1 // Copyright 2012 the V8 project authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 // Platform-specific code for Win32.
7 // Secure API functions are not available using MinGW with msvcrt.dll
8 // on Windows XP. Make sure MINGW_HAS_SECURE_API is not defined to
9 // disable definition of secure API functions in standard headers that
10 // would conflict with our own implementation.
13 #ifdef MINGW_HAS_SECURE_API
14 #undef MINGW_HAS_SECURE_API
15 #endif // MINGW_HAS_SECURE_API
20 #include "src/base/win32-headers.h"
22 #include "src/base/bits.h"
23 #include "src/base/lazy-instance.h"
24 #include "src/base/macros.h"
25 #include "src/base/platform/platform.h"
26 #include "src/base/platform/time.h"
27 #include "src/base/utils/random-number-generator.h"
30 // Extra functions for MinGW. Most of these are the _s functions which are in
31 // the Microsoft Visual Studio C++ CRT.
35 #ifndef __MINGW64_VERSION_MAJOR
40 inline void MemoryBarrier() {
42 __asm__ __volatile__("xchgl %%eax,%0 ":"=r" (barrier));
45 #endif // __MINGW64_VERSION_MAJOR
48 int localtime_s(tm* out_tm, const time_t* time) {
49 tm* posix_local_time_struct = localtime(time);
50 if (posix_local_time_struct == NULL) return 1;
51 *out_tm = *posix_local_time_struct;
56 int fopen_s(FILE** pFile, const char* filename, const char* mode) {
57 *pFile = fopen(filename, mode);
58 return *pFile != NULL ? 0 : 1;
61 int _vsnprintf_s(char* buffer, size_t sizeOfBuffer, size_t count,
62 const char* format, va_list argptr) {
63 DCHECK(count == _TRUNCATE);
64 return _vsnprintf(buffer, sizeOfBuffer, format, argptr);
68 int strncpy_s(char* dest, size_t dest_size, const char* source, size_t count) {
69 CHECK(source != NULL);
71 CHECK_GT(dest_size, 0);
73 if (count == _TRUNCATE) {
74 while (dest_size > 0 && *source != 0) {
75 *(dest++) = *(source++);
83 while (dest_size > 0 && count > 0 && *source != 0) {
84 *(dest++) = *(source++);
89 CHECK_GT(dest_size, 0);
101 bool g_hard_abort = false;
105 class TimezoneCache {
107 TimezoneCache() : initialized_(false) { }
110 initialized_ = false;
113 // Initialize timezone information. The timezone information is obtained from
114 // windows. If we cannot get the timezone information we fall back to CET.
115 void InitializeIfNeeded() {
116 // Just return if timezone information has already been initialized.
117 if (initialized_) return;
119 // Initialize POSIX time zone data.
121 // Obtain timezone information from operating system.
122 memset(&tzinfo_, 0, sizeof(tzinfo_));
123 if (GetTimeZoneInformation(&tzinfo_) == TIME_ZONE_ID_INVALID) {
124 // If we cannot get timezone information we fall back to CET.
126 tzinfo_.StandardDate.wMonth = 10;
127 tzinfo_.StandardDate.wDay = 5;
128 tzinfo_.StandardDate.wHour = 3;
129 tzinfo_.StandardBias = 0;
130 tzinfo_.DaylightDate.wMonth = 3;
131 tzinfo_.DaylightDate.wDay = 5;
132 tzinfo_.DaylightDate.wHour = 2;
133 tzinfo_.DaylightBias = -60;
136 // Make standard and DST timezone names.
137 WideCharToMultiByte(CP_UTF8, 0, tzinfo_.StandardName, -1,
138 std_tz_name_, kTzNameSize, NULL, NULL);
139 std_tz_name_[kTzNameSize - 1] = '\0';
140 WideCharToMultiByte(CP_UTF8, 0, tzinfo_.DaylightName, -1,
141 dst_tz_name_, kTzNameSize, NULL, NULL);
142 dst_tz_name_[kTzNameSize - 1] = '\0';
144 // If OS returned empty string or resource id (like "@tzres.dll,-211")
145 // simply guess the name from the UTC bias of the timezone.
146 // To properly resolve the resource identifier requires a library load,
147 // which is not possible in a sandbox.
148 if (std_tz_name_[0] == '\0' || std_tz_name_[0] == '@') {
149 OS::SNPrintF(std_tz_name_, kTzNameSize - 1,
151 GuessTimezoneNameFromBias(tzinfo_.Bias));
153 if (dst_tz_name_[0] == '\0' || dst_tz_name_[0] == '@') {
154 OS::SNPrintF(dst_tz_name_, kTzNameSize - 1,
156 GuessTimezoneNameFromBias(tzinfo_.Bias));
158 // Timezone information initialized.
162 // Guess the name of the timezone from the bias.
163 // The guess is very biased towards the northern hemisphere.
164 const char* GuessTimezoneNameFromBias(int bias) {
165 static const int kHour = 60;
167 case -9*kHour: return "Alaska";
168 case -8*kHour: return "Pacific";
169 case -7*kHour: return "Mountain";
170 case -6*kHour: return "Central";
171 case -5*kHour: return "Eastern";
172 case -4*kHour: return "Atlantic";
173 case 0*kHour: return "GMT";
174 case +1*kHour: return "Central Europe";
175 case +2*kHour: return "Eastern Europe";
176 case +3*kHour: return "Russia";
177 case +5*kHour + 30: return "India";
178 case +8*kHour: return "China";
179 case +9*kHour: return "Japan";
180 case +12*kHour: return "New Zealand";
181 default: return "Local";
187 static const int kTzNameSize = 128;
189 char std_tz_name_[kTzNameSize];
190 char dst_tz_name_[kTzNameSize];
191 TIME_ZONE_INFORMATION tzinfo_;
192 friend class Win32Time;
196 // ----------------------------------------------------------------------------
197 // The Time class represents time on win32. A timestamp is represented as
198 // a 64-bit integer in 100 nanoseconds since January 1, 1601 (UTC). JavaScript
199 // timestamps are represented as a doubles in milliseconds since 00:00:00 UTC,
206 explicit Win32Time(double jstime);
207 Win32Time(int year, int mon, int day, int hour, int min, int sec);
209 // Convert timestamp to JavaScript representation.
