xref: /freebsd/contrib/llvm-project/lldb/source/Plugins/Process/Utility/StopInfoMachException.cpp (revision 700637cbb5e582861067a11aaca4d053546871d2)
1 //===-- StopInfoMachException.cpp -----------------------------------------===//
2 //
3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4 // See https://llvm.org/LICENSE.txt for license information.
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6 //
7 //===----------------------------------------------------------------------===//
8 
9 #include "StopInfoMachException.h"
10 
11 #include "lldb/lldb-forward.h"
12 
13 #if defined(__APPLE__)
14 // Needed for the EXC_RESOURCE interpretation macros
15 #include <kern/exc_resource.h>
16 #endif
17 
18 #include "lldb/Breakpoint/Watchpoint.h"
19 #include "lldb/Symbol/Symbol.h"
20 #include "lldb/Target/ABI.h"
21 #include "lldb/Target/DynamicLoader.h"
22 #include "lldb/Target/ExecutionContext.h"
23 #include "lldb/Target/Process.h"
24 #include "lldb/Target/RegisterContext.h"
25 #include "lldb/Target/Target.h"
26 #include "lldb/Target/Thread.h"
27 #include "lldb/Target/ThreadPlan.h"
28 #include "lldb/Target/UnixSignals.h"
29 #include "lldb/Utility/LLDBLog.h"
30 #include "lldb/Utility/Log.h"
31 #include "lldb/Utility/StreamString.h"
32 #include <optional>
33 
34 using namespace lldb;
35 using namespace lldb_private;
36 
37 /// Information about a pointer-authentication related instruction.
38 struct PtrauthInstructionInfo {
39   bool IsAuthenticated;
40   bool IsLoad;
41   bool DoesBranch;
42 };
43 
44 /// Get any pointer-authentication related information about the instruction
45 /// at address \p at_addr.
46 static std::optional<PtrauthInstructionInfo>
GetPtrauthInstructionInfo(Target & target,const ArchSpec & arch,const Address & at_addr)47 GetPtrauthInstructionInfo(Target &target, const ArchSpec &arch,
48                           const Address &at_addr) {
49   const char *plugin_name = nullptr;
50   const char *flavor = nullptr;
51   const char *cpu = nullptr;
52   const char *features = nullptr;
53   AddressRange range_bounds(at_addr, 4);
54   const bool prefer_file_cache = true;
55   DisassemblerSP disassembler_sp =
56       Disassembler::DisassembleRange(arch, plugin_name, flavor, cpu, features,
57                                      target, range_bounds, prefer_file_cache);
58   if (!disassembler_sp)
59     return std::nullopt;
60 
61   InstructionList &insn_list = disassembler_sp->GetInstructionList();
62   InstructionSP insn = insn_list.GetInstructionAtIndex(0);
63   if (!insn)
64     return std::nullopt;
65 
66   return PtrauthInstructionInfo{insn->IsAuthenticated(), insn->IsLoad(),
67                                 insn->DoesBranch()};
68 }
69 
70 /// Describe the load address of \p addr using the format filename:line:col.
DescribeAddressBriefly(Stream & strm,const Address & addr,Target & target)71 static void DescribeAddressBriefly(Stream &strm, const Address &addr,
72                                    Target &target) {
73   strm.Printf("at address=0x%" PRIx64, addr.GetLoadAddress(&target));
74   StreamString s;
75   if (addr.GetDescription(s, target, eDescriptionLevelBrief))
76     strm.Printf(" %s", s.GetString().data());
77   strm.Printf(".\n");
78 }
79 
DeterminePtrauthFailure(ExecutionContext & exe_ctx)80 bool StopInfoMachException::DeterminePtrauthFailure(ExecutionContext &exe_ctx) {
81   bool IsBreakpoint = m_value == 6; // EXC_BREAKPOINT
82   bool IsBadAccess = m_value == 1;  // EXC_BAD_ACCESS
83   if (!IsBreakpoint && !IsBadAccess)
84     return false;
85 
86   // Check that we have a live process.
87   if (!exe_ctx.HasProcessScope() || !exe_ctx.HasThreadScope() ||
88       !exe_ctx.HasTargetScope())
89     return false;
90 
91   Thread &thread = *exe_ctx.GetThreadPtr();
92   StackFrameSP current_frame = thread.GetStackFrameAtIndex(0);
93   if (!current_frame)
94     return false;
95 
96   Target &target = *exe_ctx.GetTargetPtr();
97   Process &process = *exe_ctx.GetProcessPtr();
98   const ArchSpec &arch = target.GetArchitecture();
99 
100   // Check for a ptrauth-enabled target.
