| //===- Win32/Signals.cpp - Win32 Signals Implementation ---------*- C++ -*-===// |
| // |
| // The LLVM Compiler Infrastructure |
| // |
| // This file is distributed under the University of Illinois Open Source |
| // License. See LICENSE.TXT for details. |
| // |
| //===----------------------------------------------------------------------===// |
| // |
| // This file provides the Win32 specific implementation of the Signals class. |
| // |
| //===----------------------------------------------------------------------===// |
| #include "llvm/Support/FileSystem.h" |
| #include "llvm/Support/Path.h" |
| #include "llvm/Support/Process.h" |
| #include "llvm/Support/WindowsError.h" |
| #include <algorithm> |
| #include <io.h> |
| #include <signal.h> |
| #include <stdio.h> |
| |
| #include "llvm/Support/Format.h" |
| #include "llvm/Support/raw_ostream.h" |
| |
| // The Windows.h header must be after LLVM and standard headers. |
| #include "WindowsSupport.h" |
| |
| #ifdef __MINGW32__ |
| #include <imagehlp.h> |
| #else |
| #include <crtdbg.h> |
| #include <dbghelp.h> |
| #endif |
| #include <psapi.h> |
| |
| #ifdef _MSC_VER |
| #pragma comment(lib, "psapi.lib") |
| #elif __MINGW32__ |
| #if (HAVE_LIBPSAPI != 1) |
| #error "libpsapi.a should be present" |
| #endif |
| // The version of g++ that comes with MinGW does *not* properly understand |
| // the ll format specifier for printf. However, MinGW passes the format |
| // specifiers on to the MSVCRT entirely, and the CRT understands the ll |
| // specifier. So these warnings are spurious in this case. Since we compile |
| // with -Wall, this will generate these warnings which should be ignored. So |
| // we will turn off the warnings for this just file. However, MinGW also does |
| // not support push and pop for diagnostics, so we have to manually turn it |
| // back on at the end of the file. |
| #pragma GCC diagnostic ignored "-Wformat" |
| #pragma GCC diagnostic ignored "-Wformat-extra-args" |
| |
| #if !defined(__MINGW64_VERSION_MAJOR) |
| // MinGW.org does not have updated support for the 64-bit versions of the |
| // DebugHlp APIs. So we will have to load them manually. The structures and |
| // method signatures were pulled from DbgHelp.h in the Windows Platform SDK, |
| // and adjusted for brevity. |
| typedef struct _IMAGEHLP_LINE64 { |
| DWORD SizeOfStruct; |
| PVOID Key; |
| DWORD LineNumber; |
| PCHAR FileName; |
| DWORD64 Address; |
| } IMAGEHLP_LINE64, *PIMAGEHLP_LINE64; |
| |
| typedef struct _IMAGEHLP_SYMBOL64 { |
| DWORD SizeOfStruct; |
| DWORD64 Address; |
| DWORD Size; |
| DWORD Flags; |
| DWORD MaxNameLength; |
| CHAR Name[1]; |
| } IMAGEHLP_SYMBOL64, *PIMAGEHLP_SYMBOL64; |
| |
| typedef struct _tagADDRESS64 { |
| DWORD64 Offset; |
| WORD Segment; |
| ADDRESS_MODE Mode; |
| } ADDRESS64, *LPADDRESS64; |
| |
| typedef struct _KDHELP64 { |
| DWORD64 Thread; |
| DWORD ThCallbackStack; |
| DWORD ThCallbackBStore; |
| DWORD NextCallback; |
| DWORD FramePointer; |
| DWORD64 KiCallUserMode; |
| DWORD64 KeUserCallbackDispatcher; |
| DWORD64 SystemRangeStart; |
| DWORD64 KiUserExceptionDispatcher; |
| DWORD64 StackBase; |
| DWORD64 StackLimit; |
| DWORD64 Reserved[5]; |
| } KDHELP64, *PKDHELP64; |
| |
| typedef struct _tagSTACKFRAME64 { |
| ADDRESS64 AddrPC; |
| ADDRESS64 AddrReturn; |
| ADDRESS64 AddrFrame; |
| ADDRESS64 AddrStack; |
| ADDRESS64 AddrBStore; |
| PVOID FuncTableEntry; |
| DWORD64 Params[4]; |
| BOOL Far; |
| BOOL Virtual; |
| DWORD64 Reserved[3]; |
| KDHELP64 KdHelp; |
| } STACKFRAME64, *LPSTACKFRAME64; |
| #endif // !defined(__MINGW64_VERSION_MAJOR) |
| #endif // __MINGW32__ |
| |
| typedef BOOL (__stdcall *PREAD_PROCESS_MEMORY_ROUTINE64)(HANDLE hProcess, |
| DWORD64 qwBaseAddress, PVOID lpBuffer, DWORD nSize, |