212 // Set timestamp to current time.
213 void SetToCurrentTime();
215 // Returns the local timezone offset in milliseconds east of UTC. This is
216 // the number of milliseconds you must add to UTC to get local time, i.e.
217 // LocalOffset(CET) = 3600000 and LocalOffset(PST) = -28800000. This
218 // routine also takes into account whether daylight saving is effect
220 int64_t LocalOffset(TimezoneCache* cache);
222 // Returns the daylight savings time offset for the time in milliseconds.
223 int64_t DaylightSavingsOffset(TimezoneCache* cache);
225 // Returns a string identifying the current timezone for the
226 // timestamp taking into account daylight saving.
227 char* LocalTimezone(TimezoneCache* cache);
230 // Constants for time conversion.
231 static const int64_t kTimeEpoc = 116444736000000000LL;
232 static const int64_t kTimeScaler = 10000;
233 static const int64_t kMsPerMinute = 60000;
235 // Constants for timezone information.
236 static const bool kShortTzNames = false;
238 // Return whether or not daylight savings time is in effect at this time.
239 bool InDST(TimezoneCache* cache);
241 // Accessor for FILETIME representation.
242 FILETIME& ft() { return time_.ft_; }
244 // Accessor for integer representation.
245 int64_t& t() { return time_.t_; }
247 // Although win32 uses 64-bit integers for representing timestamps,
248 // these are packed into a FILETIME structure. The FILETIME structure
249 // is just a struct representing a 64-bit integer. The TimeStamp union
250 // allows access to both a FILETIME and an integer representation of
261 // Initialize timestamp to start of epoc.
262 Win32Time::Win32Time() {
267 // Initialize timestamp from a JavaScript timestamp.
268 Win32Time::Win32Time(double jstime) {
269 t() = static_cast<int64_t>(jstime) * kTimeScaler + kTimeEpoc;
273 // Initialize timestamp from date/time components.
274 Win32Time::Win32Time(int year, int mon, int day, int hour, int min, int sec) {
282 st.wMilliseconds = 0;
283 SystemTimeToFileTime(&st, &ft());
287 // Convert timestamp to JavaScript timestamp.
288 double Win32Time::ToJSTime() {
289 return static_cast<double>((t() - kTimeEpoc) / kTimeScaler);
293 // Set timestamp to current time.
294 void Win32Time::SetToCurrentTime() {
295 // The default GetSystemTimeAsFileTime has a ~15.5ms resolution.
296 // Because we're fast, we like fast timers which have at least a
299 // timeGetTime() provides 1ms granularity when combined with
300 // timeBeginPeriod(). If the host application for v8 wants fast
301 // timers, it can use timeBeginPeriod to increase the resolution.
303 // Using timeGetTime() has a drawback because it is a 32bit value
304 // and hence rolls-over every ~49days.
306 // To use the clock, we use GetSystemTimeAsFileTime as our base;
307 // and then use timeGetTime to extrapolate current time from the
308 // start time. To deal with rollovers, we resync the clock
309 // any time when more than kMaxClockElapsedTime has passed or
310 // whenever timeGetTime creates a rollover.
312 static bool initialized = false;
313 static TimeStamp init_time;
314 static DWORD init_ticks;
315 static const int64_t kHundredNanosecondsPerSecond = 10000000;
316 static const int64_t kMaxClockElapsedTime =
317 60*kHundredNanosecondsPerSecond; // 1 minute
319 // If we are uninitialized, we need to resync the clock.
320 bool needs_resync = !initialized;
322 // Get the current time.
324 GetSystemTimeAsFileTime(&time_now.ft_);
325 DWORD ticks_now = timeGetTime();
327 // Check if we need to resync due to clock rollover.
328 needs_resync |= ticks_now < init_ticks;
330 // Check if we need to resync due to elapsed time.
331 needs_resync |= (time_now.t_ - init_time.t_) > kMaxClockElapsedTime;
333 // Check if we need to resync due to backwards time change.
334 needs_resync |= time_now.t_ < init_time.t_;
336 // Resync the clock if necessary.
338 GetSystemTimeAsFileTime(&init_time.ft_);
339 init_ticks = ticks_now = timeGetTime();
343 // Finally, compute the actual time. Why is this so hard.
344 DWORD elapsed = ticks_now - init_ticks;
345 this->time_.t_ = init_time.t_ + (static_cast<int64_t>(elapsed) * 10000);
349 // Return the local timezone offset in milliseconds east of UTC. This
350 // takes into account whether daylight saving is in effect at the time.
351 // Only times in the 32-bit Unix range may be passed to this function.
352 // Also, adding the time-zone offset to the input must not overflow.
353 // The function EquivalentTime() in date.js guarantees this.
354 int64_t Win32Time::LocalOffset(TimezoneCache* cache) {
355 cache->InitializeIfNeeded();
357 Win32Time rounded_to_second(*this);
358 rounded_to_second.t() =
359 rounded_to_second.t() / 1000 / kTimeScaler * 1000 * kTimeScaler;
360 // Convert to local time using POSIX localtime function.
