118a9135dSAdrian McCarthy //===-- ProcessWindows.cpp --------------------------------------*- C++ -*-===// 218a9135dSAdrian McCarthy // 318a9135dSAdrian McCarthy // The LLVM Compiler Infrastructure 418a9135dSAdrian McCarthy // 518a9135dSAdrian McCarthy // This file is distributed under the University of Illinois Open Source 618a9135dSAdrian McCarthy // License. See LICENSE.TXT for details. 718a9135dSAdrian McCarthy // 818a9135dSAdrian McCarthy //===----------------------------------------------------------------------===// 918a9135dSAdrian McCarthy 1018a9135dSAdrian McCarthy #include "ProcessWindows.h" 1118a9135dSAdrian McCarthy 124ad5def9SAdrian McCarthy // Windows includes 134ad5def9SAdrian McCarthy #include "lldb/Host/windows/windows.h" 144ad5def9SAdrian McCarthy #include <psapi.h> 154ad5def9SAdrian McCarthy 1618a9135dSAdrian McCarthy // Other libraries and framework includes 1718a9135dSAdrian McCarthy #include "lldb/Core/Module.h" 1818a9135dSAdrian McCarthy #include "lldb/Core/ModuleSpec.h" 1918a9135dSAdrian McCarthy #include "lldb/Core/PluginManager.h" 2018a9135dSAdrian McCarthy #include "lldb/Core/Section.h" 214ad5def9SAdrian McCarthy #include "lldb/Host/HostNativeProcessBase.h" 224ad5def9SAdrian McCarthy #include "lldb/Host/HostProcess.h" 234ad5def9SAdrian McCarthy #include "lldb/Host/windows/HostThreadWindows.h" 240c35cde9SAdrian McCarthy #include "lldb/Host/windows/windows.h" 252f3df613SZachary Turner #include "lldb/Symbol/ObjectFile.h" 2618a9135dSAdrian McCarthy #include "lldb/Target/DynamicLoader.h" 2718a9135dSAdrian McCarthy #include "lldb/Target/MemoryRegionInfo.h" 284ad5def9SAdrian McCarthy #include "lldb/Target/StopInfo.h" 2918a9135dSAdrian McCarthy #include "lldb/Target/Target.h" 30d821c997SPavel Labath #include "lldb/Utility/State.h" 3118a9135dSAdrian McCarthy 324ad5def9SAdrian McCarthy #include "llvm/Support/ConvertUTF.h" 334ad5def9SAdrian McCarthy #include "llvm/Support/Format.h" 34c5f28e2aSKamil Rytarowski #include "llvm/Support/Threading.h" 354ad5def9SAdrian McCarthy #include "llvm/Support/raw_ostream.h" 364ad5def9SAdrian McCarthy 374ad5def9SAdrian McCarthy #include "DebuggerThread.h" 384ad5def9SAdrian McCarthy #include "ExceptionRecord.h" 394ad5def9SAdrian McCarthy #include "ForwardDecl.h" 404ad5def9SAdrian McCarthy #include "LocalDebugDelegate.h" 414ad5def9SAdrian McCarthy #include "ProcessWindowsLog.h" 424ad5def9SAdrian McCarthy #include "TargetThreadWindows.h" 434ad5def9SAdrian McCarthy 4418a9135dSAdrian McCarthy using namespace lldb; 4518a9135dSAdrian McCarthy using namespace lldb_private; 4618a9135dSAdrian McCarthy 474ad5def9SAdrian McCarthy namespace { 484ad5def9SAdrian McCarthy std::string GetProcessExecutableName(HANDLE process_handle) { 494ad5def9SAdrian McCarthy std::vector<wchar_t> file_name; 504ad5def9SAdrian McCarthy DWORD file_name_size = MAX_PATH; // first guess, not an absolute limit 514ad5def9SAdrian McCarthy DWORD copied = 0; 524ad5def9SAdrian McCarthy do { 534ad5def9SAdrian McCarthy file_name_size *= 2; 544ad5def9SAdrian McCarthy file_name.resize(file_name_size); 554ad5def9SAdrian McCarthy copied = ::GetModuleFileNameExW(process_handle, NULL, file_name.data(), 564ad5def9SAdrian McCarthy file_name_size); 574ad5def9SAdrian McCarthy } while (copied >= file_name_size); 584ad5def9SAdrian McCarthy file_name.resize(copied); 594ad5def9SAdrian McCarthy std::string result; 604ad5def9SAdrian McCarthy llvm::convertWideToUTF8(file_name.data(), result); 614ad5def9SAdrian McCarthy return result; 624ad5def9SAdrian McCarthy } 634ad5def9SAdrian McCarthy 644ad5def9SAdrian McCarthy std::string GetProcessExecutableName(DWORD pid) { 654ad5def9SAdrian McCarthy std::string file_name; 664ad5def9SAdrian McCarthy HANDLE process_handle = 674ad5def9SAdrian McCarthy ::OpenProcess(PROCESS_QUERY_INFORMATION | PROCESS_VM_READ, FALSE, pid); 684ad5def9SAdrian McCarthy if (process_handle != NULL) { 694ad5def9SAdrian McCarthy file_name = GetProcessExecutableName(process_handle); 704ad5def9SAdrian McCarthy ::CloseHandle(process_handle); 714ad5def9SAdrian McCarthy } 724ad5def9SAdrian McCarthy return file_name; 734ad5def9SAdrian McCarthy } 744ad5def9SAdrian McCarthy 75*9d5b2d4aSAleksandr Urakov DWORD ConvertLldbToWinApiProtect(uint32_t protect) { 76*9d5b2d4aSAleksandr Urakov // We also can process a read / write permissions here, but if the debugger 77*9d5b2d4aSAleksandr Urakov // will make later a write into the allocated memory, it will fail. To get 78*9d5b2d4aSAleksandr Urakov // around it is possible inside DoWriteMemory to remember memory permissions, 79*9d5b2d4aSAleksandr Urakov // allow write, write and restore permissions, but for now we process only 80*9d5b2d4aSAleksandr Urakov // the executable permission. 81*9d5b2d4aSAleksandr Urakov // 82*9d5b2d4aSAleksandr Urakov // TODO: Process permissions other than executable 83*9d5b2d4aSAleksandr Urakov if (protect & ePermissionsExecutable) 84*9d5b2d4aSAleksandr Urakov return PAGE_EXECUTE_READWRITE; 85*9d5b2d4aSAleksandr Urakov 86*9d5b2d4aSAleksandr Urakov return PAGE_READWRITE; 87*9d5b2d4aSAleksandr Urakov } 88*9d5b2d4aSAleksandr Urakov 894ad5def9SAdrian McCarthy } // anonymous namespace 904ad5def9SAdrian McCarthy 91b9c1b51eSKate Stone namespace lldb_private { 9218a9135dSAdrian McCarthy 934ad5def9SAdrian McCarthy // We store a pointer to this class in the ProcessWindows, so that we don't 9405097246SAdrian Prantl // expose Windows-specific types and implementation details from a public 9505097246SAdrian Prantl // header file. 964ad5def9SAdrian McCarthy class ProcessWindowsData { 974ad5def9SAdrian McCarthy public: 984ad5def9SAdrian McCarthy ProcessWindowsData(bool stop_at_entry) : m_stop_at_entry(stop_at_entry) { 994ad5def9SAdrian McCarthy m_initial_stop_event = ::CreateEvent(nullptr, TRUE, FALSE, nullptr); 1004ad5def9SAdrian McCarthy } 1014ad5def9SAdrian McCarthy 1024ad5def9SAdrian McCarthy ~ProcessWindowsData() { ::CloseHandle(m_initial_stop_event); } 1034ad5def9SAdrian McCarthy 10497206d57SZachary Turner Status m_launch_error; 1054ad5def9SAdrian McCarthy DebuggerThreadSP m_debugger; 1064ad5def9SAdrian McCarthy StopInfoSP m_pending_stop_info; 1074ad5def9SAdrian McCarthy HANDLE m_initial_stop_event = nullptr; 1084ad5def9SAdrian McCarthy bool m_initial_stop_received = false; 1094ad5def9SAdrian McCarthy bool m_stop_at_entry; 1104ad5def9SAdrian McCarthy std::map<lldb::tid_t, HostThread> m_new_threads; 1114ad5def9SAdrian McCarthy std::set<lldb::tid_t> m_exited_threads; 1124ad5def9SAdrian McCarthy }; 1134ad5def9SAdrian McCarthy 1144ad5def9SAdrian McCarthy ProcessSP ProcessWindows::CreateInstance(lldb::TargetSP target_sp, 1154ad5def9SAdrian McCarthy lldb::ListenerSP listener_sp, 1164ad5def9SAdrian McCarthy const FileSpec *) { 1174ad5def9SAdrian McCarthy return ProcessSP(new ProcessWindows(target_sp, listener_sp)); 1184ad5def9SAdrian McCarthy } 1194ad5def9SAdrian McCarthy 1204ad5def9SAdrian McCarthy void ProcessWindows::Initialize() { 121c5f28e2aSKamil Rytarowski static llvm::once_flag g_once_flag; 1224ad5def9SAdrian McCarthy 123c5f28e2aSKamil Rytarowski llvm::call_once(g_once_flag, []() { 1244ad5def9SAdrian McCarthy PluginManager::RegisterPlugin(GetPluginNameStatic(), 1254ad5def9SAdrian McCarthy GetPluginDescriptionStatic(), CreateInstance); 1264ad5def9SAdrian McCarthy }); 1274ad5def9SAdrian McCarthy } 1284ad5def9SAdrian McCarthy 1294ad5def9SAdrian McCarthy void ProcessWindows::Terminate() {} 1304ad5def9SAdrian McCarthy 1314ad5def9SAdrian McCarthy lldb_private::ConstString ProcessWindows::GetPluginNameStatic() { 1324ad5def9SAdrian McCarthy static ConstString g_name("windows"); 1334ad5def9SAdrian McCarthy return g_name; 1344ad5def9SAdrian McCarthy } 1354ad5def9SAdrian McCarthy 1364ad5def9SAdrian McCarthy const char *ProcessWindows::GetPluginDescriptionStatic() { 1374ad5def9SAdrian McCarthy return "Process plugin for Windows"; 1384ad5def9SAdrian McCarthy } 1394ad5def9SAdrian McCarthy 14018a9135dSAdrian McCarthy //------------------------------------------------------------------------------ 14118a9135dSAdrian McCarthy // Constructors and destructors. 