diff options
| author | 2020-08-03 15:06:44 +0000 | |
|---|---|---|
| committer | 2020-08-03 15:06:44 +0000 | |
| commit | b64793999546ed8adebaeebd9d8345d18db8927d (patch) | |
| tree | 4357c27b561d73b0e089727c6ed659f2ceff5f47 /gnu/llvm/lib/Support/Windows/Signals.inc | |
| parent | Add support for UTF-8 DISPLAY-HINTs with octet length. For now only (diff) | |
| download | wireguard-openbsd-b64793999546ed8adebaeebd9d8345d18db8927d.tar.xz wireguard-openbsd-b64793999546ed8adebaeebd9d8345d18db8927d.zip | |
Remove LLVM 8.0.1 files.
Diffstat (limited to 'gnu/llvm/lib/Support/Windows/Signals.inc')
| -rw-r--r-- | gnu/llvm/lib/Support/Windows/Signals.inc | 871 |
1 files changed, 0 insertions, 871 deletions
diff --git a/gnu/llvm/lib/Support/Windows/Signals.inc b/gnu/llvm/lib/Support/Windows/Signals.inc deleted file mode 100644 index 41eb5e593aa..00000000000 --- a/gnu/llvm/lib/Support/Windows/Signals.inc +++ /dev/null @@ -1,871 +0,0 @@ -//===- Win32/Signals.cpp - Win32 Signals Implementation ---------*- C++ -*-===// -// -// The LLVM Compiler Infrastructure -// -// This file is distributed under the University of Illinois Open Source -// License. See LICENSE.TXT for details. -// -//===----------------------------------------------------------------------===// -// -// This file provides the Win32 specific implementation of the Signals class. -// -//===----------------------------------------------------------------------===// -#include "llvm/Support/ConvertUTF.h" -#include "llvm/Support/FileSystem.h" -#include "llvm/Support/Path.h" -#include "llvm/Support/Process.h" -#include "llvm/Support/WindowsError.h" -#include <algorithm> -#include <io.h> -#include <signal.h> -#include <stdio.h> - -#include "llvm/Support/Format.h" -#include "llvm/Support/raw_ostream.h" - -// The Windows.h header must be after LLVM and standard headers. -#include "WindowsSupport.h" - -#ifdef __MINGW32__ - #include <imagehlp.h> -#else - #include <crtdbg.h> - #include <dbghelp.h> -#endif -#include <psapi.h> - -#ifdef _MSC_VER - #pragma comment(lib, "psapi.lib") -#elif __MINGW32__ - // The version of g++ that comes with MinGW does *not* properly understand - // the ll format specifier for printf. However, MinGW passes the format - // specifiers on to the MSVCRT entirely, and the CRT understands the ll - // specifier. So these warnings are spurious in this case. Since we compile - // with -Wall, this will generate these warnings which should be ignored. So - // we will turn off the warnings for this just file. However, MinGW also does - // not support push and pop for diagnostics, so we have to manually turn it - // back on at the end of the file. - #pragma GCC diagnostic ignored "-Wformat" - #pragma GCC diagnostic ignored "-Wformat-extra-args" - - #if !defined(__MINGW64_VERSION_MAJOR) - // MinGW.org does not have updated support for the 64-bit versions of the - // DebugHlp APIs. So we will have to load them manually. The structures and - // method signatures were pulled from DbgHelp.h in the Windows Platform SDK, - // and adjusted for brevity. - typedef struct _IMAGEHLP_LINE64 { - DWORD SizeOfStruct; - PVOID Key; - DWORD LineNumber; - PCHAR FileName; - DWORD64 Address; - } IMAGEHLP_LINE64, *PIMAGEHLP_LINE64; - - typedef struct _IMAGEHLP_SYMBOL64 { - DWORD SizeOfStruct; - DWORD64 Address; - DWORD Size; - DWORD Flags; - DWORD MaxNameLength; - CHAR Name[1]; - } IMAGEHLP_SYMBOL64, *PIMAGEHLP_SYMBOL64; - - typedef struct _tagADDRESS64 { - DWORD64 Offset; - WORD Segment; - ADDRESS_MODE Mode; - } ADDRESS64, *LPADDRESS64; - - typedef struct _KDHELP64 { - DWORD64 Thread; - DWORD ThCallbackStack; - DWORD ThCallbackBStore; - DWORD NextCallback; - DWORD FramePointer; - DWORD64 KiCallUserMode; - DWORD64 