//+--------------------------------------------------------------------------- // // Microsoft Windows // Copyright (C) Microsoft Corporation, 1997. // // File: D E B U G X . C P P // // Contents: Implementation of debug support routines. // // Notes: // // Author: danielwe 16 Feb 1997 // //---------------------------------------------------------------------------- #include #pragma hdrstop #ifdef DBG #include "ncdebug.h" #include "ncdefine.h" static int nAssertLevel = 0; static PFNASSERTHOOK pfnAssertHook = DefAssertSzFn; #define MAX_ASSERT_TEXT_SIZE 4096 // // We can only do memory tracking if we've included crtdbg.h and // _DEBUG is defined. // #if defined(_INC_CRTDBG) && defined(_DEBUG) struct DBG_SHARED_MEM { _CrtMemState crtState; DWORD cRef; }; DBG_SHARED_MEM * g_pMem = NULL; HANDLE g_hMap = NULL; static const WCHAR c_szSharedMem[] = L"DBG_NetCfgSharedMemory"; //+--------------------------------------------------------------------------- // // Function: InitDbgState // // Purpose: Initializes the memory leak detection code. // // Arguments: // (none) // // Returns: Nothing. // // Author: danielwe 13 May 1997 // // Notes: // VOID InitDbgState() { g_hMap = CreateFileMapping(INVALID_HANDLE_VALUE, NULL, PAGE_READWRITE, 0, sizeof(DBG_SHARED_MEM), c_szSharedMem); if (g_hMap) { LPVOID pvMem; BOOL fExisted = (GetLastError() == ERROR_ALREADY_EXISTS); pvMem = MapViewOfFile(g_hMap, FILE_MAP_WRITE, 0, 0, 0); g_pMem = reinterpret_cast(pvMem); if (!fExisted) { // First time creating the file mapping. Initialize things. g_pMem->cRef = 0; // start looking for leaks now _CrtMemCheckpoint(&g_pMem->crtState); } g_pMem->cRef++; TraceTag(ttidDefault, "DBGMEM: Init Refcount on shared mem is now %d", g_pMem->cRef); } } //+--------------------------------------------------------------------------- // // Function: UnInitDbgState // // Purpose: Uninitializes the memory leak detection code. // // Arguments: // (none) // // Returns: Nothing. // // Author: danielwe 13 May 1997 // // Notes: // VOID UnInitDbgState() { if (g_pMem) { g_pMem->cRef--; TraceTag(ttidDefault, "DBGMEM: Uninit Refcount on shared mem is now %d", g_pMem->cRef); if (!g_pMem->cRef) { // manually force dump of leaks when refcount goes to 0 _CrtMemDumpAllObjectsSince(&g_pMem->crtState); } UnmapViewOfFile(reinterpret_cast(g_pMem)); CloseHandle(g_hMap); } } #endif BOOL WINAPI FInAssert(VOID) { return nAssertLevel > 0; } VOID WINAPIV AssertFmt(BOOL fExp, PCSTR pszaFile, int nLine, PCSTR pszaFmt, ...) { CHAR rgch[MAX_ASSERT_TEXT_SIZE]; if (!fExp) { va_list valMarker; va_start(valMarker, pszaFmt); wvsprintfA(rgch, pszaFmt, valMarker); va_end(valMarker); AssertSzFn(rgch, pszaFile, nLine); } } VOID WINAPI AssertSzFn(PCSTR pszaMsg, PCSTR pszaFile, INT nLine) { CHAR rgch[MAX_ASSERT_TEXT_SIZE]; ++nAssertLevel; if (pszaFile) { if (pszaMsg) { wsprintfA(rgch, "Net Config Assert Failure:\r\n File %s, line %d:\r\n %s\r\n", pszaFile, nLine, pszaMsg); } else { wsprintfA(rgch, "Net Config Assert Failure:\r\n File %s, line %d.\r\n", pszaFile, nLine); } } else { if (pszaMsg) { wsprintfA(rgch, "Net Config Assert Failure:\r\n:\r\n %s\r\n", pszaMsg); } else { wsprintfA(rgch, "Net Config Assert Failure\r\n"); } } OutputDebugStringA(rgch); if (pfnAssertHook) { (*pfnAssertHook)(pszaMsg, pszaFile, nLine); } --nAssertLevel; } VOID WINAPI AssertSzFn(PCSTR pszaMsg, PCSTR pszaFile, INT nLine, PCSTR pszaFunc) { CHAR rgch[MAX_ASSERT_TEXT_SIZE]; ++nAssertLevel; if (pszaFile) { if (pszaMsg) { wsprintfA(rgch, "Net Config Assert Failure:\r\n File %s, line %d, Func: %s:\r\n %s\r\n", pszaFile, nLine, pszaFunc, pszaMsg ); } else { wsprintfA(rgch, "Net Config Assert Failure:\r\n File %s, line %d, Func: %s:.\r\n", pszaFile, nLine, pszaFunc ) ; } } else { if (pszaMsg) { wsprintfA(rgch, "Net Config Assert Failure:\r\n:\r\n %s\r\n", pszaMsg); } else { wsprintfA(rgch, "Net Config Assert Failure\r\n"); } } OutputDebugStringA(rgch); if (pfnAssertHook) { (*pfnAssertHook)(pszaMsg, pszaFile, nLine); } --nAssertLevel; } VOID WINAPI AssertSzFnWithDbgPrompt(BOOL fPromptIgnore, PCSTR pszaMsg, PCSTR pszaFile, INT nLine, PCSTR pszaFunc) { CHAR rgch[MAX_ASSERT_TEXT_SIZE]; DWORD dwProcId = GetCurrentProcessId(); if (fPromptIgnore) { wsprintfA(rgch, "%s.