
#if SUPPORTS_BACKTRACE
#include <cxxabi.h>
#ifdef C10_ANDROID
#include <dlfcn.h>
#include <unwind.h>
#else
#include <execinfo.h>
#endif
#endif
#ifdef FBCODE_CAFFE2
#include <common/process/StackTrace.h>
#endif
namespace c10 {
#if SUPPORTS_BACKTRACE && defined(C10_ANDROID)
struct AndroidBacktraceState {
std::vector<void*> buffer;
};
_Unwind_Reason_Code android_unwind_callback(
struct _Unwind_Context* context,
void* arg) {
AndroidBacktraceState* state = (AndroidBacktraceState*)arg;
uintptr_t pc = _Unwind_GetIP(context);
if (pc) {
state->buffer.emplace_back(reinterpret_cast<void*>(pc));
}
return _URC_NO_REASON;
}
void dump_stack(
std::ostream& os,
size_t frames_to_skip,
size_t maximum_number_of_frames) {
AndroidBacktraceState state;
_Unwind_Backtrace(android_unwind_callback, &state);
int idx = 0;
char* demangled = nullptr;
size_t length = 0;
for (const void* addr : state.buffer) {
const char* symbol = "";
Dl_info info;
if (dladdr(addr, &info) && info.dli_sname) {
symbol = info.dli_sname;
}
int status = 0;
demangled = __cxxabiv1::__cxa_demangle(
/*mangled_name*/ symbol,
/*output_buffer*/ demangled,
/*length*/ &length,
/*status*/ &status);
os << " frame #" << idx++ << "\t"
<< ((demangled != NULL && status == 0) ? demangled : symbol) << "["
<< addr << "]\t" << std::endl;
}
free(demangled);
}
#endif /* SUPPORTS_BACKTRACE && defined(C10_ANDROID) */
#if SUPPORTS_BACKTRACE
namespace {
struct FrameInformation {
/// If available, the demangled name of the function at this frame, else
/// whatever (possibly mangled) name we got from `backtrace()`.
std::string function_name;
/// This is a number in hexadecimal form (e.g. "0xdead") representing the
/// offset into the function's machine code at which the function's body
/// starts, i.e. skipping the "prologue" that handles stack manipulation and
/// other calling convention things.
std::string offset_into_function;
/// NOTE: In debugger parlance, the "object file" refers to the ELF file that
/// the symbol originates from, i.e. either an executable or a library.
std::string object_file;
};
#ifndef C10_ANDROID
bool is_python_frame(const FrameInformation& frame) {
return frame.object_file == "python" || frame.object_file == "python3" ||
(frame.object_file.find("libpython") != std::string::npos);
}
c10::optional<FrameInformation> parse_frame_information(
const std::string& frame_string) {
FrameInformation frame;
// This is the function name in the CXX ABI mangled format, e.g. something
// like _Z1gv. Reference:
// https://itanium-cxx-abi.github.io/cxx-abi/abi.html#mangling
std::string mangled_function_name;
#if defined(__GLIBCXX__)
// In GLIBCXX, `frame_string` follows the pattern
// `<object-file>(<mangled-function-name>+<offset-into-function>)
// [<return-address>]`
auto function_name_start = frame_string.find('(');
if (function_name_start == std::string::npos) {
return c10::nullopt;
}
function_name_start += 1;
auto offset_start = frame_string.find('+', function_name_start);
if (offset_start == std::string::npos) {
return c10::nullopt;
}
offset_start += 1;
const auto offset_end = frame_string.find(')', offset_start);
if (offset_end == std::string::npos) {
return c10::nullopt;
}
frame.object_file = frame_string.substr(0, function_name_start - 1);
frame.offset_into_function =
frame_string.substr(offset_start, offset_end - offset_start);
// NOTE: We don't need to parse the return address because
// we already have it from the call to `backtrace()`.
mangled_function_name = frame_string.substr(
function_name_start, (offset_start - 1) - function_name_start);
#elif defined(_LIBCPP_VERSION)
// In LIBCXX, The pattern is
// `<frame number> <object-file> <return-address> <mangled-function-name> +
// <offset-into-function>`
std::string skip;
std::istringstream input_stream(frame_string);
// operator>>() does not fail -- if the input stream is corrupted, the
// strings will simply be empty.