361 // Windows XP Service Pack 3 made SystemTimeToTzSpecificLocalTime()
362 // very slow. Other browsers use localtime().
364 // Convert from JavaScript milliseconds past 1/1/1970 0:00:00 to
365 // POSIX seconds past 1/1/1970 0:00:00.
366 double unchecked_posix_time = rounded_to_second.ToJSTime() / 1000;
367 if (unchecked_posix_time > INT_MAX || unchecked_posix_time < 0) {
370 // Because _USE_32BIT_TIME_T is defined, time_t is a 32-bit int.
371 time_t posix_time = static_cast<time_t>(unchecked_posix_time);
373 // Convert to local time, as struct with fields for day, hour, year, etc.
374 tm posix_local_time_struct;
375 if (localtime_s(&posix_local_time_struct, &posix_time)) return 0;
377 if (posix_local_time_struct.tm_isdst > 0) {
378 return (cache->tzinfo_.Bias + cache->tzinfo_.DaylightBias) * -kMsPerMinute;
379 } else if (posix_local_time_struct.tm_isdst == 0) {
380 return (cache->tzinfo_.Bias + cache->tzinfo_.StandardBias) * -kMsPerMinute;
382 return cache->tzinfo_.Bias * -kMsPerMinute;
387 // Return whether or not daylight savings time is in effect at this time.
388 bool Win32Time::InDST(TimezoneCache* cache) {
389 cache->InitializeIfNeeded();
391 // Determine if DST is in effect at the specified time.
393 if (cache->tzinfo_.StandardDate.wMonth != 0 ||
394 cache->tzinfo_.DaylightDate.wMonth != 0) {
395 // Get the local timezone offset for the timestamp in milliseconds.
396 int64_t offset = LocalOffset(cache);
398 // Compute the offset for DST. The bias parameters in the timezone info
399 // are specified in minutes. These must be converted to milliseconds.
401 -(cache->tzinfo_.Bias + cache->tzinfo_.DaylightBias) * kMsPerMinute;
403 // If the local time offset equals the timezone bias plus the daylight
404 // bias then DST is in effect.
405 in_dst = offset == dstofs;
412 // Return the daylight savings time offset for this time.
413 int64_t Win32Time::DaylightSavingsOffset(TimezoneCache* cache) {
414 return InDST(cache) ? 60 * kMsPerMinute : 0;
418 // Returns a string identifying the current timezone for the
419 // timestamp taking into account daylight saving.
420 char* Win32Time::LocalTimezone(TimezoneCache* cache) {
421 // Return the standard or DST time zone name based on whether daylight
422 // saving is in effect at the given time.
423 return InDST(cache) ? cache->dst_tz_name_ : cache->std_tz_name_;
427 // Returns the accumulated user time for thread.
428 int OS::GetUserTime(uint32_t* secs, uint32_t* usecs) {
432 // Get the amount of time that the thread has executed in user mode.
433 if (!GetThreadTimes(GetCurrentThread(), &dummy, &dummy, &dummy,
434 reinterpret_cast<FILETIME*>(&usertime))) return -1;
436 // Adjust the resolution to micro-seconds.
439 // Convert to seconds and microseconds
440 *secs = static_cast<uint32_t>(usertime / 1000000);
441 *usecs = static_cast<uint32_t>(usertime % 1000000);
446 // Returns current time as the number of milliseconds since
447 // 00:00:00 UTC, January 1, 1970.
448 double OS::TimeCurrentMillis() {
449 return Time::Now().ToJsTime();
453 TimezoneCache* OS::CreateTimezoneCache() {
454 return new TimezoneCache();
458 void OS::DisposeTimezoneCache(TimezoneCache* cache) {
463 void OS::ClearTimezoneCache(TimezoneCache* cache) {
468 // Returns a string identifying the current timezone taking into
469 // account daylight saving.
470 const char* OS::LocalTimezone(double time, TimezoneCache* cache) {
471 return Win32Time(time).LocalTimezone(cache);
475 // Returns the local time offset in milliseconds east of UTC without
476 // taking daylight savings time into account.
477 double OS::LocalTimeOffset(TimezoneCache* cache) {
478 // Use current time, rounded to the millisecond.
479 Win32Time t(TimeCurrentMillis());
480 // Time::LocalOffset inlcudes any daylight savings offset, so subtract it.
481 return static_cast<double>(t.LocalOffset(cache) -
482 t.DaylightSavingsOffset(cache));
486 // Returns the daylight savings offset in milliseconds for the given
488 double OS::DaylightSavingsOffset(double time, TimezoneCache* cache) {
489 int64_t offset = Win32Time(time).DaylightSavingsOffset(cache);
490 return static_cast<double>(offset);
494 int OS::GetLastError() {
495 return ::GetLastError();
499 int OS::GetCurrentProcessId() {
500 return static_cast<int>(::GetCurrentProcessId());
504 int OS::GetCurrentThreadId() {
505 return static_cast<int>(::GetCurrentThreadId());
509 // ----------------------------------------------------------------------------
510 // Win32 console output.
512 // If a Win32 application is linked as a console application it has a normal
513 // standard output and standard error. In this case normal printf works fine
514 // for output. However, if the application is linked as a GUI application,
515 // the process doesn't have a console, and therefore (debugging) output is lost.
516 // This is the case if we are embedded in a windows program (like a browser).
517 // In order to be able to get debug output in this case the the debugging
518 // facility using OutputDebugString. This output goes to the active debugger
519 // for the process (if any). Else the output can be monitored using DBMON.EXE.
