xref: /freebsd-src/contrib/llvm-project/compiler-rt/lib/sanitizer_common/sanitizer_symbolizer_win.cpp (revision 5f757f3ff9144b609b3c433dfd370cc6bdc191ad)
168d75effSDimitry Andric //===-- sanitizer_symbolizer_win.cpp --------------------------------------===//
268d75effSDimitry Andric //
368d75effSDimitry Andric // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
468d75effSDimitry Andric // See https://llvm.org/LICENSE.txt for license information.
568d75effSDimitry Andric // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
668d75effSDimitry Andric //
768d75effSDimitry Andric //===----------------------------------------------------------------------===//
868d75effSDimitry Andric //
968d75effSDimitry Andric // This file is shared between AddressSanitizer and ThreadSanitizer
1068d75effSDimitry Andric // run-time libraries.
1168d75effSDimitry Andric // Windows-specific implementation of symbolizer parts.
1268d75effSDimitry Andric //===----------------------------------------------------------------------===//
1368d75effSDimitry Andric 
1468d75effSDimitry Andric #include "sanitizer_platform.h"
1568d75effSDimitry Andric #if SANITIZER_WINDOWS
1668d75effSDimitry Andric 
1768d75effSDimitry Andric #  include "sanitizer_dbghelp.h"
1868d75effSDimitry Andric #  include "sanitizer_symbolizer_internal.h"
1968d75effSDimitry Andric 
2068d75effSDimitry Andric namespace __sanitizer {
2168d75effSDimitry Andric 
2268d75effSDimitry Andric decltype(::StackWalk64) *StackWalk64;
2368d75effSDimitry Andric decltype(::SymCleanup) *SymCleanup;
2468d75effSDimitry Andric decltype(::SymFromAddr) *SymFromAddr;
2568d75effSDimitry Andric decltype(::SymFunctionTableAccess64) *SymFunctionTableAccess64;
2668d75effSDimitry Andric decltype(::SymGetLineFromAddr64) *SymGetLineFromAddr64;
2768d75effSDimitry Andric decltype(::SymGetModuleBase64) *SymGetModuleBase64;
2868d75effSDimitry Andric decltype(::SymGetSearchPathW) *SymGetSearchPathW;
2968d75effSDimitry Andric decltype(::SymInitialize) *SymInitialize;
3068d75effSDimitry Andric decltype(::SymSetOptions) *SymSetOptions;
3168d75effSDimitry Andric decltype(::SymSetSearchPathW) *SymSetSearchPathW;
3268d75effSDimitry Andric decltype(::UnDecorateSymbolName) *UnDecorateSymbolName;
3368d75effSDimitry Andric 
3468d75effSDimitry Andric namespace {
3568d75effSDimitry Andric 
36e8d8bef9SDimitry Andric class WinSymbolizerTool final : public SymbolizerTool {
3768d75effSDimitry Andric  public:
3868d75effSDimitry Andric   // The constructor is provided to avoid synthesized memsets.
WinSymbolizerTool()3968d75effSDimitry Andric   WinSymbolizerTool() {}
4068d75effSDimitry Andric 
4168d75effSDimitry Andric   bool SymbolizePC(uptr addr, SymbolizedStack *stack) override;
SymbolizeData(uptr addr,DataInfo * info)4268d75effSDimitry Andric   bool SymbolizeData(uptr addr, DataInfo *info) override {
4368d75effSDimitry Andric     return false;
4468d75effSDimitry Andric   }
4568d75effSDimitry Andric   const char *Demangle(const char *name) override;
4668d75effSDimitry Andric };
4768d75effSDimitry Andric 
4868d75effSDimitry Andric bool is_dbghelp_initialized = false;
4968d75effSDimitry Andric 
TrySymInitialize()5068d75effSDimitry Andric bool TrySymInitialize() {
5168d75effSDimitry Andric   SymSetOptions(SYMOPT_DEFERRED_LOADS | SYMOPT_UNDNAME | SYMOPT_LOAD_LINES);
5268d75effSDimitry Andric   return SymInitialize(GetCurrentProcess(), 0, TRUE);
5368d75effSDimitry Andric   // FIXME: We don't call SymCleanup() on exit yet - should we?
