blob: c4f20d7d46565ebbe8e60e739fc341b5ac9f644a [file] [log] [blame]
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001//===-- Process.cpp ---------------------------------------------*- C++ -*-===//
2//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9
Eugene Zelenko8f30a652015-10-23 18:39:37 +000010// C Includes
11// C++ Includes
Greg Clayton5cc45e02016-02-26 19:41:49 +000012#include <atomic>
Greg Clayton04df8ee2016-02-26 19:38:18 +000013#include <mutex>
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +000014
Eugene Zelenko8f30a652015-10-23 18:39:37 +000015// Other libraries and framework includes
16// Project includes
Sean Callanan579e70c2016-03-19 00:03:59 +000017#include "Plugins/Process/Utility/InferiorCallPOSIX.h"
Chris Lattner30fdc8d2010-06-08 16:52:24 +000018#include "lldb/Breakpoint/BreakpointLocation.h"
Sean Callanan579e70c2016-03-19 00:03:59 +000019#include "lldb/Breakpoint/StoppointCallbackContext.h"
Chris Lattner30fdc8d2010-06-08 16:52:24 +000020#include "lldb/Core/Debugger.h"
Sean Callanan579e70c2016-03-19 00:03:59 +000021#include "lldb/Core/Event.h"
Chris Lattner30fdc8d2010-06-08 16:52:24 +000022#include "lldb/Core/Log.h"
Greg Clayton1f746072012-08-29 21:13:06 +000023#include "lldb/Core/Module.h"
Tamas Berghammer7cb18bf2015-03-24 11:15:23 +000024#include "lldb/Core/ModuleSpec.h"
Chris Lattner30fdc8d2010-06-08 16:52:24 +000025#include "lldb/Core/PluginManager.h"
26#include "lldb/Core/State.h"
Greg Clayton44d93782014-01-27 23:43:24 +000027#include "lldb/Core/StreamFile.h"
Sean Callanan579e70c2016-03-19 00:03:59 +000028#include "lldb/Expression/DiagnosticManager.h"
Zachary Turner93749ab2015-03-03 21:51:25 +000029#include "lldb/Expression/IRDynamicChecks.h"
Sean Callanan579e70c2016-03-19 00:03:59 +000030#include "lldb/Expression/UserExpression.h"
Zachary Turner93a66fc2014-10-06 21:22:36 +000031#include "lldb/Host/ConnectionFileDescriptor.h"
Zachary Turner4eff2d32015-10-14 21:37:36 +000032#include "lldb/Host/FileSystem.h"
Chris Lattner30fdc8d2010-06-08 16:52:24 +000033#include "lldb/Host/Host.h"
Zachary Turner39de3112014-09-09 20:54:56 +000034#include "lldb/Host/HostInfo.h"
Greg Clayton100eb932014-07-02 21:10:39 +000035#include "lldb/Host/Pipe.h"
Greg Clayton44d93782014-01-27 23:43:24 +000036#include "lldb/Host/Terminal.h"
Zachary Turner39de3112014-09-09 20:54:56 +000037#include "lldb/Host/ThreadLauncher.h"
Zachary Turner93a66fc2014-10-06 21:22:36 +000038#include "lldb/Interpreter/CommandInterpreter.h"
Zachary Turner633a29c2015-03-04 01:58:01 +000039#include "lldb/Interpreter/OptionValueProperties.h"
Jason Molenda484900b2015-08-10 07:55:25 +000040#include "lldb/Symbol/Function.h"
Zachary Turner93a66fc2014-10-06 21:22:36 +000041#include "lldb/Symbol/Symbol.h"
Chris Lattner30fdc8d2010-06-08 16:52:24 +000042#include "lldb/Target/ABI.h"
Sean Callanan579e70c2016-03-19 00:03:59 +000043#include "lldb/Target/CPPLanguageRuntime.h"
Greg Clayton8f343b02010-11-04 01:54:29 +000044#include "lldb/Target/DynamicLoader.h"
Zachary Turner93749ab2015-03-03 21:51:25 +000045#include "lldb/Target/InstrumentationRuntime.h"
Andrew MacPherson17220c12014-03-05 10:12:43 +000046#include "lldb/Target/JITLoader.h"
Zachary Turner93749ab2015-03-03 21:51:25 +000047#include "lldb/Target/JITLoaderList.h"
Sean Callanan579e70c2016-03-19 00:03:59 +000048#include "lldb/Target/LanguageRuntime.h"
Kuba Breckaa51ea382014-09-06 01:33:13 +000049#include "lldb/Target/MemoryHistory.h"
Zachary Turner93749ab2015-03-03 21:51:25 +000050#include "lldb/Target/MemoryRegionInfo.h"
Jim Ingham22777012010-09-23 02:01:19 +000051#include "lldb/Target/ObjCLanguageRuntime.h"
Sean Callanan579e70c2016-03-19 00:03:59 +000052#include "lldb/Target/OperatingSystem.h"
Greg Claytone996fd32011-03-08 22:40:15 +000053#include "lldb/Target/Platform.h"
Sean Callanan579e70c2016-03-19 00:03:59 +000054#include "lldb/Target/Process.h"
Chris Lattner30fdc8d2010-06-08 16:52:24 +000055#include "lldb/Target/RegisterContext.h"
Greg Claytonf4b47e12010-08-04 01:40:35 +000056#include "lldb/Target/StopInfo.h"
Todd Fiala75930012016-08-19 04:21:48 +000057#include "lldb/Target/StructuredDataPlugin.h"
Jason Molendaeef51062013-11-05 03:57:19 +000058#include "lldb/Target/SystemRuntime.h"
Chris Lattner30fdc8d2010-06-08 16:52:24 +000059#include "lldb/Target/Target.h"
60#include "lldb/Target/TargetList.h"
61#include "lldb/Target/Thread.h"
62#include "lldb/Target/ThreadPlan.h"
Jim Ingham076b3042012-04-10 01:21:57 +000063#include "lldb/Target/ThreadPlanBase.h"
Zachary Turner93749ab2015-03-03 21:51:25 +000064#include "lldb/Target/UnixSignals.h"
Zachary Turner50232572015-03-18 21:31:45 +000065#include "lldb/Utility/NameMatches.h"
Greg Claytonee1f5782016-08-10 22:43:48 +000066#include "lldb/Utility/SelectHelper.h"
Chris Lattner30fdc8d2010-06-08 16:52:24 +000067
68using namespace lldb;
69using namespace lldb_private;
70
Greg Clayton67cc0632012-08-22 17:17:09 +000071// Comment out line below to disable memory caching, overriding the process setting
72// target.process.disable-memory-cache
73#define ENABLE_MEMORY_CACHING
74
75#ifdef ENABLE_MEMORY_CACHING
76#define DISABLE_MEM_CACHE_DEFAULT false
77#else
78#define DISABLE_MEM_CACHE_DEFAULT true
79#endif
80
81class ProcessOptionValueProperties : public OptionValueProperties
82{
83public:
84 ProcessOptionValueProperties (const ConstString &name) :
85 OptionValueProperties (name)
86 {
87 }
88
89 // This constructor is used when creating ProcessOptionValueProperties when it
90 // is part of a new lldb_private::Process instance. It will copy all current
91 // global property values as needed
92 ProcessOptionValueProperties (ProcessProperties *global_properties) :
93 OptionValueProperties(*global_properties->GetValueProperties())
94 {
95 }
96
Eugene Zelenko8f30a652015-10-23 18:39:37 +000097 const Property *
98 GetPropertyAtIndex(const ExecutionContext *exe_ctx, bool will_modify, uint32_t idx) const override
Greg Clayton67cc0632012-08-22 17:17:09 +000099 {
Bruce Mitchenerd93c4a32014-07-01 21:22:11 +0000100 // When getting the value for a key from the process options, we will always
Greg Clayton67cc0632012-08-22 17:17:09 +0000101 // try and grab the setting from the current process if there is one. Else we just
102 // use the one from this instance.
