|  | //===- Win32/Signals.cpp - Win32 Signals Implementation ---------*- C++ -*-===// | 
|  | // | 
|  | //                     The LLVM Compiler Infrastructure | 
|  | // | 
|  | // This file is distributed under the University of Illinois Open Source | 
|  | // License. See LICENSE.TXT for details. | 
|  | // | 
|  | //===----------------------------------------------------------------------===// | 
|  | // | 
|  | // This file provides the Win32 specific implementation of the Signals class. | 
|  | // | 
|  | //===----------------------------------------------------------------------===// | 
|  | #include "llvm/Support/FileSystem.h" | 
|  | #include "llvm/Support/Path.h" | 
|  | #include "llvm/Support/Process.h" | 
|  | #include "llvm/Support/WindowsError.h" | 
|  | #include <algorithm> | 
|  | #include <io.h> | 
|  | #include <signal.h> | 
|  | #include <stdio.h> | 
|  |  | 
|  | #include "llvm/Support/Format.h" | 
|  | #include "llvm/Support/raw_ostream.h" | 
|  |  | 
|  | // The Windows.h header must be after LLVM and standard headers. | 
|  | #include "WindowsSupport.h" | 
|  |  | 
|  | #ifdef __MINGW32__ | 
|  | #include <imagehlp.h> | 
|  | #else | 
|  | #include <crtdbg.h> | 
|  | #include <dbghelp.h> | 
|  | #endif | 
|  | #include <psapi.h> | 
|  |  | 
|  | #ifdef _MSC_VER | 
|  | #pragma comment(lib, "psapi.lib") | 
|  | #elif __MINGW32__ | 
|  | #if (HAVE_LIBPSAPI != 1) | 
|  | #error "libpsapi.a should be present" | 
|  | #endif | 
|  | // The version of g++ that comes with MinGW does *not* properly understand | 
|  | // the ll format specifier for printf. However, MinGW passes the format | 
|  | // specifiers on to the MSVCRT entirely, and the CRT understands the ll | 
|  | // specifier. So these warnings are spurious in this case. Since we compile | 
|  | // with -Wall, this will generate these warnings which should be ignored. So | 
|  | // we will turn off the warnings for this just file. However, MinGW also does | 
|  | // not support push and pop for diagnostics, so we have to manually turn it | 
|  | // back on at the end of the file. | 
|  | #pragma GCC diagnostic ignored "-Wformat" | 
|  | #pragma GCC diagnostic ignored "-Wformat-extra-args" | 
|  |  | 
|  | #if !defined(__MINGW64_VERSION_MAJOR) | 
|  | // MinGW.org does not have updated support for the 64-bit versions of the | 
|  | // DebugHlp APIs. So we will have to load them manually. The structures and | 
|  | // method signatures were pulled from DbgHelp.h in the Windows Platform SDK, | 
|  | // and adjusted for brevity. | 
|  | typedef struct _IMAGEHLP_LINE64 { | 
|  | DWORD    SizeOfStruct; | 
|  | PVOID    Key; | 
|  | DWORD    LineNumber; | 
|  | PCHAR    FileName; | 
|  | DWORD64  Address; | 
|  | } IMAGEHLP_LINE64, *PIMAGEHLP_LINE64; | 
|  |  | 
|  | typedef struct _IMAGEHLP_SYMBOL64 { | 
|  | DWORD   SizeOfStruct; | 
|  | DWORD64 Address; | 
|  | DWORD   Size; | 
|  | DWORD   Flags; | 
|  | DWORD   MaxNameLength; | 
|  | CHAR    Name[1]; | 
|  | } IMAGEHLP_SYMBOL64, *PIMAGEHLP_SYMBOL64; | 
|  |  | 
|  | typedef struct _tagADDRESS64 { | 
|  | DWORD64       Offset; | 
|  | WORD          Segment; | 
|  | ADDRESS_MODE  Mode; | 
|  | } ADDRESS64, *LPADDRESS64; | 
|  |  | 
|  | typedef struct _KDHELP64 { | 
|  | DWORD64   Thread; | 
|  | DWORD   ThCallbackStack; | 
|  | DWORD   ThCallbackBStore; | 
|  | DWORD   NextCallback; | 
|  | DWORD   FramePointer; | 
|  | DWORD64   KiCallUserMode; | 
|  | DWORD64   KeUserCallbackDispatcher; | 
|  | DWORD64   SystemRangeStart; | 
|  | DWORD64   KiUserExceptionDispatcher; | 
|  | DWORD64   StackBase; | 
|  | DWORD64   StackLimit; | 
|  | DWORD64   Reserved[5]; | 
|  | } KDHELP64, *PKDHELP64; | 
|  |  | 
|  | typedef struct _tagSTACKFRAME64 { | 
|  | ADDRESS64   AddrPC; | 
|  | ADDRESS64   AddrReturn; | 
|  | ADDRESS64   AddrFrame; | 
|  | ADDRESS64   AddrStack; | 
|  | ADDRESS64   AddrBStore; | 
|  | PVOID       FuncTableEntry; | 
|  | DWORD64     Params[4]; | 
|  | BOOL        Far; | 
|  | BOOL        Virtual; | 
|  | DWORD64     Reserved[3]; | 
|  | KDHELP64    KdHelp; | 
|  | } STACKFRAME64, *LPSTACKFRAME64; | 
|  | #endif // !defined(__MINGW64_VERSION_MAJOR) | 
|  | #endif // __MINGW32__ | 
|  |  | 