5468d75effSDimitry Andric }
5568d75effSDimitry Andric 
5668d75effSDimitry Andric }  // namespace
5768d75effSDimitry Andric 
5868d75effSDimitry Andric // Initializes DbgHelp library, if it's not yet initialized. Calls to this
5968d75effSDimitry Andric // function should be synchronized with respect to other calls to DbgHelp API
6068d75effSDimitry Andric // (e.g. from WinSymbolizerTool).
InitializeDbgHelpIfNeeded()6168d75effSDimitry Andric void InitializeDbgHelpIfNeeded() {
6268d75effSDimitry Andric   if (is_dbghelp_initialized)
6368d75effSDimitry Andric     return;
6468d75effSDimitry Andric 
6568d75effSDimitry Andric   HMODULE dbghelp = LoadLibraryA("dbghelp.dll");
6668d75effSDimitry Andric   CHECK(dbghelp && "failed to load dbghelp.dll");
6768d75effSDimitry Andric 
6868d75effSDimitry Andric #define DBGHELP_IMPORT(name)                                                  \
6968d75effSDimitry Andric   do {                                                                        \
7068d75effSDimitry Andric     name =                                                                    \
7168d75effSDimitry Andric         reinterpret_cast<decltype(::name) *>(GetProcAddress(dbghelp, #name)); \
7268d75effSDimitry Andric     CHECK(name != nullptr);                                                   \
7368d75effSDimitry Andric   } while (0)
7468d75effSDimitry Andric   DBGHELP_IMPORT(StackWalk64);
7568d75effSDimitry Andric   DBGHELP_IMPORT(SymCleanup);
7668d75effSDimitry Andric   DBGHELP_IMPORT(SymFromAddr);
7768d75effSDimitry Andric   DBGHELP_IMPORT(SymFunctionTableAccess64);
7868d75effSDimitry Andric   DBGHELP_IMPORT(SymGetLineFromAddr64);
7968d75effSDimitry Andric   DBGHELP_IMPORT(SymGetModuleBase64);
8068d75effSDimitry Andric   DBGHELP_IMPORT(SymGetSearchPathW);
8168d75effSDimitry Andric   DBGHELP_IMPORT(SymInitialize);
8268d75effSDimitry Andric   DBGHELP_IMPORT(SymSetOptions);
8368d75effSDimitry Andric   DBGHELP_IMPORT(SymSetSearchPathW);
8468d75effSDimitry Andric   DBGHELP_IMPORT(UnDecorateSymbolName);
8568d75effSDimitry Andric #undef DBGHELP_IMPORT
8668d75effSDimitry Andric 
8768d75effSDimitry Andric   if (!TrySymInitialize()) {
8868d75effSDimitry Andric     // OK, maybe the client app has called SymInitialize already.
8968d75effSDimitry Andric     // That's a bit unfortunate for us as all the DbgHelp functions are
9068d75effSDimitry Andric     // single-threaded and we can't coordinate with the app.
9168d75effSDimitry Andric     // FIXME: Can we stop the other threads at this point?
9268d75effSDimitry Andric     // Anyways, we have to reconfigure stuff to make sure that SymInitialize
9368d75effSDimitry Andric     // has all the appropriate options set.
9468d75effSDimitry Andric     // Cross our fingers and reinitialize DbgHelp.
9568d75effSDimitry Andric     Report("*** WARNING: Failed to initialize DbgHelp!              ***\n");
9668d75effSDimitry Andric     Report("*** Most likely this means that the app is already      ***\n");
9768d75effSDimitry Andric     Report("*** using DbgHelp, possibly with incompatible flags.    ***\n");
9868d75effSDimitry Andric     Report("*** Due to technical reasons, symbolization might crash ***\n");
9968d75effSDimitry Andric     Report("*** or produce wrong results.                           ***\n");
10068d75effSDimitry Andric     SymCleanup(GetCurrentProcess());
10168d75effSDimitry Andric     TrySymInitialize();
10268d75effSDimitry Andric   }
10368d75effSDimitry Andric   is_dbghelp_initialized = true;
10468d75effSDimitry Andric 
10568d75effSDimitry Andric   // When an executable is run from a location different from the one where it
10668d75effSDimitry Andric   // was originally built, we may not see the nearby PDB files.