522 UNKNOWN, // Output method has not yet been determined.
523 CONSOLE, // Output is written to stdout.
524 ODS // Output is written to debug facility.
527 static OutputMode output_mode = UNKNOWN; // Current output mode.
530 // Determine if the process has a console for output.
531 static bool HasConsole() {
532 // Only check the first time. Eventual race conditions are not a problem,
533 // because all threads will eventually determine the same mode.
534 if (output_mode == UNKNOWN) {
535 // We cannot just check that the standard output is attached to a console
536 // because this would fail if output is redirected to a file. Therefore we
537 // say that a process does not have an output console if either the
538 // standard output handle is invalid or its file type is unknown.
539 if (GetStdHandle(STD_OUTPUT_HANDLE) != INVALID_HANDLE_VALUE &&
540 GetFileType(GetStdHandle(STD_OUTPUT_HANDLE)) != FILE_TYPE_UNKNOWN)
541 output_mode = CONSOLE;
545 return output_mode == CONSOLE;
549 static void VPrintHelper(FILE* stream, const char* format, va_list args) {
550 if ((stream == stdout || stream == stderr) && !HasConsole()) {
551 // It is important to use safe print here in order to avoid
552 // overflowing the buffer. We might truncate the output, but this
555 OS::VSNPrintF(buffer, sizeof(buffer), format, args);
556 OutputDebugStringA(buffer);
558 vfprintf(stream, format, args);
563 FILE* OS::FOpen(const char* path, const char* mode) {
565 if (fopen_s(&result, path, mode) == 0) {
573 bool OS::Remove(const char* path) {
574 return (DeleteFileA(path) != 0);
578 bool OS::isDirectorySeparator(const char ch) {
579 return ch == '/' || ch == '\\';
583 FILE* OS::OpenTemporaryFile() {
584 // tmpfile_s tries to use the root dir, don't use it.
585 char tempPathBuffer[MAX_PATH];
586 DWORD path_result = 0;
587 path_result = GetTempPathA(MAX_PATH, tempPathBuffer);
588 if (path_result > MAX_PATH || path_result == 0) return NULL;
589 UINT name_result = 0;
590 char tempNameBuffer[MAX_PATH];
591 name_result = GetTempFileNameA(tempPathBuffer, "", 0, tempNameBuffer);
592 if (name_result == 0) return NULL;
593 FILE* result = FOpen(tempNameBuffer, "w+"); // Same mode as tmpfile uses.
594 if (result != NULL) {
595 Remove(tempNameBuffer); // Delete on close.
601 // Open log file in binary mode to avoid /n -> /r/n conversion.
602 const char* const OS::LogFileOpenMode = "wb";
605 // Print (debug) message to console.
606 void OS::Print(const char* format, ...) {
608 va_start(args, format);
609 VPrint(format, args);
614 void OS::VPrint(const char* format, va_list args) {
615 VPrintHelper(stdout, format, args);
619 void OS::FPrint(FILE* out, const char* format, ...) {
621 va_start(args, format);
622 VFPrint(out, format, args);
627 void OS::VFPrint(FILE* out, const char* format, va_list args) {
628 VPrintHelper(out, format, args);
632 // Print error message to console.
633 void OS::PrintError(const char* format, ...) {
635 va_start(args, format);
636 VPrintError(format, args);
641 void OS::VPrintError(const char* format, va_list args) {
642 VPrintHelper(stderr, format, args);
646 int OS::SNPrintF(char* str, int length, const char* format, ...) {
648 va_start(args, format);
649 int result = VSNPrintF(str, length, format, args);
655 int OS::VSNPrintF(char* str, int length, const char* format, va_list args) {
656 int n = _vsnprintf_s(str, length, _TRUNCATE, format, args);
657 // Make sure to zero-terminate the string if the output was
658 // truncated or if there was an error.
659 if (n < 0 || n >= length) {
661 str[length - 1] = '\0';
669 char* OS::StrChr(char* str, int c) {
670 return const_cast<char*>(strchr(str, c));
674 void OS::StrNCpy(char* dest, int length, const char* src, size_t n) {
675 // Use _TRUNCATE or strncpy_s crashes (by design) if buffer is too small.
676 size_t buffer_size = static_cast<size_t>(length);
677 if (n + 1 > buffer_size) // count for trailing '\0'
679 int result = strncpy_s(dest, length, src, n);
681 DCHECK(result == 0 || (n == _TRUNCATE && result == STRUNCATE));
689 // Get the system's page size used by VirtualAlloc() or the next power
690 // of two. The reason for always returning a power of two is that the
691 // rounding up in OS::Allocate expects that.
692 static size_t GetPageSize() {
693 static size_t page_size = 0;
694 if (page_size == 0) {
696 GetSystemInfo(&info);
697 page_size = base::bits::RoundUpToPowerOfTwo32(info.dwPageSize);
703 // The allocation alignment is the guaranteed alignment for
704 // VirtualAlloc'ed blocks of memory.
705 size_t OS::AllocateAlignment() {
706 static size_t allocate_alignment = 0;
707 if (allocate_alignment == 0) {
709 GetSystemInfo(&info);
710 allocate_alignment = info.dwAllocationGranularity;
712 return allocate_alignment;
716 static LazyInstance<RandomNumberGenerator>::type
717 platform_random_number_generator = LAZY_INSTANCE_INITIALIZER;
720 void OS::Initialize(int64_t random_seed, bool hard_abort,
721 const char* const gc_fake_mmap) {
723 platform_random_number_generator.Pointer()->SetSeed(random_seed);
725 g_hard_abort = hard_abort;
729 void* OS::GetRandomMmapAddr() {
730 // The address range used to randomize RWX allocations in OS::Allocate
731 // Try not to map pages into the default range that windows loads DLLs
732 // Use a multiple of 64k to prevent committing unused memory.
