LLDB mainline
ProcessDebugger.cpp
Go to the documentation of this file.
1//===-- ProcessDebugger.cpp -----------------------------------------------===//
2//
3// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4// See https://llvm.org/LICENSE.txt for license information.
5// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6//
7//===----------------------------------------------------------------------===//
8
9#include "ProcessDebugger.h"
10
11// Windows includes
13#include <psapi.h>
14
21#include "lldb/Target/Process.h"
22#include "llvm/Support/ConvertUTF.h"
23#include "llvm/Support/Error.h"
24
25#include "DebuggerThread.h"
26#include "ExceptionRecord.h"
27#include "ProcessWindowsLog.h"
28
29using namespace lldb;
30using namespace lldb_private;
31
32static DWORD ConvertLldbToWinApiProtect(uint32_t protect) {
33 // We also can process a read / write permissions here, but if the debugger
34 // will make later a write into the allocated memory, it will fail. To get
35 // around it is possible inside DoWriteMemory to remember memory permissions,
36 // allow write, write and restore permissions, but for now we process only
37 // the executable permission.
38 //
39 // TODO: Process permissions other than executable
40 if (protect & ePermissionsExecutable)
41 return PAGE_EXECUTE_READWRITE;
42
43 return PAGE_READWRITE;
44}
45
46// The Windows page protection bits are NOT independent masks that can be
47// bitwise-ORed together. For example, PAGE_EXECUTE_READ is not (PAGE_EXECUTE
48// | PAGE_READ). To test for an access type, it's necessary to test for any of
49// the bits that provide that access type.
50static bool IsPageReadable(uint32_t protect) {
51 return (protect & PAGE_NOACCESS) == 0;
52}
53
54static bool IsPageWritable(uint32_t protect) {
55 return (protect & (PAGE_EXECUTE_READWRITE | PAGE_EXECUTE_WRITECOPY |
56 PAGE_READWRITE | PAGE_WRITECOPY)) != 0;
57}
58
59static bool IsPageExecutable(uint32_t protect) {
60 return (protect & (PAGE_EXECUTE | PAGE_EXECUTE_READ | PAGE_EXECUTE_READWRITE |
61 PAGE_EXECUTE_WRITECOPY)) != 0;
62}
63
64namespace lldb_private {
65
67
70 return m_session_data->m_debugger->GetProcess().GetProcessId();
72}
73
76 DebuggerThreadSP debugger_thread;
77 {
78 // Acquire the lock only long enough to get the DebuggerThread.
79 // StopDebugging() will trigger a call back into ProcessDebugger which will
80 // also acquire the lock. Thus we have to release the lock before calling
81 // StopDebugging().
82 llvm::sys::ScopedLock lock(m_mutex);
83
84 if (!m_session_data) {
85 LLDB_LOG(log, "there is no active session.");
86 return Status();
87 }
88
89 debugger_thread = m_session_data->m_debugger;
90 }
91
93
94 LLDB_LOG(log, "detaching from process {0}.",
95 debugger_thread->GetProcess().GetNativeProcess().GetSystemHandle());
96 error = debugger_thread->StopDebugging(false);
97
98 // By the time StopDebugging returns, there is no more debugger thread, so
99 // we can be assured that no other thread will race for the session data.
100 m_session_data.reset();
101
102 return error;
103}
104
106 DebugDelegateSP delegate) {
107 // Even though m_session_data is accessed here, it is before a debugger
108 // thread has been kicked off. So there's no race conditions, and it
109 // shouldn't be necessary to acquire the mutex.
110
112 Status result;
113
114 FileSpec working_dir = launch_info.GetWorkingDirectory();
115 namespace fs = llvm::sys::fs;
116 if (working_dir) {
117 FileSystem::Instance().Resolve(working_dir);
118 if (!FileSystem::Instance().IsDirectory(working_dir)) {
120 "No such file or directory: %s", working_dir.GetPath().c_str());
121 return result;
122 }
123 }
124
125 if (!launch_info.GetFlags().Test(eLaunchFlagDebug)) {
126 StreamString stream;
127 stream.Printf("ProcessDebugger unable to launch '%s'. ProcessDebugger can "
128 "only be used for debug launches.",
129 launch_info.GetExecutableFile().GetPath().c_str());
130 std::string message = stream.GetString().str();
131 result = Status::FromErrorString(message.c_str());
132
133 LLDB_LOG(log, "error: {0}", message);
134 return result;
135 }
136
137 bool stop_at_entry = launch_info.GetFlags().Test(eLaunchFlagStopAtEntry);
138 m_session_data.reset(new ProcessWindowsData(stop_at_entry));
139 m_session_data->m_debugger.reset(new DebuggerThread(delegate));
140 DebuggerThreadSP debugger = m_session_data->m_debugger;
141
142 // Kick off the DebugLaunch asynchronously and wait for it to complete.