10768d75effSDimitry Andric   // To work around this, let's append the directory of the main module
10868d75effSDimitry Andric   // to the symbol search path.  All the failures below are not fatal.
10968d75effSDimitry Andric   const size_t kSymPathSize = 2048;
11068d75effSDimitry Andric   static wchar_t path_buffer[kSymPathSize + 1 + MAX_PATH];
11168d75effSDimitry Andric   if (!SymGetSearchPathW(GetCurrentProcess(), path_buffer, kSymPathSize)) {
11268d75effSDimitry Andric     Report("*** WARNING: Failed to SymGetSearchPathW ***\n");
11368d75effSDimitry Andric     return;
11468d75effSDimitry Andric   }
11568d75effSDimitry Andric   size_t sz = wcslen(path_buffer);
11668d75effSDimitry Andric   if (sz) {
11768d75effSDimitry Andric     CHECK_EQ(0, wcscat_s(path_buffer, L";"));
11868d75effSDimitry Andric     sz++;
11968d75effSDimitry Andric   }
12068d75effSDimitry Andric   DWORD res = GetModuleFileNameW(NULL, path_buffer + sz, MAX_PATH);
12168d75effSDimitry Andric   if (res == 0 || res == MAX_PATH) {
12268d75effSDimitry Andric     Report("*** WARNING: Failed to getting the EXE directory ***\n");
12368d75effSDimitry Andric     return;
12468d75effSDimitry Andric   }
12568d75effSDimitry Andric   // Write the zero character in place of the last backslash to get the
12668d75effSDimitry Andric   // directory of the main module at the end of path_buffer.
12768d75effSDimitry Andric   wchar_t *last_bslash = wcsrchr(path_buffer + sz, L'\\');
12868d75effSDimitry Andric   CHECK_NE(last_bslash, 0);
12968d75effSDimitry Andric   *last_bslash = L'\0';
13068d75effSDimitry Andric   if (!SymSetSearchPathW(GetCurrentProcess(), path_buffer)) {
13168d75effSDimitry Andric     Report("*** WARNING: Failed to SymSetSearchPathW\n");
13268d75effSDimitry Andric     return;
13368d75effSDimitry Andric   }
13468d75effSDimitry Andric }
13568d75effSDimitry Andric 
SymbolizePC(uptr addr,SymbolizedStack * frame)13668d75effSDimitry Andric bool WinSymbolizerTool::SymbolizePC(uptr addr, SymbolizedStack *frame) {
13768d75effSDimitry Andric   InitializeDbgHelpIfNeeded();
13868d75effSDimitry Andric 
139e8d8bef9SDimitry Andric   // See https://docs.microsoft.com/en-us/windows/win32/debug/retrieving-symbol-information-by-address
140fe6060f1SDimitry Andric   InternalMmapVector<char> buffer(sizeof(SYMBOL_INFO) +
141fe6060f1SDimitry Andric                                   MAX_SYM_NAME * sizeof(CHAR));
142fe6060f1SDimitry Andric   PSYMBOL_INFO symbol = (PSYMBOL_INFO)&buffer[0];
14368d75effSDimitry Andric   symbol->SizeOfStruct = sizeof(SYMBOL_INFO);
14468d75effSDimitry Andric   symbol->MaxNameLen = MAX_SYM_NAME;
14568d75effSDimitry Andric   DWORD64 offset = 0;
14668d75effSDimitry Andric   BOOL got_objname = SymFromAddr(GetCurrentProcess(),
14768d75effSDimitry Andric                                  (DWORD64)addr, &offset, symbol);
14868d75effSDimitry Andric   if (!got_objname)
14968d75effSDimitry Andric     return false;
15068d75effSDimitry Andric 
15168d75effSDimitry Andric   DWORD unused;
15268d75effSDimitry Andric   IMAGEHLP_LINE64 line_info;
15368d75effSDimitry Andric   line_info.SizeOfStruct = sizeof(IMAGEHLP_LINE64);
15468d75effSDimitry Andric   BOOL got_fileline = SymGetLineFromAddr64(GetCurrentProcess(), (DWORD64)addr,
15568d75effSDimitry Andric                                            &unused, &line_info);
15668d75effSDimitry Andric   frame->info.function = internal_strdup(symbol->Name);
15768d75effSDimitry Andric   frame->info.function_offset = (uptr)offset;
15868d75effSDimitry Andric   if (got_fileline) {
15968d75effSDimitry Andric     frame->info.file = internal_strdup(line_info.FileName);
16068d75effSDimitry Andric     frame->info.line = line_info.LineNumber;
16168d75effSDimitry Andric   }
16268d75effSDimitry Andric   // Only consider this a successful symbolization attempt if we got file info.
