118a9135dSAdrian McCarthy //===-- ProcessWindows.cpp --------------------------------------*- C++ -*-===// 218a9135dSAdrian McCarthy // 32946cd70SChandler Carruth // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. 42946cd70SChandler Carruth // See https://llvm.org/LICENSE.txt for license information. 52946cd70SChandler Carruth // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 618a9135dSAdrian McCarthy // 718a9135dSAdrian McCarthy //===----------------------------------------------------------------------===// 818a9135dSAdrian McCarthy 918a9135dSAdrian McCarthy #include "ProcessWindows.h" 1018a9135dSAdrian McCarthy 114ad5def9SAdrian McCarthy // Windows includes 124ad5def9SAdrian McCarthy #include "lldb/Host/windows/windows.h" 134ad5def9SAdrian McCarthy #include <psapi.h> 144ad5def9SAdrian McCarthy 1518a9135dSAdrian McCarthy #include "lldb/Core/Module.h" 1618a9135dSAdrian McCarthy #include "lldb/Core/ModuleSpec.h" 1718a9135dSAdrian McCarthy #include "lldb/Core/PluginManager.h" 1818a9135dSAdrian McCarthy #include "lldb/Core/Section.h" 1960cf3f82SJonas Devlieghere #include "lldb/Host/FileSystem.h" 204ad5def9SAdrian McCarthy #include "lldb/Host/HostNativeProcessBase.h" 214ad5def9SAdrian McCarthy #include "lldb/Host/HostProcess.h" 224ad5def9SAdrian McCarthy #include "lldb/Host/windows/HostThreadWindows.h" 230c35cde9SAdrian McCarthy #include "lldb/Host/windows/windows.h" 242f3df613SZachary Turner #include "lldb/Symbol/ObjectFile.h" 2518a9135dSAdrian McCarthy #include "lldb/Target/DynamicLoader.h" 2618a9135dSAdrian McCarthy #include "lldb/Target/MemoryRegionInfo.h" 274ad5def9SAdrian McCarthy #include "lldb/Target/StopInfo.h" 2818a9135dSAdrian McCarthy #include "lldb/Target/Target.h" 29d821c997SPavel Labath #include "lldb/Utility/State.h" 3018a9135dSAdrian McCarthy 314ad5def9SAdrian McCarthy #include "llvm/Support/ConvertUTF.h" 324ad5def9SAdrian McCarthy #include "llvm/Support/Format.h" 33c5f28e2aSKamil Rytarowski #include "llvm/Support/Threading.h" 344ad5def9SAdrian McCarthy #include "llvm/Support/raw_ostream.h" 354ad5def9SAdrian McCarthy 364ad5def9SAdrian McCarthy #include "DebuggerThread.h" 374ad5def9SAdrian McCarthy #include "ExceptionRecord.h" 384ad5def9SAdrian McCarthy #include "ForwardDecl.h" 394ad5def9SAdrian McCarthy #include "LocalDebugDelegate.h" 404ad5def9SAdrian McCarthy #include "ProcessWindowsLog.h" 414ad5def9SAdrian McCarthy #include "TargetThreadWindows.h" 424ad5def9SAdrian McCarthy 4318a9135dSAdrian McCarthy using namespace lldb; 4418a9135dSAdrian McCarthy using namespace lldb_private; 4518a9135dSAdrian McCarthy 464ad5def9SAdrian McCarthy namespace { 474ad5def9SAdrian McCarthy std::string GetProcessExecutableName(HANDLE process_handle) { 484ad5def9SAdrian McCarthy std::vector<wchar_t> file_name; 494ad5def9SAdrian McCarthy DWORD file_name_size = MAX_PATH; // first guess, not an absolute limit 504ad5def9SAdrian McCarthy DWORD copied = 0; 514ad5def9SAdrian McCarthy do { 524ad5def9SAdrian McCarthy file_name_size *= 2; 534ad5def9SAdrian McCarthy file_name.resize(file_name_size); 544ad5def9SAdrian McCarthy copied = ::GetModuleFileNameExW(process_handle, NULL, file_name.data(), 554ad5def9SAdrian McCarthy file_name_size); 564ad5def9SAdrian McCarthy } while (copied >= file_name_size); 574ad5def9SAdrian McCarthy file_name.resize(copied); 584ad5def9SAdrian McCarthy std::string result; 594ad5def9SAdrian McCarthy llvm::convertWideToUTF8(file_name.data(), result); 604ad5def9SAdrian McCarthy return result; 614ad5def9SAdrian McCarthy } 624ad5def9SAdrian McCarthy 634ad5def9SAdrian McCarthy std::string GetProcessExecutableName(DWORD pid) { 644ad5def9SAdrian McCarthy std::string file_name; 654ad5def9SAdrian McCarthy HANDLE process_handle = 664ad5def9SAdrian McCarthy ::OpenProcess(PROCESS_QUERY_INFORMATION | PROCESS_VM_READ, FALSE, pid); 674ad5def9SAdrian McCarthy if (process_handle != NULL) { 684ad5def9SAdrian McCarthy file_name = GetProcessExecutableName(process_handle); 694ad5def9SAdrian McCarthy ::CloseHandle(process_handle); 704ad5def9SAdrian McCarthy } 714ad5def9SAdrian McCarthy return file_name; 724ad5def9SAdrian McCarthy } 734ad5def9SAdrian McCarthy 749d5b2d4aSAleksandr Urakov DWORD ConvertLldbToWinApiProtect(uint32_t protect) { 759d5b2d4aSAleksandr Urakov // We also can process a read / write permissions here, but if the debugger 769d5b2d4aSAleksandr Urakov // will make later a write into the allocated memory, it will fail. To get 779d5b2d4aSAleksandr Urakov // around it is possible inside DoWriteMemory to remember memory permissions, 789d5b2d4aSAleksandr Urakov // allow write, write and restore permissions, but for now we process only 799d5b2d4aSAleksandr Urakov // the executable permission. 809d5b2d4aSAleksandr Urakov // 819d5b2d4aSAleksandr Urakov // TODO: Process permissions other than executable 829d5b2d4aSAleksandr Urakov if (protect & ePermissionsExecutable) 839d5b2d4aSAleksandr Urakov return PAGE_EXECUTE_READWRITE; 849d5b2d4aSAleksandr Urakov 859d5b2d4aSAleksandr Urakov return PAGE_READWRITE; 869d5b2d4aSAleksandr Urakov } 879d5b2d4aSAleksandr Urakov 884ad5def9SAdrian McCarthy } // anonymous namespace 894ad5def9SAdrian McCarthy 90b9c1b51eSKate Stone namespace lldb_private { 9118a9135dSAdrian McCarthy 924ad5def9SAdrian McCarthy // We store a pointer to this class in the ProcessWindows, so that we don't 9305097246SAdrian Prantl // expose Windows-specific types and implementation details from a public 9405097246SAdrian Prantl // header file. 954ad5def9SAdrian McCarthy class ProcessWindowsData { 964ad5def9SAdrian McCarthy public: 974ad5def9SAdrian McCarthy ProcessWindowsData(bool stop_at_entry) : m_stop_at_entry(stop_at_entry) { 984ad5def9SAdrian McCarthy m_initial_stop_event = ::CreateEvent(nullptr, TRUE, FALSE, nullptr); 994ad5def9SAdrian McCarthy } 1004ad5def9SAdrian McCarthy 1014ad5def9SAdrian McCarthy ~ProcessWindowsData() { ::CloseHandle(m_initial_stop_event); } 1024ad5def9SAdrian McCarthy 10397206d57SZachary Turner Status m_launch_error; 1044ad5def9SAdrian McCarthy DebuggerThreadSP m_debugger; 1054ad5def9SAdrian McCarthy StopInfoSP m_pending_stop_info; 1064ad5def9SAdrian McCarthy HANDLE m_initial_stop_event = nullptr; 1074ad5def9SAdrian McCarthy bool m_initial_stop_received = false; 1084ad5def9SAdrian McCarthy bool m_stop_at_entry; 1094ad5def9SAdrian McCarthy std::map<lldb::tid_t, HostThread> m_new_threads; 1104ad5def9SAdrian McCarthy std::set<lldb::tid_t> m_exited_threads; 1114ad5def9SAdrian McCarthy }; 1124ad5def9SAdrian McCarthy 1134ad5def9SAdrian McCarthy ProcessSP ProcessWindows::CreateInstance(lldb::TargetSP target_sp, 1144ad5def9SAdrian McCarthy lldb::ListenerSP listener_sp, 1154ad5def9SAdrian McCarthy const FileSpec *) { 1164ad5def9SAdrian McCarthy return ProcessSP(new ProcessWindows(target_sp, listener_sp)); 1174ad5def9SAdrian McCarthy } 1184ad5def9SAdrian McCarthy 1194ad5def9SAdrian McCarthy void ProcessWindows::Initialize() { 120c5f28e2aSKamil Rytarowski static llvm::once_flag g_once_flag; 1214ad5def9SAdrian McCarthy 122c5f28e2aSKamil Rytarowski llvm::call_once(g_once_flag, []() { 1234ad5def9SAdrian McCarthy PluginManager::RegisterPlugin(GetPluginNameStatic(), 1244ad5def9SAdrian McCarthy GetPluginDescriptionStatic(), CreateInstance); 1254ad5def9SAdrian McCarthy }); 1264ad5def9SAdrian McCarthy } 1274ad5def9SAdrian McCarthy 1284ad5def9SAdrian McCarthy void ProcessWindows::Terminate() {} 1294ad5def9SAdrian McCarthy 1304ad5def9SAdrian McCarthy lldb_private::ConstString ProcessWindows::GetPluginNameStatic() { 1314ad5def9SAdrian McCarthy static ConstString g_name("windows"); 1324ad5def9SAdrian McCarthy return g_name; 1334ad5def9SAdrian McCarthy } 1344ad5def9SAdrian McCarthy 1354ad5def9SAdrian McCarthy const char *ProcessWindows::GetPluginDescriptionStatic() { 1364ad5def9SAdrian McCarthy return "Process plugin for Windows"; 1374ad5def9SAdrian McCarthy } 1384ad5def9SAdrian McCarthy 13918a9135dSAdrian McCarthy // Constructors and destructors. 14018a9135dSAdrian McCarthy 141b9c1b51eSKate Stone ProcessWindows::ProcessWindows(lldb::TargetSP target_sp, 142b9c1b51eSKate Stone lldb::ListenerSP listener_sp) 143b9c1b51eSKate Stone : lldb_private::Process(target_sp, listener_sp) {} 14418a9135dSAdrian McCarthy 145b9c1b51eSKate Stone ProcessWindows::~ProcessWindows() {} 14618a9135dSAdrian McCarthy 14797206d57SZachary Turner size_t ProcessWindows::GetSTDOUT(char *buf, size_t buf_size, Status &error) { 14818a9135dSAdrian McCarthy error.SetErrorString("GetSTDOUT unsupported on Windows"); 14918a9135dSAdrian McCarthy return 0; 15018a9135dSAdrian McCarthy } 15118a9135dSAdrian McCarthy 15297206d57SZachary Turner size_t ProcessWindows::GetSTDERR(char *buf, size_t buf_size, Status &error) { 15318a9135dSAdrian McCarthy error.SetErrorString("GetSTDERR unsupported on Windows"); 15418a9135dSAdrian McCarthy return 0; 15518a9135dSAdrian McCarthy } 15618a9135dSAdrian McCarthy 157b9c1b51eSKate Stone size_t ProcessWindows::PutSTDIN(const char *buf, size_t buf_size, 15897206d57SZachary Turner Status &error) { 15918a9135dSAdrian McCarthy error.SetErrorString("PutSTDIN unsupported on Windows"); 16018a9135dSAdrian McCarthy return 0; 16118a9135dSAdrian McCarthy } 16218a9135dSAdrian McCarthy 16318a9135dSAdrian McCarthy // ProcessInterface protocol. 