14218a9135dSAdrian McCarthy 143b9c1b51eSKate Stone ProcessWindows::ProcessWindows(lldb::TargetSP target_sp, 144b9c1b51eSKate Stone lldb::ListenerSP listener_sp) 145b9c1b51eSKate Stone : lldb_private::Process(target_sp, listener_sp) {} 14618a9135dSAdrian McCarthy 147b9c1b51eSKate Stone ProcessWindows::~ProcessWindows() {} 14818a9135dSAdrian McCarthy 14997206d57SZachary Turner size_t ProcessWindows::GetSTDOUT(char *buf, size_t buf_size, Status &error) { 15018a9135dSAdrian McCarthy error.SetErrorString("GetSTDOUT unsupported on Windows"); 15118a9135dSAdrian McCarthy return 0; 15218a9135dSAdrian McCarthy } 15318a9135dSAdrian McCarthy 15497206d57SZachary Turner size_t ProcessWindows::GetSTDERR(char *buf, size_t buf_size, Status &error) { 15518a9135dSAdrian McCarthy error.SetErrorString("GetSTDERR unsupported on Windows"); 15618a9135dSAdrian McCarthy return 0; 15718a9135dSAdrian McCarthy } 15818a9135dSAdrian McCarthy 159b9c1b51eSKate Stone size_t ProcessWindows::PutSTDIN(const char *buf, size_t buf_size, 16097206d57SZachary Turner Status &error) { 16118a9135dSAdrian McCarthy error.SetErrorString("PutSTDIN unsupported on Windows"); 16218a9135dSAdrian McCarthy return 0; 16318a9135dSAdrian McCarthy } 16418a9135dSAdrian McCarthy 16518a9135dSAdrian McCarthy //------------------------------------------------------------------------------ 16618a9135dSAdrian McCarthy // ProcessInterface protocol. 16718a9135dSAdrian McCarthy 1684ad5def9SAdrian McCarthy lldb_private::ConstString ProcessWindows::GetPluginName() { 1694ad5def9SAdrian McCarthy return GetPluginNameStatic(); 1704ad5def9SAdrian McCarthy } 1714ad5def9SAdrian McCarthy 1724ad5def9SAdrian McCarthy uint32_t ProcessWindows::GetPluginVersion() { return 1; } 1734ad5def9SAdrian McCarthy 17497206d57SZachary Turner Status ProcessWindows::EnableBreakpointSite(BreakpointSite *bp_site) { 175a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_BREAKPOINTS); 176a385d2c1SPavel Labath LLDB_LOG(log, "bp_site = {0:x}, id={1}, addr={2:x}", bp_site, 177a385d2c1SPavel Labath bp_site->GetID(), bp_site->GetLoadAddress()); 1784ad5def9SAdrian McCarthy 17997206d57SZachary Turner Status error = EnableSoftwareBreakpoint(bp_site); 180a385d2c1SPavel Labath if (!error.Success()) 181a385d2c1SPavel Labath LLDB_LOG(log, "error: {0}", error); 1824ad5def9SAdrian McCarthy return error; 1834ad5def9SAdrian McCarthy } 1844ad5def9SAdrian McCarthy 18597206d57SZachary Turner Status ProcessWindows::DisableBreakpointSite(BreakpointSite *bp_site) { 186a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_BREAKPOINTS); 187a385d2c1SPavel Labath LLDB_LOG(log, "bp_site = {0:x}, id={1}, addr={2:x}", bp_site, 188a385d2c1SPavel Labath bp_site->GetID(), bp_site->GetLoadAddress()); 1894ad5def9SAdrian McCarthy 19097206d57SZachary Turner Status error = DisableSoftwareBreakpoint(bp_site); 1914ad5def9SAdrian McCarthy 192a385d2c1SPavel Labath if (!error.Success()) 193a385d2c1SPavel Labath LLDB_LOG(log, "error: {0}", error); 1944ad5def9SAdrian McCarthy return error; 1954ad5def9SAdrian McCarthy } 1964ad5def9SAdrian McCarthy 19797206d57SZachary Turner Status ProcessWindows::DoDetach(bool keep_stopped) { 198a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_PROCESS); 1994ad5def9SAdrian McCarthy DebuggerThreadSP debugger_thread; 2004ad5def9SAdrian McCarthy StateType private_state; 2014ad5def9SAdrian McCarthy { 2024ad5def9SAdrian McCarthy // Acquire the lock only long enough to get the DebuggerThread. 20305097246SAdrian Prantl // StopDebugging() will trigger a call back into ProcessWindows which will 20405097246SAdrian Prantl // also acquire the lock. Thus we have to release the lock before calling 20505097246SAdrian Prantl // StopDebugging(). 2064ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 2074ad5def9SAdrian McCarthy 2084ad5def9SAdrian McCarthy private_state = GetPrivateState(); 2094ad5def9SAdrian McCarthy 2104ad5def9SAdrian McCarthy if (!m_session_data) { 211a385d2c1SPavel Labath LLDB_LOG(log, "state = {0}, but there is no active session.", 2124ad5def9SAdrian McCarthy private_state); 21397206d57SZachary Turner return Status(); 2144ad5def9SAdrian McCarthy } 2154ad5def9SAdrian McCarthy 2164ad5def9SAdrian McCarthy debugger_thread = m_session_data->m_debugger; 2174ad5def9SAdrian McCarthy } 2184ad5def9SAdrian McCarthy 21997206d57SZachary Turner Status error; 2204ad5def9SAdrian McCarthy if (private_state != eStateExited && private_state != eStateDetached) { 221a385d2c1SPavel Labath LLDB_LOG(log, "detaching from process {0} while state = {1}.", 2224ad5def9SAdrian McCarthy debugger_thread->GetProcess().GetNativeProcess().GetSystemHandle(), 2234ad5def9SAdrian McCarthy private_state); 2244ad5def9SAdrian McCarthy error = debugger_thread->StopDebugging(false); 2254ad5def9SAdrian McCarthy if (error.Success()) { 2264ad5def9SAdrian McCarthy SetPrivateState(eStateDetached); 2274ad5def9SAdrian McCarthy } 2284ad5def9SAdrian McCarthy 2294ad5def9SAdrian McCarthy // By the time StopDebugging returns, there is no more debugger thread, so 2304ad5def9SAdrian McCarthy // we can be assured that no other thread will race for the session data. 2314ad5def9SAdrian McCarthy m_session_data.reset(); 2324ad5def9SAdrian McCarthy } else { 233a385d2c1SPavel Labath LLDB_LOG( 234a385d2c1SPavel Labath log, 235a385d2c1SPavel Labath "error: process {0} in state = {1}, but cannot destroy in this state.", 2364ad5def9SAdrian McCarthy debugger_thread->GetProcess().GetNativeProcess().GetSystemHandle(), 2374ad5def9SAdrian McCarthy private_state); 2384ad5def9SAdrian McCarthy } 2394ad5def9SAdrian McCarthy 2404ad5def9SAdrian McCarthy return error; 2414ad5def9SAdrian McCarthy } 2424ad5def9SAdrian McCarthy 24397206d57SZachary Turner Status ProcessWindows::DoLaunch(Module *exe_module, 2444ad5def9SAdrian McCarthy ProcessLaunchInfo &launch_info) { 24505097246SAdrian Prantl // Even though m_session_data is accessed here, it is before a debugger 24605097246SAdrian Prantl // thread has been kicked off. So there's no race conditions, and it 24705097246SAdrian Prantl // shouldn't be necessary to acquire the mutex. 2484ad5def9SAdrian McCarthy 249a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_PROCESS); 25097206d57SZachary Turner Status result; 2519d6fabf9SStella Stamenova 2529d6fabf9SStella Stamenova FileSpec working_dir = launch_info.GetWorkingDirectory(); 2539d6fabf9SStella Stamenova namespace fs = llvm::sys::fs; 2549d6fabf9SStella Stamenova if (working_dir && (!working_dir.ResolvePath() || 2559d6fabf9SStella Stamenova !fs::is_directory(working_dir.GetPath()))) { 2569d6fabf9SStella Stamenova result.SetErrorStringWithFormat("No such file or directory: %s", 2579d6fabf9SStella Stamenova working_dir.GetCString()); 2589d6fabf9SStella Stamenova return result; 2599d6fabf9SStella Stamenova } 2609d6fabf9SStella Stamenova 2614ad5def9SAdrian McCarthy if (!launch_info.GetFlags().Test(eLaunchFlagDebug)) { 2624ad5def9SAdrian McCarthy StreamString stream; 2634ad5def9SAdrian McCarthy stream.Printf("ProcessWindows unable to launch '%s'. ProcessWindows can " 2644ad5def9SAdrian McCarthy "only be used for debug launches.", 2654ad5def9SAdrian McCarthy launch_info.GetExecutableFile().GetPath().c_str()); 2664ad5def9SAdrian McCarthy std::string message = stream.GetString(); 2674ad5def9SAdrian McCarthy result.SetErrorString(message.c_str()); 2684ad5def9SAdrian McCarthy 269a385d2c1SPavel Labath LLDB_LOG(log, "error: {0}", message); 2704ad5def9SAdrian McCarthy return result; 2714ad5def9SAdrian McCarthy } 2724ad5def9SAdrian McCarthy 2734ad5def9SAdrian McCarthy bool stop_at_entry = launch_info.GetFlags().Test(eLaunchFlagStopAtEntry); 2744ad5def9SAdrian McCarthy m_session_data.reset(new ProcessWindowsData(stop_at_entry)); 2754ad5def9SAdrian McCarthy 2764ad5def9SAdrian McCarthy DebugDelegateSP delegate(new LocalDebugDelegate(shared_from_this())); 2774ad5def9SAdrian McCarthy m_session_data->m_debugger.reset(new DebuggerThread(delegate)); 2784ad5def9SAdrian McCarthy DebuggerThreadSP debugger = m_session_data->m_debugger; 2794ad5def9SAdrian McCarthy 2804ad5def9SAdrian McCarthy // Kick off the DebugLaunch asynchronously and wait for it to complete. 