101   const bool ptrauth_enabled_target =
102       arch.GetCore() == ArchSpec::eCore_arm_arm64e;
103   if (!ptrauth_enabled_target)
104     return false;
105 
106   // Set up a stream we can write a diagnostic into.
107   StreamString strm;
108   auto emit_ptrauth_prologue = [&](uint64_t at_address) {
109     strm.Printf("EXC_BAD_ACCESS (code=%" PRIu64 ", address=0x%" PRIx64 ")\n",
110                 m_exc_code, at_address);
111     strm.Printf("Note: Possible pointer authentication failure detected.\n");
112   };
113 
114   ABISP abi_sp = process.GetABI();
115   assert(abi_sp && "Missing ABI info");
116 
117   // Check if we have a "brk 0xc47x" trap, where the value that failed to
118   // authenticate is in x16.
119   Address current_address = current_frame->GetFrameCodeAddress();
120   if (IsBreakpoint) {
121     RegisterContext *reg_ctx = exe_ctx.GetRegisterContext();
122     if (!reg_ctx)
123       return false;
124 
125     const RegisterInfo *X16Info = reg_ctx->GetRegisterInfoByName("x16");
126     RegisterValue X16Val;
127     if (!reg_ctx->ReadRegister(X16Info, X16Val))
128       return false;
129     uint64_t bad_address = X16Val.GetAsUInt64();
130 
131     uint64_t fixed_bad_address = abi_sp->FixCodeAddress(bad_address);
132     Address brk_address;
133     if (!target.ResolveLoadAddress(fixed_bad_address, brk_address))
134       return false;
135 
136     auto brk_ptrauth_info =
137         GetPtrauthInstructionInfo(target, arch, current_address);
138     if (brk_ptrauth_info && brk_ptrauth_info->IsAuthenticated) {
139       emit_ptrauth_prologue(bad_address);
140       strm.Printf("Found value that failed to authenticate ");
141       DescribeAddressBriefly(strm, brk_address, target);
142       m_description = std::string(strm.GetString());
143       return true;
144     }
145     return false;
146   }
147 
148   assert(IsBadAccess && "Handle EXC_BAD_ACCESS only after this point");
149 
150   // Check that we have the "bad address" from an EXC_BAD_ACCESS.
151   if (m_exc_data_count < 2)
152     return false;
153 
154   // Ok, we know the Target is valid and that it describes a ptrauth-enabled
155   // device. Now, we need to determine whether this exception was caused by a
156   // ptrauth failure.
157 
158   uint64_t bad_address = m_exc_subcode;
159   uint64_t fixed_bad_address = abi_sp->FixCodeAddress(bad_address);
160   uint64_t current_pc = current_address.GetLoadAddress(&target);
161 
162   // Detect: LDRAA, LDRAB (Load Register, with pointer authentication).
163   //
164   // If an authenticated load results in an exception, the instruction at the
165   // current PC should be one of LDRAx.
166   if (bad_address != current_pc && fixed_bad_address != current_pc) {
167     auto ptrauth_info =
168         GetPtrauthInstructionInfo(target, arch, current_address);
169     if (ptrauth_info && ptrauth_info->IsAuthenticated && ptrauth_info->IsLoad) {
170       emit_ptrauth_prologue(bad_address);
171       strm.Printf("Found authenticated load instruction ");
172       DescribeAddressBriefly(strm, current_address, target);
173       m_description = std::string(strm.GetString());
174       return true;
175     }
176   }
177 
178   // Detect: BLRAA, BLRAAZ, BLRAB, BLRABZ (Branch with Link to Register, with
179   // pointer authentication).
180   //
181   // TODO: Detect: BRAA, BRAAZ, BRAB, BRABZ (Branch to Register, with pointer
182   // authentication). At a minimum, this requires call site info support for
183   // indirect calls.
184   //
185   // If an authenticated call or tail call results in an exception, stripping
186   // the bad address should give the current PC, which points to the address
187   // we tried to branch to.