input_stream >> skip >> frame.object_file >> skip >> mangled_function_name >>
skip >> frame.offset_into_function;
#else
#warning Unknown standard library, backtraces may have incomplete debug information
return c10::nullopt;
#endif // defined(__GLIBCXX__)
// Some system-level functions don't have sufficient debug information, so
// we'll display them as "<unknown function>". They'll still have a return
// address and other pieces of information.
if (mangled_function_name.empty()) {
frame.function_name = "<unknown function>";
return frame;
}
frame.function_name = demangle(mangled_function_name.c_str());
return frame;
}
#endif /* !defined(C10_ANDROID) */
} // anonymous namespace
#elif defined(_MSC_VER)
namespace {
const int max_name_len = 256;
std::string get_module_base_name(void* addr) {
HMODULE h_module;
char module[max_name_len];
strcpy(module, "");
GetModuleHandleEx(
GET_MODULE_HANDLE_EX_FLAG_FROM_ADDRESS |
GET_MODULE_HANDLE_EX_FLAG_UNCHANGED_REFCOUNT,
(LPCTSTR)addr,
&h_module);
if (h_module != NULL) {
GetModuleFileNameA(h_module, module, max_name_len);
}
char* last_slash_pos = strrchr(module, '\\');
if (last_slash_pos) {
std::string module_base_name(last_slash_pos + 1);
return module_base_name;
} else {
std::string module_base_name(module);
return module_base_name;
}
}
class SymbolHelper {
public:
static SymbolHelper& getInstance() {
static SymbolHelper instance;
return instance;
}
bool inited = false;
HANDLE process;
private:
SymbolHelper() {
process = GetCurrentProcess();
DWORD flags = SymGetOptions();
SymSetOptions(flags | SYMOPT_DEFERRED_LOADS);
inited = SymInitialize(process, NULL, TRUE);
}
~SymbolHelper() {
if (inited) {
SymCleanup(process);
}
}
public:
SymbolHelper(SymbolHelper const&) = delete;
void operator=(SymbolHelper const&) = delete;
};
} // anonymous namespace
#endif // SUPPORTS_BACKTRACE
std::string get_backtrace(
size_t frames_to_skip,
size_t maximum_number_of_frames,
bool skip_python_frames) {
#ifdef FBCODE_CAFFE2
// For some reason, the stacktrace implementation in fbcode is
// better than ours, see https://github.com/pytorch/pytorch/issues/56399
// When it's available, just use that.
facebook::process::StackTrace st;
return st.toString();
#elif SUPPORTS_BACKTRACE && !defined(C10_ANDROID)
// We always skip this frame (backtrace).
frames_to_skip += 1;
std::vector<void*> callstack(
frames_to_skip + maximum_number_of_frames, nullptr);
// backtrace() gives us a list of return addresses in the current call stack.
// NOTE: As per man (3) backtrace it can never fail
// (http://man7.org/linux/man-pages/man3/backtrace.3.html).
auto number_of_frames =
::backtrace(callstack.data(), static_cast<int>(callstack.size()));
// Skip as many frames as requested. This is not efficient, but the sizes here
// are small and it makes the code nicer and safer.
for (; frames_to_skip > 0 && number_of_frames > 0;
--frames_to_skip, --number_of_frames) {
callstack.erase(callstack.begin());
}
// `number_of_frames` is strictly less than the current capacity of
// `callstack`, so this is just a pointer subtraction and makes the subsequent
// code safer.
callstack.resize(static_cast<size_t>(number_of_frames));
// `backtrace_symbols` takes the return addresses obtained from `backtrace()`
// and fetches string representations of each stack. Unfortunately it doesn't
// return a struct of individual pieces of information but a concatenated
// string, so we'll have to parse the string after. NOTE: The array returned
// by `backtrace_symbols` is malloc'd and must be manually freed, but not the
// strings inside the array.
std::unique_ptr<char*, std::function<void(char**)>> raw_symbols(
::backtrace_symbols(callstack.data(), static_cast<int>(callstack.size())),
/*deleter=*/free);
const std::vector<std::string> symbols(
raw_symbols.get(), raw_symbols.get() + callstack.size());
// The backtrace string goes into here.
std::ostringstream stream;
// Toggles to true after the first skipped python frame.
