blob: f40ca72996a1273789506c48a131d9409acee134 [file] [log] [blame]
Reid Spencer3d7a6142004-08-29 19:22:48 +00001//===- Win32/Signals.cpp - Win32 Signals Implementation ---------*- C++ -*-===//
Mikhail Glushenkovf64d93d2010-10-21 20:40:39 +00002//
Reid Spencer3d7a6142004-08-29 19:22:48 +00003// The LLVM Compiler Infrastructure
4//
Chris Lattnerf3ebc3f2007-12-29 20:36:04 +00005// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
Mikhail Glushenkovf64d93d2010-10-21 20:40:39 +00007//
Reid Spencer3d7a6142004-08-29 19:22:48 +00008//===----------------------------------------------------------------------===//
9//
10// This file provides the Win32 specific implementation of the Signals class.
11//
12//===----------------------------------------------------------------------===//
Rafael Espindola9aa3d5d2013-06-14 13:59:21 +000013#include "llvm/Support/FileSystem.h"
Chandler Carruthed0881b2012-12-03 16:50:05 +000014#include <algorithm>
Michael J. Spencer89b0ad22015-01-29 17:20:29 +000015#include <signal.h>
Reid Spencer70b68352004-09-28 23:58:03 +000016#include <stdio.h>
Reid Spencer4aff78a2004-09-16 15:53:16 +000017
Zachary Turnercd132c92015-03-05 19:10:52 +000018#include "llvm/Support/Format.h"
19#include "llvm/Support/raw_ostream.h"
20
Chandler Carruth10b09152014-01-07 12:37:13 +000021// The Windows.h header must be after LLVM and standard headers.
Reid Klecknerd59e2fa2014-02-12 21:26:20 +000022#include "WindowsSupport.h"
Chandler Carruth10b09152014-01-07 12:37:13 +000023
Jeff Cohen07e22ba2005-02-19 03:01:13 +000024#ifdef __MINGW32__
Reid Spencer187b4ad2006-06-01 19:03:21 +000025 #include <imagehlp.h>
Reid Spencer99049282004-09-23 14:47:10 +000026#else
Reid Spencer187b4ad2006-06-01 19:03:21 +000027 #include <dbghelp.h>
Reid Spencer99049282004-09-23 14:47:10 +000028#endif
29#include <psapi.h>
Reid Spencer4aff78a2004-09-16 15:53:16 +000030
Michael J. Spencer44a36c82011-10-01 00:05:20 +000031#ifdef _MSC_VER
32 #pragma comment(lib, "psapi.lib")
Michael J. Spencer44a36c82011-10-01 00:05:20 +000033#elif __MINGW32__
Leny Kholodovbebb27b2015-07-02 14:34:57 +000034 #if (HAVE_LIBPSAPI != 1)
35 #error "libpsapi.a should be present"
Reid Spencer187b4ad2006-06-01 19:03:21 +000036 #endif
Michael J. Spencer44a36c82011-10-01 00:05:20 +000037 // The version of g++ that comes with MinGW does *not* properly understand
38 // the ll format specifier for printf. However, MinGW passes the format
39 // specifiers on to the MSVCRT entirely, and the CRT understands the ll
40 // specifier. So these warnings are spurious in this case. Since we compile
41 // with -Wall, this will generate these warnings which should be ignored. So
42 // we will turn off the warnings for this just file. However, MinGW also does
43 // not support push and pop for diagnostics, so we have to manually turn it
44 // back on at the end of the file.
45 #pragma GCC diagnostic ignored "-Wformat"
46 #pragma GCC diagnostic ignored "-Wformat-extra-args"
47
Anton Korobeynikovb27f11e2011-10-21 09:38:50 +000048 #if !defined(__MINGW64_VERSION_MAJOR)
49 // MinGW.org does not have updated support for the 64-bit versions of the
50 // DebugHlp APIs. So we will have to load them manually. The structures and
51 // method signatures were pulled from DbgHelp.h in the Windows Platform SDK,
52 // and adjusted for brevity.