| LPDWORD lpNumberOfBytesRead); |
| |
| typedef PVOID (__stdcall *PFUNCTION_TABLE_ACCESS_ROUTINE64)( HANDLE ahProcess, |
| DWORD64 AddrBase); |
| |
| typedef DWORD64 (__stdcall *PGET_MODULE_BASE_ROUTINE64)(HANDLE hProcess, |
| DWORD64 Address); |
| |
| typedef DWORD64 (__stdcall *PTRANSLATE_ADDRESS_ROUTINE64)(HANDLE hProcess, |
| HANDLE hThread, LPADDRESS64 lpaddr); |
| |
| typedef BOOL(WINAPI *fpMiniDumpWriteDump)(HANDLE, DWORD, HANDLE, MINIDUMP_TYPE, |
| PMINIDUMP_EXCEPTION_INFORMATION, |
| PMINIDUMP_USER_STREAM_INFORMATION, |
| PMINIDUMP_CALLBACK_INFORMATION); |
| static fpMiniDumpWriteDump fMiniDumpWriteDump; |
| |
| typedef BOOL (WINAPI *fpStackWalk64)(DWORD, HANDLE, HANDLE, LPSTACKFRAME64, |
| PVOID, PREAD_PROCESS_MEMORY_ROUTINE64, |
| PFUNCTION_TABLE_ACCESS_ROUTINE64, |
| PGET_MODULE_BASE_ROUTINE64, |
| PTRANSLATE_ADDRESS_ROUTINE64); |
| static fpStackWalk64 fStackWalk64; |
| |
| typedef DWORD64 (WINAPI *fpSymGetModuleBase64)(HANDLE, DWORD64); |
| static fpSymGetModuleBase64 fSymGetModuleBase64; |
| |
| typedef BOOL (WINAPI *fpSymGetSymFromAddr64)(HANDLE, DWORD64, |
| PDWORD64, PIMAGEHLP_SYMBOL64); |
| static fpSymGetSymFromAddr64 fSymGetSymFromAddr64; |
| |
| typedef BOOL (WINAPI *fpSymGetLineFromAddr64)(HANDLE, DWORD64, |
| PDWORD, PIMAGEHLP_LINE64); |
| static fpSymGetLineFromAddr64 fSymGetLineFromAddr64; |
| |
| typedef BOOL(WINAPI *fpSymGetModuleInfo64)(HANDLE hProcess, DWORD64 dwAddr, |
| PIMAGEHLP_MODULE64 ModuleInfo); |
| static fpSymGetModuleInfo64 fSymGetModuleInfo64; |
| |
| typedef PVOID (WINAPI *fpSymFunctionTableAccess64)(HANDLE, DWORD64); |
| static fpSymFunctionTableAccess64 fSymFunctionTableAccess64; |
| |
| typedef DWORD (WINAPI *fpSymSetOptions)(DWORD); |
| static fpSymSetOptions fSymSetOptions; |
| |
| typedef BOOL (WINAPI *fpSymInitialize)(HANDLE, PCSTR, BOOL); |
| static fpSymInitialize fSymInitialize; |
| |
| typedef BOOL (WINAPI *fpEnumerateLoadedModules)(HANDLE,PENUMLOADED_MODULES_CALLBACK64,PVOID); |
| static fpEnumerateLoadedModules fEnumerateLoadedModules; |
| |
| static bool load64BitDebugHelp(void) { |
| HMODULE hLib = ::LoadLibraryW(L"Dbghelp.dll"); |
| if (hLib) { |
| fMiniDumpWriteDump = (fpMiniDumpWriteDump) |
| ::GetProcAddress(hLib, "MiniDumpWriteDump"); |
| fStackWalk64 = (fpStackWalk64) |
| ::GetProcAddress(hLib, "StackWalk64"); |
| fSymGetModuleBase64 = (fpSymGetModuleBase64) |
| ::GetProcAddress(hLib, "SymGetModuleBase64"); |
| fSymGetSymFromAddr64 = (fpSymGetSymFromAddr64) |
| ::GetProcAddress(hLib, "SymGetSymFromAddr64"); |
| fSymGetLineFromAddr64 = (fpSymGetLineFromAddr64) |
| ::GetProcAddress(hLib, "SymGetLineFromAddr64"); |
| fSymGetModuleInfo64 = (fpSymGetModuleInfo64) |
| ::GetProcAddress(hLib, "SymGetModuleInfo64"); |
| fSymFunctionTableAccess64 = (fpSymFunctionTableAccess64) |
| ::GetProcAddress(hLib, "SymFunctionTableAccess64"); |
| fSymSetOptions = (fpSymSetOptions)::GetProcAddress(hLib, "SymSetOptions"); |
| fSymInitialize = (fpSymInitialize)::GetProcAddress(hLib, "SymInitialize"); |
| fEnumerateLoadedModules = (fpEnumerateLoadedModules) |
| ::GetProcAddress(hLib, "EnumerateLoadedModules64"); |
| } |
| return fStackWalk64 && fSymInitialize && fSymSetOptions && fMiniDumpWriteDump; |
| } |
| |
| using namespace llvm; |
| |
| // Forward declare. |
| static LONG WINAPI LLVMUnhandledExceptionFilter(LPEXCEPTION_POINTERS ep); |
| static BOOL WINAPI LLVMConsoleCtrlHandler(DWORD dwCtrlType); |
| |
| // InterruptFunction - The function to call if ctrl-c is pressed. |
| static void (*InterruptFunction)() = 0; |
| |
| static std::vector<std::string> *FilesToRemove = NULL; |
| static bool RegisteredUnhandledExceptionFilter = false; |
| static bool CleanupExecuted = false; |