2814ad5def9SAdrian McCarthy result = debugger->DebugLaunch(launch_info); 2824ad5def9SAdrian McCarthy if (result.Fail()) { 283a385d2c1SPavel Labath LLDB_LOG(log, "failed launching '{0}'. {1}", 284a385d2c1SPavel Labath launch_info.GetExecutableFile().GetPath(), result); 2854ad5def9SAdrian McCarthy return result; 2864ad5def9SAdrian McCarthy } 2874ad5def9SAdrian McCarthy 2884ad5def9SAdrian McCarthy HostProcess process; 28997206d57SZachary Turner Status error = WaitForDebuggerConnection(debugger, process); 2904ad5def9SAdrian McCarthy if (error.Fail()) { 291a385d2c1SPavel Labath LLDB_LOG(log, "failed launching '{0}'. {1}", 292a385d2c1SPavel Labath launch_info.GetExecutableFile().GetPath(), error); 2934ad5def9SAdrian McCarthy return error; 2944ad5def9SAdrian McCarthy } 2954ad5def9SAdrian McCarthy 296a385d2c1SPavel Labath LLDB_LOG(log, "successfully launched '{0}'", 297a385d2c1SPavel Labath launch_info.GetExecutableFile().GetPath()); 2984ad5def9SAdrian McCarthy 2994ad5def9SAdrian McCarthy // We've hit the initial stop. If eLaunchFlagsStopAtEntry was specified, the 30005097246SAdrian Prantl // private state should already be set to eStateStopped as a result of 30105097246SAdrian Prantl // hitting the initial breakpoint. If it was not set, the breakpoint should 30205097246SAdrian Prantl // have already been resumed from and the private state should already be 30305097246SAdrian Prantl // eStateRunning. 3044ad5def9SAdrian McCarthy launch_info.SetProcessID(process.GetProcessId()); 3054ad5def9SAdrian McCarthy SetID(process.GetProcessId()); 3064ad5def9SAdrian McCarthy 3074ad5def9SAdrian McCarthy return result; 3084ad5def9SAdrian McCarthy } 3094ad5def9SAdrian McCarthy 31097206d57SZachary Turner Status 31197206d57SZachary Turner ProcessWindows::DoAttachToProcessWithID(lldb::pid_t pid, 31297206d57SZachary Turner const ProcessAttachInfo &attach_info) { 313a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_PROCESS); 3144ad5def9SAdrian McCarthy m_session_data.reset( 3154ad5def9SAdrian McCarthy new ProcessWindowsData(!attach_info.GetContinueOnceAttached())); 3164ad5def9SAdrian McCarthy 3174ad5def9SAdrian McCarthy DebugDelegateSP delegate(new LocalDebugDelegate(shared_from_this())); 3184ad5def9SAdrian McCarthy DebuggerThreadSP debugger(new DebuggerThread(delegate)); 3194ad5def9SAdrian McCarthy 3204ad5def9SAdrian McCarthy m_session_data->m_debugger = debugger; 3214ad5def9SAdrian McCarthy 3224ad5def9SAdrian McCarthy DWORD process_id = static_cast<DWORD>(pid); 32397206d57SZachary Turner Status error = debugger->DebugAttach(process_id, attach_info); 3244ad5def9SAdrian McCarthy if (error.Fail()) { 325a385d2c1SPavel Labath LLDB_LOG( 326a385d2c1SPavel Labath log, 327a385d2c1SPavel Labath "encountered an error occurred initiating the asynchronous attach. {0}", 328a385d2c1SPavel Labath error); 3294ad5def9SAdrian McCarthy return error; 3304ad5def9SAdrian McCarthy } 3314ad5def9SAdrian McCarthy 3324ad5def9SAdrian McCarthy HostProcess process; 3334ad5def9SAdrian McCarthy error = WaitForDebuggerConnection(debugger, process); 3344ad5def9SAdrian McCarthy if (error.Fail()) { 335a385d2c1SPavel Labath LLDB_LOG(log, 336a385d2c1SPavel Labath "encountered an error waiting for the debugger to connect. {0}", 337a385d2c1SPavel Labath error); 3384ad5def9SAdrian McCarthy return error; 3394ad5def9SAdrian McCarthy } 3404ad5def9SAdrian McCarthy 341a385d2c1SPavel Labath LLDB_LOG(log, "successfully attached to process with pid={0}", process_id); 3424ad5def9SAdrian McCarthy 3434ad5def9SAdrian McCarthy // We've hit the initial stop. If eLaunchFlagsStopAtEntry was specified, the 34405097246SAdrian Prantl // private state should already be set to eStateStopped as a result of 34505097246SAdrian Prantl // hitting the initial breakpoint. If it was not set, the breakpoint should 34605097246SAdrian Prantl // have already been resumed from and the private state should already be 34705097246SAdrian Prantl // eStateRunning. 3484ad5def9SAdrian McCarthy SetID(process.GetProcessId()); 3494ad5def9SAdrian McCarthy return error; 3504ad5def9SAdrian McCarthy } 3514ad5def9SAdrian McCarthy 35297206d57SZachary Turner Status ProcessWindows::DoResume() { 353a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_PROCESS); 3544ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 35597206d57SZachary Turner Status error; 3564ad5def9SAdrian McCarthy 3574ad5def9SAdrian McCarthy StateType private_state = GetPrivateState(); 3584ad5def9SAdrian McCarthy if (private_state == eStateStopped || private_state == eStateCrashed) { 359a385d2c1SPavel Labath LLDB_LOG(log, "process {0} is in state {1}. Resuming...", 3604ad5def9SAdrian McCarthy m_session_data->m_debugger->GetProcess().GetProcessId(), 3614ad5def9SAdrian McCarthy GetPrivateState()); 3624ad5def9SAdrian McCarthy 3634ad5def9SAdrian McCarthy ExceptionRecordSP active_exception = 3644ad5def9SAdrian McCarthy m_session_data->m_debugger->GetActiveException().lock(); 3654ad5def9SAdrian McCarthy if (active_exception) { 36605097246SAdrian Prantl // Resume the process and continue processing debug events. Mask the 36705097246SAdrian Prantl // exception so that from the process's view, there is no indication that 36805097246SAdrian Prantl // anything happened. 3694ad5def9SAdrian McCarthy m_session_data->m_debugger->ContinueAsyncException( 3704ad5def9SAdrian McCarthy ExceptionResult::MaskException); 3714ad5def9SAdrian McCarthy } 3724ad5def9SAdrian McCarthy 373a385d2c1SPavel Labath LLDB_LOG(log, "resuming {0} threads.", m_thread_list.GetSize()); 3744ad5def9SAdrian McCarthy 3750fd67b53SStella Stamenova bool failed = false; 3764ad5def9SAdrian McCarthy for (uint32_t i = 0; i < m_thread_list.GetSize(); ++i) { 3774ad5def9SAdrian McCarthy auto thread = std::static_pointer_cast<TargetThreadWindows>( 3784ad5def9SAdrian McCarthy m_thread_list.GetThreadAtIndex(i)); 3790fd67b53SStella Stamenova Status result = thread->DoResume(); 3800fd67b53SStella Stamenova if (result.Fail()) { 3810fd67b53SStella Stamenova failed = true; 38262c76db4SStella Stamenova LLDB_LOG( 38362c76db4SStella Stamenova log, 38462c76db4SStella Stamenova "Trying to resume thread at index {0}, but failed with error {1}.", 38562c76db4SStella Stamenova i, result); 3860fd67b53SStella Stamenova } 3874ad5def9SAdrian McCarthy } 3884ad5def9SAdrian McCarthy 3890fd67b53SStella Stamenova if (failed) { 3900fd67b53SStella Stamenova error.SetErrorString("ProcessWindows::DoResume failed"); 3910fd67b53SStella Stamenova return error; 3920fd67b53SStella Stamenova } else { 3934ad5def9SAdrian McCarthy SetPrivateState(eStateRunning); 3940fd67b53SStella Stamenova } 3954ad5def9SAdrian McCarthy } else { 396a385d2c1SPavel Labath LLDB_LOG(log, "error: process %I64u is in state %u. Returning...", 3974ad5def9SAdrian McCarthy m_session_data->m_debugger->GetProcess().GetProcessId(), 3984ad5def9SAdrian McCarthy GetPrivateState()); 3994ad5def9SAdrian McCarthy } 4004ad5def9SAdrian McCarthy return error; 4014ad5def9SAdrian McCarthy } 4024ad5def9SAdrian McCarthy 40397206d57SZachary Turner Status ProcessWindows::DoDestroy() { 404a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_PROCESS); 4054ad5def9SAdrian McCarthy DebuggerThreadSP debugger_thread; 4064ad5def9SAdrian McCarthy StateType private_state; 4074ad5def9SAdrian McCarthy { 4084ad5def9SAdrian McCarthy // Acquire this lock inside an inner scope, only long enough to get the 40905097246SAdrian Prantl // DebuggerThread. StopDebugging() will trigger a call back into 41005097246SAdrian Prantl // ProcessWindows which will acquire the lock again, so we need to not 41105097246SAdrian Prantl // deadlock. 