Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

414 lines
10 KiB

//+---------------------------------------------------------------------------
//
// Microsoft Windows
// Copyright (C) Microsoft Corporation, 1997.
//
// File: D E B U G X . C P P
//
// Contents: Implementation of debug support routines.
//
// Notes:
//
// Author: danielwe 16 Feb 1997
//
//----------------------------------------------------------------------------
#include <pch.h>
#pragma hdrstop
#ifdef DBG
#include "ncdebug.h"
#include "ncdefine.h"
static int nAssertLevel = 0;
static PFNASSERTHOOK pfnAssertHook = DefAssertSzFn;
#define MAX_ASSERT_TEXT_SIZE 4096
//
// We can only do memory tracking if we've included crtdbg.h and
// _DEBUG is defined.
//
#if defined(_INC_CRTDBG) && defined(_DEBUG)
struct DBG_SHARED_MEM
{
_CrtMemState crtState;
DWORD cRef;
};
DBG_SHARED_MEM * g_pMem = NULL;
HANDLE g_hMap = NULL;
static const WCHAR c_szSharedMem[] = L"DBG_NetCfgSharedMemory";
//+---------------------------------------------------------------------------
//
// Function: InitDbgState
//
// Purpose: Initializes the memory leak detection code.
//
// Arguments:
// (none)
//
// Returns: Nothing.
//
// Author: danielwe 13 May 1997
//
// Notes:
//
VOID InitDbgState()
{
g_hMap = CreateFileMapping(INVALID_HANDLE_VALUE, NULL, PAGE_READWRITE,
0, sizeof(DBG_SHARED_MEM), c_szSharedMem);
if (g_hMap)
{
LPVOID pvMem;
BOOL fExisted = (GetLastError() == ERROR_ALREADY_EXISTS);
pvMem = MapViewOfFile(g_hMap, FILE_MAP_WRITE, 0, 0, 0);
g_pMem = reinterpret_cast<DBG_SHARED_MEM *>(pvMem);
if (!fExisted)
{
// First time creating the file mapping. Initialize things.
g_pMem->cRef = 0;
// start looking for leaks now
_CrtMemCheckpoint(&g_pMem->crtState);
}
g_pMem->cRef++;
TraceTag(ttidDefault, "DBGMEM: Init Refcount on shared mem is now %d",
g_pMem->cRef);
}
}
//+---------------------------------------------------------------------------
//
// Function: UnInitDbgState
//
// Purpose: Uninitializes the memory leak detection code.
//
// Arguments:
// (none)
//
// Returns: Nothing.
//
// Author: danielwe 13 May 1997
//
// Notes:
//
VOID UnInitDbgState()
{
if (g_pMem)
{
g_pMem->cRef--;
TraceTag(ttidDefault, "DBGMEM: Uninit Refcount on shared mem is now %d",
g_pMem->cRef);
if (!g_pMem->cRef)
{
// manually force dump of leaks when refcount goes to 0
_CrtMemDumpAllObjectsSince(&g_pMem->crtState);
}
UnmapViewOfFile(reinterpret_cast<LPVOID>(g_pMem));
CloseHandle(g_hMap);
}
}
#endif
BOOL WINAPI FInAssert(VOID)
{
return nAssertLevel > 0;
}
VOID WINAPIV AssertFmt(BOOL fExp, PCSTR pszaFile, int nLine, PCSTR pszaFmt, ...)