733 // Note: This does not guarantee RWX regions will be within the
734 // range kAllocationRandomAddressMin to kAllocationRandomAddressMax
735 #ifdef V8_HOST_ARCH_64_BIT
736 static const intptr_t kAllocationRandomAddressMin = 0x0000000080000000;
737 static const intptr_t kAllocationRandomAddressMax = 0x000003FFFFFF0000;
739 static const intptr_t kAllocationRandomAddressMin = 0x04000000;
740 static const intptr_t kAllocationRandomAddressMax = 0x3FFF0000;
743 (platform_random_number_generator.Pointer()->NextInt() << kPageSizeBits) |
744 kAllocationRandomAddressMin;
745 address &= kAllocationRandomAddressMax;
746 return reinterpret_cast<void *>(address);
750 static void* RandomizedVirtualAlloc(size_t size, int action, int protection) {
753 if (protection == PAGE_EXECUTE_READWRITE || protection == PAGE_NOACCESS) {
754 // For exectutable pages try and randomize the allocation address
755 for (size_t attempts = 0; base == NULL && attempts < 3; ++attempts) {
756 base = VirtualAlloc(OS::GetRandomMmapAddr(), size, action, protection);
760 // After three attempts give up and let the OS find an address to use.
761 if (base == NULL) base = VirtualAlloc(NULL, size, action, protection);
767 void* OS::Allocate(const size_t requested,
769 bool is_executable) {
770 // VirtualAlloc rounds allocated size to page size automatically.
771 size_t msize = RoundUp(requested, static_cast<int>(GetPageSize()));
773 // Windows XP SP2 allows Data Excution Prevention (DEP).
774 int prot = is_executable ? PAGE_EXECUTE_READWRITE : PAGE_READWRITE;
776 LPVOID mbase = RandomizedVirtualAlloc(msize,
777 MEM_COMMIT | MEM_RESERVE,
780 if (mbase == NULL) return NULL;
782 DCHECK((reinterpret_cast<uintptr_t>(mbase) % OS::AllocateAlignment()) == 0);
789 void OS::Free(void* address, const size_t size) {
790 // TODO(1240712): VirtualFree has a return value which is ignored here.
791 VirtualFree(address, 0, MEM_RELEASE);
796 intptr_t OS::CommitPageSize() {
801 void OS::ProtectCode(void* address, const size_t size) {
803 VirtualProtect(address, size, PAGE_EXECUTE_READ, &old_protect);
807 void OS::Guard(void* address, const size_t size) {
809 VirtualProtect(address, size, PAGE_NOACCESS, &oldprotect);
813 void OS::Sleep(int milliseconds) {
814 ::Sleep(milliseconds);
820 V8_IMMEDIATE_CRASH();
822 // Make the MSVCRT do a silent abort.
827 void OS::DebugBreak() {
829 // To avoid Visual Studio runtime support the following code can be used
839 class Win32MemoryMappedFile : public OS::MemoryMappedFile {
841 Win32MemoryMappedFile(HANDLE file,
846 file_mapping_(file_mapping),
849 virtual ~Win32MemoryMappedFile();
850 virtual void* memory() { return memory_; }
851 virtual int size() { return size_; }
854 HANDLE file_mapping_;
860 OS::MemoryMappedFile* OS::MemoryMappedFile::open(const char* name) {
861 // Open a physical file
862 HANDLE file = CreateFileA(name, GENERIC_READ | GENERIC_WRITE,
863 FILE_SHARE_READ | FILE_SHARE_WRITE, NULL, OPEN_EXISTING, 0, NULL);
864 if (file == INVALID_HANDLE_VALUE) return NULL;
866 int size = static_cast<int>(GetFileSize(file, NULL));
868 // Create a file mapping for the physical file
869 HANDLE file_mapping = CreateFileMapping(file, NULL,
870 PAGE_READWRITE, 0, static_cast<DWORD>(size), NULL);
871 if (file_mapping == NULL) return NULL;
873 // Map a view of the file into memory
874 void* memory = MapViewOfFile(file_mapping, FILE_MAP_ALL_ACCESS, 0, 0, size);
875 return new Win32MemoryMappedFile(file, file_mapping, memory, size);
879 OS::MemoryMappedFile* OS::MemoryMappedFile::create(const char* name, int size,
881 // Open a physical file
882 HANDLE file = CreateFileA(name, GENERIC_READ | GENERIC_WRITE,
883 FILE_SHARE_READ | FILE_SHARE_WRITE, NULL, OPEN_ALWAYS, 0, NULL);
884 if (file == NULL) return NULL;
885 // Create a file mapping for the physical file
886 HANDLE file_mapping = CreateFileMapping(file, NULL,
887 PAGE_READWRITE, 0, static_cast<DWORD>(size), NULL);
888 if (file_mapping == NULL) return NULL;
889 // Map a view of the file into memory
890 void* memory = MapViewOfFile(file_mapping, FILE_MAP_ALL_ACCESS, 0, 0, size);
891 if (memory) memmove(memory, initial, size);
892 return new Win32MemoryMappedFile(file, file_mapping, memory, size);
896 Win32MemoryMappedFile::~Win32MemoryMappedFile() {
898 UnmapViewOfFile(memory_);
899 CloseHandle(file_mapping_);
904 // The following code loads functions defined in DbhHelp.h and TlHelp32.h
905 // dynamically. This is to avoid being depending on dbghelp.dll and
906 // tlhelp32.dll when running (the functions in tlhelp32.dll have been moved to
907 // kernel32.dll at some point so loading functions defines in TlHelp32.h
908 // dynamically might not be necessary any more - for some versions of Windows?).
