blob: e76f1d1f7fa62e3211236b3968470c8cc6dd6d92 [file] [log] [blame]
Alexey Samsonov298dd7c2012-06-05 07:46:31 +00001//===-- sanitizer_win.cc --------------------------------------------------===//
Alexey Samsonovdde1f112012-06-05 07:05:10 +00002//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9//
10// This file is shared between AddressSanitizer and ThreadSanitizer
11// run-time libraries and implements windows-specific functions from
12// sanitizer_libc.h.
13//===----------------------------------------------------------------------===//
Evgeniy Stepanov0af67232013-03-19 14:33:38 +000014
15#include "sanitizer_platform.h"
16#if SANITIZER_WINDOWS
17
Dmitry Vyukov0ff6d2d2012-11-06 13:19:59 +000018#define WIN32_LEAN_AND_MEAN
19#define NOGDI
Alexey Samsonovc463f302012-11-08 13:08:41 +000020#include <stdlib.h>
Alexey Samsonov35ed02e2012-12-19 08:51:39 +000021#include <io.h>
Alexey Samsonovdde1f112012-06-05 07:05:10 +000022#include <windows.h>
23
Alexey Samsonov201aa362012-06-06 09:43:32 +000024#include "sanitizer_common.h"
Alexey Samsonovdde1f112012-06-05 07:05:10 +000025#include "sanitizer_libc.h"
Dmitry Vyukovff198092013-01-14 14:28:06 +000026#include "sanitizer_mutex.h"
Sergey Matveevaf179b82013-05-08 12:45:55 +000027#include "sanitizer_placement_new.h"
28#include "sanitizer_stacktrace.h"
Alexey Samsonovdde1f112012-06-05 07:05:10 +000029
Alexey Samsonovdde1f112012-06-05 07:05:10 +000030namespace __sanitizer {
31
Peter Collingbourne6f4be192013-05-08 14:43:49 +000032#include "sanitizer_syscall_generic.inc"
33
Alexey Samsonov4b1f1032012-06-07 07:13:46 +000034// --------------------- sanitizer_common.h
Kostya Serebryanyf22c6972012-11-23 15:38:49 +000035uptr GetPageSize() {
36 return 1U << 14; // FIXME: is this configurable?
37}
38
39uptr GetMmapGranularity() {
40 return 1U << 16; // FIXME: is this configurable?
41}
42
Alexey Samsonovae9b18b2012-11-09 14:45:30 +000043bool FileExists(const char *filename) {
44 UNIMPLEMENTED();
45}
46
Peter Collingbourneffaf2ea2013-05-17 16:56:53 +000047uptr internal_getpid() {
Alexey Samsonovee072902012-06-06 09:26:25 +000048 return GetProcessId(GetCurrentProcess());
49}
50
Timur Iskhodzhanov2dee3dd2013-03-25 22:04:29 +000051// In contrast to POSIX, on Windows GetCurrentThreadId()
52// returns a system-unique identifier.
53uptr GetTid() {
Alexey Samsonov70afb912012-06-15 06:37:34 +000054 return GetCurrentThreadId();
55}
56
Timur Iskhodzhanov2dee3dd2013-03-25 22:04:29 +000057uptr GetThreadSelf() {
58 return GetTid();
59}
60
Alexey Samsonovcf4d3a02012-06-07 07:32:00 +000061void GetThreadStackTopAndBottom(bool at_initialization, uptr *stack_top,
Alexey Samsonov4b1f1032012-06-07 07:13:46 +000062 uptr *stack_bottom) {
63 CHECK(stack_top);
64 CHECK(stack_bottom);
65 MEMORY_BASIC_INFORMATION mbi;
Kostya Serebryany98390d02012-06-20 15:19:17 +000066 CHECK_NE(VirtualQuery(&mbi /* on stack */, &mbi, sizeof(mbi)), 0);
Alexey Samsonov4b1f1032012-06-07 07:13:46 +000067 // FIXME: is it possible for the stack to not be a single allocation?
68 // Are these values what ASan expects to get (reserved, not committed;
69 // including stack guard page) ?
