]> git.ipfire.org Git - thirdparty/glibc.git/blame - manual/debug.texi
tunables: Fix environment variable processing for setuid binaries (bz #21073)
[thirdparty/glibc.git] / manual / debug.texi
CommitLineData
2244ddf2 1@node Debugging Support
0409959c 2@c @node Debugging Support, POSIX Threads, Cryptographic Functions, Top
5656e294 3@c %MENU% Functions to help debugging applications
2244ddf2
UD
4@chapter Debugging support
5
f6b02eff
UD
6Applications are usually debugged using dedicated debugger programs.
7But sometimes this is not possible and, in any case, it is useful to
3ba06713 8provide the developer with as much information as possible at the time
f6b02eff
UD
9the problems are experienced. For this reason a few functions are
10provided which a program can use to help the developer more easily
11locate the problem.
2244ddf2
UD
12
13
14@menu
15* Backtraces:: Obtaining and printing a back trace of the
16 current stack.
17@end menu
18
19
20@node Backtraces, , , Debugging Support
21@section Backtraces
22
23@cindex backtrace
24@cindex backtrace_symbols
25@cindex backtrace_fd
26A @dfn{backtrace} is a list of the function calls that are currently
27active in a thread. The usual way to inspect a backtrace of a program
28is to use an external debugger such as gdb. However, sometimes it is
3ba06713 29useful to obtain a backtrace programmatically from within a program,
2244ddf2
UD
30e.g., for the purposes of logging or diagnostics.
31
32The header file @file{execinfo.h} declares three functions that obtain
33and manipulate backtraces of the current thread.
34@pindex execinfo.h
35
36@comment execinfo.h
37@comment GNU
38@deftypefun int backtrace (void **@var{buffer}, int @var{size})
0037bb60
AO
39@safety{@prelim{}@mtsafe{}@asunsafe{@asuinit{} @ascuheap{} @ascudlopen{} @ascuplugin{} @asulock{}}@acunsafe{@acuinit{} @acsmem{} @aculock{} @acsfd{}}}
40@c The generic implementation just does pointer chasing within the local
41@c stack, without any guarantees that this will handle signal frames
42@c correctly, so it's AS-Unsafe to begin with. However, most (all?)
43@c arches defer to libgcc_s's _Unwind_* implementation, dlopening
44@c libgcc_s.so to that end except in a static version of libc.
45@c libgcc_s's implementation may in turn defer to libunwind. We can't
46@c assume those implementations are AS- or AC-safe, but even if we
47@c could, our own initialization path isn't, and libgcc's implementation
48@c calls malloc and performs internal locking, so...
2244ddf2
UD
49The @code{backtrace} function obtains a backtrace for the current
50thread, as a list of pointers, and places the information into
51@var{buffer}. The argument @var{size} should be the number of
f6b02eff
UD
52@w{@code{void *}} elements that will fit into @var{buffer}. The return
53value is the actual number of entries of @var{buffer} that are obtained,
54and is at most @var{size}.
2244ddf2
UD
55
56The pointers placed in @var{buffer} are actually return addresses
57obtained by inspecting the stack, one return address per stack frame.
58
0bc93a2f 59Note that certain compiler optimizations may interfere with obtaining a
2244ddf2 60valid backtrace. Function inlining causes the inlined function to not
0bc93a2f 61have a stack frame; tail call optimization replaces one stack frame with
2244ddf2
UD
62another; frame pointer elimination will stop @code{backtrace} from
63interpreting the stack contents correctly.
64@end deftypefun
65
66@comment execinfo.h
67@comment GNU
68@deftypefun {char **} backtrace_symbols (void *const *@var{buffer}, int @var{size})
0037bb60
AO
69@safety{@prelim{}@mtsafe{}@asunsafe{@ascuheap{}}@acunsafe{@acsmem{} @aculock{}}}
70@c Collects info returned by _dl_addr in an auto array, allocates memory
71@c for the whole return buffer with malloc then sprintfs into it storing
72@c pointers to the strings into the array entries in the buffer.
73@c _dl_addr takes the recursive dl_load_lock then calls
74@c _dl_find_dso_for_object and determine_info.
75@c _dl_find_dso_for_object calls _dl-addr_inside_object.
76@c All of them are safe as long as the lock is held.
77@c @asucorrupt? It doesn't look like the dynamic loader's data
78@c structures could be in an inconsistent state that would cause
79@c malfunction here.
2244ddf2
UD
80The @code{backtrace_symbols} function translates the information
81obtained from the @code{backtrace} function into an array of strings.
82The argument @var{buffer} should be a pointer to an array of addresses
83obtained via the @code{backtrace} function, and @var{size} is the number
84of entries in that array (the return value of @code{backtrace}).
85
86The return value is a pointer to an array of strings, which has
87@var{size} entries just like the array @var{buffer}. Each string
88contains a printable representation of the corresponding element of
89@var{buffer}. It includes the function name (if this can be
90determined), an offset into the function, and the actual return address
f6b02eff 91(in hexadecimal).
2244ddf2 92
db5e4e88 93Currently, the function name and offset can only be obtained on systems that
f6b02eff
UD
94use the ELF binary format for programs and libraries. On other systems,
95only the hexadecimal return address will be present. Also, you may need
96to pass additional flags to the linker to make the function names
97available to the program. (For example, on systems using GNU ld, you
db5e4e88 98must pass @code{-rdynamic}.)
2244ddf2
UD
99
100The return value of @code{backtrace_symbols} is a pointer obtained via
101the @code{malloc} function, and it is the responsibility of the caller
102to @code{free} that pointer. Note that only the return value need be
f6b02eff 103freed, not the individual strings.
2244ddf2
UD
104
105The return value is @code{NULL} if sufficient memory for the strings
106cannot be obtained.
107@end deftypefun
108
109@comment execinfo.h
110@comment GNU
111@deftypefun void backtrace_symbols_fd (void *const *@var{buffer}, int @var{size}, int @var{fd})
0037bb60
AO
112@safety{@prelim{}@mtsafe{}@assafe{}@acunsafe{@aculock{}}}
113@c Single loop of _dl_addr over addresses, collecting info into an iovec
114@c written out with a writev call per iteration. Addresses and offsets
115@c are converted to hex in auto buffers, so the only potential issue
116@c here is leaking the dl lock in case of cancellation.
2244ddf2
UD
117The @code{backtrace_symbols_fd} function performs the same translation
118as the function @code{backtrace_symbols} function. Instead of returning
119the strings to the caller, it writes the strings to the file descriptor
120@var{fd}, one per line. It does not use the @code{malloc} function, and
121can therefore be used in situations where that function might fail.
122@end deftypefun
123
124The following program illustrates the use of these functions. Note that
125the array to contain the return addresses returned by @code{backtrace}
126is allocated on the stack. Therefore code like this can be used in
127situations where the memory handling via @code{malloc} does not work
128anymore (in which case the @code{backtrace_symbols} has to be replaced
129by a @code{backtrace_symbols_fd} call as well). The number of return
130addresses is normally not very large. Even complicated programs rather
131seldom have a nesting level of more than, say, 50 and with 200 possible
132entries probably all programs should be covered.
133
134@smallexample
135@include execinfo.c.texi
136@end smallexample