xref: /openbsd-src/gnu/llvm/compiler-rt/lib/sanitizer_common/sanitizer_unwind_win.cpp (revision 810390e339a5425391477d5d41c78d7cab2424ac)
13cab2bb3Spatrick //===-- sanitizer_unwind_win.cpp ------------------------------------------===//
23cab2bb3Spatrick //
33cab2bb3Spatrick // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
43cab2bb3Spatrick // See https://llvm.org/LICENSE.txt for license information.
53cab2bb3Spatrick // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
63cab2bb3Spatrick //
73cab2bb3Spatrick //===----------------------------------------------------------------------===//
83cab2bb3Spatrick //
93cab2bb3Spatrick /// Sanitizer unwind Windows specific functions.
103cab2bb3Spatrick //
113cab2bb3Spatrick //===----------------------------------------------------------------------===//
123cab2bb3Spatrick 
133cab2bb3Spatrick #include "sanitizer_platform.h"
143cab2bb3Spatrick #if SANITIZER_WINDOWS
153cab2bb3Spatrick 
163cab2bb3Spatrick #define WIN32_LEAN_AND_MEAN
173cab2bb3Spatrick #define NOGDI
183cab2bb3Spatrick #include <windows.h>
193cab2bb3Spatrick 
203cab2bb3Spatrick #include "sanitizer_dbghelp.h"  // for StackWalk64
213cab2bb3Spatrick #include "sanitizer_stacktrace.h"
223cab2bb3Spatrick #include "sanitizer_symbolizer.h"  // for InitializeDbgHelpIfNeeded
233cab2bb3Spatrick 
243cab2bb3Spatrick using namespace __sanitizer;
253cab2bb3Spatrick 
263cab2bb3Spatrick #if !SANITIZER_GO
UnwindSlow(uptr pc,u32 max_depth)273cab2bb3Spatrick void BufferedStackTrace::UnwindSlow(uptr pc, u32 max_depth) {
283cab2bb3Spatrick   CHECK_GE(max_depth, 2);
293cab2bb3Spatrick   // FIXME: CaptureStackBackTrace might be too slow for us.
303cab2bb3Spatrick   // FIXME: Compare with StackWalk64.
313cab2bb3Spatrick   // FIXME: Look at LLVMUnhandledExceptionFilter in Signals.inc
323cab2bb3Spatrick   size = CaptureStackBackTrace(1, Min(max_depth, kStackTraceMax),
333cab2bb3Spatrick     (void **)&trace_buffer[0], 0);
343cab2bb3Spatrick   if (size == 0)
353cab2bb3Spatrick     return;
363cab2bb3Spatrick 
373cab2bb3Spatrick   // Skip the RTL frames by searching for the PC in the stacktrace.
383cab2bb3Spatrick   uptr pc_location = LocatePcInTrace(pc);
393cab2bb3Spatrick   PopStackFrames(pc_location);
40d89ec533Spatrick 
41d89ec533Spatrick   // Replace the first frame with the PC because the frame in the
42d89ec533Spatrick   // stacktrace might be incorrect.
43d89ec533Spatrick   trace_buffer[0] = pc;
443cab2bb3Spatrick }
453cab2bb3Spatrick 
46d89ec533Spatrick #ifdef __clang__
47d89ec533Spatrick #pragma clang diagnostic push
48d89ec533Spatrick #pragma clang diagnostic ignored "-Wframe-larger-than="
49d89ec533Spatrick #endif
UnwindSlow(uptr pc,void * context,u32 max_depth)503cab2bb3Spatrick void BufferedStackTrace::UnwindSlow(uptr pc, void *context, u32 max_depth) {
513cab2bb3Spatrick   CHECK(context);
523cab2bb3Spatrick   CHECK_GE(max_depth, 2);
533cab2bb3Spatrick   CONTEXT ctx = *(CONTEXT *)context;
543cab2bb3Spatrick   STACKFRAME64 stack_frame;
553cab2bb3Spatrick   memset(&stack_frame, 0, sizeof(stack_frame));
563cab2bb3Spatrick 
573cab2bb3Spatrick   InitializeDbgHelpIfNeeded();
583cab2bb3Spatrick 
593cab2bb3Spatrick   size = 0;
60*810390e3Srobert #    if SANITIZER_WINDOWS64
61*810390e3Srobert #      if SANITIZER_ARM64
62*810390e3Srobert   int machine_type = IMAGE_FILE_MACHINE_ARM64;
63*810390e3Srobert   stack_frame.AddrPC.Offset = ctx.Pc;
64*810390e3Srobert   stack_frame.AddrFrame.Offset = ctx.Fp;
65*810390e3Srobert   stack_frame.AddrStack.Offset = ctx.Sp;
66*810390e3Srobert #      else
673cab2bb3Spatrick   int machine_type = IMAGE_FILE_MACHINE_AMD64;
683cab2bb3Spatrick   stack_frame.AddrPC.Offset = ctx.Rip;
693cab2bb3Spatrick   stack_frame.AddrFrame.Offset = ctx.Rbp;
703cab2bb3Spatrick   stack_frame.AddrStack.Offset = ctx.Rsp;
71*810390e3Srobert #      endif
723cab2bb3Spatrick #    else
733cab2bb3Spatrick   int machine_type = IMAGE_FILE_MACHINE_I386;
743cab2bb3Spatrick   stack_frame.AddrPC.Offset = ctx.Eip;
753cab2bb3Spatrick   stack_frame.AddrFrame.Offset = ctx.Ebp;
763cab2bb3Spatrick   stack_frame.AddrStack.Offset = ctx.Esp;
773cab2bb3Spatrick #    endif
783cab2bb3Spatrick   stack_frame.AddrPC.Mode = AddrModeFlat;
793cab2bb3Spatrick   stack_frame.AddrFrame.Mode = AddrModeFlat;
803cab2bb3Spatrick   stack_frame.AddrStack.Mode = AddrModeFlat;
813cab2bb3Spatrick   while (StackWalk64(machine_type, GetCurrentProcess(), GetCurrentThread(),
823cab2bb3Spatrick                      &stack_frame, &ctx, NULL, SymFunctionTableAccess64,
833cab2bb3Spatrick                      SymGetModuleBase64, NULL) &&
843cab2bb3Spatrick          size < Min(max_depth, kStackTraceMax)) {
853cab2bb3Spatrick     trace_buffer[size++] = (uptr)stack_frame.AddrPC.Offset;
863cab2bb3Spatrick   }
873cab2bb3Spatrick }
88d89ec533Spatrick #    ifdef __clang__
89d89ec533Spatrick #      pragma clang diagnostic pop
90d89ec533Spatrick #    endif
913cab2bb3Spatrick #  endif  // #if !SANITIZER_GO
923cab2bb3Spatrick 
933cab2bb3Spatrick #endif  // SANITIZER_WINDOWS
94