118a9135dSAdrian McCarthy //===-- ProcessWindows.cpp --------------------------------------*- C++ -*-===// 218a9135dSAdrian McCarthy // 32946cd70SChandler Carruth // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. 42946cd70SChandler Carruth // See https://llvm.org/LICENSE.txt for license information. 52946cd70SChandler Carruth // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 618a9135dSAdrian McCarthy // 718a9135dSAdrian McCarthy //===----------------------------------------------------------------------===// 818a9135dSAdrian McCarthy 918a9135dSAdrian McCarthy #include "ProcessWindows.h" 1018a9135dSAdrian McCarthy 114ad5def9SAdrian McCarthy // Windows includes 124ad5def9SAdrian McCarthy #include "lldb/Host/windows/windows.h" 134ad5def9SAdrian McCarthy #include <psapi.h> 144ad5def9SAdrian McCarthy 1518a9135dSAdrian McCarthy #include "lldb/Core/Module.h" 1618a9135dSAdrian McCarthy #include "lldb/Core/ModuleSpec.h" 1718a9135dSAdrian McCarthy #include "lldb/Core/PluginManager.h" 1818a9135dSAdrian McCarthy #include "lldb/Core/Section.h" 1960cf3f82SJonas Devlieghere #include "lldb/Host/FileSystem.h" 204ad5def9SAdrian McCarthy #include "lldb/Host/HostNativeProcessBase.h" 214ad5def9SAdrian McCarthy #include "lldb/Host/HostProcess.h" 224ad5def9SAdrian McCarthy #include "lldb/Host/windows/HostThreadWindows.h" 230c35cde9SAdrian McCarthy #include "lldb/Host/windows/windows.h" 242f3df613SZachary Turner #include "lldb/Symbol/ObjectFile.h" 2518a9135dSAdrian McCarthy #include "lldb/Target/DynamicLoader.h" 2618a9135dSAdrian McCarthy #include "lldb/Target/MemoryRegionInfo.h" 274ad5def9SAdrian McCarthy #include "lldb/Target/StopInfo.h" 2818a9135dSAdrian McCarthy #include "lldb/Target/Target.h" 29d821c997SPavel Labath #include "lldb/Utility/State.h" 3018a9135dSAdrian McCarthy 314ad5def9SAdrian McCarthy #include "llvm/Support/ConvertUTF.h" 324ad5def9SAdrian McCarthy #include "llvm/Support/Format.h" 33c5f28e2aSKamil Rytarowski #include "llvm/Support/Threading.h" 344ad5def9SAdrian McCarthy #include "llvm/Support/raw_ostream.h" 354ad5def9SAdrian McCarthy 364ad5def9SAdrian McCarthy #include "DebuggerThread.h" 374ad5def9SAdrian McCarthy #include "ExceptionRecord.h" 384ad5def9SAdrian McCarthy #include "ForwardDecl.h" 394ad5def9SAdrian McCarthy #include "LocalDebugDelegate.h" 404ad5def9SAdrian McCarthy #include "ProcessWindowsLog.h" 414ad5def9SAdrian McCarthy #include "TargetThreadWindows.h" 424ad5def9SAdrian McCarthy 4318a9135dSAdrian McCarthy using namespace lldb; 4418a9135dSAdrian McCarthy using namespace lldb_private; 4518a9135dSAdrian McCarthy 464ad5def9SAdrian McCarthy namespace { 474ad5def9SAdrian McCarthy std::string GetProcessExecutableName(HANDLE process_handle) { 484ad5def9SAdrian McCarthy std::vector<wchar_t> file_name; 494ad5def9SAdrian McCarthy DWORD file_name_size = MAX_PATH; // first guess, not an absolute limit 504ad5def9SAdrian McCarthy DWORD copied = 0; 514ad5def9SAdrian McCarthy do { 524ad5def9SAdrian McCarthy file_name_size *= 2; 534ad5def9SAdrian McCarthy file_name.resize(file_name_size); 544ad5def9SAdrian McCarthy copied = ::GetModuleFileNameExW(process_handle, NULL, file_name.data(), 554ad5def9SAdrian McCarthy file_name_size); 564ad5def9SAdrian McCarthy } while (copied >= file_name_size); 574ad5def9SAdrian McCarthy file_name.resize(copied); 584ad5def9SAdrian McCarthy std::string result; 594ad5def9SAdrian McCarthy llvm::convertWideToUTF8(file_name.data(), result); 604ad5def9SAdrian McCarthy return result; 614ad5def9SAdrian McCarthy } 624ad5def9SAdrian McCarthy 634ad5def9SAdrian McCarthy std::string GetProcessExecutableName(DWORD pid) { 644ad5def9SAdrian McCarthy std::string file_name; 654ad5def9SAdrian McCarthy HANDLE process_handle = 664ad5def9SAdrian McCarthy ::OpenProcess(PROCESS_QUERY_INFORMATION | PROCESS_VM_READ, FALSE, pid); 674ad5def9SAdrian McCarthy if (process_handle != NULL) { 684ad5def9SAdrian McCarthy file_name = GetProcessExecutableName(process_handle); 694ad5def9SAdrian McCarthy ::CloseHandle(process_handle); 704ad5def9SAdrian McCarthy } 714ad5def9SAdrian McCarthy return file_name; 724ad5def9SAdrian McCarthy } 734ad5def9SAdrian McCarthy 749d5b2d4aSAleksandr Urakov DWORD ConvertLldbToWinApiProtect(uint32_t protect) { 759d5b2d4aSAleksandr Urakov // We also can process a read / write permissions here, but if the debugger 769d5b2d4aSAleksandr Urakov // will make later a write into the allocated memory, it will fail. To get 779d5b2d4aSAleksandr Urakov // around it is possible inside DoWriteMemory to remember memory permissions, 789d5b2d4aSAleksandr Urakov // allow write, write and restore permissions, but for now we process only 799d5b2d4aSAleksandr Urakov // the executable permission. 809d5b2d4aSAleksandr Urakov // 819d5b2d4aSAleksandr Urakov // TODO: Process permissions other than executable 829d5b2d4aSAleksandr Urakov if (protect & ePermissionsExecutable) 839d5b2d4aSAleksandr Urakov return PAGE_EXECUTE_READWRITE; 849d5b2d4aSAleksandr Urakov 859d5b2d4aSAleksandr Urakov return PAGE_READWRITE; 869d5b2d4aSAleksandr Urakov } 879d5b2d4aSAleksandr Urakov 884ad5def9SAdrian McCarthy } // anonymous namespace 894ad5def9SAdrian McCarthy 90b9c1b51eSKate Stone namespace lldb_private { 9118a9135dSAdrian McCarthy 924ad5def9SAdrian McCarthy // We store a pointer to this class in the ProcessWindows, so that we don't 9305097246SAdrian Prantl // expose Windows-specific types and implementation details from a public 9405097246SAdrian Prantl // header file. 954ad5def9SAdrian McCarthy class ProcessWindowsData { 964ad5def9SAdrian McCarthy public: 974ad5def9SAdrian McCarthy ProcessWindowsData(bool stop_at_entry) : m_stop_at_entry(stop_at_entry) { 984ad5def9SAdrian McCarthy m_initial_stop_event = ::CreateEvent(nullptr, TRUE, FALSE, nullptr); 994ad5def9SAdrian McCarthy } 1004ad5def9SAdrian McCarthy 1014ad5def9SAdrian McCarthy ~ProcessWindowsData() { ::CloseHandle(m_initial_stop_event); } 1024ad5def9SAdrian McCarthy 10397206d57SZachary Turner Status m_launch_error; 1044ad5def9SAdrian McCarthy DebuggerThreadSP m_debugger; 1054ad5def9SAdrian McCarthy StopInfoSP m_pending_stop_info; 1064ad5def9SAdrian McCarthy HANDLE m_initial_stop_event = nullptr; 1074ad5def9SAdrian McCarthy bool m_initial_stop_received = false; 1084ad5def9SAdrian McCarthy bool m_stop_at_entry; 1094ad5def9SAdrian McCarthy std::map<lldb::tid_t, HostThread> m_new_threads; 1104ad5def9SAdrian McCarthy std::set<lldb::tid_t> m_exited_threads; 1114ad5def9SAdrian McCarthy }; 1124ad5def9SAdrian McCarthy 1134ad5def9SAdrian McCarthy ProcessSP ProcessWindows::CreateInstance(lldb::TargetSP target_sp, 1144ad5def9SAdrian McCarthy lldb::ListenerSP listener_sp, 1154ad5def9SAdrian McCarthy const FileSpec *) { 1164ad5def9SAdrian McCarthy return ProcessSP(new ProcessWindows(target_sp, listener_sp)); 1174ad5def9SAdrian McCarthy } 1184ad5def9SAdrian McCarthy 1194ad5def9SAdrian McCarthy void ProcessWindows::Initialize() { 120c5f28e2aSKamil Rytarowski static llvm::once_flag g_once_flag; 1214ad5def9SAdrian McCarthy 122c5f28e2aSKamil Rytarowski llvm::call_once(g_once_flag, []() { 1234ad5def9SAdrian McCarthy PluginManager::RegisterPlugin(GetPluginNameStatic(), 1244ad5def9SAdrian McCarthy GetPluginDescriptionStatic(), CreateInstance); 1254ad5def9SAdrian McCarthy }); 1264ad5def9SAdrian McCarthy } 1274ad5def9SAdrian McCarthy 1284ad5def9SAdrian McCarthy void ProcessWindows::Terminate() {} 1294ad5def9SAdrian McCarthy 1304ad5def9SAdrian McCarthy lldb_private::ConstString ProcessWindows::GetPluginNameStatic() { 1314ad5def9SAdrian McCarthy static ConstString g_name("windows"); 1324ad5def9SAdrian McCarthy return g_name; 1334ad5def9SAdrian McCarthy } 1344ad5def9SAdrian McCarthy 1354ad5def9SAdrian McCarthy const char *ProcessWindows::GetPluginDescriptionStatic() { 1364ad5def9SAdrian McCarthy return "Process plugin for Windows"; 1374ad5def9SAdrian McCarthy } 1384ad5def9SAdrian McCarthy 13918a9135dSAdrian McCarthy // Constructors and destructors. 14018a9135dSAdrian McCarthy 141b9c1b51eSKate Stone ProcessWindows::ProcessWindows(lldb::TargetSP target_sp, 142b9c1b51eSKate Stone lldb::ListenerSP listener_sp) 143b9c1b51eSKate Stone : lldb_private::Process(target_sp, listener_sp) {} 14418a9135dSAdrian McCarthy 145b9c1b51eSKate Stone ProcessWindows::~ProcessWindows() {} 14618a9135dSAdrian McCarthy 14797206d57SZachary Turner size_t ProcessWindows::GetSTDOUT(char *buf, size_t buf_size, Status &error) { 14818a9135dSAdrian McCarthy error.SetErrorString("GetSTDOUT unsupported on Windows"); 14918a9135dSAdrian McCarthy return 0; 15018a9135dSAdrian McCarthy } 15118a9135dSAdrian McCarthy 15297206d57SZachary Turner size_t ProcessWindows::GetSTDERR(char *buf, size_t buf_size, Status &error) { 15318a9135dSAdrian McCarthy error.SetErrorString("GetSTDERR unsupported on Windows"); 15418a9135dSAdrian McCarthy return 0; 15518a9135dSAdrian McCarthy } 15618a9135dSAdrian McCarthy 157b9c1b51eSKate Stone size_t ProcessWindows::PutSTDIN(const char *buf, size_t buf_size, 15897206d57SZachary Turner Status &error) { 15918a9135dSAdrian McCarthy error.SetErrorString("PutSTDIN unsupported on Windows"); 16018a9135dSAdrian McCarthy return 0; 16118a9135dSAdrian McCarthy } 16218a9135dSAdrian McCarthy 16318a9135dSAdrian McCarthy // ProcessInterface protocol. 