| //===-- Target.cpp ----------------------------------------------*- C++ -*-===// |
| // |
| // The LLVM Compiler Infrastructure |
| // |
| // This file is distributed under the University of Illinois Open Source |
| // License. See LICENSE.TXT for details. |
| // |
| //===----------------------------------------------------------------------===// |
| |
| #include "lldb/lldb-python.h" |
| |
| #include "lldb/Target/Target.h" |
| |
| // C Includes |
| // C++ Includes |
| // Other libraries and framework includes |
| // Project includes |
| #include "lldb/Breakpoint/BreakpointResolver.h" |
| #include "lldb/Breakpoint/BreakpointResolverAddress.h" |
| #include "lldb/Breakpoint/BreakpointResolverFileLine.h" |
| #include "lldb/Breakpoint/BreakpointResolverFileRegex.h" |
| #include "lldb/Breakpoint/BreakpointResolverName.h" |
| #include "lldb/Breakpoint/Watchpoint.h" |
| #include "lldb/Core/Debugger.h" |
| #include "lldb/Core/Event.h" |
| #include "lldb/Core/Log.h" |
| #include "lldb/Core/Module.h" |
| #include "lldb/Core/ModuleSpec.h" |
| #include "lldb/Core/Section.h" |
| #include "lldb/Core/SourceManager.h" |
| #include "lldb/Core/StreamString.h" |
| #include "lldb/Core/Timer.h" |
| #include "lldb/Core/ValueObject.h" |
| #include "lldb/Expression/ClangASTSource.h" |
| #include "lldb/Expression/ClangUserExpression.h" |
| #include "lldb/Host/Host.h" |
| #include "lldb/Interpreter/CommandInterpreter.h" |
| #include "lldb/Interpreter/CommandReturnObject.h" |
| #include "lldb/Interpreter/OptionGroupWatchpoint.h" |
| #include "lldb/Interpreter/OptionValues.h" |
| #include "lldb/Interpreter/Property.h" |
| #include "lldb/lldb-private-log.h" |
| #include "lldb/Symbol/ObjectFile.h" |
| #include "lldb/Target/Process.h" |
| #include "lldb/Target/StackFrame.h" |
| #include "lldb/Target/Thread.h" |
| #include "lldb/Target/ThreadSpec.h" |
| |
| using namespace lldb; |
| using namespace lldb_private; |
| |
| ConstString & |
| Target::GetStaticBroadcasterClass () |
| { |
| static ConstString class_name ("lldb.target"); |
| return class_name; |
| } |
| |
| //---------------------------------------------------------------------- |
| // Target constructor |
| //---------------------------------------------------------------------- |
| Target::Target(Debugger &debugger, const ArchSpec &target_arch, const lldb::PlatformSP &platform_sp) : |
| TargetProperties (this), |
| Broadcaster (&debugger, Target::GetStaticBroadcasterClass().AsCString()), |
| ExecutionContextScope (), |
| m_debugger (debugger), |
| m_platform_sp (platform_sp), |
| m_mutex (Mutex::eMutexTypeRecursive), |
| m_arch (target_arch), |
| m_images (this), |
| m_section_load_list (), |
| m_breakpoint_list (false), |
| m_internal_breakpoint_list (true), |
| m_watchpoint_list (), |
| m_process_sp (), |
| m_valid (true), |
| m_search_filter_sp (), |
| m_image_search_paths (ImageSearchPathsChanged, this), |
| m_scratch_ast_context_ap (), |
| m_scratch_ast_source_ap (), |
| m_ast_importer_ap (), |
| m_persistent_variables (), |
| m_source_manager_ap(), |
| m_stop_hooks (), |
| m_stop_hook_next_id (0), |
| m_suppress_stop_hooks (false), |
| m_suppress_synthetic_value(false) |
| { |
| SetEventName (eBroadcastBitBreakpointChanged, "breakpoint-changed"); |
| SetEventName (eBroadcastBitModulesLoaded, "modules-loaded"); |
| SetEventName (eBroadcastBitModulesUnloaded, "modules-unloaded"); |
| SetEventName (eBroadcastBitWatchpointChanged, "watchpoint-changed"); |
| SetEventName (eBroadcastBitSymbolsLoaded, "symbols-loaded"); |
| |
| CheckInWithManager(); |
| |
| Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_OBJECT)); |
| if (log) |
| log->Printf ("%p Target::Target()", this); |
| if (m_arch.IsValid()) |
| { |
| LogIfAnyCategoriesSet(LIBLLDB_LOG_TARGET, "Target::Target created with architecture %s (%s)", m_arch.GetArchitectureName(), m_arch.GetTriple().getTriple().c_str()); |
| } |
| } |
| |
| //---------------------------------------------------------------------- |
| // Destructor |
| //---------------------------------------------------------------------- |
| Target::~Target() |
| { |
| Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_OBJECT)); |
| if (log) |
| log->Printf ("%p Target::~Target()", this); |
| DeleteCurrentProcess (); |
| } |
| |
| void |
| Target::Dump (Stream *s, lldb::DescriptionLevel description_level) |
| { |
| // s->Printf("%.*p: ", (int)sizeof(void*) * 2, this); |
| if (description_level != lldb::eDescriptionLevelBrief) |
| { |
| s->Indent(); |
| s->PutCString("Target\n"); |
| s->IndentMore(); |
| m_images.Dump(s); |
| m_breakpoint_list.Dump(s); |
| m_internal_breakpoint_list.Dump(s); |
| s->IndentLess(); |
| } |
| else |
| { |
| Module *exe_module = GetExecutableModulePointer(); |
| if (exe_module) |
| s->PutCString (exe_module->GetFileSpec().GetFilename().GetCString()); |
| else |
| s->PutCString ("No executable module."); |
| } |
| } |
| |
| void |
| Target::CleanupProcess () |
| { |
| // Do any cleanup of the target we need to do between process instances. |
| // NB It is better to do this before destroying the process in case the |
| // clean up needs some help from the process. |
| m_breakpoint_list.ClearAllBreakpointSites(); |
| m_internal_breakpoint_list.ClearAllBreakpointSites(); |
| // Disable watchpoints just on the debugger side. |
| Mutex::Locker locker; |
| this->GetWatchpointList().GetListMutex(locker); |
| DisableAllWatchpoints(false); |
| ClearAllWatchpointHitCounts(); |
| } |
| |
| void |
| Target::DeleteCurrentProcess () |
| { |
| if (m_process_sp.get()) |
| { |
| m_section_load_list.Clear(); |
| if (m_process_sp->IsAlive()) |
| m_process_sp->Destroy(); |
| |
| m_process_sp->Finalize(); |
| |
| CleanupProcess (); |
| |
| m_process_sp.reset(); |
| } |
| } |
| |
| const lldb::ProcessSP & |
| Target::CreateProcess (Listener &listener, const char *plugin_name, const FileSpec *crash_file) |
| { |
| DeleteCurrentProcess (); |
| m_process_sp = Process::FindPlugin(*this, plugin_name, listener, crash_file); |
| return m_process_sp; |
| } |
| |
| const lldb::ProcessSP & |
| Target::GetProcessSP () const |
| { |
| return m_process_sp; |
| } |
| |
| void |
| Target::Destroy() |
| { |
| Mutex::Locker locker (m_mutex); |
| m_valid = false; |
| DeleteCurrentProcess (); |
| m_platform_sp.reset(); |
| m_arch.Clear(); |
| m_images.Clear(); |
| m_section_load_list.Clear(); |
| const bool notify = false; |
| m_breakpoint_list.RemoveAll(notify); |
| m_internal_breakpoint_list.RemoveAll(notify); |
| m_last_created_breakpoint.reset(); |
| m_last_created_watchpoint.reset(); |
| m_search_filter_sp.reset(); |
| m_image_search_paths.Clear(notify); |
| m_scratch_ast_context_ap.reset(); |
| m_scratch_ast_source_ap.reset(); |
| m_ast_importer_ap.reset(); |
| m_persistent_variables.Clear(); |
| m_stop_hooks.clear(); |
| m_stop_hook_next_id = 0; |
| m_suppress_stop_hooks = false; |
| m_suppress_synthetic_value = false; |
| } |
| |
| |
| BreakpointList & |
| Target::GetBreakpointList(bool internal) |
| { |
| if (internal) |
| return m_internal_breakpoint_list; |
| else |
| return m_breakpoint_list; |
| } |
| |
| const BreakpointList & |
| Target::GetBreakpointList(bool internal) const |
| { |
| if (internal) |
| return m_internal_breakpoint_list; |
| else |
| return m_breakpoint_list; |
| } |
| |
| BreakpointSP |
| Target::GetBreakpointByID (break_id_t break_id) |
| { |
| BreakpointSP bp_sp; |
| |
| if (LLDB_BREAK_ID_IS_INTERNAL (break_id)) |
| bp_sp = m_internal_breakpoint_list.FindBreakpointByID (break_id); |
| else |
| bp_sp = m_breakpoint_list.FindBreakpointByID (break_id); |
| |
| return bp_sp; |
| } |
| |
| BreakpointSP |
| Target::CreateSourceRegexBreakpoint (const FileSpecList *containingModules, |
| const FileSpecList *source_file_spec_list, |
| RegularExpression &source_regex, |
| bool internal) |
| { |
| SearchFilterSP filter_sp(GetSearchFilterForModuleAndCUList (containingModules, source_file_spec_list)); |
| BreakpointResolverSP resolver_sp(new BreakpointResolverFileRegex (NULL, source_regex)); |
| return CreateBreakpoint (filter_sp, resolver_sp, internal); |
| } |
| |
| |
| BreakpointSP |
| Target::CreateBreakpoint (const FileSpecList *containingModules, |
| const FileSpec &file, |
| uint32_t line_no, |
| LazyBool check_inlines, |
| LazyBool skip_prologue, |
| bool internal) |
| { |
| if (check_inlines == eLazyBoolCalculate) |
| { |
| const InlineStrategy inline_strategy = GetInlineStrategy(); |
| switch (inline_strategy) |
| { |
| case eInlineBreakpointsNever: |
| check_inlines = eLazyBoolNo; |
| break; |
| |
| case eInlineBreakpointsHeaders: |
| if (file.IsSourceImplementationFile()) |
| check_inlines = eLazyBoolNo; |
| else |
| check_inlines = eLazyBoolYes; |
| break; |
| |
| case eInlineBreakpointsAlways: |
| check_inlines = eLazyBoolYes; |
| break; |
| } |
| } |
| SearchFilterSP filter_sp; |
| if (check_inlines == eLazyBoolNo) |
| { |
| // Not checking for inlines, we are looking only for matching compile units |
| FileSpecList compile_unit_list; |
| compile_unit_list.Append (file); |
| filter_sp = GetSearchFilterForModuleAndCUList (containingModules, &compile_unit_list); |
| } |
| else |
| { |
| filter_sp = GetSearchFilterForModuleList (containingModules); |
| } |
| if (skip_prologue == eLazyBoolCalculate) |
| skip_prologue = GetSkipPrologue() ? eLazyBoolYes : eLazyBoolNo; |
| |
| BreakpointResolverSP resolver_sp(new BreakpointResolverFileLine (NULL, |
| file, |
| line_no, |
| check_inlines, |
| skip_prologue)); |
| return CreateBreakpoint (filter_sp, resolver_sp, internal); |
| } |
| |
| |
| BreakpointSP |
| Target::CreateBreakpoint (lldb::addr_t addr, bool internal) |
| { |
| Address so_addr; |
| // Attempt to resolve our load address if possible, though it is ok if |
| // it doesn't resolve to section/offset. |
| |
| // Try and resolve as a load address if possible |
| m_section_load_list.ResolveLoadAddress(addr, so_addr); |
| if (!so_addr.IsValid()) |
| { |
| // The address didn't resolve, so just set this as an absolute address |
| so_addr.SetOffset (addr); |
| } |
| BreakpointSP bp_sp (CreateBreakpoint(so_addr, internal)); |
| return bp_sp; |
| } |
| |
| BreakpointSP |
| Target::CreateBreakpoint (Address &addr, bool internal) |
| { |
| SearchFilterSP filter_sp(new SearchFilterForNonModuleSpecificSearches (shared_from_this())); |
| BreakpointResolverSP resolver_sp (new BreakpointResolverAddress (NULL, addr)); |
| return CreateBreakpoint (filter_sp, resolver_sp, internal); |
| } |
| |
| BreakpointSP |
| Target::CreateBreakpoint (const FileSpecList *containingModules, |
| const FileSpecList *containingSourceFiles, |
| const char *func_name, |
| uint32_t func_name_type_mask, |
| LazyBool skip_prologue, |
| bool internal) |
| { |
| BreakpointSP bp_sp; |
| if (func_name) |
| { |
| SearchFilterSP filter_sp(GetSearchFilterForModuleAndCUList (containingModules, containingSourceFiles)); |
| |
| if (skip_prologue == eLazyBoolCalculate) |
| skip_prologue = GetSkipPrologue() ? eLazyBoolYes : eLazyBoolNo; |
| |
| BreakpointResolverSP resolver_sp (new BreakpointResolverName (NULL, |
| func_name, |
| func_name_type_mask, |
| Breakpoint::Exact, |