bool has_skipped_python_frames = false;
for (const auto frame_number : c10::irange(callstack.size())) {
const auto frame = parse_frame_information(symbols[frame_number]);
if (skip_python_frames && frame && is_python_frame(*frame)) {
if (!has_skipped_python_frames) {
stream << "<omitting python frames>\n";
has_skipped_python_frames = true;
}
continue;
}
// frame #<number>:
stream << "frame #" << frame_number << ": ";
if (frame) {
// <function_name> + <offset> (<return-address> in <object-file>)
stream << frame->function_name << " + " << frame->offset_into_function
<< " (" << callstack[frame_number] << " in " << frame->object_file
<< ")\n";
} else {
// In the edge-case where we couldn't parse the frame string, we can
// just use it directly (it may have a different format).
stream << symbols[frame_number] << "\n";
}
}
return stream.str();
#elif SUPPORTS_BACKTRACE && defined(C10_ANDROID)
std::ostringstream oss;
dump_stack(oss, frames_to_skip, maximum_number_of_frames);
return oss.str().c_str();
#elif defined(_MSC_VER) // !SUPPORTS_BACKTRACE
// This backtrace retrieval is implemented on Windows via the Windows
// API using `CaptureStackBackTrace`, `SymFromAddr` and
// `SymGetLineFromAddr64`.
// https://stackoverflow.com/questions/5693192/win32-backtrace-from-c-code
// https://stackoverflow.com/questions/26398064/counterpart-to-glibcs-backtrace-and-backtrace-symbols-on-windows
// https://docs.microsoft.com/en-us/windows/win32/debug/capturestackbacktrace
// https://docs.microsoft.com/en-us/windows/win32/api/dbghelp/nf-dbghelp-symfromaddr
// https://docs.microsoft.com/en-us/windows/win32/api/dbghelp/nf-dbghelp-symgetlinefromaddr64
// TODO: Support skipping python frames
// We always skip this frame (backtrace).
frames_to_skip += 1;
DWORD64 displacement;
DWORD disp;
std::unique_ptr<IMAGEHLP_LINE64> line;
char buffer[sizeof(SYMBOL_INFO) + MAX_SYM_NAME * sizeof(TCHAR)];
PSYMBOL_INFO p_symbol = (PSYMBOL_INFO)buffer;
std::unique_ptr<void*[]> back_trace(new void*[maximum_number_of_frames]);
bool with_symbol = false;
bool with_line = false;
// The backtrace string goes into here.
std::ostringstream stream;
// Get the frames
const USHORT n_frame = CaptureStackBackTrace(
static_cast<DWORD>(frames_to_skip),
static_cast<DWORD>(maximum_number_of_frames),
back_trace.get(),
NULL);
// Initialize symbols if necessary
SymbolHelper& sh = SymbolHelper::getInstance();
for (USHORT i_frame = 0; i_frame < n_frame; ++i_frame) {
// Get the address and the name of the symbol
if (sh.inited) {
p_symbol->SizeOfStruct = sizeof(SYMBOL_INFO);
p_symbol->MaxNameLen = MAX_SYM_NAME;
with_symbol = SymFromAddr(
sh.process, (ULONG64)back_trace[i_frame], &displacement, p_symbol);
}
// Get the line number and the module
if (sh.inited) {
line.reset(new IMAGEHLP_LINE64());
line->SizeOfStruct = sizeof(IMAGEHLP_LINE64);
with_line = SymGetLineFromAddr64(
sh.process, (ULONG64)back_trace[i_frame], &disp, line.get());
}
// Get the module basename
std::string module = get_module_base_name(back_trace[i_frame]);
// The pattern on Windows is
// `<return-address> <symbol-address>
// <module-name>!<demangled-function-name> [<file-name> @ <line-number>]
stream << std::setfill('0') << std::setw(16) << std::uppercase << std::hex
<< back_trace[i_frame] << std::dec;
if (with_symbol) {
stream << std::setfill('0') << std::setw(16) << std::uppercase << std::hex
<< p_symbol->Address << std::dec << " " << module << "!"
<< p_symbol->Name;
} else {
stream << " <unknown symbol address> " << module << "!<unknown symbol>";
}
stream << " [";
if (with_line) {
stream << line->FileName << " @ " << line->LineNumber;
} else {
stream << "<unknown file> @ <unknown line number>";
}
stream << "]" << std::endl;
}
return stream.str();
#else // !SUPPORTS_BACKTRACE && !_WIN32
return "(no backtrace available)";
#endif // SUPPORTS_BACKTRACE
}
} // namespace c10