16418a9135dSAdrian McCarthy 1654ad5def9SAdrian McCarthy lldb_private::ConstString ProcessWindows::GetPluginName() { 1664ad5def9SAdrian McCarthy return GetPluginNameStatic(); 1674ad5def9SAdrian McCarthy } 1684ad5def9SAdrian McCarthy 1694ad5def9SAdrian McCarthy uint32_t ProcessWindows::GetPluginVersion() { return 1; } 1704ad5def9SAdrian McCarthy 17197206d57SZachary Turner Status ProcessWindows::EnableBreakpointSite(BreakpointSite *bp_site) { 172a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_BREAKPOINTS); 173a385d2c1SPavel Labath LLDB_LOG(log, "bp_site = {0:x}, id={1}, addr={2:x}", bp_site, 174a385d2c1SPavel Labath bp_site->GetID(), bp_site->GetLoadAddress()); 1754ad5def9SAdrian McCarthy 17697206d57SZachary Turner Status error = EnableSoftwareBreakpoint(bp_site); 177a385d2c1SPavel Labath if (!error.Success()) 178a385d2c1SPavel Labath LLDB_LOG(log, "error: {0}", error); 1794ad5def9SAdrian McCarthy return error; 1804ad5def9SAdrian McCarthy } 1814ad5def9SAdrian McCarthy 18297206d57SZachary Turner Status ProcessWindows::DisableBreakpointSite(BreakpointSite *bp_site) { 183a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_BREAKPOINTS); 184a385d2c1SPavel Labath LLDB_LOG(log, "bp_site = {0:x}, id={1}, addr={2:x}", bp_site, 185a385d2c1SPavel Labath bp_site->GetID(), bp_site->GetLoadAddress()); 1864ad5def9SAdrian McCarthy 18797206d57SZachary Turner Status error = DisableSoftwareBreakpoint(bp_site); 1884ad5def9SAdrian McCarthy 189a385d2c1SPavel Labath if (!error.Success()) 190a385d2c1SPavel Labath LLDB_LOG(log, "error: {0}", error); 1914ad5def9SAdrian McCarthy return error; 1924ad5def9SAdrian McCarthy } 1934ad5def9SAdrian McCarthy 19497206d57SZachary Turner Status ProcessWindows::DoDetach(bool keep_stopped) { 195a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_PROCESS); 1964ad5def9SAdrian McCarthy DebuggerThreadSP debugger_thread; 1974ad5def9SAdrian McCarthy StateType private_state; 1984ad5def9SAdrian McCarthy { 1994ad5def9SAdrian McCarthy // Acquire the lock only long enough to get the DebuggerThread. 20005097246SAdrian Prantl // StopDebugging() will trigger a call back into ProcessWindows which will 20105097246SAdrian Prantl // also acquire the lock. Thus we have to release the lock before calling 20205097246SAdrian Prantl // StopDebugging(). 2034ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 2044ad5def9SAdrian McCarthy 2054ad5def9SAdrian McCarthy private_state = GetPrivateState(); 2064ad5def9SAdrian McCarthy 2074ad5def9SAdrian McCarthy if (!m_session_data) { 208a385d2c1SPavel Labath LLDB_LOG(log, "state = {0}, but there is no active session.", 2094ad5def9SAdrian McCarthy private_state); 21097206d57SZachary Turner return Status(); 2114ad5def9SAdrian McCarthy } 2124ad5def9SAdrian McCarthy 2134ad5def9SAdrian McCarthy debugger_thread = m_session_data->m_debugger; 2144ad5def9SAdrian McCarthy } 2154ad5def9SAdrian McCarthy 21697206d57SZachary Turner Status error; 2174ad5def9SAdrian McCarthy if (private_state != eStateExited && private_state != eStateDetached) { 218a385d2c1SPavel Labath LLDB_LOG(log, "detaching from process {0} while state = {1}.", 2194ad5def9SAdrian McCarthy debugger_thread->GetProcess().GetNativeProcess().GetSystemHandle(), 2204ad5def9SAdrian McCarthy private_state); 2214ad5def9SAdrian McCarthy error = debugger_thread->StopDebugging(false); 2224ad5def9SAdrian McCarthy if (error.Success()) { 2234ad5def9SAdrian McCarthy SetPrivateState(eStateDetached); 2244ad5def9SAdrian McCarthy } 2254ad5def9SAdrian McCarthy 2264ad5def9SAdrian McCarthy // By the time StopDebugging returns, there is no more debugger thread, so 2274ad5def9SAdrian McCarthy // we can be assured that no other thread will race for the session data. 2284ad5def9SAdrian McCarthy m_session_data.reset(); 2294ad5def9SAdrian McCarthy } else { 230a385d2c1SPavel Labath LLDB_LOG( 231a385d2c1SPavel Labath log, 232a385d2c1SPavel Labath "error: process {0} in state = {1}, but cannot destroy in this state.", 2334ad5def9SAdrian McCarthy debugger_thread->GetProcess().GetNativeProcess().GetSystemHandle(), 2344ad5def9SAdrian McCarthy private_state); 2354ad5def9SAdrian McCarthy } 2364ad5def9SAdrian McCarthy 2374ad5def9SAdrian McCarthy return error; 2384ad5def9SAdrian McCarthy } 2394ad5def9SAdrian McCarthy 24097206d57SZachary Turner Status ProcessWindows::DoLaunch(Module *exe_module, 2414ad5def9SAdrian McCarthy ProcessLaunchInfo &launch_info) { 24205097246SAdrian Prantl // Even though m_session_data is accessed here, it is before a debugger 24305097246SAdrian Prantl // thread has been kicked off. So there's no race conditions, and it 24405097246SAdrian Prantl // shouldn't be necessary to acquire the mutex. 2454ad5def9SAdrian McCarthy 246a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_PROCESS); 24797206d57SZachary Turner Status result; 2489d6fabf9SStella Stamenova 2499d6fabf9SStella Stamenova FileSpec working_dir = launch_info.GetWorkingDirectory(); 2509d6fabf9SStella Stamenova namespace fs = llvm::sys::fs; 25154bb3161SAleksandr Urakov if (working_dir) { 25254bb3161SAleksandr Urakov FileSystem::Instance().Resolve(working_dir); 2533a58d898SJonas Devlieghere if (!FileSystem::Instance().IsDirectory(working_dir)) { 2549d6fabf9SStella Stamenova result.SetErrorStringWithFormat("No such file or directory: %s", 2559d6fabf9SStella Stamenova working_dir.GetCString()); 2569d6fabf9SStella Stamenova return result; 2579d6fabf9SStella Stamenova } 25854bb3161SAleksandr Urakov } 2599d6fabf9SStella Stamenova 2604ad5def9SAdrian McCarthy if (!launch_info.GetFlags().Test(eLaunchFlagDebug)) { 2614ad5def9SAdrian McCarthy StreamString stream; 2624ad5def9SAdrian McCarthy stream.Printf("ProcessWindows unable to launch '%s'. ProcessWindows can " 2634ad5def9SAdrian McCarthy "only be used for debug launches.", 2644ad5def9SAdrian McCarthy launch_info.GetExecutableFile().GetPath().c_str()); 2654ad5def9SAdrian McCarthy std::string message = stream.GetString(); 2664ad5def9SAdrian McCarthy result.SetErrorString(message.c_str()); 2674ad5def9SAdrian McCarthy 268a385d2c1SPavel Labath LLDB_LOG(log, "error: {0}", message); 2694ad5def9SAdrian McCarthy return result; 2704ad5def9SAdrian McCarthy } 2714ad5def9SAdrian McCarthy 2724ad5def9SAdrian McCarthy bool stop_at_entry = launch_info.GetFlags().Test(eLaunchFlagStopAtEntry); 2734ad5def9SAdrian McCarthy m_session_data.reset(new ProcessWindowsData(stop_at_entry)); 2744ad5def9SAdrian McCarthy 2754ad5def9SAdrian McCarthy DebugDelegateSP delegate(new LocalDebugDelegate(shared_from_this())); 2764ad5def9SAdrian McCarthy m_session_data->m_debugger.reset(new DebuggerThread(delegate)); 2774ad5def9SAdrian McCarthy DebuggerThreadSP debugger = m_session_data->m_debugger; 2784ad5def9SAdrian McCarthy 2794ad5def9SAdrian McCarthy // Kick off the DebugLaunch asynchronously and wait for it to complete. 2804ad5def9SAdrian McCarthy result = debugger->DebugLaunch(launch_info); 2814ad5def9SAdrian McCarthy if (result.Fail()) { 282a385d2c1SPavel Labath LLDB_LOG(log, "failed launching '{0}'. {1}", 283a385d2c1SPavel Labath launch_info.GetExecutableFile().GetPath(), result); 2844ad5def9SAdrian McCarthy return result; 2854ad5def9SAdrian McCarthy } 2864ad5def9SAdrian McCarthy 2874ad5def9SAdrian McCarthy HostProcess process; 28897206d57SZachary Turner Status error = WaitForDebuggerConnection(debugger, process); 2894ad5def9SAdrian McCarthy if (error.Fail()) { 290a385d2c1SPavel Labath LLDB_LOG(log, "failed launching '{0}'. {1}", 291a385d2c1SPavel Labath launch_info.GetExecutableFile().GetPath(), error); 2924ad5def9SAdrian McCarthy return error; 2934ad5def9SAdrian McCarthy } 2944ad5def9SAdrian McCarthy 295a385d2c1SPavel Labath LLDB_LOG(log, "successfully launched '{0}'", 296a385d2c1SPavel Labath launch_info.GetExecutableFile().GetPath()); 2974ad5def9SAdrian McCarthy 2984ad5def9SAdrian McCarthy // We've hit the initial stop. If eLaunchFlagsStopAtEntry was specified, the 29905097246SAdrian Prantl // private state should already be set to eStateStopped as a result of 30005097246SAdrian Prantl // hitting the initial breakpoint. If it was not set, the breakpoint should 30105097246SAdrian Prantl // have already been resumed from and the private state should already be 30205097246SAdrian Prantl // eStateRunning. 