16368d75effSDimitry Andric   // Otherwise, try llvm-symbolizer.
16468d75effSDimitry Andric   return got_fileline;
16568d75effSDimitry Andric }
16668d75effSDimitry Andric 
Demangle(const char * name)16768d75effSDimitry Andric const char *WinSymbolizerTool::Demangle(const char *name) {
16868d75effSDimitry Andric   CHECK(is_dbghelp_initialized);
16968d75effSDimitry Andric   static char demangle_buffer[1000];
17068d75effSDimitry Andric   if (name[0] == '\01' &&
17168d75effSDimitry Andric       UnDecorateSymbolName(name + 1, demangle_buffer, sizeof(demangle_buffer),
17268d75effSDimitry Andric                            UNDNAME_NAME_ONLY))
17368d75effSDimitry Andric     return demangle_buffer;
17468d75effSDimitry Andric   else
17568d75effSDimitry Andric     return name;
17668d75effSDimitry Andric }
17768d75effSDimitry Andric 
PlatformDemangle(const char * name)178*5f757f3fSDimitry Andric const char *Symbolizer::PlatformDemangle(const char *name) { return nullptr; }
17968d75effSDimitry Andric 
18068d75effSDimitry Andric namespace {
18168d75effSDimitry Andric struct ScopedHandle {
ScopedHandle__sanitizer::__anon24ea1b9a0211::ScopedHandle18268d75effSDimitry Andric   ScopedHandle() : h_(nullptr) {}
ScopedHandle__sanitizer::__anon24ea1b9a0211::ScopedHandle18368d75effSDimitry Andric   explicit ScopedHandle(HANDLE h) : h_(h) {}
~ScopedHandle__sanitizer::__anon24ea1b9a0211::ScopedHandle18468d75effSDimitry Andric   ~ScopedHandle() {
18568d75effSDimitry Andric     if (h_)
18668d75effSDimitry Andric       ::CloseHandle(h_);
18768d75effSDimitry Andric   }
get__sanitizer::__anon24ea1b9a0211::ScopedHandle18868d75effSDimitry Andric   HANDLE get() { return h_; }
receive__sanitizer::__anon24ea1b9a0211::ScopedHandle18968d75effSDimitry Andric   HANDLE *receive() { return &h_; }
release__sanitizer::__anon24ea1b9a0211::ScopedHandle19068d75effSDimitry Andric   HANDLE release() {
19168d75effSDimitry Andric     HANDLE h = h_;
19268d75effSDimitry Andric     h_ = nullptr;
19368d75effSDimitry Andric     return h;
19468d75effSDimitry Andric   }
19568d75effSDimitry Andric   HANDLE h_;
19668d75effSDimitry Andric };
19768d75effSDimitry Andric } // namespace
19868d75effSDimitry Andric 
StartSymbolizerSubprocess()19968d75effSDimitry Andric bool SymbolizerProcess::StartSymbolizerSubprocess() {
20068d75effSDimitry Andric   // Create inherited pipes for stdin and stdout.
20168d75effSDimitry Andric   ScopedHandle stdin_read, stdin_write;
20268d75effSDimitry Andric   ScopedHandle stdout_read, stdout_write;
20368d75effSDimitry Andric   SECURITY_ATTRIBUTES attrs;
20468d75effSDimitry Andric   attrs.nLength = sizeof(SECURITY_ATTRIBUTES);
20568d75effSDimitry Andric   attrs.bInheritHandle = TRUE;
20668d75effSDimitry Andric   attrs.lpSecurityDescriptor = nullptr;
20768d75effSDimitry Andric   if (!::CreatePipe(stdin_read.receive(), stdin_write.receive(), &attrs, 0) ||
20868d75effSDimitry Andric       !::CreatePipe(stdout_read.receive(), stdout_write.receive(), &attrs, 0)) {
20968d75effSDimitry Andric     VReport(2, "WARNING: %s CreatePipe failed (error code: %d)\n",
21068d75effSDimitry Andric             SanitizerToolName, path_, GetLastError());
21168d75effSDimitry Andric     return false;
21268d75effSDimitry Andric   }
21368d75effSDimitry Andric 
21468d75effSDimitry Andric   // Don't inherit the writing end of stdin or the reading end of stdout.
