2008-05-30 Vladimir Makarov <vmakarov@redhat.com>
[official-gcc.git] / gcc / ada / vxaddr2line.adb
blob1fd85ec506f44b96bdefd2f0164d37ac1de8359a
1 ------------------------------------------------------------------------------
2 -- --
3 -- GNAT COMPILER COMPONENTS --
4 -- --
5 -- V X A D D R 2 L I N E --
6 -- --
7 -- B o d y --
8 -- --
9 -- Copyright (C) 2002-2008, AdaCore --
10 -- --
11 -- GNAT is free software; you can redistribute it and/or modify it under --
12 -- terms of the GNU General Public License as published by the Free Soft- --
13 -- ware Foundation; either version 3, or (at your option) any later ver- --
14 -- sion. GNAT is distributed in the hope that it will be useful, but WITH- --
15 -- OUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY --
16 -- or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License --
17 -- for more details. You should have received a copy of the GNU General --
18 -- Public License distributed with GNAT; see file COPYING3. If not, go to --
19 -- http://www.gnu.org/licenses for a complete copy of the license. --
20 -- --
21 -- GNAT was originally developed by the GNAT team at New York University. --
22 -- Extensive contributions were provided by Ada Core Technologies Inc. --
23 -- --
24 ------------------------------------------------------------------------------
26 -- This program is meant to be used with vxworks to compute symbolic
27 -- backtraces on the host from non-symbolic backtraces obtained on the target.
29 -- The basic idea is to automate the computation of the necessary address
30 -- adjustments prior to calling addr2line when the application has only been
31 -- partially linked on the host.
33 -- Variants for various targets are supported, and the command line should
34 -- be like :
36 -- <target>-addr2line [-a <target_arch>] <exe_file> <ref_address>
37 -- <backtrace addresses>
39 -- Where:
40 -- <target_arch> :
41 -- selects the target architecture. In the absence of this parameter the
42 -- default variant is chosen based on the Detect_Arch result. Generally,
43 -- this parameter will only be used if vxaddr2line is recompiled manually.
44 -- Otherwise, the command name will always be of the form
45 -- <target>-vxaddr2line where there is no ambiguity on the target's
46 -- architecture.
48 -- <exe_file> :
49 -- The name of the partially linked binary file for the application.
51 -- <ref_address> :
52 -- Runtime address (on the target) of a reference symbol you choose,
53 -- which name shall match the value of the Ref_Symbol variable declared
54 -- below. A symbol with a small offset from the beginning of the text
55 -- segment is better, so "adainit" is a good choice.
57 -- <backtrace addresses> :
58 -- The call chain addresses you obtained at run time on the target and
59 -- for which you want a symbolic association.
61 -- TO ADD A NEW ARCHITECTURE add an appropriate value to Architecture type
62 -- (in a format <host>_<target>), and then an appropriate value to Config_List
63 -- array
65 with Ada.Text_IO; use Ada.Text_IO;
66 with Ada.Command_Line; use Ada.Command_Line;
67 with Ada.Strings.Fixed; use Ada.Strings.Fixed;
68 with Interfaces; use Interfaces;
70 with GNAT.OS_Lib; use GNAT.OS_Lib;
71 with GNAT.Directory_Operations; use GNAT.Directory_Operations;
72 with GNAT.Expect; use GNAT.Expect;
73 with GNAT.Regpat; use GNAT.Regpat;
75 procedure VxAddr2Line is
77 package Unsigned_32_IO is new Modular_IO (Unsigned_32);
78 -- Instantiate Modular_IO to have Put.
80 Ref_Symbol : constant String := "adainit";
81 -- This is the name of the reference symbol which runtime address shall
82 -- be provided as the <ref_address> argument.
84 -- All supported architectures
85 type Architecture is
86 (SOLARIS_I586,
87 WINDOWS_POWERPC,
88 WINDOWS_I586,
89 WINDOWS_M68K,
90 SOLARIS_POWERPC,
91 DEC_ALPHA);
93 type Arch_Record is record
94 Addr2line_Binary : String_Access;
95 -- Name of the addr2line utility to use
97 Nm_Binary : String_Access;
98 -- Name of the host nm utility, which will be used to find out the
99 -- offset of the reference symbol in the text segment of the partially
100 -- linked executable.