3034ad5def9SAdrian McCarthy launch_info.SetProcessID(process.GetProcessId()); 3044ad5def9SAdrian McCarthy SetID(process.GetProcessId()); 3054ad5def9SAdrian McCarthy 3064ad5def9SAdrian McCarthy return result; 3074ad5def9SAdrian McCarthy } 3084ad5def9SAdrian McCarthy 30997206d57SZachary Turner Status 31097206d57SZachary Turner ProcessWindows::DoAttachToProcessWithID(lldb::pid_t pid, 31197206d57SZachary Turner const ProcessAttachInfo &attach_info) { 312a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_PROCESS); 3134ad5def9SAdrian McCarthy m_session_data.reset( 3144ad5def9SAdrian McCarthy new ProcessWindowsData(!attach_info.GetContinueOnceAttached())); 3154ad5def9SAdrian McCarthy 3164ad5def9SAdrian McCarthy DebugDelegateSP delegate(new LocalDebugDelegate(shared_from_this())); 3174ad5def9SAdrian McCarthy DebuggerThreadSP debugger(new DebuggerThread(delegate)); 3184ad5def9SAdrian McCarthy 3194ad5def9SAdrian McCarthy m_session_data->m_debugger = debugger; 3204ad5def9SAdrian McCarthy 3214ad5def9SAdrian McCarthy DWORD process_id = static_cast<DWORD>(pid); 32297206d57SZachary Turner Status error = debugger->DebugAttach(process_id, attach_info); 3234ad5def9SAdrian McCarthy if (error.Fail()) { 324a385d2c1SPavel Labath LLDB_LOG( 325a385d2c1SPavel Labath log, 326a385d2c1SPavel Labath "encountered an error occurred initiating the asynchronous attach. {0}", 327a385d2c1SPavel Labath error); 3284ad5def9SAdrian McCarthy return error; 3294ad5def9SAdrian McCarthy } 3304ad5def9SAdrian McCarthy 3314ad5def9SAdrian McCarthy HostProcess process; 3324ad5def9SAdrian McCarthy error = WaitForDebuggerConnection(debugger, process); 3334ad5def9SAdrian McCarthy if (error.Fail()) { 334a385d2c1SPavel Labath LLDB_LOG(log, 335a385d2c1SPavel Labath "encountered an error waiting for the debugger to connect. {0}", 336a385d2c1SPavel Labath error); 3374ad5def9SAdrian McCarthy return error; 3384ad5def9SAdrian McCarthy } 3394ad5def9SAdrian McCarthy 340a385d2c1SPavel Labath LLDB_LOG(log, "successfully attached to process with pid={0}", process_id); 3414ad5def9SAdrian McCarthy 3424ad5def9SAdrian McCarthy // We've hit the initial stop. If eLaunchFlagsStopAtEntry was specified, the 34305097246SAdrian Prantl // private state should already be set to eStateStopped as a result of 34405097246SAdrian Prantl // hitting the initial breakpoint. If it was not set, the breakpoint should 34505097246SAdrian Prantl // have already been resumed from and the private state should already be 34605097246SAdrian Prantl // eStateRunning. 3474ad5def9SAdrian McCarthy SetID(process.GetProcessId()); 3484ad5def9SAdrian McCarthy return error; 3494ad5def9SAdrian McCarthy } 3504ad5def9SAdrian McCarthy 35197206d57SZachary Turner Status ProcessWindows::DoResume() { 352a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_PROCESS); 3534ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 35497206d57SZachary Turner Status error; 3554ad5def9SAdrian McCarthy 3564ad5def9SAdrian McCarthy StateType private_state = GetPrivateState(); 3574ad5def9SAdrian McCarthy if (private_state == eStateStopped || private_state == eStateCrashed) { 358a385d2c1SPavel Labath LLDB_LOG(log, "process {0} is in state {1}. Resuming...", 3594ad5def9SAdrian McCarthy m_session_data->m_debugger->GetProcess().GetProcessId(), 3604ad5def9SAdrian McCarthy GetPrivateState()); 3614ad5def9SAdrian McCarthy 3624ad5def9SAdrian McCarthy ExceptionRecordSP active_exception = 3634ad5def9SAdrian McCarthy m_session_data->m_debugger->GetActiveException().lock(); 3644ad5def9SAdrian McCarthy if (active_exception) { 36505097246SAdrian Prantl // Resume the process and continue processing debug events. Mask the 36605097246SAdrian Prantl // exception so that from the process's view, there is no indication that 36705097246SAdrian Prantl // anything happened. 3684ad5def9SAdrian McCarthy m_session_data->m_debugger->ContinueAsyncException( 3694ad5def9SAdrian McCarthy ExceptionResult::MaskException); 3704ad5def9SAdrian McCarthy } 3714ad5def9SAdrian McCarthy 372a385d2c1SPavel Labath LLDB_LOG(log, "resuming {0} threads.", m_thread_list.GetSize()); 3734ad5def9SAdrian McCarthy 3740fd67b53SStella Stamenova bool failed = false; 3754ad5def9SAdrian McCarthy for (uint32_t i = 0; i < m_thread_list.GetSize(); ++i) { 3764ad5def9SAdrian McCarthy auto thread = std::static_pointer_cast<TargetThreadWindows>( 3774ad5def9SAdrian McCarthy m_thread_list.GetThreadAtIndex(i)); 3780fd67b53SStella Stamenova Status result = thread->DoResume(); 3790fd67b53SStella Stamenova if (result.Fail()) { 3800fd67b53SStella Stamenova failed = true; 38162c76db4SStella Stamenova LLDB_LOG( 38262c76db4SStella Stamenova log, 38362c76db4SStella Stamenova "Trying to resume thread at index {0}, but failed with error {1}.", 38462c76db4SStella Stamenova i, result); 3850fd67b53SStella Stamenova } 3864ad5def9SAdrian McCarthy } 3874ad5def9SAdrian McCarthy 3880fd67b53SStella Stamenova if (failed) { 3890fd67b53SStella Stamenova error.SetErrorString("ProcessWindows::DoResume failed"); 3900fd67b53SStella Stamenova return error; 3910fd67b53SStella Stamenova } else { 3924ad5def9SAdrian McCarthy SetPrivateState(eStateRunning); 3930fd67b53SStella Stamenova } 3944ad5def9SAdrian McCarthy } else { 395c28daec5SAaron Smith LLDB_LOG(log, "error: process {0} is in state {1}. Returning...", 3964ad5def9SAdrian McCarthy m_session_data->m_debugger->GetProcess().GetProcessId(), 3974ad5def9SAdrian McCarthy GetPrivateState()); 3984ad5def9SAdrian McCarthy } 3994ad5def9SAdrian McCarthy return error; 4004ad5def9SAdrian McCarthy } 4014ad5def9SAdrian McCarthy 40297206d57SZachary Turner Status ProcessWindows::DoDestroy() { 403a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_PROCESS); 4044ad5def9SAdrian McCarthy DebuggerThreadSP debugger_thread; 4054ad5def9SAdrian McCarthy StateType private_state; 4064ad5def9SAdrian McCarthy { 4074ad5def9SAdrian McCarthy // Acquire this lock inside an inner scope, only long enough to get the 40805097246SAdrian Prantl // DebuggerThread. StopDebugging() will trigger a call back into 40905097246SAdrian Prantl // ProcessWindows which will acquire the lock again, so we need to not 41005097246SAdrian Prantl // deadlock. 4114ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 4124ad5def9SAdrian McCarthy 4134ad5def9SAdrian McCarthy private_state = GetPrivateState(); 4144ad5def9SAdrian McCarthy 4154ad5def9SAdrian McCarthy if (!m_session_data) { 416a385d2c1SPavel Labath LLDB_LOG(log, "warning: state = {0}, but there is no active session.", 4174ad5def9SAdrian McCarthy private_state); 41897206d57SZachary Turner return Status(); 4194ad5def9SAdrian McCarthy } 4204ad5def9SAdrian McCarthy 4214ad5def9SAdrian McCarthy debugger_thread = m_session_data->m_debugger; 4224ad5def9SAdrian McCarthy } 4234ad5def9SAdrian McCarthy 42497206d57SZachary Turner Status error; 4254ad5def9SAdrian McCarthy if (private_state != eStateExited && private_state != eStateDetached) { 426a385d2c1SPavel Labath LLDB_LOG(log, "Shutting down process {0} while state = {1}.", 4274ad5def9SAdrian McCarthy debugger_thread->GetProcess().GetNativeProcess().GetSystemHandle(), 4284ad5def9SAdrian McCarthy private_state); 4294ad5def9SAdrian McCarthy error = debugger_thread->StopDebugging(true); 4304ad5def9SAdrian McCarthy 4314ad5def9SAdrian McCarthy // By the time StopDebugging returns, there is no more debugger thread, so 4324ad5def9SAdrian McCarthy // we can be assured that no other thread will race for the session data. 4334ad5def9SAdrian McCarthy m_session_data.reset(); 4344ad5def9SAdrian McCarthy } else { 435a385d2c1SPavel Labath LLDB_LOG(log, "cannot destroy process {0} while state = {1}", 4364ad5def9SAdrian McCarthy debugger_thread->GetProcess().GetNativeProcess().GetSystemHandle(), 4374ad5def9SAdrian McCarthy private_state); 4384ad5def9SAdrian McCarthy } 4394ad5def9SAdrian McCarthy 4404ad5def9SAdrian McCarthy return error; 4414ad5def9SAdrian McCarthy } 4424ad5def9SAdrian McCarthy 44397206d57SZachary Turner Status ProcessWindows::DoHalt(bool &caused_stop) { 444a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_PROCESS); 44597206d57SZachary Turner Status error; 4464ad5def9SAdrian McCarthy StateType state = GetPrivateState(); 4474ad5def9SAdrian McCarthy if (state == eStateStopped) 4484ad5def9SAdrian McCarthy caused_stop = false; 4494ad5def9SAdrian McCarthy else { 4504ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 4514ad5def9SAdrian McCarthy caused_stop = ::DebugBreakProcess(m_session_data->m_debugger->GetProcess() 4524ad5def9SAdrian McCarthy .GetNativeProcess() 4534ad5def9SAdrian McCarthy .GetSystemHandle()); 4544ad5def9SAdrian McCarthy if (!caused_stop) { 4554ad5def9SAdrian McCarthy error.SetError(::GetLastError(), eErrorTypeWin32); 456a385d2c1SPavel Labath LLDB_LOG(log, "DebugBreakProcess failed with error {0}", error); 4574ad5def9SAdrian McCarthy } 4584ad5def9SAdrian McCarthy } 4594ad5def9SAdrian McCarthy return error; 4604ad5def9SAdrian McCarthy } 4614ad5def9SAdrian McCarthy 4624ad5def9SAdrian McCarthy void ProcessWindows::DidLaunch() { 4634ad5def9SAdrian McCarthy ArchSpec arch_spec; 4644ad5def9SAdrian McCarthy DidAttach(arch_spec); 4654ad5def9SAdrian McCarthy } 4664ad5def9SAdrian McCarthy 4674ad5def9SAdrian McCarthy void ProcessWindows::DidAttach(ArchSpec &arch_spec) { 4684ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 4694ad5def9SAdrian McCarthy 4704ad5def9SAdrian McCarthy // The initial stop won't broadcast the state change event, so account for 4714ad5def9SAdrian McCarthy // that here. 4724ad5def9SAdrian McCarthy if (m_session_data && GetPrivateState() == eStateStopped && 4734ad5def9SAdrian McCarthy m_session_data->m_stop_at_entry) 4744ad5def9SAdrian McCarthy RefreshStateAfterStop(); 4754ad5def9SAdrian McCarthy } 4764ad5def9SAdrian McCarthy 477*26366c3eSAleksandr Urakov static void 478*26366c3eSAleksandr Urakov DumpAdditionalExceptionInformation(llvm::raw_ostream &stream, 479*26366c3eSAleksandr Urakov const ExceptionRecordSP &exception) { 480*26366c3eSAleksandr Urakov // Decode additional exception information for specific exception types based 481*26366c3eSAleksandr Urakov // on 482*26366c3eSAleksandr Urakov // https://docs.microsoft.com/en-us/windows/desktop/api/winnt/ns-winnt-_exception_record 483*26366c3eSAleksandr Urakov 484*26366c3eSAleksandr Urakov const int addr_min_width = 2 + 8; // "0x" + 4 address bytes 485*26366c3eSAleksandr Urakov 486*26366c3eSAleksandr Urakov const std::vector<ULONG_PTR> &args = exception->GetExceptionArguments(); 487*26366c3eSAleksandr Urakov switch (exception->GetExceptionCode()) { 488*26366c3eSAleksandr Urakov case EXCEPTION_ACCESS_VIOLATION: { 489*26366c3eSAleksandr Urakov if (args.size() < 2) 490*26366c3eSAleksandr Urakov break; 491*26366c3eSAleksandr Urakov 492*26366c3eSAleksandr Urakov stream << ": "; 493*26366c3eSAleksandr Urakov const int access_violation_code = args[0]; 494*26366c3eSAleksandr Urakov const lldb::addr_t access_violation_address = args[1]; 495*26366c3eSAleksandr Urakov switch (access_violation_code) { 496*26366c3eSAleksandr Urakov case 0: 497*26366c3eSAleksandr Urakov stream << "Access violation reading"; 498*26366c3eSAleksandr Urakov break; 499*26366c3eSAleksandr Urakov case 1: 500*26366c3eSAleksandr Urakov stream << "Access violation writing"; 501*26366c3eSAleksandr Urakov break; 502*26366c3eSAleksandr Urakov case 8: 503*26366c3eSAleksandr Urakov stream << "User-mode data execution prevention (DEP) violation at"; 504*26366c3eSAleksandr Urakov break; 505*26366c3eSAleksandr Urakov default: 506*26366c3eSAleksandr Urakov stream << "Unknown access violation (code " << access_violation_code 507*26366c3eSAleksandr Urakov << ") at"; 508*26366c3eSAleksandr Urakov break; 509*26366c3eSAleksandr Urakov } 510*26366c3eSAleksandr Urakov stream << " location " 511*26366c3eSAleksandr Urakov << llvm::format_hex(access_violation_address, addr_min_width); 512*26366c3eSAleksandr Urakov break; 513*26366c3eSAleksandr Urakov } 514*26366c3eSAleksandr Urakov case EXCEPTION_IN_PAGE_ERROR: { 515*26366c3eSAleksandr Urakov if (args.size() < 3) 516*26366c3eSAleksandr Urakov break; 517*26366c3eSAleksandr Urakov 518*26366c3eSAleksandr Urakov stream << ": "; 519*26366c3eSAleksandr Urakov const int page_load_error_code = args[0]; 520*26366c3eSAleksandr Urakov const lldb::addr_t page_load_error_address = args[1]; 521*26366c3eSAleksandr Urakov const DWORD underlying_code = args[2]; 522*26366c3eSAleksandr Urakov switch (page_load_error_code) { 523*26366c3eSAleksandr Urakov case 0: 524*26366c3eSAleksandr Urakov stream << "In page error reading"; 525*26366c3eSAleksandr Urakov break; 526*26366c3eSAleksandr Urakov case 1: 527*26366c3eSAleksandr Urakov stream << "In page error writing"; 528*26366c3eSAleksandr Urakov break; 529*26366c3eSAleksandr Urakov case 8: 530*26366c3eSAleksandr Urakov stream << "User-mode data execution prevention (DEP) violation at"; 531*26366c3eSAleksandr Urakov break; 532*26366c3eSAleksandr Urakov default: 533*26366c3eSAleksandr Urakov stream << "Unknown page loading error (code " << page_load_error_code 534*26366c3eSAleksandr Urakov << ") at"; 535*26366c3eSAleksandr Urakov break; 536*26366c3eSAleksandr Urakov } 537*26366c3eSAleksandr Urakov stream << " location " 538*26366c3eSAleksandr Urakov << llvm::format_hex(page_load_error_address, addr_min_width) 539*26366c3eSAleksandr Urakov << " (status code " << llvm::format_hex(underlying_code, 8) << ")"; 540*26366c3eSAleksandr Urakov break; 541*26366c3eSAleksandr Urakov } 542*26366c3eSAleksandr Urakov } 543*26366c3eSAleksandr Urakov } 544*26366c3eSAleksandr Urakov 5454ad5def9SAdrian McCarthy void ProcessWindows::RefreshStateAfterStop() { 546a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_EXCEPTION); 5474ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 5484ad5def9SAdrian McCarthy 5494ad5def9SAdrian McCarthy if (!m_session_data) { 550a385d2c1SPavel Labath LLDB_LOG(log, "no active session. Returning..."); 5514ad5def9SAdrian McCarthy return; 5524ad5def9SAdrian McCarthy } 5534ad5def9SAdrian McCarthy 5544ad5def9SAdrian McCarthy m_thread_list.RefreshStateAfterStop(); 5554ad5def9SAdrian McCarthy 5564ad5def9SAdrian McCarthy std::weak_ptr<ExceptionRecord> exception_record = 5574ad5def9SAdrian McCarthy m_session_data->m_debugger->GetActiveException(); 5584ad5def9SAdrian McCarthy ExceptionRecordSP active_exception = exception_record.lock(); 5594ad5def9SAdrian McCarthy if (!active_exception) { 56062c76db4SStella Stamenova LLDB_LOG(log, 56162c76db4SStella Stamenova "there is no active exception in process {0}. Why is the " 562a385d2c1SPavel Labath "process stopped?", 5634ad5def9SAdrian McCarthy m_session_data->m_debugger->GetProcess().GetProcessId()); 5644ad5def9SAdrian McCarthy return; 5654ad5def9SAdrian McCarthy } 5664ad5def9SAdrian McCarthy 5674ad5def9SAdrian McCarthy StopInfoSP stop_info; 5684ad5def9SAdrian McCarthy m_thread_list.SetSelectedThreadByID(active_exception->GetThreadID()); 5694ad5def9SAdrian McCarthy ThreadSP stop_thread = m_thread_list.GetSelectedThread(); 5704ad5def9SAdrian McCarthy if (!stop_thread) 5714ad5def9SAdrian McCarthy return; 5724ad5def9SAdrian McCarthy 5734ad5def9SAdrian McCarthy switch (active_exception->GetExceptionCode()) { 5744ad5def9SAdrian McCarthy case EXCEPTION_SINGLE_STEP: { 5754ad5def9SAdrian McCarthy RegisterContextSP register_context = stop_thread->GetRegisterContext(); 5764ad5def9SAdrian McCarthy const uint64_t pc = register_context->GetPC(); 5774ad5def9SAdrian McCarthy BreakpointSiteSP site(GetBreakpointSiteList().FindByAddress(pc)); 5784ad5def9SAdrian McCarthy if (site && site->ValidForThisThread(stop_thread.get())) { 57962c76db4SStella Stamenova LLDB_LOG(log, 58062c76db4SStella Stamenova "Single-stepped onto a breakpoint in process {0} at " 581a385d2c1SPavel Labath "address {1:x} with breakpoint site {2}", 5824ad5def9SAdrian McCarthy m_session_data->m_debugger->GetProcess().GetProcessId(), pc, 5834ad5def9SAdrian McCarthy site->GetID()); 5844ad5def9SAdrian McCarthy stop_info = StopInfo::CreateStopReasonWithBreakpointSiteID(*stop_thread, 5854ad5def9SAdrian McCarthy site->GetID()); 5864ad5def9SAdrian McCarthy stop_thread->SetStopInfo(stop_info); 5874ad5def9SAdrian McCarthy } else { 588a385d2c1SPavel Labath LLDB_LOG(log, "single stepping thread {0}", stop_thread->GetID()); 5894ad5def9SAdrian McCarthy stop_info = StopInfo::CreateStopReasonToTrace(*stop_thread); 5904ad5def9SAdrian McCarthy stop_thread->SetStopInfo(stop_info); 5914ad5def9SAdrian McCarthy } 5924ad5def9SAdrian McCarthy return; 5934ad5def9SAdrian McCarthy } 5944ad5def9SAdrian McCarthy 5954ad5def9SAdrian McCarthy case EXCEPTION_BREAKPOINT: { 5964ad5def9SAdrian McCarthy RegisterContextSP register_context = stop_thread->GetRegisterContext(); 5974ad5def9SAdrian McCarthy 5984ad5def9SAdrian McCarthy // The current EIP is AFTER the BP opcode, which is one byte. 5994ad5def9SAdrian McCarthy uint64_t pc = register_context->GetPC() - 1; 6004ad5def9SAdrian McCarthy 6014ad5def9SAdrian McCarthy BreakpointSiteSP site(GetBreakpointSiteList().FindByAddress(pc)); 6024ad5def9SAdrian McCarthy if (site) { 60362c76db4SStella Stamenova LLDB_LOG(log, 60462c76db4SStella Stamenova "detected breakpoint in process {0} at address {1:x} with " 605a385d2c1SPavel Labath "breakpoint site {2}", 6064ad5def9SAdrian McCarthy m_session_data->m_debugger->GetProcess().GetProcessId(), pc, 6074ad5def9SAdrian McCarthy site->GetID()); 6084ad5def9SAdrian McCarthy 6094ad5def9SAdrian McCarthy if (site->ValidForThisThread(stop_thread.get())) { 61062c76db4SStella Stamenova LLDB_LOG(log, 61162c76db4SStella Stamenova "Breakpoint site {0} is valid for this thread ({1:x}), " 6124ad5def9SAdrian McCarthy "creating stop info.", 6134ad5def9SAdrian McCarthy site->GetID(), stop_thread->GetID()); 6144ad5def9SAdrian McCarthy 6154ad5def9SAdrian McCarthy stop_info = StopInfo::CreateStopReasonWithBreakpointSiteID( 6164ad5def9SAdrian McCarthy *stop_thread, site->GetID()); 6174ad5def9SAdrian McCarthy register_context->SetPC(pc); 6184ad5def9SAdrian McCarthy } else { 61962c76db4SStella Stamenova LLDB_LOG(log, 62062c76db4SStella Stamenova "Breakpoint site {0} is not valid for this thread, " 6214ad5def9SAdrian McCarthy "creating empty stop info.", 6224ad5def9SAdrian McCarthy site->GetID()); 6234ad5def9SAdrian McCarthy } 6244ad5def9SAdrian McCarthy stop_thread->SetStopInfo(stop_info); 6254ad5def9SAdrian McCarthy return; 6264ad5def9SAdrian McCarthy } else { 6274ad5def9SAdrian McCarthy // The thread hit a hard-coded breakpoint like an `int 3` or 6284ad5def9SAdrian McCarthy // `__debugbreak()`. 