Michael J. Spencer44a36c82011-10-01 00:05:20 +000053 typedef struct _IMAGEHLP_LINE64 {
54 DWORD SizeOfStruct;
55 PVOID Key;
56 DWORD LineNumber;
57 PCHAR FileName;
58 DWORD64 Address;
59 } IMAGEHLP_LINE64, *PIMAGEHLP_LINE64;
60
61 typedef struct _IMAGEHLP_SYMBOL64 {
62 DWORD SizeOfStruct;
63 DWORD64 Address;
64 DWORD Size;
65 DWORD Flags;
66 DWORD MaxNameLength;
67 CHAR Name[1];
68 } IMAGEHLP_SYMBOL64, *PIMAGEHLP_SYMBOL64;
69
70 typedef struct _tagADDRESS64 {
71 DWORD64 Offset;
72 WORD Segment;
73 ADDRESS_MODE Mode;
74 } ADDRESS64, *LPADDRESS64;
75
76 typedef struct _KDHELP64 {
77 DWORD64 Thread;
78 DWORD ThCallbackStack;
79 DWORD ThCallbackBStore;
80 DWORD NextCallback;
81 DWORD FramePointer;
82 DWORD64 KiCallUserMode;
83 DWORD64 KeUserCallbackDispatcher;
84 DWORD64 SystemRangeStart;
85 DWORD64 KiUserExceptionDispatcher;
86 DWORD64 StackBase;
87 DWORD64 StackLimit;
88 DWORD64 Reserved[5];
89 } KDHELP64, *PKDHELP64;
90
91 typedef struct _tagSTACKFRAME64 {
92 ADDRESS64 AddrPC;
93 ADDRESS64 AddrReturn;
94 ADDRESS64 AddrFrame;
95 ADDRESS64 AddrStack;
96 ADDRESS64 AddrBStore;
97 PVOID FuncTableEntry;
98 DWORD64 Params[4];
99 BOOL Far;
100 BOOL Virtual;
101 DWORD64 Reserved[3];
102 KDHELP64 KdHelp;
103 } STACKFRAME64, *LPSTACKFRAME64;
Leny Kholodovbebb27b2015-07-02 14:34:57 +0000104 #endif // !defined(__MINGW64_VERSION_MAJOR)
105#endif // __MINGW32__
Michael J. Spencer44a36c82011-10-01 00:05:20 +0000106
107typedef BOOL (__stdcall *PREAD_PROCESS_MEMORY_ROUTINE64)(HANDLE hProcess,
108 DWORD64 qwBaseAddress, PVOID lpBuffer, DWORD nSize,
109 LPDWORD lpNumberOfBytesRead);
110
111typedef PVOID (__stdcall *PFUNCTION_TABLE_ACCESS_ROUTINE64)( HANDLE ahProcess,
112 DWORD64 AddrBase);
113
114typedef DWORD64 (__stdcall *PGET_MODULE_BASE_ROUTINE64)(HANDLE hProcess,
115 DWORD64 Address);
116
117typedef DWORD64 (__stdcall *PTRANSLATE_ADDRESS_ROUTINE64)(HANDLE hProcess,
118 HANDLE hThread, LPADDRESS64 lpaddr);
119
120typedef BOOL (WINAPI *fpStackWalk64)(DWORD, HANDLE, HANDLE, LPSTACKFRAME64,
121 PVOID, PREAD_PROCESS_MEMORY_ROUTINE64,
122 PFUNCTION_TABLE_ACCESS_ROUTINE64,
123 PGET_MODULE_BASE_ROUTINE64,
124 PTRANSLATE_ADDRESS_ROUTINE64);
Leny Kholodovbebb27b2015-07-02 14:34:57 +0000125static fpStackWalk64 fStackWalk64;
Michael J. Spencer44a36c82011-10-01 00:05:20 +0000126
127typedef DWORD64 (WINAPI *fpSymGetModuleBase64)(HANDLE, DWORD64);
Leny Kholodovbebb27b2015-07-02 14:34:57 +0000128static fpSymGetModuleBase64 fSymGetModuleBase64;
Michael J. Spencer44a36c82011-10-01 00:05:20 +0000129
130typedef BOOL (WINAPI *fpSymGetSymFromAddr64)(HANDLE, DWORD64,
131 PDWORD64, PIMAGEHLP_SYMBOL64);
Leny Kholodovbebb27b2015-07-02 14:34:57 +0000132static fpSymGetSymFromAddr64 fSymGetSymFromAddr64;
Michael J. Spencer44a36c82011-10-01 00:05:20 +0000133
134typedef BOOL (WINAPI *fpSymGetLineFromAddr64)(HANDLE, DWORD64,
135 PDWORD, PIMAGEHLP_LINE64);
Leny Kholodovbebb27b2015-07-02 14:34:57 +0000136static fpSymGetLineFromAddr64 fSymGetLineFromAddr64;
Michael J. Spencer44a36c82011-10-01 00:05:20 +0000137
Reid Klecknerba5757d2015-11-05 01:07:54 +0000138typedef BOOL(WINAPI *fpSymGetModuleInfo64)(HANDLE hProcess, DWORD64 dwAddr,
139 PIMAGEHLP_MODULE64 ModuleInfo);
140static fpSymGetModuleInfo64 fSymGetModuleInfo64;
141
Michael J. Spencer44a36c82011-10-01 00:05:20 +0000142typedef PVOID (WINAPI *fpSymFunctionTableAccess64)(HANDLE, DWORD64);
Leny Kholodovbebb27b2015-07-02 14:34:57 +0000143static fpSymFunctionTableAccess64 fSymFunctionTableAccess64;
144
145typedef DWORD (WINAPI *fpSymSetOptions)(DWORD);
146static fpSymSetOptions fSymSetOptions;
147
148typedef BOOL (WINAPI *fpSymInitialize)(HANDLE, PCSTR, BOOL);
149static fpSymInitialize fSymInitialize;
Michael J. Spencer44a36c82011-10-01 00:05:20 +0000150
Reid Klecknerba5757d2015-11-05 01:07:54 +0000151typedef BOOL (WINAPI *fpEnumerateLoadedModules)(HANDLE,PENUMLOADED_MODULES_CALLBACK64,PVOID);
152static fpEnumerateLoadedModules fEnumerateLoadedModules;
153
Michael J. Spencer44a36c82011-10-01 00:05:20 +0000154static bool load64BitDebugHelp(void) {