| static PTOP_LEVEL_EXCEPTION_FILTER OldFilter = NULL; |
| |
| // Windows creates a new thread to execute the console handler when an event |
| // (such as CTRL/C) occurs. This causes concurrency issues with the above |
| // globals which this critical section addresses. |
| static CRITICAL_SECTION CriticalSection; |
| static bool CriticalSectionInitialized = false; |
| |
| static StringRef Argv0; |
| |
| enum { |
| #if defined(_M_X64) |
| NativeMachineType = IMAGE_FILE_MACHINE_AMD64 |
| #else |
| NativeMachineType = IMAGE_FILE_MACHINE_I386 |
| #endif |
| }; |
| |
| static bool printStackTraceWithLLVMSymbolizer(llvm::raw_ostream &OS, |
| HANDLE hProcess, HANDLE hThread, |
| STACKFRAME64 &StackFrameOrig, |
| CONTEXT *ContextOrig) { |
| // StackWalk64 modifies the incoming stack frame and context, so copy them. |
| STACKFRAME64 StackFrame = StackFrameOrig; |
| |
| // Copy the register context so that we don't modify it while we unwind. We |
| // could use InitializeContext + CopyContext, but that's only required to get |
| // at AVX registers, which typically aren't needed by StackWalk64. Reduce the |
| // flag set to indicate that there's less data. |
| CONTEXT Context = *ContextOrig; |
| Context.ContextFlags = CONTEXT_CONTROL | CONTEXT_INTEGER; |
| |
| static void *StackTrace[256]; |
| size_t Depth = 0; |
| while (fStackWalk64(NativeMachineType, hProcess, hThread, &StackFrame, |
| &Context, 0, fSymFunctionTableAccess64, |
| fSymGetModuleBase64, 0)) { |
| if (StackFrame.AddrFrame.Offset == 0) |
| break; |
| StackTrace[Depth++] = (void *)(uintptr_t)StackFrame.AddrPC.Offset; |
| if (Depth >= array_lengthof(StackTrace)) |
| break; |
| } |
| |
| return printSymbolizedStackTrace(Argv0, &StackTrace[0], Depth, OS); |
| } |
| |
| namespace { |
| struct FindModuleData { |
| void **StackTrace; |
| int Depth; |
| const char **Modules; |
| intptr_t *Offsets; |
| StringSaver *StrPool; |
| }; |
| } |
| |
| static BOOL CALLBACK findModuleCallback(PCSTR ModuleName, |
| DWORD64 ModuleBase, ULONG ModuleSize, |
| void *VoidData) { |
| FindModuleData *Data = (FindModuleData*)VoidData; |
| intptr_t Beg = ModuleBase; |
| intptr_t End = Beg + ModuleSize; |
| for (int I = 0; I < Data->Depth; I++) { |
| if (Data->Modules[I]) |
| continue; |
| intptr_t Addr = (intptr_t)Data->StackTrace[I]; |
| if (Beg <= Addr && Addr < End) { |
| Data->Modules[I] = Data->StrPool->save(ModuleName).data(); |
| Data->Offsets[I] = Addr - Beg; |
| } |
| } |
| return TRUE; |
| } |
| |
| static bool findModulesAndOffsets(void **StackTrace, int Depth, |
| const char **Modules, intptr_t *Offsets, |
| const char *MainExecutableName, |
| StringSaver &StrPool) { |
| if (!fEnumerateLoadedModules) |
| return false; |
| FindModuleData Data; |
| Data.StackTrace = StackTrace; |
| Data.Depth = Depth; |
| Data.Modules = Modules; |
| Data.Offsets = Offsets; |
| Data.StrPool = &StrPool; |
| fEnumerateLoadedModules(GetCurrentProcess(), findModuleCallback, &Data); |
| return true; |
| } |
| |
| static void PrintStackTraceForThread(llvm::raw_ostream &OS, HANDLE hProcess, |
| HANDLE hThread, STACKFRAME64 &StackFrame, |
| CONTEXT *Context) { |
| #if ENABLE_BACKTRACES |
| // Initialize the symbol handler. |
| fSymSetOptions(SYMOPT_DEFERRED_LOADS | SYMOPT_LOAD_LINES); |
| fSymInitialize(hProcess, NULL, TRUE); |
| |
| // Try llvm-symbolizer first. llvm-symbolizer knows how to deal with both PDBs |
| // and DWARF, so it should do a good job regardless of what debug info or |
| // linker is in use. |
| if (printStackTraceWithLLVMSymbolizer(OS, hProcess, hThread, StackFrame, |
| Context)) { |
| return; |
| } |
| |
| while (true) { |
| if (!fStackWalk64(NativeMachineType, hProcess, hThread, &StackFrame, |
| Context, 0, fSymFunctionTableAccess64, |
| fSymGetModuleBase64, 0)) { |