629a385d2c1SPavel Labath LLDB_LOG(log, 6304ad5def9SAdrian McCarthy "No breakpoint site matches for this thread. __debugbreak()? " 6314ad5def9SAdrian McCarthy "Creating stop info with the exception."); 6324ad5def9SAdrian McCarthy // FALLTHROUGH: We'll treat this as a generic exception record in the 6334ad5def9SAdrian McCarthy // default case. 6344ad5def9SAdrian McCarthy } 6354ad5def9SAdrian McCarthy } 6364ad5def9SAdrian McCarthy 6374ad5def9SAdrian McCarthy default: { 6384ad5def9SAdrian McCarthy std::string desc; 6394ad5def9SAdrian McCarthy llvm::raw_string_ostream desc_stream(desc); 6404ad5def9SAdrian McCarthy desc_stream << "Exception " 6414ad5def9SAdrian McCarthy << llvm::format_hex(active_exception->GetExceptionCode(), 8) 6424ad5def9SAdrian McCarthy << " encountered at address " 6434ad5def9SAdrian McCarthy << llvm::format_hex(active_exception->GetExceptionAddress(), 8); 644*26366c3eSAleksandr Urakov DumpAdditionalExceptionInformation(desc_stream, active_exception); 645*26366c3eSAleksandr Urakov 6464ad5def9SAdrian McCarthy stop_info = StopInfo::CreateStopReasonWithException( 6474ad5def9SAdrian McCarthy *stop_thread, desc_stream.str().c_str()); 6484ad5def9SAdrian McCarthy stop_thread->SetStopInfo(stop_info); 649a385d2c1SPavel Labath LLDB_LOG(log, "{0}", desc_stream.str()); 6504ad5def9SAdrian McCarthy return; 6514ad5def9SAdrian McCarthy } 6524ad5def9SAdrian McCarthy } 6534ad5def9SAdrian McCarthy } 6544ad5def9SAdrian McCarthy 6554ad5def9SAdrian McCarthy bool ProcessWindows::CanDebug(lldb::TargetSP target_sp, 6564ad5def9SAdrian McCarthy bool plugin_specified_by_name) { 6574ad5def9SAdrian McCarthy if (plugin_specified_by_name) 6584ad5def9SAdrian McCarthy return true; 6594ad5def9SAdrian McCarthy 6604ad5def9SAdrian McCarthy // For now we are just making sure the file exists for a given module 6614ad5def9SAdrian McCarthy ModuleSP exe_module_sp(target_sp->GetExecutableModule()); 6624ad5def9SAdrian McCarthy if (exe_module_sp.get()) 66360cf3f82SJonas Devlieghere return FileSystem::Instance().Exists(exe_module_sp->GetFileSpec()); 66405097246SAdrian Prantl // However, if there is no executable module, we return true since we might 66505097246SAdrian Prantl // be preparing to attach. 6664ad5def9SAdrian McCarthy return true; 6674ad5def9SAdrian McCarthy } 6684ad5def9SAdrian McCarthy 6694ad5def9SAdrian McCarthy bool ProcessWindows::UpdateThreadList(ThreadList &old_thread_list, 6704ad5def9SAdrian McCarthy ThreadList &new_thread_list) { 671a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_THREAD); 6724ad5def9SAdrian McCarthy // Add all the threads that were previously running and for which we did not 6734ad5def9SAdrian McCarthy // detect a thread exited event. 6744ad5def9SAdrian McCarthy int new_size = 0; 6754ad5def9SAdrian McCarthy int continued_threads = 0; 6764ad5def9SAdrian McCarthy int exited_threads = 0; 6774ad5def9SAdrian McCarthy int new_threads = 0; 6784ad5def9SAdrian McCarthy 6794ad5def9SAdrian McCarthy for (ThreadSP old_thread : old_thread_list.Threads()) { 6804ad5def9SAdrian McCarthy lldb::tid_t old_thread_id = old_thread->GetID(); 6814ad5def9SAdrian McCarthy auto exited_thread_iter = 6824ad5def9SAdrian McCarthy m_session_data->m_exited_threads.find(old_thread_id); 6834ad5def9SAdrian McCarthy if (exited_thread_iter == m_session_data->m_exited_threads.end()) { 6844ad5def9SAdrian McCarthy new_thread_list.AddThread(old_thread); 6854ad5def9SAdrian McCarthy ++new_size; 6864ad5def9SAdrian McCarthy ++continued_threads; 687a385d2c1SPavel Labath LLDB_LOGV(log, "Thread {0} was running and is still running.", 6884ad5def9SAdrian McCarthy old_thread_id); 6894ad5def9SAdrian McCarthy } else { 690a385d2c1SPavel Labath LLDB_LOGV(log, "Thread {0} was running and has exited.", old_thread_id); 6914ad5def9SAdrian McCarthy ++exited_threads; 6924ad5def9SAdrian McCarthy } 6934ad5def9SAdrian McCarthy } 6944ad5def9SAdrian McCarthy 69505097246SAdrian Prantl // Also add all the threads that are new since the last time we broke into 69605097246SAdrian Prantl // the debugger. 6974ad5def9SAdrian McCarthy for (const auto &thread_info : m_session_data->m_new_threads) { 6984ad5def9SAdrian McCarthy ThreadSP thread(new TargetThreadWindows(*this, thread_info.second)); 6994ad5def9SAdrian McCarthy thread->SetID(thread_info.first); 7004ad5def9SAdrian McCarthy new_thread_list.AddThread(thread); 7014ad5def9SAdrian McCarthy ++new_size; 7024ad5def9SAdrian McCarthy ++new_threads; 703a385d2c1SPavel Labath LLDB_LOGV(log, "Thread {0} is new since last update.", thread_info.first); 7044ad5def9SAdrian McCarthy } 7054ad5def9SAdrian McCarthy 706a385d2c1SPavel Labath LLDB_LOG(log, "{0} new threads, {1} old threads, {2} exited threads.", 7074ad5def9SAdrian McCarthy new_threads, continued_threads, exited_threads); 7084ad5def9SAdrian McCarthy 7094ad5def9SAdrian McCarthy m_session_data->m_new_threads.clear(); 7104ad5def9SAdrian McCarthy m_session_data->m_exited_threads.clear(); 7114ad5def9SAdrian McCarthy 7124ad5def9SAdrian McCarthy return new_size > 0; 7134ad5def9SAdrian McCarthy } 7144ad5def9SAdrian McCarthy 7154ad5def9SAdrian McCarthy bool ProcessWindows::IsAlive() { 7164ad5def9SAdrian McCarthy StateType state = GetPrivateState(); 7174ad5def9SAdrian McCarthy switch (state) { 7184ad5def9SAdrian McCarthy case eStateCrashed: 7194ad5def9SAdrian McCarthy case eStateDetached: 7204ad5def9SAdrian McCarthy case eStateUnloaded: 7214ad5def9SAdrian McCarthy case eStateExited: 7224ad5def9SAdrian McCarthy case eStateInvalid: 7234ad5def9SAdrian McCarthy return false; 7244ad5def9SAdrian McCarthy default: 7254ad5def9SAdrian McCarthy return true; 7264ad5def9SAdrian McCarthy } 7274ad5def9SAdrian McCarthy } 7284ad5def9SAdrian McCarthy 7294ad5def9SAdrian McCarthy size_t ProcessWindows::DoReadMemory(lldb::addr_t vm_addr, void *buf, 73097206d57SZachary Turner size_t size, Status &error) { 731a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_MEMORY); 7324ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 7334ad5def9SAdrian McCarthy 7344ad5def9SAdrian McCarthy if (!m_session_data) 7354ad5def9SAdrian McCarthy return 0; 7364ad5def9SAdrian McCarthy 737a385d2c1SPavel Labath LLDB_LOG(log, "attempting to read {0} bytes from address {1:x}", size, 738a385d2c1SPavel Labath vm_addr); 7394ad5def9SAdrian McCarthy 7404ad5def9SAdrian McCarthy HostProcess process = m_session_data->m_debugger->GetProcess(); 7414ad5def9SAdrian McCarthy void *addr = reinterpret_cast<void *>(vm_addr); 7424ad5def9SAdrian McCarthy SIZE_T bytes_read = 0; 7434ad5def9SAdrian McCarthy if (!ReadProcessMemory(process.GetNativeProcess().GetSystemHandle(), addr, 7444ad5def9SAdrian McCarthy buf, size, &bytes_read)) { 74562c76db4SStella Stamenova // Reading from the process can fail for a number of reasons - set the 74662c76db4SStella Stamenova // error code and make sure that the number of bytes read is set back to 0 74762c76db4SStella Stamenova // because in some scenarios the value of bytes_read returned from the API 74862c76db4SStella Stamenova // is garbage. 