| skip_prologue)); |
| bp_sp = CreateBreakpoint (filter_sp, resolver_sp, internal); |
| } |
| return bp_sp; |
| } |
| |
| lldb::BreakpointSP |
| Target::CreateBreakpoint (const FileSpecList *containingModules, |
| const FileSpecList *containingSourceFiles, |
| const std::vector<std::string> &func_names, |
| uint32_t func_name_type_mask, |
| LazyBool skip_prologue, |
| bool internal) |
| { |
| BreakpointSP bp_sp; |
| size_t num_names = func_names.size(); |
| if (num_names > 0) |
| { |
| SearchFilterSP filter_sp(GetSearchFilterForModuleAndCUList (containingModules, containingSourceFiles)); |
| |
| if (skip_prologue == eLazyBoolCalculate) |
| skip_prologue = GetSkipPrologue() ? eLazyBoolYes : eLazyBoolNo; |
| |
| BreakpointResolverSP resolver_sp (new BreakpointResolverName (NULL, |
| func_names, |
| func_name_type_mask, |
| skip_prologue)); |
| bp_sp = CreateBreakpoint (filter_sp, resolver_sp, internal); |
| } |
| return bp_sp; |
| } |
| |
| BreakpointSP |
| Target::CreateBreakpoint (const FileSpecList *containingModules, |
| const FileSpecList *containingSourceFiles, |
| const char *func_names[], |
| size_t num_names, |
| uint32_t func_name_type_mask, |
| LazyBool skip_prologue, |
| bool internal) |
| { |
| BreakpointSP bp_sp; |
| if (num_names > 0) |
| { |
| SearchFilterSP filter_sp(GetSearchFilterForModuleAndCUList (containingModules, containingSourceFiles)); |
| |
| if (skip_prologue == eLazyBoolCalculate) |
| skip_prologue = GetSkipPrologue() ? eLazyBoolYes : eLazyBoolNo; |
| |
| BreakpointResolverSP resolver_sp (new BreakpointResolverName (NULL, |
| func_names, |
| num_names, |
| func_name_type_mask, |
| skip_prologue)); |
| bp_sp = CreateBreakpoint (filter_sp, resolver_sp, internal); |
| } |
| return bp_sp; |
| } |
| |
| SearchFilterSP |
| Target::GetSearchFilterForModule (const FileSpec *containingModule) |
| { |
| SearchFilterSP filter_sp; |
| if (containingModule != NULL) |
| { |
| // TODO: We should look into sharing module based search filters |
| // across many breakpoints like we do for the simple target based one |
| filter_sp.reset (new SearchFilterByModule (shared_from_this(), *containingModule)); |
| } |
| else |
| { |
| if (m_search_filter_sp.get() == NULL) |
| m_search_filter_sp.reset (new SearchFilterForNonModuleSpecificSearches (shared_from_this())); |
| filter_sp = m_search_filter_sp; |
| } |
| return filter_sp; |
| } |
| |
| SearchFilterSP |
| Target::GetSearchFilterForModuleList (const FileSpecList *containingModules) |
| { |
| SearchFilterSP filter_sp; |
| if (containingModules && containingModules->GetSize() != 0) |
| { |
| // TODO: We should look into sharing module based search filters |
| // across many breakpoints like we do for the simple target based one |
| filter_sp.reset (new SearchFilterByModuleList (shared_from_this(), *containingModules)); |
| } |
| else |
| { |
| if (m_search_filter_sp.get() == NULL) |
| m_search_filter_sp.reset (new SearchFilterForNonModuleSpecificSearches (shared_from_this())); |
| filter_sp = m_search_filter_sp; |
| } |
| return filter_sp; |
| } |
| |
| SearchFilterSP |
| Target::GetSearchFilterForModuleAndCUList (const FileSpecList *containingModules, |
| const FileSpecList *containingSourceFiles) |
| { |
| if (containingSourceFiles == NULL || containingSourceFiles->GetSize() == 0) |
| return GetSearchFilterForModuleList(containingModules); |
| |
| SearchFilterSP filter_sp; |
| if (containingModules == NULL) |
| { |
| // We could make a special "CU List only SearchFilter". Better yet was if these could be composable, |
| // but that will take a little reworking. |
| |
| filter_sp.reset (new SearchFilterByModuleListAndCU (shared_from_this(), FileSpecList(), *containingSourceFiles)); |
| } |
| else |
| { |
| filter_sp.reset (new SearchFilterByModuleListAndCU (shared_from_this(), *containingModules, *containingSourceFiles)); |
| } |
| return filter_sp; |
| } |
| |
| BreakpointSP |
| Target::CreateFuncRegexBreakpoint (const FileSpecList *containingModules, |
| const FileSpecList *containingSourceFiles, |
| RegularExpression &func_regex, |
| LazyBool skip_prologue, |
| bool internal) |
| { |
| SearchFilterSP filter_sp(GetSearchFilterForModuleAndCUList (containingModules, containingSourceFiles)); |
| BreakpointResolverSP resolver_sp(new BreakpointResolverName (NULL, |
| func_regex, |
| skip_prologue == eLazyBoolCalculate ? GetSkipPrologue() : skip_prologue)); |
| |
| return CreateBreakpoint (filter_sp, resolver_sp, internal); |
| } |
| |
| lldb::BreakpointSP |
| Target::CreateExceptionBreakpoint (enum lldb::LanguageType language, bool catch_bp, bool throw_bp, bool internal) |
| { |
| return LanguageRuntime::CreateExceptionBreakpoint (*this, language, catch_bp, throw_bp, internal); |
| } |
| |
| BreakpointSP |
| Target::CreateBreakpoint (SearchFilterSP &filter_sp, BreakpointResolverSP &resolver_sp, bool internal) |
| { |
| BreakpointSP bp_sp; |
| if (filter_sp && resolver_sp) |
| { |
| bp_sp.reset(new Breakpoint (*this, filter_sp, resolver_sp)); |
| resolver_sp->SetBreakpoint (bp_sp.get()); |
| |
| if (internal) |
| m_internal_breakpoint_list.Add (bp_sp, false); |
| else |
| m_breakpoint_list.Add (bp_sp, true); |
| |
| Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_BREAKPOINTS)); |
| if (log) |
| { |
| StreamString s; |
| bp_sp->GetDescription(&s, lldb::eDescriptionLevelVerbose); |
| log->Printf ("Target::%s (internal = %s) => break_id = %s\n", __FUNCTION__, internal ? "yes" : "no", s.GetData()); |
| } |
| |
| bp_sp->ResolveBreakpoint(); |
| } |
| |
| if (!internal && bp_sp) |
| { |
| m_last_created_breakpoint = bp_sp; |
| } |
| |
| return bp_sp; |
| } |
| |
| bool |
| Target::ProcessIsValid() |
| { |
| return (m_process_sp && m_process_sp->IsAlive()); |
| } |
| |
| static bool |
| CheckIfWatchpointsExhausted(Target *target, Error &error) |
| { |
| uint32_t num_supported_hardware_watchpoints; |
| Error rc = target->GetProcessSP()->GetWatchpointSupportInfo(num_supported_hardware_watchpoints); |
| if (rc.Success()) |
| { |
| uint32_t num_current_watchpoints = target->GetWatchpointList().GetSize(); |
| if (num_current_watchpoints >= num_supported_hardware_watchpoints) |
| error.SetErrorStringWithFormat("number of supported hardware watchpoints (%u) has been reached", |
| num_supported_hardware_watchpoints); |
| } |
| return false; |
| } |
| |
| // See also Watchpoint::SetWatchpointType(uint32_t type) and |
| // the OptionGroupWatchpoint::WatchType enum type. |
| WatchpointSP |
| Target::CreateWatchpoint(lldb::addr_t addr, size_t size, const ClangASTType *type, uint32_t kind, Error &error) |
| { |
| Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_WATCHPOINTS)); |
| if (log) |
| log->Printf("Target::%s (addr = 0x%8.8" PRIx64 " size = %" PRIu64 " type = %u)\n", |
| __FUNCTION__, addr, (uint64_t)size, kind); |
| |
| WatchpointSP wp_sp; |
| if (!ProcessIsValid()) |
| { |
| error.SetErrorString("process is not alive"); |
| return wp_sp; |
| } |
| if (addr == LLDB_INVALID_ADDRESS || size == 0) |
| { |
| if (size == 0) |
| error.SetErrorString("cannot set a watchpoint with watch_size of 0"); |
| else |
| error.SetErrorStringWithFormat("invalid watch address: %" PRIu64, addr); |
| return wp_sp; |
| } |
| |
| // Currently we only support one watchpoint per address, with total number |
| // of watchpoints limited by the hardware which the inferior is running on. |
| |
| // Grab the list mutex while doing operations. |
| const bool notify = false; // Don't notify about all the state changes we do on creating the watchpoint. |
| Mutex::Locker locker; |
| this->GetWatchpointList().GetListMutex(locker); |
| WatchpointSP matched_sp = m_watchpoint_list.FindByAddress(addr); |
| if (matched_sp) |
| { |
| size_t old_size = matched_sp->GetByteSize(); |
| uint32_t old_type = |
| (matched_sp->WatchpointRead() ? LLDB_WATCH_TYPE_READ : 0) | |
| (matched_sp->WatchpointWrite() ? LLDB_WATCH_TYPE_WRITE : 0); |
| // Return the existing watchpoint if both size and type match. |
| if (size == old_size && kind == old_type) { |
| wp_sp = matched_sp; |
| wp_sp->SetEnabled(false, notify); |
| } else { |
| // Nil the matched watchpoint; we will be creating a new one. |
| m_process_sp->DisableWatchpoint(matched_sp.get(), notify); |
| m_watchpoint_list.Remove(matched_sp->GetID(), true); |
| } |
| } |
| |
| if (!wp_sp) |
| { |
| wp_sp.reset(new Watchpoint(*this, addr, size, type)); |
| wp_sp->SetWatchpointType(kind, notify); |
| m_watchpoint_list.Add (wp_sp, true); |
| } |
| |
| error = m_process_sp->EnableWatchpoint(wp_sp.get(), notify); |
| if (log) |
| log->Printf("Target::%s (creation of watchpoint %s with id = %u)\n", |
| __FUNCTION__, |
| error.Success() ? "succeeded" : "failed", |
| wp_sp->GetID()); |
| |
| if (error.Fail()) |
| { |
| // Enabling the watchpoint on the device side failed. |
| // Remove the said watchpoint from the list maintained by the target instance. |
| m_watchpoint_list.Remove (wp_sp->GetID(), true); |
| // See if we could provide more helpful error message. |
| if (!CheckIfWatchpointsExhausted(this, error)) |
| { |
| if (!OptionGroupWatchpoint::IsWatchSizeSupported(size)) |
| error.SetErrorStringWithFormat("watch size of %lu is not supported", size); |
| } |
| wp_sp.reset(); |
| } |
| else |
| m_last_created_watchpoint = wp_sp; |
| return wp_sp; |
| } |
| |
| void |
| Target::RemoveAllBreakpoints (bool internal_also) |
| { |
| Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_BREAKPOINTS)); |
| if (log) |
| log->Printf ("Target::%s (internal_also = %s)\n", __FUNCTION__, internal_also ? "yes" : "no"); |
| |
| m_breakpoint_list.RemoveAll (true); |
| if (internal_also) |
| m_internal_breakpoint_list.RemoveAll (false); |
| |
| m_last_created_breakpoint.reset(); |
| } |
| |
| void |
| Target::DisableAllBreakpoints (bool internal_also) |
| { |
| Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_BREAKPOINTS)); |
| if (log) |
| log->Printf ("Target::%s (internal_also = %s)\n", __FUNCTION__, internal_also ? "yes" : "no"); |
| |
| m_breakpoint_list.SetEnabledAll (false); |
| if (internal_also) |
| m_internal_breakpoint_list.SetEnabledAll (false); |
| } |
| |
| void |
| Target::EnableAllBreakpoints (bool internal_also) |
| { |
| Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_BREAKPOINTS)); |
| if (log) |
| log->Printf ("Target::%s (internal_also = %s)\n", __FUNCTION__, internal_also ? "yes" : "no"); |
| |
| m_breakpoint_list.SetEnabledAll (true); |
| if (internal_also) |
| m_internal_breakpoint_list.SetEnabledAll (true); |
| } |
| |
| bool |
| Target::RemoveBreakpointByID (break_id_t break_id) |
| { |
| Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_BREAKPOINTS)); |
| if (log) |
| log->Printf ("Target::%s (break_id = %i, internal = %s)\n", __FUNCTION__, break_id, LLDB_BREAK_ID_IS_INTERNAL (break_id) ? "yes" : "no"); |
| |
| if (DisableBreakpointByID (break_id)) |
| { |
| if (LLDB_BREAK_ID_IS_INTERNAL (break_id)) |
| m_internal_breakpoint_list.Remove(break_id, false); |
| else |
| { |
| if (m_last_created_breakpoint) |
| { |
| if (m_last_created_breakpoint->GetID() == break_id) |
| m_last_created_breakpoint.reset(); |
| } |