143 result = debugger->DebugLaunch(launch_info);
144 if (result.Fail()) {
145 LLDB_LOG(log, "failed launching '{0}'. {1}",
146 launch_info.GetExecutableFile().GetPath(), result);
147 return result;
148 }
149
150 HostProcess process;
151 Status error = WaitForDebuggerConnection(debugger, process);
152 if (error.Fail()) {
153 LLDB_LOG(log, "failed launching '{0}'. {1}",
154 launch_info.GetExecutableFile().GetPath(), error);
155 return error;
156 }
157
158 LLDB_LOG(log, "successfully launched '{0}'",
159 launch_info.GetExecutableFile().GetPath());
160
161 // We've hit the initial stop. If eLaunchFlagsStopAtEntry was specified, the
162 // private state should already be set to eStateStopped as a result of
163 // hitting the initial breakpoint. If it was not set, the breakpoint should
164 // have already been resumed from and the private state should already be
165 // eStateRunning.
166 launch_info.SetProcessID(process.GetProcessId());
167
168 return result;
169}
170
172 const ProcessAttachInfo &attach_info,
173 DebugDelegateSP delegate) {
175 m_session_data.reset(
176 new ProcessWindowsData(!attach_info.GetContinueOnceAttached()));
177 DebuggerThreadSP debugger(new DebuggerThread(delegate));
178
179 m_session_data->m_debugger = debugger;
180
181 DWORD process_id = static_cast<DWORD>(pid);
182 Status error = debugger->DebugAttach(process_id, attach_info);
183 if (error.Fail()) {
184 LLDB_LOG(
185 log,
186 "encountered an error occurred initiating the asynchronous attach. {0}",
187 error);
188 return error;
189 }
190
191 HostProcess process;
192 error = WaitForDebuggerConnection(debugger, process);
193 if (error.Fail()) {
194 LLDB_LOG(log,
195 "encountered an error waiting for the debugger to connect. {0}",
196 error);
197 return error;
198 }
199
200 LLDB_LOG(log, "successfully attached to process with pid={0}", process_id);
201
202 // We've hit the initial stop. If eLaunchFlagsStopAtEntry was specified, the
203 // private state should already be set to eStateStopped as a result of
204 // hitting the initial breakpoint. If it was not set, the breakpoint should
205 // have already been resumed from and the private state should already be
206 // eStateRunning.
207
208 return error;
209}
210
213 DebuggerThreadSP debugger_thread;
214 {
215 // Acquire this lock inside an inner scope, only long enough to get the
216 // DebuggerThread. StopDebugging() will trigger a call back into
217 // ProcessDebugger which will acquire the lock again, so we need to not
218 // deadlock.
219 llvm::sys::ScopedLock lock(m_mutex);
220
221 if (!m_session_data) {
222 LLDB_LOG(log, "warning: state = {0}, but there is no active session.",
223 state);
224 return Status();
225 }
226
227 debugger_thread = m_session_data->m_debugger;
228 }
229
230 if (state == eStateExited || state == eStateDetached) {
231 LLDB_LOG(log, "warning: cannot destroy process {0} while state = {1}.",
232 GetDebuggedProcessId(), state);
233 return Status();
234 }
235
236 LLDB_LOG(log, "Shutting down process {0}.",
237 debugger_thread->GetProcess().GetNativeProcess().GetSystemHandle());
238 auto error = debugger_thread->StopDebugging(true);
239
240 // By the time StopDebugging returns, there is no more debugger thread, so
241 // we can be assured that no other thread will race for the session data.