KeUserCallbackDispatcher; - DWORD64 SystemRangeStart; - DWORD64 KiUserExceptionDispatcher; - DWORD64 StackBase; - DWORD64 StackLimit; - DWORD64 Reserved[5]; - } KDHELP64, *PKDHELP64; - - typedef struct _tagSTACKFRAME64 { - ADDRESS64 AddrPC; - ADDRESS64 AddrReturn; - ADDRESS64 AddrFrame; - ADDRESS64 AddrStack; - ADDRESS64 AddrBStore; - PVOID FuncTableEntry; - DWORD64 Params[4]; - BOOL Far; - BOOL Virtual; - DWORD64 Reserved[3]; - KDHELP64 KdHelp; - } STACKFRAME64, *LPSTACKFRAME64; - #endif // !defined(__MINGW64_VERSION_MAJOR) -#endif // __MINGW32__ - -typedef BOOL (__stdcall *PREAD_PROCESS_MEMORY_ROUTINE64)(HANDLE hProcess, - DWORD64 qwBaseAddress, PVOID lpBuffer, DWORD nSize, - LPDWORD lpNumberOfBytesRead); - -typedef PVOID (__stdcall *PFUNCTION_TABLE_ACCESS_ROUTINE64)( HANDLE ahProcess, - DWORD64 AddrBase); - -typedef DWORD64 (__stdcall *PGET_MODULE_BASE_ROUTINE64)(HANDLE hProcess, - DWORD64 Address); - -typedef DWORD64 (__stdcall *PTRANSLATE_ADDRESS_ROUTINE64)(HANDLE hProcess, - HANDLE hThread, LPADDRESS64 lpaddr); - -typedef BOOL(WINAPI *fpMiniDumpWriteDump)(HANDLE, DWORD, HANDLE, MINIDUMP_TYPE, - PMINIDUMP_EXCEPTION_INFORMATION, - PMINIDUMP_USER_STREAM_INFORMATION, - PMINIDUMP_CALLBACK_INFORMATION); -static fpMiniDumpWriteDump fMiniDumpWriteDump; - -typedef BOOL (WINAPI *fpStackWalk64)(DWORD, HANDLE, HANDLE, LPSTACKFRAME64, - PVOID, PREAD_PROCESS_MEMORY_ROUTINE64, - PFUNCTION_TABLE_ACCESS_ROUTINE64, - PGET_MODULE_BASE_ROUTINE64, - PTRANSLATE_ADDRESS_ROUTINE64); -static fpStackWalk64 fStackWalk64; - -typedef DWORD64 (WINAPI *fpSymGetModuleBase64)(HANDLE, DWORD64); -static fpSymGetModuleBase64 fSymGetModuleBase64; - -typedef BOOL (WINAPI *fpSymGetSymFromAddr64)(HANDLE, DWORD64, - PDWORD64, PIMAGEHLP_SYMBOL64); -static fpSymGetSymFromAddr64 fSymGetSymFromAddr64; - -typedef BOOL (WINAPI *fpSymGetLineFromAddr64)(HANDLE, DWORD64, - PDWORD, PIMAGEHLP_LINE64); -static fpSymGetLineFromAddr64 fSymGetLineFromAddr64; - -typedef BOOL(WINAPI *fpSymGetModuleInfo64)(HANDLE hProcess, DWORD64 dwAddr, - PIMAGEHLP_MODULE64 ModuleInfo); -static fpSymGetModuleInfo64 fSymGetModuleInfo64; - -typedef PVOID (WINAPI *fpSymFunctionTableAccess64)(HANDLE, DWORD64); -static fpSymFunctionTableAccess64 fSymFunctionTableAccess64; - -typedef DWORD (WINAPI *fpSymSetOptions)(DWORD); -static fpSymSetOptions fSymSetOptions; - -typedef BOOL (WINAPI *fpSymInitialize)(HANDLE, PCSTR, BOOL); -static fpSymInitialize fSymInitialize; - -typedef BOOL (WINAPI *fpEnumerateLoadedModules)(HANDLE,PENUMLOADED_MODULES_CALLBACK64,PVOID); -static fpEnumerateLoadedModules fEnumerateLoadedModules; - -static bool load64BitDebugHelp(void) { - HMODULE hLib = ::LoadLibraryW(L"Dbghelp.dll"); - if (hLib) { - fMiniDumpWriteDump = (fpMiniDumpWriteDump) - ::GetProcAddress(hLib, "MiniDumpWriteDump"); - fStackWalk64 = (fpStackWalk64) - ::GetProcAddress(hLib, "StackWalk64"); - fSymGetModuleBase64 = (fpSymGetModuleBase64) - ::GetProcAddress(hLib, "SymGetModuleBase64"); - fSymGetSymFromAddr64 = (fpSymGetSymFromAddr64) - ::GetProcAddress(hLib, "SymGetSymFromAddr64"); - fSymGetLineFromAddr64 = (fpSymGetLineFromAddr64) - ::GetProcAddress(hLib, "SymGetLineFromAddr64"); - fSymGetModuleInfo64 = (fpSymGetModuleInfo64) - ::GetProcAddress(hLib, "SymGetModuleInfo64"); - fSymFunctionTableAccess64 = (fpSymFunctionTableAccess64) - ::GetProcAddress(hLib, "SymFunctionTableAccess64"); - fSymSetOptions = (fpSymSetOptions)::GetProcAddress(hLib, "SymSetOptions"); - fSymInitialize = (fpSymInitialize)::GetProcAddress(hLib, "SymInitialize"); - fEnumerateLoadedModules = (fpEnumerateLoadedModules) - ::GetProcAddress(hLib, "EnumerateLoadedModules64"); - } - return fStackWalk64 && fSymInitialize && fSymSetOptions && fMiniDumpWriteDump; -} - -using