| m_breakpoint_list.Remove(break_id, true); |
| } |
| return true; |
| } |
| return false; |
| } |
| |
| bool |
| Target::DisableBreakpointByID (break_id_t break_id) |
| { |
| Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_BREAKPOINTS)); |
| if (log) |
| log->Printf ("Target::%s (break_id = %i, internal = %s)\n", __FUNCTION__, break_id, LLDB_BREAK_ID_IS_INTERNAL (break_id) ? "yes" : "no"); |
| |
| BreakpointSP bp_sp; |
| |
| if (LLDB_BREAK_ID_IS_INTERNAL (break_id)) |
| bp_sp = m_internal_breakpoint_list.FindBreakpointByID (break_id); |
| else |
| bp_sp = m_breakpoint_list.FindBreakpointByID (break_id); |
| if (bp_sp) |
| { |
| bp_sp->SetEnabled (false); |
| return true; |
| } |
| return false; |
| } |
| |
| bool |
| Target::EnableBreakpointByID (break_id_t break_id) |
| { |
| Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_BREAKPOINTS)); |
| if (log) |
| log->Printf ("Target::%s (break_id = %i, internal = %s)\n", |
| __FUNCTION__, |
| break_id, |
| LLDB_BREAK_ID_IS_INTERNAL (break_id) ? "yes" : "no"); |
| |
| BreakpointSP bp_sp; |
| |
| if (LLDB_BREAK_ID_IS_INTERNAL (break_id)) |
| bp_sp = m_internal_breakpoint_list.FindBreakpointByID (break_id); |
| else |
| bp_sp = m_breakpoint_list.FindBreakpointByID (break_id); |
| |
| if (bp_sp) |
| { |
| bp_sp->SetEnabled (true); |
| return true; |
| } |
| return false; |
| } |
| |
| // The flag 'end_to_end', default to true, signifies that the operation is |
| // performed end to end, for both the debugger and the debuggee. |
| |
| // Assumption: Caller holds the list mutex lock for m_watchpoint_list for end |
| // to end operations. |
| bool |
| Target::RemoveAllWatchpoints (bool end_to_end) |
| { |
| Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_WATCHPOINTS)); |
| if (log) |
| log->Printf ("Target::%s\n", __FUNCTION__); |
| |
| if (!end_to_end) { |
| m_watchpoint_list.RemoveAll(true); |
| return true; |
| } |
| |
| // Otherwise, it's an end to end operation. |
| |
| if (!ProcessIsValid()) |
| return false; |
| |
| size_t num_watchpoints = m_watchpoint_list.GetSize(); |
| for (size_t i = 0; i < num_watchpoints; ++i) |
| { |
| WatchpointSP wp_sp = m_watchpoint_list.GetByIndex(i); |
| if (!wp_sp) |
| return false; |
| |
| Error rc = m_process_sp->DisableWatchpoint(wp_sp.get()); |
| if (rc.Fail()) |
| return false; |
| } |
| m_watchpoint_list.RemoveAll (true); |
| return true; // Success! |
| } |
| |
| // Assumption: Caller holds the list mutex lock for m_watchpoint_list for end to |
| // end operations. |
| bool |
| Target::DisableAllWatchpoints (bool end_to_end) |
| { |
| Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_WATCHPOINTS)); |
| if (log) |
| log->Printf ("Target::%s\n", __FUNCTION__); |
| |
| if (!end_to_end) { |
| m_watchpoint_list.SetEnabledAll(false); |
| return true; |
| } |
| |
| // Otherwise, it's an end to end operation. |
| |
| if (!ProcessIsValid()) |
| return false; |
| |
| size_t num_watchpoints = m_watchpoint_list.GetSize(); |
| for (size_t i = 0; i < num_watchpoints; ++i) |
| { |
| WatchpointSP wp_sp = m_watchpoint_list.GetByIndex(i); |
| if (!wp_sp) |
| return false; |
| |
| Error rc = m_process_sp->DisableWatchpoint(wp_sp.get()); |
| if (rc.Fail()) |
| return false; |
| } |
| return true; // Success! |
| } |
| |
| // Assumption: Caller holds the list mutex lock for m_watchpoint_list for end to |
| // end operations. |
| bool |
| Target::EnableAllWatchpoints (bool end_to_end) |
| { |
| Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_WATCHPOINTS)); |
| if (log) |
| log->Printf ("Target::%s\n", __FUNCTION__); |
| |
| if (!end_to_end) { |
| m_watchpoint_list.SetEnabledAll(true); |
| return true; |
| } |
| |
| // Otherwise, it's an end to end operation. |
| |
| if (!ProcessIsValid()) |
| return false; |
| |
| size_t num_watchpoints = m_watchpoint_list.GetSize(); |
| for (size_t i = 0; i < num_watchpoints; ++i) |
| { |
| WatchpointSP wp_sp = m_watchpoint_list.GetByIndex(i); |
| if (!wp_sp) |
| return false; |
| |
| Error rc = m_process_sp->EnableWatchpoint(wp_sp.get()); |
| if (rc.Fail()) |
| return false; |
| } |
| return true; // Success! |
| } |
| |
| // Assumption: Caller holds the list mutex lock for m_watchpoint_list. |
| bool |
| Target::ClearAllWatchpointHitCounts () |
| { |
| Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_WATCHPOINTS)); |
| if (log) |
| log->Printf ("Target::%s\n", __FUNCTION__); |
| |
| size_t num_watchpoints = m_watchpoint_list.GetSize(); |
| for (size_t i = 0; i < num_watchpoints; ++i) |
| { |
| WatchpointSP wp_sp = m_watchpoint_list.GetByIndex(i); |
| if (!wp_sp) |
| return false; |
| |
| wp_sp->ResetHitCount(); |
| } |
| return true; // Success! |
| } |
| |
| // Assumption: Caller holds the list mutex lock for m_watchpoint_list |
| // during these operations. |
| bool |
| Target::IgnoreAllWatchpoints (uint32_t ignore_count) |
| { |
| Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_WATCHPOINTS)); |
| if (log) |
| log->Printf ("Target::%s\n", __FUNCTION__); |
| |
| if (!ProcessIsValid()) |
| return false; |
| |
| size_t num_watchpoints = m_watchpoint_list.GetSize(); |
| for (size_t i = 0; i < num_watchpoints; ++i) |
| { |
| WatchpointSP wp_sp = m_watchpoint_list.GetByIndex(i); |
| if (!wp_sp) |
| return false; |
| |
| wp_sp->SetIgnoreCount(ignore_count); |
| } |
| return true; // Success! |
| } |
| |
| // Assumption: Caller holds the list mutex lock for m_watchpoint_list. |
| bool |
| Target::DisableWatchpointByID (lldb::watch_id_t watch_id) |
| { |
| Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_WATCHPOINTS)); |
| if (log) |
| log->Printf ("Target::%s (watch_id = %i)\n", __FUNCTION__, watch_id); |
| |
| if (!ProcessIsValid()) |
| return false; |
| |
| WatchpointSP wp_sp = m_watchpoint_list.FindByID (watch_id); |
| if (wp_sp) |
| { |
| Error rc = m_process_sp->DisableWatchpoint(wp_sp.get()); |
| if (rc.Success()) |
| return true; |
| |
| // Else, fallthrough. |
| } |
| return false; |
| } |
| |
| // Assumption: Caller holds the list mutex lock for m_watchpoint_list. |
| bool |
| Target::EnableWatchpointByID (lldb::watch_id_t watch_id) |
| { |
| Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_WATCHPOINTS)); |
| if (log) |
| log->Printf ("Target::%s (watch_id = %i)\n", __FUNCTION__, watch_id); |
| |
| if (!ProcessIsValid()) |
| return false; |
| |
| WatchpointSP wp_sp = m_watchpoint_list.FindByID (watch_id); |
| if (wp_sp) |
| { |
| Error rc = m_process_sp->EnableWatchpoint(wp_sp.get()); |
| if (rc.Success()) |
| return true; |
| |
| // Else, fallthrough. |
| } |
| return false; |
| } |
| |
| // Assumption: Caller holds the list mutex lock for m_watchpoint_list. |
| bool |
| Target::RemoveWatchpointByID (lldb::watch_id_t watch_id) |
| { |
| Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_WATCHPOINTS)); |
| if (log) |
| log->Printf ("Target::%s (watch_id = %i)\n", __FUNCTION__, watch_id); |
| |
| if (DisableWatchpointByID (watch_id)) |
| { |
| m_watchpoint_list.Remove(watch_id, true); |
| return true; |
| } |
| return false; |
| } |
| |
| // Assumption: Caller holds the list mutex lock for m_watchpoint_list. |
| bool |
| Target::IgnoreWatchpointByID (lldb::watch_id_t watch_id, uint32_t ignore_count) |
| { |
| Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_WATCHPOINTS)); |
| if (log) |
| log->Printf ("Target::%s (watch_id = %i)\n", __FUNCTION__, watch_id); |
| |
| if (!ProcessIsValid()) |
| return false; |
| |
| WatchpointSP wp_sp = m_watchpoint_list.FindByID (watch_id); |
| if (wp_sp) |
| { |
| wp_sp->SetIgnoreCount(ignore_count); |
| return true; |
| } |
| return false; |
| } |
| |
| ModuleSP |
| Target::GetExecutableModule () |
| { |
| return m_images.GetModuleAtIndex(0); |
| } |
| |
| Module* |
| Target::GetExecutableModulePointer () |
| { |
| return m_images.GetModulePointerAtIndex(0); |
| } |
| |
| static void |
| LoadScriptingResourceForModule (const ModuleSP &module_sp, Target *target) |
| { |
| Error error; |
| StreamString feedback_stream; |
| if (module_sp && !module_sp->LoadScriptingResourceInTarget(target, error, &feedback_stream)) |
| { |
| if (error.AsCString()) |
| target->GetDebugger().GetErrorStream().Printf("unable to load scripting data for module %s - error reported was %s\n", |
| module_sp->GetFileSpec().GetFileNameStrippingExtension().GetCString(), |
| error.AsCString()); |
| if (feedback_stream.GetSize()) |
| target->GetDebugger().GetOutputStream().Printf("%s\n", |
| feedback_stream.GetData()); |
| } |
| } |
| |
| void |
| Target::SetExecutableModule (ModuleSP& executable_sp, bool get_dependent_files) |
| { |
| Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_TARGET)); |
| m_images.Clear(); |
| m_scratch_ast_context_ap.reset(); |
| m_scratch_ast_source_ap.reset(); |
| m_ast_importer_ap.reset(); |
| |
| if (executable_sp.get()) |
| { |
| Timer scoped_timer (__PRETTY_FUNCTION__, |
| "Target::SetExecutableModule (executable = '%s')", |
| executable_sp->GetFileSpec().GetPath().c_str()); |
| |
| m_images.Append(executable_sp); // The first image is our exectuable file |
| |
| // If we haven't set an architecture yet, reset our architecture based on what we found in the executable module. |
| if (!m_arch.IsValid()) |
| { |
| m_arch = executable_sp->GetArchitecture(); |
| if (log) |
| log->Printf ("Target::SetExecutableModule setting architecture to %s (%s) based on executable file", m_arch.GetArchitectureName(), m_arch.GetTriple().getTriple().c_str()); |
| } |
| |
| FileSpecList dependent_files; |
| ObjectFile *executable_objfile = executable_sp->GetObjectFile(); |
| |
| if (executable_objfile && get_dependent_files) |
| { |
| executable_objfile->GetDependentModules(dependent_files); |
| for (uint32_t i=0; i<dependent_files.GetSize(); i++) |
| { |
| FileSpec dependent_file_spec (dependent_files.GetFileSpecPointerAtIndex(i)); |
| FileSpec platform_dependent_file_spec; |
| if (m_platform_sp) |
| m_platform_sp->GetFile (dependent_file_spec, NULL, platform_dependent_file_spec); |
| else |
| platform_dependent_file_spec = dependent_file_spec; |
| |
| ModuleSpec module_spec (platform_dependent_file_spec, m_arch); |
| ModuleSP image_module_sp(GetSharedModule (module_spec)); |
| if (image_module_sp.get()) |
| { |
| ObjectFile *objfile = image_module_sp->GetObjectFile(); |
| if (objfile) |
| objfile->GetDependentModules(dependent_files); |
| } |
| } |
| } |
| } |
| } |
| |
| |
| bool |
| Target::SetArchitecture (const ArchSpec &arch_spec) |
| { |
| Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_TARGET)); |
| if (m_arch.IsCompatibleMatch(arch_spec) || !m_arch.IsValid()) |
| { |
| // If we haven't got a valid arch spec, or the architectures are |
| // compatible, so just update the architecture. Architectures can be |
| // equal, yet the triple OS and vendor might change, so we need to do |
| // the assignment here just in case. |
| m_arch = arch_spec; |
| if (log) |
| log->Printf ("Target::SetArchitecture setting architecture to %s (%s)", arch_spec.GetArchitectureName(), arch_spec.GetTriple().getTriple().c_str()); |
| return true; |
| } |
| else |
| { |
| // If we have an executable file, try to reset the executable to the desired architecture |