188   if (bad_address != current_pc && fixed_bad_address == current_pc) {
189     if (StackFrameSP parent_frame = thread.GetStackFrameAtIndex(1)) {
190       addr_t return_pc =
191           parent_frame->GetFrameCodeAddress().GetLoadAddress(&target);
192       Address blr_address;
193       if (!target.ResolveLoadAddress(return_pc - 4, blr_address))
194         return false;
195 
196       auto blr_ptrauth_info =
197           GetPtrauthInstructionInfo(target, arch, blr_address);
198       if (blr_ptrauth_info && blr_ptrauth_info->IsAuthenticated &&
199           blr_ptrauth_info->DoesBranch) {
200         emit_ptrauth_prologue(bad_address);
201         strm.Printf("Found authenticated indirect branch ");
202         DescribeAddressBriefly(strm, blr_address, target);
203         m_description = std::string(strm.GetString());
204         return true;
205       }
206     }
207   }
208 
209   // TODO: Detect: RETAA, RETAB (Return from subroutine, with pointer
210   // authentication).
211   //
212   // Is there a motivating, non-malicious code snippet that corrupts LR?
213 
214   return false;
215 }
216 
GetDescription()217 const char *StopInfoMachException::GetDescription() {
218   if (!m_description.empty())
219     return m_description.c_str();
220   if (GetValue() == eStopReasonInvalid)
221     return "invalid stop reason!";
222 
223   ExecutionContext exe_ctx(m_thread_wp.lock());
224   Target *target = exe_ctx.GetTargetPtr();
225   const llvm::Triple::ArchType cpu =
226       target ? target->GetArchitecture().GetMachine()
227              : llvm::Triple::UnknownArch;
228 
229   const char *exc_desc = nullptr;
230   const char *code_label = "code";
231   const char *code_desc = nullptr;
232   const char *subcode_label = "subcode";
233   const char *subcode_desc = nullptr;
234 
235 #if defined(__APPLE__)
236   char code_desc_buf[32];
237   char subcode_desc_buf[32];
238 #endif
239 
240   switch (m_value) {
241   case 1: // EXC_BAD_ACCESS
242     exc_desc = "EXC_BAD_ACCESS";
243     subcode_label = "address";
244     switch (cpu) {
245     case llvm::Triple::x86:
246     case llvm::Triple::x86_64:
247       switch (m_exc_code) {
248       case 0xd:
249         code_desc = "EXC_I386_GPFLT";
250         m_exc_data_count = 1;
251         break;
252       }
253       break;
254     case llvm::Triple::arm:
255     case llvm::Triple::thumb:
256       switch (m_exc_code) {
257       case 0x101:
258         code_desc = "EXC_ARM_DA_ALIGN";
259         break;
260       case 0x102:
261         code_desc = "EXC_ARM_DA_DEBUG";
262         break;
263       }
264       break;
265 
266     case llvm::Triple::aarch64:
267       if (DeterminePtrauthFailure(exe_ctx))
268         return m_description.c_str();
269       break;
270 
271     default:
272       break;
273     }
274     break;
275 
276   case 2: // EXC_BAD_INSTRUCTION
277     exc_desc = "EXC_BAD_INSTRUCTION";
278     switch (cpu) {
279     case llvm::Triple::x86:
280     case llvm::Triple::x86_64:
281       if (m_exc_code == 1)
282         code_desc = "EXC_I386_INVOP";
283       break;
284 
285     case llvm::Triple::arm:
286     case llvm::Triple::thumb:
287       if (m_exc_code == 1)
288         code_desc = "EXC_ARM_UNDEFINED";
289       break;
290 
291     default:
292       break;
293     }
294     break;
295 
296   case 3: // EXC_ARITHMETIC
297     exc_desc = "EXC_ARITHMETIC";
298     switch (cpu) {
299     case llvm::Triple::x86:
300     case llvm::Triple::x86_64:
301       switch (m_exc_code) {
302       case 1:
303         code_desc = "EXC_I386_DIV";
304         break;
305       case 2:
306         code_desc = "EXC_I386_INTO";
307         break;
308       case 3:
309         code_desc = "EXC_I386_NOEXT";
310         break;
311       case 4:
312         code_desc = "EXC_I386_EXTOVR";
313         break;
314       case 5:
315         code_desc = "EXC_I386_EXTERR";
316         break;
317       case 6:
318         code_desc = "EXC_I386_EMERR";
319         break;
320       case 7:
321         code_desc = "EXC_I386_BOUND";
322         break;
323       case 8:
324         code_desc = "EXC_I386_SSEEXTERR";
325         break;
326       }
327       break;
328 
329     default:
330       break;
331     }
332     break;
333 
334   case 4: // EXC_EMULATION
335     exc_desc = "EXC_EMULATION";
336     break;
337 
338   case 5: // EXC_SOFTWARE
339     exc_desc = "EXC_SOFTWARE";
340     if (m_exc_code == 0x10003) {
341       subcode_desc = "EXC_SOFT_SIGNAL";
342       subcode_label = "signo";
343     }
344     break;
345 
346   case 6: // EXC_BREAKPOINT
347   {
348     exc_desc = "EXC_BREAKPOINT";
349     switch (cpu) {
350     case llvm::Triple::x86:
351     case llvm::Triple::x86_64:
352       switch (m_exc_code) {
353       case 1:
354         code_desc = "EXC_I386_SGL";
355         break;
356       case 2:
357         code_desc = "EXC_I386_BPT";
358         break;
359       }
360       break;
361 
362     case llvm::Triple::arm:
363     case llvm::Triple::thumb:
364       switch (m_exc_code) {
365       case 0x101:
366         code_desc = "EXC_ARM_DA_ALIGN";
367         break;
368       case 0x102:
369         code_desc = "EXC_ARM_DA_DEBUG";
370         break;
371       case 1:
372         code_desc = "EXC_ARM_BREAKPOINT";
373         break;
374       // FIXME temporary workaround, exc_code 0 does not really mean
375       // EXC_ARM_BREAKPOINT
376       case 0:
377         code_desc = "EXC_ARM_BREAKPOINT";
378         break;
379       }
380       break;
381 
382     case llvm::Triple::aarch64:
383       if (DeterminePtrauthFailure(exe_ctx))
384         return m_description.c_str();
385       break;
386 
387     default:
388       break;
389     }
390   } break;
391 
392   case 7:
393     exc_desc = "EXC_SYSCALL";
394     break;
395 
396   case 8:
397     exc_desc = "EXC_MACH_SYSCALL";
398     break;
399 
400   case 9:
401     exc_desc = "EXC_RPC_ALERT";
402     break;
403 
404   case 10:
405     exc_desc = "EXC_CRASH";
406     break;
407   case 11:
408     exc_desc = "EXC_RESOURCE";
409 #if defined(__APPLE__)
410     {
411       int resource_type = EXC_RESOURCE_DECODE_RESOURCE_TYPE(m_exc_code);
412 
413       code_label = "limit";
414       code_desc = code_desc_buf;
415       subcode_label = "observed";
416       subcode_desc = subcode_desc_buf;
417 
418       switch (resource_type) {
419       case RESOURCE_TYPE_CPU:
420         exc_desc =
421             "EXC_RESOURCE (RESOURCE_TYPE_CPU: CPU usage monitor tripped)";
422         snprintf(code_desc_buf, sizeof(code_desc_buf), "%d%%",
423                  (int)EXC_RESOURCE_CPUMONITOR_DECODE_PERCENTAGE(m_exc_code));
424         snprintf(subcode_desc_buf, sizeof(subcode_desc_buf), "%d%%",
425                  (int)EXC_RESOURCE_CPUMONITOR_DECODE_PERCENTAGE_OBSERVED(
426                      m_exc_subcode));
427         break;
428       case RESOURCE_TYPE_WAKEUPS:
429         exc_desc = "EXC_RESOURCE (RESOURCE_TYPE_WAKEUPS: idle wakeups monitor "
430                    "tripped)";
431         snprintf(
432             code_desc_buf, sizeof(code_desc_buf), "%d w/s",
433             (int)EXC_RESOURCE_CPUMONITOR_DECODE_WAKEUPS_PERMITTED(m_exc_code));
434         snprintf(subcode_desc_buf, sizeof(subcode_desc_buf), "%d w/s",
435                  (int)EXC_RESOURCE_CPUMONITOR_DECODE_WAKEUPS_OBSERVED(
436                      m_exc_subcode));
437         break;
438       case RESOURCE_TYPE_MEMORY:
439         exc_desc = "EXC_RESOURCE (RESOURCE_TYPE_MEMORY: high watermark memory "
440                    "limit exceeded)";
441         snprintf(code_desc_buf, sizeof(code_desc_buf), "%d MB",
442                  (int)EXC_RESOURCE_HWM_DECODE_LIMIT(m_exc_code));
443         subcode_desc = nullptr;
444         subcode_label = nullptr;
445         break;
446 #if defined(RESOURCE_TYPE_IO)
447       // RESOURCE_TYPE_IO is introduced in macOS SDK 10.12.