|  | typedef BOOL (__stdcall *PREAD_PROCESS_MEMORY_ROUTINE64)(HANDLE hProcess, | 
|  | DWORD64 qwBaseAddress, PVOID lpBuffer, DWORD nSize, | 
|  | LPDWORD lpNumberOfBytesRead); | 
|  |  | 
|  | typedef PVOID (__stdcall *PFUNCTION_TABLE_ACCESS_ROUTINE64)( HANDLE ahProcess, | 
|  | DWORD64 AddrBase); | 
|  |  | 
|  | typedef DWORD64 (__stdcall *PGET_MODULE_BASE_ROUTINE64)(HANDLE hProcess, | 
|  | DWORD64 Address); | 
|  |  | 
|  | typedef DWORD64 (__stdcall *PTRANSLATE_ADDRESS_ROUTINE64)(HANDLE hProcess, | 
|  | HANDLE hThread, LPADDRESS64 lpaddr); | 
|  |  | 
|  | typedef BOOL(WINAPI *fpMiniDumpWriteDump)(HANDLE, DWORD, HANDLE, MINIDUMP_TYPE, | 
|  | PMINIDUMP_EXCEPTION_INFORMATION, | 
|  | PMINIDUMP_USER_STREAM_INFORMATION, | 
|  | PMINIDUMP_CALLBACK_INFORMATION); | 
|  | static fpMiniDumpWriteDump fMiniDumpWriteDump; | 
|  |  | 
|  | typedef BOOL (WINAPI *fpStackWalk64)(DWORD, HANDLE, HANDLE, LPSTACKFRAME64, | 
|  | PVOID, PREAD_PROCESS_MEMORY_ROUTINE64, | 
|  | PFUNCTION_TABLE_ACCESS_ROUTINE64, | 
|  | PGET_MODULE_BASE_ROUTINE64, | 
|  | PTRANSLATE_ADDRESS_ROUTINE64); | 
|  | static fpStackWalk64 fStackWalk64; | 
|  |  | 
|  | typedef DWORD64 (WINAPI *fpSymGetModuleBase64)(HANDLE, DWORD64); | 
|  | static fpSymGetModuleBase64 fSymGetModuleBase64; | 
|  |  | 
|  | typedef BOOL (WINAPI *fpSymGetSymFromAddr64)(HANDLE, DWORD64, | 
|  | PDWORD64, PIMAGEHLP_SYMBOL64); | 
|  | static fpSymGetSymFromAddr64 fSymGetSymFromAddr64; | 
|  |  | 
|  | typedef BOOL (WINAPI *fpSymGetLineFromAddr64)(HANDLE, DWORD64, | 
|  | PDWORD, PIMAGEHLP_LINE64); | 
|  | static fpSymGetLineFromAddr64 fSymGetLineFromAddr64; | 
|  |  | 
|  | typedef BOOL(WINAPI *fpSymGetModuleInfo64)(HANDLE hProcess, DWORD64 dwAddr, | 
|  | PIMAGEHLP_MODULE64 ModuleInfo); | 
|  | static fpSymGetModuleInfo64 fSymGetModuleInfo64; | 
|  |  | 
|  | typedef PVOID (WINAPI *fpSymFunctionTableAccess64)(HANDLE, DWORD64); | 
|  | static fpSymFunctionTableAccess64 fSymFunctionTableAccess64; | 
|  |  | 
|  | typedef DWORD (WINAPI *fpSymSetOptions)(DWORD); | 
|  | static fpSymSetOptions fSymSetOptions; | 
|  |  | 
|  | typedef BOOL (WINAPI *fpSymInitialize)(HANDLE, PCSTR, BOOL); | 
|  | static fpSymInitialize fSymInitialize; | 
|  |  | 
|  | typedef BOOL (WINAPI *fpEnumerateLoadedModules)(HANDLE,PENUMLOADED_MODULES_CALLBACK64,PVOID); | 
|  | static fpEnumerateLoadedModules fEnumerateLoadedModules; | 
|  |  | 
|  | static bool load64BitDebugHelp(void) { | 
|  | HMODULE hLib = ::LoadLibraryW(L"Dbghelp.dll"); | 
|  | if (hLib) { | 
|  | fMiniDumpWriteDump = (fpMiniDumpWriteDump) | 
|  | ::GetProcAddress(hLib, "MiniDumpWriteDump"); | 
|  | fStackWalk64 = (fpStackWalk64) | 
|  | ::GetProcAddress(hLib, "StackWalk64"); | 
|  | fSymGetModuleBase64 = (fpSymGetModuleBase64) | 
|  | ::GetProcAddress(hLib, "SymGetModuleBase64"); | 
|  | fSymGetSymFromAddr64 = (fpSymGetSymFromAddr64) | 
|  | ::GetProcAddress(hLib, "SymGetSymFromAddr64"); | 
|  | fSymGetLineFromAddr64 = (fpSymGetLineFromAddr64) | 
|  | ::GetProcAddress(hLib, "SymGetLineFromAddr64"); | 
|  | fSymGetModuleInfo64 = (fpSymGetModuleInfo64) | 
|  | ::GetProcAddress(hLib, "SymGetModuleInfo64"); | 
|  | fSymFunctionTableAccess64 = (fpSymFunctionTableAccess64) | 
|  | ::GetProcAddress(hLib, "SymFunctionTableAccess64"); | 
|  | fSymSetOptions = (fpSymSetOptions)::GetProcAddress(hLib, "SymSetOptions"); | 
|  | fSymInitialize = (fpSymInitialize)::GetProcAddress(hLib, "SymInitialize"); | 
|  | fEnumerateLoadedModules = (fpEnumerateLoadedModules) | 
|  | ::GetProcAddress(hLib, "EnumerateLoadedModules64"); | 
|  | } | 
|  | return fStackWalk64 && fSymInitialize && fSymSetOptions && fMiniDumpWriteDump; | 
|  | } | 
|  |  | 
|  | using namespace llvm; | 
|  |  | 
|  | // Forward declare. | 
|  | static LONG WINAPI LLVMUnhandledExceptionFilter(LPEXCEPTION_POINTERS ep); | 
|  | static BOOL WINAPI LLVMConsoleCtrlHandler(DWORD dwCtrlType); | 
|  |  | 
|  | // InterruptFunction - The function to call if ctrl-c is pressed. | 
|  | static void (*InterruptFunction)() = 0; | 
|  |  | 
|  | static std::vector<std::string> *FilesToRemove = NULL; | 
|  | static bool RegisteredUnhandledExceptionFilter = false; | 
|  | static bool CleanupExecuted = false; | 