| if (log) |
| log->Printf ("Target::SetArchitecture changing architecture to %s (%s)", arch_spec.GetArchitectureName(), arch_spec.GetTriple().getTriple().c_str()); |
| m_arch = arch_spec; |
| ModuleSP executable_sp = GetExecutableModule (); |
| m_images.Clear(); |
| m_scratch_ast_context_ap.reset(); |
| m_scratch_ast_source_ap.reset(); |
| m_ast_importer_ap.reset(); |
| // Need to do something about unsetting breakpoints. |
| |
| if (executable_sp) |
| { |
| if (log) |
| log->Printf("Target::SetArchitecture Trying to select executable file architecture %s (%s)", arch_spec.GetArchitectureName(), arch_spec.GetTriple().getTriple().c_str()); |
| ModuleSpec module_spec (executable_sp->GetFileSpec(), arch_spec); |
| Error error = ModuleList::GetSharedModule (module_spec, |
| executable_sp, |
| &GetExecutableSearchPaths(), |
| NULL, |
| NULL); |
| |
| if (!error.Fail() && executable_sp) |
| { |
| SetExecutableModule (executable_sp, true); |
| return true; |
| } |
| } |
| } |
| return false; |
| } |
| |
| void |
| Target::WillClearList (const ModuleList& module_list) |
| { |
| } |
| |
| void |
| Target::ModuleAdded (const ModuleList& module_list, const ModuleSP &module_sp) |
| { |
| // A module is being added to this target for the first time |
| ModuleList my_module_list; |
| my_module_list.Append(module_sp); |
| LoadScriptingResourceForModule(module_sp, this); |
| ModulesDidLoad (my_module_list); |
| } |
| |
| void |
| Target::ModuleRemoved (const ModuleList& module_list, const ModuleSP &module_sp) |
| { |
| // A module is being added to this target for the first time |
| ModuleList my_module_list; |
| my_module_list.Append(module_sp); |
| ModulesDidUnload (my_module_list); |
| } |
| |
| void |
| Target::ModuleUpdated (const ModuleList& module_list, const ModuleSP &old_module_sp, const ModuleSP &new_module_sp) |
| { |
| // A module is replacing an already added module |
| m_breakpoint_list.UpdateBreakpointsWhenModuleIsReplaced(old_module_sp, new_module_sp); |
| } |
| |
| void |
| Target::ModulesDidLoad (ModuleList &module_list) |
| { |
| if (module_list.GetSize()) |
| { |
| m_breakpoint_list.UpdateBreakpoints (module_list, true); |
| // TODO: make event data that packages up the module_list |
| BroadcastEvent (eBroadcastBitModulesLoaded, NULL); |
| } |
| } |
| |
| void |
| Target::SymbolsDidLoad (ModuleList &module_list) |
| { |
| if (module_list.GetSize()) |
| { |
| if (m_process_sp) |
| { |
| LanguageRuntime* runtime = m_process_sp->GetLanguageRuntime(lldb::eLanguageTypeObjC); |
| if (runtime) |
| { |
| ObjCLanguageRuntime *objc_runtime = (ObjCLanguageRuntime*)runtime; |
| objc_runtime->SymbolsDidLoad(module_list); |
| } |
| } |
| |
| m_breakpoint_list.UpdateBreakpoints (module_list, true); |
| BroadcastEvent(eBroadcastBitSymbolsLoaded, NULL); |
| } |
| } |
| |
| void |
| Target::ModulesDidUnload (ModuleList &module_list) |
| { |
| if (module_list.GetSize()) |
| { |
| m_breakpoint_list.UpdateBreakpoints (module_list, false); |
| // TODO: make event data that packages up the module_list |
| BroadcastEvent (eBroadcastBitModulesUnloaded, NULL); |
| } |
| } |
| |
| bool |
| Target::ModuleIsExcludedForNonModuleSpecificSearches (const FileSpec &module_file_spec) |
| { |
| if (GetBreakpointsConsultPlatformAvoidList()) |
| { |
| ModuleList matchingModules; |
| ModuleSpec module_spec (module_file_spec); |
| size_t num_modules = GetImages().FindModules(module_spec, matchingModules); |
| |
| // If there is more than one module for this file spec, only return true if ALL the modules are on the |
| // black list. |
| if (num_modules > 0) |
| { |
| for (int i = 0; i < num_modules; i++) |
| { |
| if (!ModuleIsExcludedForNonModuleSpecificSearches (matchingModules.GetModuleAtIndex(i))) |
| return false; |
| } |
| return true; |
| } |
| } |
| return false; |
| } |
| |
| bool |
| Target::ModuleIsExcludedForNonModuleSpecificSearches (const lldb::ModuleSP &module_sp) |
| { |
| if (GetBreakpointsConsultPlatformAvoidList()) |
| { |
| if (m_platform_sp) |
| return m_platform_sp->ModuleIsExcludedForNonModuleSpecificSearches (*this, module_sp); |
| } |
| return false; |
| } |
| |
| size_t |
| Target::ReadMemoryFromFileCache (const Address& addr, void *dst, size_t dst_len, Error &error) |
| { |
| SectionSP section_sp (addr.GetSection()); |
| if (section_sp) |
| { |
| // If the contents of this section are encrypted, the on-disk file is unusuable. Read only from live memory. |
| if (section_sp->IsEncrypted()) |
| { |
| error.SetErrorString("section is encrypted"); |
| return 0; |
| } |
| ModuleSP module_sp (section_sp->GetModule()); |
| if (module_sp) |
| { |
| ObjectFile *objfile = section_sp->GetModule()->GetObjectFile(); |
| if (objfile) |
| { |
| size_t bytes_read = objfile->ReadSectionData (section_sp.get(), |
| addr.GetOffset(), |
| dst, |
| dst_len); |
| if (bytes_read > 0) |
| return bytes_read; |
| else |
| error.SetErrorStringWithFormat("error reading data from section %s", section_sp->GetName().GetCString()); |
| } |
| else |
| error.SetErrorString("address isn't from a object file"); |
| } |
| else |
| error.SetErrorString("address isn't in a module"); |
| } |
| else |
| error.SetErrorString("address doesn't contain a section that points to a section in a object file"); |
| |
| return 0; |
| } |
| |
| size_t |
| Target::ReadMemory (const Address& addr, |
| bool prefer_file_cache, |
| void *dst, |
| size_t dst_len, |
| Error &error, |
| lldb::addr_t *load_addr_ptr) |
| { |
| error.Clear(); |
| |
| // if we end up reading this from process memory, we will fill this |
| // with the actual load address |
| if (load_addr_ptr) |
| *load_addr_ptr = LLDB_INVALID_ADDRESS; |
| |
| size_t bytes_read = 0; |
| |
| addr_t load_addr = LLDB_INVALID_ADDRESS; |
| addr_t file_addr = LLDB_INVALID_ADDRESS; |
| Address resolved_addr; |
| if (!addr.IsSectionOffset()) |
| { |
| if (m_section_load_list.IsEmpty()) |
| { |
| // No sections are loaded, so we must assume we are not running |
| // yet and anything we are given is a file address. |
| file_addr = addr.GetOffset(); // "addr" doesn't have a section, so its offset is the file address |
| m_images.ResolveFileAddress (file_addr, resolved_addr); |
| } |
| else |
| { |
| // We have at least one section loaded. This can be becuase |
| // we have manually loaded some sections with "target modules load ..." |
| // or because we have have a live process that has sections loaded |
| // through the dynamic loader |
| load_addr = addr.GetOffset(); // "addr" doesn't have a section, so its offset is the load address |
| m_section_load_list.ResolveLoadAddress (load_addr, resolved_addr); |
| } |
| } |
| if (!resolved_addr.IsValid()) |
| resolved_addr = addr; |
| |
| |
| if (prefer_file_cache) |
| { |
| bytes_read = ReadMemoryFromFileCache (resolved_addr, dst, dst_len, error); |
| if (bytes_read > 0) |
| return bytes_read; |
| } |
| |
| if (ProcessIsValid()) |
| { |
| if (load_addr == LLDB_INVALID_ADDRESS) |
| load_addr = resolved_addr.GetLoadAddress (this); |
| |
| if (load_addr == LLDB_INVALID_ADDRESS) |
| { |
| ModuleSP addr_module_sp (resolved_addr.GetModule()); |
| if (addr_module_sp && addr_module_sp->GetFileSpec()) |
| error.SetErrorStringWithFormat("%s[0x%" PRIx64 "] can't be resolved, %s in not currently loaded", |
| addr_module_sp->GetFileSpec().GetFilename().AsCString(), |
| resolved_addr.GetFileAddress(), |
| addr_module_sp->GetFileSpec().GetFilename().AsCString()); |
| else |
| error.SetErrorStringWithFormat("0x%" PRIx64 " can't be resolved", resolved_addr.GetFileAddress()); |
| } |
| else |
| { |
| bytes_read = m_process_sp->ReadMemory(load_addr, dst, dst_len, error); |
| if (bytes_read != dst_len) |
| { |
| if (error.Success()) |
| { |
| if (bytes_read == 0) |
| error.SetErrorStringWithFormat("read memory from 0x%" PRIx64 " failed", load_addr); |
| else |
| error.SetErrorStringWithFormat("only %" PRIu64 " of %" PRIu64 " bytes were read from memory at 0x%" PRIx64, (uint64_t)bytes_read, (uint64_t)dst_len, load_addr); |
| } |
| } |
| if (bytes_read) |
| { |
| if (load_addr_ptr) |
| *load_addr_ptr = load_addr; |
| return bytes_read; |
| } |
| // If the address is not section offset we have an address that |
| // doesn't resolve to any address in any currently loaded shared |
| // libaries and we failed to read memory so there isn't anything |
| // more we can do. If it is section offset, we might be able to |
| // read cached memory from the object file. |
| if (!resolved_addr.IsSectionOffset()) |
| return 0; |
| } |
| } |
| |
| if (!prefer_file_cache && resolved_addr.IsSectionOffset()) |
| { |
| // If we didn't already try and read from the object file cache, then |
| // try it after failing to read from the process. |
| return ReadMemoryFromFileCache (resolved_addr, dst, dst_len, error); |
| } |
| return 0; |
| } |
| |
| size_t |
| Target::ReadCStringFromMemory (const Address& addr, std::string &out_str, Error &error) |
| { |
| char buf[256]; |
| out_str.clear(); |
| addr_t curr_addr = addr.GetLoadAddress(this); |
| Address address(addr); |
| while (1) |
| { |
| size_t length = ReadCStringFromMemory (address, buf, sizeof(buf), error); |
| if (length == 0) |
| break; |
| out_str.append(buf, length); |
| // If we got "length - 1" bytes, we didn't get the whole C string, we |
| // need to read some more characters |
| if (length == sizeof(buf) - 1) |
| curr_addr += length; |
| else |
| break; |
| address = Address(curr_addr); |
| } |
| return out_str.size(); |
| } |
| |
| |
| size_t |
| Target::ReadCStringFromMemory (const Address& addr, char *dst, size_t dst_max_len, Error &result_error) |
| { |
| size_t total_cstr_len = 0; |
| if (dst && dst_max_len) |
| { |
| result_error.Clear(); |
| // NULL out everything just to be safe |
| memset (dst, 0, dst_max_len); |
| Error error; |
| addr_t curr_addr = addr.GetLoadAddress(this); |
| Address address(addr); |
| const size_t cache_line_size = 512; |
| size_t bytes_left = dst_max_len - 1; |
| char *curr_dst = dst; |
| |
| while (bytes_left > 0) |
| { |
| addr_t cache_line_bytes_left = cache_line_size - (curr_addr % cache_line_size); |
| addr_t bytes_to_read = std::min<addr_t>(bytes_left, cache_line_bytes_left); |
| size_t bytes_read = ReadMemory (address, false, curr_dst, bytes_to_read, error); |
| |
| if (bytes_read == 0) |
| { |
| result_error = error; |
| dst[total_cstr_len] = '\0'; |
| break; |
| } |
| const size_t len = strlen(curr_dst); |
| |
| total_cstr_len += len; |
| |
| if (len < bytes_to_read) |
| break; |
| |
| curr_dst += bytes_read; |
| curr_addr += bytes_read; |
| bytes_left -= bytes_read; |
| address = Address(curr_addr); |
| } |
| } |
| else |
| { |
| if (dst == NULL) |
| result_error.SetErrorString("invalid arguments"); |
| else |
| result_error.Clear(); |
| } |
| return total_cstr_len; |
| } |
| |
| size_t |
| Target::ReadScalarIntegerFromMemory (const Address& addr, |
| bool prefer_file_cache, |
| uint32_t byte_size, |
| bool is_signed, |
| Scalar &scalar, |
| Error &error) |
| { |
| uint64_t uval; |
| |
| if (byte_size <= sizeof(uval)) |
| { |
| size_t bytes_read = ReadMemory (addr, prefer_file_cache, &uval, byte_size, error); |