| break; |
| } |
| |
| if (StackFrame.AddrFrame.Offset == 0) |
| break; |
| |
| using namespace llvm; |
| // Print the PC in hexadecimal. |
| DWORD64 PC = StackFrame.AddrPC.Offset; |
| #if defined(_M_X64) |
| OS << format("0x%016llX", PC); |
| #elif defined(_M_IX86) |
| OS << format("0x%08lX", static_cast<DWORD>(PC)); |
| #endif |
| |
| // Print the parameters. Assume there are four. |
| #if defined(_M_X64) |
| OS << format(" (0x%016llX 0x%016llX 0x%016llX 0x%016llX)", |
| StackFrame.Params[0], StackFrame.Params[1], StackFrame.Params[2], |
| StackFrame.Params[3]); |
| #elif defined(_M_IX86) |
| OS << format(" (0x%08lX 0x%08lX 0x%08lX 0x%08lX)", |
| static_cast<DWORD>(StackFrame.Params[0]), |
| static_cast<DWORD>(StackFrame.Params[1]), |
| static_cast<DWORD>(StackFrame.Params[2]), |
| static_cast<DWORD>(StackFrame.Params[3])); |
| #endif |
| // Verify the PC belongs to a module in this process. |
| if (!fSymGetModuleBase64(hProcess, PC)) { |
| OS << " <unknown module>\n"; |
| continue; |
| } |
| |
| // Print the symbol name. |
| char buffer[512]; |
| IMAGEHLP_SYMBOL64 *symbol = reinterpret_cast<IMAGEHLP_SYMBOL64 *>(buffer); |
| memset(symbol, 0, sizeof(IMAGEHLP_SYMBOL64)); |
| symbol->SizeOfStruct = sizeof(IMAGEHLP_SYMBOL64); |
| symbol->MaxNameLength = 512 - sizeof(IMAGEHLP_SYMBOL64); |
| |
| DWORD64 dwDisp; |
| if (!fSymGetSymFromAddr64(hProcess, PC, &dwDisp, symbol)) { |
| OS << '\n'; |
| continue; |
| } |
| |
| buffer[511] = 0; |
| if (dwDisp > 0) |
| OS << format(", %s() + 0x%llX bytes(s)", (const char*)symbol->Name, |
| dwDisp); |
| else |
| OS << format(", %s", (const char*)symbol->Name); |
| |
| // Print the source file and line number information. |
| IMAGEHLP_LINE64 line = {}; |
| DWORD dwLineDisp; |
| line.SizeOfStruct = sizeof(line); |
| if (fSymGetLineFromAddr64(hProcess, PC, &dwLineDisp, &line)) { |
| OS << format(", %s, line %lu", line.FileName, line.LineNumber); |
| if (dwLineDisp > 0) |
| OS << format(" + 0x%lX byte(s)", dwLineDisp); |
| } |
| |
| OS << '\n'; |
| } |
| #endif |
| } |
| |
| namespace llvm { |
| |
| //===----------------------------------------------------------------------===// |
| //=== WARNING: Implementation here must contain only Win32 specific code |
| //=== and must not be UNIX code |
| //===----------------------------------------------------------------------===// |
| |
| #ifdef _MSC_VER |
| /// AvoidMessageBoxHook - Emulates hitting "retry" from an "abort, retry, |
| /// ignore" CRT debug report dialog. "retry" raises an exception which |
| /// ultimately triggers our stack dumper. |
| static LLVM_ATTRIBUTE_UNUSED int |
| AvoidMessageBoxHook(int ReportType, char *Message, int *Return) { |
| // Set *Return to the retry code for the return value of _CrtDbgReport: |
| // http://msdn.microsoft.com/en-us/library/8hyw4sy7(v=vs.71).aspx |
| // This may also trigger just-in-time debugging via DebugBreak(). |
| if (Return) |
| *Return = 1; |
| // Don't call _CrtDbgReport. |
| return TRUE; |
| } |
| |
| #endif |
| |
| extern "C" void HandleAbort(int Sig) { |
| if (Sig == SIGABRT) { |
| LLVM_BUILTIN_TRAP; |
| } |
| } |
| |
| static void InitializeThreading() { |
| if (CriticalSectionInitialized) |
| return; |
| |
| // Now's the time to create the critical section. This is the first time |
| // through here, and there's only one thread. |
| InitializeCriticalSection(&CriticalSection); |
| CriticalSectionInitialized = true; |
| } |
| |
| static void RegisterHandler() { |
| // If we cannot load up the APIs (which would be unexpected as they should |
| // exist on every version of Windows we support), we will bail out since |
| // there would be nothing to report. |
| if (!load64BitDebugHelp()) { |
| assert(false && "These APIs should always be available"); |