102 Addr_Digits_To_Skip : Integer;
103 -- When addresses such as 0xfffffc0001dfed50 are provided, for instance
104 -- on ALPHA, indicate the number of leading digits that can be ignored,
105 -- which will avoid computational overflows. Typically only useful when
106 -- 64bit addresses are provided.
108 Bt_Offset_From_Call : Unsigned_32;
109 -- Offset from a backtrace address to the address of the corresponding
110 -- call instruction. This should always be 0, except on platforms where
111 -- the backtrace addresses actually correspond to return and not call
112 -- points. In such cases, a negative value is most likely.
113 end record;
115 -- Configuration for each of the architectures
116 Arch_List : array (Architecture'Range) of Arch_Record :=
117 (WINDOWS_POWERPC =>
118 (Addr2line_Binary => null,
119 Nm_Binary => null,
120 Addr_Digits_To_Skip => 0,
121 Bt_Offset_From_Call => -4),
122 WINDOWS_M68K =>
123 (Addr2line_Binary => null,
124 Nm_Binary => null,
125 Addr_Digits_To_Skip => 0,
126 Bt_Offset_From_Call => -4),
127 WINDOWS_I586 =>
128 (Addr2line_Binary => null,
129 Nm_Binary => null,
130 Addr_Digits_To_Skip => 0,
131 Bt_Offset_From_Call => -2),
132 SOLARIS_POWERPC =>
133 (Addr2line_Binary => null,
134 Nm_Binary => null,
135 Addr_Digits_To_Skip => 0,
136 Bt_Offset_From_Call => 0),
137 SOLARIS_I586 =>
138 (Addr2line_Binary => null,
139 Nm_Binary => null,
140 Addr_Digits_To_Skip => 0,
141 Bt_Offset_From_Call => -2),
142 DEC_ALPHA =>
143 (Addr2line_Binary => null,
144 Nm_Binary => null,
145 Addr_Digits_To_Skip => 8,
146 Bt_Offset_From_Call => 0)
149 -- Current architecture
150 Cur_Arch : Architecture;
152 -- State of architecture detection
153 Detect_Success : Boolean := False;
155 -----------------------
156 -- Local subprograms --
157 -----------------------
159 procedure Error (Msg : String);
160 pragma No_Return (Error);
161 -- Prints the message and then terminates the program
163 procedure Usage;
164 -- Displays the short help message and then terminates the program
166 function Get_Reference_Offset return Unsigned_32;
167 -- Computes the static offset of the reference symbol by calling nm
169 function Get_Value_From_Hex_Arg (Arg : Natural) return Unsigned_32;
170 -- Threats the argument number Arg as a C-style hexadecimal literal
171 -- and returns its integer value
173 function Hex_Image (Value : Unsigned_32) return String_Access;
174 -- Returns access to a string that contains hexadecimal image of Value
176 -- Separate functions that provide build-time customization:
178 procedure Detect_Arch;
179 -- Saves in Cur_Arch the current architecture, based on the name of
180 -- vxaddr2line instance and properties of the host. Detect_Success is False
181 -- if detection fails
183 -----------------
184 -- Detect_Arch --
185 -----------------
187 procedure Detect_Arch is
188 Name : constant String := Base_Name (Command_Name);
189 Proc : constant String :=
190 Name (Name'First .. Index (Name, "-") - 1);
191 Target : constant String :=
192 Name (Name'First .. Index (Name, "vxaddr2line") - 1);
194 begin
195 Detect_Success := False;
197 if Proc = "" then
198 return;
199 end if;
201 if Proc = "alpha" then
202 Cur_Arch := DEC_ALPHA;
203 else
204 -- Let's detect the host.