| if (bytes_read == byte_size) |
| { |
| DataExtractor data (&uval, sizeof(uval), m_arch.GetByteOrder(), m_arch.GetAddressByteSize()); |
| lldb::offset_t offset = 0; |
| if (byte_size <= 4) |
| scalar = data.GetMaxU32 (&offset, byte_size); |
| else |
| scalar = data.GetMaxU64 (&offset, byte_size); |
| |
| if (is_signed) |
| scalar.SignExtend(byte_size * 8); |
| return bytes_read; |
| } |
| } |
| else |
| { |
| error.SetErrorStringWithFormat ("byte size of %u is too large for integer scalar type", byte_size); |
| } |
| return 0; |
| } |
| |
| uint64_t |
| Target::ReadUnsignedIntegerFromMemory (const Address& addr, |
| bool prefer_file_cache, |
| size_t integer_byte_size, |
| uint64_t fail_value, |
| Error &error) |
| { |
| Scalar scalar; |
| if (ReadScalarIntegerFromMemory (addr, |
| prefer_file_cache, |
| integer_byte_size, |
| false, |
| scalar, |
| error)) |
| return scalar.ULongLong(fail_value); |
| return fail_value; |
| } |
| |
| bool |
| Target::ReadPointerFromMemory (const Address& addr, |
| bool prefer_file_cache, |
| Error &error, |
| Address &pointer_addr) |
| { |
| Scalar scalar; |
| if (ReadScalarIntegerFromMemory (addr, |
| prefer_file_cache, |
| m_arch.GetAddressByteSize(), |
| false, |
| scalar, |
| error)) |
| { |
| addr_t pointer_vm_addr = scalar.ULongLong(LLDB_INVALID_ADDRESS); |
| if (pointer_vm_addr != LLDB_INVALID_ADDRESS) |
| { |
| if (m_section_load_list.IsEmpty()) |
| { |
| // No sections are loaded, so we must assume we are not running |
| // yet and anything we are given is a file address. |
| m_images.ResolveFileAddress (pointer_vm_addr, pointer_addr); |
| } |
| else |
| { |
| // We have at least one section loaded. This can be becuase |
| // we have manually loaded some sections with "target modules load ..." |
| // or because we have have a live process that has sections loaded |
| // through the dynamic loader |
| m_section_load_list.ResolveLoadAddress (pointer_vm_addr, pointer_addr); |
| } |
| // We weren't able to resolve the pointer value, so just return |
| // an address with no section |
| if (!pointer_addr.IsValid()) |
| pointer_addr.SetOffset (pointer_vm_addr); |
| return true; |
| |
| } |
| } |
| return false; |
| } |
| |
| ModuleSP |
| Target::GetSharedModule (const ModuleSpec &module_spec, Error *error_ptr) |
| { |
| ModuleSP module_sp; |
| |
| Error error; |
| |
| // First see if we already have this module in our module list. If we do, then we're done, we don't need |
| // to consult the shared modules list. But only do this if we are passed a UUID. |
| |
| if (module_spec.GetUUID().IsValid()) |
| module_sp = m_images.FindFirstModule(module_spec); |
| |
| if (!module_sp) |
| { |
| ModuleSP old_module_sp; // This will get filled in if we have a new version of the library |
| bool did_create_module = false; |
| |
| // If there are image search path entries, try to use them first to acquire a suitable image. |
| if (m_image_search_paths.GetSize()) |
| { |
| ModuleSpec transformed_spec (module_spec); |
| if (m_image_search_paths.RemapPath (module_spec.GetFileSpec().GetDirectory(), transformed_spec.GetFileSpec().GetDirectory())) |
| { |
| transformed_spec.GetFileSpec().GetFilename() = module_spec.GetFileSpec().GetFilename(); |
| error = ModuleList::GetSharedModule (transformed_spec, |
| module_sp, |
| &GetExecutableSearchPaths(), |
| &old_module_sp, |
| &did_create_module); |
| } |
| } |
| |
| if (!module_sp) |
| { |
| // If we have a UUID, we can check our global shared module list in case |
| // we already have it. If we don't have a valid UUID, then we can't since |
| // the path in "module_spec" will be a platform path, and we will need to |
| // let the platform find that file. For example, we could be asking for |
| // "/usr/lib/dyld" and if we do not have a UUID, we don't want to pick |
| // the local copy of "/usr/lib/dyld" since our platform could be a remote |
| // platform that has its own "/usr/lib/dyld" in an SDK or in a local file |
| // cache. |
| if (module_spec.GetUUID().IsValid()) |
| { |
| // We have a UUID, it is OK to check the global module list... |
| error = ModuleList::GetSharedModule (module_spec, |
| module_sp, |
| &GetExecutableSearchPaths(), |
| &old_module_sp, |
| &did_create_module); |
| } |
| |
| if (!module_sp) |
| { |
| // The platform is responsible for finding and caching an appropriate |
| // module in the shared module cache. |
| if (m_platform_sp) |
| { |
| FileSpec platform_file_spec; |
| error = m_platform_sp->GetSharedModule (module_spec, |
| module_sp, |
| &GetExecutableSearchPaths(), |
| &old_module_sp, |
| &did_create_module); |
| } |
| else |
| { |
| error.SetErrorString("no platform is currently set"); |
| } |
| } |
| } |
| |
| // We found a module that wasn't in our target list. Let's make sure that there wasn't an equivalent |
| // module in the list already, and if there was, let's remove it. |
| if (module_sp) |
| { |
| ObjectFile *objfile = module_sp->GetObjectFile(); |
| if (objfile) |
| { |
| switch (objfile->GetType()) |
| { |
| case ObjectFile::eTypeCoreFile: /// A core file that has a checkpoint of a program's execution state |
| case ObjectFile::eTypeExecutable: /// A normal executable |
| case ObjectFile::eTypeDynamicLinker: /// The platform's dynamic linker executable |
| case ObjectFile::eTypeObjectFile: /// An intermediate object file |
| case ObjectFile::eTypeSharedLibrary: /// A shared library that can be used during execution |
| break; |
| case ObjectFile::eTypeDebugInfo: /// An object file that contains only debug information |
| if (error_ptr) |
| error_ptr->SetErrorString("debug info files aren't valid target modules, please specify an executable"); |
| return ModuleSP(); |
| case ObjectFile::eTypeStubLibrary: /// A library that can be linked against but not used for execution |
| if (error_ptr) |
| error_ptr->SetErrorString("stub libraries aren't valid target modules, please specify an executable"); |
| return ModuleSP(); |
| default: |
| if (error_ptr) |
| error_ptr->SetErrorString("unsupported file type, please specify an executable"); |
| return ModuleSP(); |
| } |
| // GetSharedModule is not guaranteed to find the old shared module, for instance |
| // in the common case where you pass in the UUID, it is only going to find the one |
| // module matching the UUID. In fact, it has no good way to know what the "old module" |
| // relevant to this target is, since there might be many copies of a module with this file spec |
| // in various running debug sessions, but only one of them will belong to this target. |
| // So let's remove the UUID from the module list, and look in the target's module list. |
| // Only do this if there is SOMETHING else in the module spec... |
| if (!old_module_sp) |
| { |
| if (module_spec.GetUUID().IsValid() && !module_spec.GetFileSpec().GetFilename().IsEmpty() && !module_spec.GetFileSpec().GetDirectory().IsEmpty()) |
| { |
| ModuleSpec module_spec_copy(module_spec.GetFileSpec()); |
| module_spec_copy.GetUUID().Clear(); |
| |
| ModuleList found_modules; |
| size_t num_found = m_images.FindModules (module_spec_copy, found_modules); |
| if (num_found == 1) |
| { |
| old_module_sp = found_modules.GetModuleAtIndex(0); |
| } |
| } |
| } |
| |
| if (old_module_sp && m_images.GetIndexForModule (old_module_sp.get()) != LLDB_INVALID_INDEX32) |
| { |
| m_images.ReplaceModule(old_module_sp, module_sp); |
| Module *old_module_ptr = old_module_sp.get(); |
| old_module_sp.reset(); |
| ModuleList::RemoveSharedModuleIfOrphaned (old_module_ptr); |
| } |
| else |
| m_images.Append(module_sp); |
| } |
| } |
| } |
| if (error_ptr) |
| *error_ptr = error; |
| return module_sp; |
| } |
| |
| |
| TargetSP |
| Target::CalculateTarget () |
| { |
| return shared_from_this(); |
| } |
| |
| ProcessSP |
| Target::CalculateProcess () |
| { |
| return ProcessSP(); |
| } |
| |
| ThreadSP |
| Target::CalculateThread () |
| { |
| return ThreadSP(); |
| } |
| |
| StackFrameSP |
| Target::CalculateStackFrame () |
| { |
| return StackFrameSP(); |
| } |
| |
| void |
| Target::CalculateExecutionContext (ExecutionContext &exe_ctx) |
| { |
| exe_ctx.Clear(); |
| exe_ctx.SetTargetPtr(this); |
| } |
| |
| PathMappingList & |
| Target::GetImageSearchPathList () |
| { |
| return m_image_search_paths; |
| } |
| |
| void |
| Target::ImageSearchPathsChanged |
| ( |
| const PathMappingList &path_list, |
| void *baton |
| ) |
| { |
| Target *target = (Target *)baton; |
| ModuleSP exe_module_sp (target->GetExecutableModule()); |
| if (exe_module_sp) |
| { |
| target->m_images.Clear(); |
| target->SetExecutableModule (exe_module_sp, true); |
| } |
| } |
| |
| ClangASTContext * |
| Target::GetScratchClangASTContext(bool create_on_demand) |
| { |
| // Now see if we know the target triple, and if so, create our scratch AST context: |
| if (m_scratch_ast_context_ap.get() == NULL && m_arch.IsValid() && create_on_demand) |
| { |
| m_scratch_ast_context_ap.reset (new ClangASTContext(m_arch.GetTriple().str().c_str())); |
| m_scratch_ast_source_ap.reset (new ClangASTSource(shared_from_this())); |
| m_scratch_ast_source_ap->InstallASTContext(m_scratch_ast_context_ap->getASTContext()); |
| llvm::OwningPtr<clang::ExternalASTSource> proxy_ast_source(m_scratch_ast_source_ap->CreateProxy()); |
| m_scratch_ast_context_ap->SetExternalSource(proxy_ast_source); |
| } |
| return m_scratch_ast_context_ap.get(); |
| } |
| |
| ClangASTImporter * |
| Target::GetClangASTImporter() |
| { |
| ClangASTImporter *ast_importer = m_ast_importer_ap.get(); |
| |
| if (!ast_importer) |
| { |
| ast_importer = new ClangASTImporter(); |
| m_ast_importer_ap.reset(ast_importer); |
| } |
| |
| return ast_importer; |
| } |
| |
| void |
| Target::SettingsInitialize () |
| { |
| Process::SettingsInitialize (); |
| } |
| |
| void |
| Target::SettingsTerminate () |
| { |
| Process::SettingsTerminate (); |
| } |
| |
| FileSpecList |
| Target::GetDefaultExecutableSearchPaths () |
| { |
| TargetPropertiesSP properties_sp(Target::GetGlobalProperties()); |
| if (properties_sp) |
| return properties_sp->GetExecutableSearchPaths(); |
| return FileSpecList(); |
| } |
| |
| ArchSpec |
| Target::GetDefaultArchitecture () |
| { |
| TargetPropertiesSP properties_sp(Target::GetGlobalProperties()); |
| if (properties_sp) |
| return properties_sp->GetDefaultArchitecture(); |
| return ArchSpec(); |
| } |
| |
| void |
| Target::SetDefaultArchitecture (const ArchSpec &arch) |
| { |
| TargetPropertiesSP properties_sp(Target::GetGlobalProperties()); |
| if (properties_sp) |
| { |
| LogIfAnyCategoriesSet(LIBLLDB_LOG_TARGET, "Target::SetDefaultArchitecture setting target's default architecture to %s (%s)", arch.GetArchitectureName(), arch.GetTriple().getTriple().c_str()); |
| return properties_sp->SetDefaultArchitecture(arch); |
| } |
| } |
| |
| Target * |
| Target::GetTargetFromContexts (const ExecutionContext *exe_ctx_ptr, const SymbolContext *sc_ptr) |
| { |
| // The target can either exist in the "process" of ExecutionContext, or in |
| // the "target_sp" member of SymbolContext. This accessor helper function |
| // will get the target from one of these locations. |
| |