103 if (exe_ctx)
104 {
105 Process *process = exe_ctx->GetProcessPtr();
106 if (process)
107 {
108 ProcessOptionValueProperties *instance_properties = static_cast<ProcessOptionValueProperties *>(process->GetValueProperties().get());
109 if (this != instance_properties)
110 return instance_properties->ProtectedGetPropertyAtIndex (idx);
111 }
112 }
113 return ProtectedGetPropertyAtIndex (idx);
114 }
115};
116
117static PropertyDefinition
118g_properties[] =
119{
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +0000120 { "disable-memory-cache" , OptionValue::eTypeBoolean, false, DISABLE_MEM_CACHE_DEFAULT, nullptr, nullptr, "Disable reading and caching of memory in fixed-size units." },
121 { "extra-startup-command", OptionValue::eTypeArray , false, OptionValue::eTypeString, nullptr, nullptr, "A list containing extra commands understood by the particular process plugin used. "
Jim Ingham8c3f2762012-11-29 00:41:12 +0000122 "For instance, to turn on debugserver logging set this to \"QSetLogging:bitmask=LOG_DEFAULT;\"" },
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +0000123 { "ignore-breakpoints-in-expressions", OptionValue::eTypeBoolean, true, true, nullptr, nullptr, "If true, breakpoints will be ignored during expression evaluation." },
124 { "unwind-on-error-in-expressions", OptionValue::eTypeBoolean, true, true, nullptr, nullptr, "If true, errors in expression evaluation will unwind the stack back to the state before the call." },
125 { "python-os-plugin-path", OptionValue::eTypeFileSpec, false, true, nullptr, nullptr, "A path to a python OS plug-in module file that contains a OperatingSystemPlugIn class." },
126 { "stop-on-sharedlibrary-events" , OptionValue::eTypeBoolean, true, false, nullptr, nullptr, "If true, stop when a shared library is loaded or unloaded." },
127 { "detach-keeps-stopped" , OptionValue::eTypeBoolean, true, false, nullptr, nullptr, "If true, detach will attempt to keep the process stopped." },
128 { "memory-cache-line-size" , OptionValue::eTypeUInt64, false, 512, nullptr, nullptr, "The memory cache line size" },
129 { "optimization-warnings" , OptionValue::eTypeBoolean, false, true, nullptr, nullptr, "If true, warn when stopped in code that is optimized where stepping and variable availability may not behave as expected." },
130 { nullptr , OptionValue::eTypeInvalid, false, 0, nullptr, nullptr, nullptr }
Greg Clayton67cc0632012-08-22 17:17:09 +0000131};
132
133enum {
134 ePropertyDisableMemCache,
Greg Claytonc9d645d2012-10-18 22:40:37 +0000135 ePropertyExtraStartCommand,
Jim Ingham184e9812013-01-15 02:47:48 +0000136 ePropertyIgnoreBreakpointsInExpressions,
137 ePropertyUnwindOnErrorInExpressions,
Jim Ingham29950772013-01-26 02:19:28 +0000138 ePropertyPythonOSPluginPath,
Jim Inghamacff8952013-05-02 00:27:30 +0000139 ePropertyStopOnSharedLibraryEvents,
Jason Molendaf0340c92014-09-03 22:30:54 +0000140 ePropertyDetachKeepsStopped,
Jason Molendaef7d6412015-08-06 03:27:10 +0000141 ePropertyMemCacheLineSize,
142 ePropertyWarningOptimization
Greg Clayton67cc0632012-08-22 17:17:09 +0000143};
144
Greg Clayton332e8b12015-01-13 21:13:08 +0000145ProcessProperties::ProcessProperties (lldb_private::Process *process) :
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +0000146 Properties(),
147 m_process(process) // Can be nullptr for global ProcessProperties
Greg Clayton67cc0632012-08-22 17:17:09 +0000148{
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +0000149 if (process == nullptr)
Greg Clayton67cc0632012-08-22 17:17:09 +0000150 {
Greg Clayton332e8b12015-01-13 21:13:08 +0000151 // Global process properties, set them up one time
Greg Clayton67cc0632012-08-22 17:17:09 +0000152 m_collection_sp.reset (new ProcessOptionValueProperties(ConstString("process")));
153 m_collection_sp->Initialize(g_properties);
154 m_collection_sp->AppendProperty(ConstString("thread"),
Jim Ingham29950772013-01-26 02:19:28 +0000155 ConstString("Settings specific to threads."),
Greg Clayton67cc0632012-08-22 17:17:09 +0000156 true,
157 Thread::GetGlobalProperties()->GetValueProperties());
158 }
159 else
Greg Clayton332e8b12015-01-13 21:13:08 +0000160 {
Greg Clayton67cc0632012-08-22 17:17:09 +0000161 m_collection_sp.reset (new ProcessOptionValueProperties(Process::GetGlobalProperties().get()));
Greg Clayton332e8b12015-01-13 21:13:08 +0000162 m_collection_sp->SetValueChangedCallback(ePropertyPythonOSPluginPath, ProcessProperties::OptionValueChangedCallback, this);
163 }
Greg Clayton67cc0632012-08-22 17:17:09 +0000164}
165
Eugene Zelenko8f30a652015-10-23 18:39:37 +0000166ProcessProperties::~ProcessProperties() = default;
Greg Clayton67cc0632012-08-22 17:17:09 +0000167
Greg Clayton332e8b12015-01-13 21:13:08 +0000168void
169ProcessProperties::OptionValueChangedCallback (void *baton, OptionValue *option_value)
170{
171 ProcessProperties *properties = (ProcessProperties *)baton;
172 if (properties->m_process)
173 properties->m_process->LoadOperatingSystemPlugin(true);
174}
175
Greg Clayton67cc0632012-08-22 17:17:09 +0000176bool
177ProcessProperties::GetDisableMemoryCache() const
178{
179 const uint32_t idx = ePropertyDisableMemCache;
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +0000180 return m_collection_sp->GetPropertyAtIndexAsBoolean(nullptr, idx, g_properties[idx].default_uint_value != 0);
Greg Clayton67cc0632012-08-22 17:17:09 +0000181}
182
Jason Molendaf0340c92014-09-03 22:30:54 +0000183uint64_t
184ProcessProperties::GetMemoryCacheLineSize() const
185{
186 const uint32_t idx = ePropertyMemCacheLineSize;
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +0000187 return m_collection_sp->GetPropertyAtIndexAsUInt64(nullptr, idx, g_properties[idx].default_uint_value);
Jason Molendaf0340c92014-09-03 22:30:54 +0000188}
189
Greg Clayton67cc0632012-08-22 17:17:09 +0000190Args
191ProcessProperties::GetExtraStartupCommands () const
192{
193 Args args;
194 const uint32_t idx = ePropertyExtraStartCommand;
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +0000195 m_collection_sp->GetPropertyAtIndexAsArgs(nullptr, idx, args);
Greg Clayton67cc0632012-08-22 17:17:09 +0000196 return args;
197}
198
199void
200ProcessProperties::SetExtraStartupCommands (const Args &args)
201{
202 const uint32_t idx = ePropertyExtraStartCommand;
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +0000203 m_collection_sp->SetPropertyAtIndexFromArgs(nullptr, idx, args);
Greg Clayton67cc0632012-08-22 17:17:09 +0000204}
205
Greg Claytonc9d645d2012-10-18 22:40:37 +0000206FileSpec
207ProcessProperties::GetPythonOSPluginPath () const
208{
209 const uint32_t idx = ePropertyPythonOSPluginPath;
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +0000210 return m_collection_sp->GetPropertyAtIndexAsFileSpec(nullptr, idx);
Greg Claytonc9d645d2012-10-18 22:40:37 +0000211}
212
213void
214ProcessProperties::SetPythonOSPluginPath (const FileSpec &file)
215{
216 const uint32_t idx = ePropertyPythonOSPluginPath;
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +0000217 m_collection_sp->SetPropertyAtIndexAsFileSpec(nullptr, idx, file);
Greg Claytonc9d645d2012-10-18 22:40:37 +0000218}
219
Jim Ingham184e9812013-01-15 02:47:48 +0000220bool
221ProcessProperties::GetIgnoreBreakpointsInExpressions () const
222{
223 const uint32_t idx = ePropertyIgnoreBreakpointsInExpressions;
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +0000224 return m_collection_sp->GetPropertyAtIndexAsBoolean(nullptr, idx, g_properties[idx].default_uint_value != 0);