242 m_session_data.reset();
243
244 return error;
245}
246
250 llvm::sys::ScopedLock lock(m_mutex);
251 caused_stop = ::DebugBreakProcess(m_session_data->m_debugger->GetProcess()
252 .GetNativeProcess()
253 .GetSystemHandle());
254 if (!caused_stop) {
255 error = Status(::GetLastError(), eErrorTypeWin32);
256 LLDB_LOG(log, "DebugBreakProcess failed with error {0}", error);
257 }
258
259 return error;
260}
261
262Status ProcessDebugger::ReadMemory(lldb::addr_t vm_addr, void *buf, size_t size,
263 size_t &bytes_read) {
265 bytes_read = 0;
267 llvm::sys::ScopedLock lock(m_mutex);
268
269 if (!m_session_data) {
271 "cannot read, there is no active debugger connection.");
272 LLDB_LOG(log, "error: {0}", error);
273 return error;
274 }
275
276 LLDB_LOG(log, "attempting to read {0} bytes from address {1:x}", size,
277 vm_addr);
278
279 lldb::process_t handle = m_session_data->m_debugger->GetProcess()
280 .GetNativeProcess()
281 .GetSystemHandle();
282 void *addr = reinterpret_cast<void *>(vm_addr);
283 SIZE_T num_of_bytes_read = 0;
284 if (::ReadProcessMemory(handle, addr, buf, size, &num_of_bytes_read)) {
285 bytes_read = num_of_bytes_read;
286 return Status();
287 }
288 error = Status(GetLastError(), eErrorTypeWin32);
289 MemoryRegionInfo info;
290 if (GetMemoryRegionInfo(vm_addr, info).Fail() ||
292 return error;
293 size = info.GetRange().GetRangeEnd() - vm_addr;
294 LLDB_LOG(log, "retrying the read with size {0:x}", size);
295 if (::ReadProcessMemory(handle, addr, buf, size, &num_of_bytes_read)) {
296 LLDB_LOG(log, "success: read {0:x} bytes", num_of_bytes_read);
297 bytes_read = num_of_bytes_read;
298 return Status();
299 }
300 error = Status(GetLastError(), eErrorTypeWin32);
301 LLDB_LOG(log, "error: {0}", error);
302 return error;
303}
304
306 size_t size, size_t &bytes_written) {
308 bytes_written = 0;
310 llvm::sys::ScopedLock lock(m_mutex);
311 LLDB_LOG(log, "attempting to write {0} bytes into address {1:x}", size,
312 vm_addr);
313
314 if (!m_session_data) {
316 "cannot write, there is no active debugger connection.");
317 LLDB_LOG(log, "error: {0}", error);
318 return error;
319 }
320
321 HostProcess process = m_session_data->m_debugger->GetProcess();
322 void *addr = reinterpret_cast<void *>(vm_addr);
323 SIZE_T num_of_bytes_written = 0;
325 if (::WriteProcessMemory(handle, addr, buf, size, &num_of_bytes_written)) {
326 FlushInstructionCache(handle, addr, num_of_bytes_written);
327 bytes_written = num_of_bytes_written;
328 } else {
329 error = Status(GetLastError(), eErrorTypeWin32);
330 LLDB_LOG(log, "writing failed with error: {0}", error);
331 }
332 return error;
333}
334
335Status ProcessDebugger::AllocateMemory(size_t size, uint32_t permissions,
336 lldb::addr_t &addr) {
340 llvm::sys::ScopedLock lock(m_mutex);
341 LLDB_LOG(log, "attempting to allocate {0} bytes with permissions {1}", size,
342 permissions);
343
344 if (!m_session_data) {
346 "cannot allocate, there is no active debugger connection");
347 LLDB_LOG(log, "error: {0}", error);
348 return error;
349 }
350
351 HostProcess process = m_session_data->m_debugger->GetProcess();
353 auto protect = ConvertLldbToWinApiProtect(permissions);
354 auto result = ::VirtualAllocEx(handle, nullptr, size, MEM_COMMIT, protect);
355 if (!result) {
356 error = Status(GetLastError(), eErrorTypeWin32);
357 LLDB_LOG(log, "allocating failed with error: {0}", error);
358 } else {
359 addr = reinterpret_cast<addr_t>(result);
360 }
361 return error;
362}
363
365 Status result;
366
368 llvm::sys::ScopedLock lock(m_mutex);
369 LLDB_LOG(log, "attempting to deallocate bytes at address {0}", vm_addr);
370
371 if (!m_session_data) {
373 "cannot deallocate, there is no active debugger connection");
374 LLDB_LOG(log, "error: {0}", result);
375 return result;
376 }
377
378 HostProcess process = m_session_data->m_debugger->GetProcess();