448       case RESOURCE_TYPE_IO:
449         exc_desc = "EXC_RESOURCE RESOURCE_TYPE_IO";
450         snprintf(code_desc_buf, sizeof(code_desc_buf), "%d MB",
451                  (int)EXC_RESOURCE_IO_DECODE_LIMIT(m_exc_code));
452         snprintf(subcode_desc_buf, sizeof(subcode_desc_buf), "%d MB",
453                  (int)EXC_RESOURCE_IO_OBSERVED(m_exc_subcode));
454         ;
455         break;
456 #endif
457       }
458     }
459 #endif
460     break;
461   case 12:
462     exc_desc = "EXC_GUARD";
463     break;
464   }
465 
466   StreamString strm;
467 
468   if (exc_desc)
469     strm.PutCString(exc_desc);
470   else
471     strm.Printf("EXC_??? (%" PRIu64 ")", m_value);
472 
473   if (m_exc_data_count >= 1) {
474     if (code_desc)
475       strm.Printf(" (%s=%s", code_label, code_desc);
476     else
477       strm.Printf(" (%s=%" PRIu64, code_label, m_exc_code);
478   }
479 
480   if (m_exc_data_count >= 2) {
481     if (subcode_label && subcode_desc)
482       strm.Printf(", %s=%s", subcode_label, subcode_desc);
483     else if (subcode_label)
484       strm.Printf(", %s=0x%" PRIx64, subcode_label, m_exc_subcode);
485   }
486 
487   if (m_exc_data_count > 0)
488     strm.PutChar(')');
489 
490   m_description = std::string(strm.GetString());
491   return m_description.c_str();
492 }
493 
494 #if defined(__APPLE__)
495 const char *
Name(exception_type_t exc_type)496 StopInfoMachException::MachException::Name(exception_type_t exc_type) {
497   switch (exc_type) {
498   case EXC_BAD_ACCESS:
499     return "EXC_BAD_ACCESS";
500   case EXC_BAD_INSTRUCTION:
501     return "EXC_BAD_INSTRUCTION";
502   case EXC_ARITHMETIC:
503     return "EXC_ARITHMETIC";
504   case EXC_EMULATION:
505     return "EXC_EMULATION";
506   case EXC_SOFTWARE:
507     return "EXC_SOFTWARE";
508   case EXC_BREAKPOINT:
509     return "EXC_BREAKPOINT";
510   case EXC_SYSCALL:
511     return "EXC_SYSCALL";
512   case EXC_MACH_SYSCALL:
513     return "EXC_MACH_SYSCALL";
514   case EXC_RPC_ALERT:
515     return "EXC_RPC_ALERT";
516 #ifdef EXC_CRASH
517   case EXC_CRASH:
518     return "EXC_CRASH";
519 #endif
520   case EXC_RESOURCE:
521     return "EXC_RESOURCE";
522 #ifdef EXC_GUARD
523   case EXC_GUARD:
524     return "EXC_GUARD";
525 #endif
526 #ifdef EXC_CORPSE_NOTIFY
527   case EXC_CORPSE_NOTIFY:
528     return "EXC_CORPSE_NOTIFY";
529 #endif
530 #ifdef EXC_CORPSE_VARIANT_BIT
531   case EXC_CORPSE_VARIANT_BIT:
532     return "EXC_CORPSE_VARIANT_BIT";
533 #endif
534   default:
535     break;
536   }
537   return NULL;
538 }
539 
540 std::optional<exception_type_t>
ExceptionCode(const char * name)541 StopInfoMachException::MachException::ExceptionCode(const char *name) {
542   return llvm::StringSwitch<std::optional<exception_type_t>>(name)
543       .Case("EXC_BAD_ACCESS", EXC_BAD_ACCESS)
544       .Case("EXC_BAD_INSTRUCTION", EXC_BAD_INSTRUCTION)
545       .Case("EXC_ARITHMETIC", EXC_ARITHMETIC)
546       .Case("EXC_EMULATION", EXC_EMULATION)
547       .Case("EXC_SOFTWARE", EXC_SOFTWARE)
548       .Case("EXC_BREAKPOINT", EXC_BREAKPOINT)
549       .Case("EXC_SYSCALL", EXC_SYSCALL)
550       .Case("EXC_MACH_SYSCALL", EXC_MACH_SYSCALL)
551       .Case("EXC_RPC_ALERT", EXC_RPC_ALERT)
552 #ifdef EXC_CRASH