|  | static PTOP_LEVEL_EXCEPTION_FILTER OldFilter = NULL; | 
|  |  | 
|  | // Windows creates a new thread to execute the console handler when an event | 
|  | // (such as CTRL/C) occurs.  This causes concurrency issues with the above | 
|  | // globals which this critical section addresses. | 
|  | static CRITICAL_SECTION CriticalSection; | 
|  | static bool CriticalSectionInitialized = false; | 
|  |  | 
|  | static StringRef Argv0; | 
|  |  | 
|  | enum { | 
|  | #if defined(_M_X64) | 
|  | NativeMachineType = IMAGE_FILE_MACHINE_AMD64 | 
|  | #else | 
|  | NativeMachineType = IMAGE_FILE_MACHINE_I386 | 
|  | #endif | 
|  | }; | 
|  |  | 
|  | static bool printStackTraceWithLLVMSymbolizer(llvm::raw_ostream &OS, | 
|  | HANDLE hProcess, HANDLE hThread, | 
|  | STACKFRAME64 &StackFrameOrig, | 
|  | CONTEXT *ContextOrig) { | 
|  | // StackWalk64 modifies the incoming stack frame and context, so copy them. | 
|  | STACKFRAME64 StackFrame = StackFrameOrig; | 
|  |  | 
|  | // Copy the register context so that we don't modify it while we unwind. We | 
|  | // could use InitializeContext + CopyContext, but that's only required to get | 
|  | // at AVX registers, which typically aren't needed by StackWalk64. Reduce the | 
|  | // flag set to indicate that there's less data. | 
|  | CONTEXT Context = *ContextOrig; | 
|  | Context.ContextFlags = CONTEXT_CONTROL | CONTEXT_INTEGER; | 
|  |  | 
|  | static void *StackTrace[256]; | 
|  | size_t Depth = 0; | 
|  | while (fStackWalk64(NativeMachineType, hProcess, hThread, &StackFrame, | 
|  | &Context, 0, fSymFunctionTableAccess64, | 
|  | fSymGetModuleBase64, 0)) { | 
|  | if (StackFrame.AddrFrame.Offset == 0) | 
|  | break; | 
|  | StackTrace[Depth++] = (void *)(uintptr_t)StackFrame.AddrPC.Offset; | 
|  | if (Depth >= array_lengthof(StackTrace)) | 
|  | break; | 
|  | } | 
|  |  | 
|  | return printSymbolizedStackTrace(Argv0, &StackTrace[0], Depth, OS); | 
|  | } | 
|  |  | 
|  | namespace { | 
|  | struct FindModuleData { | 
|  | void **StackTrace; | 
|  | int Depth; | 
|  | const char **Modules; | 
|  | intptr_t *Offsets; | 
|  | StringSaver *StrPool; | 
|  | }; | 
|  | } | 
|  |  | 
|  | static BOOL CALLBACK findModuleCallback(PCSTR ModuleName, | 
|  | DWORD64 ModuleBase, ULONG ModuleSize, | 
|  | void *VoidData) { | 
|  | FindModuleData *Data = (FindModuleData*)VoidData; | 
|  | intptr_t Beg = ModuleBase; | 
|  | intptr_t End = Beg + ModuleSize; | 
|  | for (int I = 0; I < Data->Depth; I++) { | 
|  | if (Data->Modules[I]) | 
|  | continue; | 
|  | intptr_t Addr = (intptr_t)Data->StackTrace[I]; | 
|  | if (Beg <= Addr && Addr < End) { | 
|  | Data->Modules[I] = Data->StrPool->save(ModuleName).data(); | 
|  | Data->Offsets[I] = Addr - Beg; | 
|  | } | 
|  | } | 
|  | return TRUE; | 
|  | } | 
|  |  | 
|  | static bool findModulesAndOffsets(void **StackTrace, int Depth, | 
|  | const char **Modules, intptr_t *Offsets, | 
|  | const char *MainExecutableName, | 
|  | StringSaver &StrPool) { | 
|  | if (!fEnumerateLoadedModules) | 
|  | return false; | 
|  | FindModuleData Data; | 
|  | Data.StackTrace = StackTrace; | 
|  | Data.Depth = Depth; | 
|  | Data.Modules = Modules; | 
|  | Data.Offsets = Offsets; | 
|  | Data.StrPool = &StrPool; | 
|  | fEnumerateLoadedModules(GetCurrentProcess(), findModuleCallback, &Data); | 
|  | return true; | 
|  | } | 
|  |  | 
|  | static void PrintStackTraceForThread(llvm::raw_ostream &OS, HANDLE hProcess, | 
|  | HANDLE hThread, STACKFRAME64 &StackFrame, | 
|  | CONTEXT *Context) { | 
|  | #if ENABLE_BACKTRACES | 
|  | // Initialize the symbol handler. | 
|  | fSymSetOptions(SYMOPT_DEFERRED_LOADS | SYMOPT_LOAD_LINES); | 
|  | fSymInitialize(hProcess, NULL, TRUE); | 
|  |  | 
|  | // Try llvm-symbolizer first. llvm-symbolizer knows how to deal with both PDBs | 
|  | // and DWARF, so it should do a good job regardless of what debug info or | 
|  | // linker is in use. | 
|  | if (printStackTraceWithLLVMSymbolizer(OS, hProcess, hThread, StackFrame, | 
|  | Context)) { | 
|  | return; | 
|  | } | 
|  |  | 
|  | while (true) { | 
|  | if (!fStackWalk64(NativeMachineType, hProcess, hThread, &StackFrame, | 
|  | Context, 0, fSymFunctionTableAccess64, | 