380 if (!::VirtualFreeEx(handle, reinterpret_cast<LPVOID>(vm_addr), 0,
381 MEM_RELEASE)) {
382 result = Status(GetLastError(), eErrorTypeWin32);
383 LLDB_LOG(log, "deallocating failed with error: {0}", result);
384 }
385
386 return result;
387}
388
390 MemoryRegionInfo &info) {
393 llvm::sys::ScopedLock lock(m_mutex);
394 info.Clear();
395
396 if (!m_session_data) {
398 "GetMemoryRegionInfo called with no debugging session.");
399 LLDB_LOG(log, "error: {0}", error);
400 return error;
401 }
402 HostProcess process = m_session_data->m_debugger->GetProcess();
404 if (handle == nullptr || handle == LLDB_INVALID_PROCESS) {
406 "GetMemoryRegionInfo called with an invalid target process.");
407 LLDB_LOG(log, "error: {0}", error);
408 return error;
409 }
410
411 LLDB_LOG(log, "getting info for address {0:x}", vm_addr);
412
413 void *addr = reinterpret_cast<void *>(vm_addr);
414 MEMORY_BASIC_INFORMATION mem_info = {};
415 SIZE_T result = ::VirtualQueryEx(handle, addr, &mem_info, sizeof(mem_info));
416 if (result == 0) {
417 DWORD last_error = ::GetLastError();
418 if (last_error == ERROR_INVALID_PARAMETER) {
419 // ERROR_INVALID_PARAMETER is returned if VirtualQueryEx is called with
420 // an address past the highest accessible address. We should return a
421 // range from the vm_addr to LLDB_INVALID_ADDRESS
422 info.GetRange().SetRangeBase(vm_addr);
428 return error;
429 } else {
430 error = Status(last_error, eErrorTypeWin32);
431 LLDB_LOG(log,
432 "VirtualQueryEx returned error {0} while getting memory "
433 "region info for address {1:x}",
434 error, vm_addr);
435 return error;
436 }
437 }
438
439 // Protect bits are only valid for MEM_COMMIT regions.
440 if (mem_info.State == MEM_COMMIT) {
441 const bool readable = IsPageReadable(mem_info.Protect);
442 const bool executable = IsPageExecutable(mem_info.Protect);
443 const bool writable = IsPageWritable(mem_info.Protect);
445 info.SetExecutable(executable ? MemoryRegionInfo::eYes
448 } else {
452 }
453
454 // AllocationBase is defined for MEM_COMMIT and MEM_RESERVE but not MEM_FREE.
455 if (mem_info.State != MEM_FREE) {
456 info.GetRange().SetRangeBase(
457 reinterpret_cast<addr_t>(mem_info.BaseAddress));
458 info.GetRange().SetRangeEnd(reinterpret_cast<addr_t>(mem_info.BaseAddress) +
459 mem_info.RegionSize);
461 } else {
462 // In the unmapped case we need to return the distance to the next block of
463 // memory. VirtualQueryEx nearly does that except that it gives the
464 // distance from the start of the page containing vm_addr.
465 SYSTEM_INFO data;
466 ::GetSystemInfo(&data);
467 DWORD page_offset = vm_addr % data.dwPageSize;
468 info.GetRange().SetRangeBase(vm_addr);
469 info.GetRange().SetByteSize(mem_info.RegionSize - page_offset);
471 }
472
473 LLDB_LOGV(log,
474 "Memory region info for address {0}: readable={1}, "
475 "executable={2}, writable={3}",
476 vm_addr, info.GetReadable(), info.GetExecutable(),
477 info.GetWritable());
478 return error;
479}
480
481void ProcessDebugger::OnExitProcess(uint32_t exit_code) {
482 // If the process exits before any initial stop then notify the debugger
483 // of the error otherwise WaitForDebuggerConnection() will be blocked.
484 // An example of this issue is when a process fails to load a dependent DLL.
485 if (m_session_data && !m_session_data->m_initial_stop_received) {
486 Status error(exit_code, eErrorTypeWin32);
488 }
489}
490
492
495 const ExceptionRecord &record) {
497 llvm::sys::ScopedLock lock(m_mutex);
498 // FIXME: Without this check, occasionally when running the test suite
499 // there is an issue where m_session_data can be null. It's not clear how
500 // this could happen but it only surfaces while running the test suite. In
501 // order to properly diagnose this, we probably need to first figure allow the
502 // test suite to print out full lldb logs, and then add logging to the process
503 // plugin.
