1 // Copyright 2014 The Rust Project Developers. See the COPYRIGHT
2 // file at the top-level directory of this distribution and at
3 // http://rust-lang.org/COPYRIGHT.
5 // Licensed under the Apache License, Version 2.0 <LICENSE-APACHE or
6 // http://www.apache.org/licenses/LICENSE-2.0> or the MIT license
7 // <LICENSE-MIT or http://opensource.org/licenses/MIT>, at your
8 // option. This file may not be copied, modified, or distributed
9 // except according to those terms.
11 //! Simple backtrace functionality (to print on failure)
13 #![allow(non_camel_case_types)]
16 use container::Container;
17 use from_str::from_str;
18 use io::{IoResult, Writer};
20 use option::{Some, None};
22 use result::{Ok, Err};
26 pub use self::imp::write;
28 // For now logging is turned off by default, and this function checks to see
29 // whether the magical environment variable is present to see if it's turned on.
30 pub fn log_enabled() -> bool {
31 static mut ENABLED: atomics::AtomicInt = atomics::INIT_ATOMIC_INT;
33 match ENABLED.load(atomics::SeqCst) {
40 let val = match os::getenv("RUST_BACKTRACE") {
44 unsafe { ENABLED.store(val, atomics::SeqCst); }
48 #[cfg(target_word_size = "64")] static HEX_WIDTH: uint = 18;
49 #[cfg(target_word_size = "32")] static HEX_WIDTH: uint = 10;
51 // All rust symbols are in theory lists of "::"-separated identifiers. Some
52 // assemblers, however, can't handle these characters in symbol names. To get
53 // around this, we use C++-style mangling. The mangling method is:
55 // 1. Prefix the symbol with "_ZN"
56 // 2. For each element of the path, emit the length plus the element
57 // 3. End the path with "E"
59 // For example, "_ZN4testE" => "test" and "_ZN3foo3bar" => "foo::bar".
61 // We're the ones printing our backtraces, so we can't rely on anything else to
62 // demangle our symbols. It's *much* nicer to look at demangled symbols, so
63 // this function is implemented to give us nice pretty output.
65 // Note that this demangler isn't quite as fancy as it could be. We have lots
66 // of other information in our symbols like hashes, version, type information,
67 // etc. Additionally, this doesn't handle glue symbols at all.
68 fn demangle(writer: &mut Writer, s: &str) -> IoResult<()> {
69 // First validate the symbol. If it doesn't look like anything we're
70 // expecting, we just print it literally. Note that we must handle non-rust
71 // symbols because we could have any function in the backtrace.
73 if s.len() > 4 && s.starts_with("_ZN") && s.ends_with("E") {
74 let mut chars = s.slice(3, s.len() - 1).chars();
79 i = i * 10 + c as uint - '0' as uint;
85 valid = chars.next().is_none();
87 } else if chars.by_ref().take(i - 1).len() != i - 1 {
95 // Alright, let's do this.
97 try!(writer.write_str(s));
99 let mut s = s.slice_from(3);
100 let mut first = true;
103 try!(writer.write_str("::"));
108 while rest.char_at(0).is_digit() {
109 rest = rest.slice_from(1);
111 let i: uint = from_str(s.slice_to(s.len() - rest.len())).unwrap();
112 s = rest.slice_from(i);
113 rest = rest.slice_to(i);
114 while rest.len() > 0 {
115 if rest.starts_with("$") {
116 macro_rules! demangle(
117 ($($pat:expr => $demangled:expr),*) => ({
118 $(if rest.starts_with($pat) {
119 try!(writer.write_str($demangled));
120 rest = rest.slice_from($pat.len());
123 try!(writer.write_str(rest));
129 // see src/librustc/back/link.rs for these mappings
141 // in theory we can demangle any unicode code point, but
142 // for simplicity we just catch the common ones.