| Target *target = NULL; |
| if (sc_ptr != NULL) |
| target = sc_ptr->target_sp.get(); |
| if (target == NULL && exe_ctx_ptr) |
| target = exe_ctx_ptr->GetTargetPtr(); |
| return target; |
| } |
| |
| ExecutionResults |
| Target::EvaluateExpression |
| ( |
| const char *expr_cstr, |
| StackFrame *frame, |
| lldb::ValueObjectSP &result_valobj_sp, |
| const EvaluateExpressionOptions& options |
| ) |
| { |
| result_valobj_sp.reset(); |
| |
| ExecutionResults execution_results = eExecutionSetupError; |
| |
| if (expr_cstr == NULL || expr_cstr[0] == '\0') |
| return execution_results; |
| |
| // We shouldn't run stop hooks in expressions. |
| // Be sure to reset this if you return anywhere within this function. |
| bool old_suppress_value = m_suppress_stop_hooks; |
| m_suppress_stop_hooks = true; |
| |
| ExecutionContext exe_ctx; |
| |
| if (frame) |
| { |
| frame->CalculateExecutionContext(exe_ctx); |
| } |
| else if (m_process_sp) |
| { |
| m_process_sp->CalculateExecutionContext(exe_ctx); |
| } |
| else |
| { |
| CalculateExecutionContext(exe_ctx); |
| } |
| |
| // Make sure we aren't just trying to see the value of a persistent |
| // variable (something like "$0") |
| lldb::ClangExpressionVariableSP persistent_var_sp; |
| // Only check for persistent variables the expression starts with a '$' |
| if (expr_cstr[0] == '$') |
| persistent_var_sp = m_persistent_variables.GetVariable (expr_cstr); |
| |
| if (persistent_var_sp) |
| { |
| result_valobj_sp = persistent_var_sp->GetValueObject (); |
| execution_results = eExecutionCompleted; |
| } |
| else |
| { |
| const char *prefix = GetExpressionPrefixContentsAsCString(); |
| |
| execution_results = ClangUserExpression::Evaluate (exe_ctx, |
| options.GetExecutionPolicy(), |
| lldb::eLanguageTypeUnknown, |
| options.DoesCoerceToId() ? ClangUserExpression::eResultTypeId : ClangUserExpression::eResultTypeAny, |
| options.DoesUnwindOnError(), |
| options.DoesIgnoreBreakpoints(), |
| expr_cstr, |
| prefix, |
| result_valobj_sp, |
| options.GetRunOthers(), |
| options.GetTimeoutUsec()); |
| } |
| |
| m_suppress_stop_hooks = old_suppress_value; |
| |
| return execution_results; |
| } |
| |
| lldb::addr_t |
| Target::GetCallableLoadAddress (lldb::addr_t load_addr, AddressClass addr_class) const |
| { |
| addr_t code_addr = load_addr; |
| switch (m_arch.GetMachine()) |
| { |
| case llvm::Triple::arm: |
| case llvm::Triple::thumb: |
| switch (addr_class) |
| { |
| case eAddressClassData: |
| case eAddressClassDebug: |
| return LLDB_INVALID_ADDRESS; |
| |
| case eAddressClassUnknown: |
| case eAddressClassInvalid: |
| case eAddressClassCode: |
| case eAddressClassCodeAlternateISA: |
| case eAddressClassRuntime: |
| // Check if bit zero it no set? |
| if ((code_addr & 1ull) == 0) |
| { |
| // Bit zero isn't set, check if the address is a multiple of 2? |
| if (code_addr & 2ull) |
| { |
| // The address is a multiple of 2 so it must be thumb, set bit zero |
| code_addr |= 1ull; |
| } |
| else if (addr_class == eAddressClassCodeAlternateISA) |
| { |
| // We checked the address and the address claims to be the alternate ISA |
| // which means thumb, so set bit zero. |
| code_addr |= 1ull; |
| } |
| } |
| break; |
| } |
| break; |
| |
| default: |
| break; |
| } |
| return code_addr; |
| } |
| |
| lldb::addr_t |
| Target::GetOpcodeLoadAddress (lldb::addr_t load_addr, AddressClass addr_class) const |
| { |
| addr_t opcode_addr = load_addr; |
| switch (m_arch.GetMachine()) |
| { |
| case llvm::Triple::arm: |
| case llvm::Triple::thumb: |
| switch (addr_class) |
| { |
| case eAddressClassData: |
| case eAddressClassDebug: |
| return LLDB_INVALID_ADDRESS; |
| |
| case eAddressClassInvalid: |
| case eAddressClassUnknown: |
| case eAddressClassCode: |
| case eAddressClassCodeAlternateISA: |
| case eAddressClassRuntime: |
| opcode_addr &= ~(1ull); |
| break; |
| } |
| break; |
| |
| default: |
| break; |
| } |
| return opcode_addr; |
| } |
| |
| SourceManager & |
| Target::GetSourceManager () |
| { |
| if (m_source_manager_ap.get() == NULL) |
| m_source_manager_ap.reset (new SourceManager(shared_from_this())); |
| return *m_source_manager_ap; |
| } |
| |
| |
| lldb::user_id_t |
| Target::AddStopHook (Target::StopHookSP &new_hook_sp) |
| { |
| lldb::user_id_t new_uid = ++m_stop_hook_next_id; |
| new_hook_sp.reset (new StopHook(shared_from_this(), new_uid)); |
| m_stop_hooks[new_uid] = new_hook_sp; |
| return new_uid; |
| } |
| |
| bool |
| Target::RemoveStopHookByID (lldb::user_id_t user_id) |
| { |
| size_t num_removed; |
| num_removed = m_stop_hooks.erase (user_id); |
| if (num_removed == 0) |
| return false; |
| else |
| return true; |
| } |
| |
| void |
| Target::RemoveAllStopHooks () |
| { |
| m_stop_hooks.clear(); |
| } |
| |
| Target::StopHookSP |
| Target::GetStopHookByID (lldb::user_id_t user_id) |
| { |
| StopHookSP found_hook; |
| |
| StopHookCollection::iterator specified_hook_iter; |
| specified_hook_iter = m_stop_hooks.find (user_id); |
| if (specified_hook_iter != m_stop_hooks.end()) |
| found_hook = (*specified_hook_iter).second; |
| return found_hook; |
| } |
| |
| bool |
| Target::SetStopHookActiveStateByID (lldb::user_id_t user_id, bool active_state) |
| { |
| StopHookCollection::iterator specified_hook_iter; |
| specified_hook_iter = m_stop_hooks.find (user_id); |
| if (specified_hook_iter == m_stop_hooks.end()) |
| return false; |
| |
| (*specified_hook_iter).second->SetIsActive (active_state); |
| return true; |
| } |
| |
| void |
| Target::SetAllStopHooksActiveState (bool active_state) |
| { |
| StopHookCollection::iterator pos, end = m_stop_hooks.end(); |
| for (pos = m_stop_hooks.begin(); pos != end; pos++) |
| { |
| (*pos).second->SetIsActive (active_state); |
| } |
| } |
| |
| void |
| Target::RunStopHooks () |
| { |
| if (m_suppress_stop_hooks) |
| return; |
| |
| if (!m_process_sp) |
| return; |
| |
| // <rdar://problem/12027563> make sure we check that we are not stopped because of us running a user expression |
| // since in that case we do not want to run the stop-hooks |
| if (m_process_sp->GetModIDRef().IsLastResumeForUserExpression()) |
| return; |
| |
| if (m_stop_hooks.empty()) |
| return; |
| |
| StopHookCollection::iterator pos, end = m_stop_hooks.end(); |
| |
| // If there aren't any active stop hooks, don't bother either: |
| bool any_active_hooks = false; |
| for (pos = m_stop_hooks.begin(); pos != end; pos++) |
| { |
| if ((*pos).second->IsActive()) |
| { |
| any_active_hooks = true; |
| break; |
| } |
| } |
| if (!any_active_hooks) |
| return; |
| |
| CommandReturnObject result; |
| |
| std::vector<ExecutionContext> exc_ctx_with_reasons; |
| std::vector<SymbolContext> sym_ctx_with_reasons; |
| |
| ThreadList &cur_threadlist = m_process_sp->GetThreadList(); |
| size_t num_threads = cur_threadlist.GetSize(); |
| for (size_t i = 0; i < num_threads; i++) |
| { |
| lldb::ThreadSP cur_thread_sp = cur_threadlist.GetThreadAtIndex (i); |
| if (cur_thread_sp->ThreadStoppedForAReason()) |
| { |
| lldb::StackFrameSP cur_frame_sp = cur_thread_sp->GetStackFrameAtIndex(0); |
| exc_ctx_with_reasons.push_back(ExecutionContext(m_process_sp.get(), cur_thread_sp.get(), cur_frame_sp.get())); |
| sym_ctx_with_reasons.push_back(cur_frame_sp->GetSymbolContext(eSymbolContextEverything)); |
| } |
| } |
| |
| // If no threads stopped for a reason, don't run the stop-hooks. |
| size_t num_exe_ctx = exc_ctx_with_reasons.size(); |
| if (num_exe_ctx == 0) |
| return; |
| |
| result.SetImmediateOutputStream (m_debugger.GetAsyncOutputStream()); |
| result.SetImmediateErrorStream (m_debugger.GetAsyncErrorStream()); |
| |
| bool keep_going = true; |
| bool hooks_ran = false; |
| bool print_hook_header; |
| bool print_thread_header; |
| |
| if (num_exe_ctx == 1) |
| print_thread_header = false; |
| else |
| print_thread_header = true; |
| |
| if (m_stop_hooks.size() == 1) |
| print_hook_header = false; |
| else |
| print_hook_header = true; |
| |
| for (pos = m_stop_hooks.begin(); keep_going && pos != end; pos++) |
| { |
| // result.Clear(); |
| StopHookSP cur_hook_sp = (*pos).second; |
| if (!cur_hook_sp->IsActive()) |
| continue; |
| |
| bool any_thread_matched = false; |
| for (size_t i = 0; keep_going && i < num_exe_ctx; i++) |
| { |
| if ((cur_hook_sp->GetSpecifier () == NULL |
| || cur_hook_sp->GetSpecifier()->SymbolContextMatches(sym_ctx_with_reasons[i])) |
| && (cur_hook_sp->GetThreadSpecifier() == NULL |
| || cur_hook_sp->GetThreadSpecifier()->ThreadPassesBasicTests(exc_ctx_with_reasons[i].GetThreadRef()))) |
| { |
| if (!hooks_ran) |
| { |
| hooks_ran = true; |
| } |
| if (print_hook_header && !any_thread_matched) |
| { |
| const char *cmd = (cur_hook_sp->GetCommands().GetSize() == 1 ? |
| cur_hook_sp->GetCommands().GetStringAtIndex(0) : |
| NULL); |
| if (cmd) |
| result.AppendMessageWithFormat("\n- Hook %" PRIu64 " (%s)\n", cur_hook_sp->GetID(), cmd); |
| else |
| result.AppendMessageWithFormat("\n- Hook %" PRIu64 "\n", cur_hook_sp->GetID()); |
| any_thread_matched = true; |
| } |
| |
| if (print_thread_header) |
| result.AppendMessageWithFormat("-- Thread %d\n", exc_ctx_with_reasons[i].GetThreadPtr()->GetIndexID()); |
| |
| bool stop_on_continue = true; |
| bool stop_on_error = true; |
| bool echo_commands = false; |
| bool print_results = true; |
| GetDebugger().GetCommandInterpreter().HandleCommands (cur_hook_sp->GetCommands(), |
| &exc_ctx_with_reasons[i], |
| stop_on_continue, |
| stop_on_error, |
| echo_commands, |
| print_results, |
| eLazyBoolNo, |
| result); |
| |
| // If the command started the target going again, we should bag out of |
| // running the stop hooks. |
| if ((result.GetStatus() == eReturnStatusSuccessContinuingNoResult) || |
| (result.GetStatus() == eReturnStatusSuccessContinuingResult)) |
| { |
| result.AppendMessageWithFormat ("Aborting stop hooks, hook %" PRIu64 " set the program running.", cur_hook_sp->GetID()); |
| keep_going = false; |
| } |
| } |
| } |
| } |
| |
| result.GetImmediateOutputStream()->Flush(); |
| result.GetImmediateErrorStream()->Flush(); |
| } |
| |
| |
| //-------------------------------------------------------------- |
| // class Target::StopHook |
| //-------------------------------------------------------------- |
| |
| |
| Target::StopHook::StopHook (lldb::TargetSP target_sp, lldb::user_id_t uid) : |
| UserID (uid), |
| m_target_sp (target_sp), |
| m_commands (), |
| m_specifier_sp (), |
| m_thread_spec_ap(), |
| m_active (true) |
| { |
| } |
| |
| Target::StopHook::StopHook (const StopHook &rhs) : |
| UserID (rhs.GetID()), |
| m_target_sp (rhs.m_target_sp), |
| m_commands (rhs.m_commands), |
| m_specifier_sp (rhs.m_specifier_sp), |
| m_thread_spec_ap (), |
| m_active (rhs.m_active) |
| { |
| if (rhs.m_thread_spec_ap.get() != NULL) |
| m_thread_spec_ap.reset (new ThreadSpec(*rhs.m_thread_spec_ap.get())); |
| } |
| |
| |
| Target::StopHook::~StopHook () |
| { |
| } |
| |
| void |
| Target::StopHook::SetThreadSpecifier (ThreadSpec *specifier) |
| { |
| m_thread_spec_ap.reset (specifier); |
| } |
| |
| |
| void |
| Target::StopHook::GetDescription (Stream *s, lldb::DescriptionLevel level) const |
| { |
