| //===-- source/Host/windows/Host.cpp ----------------------------*- C++ -*-===// |
| // |
| // The LLVM Compiler Infrastructure |
| // |
| // This file is distributed under the University of Illinois Open Source |
| // License. See LICENSE.TXT for details. |
| // |
| //===----------------------------------------------------------------------===// |
| |
| // C Includes |
| #include <stdio.h> |
| #include "lldb/Host/windows/windows.h" |
| #include "lldb/Host/windows/AutoHandle.h" |
| |
| // C++ Includes |
| // Other libraries and framework includes |
| // Project includes |
| #include "lldb/Core/Error.h" |
| #include "lldb/Core/Log.h" |
| #include "lldb/Target/Process.h" |
| |
| #include "lldb/Host/Host.h" |
| #include "lldb/Host/HostInfo.h" |
| #include "lldb/Core/DataBufferHeap.h" |
| #include "lldb/Core/DataExtractor.h" |
| #include "lldb/Core/StreamFile.h" |
| #include "lldb/Core/StructuredData.h" |
| |
| // Windows includes |
| #include <TlHelp32.h> |
| |
| using namespace lldb; |
| using namespace lldb_private; |
| |
| namespace |
| { |
| bool GetTripleForProcess(const FileSpec &executable, llvm::Triple &triple) |
| { |
| // Open the PE File as a binary file, and parse just enough information to determine the |
| // machine type. |
| File imageBinary( |
| executable.GetPath().c_str(), |
| File::eOpenOptionRead, |
| lldb::eFilePermissionsUserRead); |
| imageBinary.SeekFromStart(0x3c); |
| int32_t peOffset = 0; |
| uint32_t peHead = 0; |
| uint16_t machineType = 0; |
| size_t readSize = sizeof(peOffset); |
| imageBinary.Read(&peOffset, readSize); |
| imageBinary.SeekFromStart(peOffset); |
| imageBinary.Read(&peHead, readSize); |
| if (peHead != 0x00004550) // "PE\0\0", little-endian |
| return false; // Error: Can't find PE header |
| readSize = 2; |
| imageBinary.Read(&machineType, readSize); |
| triple.setVendor(llvm::Triple::PC); |
| triple.setOS(llvm::Triple::Win32); |
| triple.setArch(llvm::Triple::UnknownArch); |
| if (machineType == 0x8664) |
| triple.setArch(llvm::Triple::x86_64); |
| else if (machineType == 0x14c) |
| triple.setArch(llvm::Triple::x86); |
| |
| return true; |
| } |
| |
| bool GetExecutableForProcess(const AutoHandle &handle, std::string &path) |
| { |
| // Get the process image path. MAX_PATH isn't long enough, paths can actually be up to 32KB. |
| std::vector<char> buffer(32768); |
| DWORD dwSize = buffer.size(); |
| if (!::QueryFullProcessImageNameA(handle.get(), 0, &buffer[0], &dwSize)) |
| return false; |
| path.assign(&buffer[0]); |
| return true; |
| } |
| |
| void GetProcessExecutableAndTriple(const AutoHandle &handle, ProcessInstanceInfo &process) |
| { |
| // We may not have permissions to read the path from the process. So start off by |
| // setting the executable file to whatever Toolhelp32 gives us, and then try to |
| // enhance this with more detailed information, but fail gracefully. |
| std::string executable; |
| llvm::Triple triple; |
| triple.setVendor(llvm::Triple::PC); |
| triple.setOS(llvm::Triple::Win32); |
| triple.setArch(llvm::Triple::UnknownArch); |
| if (GetExecutableForProcess(handle, executable)) |
| { |
| FileSpec executableFile(executable.c_str(), false); |
