diff options
author | Jason Molenda <jmolenda@apple.com> | 2024-07-23 17:50:40 -0700 |
---|---|---|
committer | GitHub <noreply@github.com> | 2024-07-23 17:50:40 -0700 |
commit | 56535a090d91ff10a60c884bacbd314dcf9659db (patch) | |
tree | 53f5fad45aaad264cce5dc80018c878462f999d2 /lldb/source/Commands/CommandObjectProcess.cpp | |
parent | ae1de3ea3c2db722bb2b135fe2c29b14b9ae1bcc (diff) | |
download | llvm-56535a090d91ff10a60c884bacbd314dcf9659db.zip llvm-56535a090d91ff10a60c884bacbd314dcf9659db.tar.gz llvm-56535a090d91ff10a60c884bacbd314dcf9659db.tar.bz2 |
[lldb] Don't crash when attaching to pid and no binaries found (#100287)
There is a narrow window during process launch on macOS where lldb can
attach and no binaries will be seen as loaded in the process (none
reported by libdyld SPI). A year ago I made changes to set the
new-binary-loaded breakpoint correctly despite this. But we've seen a
crash when this combination is seen, where
CommandObjectProcessAttach::DoExecute assumed there was at least one
binary registered in the Target. Fix that.
Also fix two FileSpec API uses from when we didn't have a GetPath()
method that returned a std::string, and was copying the filepaths into
fixed length buffers. All of this code was from ~14 years ago when we
didn't have that API.
rdar://131631627
Diffstat (limited to 'lldb/source/Commands/CommandObjectProcess.cpp')
-rw-r--r-- | lldb/source/Commands/CommandObjectProcess.cpp | 18 |
1 files changed, 8 insertions, 10 deletions
diff --git a/lldb/source/Commands/CommandObjectProcess.cpp b/lldb/source/Commands/CommandObjectProcess.cpp index 50695af..e605abd 100644 --- a/lldb/source/Commands/CommandObjectProcess.cpp +++ b/lldb/source/Commands/CommandObjectProcess.cpp @@ -369,25 +369,23 @@ protected: // Okay, we're done. Last step is to warn if the executable module has // changed: - char new_path[PATH_MAX]; ModuleSP new_exec_module_sp(target->GetExecutableModule()); if (!old_exec_module_sp) { // We might not have a module if we attached to a raw pid... if (new_exec_module_sp) { - new_exec_module_sp->GetFileSpec().GetPath(new_path, PATH_MAX); - result.AppendMessageWithFormat("Executable module set to \"%s\".\n", - new_path); + result.AppendMessageWithFormat( + "Executable binary set to \"%s\".\n", + new_exec_module_sp->GetFileSpec().GetPath().c_str()); } + } else if (!new_exec_module_sp) { + result.AppendWarningWithFormat("No executable binary."); } else if (old_exec_module_sp->GetFileSpec() != new_exec_module_sp->GetFileSpec()) { - char old_path[PATH_MAX]; - - old_exec_module_sp->GetFileSpec().GetPath(old_path, PATH_MAX); - new_exec_module_sp->GetFileSpec().GetPath(new_path, PATH_MAX); result.AppendWarningWithFormat( - "Executable module changed from \"%s\" to \"%s\".\n", old_path, - new_path); + "Executable binary changed from \"%s\" to \"%s\".\n", + old_exec_module_sp->GetFileSpec().GetPath().c_str(), + new_exec_module_sp->GetFileSpec().GetPath().c_str()); } if (!old_arch_spec.IsValid()) { |