| return; |
| } |
| |
| if (RegisteredUnhandledExceptionFilter) { |
| EnterCriticalSection(&CriticalSection); |
| return; |
| } |
| |
| InitializeThreading(); |
| |
| // Enter it immediately. Now if someone hits CTRL/C, the console handler |
| // can't proceed until the globals are updated. |
| EnterCriticalSection(&CriticalSection); |
| |
| RegisteredUnhandledExceptionFilter = true; |
| OldFilter = SetUnhandledExceptionFilter(LLVMUnhandledExceptionFilter); |
| SetConsoleCtrlHandler(LLVMConsoleCtrlHandler, TRUE); |
| |
| // IMPORTANT NOTE: Caller must call LeaveCriticalSection(&CriticalSection) or |
| // else multi-threading problems will ensue. |
| } |
| |
| // RemoveFileOnSignal - The public API |
| bool sys::RemoveFileOnSignal(StringRef Filename, std::string* ErrMsg) { |
| RegisterHandler(); |
| |
| if (CleanupExecuted) { |
| if (ErrMsg) |
| *ErrMsg = "Process terminating -- cannot register for removal"; |
| return true; |
| } |
| |
| if (FilesToRemove == NULL) |
| FilesToRemove = new std::vector<std::string>; |
| |
| FilesToRemove->push_back(Filename); |
| |
| LeaveCriticalSection(&CriticalSection); |
| return false; |
| } |
| |
| // DontRemoveFileOnSignal - The public API |
| void sys::DontRemoveFileOnSignal(StringRef Filename) { |
| if (FilesToRemove == NULL) |
| return; |
| |
| RegisterHandler(); |
| |
| std::vector<std::string>::reverse_iterator I = |
| find(reverse(*FilesToRemove), Filename); |
| if (I != FilesToRemove->rend()) |
| FilesToRemove->erase(I.base()-1); |
| |
| LeaveCriticalSection(&CriticalSection); |
| } |
| |
| void sys::DisableSystemDialogsOnCrash() { |
| // Crash to stack trace handler on abort. |
| signal(SIGABRT, HandleAbort); |
| |
| // The following functions are not reliably accessible on MinGW. |
| #ifdef _MSC_VER |
| // We're already handling writing a "something went wrong" message. |
| _set_abort_behavior(0, _WRITE_ABORT_MSG); |
| // Disable Dr. Watson. |
| _set_abort_behavior(0, _CALL_REPORTFAULT); |
| _CrtSetReportHook(AvoidMessageBoxHook); |
| #endif |
| |
| // Disable standard error dialog box. |
| SetErrorMode(SEM_FAILCRITICALERRORS | SEM_NOGPFAULTERRORBOX | |
| SEM_NOOPENFILEERRORBOX); |
| _set_error_mode(_OUT_TO_STDERR); |
| } |
| |
| /// PrintStackTraceOnErrorSignal - When an error signal (such as SIBABRT or |
| /// SIGSEGV) is delivered to the process, print a stack trace and then exit. |
| void sys::PrintStackTraceOnErrorSignal(StringRef Argv0, |
| bool DisableCrashReporting) { |
| ::Argv0 = Argv0; |
| |
| if (DisableCrashReporting || getenv("LLVM_DISABLE_CRASH_REPORT")) |
| Process::PreventCoreFiles(); |
| |
| DisableSystemDialogsOnCrash(); |
| RegisterHandler(); |
| LeaveCriticalSection(&CriticalSection); |
| } |
| } |
| |
| #if defined(__MINGW32__) && !defined(__MINGW64_VERSION_MAJOR) |
| // Provide a prototype for RtlCaptureContext, mingw32 from mingw.org is |
| // missing it but mingw-w64 has it. |
| extern "C" VOID WINAPI RtlCaptureContext(PCONTEXT ContextRecord); |
| #endif |
| |
| void llvm::sys::PrintStackTrace(raw_ostream &OS) { |
| STACKFRAME64 StackFrame = {}; |
| CONTEXT Context = {}; |
| ::RtlCaptureContext(&Context); |
| #if defined(_M_X64) |
| StackFrame.AddrPC.Offset = Context.Rip; |
| StackFrame.AddrStack.Offset = Context.Rsp; |
| StackFrame.AddrFrame.Offset = Context.Rbp; |
| #else |
| StackFrame.AddrPC.Offset = Context.Eip; |
| StackFrame.AddrStack.Offset = Context.Esp; |
| StackFrame.AddrFrame.Offset = Context.Ebp; |
| #endif |
| StackFrame.AddrPC.Mode = AddrModeFlat; |
| StackFrame.AddrStack.Mode = AddrModeFlat; |
| StackFrame.AddrFrame.Mode = AddrModeFlat; |
| PrintStackTraceForThread(OS, GetCurrentProcess(), GetCurrentThread(), |
| StackFrame, &Context); |
| } |
| |
| |