149 let idx = match rest.find('$') {
153 try!(writer.write_str(rest.slice_to(idx)));
154 rest = rest.slice_from(idx);
163 /// Backtrace support built on libgcc with some extra OS-specific support
165 /// Some methods of getting a backtrace:
167 /// * The backtrace() functions on unix. It turns out this doesn't work very
168 /// well for green threads on OSX, and the address to symbol portion of it
169 /// suffers problems that are described below.
171 /// * Using libunwind. This is more difficult than it sounds because libunwind
172 /// isn't installed everywhere by default. It's also a bit of a hefty library,
173 /// so possibly not the best option. When testing, libunwind was excellent at
174 /// getting both accurate backtraces and accurate symbols across platforms.
175 /// This route was not chosen in favor of the next option, however.
177 /// * We're already using libgcc_s for exceptions in rust (triggering task
178 /// unwinding and running destructors on the stack), and it turns out that it
179 /// conveniently comes with a function that also gives us a backtrace. All of
180 /// these functions look like _Unwind_*, but it's not quite the full
181 /// repertoire of the libunwind API. Due to it already being in use, this was
182 /// the chosen route of getting a backtrace.
184 /// After choosing libgcc_s for backtraces, the sad part is that it will only
185 /// give us a stack trace of instruction pointers. Thankfully these instruction
186 /// pointers are accurate (they work for green and native threads), but it's
187 /// then up to us again to figure out how to translate these addresses to
188 /// symbols. As with before, we have a few options. Before, that, a little bit
189 /// of an interlude about symbols. This is my very limited knowledge about
190 /// symbol tables, and this information is likely slightly wrong, but the
191 /// general idea should be correct.
193 /// When talking about symbols, it's helpful to know a few things about where
194 /// symbols are located. Some symbols are located in the dynamic symbol table
195 /// of the executable which in theory means that they're available for dynamic
196 /// linking and lookup. Other symbols end up only in the local symbol table of
197 /// the file. This loosely corresponds to pub and priv functions in Rust.
199 /// Armed with this knowledge, we know that our solution for address to symbol
200 /// translation will need to consult both the local and dynamic symbol tables.
201 /// With that in mind, here's our options of translating an address to
204 /// * Use dladdr(). The original backtrace()-based idea actually uses dladdr()
205 /// behind the scenes to translate, and this is why backtrace() was not used.
206 /// Conveniently, this method works fantastically on OSX. It appears dladdr()
207 /// uses magic to consult the local symbol table, or we're putting everything
208 /// in the dynamic symbol table anyway. Regardless, for OSX, this is the
209 /// method used for translation. It's provided by the system and easy to do.o
211 /// Sadly, all other systems have a dladdr() implementation that does not
212 /// consult the local symbol table. This means that most functions are blank
213 /// because they don't have symbols. This means that we need another solution.
215 /// * Use unw_get_proc_name(). This is part of the libunwind api (not the
216 /// libgcc_s version of the libunwind api), but involves taking a dependency
217 /// to libunwind. We may pursue this route in the future if we bundle
218 /// libunwind, but libunwind was unwieldy enough that it was not chosen at
219 /// this time to provide this functionality.
221 /// * Shell out to a utility like `readelf`. Crazy though it may sound, it's a
222 /// semi-reasonable solution. The stdlib already knows how to spawn processes,
223 /// so in theory it could invoke readelf, parse the output, and consult the
224 /// local/dynamic symbol tables from there. This ended up not getting chosen
225 /// due to the craziness of the idea plus the advent of the next option.
227 /// * Use `libbacktrace`. It turns out that this is a small library bundled in
228 /// the gcc repository which provides backtrace and symbol translation
229 /// functionality. All we really need from it is the backtrace functionality,
230 /// and we only really need this on everything that's not OSX, so this is the
231 /// chosen route for now.