\r\nPlease attach a kernel mode debugger, or (if you have local access to symbols) a user mode debugger to process id %d (decimal) and hit IGNORE to debug the problem\r\nE.g. use ntsd -Gg -p %d, (or ntsd -d -Gg -p %d) and then hit IGNORE.", pszaMsg, dwProcId, dwProcId, dwProcId); } else { wsprintfA(rgch, "%s.\r\nPlease attach a user mode debugger to process id %d (decimal) and hit RETRY to debug the problem\r\nE.g. use ntsd -Gg -p %d, (or ntsd -d -Gg -p %d) and then hit RETRY.", pszaMsg, dwProcId, dwProcId, dwProcId); } AssertSzFn(rgch, pszaFile, nLine, pszaFunc); }; VOID CALLBACK DefAssertSzFn(PCSTR pszaMsg, PCSTR pszaFile, INT nLine) { CHAR rgch[2048]; INT nID; int cch; PSTR pch; BOOL fNYIWarning = FALSE; CHAR szaNYI[] = "NYI:"; if (pszaFile) { wsprintfA(rgch, "File %s, line %d\r\n\r\n", pszaFile, nLine); } else { rgch[0] = 0; } if (pszaMsg) { // Check to see if this is an NYI alert. If so, then we'll want // to use a different MessageBox title if (strncmp(pszaMsg, szaNYI, strlen(szaNYI)) == 0) { fNYIWarning = TRUE; } lstrcatA(rgch, pszaMsg); } cch = lstrlenA(rgch); pch = &rgch[cch]; if (cch < celems(rgch)) { lstrcpynA(pch, "\n\nPress Abort to crash, Retry to debug, or Ignore to ignore." "\nHold down Shift to copy the assert text to the " "clipboard before the action is taken.", celems(rgch) - cch - 1); } MessageBeep(MB_ICONHAND); nID = MessageBoxA(NULL, rgch, fNYIWarning ? "Net Config -- Not Yet Implemented" : "Net Config Assert Failure", MB_ABORTRETRYIGNORE | MB_DEFBUTTON3 | MB_ICONHAND | MB_SETFOREGROUND | MB_TASKMODAL | MB_SERVICE_NOTIFICATION); if (nID == IDRETRY) { DebugBreak(); } // if cancelling, force a hard exit w/ a GP-fault so that Dr. Watson // generates a nice stack trace log. if (nID == IDABORT) { *(BYTE *) 0 = 1; // write to address 0 causes GP-fault } } VOID WINAPI SetAssertFn(PFNASSERTHOOK pfn) { pfnAssertHook = pfn; } //+--------------------------------------------------------------------------- // To be called during DLL_PROCESS_DETACH for a DLL which implements COM // objects or hands out references to objects which can be tracked. // Call this function with the name of the DLL (so that it can be traced // to the debugger) and the lock count of the DLL. If the lock count is // non-zero, it means the DLL is being unloaded prematurley. When this // condition is detected, a message is printed to the debugger and a // DebugBreak will be invoked if the debug flag dfidBreakOnPrematureDllUnload // is set. // // Assumptions: // Trace and debugging features have not been uninitialized. // // VOID DbgCheckPrematureDllUnload ( PCSTR pszaDllName, UINT ModuleLockCount) { if (0 != ModuleLockCount) { TraceTag(ttidNetcfgBase, "ModuleLockCount == %d. " "%s is being unloaded with clients still holding references!", ModuleLockCount, pszaDllName); if (FIsDebugFlagSet(dfidBreakOnPrematureDllUnload)) { DebugBreak (); } } } #endif //! DBG //+--------------------------------------------------------------------------- // // Function: InitializeDebugging // // Purpose: Called by every DLL or EXE to initialize the debugging // objects (Trace and DebugFlag tables) // // Arguments: // bDisableFaultInjection [in] Disable App Verifier Fault injection for tracing // // Returns: // // Author: jeffspr 23 Sep 1997 // // Notes: // NOTHROW void InitializeDebugging(BOOL bDisableFaultInjection) { // For debug builds or if we have retail tracing enabled we need to // include the tracing code. // Ignore the error return, since we don't return it here anyway. // #ifdef ENABLETRACE (void) HrInitTracing(bDisableFaultInjection); #endif #if defined(DBG) && defined(_INC_CRTDBG) && defined(_DEBUG) if (FIsDebugFlagSet (dfidDumpLeaks)) { InitDbgState(); } #endif } //+--------------------------------------------------------------------------- // // Function: UnInitializeDebugging // // Purpose: Uninitialize the debugging objects (Tracing and DbgFlags) // // Arguments: // (none) // // Returns: // // Author: jeffspr 23 Sep 1997 // // Notes: // NOTHROW void UnInitializeDebugging() { // For debug builds or if we have retail tracing enabled we will have // included the tracing code. We now need to uninitialize it. // Ignore the error return, since we don't return it here anyway. // #ifdef ENABLETRACE (void) HrUnInitTracing(); #endif #if defined(DBG) && defined(_INC_CRTDBG) && defined(_DEBUG) if (FIsDebugFlagSet (dfidDumpLeaks)) { UnInitDbgState(); } #endif }