16418a9135dSAdrian McCarthy 1654ad5def9SAdrian McCarthy lldb_private::ConstString ProcessWindows::GetPluginName() { 1664ad5def9SAdrian McCarthy return GetPluginNameStatic(); 1674ad5def9SAdrian McCarthy } 1684ad5def9SAdrian McCarthy 1694ad5def9SAdrian McCarthy uint32_t ProcessWindows::GetPluginVersion() { return 1; } 1704ad5def9SAdrian McCarthy 17197206d57SZachary Turner Status ProcessWindows::EnableBreakpointSite(BreakpointSite *bp_site) { 172a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_BREAKPOINTS); 173a385d2c1SPavel Labath LLDB_LOG(log, "bp_site = {0:x}, id={1}, addr={2:x}", bp_site, 174a385d2c1SPavel Labath bp_site->GetID(), bp_site->GetLoadAddress()); 1754ad5def9SAdrian McCarthy 17697206d57SZachary Turner Status error = EnableSoftwareBreakpoint(bp_site); 177a385d2c1SPavel Labath if (!error.Success()) 178a385d2c1SPavel Labath LLDB_LOG(log, "error: {0}", error); 1794ad5def9SAdrian McCarthy return error; 1804ad5def9SAdrian McCarthy } 1814ad5def9SAdrian McCarthy 18297206d57SZachary Turner Status ProcessWindows::DisableBreakpointSite(BreakpointSite *bp_site) { 183a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_BREAKPOINTS); 184a385d2c1SPavel Labath LLDB_LOG(log, "bp_site = {0:x}, id={1}, addr={2:x}", bp_site, 185a385d2c1SPavel Labath bp_site->GetID(), bp_site->GetLoadAddress()); 1864ad5def9SAdrian McCarthy 18797206d57SZachary Turner Status error = DisableSoftwareBreakpoint(bp_site); 1884ad5def9SAdrian McCarthy 189a385d2c1SPavel Labath if (!error.Success()) 190a385d2c1SPavel Labath LLDB_LOG(log, "error: {0}", error); 1914ad5def9SAdrian McCarthy return error; 1924ad5def9SAdrian McCarthy } 1934ad5def9SAdrian McCarthy 19497206d57SZachary Turner Status ProcessWindows::DoDetach(bool keep_stopped) { 195a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_PROCESS); 1964ad5def9SAdrian McCarthy DebuggerThreadSP debugger_thread; 1974ad5def9SAdrian McCarthy StateType private_state; 1984ad5def9SAdrian McCarthy { 1994ad5def9SAdrian McCarthy // Acquire the lock only long enough to get the DebuggerThread. 20005097246SAdrian Prantl // StopDebugging() will trigger a call back into ProcessWindows which will 20105097246SAdrian Prantl // also acquire the lock. Thus we have to release the lock before calling 20205097246SAdrian Prantl // StopDebugging(). 2034ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 2044ad5def9SAdrian McCarthy 2054ad5def9SAdrian McCarthy private_state = GetPrivateState(); 2064ad5def9SAdrian McCarthy 2074ad5def9SAdrian McCarthy if (!m_session_data) { 208a385d2c1SPavel Labath LLDB_LOG(log, "state = {0}, but there is no active session.", 2094ad5def9SAdrian McCarthy private_state); 21097206d57SZachary Turner return Status(); 2114ad5def9SAdrian McCarthy } 2124ad5def9SAdrian McCarthy 2134ad5def9SAdrian McCarthy debugger_thread = m_session_data->m_debugger; 2144ad5def9SAdrian McCarthy } 2154ad5def9SAdrian McCarthy 21697206d57SZachary Turner Status error; 2174ad5def9SAdrian McCarthy if (private_state != eStateExited && private_state != eStateDetached) { 218a385d2c1SPavel Labath LLDB_LOG(log, "detaching from process {0} while state = {1}.", 2194ad5def9SAdrian McCarthy debugger_thread->GetProcess().GetNativeProcess().GetSystemHandle(), 2204ad5def9SAdrian McCarthy private_state); 2214ad5def9SAdrian McCarthy error = debugger_thread->StopDebugging(false); 2224ad5def9SAdrian McCarthy if (error.Success()) { 2234ad5def9SAdrian McCarthy SetPrivateState(eStateDetached); 2244ad5def9SAdrian McCarthy } 2254ad5def9SAdrian McCarthy 2264ad5def9SAdrian McCarthy // By the time StopDebugging returns, there is no more debugger thread, so 2274ad5def9SAdrian McCarthy // we can be assured that no other thread will race for the session data. 2284ad5def9SAdrian McCarthy m_session_data.reset(); 2294ad5def9SAdrian McCarthy } else { 230a385d2c1SPavel Labath LLDB_LOG( 231a385d2c1SPavel Labath log, 232a385d2c1SPavel Labath "error: process {0} in state = {1}, but cannot destroy in this state.", 2334ad5def9SAdrian McCarthy debugger_thread->GetProcess().GetNativeProcess().GetSystemHandle(), 2344ad5def9SAdrian McCarthy private_state); 2354ad5def9SAdrian McCarthy } 2364ad5def9SAdrian McCarthy 2374ad5def9SAdrian McCarthy return error; 2384ad5def9SAdrian McCarthy } 2394ad5def9SAdrian McCarthy 24097206d57SZachary Turner Status ProcessWindows::DoLaunch(Module *exe_module, 2414ad5def9SAdrian McCarthy ProcessLaunchInfo &launch_info) { 24205097246SAdrian Prantl // Even though m_session_data is accessed here, it is before a debugger 24305097246SAdrian Prantl // thread has been kicked off. So there's no race conditions, and it 24405097246SAdrian Prantl // shouldn't be necessary to acquire the mutex. 2454ad5def9SAdrian McCarthy 246a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_PROCESS); 24797206d57SZachary Turner Status result; 2489d6fabf9SStella Stamenova 2499d6fabf9SStella Stamenova FileSpec working_dir = launch_info.GetWorkingDirectory(); 2509d6fabf9SStella Stamenova namespace fs = llvm::sys::fs; 25154bb3161SAleksandr Urakov if (working_dir) { 25254bb3161SAleksandr Urakov FileSystem::Instance().Resolve(working_dir); 2533a58d898SJonas Devlieghere if (!FileSystem::Instance().IsDirectory(working_dir)) { 2549d6fabf9SStella Stamenova result.SetErrorStringWithFormat("No such file or directory: %s", 2559d6fabf9SStella Stamenova working_dir.GetCString()); 2569d6fabf9SStella Stamenova return result; 2579d6fabf9SStella Stamenova } 25854bb3161SAleksandr Urakov } 2599d6fabf9SStella Stamenova 2604ad5def9SAdrian McCarthy if (!launch_info.GetFlags().Test(eLaunchFlagDebug)) { 2614ad5def9SAdrian McCarthy StreamString stream; 2624ad5def9SAdrian McCarthy stream.Printf("ProcessWindows unable to launch '%s'. ProcessWindows can " 2634ad5def9SAdrian McCarthy "only be used for debug launches.", 2644ad5def9SAdrian McCarthy launch_info.GetExecutableFile().GetPath().c_str()); 2654ad5def9SAdrian McCarthy std::string message = stream.GetString(); 2664ad5def9SAdrian McCarthy result.SetErrorString(message.c_str()); 2674ad5def9SAdrian McCarthy 268a385d2c1SPavel Labath LLDB_LOG(log, "error: {0}", message); 2694ad5def9SAdrian McCarthy return result; 2704ad5def9SAdrian McCarthy } 2714ad5def9SAdrian McCarthy 2724ad5def9SAdrian McCarthy bool stop_at_entry = launch_info.GetFlags().Test(eLaunchFlagStopAtEntry); 2734ad5def9SAdrian McCarthy m_session_data.reset(new ProcessWindowsData(stop_at_entry)); 2744ad5def9SAdrian McCarthy 2754ad5def9SAdrian McCarthy DebugDelegateSP delegate(new LocalDebugDelegate(shared_from_this())); 2764ad5def9SAdrian McCarthy m_session_data->m_debugger.reset(new DebuggerThread(delegate)); 2774ad5def9SAdrian McCarthy DebuggerThreadSP debugger = m_session_data->m_debugger; 2784ad5def9SAdrian McCarthy 2794ad5def9SAdrian McCarthy // Kick off the DebugLaunch asynchronously and wait for it to complete. 2804ad5def9SAdrian McCarthy result = debugger->DebugLaunch(launch_info); 2814ad5def9SAdrian McCarthy if (result.Fail()) { 282a385d2c1SPavel Labath LLDB_LOG(log, "failed launching '{0}'. {1}", 283a385d2c1SPavel Labath launch_info.GetExecutableFile().GetPath(), result); 2844ad5def9SAdrian McCarthy return result; 2854ad5def9SAdrian McCarthy } 2864ad5def9SAdrian McCarthy 2874ad5def9SAdrian McCarthy HostProcess process; 28897206d57SZachary Turner Status error = WaitForDebuggerConnection(debugger, process); 2894ad5def9SAdrian McCarthy if (error.Fail()) { 290a385d2c1SPavel Labath LLDB_LOG(log, "failed launching '{0}'. {1}", 291a385d2c1SPavel Labath launch_info.GetExecutableFile().GetPath(), error); 2924ad5def9SAdrian McCarthy return error; 2934ad5def9SAdrian McCarthy } 2944ad5def9SAdrian McCarthy 295a385d2c1SPavel Labath LLDB_LOG(log, "successfully launched '{0}'", 296a385d2c1SPavel Labath launch_info.GetExecutableFile().GetPath()); 2974ad5def9SAdrian McCarthy 2984ad5def9SAdrian McCarthy // We've hit the initial stop. If eLaunchFlagsStopAtEntry was specified, the 29905097246SAdrian Prantl // private state should already be set to eStateStopped as a result of 30005097246SAdrian Prantl // hitting the initial breakpoint. If it was not set, the breakpoint should 30105097246SAdrian Prantl // have already been resumed from and the private state should already be 30205097246SAdrian Prantl // eStateRunning. 