David Majnemer17a44962013-10-07 09:52:36 +0000155 HMODULE hLib = ::LoadLibraryW(L"Dbghelp.dll");
Michael J. Spencer44a36c82011-10-01 00:05:20 +0000156 if (hLib) {
Leny Kholodovbebb27b2015-07-02 14:34:57 +0000157 fStackWalk64 = (fpStackWalk64)
Michael J. Spencer44a36c82011-10-01 00:05:20 +0000158 ::GetProcAddress(hLib, "StackWalk64");
Leny Kholodovbebb27b2015-07-02 14:34:57 +0000159 fSymGetModuleBase64 = (fpSymGetModuleBase64)
Michael J. Spencer44a36c82011-10-01 00:05:20 +0000160 ::GetProcAddress(hLib, "SymGetModuleBase64");
Leny Kholodovbebb27b2015-07-02 14:34:57 +0000161 fSymGetSymFromAddr64 = (fpSymGetSymFromAddr64)
Michael J. Spencer44a36c82011-10-01 00:05:20 +0000162 ::GetProcAddress(hLib, "SymGetSymFromAddr64");
Leny Kholodovbebb27b2015-07-02 14:34:57 +0000163 fSymGetLineFromAddr64 = (fpSymGetLineFromAddr64)
Michael J. Spencer44a36c82011-10-01 00:05:20 +0000164 ::GetProcAddress(hLib, "SymGetLineFromAddr64");
Reid Klecknerba5757d2015-11-05 01:07:54 +0000165 fSymGetModuleInfo64 = (fpSymGetModuleInfo64)
166 ::GetProcAddress(hLib, "SymGetModuleInfo64");
Leny Kholodovbebb27b2015-07-02 14:34:57 +0000167 fSymFunctionTableAccess64 = (fpSymFunctionTableAccess64)
Michael J. Spencer44a36c82011-10-01 00:05:20 +0000168 ::GetProcAddress(hLib, "SymFunctionTableAccess64");
Leny Kholodovbebb27b2015-07-02 14:34:57 +0000169 fSymSetOptions = (fpSymSetOptions)::GetProcAddress(hLib, "SymSetOptions");
170 fSymInitialize = (fpSymInitialize)::GetProcAddress(hLib, "SymInitialize");
Reid Klecknerba5757d2015-11-05 01:07:54 +0000171 fEnumerateLoadedModules = (fpEnumerateLoadedModules)
172 ::GetProcAddress(hLib, "EnumerateLoadedModules64");
Michael J. Spencer44a36c82011-10-01 00:05:20 +0000173 }
Leny Kholodovbebb27b2015-07-02 14:34:57 +0000174 return fStackWalk64 && fSymInitialize && fSymSetOptions;
Michael J. Spencer44a36c82011-10-01 00:05:20 +0000175}
Reid Spencer4aff78a2004-09-16 15:53:16 +0000176
Yaron Keren240bd9c2015-07-22 19:01:14 +0000177using namespace llvm;
178
Reid Spencer4aff78a2004-09-16 15:53:16 +0000179// Forward declare.
180static LONG WINAPI LLVMUnhandledExceptionFilter(LPEXCEPTION_POINTERS ep);
181static BOOL WINAPI LLVMConsoleCtrlHandler(DWORD dwCtrlType);
182
Jeff Cohenba7cc682005-08-02 03:04:47 +0000183// InterruptFunction - The function to call if ctrl-c is pressed.
184static void (*InterruptFunction)() = 0;
185
Rafael Espindola4f35da72013-06-13 21:16:58 +0000186static std::vector<std::string> *FilesToRemove = NULL;
Reid Spencer4aff78a2004-09-16 15:53:16 +0000187static bool RegisteredUnhandledExceptionFilter = false;
Reid Spencer1bdd0f02004-09-19 05:37:39 +0000188static bool CleanupExecuted = false;
189static PTOP_LEVEL_EXCEPTION_FILTER OldFilter = NULL;
Reid Spencer90debc52004-09-17 03:02:27 +0000190
191// Windows creates a new thread to execute the console handler when an event
192// (such as CTRL/C) occurs. This causes concurrency issues with the above
193// globals which this critical section addresses.
Reid Spencer4aff78a2004-09-16 15:53:16 +0000194static CRITICAL_SECTION CriticalSection;
Aaron Ballman50af8d42015-03-26 16:24:38 +0000195static bool CriticalSectionInitialized = false;
Reid Spencer4aff78a2004-09-16 15:53:16 +0000196
Reid Klecknerba5757d2015-11-05 01:07:54 +0000197enum {
198#if defined(_M_X64)
199 NativeMachineType = IMAGE_FILE_MACHINE_AMD64
200#else
201 NativeMachineType = IMAGE_FILE_MACHINE_I386
202#endif
203};
204
205static bool printStackTraceWithLLVMSymbolizer(llvm::raw_ostream &OS,
206 HANDLE hProcess, HANDLE hThread,
207 STACKFRAME64 &StackFrameOrig,
208 CONTEXT *ContextOrig) {
209 // StackWalk64 modifies the incoming stack frame and context, so copy them.
210 STACKFRAME64 StackFrame = StackFrameOrig;
211
212 // Copy the register context so that we don't modify it while we unwind. We
213 // could use InitializeContext + CopyContext, but that's only required to get
214 // at AVX registers, which typically aren't needed by StackWalk64. Reduce the
215 // flag set to indicate that there's less data.