7494ad5def9SAdrian McCarthy error.SetError(GetLastError(), eErrorTypeWin32); 750a385d2c1SPavel Labath LLDB_LOG(log, "reading failed with error: {0}", error); 75162c76db4SStella Stamenova bytes_read = 0; 7524ad5def9SAdrian McCarthy } 7534ad5def9SAdrian McCarthy return bytes_read; 7544ad5def9SAdrian McCarthy } 7554ad5def9SAdrian McCarthy 7564ad5def9SAdrian McCarthy size_t ProcessWindows::DoWriteMemory(lldb::addr_t vm_addr, const void *buf, 75797206d57SZachary Turner size_t size, Status &error) { 758a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_MEMORY); 7594ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 760a385d2c1SPavel Labath LLDB_LOG(log, "attempting to write {0} bytes into address {1:x}", size, 7614ad5def9SAdrian McCarthy vm_addr); 7624ad5def9SAdrian McCarthy 7634ad5def9SAdrian McCarthy if (!m_session_data) { 764a385d2c1SPavel Labath LLDB_LOG(log, "cannot write, there is no active debugger connection."); 7654ad5def9SAdrian McCarthy return 0; 7664ad5def9SAdrian McCarthy } 7674ad5def9SAdrian McCarthy 7684ad5def9SAdrian McCarthy HostProcess process = m_session_data->m_debugger->GetProcess(); 7694ad5def9SAdrian McCarthy void *addr = reinterpret_cast<void *>(vm_addr); 7704ad5def9SAdrian McCarthy SIZE_T bytes_written = 0; 7714ad5def9SAdrian McCarthy lldb::process_t handle = process.GetNativeProcess().GetSystemHandle(); 7724ad5def9SAdrian McCarthy if (WriteProcessMemory(handle, addr, buf, size, &bytes_written)) 7734ad5def9SAdrian McCarthy FlushInstructionCache(handle, addr, bytes_written); 7744ad5def9SAdrian McCarthy else { 7754ad5def9SAdrian McCarthy error.SetError(GetLastError(), eErrorTypeWin32); 776a385d2c1SPavel Labath LLDB_LOG(log, "writing failed with error: {0}", error); 7774ad5def9SAdrian McCarthy } 7784ad5def9SAdrian McCarthy return bytes_written; 7794ad5def9SAdrian McCarthy } 7804ad5def9SAdrian McCarthy 7819d5b2d4aSAleksandr Urakov lldb::addr_t ProcessWindows::DoAllocateMemory(size_t size, uint32_t permissions, 7829d5b2d4aSAleksandr Urakov Status &error) { 7839d5b2d4aSAleksandr Urakov Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_MEMORY); 7849d5b2d4aSAleksandr Urakov llvm::sys::ScopedLock lock(m_mutex); 7859d5b2d4aSAleksandr Urakov LLDB_LOG(log, "attempting to allocate {0} bytes with permissions {1}", size, 7869d5b2d4aSAleksandr Urakov permissions); 7879d5b2d4aSAleksandr Urakov 7889d5b2d4aSAleksandr Urakov if (!m_session_data) { 7899d5b2d4aSAleksandr Urakov LLDB_LOG(log, "cannot allocate, there is no active debugger connection."); 7909d5b2d4aSAleksandr Urakov error.SetErrorString( 7919d5b2d4aSAleksandr Urakov "cannot allocate, there is no active debugger connection"); 792975814a7SStella Stamenova return LLDB_INVALID_ADDRESS; 7939d5b2d4aSAleksandr Urakov } 7949d5b2d4aSAleksandr Urakov 7959d5b2d4aSAleksandr Urakov HostProcess process = m_session_data->m_debugger->GetProcess(); 7969d5b2d4aSAleksandr Urakov lldb::process_t handle = process.GetNativeProcess().GetSystemHandle(); 7979d5b2d4aSAleksandr Urakov auto protect = ConvertLldbToWinApiProtect(permissions); 7989d5b2d4aSAleksandr Urakov auto result = VirtualAllocEx(handle, nullptr, size, MEM_COMMIT, protect); 7999d5b2d4aSAleksandr Urakov if (!result) { 8009d5b2d4aSAleksandr Urakov error.SetError(GetLastError(), eErrorTypeWin32); 8019d5b2d4aSAleksandr Urakov LLDB_LOG(log, "allocating failed with error: {0}", error); 802975814a7SStella Stamenova return LLDB_INVALID_ADDRESS; 8039d5b2d4aSAleksandr Urakov } 8049d5b2d4aSAleksandr Urakov 8059d5b2d4aSAleksandr Urakov return reinterpret_cast<addr_t>(result); 8069d5b2d4aSAleksandr Urakov } 8079d5b2d4aSAleksandr Urakov 8089d5b2d4aSAleksandr Urakov Status ProcessWindows::DoDeallocateMemory(lldb::addr_t ptr) { 8099d5b2d4aSAleksandr Urakov Status result; 8109d5b2d4aSAleksandr Urakov 8119d5b2d4aSAleksandr Urakov Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_MEMORY); 8129d5b2d4aSAleksandr Urakov llvm::sys::ScopedLock lock(m_mutex); 8139d5b2d4aSAleksandr Urakov LLDB_LOG(log, "attempting to deallocate bytes at address {0}", ptr); 8149d5b2d4aSAleksandr Urakov 8159d5b2d4aSAleksandr Urakov if (!m_session_data) { 8169d5b2d4aSAleksandr Urakov LLDB_LOG(log, "cannot deallocate, there is no active debugger connection."); 8179d5b2d4aSAleksandr Urakov result.SetErrorString( 8189d5b2d4aSAleksandr Urakov "cannot deallocate, there is no active debugger connection"); 8199d5b2d4aSAleksandr Urakov return result; 8209d5b2d4aSAleksandr Urakov } 8219d5b2d4aSAleksandr Urakov 8229d5b2d4aSAleksandr Urakov HostProcess process = m_session_data->m_debugger->GetProcess(); 8239d5b2d4aSAleksandr Urakov lldb::process_t handle = process.GetNativeProcess().GetSystemHandle(); 8249d5b2d4aSAleksandr Urakov if (!VirtualFreeEx(handle, reinterpret_cast<LPVOID>(ptr), 0, MEM_RELEASE)) { 8259d5b2d4aSAleksandr Urakov result.SetError(GetLastError(), eErrorTypeWin32); 8269d5b2d4aSAleksandr Urakov LLDB_LOG(log, "deallocating failed with error: {0}", result); 8279d5b2d4aSAleksandr Urakov return result; 8289d5b2d4aSAleksandr Urakov } 8299d5b2d4aSAleksandr Urakov 8309d5b2d4aSAleksandr Urakov return result; 8319d5b2d4aSAleksandr Urakov } 8329d5b2d4aSAleksandr Urakov 83397206d57SZachary Turner Status ProcessWindows::GetMemoryRegionInfo(lldb::addr_t vm_addr, 8344ad5def9SAdrian McCarthy MemoryRegionInfo &info) { 835a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_MEMORY); 83697206d57SZachary Turner Status error; 8374ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 8384ad5def9SAdrian McCarthy info.Clear(); 8394ad5def9SAdrian McCarthy 8404ad5def9SAdrian McCarthy if (!m_session_data) { 8414ad5def9SAdrian McCarthy error.SetErrorString( 8424ad5def9SAdrian McCarthy "GetMemoryRegionInfo called with no debugging session."); 843a385d2c1SPavel Labath LLDB_LOG(log, "error: {0}", error); 8444ad5def9SAdrian McCarthy return error; 8454ad5def9SAdrian McCarthy } 8464ad5def9SAdrian McCarthy HostProcess process = m_session_data->m_debugger->GetProcess(); 8474ad5def9SAdrian McCarthy lldb::process_t handle = process.GetNativeProcess().GetSystemHandle(); 8484ad5def9SAdrian McCarthy if (handle == nullptr || handle == LLDB_INVALID_PROCESS) { 8494ad5def9SAdrian McCarthy error.SetErrorString( 8504ad5def9SAdrian McCarthy "GetMemoryRegionInfo called with an invalid target process."); 851a385d2c1SPavel Labath LLDB_LOG(log, "error: {0}", error); 8524ad5def9SAdrian McCarthy return error; 8534ad5def9SAdrian McCarthy } 8544ad5def9SAdrian McCarthy 855a385d2c1SPavel Labath LLDB_LOG(log, "getting info for address {0:x}", vm_addr); 8564ad5def9SAdrian McCarthy 8574ad5def9SAdrian McCarthy void *addr = reinterpret_cast<void *>(vm_addr); 8584ad5def9SAdrian McCarthy MEMORY_BASIC_INFORMATION mem_info = {}; 8594ad5def9SAdrian McCarthy SIZE_T result = ::VirtualQueryEx(handle, addr, &mem_info, sizeof(mem_info)); 8604ad5def9SAdrian McCarthy if (result == 0) { 8614ad5def9SAdrian McCarthy if (::GetLastError() == ERROR_INVALID_PARAMETER) { 86205097246SAdrian Prantl // ERROR_INVALID_PARAMETER is returned if VirtualQueryEx is called with 86305097246SAdrian Prantl // an address past the highest accessible address. We should return a 86405097246SAdrian Prantl // range from the vm_addr to LLDB_INVALID_ADDRESS 8654ad5def9SAdrian McCarthy info.GetRange().SetRangeBase(vm_addr); 8664ad5def9SAdrian McCarthy info.GetRange().SetRangeEnd(LLDB_INVALID_ADDRESS); 8674ad5def9SAdrian McCarthy info.SetReadable(MemoryRegionInfo::eNo); 8684ad5def9SAdrian McCarthy info.SetExecutable(MemoryRegionInfo::eNo); 8694ad5def9SAdrian McCarthy info.SetWritable(MemoryRegionInfo::eNo); 8704ad5def9SAdrian McCarthy info.SetMapped(MemoryRegionInfo::eNo); 8714ad5def9SAdrian McCarthy return error; 8724ad5def9SAdrian McCarthy } else { 8734ad5def9SAdrian McCarthy error.SetError(::GetLastError(), eErrorTypeWin32); 87462c76db4SStella Stamenova LLDB_LOG(log, 87562c76db4SStella Stamenova "VirtualQueryEx returned error {0} while getting memory " 876a385d2c1SPavel Labath "region info for address {1:x}", 877a385d2c1SPavel Labath error, vm_addr); 8784ad5def9SAdrian McCarthy return error; 8794ad5def9SAdrian McCarthy } 8804ad5def9SAdrian McCarthy } 8814ad5def9SAdrian McCarthy 8824ad5def9SAdrian McCarthy // Protect bits are only valid for MEM_COMMIT regions. 