233 /// In summary, the current situation uses libgcc_s to get a trace of stack
234 /// pointers, and we use dladdr() or libbacktrace to translate these addresses
235 /// to symbols. This is a bit of a hokey implementation as-is, but it works for
236 /// all unix platforms we support right now, so it at least gets the job done.
241 use io::{IoResult, IoError, Writer};
243 use option::{Some, None, Option};
244 use result::{Ok, Err};
245 use unstable::mutex::{StaticNativeMutex, NATIVE_MUTEX_INIT};
246 use uw = rt::libunwind;
250 writer: &'a mut Writer,
251 last_error: Option<IoError>,
254 #[inline(never)] // if we know this is a function call, we can skip it when
256 pub fn write(w: &mut Writer) -> IoResult<()> {
257 // When using libbacktrace, we use some necessary global state, so we
258 // need to prevent more than one thread from entering this block. This
259 // is semi-reasonable in terms of printing anyway, and we know that all
260 // I/O done here is blocking I/O, not green I/O, so we don't have to
261 // worry about this being a native vs green mutex.
262 static mut LOCK: StaticNativeMutex = NATIVE_MUTEX_INIT;
263 let _g = unsafe { LOCK.lock() };
265 try!(writeln!(w, "stack backtrace:"));
267 let mut cx = Context { writer: w, last_error: None, idx: 0 };
268 return match unsafe {
269 uw::_Unwind_Backtrace(trace_fn,
270 &mut cx as *mut Context as *libc::c_void)
272 uw::_URC_NO_REASON => {
273 match cx.last_error {
274 Some(err) => Err(err),
281 extern fn trace_fn(ctx: *uw::_Unwind_Context,
282 arg: *libc::c_void) -> uw::_Unwind_Reason_Code {
283 let cx: &mut Context = unsafe { cast::transmute(arg) };
284 let ip = unsafe { uw::_Unwind_GetIP(ctx) as *libc::c_void };
285 // dladdr() on osx gets whiny when we use FindEnclosingFunction, and
286 // it appears to work fine without it, so we only use
287 // FindEnclosingFunction on non-osx platforms. In doing so, we get a
288 // slightly more accurate stack trace in the process.
290 // This is often because failure involves the last instruction of a
291 // function being "call std::rt::begin_unwind", with no ret
292 // instructions after it. This means that the return instruction
293 // pointer points *outside* of the calling function, and by
294 // unwinding it we go back to the original function.
295 let ip = if cfg!(target_os = "macos") {
298 unsafe { uw::_Unwind_FindEnclosingFunction(ip) }
301 // Don't print out the first few frames (they're not user frames)
303 if cx.idx <= 0 { return uw::_URC_NO_REASON }
304 // Don't print ginormous backtraces
306 match write!(cx.writer, " ... <frames omitted>\n") {
308 Err(e) => { cx.last_error = Some(e); }
310 return uw::_URC_FAILURE
313 // Once we hit an error, stop trying to print more frames
314 if cx.last_error.is_some() { return uw::_URC_FAILURE }
316 match print(cx.writer, cx.idx, ip) {
318 Err(e) => { cx.last_error = Some(e); }
322 return uw::_URC_NO_REASON
326 #[cfg(target_os = "macos")]
327 fn print(w: &mut Writer, idx: int, addr: *libc::c_void) -> IoResult<()> {
330 dli_fname: *libc::c_char,
331 dli_fbase: *libc::c_void,
332 dli_sname: *libc::c_char,
333 dli_saddr: *libc::c_void,
336 fn dladdr(addr: *libc::c_void,
337 info: *mut Dl_info) -> libc::c_int;
340 let mut info: Dl_info = unsafe { intrinsics::init() };
341 if unsafe { dladdr(addr, &mut info) == 0 } {
342 output(w, idx,addr, None)
344 output(w, idx, addr, Some(unsafe {
345 CString::new(info.dli_sname, false)
350 #[cfg(not(target_os = "macos"))]
351 fn print(w: &mut Writer, idx: int, addr: *libc::c_void) -> IoResult<()> {
352 use container::Container;
355 use path::GenericPath;
358 use slice::{ImmutableVector, MutableVector};
360 ////////////////////////////////////////////////////////////////////////
361 // libbacktrace.h API