|  | fSymGetModuleBase64, 0)) { | 
|  | break; | 
|  | } | 
|  |  | 
|  | if (StackFrame.AddrFrame.Offset == 0) | 
|  | break; | 
|  |  | 
|  | using namespace llvm; | 
|  | // Print the PC in hexadecimal. | 
|  | DWORD64 PC = StackFrame.AddrPC.Offset; | 
|  | #if defined(_M_X64) | 
|  | OS << format("0x%016llX", PC); | 
|  | #elif defined(_M_IX86) | 
|  | OS << format("0x%08lX", static_cast<DWORD>(PC)); | 
|  | #endif | 
|  |  | 
|  | // Print the parameters.  Assume there are four. | 
|  | #if defined(_M_X64) | 
|  | OS << format(" (0x%016llX 0x%016llX 0x%016llX 0x%016llX)", | 
|  | StackFrame.Params[0], StackFrame.Params[1], StackFrame.Params[2], | 
|  | StackFrame.Params[3]); | 
|  | #elif defined(_M_IX86) | 
|  | OS << format(" (0x%08lX 0x%08lX 0x%08lX 0x%08lX)", | 
|  | static_cast<DWORD>(StackFrame.Params[0]), | 
|  | static_cast<DWORD>(StackFrame.Params[1]), | 
|  | static_cast<DWORD>(StackFrame.Params[2]), | 
|  | static_cast<DWORD>(StackFrame.Params[3])); | 
|  | #endif | 
|  | // Verify the PC belongs to a module in this process. | 
|  | if (!fSymGetModuleBase64(hProcess, PC)) { | 
|  | OS << " <unknown module>\n"; | 
|  | continue; | 
|  | } | 
|  |  | 
|  | // Print the symbol name. | 
|  | char buffer[512]; | 
|  | IMAGEHLP_SYMBOL64 *symbol = reinterpret_cast<IMAGEHLP_SYMBOL64 *>(buffer); | 
|  | memset(symbol, 0, sizeof(IMAGEHLP_SYMBOL64)); | 
|  | symbol->SizeOfStruct = sizeof(IMAGEHLP_SYMBOL64); | 
|  | symbol->MaxNameLength = 512 - sizeof(IMAGEHLP_SYMBOL64); | 
|  |  | 
|  | DWORD64 dwDisp; | 
|  | if (!fSymGetSymFromAddr64(hProcess, PC, &dwDisp, symbol)) { | 
|  | OS << '\n'; | 
|  | continue; | 
|  | } | 
|  |  | 
|  | buffer[511] = 0; | 
|  | if (dwDisp > 0) | 
|  | OS << format(", %s() + 0x%llX bytes(s)", (const char*)symbol->Name, | 
|  | dwDisp); | 
|  | else | 
|  | OS << format(", %s", (const char*)symbol->Name); | 
|  |  | 
|  | // Print the source file and line number information. | 
|  | IMAGEHLP_LINE64 line = {}; | 
|  | DWORD dwLineDisp; | 
|  | line.SizeOfStruct = sizeof(line); | 
|  | if (fSymGetLineFromAddr64(hProcess, PC, &dwLineDisp, &line)) { | 
|  | OS << format(", %s, line %lu", line.FileName, line.LineNumber); | 
|  | if (dwLineDisp > 0) | 
|  | OS << format(" + 0x%lX byte(s)", dwLineDisp); | 
|  | } | 
|  |  | 
|  | OS << '\n'; | 
|  | } | 
|  | #endif | 
|  | } | 
|  |  | 
|  | namespace llvm { | 
|  |  | 
|  | //===----------------------------------------------------------------------===// | 
|  | //=== WARNING: Implementation here must contain only Win32 specific code | 
|  | //===          and must not be UNIX code | 
|  | //===----------------------------------------------------------------------===// | 
|  |  | 
|  | #ifdef _MSC_VER | 
|  | /// AvoidMessageBoxHook - Emulates hitting "retry" from an "abort, retry, | 
|  | /// ignore" CRT debug report dialog.  "retry" raises an exception which | 
|  | /// ultimately triggers our stack dumper. | 
|  | static LLVM_ATTRIBUTE_UNUSED int | 
|  | AvoidMessageBoxHook(int ReportType, char *Message, int *Return) { | 
|  | // Set *Return to the retry code for the return value of _CrtDbgReport: | 
|  | // http://msdn.microsoft.com/en-us/library/8hyw4sy7(v=vs.71).aspx | 
|  | // This may also trigger just-in-time debugging via DebugBreak(). | 
|  | if (Return) | 
|  | *Return = 1; | 
|  | // Don't call _CrtDbgReport. | 
|  | return TRUE; | 
|  | } | 
|  |  | 
|  | #endif | 
|  |  | 
|  | extern "C" void HandleAbort(int Sig) { | 
|  | if (Sig == SIGABRT) { | 
|  | LLVM_BUILTIN_TRAP; | 
|  | } | 
|  | } | 
|  |  | 
|  | static void InitializeThreading() { | 
|  | if (CriticalSectionInitialized) | 
|  | return; | 
|  |  | 
|  | // Now's the time to create the critical section. This is the first time | 
|  | // through here, and there's only one thread. | 
|  | InitializeCriticalSection(&CriticalSection); | 
|  | CriticalSectionInitialized = true; | 
|  | } | 
|  |  | 
|  | static void RegisterHandler() { | 
|  | // If we cannot load up the APIs (which would be unexpected as they should | 
|  | // exist on every version of Windows we support), we will bail out since | 
|  | // there would be nothing to report. | 
|  | if (!load64BitDebugHelp()) { | 