Jim Ingham184e9812013-01-15 02:47:48 +0000225}
226
227void
228ProcessProperties::SetIgnoreBreakpointsInExpressions (bool ignore)
229{
230 const uint32_t idx = ePropertyIgnoreBreakpointsInExpressions;
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +0000231 m_collection_sp->SetPropertyAtIndexAsBoolean(nullptr, idx, ignore);
Jim Ingham184e9812013-01-15 02:47:48 +0000232}
233
234bool
235ProcessProperties::GetUnwindOnErrorInExpressions () const
236{
237 const uint32_t idx = ePropertyUnwindOnErrorInExpressions;
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +0000238 return m_collection_sp->GetPropertyAtIndexAsBoolean(nullptr, idx, g_properties[idx].default_uint_value != 0);
Jim Ingham184e9812013-01-15 02:47:48 +0000239}
240
241void
242ProcessProperties::SetUnwindOnErrorInExpressions (bool ignore)
243{
244 const uint32_t idx = ePropertyUnwindOnErrorInExpressions;
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +0000245 m_collection_sp->SetPropertyAtIndexAsBoolean(nullptr, idx, ignore);
Jim Ingham184e9812013-01-15 02:47:48 +0000246}
247
Jim Ingham29950772013-01-26 02:19:28 +0000248bool
249ProcessProperties::GetStopOnSharedLibraryEvents () const
250{
251 const uint32_t idx = ePropertyStopOnSharedLibraryEvents;
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +0000252 return m_collection_sp->GetPropertyAtIndexAsBoolean(nullptr, idx, g_properties[idx].default_uint_value != 0);
Jim Ingham29950772013-01-26 02:19:28 +0000253}
254
255void
256ProcessProperties::SetStopOnSharedLibraryEvents (bool stop)
257{
258 const uint32_t idx = ePropertyStopOnSharedLibraryEvents;
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +0000259 m_collection_sp->SetPropertyAtIndexAsBoolean(nullptr, idx, stop);
Jim Ingham29950772013-01-26 02:19:28 +0000260}
261
Jim Inghamacff8952013-05-02 00:27:30 +0000262bool
263ProcessProperties::GetDetachKeepsStopped () const
264{
265 const uint32_t idx = ePropertyDetachKeepsStopped;
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +0000266 return m_collection_sp->GetPropertyAtIndexAsBoolean(nullptr, idx, g_properties[idx].default_uint_value != 0);
Jim Inghamacff8952013-05-02 00:27:30 +0000267}
268
269void
270ProcessProperties::SetDetachKeepsStopped (bool stop)
271{
272 const uint32_t idx = ePropertyDetachKeepsStopped;
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +0000273 m_collection_sp->SetPropertyAtIndexAsBoolean(nullptr, idx, stop);
Jim Inghamacff8952013-05-02 00:27:30 +0000274}
275
Jason Molendaef7d6412015-08-06 03:27:10 +0000276bool
277ProcessProperties::GetWarningsOptimization () const
278{
279 const uint32_t idx = ePropertyWarningOptimization;
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +0000280 return m_collection_sp->GetPropertyAtIndexAsBoolean(nullptr, idx, g_properties[idx].default_uint_value != 0);
Jason Molendaef7d6412015-08-06 03:27:10 +0000281}
282
Greg Clayton32e0a752011-03-30 18:16:51 +0000283void
Greg Clayton8b82f082011-04-12 05:54:46 +0000284ProcessInstanceInfo::Dump (Stream &s, Platform *platform) const
Greg Clayton32e0a752011-03-30 18:16:51 +0000285{
286 const char *cstr;
Greg Clayton95bf0fd2011-04-01 00:29:43 +0000287 if (m_pid != LLDB_INVALID_PROCESS_ID)
Daniel Malead01b2952012-11-29 21:49:15 +0000288 s.Printf (" pid = %" PRIu64 "\n", m_pid);
Greg Clayton95bf0fd2011-04-01 00:29:43 +0000289
290 if (m_parent_pid != LLDB_INVALID_PROCESS_ID)
Daniel Malead01b2952012-11-29 21:49:15 +0000291 s.Printf (" parent = %" PRIu64 "\n", m_parent_pid);
Greg Clayton95bf0fd2011-04-01 00:29:43 +0000292
293 if (m_executable)
294 {
295 s.Printf (" name = %s\n", m_executable.GetFilename().GetCString());
296 s.PutCString (" file = ");
297 m_executable.Dump(&s);
298 s.EOL();
299 }
Greg Clayton8b82f082011-04-12 05:54:46 +0000300 const uint32_t argc = m_arguments.GetArgumentCount();
Greg Clayton95bf0fd2011-04-01 00:29:43 +0000301 if (argc > 0)
302 {
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +0000303 for (uint32_t i = 0; i < argc; i++)
Greg Clayton95bf0fd2011-04-01 00:29:43 +0000304 {
Greg Clayton8b82f082011-04-12 05:54:46 +0000305 const char *arg = m_arguments.GetArgumentAtIndex(i);
Greg Clayton95bf0fd2011-04-01 00:29:43 +0000306 if (i < 10)
Greg Clayton8b82f082011-04-12 05:54:46 +0000307 s.Printf (" arg[%u] = %s\n", i, arg);
Greg Clayton95bf0fd2011-04-01 00:29:43 +0000308 else
Greg Clayton8b82f082011-04-12 05:54:46 +0000309 s.Printf ("arg[%u] = %s\n", i, arg);
Greg Clayton95bf0fd2011-04-01 00:29:43 +0000310 }
311 }
Greg Clayton8b82f082011-04-12 05:54:46 +0000312
313 const uint32_t envc = m_environment.GetArgumentCount();
314 if (envc > 0)
315 {
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +0000316 for (uint32_t i = 0; i < envc; i++)
Greg Clayton8b82f082011-04-12 05:54:46 +0000317 {
318 const char *env = m_environment.GetArgumentAtIndex(i);
319 if (i < 10)
320 s.Printf (" env[%u] = %s\n", i, env);
321 else
322 s.Printf ("env[%u] = %s\n", i, env);
323 }
324 }
325
Todd Fiala7df337f2015-10-13 23:41:19 +0000326 if (m_arch.IsValid())
327 {
328 s.Printf (" arch = ");
329 m_arch.DumpTriple(s);
330 s.EOL();
331 }
Greg Clayton95bf0fd2011-04-01 00:29:43 +0000332
Greg Clayton8b82f082011-04-12 05:54:46 +0000333 if (m_uid != UINT32_MAX)
Greg Clayton32e0a752011-03-30 18:16:51 +0000334 {
Greg Clayton8b82f082011-04-12 05:54:46 +0000335 cstr = platform->GetUserName (m_uid);
336 s.Printf (" uid = %-5u (%s)\n", m_uid, cstr ? cstr : "");
Greg Clayton32e0a752011-03-30 18:16:51 +0000337 }
Greg Clayton8b82f082011-04-12 05:54:46 +0000338 if (m_gid != UINT32_MAX)
Greg Clayton32e0a752011-03-30 18:16:51 +0000339 {
Greg Clayton8b82f082011-04-12 05:54:46 +0000340 cstr = platform->GetGroupName (m_gid);
341 s.Printf (" gid = %-5u (%s)\n", m_gid, cstr ? cstr : "");
Greg Clayton32e0a752011-03-30 18:16:51 +0000342 }
Greg Clayton8b82f082011-04-12 05:54:46 +0000343 if (m_euid != UINT32_MAX)
Greg Clayton32e0a752011-03-30 18:16:51 +0000344 {
Greg Clayton8b82f082011-04-12 05:54:46 +0000345 cstr = platform->GetUserName (m_euid);
346 s.Printf (" euid = %-5u (%s)\n", m_euid, cstr ? cstr : "");
Greg Clayton32e0a752011-03-30 18:16:51 +0000347 }
Greg Clayton8b82f082011-04-12 05:54:46 +0000348 if (m_egid != UINT32_MAX)
Greg Clayton32e0a752011-03-30 18:16:51 +0000349 {
Greg Clayton8b82f082011-04-12 05:54:46 +0000350 cstr = platform->GetGroupName (m_egid);
351 s.Printf (" egid = %-5u (%s)\n", m_egid, cstr ? cstr : "");
Greg Clayton32e0a752011-03-30 18:16:51 +0000352 }
353}
354
355void
Greg Clayton8b82f082011-04-12 05:54:46 +0000356ProcessInstanceInfo::DumpTableHeader (Stream &s, Platform *platform, bool show_args, bool verbose)
Greg Clayton32e0a752011-03-30 18:16:51 +0000357{
Greg Clayton8b82f082011-04-12 05:54:46 +0000358 const char *label;
359 if (show_args || verbose)
360 label = "ARGUMENTS";
361 else
362 label = "NAME";
363
Greg Clayton95bf0fd2011-04-01 00:29:43 +0000364 if (verbose)
365 {
Greg Clayton8b82f082011-04-12 05:54:46 +0000366 s.Printf ("PID PARENT USER GROUP EFF USER EFF GROUP TRIPLE %s\n", label);
Greg Clayton95bf0fd2011-04-01 00:29:43 +0000367 s.PutCString ("====== ====== ========== ========== ========== ========== ======================== ============================\n");
368 }
369 else
370 {
Jim Ingham368ac222014-08-15 17:05:27 +0000371 s.Printf ("PID PARENT USER TRIPLE %s\n", label);
372 s.PutCString ("====== ====== ========== ======================== ============================\n");