504 if (!m_session_data) {
505 LLDB_LOG(log,
506 "Debugger thread reported exception {0:x} at address {1:x}, but "
507 "there is no session.",
508 record.GetExceptionCode(), record.GetExceptionAddress());
509 return ExceptionResult::SendToApplication;
510 }
511
512 ExceptionResult result = ExceptionResult::SendToApplication;
513 if ((record.GetExceptionCode() == EXCEPTION_BREAKPOINT ||
514 record.GetExceptionCode() ==
515 0x4000001FL /*WOW64 STATUS_WX86_BREAKPOINT*/) &&
516 !m_session_data->m_initial_stop_received) {
517 // Handle breakpoints at the first chance.
518 result = ExceptionResult::BreakInDebugger;
519 LLDB_LOG(
520 log,
521 "Hit loader breakpoint at address {0:x}, setting initial stop event.",
522 record.GetExceptionAddress());
523 m_session_data->m_initial_stop_received = true;
524 ::SetEvent(m_session_data->m_initial_stop_event);
525 }
526 return result;
527}
528
530 // Do nothing by default
531}
532
533void ProcessDebugger::OnExitThread(lldb::tid_t thread_id, uint32_t exit_code) {
534 // Do nothing by default
535}
536
538 lldb::addr_t module_addr) {
539 // Do nothing by default
540}
541
543 // Do nothing by default
544}
545
546void ProcessDebugger::OnDebugString(const std::string &string) {}
547
548void ProcessDebugger::OnDebuggerError(const Status &error, uint32_t type) {
549 llvm::sys::ScopedLock lock(m_mutex);
551
552 if (m_session_data->m_initial_stop_received) {
553 // This happened while debugging. Do we shutdown the debugging session,
554 // try to continue, or do something else?
555 LLDB_LOG(log,
556 "Error {0} occurred during debugging. Unexpected behavior "
557 "may result. {1}",
558 error.GetError(), error);
559 } else {
560 // If we haven't actually launched the process yet, this was an error
561 // launching the process. Set the internal error and signal the initial
562 // stop event so that the DoLaunch method wakes up and returns a failure.
563 m_session_data->m_launch_error = error.Clone();
564 ::SetEvent(m_session_data->m_initial_stop_event);
565 LLDB_LOG(log,
566 "Error {0} occurred launching the process before the initial "
567 "stop. {1}",
568 error.GetError(), error);
569 return;
570 }
571}
572
574 HostProcess &process) {
575 Status result;
577 LLDB_LOG(log, "Waiting for loader breakpoint.");
578
579 // Block this function until we receive the initial stop from the process.
580 if (::WaitForSingleObject(m_session_data->m_initial_stop_event, INFINITE) ==
581 WAIT_OBJECT_0) {
582 LLDB_LOG(log, "hit loader breakpoint, returning.");
583
584 process = debugger->GetProcess();
585 return m_session_data->m_launch_error.Clone();
586 } else
587 return Status(::GetLastError(), eErrorTypeWin32);
588}
589
590} // namespace lldb_private
static llvm::raw_ostream & error(Stream &strm)
ExceptionResult
Definition: ForwardDecl.h:16
static int ReadProcessMemory(uint8_t *buffer, size_t size, const pt_asid *, uint64_t pc, void *context)
Callback used by libipt for reading the process memory.
#define LLDB_LOG(log,...)
The LLDB_LOG* macros defined below are the way to emit log messages.
Definition: Log.h:369
#define LLDB_LOGV(log,...)
Definition: Log.h:383
static bool IsPageExecutable(uint32_t protect)
static bool IsPageWritable(uint32_t protect)
static bool IsPageReadable(uint32_t protect)
static DWORD ConvertLldbToWinApiProtect(uint32_t protect)
lldb::addr_t GetExceptionAddress() const
A file utility class.
Definition: FileSpec.h:56
size_t GetPath(char *path, size_t max_path_length, bool denormalize=true) const
Extract the full path to the file.
Definition: FileSpec.cpp:367
void Resolve(llvm::SmallVectorImpl< char > &path)
Resolve path to make it canonical.
static FileSystem & Instance()
bool Test(ValueType bit) const
Test a single flag bit.