|  | assert(false && "These APIs should always be available"); | 
|  | return; | 
|  | } | 
|  |  | 
|  | if (RegisteredUnhandledExceptionFilter) { | 
|  | EnterCriticalSection(&CriticalSection); | 
|  | return; | 
|  | } | 
|  |  | 
|  | InitializeThreading(); | 
|  |  | 
|  | // Enter it immediately.  Now if someone hits CTRL/C, the console handler | 
|  | // can't proceed until the globals are updated. | 
|  | EnterCriticalSection(&CriticalSection); | 
|  |  | 
|  | RegisteredUnhandledExceptionFilter = true; | 
|  | OldFilter = SetUnhandledExceptionFilter(LLVMUnhandledExceptionFilter); | 
|  | SetConsoleCtrlHandler(LLVMConsoleCtrlHandler, TRUE); | 
|  |  | 
|  | // IMPORTANT NOTE: Caller must call LeaveCriticalSection(&CriticalSection) or | 
|  | // else multi-threading problems will ensue. | 
|  | } | 
|  |  | 
|  | // RemoveFileOnSignal - The public API | 
|  | bool sys::RemoveFileOnSignal(StringRef Filename, std::string* ErrMsg) { | 
|  | RegisterHandler(); | 
|  |  | 
|  | if (CleanupExecuted) { | 
|  | if (ErrMsg) | 
|  | *ErrMsg = "Process terminating -- cannot register for removal"; | 
|  | return true; | 
|  | } | 
|  |  | 
|  | if (FilesToRemove == NULL) | 
|  | FilesToRemove = new std::vector<std::string>; | 
|  |  | 
|  | FilesToRemove->push_back(Filename); | 
|  |  | 
|  | LeaveCriticalSection(&CriticalSection); | 
|  | return false; | 
|  | } | 
|  |  | 
|  | // DontRemoveFileOnSignal - The public API | 
|  | void sys::DontRemoveFileOnSignal(StringRef Filename) { | 
|  | if (FilesToRemove == NULL) | 
|  | return; | 
|  |  | 
|  | RegisterHandler(); | 
|  |  | 
|  | std::vector<std::string>::reverse_iterator I = | 
|  | find(reverse(*FilesToRemove), Filename); | 
|  | if (I != FilesToRemove->rend()) | 
|  | FilesToRemove->erase(I.base()-1); | 
|  |  | 
|  | LeaveCriticalSection(&CriticalSection); | 
|  | } | 
|  |  | 
|  | void sys::DisableSystemDialogsOnCrash() { | 
|  | // Crash to stack trace handler on abort. | 
|  | signal(SIGABRT, HandleAbort); | 
|  |  | 
|  | // The following functions are not reliably accessible on MinGW. | 
|  | #ifdef _MSC_VER | 
|  | // We're already handling writing a "something went wrong" message. | 
|  | _set_abort_behavior(0, _WRITE_ABORT_MSG); | 
|  | // Disable Dr. Watson. | 
|  | _set_abort_behavior(0, _CALL_REPORTFAULT); | 
|  | _CrtSetReportHook(AvoidMessageBoxHook); | 
|  | #endif | 
|  |  | 
|  | // Disable standard error dialog box. | 
|  | SetErrorMode(SEM_FAILCRITICALERRORS | SEM_NOGPFAULTERRORBOX | | 
|  | SEM_NOOPENFILEERRORBOX); | 
|  | _set_error_mode(_OUT_TO_STDERR); | 
|  | } | 
|  |  | 
|  | /// PrintStackTraceOnErrorSignal - When an error signal (such as SIBABRT or | 
|  | /// SIGSEGV) is delivered to the process, print a stack trace and then exit. | 
|  | void sys::PrintStackTraceOnErrorSignal(StringRef Argv0, | 
|  | bool DisableCrashReporting) { | 
|  | ::Argv0 = Argv0; | 
|  |  | 
|  | if (DisableCrashReporting || getenv("LLVM_DISABLE_CRASH_REPORT")) | 
|  | Process::PreventCoreFiles(); | 
|  |  | 
|  | DisableSystemDialogsOnCrash(); | 
|  | RegisterHandler(); | 
|  | LeaveCriticalSection(&CriticalSection); | 
|  | } | 
|  | } | 
|  |  | 
|  | #if defined(__MINGW32__) && !defined(__MINGW64_VERSION_MAJOR) | 
|  | // Provide a prototype for RtlCaptureContext, mingw32 from mingw.org is | 
|  | // missing it but mingw-w64 has it. | 
|  | extern "C" VOID WINAPI RtlCaptureContext(PCONTEXT ContextRecord); | 
|  | #endif | 
|  |  | 
|  | void llvm::sys::PrintStackTrace(raw_ostream &OS) { | 
|  | STACKFRAME64 StackFrame = {}; | 
|  | CONTEXT Context = {}; | 
|  | ::RtlCaptureContext(&Context); | 
|  | #if defined(_M_X64) | 
|  | StackFrame.AddrPC.Offset = Context.Rip; | 
|  | StackFrame.AddrStack.Offset = Context.Rsp; | 
|  | StackFrame.AddrFrame.Offset = Context.Rbp; | 
|  | #else | 
|  | StackFrame.AddrPC.Offset = Context.Eip; | 
|  | StackFrame.AddrStack.Offset = Context.Esp; | 
|  | StackFrame.AddrFrame.Offset = Context.Ebp; | 
|  | #endif | 
|  | StackFrame.AddrPC.Mode = AddrModeFlat; | 
|  | StackFrame.AddrStack.Mode = AddrModeFlat; | 
|  | StackFrame.AddrFrame.Mode = AddrModeFlat; | 
|  | PrintStackTraceForThread(OS, GetCurrentProcess(), GetCurrentThread(), | 