Greg Clayton95bf0fd2011-04-01 00:29:43 +0000373 }
Greg Clayton32e0a752011-03-30 18:16:51 +0000374}
375
376void
Greg Clayton8b82f082011-04-12 05:54:46 +0000377ProcessInstanceInfo::DumpAsTableRow (Stream &s, Platform *platform, bool show_args, bool verbose) const
Greg Clayton32e0a752011-03-30 18:16:51 +0000378{
379 if (m_pid != LLDB_INVALID_PROCESS_ID)
380 {
381 const char *cstr;
Daniel Malead01b2952012-11-29 21:49:15 +0000382 s.Printf ("%-6" PRIu64 " %-6" PRIu64 " ", m_pid, m_parent_pid);
Greg Clayton32e0a752011-03-30 18:16:51 +0000383
Todd Fiala7df337f2015-10-13 23:41:19 +0000384 StreamString arch_strm;
385 if (m_arch.IsValid())
386 m_arch.DumpTriple(arch_strm);
387
Greg Clayton95bf0fd2011-04-01 00:29:43 +0000388 if (verbose)
389 {
Greg Clayton8b82f082011-04-12 05:54:46 +0000390 cstr = platform->GetUserName (m_uid);
Greg Clayton95bf0fd2011-04-01 00:29:43 +0000391 if (cstr && cstr[0]) // Watch for empty string that indicates lookup failed
392 s.Printf ("%-10s ", cstr);
393 else
Greg Clayton8b82f082011-04-12 05:54:46 +0000394 s.Printf ("%-10u ", m_uid);
Greg Clayton32e0a752011-03-30 18:16:51 +0000395
Greg Clayton8b82f082011-04-12 05:54:46 +0000396 cstr = platform->GetGroupName (m_gid);
Greg Clayton95bf0fd2011-04-01 00:29:43 +0000397 if (cstr && cstr[0]) // Watch for empty string that indicates lookup failed
398 s.Printf ("%-10s ", cstr);
399 else
Greg Clayton8b82f082011-04-12 05:54:46 +0000400 s.Printf ("%-10u ", m_gid);
Greg Clayton32e0a752011-03-30 18:16:51 +0000401
Greg Clayton8b82f082011-04-12 05:54:46 +0000402 cstr = platform->GetUserName (m_euid);
Greg Clayton95bf0fd2011-04-01 00:29:43 +0000403 if (cstr && cstr[0]) // Watch for empty string that indicates lookup failed
404 s.Printf ("%-10s ", cstr);
405 else
Greg Clayton8b82f082011-04-12 05:54:46 +0000406 s.Printf ("%-10u ", m_euid);
Greg Clayton95bf0fd2011-04-01 00:29:43 +0000407
Greg Clayton8b82f082011-04-12 05:54:46 +0000408 cstr = platform->GetGroupName (m_egid);
Greg Clayton95bf0fd2011-04-01 00:29:43 +0000409 if (cstr && cstr[0]) // Watch for empty string that indicates lookup failed
410 s.Printf ("%-10s ", cstr);
411 else
Greg Clayton8b82f082011-04-12 05:54:46 +0000412 s.Printf ("%-10u ", m_egid);
Todd Fiala7df337f2015-10-13 23:41:19 +0000413
414 s.Printf ("%-24s ", arch_strm.GetString().c_str());
Greg Clayton95bf0fd2011-04-01 00:29:43 +0000415 }
416 else
417 {
Jim Ingham368ac222014-08-15 17:05:27 +0000418 s.Printf ("%-10s %-24s ",
Greg Clayton8b82f082011-04-12 05:54:46 +0000419 platform->GetUserName (m_euid),
Todd Fiala7df337f2015-10-13 23:41:19 +0000420 arch_strm.GetString().c_str());
Greg Clayton95bf0fd2011-04-01 00:29:43 +0000421 }
422
Greg Clayton8b82f082011-04-12 05:54:46 +0000423 if (verbose || show_args)
Greg Clayton95bf0fd2011-04-01 00:29:43 +0000424 {
Greg Clayton8b82f082011-04-12 05:54:46 +0000425 const uint32_t argc = m_arguments.GetArgumentCount();
Greg Clayton95bf0fd2011-04-01 00:29:43 +0000426 if (argc > 0)
427 {
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +0000428 for (uint32_t i = 0; i < argc; i++)
Greg Clayton95bf0fd2011-04-01 00:29:43 +0000429 {
430 if (i > 0)
431 s.PutChar (' ');
Greg Clayton8b82f082011-04-12 05:54:46 +0000432 s.PutCString (m_arguments.GetArgumentAtIndex(i));
Greg Clayton95bf0fd2011-04-01 00:29:43 +0000433 }
434 }
435 }
436 else
437 {
438 s.PutCString (GetName());
439 }
440
441 s.EOL();
Greg Clayton32e0a752011-03-30 18:16:51 +0000442 }
443}
444
Greg Clayton8b82f082011-04-12 05:54:46 +0000445Error
Todd Fialae1cfbc72016-08-11 23:51:28 +0000446ProcessLaunchCommandOptions::SetOptionValue(uint32_t option_idx,
447 const char *option_arg,
448 ExecutionContext *execution_context)
Greg Clayton8b82f082011-04-12 05:54:46 +0000449{
450 Error error;
Greg Clayton3bcdfc02012-12-04 00:32:51 +0000451 const int short_option = m_getopt_table[option_idx].val;
Greg Clayton8b82f082011-04-12 05:54:46 +0000452
453 switch (short_option)
454 {
455 case 's': // Stop at program entry point
456 launch_info.GetFlags().Set (eLaunchFlagStopAtEntry);
457 break;
458
Greg Clayton8b82f082011-04-12 05:54:46 +0000459 case 'i': // STDIN for read only
Zachary Turnerc00cf4a2014-08-15 22:04:21 +0000460 {
461 FileAction action;
Chaoren Lind3173f32015-05-29 19:52:29 +0000462 if (action.Open(STDIN_FILENO, FileSpec{option_arg, false}, true, false))
Zachary Turnerc00cf4a2014-08-15 22:04:21 +0000463 launch_info.AppendFileAction (action);
Greg Clayton8b82f082011-04-12 05:54:46 +0000464 break;
Zachary Turnerc00cf4a2014-08-15 22:04:21 +0000465 }
Greg Clayton8b82f082011-04-12 05:54:46 +0000466
467 case 'o': // Open STDOUT for write only
Zachary Turnerc00cf4a2014-08-15 22:04:21 +0000468 {
469 FileAction action;
Chaoren Lind3173f32015-05-29 19:52:29 +0000470 if (action.Open(STDOUT_FILENO, FileSpec{option_arg, false}, false, true))
Zachary Turnerc00cf4a2014-08-15 22:04:21 +0000471 launch_info.AppendFileAction (action);
Greg Clayton9845a8d2012-03-06 04:01:04 +0000472 break;
Zachary Turnerc00cf4a2014-08-15 22:04:21 +0000473 }
Greg Clayton9845a8d2012-03-06 04:01:04 +0000474
475 case 'e': // STDERR for write only
Zachary Turnerc00cf4a2014-08-15 22:04:21 +0000476 {
477 FileAction action;
Chaoren Lind3173f32015-05-29 19:52:29 +0000478 if (action.Open(STDERR_FILENO, FileSpec{option_arg, false}, false, true))
Zachary Turnerc00cf4a2014-08-15 22:04:21 +0000479 launch_info.AppendFileAction (action);
Greg Clayton8b82f082011-04-12 05:54:46 +0000480 break;
Zachary Turnerc00cf4a2014-08-15 22:04:21 +0000481 }
Greg Clayton9845a8d2012-03-06 04:01:04 +0000482
Greg Clayton8b82f082011-04-12 05:54:46 +0000483 case 'p': // Process plug-in name
484 launch_info.SetProcessPluginName (option_arg);
485 break;
486
487 case 'n': // Disable STDIO
Zachary Turnerc00cf4a2014-08-15 22:04:21 +0000488 {
489 FileAction action;
Zachary Turner4eff2d32015-10-14 21:37:36 +0000490 const FileSpec dev_null{FileSystem::DEV_NULL, false};
Chaoren Lind3173f32015-05-29 19:52:29 +0000491 if (action.Open(STDIN_FILENO, dev_null, true, false))
Zachary Turnerc00cf4a2014-08-15 22:04:21 +0000492 launch_info.AppendFileAction (action);
Chaoren Lind3173f32015-05-29 19:52:29 +0000493 if (action.Open(STDOUT_FILENO, dev_null, false, true))
Zachary Turnerc00cf4a2014-08-15 22:04:21 +0000494 launch_info.AppendFileAction (action);
Chaoren Lind3173f32015-05-29 19:52:29 +0000495 if (action.Open(STDERR_FILENO, dev_null, false, true))
Zachary Turnerc00cf4a2014-08-15 22:04:21 +0000496 launch_info.AppendFileAction (action);
Greg Clayton8b82f082011-04-12 05:54:46 +0000497 break;
Zachary Turnerc00cf4a2014-08-15 22:04:21 +0000498 }
Greg Clayton8b82f082011-04-12 05:54:46 +0000499
500 case 'w':
Chaoren Lind3173f32015-05-29 19:52:29 +0000501 launch_info.SetWorkingDirectory(FileSpec{option_arg, false});
Greg Clayton8b82f082011-04-12 05:54:46 +0000502 break;
503
504 case 't': // Open process in new terminal window
505 launch_info.GetFlags().Set (eLaunchFlagLaunchInTTY);
506 break;
507
508 case 'a':
Todd Fialae1cfbc72016-08-11 23:51:28 +0000509 {
510 TargetSP target_sp = execution_context ?
511 execution_context->GetTargetSP() : TargetSP();
512 PlatformSP platform_sp = target_sp ?
513 target_sp->GetPlatform() : PlatformSP();
514 if (!launch_info.GetArchitecture().SetTriple (option_arg, platform_sp.get()))
515 launch_info.GetArchitecture().SetTriple (option_arg);
516 }
Greg Clayton8b82f082011-04-12 05:54:46 +0000517 break;
518
Todd Fiala51637922014-08-19 17:40:43 +0000519 case 'A': // Disable ASLR.