216 CONTEXT Context = *ContextOrig;
217 Context.ContextFlags = CONTEXT_CONTROL | CONTEXT_INTEGER;
218
219 static void *StackTrace[256];
Aaron Ballman3c44b422015-11-05 14:22:56 +0000220 size_t Depth = 0;
Reid Klecknerba5757d2015-11-05 01:07:54 +0000221 while (fStackWalk64(NativeMachineType, hProcess, hThread, &StackFrame,
222 &Context, 0, fSymFunctionTableAccess64,
223 fSymGetModuleBase64, 0)) {
224 if (StackFrame.AddrFrame.Offset == 0)
225 break;
226 StackTrace[Depth++] = (void *)(uintptr_t)StackFrame.AddrPC.Offset;
227 if (Depth >= array_lengthof(StackTrace))
228 break;
229 }
230
231 return printSymbolizedStackTrace(&StackTrace[0], Depth, OS);
232}
233
234namespace {
235struct FindModuleData {
236 void **StackTrace;
237 int Depth;
238 const char **Modules;
239 intptr_t *Offsets;
240 StringSaver *StrPool;
241};
242}
243
244static BOOL CALLBACK findModuleCallback(WIN32_ELMCB_PCSTR ModuleName,
245 DWORD64 ModuleBase, ULONG ModuleSize,
246 void *VoidData) {
247 FindModuleData *Data = (FindModuleData*)VoidData;
248 intptr_t Beg = ModuleBase;
249 intptr_t End = Beg + ModuleSize;
250 for (int I = 0; I < Data->Depth; I++) {
251 if (Data->Modules[I])
252 continue;
253 intptr_t Addr = (intptr_t)Data->StackTrace[I];
254 if (Beg <= Addr && Addr < End) {
255 Data->Modules[I] = Data->StrPool->save(ModuleName);
256 Data->Offsets[I] = Addr - Beg;
257 }
258 }
259 return TRUE;
260}
261
262static bool findModulesAndOffsets(void **StackTrace, int Depth,
263 const char **Modules, intptr_t *Offsets,
264 const char *MainExecutableName,
265 StringSaver &StrPool) {
266 if (!fEnumerateLoadedModules)
267 return false;
268 FindModuleData Data;
269 Data.StackTrace = StackTrace;
270 Data.Depth = Depth;
271 Data.Modules = Modules;
272 Data.Offsets = Offsets;
273 Data.StrPool = &StrPool;
274 fEnumerateLoadedModules(GetCurrentProcess(), findModuleCallback, &Data);
275 return true;
276}
277
Zachary Turnercd132c92015-03-05 19:10:52 +0000278static void PrintStackTraceForThread(llvm::raw_ostream &OS, HANDLE hProcess,
Zachary Turner62b7b612015-03-05 17:47:52 +0000279 HANDLE hThread, STACKFRAME64 &StackFrame,
280 CONTEXT *Context) {
Zachary Turner62b7b612015-03-05 17:47:52 +0000281 // Initialize the symbol handler.
Leny Kholodovbebb27b2015-07-02 14:34:57 +0000282 fSymSetOptions(SYMOPT_DEFERRED_LOADS | SYMOPT_LOAD_LINES);
283 fSymInitialize(hProcess, NULL, TRUE);
Zachary Turner62b7b612015-03-05 17:47:52 +0000284
Reid Klecknerba5757d2015-11-05 01:07:54 +0000285 // Try llvm-symbolizer first. llvm-symbolizer knows how to deal with both PDBs
286 // and DWARF, so it should do a good job regardless of what debug info or
287 // linker is in use.
288 if (printStackTraceWithLLVMSymbolizer(OS, hProcess, hThread, StackFrame,
289 Context)) {
290 return;
291 }
292
Zachary Turner62b7b612015-03-05 17:47:52 +0000293 while (true) {
Reid Klecknerba5757d2015-11-05 01:07:54 +0000294 if (!fStackWalk64(NativeMachineType, hProcess, hThread, &StackFrame,
295 Context, 0, fSymFunctionTableAccess64,
296 fSymGetModuleBase64, 0)) {
Zachary Turner62b7b612015-03-05 17:47:52 +0000297 break;
298 }
299
300 if (StackFrame.AddrFrame.Offset == 0)
301 break;
302
Zachary Turnercd132c92015-03-05 19:10:52 +0000303 using namespace llvm;
Zachary Turner62b7b612015-03-05 17:47:52 +0000304 // Print the PC in hexadecimal.
305 DWORD64 PC = StackFrame.AddrPC.Offset;
306#if defined(_M_X64)
Zachary Turnercd132c92015-03-05 19:10:52 +0000307 OS << format("0x%016llX", PC);
Zachary Turner62b7b612015-03-05 17:47:52 +0000308#elif defined(_M_IX86)
Zachary Turnercd132c92015-03-05 19:10:52 +0000309 OS << format("0x%08lX", static_cast<DWORD>(PC));
Zachary Turner62b7b612015-03-05 17:47:52 +0000310#endif
311
312// Print the parameters. Assume there are four.
313#if defined(_M_X64)
Zachary Turnercd132c92015-03-05 19:10:52 +0000314 OS << format(" (0x%016llX 0x%016llX 0x%016llX 0x%016llX)",
Zachary Turner62b7b612015-03-05 17:47:52 +0000315 StackFrame.Params[0], StackFrame.Params[1], StackFrame.Params[2],
316 StackFrame.Params[3]);
317#elif defined(_M_IX86)
Zachary Turnercd132c92015-03-05 19:10:52 +0000318 OS << format(" (0x%08lX 0x%08lX 0x%08lX 0x%08lX)",
Zachary Turner62b7b612015-03-05 17:47:52 +0000319 static_cast<DWORD>(StackFrame.Params[0]),
320 static_cast<DWORD>(StackFrame.Params[1]),
321 static_cast<DWORD>(StackFrame.Params[2]),
322 static_cast<DWORD>(StackFrame.Params[3]));
323#endif
324 // Verify the PC belongs to a module in this process.