| void llvm::sys::SetInterruptFunction(void (*IF)()) { |
| RegisterHandler(); |
| InterruptFunction = IF; |
| LeaveCriticalSection(&CriticalSection); |
| } |
| |
| |
| /// AddSignalHandler - Add a function to be called when a signal is delivered |
| /// to the process. The handler can have a cookie passed to it to identify |
| /// what instance of the handler it is. |
| void llvm::sys::AddSignalHandler(void (*FnPtr)(void *), void *Cookie) { |
| CallBacksToRun->push_back(std::make_pair(FnPtr, Cookie)); |
| RegisterHandler(); |
| LeaveCriticalSection(&CriticalSection); |
| } |
| |
| static void Cleanup() { |
| if (CleanupExecuted) |
| return; |
| |
| EnterCriticalSection(&CriticalSection); |
| |
| // Prevent other thread from registering new files and directories for |
| // removal, should we be executing because of the console handler callback. |
| CleanupExecuted = true; |
| |
| // FIXME: open files cannot be deleted. |
| if (FilesToRemove != NULL) |
| while (!FilesToRemove->empty()) { |
| llvm::sys::fs::remove(FilesToRemove->back()); |
| FilesToRemove->pop_back(); |
| } |
| llvm::sys::RunSignalHandlers(); |
| LeaveCriticalSection(&CriticalSection); |
| } |
| |
| void llvm::sys::RunInterruptHandlers() { |
| // The interrupt handler may be called from an interrupt, but it may also be |
| // called manually (such as the case of report_fatal_error with no registered |
| // error handler). We must ensure that the critical section is properly |
| // initialized. |
| InitializeThreading(); |
| Cleanup(); |
| } |
| |
| /// \brief Find the Windows Registry Key for a given location. |
| /// |
| /// \returns a valid HKEY if the location exists, else NULL. |
| static HKEY FindWERKey(const llvm::Twine &RegistryLocation) { |
| HKEY Key; |
| if (ERROR_SUCCESS != ::RegOpenKeyExA(HKEY_LOCAL_MACHINE, |
| RegistryLocation.str().c_str(), 0, |
| KEY_QUERY_VALUE | KEY_READ, &Key)) |
| return NULL; |
| |
| return Key; |
| } |
| |
| /// \brief Populate ResultDirectory with the value for "DumpFolder" for a given |
| /// Windows Registry key. |
| /// |
| /// \returns true if a valid value for DumpFolder exists, false otherwise. |
| static bool GetDumpFolder(HKEY Key, |
| llvm::SmallVectorImpl<char> &ResultDirectory) { |
| using llvm::sys::windows::UTF16ToUTF8; |
| |
| if (!Key) |
| return false; |
| |
| DWORD BufferLengthBytes = 0; |
| |
| if (ERROR_SUCCESS != ::RegGetValueW(Key, 0, L"DumpFolder", REG_EXPAND_SZ, |
| NULL, NULL, &BufferLengthBytes)) |
| return false; |
| |
| SmallVector<wchar_t, MAX_PATH> Buffer(BufferLengthBytes); |
| |
| if (ERROR_SUCCESS != ::RegGetValueW(Key, 0, L"DumpFolder", REG_EXPAND_SZ, |
| NULL, Buffer.data(), &BufferLengthBytes)) |
| return false; |
| |
| DWORD ExpandBufferSize = ::ExpandEnvironmentStringsW(Buffer.data(), NULL, 0); |
| |
| if (!ExpandBufferSize) |
| return false; |
| |
| SmallVector<wchar_t, MAX_PATH> ExpandBuffer(ExpandBufferSize); |
| |
| if (ExpandBufferSize != ::ExpandEnvironmentStringsW(Buffer.data(), |
| ExpandBuffer.data(), |
| ExpandBufferSize)) |
| return false; |
| |
| if (UTF16ToUTF8(ExpandBuffer.data(), ExpandBufferSize - 1, ResultDirectory)) |
| return false; |
| |
| return true; |
| } |
| |
| /// \brief Populate ResultType with a valid MINIDUMP_TYPE based on the value of |
| /// "DumpType" for a given Windows Registry key. |
| /// |
| /// According to |
| /// https://msdn.microsoft.com/en-us/library/windows/desktop/bb787181(v=vs.85).aspx |
| /// valid values for DumpType are: |
| /// * 0: Custom dump |
| /// * 1: Mini dump |
| /// * 2: Full dump |
| /// If "Custom dump" is specified then the "CustomDumpFlags" field is read |
| /// containing a bitwise combination of MINIDUMP_TYPE values. |
| /// |