70 *stack_top = (uptr)mbi.BaseAddress + mbi.RegionSize;
71 *stack_bottom = (uptr)mbi.AllocationBase;
72}
73
Alexey Samsonov40d5b772012-06-06 16:15:07 +000074void *MmapOrDie(uptr size, const char *mem_type) {
Alexey Samsonovee072902012-06-06 09:26:25 +000075 void *rv = VirtualAlloc(0, size, MEM_RESERVE | MEM_COMMIT, PAGE_READWRITE);
Alexey Samsonov40d5b772012-06-06 16:15:07 +000076 if (rv == 0) {
77 Report("ERROR: Failed to allocate 0x%zx (%zd) bytes of %s\n",
78 size, size, mem_type);
79 CHECK("unable to mmap" && 0);
80 }
Alexey Samsonovee072902012-06-06 09:26:25 +000081 return rv;
82}
83
84void UnmapOrDie(void *addr, uptr size) {
Alexey Samsonove95e29c2012-06-06 15:47:40 +000085 if (VirtualFree(addr, size, MEM_DECOMMIT) == 0) {
Alexey Samsonov40d5b772012-06-06 16:15:07 +000086 Report("ERROR: Failed to deallocate 0x%zx (%zd) bytes at address %p\n",
87 size, size, addr);
88 CHECK("unable to unmap" && 0);
Alexey Samsonove95e29c2012-06-06 15:47:40 +000089 }
Alexey Samsonovee072902012-06-06 09:26:25 +000090}
91
Alexey Samsonovc70d1082012-06-14 14:42:58 +000092void *MmapFixedNoReserve(uptr fixed_addr, uptr size) {
Kostya Serebryany98066282012-12-13 05:36:00 +000093 // FIXME: is this really "NoReserve"? On Win32 this does not matter much,
94 // but on Win64 it does.
Dmitry Vyukov0ff6d2d2012-11-06 13:19:59 +000095 void *p = VirtualAlloc((LPVOID)fixed_addr, size,
96 MEM_RESERVE | MEM_COMMIT, PAGE_READWRITE);
97 if (p == 0)
98 Report("ERROR: Failed to allocate 0x%zx (%zd) bytes at %p (%d)\n",
99 size, size, fixed_addr, GetLastError());
100 return p;
Alexey Samsonovc70d1082012-06-14 14:42:58 +0000101}
102
Kostya Serebryany98066282012-12-13 05:36:00 +0000103void *MmapFixedOrDie(uptr fixed_addr, uptr size) {
Kostya Serebryanya1670872012-12-13 05:51:02 +0000104 return MmapFixedNoReserve(fixed_addr, size);
Kostya Serebryany98066282012-12-13 05:36:00 +0000105}
106
Alexey Samsonovc70d1082012-06-14 14:42:58 +0000107void *Mprotect(uptr fixed_addr, uptr size) {
108 return VirtualAlloc((LPVOID)fixed_addr, size,
109 MEM_RESERVE | MEM_COMMIT, PAGE_NOACCESS);
110}
111
Timur Iskhodzhanov167f9e42013-02-08 12:02:00 +0000112void FlushUnneededShadowMemory(uptr addr, uptr size) {
113 // This is almost useless on 32-bits.
114 // FIXME: add madvice-analog when we move to 64-bits.
115}
116
Alexey Samsonov40e51282012-06-15 07:29:14 +0000117bool MemoryRangeIsAvailable(uptr range_start, uptr range_end) {
118 // FIXME: shall we do anything here on Windows?
119 return true;
120}
121
Alexey Samsonov961276a2012-07-03 08:24:14 +0000122void *MapFileToMemory(const char *file_name, uptr *buff_size) {
123 UNIMPLEMENTED();
124}
125
Alexey Samsonov7d238542013-03-14 11:29:06 +0000126static const int kMaxEnvNameLength = 128;
127static const int kMaxEnvValueLength = 32767;
Alexey Samsonov83e76222013-03-14 11:10:23 +0000128
129namespace {
130
131struct EnvVariable {
132 char name[kMaxEnvNameLength];
133 char value[kMaxEnvValueLength];
134};
135
136} // namespace
137
138static const int kEnvVariables = 5;
139static EnvVariable env_vars[kEnvVariables];
140static int num_env_vars;
141
Alexey Samsonov0c53a382012-06-14 14:07:21 +0000142const char *GetEnv(const char *name) {
Alexey Samsonov83e76222013-03-14 11:10:23 +0000143 // Note: this implementation caches the values of the environment variables
144 // and limits their quantity.