3034ad5def9SAdrian McCarthy launch_info.SetProcessID(process.GetProcessId()); 3044ad5def9SAdrian McCarthy SetID(process.GetProcessId()); 3054ad5def9SAdrian McCarthy 3064ad5def9SAdrian McCarthy return result; 3074ad5def9SAdrian McCarthy } 3084ad5def9SAdrian McCarthy 30997206d57SZachary Turner Status 31097206d57SZachary Turner ProcessWindows::DoAttachToProcessWithID(lldb::pid_t pid, 31197206d57SZachary Turner const ProcessAttachInfo &attach_info) { 312a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_PROCESS); 3134ad5def9SAdrian McCarthy m_session_data.reset( 3144ad5def9SAdrian McCarthy new ProcessWindowsData(!attach_info.GetContinueOnceAttached())); 3154ad5def9SAdrian McCarthy 3164ad5def9SAdrian McCarthy DebugDelegateSP delegate(new LocalDebugDelegate(shared_from_this())); 3174ad5def9SAdrian McCarthy DebuggerThreadSP debugger(new DebuggerThread(delegate)); 3184ad5def9SAdrian McCarthy 3194ad5def9SAdrian McCarthy m_session_data->m_debugger = debugger; 3204ad5def9SAdrian McCarthy 3214ad5def9SAdrian McCarthy DWORD process_id = static_cast<DWORD>(pid); 32297206d57SZachary Turner Status error = debugger->DebugAttach(process_id, attach_info); 3234ad5def9SAdrian McCarthy if (error.Fail()) { 324a385d2c1SPavel Labath LLDB_LOG( 325a385d2c1SPavel Labath log, 326a385d2c1SPavel Labath "encountered an error occurred initiating the asynchronous attach. {0}", 327a385d2c1SPavel Labath error); 3284ad5def9SAdrian McCarthy return error; 3294ad5def9SAdrian McCarthy } 3304ad5def9SAdrian McCarthy 3314ad5def9SAdrian McCarthy HostProcess process; 3324ad5def9SAdrian McCarthy error = WaitForDebuggerConnection(debugger, process); 3334ad5def9SAdrian McCarthy if (error.Fail()) { 334a385d2c1SPavel Labath LLDB_LOG(log, 335a385d2c1SPavel Labath "encountered an error waiting for the debugger to connect. {0}", 336a385d2c1SPavel Labath error); 3374ad5def9SAdrian McCarthy return error; 3384ad5def9SAdrian McCarthy } 3394ad5def9SAdrian McCarthy 340a385d2c1SPavel Labath LLDB_LOG(log, "successfully attached to process with pid={0}", process_id); 3414ad5def9SAdrian McCarthy 3424ad5def9SAdrian McCarthy // We've hit the initial stop. If eLaunchFlagsStopAtEntry was specified, the 34305097246SAdrian Prantl // private state should already be set to eStateStopped as a result of 34405097246SAdrian Prantl // hitting the initial breakpoint. If it was not set, the breakpoint should 34505097246SAdrian Prantl // have already been resumed from and the private state should already be 34605097246SAdrian Prantl // eStateRunning. 3474ad5def9SAdrian McCarthy SetID(process.GetProcessId()); 3484ad5def9SAdrian McCarthy return error; 3494ad5def9SAdrian McCarthy } 3504ad5def9SAdrian McCarthy 35197206d57SZachary Turner Status ProcessWindows::DoResume() { 352a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_PROCESS); 3534ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 35497206d57SZachary Turner Status error; 3554ad5def9SAdrian McCarthy 3564ad5def9SAdrian McCarthy StateType private_state = GetPrivateState(); 3574ad5def9SAdrian McCarthy if (private_state == eStateStopped || private_state == eStateCrashed) { 358a385d2c1SPavel Labath LLDB_LOG(log, "process {0} is in state {1}. Resuming...", 3594ad5def9SAdrian McCarthy m_session_data->m_debugger->GetProcess().GetProcessId(), 3604ad5def9SAdrian McCarthy GetPrivateState()); 3614ad5def9SAdrian McCarthy 3624ad5def9SAdrian McCarthy ExceptionRecordSP active_exception = 3634ad5def9SAdrian McCarthy m_session_data->m_debugger->GetActiveException().lock(); 3644ad5def9SAdrian McCarthy if (active_exception) { 36505097246SAdrian Prantl // Resume the process and continue processing debug events. Mask the 36605097246SAdrian Prantl // exception so that from the process's view, there is no indication that 36705097246SAdrian Prantl // anything happened. 3684ad5def9SAdrian McCarthy m_session_data->m_debugger->ContinueAsyncException( 3694ad5def9SAdrian McCarthy ExceptionResult::MaskException); 3704ad5def9SAdrian McCarthy } 3714ad5def9SAdrian McCarthy 372a385d2c1SPavel Labath LLDB_LOG(log, "resuming {0} threads.", m_thread_list.GetSize()); 3734ad5def9SAdrian McCarthy 3740fd67b53SStella Stamenova bool failed = false; 3754ad5def9SAdrian McCarthy for (uint32_t i = 0; i < m_thread_list.GetSize(); ++i) { 3764ad5def9SAdrian McCarthy auto thread = std::static_pointer_cast<TargetThreadWindows>( 3774ad5def9SAdrian McCarthy m_thread_list.GetThreadAtIndex(i)); 3780fd67b53SStella Stamenova Status result = thread->DoResume(); 3790fd67b53SStella Stamenova if (result.Fail()) { 3800fd67b53SStella Stamenova failed = true; 38162c76db4SStella Stamenova LLDB_LOG( 38262c76db4SStella Stamenova log, 38362c76db4SStella Stamenova "Trying to resume thread at index {0}, but failed with error {1}.", 38462c76db4SStella Stamenova i, result); 3850fd67b53SStella Stamenova } 3864ad5def9SAdrian McCarthy } 3874ad5def9SAdrian McCarthy 3880fd67b53SStella Stamenova if (failed) { 3890fd67b53SStella Stamenova error.SetErrorString("ProcessWindows::DoResume failed"); 3900fd67b53SStella Stamenova return error; 3910fd67b53SStella Stamenova } else { 3924ad5def9SAdrian McCarthy SetPrivateState(eStateRunning); 3930fd67b53SStella Stamenova } 3944ad5def9SAdrian McCarthy } else { 395c28daec5SAaron Smith LLDB_LOG(log, "error: process {0} is in state {1}. Returning...", 3964ad5def9SAdrian McCarthy m_session_data->m_debugger->GetProcess().GetProcessId(), 3974ad5def9SAdrian McCarthy GetPrivateState()); 3984ad5def9SAdrian McCarthy } 3994ad5def9SAdrian McCarthy return error; 4004ad5def9SAdrian McCarthy } 4014ad5def9SAdrian McCarthy 40297206d57SZachary Turner Status ProcessWindows::DoDestroy() { 403a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_PROCESS); 4044ad5def9SAdrian McCarthy DebuggerThreadSP debugger_thread; 4054ad5def9SAdrian McCarthy StateType private_state; 4064ad5def9SAdrian McCarthy { 4074ad5def9SAdrian McCarthy // Acquire this lock inside an inner scope, only long enough to get the 40805097246SAdrian Prantl // DebuggerThread. StopDebugging() will trigger a call back into 40905097246SAdrian Prantl // ProcessWindows which will acquire the lock again, so we need to not 41005097246SAdrian Prantl // deadlock. 4114ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 4124ad5def9SAdrian McCarthy 4134ad5def9SAdrian McCarthy private_state = GetPrivateState(); 4144ad5def9SAdrian McCarthy 4154ad5def9SAdrian McCarthy if (!m_session_data) { 416a385d2c1SPavel Labath LLDB_LOG(log, "warning: state = {0}, but there is no active session.", 4174ad5def9SAdrian McCarthy private_state); 41897206d57SZachary Turner return Status(); 4194ad5def9SAdrian McCarthy } 4204ad5def9SAdrian McCarthy 4214ad5def9SAdrian McCarthy debugger_thread = m_session_data->m_debugger; 4224ad5def9SAdrian McCarthy } 4234ad5def9SAdrian McCarthy 42497206d57SZachary Turner Status error; 4254ad5def9SAdrian McCarthy if (private_state != eStateExited && private_state != eStateDetached) { 426a385d2c1SPavel Labath LLDB_LOG(log, "Shutting down process {0} while state = {1}.", 4274ad5def9SAdrian McCarthy debugger_thread->GetProcess().GetNativeProcess().GetSystemHandle(), 4284ad5def9SAdrian McCarthy private_state); 4294ad5def9SAdrian McCarthy error = debugger_thread->StopDebugging(true); 4304ad5def9SAdrian McCarthy 4314ad5def9SAdrian McCarthy // By the time StopDebugging returns, there is no more debugger thread, so 4324ad5def9SAdrian McCarthy // we can be assured that no other thread will race for the session data. 4334ad5def9SAdrian McCarthy m_session_data.reset(); 4344ad5def9SAdrian McCarthy } else { 435a385d2c1SPavel Labath LLDB_LOG(log, "cannot destroy process {0} while state = {1}", 4364ad5def9SAdrian McCarthy debugger_thread->GetProcess().GetNativeProcess().GetSystemHandle(), 4374ad5def9SAdrian McCarthy private_state); 4384ad5def9SAdrian McCarthy } 4394ad5def9SAdrian McCarthy 4404ad5def9SAdrian McCarthy return error; 4414ad5def9SAdrian McCarthy } 4424ad5def9SAdrian McCarthy 44397206d57SZachary Turner Status ProcessWindows::DoHalt(bool &caused_stop) { 444a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_PROCESS); 44597206d57SZachary Turner Status error; 4464ad5def9SAdrian McCarthy StateType state = GetPrivateState(); 4474ad5def9SAdrian McCarthy if (state == eStateStopped) 4484ad5def9SAdrian McCarthy caused_stop = false; 4494ad5def9SAdrian McCarthy else { 4504ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 4514ad5def9SAdrian McCarthy caused_stop = ::DebugBreakProcess(m_session_data->m_debugger->GetProcess() 4524ad5def9SAdrian McCarthy .GetNativeProcess() 4534ad5def9SAdrian McCarthy .GetSystemHandle()); 4544ad5def9SAdrian McCarthy if (!caused_stop) { 4554ad5def9SAdrian McCarthy error.SetError(::GetLastError(), eErrorTypeWin32); 456a385d2c1SPavel Labath LLDB_LOG(log, "DebugBreakProcess failed with error {0}", error); 4574ad5def9SAdrian McCarthy } 4584ad5def9SAdrian McCarthy } 4594ad5def9SAdrian McCarthy return error; 4604ad5def9SAdrian McCarthy } 4614ad5def9SAdrian McCarthy 4624ad5def9SAdrian McCarthy void ProcessWindows::DidLaunch() { 4634ad5def9SAdrian McCarthy ArchSpec arch_spec; 4644ad5def9SAdrian McCarthy DidAttach(arch_spec); 4654ad5def9SAdrian McCarthy } 4664ad5def9SAdrian McCarthy 4674ad5def9SAdrian McCarthy void ProcessWindows::DidAttach(ArchSpec &arch_spec) { 4684ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 4694ad5def9SAdrian McCarthy 4704ad5def9SAdrian McCarthy // The initial stop won't broadcast the state change event, so account for 4714ad5def9SAdrian McCarthy // that here. 4724ad5def9SAdrian McCarthy if (m_session_data && GetPrivateState() == eStateStopped && 4734ad5def9SAdrian McCarthy m_session_data->m_stop_at_entry) 4744ad5def9SAdrian McCarthy RefreshStateAfterStop(); 4754ad5def9SAdrian McCarthy } 4764ad5def9SAdrian McCarthy 47726366c3eSAleksandr Urakov static void 47826366c3eSAleksandr Urakov DumpAdditionalExceptionInformation(llvm::raw_ostream &stream, 47926366c3eSAleksandr Urakov const ExceptionRecordSP &exception) { 48026366c3eSAleksandr Urakov // Decode additional exception information for specific exception types based 48126366c3eSAleksandr Urakov // on 48226366c3eSAleksandr Urakov // https://docs.microsoft.com/en-us/windows/desktop/api/winnt/ns-winnt-_exception_record 48326366c3eSAleksandr Urakov 48426366c3eSAleksandr Urakov const int addr_min_width = 2 + 8; // "0x" + 4 address bytes 48526366c3eSAleksandr Urakov 48626366c3eSAleksandr Urakov const std::vector<ULONG_PTR> &args = exception->GetExceptionArguments(); 48726366c3eSAleksandr Urakov switch (exception->GetExceptionCode()) { 48826366c3eSAleksandr Urakov case EXCEPTION_ACCESS_VIOLATION: { 48926366c3eSAleksandr Urakov if (args.size() < 2) 49026366c3eSAleksandr Urakov break; 49126366c3eSAleksandr Urakov 49226366c3eSAleksandr Urakov stream << ": "; 49326366c3eSAleksandr Urakov const int access_violation_code = args[0]; 49426366c3eSAleksandr Urakov const lldb::addr_t access_violation_address = args[1]; 49526366c3eSAleksandr Urakov switch (access_violation_code) { 49626366c3eSAleksandr Urakov case 0: 49726366c3eSAleksandr Urakov stream << "Access violation reading"; 49826366c3eSAleksandr Urakov break; 49926366c3eSAleksandr Urakov case 1: 50026366c3eSAleksandr Urakov stream << "Access violation writing"; 50126366c3eSAleksandr Urakov break; 50226366c3eSAleksandr Urakov case 8: 50326366c3eSAleksandr Urakov stream << "User-mode data execution prevention (DEP) violation at"; 50426366c3eSAleksandr Urakov break; 50526366c3eSAleksandr Urakov default: 50626366c3eSAleksandr Urakov stream << "Unknown access violation (code " << access_violation_code 50726366c3eSAleksandr Urakov << ") at"; 50826366c3eSAleksandr Urakov break; 50926366c3eSAleksandr Urakov } 51026366c3eSAleksandr Urakov stream << " location " 51126366c3eSAleksandr Urakov << llvm::format_hex(access_violation_address, addr_min_width); 51226366c3eSAleksandr Urakov break; 51326366c3eSAleksandr Urakov } 51426366c3eSAleksandr Urakov case EXCEPTION_IN_PAGE_ERROR: { 51526366c3eSAleksandr Urakov if (args.size() < 3) 51626366c3eSAleksandr Urakov break; 51726366c3eSAleksandr Urakov 51826366c3eSAleksandr Urakov stream << ": "; 51926366c3eSAleksandr Urakov const int page_load_error_code = args[0]; 52026366c3eSAleksandr Urakov const lldb::addr_t page_load_error_address = args[1]; 52126366c3eSAleksandr Urakov const DWORD underlying_code = args[2]; 52226366c3eSAleksandr Urakov switch (page_load_error_code) { 52326366c3eSAleksandr Urakov case 0: 52426366c3eSAleksandr Urakov stream << "In page error reading"; 52526366c3eSAleksandr Urakov break; 52626366c3eSAleksandr Urakov case 1: 52726366c3eSAleksandr Urakov stream << "In page error writing"; 52826366c3eSAleksandr Urakov break; 52926366c3eSAleksandr Urakov case 8: 53026366c3eSAleksandr Urakov stream << "User-mode data execution prevention (DEP) violation at"; 53126366c3eSAleksandr Urakov break; 53226366c3eSAleksandr Urakov default: 53326366c3eSAleksandr Urakov stream << "Unknown page loading error (code " << page_load_error_code 53426366c3eSAleksandr Urakov << ") at"; 53526366c3eSAleksandr Urakov break; 53626366c3eSAleksandr Urakov } 53726366c3eSAleksandr Urakov stream << " location " 53826366c3eSAleksandr Urakov << llvm::format_hex(page_load_error_address, addr_min_width) 53926366c3eSAleksandr Urakov << " (status code " << llvm::format_hex(underlying_code, 8) << ")"; 54026366c3eSAleksandr Urakov break; 54126366c3eSAleksandr Urakov } 54226366c3eSAleksandr Urakov } 54326366c3eSAleksandr Urakov } 54426366c3eSAleksandr Urakov 5454ad5def9SAdrian McCarthy void ProcessWindows::RefreshStateAfterStop() { 546a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_EXCEPTION); 5474ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 5484ad5def9SAdrian McCarthy 5494ad5def9SAdrian McCarthy if (!m_session_data) { 550a385d2c1SPavel Labath LLDB_LOG(log, "no active session. Returning..."); 5514ad5def9SAdrian McCarthy return; 5524ad5def9SAdrian McCarthy } 5534ad5def9SAdrian McCarthy 5544ad5def9SAdrian McCarthy m_thread_list.RefreshStateAfterStop(); 5554ad5def9SAdrian McCarthy 5564ad5def9SAdrian McCarthy std::weak_ptr<ExceptionRecord> exception_record = 5574ad5def9SAdrian McCarthy m_session_data->m_debugger->GetActiveException(); 5584ad5def9SAdrian McCarthy ExceptionRecordSP active_exception = exception_record.lock(); 5594ad5def9SAdrian McCarthy if (!active_exception) { 56062c76db4SStella Stamenova LLDB_LOG(log, 56162c76db4SStella Stamenova "there is no active exception in process {0}. Why is the " 562a385d2c1SPavel Labath "process stopped?", 5634ad5def9SAdrian McCarthy m_session_data->m_debugger->GetProcess().GetProcessId()); 5644ad5def9SAdrian McCarthy return; 5654ad5def9SAdrian McCarthy } 5664ad5def9SAdrian McCarthy 5674ad5def9SAdrian McCarthy StopInfoSP stop_info; 5684ad5def9SAdrian McCarthy m_thread_list.SetSelectedThreadByID(active_exception->GetThreadID()); 5694ad5def9SAdrian McCarthy ThreadSP stop_thread = m_thread_list.GetSelectedThread(); 5704ad5def9SAdrian McCarthy if (!stop_thread) 5714ad5def9SAdrian McCarthy return; 5724ad5def9SAdrian McCarthy 5734ad5def9SAdrian McCarthy switch (active_exception->GetExceptionCode()) { 5744ad5def9SAdrian McCarthy case EXCEPTION_SINGLE_STEP: { 5754ad5def9SAdrian McCarthy RegisterContextSP register_context = stop_thread->GetRegisterContext(); 5764ad5def9SAdrian McCarthy const uint64_t pc = register_context->GetPC(); 5774ad5def9SAdrian McCarthy BreakpointSiteSP site(GetBreakpointSiteList().FindByAddress(pc)); 5784ad5def9SAdrian McCarthy if (site && site->ValidForThisThread(stop_thread.get())) { 57962c76db4SStella Stamenova LLDB_LOG(log, 58062c76db4SStella Stamenova "Single-stepped onto a breakpoint in process {0} at " 581a385d2c1SPavel Labath "address {1:x} with breakpoint site {2}", 5824ad5def9SAdrian McCarthy m_session_data->m_debugger->GetProcess().GetProcessId(), pc, 5834ad5def9SAdrian McCarthy site->GetID()); 5844ad5def9SAdrian McCarthy stop_info = StopInfo::CreateStopReasonWithBreakpointSiteID(*stop_thread, 5854ad5def9SAdrian McCarthy site->GetID()); 5864ad5def9SAdrian McCarthy stop_thread->SetStopInfo(stop_info); 5874ad5def9SAdrian McCarthy } else { 588a385d2c1SPavel Labath LLDB_LOG(log, "single stepping thread {0}", stop_thread->GetID()); 5894ad5def9SAdrian McCarthy stop_info = StopInfo::CreateStopReasonToTrace(*stop_thread); 5904ad5def9SAdrian McCarthy stop_thread->SetStopInfo(stop_info); 5914ad5def9SAdrian McCarthy } 5924ad5def9SAdrian McCarthy return; 5934ad5def9SAdrian McCarthy } 5944ad5def9SAdrian McCarthy 5954ad5def9SAdrian McCarthy case EXCEPTION_BREAKPOINT: { 5964ad5def9SAdrian McCarthy RegisterContextSP register_context = stop_thread->GetRegisterContext(); 5974ad5def9SAdrian McCarthy 5984ad5def9SAdrian McCarthy // The current EIP is AFTER the BP opcode, which is one byte. 5994ad5def9SAdrian McCarthy uint64_t pc = register_context->GetPC() - 1; 6004ad5def9SAdrian McCarthy 6014ad5def9SAdrian McCarthy BreakpointSiteSP site(GetBreakpointSiteList().FindByAddress(pc)); 6024ad5def9SAdrian McCarthy if (site) { 60362c76db4SStella Stamenova LLDB_LOG(log, 60462c76db4SStella Stamenova "detected breakpoint in process {0} at address {1:x} with " 605a385d2c1SPavel Labath "breakpoint site {2}", 6064ad5def9SAdrian McCarthy m_session_data->m_debugger->GetProcess().GetProcessId(), pc, 6074ad5def9SAdrian McCarthy site->GetID()); 6084ad5def9SAdrian McCarthy 6094ad5def9SAdrian McCarthy if (site->ValidForThisThread(stop_thread.get())) { 61062c76db4SStella Stamenova LLDB_LOG(log, 61162c76db4SStella Stamenova "Breakpoint site {0} is valid for this thread ({1:x}), " 6124ad5def9SAdrian McCarthy "creating stop info.", 6134ad5def9SAdrian McCarthy site->GetID(), stop_thread->GetID()); 6144ad5def9SAdrian McCarthy 6154ad5def9SAdrian McCarthy stop_info = StopInfo::CreateStopReasonWithBreakpointSiteID( 6164ad5def9SAdrian McCarthy *stop_thread, site->GetID()); 6174ad5def9SAdrian McCarthy register_context->SetPC(pc); 6184ad5def9SAdrian McCarthy } else { 61962c76db4SStella Stamenova LLDB_LOG(log, 62062c76db4SStella Stamenova "Breakpoint site {0} is not valid for this thread, " 6214ad5def9SAdrian McCarthy "creating empty stop info.", 6224ad5def9SAdrian McCarthy site->GetID()); 6234ad5def9SAdrian McCarthy } 6244ad5def9SAdrian McCarthy stop_thread->SetStopInfo(stop_info); 6254ad5def9SAdrian McCarthy return; 6264ad5def9SAdrian McCarthy } else { 6274ad5def9SAdrian McCarthy // The thread hit a hard-coded breakpoint like an `int 3` or 6284ad5def9SAdrian McCarthy // `__debugbreak()`. 