namespace llvm; - -// Forward declare. -static LONG WINAPI LLVMUnhandledExceptionFilter(LPEXCEPTION_POINTERS ep); -static BOOL WINAPI LLVMConsoleCtrlHandler(DWORD dwCtrlType); - -// The function to call if ctrl-c is pressed. -static void (*InterruptFunction)() = 0; - -static std::vector<std::string> *FilesToRemove = NULL; -static bool RegisteredUnhandledExceptionFilter = false; -static bool CleanupExecuted = false; -static PTOP_LEVEL_EXCEPTION_FILTER OldFilter = NULL; - -// Windows creates a new thread to execute the console handler when an event -// (such as CTRL/C) occurs. This causes concurrency issues with the above -// globals which this critical section addresses. -static CRITICAL_SECTION CriticalSection; -static bool CriticalSectionInitialized = false; - -static StringRef Argv0; - -enum { -#if defined(_M_X64) - NativeMachineType = IMAGE_FILE_MACHINE_AMD64 -#elif defined(_M_ARM64) - NativeMachineType = IMAGE_FILE_MACHINE_ARM64 -#elif defined(_M_IX86) - NativeMachineType = IMAGE_FILE_MACHINE_I386 -#elif defined(_M_ARM) - NativeMachineType = IMAGE_FILE_MACHINE_ARMNT -#else - NativeMachineType = IMAGE_FILE_MACHINE_UNKNOWN -#endif -}; - -static bool printStackTraceWithLLVMSymbolizer(llvm::raw_ostream &OS, - HANDLE hProcess, HANDLE hThread, - STACKFRAME64 &StackFrameOrig, - CONTEXT *ContextOrig) { - // StackWalk64 modifies the incoming stack frame and context, so copy them. - STACKFRAME64 StackFrame = StackFrameOrig; - - // Copy the register context so that we don't modify it while we unwind. We - // could use InitializeContext + CopyContext, but that's only required to get - // at AVX registers, which typically aren't needed by StackWalk64. Reduce the - // flag set to indicate that there's less data. - CONTEXT Context = *ContextOrig; - Context.ContextFlags = CONTEXT_CONTROL | CONTEXT_INTEGER; - - static void *StackTrace[256]; - size_t Depth = 0; - while (fStackWalk64(NativeMachineType, hProcess, hThread, &StackFrame, - &Context, 0, fSymFunctionTableAccess64, - fSymGetModuleBase64, 0)) { - if (StackFrame.AddrFrame.Offset == 0) - break; - StackTrace[Depth++] = (void *)(uintptr_t)StackFrame.AddrPC.Offset; - if (Depth >= array_lengthof(StackTrace)) - break; - } - - return printSymbolizedStackTrace(Argv0, &StackTrace[0], Depth, OS); -} - -namespace { -struct FindModuleData { - void **StackTrace; - int Depth; - const char **Modules; - intptr_t *Offsets; - StringSaver *StrPool; -}; -} - -static BOOL CALLBACK findModuleCallback(PCSTR ModuleName, - DWORD64 ModuleBase, ULONG ModuleSize, - void *VoidData) { - FindModuleData *Data = (FindModuleData*)VoidData; - intptr_t Beg = ModuleBase; - intptr_t End = Beg + ModuleSize; - for (int I = 0; I < Data->Depth; I++) { - if (Data->Modules[I]) - continue; - intptr_t Addr = (intptr_t)Data->StackTrace[I]; - if (Beg <= Addr && Addr < End) { - Data->Modules[I] = Data->StrPool->save(ModuleName).data(); - Data->Offsets[I] = Addr - Beg; - } - } - return TRUE; -} - -static bool findModulesAndOffsets(void **StackTrace, int Depth, - const char **Modules, intptr_t *Offsets, - const char *MainExecutableName, - StringSaver &StrPool) { - if (!fEnumerateLoadedModules) - return false; - FindModuleData Data; - Data.StackTrace = StackTrace; - Data.Depth = Depth; - Data.Modules = Modules; - Data.Offsets = Offsets; - Data.StrPool = &StrPool; - fEnumerateLoadedModules(GetCurrentProcess(), findModuleCallback, &Data); - return true; -} - -static void PrintStackTraceForThread(llvm::raw_ostream &OS, HANDLE hProcess, - HANDLE hThread, STACKFRAME64 &StackFrame, - CONTEXT *Context) { - // Initialize the symbol handler. - fSymSetOptions(SYMOPT_DEFERRED_LOADS | SYMOPT_LOAD_LINES); - fSymInitialize(hProcess, NULL, TRUE); - - // Try llvm-symbolizer