145 for (int i = 0; i < num_env_vars; i++) {
146 if (0 == internal_strcmp(name, env_vars[i].name))
147 return env_vars[i].value;
148 }
149 CHECK_LT(num_env_vars, kEnvVariables);
150 DWORD rv = GetEnvironmentVariableA(name, env_vars[num_env_vars].value,
151 kMaxEnvValueLength);
152 if (rv > 0 && rv < kMaxEnvValueLength) {
153 CHECK_LT(internal_strlen(name), kMaxEnvNameLength);
154 internal_strncpy(env_vars[num_env_vars].name, name, kMaxEnvNameLength);
155 num_env_vars++;
156 return env_vars[num_env_vars - 1].value;
157 }
Alexey Samsonov0c53a382012-06-14 14:07:21 +0000158 return 0;
159}
160
Alexey Samsonov58a3c582012-06-18 08:44:30 +0000161const char *GetPwd() {
162 UNIMPLEMENTED();
163}
164
Alexey Samsonov9211bd32013-02-18 07:17:12 +0000165u32 GetUid() {
166 UNIMPLEMENTED();
167}
168
Alexey Samsonovae1e1712012-06-15 06:08:19 +0000169void DumpProcessMap() {
170 UNIMPLEMENTED();
171}
172
173void DisableCoreDumper() {
174 UNIMPLEMENTED();
175}
176
Alexey Samsonov97ca3062012-09-17 09:12:39 +0000177void ReExec() {
178 UNIMPLEMENTED();
179}
180
Alexander Potapenko1746f552012-12-10 13:10:40 +0000181void PrepareForSandboxing() {
182 // Nothing here for now.
183}
184
Alexey Samsonov97ca3062012-09-17 09:12:39 +0000185bool StackSizeIsUnlimited() {
186 UNIMPLEMENTED();
Alexey Samsonov97ca3062012-09-17 09:12:39 +0000187}
188
189void SetStackSizeLimitInBytes(uptr limit) {
190 UNIMPLEMENTED();
191}
192
Alexey Samsonov70afb912012-06-15 06:37:34 +0000193void SleepForSeconds(int seconds) {
194 Sleep(seconds * 1000);
195}
196
Alexey Samsonov58a3c582012-06-18 08:44:30 +0000197void SleepForMillis(int millis) {
198 Sleep(millis);
199}
200
Alexey Samsonov70afb912012-06-15 06:37:34 +0000201void Abort() {
202 abort();
203 _exit(-1); // abort is not NORETURN on Windows.
204}
205
Dmitry Vyukov0ff6d2d2012-11-06 13:19:59 +0000206#ifndef SANITIZER_GO
Alexey Samsonov70afb912012-06-15 06:37:34 +0000207int Atexit(void (*function)(void)) {
208 return atexit(function);
209}
Dmitry Vyukov0ff6d2d2012-11-06 13:19:59 +0000210#endif
Alexey Samsonov70afb912012-06-15 06:37:34 +0000211
Alexey Samsonov4b1f1032012-06-07 07:13:46 +0000212// ------------------ sanitizer_libc.h
Peter Collingbourne53caf562013-05-08 18:15:01 +0000213uptr internal_mmap(void *addr, uptr length, int prot, int flags,
214 int fd, u64 offset) {
Alexey Samsonove95e29c2012-06-06 15:47:40 +0000215 UNIMPLEMENTED();
Alexey Samsonovdde1f112012-06-05 07:05:10 +0000216}
217
Peter Collingbourne53caf562013-05-08 18:15:01 +0000218uptr internal_munmap(void *addr, uptr length) {
Alexey Samsonove95e29c2012-06-06 15:47:40 +0000219 UNIMPLEMENTED();
Alexey Samsonov7ac77d62012-06-05 09:49:25 +0000220}
221
Peter Collingbourne6f4be192013-05-08 14:43:49 +0000222uptr internal_close(fd_t fd) {
Alexey Samsonove95e29c2012-06-06 15:47:40 +0000223 UNIMPLEMENTED();
Alexey Samsonov03c8b842012-06-05 08:32:53 +0000224}
225
Alexey Samsonov58358892012-11-02 15:18:34 +0000226int internal_isatty(fd_t fd) {
Alexey Samsonovb6219c02012-12-19 07:57:42 +0000227 return _isatty(fd);
Alexey Samsonov58358892012-11-02 15:18:34 +0000228}
229
Peter Collingbourne53caf562013-05-08 18:15:01 +0000230uptr internal_open(const char *filename, int flags) {