| process.SetExecutableFile(executableFile, true); |
| GetTripleForProcess(executableFile, triple); |
| } |
| process.SetArchitecture(ArchSpec(triple)); |
| |
| // TODO(zturner): Add the ability to get the process user name. |
| } |
| } |
| |
| lldb::DataBufferSP |
| Host::GetAuxvData(lldb_private::Process *process) |
| { |
| return 0; |
| } |
| |
| lldb::tid_t |
| Host::GetCurrentThreadID() |
| { |
| return lldb::tid_t(::GetCurrentThreadId()); |
| } |
| |
| lldb::thread_t |
| Host::GetCurrentThread () |
| { |
| return lldb::thread_t(::GetCurrentThread()); |
| } |
| |
| lldb::thread_key_t |
| Host::ThreadLocalStorageCreate(ThreadLocalStorageCleanupCallback callback) |
| { |
| return TlsAlloc(); |
| } |
| |
| void* |
| Host::ThreadLocalStorageGet(lldb::thread_key_t key) |
| { |
| return ::TlsGetValue (key); |
| } |
| |
| void |
| Host::ThreadLocalStorageSet(lldb::thread_key_t key, void *value) |
| { |
| ::TlsSetValue (key, value); |
| } |
| |
| void |
| Host::Kill(lldb::pid_t pid, int signo) |
| { |
| TerminateProcess((HANDLE) pid, 1); |
| } |
| |
| |
| const char * |
| Host::GetSignalAsCString(int signo) |
| { |
| return NULL; |
| } |
| |
| FileSpec |
| Host::GetModuleFileSpecForHostAddress (const void *host_addr) |
| { |
| FileSpec module_filespec; |
| |
| HMODULE hmodule = NULL; |
| if (!::GetModuleHandleEx(GET_MODULE_HANDLE_EX_FLAG_FROM_ADDRESS, (LPCTSTR)host_addr, &hmodule)) |
| return module_filespec; |
| |
| std::vector<char> buffer(MAX_PATH); |
| DWORD chars_copied = 0; |
| do { |
| chars_copied = ::GetModuleFileName(hmodule, &buffer[0], buffer.size()); |
| if (chars_copied == buffer.size() && ::GetLastError() == ERROR_INSUFFICIENT_BUFFER) |
| buffer.resize(buffer.size() * 2); |
| } while (chars_copied >= buffer.size()); |
| |
| module_filespec.SetFile(&buffer[0], false); |
| return module_filespec; |
| } |
| |
| uint32_t |
| Host::FindProcesses (const ProcessInstanceInfoMatch &match_info, ProcessInstanceInfoList &process_infos) |
| { |
| process_infos.Clear(); |
| |
| AutoHandle snapshot(CreateToolhelp32Snapshot(TH32CS_SNAPPROCESS, 0)); |
| if (!snapshot.IsValid()) |
| return 0; |
| |
| PROCESSENTRY32 pe = {0}; |
| pe.dwSize = sizeof(PROCESSENTRY32); |
| if (Process32First(snapshot.get(), &pe)) |
| { |
| do |
| { |
| AutoHandle handle(::OpenProcess(PROCESS_QUERY_LIMITED_INFORMATION, FALSE, pe.th32ProcessID), nullptr); |
| |
| ProcessInstanceInfo process; |
| process.SetExecutableFile(FileSpec(pe.szExeFile, false), true); |
| process.SetProcessID(pe.th32ProcessID); |
| process.SetParentProcessID(pe.th32ParentProcessID); |
| GetProcessExecutableAndTriple(handle, process); |
| |
| if (match_info.MatchAllProcesses() || match_info.Matches(process)) |
| process_infos.Append(process); |
| } while (Process32Next(snapshot.get(), &pe)); |
| } |
| return process_infos.GetSize(); |
| } |
| |
| bool |
| Host::GetProcessInfo (lldb::pid_t pid, ProcessInstanceInfo &process_info) |
| { |
| process_info.Clear(); |
| |
| AutoHandle handle(::OpenProcess(PROCESS_QUERY_INFORMATION | PROCESS_VM_READ, FALSE, pid), |
| nullptr); |
| if (!handle.IsValid()) |
| return false; |
| |