205 -- ??? A naive implementation that can't distinguish between Unixes
206 if Directory_Separator = '/' then
207 Cur_Arch := Architecture'Value ("solaris_" & Proc);
208 else
209 Cur_Arch := Architecture'Value ("windows_" & Proc);
210 end if;
211 end if;
213 if Arch_List (Cur_Arch).Addr2line_Binary = null then
214 Arch_List (Cur_Arch).Addr2line_Binary := new String'
215 (Target & "addr2line");
216 end if;
217 if Arch_List (Cur_Arch).Nm_Binary = null then
218 Arch_List (Cur_Arch).Nm_Binary := new String'
219 (Target & "nm");
220 end if;
222 Detect_Success := True;
224 exception
225 when others =>
226 return;
227 end Detect_Arch;
229 -----------
230 -- Error --
231 -----------
233 procedure Error (Msg : String) is
234 begin
235 Put_Line (Msg);
236 OS_Exit (1);
237 raise Program_Error;
238 end Error;
240 --------------------------
241 -- Get_Reference_Offset --
242 --------------------------
244 function Get_Reference_Offset return Unsigned_32 is
245 Nm_Cmd : constant String_Access :=
246 Locate_Exec_On_Path (Arch_List (Cur_Arch).Nm_Binary.all);
248 Nm_Args : constant Argument_List :=
249 (new String'("-P"),
250 new String'(Argument (1)));
252 Forever : aliased String := "^@@@@";
253 Reference : aliased String := Ref_Symbol & "\s+\S\s+([\da-fA-F]+)";
255 Pd : Process_Descriptor;
256 Result : Expect_Match;
258 begin
259 -- If Nm is not found, abort
261 if Nm_Cmd = null then
262 Error ("Couldn't find " & Arch_List (Cur_Arch).Nm_Binary.all);
263 end if;
265 Non_Blocking_Spawn
266 (Pd, Nm_Cmd.all, Nm_Args, Buffer_Size => 0, Err_To_Out => True);
268 -- Expect a string containing the reference symbol
270 Expect (Pd, Result,
271 Regexp_Array'(1 => Reference'Unchecked_Access),
272 Timeout => -1);
274 -- If we are here, the pattern was matched successfully
276 declare
277 Match_String : constant String := Expect_Out_Match (Pd);
278 Matches : Match_Array (0 .. 1);
279 Value : Unsigned_32;
281 begin
282 Match (Reference, Match_String, Matches);
283 Value := Unsigned_32'Value
284 ("16#"
285 & Match_String (Matches (1).First .. Matches (1).Last) & "#");
287 -- Expect a string that will never be emitted, so that the
288 -- process can be correctly terminated (with Process_Died)
290 Expect (Pd, Result,
291 Regexp_Array'(1 => Forever'Unchecked_Access),
292 Timeout => -1);
294 exception
295 when Process_Died =>
296 return Value;
297 end;
299 -- We cannot get here
301 raise Program_Error;
303 exception
304 when Invalid_Process =>
305 Error ("Could not spawn a process " & Nm_Cmd.all);
307 when others =>
309 -- The process died without matching the reference symbol or the
310 -- format wasn't recognized.