21568d75effSDimitry Andric   if (!SetHandleInformation(stdin_write.get(), HANDLE_FLAG_INHERIT, 0) ||
21668d75effSDimitry Andric       !SetHandleInformation(stdout_read.get(), HANDLE_FLAG_INHERIT, 0)) {
21768d75effSDimitry Andric     VReport(2, "WARNING: %s SetHandleInformation failed (error code: %d)\n",
21868d75effSDimitry Andric             SanitizerToolName, path_, GetLastError());
21968d75effSDimitry Andric     return false;
22068d75effSDimitry Andric   }
22168d75effSDimitry Andric 
22268d75effSDimitry Andric   // Compute the command line. Wrap double quotes around everything.
22368d75effSDimitry Andric   const char *argv[kArgVMax];
22468d75effSDimitry Andric   GetArgV(path_, argv);
225fe6060f1SDimitry Andric   InternalScopedString command_line;
22668d75effSDimitry Andric   for (int i = 0; argv[i]; i++) {
22768d75effSDimitry Andric     const char *arg = argv[i];
22868d75effSDimitry Andric     int arglen = internal_strlen(arg);
22968d75effSDimitry Andric     // Check that tool command lines are simple and that complete escaping is
23068d75effSDimitry Andric     // unnecessary.
23168d75effSDimitry Andric     CHECK(!internal_strchr(arg, '"') && "quotes in args unsupported");
23268d75effSDimitry Andric     CHECK(arglen > 0 && arg[arglen - 1] != '\\' &&
23368d75effSDimitry Andric           "args ending in backslash and empty args unsupported");
234*5f757f3fSDimitry Andric     command_line.AppendF("\"%s\" ", arg);
23568d75effSDimitry Andric   }
23668d75effSDimitry Andric   VReport(3, "Launching symbolizer command: %s\n", command_line.data());
23768d75effSDimitry Andric 
23868d75effSDimitry Andric   // Launch llvm-symbolizer with stdin and stdout redirected.
23968d75effSDimitry Andric   STARTUPINFOA si;
24068d75effSDimitry Andric   memset(&si, 0, sizeof(si));
24168d75effSDimitry Andric   si.cb = sizeof(si);
24268d75effSDimitry Andric   si.dwFlags |= STARTF_USESTDHANDLES;
24368d75effSDimitry Andric   si.hStdInput = stdin_read.get();
24468d75effSDimitry Andric   si.hStdOutput = stdout_write.get();
24568d75effSDimitry Andric   PROCESS_INFORMATION pi;
24668d75effSDimitry Andric   memset(&pi, 0, sizeof(pi));
24768d75effSDimitry Andric   if (!CreateProcessA(path_,               // Executable
24868d75effSDimitry Andric                       command_line.data(), // Command line
24968d75effSDimitry Andric                       nullptr,             // Process handle not inheritable
25068d75effSDimitry Andric                       nullptr,             // Thread handle not inheritable
25168d75effSDimitry Andric                       TRUE,                // Set handle inheritance to TRUE
25268d75effSDimitry Andric                       0,                   // Creation flags
25368d75effSDimitry Andric                       nullptr,             // Use parent's environment block
25468d75effSDimitry Andric                       nullptr,             // Use parent's starting directory
25568d75effSDimitry Andric                       &si, &pi)) {
25668d75effSDimitry Andric     VReport(2, "WARNING: %s failed to create process for %s (error code: %d)\n",
25768d75effSDimitry Andric             SanitizerToolName, path_, GetLastError());
25868d75effSDimitry Andric     return false;
25968d75effSDimitry Andric   }
26068d75effSDimitry Andric 
26168d75effSDimitry Andric   // Process creation succeeded, so transfer handle ownership into the fields.