first. llvm-symbolizer knows how to deal with both PDBs - // and DWARF, so it should do a good job regardless of what debug info or - // linker is in use. - if (printStackTraceWithLLVMSymbolizer(OS, hProcess, hThread, StackFrame, - Context)) { - return; - } - - while (true) { - if (!fStackWalk64(NativeMachineType, hProcess, hThread, &StackFrame, - Context, 0, fSymFunctionTableAccess64, - fSymGetModuleBase64, 0)) { - break; - } - - if (StackFrame.AddrFrame.Offset == 0) - break; - - using namespace llvm; - // Print the PC in hexadecimal. - DWORD64 PC = StackFrame.AddrPC.Offset; -#if defined(_M_X64) || defined(_M_ARM64) - OS << format("0x%016llX", PC); -#elif defined(_M_IX86) || defined(_M_ARM) - OS << format("0x%08lX", static_cast<DWORD>(PC)); -#endif - -// Print the parameters. Assume there are four. -#if defined(_M_X64) || defined(_M_ARM64) - OS << format(" (0x%016llX 0x%016llX 0x%016llX 0x%016llX)", - StackFrame.Params[0], StackFrame.Params[1], StackFrame.Params[2], - StackFrame.Params[3]); -#elif defined(_M_IX86) || defined(_M_ARM) - OS << format(" (0x%08lX 0x%08lX 0x%08lX 0x%08lX)", - static_cast<DWORD>(StackFrame.Params[0]), - static_cast<DWORD>(StackFrame.Params[1]), - static_cast<DWORD>(StackFrame.Params[2]), - static_cast<DWORD>(StackFrame.Params[3])); -#endif - // Verify the PC belongs to a module in this process. - if (!fSymGetModuleBase64(hProcess, PC)) { - OS << " <unknown module>\n"; - continue; - } - - // Print the symbol name. - char buffer[512]; - IMAGEHLP_SYMBOL64 *symbol = reinterpret_cast<IMAGEHLP_SYMBOL64 *>(buffer); - memset(symbol, 0, sizeof(IMAGEHLP_SYMBOL64)); - symbol->SizeOfStruct = sizeof(IMAGEHLP_SYMBOL64); - symbol->MaxNameLength = 512 - sizeof(IMAGEHLP_SYMBOL64); - - DWORD64 dwDisp; - if (!fSymGetSymFromAddr64(hProcess, PC, &dwDisp, symbol)) { - OS << '\n'; - continue; - } - - buffer[511] = 0; - if (dwDisp > 0) - OS << format(", %s() + 0x%llX bytes(s)", (const char*)symbol->Name, - dwDisp); - else - OS << format(", %s", (const char*)symbol->Name); - - // Print the source file and line number information. - IMAGEHLP_LINE64 line = {}; - DWORD dwLineDisp; - line.SizeOfStruct = sizeof(line); - if (fSymGetLineFromAddr64(hProcess, PC, &dwLineDisp, &line)) { - OS << format(", %s, line %lu", line.FileName, line.LineNumber); - if (dwLineDisp > 0) - OS << format(" + 0x%lX byte(s)", dwLineDisp); - } - - OS << '\n'; - } -} - -namespace llvm { - -//===----------------------------------------------------------------------===// -//=== WARNING: Implementation here must contain only Win32 specific code -//=== and must not be UNIX code -//===----------------------------------------------------------------------===// - -#ifdef _MSC_VER -/// Emulates hitting "retry" from an "abort, retry, ignore" CRT debug report -/// dialog. "retry" raises an exception which ultimately triggers our stack -/// dumper. -static LLVM_ATTRIBUTE_UNUSED int -AvoidMessageBoxHook(int ReportType, char *Message, int *Return) { - // Set *Return to the retry code for the return value of _CrtDbgReport: - // http://msdn.microsoft.com/en-us/library/8hyw4sy7(v=vs.71).aspx - // This may also trigger just-in-time debugging via DebugBreak(). - if (Return) - *Return = 1; - // Don't call _CrtDbgReport. - return TRUE; -} - -#endif - -extern "C" void HandleAbort(int Sig) { - if (Sig == SIGABRT) { - LLVM_BUILTIN_TRAP; - } -} - -static void InitializeThreading() { - if (CriticalSectionInitialized) - return; - - // Now's the time to create the critical section. This is the first time - // through here, and there's only one thread. - InitializeCriticalSection(&CriticalSection); - CriticalSectionInitialized = true; -} - -static void RegisterHandler() { - // If we cannot load up the