Leny Kholodovbebb27b2015-07-02 14:34:57 +0000325 if (!fSymGetModuleBase64(hProcess, PC)) {
Zachary Turnercd132c92015-03-05 19:10:52 +0000326 OS << " <unknown module>\n";
Zachary Turner62b7b612015-03-05 17:47:52 +0000327 continue;
328 }
329
330 // Print the symbol name.
331 char buffer[512];
332 IMAGEHLP_SYMBOL64 *symbol = reinterpret_cast<IMAGEHLP_SYMBOL64 *>(buffer);
333 memset(symbol, 0, sizeof(IMAGEHLP_SYMBOL64));
334 symbol->SizeOfStruct = sizeof(IMAGEHLP_SYMBOL64);
335 symbol->MaxNameLength = 512 - sizeof(IMAGEHLP_SYMBOL64);
336
337 DWORD64 dwDisp;
Leny Kholodovbebb27b2015-07-02 14:34:57 +0000338 if (!fSymGetSymFromAddr64(hProcess, PC, &dwDisp, symbol)) {
Zachary Turnercd132c92015-03-05 19:10:52 +0000339 OS << '\n';
Zachary Turner62b7b612015-03-05 17:47:52 +0000340 continue;
341 }
342
343 buffer[511] = 0;
344 if (dwDisp > 0)
Zachary Turnercd132c92015-03-05 19:10:52 +0000345 OS << format(", %s() + 0x%llX bytes(s)", (const char*)symbol->Name,
346 dwDisp);
Zachary Turner62b7b612015-03-05 17:47:52 +0000347 else
Zachary Turnercd132c92015-03-05 19:10:52 +0000348 OS << format(", %s", (const char*)symbol->Name);
Zachary Turner62b7b612015-03-05 17:47:52 +0000349
350 // Print the source file and line number information.
Yaron Keren24a86df2015-04-24 15:39:47 +0000351 IMAGEHLP_LINE64 line = {};
Zachary Turner62b7b612015-03-05 17:47:52 +0000352 DWORD dwLineDisp;
Zachary Turner62b7b612015-03-05 17:47:52 +0000353 line.SizeOfStruct = sizeof(line);
Leny Kholodovbebb27b2015-07-02 14:34:57 +0000354 if (fSymGetLineFromAddr64(hProcess, PC, &dwLineDisp, &line)) {
Zachary Turnercd132c92015-03-05 19:10:52 +0000355 OS << format(", %s, line %lu", line.FileName, line.LineNumber);
Zachary Turner62b7b612015-03-05 17:47:52 +0000356 if (dwLineDisp > 0)
Zachary Turnercd132c92015-03-05 19:10:52 +0000357 OS << format(" + 0x%lX byte(s)", dwLineDisp);
Zachary Turner62b7b612015-03-05 17:47:52 +0000358 }
359
Zachary Turnercd132c92015-03-05 19:10:52 +0000360 OS << '\n';
Zachary Turner62b7b612015-03-05 17:47:52 +0000361 }
362}
363
Reid Spencer3d7a6142004-08-29 19:22:48 +0000364namespace llvm {
Reid Spencer3d7a6142004-08-29 19:22:48 +0000365
366//===----------------------------------------------------------------------===//
Mikhail Glushenkovf64d93d2010-10-21 20:40:39 +0000367//=== WARNING: Implementation here must contain only Win32 specific code
Reid Spencer4aff78a2004-09-16 15:53:16 +0000368//=== and must not be UNIX code
Reid Spencer3d7a6142004-08-29 19:22:48 +0000369//===----------------------------------------------------------------------===//
370
Daniel Dunbar1bdedd32009-09-22 15:58:35 +0000371#ifdef _MSC_VER
Reid Klecknerbd39f212013-04-05 16:18:03 +0000372/// AvoidMessageBoxHook - Emulates hitting "retry" from an "abort, retry,
373/// ignore" CRT debug report dialog. "retry" raises an exception which
374/// ultimately triggers our stack dumper.
Reid Kleckner542a4542015-02-26 21:08:21 +0000375static LLVM_ATTRIBUTE_UNUSED int
376AvoidMessageBoxHook(int ReportType, char *Message, int *Return) {
Reid Klecknerbd39f212013-04-05 16:18:03 +0000377 // Set *Return to the retry code for the return value of _CrtDbgReport:
378 // http://msdn.microsoft.com/en-us/library/8hyw4sy7(v=vs.71).aspx
379 // This may also trigger just-in-time debugging via DebugBreak().
380 if (Return)
381 *Return = 1;
382 // Don't call _CrtDbgReport.
383 return TRUE;
384}
385
Daniel Dunbar1bdedd32009-09-22 15:58:35 +0000386#endif
Daniel Dunbar4c7b0ca2009-09-22 09:50:28 +0000387
Aaron Ballman03b968e2015-01-29 20:48:34 +0000388extern "C" void HandleAbort(int Sig) {
Michael J. Spencer89b0ad22015-01-29 17:20:29 +0000389 if (Sig == SIGABRT) {
390 LLVM_BUILTIN_TRAP;
391 }
392}
393
Aaron Ballman50af8d42015-03-26 16:24:38 +0000394static void InitializeThreading() {
395 if (CriticalSectionInitialized)
396 return;
397
398 // Now's the time to create the critical section. This is the first time
399 // through here, and there's only one thread.