629a385d2c1SPavel Labath LLDB_LOG(log, 6304ad5def9SAdrian McCarthy "No breakpoint site matches for this thread. __debugbreak()? " 6314ad5def9SAdrian McCarthy "Creating stop info with the exception."); 6324ad5def9SAdrian McCarthy // FALLTHROUGH: We'll treat this as a generic exception record in the 6334ad5def9SAdrian McCarthy // default case. 634*b0717666SAlexandre Ganea LLVM_FALLTHROUGH; 6354ad5def9SAdrian McCarthy } 6364ad5def9SAdrian McCarthy } 6374ad5def9SAdrian McCarthy 6384ad5def9SAdrian McCarthy default: { 6394ad5def9SAdrian McCarthy std::string desc; 6404ad5def9SAdrian McCarthy llvm::raw_string_ostream desc_stream(desc); 6414ad5def9SAdrian McCarthy desc_stream << "Exception " 6424ad5def9SAdrian McCarthy << llvm::format_hex(active_exception->GetExceptionCode(), 8) 6434ad5def9SAdrian McCarthy << " encountered at address " 6444ad5def9SAdrian McCarthy << llvm::format_hex(active_exception->GetExceptionAddress(), 8); 64526366c3eSAleksandr Urakov DumpAdditionalExceptionInformation(desc_stream, active_exception); 64626366c3eSAleksandr Urakov 6474ad5def9SAdrian McCarthy stop_info = StopInfo::CreateStopReasonWithException( 6484ad5def9SAdrian McCarthy *stop_thread, desc_stream.str().c_str()); 6494ad5def9SAdrian McCarthy stop_thread->SetStopInfo(stop_info); 650a385d2c1SPavel Labath LLDB_LOG(log, "{0}", desc_stream.str()); 6514ad5def9SAdrian McCarthy return; 6524ad5def9SAdrian McCarthy } 6534ad5def9SAdrian McCarthy } 6544ad5def9SAdrian McCarthy } 6554ad5def9SAdrian McCarthy 6564ad5def9SAdrian McCarthy bool ProcessWindows::CanDebug(lldb::TargetSP target_sp, 6574ad5def9SAdrian McCarthy bool plugin_specified_by_name) { 6584ad5def9SAdrian McCarthy if (plugin_specified_by_name) 6594ad5def9SAdrian McCarthy return true; 6604ad5def9SAdrian McCarthy 6614ad5def9SAdrian McCarthy // For now we are just making sure the file exists for a given module 6624ad5def9SAdrian McCarthy ModuleSP exe_module_sp(target_sp->GetExecutableModule()); 6634ad5def9SAdrian McCarthy if (exe_module_sp.get()) 66460cf3f82SJonas Devlieghere return FileSystem::Instance().Exists(exe_module_sp->GetFileSpec()); 66505097246SAdrian Prantl // However, if there is no executable module, we return true since we might 66605097246SAdrian Prantl // be preparing to attach. 6674ad5def9SAdrian McCarthy return true; 6684ad5def9SAdrian McCarthy } 6694ad5def9SAdrian McCarthy 6704ad5def9SAdrian McCarthy bool ProcessWindows::UpdateThreadList(ThreadList &old_thread_list, 6714ad5def9SAdrian McCarthy ThreadList &new_thread_list) { 672a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_THREAD); 6734ad5def9SAdrian McCarthy // Add all the threads that were previously running and for which we did not 6744ad5def9SAdrian McCarthy // detect a thread exited event. 6754ad5def9SAdrian McCarthy int new_size = 0; 6764ad5def9SAdrian McCarthy int continued_threads = 0; 6774ad5def9SAdrian McCarthy int exited_threads = 0; 6784ad5def9SAdrian McCarthy int new_threads = 0; 6794ad5def9SAdrian McCarthy 6804ad5def9SAdrian McCarthy for (ThreadSP old_thread : old_thread_list.Threads()) { 6814ad5def9SAdrian McCarthy lldb::tid_t old_thread_id = old_thread->GetID(); 6824ad5def9SAdrian McCarthy auto exited_thread_iter = 6834ad5def9SAdrian McCarthy m_session_data->m_exited_threads.find(old_thread_id); 6844ad5def9SAdrian McCarthy if (exited_thread_iter == m_session_data->m_exited_threads.end()) { 6854ad5def9SAdrian McCarthy new_thread_list.AddThread(old_thread); 6864ad5def9SAdrian McCarthy ++new_size; 6874ad5def9SAdrian McCarthy ++continued_threads; 688a385d2c1SPavel Labath LLDB_LOGV(log, "Thread {0} was running and is still running.", 6894ad5def9SAdrian McCarthy old_thread_id); 6904ad5def9SAdrian McCarthy } else { 691a385d2c1SPavel Labath LLDB_LOGV(log, "Thread {0} was running and has exited.", old_thread_id); 6924ad5def9SAdrian McCarthy ++exited_threads; 6934ad5def9SAdrian McCarthy } 6944ad5def9SAdrian McCarthy } 6954ad5def9SAdrian McCarthy 69605097246SAdrian Prantl // Also add all the threads that are new since the last time we broke into 69705097246SAdrian Prantl // the debugger. 6984ad5def9SAdrian McCarthy for (const auto &thread_info : m_session_data->m_new_threads) { 6994ad5def9SAdrian McCarthy ThreadSP thread(new TargetThreadWindows(*this, thread_info.second)); 7004ad5def9SAdrian McCarthy thread->SetID(thread_info.first); 7014ad5def9SAdrian McCarthy new_thread_list.AddThread(thread); 7024ad5def9SAdrian McCarthy ++new_size; 7034ad5def9SAdrian McCarthy ++new_threads; 704a385d2c1SPavel Labath LLDB_LOGV(log, "Thread {0} is new since last update.", thread_info.first); 7054ad5def9SAdrian McCarthy } 7064ad5def9SAdrian McCarthy 707a385d2c1SPavel Labath LLDB_LOG(log, "{0} new threads, {1} old threads, {2} exited threads.", 7084ad5def9SAdrian McCarthy new_threads, continued_threads, exited_threads); 7094ad5def9SAdrian McCarthy 7104ad5def9SAdrian McCarthy m_session_data->m_new_threads.clear(); 7114ad5def9SAdrian McCarthy m_session_data->m_exited_threads.clear(); 7124ad5def9SAdrian McCarthy 7134ad5def9SAdrian McCarthy return new_size > 0; 7144ad5def9SAdrian McCarthy } 7154ad5def9SAdrian McCarthy 7164ad5def9SAdrian McCarthy bool ProcessWindows::IsAlive() { 7174ad5def9SAdrian McCarthy StateType state = GetPrivateState(); 7184ad5def9SAdrian McCarthy switch (state) { 7194ad5def9SAdrian McCarthy case eStateCrashed: 7204ad5def9SAdrian McCarthy case eStateDetached: 7214ad5def9SAdrian McCarthy case eStateUnloaded: 7224ad5def9SAdrian McCarthy case eStateExited: 7234ad5def9SAdrian McCarthy case eStateInvalid: 7244ad5def9SAdrian McCarthy return false; 7254ad5def9SAdrian McCarthy default: 7264ad5def9SAdrian McCarthy return true; 7274ad5def9SAdrian McCarthy } 7284ad5def9SAdrian McCarthy } 7294ad5def9SAdrian McCarthy 7304ad5def9SAdrian McCarthy size_t ProcessWindows::DoReadMemory(lldb::addr_t vm_addr, void *buf, 73197206d57SZachary Turner size_t size, Status &error) { 732a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_MEMORY); 7334ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 7344ad5def9SAdrian McCarthy 7354ad5def9SAdrian McCarthy if (!m_session_data) 7364ad5def9SAdrian McCarthy return 0; 7374ad5def9SAdrian McCarthy 738a385d2c1SPavel Labath LLDB_LOG(log, "attempting to read {0} bytes from address {1:x}", size, 739a385d2c1SPavel Labath vm_addr); 7404ad5def9SAdrian McCarthy 7414ad5def9SAdrian McCarthy HostProcess process = m_session_data->m_debugger->GetProcess(); 7424ad5def9SAdrian McCarthy void *addr = reinterpret_cast<void *>(vm_addr); 7434ad5def9SAdrian McCarthy SIZE_T bytes_read = 0; 7444ad5def9SAdrian McCarthy if (!ReadProcessMemory(process.GetNativeProcess().GetSystemHandle(), addr, 7454ad5def9SAdrian McCarthy buf, size, &bytes_read)) { 74662c76db4SStella Stamenova // Reading from the process can fail for a number of reasons - set the 74762c76db4SStella Stamenova // error code and make sure that the number of bytes read is set back to 0 74862c76db4SStella Stamenova // because in some scenarios the value of bytes_read returned from the API 74962c76db4SStella Stamenova // is garbage. 