Definition: Flags.h:96
HostNativeProcessBase & GetNativeProcess()
Definition: HostProcess.cpp:36
lldb::pid_t GetProcessId() const
Definition: HostProcess.cpp:25
OptionalBool GetWritable() const
void SetMapped(OptionalBool val)
OptionalBool GetMapped() const
void SetReadable(OptionalBool val)
void SetExecutable(OptionalBool val)
void SetWritable(OptionalBool val)
OptionalBool GetReadable() const
OptionalBool GetExecutable() const
bool GetContinueOnceAttached() const
Definition: Process.h:150
Status WriteMemory(lldb::addr_t addr, const void *buf, size_t size, size_t &bytes_written)
Status DestroyProcess(lldb::StateType process_state)
Status LaunchProcess(ProcessLaunchInfo &launch_info, DebugDelegateSP delegate)
Status WaitForDebuggerConnection(DebuggerThreadSP debugger, HostProcess &process)
Status GetMemoryRegionInfo(lldb::addr_t load_addr, MemoryRegionInfo &range_info)
virtual void OnCreateThread(const HostThread &thread)
virtual void OnDebuggerError(const Status &error, uint32_t type)
virtual void OnExitThread(lldb::tid_t thread_id, uint32_t exit_code)
virtual void OnDebuggerConnected(lldb::addr_t image_base)
std::unique_ptr< ProcessWindowsData > m_session_data
Status AllocateMemory(size_t size, uint32_t permissions, lldb::addr_t &addr)
virtual void OnDebugString(const std::string &string)
virtual ExceptionResult OnDebugException(bool first_chance, const ExceptionRecord &record)
Status AttachProcess(lldb::pid_t pid, const ProcessAttachInfo &attach_info, DebugDelegateSP delegate)
virtual void OnUnloadDll(lldb::addr_t module_addr)
lldb::pid_t GetDebuggedProcessId() const
Status ReadMemory(lldb::addr_t addr, void *buf, size_t size, size_t &bytes_read)
virtual void OnExitProcess(uint32_t exit_code)
virtual void OnLoadDll(const ModuleSpec &module_spec, lldb::addr_t module_addr)
Status HaltProcess(bool &caused_stop)
Status DeallocateMemory(lldb::addr_t addr)
void SetProcessID(lldb::pid_t pid)
Definition: ProcessInfo.h:70
FileSpec & GetExecutableFile()
Definition: ProcessInfo.h:43
const FileSpec & GetWorkingDirectory() const
An error handling class.
Definition: Status.h:115
static Status FromErrorStringWithFormat(const char *format,...) __attribute__((format(printf
Definition: Status.cpp:106
static Status FromErrorString(const char *str)
Definition: Status.h:138
bool Fail() const
Test for error condition.
Definition: Status.cpp:270
llvm::StringRef GetString() const
size_t Printf(const char *format,...) __attribute__((format(printf
Output printf formatted output to the stream.
Definition: Stream.cpp:134
#define LLDB_INVALID_ADDRESS
Definition: lldb-defines.h:82
#define LLDB_INVALID_PROCESS_ID
Definition: lldb-defines.h:89
#define LLDB_INVALID_PROCESS
Definition: lldb-types.h:68
A class that represents a running process on the host machine.
Log * GetLog(Cat mask)
Retrieve the Log object for the channel associated with the given log enum.
Definition: Log.h:332
std::shared_ptr< IDebugDelegate > DebugDelegateSP
Definition: ForwardDecl.h:35
std::shared_ptr< DebuggerThread > DebuggerThreadSP
Definition: ForwardDecl.h:36
Definition: SBAddress.h:15
StateType
Process and Thread States.
@ eStateDetached
Process has been detached and can't be examined.
@ eStateExited
Process has exited and can't be examined.
@ eErrorTypeWin32
Standard Win32 error codes.
uint64_t pid_t
Definition: lldb-types.h:83
uint64_t addr_t
Definition: lldb-types.h:80
uint64_t tid_t
Definition: lldb-types.h:84
uint64_t process_t
Definition: lldb-types.h:57
void SetRangeEnd(BaseType end)
Definition: RangeMap.h:80
void SetRangeBase(BaseType b)
Set the start value for the range, and keep the same size.
Definition: RangeMap.h:48
BaseType GetRangeEnd() const
Definition: RangeMap.h:78
void SetByteSize(SizeType s)
Definition: RangeMap.h:89