910 // Function pointers to functions dynamically loaded from dbghelp.dll.
911 #define DBGHELP_FUNCTION_LIST(V) \
915 V(SymGetSearchPath) \
918 V(SymGetSymFromAddr64) \
919 V(SymGetLineFromAddr64) \
920 V(SymFunctionTableAccess64) \
921 V(SymGetModuleBase64)
923 // Function pointers to functions dynamically loaded from dbghelp.dll.
924 #define TLHELP32_FUNCTION_LIST(V) \
925 V(CreateToolhelp32Snapshot) \
929 // Define the decoration to use for the type and variable name used for
930 // dynamically loaded DLL function..
931 #define DLL_FUNC_TYPE(name) _##name##_
932 #define DLL_FUNC_VAR(name) _##name
934 // Define the type for each dynamically loaded DLL function. The function
935 // definitions are copied from DbgHelp.h and TlHelp32.h. The IN and VOID macros
936 // from the Windows include files are redefined here to have the function
937 // definitions to be as close to the ones in the original .h files as possible.
945 // DbgHelp isn't supported on MinGW yet
947 // DbgHelp.h functions.
948 typedef BOOL (__stdcall *DLL_FUNC_TYPE(SymInitialize))(IN HANDLE hProcess,
949 IN PSTR UserSearchPath,
950 IN BOOL fInvadeProcess);
951 typedef DWORD (__stdcall *DLL_FUNC_TYPE(SymGetOptions))(VOID);
952 typedef DWORD (__stdcall *DLL_FUNC_TYPE(SymSetOptions))(IN DWORD SymOptions);
953 typedef BOOL (__stdcall *DLL_FUNC_TYPE(SymGetSearchPath))(
956 IN DWORD SearchPathLength);
957 typedef DWORD64 (__stdcall *DLL_FUNC_TYPE(SymLoadModule64))(
962 IN DWORD64 BaseOfDll,
964 typedef BOOL (__stdcall *DLL_FUNC_TYPE(StackWalk64))(
968 LPSTACKFRAME64 StackFrame,
970 PREAD_PROCESS_MEMORY_ROUTINE64 ReadMemoryRoutine,
971 PFUNCTION_TABLE_ACCESS_ROUTINE64 FunctionTableAccessRoutine,
972 PGET_MODULE_BASE_ROUTINE64 GetModuleBaseRoutine,
973 PTRANSLATE_ADDRESS_ROUTINE64 TranslateAddress);
974 typedef BOOL (__stdcall *DLL_FUNC_TYPE(SymGetSymFromAddr64))(
977 OUT PDWORD64 pdwDisplacement,
978 OUT PIMAGEHLP_SYMBOL64 Symbol);
979 typedef BOOL (__stdcall *DLL_FUNC_TYPE(SymGetLineFromAddr64))(
982 OUT PDWORD pdwDisplacement,
983 OUT PIMAGEHLP_LINE64 Line64);
984 // DbgHelp.h typedefs. Implementation found in dbghelp.dll.
985 typedef PVOID (__stdcall *DLL_FUNC_TYPE(SymFunctionTableAccess64))(
987 DWORD64 AddrBase); // DbgHelp.h typedef PFUNCTION_TABLE_ACCESS_ROUTINE64
988 typedef DWORD64 (__stdcall *DLL_FUNC_TYPE(SymGetModuleBase64))(
990 DWORD64 AddrBase); // DbgHelp.h typedef PGET_MODULE_BASE_ROUTINE64
992 // TlHelp32.h functions.
993 typedef HANDLE (__stdcall *DLL_FUNC_TYPE(CreateToolhelp32Snapshot))(
995 DWORD th32ProcessID);
996 typedef BOOL (__stdcall *DLL_FUNC_TYPE(Module32FirstW))(HANDLE hSnapshot,
997 LPMODULEENTRY32W lpme);
998 typedef BOOL (__stdcall *DLL_FUNC_TYPE(Module32NextW))(HANDLE hSnapshot,
999 LPMODULEENTRY32W lpme);
1004 // Declare a variable for each dynamically loaded DLL function.
1005 #define DEF_DLL_FUNCTION(name) DLL_FUNC_TYPE(name) DLL_FUNC_VAR(name) = NULL;
1006 DBGHELP_FUNCTION_LIST(DEF_DLL_FUNCTION)
1007 TLHELP32_FUNCTION_LIST(DEF_DLL_FUNCTION)
1008 #undef DEF_DLL_FUNCTION
1010 // Load the functions. This function has a lot of "ugly" macros in order to
1011 // keep down code duplication.
1013 static bool LoadDbgHelpAndTlHelp32() {
1014 static bool dbghelp_loaded = false;
1016 if (dbghelp_loaded) return true;
1020 // Load functions from the dbghelp.dll module.
1021 module = LoadLibrary(TEXT("dbghelp.dll"));
1022 if (module == NULL) {
1026 #define LOAD_DLL_FUNC(name) \
1027 DLL_FUNC_VAR(name) = \
1028 reinterpret_cast<DLL_FUNC_TYPE(name)>(GetProcAddress(module, #name));
1030 DBGHELP_FUNCTION_LIST(LOAD_DLL_FUNC)
1032 #undef LOAD_DLL_FUNC
1034 // Load functions from the kernel32.dll module (the TlHelp32.h function used
1035 // to be in tlhelp32.dll but are now moved to kernel32.dll).