400 InitializeCriticalSection(&CriticalSection);
401 CriticalSectionInitialized = true;
402}
403
Daniel Dunbar4c7b0ca2009-09-22 09:50:28 +0000404static void RegisterHandler() {
Leny Kholodovbebb27b2015-07-02 14:34:57 +0000405 // If we cannot load up the APIs (which would be unexpected as they should
406 // exist on every version of Windows we support), we will bail out since
407 // there would be nothing to report.
Michael J. Spencer44a36c82011-10-01 00:05:20 +0000408 if (!load64BitDebugHelp()) {
409 assert(false && "These APIs should always be available");
410 return;
411 }
Michael J. Spencer44a36c82011-10-01 00:05:20 +0000412
Reid Spencer1bdd0f02004-09-19 05:37:39 +0000413 if (RegisteredUnhandledExceptionFilter) {
Reid Spencer90debc52004-09-17 03:02:27 +0000414 EnterCriticalSection(&CriticalSection);
Reid Spencer4aff78a2004-09-16 15:53:16 +0000415 return;
Reid Spencer90debc52004-09-17 03:02:27 +0000416 }
Reid Spencer4aff78a2004-09-16 15:53:16 +0000417
Aaron Ballman50af8d42015-03-26 16:24:38 +0000418 InitializeThreading();
Reid Spencer4aff78a2004-09-16 15:53:16 +0000419
420 // Enter it immediately. Now if someone hits CTRL/C, the console handler
421 // can't proceed until the globals are updated.
422 EnterCriticalSection(&CriticalSection);
423
424 RegisteredUnhandledExceptionFilter = true;
Reid Spencer1bdd0f02004-09-19 05:37:39 +0000425 OldFilter = SetUnhandledExceptionFilter(LLVMUnhandledExceptionFilter);
Reid Spencer4aff78a2004-09-16 15:53:16 +0000426 SetConsoleCtrlHandler(LLVMConsoleCtrlHandler, TRUE);
427
428 // IMPORTANT NOTE: Caller must call LeaveCriticalSection(&CriticalSection) or
429 // else multi-threading problems will ensue.
430}
431
Reid Spencer3d7a6142004-08-29 19:22:48 +0000432// RemoveFileOnSignal - The public API
Rafael Espindola4f35da72013-06-13 21:16:58 +0000433bool sys::RemoveFileOnSignal(StringRef Filename, std::string* ErrMsg) {
Reid Spencer4aff78a2004-09-16 15:53:16 +0000434 RegisterHandler();
435
Reid Spencer50eac3b2006-08-25 21:37:17 +0000436 if (CleanupExecuted) {
437 if (ErrMsg)
438 *ErrMsg = "Process terminating -- cannot register for removal";
439 return true;
440 }
Reid Spencer1bdd0f02004-09-19 05:37:39 +0000441
Reid Spencer4aff78a2004-09-16 15:53:16 +0000442 if (FilesToRemove == NULL)
Rafael Espindola4f35da72013-06-13 21:16:58 +0000443 FilesToRemove = new std::vector<std::string>;
Reid Spencer4aff78a2004-09-16 15:53:16 +0000444
Reid Spencerf070b6c2004-11-16 06:59:53 +0000445 FilesToRemove->push_back(Filename);
Reid Spencer4aff78a2004-09-16 15:53:16 +0000446
447 LeaveCriticalSection(&CriticalSection);
Reid Spencer50eac3b2006-08-25 21:37:17 +0000448 return false;
Reid Spencer3d7a6142004-08-29 19:22:48 +0000449}
450
Dan Gohmane201c072010-09-01 14:17:34 +0000451// DontRemoveFileOnSignal - The public API
Rafael Espindola4f35da72013-06-13 21:16:58 +0000452void sys::DontRemoveFileOnSignal(StringRef Filename) {
Dan Gohmane201c072010-09-01 14:17:34 +0000453 if (FilesToRemove == NULL)
454 return;
455
NAKAMURA Takumi3f688b92010-10-22 01:23:50 +0000456 RegisterHandler();
457
Rafael Espindola4f35da72013-06-13 21:16:58 +0000458 std::vector<std::string>::reverse_iterator I =
Dan Gohmane201c072010-09-01 14:17:34 +0000459 std::find(FilesToRemove->rbegin(), FilesToRemove->rend(), Filename);
460 if (I != FilesToRemove->rend())
461 FilesToRemove->erase(I.base()-1);
462
463 LeaveCriticalSection(&CriticalSection);
464}
465
Michael J. Spencer89b0ad22015-01-29 17:20:29 +0000466void sys::DisableSystemDialogsOnCrash() {
467 // Crash to stack trace handler on abort.
468 signal(SIGABRT, HandleAbort);
469
470 // The following functions are not reliably accessible on MinGW.
471#ifdef _MSC_VER
472 // We're already handling writing a "something went wrong" message.
473 _set_abort_behavior(0, _WRITE_ABORT_MSG);
474 // Disable Dr. Watson.
475 _set_abort_behavior(0, _CALL_REPORTFAULT);
476 _CrtSetReportHook(AvoidMessageBoxHook);
477#endif
478
479 // Disable standard error dialog box.
480 SetErrorMode(SEM_FAILCRITICALERRORS | SEM_NOGPFAULTERRORBOX |
481 SEM_NOOPENFILEERRORBOX);
482 _set_error_mode(_OUT_TO_STDERR);
483}
484
Reid Spencer3d7a6142004-08-29 19:22:48 +0000485/// PrintStackTraceOnErrorSignal - When an error signal (such as SIBABRT or
486/// SIGSEGV) is delivered to the process, print a stack trace and then exit.