7504ad5def9SAdrian McCarthy error.SetError(GetLastError(), eErrorTypeWin32); 751a385d2c1SPavel Labath LLDB_LOG(log, "reading failed with error: {0}", error); 75262c76db4SStella Stamenova bytes_read = 0; 7534ad5def9SAdrian McCarthy } 7544ad5def9SAdrian McCarthy return bytes_read; 7554ad5def9SAdrian McCarthy } 7564ad5def9SAdrian McCarthy 7574ad5def9SAdrian McCarthy size_t ProcessWindows::DoWriteMemory(lldb::addr_t vm_addr, const void *buf, 75897206d57SZachary Turner size_t size, Status &error) { 759a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_MEMORY); 7604ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 761a385d2c1SPavel Labath LLDB_LOG(log, "attempting to write {0} bytes into address {1:x}", size, 7624ad5def9SAdrian McCarthy vm_addr); 7634ad5def9SAdrian McCarthy 7644ad5def9SAdrian McCarthy if (!m_session_data) { 765a385d2c1SPavel Labath LLDB_LOG(log, "cannot write, there is no active debugger connection."); 7664ad5def9SAdrian McCarthy return 0; 7674ad5def9SAdrian McCarthy } 7684ad5def9SAdrian McCarthy 7694ad5def9SAdrian McCarthy HostProcess process = m_session_data->m_debugger->GetProcess(); 7704ad5def9SAdrian McCarthy void *addr = reinterpret_cast<void *>(vm_addr); 7714ad5def9SAdrian McCarthy SIZE_T bytes_written = 0; 7724ad5def9SAdrian McCarthy lldb::process_t handle = process.GetNativeProcess().GetSystemHandle(); 7734ad5def9SAdrian McCarthy if (WriteProcessMemory(handle, addr, buf, size, &bytes_written)) 7744ad5def9SAdrian McCarthy FlushInstructionCache(handle, addr, bytes_written); 7754ad5def9SAdrian McCarthy else { 7764ad5def9SAdrian McCarthy error.SetError(GetLastError(), eErrorTypeWin32); 777a385d2c1SPavel Labath LLDB_LOG(log, "writing failed with error: {0}", error); 7784ad5def9SAdrian McCarthy } 7794ad5def9SAdrian McCarthy return bytes_written; 7804ad5def9SAdrian McCarthy } 7814ad5def9SAdrian McCarthy 7829d5b2d4aSAleksandr Urakov lldb::addr_t ProcessWindows::DoAllocateMemory(size_t size, uint32_t permissions, 7839d5b2d4aSAleksandr Urakov Status &error) { 7849d5b2d4aSAleksandr Urakov Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_MEMORY); 7859d5b2d4aSAleksandr Urakov llvm::sys::ScopedLock lock(m_mutex); 7869d5b2d4aSAleksandr Urakov LLDB_LOG(log, "attempting to allocate {0} bytes with permissions {1}", size, 7879d5b2d4aSAleksandr Urakov permissions); 7889d5b2d4aSAleksandr Urakov 7899d5b2d4aSAleksandr Urakov if (!m_session_data) { 7909d5b2d4aSAleksandr Urakov LLDB_LOG(log, "cannot allocate, there is no active debugger connection."); 7919d5b2d4aSAleksandr Urakov error.SetErrorString( 7929d5b2d4aSAleksandr Urakov "cannot allocate, there is no active debugger connection"); 793975814a7SStella Stamenova return LLDB_INVALID_ADDRESS; 7949d5b2d4aSAleksandr Urakov } 7959d5b2d4aSAleksandr Urakov 7969d5b2d4aSAleksandr Urakov HostProcess process = m_session_data->m_debugger->GetProcess(); 7979d5b2d4aSAleksandr Urakov lldb::process_t handle = process.GetNativeProcess().GetSystemHandle(); 7989d5b2d4aSAleksandr Urakov auto protect = ConvertLldbToWinApiProtect(permissions); 7999d5b2d4aSAleksandr Urakov auto result = VirtualAllocEx(handle, nullptr, size, MEM_COMMIT, protect); 8009d5b2d4aSAleksandr Urakov if (!result) { 8019d5b2d4aSAleksandr Urakov error.SetError(GetLastError(), eErrorTypeWin32); 8029d5b2d4aSAleksandr Urakov LLDB_LOG(log, "allocating failed with error: {0}", error); 803975814a7SStella Stamenova return LLDB_INVALID_ADDRESS; 8049d5b2d4aSAleksandr Urakov } 8059d5b2d4aSAleksandr Urakov 8069d5b2d4aSAleksandr Urakov return reinterpret_cast<addr_t>(result); 8079d5b2d4aSAleksandr Urakov } 8089d5b2d4aSAleksandr Urakov 8099d5b2d4aSAleksandr Urakov Status ProcessWindows::DoDeallocateMemory(lldb::addr_t ptr) { 8109d5b2d4aSAleksandr Urakov Status result; 8119d5b2d4aSAleksandr Urakov 8129d5b2d4aSAleksandr Urakov Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_MEMORY); 8139d5b2d4aSAleksandr Urakov llvm::sys::ScopedLock lock(m_mutex); 8149d5b2d4aSAleksandr Urakov LLDB_LOG(log, "attempting to deallocate bytes at address {0}", ptr); 8159d5b2d4aSAleksandr Urakov 8169d5b2d4aSAleksandr Urakov if (!m_session_data) { 8179d5b2d4aSAleksandr Urakov LLDB_LOG(log, "cannot deallocate, there is no active debugger connection."); 8189d5b2d4aSAleksandr Urakov result.SetErrorString( 8199d5b2d4aSAleksandr Urakov "cannot deallocate, there is no active debugger connection"); 8209d5b2d4aSAleksandr Urakov return result; 8219d5b2d4aSAleksandr Urakov } 8229d5b2d4aSAleksandr Urakov 8239d5b2d4aSAleksandr Urakov HostProcess process = m_session_data->m_debugger->GetProcess(); 8249d5b2d4aSAleksandr Urakov lldb::process_t handle = process.GetNativeProcess().GetSystemHandle(); 8259d5b2d4aSAleksandr Urakov if (!VirtualFreeEx(handle, reinterpret_cast<LPVOID>(ptr), 0, MEM_RELEASE)) { 8269d5b2d4aSAleksandr Urakov result.SetError(GetLastError(), eErrorTypeWin32); 8279d5b2d4aSAleksandr Urakov LLDB_LOG(log, "deallocating failed with error: {0}", result); 8289d5b2d4aSAleksandr Urakov return result; 8299d5b2d4aSAleksandr Urakov } 8309d5b2d4aSAleksandr Urakov 8319d5b2d4aSAleksandr Urakov return result; 8329d5b2d4aSAleksandr Urakov } 8339d5b2d4aSAleksandr Urakov 83497206d57SZachary Turner Status ProcessWindows::GetMemoryRegionInfo(lldb::addr_t vm_addr, 8354ad5def9SAdrian McCarthy MemoryRegionInfo &info) { 836a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_MEMORY); 83797206d57SZachary Turner Status error; 8384ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 8394ad5def9SAdrian McCarthy info.Clear(); 8404ad5def9SAdrian McCarthy 8414ad5def9SAdrian McCarthy if (!m_session_data) { 8424ad5def9SAdrian McCarthy error.SetErrorString( 8434ad5def9SAdrian McCarthy "GetMemoryRegionInfo called with no debugging session."); 844a385d2c1SPavel Labath LLDB_LOG(log, "error: {0}", error); 8454ad5def9SAdrian McCarthy return error; 8464ad5def9SAdrian McCarthy } 8474ad5def9SAdrian McCarthy HostProcess process = m_session_data->m_debugger->GetProcess(); 8484ad5def9SAdrian McCarthy lldb::process_t handle = process.GetNativeProcess().GetSystemHandle(); 8494ad5def9SAdrian McCarthy if (handle == nullptr || handle == LLDB_INVALID_PROCESS) { 8504ad5def9SAdrian McCarthy error.SetErrorString( 8514ad5def9SAdrian McCarthy "GetMemoryRegionInfo called with an invalid target process."); 852a385d2c1SPavel Labath LLDB_LOG(log, "error: {0}", error); 8534ad5def9SAdrian McCarthy return error; 8544ad5def9SAdrian McCarthy } 8554ad5def9SAdrian McCarthy 856a385d2c1SPavel Labath LLDB_LOG(log, "getting info for address {0:x}", vm_addr); 8574ad5def9SAdrian McCarthy 8584ad5def9SAdrian McCarthy void *addr = reinterpret_cast<void *>(vm_addr); 8594ad5def9SAdrian McCarthy MEMORY_BASIC_INFORMATION mem_info = {}; 8604ad5def9SAdrian McCarthy SIZE_T result = ::VirtualQueryEx(handle, addr, &mem_info, sizeof(mem_info)); 8614ad5def9SAdrian McCarthy if (result == 0) { 8624ad5def9SAdrian McCarthy if (::GetLastError() == ERROR_INVALID_PARAMETER) { 86305097246SAdrian Prantl // ERROR_INVALID_PARAMETER is returned if VirtualQueryEx is called with 86405097246SAdrian Prantl // an address past the highest accessible address. We should return a 86505097246SAdrian Prantl // range from the vm_addr to LLDB_INVALID_ADDRESS 8664ad5def9SAdrian McCarthy info.GetRange().SetRangeBase(vm_addr); 8674ad5def9SAdrian McCarthy info.GetRange().SetRangeEnd(LLDB_INVALID_ADDRESS); 8684ad5def9SAdrian McCarthy info.SetReadable(MemoryRegionInfo::eNo); 8694ad5def9SAdrian McCarthy info.SetExecutable(MemoryRegionInfo::eNo); 8704ad5def9SAdrian McCarthy info.SetWritable(MemoryRegionInfo::eNo); 8714ad5def9SAdrian McCarthy info.SetMapped(MemoryRegionInfo::eNo); 8724ad5def9SAdrian McCarthy return error; 8734ad5def9SAdrian McCarthy } else { 8744ad5def9SAdrian McCarthy error.SetError(::GetLastError(), eErrorTypeWin32); 87562c76db4SStella Stamenova LLDB_LOG(log, 87662c76db4SStella Stamenova "VirtualQueryEx returned error {0} while getting memory " 877a385d2c1SPavel Labath "region info for address {1:x}", 878a385d2c1SPavel Labath error, vm_addr); 8794ad5def9SAdrian McCarthy return error; 8804ad5def9SAdrian McCarthy } 8814ad5def9SAdrian McCarthy } 8824ad5def9SAdrian McCarthy 8834ad5def9SAdrian McCarthy // Protect bits are only valid for MEM_COMMIT regions. 