1036 module = LoadLibrary(TEXT("kernel32.dll"));
1037 if (module == NULL) {
1041 #define LOAD_DLL_FUNC(name) \
1042 DLL_FUNC_VAR(name) = \
1043 reinterpret_cast<DLL_FUNC_TYPE(name)>(GetProcAddress(module, #name));
1045 TLHELP32_FUNCTION_LIST(LOAD_DLL_FUNC)
1047 #undef LOAD_DLL_FUNC
1049 // Check that all functions where loaded.
1051 #define DLL_FUNC_LOADED(name) (DLL_FUNC_VAR(name) != NULL) &&
1053 DBGHELP_FUNCTION_LIST(DLL_FUNC_LOADED)
1054 TLHELP32_FUNCTION_LIST(DLL_FUNC_LOADED)
1056 #undef DLL_FUNC_LOADED
1059 dbghelp_loaded = result;
1061 // NOTE: The modules are never unloaded and will stay around until the
1062 // application is closed.
1065 #undef DBGHELP_FUNCTION_LIST
1066 #undef TLHELP32_FUNCTION_LIST
1068 #undef DLL_FUNC_TYPE
1071 // Load the symbols for generating stack traces.
1072 static std::vector<OS::SharedLibraryAddress> LoadSymbols(
1073 HANDLE process_handle) {
1074 static std::vector<OS::SharedLibraryAddress> result;
1076 static bool symbols_loaded = false;
1078 if (symbols_loaded) return result;
1082 // Initialize the symbol engine.
1083 ok = _SymInitialize(process_handle, // hProcess
1084 NULL, // UserSearchPath
1085 false); // fInvadeProcess
1086 if (!ok) return result;
1088 DWORD options = _SymGetOptions();
1089 options |= SYMOPT_LOAD_LINES;
1090 options |= SYMOPT_FAIL_CRITICAL_ERRORS;
1091 options = _SymSetOptions(options);
1093 char buf[OS::kStackWalkMaxNameLen] = {0};
1094 ok = _SymGetSearchPath(process_handle, buf, OS::kStackWalkMaxNameLen);
1096 int err = GetLastError();
1097 OS::Print("%d\n", err);
1101 HANDLE snapshot = _CreateToolhelp32Snapshot(
1102 TH32CS_SNAPMODULE, // dwFlags
1103 GetCurrentProcessId()); // th32ProcessId
1104 if (snapshot == INVALID_HANDLE_VALUE) return result;
1105 MODULEENTRY32W module_entry;
1106 module_entry.dwSize = sizeof(module_entry); // Set the size of the structure.
1107 BOOL cont = _Module32FirstW(snapshot, &module_entry);
1110 // NOTE the SymLoadModule64 function has the peculiarity of accepting a
1111 // both unicode and ASCII strings even though the parameter is PSTR.
1112 base = _SymLoadModule64(
1113 process_handle, // hProcess
1115 reinterpret_cast<PSTR>(module_entry.szExePath), // ImageName
1116 reinterpret_cast<PSTR>(module_entry.szModule), // ModuleName
1117 reinterpret_cast<DWORD64>(module_entry.modBaseAddr), // BaseOfDll
1118 module_entry.modBaseSize); // SizeOfDll
1120 int err = GetLastError();
1121 if (err != ERROR_MOD_NOT_FOUND &&
1122 err != ERROR_INVALID_HANDLE) {
1127 int lib_name_length = WideCharToMultiByte(
1128 CP_UTF8, 0, module_entry.szExePath, -1, NULL, 0, NULL, NULL);
1129 std::string lib_name(lib_name_length, 0);
1130 WideCharToMultiByte(CP_UTF8, 0, module_entry.szExePath, -1, &lib_name[0],
1131 lib_name_length, NULL, NULL);
1132 result.push_back(OS::SharedLibraryAddress(
1133 lib_name, reinterpret_cast<unsigned int>(module_entry.modBaseAddr),
1134 reinterpret_cast<unsigned int>(module_entry.modBaseAddr +
1135 module_entry.modBaseSize)));
1136 cont = _Module32NextW(snapshot, &module_entry);
1138 CloseHandle(snapshot);
1140 symbols_loaded = true;
1145 std::vector<OS::SharedLibraryAddress> OS::GetSharedLibraryAddresses() {
1146 // SharedLibraryEvents are logged when loading symbol information.
1147 // Only the shared libraries loaded at the time of the call to
1148 // GetSharedLibraryAddresses are logged. DLLs loaded after
1149 // initialization are not accounted for.
1150 if (!LoadDbgHelpAndTlHelp32()) return std::vector<OS::SharedLibraryAddress>();
1151 HANDLE process_handle = GetCurrentProcess();
1152 return LoadSymbols(process_handle);
1156 void OS::SignalCodeMovingGC() {
1160 #else // __MINGW32__
1161 std::vector<OS::SharedLibraryAddress> OS::GetSharedLibraryAddresses() {
1162 return std::vector<OS::SharedLibraryAddress>();
1166 void OS::SignalCodeMovingGC() { }
1167 #endif // __MINGW32__
1170 int OS::ActivationFrameAlignment() {
1172 return 16; // Windows 64-bit ABI requires the stack to be 16-byte aligned.
1173 #elif defined(__MINGW32__)
1174 // With gcc 4.4 the tree vectorization optimizer can generate code
1175 // that requires 16 byte alignment such as movdqa on x86.
1178 return 8; // Floating-point math runs faster with 8-byte alignment.