362 ////////////////////////////////////////////////////////////////////////
363 type backtrace_syminfo_callback =
364 extern "C" fn(data: *mut libc::c_void,
366 symname: *libc::c_char,
367 symval: libc::uintptr_t,
368 symsize: libc::uintptr_t);
369 type backtrace_error_callback =
370 extern "C" fn(data: *mut libc::c_void,
372 errnum: libc::c_int);
373 enum backtrace_state {}
374 #[link(name = "backtrace", kind = "static")]
376 fn backtrace_create_state(filename: *libc::c_char,
377 threaded: libc::c_int,
378 error: backtrace_error_callback,
379 data: *mut libc::c_void)
380 -> *mut backtrace_state;
381 fn backtrace_syminfo(state: *mut backtrace_state,
382 addr: libc::uintptr_t,
383 cb: backtrace_syminfo_callback,
384 error: backtrace_error_callback,
385 data: *mut libc::c_void) -> libc::c_int;
388 ////////////////////////////////////////////////////////////////////////
390 ////////////////////////////////////////////////////////////////////////
392 extern fn error_cb(_data: *mut libc::c_void, _msg: *libc::c_char,
393 _errnum: libc::c_int) {
394 // do nothing for now
396 extern fn syminfo_cb(data: *mut libc::c_void,
397 _pc: libc::uintptr_t,
398 symname: *libc::c_char,
399 _symval: libc::uintptr_t,
400 _symsize: libc::uintptr_t) {
401 let slot = data as *mut *libc::c_char;
402 unsafe { *slot = symname; }
405 // The libbacktrace API supports creating a state, but it does not
406 // support destroying a state. I personally take this to mean that a
407 // state is meant to be created and then live forever.
409 // I would love to register an at_exit() handler which cleans up this
410 // state, but libbacktrace provides no way to do so.
412 // With these constraints, this function has a statically cached state
413 // that is calculated the first time this is requested. Remember that
414 // backtracing all happens serially (one global lock).
416 // An additionally oddity in this function is that we initialize the
417 // filename via self_exe_name() to pass to libbacktrace. It turns out
418 // that on linux libbacktrace seamlessly gets the filename of the
419 // current executable, but this fails on freebsd. by always providing
420 // it, we make sure that libbacktrace never has a reason to not look up
421 // the symbols. The libbacktrace API also states that the filename must
422 // be in "permanent memory", so we copy it to a static and then use the
423 // static as the pointer.
424 unsafe fn init_state() -> *mut backtrace_state {
425 static mut STATE: *mut backtrace_state = 0 as *mut backtrace_state;
426 static mut LAST_FILENAME: [libc::c_char, ..256] = [0, ..256];
427 if !STATE.is_null() { return STATE }
428 let selfname = if cfg!(target_os = "freebsd") {
433 let filename = match selfname {
435 let bytes = path.as_vec();
436 if bytes.len() < LAST_FILENAME.len() {
437 let i = bytes.iter();
438 for (slot, val) in LAST_FILENAME.mut_iter().zip(i) {
439 *slot = *val as libc::c_char;
441 LAST_FILENAME.as_ptr()
448 STATE = backtrace_create_state(filename, 0, error_cb,
453 ////////////////////////////////////////////////////////////////////////
455 ////////////////////////////////////////////////////////////////////////
457 // backtrace errors are currently swept under the rug, only I/O
458 // errors are reported
459 let state = unsafe { init_state() };
461 return output(w, idx, addr, None)
463 let mut data = 0 as *libc::c_char;
464 let data_addr = &mut data as *mut *libc::c_char;
466 backtrace_syminfo(state, addr as libc::uintptr_t,
467 syminfo_cb, error_cb,
468 data_addr as *mut libc::c_void)
470 if ret == 0 || data.is_null() {
471 output(w, idx, addr, None)
473 output(w, idx, addr, Some(unsafe { CString::new(data, false) }))
477 // Finally, after all that work above, we can emit a symbol.