|  | StackFrame, &Context); | 
|  | } | 
|  |  | 
|  |  | 
|  | void llvm::sys::SetInterruptFunction(void (*IF)()) { | 
|  | RegisterHandler(); | 
|  | InterruptFunction = IF; | 
|  | LeaveCriticalSection(&CriticalSection); | 
|  | } | 
|  |  | 
|  |  | 
|  | /// AddSignalHandler - Add a function to be called when a signal is delivered | 
|  | /// to the process.  The handler can have a cookie passed to it to identify | 
|  | /// what instance of the handler it is. | 
|  | void llvm::sys::AddSignalHandler(void (*FnPtr)(void *), void *Cookie) { | 
|  | CallBacksToRun->push_back(std::make_pair(FnPtr, Cookie)); | 
|  | RegisterHandler(); | 
|  | LeaveCriticalSection(&CriticalSection); | 
|  | } | 
|  |  | 
|  | static void Cleanup() { | 
|  | if (CleanupExecuted) | 
|  | return; | 
|  |  | 
|  | EnterCriticalSection(&CriticalSection); | 
|  |  | 
|  | // Prevent other thread from registering new files and directories for | 
|  | // removal, should we be executing because of the console handler callback. | 
|  | CleanupExecuted = true; | 
|  |  | 
|  | // FIXME: open files cannot be deleted. | 
|  | if (FilesToRemove != NULL) | 
|  | while (!FilesToRemove->empty()) { | 
|  | llvm::sys::fs::remove(FilesToRemove->back()); | 
|  | FilesToRemove->pop_back(); | 
|  | } | 
|  | llvm::sys::RunSignalHandlers(); | 
|  | LeaveCriticalSection(&CriticalSection); | 
|  | } | 
|  |  | 
|  | void llvm::sys::RunInterruptHandlers() { | 
|  | // The interrupt handler may be called from an interrupt, but it may also be | 
|  | // called manually (such as the case of report_fatal_error with no registered | 
|  | // error handler). We must ensure that the critical section is properly | 
|  | // initialized. | 
|  | InitializeThreading(); | 
|  | Cleanup(); | 
|  | } | 
|  |  | 
|  | /// \brief Find the Windows Registry Key for a given location. | 
|  | /// | 
|  | /// \returns a valid HKEY if the location exists, else NULL. | 
|  | static HKEY FindWERKey(const llvm::Twine &RegistryLocation) { | 
|  | HKEY Key; | 
|  | if (ERROR_SUCCESS != ::RegOpenKeyExA(HKEY_LOCAL_MACHINE, | 
|  | RegistryLocation.str().c_str(), 0, | 
|  | KEY_QUERY_VALUE | KEY_READ, &Key)) | 
|  | return NULL; | 
|  |  | 
|  | return Key; | 
|  | } | 
|  |  | 
|  | /// \brief Populate ResultDirectory with the value for "DumpFolder" for a given | 
|  | /// Windows Registry key. | 
|  | /// | 
|  | /// \returns true if a valid value for DumpFolder exists, false otherwise. | 
|  | static bool GetDumpFolder(HKEY Key, | 
|  | llvm::SmallVectorImpl<char> &ResultDirectory) { | 
|  | using llvm::sys::windows::UTF16ToUTF8; | 
|  |  | 
|  | if (!Key) | 
|  | return false; | 
|  |  | 
|  | DWORD BufferLengthBytes = 0; | 
|  |  | 
|  | if (ERROR_SUCCESS != ::RegGetValueW(Key, 0, L"DumpFolder", REG_EXPAND_SZ, | 
|  | NULL, NULL, &BufferLengthBytes)) | 
|  | return false; | 
|  |  | 
|  | SmallVector<wchar_t, MAX_PATH> Buffer(BufferLengthBytes); | 
|  |  | 
|  | if (ERROR_SUCCESS != ::RegGetValueW(Key, 0, L"DumpFolder", REG_EXPAND_SZ, | 
|  | NULL, Buffer.data(), &BufferLengthBytes)) | 
|  | return false; | 
|  |  | 
|  | DWORD ExpandBufferSize = ::ExpandEnvironmentStringsW(Buffer.data(), NULL, 0); | 
|  |  | 
|  | if (!ExpandBufferSize) | 
|  | return false; | 
|  |  | 
|  | SmallVector<wchar_t, MAX_PATH> ExpandBuffer(ExpandBufferSize); | 
|  |  | 
|  | if (ExpandBufferSize != ::ExpandEnvironmentStringsW(Buffer.data(), | 
|  | ExpandBuffer.data(), | 
|  | ExpandBufferSize)) | 
|  | return false; | 
|  |  | 
|  | if (UTF16ToUTF8(ExpandBuffer.data(), ExpandBufferSize - 1, ResultDirectory)) | 
|  | return false; | 
|  |  | 
|  | return true; | 
|  | } | 
|  |  | 
|  | /// \brief Populate ResultType with a valid MINIDUMP_TYPE based on the value of | 
|  | /// "DumpType" for a given Windows Registry key. | 
|  | /// | 
|  | /// According to | 
|  | /// https://msdn.microsoft.com/en-us/library/windows/desktop/bb787181(v=vs.85).aspx | 
|  | /// valid values for DumpType are: | 
|  | ///   * 0: Custom dump | 
|  | ///   * 1: Mini dump | 
|  | ///   * 2: Full dump | 
|  | /// If "Custom dump" is specified then the "CustomDumpFlags" field is read | 
|  | /// containing a bitwise combination of MINIDUMP_TYPE values. | 