Pete Cooper6bea2f42015-04-07 20:43:23 +0000487void sys::PrintStackTraceOnErrorSignal(bool DisableCrashReporting) {
Michael J. Spencer89b0ad22015-01-29 17:20:29 +0000488 DisableSystemDialogsOnCrash();
Reid Spencer4aff78a2004-09-16 15:53:16 +0000489 RegisterHandler();
490 LeaveCriticalSection(&CriticalSection);
Reid Spencer3d7a6142004-08-29 19:22:48 +0000491}
Benjamin Kramerf97eff62015-03-11 15:41:15 +0000492}
493
Yaron Kerenbdae8d62015-03-14 19:20:56 +0000494#if defined(__MINGW32__) && !defined(__MINGW64_VERSION_MAJOR)
495// Provide a prototype for RtlCaptureContext, mingw32 from mingw.org is
496// missing it but mingw-w64 has it.
Benjamin Kramerf97eff62015-03-11 15:41:15 +0000497extern "C" VOID WINAPI RtlCaptureContext(PCONTEXT ContextRecord);
Benjamin Kramerb47d5492015-03-11 16:09:02 +0000498#endif
Reid Spencer3d7a6142004-08-29 19:22:48 +0000499
Zachary Turnercd132c92015-03-05 19:10:52 +0000500void llvm::sys::PrintStackTrace(raw_ostream &OS) {
Reid Klecknere6580582015-03-05 18:26:58 +0000501 STACKFRAME64 StackFrame = {};
Yaron Keren24a86df2015-04-24 15:39:47 +0000502 CONTEXT Context = {};
Zachary Turner62b7b612015-03-05 17:47:52 +0000503 ::RtlCaptureContext(&Context);
504#if defined(_M_X64)
505 StackFrame.AddrPC.Offset = Context.Rip;
506 StackFrame.AddrStack.Offset = Context.Rsp;
507 StackFrame.AddrFrame.Offset = Context.Rbp;
508#else
509 StackFrame.AddrPC.Offset = Context.Eip;
510 StackFrame.AddrStack.Offset = Context.Esp;
511 StackFrame.AddrFrame.Offset = Context.Ebp;
512#endif
513 StackFrame.AddrPC.Mode = AddrModeFlat;
514 StackFrame.AddrStack.Mode = AddrModeFlat;
515 StackFrame.AddrFrame.Mode = AddrModeFlat;
Zachary Turnercd132c92015-03-05 19:10:52 +0000516 PrintStackTraceForThread(OS, GetCurrentProcess(), GetCurrentThread(),
Zachary Turner62b7b612015-03-05 17:47:52 +0000517 StackFrame, &Context);
Argyrios Kyrtzidiseb9ae762013-01-09 19:42:40 +0000518}
519
Chris Lattner6a5d6ec2005-08-02 02:14:22 +0000520
Benjamin Kramer90c2db22015-03-11 15:53:24 +0000521void llvm::sys::SetInterruptFunction(void (*IF)()) {
Jeff Cohenba7cc682005-08-02 03:04:47 +0000522 RegisterHandler();
Jeff Cohen9aafa062005-08-02 03:26:32 +0000523 InterruptFunction = IF;
Jeff Cohenba7cc682005-08-02 03:04:47 +0000524 LeaveCriticalSection(&CriticalSection);
Chris Lattner6a5d6ec2005-08-02 02:14:22 +0000525}
Sebastian Redl8d5baa02009-03-19 23:26:52 +0000526
527
528/// AddSignalHandler - Add a function to be called when a signal is delivered
529/// to the process. The handler can have a cookie passed to it to identify
530/// what instance of the handler it is.
Benjamin Kramerb47d5492015-03-11 16:09:02 +0000531void llvm::sys::AddSignalHandler(void (*FnPtr)(void *), void *Cookie) {
Sebastian Redl8d5baa02009-03-19 23:26:52 +0000532 CallBacksToRun->push_back(std::make_pair(FnPtr, Cookie));
533 RegisterHandler();
Torok Edwin6fb09562010-03-31 12:07:16 +0000534 LeaveCriticalSection(&CriticalSection);
Sebastian Redl8d5baa02009-03-19 23:26:52 +0000535}
Reid Spencer3d7a6142004-08-29 19:22:48 +0000536
Reid Spencer4aff78a2004-09-16 15:53:16 +0000537static void Cleanup() {
Yaron Keren356aa462015-05-19 13:31:25 +0000538 if (CleanupExecuted)
539 return;
540
Reid Spencer4aff78a2004-09-16 15:53:16 +0000541 EnterCriticalSection(&CriticalSection);
542
Reid Spencer1bdd0f02004-09-19 05:37:39 +0000543 // Prevent other thread from registering new files and directories for
544 // removal, should we be executing because of the console handler callback.
545 CleanupExecuted = true;
546
547 // FIXME: open files cannot be deleted.
Reid Spencer4aff78a2004-09-16 15:53:16 +0000548 if (FilesToRemove != NULL)
549 while (!FilesToRemove->empty()) {
Rafael Espindolad724c282014-02-23 13:37:37 +0000550 llvm::sys::fs::remove(FilesToRemove->back());
Reid Spencer4aff78a2004-09-16 15:53:16 +0000551 FilesToRemove->pop_back();
552 }
Yaron Keren28738102015-07-22 21:11:17 +0000553 llvm::sys::RunSignalHandlers();
Reid Spencer4aff78a2004-09-16 15:53:16 +0000554 LeaveCriticalSection(&CriticalSection);
555}
556
Daniel Dunbar68272562010-05-08 02:10:34 +0000557void llvm::sys::RunInterruptHandlers() {
Aaron Ballman50af8d42015-03-26 16:24:38 +0000558 // The interrupt handler may be called from an interrupt, but it may also be
559 // called manually (such as the case of report_fatal_error with no registered
560 // error handler). We must ensure that the critical section is properly
561 // initialized.