APIs (which would be unexpected as they should - // exist on every version of Windows we support), we will bail out since - // there would be nothing to report. - if (!load64BitDebugHelp()) { - assert(false && "These APIs should always be available"); - return; - } - - if (RegisteredUnhandledExceptionFilter) { - EnterCriticalSection(&CriticalSection); - return; - } - - InitializeThreading(); - - // Enter it immediately. Now if someone hits CTRL/C, the console handler - // can't proceed until the globals are updated. - EnterCriticalSection(&CriticalSection); - - RegisteredUnhandledExceptionFilter = true; - OldFilter = SetUnhandledExceptionFilter(LLVMUnhandledExceptionFilter); - SetConsoleCtrlHandler(LLVMConsoleCtrlHandler, TRUE); - - // IMPORTANT NOTE: Caller must call LeaveCriticalSection(&CriticalSection) or - // else multi-threading problems will ensue. -} - -// The public API -bool sys::RemoveFileOnSignal(StringRef Filename, std::string* ErrMsg) { - RegisterHandler(); - - if (CleanupExecuted) { - if (ErrMsg) - *ErrMsg = "Process terminating -- cannot register for removal"; - return true; - } - - if (FilesToRemove == NULL) - FilesToRemove = new std::vector<std::string>; - - FilesToRemove->push_back(Filename); - - LeaveCriticalSection(&CriticalSection); - return false; -} - -// The public API -void sys::DontRemoveFileOnSignal(StringRef Filename) { - if (FilesToRemove == NULL) - return; - - RegisterHandler(); - - std::vector<std::string>::reverse_iterator I = - find(reverse(*FilesToRemove), Filename); - if (I != FilesToRemove->rend()) - FilesToRemove->erase(I.base()-1); - - LeaveCriticalSection(&CriticalSection); -} - -void sys::DisableSystemDialogsOnCrash() { - // Crash to stack trace handler on abort. - signal(SIGABRT, HandleAbort); - - // The following functions are not reliably accessible on MinGW. -#ifdef _MSC_VER - // We're already handling writing a "something went wrong" message. - _set_abort_behavior(0, _WRITE_ABORT_MSG); - // Disable Dr. Watson. - _set_abort_behavior(0, _CALL_REPORTFAULT); - _CrtSetReportHook(AvoidMessageBoxHook); -#endif - - // Disable standard error dialog box. - SetErrorMode(SEM_FAILCRITICALERRORS | SEM_NOGPFAULTERRORBOX | - SEM_NOOPENFILEERRORBOX); - _set_error_mode(_OUT_TO_STDERR); -} - -/// When an error signal (such as SIGABRT or SIGSEGV) is delivered to the -/// process, print a stack trace and then exit. -void sys::PrintStackTraceOnErrorSignal(StringRef Argv0, - bool DisableCrashReporting) { - ::Argv0 = Argv0; - - if (DisableCrashReporting || getenv("LLVM_DISABLE_CRASH_REPORT")) - Process::PreventCoreFiles(); - - DisableSystemDialogsOnCrash(); - RegisterHandler(); - LeaveCriticalSection(&CriticalSection); -} -} - -#if defined(__MINGW32__) && !defined(__MINGW64_VERSION_MAJOR) -// Provide a prototype for RtlCaptureContext, mingw32 from mingw.org is -// missing it but mingw-w64 has it. -extern "C" VOID WINAPI RtlCaptureContext(PCONTEXT ContextRecord); -#endif - -void llvm::sys::PrintStackTrace(raw_ostream &OS) { - STACKFRAME64 StackFrame = {}; - CONTEXT Context = {}; - ::RtlCaptureContext(&Context); -#if defined(_M_X64) - StackFrame.AddrPC.Offset = Context.Rip; - StackFrame.AddrStack.Offset = Context.Rsp; - StackFrame.AddrFrame.Offset = Context.Rbp; -#elif defined(_M_IX86) - StackFrame.AddrPC.Offset = Context.Eip; - StackFrame.AddrStack.Offset = Context.Esp; - StackFrame.AddrFrame.Offset = Context.Ebp; -#elif defined(_M_ARM64) - StackFrame.AddrPC.Offset = Context.Pc; - StackFrame.AddrStack.Offset = Context.Sp; - StackFrame.AddrFrame.Offset = Context.Fp; -#elif defined(_M_ARM) - StackFrame.AddrPC.Offset = Context.Pc; - StackFrame.AddrStack.Offset = Context.Sp; - StackFrame.AddrFrame.Offset = Context.R11; -#endif - StackFrame.AddrPC.Mode = AddrModeFlat; - StackFrame.AddrStack.Mode = AddrModeFlat; - StackFrame.AddrFrame.Mode = AddrModeFlat; - PrintStackTraceForThread(OS, GetCurrentProcess(), GetCurrentThread(), - StackFrame, &Context); -} - - -void llvm::sys::SetInterruptFunction(void (*IF)()) { - RegisterHandler(); - InterruptFunction = IF; - LeaveCriticalSection(&CriticalSection); -} - - -/// Add a function to be called when a signal is delivered to the process. The -/// handler can have a cookie passed to it to identify what instance of the -/// handler it is. -void llvm::sys::AddSignalHandler(sys::SignalHandlerCallback FnPtr, - void *Cookie) { - insertSignalHandler(FnPtr, Cookie); - RegisterHandler(); - LeaveCriticalSection(&CriticalSection); -} - -static void Cleanup() { - if (CleanupExecuted) - return; - - EnterCriticalSection(&CriticalSection); - - // Prevent other thread from registering new files and directories for - // removal, should we be executing because of the console handler callback. - CleanupExecuted = true; - - // FIXME: open files cannot be deleted. - if (FilesToRemove != NULL) - while (!FilesToRemove->empty()) { - llvm::sys::fs::remove(FilesToRemove->back()); - FilesToRemove->pop_back(); - } - llvm::sys::RunSignalHandlers(); - LeaveCriticalSection(&CriticalSection); -} - -void llvm::sys::RunInterruptHandlers() { - // The interrupt handler may be called from an interrupt, but it may also be - // called manually (such as the case of report_fatal_error with no registered - // error handler). We must ensure that the critical section is properly - // initialized. - InitializeThreading(); - Cleanup(); -} - -/// Find the Windows Registry Key for a given location. -/// -/// \returns a valid HKEY if the location exists, else NULL. -static HKEY FindWERKey(const llvm::Twine &RegistryLocation) { - HKEY Key; - if (ERROR_SUCCESS != ::RegOpenKeyExA(HKEY_LOCAL_MACHINE, - RegistryLocation.str().c_str(), 0, - KEY_QUERY_VALUE | KEY_READ, &Key)) - return NULL; - - return Key; -} - -/// Populate ResultDirectory with the value for "DumpFolder" for a given -/// Windows Registry key. -/// -/// \returns true if a valid value for DumpFolder exists, false otherwise. -static bool GetDumpFolder(HKEY Key, - llvm::SmallVectorImpl<char> &ResultDirectory) { - using llvm::sys::windows::UTF16ToUTF8; - - if (!Key) - return false; - - DWORD BufferLengthBytes = 0; - - if (ERROR_SUCCESS != ::RegGetValueW(Key, 0, L"DumpFolder", REG_EXPAND_SZ, - NULL, NULL, &BufferLengthBytes)) - return false; - - SmallVector<wchar_t, MAX_PATH> Buffer(BufferLengthBytes); - - if (ERROR_SUCCESS != ::RegGetValueW(Key, 0, L"DumpFolder", REG_EXPAND_SZ, - NULL, Buffer.data(), &BufferLengthBytes)) - return false; - - DWORD ExpandBufferSize = ::ExpandEnvironmentStringsW(Buffer.data(), NULL, 0); - - if (!ExpandBufferSize) - return false; - - SmallVector<wchar_t, MAX_PATH> ExpandBuffer(ExpandBufferSize); - - if (ExpandBufferSize != ::ExpandEnvironmentStringsW(Buffer.data(), - ExpandBuffer.data(), - ExpandBufferSize)) - return false; - - if (UTF16ToUTF8(ExpandBuffer.data(), ExpandBufferSize - 1, ResultDirectory)) - return false; - - return true; -} - -/// Populate ResultType with a valid MINIDUMP_TYPE based on the value of -/// "DumpType" for a given Windows Registry key. -/// -/// According to -/// https://msdn.microsoft.com/en-us/library/windows/desktop/bb787181(v=vs.85).aspx -/// valid values for DumpType are: -/// * 0: Custom dump -/// * 1: Mini dump -/// * 2: Full dump -/// If "Custom dump" is specified then the "CustomDumpFlags" field is read -/// containing a bitwise combination of MINIDUMP_TYPE values. -/// -/// \returns true if a valid value for ResultType can be set, false otherwise. -static bool