520 {
521 bool success;
522 const bool disable_aslr_arg = Args::StringToBoolean (option_arg, true, &success);
523 if (success)
524 disable_aslr = disable_aslr_arg ? eLazyBoolYes : eLazyBoolNo;
525 else
526 error.SetErrorStringWithFormat ("Invalid boolean value for disable-aslr option: '%s'", option_arg ? option_arg : "<null>");
Greg Clayton8b82f082011-04-12 05:54:46 +0000527 break;
Todd Fiala51637922014-08-19 17:40:43 +0000528 }
529
Enrico Granatab38ef8c2015-02-20 22:20:30 +0000530 case 'X': // shell expand args.
Enrico Granatad7a83a92015-02-10 03:06:24 +0000531 {
532 bool success;
Enrico Granatab38ef8c2015-02-20 22:20:30 +0000533 const bool expand_args = Args::StringToBoolean (option_arg, true, &success);
Enrico Granatad7a83a92015-02-10 03:06:24 +0000534 if (success)
Enrico Granatab38ef8c2015-02-20 22:20:30 +0000535 launch_info.SetShellExpandArguments(expand_args);
Enrico Granatad7a83a92015-02-10 03:06:24 +0000536 else
Enrico Granatab38ef8c2015-02-20 22:20:30 +0000537 error.SetErrorStringWithFormat ("Invalid boolean value for shell-expand-args option: '%s'", option_arg ? option_arg : "<null>");
Enrico Granatad7a83a92015-02-10 03:06:24 +0000538 break;
539 }
540
Todd Fiala51637922014-08-19 17:40:43 +0000541 case 'c':
Greg Clayton144f3a92011-11-15 03:53:30 +0000542 if (option_arg && option_arg[0])
Zachary Turner10687b02014-10-20 17:46:43 +0000543 launch_info.SetShell (FileSpec(option_arg, false));
Greg Clayton144f3a92011-11-15 03:53:30 +0000544 else
Zachary Turner10687b02014-10-20 17:46:43 +0000545 launch_info.SetShell (HostInfo::GetDefaultShell());
Greg Clayton982c9762011-11-03 21:22:33 +0000546 break;
547
Greg Clayton8b82f082011-04-12 05:54:46 +0000548 case 'v':
549 launch_info.GetEnvironmentEntries().AppendArgument(option_arg);
550 break;
551
552 default:
Greg Clayton86edbf42011-10-26 00:56:27 +0000553 error.SetErrorStringWithFormat("unrecognized short option character '%c'", short_option);
Greg Clayton8b82f082011-04-12 05:54:46 +0000554 break;
Greg Clayton8b82f082011-04-12 05:54:46 +0000555 }
556 return error;
557}
558
559OptionDefinition
560ProcessLaunchCommandOptions::g_option_table[] =
561{
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +0000562{ LLDB_OPT_SET_ALL, false, "stop-at-entry", 's', OptionParser::eNoArgument, nullptr, nullptr, 0, eArgTypeNone, "Stop at the entry point of the program when launching a process." },
563{ LLDB_OPT_SET_ALL, false, "disable-aslr", 'A', OptionParser::eRequiredArgument, nullptr, nullptr, 0, eArgTypeBoolean, "Set whether to disable address space layout randomization when launching a process." },
564{ LLDB_OPT_SET_ALL, false, "plugin", 'p', OptionParser::eRequiredArgument, nullptr, nullptr, 0, eArgTypePlugin, "Name of the process plugin you want to use." },
565{ LLDB_OPT_SET_ALL, false, "working-dir", 'w', OptionParser::eRequiredArgument, nullptr, nullptr, 0, eArgTypeDirectoryName, "Set the current working directory to <path> when running the inferior." },
566{ LLDB_OPT_SET_ALL, false, "arch", 'a', OptionParser::eRequiredArgument, nullptr, nullptr, 0, eArgTypeArchitecture, "Set the architecture for the process to launch when ambiguous." },
567{ LLDB_OPT_SET_ALL, false, "environment", 'v', OptionParser::eRequiredArgument, nullptr, nullptr, 0, eArgTypeNone, "Specify an environment variable name/value string (--environment NAME=VALUE). Can be specified multiple times for subsequent environment entries." },
568{ LLDB_OPT_SET_1|LLDB_OPT_SET_2|LLDB_OPT_SET_3, false, "shell", 'c', OptionParser::eOptionalArgument, nullptr, nullptr, 0, eArgTypeFilename, "Run the process in a shell (not supported on all platforms)." },
Greg Clayton8b82f082011-04-12 05:54:46 +0000569
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +0000570{ LLDB_OPT_SET_1 , false, "stdin", 'i', OptionParser::eRequiredArgument, nullptr, nullptr, 0, eArgTypeFilename, "Redirect stdin for the process to <filename>." },
571{ LLDB_OPT_SET_1 , false, "stdout", 'o', OptionParser::eRequiredArgument, nullptr, nullptr, 0, eArgTypeFilename, "Redirect stdout for the process to <filename>." },
572{ LLDB_OPT_SET_1 , false, "stderr", 'e', OptionParser::eRequiredArgument, nullptr, nullptr, 0, eArgTypeFilename, "Redirect stderr for the process to <filename>." },
Greg Clayton8b82f082011-04-12 05:54:46 +0000573
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +0000574{ LLDB_OPT_SET_2 , false, "tty", 't', OptionParser::eNoArgument, nullptr, nullptr, 0, eArgTypeNone, "Start the process in a terminal (not supported on all platforms)." },
Greg Clayton8b82f082011-04-12 05:54:46 +0000575
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +0000576{ LLDB_OPT_SET_3 , false, "no-stdio", 'n', OptionParser::eNoArgument, nullptr, nullptr, 0, eArgTypeNone, "Do not set up for terminal I/O to go to running process." },
577{ LLDB_OPT_SET_4, false, "shell-expand-args", 'X', OptionParser::eRequiredArgument, nullptr, nullptr, 0, eArgTypeBoolean, "Set whether to shell expand arguments to the process when launching." },
578{ 0 , false, nullptr, 0, 0, nullptr, nullptr, 0, eArgTypeNone, nullptr }
Greg Clayton8b82f082011-04-12 05:54:46 +0000579};
580
Greg Clayton8b82f082011-04-12 05:54:46 +0000581bool
582ProcessInstanceInfoMatch::NameMatches (const char *process_name) const
Greg Clayton32e0a752011-03-30 18:16:51 +0000583{
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +0000584 if (m_name_match_type == eNameMatchIgnore || process_name == nullptr)
Greg Clayton32e0a752011-03-30 18:16:51 +0000585 return true;
586 const char *match_name = m_match_info.GetName();
587 if (!match_name)
588 return true;
589
590 return lldb_private::NameMatches (process_name, m_name_match_type, match_name);
591}
592
593bool
Greg Clayton8b82f082011-04-12 05:54:46 +0000594ProcessInstanceInfoMatch::Matches (const ProcessInstanceInfo &proc_info) const
Greg Clayton32e0a752011-03-30 18:16:51 +0000595{
596 if (!NameMatches (proc_info.GetName()))
597 return false;
598
599 if (m_match_info.ProcessIDIsValid() &&
600 m_match_info.GetProcessID() != proc_info.GetProcessID())
601 return false;
602
603 if (m_match_info.ParentProcessIDIsValid() &&
604 m_match_info.GetParentProcessID() != proc_info.GetParentProcessID())
605 return false;
606
Greg Clayton8b82f082011-04-12 05:54:46 +0000607 if (m_match_info.UserIDIsValid () &&
608 m_match_info.GetUserID() != proc_info.GetUserID())
Greg Clayton32e0a752011-03-30 18:16:51 +0000609 return false;
610
Greg Clayton8b82f082011-04-12 05:54:46 +0000611 if (m_match_info.GroupIDIsValid () &&
612 m_match_info.GetGroupID() != proc_info.GetGroupID())
Greg Clayton32e0a752011-03-30 18:16:51 +0000613 return false;
614
615 if (m_match_info.EffectiveUserIDIsValid () &&
616 m_match_info.GetEffectiveUserID() != proc_info.GetEffectiveUserID())
617 return false;
618
619 if (m_match_info.EffectiveGroupIDIsValid () &&
620 m_match_info.GetEffectiveGroupID() != proc_info.GetEffectiveGroupID())
621 return false;
622
623 if (m_match_info.GetArchitecture().IsValid() &&
Sean Callananbf4b7be2012-12-13 22:07:14 +0000624 !m_match_info.GetArchitecture().IsCompatibleMatch(proc_info.GetArchitecture()))
Greg Clayton32e0a752011-03-30 18:16:51 +0000625 return false;
626 return true;
627}
628
629bool
Greg Clayton8b82f082011-04-12 05:54:46 +0000630ProcessInstanceInfoMatch::MatchAllProcesses () const
Greg Clayton32e0a752011-03-30 18:16:51 +0000631{
632 if (m_name_match_type != eNameMatchIgnore)
633 return false;
634
635 if (m_match_info.ProcessIDIsValid())
636 return false;
637
638 if (m_match_info.ParentProcessIDIsValid())
639 return false;
640
Greg Clayton8b82f082011-04-12 05:54:46 +0000641 if (m_match_info.UserIDIsValid ())
Greg Clayton32e0a752011-03-30 18:16:51 +0000642 return false;
643
Greg Clayton8b82f082011-04-12 05:54:46 +0000644 if (m_match_info.GroupIDIsValid ())
Greg Clayton32e0a752011-03-30 18:16:51 +0000645 return false;
646
647 if (m_match_info.EffectiveUserIDIsValid ())
648 return false;
649
650 if (m_match_info.EffectiveGroupIDIsValid ())
651 return false;
652
653 if (m_match_info.GetArchitecture().IsValid())
654 return false;
655
656 if (m_match_all_users)
657 return false;
658
659 return true;
Greg Clayton32e0a752011-03-30 18:16:51 +0000660}
661
662void
Greg Clayton8b82f082011-04-12 05:54:46 +0000663ProcessInstanceInfoMatch::Clear()
Greg Clayton32e0a752011-03-30 18:16:51 +0000664{