553       .Case("EXC_CRASH", EXC_CRASH)
554 #endif
555       .Case("EXC_RESOURCE", EXC_RESOURCE)
556 #ifdef EXC_GUARD
557       .Case("EXC_GUARD", EXC_GUARD)
558 #endif
559 #ifdef EXC_CORPSE_NOTIFY
560       .Case("EXC_CORPSE_NOTIFY", EXC_CORPSE_NOTIFY)
561 #endif
562       .Default(std::nullopt);
563 }
564 #endif
565 
CreateStopReasonWithMachException(Thread & thread,uint32_t exc_type,uint32_t exc_data_count,uint64_t exc_code,uint64_t exc_sub_code,uint64_t exc_sub_sub_code,bool pc_already_adjusted,bool adjust_pc_if_needed)566 StopInfoSP StopInfoMachException::CreateStopReasonWithMachException(
567     Thread &thread, uint32_t exc_type, uint32_t exc_data_count,
568     uint64_t exc_code, uint64_t exc_sub_code, uint64_t exc_sub_sub_code,
569     bool pc_already_adjusted, bool adjust_pc_if_needed) {
570   if (exc_type == 0)
571     return StopInfoSP();
572 
573   bool not_stepping_but_got_singlestep_exception = false;
574   uint32_t pc_decrement = 0;
575   ExecutionContext exe_ctx(thread.shared_from_this());
576   Target *target = exe_ctx.GetTargetPtr();
577   const llvm::Triple::ArchType cpu =
578       target ? target->GetArchitecture().GetMachine()
579              : llvm::Triple::UnknownArch;
580 
581   ProcessSP process_sp(thread.GetProcess());
582   RegisterContextSP reg_ctx_sp(thread.GetRegisterContext());
583   // Caveat: with x86 KDP if we've hit a breakpoint, the pc we
584   // receive is past the breakpoint instruction.
585   // If we have a breakpoints at 0x100 and 0x101, we hit the
586   // 0x100 breakpoint and the pc is reported at 0x101.
587   // We will initially mark this thread as being stopped at an
588   // unexecuted breakpoint at 0x101. Later when we see that
589   // we stopped for a Breakpoint reason, we will decrement the
590   // pc, and update the thread to record that we hit the
591   // breakpoint at 0x100.
592   // The fact that the pc may be off by one at this point
593   // (for an x86 KDP breakpoint hit) is not a problem.
594   addr_t pc = reg_ctx_sp->GetPC();
595   BreakpointSiteSP bp_site_sp =
596       process_sp->GetBreakpointSiteList().FindByAddress(pc);
597   if (bp_site_sp && bp_site_sp->IsEnabled())
598     thread.SetThreadStoppedAtUnexecutedBP(pc);
599 
600   switch (exc_type) {
601   case 1: // EXC_BAD_ACCESS
602   case 2: // EXC_BAD_INSTRUCTION
603   case 3: // EXC_ARITHMETIC
604   case 4: // EXC_EMULATION
605     break;
606 
607   case 5:                    // EXC_SOFTWARE
608     if (exc_code == 0x10003) // EXC_SOFT_SIGNAL
609     {
610       if (exc_sub_code == 5) {
611         // On MacOSX, a SIGTRAP can signify that a process has called exec,
612         // so we should check with our dynamic loader to verify.
613         ProcessSP process_sp(thread.GetProcess());
614         if (process_sp) {
615           DynamicLoader *dynamic_loader = process_sp->GetDynamicLoader();
616           if (dynamic_loader && dynamic_loader->ProcessDidExec()) {
617             // The program was re-exec'ed
618             return StopInfo::CreateStopReasonWithExec(thread);
619           }
620         }
621       }
622       return StopInfo::CreateStopReasonWithSignal(thread, exc_sub_code);
623     }
624     break;
625 
626     // A mach exception comes with 2-4 pieces of data.