Alexey Samsonov39313b72013-02-01 15:58:46 +0000231 UNIMPLEMENTED();
232}
233
Peter Collingbourne53caf562013-05-08 18:15:01 +0000234uptr internal_open(const char *filename, int flags, u32 mode) {
Alexey Samsonov39313b72013-02-01 15:58:46 +0000235 UNIMPLEMENTED();
236}
237
Peter Collingbourne6f4be192013-05-08 14:43:49 +0000238uptr OpenFile(const char *filename, bool write) {
Alexey Samsonove95e29c2012-06-06 15:47:40 +0000239 UNIMPLEMENTED();
Alexey Samsonovdde1f112012-06-05 07:05:10 +0000240}
241
Alexey Samsonov03c8b842012-06-05 08:32:53 +0000242uptr internal_read(fd_t fd, void *buf, uptr count) {
Alexey Samsonove95e29c2012-06-06 15:47:40 +0000243 UNIMPLEMENTED();
Alexey Samsonov03c8b842012-06-05 08:32:53 +0000244}
245
246uptr internal_write(fd_t fd, const void *buf, uptr count) {
Alexey Samsonov20ba98f2012-11-02 09:38:47 +0000247 if (fd != kStderrFd)
Alexey Samsonove95e29c2012-06-06 15:47:40 +0000248 UNIMPLEMENTED();
Alexey Samsonov03c8b842012-06-05 08:32:53 +0000249 HANDLE err = GetStdHandle(STD_ERROR_HANDLE);
250 if (err == 0)
251 return 0; // FIXME: this might not work on some apps.
252 DWORD ret;
253 if (!WriteFile(err, buf, count, &ret, 0))
254 return 0;
255 return ret;
256}
257
Peter Collingbourne6f4be192013-05-08 14:43:49 +0000258uptr internal_stat(const char *path, void *buf) {
Alexey Samsonov2c5cbd22013-02-04 10:16:50 +0000259 UNIMPLEMENTED();
260}
261
Peter Collingbourne6f4be192013-05-08 14:43:49 +0000262uptr internal_lstat(const char *path, void *buf) {
Alexey Samsonov2c5cbd22013-02-04 10:16:50 +0000263 UNIMPLEMENTED();
264}
265
Peter Collingbourne6f4be192013-05-08 14:43:49 +0000266uptr internal_fstat(fd_t fd, void *buf) {
Alexey Samsonov2c5cbd22013-02-04 10:16:50 +0000267 UNIMPLEMENTED();
268}
269
Alexey Samsonovca2b5d72012-06-06 07:30:33 +0000270uptr internal_filesize(fd_t fd) {
Alexey Samsonove95e29c2012-06-06 15:47:40 +0000271 UNIMPLEMENTED();
Alexey Samsonovca2b5d72012-06-06 07:30:33 +0000272}
273
Peter Collingbourne6f4be192013-05-08 14:43:49 +0000274uptr internal_dup2(int oldfd, int newfd) {
Alexey Samsonove95e29c2012-06-06 15:47:40 +0000275 UNIMPLEMENTED();
Alexey Samsonovca2b5d72012-06-06 07:30:33 +0000276}
277
Alexey Samsonovf6d21252012-09-05 14:48:24 +0000278uptr internal_readlink(const char *path, char *buf, uptr bufsize) {
279 UNIMPLEMENTED();
Alexey Samsonovf6d21252012-09-05 14:48:24 +0000280}
281
Peter Collingbourne6f4be192013-05-08 14:43:49 +0000282uptr internal_sched_yield() {
Dmitry Vyukov0ff6d2d2012-11-06 13:19:59 +0000283 Sleep(0);
284 return 0;
Alexey Samsonov58a3c582012-06-18 08:44:30 +0000285}
286
Alexey Samsonovaadd1f22013-02-20 13:54:32 +0000287void internal__exit(int exitcode) {
288 _exit(exitcode);
289}
290
Dmitry Vyukovf22982b2013-01-14 07:51:39 +0000291// ---------------------- BlockingMutex ---------------- {{{1
Dmitry Vyukovfa67ed42013-02-04 10:42:38 +0000292const uptr LOCK_UNINITIALIZED = 0;
293const uptr LOCK_READY = (uptr)-1;
Dmitry Vyukovf22982b2013-01-14 07:51:39 +0000294
295BlockingMutex::BlockingMutex(LinkerInitialized li) {
296 // FIXME: see comments in BlockingMutex::Lock() for the details.