| /// \returns true if a valid value for ResultType can be set, false otherwise. |
| static bool GetDumpType(HKEY Key, MINIDUMP_TYPE &ResultType) { |
| if (!Key) |
| return false; |
| |
| DWORD DumpType; |
| DWORD TypeSize = sizeof(DumpType); |
| if (ERROR_SUCCESS != ::RegGetValueW(Key, NULL, L"DumpType", RRF_RT_REG_DWORD, |
| NULL, &DumpType, |
| &TypeSize)) |
| return false; |
| |
| switch (DumpType) { |
| case 0: { |
| DWORD Flags = 0; |
| if (ERROR_SUCCESS != ::RegGetValueW(Key, NULL, L"CustomDumpFlags", |
| RRF_RT_REG_DWORD, NULL, &Flags, |
| &TypeSize)) |
| return false; |
| |
| ResultType = static_cast<MINIDUMP_TYPE>(Flags); |
| break; |
| } |
| case 1: |
| ResultType = MiniDumpNormal; |
| break; |
| case 2: |
| ResultType = MiniDumpWithFullMemory; |
| break; |
| default: |
| return false; |
| } |
| return true; |
| } |
| |
| /// \brief Write a Windows dump file containing process information that can be |
| /// used for post-mortem debugging. |
| /// |
| /// \returns zero error code if a mini dump created, actual error code |
| /// otherwise. |
| static std::error_code WINAPI |
| WriteWindowsDumpFile(PMINIDUMP_EXCEPTION_INFORMATION ExceptionInfo) { |
| using namespace llvm; |
| using namespace llvm::sys; |
| |
| std::string MainExecutableName = fs::getMainExecutable(nullptr, nullptr); |
| StringRef ProgramName; |
| |
| if (MainExecutableName.empty()) { |
| // If we can't get the executable filename, |
| // things are in worse shape than we realize |
| // and we should just bail out. |
| return mapWindowsError(::GetLastError()); |
| } |
| |
| ProgramName = path::filename(MainExecutableName.c_str()); |
| |
| // The Windows Registry location as specified at |
| // https://msdn.microsoft.com/en-us/library/windows/desktop/bb787181%28v=vs.85%29.aspx |
| // "Collecting User-Mode Dumps" that may optionally be set to collect crash |
| // dumps in a specified location. |
| StringRef LocalDumpsRegistryLocation = |
| "SOFTWARE\\Microsoft\\Windows\\Windows Error Reporting\\LocalDumps"; |
| |
| // The key pointing to the Registry location that may contain global crash |
| // dump settings. This will be NULL if the location can not be found. |
| ScopedRegHandle DefaultLocalDumpsKey(FindWERKey(LocalDumpsRegistryLocation)); |
| |
| // The key pointing to the Registry location that may contain |
| // application-specific crash dump settings. This will be NULL if the |
| // location can not be found. |
| ScopedRegHandle AppSpecificKey( |
| FindWERKey(Twine(LocalDumpsRegistryLocation) + "\\" + ProgramName)); |
| |
| // Look to see if a dump type is specified in the registry; first with the |
| // app-specific key and failing that with the global key. If none are found |
| // default to a normal dump (GetDumpType will return false either if the key |
| // is NULL or if there is no valid DumpType value at its location). |
| MINIDUMP_TYPE DumpType; |
| if (!GetDumpType(AppSpecificKey, DumpType)) |
| if (!GetDumpType(DefaultLocalDumpsKey, DumpType)) |
| DumpType = MiniDumpNormal; |
| |
| // Look to see if a dump location is specified in the registry; first with the |
| // app-specific key and failing that with the global key. If none are found |
| // we'll just create the dump file in the default temporary file location |
| // (GetDumpFolder will return false either if the key is NULL or if there is |
| // no valid DumpFolder value at its location). |
| bool ExplicitDumpDirectorySet = true; |
| SmallString<MAX_PATH> DumpDirectory; |
| if (!GetDumpFolder(AppSpecificKey, DumpDirectory)) |
| if (!GetDumpFolder(DefaultLocalDumpsKey, DumpDirectory)) |
| ExplicitDumpDirectorySet = false; |
| |
| int FD; |
| SmallString<MAX_PATH> DumpPath; |
| |
| if (ExplicitDumpDirectorySet) { |
| if (std::error_code EC = fs::create_directories(DumpDirectory)) |