8834ad5def9SAdrian McCarthy if (mem_info.State == MEM_COMMIT) { 8844ad5def9SAdrian McCarthy const bool readable = IsPageReadable(mem_info.Protect); 8854ad5def9SAdrian McCarthy const bool executable = IsPageExecutable(mem_info.Protect); 8864ad5def9SAdrian McCarthy const bool writable = IsPageWritable(mem_info.Protect); 8874ad5def9SAdrian McCarthy info.SetReadable(readable ? MemoryRegionInfo::eYes : MemoryRegionInfo::eNo); 8884ad5def9SAdrian McCarthy info.SetExecutable(executable ? MemoryRegionInfo::eYes 8894ad5def9SAdrian McCarthy : MemoryRegionInfo::eNo); 8904ad5def9SAdrian McCarthy info.SetWritable(writable ? MemoryRegionInfo::eYes : MemoryRegionInfo::eNo); 8914ad5def9SAdrian McCarthy } else { 8924ad5def9SAdrian McCarthy info.SetReadable(MemoryRegionInfo::eNo); 8934ad5def9SAdrian McCarthy info.SetExecutable(MemoryRegionInfo::eNo); 8944ad5def9SAdrian McCarthy info.SetWritable(MemoryRegionInfo::eNo); 8954ad5def9SAdrian McCarthy } 8964ad5def9SAdrian McCarthy 8974ad5def9SAdrian McCarthy // AllocationBase is defined for MEM_COMMIT and MEM_RESERVE but not MEM_FREE. 8984ad5def9SAdrian McCarthy if (mem_info.State != MEM_FREE) { 8994ad5def9SAdrian McCarthy info.GetRange().SetRangeBase( 9004ad5def9SAdrian McCarthy reinterpret_cast<addr_t>(mem_info.AllocationBase)); 9014ad5def9SAdrian McCarthy info.GetRange().SetRangeEnd(reinterpret_cast<addr_t>(mem_info.BaseAddress) + 9024ad5def9SAdrian McCarthy mem_info.RegionSize); 9034ad5def9SAdrian McCarthy info.SetMapped(MemoryRegionInfo::eYes); 9044ad5def9SAdrian McCarthy } else { 9054ad5def9SAdrian McCarthy // In the unmapped case we need to return the distance to the next block of 90605097246SAdrian Prantl // memory. VirtualQueryEx nearly does that except that it gives the 90705097246SAdrian Prantl // distance from the start of the page containing vm_addr. 9084ad5def9SAdrian McCarthy SYSTEM_INFO data; 9094ad5def9SAdrian McCarthy GetSystemInfo(&data); 9104ad5def9SAdrian McCarthy DWORD page_offset = vm_addr % data.dwPageSize; 9114ad5def9SAdrian McCarthy info.GetRange().SetRangeBase(vm_addr); 9124ad5def9SAdrian McCarthy info.GetRange().SetByteSize(mem_info.RegionSize - page_offset); 9134ad5def9SAdrian McCarthy info.SetMapped(MemoryRegionInfo::eNo); 9144ad5def9SAdrian McCarthy } 9154ad5def9SAdrian McCarthy 9164ad5def9SAdrian McCarthy error.SetError(::GetLastError(), eErrorTypeWin32); 91762c76db4SStella Stamenova LLDB_LOGV(log, 91862c76db4SStella Stamenova "Memory region info for address {0}: readable={1}, " 919a385d2c1SPavel Labath "executable={2}, writable={3}", 920a385d2c1SPavel Labath vm_addr, info.GetReadable(), info.GetExecutable(), 921a385d2c1SPavel Labath info.GetWritable()); 9224ad5def9SAdrian McCarthy return error; 9234ad5def9SAdrian McCarthy } 9244ad5def9SAdrian McCarthy 925b9c1b51eSKate Stone lldb::addr_t ProcessWindows::GetImageInfoAddress() { 92618a9135dSAdrian McCarthy Target &target = GetTarget(); 92718a9135dSAdrian McCarthy ObjectFile *obj_file = target.GetExecutableModule()->GetObjectFile(); 92818a9135dSAdrian McCarthy Address addr = obj_file->GetImageInfoAddress(&target); 92918a9135dSAdrian McCarthy if (addr.IsValid()) 93018a9135dSAdrian McCarthy return addr.GetLoadAddress(&target); 93118a9135dSAdrian McCarthy else 93218a9135dSAdrian McCarthy return LLDB_INVALID_ADDRESS; 93318a9135dSAdrian McCarthy } 93418a9135dSAdrian McCarthy 935eb6671e7SAaron Smith DynamicLoaderWindowsDYLD *ProcessWindows::GetDynamicLoader() { 93696b82107SAaron Smith if (m_dyld_up.get() == NULL) 93796b82107SAaron Smith m_dyld_up.reset(DynamicLoader::FindPlugin( 938eb6671e7SAaron Smith this, DynamicLoaderWindowsDYLD::GetPluginNameStatic().GetCString())); 93996b82107SAaron Smith return static_cast<DynamicLoaderWindowsDYLD *>(m_dyld_up.get()); 940eb6671e7SAaron Smith } 941eb6671e7SAaron Smith 9424ad5def9SAdrian McCarthy void ProcessWindows::OnExitProcess(uint32_t exit_code) { 9434ad5def9SAdrian McCarthy // No need to acquire the lock since m_session_data isn't accessed. 944a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_PROCESS); 945a385d2c1SPavel Labath LLDB_LOG(log, "Process {0} exited with code {1}", GetID(), exit_code); 9464ad5def9SAdrian McCarthy 947d7e126c4SJim Ingham TargetSP target = CalculateTarget(); 9484ad5def9SAdrian McCarthy if (target) { 9494ad5def9SAdrian McCarthy ModuleSP executable_module = target->GetExecutableModule(); 9504ad5def9SAdrian McCarthy ModuleList unloaded_modules; 9514ad5def9SAdrian McCarthy unloaded_modules.Append(executable_module); 9524ad5def9SAdrian McCarthy target->ModulesDidUnload(unloaded_modules, true); 9534ad5def9SAdrian McCarthy } 9544ad5def9SAdrian McCarthy 9554ad5def9SAdrian McCarthy SetProcessExitStatus(GetID(), true, 0, exit_code); 9564ad5def9SAdrian McCarthy SetPrivateState(eStateExited); 957e3037904SAaron Smith 958e3037904SAaron Smith // If the process exits before any initial stop then notify the debugger 959e3037904SAaron Smith // of the error otherwise WaitForDebuggerConnection() will be blocked. 960e3037904SAaron Smith // An example of this issue is when a process fails to load a dependent DLL. 961c28daec5SAaron Smith if (m_session_data && !m_session_data->m_initial_stop_received) { 962e3037904SAaron Smith Status error(exit_code, eErrorTypeWin32); 963e3037904SAaron Smith OnDebuggerError(error, 0); 964e3037904SAaron Smith } 9654ad5def9SAdrian McCarthy } 9664ad5def9SAdrian McCarthy 9674ad5def9SAdrian McCarthy void ProcessWindows::OnDebuggerConnected(lldb::addr_t image_base) { 9684ad5def9SAdrian McCarthy DebuggerThreadSP debugger = m_session_data->m_debugger; 969a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_PROCESS); 970a385d2c1SPavel Labath LLDB_LOG(log, "Debugger connected to process {0}. Image base = {1:x}", 9714ad5def9SAdrian McCarthy debugger->GetProcess().GetProcessId(), image_base); 9724ad5def9SAdrian McCarthy 9734ad5def9SAdrian McCarthy ModuleSP module = GetTarget().GetExecutableModule(); 9744ad5def9SAdrian McCarthy if (!module) { 9754ad5def9SAdrian McCarthy // During attach, we won't have the executable module, so find it now. 9764ad5def9SAdrian McCarthy const DWORD pid = debugger->GetProcess().GetProcessId(); 9774ad5def9SAdrian McCarthy const std::string file_name = GetProcessExecutableName(pid); 9784ad5def9SAdrian McCarthy if (file_name.empty()) { 9794ad5def9SAdrian McCarthy return; 9804ad5def9SAdrian McCarthy } 9814ad5def9SAdrian McCarthy 98254bb3161SAleksandr Urakov FileSpec executable_file(file_name); 98354bb3161SAleksandr Urakov FileSystem::Instance().Resolve(executable_file); 9844ad5def9SAdrian McCarthy ModuleSpec module_spec(executable_file); 98597206d57SZachary Turner Status error; 9861724a179SJason Molenda module = GetTarget().GetOrCreateModule(module_spec, 9871724a179SJason Molenda true /* notify */, &error); 9884ad5def9SAdrian McCarthy if (!module) { 9894ad5def9SAdrian McCarthy return; 9904ad5def9SAdrian McCarthy } 9914ad5def9SAdrian McCarthy 992d54ee88aSTatyana Krasnukha GetTarget().SetExecutableModule(module, eLoadDependentsNo); 9934ad5def9SAdrian McCarthy } 9944ad5def9SAdrian McCarthy 995eb6671e7SAaron Smith if (auto dyld = GetDynamicLoader()) 996a2d9fdf5SStella Stamenova dyld->OnLoadModule(module, ModuleSpec(), image_base); 9974ad5def9SAdrian McCarthy 9984ad5def9SAdrian McCarthy // Add the main executable module to the list of pending module loads. We 99905097246SAdrian Prantl // can't call GetTarget().ModulesDidLoad() here because we still haven't 100005097246SAdrian Prantl // returned from DoLaunch() / DoAttach() yet so the target may not have set 100105097246SAdrian Prantl // the process instance to `this` yet. 10024ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 10034ad5def9SAdrian McCarthy const HostThreadWindows &wmain_thread = 10044ad5def9SAdrian McCarthy debugger->GetMainThread().GetNativeThread(); 10054ad5def9SAdrian McCarthy m_session_data->m_new_threads[wmain_thread.GetThreadId()] = 10064ad5def9SAdrian McCarthy debugger->GetMainThread(); 10074ad5def9SAdrian McCarthy } 10084ad5def9SAdrian McCarthy 10094ad5def9SAdrian McCarthy ExceptionResult 10104ad5def9SAdrian McCarthy ProcessWindows::OnDebugException(bool first_chance, 10114ad5def9SAdrian McCarthy const ExceptionRecord &record) { 1012a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_EXCEPTION); 10134ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 10144ad5def9SAdrian McCarthy 10154ad5def9SAdrian McCarthy // FIXME: Without this check, occasionally when running the test suite there 10164ad5def9SAdrian McCarthy // is 10174ad5def9SAdrian McCarthy // an issue where m_session_data can be null. It's not clear how this could 101805097246SAdrian Prantl // happen but it only surfaces while running the test suite. In order to 101905097246SAdrian Prantl // properly diagnose this, we probably need to first figure allow the test 102005097246SAdrian Prantl // suite to print out full lldb logs, and then add logging to the process 102105097246SAdrian Prantl // plugin. 10224ad5def9SAdrian McCarthy if (!m_session_data) { 102362c76db4SStella Stamenova LLDB_LOG(log, 102462c76db4SStella Stamenova "Debugger thread reported exception {0:x} at address {1:x}, " 1025a385d2c1SPavel Labath "but there is no session.", 10264ad5def9SAdrian McCarthy record.GetExceptionCode(), record.GetExceptionAddress()); 10274ad5def9SAdrian McCarthy return ExceptionResult::SendToApplication; 10284ad5def9SAdrian McCarthy } 10294ad5def9SAdrian McCarthy 10304ad5def9SAdrian McCarthy if (!first_chance) { 1031a5235af9SAleksandr Urakov // Not any second chance exception is an application crash by definition. 