665 m_match_info.Clear();
666 m_name_match_type = eNameMatchIgnore;
667 m_match_all_users = false;
668}
Greg Clayton58be07b2011-01-07 06:08:19 +0000669
Greg Claytonc3776bf2012-02-09 06:16:32 +0000670ProcessSP
Jim Ingham583bbb12016-03-07 21:50:25 +0000671Process::FindPlugin (lldb::TargetSP target_sp, const char *plugin_name, ListenerSP listener_sp, const FileSpec *crash_file_path)
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000672{
Greg Clayton949e8222013-01-16 17:29:04 +0000673 static uint32_t g_process_unique_id = 0;
674
Greg Claytonc3776bf2012-02-09 06:16:32 +0000675 ProcessSP process_sp;
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +0000676 ProcessCreateInstance create_callback = nullptr;
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000677 if (plugin_name)
678 {
Greg Clayton57abc5d2013-05-10 21:47:16 +0000679 ConstString const_plugin_name(plugin_name);
680 create_callback = PluginManager::GetProcessCreateCallbackForPluginName (const_plugin_name);
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000681 if (create_callback)
682 {
Jim Ingham583bbb12016-03-07 21:50:25 +0000683 process_sp = create_callback(target_sp, listener_sp, crash_file_path);
Greg Claytonc3776bf2012-02-09 06:16:32 +0000684 if (process_sp)
685 {
Zachary Turner7529df92015-09-01 20:02:29 +0000686 if (process_sp->CanDebug(target_sp, true))
Greg Clayton949e8222013-01-16 17:29:04 +0000687 {
688 process_sp->m_process_unique_id = ++g_process_unique_id;
689 }
690 else
Greg Claytonc3776bf2012-02-09 06:16:32 +0000691 process_sp.reset();
692 }
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000693 }
694 }
695 else
696 {
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +0000697 for (uint32_t idx = 0; (create_callback = PluginManager::GetProcessCreateCallbackAtIndex(idx)) != nullptr; ++idx)
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000698 {
Jim Ingham583bbb12016-03-07 21:50:25 +0000699 process_sp = create_callback(target_sp, listener_sp, crash_file_path);
Greg Claytonc3776bf2012-02-09 06:16:32 +0000700 if (process_sp)
701 {
Zachary Turner7529df92015-09-01 20:02:29 +0000702 if (process_sp->CanDebug(target_sp, false))
Greg Clayton949e8222013-01-16 17:29:04 +0000703 {
704 process_sp->m_process_unique_id = ++g_process_unique_id;
Greg Claytonc3776bf2012-02-09 06:16:32 +0000705 break;
Greg Clayton949e8222013-01-16 17:29:04 +0000706 }
707 else
708 process_sp.reset();
Greg Claytonc3776bf2012-02-09 06:16:32 +0000709 }
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000710 }
711 }
Greg Claytonc3776bf2012-02-09 06:16:32 +0000712 return process_sp;
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000713}
714
Jim Ingham4bddaeb2012-02-16 06:50:00 +0000715ConstString &
716Process::GetStaticBroadcasterClass ()
717{
718 static ConstString class_name ("lldb.process");
719 return class_name;
720}
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000721
Jim Ingham583bbb12016-03-07 21:50:25 +0000722Process::Process(lldb::TargetSP target_sp, ListenerSP listener_sp) :
723 Process(target_sp, listener_sp, UnixSignals::Create(HostInfo::GetArchitecture()))
Todd Fiala4ceced32014-08-29 17:35:57 +0000724{
725 // This constructor just delegates to the full Process constructor,
726 // defaulting to using the Host's UnixSignals.
727}
728
Saleem Abdulrasoolbb19a132016-05-19 05:13:57 +0000729Process::Process(lldb::TargetSP target_sp, ListenerSP listener_sp, const UnixSignalsSP &unix_signals_sp)
730 : ProcessProperties(this),
731 UserID(LLDB_INVALID_PROCESS_ID),
732 Broadcaster((target_sp->GetDebugger().GetBroadcasterManager()), Process::GetStaticBroadcasterClass().AsCString()),
733 m_target_sp(target_sp),
734 m_public_state(eStateUnloaded),
735 m_private_state(eStateUnloaded),
736 m_private_state_broadcaster(nullptr, "lldb.process.internal_state_broadcaster"),
737 m_private_state_control_broadcaster(nullptr, "lldb.process.internal_state_control_broadcaster"),
738 m_private_state_listener_sp(Listener::MakeListener("lldb.process.internal_state_listener")),
739 m_mod_id(),
740 m_process_unique_id(0),
741 m_thread_index_id(0),
742 m_thread_id_to_index_id_map(),
743 m_exit_status(-1),
744 m_exit_string(),
745 m_exit_status_mutex(),
746 m_thread_mutex(),
747 m_thread_list_real(this),
748 m_thread_list(this),
749 m_extended_thread_list(this),
750 m_extended_thread_stop_id(0),
751 m_queue_list(this),
752 m_queue_list_stop_id(0),
753 m_notifications(),
754 m_image_tokens(),
755 m_listener_sp(listener_sp),
756 m_breakpoint_site_list(),
757 m_dynamic_checkers_ap(),
758 m_unix_signals_sp(unix_signals_sp),
759 m_abi_sp(),
760 m_process_input_reader(),
761 m_stdio_communication("process.stdio"),
762 m_stdio_communication_mutex(),
763 m_stdin_forward(false),
764 m_stdout_data(),
765 m_stderr_data(),
766 m_profile_data_comm_mutex(),
767 m_profile_data(),
768 m_iohandler_sync(0),
769 m_memory_cache(*this),
770 m_allocated_memory_cache(*this),
771 m_should_detach(false),
772 m_next_event_action_ap(),
773 m_public_run_lock(),
774 m_private_run_lock(),
775 m_stop_info_override_callback(nullptr),
776 m_finalizing(false),
777 m_finalize_called(false),
778 m_clear_thread_plans_on_stop(false),
779 m_force_next_event_delivery(false),
780 m_last_broadcast_state(eStateInvalid),
781 m_destroy_in_process(false),
782 m_can_interpret_function_calls(false),
783 m_warnings_issued(),
Jim Ingham3cc425832016-05-24 18:29:36 +0000784 m_run_thread_plan_lock(),
Saleem Abdulrasoolbb19a132016-05-19 05:13:57 +0000785 m_can_jit(eCanJITDontKnow)
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000786{
Saleem Abdulrasoolbb19a132016-05-19 05:13:57 +0000787 CheckInWithManager();
Caroline Tice1559a462010-09-27 00:30:10 +0000788
Saleem Abdulrasoolbb19a132016-05-19 05:13:57 +0000789 Log *log(lldb_private::GetLogIfAllCategoriesSet(LIBLLDB_LOG_OBJECT));
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000790 if (log)
Saleem Abdulrasoolbb19a132016-05-19 05:13:57 +0000791 log->Printf("%p Process::Process()", static_cast<void *>(this));
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000792
Todd Fiala4ceced32014-08-29 17:35:57 +0000793 if (!m_unix_signals_sp)
Chaoren Lin98d0a4b2015-07-14 01:09:28 +0000794 m_unix_signals_sp = std::make_shared<UnixSignals>();
Todd Fiala4ceced32014-08-29 17:35:57 +0000795
Saleem Abdulrasoolbb19a132016-05-19 05:13:57 +0000796 SetEventName(eBroadcastBitStateChanged, "state-changed");
797 SetEventName(eBroadcastBitInterrupt, "interrupt");
798 SetEventName(eBroadcastBitSTDOUT, "stdout-available");
799 SetEventName(eBroadcastBitSTDERR, "stderr-available");
800 SetEventName(eBroadcastBitProfileData, "profile-data-available");
Todd Fiala75930012016-08-19 04:21:48 +0000801 SetEventName(eBroadcastBitStructuredData, "structured-data-available");
Chaoren Lin98d0a4b2015-07-14 01:09:28 +0000802
Saleem Abdulrasoolbb19a132016-05-19 05:13:57 +0000803 m_private_state_control_broadcaster.SetEventName(eBroadcastInternalStateControlStop, "control-stop");
804 m_private_state_control_broadcaster.SetEventName(eBroadcastInternalStateControlPause, "control-pause");
805 m_private_state_control_broadcaster.SetEventName(eBroadcastInternalStateControlResume, "control-resume");
Greg Clayton35a4cc52012-10-29 20:52:08 +0000806
Saleem Abdulrasoolbb19a132016-05-19 05:13:57 +0000807 m_listener_sp->StartListeningForEvents(this, eBroadcastBitStateChanged | eBroadcastBitInterrupt |
808 eBroadcastBitSTDOUT | eBroadcastBitSTDERR |
Todd Fiala75930012016-08-19 04:21:48 +0000809 eBroadcastBitProfileData |
810 eBroadcastBitStructuredData);
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000811
Jim Ingham583bbb12016-03-07 21:50:25 +0000812 m_private_state_listener_sp->StartListeningForEvents(&m_private_state_broadcaster,
Saleem Abdulrasoolbb19a132016-05-19 05:13:57 +0000813 eBroadcastBitStateChanged | eBroadcastBitInterrupt);
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000814
Saleem Abdulrasoolbb19a132016-05-19 05:13:57 +0000815 m_private_state_listener_sp->StartListeningForEvents(
816 &m_private_state_control_broadcaster, eBroadcastInternalStateControlStop | eBroadcastInternalStateControlPause |
817 eBroadcastInternalStateControlResume);
Todd Fiala4ceced32014-08-29 17:35:57 +0000818 // We need something valid here, even if just the default UnixSignalsSP.