8844ad5def9SAdrian McCarthy if (mem_info.State == MEM_COMMIT) { 8854ad5def9SAdrian McCarthy const bool readable = IsPageReadable(mem_info.Protect); 8864ad5def9SAdrian McCarthy const bool executable = IsPageExecutable(mem_info.Protect); 8874ad5def9SAdrian McCarthy const bool writable = IsPageWritable(mem_info.Protect); 8884ad5def9SAdrian McCarthy info.SetReadable(readable ? MemoryRegionInfo::eYes : MemoryRegionInfo::eNo); 8894ad5def9SAdrian McCarthy info.SetExecutable(executable ? MemoryRegionInfo::eYes 8904ad5def9SAdrian McCarthy : MemoryRegionInfo::eNo); 8914ad5def9SAdrian McCarthy info.SetWritable(writable ? MemoryRegionInfo::eYes : MemoryRegionInfo::eNo); 8924ad5def9SAdrian McCarthy } else { 8934ad5def9SAdrian McCarthy info.SetReadable(MemoryRegionInfo::eNo); 8944ad5def9SAdrian McCarthy info.SetExecutable(MemoryRegionInfo::eNo); 8954ad5def9SAdrian McCarthy info.SetWritable(MemoryRegionInfo::eNo); 8964ad5def9SAdrian McCarthy } 8974ad5def9SAdrian McCarthy 8984ad5def9SAdrian McCarthy // AllocationBase is defined for MEM_COMMIT and MEM_RESERVE but not MEM_FREE. 8994ad5def9SAdrian McCarthy if (mem_info.State != MEM_FREE) { 9004ad5def9SAdrian McCarthy info.GetRange().SetRangeBase( 9014ad5def9SAdrian McCarthy reinterpret_cast<addr_t>(mem_info.AllocationBase)); 9024ad5def9SAdrian McCarthy info.GetRange().SetRangeEnd(reinterpret_cast<addr_t>(mem_info.BaseAddress) + 9034ad5def9SAdrian McCarthy mem_info.RegionSize); 9044ad5def9SAdrian McCarthy info.SetMapped(MemoryRegionInfo::eYes); 9054ad5def9SAdrian McCarthy } else { 9064ad5def9SAdrian McCarthy // In the unmapped case we need to return the distance to the next block of 90705097246SAdrian Prantl // memory. VirtualQueryEx nearly does that except that it gives the 90805097246SAdrian Prantl // distance from the start of the page containing vm_addr. 9094ad5def9SAdrian McCarthy SYSTEM_INFO data; 9104ad5def9SAdrian McCarthy GetSystemInfo(&data); 9114ad5def9SAdrian McCarthy DWORD page_offset = vm_addr % data.dwPageSize; 9124ad5def9SAdrian McCarthy info.GetRange().SetRangeBase(vm_addr); 9134ad5def9SAdrian McCarthy info.GetRange().SetByteSize(mem_info.RegionSize - page_offset); 9144ad5def9SAdrian McCarthy info.SetMapped(MemoryRegionInfo::eNo); 9154ad5def9SAdrian McCarthy } 9164ad5def9SAdrian McCarthy 9174ad5def9SAdrian McCarthy error.SetError(::GetLastError(), eErrorTypeWin32); 91862c76db4SStella Stamenova LLDB_LOGV(log, 91962c76db4SStella Stamenova "Memory region info for address {0}: readable={1}, " 920a385d2c1SPavel Labath "executable={2}, writable={3}", 921a385d2c1SPavel Labath vm_addr, info.GetReadable(), info.GetExecutable(), 922a385d2c1SPavel Labath info.GetWritable()); 9234ad5def9SAdrian McCarthy return error; 9244ad5def9SAdrian McCarthy } 9254ad5def9SAdrian McCarthy 926b9c1b51eSKate Stone lldb::addr_t ProcessWindows::GetImageInfoAddress() { 92718a9135dSAdrian McCarthy Target &target = GetTarget(); 92818a9135dSAdrian McCarthy ObjectFile *obj_file = target.GetExecutableModule()->GetObjectFile(); 92918a9135dSAdrian McCarthy Address addr = obj_file->GetImageInfoAddress(&target); 93018a9135dSAdrian McCarthy if (addr.IsValid()) 93118a9135dSAdrian McCarthy return addr.GetLoadAddress(&target); 93218a9135dSAdrian McCarthy else 93318a9135dSAdrian McCarthy return LLDB_INVALID_ADDRESS; 93418a9135dSAdrian McCarthy } 93518a9135dSAdrian McCarthy 936eb6671e7SAaron Smith DynamicLoaderWindowsDYLD *ProcessWindows::GetDynamicLoader() { 93796b82107SAaron Smith if (m_dyld_up.get() == NULL) 93896b82107SAaron Smith m_dyld_up.reset(DynamicLoader::FindPlugin( 939eb6671e7SAaron Smith this, DynamicLoaderWindowsDYLD::GetPluginNameStatic().GetCString())); 94096b82107SAaron Smith return static_cast<DynamicLoaderWindowsDYLD *>(m_dyld_up.get()); 941eb6671e7SAaron Smith } 942eb6671e7SAaron Smith 9434ad5def9SAdrian McCarthy void ProcessWindows::OnExitProcess(uint32_t exit_code) { 9444ad5def9SAdrian McCarthy // No need to acquire the lock since m_session_data isn't accessed. 945a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_PROCESS); 946a385d2c1SPavel Labath LLDB_LOG(log, "Process {0} exited with code {1}", GetID(), exit_code); 9474ad5def9SAdrian McCarthy 948d7e126c4SJim Ingham TargetSP target = CalculateTarget(); 9494ad5def9SAdrian McCarthy if (target) { 9504ad5def9SAdrian McCarthy ModuleSP executable_module = target->GetExecutableModule(); 9514ad5def9SAdrian McCarthy ModuleList unloaded_modules; 9524ad5def9SAdrian McCarthy unloaded_modules.Append(executable_module); 9534ad5def9SAdrian McCarthy target->ModulesDidUnload(unloaded_modules, true); 9544ad5def9SAdrian McCarthy } 9554ad5def9SAdrian McCarthy 9564ad5def9SAdrian McCarthy SetProcessExitStatus(GetID(), true, 0, exit_code); 9574ad5def9SAdrian McCarthy SetPrivateState(eStateExited); 958e3037904SAaron Smith 959e3037904SAaron Smith // If the process exits before any initial stop then notify the debugger 960e3037904SAaron Smith // of the error otherwise WaitForDebuggerConnection() will be blocked. 961e3037904SAaron Smith // An example of this issue is when a process fails to load a dependent DLL. 962c28daec5SAaron Smith if (m_session_data && !m_session_data->m_initial_stop_received) { 963e3037904SAaron Smith Status error(exit_code, eErrorTypeWin32); 964e3037904SAaron Smith OnDebuggerError(error, 0); 965e3037904SAaron Smith } 9664ad5def9SAdrian McCarthy } 9674ad5def9SAdrian McCarthy 9684ad5def9SAdrian McCarthy void ProcessWindows::OnDebuggerConnected(lldb::addr_t image_base) { 9694ad5def9SAdrian McCarthy DebuggerThreadSP debugger = m_session_data->m_debugger; 970a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_PROCESS); 971a385d2c1SPavel Labath LLDB_LOG(log, "Debugger connected to process {0}. Image base = {1:x}", 9724ad5def9SAdrian McCarthy debugger->GetProcess().GetProcessId(), image_base); 9734ad5def9SAdrian McCarthy 9744ad5def9SAdrian McCarthy ModuleSP module = GetTarget().GetExecutableModule(); 9754ad5def9SAdrian McCarthy if (!module) { 9764ad5def9SAdrian McCarthy // During attach, we won't have the executable module, so find it now. 9774ad5def9SAdrian McCarthy const DWORD pid = debugger->GetProcess().GetProcessId(); 9784ad5def9SAdrian McCarthy const std::string file_name = GetProcessExecutableName(pid); 9794ad5def9SAdrian McCarthy if (file_name.empty()) { 9804ad5def9SAdrian McCarthy return; 9814ad5def9SAdrian McCarthy } 9824ad5def9SAdrian McCarthy 98354bb3161SAleksandr Urakov FileSpec executable_file(file_name); 98454bb3161SAleksandr Urakov FileSystem::Instance().Resolve(executable_file); 9854ad5def9SAdrian McCarthy ModuleSpec module_spec(executable_file); 98697206d57SZachary Turner Status error; 9871724a179SJason Molenda module = GetTarget().GetOrCreateModule(module_spec, 9881724a179SJason Molenda true /* notify */, &error); 9894ad5def9SAdrian McCarthy if (!module) { 9904ad5def9SAdrian McCarthy return; 9914ad5def9SAdrian McCarthy } 9924ad5def9SAdrian McCarthy 993d54ee88aSTatyana Krasnukha GetTarget().SetExecutableModule(module, eLoadDependentsNo); 9944ad5def9SAdrian McCarthy } 9954ad5def9SAdrian McCarthy 996eb6671e7SAaron Smith if (auto dyld = GetDynamicLoader()) 997a2d9fdf5SStella Stamenova dyld->OnLoadModule(module, ModuleSpec(), image_base); 9984ad5def9SAdrian McCarthy 9994ad5def9SAdrian McCarthy // Add the main executable module to the list of pending module loads. We 100005097246SAdrian Prantl // can't call GetTarget().ModulesDidLoad() here because we still haven't 100105097246SAdrian Prantl // returned from DoLaunch() / DoAttach() yet so the target may not have set 100205097246SAdrian Prantl // the process instance to `this` yet. 10034ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 10044ad5def9SAdrian McCarthy const HostThreadWindows &wmain_thread = 10054ad5def9SAdrian McCarthy debugger->GetMainThread().GetNativeThread(); 10064ad5def9SAdrian McCarthy m_session_data->m_new_threads[wmain_thread.GetThreadId()] = 10074ad5def9SAdrian McCarthy debugger->GetMainThread(); 10084ad5def9SAdrian McCarthy } 10094ad5def9SAdrian McCarthy 10104ad5def9SAdrian McCarthy ExceptionResult 10114ad5def9SAdrian McCarthy ProcessWindows::OnDebugException(bool first_chance, 10124ad5def9SAdrian McCarthy const ExceptionRecord &record) { 1013a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_EXCEPTION); 10144ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 10154ad5def9SAdrian McCarthy 10164ad5def9SAdrian McCarthy // FIXME: Without this check, occasionally when running the test suite there 10174ad5def9SAdrian McCarthy // is 10184ad5def9SAdrian McCarthy // an issue where m_session_data can be null. It's not clear how this could 101905097246SAdrian Prantl // happen but it only surfaces while running the test suite. In order to 102005097246SAdrian Prantl // properly diagnose this, we probably need to first figure allow the test 102105097246SAdrian Prantl // suite to print out full lldb logs, and then add logging to the process 102205097246SAdrian Prantl // plugin. 10234ad5def9SAdrian McCarthy if (!m_session_data) { 102462c76db4SStella Stamenova LLDB_LOG(log, 102562c76db4SStella Stamenova "Debugger thread reported exception {0:x} at address {1:x}, " 1026a385d2c1SPavel Labath "but there is no session.", 10274ad5def9SAdrian McCarthy record.GetExceptionCode(), record.GetExceptionAddress()); 10284ad5def9SAdrian McCarthy return ExceptionResult::SendToApplication; 10294ad5def9SAdrian McCarthy } 10304ad5def9SAdrian McCarthy 10314ad5def9SAdrian McCarthy if (!first_chance) { 1032a5235af9SAleksandr Urakov // Not any second chance exception is an application crash by definition. 