4124ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 4134ad5def9SAdrian McCarthy 4144ad5def9SAdrian McCarthy private_state = GetPrivateState(); 4154ad5def9SAdrian McCarthy 4164ad5def9SAdrian McCarthy if (!m_session_data) { 417a385d2c1SPavel Labath LLDB_LOG(log, "warning: state = {0}, but there is no active session.", 4184ad5def9SAdrian McCarthy private_state); 41997206d57SZachary Turner return Status(); 4204ad5def9SAdrian McCarthy } 4214ad5def9SAdrian McCarthy 4224ad5def9SAdrian McCarthy debugger_thread = m_session_data->m_debugger; 4234ad5def9SAdrian McCarthy } 4244ad5def9SAdrian McCarthy 42597206d57SZachary Turner Status error; 4264ad5def9SAdrian McCarthy if (private_state != eStateExited && private_state != eStateDetached) { 427a385d2c1SPavel Labath LLDB_LOG(log, "Shutting down process {0} while state = {1}.", 4284ad5def9SAdrian McCarthy debugger_thread->GetProcess().GetNativeProcess().GetSystemHandle(), 4294ad5def9SAdrian McCarthy private_state); 4304ad5def9SAdrian McCarthy error = debugger_thread->StopDebugging(true); 4314ad5def9SAdrian McCarthy 4324ad5def9SAdrian McCarthy // By the time StopDebugging returns, there is no more debugger thread, so 4334ad5def9SAdrian McCarthy // we can be assured that no other thread will race for the session data. 4344ad5def9SAdrian McCarthy m_session_data.reset(); 4354ad5def9SAdrian McCarthy } else { 436a385d2c1SPavel Labath LLDB_LOG(log, "cannot destroy process {0} while state = {1}", 4374ad5def9SAdrian McCarthy debugger_thread->GetProcess().GetNativeProcess().GetSystemHandle(), 4384ad5def9SAdrian McCarthy private_state); 4394ad5def9SAdrian McCarthy } 4404ad5def9SAdrian McCarthy 4414ad5def9SAdrian McCarthy return error; 4424ad5def9SAdrian McCarthy } 4434ad5def9SAdrian McCarthy 44497206d57SZachary Turner Status ProcessWindows::DoHalt(bool &caused_stop) { 445a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_PROCESS); 44697206d57SZachary Turner Status error; 4474ad5def9SAdrian McCarthy StateType state = GetPrivateState(); 4484ad5def9SAdrian McCarthy if (state == eStateStopped) 4494ad5def9SAdrian McCarthy caused_stop = false; 4504ad5def9SAdrian McCarthy else { 4514ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 4524ad5def9SAdrian McCarthy caused_stop = ::DebugBreakProcess(m_session_data->m_debugger->GetProcess() 4534ad5def9SAdrian McCarthy .GetNativeProcess() 4544ad5def9SAdrian McCarthy .GetSystemHandle()); 4554ad5def9SAdrian McCarthy if (!caused_stop) { 4564ad5def9SAdrian McCarthy error.SetError(::GetLastError(), eErrorTypeWin32); 457a385d2c1SPavel Labath LLDB_LOG(log, "DebugBreakProcess failed with error {0}", error); 4584ad5def9SAdrian McCarthy } 4594ad5def9SAdrian McCarthy } 4604ad5def9SAdrian McCarthy return error; 4614ad5def9SAdrian McCarthy } 4624ad5def9SAdrian McCarthy 4634ad5def9SAdrian McCarthy void ProcessWindows::DidLaunch() { 4644ad5def9SAdrian McCarthy ArchSpec arch_spec; 4654ad5def9SAdrian McCarthy DidAttach(arch_spec); 4664ad5def9SAdrian McCarthy } 4674ad5def9SAdrian McCarthy 4684ad5def9SAdrian McCarthy void ProcessWindows::DidAttach(ArchSpec &arch_spec) { 4694ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 4704ad5def9SAdrian McCarthy 4714ad5def9SAdrian McCarthy // The initial stop won't broadcast the state change event, so account for 4724ad5def9SAdrian McCarthy // that here. 4734ad5def9SAdrian McCarthy if (m_session_data && GetPrivateState() == eStateStopped && 4744ad5def9SAdrian McCarthy m_session_data->m_stop_at_entry) 4754ad5def9SAdrian McCarthy RefreshStateAfterStop(); 4764ad5def9SAdrian McCarthy } 4774ad5def9SAdrian McCarthy 4784ad5def9SAdrian McCarthy void ProcessWindows::RefreshStateAfterStop() { 479a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_EXCEPTION); 4804ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 4814ad5def9SAdrian McCarthy 4824ad5def9SAdrian McCarthy if (!m_session_data) { 483a385d2c1SPavel Labath LLDB_LOG(log, "no active session. Returning..."); 4844ad5def9SAdrian McCarthy return; 4854ad5def9SAdrian McCarthy } 4864ad5def9SAdrian McCarthy 4874ad5def9SAdrian McCarthy m_thread_list.RefreshStateAfterStop(); 4884ad5def9SAdrian McCarthy 4894ad5def9SAdrian McCarthy std::weak_ptr<ExceptionRecord> exception_record = 4904ad5def9SAdrian McCarthy m_session_data->m_debugger->GetActiveException(); 4914ad5def9SAdrian McCarthy ExceptionRecordSP active_exception = exception_record.lock(); 4924ad5def9SAdrian McCarthy if (!active_exception) { 49362c76db4SStella Stamenova LLDB_LOG(log, 49462c76db4SStella Stamenova "there is no active exception in process {0}. Why is the " 495a385d2c1SPavel Labath "process stopped?", 4964ad5def9SAdrian McCarthy m_session_data->m_debugger->GetProcess().GetProcessId()); 4974ad5def9SAdrian McCarthy return; 4984ad5def9SAdrian McCarthy } 4994ad5def9SAdrian McCarthy 5004ad5def9SAdrian McCarthy StopInfoSP stop_info; 5014ad5def9SAdrian McCarthy m_thread_list.SetSelectedThreadByID(active_exception->GetThreadID()); 5024ad5def9SAdrian McCarthy ThreadSP stop_thread = m_thread_list.GetSelectedThread(); 5034ad5def9SAdrian McCarthy if (!stop_thread) 5044ad5def9SAdrian McCarthy return; 5054ad5def9SAdrian McCarthy 5064ad5def9SAdrian McCarthy switch (active_exception->GetExceptionCode()) { 5074ad5def9SAdrian McCarthy case EXCEPTION_SINGLE_STEP: { 5084ad5def9SAdrian McCarthy RegisterContextSP register_context = stop_thread->GetRegisterContext(); 5094ad5def9SAdrian McCarthy const uint64_t pc = register_context->GetPC(); 5104ad5def9SAdrian McCarthy BreakpointSiteSP site(GetBreakpointSiteList().FindByAddress(pc)); 5114ad5def9SAdrian McCarthy if (site && site->ValidForThisThread(stop_thread.get())) { 51262c76db4SStella Stamenova LLDB_LOG(log, 51362c76db4SStella Stamenova "Single-stepped onto a breakpoint in process {0} at " 514a385d2c1SPavel Labath "address {1:x} with breakpoint site {2}", 5154ad5def9SAdrian McCarthy m_session_data->m_debugger->GetProcess().GetProcessId(), pc, 5164ad5def9SAdrian McCarthy site->GetID()); 5174ad5def9SAdrian McCarthy stop_info = StopInfo::CreateStopReasonWithBreakpointSiteID(*stop_thread, 5184ad5def9SAdrian McCarthy site->GetID()); 5194ad5def9SAdrian McCarthy stop_thread->SetStopInfo(stop_info); 5204ad5def9SAdrian McCarthy } else { 521a385d2c1SPavel Labath LLDB_LOG(log, "single stepping thread {0}", stop_thread->GetID()); 5224ad5def9SAdrian McCarthy stop_info = StopInfo::CreateStopReasonToTrace(*stop_thread); 5234ad5def9SAdrian McCarthy stop_thread->SetStopInfo(stop_info); 5244ad5def9SAdrian McCarthy } 5254ad5def9SAdrian McCarthy return; 5264ad5def9SAdrian McCarthy } 5274ad5def9SAdrian McCarthy 5284ad5def9SAdrian McCarthy case EXCEPTION_BREAKPOINT: { 5294ad5def9SAdrian McCarthy RegisterContextSP register_context = stop_thread->GetRegisterContext(); 5304ad5def9SAdrian McCarthy 5314ad5def9SAdrian McCarthy // The current EIP is AFTER the BP opcode, which is one byte. 5324ad5def9SAdrian McCarthy uint64_t pc = register_context->GetPC() - 1; 5334ad5def9SAdrian McCarthy 5344ad5def9SAdrian McCarthy BreakpointSiteSP site(GetBreakpointSiteList().FindByAddress(pc)); 5354ad5def9SAdrian McCarthy if (site) { 53662c76db4SStella Stamenova LLDB_LOG(log, 53762c76db4SStella Stamenova "detected breakpoint in process {0} at address {1:x} with " 538a385d2c1SPavel Labath "breakpoint site {2}", 5394ad5def9SAdrian McCarthy m_session_data->m_debugger->GetProcess().GetProcessId(), pc, 5404ad5def9SAdrian McCarthy site->GetID()); 5414ad5def9SAdrian McCarthy 5424ad5def9SAdrian McCarthy if (site->ValidForThisThread(stop_thread.get())) { 54362c76db4SStella Stamenova LLDB_LOG(log, 54462c76db4SStella Stamenova "Breakpoint site {0} is valid for this thread ({1:x}), " 5454ad5def9SAdrian McCarthy "creating stop info.", 5464ad5def9SAdrian McCarthy site->GetID(), stop_thread->GetID()); 5474ad5def9SAdrian McCarthy 5484ad5def9SAdrian McCarthy stop_info = StopInfo::CreateStopReasonWithBreakpointSiteID( 5494ad5def9SAdrian McCarthy *stop_thread, site->GetID()); 5504ad5def9SAdrian McCarthy register_context->SetPC(pc); 5514ad5def9SAdrian McCarthy } else { 55262c76db4SStella Stamenova LLDB_LOG(log, 55362c76db4SStella Stamenova "Breakpoint site {0} is not valid for this thread, " 5544ad5def9SAdrian McCarthy "creating empty stop info.", 5554ad5def9SAdrian McCarthy site->GetID()); 5564ad5def9SAdrian McCarthy } 5574ad5def9SAdrian McCarthy stop_thread->SetStopInfo(stop_info); 5584ad5def9SAdrian McCarthy return; 5594ad5def9SAdrian McCarthy } else { 5604ad5def9SAdrian McCarthy // The thread hit a hard-coded breakpoint like an `int 3` or 5614ad5def9SAdrian McCarthy // `__debugbreak()`. 