478 fn output(w: &mut Writer, idx: int, addr: *libc::c_void,
479 s: Option<CString>) -> IoResult<()> {
480 try!(write!(w, " {:2}: {:2$} - ", idx, addr, super::HEX_WIDTH));
481 match s.as_ref().and_then(|c| c.as_str()) {
482 Some(string) => try!(super::demangle(w, string)),
483 None => try!(write!(w, "<unknown>")),
485 w.write(['\n' as u8])
489 /// As always, windows has something very different than unix, we mainly want
490 /// to avoid having to depend too much on libunwind for windows.
492 /// If you google around, you'll find a fair bit of references to built-in
493 /// functions to get backtraces on windows. It turns out that most of these are
494 /// in an external library called dbghelp. I was unable to find this library
495 /// via `-ldbghelp`, but it is apparently normal to do the `dlopen` equivalent
498 /// You'll also find that there's a function called CaptureStackBackTrace
499 /// mentioned frequently (which is also easy to use), but sadly I didn't have a
500 /// copy of that function in my mingw install (maybe it was broken?). Instead,
501 /// this takes the route of using StackWalk64 in order to walk the stack.
503 #[allow(dead_code, uppercase_variables)]
506 use container::Container;
507 use io::{IoResult, Writer};
512 use option::{Some, None};
514 use result::{Ok, Err};
516 use unstable::dynamic_lib::DynamicLibrary;
518 use unstable::mutex::{StaticNativeMutex, NATIVE_MUTEX_INIT};
519 use slice::ImmutableVector;
522 fn GetCurrentProcess() -> libc::HANDLE;
523 fn GetCurrentThread() -> libc::HANDLE;
524 fn RtlCaptureContext(ctx: *mut arch::CONTEXT);
528 extern "system" fn(libc::HANDLE, u64, *mut u64,
529 *mut SYMBOL_INFO) -> libc::BOOL;
530 type SymInitializeFn =
531 extern "system" fn(libc::HANDLE, *libc::c_void,
532 libc::BOOL) -> libc::BOOL;
534 extern "system" fn(libc::HANDLE) -> libc::BOOL;
537 extern "system" fn(libc::DWORD, libc::HANDLE, libc::HANDLE,
538 *mut STACKFRAME64, *mut arch::CONTEXT,
539 *libc::c_void, *libc::c_void,
540 *libc::c_void, *libc::c_void) -> libc::BOOL;
542 static MAX_SYM_NAME: uint = 2000;
543 static IMAGE_FILE_MACHINE_I386: libc::DWORD = 0x014c;
544 static IMAGE_FILE_MACHINE_IA64: libc::DWORD = 0x0200;
545 static IMAGE_FILE_MACHINE_AMD64: libc::DWORD = 0x8664;
549 SizeOfStruct: libc::c_ulong,
550 TypeIndex: libc::c_ulong,
551 Reserved: [u64, ..2],
552 Index: libc::c_ulong,
555 Flags: libc::c_ulong,
558 Register: libc::c_ulong,
559 Scope: libc::c_ulong,
561 NameLen: libc::c_ulong,
562 MaxNameLen: libc::c_ulong,
563 // note that windows has this as 1, but it basically just means that
564 // the name is inline at the end of the struct. For us, we just bump
565 // the struct size up to MAX_SYM_NAME.