1183 VirtualMemory::VirtualMemory() : address_(NULL), size_(0) { }
1186 VirtualMemory::VirtualMemory(size_t size)
1187 : address_(ReserveRegion(size)), size_(size) { }
1190 VirtualMemory::VirtualMemory(size_t size, size_t alignment)
1191 : address_(NULL), size_(0) {
1192 DCHECK((alignment % OS::AllocateAlignment()) == 0);
1193 size_t request_size = RoundUp(size + alignment,
1194 static_cast<intptr_t>(OS::AllocateAlignment()));
1195 void* address = ReserveRegion(request_size);
1196 if (address == NULL) return;
1197 uint8_t* base = RoundUp(static_cast<uint8_t*>(address), alignment);
1198 // Try reducing the size by freeing and then reallocating a specific area.
1199 bool result = ReleaseRegion(address, request_size);
1202 address = VirtualAlloc(base, size, MEM_RESERVE, PAGE_NOACCESS);
1203 if (address != NULL) {
1204 request_size = size;
1205 DCHECK(base == static_cast<uint8_t*>(address));
1207 // Resizing failed, just go with a bigger area.
1208 address = ReserveRegion(request_size);
1209 if (address == NULL) return;
1212 size_ = request_size;
1216 VirtualMemory::~VirtualMemory() {
1218 bool result = ReleaseRegion(address(), size());
1225 bool VirtualMemory::IsReserved() {
1226 return address_ != NULL;
1230 void VirtualMemory::Reset() {
1236 bool VirtualMemory::Commit(void* address, size_t size, bool is_executable) {
1237 return CommitRegion(address, size, is_executable);
1241 bool VirtualMemory::Uncommit(void* address, size_t size) {
1242 DCHECK(IsReserved());
1243 return UncommitRegion(address, size);
1247 bool VirtualMemory::Guard(void* address) {
1248 if (NULL == VirtualAlloc(address,
1249 OS::CommitPageSize(),
1258 void* VirtualMemory::ReserveRegion(size_t size) {
1259 return RandomizedVirtualAlloc(size, MEM_RESERVE, PAGE_NOACCESS);
1263 bool VirtualMemory::CommitRegion(void* base, size_t size, bool is_executable) {
1264 int prot = is_executable ? PAGE_EXECUTE_READWRITE : PAGE_READWRITE;
1265 if (NULL == VirtualAlloc(base, size, MEM_COMMIT, prot)) {
1272 bool VirtualMemory::UncommitRegion(void* base, size_t size) {
1273 return VirtualFree(base, size, MEM_DECOMMIT) != 0;
1277 bool VirtualMemory::ReleaseRegion(void* base, size_t size) {
1278 return VirtualFree(base, 0, MEM_RELEASE) != 0;
1282 bool VirtualMemory::HasLazyCommits() {
1283 // TODO(alph): implement for the platform.
1288 // ----------------------------------------------------------------------------
1289 // Win32 thread support.
1291 // Definition of invalid thread handle and id.
1292 static const HANDLE kNoThread = INVALID_HANDLE_VALUE;
1294 // Entry point for threads. The supplied argument is a pointer to the thread
1295 // object. The entry function dispatches to the run method in the thread
1296 // object. It is important that this function has __stdcall calling
1298 static unsigned int __stdcall ThreadEntry(void* arg) {
1299 Thread* thread = reinterpret_cast<Thread*>(arg);
1300 thread->NotifyStartedAndRun();
1305 class Thread::PlatformData {
1307 explicit PlatformData(HANDLE thread) : thread_(thread) {}
1309 unsigned thread_id_;
1313 // Initialize a Win32 thread object. The thread has an invalid thread
1314 // handle until it is started.
1316 Thread::Thread(const Options& options)
1317 : stack_size_(options.stack_size()),
1318 start_semaphore_(NULL) {
1319 data_ = new PlatformData(kNoThread);
1320 set_name(options.name());
1324 void Thread::set_name(const char* name) {
1325 OS::StrNCpy(name_, sizeof(name_), name, strlen(name));
1326 name_[sizeof(name_) - 1] = '\0';
1330 // Close our own handle for the thread.
1332 if (data_->thread_ != kNoThread) CloseHandle(data_->thread_);
1337 // Create a new thread. It is important to use _beginthreadex() instead of
1338 // the Win32 function CreateThread(), because the CreateThread() does not
1339 // initialize thread specific structures in the C runtime library.
1340 void Thread::Start() {
1341 data_->thread_ = reinterpret_cast<HANDLE>(
1342 _beginthreadex(NULL,
1343 static_cast<unsigned>(stack_size_),
1347 &data_->thread_id_));
1351 // Wait for thread to terminate.
1352 void Thread::Join() {
1353 if (data_->thread_id_ != GetCurrentThreadId()) {
1354 WaitForSingleObject(data_->thread_, INFINITE);
1359 Thread::LocalStorageKey Thread::CreateThreadLocalKey() {
1360 DWORD result = TlsAlloc();
1361 DCHECK(result != TLS_OUT_OF_INDEXES);
1362 return static_cast<LocalStorageKey>(result);
1366 void Thread::DeleteThreadLocalKey(LocalStorageKey key) {
1367 BOOL result = TlsFree(static_cast<DWORD>(key));
1373 void* Thread::GetThreadLocal(LocalStorageKey key) {
1374 return TlsGetValue(static_cast<DWORD>(key));
1378 void Thread::SetThreadLocal(LocalStorageKey key, void* value) {
1379 BOOL result = TlsSetValue(static_cast<DWORD>(key), value);
1386 void Thread::YieldCPU() {
1390 } } // namespace v8::base