562a385d2c1SPavel Labath LLDB_LOG(log, 5634ad5def9SAdrian McCarthy "No breakpoint site matches for this thread. __debugbreak()? " 5644ad5def9SAdrian McCarthy "Creating stop info with the exception."); 5654ad5def9SAdrian McCarthy // FALLTHROUGH: We'll treat this as a generic exception record in the 5664ad5def9SAdrian McCarthy // default case. 5674ad5def9SAdrian McCarthy } 5684ad5def9SAdrian McCarthy } 5694ad5def9SAdrian McCarthy 5704ad5def9SAdrian McCarthy default: { 5714ad5def9SAdrian McCarthy std::string desc; 5724ad5def9SAdrian McCarthy llvm::raw_string_ostream desc_stream(desc); 5734ad5def9SAdrian McCarthy desc_stream << "Exception " 5744ad5def9SAdrian McCarthy << llvm::format_hex(active_exception->GetExceptionCode(), 8) 5754ad5def9SAdrian McCarthy << " encountered at address " 5764ad5def9SAdrian McCarthy << llvm::format_hex(active_exception->GetExceptionAddress(), 8); 5774ad5def9SAdrian McCarthy stop_info = StopInfo::CreateStopReasonWithException( 5784ad5def9SAdrian McCarthy *stop_thread, desc_stream.str().c_str()); 5794ad5def9SAdrian McCarthy stop_thread->SetStopInfo(stop_info); 580a385d2c1SPavel Labath LLDB_LOG(log, "{0}", desc_stream.str()); 5814ad5def9SAdrian McCarthy return; 5824ad5def9SAdrian McCarthy } 5834ad5def9SAdrian McCarthy } 5844ad5def9SAdrian McCarthy } 5854ad5def9SAdrian McCarthy 5864ad5def9SAdrian McCarthy bool ProcessWindows::CanDebug(lldb::TargetSP target_sp, 5874ad5def9SAdrian McCarthy bool plugin_specified_by_name) { 5884ad5def9SAdrian McCarthy if (plugin_specified_by_name) 5894ad5def9SAdrian McCarthy return true; 5904ad5def9SAdrian McCarthy 5914ad5def9SAdrian McCarthy // For now we are just making sure the file exists for a given module 5924ad5def9SAdrian McCarthy ModuleSP exe_module_sp(target_sp->GetExecutableModule()); 5934ad5def9SAdrian McCarthy if (exe_module_sp.get()) 5944ad5def9SAdrian McCarthy return exe_module_sp->GetFileSpec().Exists(); 59505097246SAdrian Prantl // However, if there is no executable module, we return true since we might 59605097246SAdrian Prantl // be preparing to attach. 5974ad5def9SAdrian McCarthy return true; 5984ad5def9SAdrian McCarthy } 5994ad5def9SAdrian McCarthy 6004ad5def9SAdrian McCarthy bool ProcessWindows::UpdateThreadList(ThreadList &old_thread_list, 6014ad5def9SAdrian McCarthy ThreadList &new_thread_list) { 602a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_THREAD); 6034ad5def9SAdrian McCarthy // Add all the threads that were previously running and for which we did not 6044ad5def9SAdrian McCarthy // detect a thread exited event. 6054ad5def9SAdrian McCarthy int new_size = 0; 6064ad5def9SAdrian McCarthy int continued_threads = 0; 6074ad5def9SAdrian McCarthy int exited_threads = 0; 6084ad5def9SAdrian McCarthy int new_threads = 0; 6094ad5def9SAdrian McCarthy 6104ad5def9SAdrian McCarthy for (ThreadSP old_thread : old_thread_list.Threads()) { 6114ad5def9SAdrian McCarthy lldb::tid_t old_thread_id = old_thread->GetID(); 6124ad5def9SAdrian McCarthy auto exited_thread_iter = 6134ad5def9SAdrian McCarthy m_session_data->m_exited_threads.find(old_thread_id); 6144ad5def9SAdrian McCarthy if (exited_thread_iter == m_session_data->m_exited_threads.end()) { 6154ad5def9SAdrian McCarthy new_thread_list.AddThread(old_thread); 6164ad5def9SAdrian McCarthy ++new_size; 6174ad5def9SAdrian McCarthy ++continued_threads; 618a385d2c1SPavel Labath LLDB_LOGV(log, "Thread {0} was running and is still running.", 6194ad5def9SAdrian McCarthy old_thread_id); 6204ad5def9SAdrian McCarthy } else { 621a385d2c1SPavel Labath LLDB_LOGV(log, "Thread {0} was running and has exited.", old_thread_id); 6224ad5def9SAdrian McCarthy ++exited_threads; 6234ad5def9SAdrian McCarthy } 6244ad5def9SAdrian McCarthy } 6254ad5def9SAdrian McCarthy 62605097246SAdrian Prantl // Also add all the threads that are new since the last time we broke into 62705097246SAdrian Prantl // the debugger. 6284ad5def9SAdrian McCarthy for (const auto &thread_info : m_session_data->m_new_threads) { 6294ad5def9SAdrian McCarthy ThreadSP thread(new TargetThreadWindows(*this, thread_info.second)); 6304ad5def9SAdrian McCarthy thread->SetID(thread_info.first); 6314ad5def9SAdrian McCarthy new_thread_list.AddThread(thread); 6324ad5def9SAdrian McCarthy ++new_size; 6334ad5def9SAdrian McCarthy ++new_threads; 634a385d2c1SPavel Labath LLDB_LOGV(log, "Thread {0} is new since last update.", thread_info.first); 6354ad5def9SAdrian McCarthy } 6364ad5def9SAdrian McCarthy 637a385d2c1SPavel Labath LLDB_LOG(log, "{0} new threads, {1} old threads, {2} exited threads.", 6384ad5def9SAdrian McCarthy new_threads, continued_threads, exited_threads); 6394ad5def9SAdrian McCarthy 6404ad5def9SAdrian McCarthy m_session_data->m_new_threads.clear(); 6414ad5def9SAdrian McCarthy m_session_data->m_exited_threads.clear(); 6424ad5def9SAdrian McCarthy 6434ad5def9SAdrian McCarthy return new_size > 0; 6444ad5def9SAdrian McCarthy } 6454ad5def9SAdrian McCarthy 6464ad5def9SAdrian McCarthy bool ProcessWindows::IsAlive() { 6474ad5def9SAdrian McCarthy StateType state = GetPrivateState(); 6484ad5def9SAdrian McCarthy switch (state) { 6494ad5def9SAdrian McCarthy case eStateCrashed: 6504ad5def9SAdrian McCarthy case eStateDetached: 6514ad5def9SAdrian McCarthy case eStateUnloaded: 6524ad5def9SAdrian McCarthy case eStateExited: 6534ad5def9SAdrian McCarthy case eStateInvalid: 6544ad5def9SAdrian McCarthy return false; 6554ad5def9SAdrian McCarthy default: 6564ad5def9SAdrian McCarthy return true; 6574ad5def9SAdrian McCarthy } 6584ad5def9SAdrian McCarthy } 6594ad5def9SAdrian McCarthy 6604ad5def9SAdrian McCarthy size_t ProcessWindows::DoReadMemory(lldb::addr_t vm_addr, void *buf, 66197206d57SZachary Turner size_t size, Status &error) { 662a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_MEMORY); 6634ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 6644ad5def9SAdrian McCarthy 6654ad5def9SAdrian McCarthy if (!m_session_data) 6664ad5def9SAdrian McCarthy return 0; 6674ad5def9SAdrian McCarthy 668a385d2c1SPavel Labath LLDB_LOG(log, "attempting to read {0} bytes from address {1:x}", size, 669a385d2c1SPavel Labath vm_addr); 6704ad5def9SAdrian McCarthy 6714ad5def9SAdrian McCarthy HostProcess process = m_session_data->m_debugger->GetProcess(); 6724ad5def9SAdrian McCarthy void *addr = reinterpret_cast<void *>(vm_addr); 6734ad5def9SAdrian McCarthy SIZE_T bytes_read = 0; 6744ad5def9SAdrian McCarthy if (!ReadProcessMemory(process.GetNativeProcess().GetSystemHandle(), addr, 6754ad5def9SAdrian McCarthy buf, size, &bytes_read)) { 67662c76db4SStella Stamenova // Reading from the process can fail for a number of reasons - set the 67762c76db4SStella Stamenova // error code and make sure that the number of bytes read is set back to 0 67862c76db4SStella Stamenova // because in some scenarios the value of bytes_read returned from the API 67962c76db4SStella Stamenova // is garbage. 6804ad5def9SAdrian McCarthy error.SetError(GetLastError(), eErrorTypeWin32); 681a385d2c1SPavel Labath LLDB_LOG(log, "reading failed with error: {0}", error); 68262c76db4SStella Stamenova bytes_read = 0; 6834ad5def9SAdrian McCarthy } 6844ad5def9SAdrian McCarthy return bytes_read; 6854ad5def9SAdrian McCarthy } 6864ad5def9SAdrian McCarthy 6874ad5def9SAdrian McCarthy size_t ProcessWindows::DoWriteMemory(lldb::addr_t vm_addr, const void *buf, 68897206d57SZachary Turner size_t size, Status &error) { 689a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_MEMORY); 6904ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 691a385d2c1SPavel Labath LLDB_LOG(log, "attempting to write {0} bytes into address {1:x}", size, 6924ad5def9SAdrian McCarthy vm_addr); 6934ad5def9SAdrian McCarthy 6944ad5def9SAdrian McCarthy if (!m_session_data) { 695a385d2c1SPavel Labath LLDB_LOG(log, "cannot write, there is no active debugger connection."); 6964ad5def9SAdrian McCarthy return 0; 6974ad5def9SAdrian McCarthy } 6984ad5def9SAdrian McCarthy 6994ad5def9SAdrian McCarthy HostProcess process = m_session_data->m_debugger->GetProcess(); 7004ad5def9SAdrian McCarthy void *addr = reinterpret_cast<void *>(vm_addr); 7014ad5def9SAdrian McCarthy SIZE_T bytes_written = 0; 7024ad5def9SAdrian McCarthy lldb::process_t handle = process.GetNativeProcess().GetSystemHandle(); 7034ad5def9SAdrian McCarthy if (WriteProcessMemory(handle, addr, buf, size, &bytes_written)) 7044ad5def9SAdrian McCarthy FlushInstructionCache(handle, addr, bytes_written); 7054ad5def9SAdrian McCarthy else { 7064ad5def9SAdrian McCarthy error.SetError(GetLastError(), eErrorTypeWin32); 707a385d2c1SPavel Labath LLDB_LOG(log, "writing failed with error: {0}", error); 7084ad5def9SAdrian McCarthy } 7094ad5def9SAdrian McCarthy return bytes_written; 7104ad5def9SAdrian McCarthy } 7114ad5def9SAdrian McCarthy 712*9d5b2d4aSAleksandr Urakov lldb::addr_t ProcessWindows::DoAllocateMemory(size_t size, uint32_t permissions, 713*9d5b2d4aSAleksandr Urakov Status &error) { 714*9d5b2d4aSAleksandr Urakov Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_MEMORY); 715*9d5b2d4aSAleksandr Urakov llvm::sys::ScopedLock