297 CHECK(li == LINKER_INITIALIZED || owner_ == LOCK_UNINITIALIZED);
298
299 CHECK(sizeof(CRITICAL_SECTION) <= sizeof(opaque_storage_));
300 InitializeCriticalSection((LPCRITICAL_SECTION)opaque_storage_);
301 owner_ = LOCK_READY;
302}
303
Alexey Samsonova097f7b2013-03-14 13:30:56 +0000304BlockingMutex::BlockingMutex() {
305 CHECK(sizeof(CRITICAL_SECTION) <= sizeof(opaque_storage_));
306 InitializeCriticalSection((LPCRITICAL_SECTION)opaque_storage_);
307 owner_ = LOCK_READY;
308}
309
Dmitry Vyukovf22982b2013-01-14 07:51:39 +0000310void BlockingMutex::Lock() {
311 if (owner_ == LOCK_UNINITIALIZED) {
312 // FIXME: hm, global BlockingMutex objects are not initialized?!?
313 // This might be a side effect of the clang+cl+link Frankenbuild...
314 new(this) BlockingMutex((LinkerInitialized)(LINKER_INITIALIZED + 1));
315
316 // FIXME: If it turns out the linker doesn't invoke our
317 // constructors, we should probably manually Lock/Unlock all the global
318 // locks while we're starting in one thread to avoid double-init races.
319 }
320 EnterCriticalSection((LPCRITICAL_SECTION)opaque_storage_);
Dmitry Vyukov7981ea82013-02-04 08:07:45 +0000321 CHECK_EQ(owner_, LOCK_READY);
Dmitry Vyukovf22982b2013-01-14 07:51:39 +0000322 owner_ = GetThreadSelf();
323}
324
325void BlockingMutex::Unlock() {
Dmitry Vyukov7981ea82013-02-04 08:07:45 +0000326 CHECK_EQ(owner_, GetThreadSelf());
Dmitry Vyukovf22982b2013-01-14 07:51:39 +0000327 owner_ = LOCK_READY;
328 LeaveCriticalSection((LPCRITICAL_SECTION)opaque_storage_);
329}
330
Alexey Samsonovdb7d9652013-03-11 15:45:20 +0000331void BlockingMutex::CheckLocked() {
332 CHECK_EQ(owner_, GetThreadSelf());
333}
334
Evgeniy Stepanov5697b582013-03-13 08:19:53 +0000335uptr GetTlsSize() {
336 return 0;
337}
338
339void InitTlsSize() {
340}
341
Sergey Matveev954c6ef12013-05-07 14:41:43 +0000342void GetThreadStackAndTls(bool main, uptr *stk_addr, uptr *stk_size,
343 uptr *tls_addr, uptr *tls_size) {
344 uptr stack_top, stack_bottom;
345 GetThreadStackTopAndBottom(main, &stack_top, &stack_bottom);
346 *stk_addr = stack_bottom;
347 *stk_size = stack_top - stack_bottom;
348 *tls_addr = 0;
349 *tls_size = 0;
350}
351
Sergey Matveevaf179b82013-05-08 12:45:55 +0000352void GetStackTrace(StackTrace *stack, uptr max_s, uptr pc, uptr bp,
353 uptr stack_top, uptr stack_bottom, bool fast) {
354 (void)fast;
355 (void)stack_top;
356 (void)stack_bottom;
357 stack->max_size = max_s;
358 void *tmp[kStackTraceMax];
359
360 // FIXME: CaptureStackBackTrace might be too slow for us.
361 // FIXME: Compare with StackWalk64.
362 // FIXME: Look at LLVMUnhandledExceptionFilter in Signals.inc
363 uptr cs_ret = CaptureStackBackTrace(1, stack->max_size, tmp, 0);
364 uptr offset = 0;
365 // Skip the RTL frames by searching for the PC in the stacktrace.
366 // FIXME: this doesn't work well for the malloc/free stacks yet.
367 for (uptr i = 0; i < cs_ret; i++) {
368 if (pc != (uptr)tmp[i])
369 continue;
370 offset = i;
371 break;
372 }
373
374 stack->size = cs_ret - offset;
375 for (uptr i = 0; i < stack->size; i++)
376 stack->trace[i] = (uptr)tmp[i + offset];
377}
378
Alexey Samsonovdde1f112012-06-05 07:05:10 +0000379} // namespace __sanitizer
380
381#endif // _WIN32