| return EC; |
| if (std::error_code EC = fs::createUniqueFile( |
| Twine(DumpDirectory) + "\\" + ProgramName + ".%%%%%%.dmp", FD, |
| DumpPath)) |
| return EC; |
| } else if (std::error_code EC = |
| fs::createTemporaryFile(ProgramName, "dmp", FD, DumpPath)) |
| return EC; |
| |
| // Our support functions return a file descriptor but Windows wants a handle. |
| ScopedCommonHandle FileHandle(reinterpret_cast<HANDLE>(_get_osfhandle(FD))); |
| |
| if (!fMiniDumpWriteDump(::GetCurrentProcess(), ::GetCurrentProcessId(), |
| FileHandle, DumpType, ExceptionInfo, NULL, NULL)) |
| return mapWindowsError(::GetLastError()); |
| |
| llvm::errs() << "Wrote crash dump file \"" << DumpPath << "\"\n"; |
| return std::error_code(); |
| } |
| |
| static LONG WINAPI LLVMUnhandledExceptionFilter(LPEXCEPTION_POINTERS ep) { |
| Cleanup(); |
| |
| // We'll automatically write a Minidump file here to help diagnose |
| // the nasty sorts of crashes that aren't 100% reproducible from a set of |
| // inputs (or in the event that the user is unable or unwilling to provide a |
| // reproducible case). |
| if (!llvm::Process::AreCoreFilesPrevented()) { |
| MINIDUMP_EXCEPTION_INFORMATION ExceptionInfo; |
| ExceptionInfo.ThreadId = ::GetCurrentThreadId(); |
| ExceptionInfo.ExceptionPointers = ep; |
| ExceptionInfo.ClientPointers = FALSE; |
| |
| if (std::error_code EC = WriteWindowsDumpFile(&ExceptionInfo)) |
| llvm::errs() << "Could not write crash dump file: " << EC.message() |
| << "\n"; |
| } |
| |
| // Initialize the STACKFRAME structure. |
| STACKFRAME64 StackFrame = {}; |
| |
| #if defined(_M_X64) |
| StackFrame.AddrPC.Offset = ep->ContextRecord->Rip; |
| StackFrame.AddrPC.Mode = AddrModeFlat; |
| StackFrame.AddrStack.Offset = ep->ContextRecord->Rsp; |
| StackFrame.AddrStack.Mode = AddrModeFlat; |
| StackFrame.AddrFrame.Offset = ep->ContextRecord->Rbp; |
| StackFrame.AddrFrame.Mode = AddrModeFlat; |
| #elif defined(_M_IX86) |
| StackFrame.AddrPC.Offset = ep->ContextRecord->Eip; |
| StackFrame.AddrPC.Mode = AddrModeFlat; |
| StackFrame.AddrStack.Offset = ep->ContextRecord->Esp; |
| StackFrame.AddrStack.Mode = AddrModeFlat; |
| StackFrame.AddrFrame.Offset = ep->ContextRecord->Ebp; |
| StackFrame.AddrFrame.Mode = AddrModeFlat; |
| #endif |
| |
| HANDLE hProcess = GetCurrentProcess(); |
| HANDLE hThread = GetCurrentThread(); |
| PrintStackTraceForThread(llvm::errs(), hProcess, hThread, StackFrame, |
| ep->ContextRecord); |
| |
| _exit(ep->ExceptionRecord->ExceptionCode); |
| } |
| |
| static BOOL WINAPI LLVMConsoleCtrlHandler(DWORD dwCtrlType) { |
| // We are running in our very own thread, courtesy of Windows. |
| EnterCriticalSection(&CriticalSection); |
| Cleanup(); |
| |
| // If an interrupt function has been set, go and run one it; otherwise, |
| // the process dies. |
| void (*IF)() = InterruptFunction; |
| InterruptFunction = 0; // Don't run it on another CTRL-C. |
| |
| if (IF) { |
| // Note: if the interrupt function throws an exception, there is nothing |
| // to catch it in this thread so it will kill the process. |
| IF(); // Run it now. |
| LeaveCriticalSection(&CriticalSection); |
| return TRUE; // Don't kill the process. |
| } |
| |
| // Allow normal processing to take place; i.e., the process dies. |
| LeaveCriticalSection(&CriticalSection); |
| return FALSE; |
| } |
| |
| #if __MINGW32__ |
| // We turned these warnings off for this file so that MinGW-g++ doesn't |
| // complain about the ll format specifiers used. Now we are turning the |
| // warnings back on. If MinGW starts to support diagnostic stacks, we can |
| // replace this with a pop. |
| #pragma GCC diagnostic warning "-Wformat" |
| #pragma GCC diagnostic warning "-Wformat-extra-args" |
| #endif |