|  | /// | 
|  | /// \returns true if a valid value for ResultType can be set, false otherwise. | 
|  | static bool GetDumpType(HKEY Key, MINIDUMP_TYPE &ResultType) { | 
|  | if (!Key) | 
|  | return false; | 
|  |  | 
|  | DWORD DumpType; | 
|  | DWORD TypeSize = sizeof(DumpType); | 
|  | if (ERROR_SUCCESS != ::RegGetValueW(Key, NULL, L"DumpType", RRF_RT_REG_DWORD, | 
|  | NULL, &DumpType, | 
|  | &TypeSize)) | 
|  | return false; | 
|  |  | 
|  | switch (DumpType) { | 
|  | case 0: { | 
|  | DWORD Flags = 0; | 
|  | if (ERROR_SUCCESS != ::RegGetValueW(Key, NULL, L"CustomDumpFlags", | 
|  | RRF_RT_REG_DWORD, NULL, &Flags, | 
|  | &TypeSize)) | 
|  | return false; | 
|  |  | 
|  | ResultType = static_cast<MINIDUMP_TYPE>(Flags); | 
|  | break; | 
|  | } | 
|  | case 1: | 
|  | ResultType = MiniDumpNormal; | 
|  | break; | 
|  | case 2: | 
|  | ResultType = MiniDumpWithFullMemory; | 
|  | break; | 
|  | default: | 
|  | return false; | 
|  | } | 
|  | return true; | 
|  | } | 
|  |  | 
|  | /// \brief Write a Windows dump file containing process information that can be | 
|  | /// used for post-mortem debugging. | 
|  | /// | 
|  | /// \returns zero error code if a mini dump created, actual error code | 
|  | /// otherwise. | 
|  | static std::error_code WINAPI | 
|  | WriteWindowsDumpFile(PMINIDUMP_EXCEPTION_INFORMATION ExceptionInfo) { | 
|  | using namespace llvm; | 
|  | using namespace llvm::sys; | 
|  |  | 
|  | std::string MainExecutableName = fs::getMainExecutable(nullptr, nullptr); | 
|  | StringRef ProgramName; | 
|  |  | 
|  | if (MainExecutableName.empty()) { | 
|  | // If we can't get the executable filename, | 
|  | // things are in worse shape than we realize | 
|  | // and we should just bail out. | 
|  | return mapWindowsError(::GetLastError()); | 
|  | } | 
|  |  | 
|  | ProgramName = path::filename(MainExecutableName.c_str()); | 
|  |  | 
|  | // The Windows Registry location as specified at | 
|  | // https://msdn.microsoft.com/en-us/library/windows/desktop/bb787181%28v=vs.85%29.aspx | 
|  | // "Collecting User-Mode Dumps" that may optionally be set to collect crash | 
|  | // dumps in a specified location. | 
|  | StringRef LocalDumpsRegistryLocation = | 
|  | "SOFTWARE\\Microsoft\\Windows\\Windows Error Reporting\\LocalDumps"; | 
|  |  | 
|  | // The key pointing to the Registry location that may contain global crash | 
|  | // dump settings.  This will be NULL if the location can not be found. | 
|  | ScopedRegHandle DefaultLocalDumpsKey(FindWERKey(LocalDumpsRegistryLocation)); | 
|  |  | 
|  | // The key pointing to the Registry location that may contain | 
|  | // application-specific crash dump settings.  This will be NULL if the | 
|  | // location can not be found. | 
|  | ScopedRegHandle AppSpecificKey( | 
|  | FindWERKey(Twine(LocalDumpsRegistryLocation) + "\\" + ProgramName)); | 
|  |  | 
|  | // Look to see if a dump type is specified in the registry; first with the | 
|  | // app-specific key and failing that with the global key.  If none are found | 
|  | // default to a normal dump (GetDumpType will return false either if the key | 
|  | // is NULL or if there is no valid DumpType value at its location). | 
|  | MINIDUMP_TYPE DumpType; | 
|  | if (!GetDumpType(AppSpecificKey, DumpType)) | 
|  | if (!GetDumpType(DefaultLocalDumpsKey, DumpType)) | 
|  | DumpType = MiniDumpNormal; | 
|  |  | 
|  | // Look to see if a dump location is specified in the registry; first with the | 
|  | // app-specific key and failing that with the global key.  If none are found | 
|  | // we'll just create the dump file in the default temporary file location | 
|  | // (GetDumpFolder will return false either if the key is NULL or if there is | 
|  | // no valid DumpFolder value at its location). | 
|  | bool ExplicitDumpDirectorySet = true; | 
|  | SmallString<MAX_PATH> DumpDirectory; | 
|  | if (!GetDumpFolder(AppSpecificKey, DumpDirectory)) | 
|  | if (!GetDumpFolder(DefaultLocalDumpsKey, DumpDirectory)) | 
|  | ExplicitDumpDirectorySet = false; | 
|  |  | 
|  | int FD; | 
|  | SmallString<MAX_PATH> DumpPath; | 
|  |  | 
|  | if (ExplicitDumpDirectorySet) { | 