566 Name: [libc::c_char, ..MAX_SYM_NAME],
583 struct STACKFRAME64 {
585 AddrReturn: ADDRESS64,
586 AddrFrame: ADDRESS64,
587 AddrStack: ADDRESS64,
588 AddrBStore: ADDRESS64,
589 FuncTableEntry: *libc::c_void,
593 Reserved: [u64, ..3],
599 ThCallbackStack: libc::DWORD,
600 ThCallbackBStore: libc::DWORD,
601 NextCallback: libc::DWORD,
602 FramePointer: libc::DWORD,
604 KeUserCallbackDispatcher: u64,
605 SystemRangeStart: u64,
606 KiUserExceptionDispatcher: u64,
609 Reserved: [u64, ..5],
612 #[cfg(target_arch = "x86")]
616 static MAXIMUM_SUPPORTED_EXTENSION: uint = 512;
619 ContextFlags: libc::DWORD,
626 FloatSave: FLOATING_SAVE_AREA,
643 ExtendedRegisters: [u8, ..MAXIMUM_SUPPORTED_EXTENSION],
646 pub struct FLOATING_SAVE_AREA {
647 ControlWord: libc::DWORD,
648 StatusWord: libc::DWORD,
649 TagWord: libc::DWORD,
650 ErrorOffset: libc::DWORD,
651 ErrorSelector: libc::DWORD,
652 DataOffset: libc::DWORD,
653 DataSelector: libc::DWORD,
654 RegisterArea: [u8, ..80],
655 Cr0NpxState: libc::DWORD,
658 pub fn init_frame(frame: &mut super::STACKFRAME64,
659 ctx: &CONTEXT) -> libc::DWORD {
660 frame.AddrPC.Offset = ctx.Eip as u64;
661 frame.AddrPC.Mode = super::AddrModeFlat;
662 frame.AddrStack.Offset = ctx.Esp as u64;
663 frame.AddrStack.Mode = super::AddrModeFlat;
664 frame.AddrFrame.Offset = ctx.Ebp as u64;
665 frame.AddrFrame.Mode = super::AddrModeFlat;
666 super::IMAGE_FILE_MACHINE_I386
670 #[cfg(target_arch = "x86_64")]
672 use libc::{c_longlong, c_ulonglong};
673 use libc::types::os::arch::extra::{WORD, DWORD, DWORDLONG};
720 FltSave: FLOATING_SAVE_AREA,
722 VectorRegister: [M128A, .. 26],
723 VectorControl: DWORDLONG,
725 DebugControl: DWORDLONG,
726 LastBranchToRip: DWORDLONG,
727 LastBranchFromRip: DWORDLONG,
728 LastExceptionToRip: DWORDLONG,
729 LastExceptionFromRip: DWORDLONG,
737 pub struct FLOATING_SAVE_AREA {
738 _Dummy: [u8, ..512] // FIXME: Fill this out
741 pub fn init_frame(frame: &mut super::STACKFRAME64,
742 ctx: &CONTEXT) -> DWORD {
743 frame.AddrPC.Offset = ctx.Rip as u64;
744 frame.AddrPC.Mode = super::AddrModeFlat;
745 frame.AddrStack.Offset = ctx.Rsp as u64;
746 frame.AddrStack.Mode = super::AddrModeFlat;
747 frame.AddrFrame.Offset = ctx.Rbp as u64;
748 frame.AddrFrame.Mode = super::AddrModeFlat;
749 super::IMAGE_FILE_MACHINE_AMD64
754 handle: libc::HANDLE,
755 SymCleanup: SymCleanupFn,
758 impl Drop for Cleanup {
759 fn drop(&mut self) { (self.SymCleanup)(self.handle); }
762 pub fn write(w: &mut Writer) -> IoResult<()> {
763 // According to windows documentation, all dbghelp functions are
765 static mut LOCK: StaticNativeMutex = NATIVE_MUTEX_INIT;
766 let _g = unsafe { LOCK.lock() };
768 // Open up dbghelp.dll, we don't link to it explicitly because it can't
769 // always be found. Additionally, it's nice having fewer dependencies.