{
CHAR rgch[MAX_ASSERT_TEXT_SIZE];
if (!fExp)
{
va_list valMarker;
va_start(valMarker, pszaFmt);
wvsprintfA(rgch, pszaFmt, valMarker);
va_end(valMarker);
AssertSzFn(rgch, pszaFile, nLine);
}
}
VOID WINAPI AssertSzFn(PCSTR pszaMsg, PCSTR pszaFile, INT nLine)
{
CHAR rgch[MAX_ASSERT_TEXT_SIZE];
++nAssertLevel;
if (pszaFile)
{
if (pszaMsg)
{
wsprintfA(rgch, "Net Config Assert Failure:\r\n File %s, line %d:\r\n %s\r\n",
pszaFile, nLine, pszaMsg);
}
else
{
wsprintfA(rgch, "Net Config Assert Failure:\r\n File %s, line %d.\r\n",
pszaFile, nLine);
}
}
else
{
if (pszaMsg)
{
wsprintfA(rgch, "Net Config Assert Failure:\r\n:\r\n %s\r\n",
pszaMsg);
}
else
{
wsprintfA(rgch, "Net Config Assert Failure\r\n");
}
}
OutputDebugStringA(rgch);
if (pfnAssertHook)
{
(*pfnAssertHook)(pszaMsg, pszaFile, nLine);
}
--nAssertLevel;
}
VOID WINAPI AssertSzFn(PCSTR pszaMsg, PCSTR pszaFile, INT nLine, PCSTR pszaFunc)
{
CHAR rgch[MAX_ASSERT_TEXT_SIZE];
++nAssertLevel;
if (pszaFile)
{
if (pszaMsg)
{
wsprintfA(rgch, "Net Config Assert Failure:\r\n File %s, line %d, Func: %s:\r\n %s\r\n",
pszaFile, nLine, pszaFunc, pszaMsg );
}
else
{
wsprintfA(rgch, "Net Config Assert Failure:\r\n File %s, line %d, Func: %s:.\r\n",
pszaFile, nLine, pszaFunc ) ;
}
}
else
{
if (pszaMsg)
{
wsprintfA(rgch, "Net Config Assert Failure:\r\n:\r\n %s\r\n",
pszaMsg);
}
else
{
wsprintfA(rgch, "Net Config Assert Failure\r\n");
}
}
OutputDebugStringA(rgch);
if (pfnAssertHook)
{
(*pfnAssertHook)(pszaMsg, pszaFile, nLine);
}
--nAssertLevel;
}
VOID WINAPI AssertSzFnWithDbgPrompt(BOOL fPromptIgnore, PCSTR pszaMsg, PCSTR pszaFile, INT nLine, PCSTR pszaFunc)
{
CHAR rgch[MAX_ASSERT_TEXT_SIZE];
DWORD dwProcId = GetCurrentProcessId();
if (fPromptIgnore)
{
wsprintfA(rgch, "%s.\r\nPlease attach a kernel mode debugger, or (if you have local access to symbols) a user mode debugger to process id %d (decimal) and hit IGNORE to debug the problem\r\nE.g. use ntsd -Gg -p %d, (or ntsd -d -Gg -p %d) and then hit IGNORE.", pszaMsg, dwProcId, dwProcId, dwProcId);
}
else
{
wsprintfA(rgch, "%s.\r\nPlease attach a user mode debugger to process id %d (decimal) and hit RETRY to debug the problem\r\nE.g. use ntsd -Gg -p %d, (or ntsd -d -Gg -p %d) and then hit RETRY.", pszaMsg, dwProcId, dwProcId, dwProcId);
}
AssertSzFn(rgch, pszaFile, nLine, pszaFunc);
};
VOID CALLBACK DefAssertSzFn(PCSTR pszaMsg, PCSTR pszaFile, INT nLine)
{
CHAR rgch[2048];
INT nID;
int cch;
PSTR pch;
BOOL fNYIWarning = FALSE;
CHAR szaNYI[] = "NYI:";
if (pszaFile)
{
wsprintfA(rgch, "File %s, line %d\r\n\r\n", pszaFile, nLine);
}
else
{
rgch[0] = 0;
}
if (pszaMsg)
{
// Check to see if this is an NYI alert. If so, then we'll want
// to use a different MessageBox title
if (strncmp(pszaMsg, szaNYI, strlen(szaNYI)) == 0)
{
fNYIWarning = TRUE;
}
lstrcatA(rgch, pszaMsg);
}
cch = lstrlenA(rgch);
pch = &rgch[cch];
if (cch < celems(rgch))
{
lstrcpynA(pch, "\n\nPress Abort to crash, Retry to debug, or Ignore to ignore."