| int indent_level = s->GetIndentLevel(); |
| |
| s->SetIndentLevel(indent_level + 2); |
| |
| s->Printf ("Hook: %" PRIu64 "\n", GetID()); |
| if (m_active) |
| s->Indent ("State: enabled\n"); |
| else |
| s->Indent ("State: disabled\n"); |
| |
| if (m_specifier_sp) |
| { |
| s->Indent(); |
| s->PutCString ("Specifier:\n"); |
| s->SetIndentLevel (indent_level + 4); |
| m_specifier_sp->GetDescription (s, level); |
| s->SetIndentLevel (indent_level + 2); |
| } |
| |
| if (m_thread_spec_ap.get() != NULL) |
| { |
| StreamString tmp; |
| s->Indent("Thread:\n"); |
| m_thread_spec_ap->GetDescription (&tmp, level); |
| s->SetIndentLevel (indent_level + 4); |
| s->Indent (tmp.GetData()); |
| s->PutCString ("\n"); |
| s->SetIndentLevel (indent_level + 2); |
| } |
| |
| s->Indent ("Commands: \n"); |
| s->SetIndentLevel (indent_level + 4); |
| uint32_t num_commands = m_commands.GetSize(); |
| for (uint32_t i = 0; i < num_commands; i++) |
| { |
| s->Indent(m_commands.GetStringAtIndex(i)); |
| s->PutCString ("\n"); |
| } |
| s->SetIndentLevel (indent_level); |
| } |
| |
| //-------------------------------------------------------------- |
| // class TargetProperties |
| //-------------------------------------------------------------- |
| |
| OptionEnumValueElement |
| lldb_private::g_dynamic_value_types[] = |
| { |
| { eNoDynamicValues, "no-dynamic-values", "Don't calculate the dynamic type of values"}, |
| { eDynamicCanRunTarget, "run-target", "Calculate the dynamic type of values even if you have to run the target."}, |
| { eDynamicDontRunTarget, "no-run-target", "Calculate the dynamic type of values, but don't run the target."}, |
| { 0, NULL, NULL } |
| }; |
| |
| static OptionEnumValueElement |
| g_inline_breakpoint_enums[] = |
| { |
| { eInlineBreakpointsNever, "never", "Never look for inline breakpoint locations (fastest). This setting should only be used if you know that no inlining occurs in your programs."}, |
| { eInlineBreakpointsHeaders, "headers", "Only check for inline breakpoint locations when setting breakpoints in header files, but not when setting breakpoint in implementation source files (default)."}, |
| { eInlineBreakpointsAlways, "always", "Always look for inline breakpoint locations when setting file and line breakpoints (slower but most accurate)."}, |
| { 0, NULL, NULL } |
| }; |
| |
| typedef enum x86DisassemblyFlavor |
| { |
| eX86DisFlavorDefault, |
| eX86DisFlavorIntel, |
| eX86DisFlavorATT |
| } x86DisassemblyFlavor; |
| |
| static OptionEnumValueElement |
| g_x86_dis_flavor_value_types[] = |
| { |
| { eX86DisFlavorDefault, "default", "Disassembler default (currently att)."}, |
| { eX86DisFlavorIntel, "intel", "Intel disassembler flavor."}, |
| { eX86DisFlavorATT, "att", "AT&T disassembler flavor."}, |
| { 0, NULL, NULL } |
| }; |
| |
| static OptionEnumValueElement |
| g_load_script_from_sym_file_values[] = |
| { |
| { eLoadScriptFromSymFileTrue, "true", "Load debug scripts inside symbol files"}, |
| { eLoadScriptFromSymFileFalse, "false", "Do not load debug scripts inside symbol files."}, |
| { eLoadScriptFromSymFileWarn, "warn", "Warn about debug scripts inside symbol files but do not load them."}, |
| { 0, NULL, NULL } |
| }; |
| |
| static PropertyDefinition |
| g_properties[] = |
| { |
| { "default-arch" , OptionValue::eTypeArch , true , 0 , NULL, NULL, "Default architecture to choose, when there's a choice." }, |
| { "expr-prefix" , OptionValue::eTypeFileSpec , false, 0 , NULL, NULL, "Path to a file containing expressions to be prepended to all expressions." }, |
| { "prefer-dynamic-value" , OptionValue::eTypeEnum , false, eNoDynamicValues , NULL, g_dynamic_value_types, "Should printed values be shown as their dynamic value." }, |
| { "enable-synthetic-value" , OptionValue::eTypeBoolean , false, true , NULL, NULL, "Should synthetic values be used by default whenever available." }, |
| { "skip-prologue" , OptionValue::eTypeBoolean , false, true , NULL, NULL, "Skip function prologues when setting breakpoints by name." }, |
| { "source-map" , OptionValue::eTypePathMap , false, 0 , NULL, NULL, "Source path remappings used to track the change of location between a source file when built, and " |
| "where it exists on the current system. It consists of an array of duples, the first element of each duple is " |
| "some part (starting at the root) of the path to the file when it was built, " |
| "and the second is where the remainder of the original build hierarchy is rooted on the local system. " |
| "Each element of the array is checked in order and the first one that results in a match wins." }, |
| { "exec-search-paths" , OptionValue::eTypeFileSpecList, false, 0 , NULL, NULL, "Executable search paths to use when locating executable files whose paths don't match the local file system." }, |
| { "max-children-count" , OptionValue::eTypeSInt64 , false, 256 , NULL, NULL, "Maximum number of children to expand in any level of depth." }, |
| { "max-string-summary-length" , OptionValue::eTypeSInt64 , false, 1024 , NULL, NULL, "Maximum number of characters to show when using %s in summary strings." }, |
| { "max-memory-read-size" , OptionValue::eTypeSInt64 , false, 1024 , NULL, NULL, "Maximum number of bytes that 'memory read' will fetch before --force must be specified." }, |
| { "breakpoints-use-platform-avoid-list", OptionValue::eTypeBoolean , false, true , NULL, NULL, "Consult the platform module avoid list when setting non-module specific breakpoints." }, |
| { "arg0" , OptionValue::eTypeString , false, 0 , NULL, NULL, "The first argument passed to the program in the argument array which can be different from the executable itself." }, |
| { "run-args" , OptionValue::eTypeArgs , false, 0 , NULL, NULL, "A list containing all the arguments to be passed to the executable when it is run. Note that this does NOT include the argv[0] which is in target.arg0." }, |
| { "env-vars" , OptionValue::eTypeDictionary, false, OptionValue::eTypeString , NULL, NULL, "A list of all the environment variables to be passed to the executable's environment, and their values." }, |
| { "inherit-env" , OptionValue::eTypeBoolean , false, true , NULL, NULL, "Inherit the environment from the process that is running LLDB." }, |
| { "input-path" , OptionValue::eTypeFileSpec , false, 0 , NULL, NULL, "The file/path to be used by the executable program for reading its standard input." }, |
| { "output-path" , OptionValue::eTypeFileSpec , false, 0 , NULL, NULL, "The file/path to be used by the executable program for writing its standard output." }, |
| { "error-path" , OptionValue::eTypeFileSpec , false, 0 , NULL, NULL, "The file/path to be used by the executable program for writing its standard error." }, |
| { "disable-aslr" , OptionValue::eTypeBoolean , false, true , NULL, NULL, "Disable Address Space Layout Randomization (ASLR)" }, |
| { "disable-stdio" , OptionValue::eTypeBoolean , false, false , NULL, NULL, "Disable stdin/stdout for process (e.g. for a GUI application)" }, |
| { "inline-breakpoint-strategy" , OptionValue::eTypeEnum , false, eInlineBreakpointsHeaders , NULL, g_inline_breakpoint_enums, "The strategy to use when settings breakpoints by file and line. " |
| "Breakpoint locations can end up being inlined by the compiler, so that a compile unit 'a.c' might contain an inlined function from another source file. " |
| "Usually this is limitted to breakpoint locations from inlined functions from header or other include files, or more accurately non-implementation source files. " |
| "Sometimes code might #include implementation files and cause inlined breakpoint locations in inlined implementation files. " |
| "Always checking for inlined breakpoint locations can be expensive (memory and time), so we try to minimize the " |
| "times we look for inlined locations. This setting allows you to control exactly which strategy is used when settings " |
| "file and line breakpoints." }, |
| // FIXME: This is the wrong way to do per-architecture settings, but we don't have a general per architecture settings system in place yet. |
| { "x86-disassembly-flavor" , OptionValue::eTypeEnum , false, eX86DisFlavorDefault, NULL, g_x86_dis_flavor_value_types, "The default disassembly flavor to use for x86 or x86-64 targets." }, |
| { "use-fast-stepping" , OptionValue::eTypeBoolean , false, true, NULL, NULL, "Use a fast stepping algorithm based on running from branch to branch rather than instruction single-stepping." }, |
| { "load-script-from-symbol-file" , OptionValue::eTypeEnum , false, eLoadScriptFromSymFileWarn, NULL, g_load_script_from_sym_file_values, "Allow LLDB to load scripting resources embedded in symbol files when available." }, |
| { NULL , OptionValue::eTypeInvalid , false, 0 , NULL, NULL, NULL } |
| }; |
| enum |
| { |
| ePropertyDefaultArch, |
| ePropertyExprPrefix, |
| ePropertyPreferDynamic, |
| ePropertyEnableSynthetic, |
| ePropertySkipPrologue, |
| ePropertySourceMap, |
| ePropertyExecutableSearchPaths, |
| ePropertyMaxChildrenCount, |
| ePropertyMaxSummaryLength, |
| ePropertyMaxMemReadSize, |
| ePropertyBreakpointUseAvoidList, |
| ePropertyArg0, |
| ePropertyRunArgs, |
| ePropertyEnvVars, |
| ePropertyInheritEnv, |
| ePropertyInputPath, |
| ePropertyOutputPath, |
| ePropertyErrorPath, |
| ePropertyDisableASLR, |
| ePropertyDisableSTDIO, |
| ePropertyInlineStrategy, |
| ePropertyDisassemblyFlavor, |
| ePropertyUseFastStepping, |
| ePropertyLoadScriptFromSymbolFile, |
| }; |
| |
| |
| class TargetOptionValueProperties : public OptionValueProperties |
| { |
| public: |
| TargetOptionValueProperties (const ConstString &name) : |
| OptionValueProperties (name), |
| m_target (NULL), |
| m_got_host_env (false) |
| { |
| } |
| |
| // This constructor is used when creating TargetOptionValueProperties when it |
| // is part of a new lldb_private::Target instance. It will copy all current |
| // global property values as needed |
| TargetOptionValueProperties (Target *target, const TargetPropertiesSP &target_properties_sp) : |
| OptionValueProperties(*target_properties_sp->GetValueProperties()), |
| m_target (target), |
| m_got_host_env (false) |
| { |
| } |
| |
| virtual const Property * |
| GetPropertyAtIndex (const ExecutionContext *exe_ctx, bool will_modify, uint32_t idx) const |
| { |
| // When gettings the value for a key from the target options, we will always |
| // try and grab the setting from the current target if there is one. Else we just |
| // use the one from this instance. |
| if (idx == ePropertyEnvVars) |
| GetHostEnvironmentIfNeeded (); |
| |
| if (exe_ctx) |
| { |
| Target *target = exe_ctx->GetTargetPtr(); |
| if (target) |
| { |
| TargetOptionValueProperties *target_properties = static_cast<TargetOptionValueProperties *>(target->GetValueProperties().get()); |
| if (this != target_properties) |
| return target_properties->ProtectedGetPropertyAtIndex (idx); |
| } |
| } |
| return ProtectedGetPropertyAtIndex (idx); |
| } |
| |
| lldb::TargetSP |
| GetTargetSP () |
| { |
| return m_target->shared_from_this(); |
| } |
| |
| protected: |
| |
| void |
| GetHostEnvironmentIfNeeded () const |
| { |