1032a5235af9SAleksandr Urakov // It may be an expression evaluation crash. 1033a5235af9SAleksandr Urakov SetPrivateState(eStateStopped); 10344ad5def9SAdrian McCarthy } 10354ad5def9SAdrian McCarthy 10364ad5def9SAdrian McCarthy ExceptionResult result = ExceptionResult::SendToApplication; 10374ad5def9SAdrian McCarthy switch (record.GetExceptionCode()) { 10384ad5def9SAdrian McCarthy case EXCEPTION_BREAKPOINT: 10394ad5def9SAdrian McCarthy // Handle breakpoints at the first chance. 10404ad5def9SAdrian McCarthy result = ExceptionResult::BreakInDebugger; 10414ad5def9SAdrian McCarthy 10424ad5def9SAdrian McCarthy if (!m_session_data->m_initial_stop_received) { 1043a385d2c1SPavel Labath LLDB_LOG( 1044a385d2c1SPavel Labath log, 1045a385d2c1SPavel Labath "Hit loader breakpoint at address {0:x}, setting initial stop event.", 10464ad5def9SAdrian McCarthy record.GetExceptionAddress()); 10474ad5def9SAdrian McCarthy m_session_data->m_initial_stop_received = true; 10484ad5def9SAdrian McCarthy ::SetEvent(m_session_data->m_initial_stop_event); 10494ad5def9SAdrian McCarthy } else { 1050a385d2c1SPavel Labath LLDB_LOG(log, "Hit non-loader breakpoint at address {0:x}.", 10514ad5def9SAdrian McCarthy record.GetExceptionAddress()); 10524ad5def9SAdrian McCarthy } 10534ad5def9SAdrian McCarthy SetPrivateState(eStateStopped); 10544ad5def9SAdrian McCarthy break; 10554ad5def9SAdrian McCarthy case EXCEPTION_SINGLE_STEP: 10564ad5def9SAdrian McCarthy result = ExceptionResult::BreakInDebugger; 10574ad5def9SAdrian McCarthy SetPrivateState(eStateStopped); 10584ad5def9SAdrian McCarthy break; 10594ad5def9SAdrian McCarthy default: 106062c76db4SStella Stamenova LLDB_LOG(log, 106162c76db4SStella Stamenova "Debugger thread reported exception {0:x} at address {1:x} " 1062a385d2c1SPavel Labath "(first_chance={2})", 10634ad5def9SAdrian McCarthy record.GetExceptionCode(), record.GetExceptionAddress(), 1064a385d2c1SPavel Labath first_chance); 10654ad5def9SAdrian McCarthy // For non-breakpoints, give the application a chance to handle the 10664ad5def9SAdrian McCarthy // exception first. 10674ad5def9SAdrian McCarthy if (first_chance) 10684ad5def9SAdrian McCarthy result = ExceptionResult::SendToApplication; 10694ad5def9SAdrian McCarthy else 10704ad5def9SAdrian McCarthy result = ExceptionResult::BreakInDebugger; 10714ad5def9SAdrian McCarthy } 10724ad5def9SAdrian McCarthy 10734ad5def9SAdrian McCarthy return result; 10744ad5def9SAdrian McCarthy } 10754ad5def9SAdrian McCarthy 10764ad5def9SAdrian McCarthy void ProcessWindows::OnCreateThread(const HostThread &new_thread) { 10774ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 10784ad5def9SAdrian McCarthy const HostThreadWindows &wnew_thread = new_thread.GetNativeThread(); 10794ad5def9SAdrian McCarthy m_session_data->m_new_threads[wnew_thread.GetThreadId()] = new_thread; 10804ad5def9SAdrian McCarthy } 10814ad5def9SAdrian McCarthy 10824ad5def9SAdrian McCarthy void ProcessWindows::OnExitThread(lldb::tid_t thread_id, uint32_t exit_code) { 10834ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 10844ad5def9SAdrian McCarthy 10854ad5def9SAdrian McCarthy // On a forced termination, we may get exit thread events after the session 10864ad5def9SAdrian McCarthy // data has been cleaned up. 10874ad5def9SAdrian McCarthy if (!m_session_data) 10884ad5def9SAdrian McCarthy return; 10894ad5def9SAdrian McCarthy 10904ad5def9SAdrian McCarthy // A thread may have started and exited before the debugger stopped allowing a 10914ad5def9SAdrian McCarthy // refresh. 10924ad5def9SAdrian McCarthy // Just remove it from the new threads list in that case. 10934ad5def9SAdrian McCarthy auto iter = m_session_data->m_new_threads.find(thread_id); 10944ad5def9SAdrian McCarthy if (iter != m_session_data->m_new_threads.end()) 10954ad5def9SAdrian McCarthy m_session_data->m_new_threads.erase(iter); 10964ad5def9SAdrian McCarthy else 10974ad5def9SAdrian McCarthy m_session_data->m_exited_threads.insert(thread_id); 10984ad5def9SAdrian McCarthy } 10994ad5def9SAdrian McCarthy 11004ad5def9SAdrian McCarthy void ProcessWindows::OnLoadDll(const ModuleSpec &module_spec, 11014ad5def9SAdrian McCarthy lldb::addr_t module_addr) { 1102eb6671e7SAaron Smith if (auto dyld = GetDynamicLoader()) 1103a2d9fdf5SStella Stamenova dyld->OnLoadModule(nullptr, module_spec, module_addr); 11044ad5def9SAdrian McCarthy } 11054ad5def9SAdrian McCarthy 11064ad5def9SAdrian McCarthy void ProcessWindows::OnUnloadDll(lldb::addr_t module_addr) { 1107eb6671e7SAaron Smith if (auto dyld = GetDynamicLoader()) 1108eb6671e7SAaron Smith dyld->OnUnloadModule(module_addr); 11094ad5def9SAdrian McCarthy } 11104ad5def9SAdrian McCarthy 11114ad5def9SAdrian McCarthy void ProcessWindows::OnDebugString(const std::string &string) {} 11124ad5def9SAdrian McCarthy 111397206d57SZachary Turner void ProcessWindows::OnDebuggerError(const Status &error, uint32_t type) { 11144ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 1115a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_PROCESS); 11164ad5def9SAdrian McCarthy 11174ad5def9SAdrian McCarthy if (m_session_data->m_initial_stop_received) { 111805097246SAdrian Prantl // This happened while debugging. Do we shutdown the debugging session, 111905097246SAdrian Prantl // try to continue, or do something else? 112062c76db4SStella Stamenova LLDB_LOG(log, 112162c76db4SStella Stamenova "Error {0} occurred during debugging. Unexpected behavior " 1122a385d2c1SPavel Labath "may result. {1}", 1123a385d2c1SPavel Labath error.GetError(), error); 11244ad5def9SAdrian McCarthy } else { 11254ad5def9SAdrian McCarthy // If we haven't actually launched the process yet, this was an error 112605097246SAdrian Prantl // launching the process. Set the internal error and signal the initial 112705097246SAdrian Prantl // stop event so that the DoLaunch method wakes up and returns a failure. 11284ad5def9SAdrian McCarthy m_session_data->m_launch_error = error; 11294ad5def9SAdrian McCarthy ::SetEvent(m_session_data->m_initial_stop_event); 1130a385d2c1SPavel Labath LLDB_LOG( 1131a385d2c1SPavel Labath log, 1132a385d2c1SPavel Labath "Error {0} occurred launching the process before the initial stop. {1}", 1133a385d2c1SPavel Labath error.GetError(), error); 11344ad5def9SAdrian McCarthy return; 11354ad5def9SAdrian McCarthy } 11364ad5def9SAdrian McCarthy } 11374ad5def9SAdrian McCarthy 113897206d57SZachary Turner Status ProcessWindows::WaitForDebuggerConnection(DebuggerThreadSP debugger, 11394ad5def9SAdrian McCarthy HostProcess &process) { 114097206d57SZachary Turner Status result; 1141a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_PROCESS | 1142a385d2c1SPavel Labath WINDOWS_LOG_BREAKPOINTS); 1143a385d2c1SPavel Labath LLDB_LOG(log, "Waiting for loader breakpoint."); 11444ad5def9SAdrian McCarthy 11454ad5def9SAdrian McCarthy // Block this function until we receive the initial stop from the process. 11464ad5def9SAdrian McCarthy if (::WaitForSingleObject(m_session_data->m_initial_stop_event, INFINITE) == 11474ad5def9SAdrian McCarthy WAIT_OBJECT_0) { 1148a385d2c1SPavel Labath LLDB_LOG(log, "hit loader breakpoint, returning."); 11494ad5def9SAdrian McCarthy 11504ad5def9SAdrian McCarthy process = debugger->GetProcess(); 11514ad5def9SAdrian McCarthy return m_session_data->m_launch_error; 11524ad5def9SAdrian McCarthy } else 115397206d57SZachary Turner return Status(::GetLastError(), eErrorTypeWin32); 11544ad5def9SAdrian McCarthy } 11554ad5def9SAdrian McCarthy 1156b9c1b51eSKate Stone // The Windows page protection bits are NOT independent masks that can be 115705097246SAdrian Prantl // bitwise-ORed together. For example, PAGE_EXECUTE_READ is not (PAGE_EXECUTE 115805097246SAdrian Prantl // | PAGE_READ). To test for an access type, it's necessary to test for any of 115905097246SAdrian Prantl // the bits that provide that access type. 1160b9c1b51eSKate Stone bool ProcessWindows::IsPageReadable(uint32_t protect) { 11610c35cde9SAdrian McCarthy return (protect & PAGE_NOACCESS) == 0; 11620c35cde9SAdrian McCarthy } 11630c35cde9SAdrian McCarthy 1164b9c1b51eSKate Stone bool ProcessWindows::IsPageWritable(uint32_t protect) { 1165b9c1b51eSKate Stone return (protect & (PAGE_EXECUTE_READWRITE | PAGE_EXECUTE_WRITECOPY | 1166b9c1b51eSKate Stone PAGE_READWRITE | PAGE_WRITECOPY)) != 0; 11670c35cde9SAdrian McCarthy } 11680c35cde9SAdrian McCarthy 1169b9c1b51eSKate Stone bool ProcessWindows::IsPageExecutable(uint32_t protect) { 1170b9c1b51eSKate Stone return (protect & (PAGE_EXECUTE | PAGE_EXECUTE_READ | PAGE_EXECUTE_READWRITE | 1171b9c1b51eSKate Stone PAGE_EXECUTE_WRITECOPY)) != 0; 11720c35cde9SAdrian McCarthy } 11734ad5def9SAdrian McCarthy 11744ad5def9SAdrian McCarthy } // namespace lldb_private 1175