"\nHold down Shift to copy the assert text to the "
"clipboard before the action is taken.", celems(rgch) - cch - 1);
}
MessageBeep(MB_ICONHAND);
nID = MessageBoxA(NULL, rgch,
fNYIWarning ? "Net Config -- Not Yet Implemented" : "Net Config Assert Failure",
MB_ABORTRETRYIGNORE | MB_DEFBUTTON3 | MB_ICONHAND |
MB_SETFOREGROUND | MB_TASKMODAL | MB_SERVICE_NOTIFICATION);
if (nID == IDRETRY)
{
DebugBreak();
}
// if cancelling, force a hard exit w/ a GP-fault so that Dr. Watson
// generates a nice stack trace log.
if (nID == IDABORT)
{
*(BYTE *) 0 = 1; // write to address 0 causes GP-fault
}
}
VOID WINAPI SetAssertFn(PFNASSERTHOOK pfn)
{
pfnAssertHook = pfn;
}
//+---------------------------------------------------------------------------
// To be called during DLL_PROCESS_DETACH for a DLL which implements COM
// objects or hands out references to objects which can be tracked.
// Call this function with the name of the DLL (so that it can be traced
// to the debugger) and the lock count of the DLL. If the lock count is
// non-zero, it means the DLL is being unloaded prematurley. When this
// condition is detected, a message is printed to the debugger and a
// DebugBreak will be invoked if the debug flag dfidBreakOnPrematureDllUnload
// is set.
//
// Assumptions:
// Trace and debugging features have not been uninitialized.
//
//
VOID
DbgCheckPrematureDllUnload (
PCSTR pszaDllName,
UINT ModuleLockCount)
{
if (0 != ModuleLockCount)
{
TraceTag(ttidNetcfgBase, "ModuleLockCount == %d. "
"%s is being unloaded with clients still holding references!",
ModuleLockCount,
pszaDllName);
if (FIsDebugFlagSet(dfidBreakOnPrematureDllUnload))
{
DebugBreak ();
}
}
}
#endif //! DBG
//+---------------------------------------------------------------------------
//
// Function: InitializeDebugging
//
// Purpose: Called by every DLL or EXE to initialize the debugging
// objects (Trace and DebugFlag tables)
//
// Arguments:
// bDisableFaultInjection [in] Disable App Verifier Fault injection for tracing
//
// Returns:
//
// Author: jeffspr 23 Sep 1997
//
// Notes:
//
NOTHROW void InitializeDebugging(BOOL bDisableFaultInjection)
{
// For debug builds or if we have retail tracing enabled we need to
// include the tracing code.
// Ignore the error return, since we don't return it here anyway.
//
#ifdef ENABLETRACE
(void) HrInitTracing(bDisableFaultInjection);
#endif
#if defined(DBG) && defined(_INC_CRTDBG) && defined(_DEBUG)
if (FIsDebugFlagSet (dfidDumpLeaks))
{
InitDbgState();
}
#endif
}
//+---------------------------------------------------------------------------
//
// Function: UnInitializeDebugging
//
// Purpose: Uninitialize the debugging objects (Tracing and DbgFlags)
//
// Arguments:
// (none)
//
// Returns:
//
// Author: jeffspr 23 Sep 1997
//
// Notes:
//
NOTHROW void UnInitializeDebugging()
{
// For debug builds or if we have retail tracing enabled we will have
// included the tracing code. We now need to uninitialize it.
// Ignore the error return, since we don't return it here anyway.
//
#ifdef ENABLETRACE
(void) HrUnInitTracing();
#endif
#if defined(DBG) && defined(_INC_CRTDBG) && defined(_DEBUG)
if (FIsDebugFlagSet (dfidDumpLeaks))
{
UnInitDbgState();
}
#endif
}