GetDumpType(HKEY Key, MINIDUMP_TYPE &ResultType) { - if (!Key) - return false; - - DWORD DumpType; - DWORD TypeSize = sizeof(DumpType); - if (ERROR_SUCCESS != ::RegGetValueW(Key, NULL, L"DumpType", RRF_RT_REG_DWORD, - NULL, &DumpType, - &TypeSize)) - return false; - - switch (DumpType) { - case 0: { - DWORD Flags = 0; - if (ERROR_SUCCESS != ::RegGetValueW(Key, NULL, L"CustomDumpFlags", - RRF_RT_REG_DWORD, NULL, &Flags, - &TypeSize)) - return false; - - ResultType = static_cast<MINIDUMP_TYPE>(Flags); - break; - } - case 1: - ResultType = MiniDumpNormal; - break; - case 2: - ResultType = MiniDumpWithFullMemory; - break; - default: - return false; - } - return true; -} - -/// Write a Windows dump file containing process information that can be -/// used for post-mortem debugging. -/// -/// \returns zero error code if a mini dump created, actual error code -/// otherwise. -static std::error_code WINAPI -WriteWindowsDumpFile(PMINIDUMP_EXCEPTION_INFORMATION ExceptionInfo) { - using namespace llvm; - using namespace llvm::sys; - - std::string MainExecutableName = fs::getMainExecutable(nullptr, nullptr); - StringRef ProgramName; - - if (MainExecutableName.empty()) { - // If we can't get the executable filename, - // things are in worse shape than we realize - // and we should just bail out. - return mapWindowsError(::GetLastError()); - } - - ProgramName = path::filename(MainExecutableName.c_str()); - - // The Windows Registry location as specified at - // https://msdn.microsoft.com/en-us/library/windows/desktop/bb787181%28v=vs.85%29.aspx - // "Collecting User-Mode Dumps" that may optionally be set to collect crash - // dumps in a specified location. - StringRef LocalDumpsRegistryLocation = - "SOFTWARE\\Microsoft\\Windows\\Windows Error Reporting\\LocalDumps"; - - // The key pointing to the Registry location that may contain global crash - // dump settings. This will be NULL if the location can not be found. - ScopedRegHandle DefaultLocalDumpsKey(FindWERKey(LocalDumpsRegistryLocation)); - - // The key pointing to the Registry location that may contain - // application-specific crash dump settings. This will be NULL if the - // location can not be found. - ScopedRegHandle AppSpecificKey( - FindWERKey(Twine(LocalDumpsRegistryLocation) + "\\" + ProgramName)); - - // Look to see if a dump type is specified in the registry; first with the - // app-specific key and failing that with the global key. If none are found - // default to a normal dump (GetDumpType will return false either if the key - // is NULL or if there is no valid DumpType value at its location). - MINIDUMP_TYPE DumpType; - if (!GetDumpType(AppSpecificKey, DumpType)) - if (!GetDumpType(DefaultLocalDumpsKey, DumpType)) - DumpType = MiniDumpNormal; - - // Look to see if a dump location is specified in the registry; first with the - // app-specific key and failing that with the global key. If none are found - // we'll just create the dump file in the default temporary file location - // (GetDumpFolder will return false either if the key is NULL or if there is - // no valid DumpFolder value at its location). - bool ExplicitDumpDirectorySet = true; - SmallString<MAX_PATH> DumpDirectory; - if (!GetDumpFolder(AppSpecificKey, DumpDirectory)) - if (!GetDumpFolder(DefaultLocalDumpsKey, DumpDirectory)) - ExplicitDumpDirectorySet = false; - - int FD; - SmallString<MAX_PATH> DumpPath; - - if (ExplicitDumpDirectorySet) { - if (std::error_code EC = fs::create_directories(DumpDirectory)) - return EC; - if (std::error_code EC = fs::createUniqueFile( - Twine(DumpDirectory) + "\\" + ProgramName + ".