312 Error ("Unexpected output from " & Nm_Cmd.all);
313 end Get_Reference_Offset;
315 ----------------------------
316 -- Get_Value_From_Hex_Arg --
317 ----------------------------
319 function Get_Value_From_Hex_Arg (Arg : Natural) return Unsigned_32 is
320 Cur_Arg : constant String := Argument (Arg);
321 Offset : Natural;
323 begin
324 -- Skip "0x" prefix if present
326 if Cur_Arg'Length > 2 and then Cur_Arg (1 .. 2) = "0x" then
327 Offset := 3;
328 else
329 Offset := 1;
330 end if;
332 -- Add architecture-specific offset
334 Offset := Offset + Arch_List (Cur_Arch).Addr_Digits_To_Skip;
336 -- Convert to value
338 return Unsigned_32'Value
339 ("16#" & Cur_Arg (Offset .. Cur_Arg'Last) & "#");
341 exception
342 when Constraint_Error =>
344 Error ("Can't parse backtrace address '" & Cur_Arg & "'");
345 raise;
346 end Get_Value_From_Hex_Arg;
348 ---------------
349 -- Hex_Image --
350 ---------------
352 function Hex_Image (Value : Unsigned_32) return String_Access is
353 Result : String (1 .. 20);
354 Start_Pos : Natural;
356 begin
357 Unsigned_32_IO.Put (Result, Value, 16);
358 Start_Pos := Index (Result, "16#") + 3;
359 return new String'(Result (Start_Pos .. Result'Last - 1));
360 end Hex_Image;
362 -----------
363 -- Usage --
364 -----------
366 procedure Usage is
367 begin
368 Put_Line ("Usage : " & Base_Name (Command_Name)
369 & " <executable> <"
370 & Ref_Symbol & " offset on target> <addr1> ...");
372 OS_Exit (1);
373 end Usage;
375 Ref_Static_Offset, Ref_Runtime_Address, Bt_Address : Unsigned_32;
377 Addr2line_Cmd : String_Access;
379 Addr2line_Args : Argument_List (1 .. 501);
380 -- We expect that there won't be more than 500 backtrace frames
382 Addr2line_Args_Count : Natural;
384 Success : Boolean;
386 -- Start of processing for VxAddr2Line
388 begin
390 Detect_Arch;
392 -- There should be at least two arguments
394 if Argument_Count < 2 then
395 Usage;
396 end if;
398 -- ??? HARD LIMIT! There should be at most 501 arguments
400 if Argument_Count > 501 then
401 Error ("Too many backtrace frames");
402 end if;
404 -- Do we have a valid architecture?
406 if not Detect_Success then
407 Put_Line ("Couldn't detect the architecture");
408 return;
409 end if;
411 Addr2line_Cmd :=
412 Locate_Exec_On_Path (Arch_List (Cur_Arch).Addr2line_Binary.all);
414 -- If Addr2line is not found, abort
416 if Addr2line_Cmd = null then
417 Error ("Couldn't find " & Arch_List (Cur_Arch).Addr2line_Binary.all);
418 end if;
420 -- The first argument specifies the image file. Check if it exists
422 if not Is_Regular_File (Argument (1)) then
423 Error ("Couldn't find the executable " & Argument (1));
424 end if;
426 -- The second argument specifies the reference symbol runtime address.
427 -- Let's parse and store it
429 Ref_Runtime_Address := Get_Value_From_Hex_Arg (2);
431 -- Run nm command to get the reference symbol static offset
433 Ref_Static_Offset := Get_Reference_Offset;
435 -- Build addr2line parameters. First, the standard part
437 Addr2line_Args (1) := new String'("--exe=" & Argument (1));
438 Addr2line_Args_Count := 1;
440 -- Now, append to this the adjusted backtraces in arguments 4 and further
442 for J in 3 .. Argument_Count loop
444 -- Basically, for each address in the runtime backtrace ...
446 -- o We compute its offset relatively to the runtime address of the
447 -- reference symbol,
449 -- and then ...
451 -- o We add this offset to the static one for the reference symbol in
452 -- the executable to find the executable offset corresponding to the
453 -- backtrace address.
455 Bt_Address := Get_Value_From_Hex_Arg (J);
457 Bt_Address :=
458 Bt_Address - Ref_Runtime_Address
459 + Ref_Static_Offset
460 + Arch_List (Cur_Arch).Bt_Offset_From_Call;
462 Addr2line_Args_Count := Addr2line_Args_Count + 1;
463 Addr2line_Args (Addr2line_Args_Count) := Hex_Image (Bt_Address);
464 end loop;
466 -- Run the resulting command
468 Spawn (Addr2line_Cmd.all,
469 Addr2line_Args (1 .. Addr2line_Args_Count), Success);
471 if not Success then
472 Error ("Couldn't spawn " & Addr2line_Cmd.all);
473 end if;
475 exception
476 when others =>
478 -- Mask all exceptions
480 return;
481 end VxAddr2Line;