627     // The sub-codes are only provided for certain types
628     // of mach exceptions.
629     // [exc_type, exc_code, exc_sub_code, exc_sub_sub_code]
630     //
631     // Here are all of the EXC_BREAKPOINT, exc_type==6,
632     // exceptions we can receive.
633     //
634     // Instruction step:
635     //   [6, 1, 0]
636     //   Intel KDP [6, 3, ??]
637     //   armv7 [6, 0x102, <stop-pc>]  Same as software breakpoint!
638     //
639     // Software breakpoint:
640     //   x86 [6, 2, 0]
641     //   Intel KDP [6, 2, <bp-addr + 1>]
642     //   arm64 [6, 1, <bp-addr>]
643     //   armv7 [6, 0x102, <bp-addr>]  Same as instruction step!
644     //
645     // Hardware breakpoint:
646     //   x86 [6, 1, <bp-addr>, 0]
647     //   x86/Rosetta not implemented, see software breakpoint
648     //   arm64 [6, 1, <bp-addr>]
649     //   armv7 not implemented, see software breakpoint
650     //
651     // Hardware watchpoint:
652     //   x86 [6, 1, <accessed-addr>, 0] (both Intel hw and Rosetta)
653     //   arm64 [6, 0x102, <accessed-addr>, 0]
654     //   armv7 [6, 0x102, <accessed-addr>, 0]
655     //
656     // arm64 BRK instruction (imm arg not reflected in the ME)
657     //   [ 6, 1, <addr-of-BRK-insn>]
658     //
659     // In order of codes mach exceptions:
660     //   [6, 1, 0] - instruction step
661     //   [6, 1, <bp-addr>] - hardware breakpoint or watchpoint
662     //
663     //   [6, 2, 0] - software breakpoint
664     //   [6, 2, <bp-addr + 1>] - software breakpoint
665     //
666     //   [6, 3] - instruction step
667     //
668     //   [6, 0x102, <stop-pc>] armv7 instruction step
669     //   [6, 0x102, <bp-addr>] armv7 software breakpoint
670     //   [6, 0x102, <accessed-addr>, 0] arm64/armv7 watchpoint
671 
672   case 6: // EXC_BREAKPOINT
673   {
674     bool stopped_by_hitting_breakpoint = false;
675     bool stopped_by_completing_stepi = false;
676     bool stopped_watchpoint = false;
677     std::optional<addr_t> address;
678 
679     // exc_code 1
680     if (exc_code == 1) {
681       if (exc_sub_code == 0) {
682         stopped_by_completing_stepi = true;
683       } else {
684         // Ambiguous: could be signalling a
685         // breakpoint or watchpoint hit.
686         stopped_by_hitting_breakpoint = true;
687         stopped_watchpoint = true;
688         address = exc_sub_code;
689       }
690     }
691 
692     // exc_code 2
693     if (exc_code == 2) {
694       if (exc_sub_code == 0)
695         stopped_by_hitting_breakpoint = true;
696       else {
697         stopped_by_hitting_breakpoint = true;
698         // Intel KDP software breakpoint
699         if (!pc_already_adjusted)
700           pc_decrement = 1;
701       }
702     }
703 
704     // exc_code 3
705     if (exc_code == 3)
706       stopped_by_completing_stepi = true;
707 
708     // exc_code 0x102
709     if (exc_code == 0x102 && exc_sub_code != 0) {
710       if (cpu == llvm::Triple::arm || cpu == llvm::Triple::thumb) {
711         stopped_by_hitting_breakpoint = true;
712         stopped_by_completing_stepi = true;
713       }
714       stopped_watchpoint = true;
715       address = exc_sub_code;
716     }
717 
718     // The Mach Exception may have been ambiguous --
719     // e.g. we stopped either because of a breakpoint
720     // or a watchpoint.  We'll disambiguate which it
721     // really was.
722 
723     if (stopped_by_hitting_breakpoint) {
724       addr_t pc = reg_ctx_sp->GetPC() - pc_decrement;
725 
726       if (address)
727         bp_site_sp =
728             process_sp->GetBreakpointSiteList().FindByAddress(*address);
729       if (!bp_site_sp && reg_ctx_sp) {
730         bp_site_sp = process_sp->GetBreakpointSiteList().FindByAddress(pc);
731       }
732       if (bp_site_sp && bp_site_sp->IsEnabled()) {
733         // We've hit this breakpoint, whether it was intended for this thread
734         // or not.  Clear this in the Tread object so we step past it on resume.