562 InitializeThreading();
Daniel Dunbar68272562010-05-08 02:10:34 +0000563 Cleanup();
564}
565
Reid Spencer4aff78a2004-09-16 15:53:16 +0000566static LONG WINAPI LLVMUnhandledExceptionFilter(LPEXCEPTION_POINTERS ep) {
Mikhail Glushenkov32acd742010-10-27 09:09:04 +0000567 Cleanup();
Mikhail Glushenkovf64d93d2010-10-21 20:40:39 +0000568
Mikhail Glushenkov080d86f2010-10-28 08:25:44 +0000569 // Initialize the STACKFRAME structure.
Yaron Keren24a86df2015-04-24 15:39:47 +0000570 STACKFRAME64 StackFrame = {};
Reid Spencer4aff78a2004-09-16 15:53:16 +0000571
Michael J. Spencer44a36c82011-10-01 00:05:20 +0000572#if defined(_M_X64)
Michael J. Spencer44a36c82011-10-01 00:05:20 +0000573 StackFrame.AddrPC.Offset = ep->ContextRecord->Rip;
574 StackFrame.AddrPC.Mode = AddrModeFlat;
575 StackFrame.AddrStack.Offset = ep->ContextRecord->Rsp;
576 StackFrame.AddrStack.Mode = AddrModeFlat;
577 StackFrame.AddrFrame.Offset = ep->ContextRecord->Rbp;
578 StackFrame.AddrFrame.Mode = AddrModeFlat;
579#elif defined(_M_IX86)
Mikhail Glushenkov080d86f2010-10-28 08:25:44 +0000580 StackFrame.AddrPC.Offset = ep->ContextRecord->Eip;
581 StackFrame.AddrPC.Mode = AddrModeFlat;
582 StackFrame.AddrStack.Offset = ep->ContextRecord->Esp;
583 StackFrame.AddrStack.Mode = AddrModeFlat;
584 StackFrame.AddrFrame.Offset = ep->ContextRecord->Ebp;
585 StackFrame.AddrFrame.Mode = AddrModeFlat;
Michael J. Spencer44a36c82011-10-01 00:05:20 +0000586#endif
Reid Spencer4aff78a2004-09-16 15:53:16 +0000587
Mikhail Glushenkov080d86f2010-10-28 08:25:44 +0000588 HANDLE hProcess = GetCurrentProcess();
589 HANDLE hThread = GetCurrentThread();
Zachary Turnercd132c92015-03-05 19:10:52 +0000590 PrintStackTraceForThread(llvm::errs(), hProcess, hThread, StackFrame,
Zachary Turner62b7b612015-03-05 17:47:52 +0000591 ep->ContextRecord);
Mikhail Glushenkov080d86f2010-10-28 08:25:44 +0000592
Michael J. Spencer89b0ad22015-01-29 17:20:29 +0000593 _exit(ep->ExceptionRecord->ExceptionCode);
Reid Spencer4aff78a2004-09-16 15:53:16 +0000594}
595
596static BOOL WINAPI LLVMConsoleCtrlHandler(DWORD dwCtrlType) {
Jeff Cohen9aafa062005-08-02 03:26:32 +0000597 // We are running in our very own thread, courtesy of Windows.
Jeff Cohenba7cc682005-08-02 03:04:47 +0000598 EnterCriticalSection(&CriticalSection);
Reid Spencer4aff78a2004-09-16 15:53:16 +0000599 Cleanup();
600
Jeff Cohenba7cc682005-08-02 03:04:47 +0000601 // If an interrupt function has been set, go and run one it; otherwise,
602 // the process dies.
603 void (*IF)() = InterruptFunction;
604 InterruptFunction = 0; // Don't run it on another CTRL-C.
605
606 if (IF) {
Jeff Cohen9aafa062005-08-02 03:26:32 +0000607 // Note: if the interrupt function throws an exception, there is nothing
608 // to catch it in this thread so it will kill the process.
609 IF(); // Run it now.
Jeff Cohenba7cc682005-08-02 03:04:47 +0000610 LeaveCriticalSection(&CriticalSection);
611 return TRUE; // Don't kill the process.
612 }
613
Reid Spencer90debc52004-09-17 03:02:27 +0000614 // Allow normal processing to take place; i.e., the process dies.
Jeff Cohenba7cc682005-08-02 03:04:47 +0000615 LeaveCriticalSection(&CriticalSection);
Reid Spencer4aff78a2004-09-16 15:53:16 +0000616 return FALSE;
617}
Michael J. Spencer44a36c82011-10-01 00:05:20 +0000618
619#if __MINGW32__
620 // We turned these warnings off for this file so that MinGW-g++ doesn't
621 // complain about the ll format specifiers used. Now we are turning the
622 // warnings back on. If MinGW starts to support diagnostic stacks, we can
623 // replace this with a pop.
624 #pragma GCC diagnostic warning "-Wformat"
625 #pragma GCC diagnostic warning "-Wformat-extra-args"
626#endif