| if (!m_got_host_env) |
| { |
| if (m_target) |
| { |
| m_got_host_env = true; |
| const uint32_t idx = ePropertyInheritEnv; |
| if (GetPropertyAtIndexAsBoolean (NULL, idx, g_properties[idx].default_uint_value != 0)) |
| { |
| PlatformSP platform_sp (m_target->GetPlatform()); |
| if (platform_sp) |
| { |
| StringList env; |
| if (platform_sp->GetEnvironment(env)) |
| { |
| OptionValueDictionary *env_dict = GetPropertyAtIndexAsOptionValueDictionary (NULL, ePropertyEnvVars); |
| if (env_dict) |
| { |
| const bool can_replace = false; |
| const size_t envc = env.GetSize(); |
| for (size_t idx=0; idx<envc; idx++) |
| { |
| const char *env_entry = env.GetStringAtIndex (idx); |
| if (env_entry) |
| { |
| const char *equal_pos = ::strchr(env_entry, '='); |
| ConstString key; |
| // It is ok to have environment variables with no values |
| const char *value = NULL; |
| if (equal_pos) |
| { |
| key.SetCStringWithLength(env_entry, equal_pos - env_entry); |
| if (equal_pos[1]) |
| value = equal_pos + 1; |
| } |
| else |
| { |
| key.SetCString(env_entry); |
| } |
| // Don't allow existing keys to be replaced with ones we get from the platform environment |
| env_dict->SetValueForKey(key, OptionValueSP(new OptionValueString(value)), can_replace); |
| } |
| } |
| } |
| } |
| } |
| } |
| } |
| } |
| } |
| Target *m_target; |
| mutable bool m_got_host_env; |
| }; |
| |
| TargetProperties::TargetProperties (Target *target) : |
| Properties () |
| { |
| if (target) |
| { |
| m_collection_sp.reset (new TargetOptionValueProperties(target, Target::GetGlobalProperties())); |
| } |
| else |
| { |
| m_collection_sp.reset (new TargetOptionValueProperties(ConstString("target"))); |
| m_collection_sp->Initialize(g_properties); |
| m_collection_sp->AppendProperty(ConstString("process"), |
| ConstString("Settings specify to processes."), |
| true, |
| Process::GetGlobalProperties()->GetValueProperties()); |
| } |
| } |
| |
| TargetProperties::~TargetProperties () |
| { |
| } |
| ArchSpec |
| TargetProperties::GetDefaultArchitecture () const |
| { |
| OptionValueArch *value = m_collection_sp->GetPropertyAtIndexAsOptionValueArch (NULL, ePropertyDefaultArch); |
| if (value) |
| return value->GetCurrentValue(); |
| return ArchSpec(); |
| } |
| |
| void |
| TargetProperties::SetDefaultArchitecture (const ArchSpec& arch) |
| { |
| OptionValueArch *value = m_collection_sp->GetPropertyAtIndexAsOptionValueArch (NULL, ePropertyDefaultArch); |
| if (value) |
| return value->SetCurrentValue(arch, true); |
| } |
| |
| lldb::DynamicValueType |
| TargetProperties::GetPreferDynamicValue() const |
| { |
| const uint32_t idx = ePropertyPreferDynamic; |
| return (lldb::DynamicValueType)m_collection_sp->GetPropertyAtIndexAsEnumeration (NULL, idx, g_properties[idx].default_uint_value); |
| } |
| |
| bool |
| TargetProperties::GetDisableASLR () const |
| { |
| const uint32_t idx = ePropertyDisableASLR; |
| return m_collection_sp->GetPropertyAtIndexAsBoolean (NULL, idx, g_properties[idx].default_uint_value != 0); |
| } |
| |
| void |
| TargetProperties::SetDisableASLR (bool b) |
| { |
| const uint32_t idx = ePropertyDisableASLR; |
| m_collection_sp->SetPropertyAtIndexAsBoolean (NULL, idx, b); |
| } |
| |
| bool |
| TargetProperties::GetDisableSTDIO () const |
| { |
| const uint32_t idx = ePropertyDisableSTDIO; |
| return m_collection_sp->GetPropertyAtIndexAsBoolean (NULL, idx, g_properties[idx].default_uint_value != 0); |
| } |
| |
| void |
| TargetProperties::SetDisableSTDIO (bool b) |
| { |
| const uint32_t idx = ePropertyDisableSTDIO; |
| m_collection_sp->SetPropertyAtIndexAsBoolean (NULL, idx, b); |
| } |
| |
| const char * |
| TargetProperties::GetDisassemblyFlavor () const |
| { |
| const uint32_t idx = ePropertyDisassemblyFlavor; |
| const char *return_value; |
| |
| x86DisassemblyFlavor flavor_value = (x86DisassemblyFlavor) m_collection_sp->GetPropertyAtIndexAsEnumeration (NULL, idx, g_properties[idx].default_uint_value); |
| return_value = g_x86_dis_flavor_value_types[flavor_value].string_value; |
| return return_value; |
| } |
| |
| InlineStrategy |
| TargetProperties::GetInlineStrategy () const |
| { |
| const uint32_t idx = ePropertyInlineStrategy; |
| return (InlineStrategy)m_collection_sp->GetPropertyAtIndexAsEnumeration (NULL, idx, g_properties[idx].default_uint_value); |
| } |
| |
| const char * |
| TargetProperties::GetArg0 () const |
| { |
| const uint32_t idx = ePropertyArg0; |
| return m_collection_sp->GetPropertyAtIndexAsString (NULL, idx, NULL); |
| } |
| |
| void |
| TargetProperties::SetArg0 (const char *arg) |
| { |
| const uint32_t idx = ePropertyArg0; |
| m_collection_sp->SetPropertyAtIndexAsString (NULL, idx, arg); |
| } |
| |
| bool |
| TargetProperties::GetRunArguments (Args &args) const |
| { |
| const uint32_t idx = ePropertyRunArgs; |
| return m_collection_sp->GetPropertyAtIndexAsArgs (NULL, idx, args); |
| } |
| |
| void |
| TargetProperties::SetRunArguments (const Args &args) |
| { |
| const uint32_t idx = ePropertyRunArgs; |
| m_collection_sp->SetPropertyAtIndexFromArgs (NULL, idx, args); |
| } |
| |
| size_t |
| TargetProperties::GetEnvironmentAsArgs (Args &env) const |
| { |
| const uint32_t idx = ePropertyEnvVars; |
| return m_collection_sp->GetPropertyAtIndexAsArgs (NULL, idx, env); |
| } |
| |
| bool |
| TargetProperties::GetSkipPrologue() const |
| { |
| const uint32_t idx = ePropertySkipPrologue; |
| return m_collection_sp->GetPropertyAtIndexAsBoolean (NULL, idx, g_properties[idx].default_uint_value != 0); |
| } |
| |
| PathMappingList & |
| TargetProperties::GetSourcePathMap () const |
| { |
| const uint32_t idx = ePropertySourceMap; |
| OptionValuePathMappings *option_value = m_collection_sp->GetPropertyAtIndexAsOptionValuePathMappings (NULL, false, idx); |
| assert(option_value); |
| return option_value->GetCurrentValue(); |
| } |
| |
| FileSpecList & |
| TargetProperties::GetExecutableSearchPaths () |
| { |
| const uint32_t idx = ePropertyExecutableSearchPaths; |
| OptionValueFileSpecList *option_value = m_collection_sp->GetPropertyAtIndexAsOptionValueFileSpecList (NULL, false, idx); |
| assert(option_value); |
| return option_value->GetCurrentValue(); |
| } |
| |
| bool |
| TargetProperties::GetEnableSyntheticValue () const |
| { |
| const uint32_t idx = ePropertyEnableSynthetic; |
| return m_collection_sp->GetPropertyAtIndexAsBoolean (NULL, idx, g_properties[idx].default_uint_value != 0); |
| } |
| |
| uint32_t |
| TargetProperties::GetMaximumNumberOfChildrenToDisplay() const |
| { |
| const uint32_t idx = ePropertyMaxChildrenCount; |
| return m_collection_sp->GetPropertyAtIndexAsSInt64 (NULL, idx, g_properties[idx].default_uint_value); |
| } |
| |
| uint32_t |
| TargetProperties::GetMaximumSizeOfStringSummary() const |
| { |
| const uint32_t idx = ePropertyMaxSummaryLength; |
| return m_collection_sp->GetPropertyAtIndexAsSInt64 (NULL, idx, g_properties[idx].default_uint_value); |
| } |
| |
| uint32_t |
| TargetProperties::GetMaximumMemReadSize () const |
| { |
| const uint32_t idx = ePropertyMaxMemReadSize; |
| return m_collection_sp->GetPropertyAtIndexAsSInt64 (NULL, idx, g_properties[idx].default_uint_value); |
| } |
| |
| FileSpec |
| TargetProperties::GetStandardInputPath () const |
| { |
| const uint32_t idx = ePropertyInputPath; |
| return m_collection_sp->GetPropertyAtIndexAsFileSpec (NULL, idx); |
| } |
| |
| void |
| TargetProperties::SetStandardInputPath (const char *p) |
| { |
| const uint32_t idx = ePropertyInputPath; |
| m_collection_sp->SetPropertyAtIndexAsString (NULL, idx, p); |
| } |
| |
| FileSpec |
| TargetProperties::GetStandardOutputPath () const |
| { |
| const uint32_t idx = ePropertyOutputPath; |
| return m_collection_sp->GetPropertyAtIndexAsFileSpec (NULL, idx); |
| } |
| |
| void |
| TargetProperties::SetStandardOutputPath (const char *p) |
| { |
| const uint32_t idx = ePropertyOutputPath; |
| m_collection_sp->SetPropertyAtIndexAsString (NULL, idx, p); |
| } |
| |
| FileSpec |
| TargetProperties::GetStandardErrorPath () const |
| { |
| const uint32_t idx = ePropertyErrorPath; |
| return m_collection_sp->GetPropertyAtIndexAsFileSpec(NULL, idx); |
| } |
| |
| const char * |
| TargetProperties::GetExpressionPrefixContentsAsCString () |
| { |
| const uint32_t idx = ePropertyExprPrefix; |
| OptionValueFileSpec *file = m_collection_sp->GetPropertyAtIndexAsOptionValueFileSpec (NULL, false, idx); |
| if (file) |
| { |
| const bool null_terminate = true; |
| DataBufferSP data_sp(file->GetFileContents(null_terminate)); |
| if (data_sp) |
| return (const char *) data_sp->GetBytes(); |
| } |
| return NULL; |
| } |
| |
| void |
| TargetProperties::SetStandardErrorPath (const char *p) |
| { |
| const uint32_t idx = ePropertyErrorPath; |
| m_collection_sp->SetPropertyAtIndexAsString (NULL, idx, p); |
| } |
| |
| bool |
| TargetProperties::GetBreakpointsConsultPlatformAvoidList () |
| { |
| const uint32_t idx = ePropertyBreakpointUseAvoidList; |
| return m_collection_sp->GetPropertyAtIndexAsBoolean (NULL, idx, g_properties[idx].default_uint_value != 0); |
| } |
| |
| bool |
| TargetProperties::GetUseFastStepping () const |
| { |
| const uint32_t idx = ePropertyUseFastStepping; |
| return m_collection_sp->GetPropertyAtIndexAsBoolean (NULL, idx, g_properties[idx].default_uint_value != 0); |
| } |
| |
| LoadScriptFromSymFile |
| TargetProperties::GetLoadScriptFromSymbolFile () const |
| { |
| const uint32_t idx = ePropertyLoadScriptFromSymbolFile; |
| return (LoadScriptFromSymFile)m_collection_sp->GetPropertyAtIndexAsEnumeration(NULL, idx, g_properties[idx].default_uint_value); |
| } |
| |
| const TargetPropertiesSP & |
| Target::GetGlobalProperties() |
| { |
| static TargetPropertiesSP g_settings_sp; |
| if (!g_settings_sp) |
| { |
| g_settings_sp.reset (new TargetProperties (NULL)); |
| } |
| return g_settings_sp; |
| } |
| |
| const ConstString & |
| Target::TargetEventData::GetFlavorString () |
| { |
| static ConstString g_flavor ("Target::TargetEventData"); |
| return g_flavor; |
| } |
| |
| const ConstString & |
| Target::TargetEventData::GetFlavor () const |
| { |
| return TargetEventData::GetFlavorString (); |
| } |
| |
| Target::TargetEventData::TargetEventData (const lldb::TargetSP &new_target_sp) : |
| EventData(), |
| m_target_sp (new_target_sp) |
| { |
| } |
| |
| Target::TargetEventData::~TargetEventData() |
| { |
| |
| } |
| |
| void |
| Target::TargetEventData::Dump (Stream *s) const |
| { |
| |
| } |
| |
| const TargetSP |
| Target::TargetEventData::GetTargetFromEvent (const lldb::EventSP &event_sp) |
| { |
| TargetSP target_sp; |
| |
| const TargetEventData *data = GetEventDataFromEvent (event_sp.get()); |
| if (data) |
| target_sp = data->m_target_sp; |
| |
| return target_sp; |
| } |
| |
| const Target::TargetEventData * |
| Target::TargetEventData::GetEventDataFromEvent (const Event *event_ptr) |
| { |
| if (event_ptr) |
| { |
| const EventData *event_data = event_ptr->GetData(); |
| if (event_data && event_data->GetFlavor() == TargetEventData::GetFlavorString()) |
| return static_cast <const TargetEventData *> (event_ptr->GetData()); |
| } |
| return NULL; |
| } |
| |