735         thread.SetThreadHitBreakpointSite();
736 
737         if (bp_site_sp->ValidForThisThread(thread)) {
738           // Update the PC if we were asked to do so, but only do so if we find
739           // a breakpoint that we know about because this could be a trap
740           // instruction in the code.
741           if (pc_decrement > 0 && adjust_pc_if_needed && reg_ctx_sp)
742             reg_ctx_sp->SetPC(pc);
743 
744           return StopInfo::CreateStopReasonWithBreakpointSiteID(
745               thread, bp_site_sp->GetID());
746         } else {
747           return StopInfoSP();
748         }
749       }
750     }
751 
752     // Breakpoint-hit events are handled.
753     // Now handle watchpoints.
754 
755     if (stopped_watchpoint && address) {
756       WatchpointResourceSP wp_rsrc_sp =
757           target->GetProcessSP()->GetWatchpointResourceList().FindByAddress(
758               *address);
759       if (wp_rsrc_sp && wp_rsrc_sp->GetNumberOfConstituents() > 0) {
760         return StopInfo::CreateStopReasonWithWatchpointID(
761             thread, wp_rsrc_sp->GetConstituentAtIndex(0)->GetID());
762       }
763     }
764 
765     // Finally, handle instruction step.
766 
767     if (stopped_by_completing_stepi) {
768       if (thread.GetTemporaryResumeState() != eStateStepping)
769         not_stepping_but_got_singlestep_exception = true;
770       else
771         return StopInfo::CreateStopReasonToTrace(thread);
772     }
773 
774   } break;
775 
776   case 7:  // EXC_SYSCALL
777   case 8:  // EXC_MACH_SYSCALL
778   case 9:  // EXC_RPC_ALERT
779   case 10: // EXC_CRASH
780     break;
781   }
782 
783   return std::make_shared<StopInfoMachException>(
784       thread, exc_type, exc_data_count, exc_code, exc_sub_code,
785       not_stepping_but_got_singlestep_exception);
786 }
787 
788 // Detect an unusual situation on Darwin where:
789 //
790 //   0. We did an instruction-step before this.
791 //   1. We have a hardware breakpoint or watchpoint set.
792 //   2. We resumed the process, but not with an instruction-step.
793 //   3. The thread gets an "instruction-step completed" mach exception.
794 //   4. The pc has not advanced - it is the same as before.
795 //
796 // This method returns true for that combination of events.
WasContinueInterrupted(Thread & thread)797 bool StopInfoMachException::WasContinueInterrupted(Thread &thread) {
798   Log *log = GetLog(LLDBLog::Step);
799 
800   // We got an instruction-step completed mach exception but we were not
801   // doing an instruction step on this thread.
802   if (!m_not_stepping_but_got_singlestep_exception)
803     return false;
804 
805   RegisterContextSP reg_ctx_sp(thread.GetRegisterContext());
806   std::optional<addr_t> prev_pc = thread.GetPreviousFrameZeroPC();
807   if (!reg_ctx_sp || !prev_pc)
808     return false;
809 
810   // The previous pc value and current pc value are the same.
811   if (*prev_pc != reg_ctx_sp->GetPC())
812     return false;
813 
814   // We have a watchpoint -- this is the kernel bug.
815   ProcessSP process_sp = thread.GetProcess();
816   if (process_sp->GetWatchpointResourceList().GetSize()) {
817     LLDB_LOGF(log,
818               "Thread stopped with insn-step completed mach exception but "
819               "thread was not stepping; there is a hardware watchpoint set.");
820     return true;
821   }
822 
823   // We have a hardware breakpoint -- this is the kernel bug.
824   auto &bp_site_list = process_sp->GetBreakpointSiteList();
825   for (auto &site : bp_site_list.Sites()) {
826     if (site->IsHardware() && site->IsEnabled()) {
827       LLDB_LOGF(log,
828                 "Thread stopped with insn-step completed mach exception but "
829                 "thread was not stepping; there is a hardware breakpoint set.");
830       return true;
831     }
832   }
833 
834   return false;
835 }
836