770 let path = Path::new("dbghelp.dll");
771 let lib = match DynamicLibrary::open(Some(&path)) {
773 Err(..) => return Ok(()),
776 macro_rules! sym( ($e:expr, $t:ident) => (
777 match unsafe { lib.symbol::<$t>($e) } {
779 Err(..) => return Ok(())
783 // Fetch the symbols necessary from dbghelp.dll
784 let SymFromAddr = sym!("SymFromAddr", SymFromAddrFn);
785 let SymInitialize = sym!("SymInitialize", SymInitializeFn);
786 let SymCleanup = sym!("SymCleanup", SymCleanupFn);
787 let StackWalk64 = sym!("StackWalk64", StackWalk64Fn);
789 // Allocate necessary structures for doing the stack walk
790 let process = unsafe { GetCurrentProcess() };
791 let thread = unsafe { GetCurrentThread() };
792 let mut context: arch::CONTEXT = unsafe { intrinsics::init() };
793 unsafe { RtlCaptureContext(&mut context); }
794 let mut frame: STACKFRAME64 = unsafe { intrinsics::init() };
795 let image = arch::init_frame(&mut frame, &context);
797 // Initialize this process's symbols
798 let ret = SymInitialize(process, 0 as *libc::c_void, libc::TRUE);
799 if ret != libc::TRUE { return Ok(()) }
800 let _c = Cleanup { handle: process, SymCleanup: SymCleanup };
802 // And now that we're done with all the setup, do the stack walking!
804 try!(write!(w, "stack backtrace:\n"));
805 while StackWalk64(image, process, thread, &mut frame, &mut context,
806 0 as *libc::c_void, 0 as *libc::c_void,
807 0 as *libc::c_void, 0 as *libc::c_void) == libc::TRUE{
808 let addr = frame.AddrPC.Offset;
809 if addr == frame.AddrReturn.Offset || addr == 0 ||
810 frame.AddrReturn.Offset == 0 { break }
813 try!(write!(w, " {:2}: {:#2$x}", i, addr, super::HEX_WIDTH));
814 let mut info: SYMBOL_INFO = unsafe { intrinsics::init() };
815 info.MaxNameLen = MAX_SYM_NAME as libc::c_ulong;
816 info.SizeOfStruct = (mem::size_of::<SYMBOL_INFO>() -
817 info.Name.len() + 1) as libc::c_ulong;
819 let mut displacement = 0u64;
820 let ret = SymFromAddr(process, addr as u64, &mut displacement,
823 if ret == libc::TRUE {
824 try!(write!(w, " - "));
825 let cstr = unsafe { CString::new(info.Name.as_ptr(), false) };
826 let bytes = cstr.as_bytes();
827 match cstr.as_str() {
828 Some(s) => try!(super::demangle(w, s)),
829 None => try!(w.write(bytes.slice_to(bytes.len() - 1))),
832 try!(w.write(['\n' as u8]));
845 macro_rules! t( ($a:expr, $b:expr) => ({
846 let mut m = MemWriter::new();
847 super::demangle(&mut m, $a).unwrap();
848 assert_eq!(str::from_utf8(m.unwrap().as_slice()).unwrap().to_owned(), $b.to_owned());
854 t!("_ZN4testE", "test");
855 t!("_ZN4test", "_ZN4test");
856 t!("_ZN4test1a2bcE", "test::a::bc");
860 fn demangle_dollars() {
861 t!("_ZN4$UP$E", "Box");
862 t!("_ZN8$UP$testE", "Boxtest");
863 t!("_ZN8$UP$test4foobE", "Boxtest::foob");
864 t!("_ZN8$x20test4foobE", " test::foob");
868 fn demangle_many_dollars() {
869 t!("_ZN12test$x20test4foobE", "test test::foob");
870 t!("_ZN12test$UP$test4foobE", "testBoxtest::foob");