lock(m_mutex); 716*9d5b2d4aSAleksandr Urakov LLDB_LOG(log, "attempting to allocate {0} bytes with permissions {1}", size, 717*9d5b2d4aSAleksandr Urakov permissions); 718*9d5b2d4aSAleksandr Urakov 719*9d5b2d4aSAleksandr Urakov if (!m_session_data) { 720*9d5b2d4aSAleksandr Urakov LLDB_LOG(log, "cannot allocate, there is no active debugger connection."); 721*9d5b2d4aSAleksandr Urakov error.SetErrorString( 722*9d5b2d4aSAleksandr Urakov "cannot allocate, there is no active debugger connection"); 723*9d5b2d4aSAleksandr Urakov return 0; 724*9d5b2d4aSAleksandr Urakov } 725*9d5b2d4aSAleksandr Urakov 726*9d5b2d4aSAleksandr Urakov HostProcess process = m_session_data->m_debugger->GetProcess(); 727*9d5b2d4aSAleksandr Urakov lldb::process_t handle = process.GetNativeProcess().GetSystemHandle(); 728*9d5b2d4aSAleksandr Urakov auto protect = ConvertLldbToWinApiProtect(permissions); 729*9d5b2d4aSAleksandr Urakov auto result = VirtualAllocEx(handle, nullptr, size, MEM_COMMIT, protect); 730*9d5b2d4aSAleksandr Urakov if (!result) { 731*9d5b2d4aSAleksandr Urakov error.SetError(GetLastError(), eErrorTypeWin32); 732*9d5b2d4aSAleksandr Urakov LLDB_LOG(log, "allocating failed with error: {0}", error); 733*9d5b2d4aSAleksandr Urakov return 0; 734*9d5b2d4aSAleksandr Urakov } 735*9d5b2d4aSAleksandr Urakov 736*9d5b2d4aSAleksandr Urakov return reinterpret_cast<addr_t>(result); 737*9d5b2d4aSAleksandr Urakov } 738*9d5b2d4aSAleksandr Urakov 739*9d5b2d4aSAleksandr Urakov Status ProcessWindows::DoDeallocateMemory(lldb::addr_t ptr) { 740*9d5b2d4aSAleksandr Urakov Status result; 741*9d5b2d4aSAleksandr Urakov 742*9d5b2d4aSAleksandr Urakov Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_MEMORY); 743*9d5b2d4aSAleksandr Urakov llvm::sys::ScopedLock lock(m_mutex); 744*9d5b2d4aSAleksandr Urakov LLDB_LOG(log, "attempting to deallocate bytes at address {0}", ptr); 745*9d5b2d4aSAleksandr Urakov 746*9d5b2d4aSAleksandr Urakov if (!m_session_data) { 747*9d5b2d4aSAleksandr Urakov LLDB_LOG(log, "cannot deallocate, there is no active debugger connection."); 748*9d5b2d4aSAleksandr Urakov result.SetErrorString( 749*9d5b2d4aSAleksandr Urakov "cannot deallocate, there is no active debugger connection"); 750*9d5b2d4aSAleksandr Urakov return result; 751*9d5b2d4aSAleksandr Urakov } 752*9d5b2d4aSAleksandr Urakov 753*9d5b2d4aSAleksandr Urakov HostProcess process = m_session_data->m_debugger->GetProcess(); 754*9d5b2d4aSAleksandr Urakov lldb::process_t handle = process.GetNativeProcess().GetSystemHandle(); 755*9d5b2d4aSAleksandr Urakov if (!VirtualFreeEx(handle, reinterpret_cast<LPVOID>(ptr), 0, MEM_RELEASE)) { 756*9d5b2d4aSAleksandr Urakov result.SetError(GetLastError(), eErrorTypeWin32); 757*9d5b2d4aSAleksandr Urakov LLDB_LOG(log, "deallocating failed with error: {0}", result); 758*9d5b2d4aSAleksandr Urakov return result; 759*9d5b2d4aSAleksandr Urakov } 760*9d5b2d4aSAleksandr Urakov 761*9d5b2d4aSAleksandr Urakov return result; 762*9d5b2d4aSAleksandr Urakov } 763*9d5b2d4aSAleksandr Urakov 76497206d57SZachary Turner Status ProcessWindows::GetMemoryRegionInfo(lldb::addr_t vm_addr, 7654ad5def9SAdrian McCarthy MemoryRegionInfo &info) { 766a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_MEMORY); 76797206d57SZachary Turner Status error; 7684ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 7694ad5def9SAdrian McCarthy info.Clear(); 7704ad5def9SAdrian McCarthy 7714ad5def9SAdrian McCarthy if (!m_session_data) { 7724ad5def9SAdrian McCarthy error.SetErrorString( 7734ad5def9SAdrian McCarthy "GetMemoryRegionInfo called with no debugging session."); 774a385d2c1SPavel Labath LLDB_LOG(log, "error: {0}", error); 7754ad5def9SAdrian McCarthy return error; 7764ad5def9SAdrian McCarthy } 7774ad5def9SAdrian McCarthy HostProcess process = m_session_data->m_debugger->GetProcess(); 7784ad5def9SAdrian McCarthy lldb::process_t handle = process.GetNativeProcess().GetSystemHandle(); 7794ad5def9SAdrian McCarthy if (handle == nullptr || handle == LLDB_INVALID_PROCESS) { 7804ad5def9SAdrian McCarthy error.SetErrorString( 7814ad5def9SAdrian McCarthy "GetMemoryRegionInfo called with an invalid target process."); 782a385d2c1SPavel Labath LLDB_LOG(log, "error: {0}", error); 7834ad5def9SAdrian McCarthy return error; 7844ad5def9SAdrian McCarthy } 7854ad5def9SAdrian McCarthy 786a385d2c1SPavel Labath LLDB_LOG(log, "getting info for address {0:x}", vm_addr); 7874ad5def9SAdrian McCarthy 7884ad5def9SAdrian McCarthy void *addr = reinterpret_cast<void *>(vm_addr); 7894ad5def9SAdrian McCarthy MEMORY_BASIC_INFORMATION mem_info = {}; 7904ad5def9SAdrian McCarthy SIZE_T result = ::VirtualQueryEx(handle, addr, &mem_info, sizeof(mem_info)); 7914ad5def9SAdrian McCarthy if (result == 0) { 7924ad5def9SAdrian McCarthy if (::GetLastError() == ERROR_INVALID_PARAMETER) { 79305097246SAdrian Prantl // ERROR_INVALID_PARAMETER is returned if VirtualQueryEx is called with 79405097246SAdrian Prantl // an address past the highest accessible address. We should return a 79505097246SAdrian Prantl // range from the vm_addr to LLDB_INVALID_ADDRESS 7964ad5def9SAdrian McCarthy info.GetRange().SetRangeBase(vm_addr); 7974ad5def9SAdrian McCarthy info.GetRange().SetRangeEnd(LLDB_INVALID_ADDRESS); 7984ad5def9SAdrian McCarthy info.SetReadable(MemoryRegionInfo::eNo); 7994ad5def9SAdrian McCarthy info.SetExecutable(MemoryRegionInfo::eNo); 8004ad5def9SAdrian McCarthy info.SetWritable(MemoryRegionInfo::eNo); 8014ad5def9SAdrian McCarthy info.SetMapped(MemoryRegionInfo::eNo); 8024ad5def9SAdrian McCarthy return error; 8034ad5def9SAdrian McCarthy } else { 8044ad5def9SAdrian McCarthy error.SetError(::GetLastError(), eErrorTypeWin32); 80562c76db4SStella Stamenova LLDB_LOG(log, 80662c76db4SStella Stamenova "VirtualQueryEx returned error {0} while getting memory " 807a385d2c1SPavel Labath "region info for address {1:x}", 808a385d2c1SPavel Labath error, vm_addr); 8094ad5def9SAdrian McCarthy return error; 8104ad5def9SAdrian McCarthy } 8114ad5def9SAdrian McCarthy } 8124ad5def9SAdrian McCarthy 8134ad5def9SAdrian McCarthy // Protect bits are only valid for MEM_COMMIT regions. 8144ad5def9SAdrian McCarthy if (mem_info.State == MEM_COMMIT) { 8154ad5def9SAdrian McCarthy const bool readable = IsPageReadable(mem_info.Protect); 8164ad5def9SAdrian McCarthy const bool executable = IsPageExecutable(mem_info.Protect); 8174ad5def9SAdrian McCarthy const bool writable = IsPageWritable(mem_info.Protect); 8184ad5def9SAdrian McCarthy info.SetReadable(readable ? MemoryRegionInfo::eYes : MemoryRegionInfo::eNo); 8194ad5def9SAdrian McCarthy info.SetExecutable(executable ? MemoryRegionInfo::eYes 8204ad5def9SAdrian McCarthy : MemoryRegionInfo::eNo); 8214ad5def9SAdrian McCarthy info.SetWritable(writable ? MemoryRegionInfo::eYes : MemoryRegionInfo::eNo); 8224ad5def9SAdrian McCarthy } else { 8234ad5def9SAdrian McCarthy info.SetReadable(MemoryRegionInfo::eNo); 8244ad5def9SAdrian McCarthy info.SetExecutable(MemoryRegionInfo::eNo); 8254ad5def9SAdrian McCarthy info.SetWritable(MemoryRegionInfo::eNo); 8264ad5def9SAdrian McCarthy } 8274ad5def9SAdrian McCarthy 8284ad5def9SAdrian McCarthy // AllocationBase is defined for MEM_COMMIT and MEM_RESERVE but not MEM_FREE. 8294ad5def9SAdrian McCarthy if (mem_info.State != MEM_FREE) { 8304ad5def9SAdrian McCarthy info.GetRange().SetRangeBase( 8314ad5def9SAdrian McCarthy reinterpret_cast<addr_t>(mem_info.AllocationBase)); 8324ad5def9SAdrian McCarthy info.GetRange().SetRangeEnd(reinterpret_cast<addr_t>(mem_info.BaseAddress) + 8334ad5def9SAdrian McCarthy mem_info.RegionSize); 8344ad5def9SAdrian McCarthy info.SetMapped(MemoryRegionInfo::eYes); 8354ad5def9SAdrian McCarthy } else { 8364ad5def9SAdrian McCarthy // In the unmapped case we need to return the distance to the next block of 83705097246SAdrian Prantl // memory. VirtualQueryEx nearly does that except that it gives the 83805097246SAdrian Prantl // distance from the start of the page containing vm_addr. 8394ad5def9SAdrian McCarthy SYSTEM_INFO data; 8404ad5def9SAdrian McCarthy GetSystemInfo(&data); 8414ad5def9SAdrian McCarthy DWORD page_offset = vm_addr % data.dwPageSize; 8424ad5def9SAdrian McCarthy info.GetRange().SetRangeBase(vm_addr); 8434ad5def9SAdrian McCarthy info.GetRange().SetByteSize(mem_info.RegionSize - page_offset); 8444ad5def9SAdrian McCarthy info.SetMapped(MemoryRegionInfo::eNo); 