|  | if (std::error_code EC = fs::create_directories(DumpDirectory)) | 
|  | return EC; | 
|  | if (std::error_code EC = fs::createUniqueFile( | 
|  | Twine(DumpDirectory) + "\\" + ProgramName + ".%%%%%%.dmp", FD, | 
|  | DumpPath)) | 
|  | return EC; | 
|  | } else if (std::error_code EC = | 
|  | fs::createTemporaryFile(ProgramName, "dmp", FD, DumpPath)) | 
|  | return EC; | 
|  |  | 
|  | // Our support functions return a file descriptor but Windows wants a handle. | 
|  | ScopedCommonHandle FileHandle(reinterpret_cast<HANDLE>(_get_osfhandle(FD))); | 
|  |  | 
|  | if (!fMiniDumpWriteDump(::GetCurrentProcess(), ::GetCurrentProcessId(), | 
|  | FileHandle, DumpType, ExceptionInfo, NULL, NULL)) | 
|  | return mapWindowsError(::GetLastError()); | 
|  |  | 
|  | llvm::errs() << "Wrote crash dump file \"" << DumpPath << "\"\n"; | 
|  | return std::error_code(); | 
|  | } | 
|  |  | 
|  | static LONG WINAPI LLVMUnhandledExceptionFilter(LPEXCEPTION_POINTERS ep) { | 
|  | Cleanup(); | 
|  |  | 
|  | // We'll automatically write a Minidump file here to help diagnose | 
|  | // the nasty sorts of crashes that aren't 100% reproducible from a set of | 
|  | // inputs (or in the event that the user is unable or unwilling to provide a | 
|  | // reproducible case). | 
|  | if (!llvm::Process::AreCoreFilesPrevented()) { | 
|  | MINIDUMP_EXCEPTION_INFORMATION ExceptionInfo; | 
|  | ExceptionInfo.ThreadId = ::GetCurrentThreadId(); | 
|  | ExceptionInfo.ExceptionPointers = ep; | 
|  | ExceptionInfo.ClientPointers = FALSE; | 
|  |  | 
|  | if (std::error_code EC = WriteWindowsDumpFile(&ExceptionInfo)) | 
|  | llvm::errs() << "Could not write crash dump file: " << EC.message() | 
|  | << "\n"; | 
|  | } | 
|  |  | 
|  | // Initialize the STACKFRAME structure. | 
|  | STACKFRAME64 StackFrame = {}; | 
|  |  | 
|  | #if defined(_M_X64) | 
|  | StackFrame.AddrPC.Offset = ep->ContextRecord->Rip; | 
|  | StackFrame.AddrPC.Mode = AddrModeFlat; | 
|  | StackFrame.AddrStack.Offset = ep->ContextRecord->Rsp; | 
|  | StackFrame.AddrStack.Mode = AddrModeFlat; | 
|  | StackFrame.AddrFrame.Offset = ep->ContextRecord->Rbp; | 
|  | StackFrame.AddrFrame.Mode = AddrModeFlat; | 
|  | #elif defined(_M_IX86) | 
|  | StackFrame.AddrPC.Offset = ep->ContextRecord->Eip; | 
|  | StackFrame.AddrPC.Mode = AddrModeFlat; | 
|  | StackFrame.AddrStack.Offset = ep->ContextRecord->Esp; | 
|  | StackFrame.AddrStack.Mode = AddrModeFlat; | 
|  | StackFrame.AddrFrame.Offset = ep->ContextRecord->Ebp; | 
|  | StackFrame.AddrFrame.Mode = AddrModeFlat; | 
|  | #endif | 
|  |  | 
|  | HANDLE hProcess = GetCurrentProcess(); | 
|  | HANDLE hThread = GetCurrentThread(); | 
|  | PrintStackTraceForThread(llvm::errs(), hProcess, hThread, StackFrame, | 
|  | ep->ContextRecord); | 
|  |  | 
|  | _exit(ep->ExceptionRecord->ExceptionCode); | 
|  | } | 
|  |  | 
|  | static BOOL WINAPI LLVMConsoleCtrlHandler(DWORD dwCtrlType) { | 
|  | // We are running in our very own thread, courtesy of Windows. | 
|  | EnterCriticalSection(&CriticalSection); | 
|  | Cleanup(); | 
|  |  | 
|  | // If an interrupt function has been set, go and run one it; otherwise, | 
|  | // the process dies. | 
|  | void (*IF)() = InterruptFunction; | 
|  | InterruptFunction = 0;      // Don't run it on another CTRL-C. | 
|  |  | 
|  | if (IF) { | 
|  | // Note: if the interrupt function throws an exception, there is nothing | 
|  | // to catch it in this thread so it will kill the process. | 
|  | IF();                     // Run it now. | 
|  | LeaveCriticalSection(&CriticalSection); | 
|  | return TRUE;              // Don't kill the process. | 
|  | } | 
|  |  | 
|  | // Allow normal processing to take place; i.e., the process dies. | 
|  | LeaveCriticalSection(&CriticalSection); | 
|  | return FALSE; | 
|  | } | 
|  |  | 
|  | #if __MINGW32__ | 
|  | // We turned these warnings off for this file so that MinGW-g++ doesn't | 
|  | // complain about the ll format specifiers used.  Now we are turning the | 
|  | // warnings back on.  If MinGW starts to support diagnostic stacks, we can | 
|  | // replace this with a pop. | 
|  | #pragma GCC diagnostic warning "-Wformat" | 
|  | #pragma GCC diagnostic warning "-Wformat-extra-args" | 
|  | #endif |