Saleem Abdulrasoolbb19a132016-05-19 05:13:57 +0000819 assert(m_unix_signals_sp && "null m_unix_signals_sp after initialization");
Pavel Labathf2991482015-10-20 10:33:17 +0000820
821 // Allow the platform to override the default cache line size
Saleem Abdulrasoolbb19a132016-05-19 05:13:57 +0000822 OptionValueSP value_sp = m_collection_sp->GetPropertyAtIndex(nullptr, true, ePropertyMemCacheLineSize)->GetValue();
Pavel Labathf2991482015-10-20 10:33:17 +0000823 uint32_t platform_cache_line_size = target_sp->GetPlatform()->GetDefaultMemoryCacheLineSize();
Saleem Abdulrasoolbb19a132016-05-19 05:13:57 +0000824 if (!value_sp->OptionWasSet() && platform_cache_line_size != 0)
Pavel Labathf2991482015-10-20 10:33:17 +0000825 value_sp->SetUInt64Value(platform_cache_line_size);
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000826}
827
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000828Process::~Process()
829{
Greg Clayton5160ce52013-03-27 23:08:40 +0000830 Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_OBJECT));
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000831 if (log)
Saleem Abdulrasool324a1032014-04-04 04:06:10 +0000832 log->Printf ("%p Process::~Process()", static_cast<void*>(this));
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000833 StopPrivateStateThread();
Zachary Turner39de3112014-09-09 20:54:56 +0000834
835 // ThreadList::Clear() will try to acquire this process's mutex, so
836 // explicitly clear the thread list here to ensure that the mutex
837 // is not destroyed before the thread list.
838 m_thread_list.Clear();
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000839}
840
Greg Clayton67cc0632012-08-22 17:17:09 +0000841const ProcessPropertiesSP &
842Process::GetGlobalProperties()
843{
Greg Claytoncc2e27f2016-02-26 23:20:08 +0000844 // NOTE: intentional leak so we don't crash if global destructor chain gets
845 // called as other threads still use the result of this function
846 static ProcessPropertiesSP *g_settings_sp_ptr = nullptr;
Greg Clayton04df8ee2016-02-26 19:38:18 +0000847 static std::once_flag g_once_flag;
848 std::call_once(g_once_flag, []() {
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +0000849 g_settings_sp_ptr = new ProcessPropertiesSP(new ProcessProperties(nullptr));
Greg Clayton04df8ee2016-02-26 19:38:18 +0000850 });
Greg Claytoncc2e27f2016-02-26 23:20:08 +0000851 return *g_settings_sp_ptr;
Greg Clayton67cc0632012-08-22 17:17:09 +0000852}
853
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000854void
855Process::Finalize()
856{
Greg Claytonc00ca312015-04-02 18:44:58 +0000857 m_finalizing = true;
858
Ilia Kc7efd562015-03-26 07:40:40 +0000859 // Destroy this process if needed
860 switch (GetPrivateState())
861 {
862 case eStateConnected:
863 case eStateAttaching:
864 case eStateLaunching:
865 case eStateStopped:
866 case eStateRunning:
867 case eStateStepping:
868 case eStateCrashed:
869 case eStateSuspended:
Jason Molendaede31932015-04-17 05:01:58 +0000870 Destroy(false);
Ilia Kc7efd562015-03-26 07:40:40 +0000871 break;
872
873 case eStateInvalid:
874 case eStateUnloaded:
875 case eStateDetached:
876 case eStateExited:
877 break;
878 }
Greg Claytone24c4ac2011-11-17 04:46:02 +0000879
Greg Clayton1ed54f52011-10-01 00:45:15 +0000880 // Clear our broadcaster before we proceed with destroying
881 Broadcaster::Clear();
882
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000883 // Do any cleanup needed prior to being destructed... Subclasses
884 // that override this method should call this superclass method as well.
Jim Inghamd0a3e122011-02-16 17:54:55 +0000885
886 // We need to destroy the loader before the derived Process class gets destroyed
887 // since it is very likely that undoing the loader will require access to the real process.
Greg Clayton894f82f2012-01-20 23:08:34 +0000888 m_dynamic_checkers_ap.reset();
889 m_abi_sp.reset();
Greg Clayton56d9a1b2011-08-22 02:49:39 +0000890 m_os_ap.reset();
Jason Molendaeef51062013-11-05 03:57:19 +0000891 m_system_runtime_ap.reset();
Greg Clayton894f82f2012-01-20 23:08:34 +0000892 m_dyld_ap.reset();
Andrew MacPherson17220c12014-03-05 10:12:43 +0000893 m_jit_loaders_ap.reset();
Andrew Kaylorba4e61d2013-05-07 18:35:34 +0000894 m_thread_list_real.Destroy();
Greg Claytone1cd1be2012-01-29 20:56:30 +0000895 m_thread_list.Destroy();
Jason Molenda864f1cc2013-11-11 05:20:44 +0000896 m_extended_thread_list.Destroy();
Jason Molenda5e8dce42013-12-13 00:29:16 +0000897 m_queue_list.Clear();
898 m_queue_list_stop_id = 0;
Greg Clayton894f82f2012-01-20 23:08:34 +0000899 std::vector<Notifications> empty_notifications;
900 m_notifications.swap(empty_notifications);
901 m_image_tokens.clear();
902 m_memory_cache.Clear();
903 m_allocated_memory_cache.Clear();
904 m_language_runtimes.clear();
Kuba Breckaafdf8422014-10-10 23:43:03 +0000905 m_instrumentation_runtimes.clear();
Greg Clayton894f82f2012-01-20 23:08:34 +0000906 m_next_event_action_ap.reset();
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +0000907 m_stop_info_override_callback = nullptr;
Greg Clayton08765fa2015-05-28 03:24:30 +0000908 // Clear the last natural stop ID since it has a strong
909 // reference to this process
910 m_mod_id.SetStopEventForLastNaturalStopID(EventSP());
Greg Clayton35a4cc52012-10-29 20:52:08 +0000911//#ifdef LLDB_CONFIGURATION_DEBUG
912// StreamFile s(stdout, false);
913// EventSP event_sp;
Jim Ingham583bbb12016-03-07 21:50:25 +0000914// while (m_private_state_listener_sp->GetNextEvent(event_sp))
Greg Clayton35a4cc52012-10-29 20:52:08 +0000915// {
916// event_sp->Dump (&s);
917// s.EOL();
918// }
919//#endif
920 // We have to be very careful here as the m_private_state_listener might
921 // contain events that have ProcessSP values in them which can keep this
922 // process around forever. These events need to be cleared out.