| process_info.SetProcessID(pid); |
| GetProcessExecutableAndTriple(handle, process_info); |
| |
| // Need to read the PEB to get parent process and command line arguments. |
| return true; |
| } |
| |
| HostThread |
| Host::StartMonitoringChildProcess(Host::MonitorChildProcessCallback callback, void *callback_baton, lldb::pid_t pid, bool monitor_signals) |
| { |
| return HostThread(); |
| } |
| |
| Error |
| Host::ShellExpandArguments (ProcessLaunchInfo &launch_info) |
| { |
| Error error; |
| if (launch_info.GetFlags().Test(eLaunchFlagShellExpandArguments)) |
| { |
| FileSpec expand_tool_spec; |
| if (!HostInfo::GetLLDBPath(lldb::ePathTypeSupportExecutableDir, expand_tool_spec)) |
| { |
| error.SetErrorString("could not find argdumper tool"); |
| return error; |
| } |
| expand_tool_spec.AppendPathComponent("argdumper.exe"); |
| if (!expand_tool_spec.Exists()) |
| { |
| error.SetErrorString("could not find argdumper tool"); |
| return error; |
| } |
| |
| std::string quoted_cmd_string; |
| launch_info.GetArguments().GetQuotedCommandString(quoted_cmd_string); |
| std::replace(quoted_cmd_string.begin(), quoted_cmd_string.end(), '\\', '/'); |
| StreamString expand_command; |
| |
| expand_command.Printf("%s %s", |
| expand_tool_spec.GetPath().c_str(), |
| quoted_cmd_string.c_str()); |
| |
| int status; |
| std::string output; |
| RunShellCommand(expand_command.GetData(), launch_info.GetWorkingDirectory(), &status, nullptr, &output, 10); |
| |
| if (status != 0) |
| { |
| error.SetErrorStringWithFormat("argdumper exited with error %d", status); |
| return error; |
| } |
| |
| auto data_sp = StructuredData::ParseJSON(output); |
| if (!data_sp) |
| { |
| error.SetErrorString("invalid JSON"); |
| return error; |
| } |
| |
| auto dict_sp = data_sp->GetAsDictionary(); |
| if (!data_sp) |
| { |
| error.SetErrorString("invalid JSON"); |
| return error; |
| } |
| |
| auto args_sp = dict_sp->GetObjectForDotSeparatedPath("arguments"); |
| if (!args_sp) |
| { |
| error.SetErrorString("invalid JSON"); |
| return error; |
| } |
| |
| auto args_array_sp = args_sp->GetAsArray(); |
| if (!args_array_sp) |
| { |
| error.SetErrorString("invalid JSON"); |
| return error; |
| } |
| |
| launch_info.GetArguments().Clear(); |
| |
| for (size_t i = 0; |
| i < args_array_sp->GetSize(); |
| i++) |
| { |
| auto item_sp = args_array_sp->GetItemAtIndex(i); |
| if (!item_sp) |
| continue; |
| auto str_sp = item_sp->GetAsString(); |
| if (!str_sp) |
| continue; |
| |
| launch_info.GetArguments().AppendArgument(str_sp->GetValue().c_str()); |
| } |
| } |
| |
| return error; |
| } |
| |
| size_t |
| Host::GetEnvironment(StringList &env) |
| { |
| // The environment block on Windows is a contiguous buffer of NULL terminated strings, |
| // where the end of the environment block is indicated by two consecutive NULLs. |
| LPCH environment_block = ::GetEnvironmentStrings(); |
| env.Clear(); |
| while (*environment_block != '\0') |
| { |
| llvm::StringRef current_var(environment_block); |
| if (current_var[0] != '=') |
| env.AppendString(current_var); |
| |
| environment_block += current_var.size()+1; |
| } |
| return env.GetSize(); |
| } |