8454ad5def9SAdrian McCarthy } 8464ad5def9SAdrian McCarthy 8474ad5def9SAdrian McCarthy error.SetError(::GetLastError(), eErrorTypeWin32); 84862c76db4SStella Stamenova LLDB_LOGV(log, 84962c76db4SStella Stamenova "Memory region info for address {0}: readable={1}, " 850a385d2c1SPavel Labath "executable={2}, writable={3}", 851a385d2c1SPavel Labath vm_addr, info.GetReadable(), info.GetExecutable(), 852a385d2c1SPavel Labath info.GetWritable()); 8534ad5def9SAdrian McCarthy return error; 8544ad5def9SAdrian McCarthy } 8554ad5def9SAdrian McCarthy 856b9c1b51eSKate Stone lldb::addr_t ProcessWindows::GetImageInfoAddress() { 85718a9135dSAdrian McCarthy Target &target = GetTarget(); 85818a9135dSAdrian McCarthy ObjectFile *obj_file = target.GetExecutableModule()->GetObjectFile(); 85918a9135dSAdrian McCarthy Address addr = obj_file->GetImageInfoAddress(&target); 86018a9135dSAdrian McCarthy if (addr.IsValid()) 86118a9135dSAdrian McCarthy return addr.GetLoadAddress(&target); 86218a9135dSAdrian McCarthy else 86318a9135dSAdrian McCarthy return LLDB_INVALID_ADDRESS; 86418a9135dSAdrian McCarthy } 86518a9135dSAdrian McCarthy 8664ad5def9SAdrian McCarthy void ProcessWindows::OnExitProcess(uint32_t exit_code) { 8674ad5def9SAdrian McCarthy // No need to acquire the lock since m_session_data isn't accessed. 868a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_PROCESS); 869a385d2c1SPavel Labath LLDB_LOG(log, "Process {0} exited with code {1}", GetID(), exit_code); 8704ad5def9SAdrian McCarthy 871d7e126c4SJim Ingham TargetSP target = CalculateTarget(); 8724ad5def9SAdrian McCarthy if (target) { 8734ad5def9SAdrian McCarthy ModuleSP executable_module = target->GetExecutableModule(); 8744ad5def9SAdrian McCarthy ModuleList unloaded_modules; 8754ad5def9SAdrian McCarthy unloaded_modules.Append(executable_module); 8764ad5def9SAdrian McCarthy target->ModulesDidUnload(unloaded_modules, true); 8774ad5def9SAdrian McCarthy } 8784ad5def9SAdrian McCarthy 8794ad5def9SAdrian McCarthy SetProcessExitStatus(GetID(), true, 0, exit_code); 8804ad5def9SAdrian McCarthy SetPrivateState(eStateExited); 881e3037904SAaron Smith 882e3037904SAaron Smith // If the process exits before any initial stop then notify the debugger 883e3037904SAaron Smith // of the error otherwise WaitForDebuggerConnection() will be blocked. 884e3037904SAaron Smith // An example of this issue is when a process fails to load a dependent DLL. 885e3037904SAaron Smith if (!m_session_data->m_initial_stop_received) { 886e3037904SAaron Smith Status error(exit_code, eErrorTypeWin32); 887e3037904SAaron Smith OnDebuggerError(error, 0); 888e3037904SAaron Smith } 8894ad5def9SAdrian McCarthy } 8904ad5def9SAdrian McCarthy 8914ad5def9SAdrian McCarthy void ProcessWindows::OnDebuggerConnected(lldb::addr_t image_base) { 8924ad5def9SAdrian McCarthy DebuggerThreadSP debugger = m_session_data->m_debugger; 893a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_PROCESS); 894a385d2c1SPavel Labath LLDB_LOG(log, "Debugger connected to process {0}. Image base = {1:x}", 8954ad5def9SAdrian McCarthy debugger->GetProcess().GetProcessId(), image_base); 8964ad5def9SAdrian McCarthy 8974ad5def9SAdrian McCarthy ModuleSP module = GetTarget().GetExecutableModule(); 8984ad5def9SAdrian McCarthy if (!module) { 8994ad5def9SAdrian McCarthy // During attach, we won't have the executable module, so find it now. 9004ad5def9SAdrian McCarthy const DWORD pid = debugger->GetProcess().GetProcessId(); 9014ad5def9SAdrian McCarthy const std::string file_name = GetProcessExecutableName(pid); 9024ad5def9SAdrian McCarthy if (file_name.empty()) { 9034ad5def9SAdrian McCarthy return; 9044ad5def9SAdrian McCarthy } 9054ad5def9SAdrian McCarthy 9064ad5def9SAdrian McCarthy FileSpec executable_file(file_name, true); 9074ad5def9SAdrian McCarthy ModuleSpec module_spec(executable_file); 90897206d57SZachary Turner Status error; 9094ad5def9SAdrian McCarthy module = GetTarget().GetSharedModule(module_spec, &error); 9104ad5def9SAdrian McCarthy if (!module) { 9114ad5def9SAdrian McCarthy return; 9124ad5def9SAdrian McCarthy } 9134ad5def9SAdrian McCarthy 914d54ee88aSTatyana Krasnukha GetTarget().SetExecutableModule(module, eLoadDependentsNo); 9154ad5def9SAdrian McCarthy } 9164ad5def9SAdrian McCarthy 9174ad5def9SAdrian McCarthy bool load_addr_changed; 9184ad5def9SAdrian McCarthy module->SetLoadAddress(GetTarget(), image_base, false, load_addr_changed); 9194ad5def9SAdrian McCarthy 9204ad5def9SAdrian McCarthy ModuleList loaded_modules; 9214ad5def9SAdrian McCarthy loaded_modules.Append(module); 9224ad5def9SAdrian McCarthy GetTarget().ModulesDidLoad(loaded_modules); 9234ad5def9SAdrian McCarthy 9244ad5def9SAdrian McCarthy // Add the main executable module to the list of pending module loads. We 92505097246SAdrian Prantl // can't call GetTarget().ModulesDidLoad() here because we still haven't 92605097246SAdrian Prantl // returned from DoLaunch() / DoAttach() yet so the target may not have set 92705097246SAdrian Prantl // the process instance to `this` yet. 9284ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 9294ad5def9SAdrian McCarthy const HostThreadWindows &wmain_thread = 9304ad5def9SAdrian McCarthy debugger->GetMainThread().GetNativeThread(); 9314ad5def9SAdrian McCarthy m_session_data->m_new_threads[wmain_thread.GetThreadId()] = 9324ad5def9SAdrian McCarthy debugger->GetMainThread(); 9334ad5def9SAdrian McCarthy } 9344ad5def9SAdrian McCarthy 9354ad5def9SAdrian McCarthy ExceptionResult 9364ad5def9SAdrian McCarthy ProcessWindows::OnDebugException(bool first_chance, 9374ad5def9SAdrian McCarthy const ExceptionRecord &record) { 938a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_EXCEPTION); 9394ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 9404ad5def9SAdrian McCarthy 9414ad5def9SAdrian McCarthy // FIXME: Without this check, occasionally when running the test suite there 9424ad5def9SAdrian McCarthy // is 9434ad5def9SAdrian McCarthy // an issue where m_session_data can be null. It's not clear how this could 94405097246SAdrian Prantl // happen but it only surfaces while running the test suite. In order to 94505097246SAdrian Prantl // properly diagnose this, we probably need to first figure allow the test 94605097246SAdrian Prantl // suite to print out full lldb logs, and then add logging to the process 94705097246SAdrian Prantl // plugin. 9484ad5def9SAdrian McCarthy if (!m_session_data) { 94962c76db4SStella Stamenova LLDB_LOG(log, 95062c76db4SStella Stamenova "Debugger thread reported exception {0:x} at address {1:x}, " 951a385d2c1SPavel Labath "but there is no session.", 9524ad5def9SAdrian McCarthy record.GetExceptionCode(), record.GetExceptionAddress()); 9534ad5def9SAdrian McCarthy return ExceptionResult::SendToApplication; 9544ad5def9SAdrian McCarthy } 9554ad5def9SAdrian McCarthy 9564ad5def9SAdrian McCarthy if (!first_chance) { 9574ad5def9SAdrian McCarthy // Any second chance exception is an application crash by definition. 9584ad5def9SAdrian McCarthy SetPrivateState(eStateCrashed); 9594ad5def9SAdrian McCarthy } 9604ad5def9SAdrian McCarthy 9614ad5def9SAdrian McCarthy ExceptionResult result = ExceptionResult::SendToApplication; 9624ad5def9SAdrian McCarthy switch (record.GetExceptionCode()) { 9634ad5def9SAdrian McCarthy case EXCEPTION_BREAKPOINT: 9644ad5def9SAdrian McCarthy // Handle breakpoints at the first chance. 9654ad5def9SAdrian McCarthy result = ExceptionResult::BreakInDebugger; 9664ad5def9SAdrian McCarthy 9674ad5def9SAdrian McCarthy if (!m_session_data->m_initial_stop_received) { 968a385d2c1SPavel Labath LLDB_LOG( 969a385d2c1SPavel Labath log, 970a385d2c1SPavel Labath "Hit loader breakpoint at address {0:x}, setting initial stop event.", 9714ad5def9SAdrian McCarthy record.GetExceptionAddress()); 9724ad5def9SAdrian McCarthy m_session_data->m_initial_stop_received = true; 9734ad5def9SAdrian McCarthy ::SetEvent(m_session_data->m_initial_stop_event); 9744ad5def9SAdrian McCarthy } else { 975a385d2c1SPavel Labath LLDB_LOG(log, "Hit non-loader breakpoint at address {0:x}.", 9764ad5def9SAdrian McCarthy record.GetExceptionAddress()); 9774ad5def9SAdrian McCarthy } 9784ad5def9SAdrian McCarthy SetPrivateState(eStateStopped); 9794ad5def9SAdrian McCarthy break; 9804ad5def9SAdrian McCarthy case EXCEPTION_SINGLE_STEP: 9814ad5def9SAdrian McCarthy result = ExceptionResult::BreakInDebugger; 9824ad5def9SAdrian McCarthy SetPrivateState(eStateStopped); 9834ad5def9SAdrian McCarthy break; 9844ad5def9SAdrian McCarthy default: 98562c76db4SStella Stamenova LLDB_LOG(log, 98662c76db4SStella Stamenova "Debugger thread reported exception {0:x} at address {1:x} " 987a385d2c1SPavel Labath "(first_chance={2})", 9884ad5def9SAdrian McCarthy record.GetExceptionCode(), record.GetExceptionAddress(), 989a385d2c1SPavel Labath first_chance); 9904ad5def9SAdrian McCarthy // For non-breakpoints, give the application a chance to handle the 9914ad5def9SAdrian McCarthy // exception first. 