26268d75effSDimitry Andric   input_fd_ = stdout_read.release();
26368d75effSDimitry Andric   output_fd_ = stdin_write.release();
26468d75effSDimitry Andric 
26568d75effSDimitry Andric   // The llvm-symbolizer process is responsible for quitting itself when the
26668d75effSDimitry Andric   // stdin pipe is closed, so we don't need these handles. Close them to prevent
26768d75effSDimitry Andric   // leaks. If we ever want to try to kill the symbolizer process from the
26868d75effSDimitry Andric   // parent, we'll want to hang on to these handles.
26968d75effSDimitry Andric   CloseHandle(pi.hProcess);
27068d75effSDimitry Andric   CloseHandle(pi.hThread);
27168d75effSDimitry Andric   return true;
27268d75effSDimitry Andric }
27368d75effSDimitry Andric 
ChooseSymbolizerTools(IntrusiveList<SymbolizerTool> * list,LowLevelAllocator * allocator)27468d75effSDimitry Andric static void ChooseSymbolizerTools(IntrusiveList<SymbolizerTool> *list,
27568d75effSDimitry Andric                                   LowLevelAllocator *allocator) {
27668d75effSDimitry Andric   if (!common_flags()->symbolize) {
27768d75effSDimitry Andric     VReport(2, "Symbolizer is disabled.\n");
27868d75effSDimitry Andric     return;
27968d75effSDimitry Andric   }
28068d75effSDimitry Andric 
281fe6060f1SDimitry Andric   // Add llvm-symbolizer.
28268d75effSDimitry Andric   const char *user_path = common_flags()->external_symbolizer_path;
283fe6060f1SDimitry Andric 
284fe6060f1SDimitry Andric   if (user_path && internal_strchr(user_path, '%')) {
285fe6060f1SDimitry Andric     char *new_path = (char *)InternalAlloc(kMaxPathLength);
286fe6060f1SDimitry Andric     SubstituteForFlagValue(user_path, new_path, kMaxPathLength);
287fe6060f1SDimitry Andric     user_path = new_path;
288fe6060f1SDimitry Andric   }
289fe6060f1SDimitry Andric 
29068d75effSDimitry Andric   const char *path =
29168d75effSDimitry Andric       user_path ? user_path : FindPathToBinary("llvm-symbolizer.exe");
29268d75effSDimitry Andric   if (path) {
29368d75effSDimitry Andric     if (user_path && user_path[0] == '\0') {
29468d75effSDimitry Andric       VReport(2, "External symbolizer is explicitly disabled.\n");
29568d75effSDimitry Andric     } else {
29606c3fb27SDimitry Andric       VReport(2, "Using llvm-symbolizer at %spath: %s\n",
29706c3fb27SDimitry Andric               user_path ? "user-specified " : "", path);
29806c3fb27SDimitry Andric       list->push_back(new (*allocator) LLVMSymbolizer(path, allocator));
29968d75effSDimitry Andric     }
30006c3fb27SDimitry Andric   } else {
30106c3fb27SDimitry Andric     VReport(2, "External symbolizer is not present.\n");
30268d75effSDimitry Andric   }
30368d75effSDimitry Andric 
30468d75effSDimitry Andric   // Add the dbghelp based symbolizer.
30568d75effSDimitry Andric   list->push_back(new(*allocator) WinSymbolizerTool());
30668d75effSDimitry Andric }
30768d75effSDimitry Andric 
PlatformInit()30868d75effSDimitry Andric Symbolizer *Symbolizer::PlatformInit() {
30968d75effSDimitry Andric   IntrusiveList<SymbolizerTool> list;
31068d75effSDimitry Andric   list.clear();
31168d75effSDimitry Andric   ChooseSymbolizerTools(&list, &symbolizer_allocator_);
31268d75effSDimitry Andric 
31368d75effSDimitry Andric   return new(symbolizer_allocator_) Symbolizer(list);
31468d75effSDimitry Andric }
31568d75effSDimitry Andric 
LateInitialize()31668d75effSDimitry Andric void Symbolizer::LateInitialize() {
3170eae32dcSDimitry Andric   Symbolizer::GetOrInit();
31868d75effSDimitry Andric }
31968d75effSDimitry Andric 
32068d75effSDimitry Andric }  // namespace __sanitizer
32168d75effSDimitry Andric 
32268d75effSDimitry Andric #endif  // _WIN32
323