1033a5235af9SAleksandr Urakov // It may be an expression evaluation crash. 1034a5235af9SAleksandr Urakov SetPrivateState(eStateStopped); 10354ad5def9SAdrian McCarthy } 10364ad5def9SAdrian McCarthy 10374ad5def9SAdrian McCarthy ExceptionResult result = ExceptionResult::SendToApplication; 10384ad5def9SAdrian McCarthy switch (record.GetExceptionCode()) { 10394ad5def9SAdrian McCarthy case EXCEPTION_BREAKPOINT: 10404ad5def9SAdrian McCarthy // Handle breakpoints at the first chance. 10414ad5def9SAdrian McCarthy result = ExceptionResult::BreakInDebugger; 10424ad5def9SAdrian McCarthy 10434ad5def9SAdrian McCarthy if (!m_session_data->m_initial_stop_received) { 1044a385d2c1SPavel Labath LLDB_LOG( 1045a385d2c1SPavel Labath log, 1046a385d2c1SPavel Labath "Hit loader breakpoint at address {0:x}, setting initial stop event.", 10474ad5def9SAdrian McCarthy record.GetExceptionAddress()); 10484ad5def9SAdrian McCarthy m_session_data->m_initial_stop_received = true; 10494ad5def9SAdrian McCarthy ::SetEvent(m_session_data->m_initial_stop_event); 10504ad5def9SAdrian McCarthy } else { 1051a385d2c1SPavel Labath LLDB_LOG(log, "Hit non-loader breakpoint at address {0:x}.", 10524ad5def9SAdrian McCarthy record.GetExceptionAddress()); 10534ad5def9SAdrian McCarthy } 10544ad5def9SAdrian McCarthy SetPrivateState(eStateStopped); 10554ad5def9SAdrian McCarthy break; 10564ad5def9SAdrian McCarthy case EXCEPTION_SINGLE_STEP: 10574ad5def9SAdrian McCarthy result = ExceptionResult::BreakInDebugger; 10584ad5def9SAdrian McCarthy SetPrivateState(eStateStopped); 10594ad5def9SAdrian McCarthy break; 10604ad5def9SAdrian McCarthy default: 106162c76db4SStella Stamenova LLDB_LOG(log, 106262c76db4SStella Stamenova "Debugger thread reported exception {0:x} at address {1:x} " 1063a385d2c1SPavel Labath "(first_chance={2})", 10644ad5def9SAdrian McCarthy record.GetExceptionCode(), record.GetExceptionAddress(), 1065a385d2c1SPavel Labath first_chance); 10664ad5def9SAdrian McCarthy // For non-breakpoints, give the application a chance to handle the 10674ad5def9SAdrian McCarthy // exception first. 10684ad5def9SAdrian McCarthy if (first_chance) 10694ad5def9SAdrian McCarthy result = ExceptionResult::SendToApplication; 10704ad5def9SAdrian McCarthy else 10714ad5def9SAdrian McCarthy result = ExceptionResult::BreakInDebugger; 10724ad5def9SAdrian McCarthy } 10734ad5def9SAdrian McCarthy 10744ad5def9SAdrian McCarthy return result; 10754ad5def9SAdrian McCarthy } 10764ad5def9SAdrian McCarthy 10774ad5def9SAdrian McCarthy void ProcessWindows::OnCreateThread(const HostThread &new_thread) { 10784ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 10794ad5def9SAdrian McCarthy const HostThreadWindows &wnew_thread = new_thread.GetNativeThread(); 10804ad5def9SAdrian McCarthy m_session_data->m_new_threads[wnew_thread.GetThreadId()] = new_thread; 10814ad5def9SAdrian McCarthy } 10824ad5def9SAdrian McCarthy 10834ad5def9SAdrian McCarthy void ProcessWindows::OnExitThread(lldb::tid_t thread_id, uint32_t exit_code) { 10844ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 10854ad5def9SAdrian McCarthy 10864ad5def9SAdrian McCarthy // On a forced termination, we may get exit thread events after the session 10874ad5def9SAdrian McCarthy // data has been cleaned up. 10884ad5def9SAdrian McCarthy if (!m_session_data) 10894ad5def9SAdrian McCarthy return; 10904ad5def9SAdrian McCarthy 10914ad5def9SAdrian McCarthy // A thread may have started and exited before the debugger stopped allowing a 10924ad5def9SAdrian McCarthy // refresh. 10934ad5def9SAdrian McCarthy // Just remove it from the new threads list in that case. 10944ad5def9SAdrian McCarthy auto iter = m_session_data->m_new_threads.find(thread_id); 10954ad5def9SAdrian McCarthy if (iter != m_session_data->m_new_threads.end()) 10964ad5def9SAdrian McCarthy m_session_data->m_new_threads.erase(iter); 10974ad5def9SAdrian McCarthy else 10984ad5def9SAdrian McCarthy m_session_data->m_exited_threads.insert(thread_id); 10994ad5def9SAdrian McCarthy } 11004ad5def9SAdrian McCarthy 11014ad5def9SAdrian McCarthy void ProcessWindows::OnLoadDll(const ModuleSpec &module_spec, 11024ad5def9SAdrian McCarthy lldb::addr_t module_addr) { 1103eb6671e7SAaron Smith if (auto dyld = GetDynamicLoader()) 1104a2d9fdf5SStella Stamenova dyld->OnLoadModule(nullptr, module_spec, module_addr); 11054ad5def9SAdrian McCarthy } 11064ad5def9SAdrian McCarthy 11074ad5def9SAdrian McCarthy void ProcessWindows::OnUnloadDll(lldb::addr_t module_addr) { 1108eb6671e7SAaron Smith if (auto dyld = GetDynamicLoader()) 1109eb6671e7SAaron Smith dyld->OnUnloadModule(module_addr); 11104ad5def9SAdrian McCarthy } 11114ad5def9SAdrian McCarthy 11124ad5def9SAdrian McCarthy void ProcessWindows::OnDebugString(const std::string &string) {} 11134ad5def9SAdrian McCarthy 111497206d57SZachary Turner void ProcessWindows::OnDebuggerError(const Status &error, uint32_t type) { 11154ad5def9SAdrian McCarthy llvm::sys::ScopedLock lock(m_mutex); 1116a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_PROCESS); 11174ad5def9SAdrian McCarthy 11184ad5def9SAdrian McCarthy if (m_session_data->m_initial_stop_received) { 111905097246SAdrian Prantl // This happened while debugging. Do we shutdown the debugging session, 112005097246SAdrian Prantl // try to continue, or do something else? 112162c76db4SStella Stamenova LLDB_LOG(log, 112262c76db4SStella Stamenova "Error {0} occurred during debugging. Unexpected behavior " 1123a385d2c1SPavel Labath "may result. {1}", 1124a385d2c1SPavel Labath error.GetError(), error); 11254ad5def9SAdrian McCarthy } else { 11264ad5def9SAdrian McCarthy // If we haven't actually launched the process yet, this was an error 112705097246SAdrian Prantl // launching the process. Set the internal error and signal the initial 112805097246SAdrian Prantl // stop event so that the DoLaunch method wakes up and returns a failure. 11294ad5def9SAdrian McCarthy m_session_data->m_launch_error = error; 11304ad5def9SAdrian McCarthy ::SetEvent(m_session_data->m_initial_stop_event); 1131a385d2c1SPavel Labath LLDB_LOG( 1132a385d2c1SPavel Labath log, 1133a385d2c1SPavel Labath "Error {0} occurred launching the process before the initial stop. {1}", 1134a385d2c1SPavel Labath error.GetError(), error); 11354ad5def9SAdrian McCarthy return; 11364ad5def9SAdrian McCarthy } 11374ad5def9SAdrian McCarthy } 11384ad5def9SAdrian McCarthy 113997206d57SZachary Turner Status ProcessWindows::WaitForDebuggerConnection(DebuggerThreadSP debugger, 11404ad5def9SAdrian McCarthy HostProcess &process) { 114197206d57SZachary Turner Status result; 1142a385d2c1SPavel Labath Log *log = ProcessWindowsLog::GetLogIfAny(WINDOWS_LOG_PROCESS | 1143a385d2c1SPavel Labath WINDOWS_LOG_BREAKPOINTS); 1144a385d2c1SPavel Labath LLDB_LOG(log, "Waiting for loader breakpoint."); 11454ad5def9SAdrian McCarthy 11464ad5def9SAdrian McCarthy // Block this function until we receive the initial stop from the process. 11474ad5def9SAdrian McCarthy if (::WaitForSingleObject(m_session_data->m_initial_stop_event, INFINITE) == 11484ad5def9SAdrian McCarthy WAIT_OBJECT_0) { 1149a385d2c1SPavel Labath LLDB_LOG(log, "hit loader breakpoint, returning."); 11504ad5def9SAdrian McCarthy 11514ad5def9SAdrian McCarthy process = debugger->GetProcess(); 11524ad5def9SAdrian McCarthy return m_session_data->m_launch_error; 11534ad5def9SAdrian McCarthy } else 115497206d57SZachary Turner return Status(::GetLastError(), eErrorTypeWin32); 11554ad5def9SAdrian McCarthy } 11564ad5def9SAdrian McCarthy 1157b9c1b51eSKate Stone // The Windows page protection bits are NOT independent masks that can be 115805097246SAdrian Prantl // bitwise-ORed together. For example, PAGE_EXECUTE_READ is not (PAGE_EXECUTE 115905097246SAdrian Prantl // | PAGE_READ). To test for an access type, it's necessary to test for any of 116005097246SAdrian Prantl // the bits that provide that access type. 1161b9c1b51eSKate Stone bool ProcessWindows::IsPageReadable(uint32_t protect) { 11620c35cde9SAdrian McCarthy return (protect & PAGE_NOACCESS) == 0; 11630c35cde9SAdrian McCarthy } 11640c35cde9SAdrian McCarthy 1165b9c1b51eSKate Stone bool ProcessWindows::IsPageWritable(uint32_t protect) { 1166b9c1b51eSKate Stone return (protect & (PAGE_EXECUTE_READWRITE | PAGE_EXECUTE_WRITECOPY | 1167b9c1b51eSKate Stone PAGE_READWRITE | PAGE_WRITECOPY)) != 0; 11680c35cde9SAdrian McCarthy } 11690c35cde9SAdrian McCarthy 1170b9c1b51eSKate Stone bool ProcessWindows::IsPageExecutable(uint32_t protect) { 1171b9c1b51eSKate Stone return (protect & (PAGE_EXECUTE | PAGE_EXECUTE_READ | PAGE_EXECUTE_READWRITE | 1172b9c1b51eSKate Stone PAGE_EXECUTE_WRITECOPY)) != 0; 11730c35cde9SAdrian McCarthy } 11744ad5def9SAdrian McCarthy 11754ad5def9SAdrian McCarthy } // namespace lldb_private 1176