%%%%%%.dmp", FD, - DumpPath)) - return EC; - } else if (std::error_code EC = - fs::createTemporaryFile(ProgramName, "dmp", FD, DumpPath)) - return EC; - - // Our support functions return a file descriptor but Windows wants a handle. - ScopedCommonHandle FileHandle(reinterpret_cast<HANDLE>(_get_osfhandle(FD))); - - if (!fMiniDumpWriteDump(::GetCurrentProcess(), ::GetCurrentProcessId(), - FileHandle, DumpType, ExceptionInfo, NULL, NULL)) - return mapWindowsError(::GetLastError()); - - llvm::errs() << "Wrote crash dump file \"" << DumpPath << "\"\n"; - return std::error_code(); -} - -static LONG WINAPI LLVMUnhandledExceptionFilter(LPEXCEPTION_POINTERS ep) { - Cleanup(); - - // We'll automatically write a Minidump file here to help diagnose - // the nasty sorts of crashes that aren't 100% reproducible from a set of - // inputs (or in the event that the user is unable or unwilling to provide a - // reproducible case). - if (!llvm::sys::Process::AreCoreFilesPrevented()) { - MINIDUMP_EXCEPTION_INFORMATION ExceptionInfo; - ExceptionInfo.ThreadId = ::GetCurrentThreadId(); - ExceptionInfo.ExceptionPointers = ep; - ExceptionInfo.ClientPointers = FALSE; - - if (std::error_code EC = WriteWindowsDumpFile(&ExceptionInfo)) - llvm::errs() << "Could not write crash dump file: " << EC.message() - << "\n"; - } - - // Initialize the STACKFRAME structure. - STACKFRAME64 StackFrame = {}; - -#if defined(_M_X64) - StackFrame.AddrPC.Offset = ep->ContextRecord->Rip; - StackFrame.AddrPC.Mode = AddrModeFlat; - StackFrame.AddrStack.Offset = ep->ContextRecord->Rsp; - StackFrame.AddrStack.Mode = AddrModeFlat; - StackFrame.AddrFrame.Offset = ep->ContextRecord->Rbp; - StackFrame.AddrFrame.Mode = AddrModeFlat; -#elif defined(_M_IX86) - StackFrame.AddrPC.Offset = ep->ContextRecord->Eip; - StackFrame.AddrPC.Mode = AddrModeFlat; - StackFrame.AddrStack.Offset = ep->ContextRecord->Esp; - StackFrame.AddrStack.Mode = AddrModeFlat; - StackFrame.AddrFrame.Offset = ep->ContextRecord->Ebp; - StackFrame.AddrFrame.Mode = AddrModeFlat; -#elif defined(_M_ARM64) || defined(_M_ARM) - StackFrame.AddrPC.Offset = ep->ContextRecord->Pc; - StackFrame.AddrPC.Mode = AddrModeFlat; - StackFrame.AddrStack.Offset = ep->ContextRecord->Sp; - StackFrame.AddrStack.Mode = AddrModeFlat; -#if defined(_M_ARM64) - StackFrame.AddrFrame.Offset = ep->ContextRecord->Fp; -#else - StackFrame.AddrFrame.Offset = ep->ContextRecord->R11; -#endif - StackFrame.AddrFrame.Mode = AddrModeFlat; -#endif - - HANDLE hProcess = GetCurrentProcess(); - HANDLE hThread = GetCurrentThread(); - PrintStackTraceForThread(llvm::errs(), hProcess, hThread, StackFrame, - ep->ContextRecord); - - _exit(ep->ExceptionRecord->ExceptionCode); -} - -static BOOL WINAPI LLVMConsoleCtrlHandler(DWORD dwCtrlType) { - // We are running in our very own thread, courtesy of Windows. - EnterCriticalSection(&CriticalSection); - Cleanup(); - - // If an interrupt function has been set, go and run one it; otherwise, - // the process dies. - void (*IF)() = InterruptFunction; - InterruptFunction = 0; // Don't run it on another CTRL-C. - - if (IF) { - // Note: if the interrupt function throws an exception, there is nothing - // to catch it in this thread so it will kill the process. - IF(); // Run it now. - LeaveCriticalSection(&CriticalSection); - return TRUE; // Don't kill the process. - } - - // Allow normal processing to take place; i.e., the process dies. - LeaveCriticalSection(&CriticalSection); - return FALSE; -} - -#if __MINGW32__ - // We turned these warnings off for this file so that MinGW-g++ doesn't - // complain about the ll format specifiers used. Now we are turning the - // warnings back on. If MinGW starts to support diagnostic stacks, we can - // replace this with a pop. - #pragma GCC diagnostic warning "-Wformat" - #pragma GCC diagnostic warning "-Wformat-extra-args" -#endif |