9924ad5def9SAdrian McCarthy if (first_chance) 9934ad5def9SAdrian McCarthy result = ExceptionResult::SendToApplication; 9944ad5def9SAdrian McCarthy else 9954ad5def9SAdrian McCarthy result = ExceptionResult::BreakInDebugger; 9964ad5def9SAdrian McCarthy } 9974ad5def9SAdrian McCarthy 9984ad5def9SAdrian McCarthy return result; 9994ad5def9SAdrian McCarthy } 10004ad5def9SAdrian McCarthy 10014ad5def9SAdrian McCarthy void ProcessWindows::OnCreateThread(const HostThread &new_thread) { 10024ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 10034ad5def9SAdrian McCarthy const HostThreadWindows &wnew_thread = new_thread.GetNativeThread(); 10044ad5def9SAdrian McCarthy m_session_data->m_new_threads[wnew_thread.GetThreadId()] = new_thread; 10054ad5def9SAdrian McCarthy } 10064ad5def9SAdrian McCarthy 10074ad5def9SAdrian McCarthy void ProcessWindows::OnExitThread(lldb::tid_t thread_id, uint32_t exit_code) { 10084ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 10094ad5def9SAdrian McCarthy 10104ad5def9SAdrian McCarthy // On a forced termination, we may get exit thread events after the session 10114ad5def9SAdrian McCarthy // data has been cleaned up. 10124ad5def9SAdrian McCarthy if (!m_session_data) 10134ad5def9SAdrian McCarthy return; 10144ad5def9SAdrian McCarthy 10154ad5def9SAdrian McCarthy // A thread may have started and exited before the debugger stopped allowing a 10164ad5def9SAdrian McCarthy // refresh. 10174ad5def9SAdrian McCarthy // Just remove it from the new threads list in that case. 10184ad5def9SAdrian McCarthy auto iter = m_session_data->m_new_threads.find(thread_id); 10194ad5def9SAdrian McCarthy if (iter != m_session_data->m_new_threads.end()) 10204ad5def9SAdrian McCarthy m_session_data->m_new_threads.erase(iter); 10214ad5def9SAdrian McCarthy else 10224ad5def9SAdrian McCarthy m_session_data->m_exited_threads.insert(thread_id); 10234ad5def9SAdrian McCarthy } 10244ad5def9SAdrian McCarthy 10254ad5def9SAdrian McCarthy void ProcessWindows::OnLoadDll(const ModuleSpec &module_spec, 10264ad5def9SAdrian McCarthy lldb::addr_t module_addr) { 10274ad5def9SAdrian McCarthy // Confusingly, there is no Target::AddSharedModule. Instead, calling 102805097246SAdrian Prantl // GetSharedModule() with a new module will add it to the module list and 102905097246SAdrian Prantl // return a corresponding ModuleSP. 103097206d57SZachary Turner Status error; 10314ad5def9SAdrian McCarthy ModuleSP module = GetTarget().GetSharedModule(module_spec, &error); 10324ad5def9SAdrian McCarthy bool load_addr_changed = false; 10334ad5def9SAdrian McCarthy module->SetLoadAddress(GetTarget(), module_addr, false, load_addr_changed); 10344ad5def9SAdrian McCarthy 10354ad5def9SAdrian McCarthy ModuleList loaded_modules; 10364ad5def9SAdrian McCarthy loaded_modules.Append(module); 10374ad5def9SAdrian McCarthy GetTarget().ModulesDidLoad(loaded_modules); 10384ad5def9SAdrian McCarthy } 10394ad5def9SAdrian McCarthy 10404ad5def9SAdrian McCarthy void ProcessWindows::OnUnloadDll(lldb::addr_t module_addr) { 10414ad5def9SAdrian McCarthy Address resolved_addr; 10424ad5def9SAdrian McCarthy if (GetTarget().ResolveLoadAddress(module_addr, resolved_addr)) { 10434ad5def9SAdrian McCarthy ModuleSP module = resolved_addr.GetModule(); 10444ad5def9SAdrian McCarthy if (module) { 10454ad5def9SAdrian McCarthy ModuleList unloaded_modules; 10464ad5def9SAdrian McCarthy unloaded_modules.Append(module); 10474ad5def9SAdrian McCarthy GetTarget().ModulesDidUnload(unloaded_modules, false); 10484ad5def9SAdrian McCarthy } 10494ad5def9SAdrian McCarthy } 10504ad5def9SAdrian McCarthy } 10514ad5def9SAdrian McCarthy 10524ad5def9SAdrian McCarthy void ProcessWindows::OnDebugString(const std::string &string) {} 10534ad5def9SAdrian McCarthy 105497206d57SZachary Turner void ProcessWindows::OnDebuggerError(const Status &error, uint32_t type) { 10554ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 1056a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_PROCESS); 10574ad5def9SAdrian McCarthy 10584ad5def9SAdrian McCarthy if (m_session_data->m_initial_stop_received) { 105905097246SAdrian Prantl // This happened while debugging. Do we shutdown the debugging session, 106005097246SAdrian Prantl // try to continue, or do something else? 106162c76db4SStella Stamenova LLDB_LOG(log, 106262c76db4SStella Stamenova "Error {0} occurred during debugging. Unexpected behavior " 1063a385d2c1SPavel Labath "may result. {1}", 1064a385d2c1SPavel Labath error.GetError(), error); 10654ad5def9SAdrian McCarthy } else { 10664ad5def9SAdrian McCarthy // If we haven't actually launched the process yet, this was an error 106705097246SAdrian Prantl // launching the process. Set the internal error and signal the initial 106805097246SAdrian Prantl // stop event so that the DoLaunch method wakes up and returns a failure. 10694ad5def9SAdrian McCarthy m_session_data->m_launch_error = error; 10704ad5def9SAdrian McCarthy ::SetEvent(m_session_data->m_initial_stop_event); 1071a385d2c1SPavel Labath LLDB_LOG( 1072a385d2c1SPavel Labath log, 1073a385d2c1SPavel Labath "Error {0} occurred launching the process before the initial stop. {1}", 1074a385d2c1SPavel Labath error.GetError(), error); 10754ad5def9SAdrian McCarthy return; 10764ad5def9SAdrian McCarthy } 10774ad5def9SAdrian McCarthy } 10784ad5def9SAdrian McCarthy 107997206d57SZachary Turner Status ProcessWindows::WaitForDebuggerConnection(DebuggerThreadSP debugger, 10804ad5def9SAdrian McCarthy HostProcess &process) { 108197206d57SZachary Turner Status result; 1082a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_PROCESS | 1083a385d2c1SPavel Labath WINDOWS_LOG_BREAKPOINTS); 1084a385d2c1SPavel Labath LLDB_LOG(log, "Waiting for loader breakpoint."); 10854ad5def9SAdrian McCarthy 10864ad5def9SAdrian McCarthy // Block this function until we receive the initial stop from the process. 10874ad5def9SAdrian McCarthy if (::WaitForSingleObject(m_session_data->m_initial_stop_event, INFINITE) == 10884ad5def9SAdrian McCarthy WAIT_OBJECT_0) { 1089a385d2c1SPavel Labath LLDB_LOG(log, "hit loader breakpoint, returning."); 10904ad5def9SAdrian McCarthy 10914ad5def9SAdrian McCarthy process = debugger->GetProcess(); 10924ad5def9SAdrian McCarthy return m_session_data->m_launch_error; 10934ad5def9SAdrian McCarthy } else 109497206d57SZachary Turner return Status(::GetLastError(), eErrorTypeWin32); 10954ad5def9SAdrian McCarthy } 10964ad5def9SAdrian McCarthy 1097b9c1b51eSKate Stone // The Windows page protection bits are NOT independent masks that can be 109805097246SAdrian Prantl // bitwise-ORed together. For example, PAGE_EXECUTE_READ is not (PAGE_EXECUTE 109905097246SAdrian Prantl // | PAGE_READ). To test for an access type, it's necessary to test for any of 110005097246SAdrian Prantl // the bits that provide that access type. 1101b9c1b51eSKate Stone bool ProcessWindows::IsPageReadable(uint32_t protect) { 11020c35cde9SAdrian McCarthy return (protect & PAGE_NOACCESS) == 0; 11030c35cde9SAdrian McCarthy } 11040c35cde9SAdrian McCarthy 1105b9c1b51eSKate Stone bool ProcessWindows::IsPageWritable(uint32_t protect) { 1106b9c1b51eSKate Stone return (protect & (PAGE_EXECUTE_READWRITE | PAGE_EXECUTE_WRITECOPY | 1107b9c1b51eSKate Stone PAGE_READWRITE | PAGE_WRITECOPY)) != 0; 11080c35cde9SAdrian McCarthy } 11090c35cde9SAdrian McCarthy 1110b9c1b51eSKate Stone bool ProcessWindows::IsPageExecutable(uint32_t protect) { 1111b9c1b51eSKate Stone return (protect & (PAGE_EXECUTE | PAGE_EXECUTE_READ | PAGE_EXECUTE_READWRITE | 1112b9c1b51eSKate Stone PAGE_EXECUTE_WRITECOPY)) != 0; 11130c35cde9SAdrian McCarthy } 11144ad5def9SAdrian McCarthy 11154ad5def9SAdrian McCarthy } // namespace lldb_private 1116