Jim Ingham583bbb12016-03-07 21:50:25 +0000923 m_private_state_listener_sp->Clear();
Ed Maste64fad602013-07-29 20:58:06 +0000924 m_public_run_lock.TrySetRunning(); // This will do nothing if already locked
925 m_public_run_lock.SetStopped();
926 m_private_run_lock.TrySetRunning(); // This will do nothing if already locked
927 m_private_run_lock.SetStopped();
Jim Ingham4fc6cb92012-08-22 21:34:33 +0000928 m_finalize_called = true;
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000929}
930
931void
932Process::RegisterNotificationCallbacks (const Notifications& callbacks)
933{
934 m_notifications.push_back(callbacks);
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +0000935 if (callbacks.initialize != nullptr)
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000936 callbacks.initialize (callbacks.baton, this);
937}
938
939bool
940Process::UnregisterNotificationCallbacks(const Notifications& callbacks)
941{
942 std::vector<Notifications>::iterator pos, end = m_notifications.end();
943 for (pos = m_notifications.begin(); pos != end; ++pos)
944 {
945 if (pos->baton == callbacks.baton &&
946 pos->initialize == callbacks.initialize &&
947 pos->process_state_changed == callbacks.process_state_changed)
948 {
949 m_notifications.erase(pos);
950 return true;
951 }
952 }
953 return false;
954}
955
956void
957Process::SynchronouslyNotifyStateChanged (StateType state)
958{
959 std::vector<Notifications>::iterator notification_pos, notification_end = m_notifications.end();
960 for (notification_pos = m_notifications.begin(); notification_pos != notification_end; ++notification_pos)
961 {
962 if (notification_pos->process_state_changed)
963 notification_pos->process_state_changed (notification_pos->baton, this, state);
964 }
965}
966
967// FIXME: We need to do some work on events before the general Listener sees them.
968// For instance if we are continuing from a breakpoint, we need to ensure that we do
969// the little "insert real insn, step & stop" trick. But we can't do that when the
970// event is delivered by the broadcaster - since that is done on the thread that is
971// waiting for new events, so if we needed more than one event for our handling, we would
972// stall. So instead we do it when we fetch the event off of the queue.
973//
974
975StateType
976Process::GetNextEvent (EventSP &event_sp)
977{
978 StateType state = eStateInvalid;
979
Jim Ingham583bbb12016-03-07 21:50:25 +0000980 if (m_listener_sp->GetNextEventForBroadcaster (this, event_sp) && event_sp)
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000981 state = Process::ProcessEventData::GetStateFromEvent (event_sp.get());
982
983 return state;
984}
985
Pavel Labath44464872015-05-27 12:40:32 +0000986void
987Process::SyncIOHandler (uint32_t iohandler_id, uint64_t timeout_msec)
Todd Fialaa3b89e22014-08-12 14:33:19 +0000988{
Todd Fialaa3b89e22014-08-12 14:33:19 +0000989 // don't sync (potentially context switch) in case where there is no process IO
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +0000990 if (!m_process_input_reader)
Pavel Labath44464872015-05-27 12:40:32 +0000991 return;
Todd Fialaa3b89e22014-08-12 14:33:19 +0000992
Pavel Labath44464872015-05-27 12:40:32 +0000993 uint32_t new_iohandler_id = 0;
Saleem Abdulrasool2d6a9ec2016-07-28 17:32:20 +0000994 m_iohandler_sync.WaitForValueNotEqualTo(iohandler_id, new_iohandler_id, std::chrono::milliseconds(timeout_msec));
Todd Fialaa3b89e22014-08-12 14:33:19 +0000995
Pavel Labath44464872015-05-27 12:40:32 +0000996 Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_PROCESS));
997 if (log)
998 log->Printf("Process::%s waited for m_iohandler_sync to change from %u, new value is %u", __FUNCTION__, iohandler_id, new_iohandler_id);
Todd Fialaa3b89e22014-08-12 14:33:19 +0000999}
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001000
1001StateType
Saleem Abdulrasool2d6a9ec2016-07-28 17:32:20 +00001002Process::WaitForProcessToStop(const std::chrono::microseconds &timeout, EventSP *event_sp_ptr, bool wait_always,
1003 ListenerSP hijack_listener_sp, Stream *stream, bool use_run_lock)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001004{
Jim Ingham4b536182011-08-09 02:12:22 +00001005 // We can't just wait for a "stopped" event, because the stopped event may have restarted the target.
1006 // We have to actually check each event, and in the case of a stopped event check the restarted flag
1007 // on the event.
Greg Clayton85fb1b92012-09-11 02:33:37 +00001008 if (event_sp_ptr)
1009 event_sp_ptr->reset();
Jim Ingham4b536182011-08-09 02:12:22 +00001010 StateType state = GetState();
1011 // If we are exited or detached, we won't ever get back to any
1012 // other valid state...
1013 if (state == eStateDetached || state == eStateExited)
1014 return state;
1015
Daniel Malea9e9919f2013-10-09 16:56:28 +00001016 Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_PROCESS));
1017 if (log)
Saleem Abdulrasool2d6a9ec2016-07-28 17:32:20 +00001018 log->Printf("Process::%s (timeout = %llu)", __FUNCTION__, static_cast<unsigned long long>(timeout.count()));
Daniel Malea9e9919f2013-10-09 16:56:28 +00001019
1020 if (!wait_always &&
1021 StateIsStoppedState(state, true) &&
Jim Ingham5b4c5eb2015-04-22 17:48:24 +00001022 StateIsStoppedState(GetPrivateState(), true))
1023 {
Daniel Malea9e9919f2013-10-09 16:56:28 +00001024 if (log)
1025 log->Printf("Process::%s returning without waiting for events; process private and public states are already 'stopped'.",
1026 __FUNCTION__);
Pavel Labath78521ef2015-03-06 10:52:47 +00001027 // We need to toggle the run lock as this won't get done in
1028 // SetPublicState() if the process is hijacked.
Jim Ingham583bbb12016-03-07 21:50:25 +00001029 if (hijack_listener_sp && use_run_lock)
Pavel Labath78521ef2015-03-06 10:52:47 +00001030 m_public_run_lock.SetStopped();
Daniel Malea9e9919f2013-10-09 16:56:28 +00001031 return state;
1032 }
1033
Jim Ingham4b536182011-08-09 02:12:22 +00001034 while (state != eStateInvalid)
1035 {
Greg Clayton85fb1b92012-09-11 02:33:37 +00001036 EventSP event_sp;
Pavel Labath12fc6752016-07-29 10:34:52 +00001037 state = WaitForStateChangedEvents(timeout, event_sp, hijack_listener_sp);
Greg Clayton85fb1b92012-09-11 02:33:37 +00001038 if (event_sp_ptr && event_sp)
1039 *event_sp_ptr = event_sp;
1040
Jim Ingham583bbb12016-03-07 21:50:25 +00001041 bool pop_process_io_handler = (hijack_listener_sp.get() != nullptr);
Greg Claytondc6224e2014-10-21 01:00:42 +00001042 Process::HandleProcessStateChangedEvent (event_sp, stream, pop_process_io_handler);
1043
Jim Ingham4b536182011-08-09 02:12:22 +00001044 switch (state)
1045 {
1046 case eStateCrashed:
1047 case eStateDetached:
1048 case eStateExited:
1049 case eStateUnloaded:
Greg Clayton44d93782014-01-27 23:43:24 +00001050 // We need to toggle the run lock as this won't get done in
1051 // SetPublicState() if the process is hijacked.
Jim Ingham583bbb12016-03-07 21:50:25 +00001052 if (hijack_listener_sp && use_run_lock)
Greg Clayton44d93782014-01-27 23:43:24 +00001053 m_public_run_lock.SetStopped();
Jim Ingham4b536182011-08-09 02:12:22 +00001054 return state;
1055 case eStateStopped:
1056 if (Process::ProcessEventData::GetRestartedFromEvent(event_sp.get()))
1057 continue;
1058 else
Greg Clayton44d93782014-01-27 23:43:24 +00001059 {
1060 // We need to toggle the run lock as this won't get done in
1061 // SetPublicState() if the process is hijacked.
Jim Ingham583bbb12016-03-07 21:50:25 +00001062 if (hijack_listener_sp && use_run_lock)
Greg Clayton44d93782014-01-27 23:43:24 +00001063 m_public_run_lock.SetStopped();
Jim Ingham4b536182011-08-09 02:12:22 +00001064 return state;
Greg Clayton44d93782014-01-27 23:43:24 +00001065 }
Jim Ingham4b536182011-08-09 02:12:22 +00001066 default:
1067 continue;
1068 }
1069 }
1070 return state;
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001071}
1072
Greg Claytondc6224e2014-10-21 01:00:42 +00001073bool
1074Process::HandleProcessStateChangedEvent (const EventSP &event_sp,
1075 Stream *stream,
1076 bool &pop_process_io_handler)
1077{
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00001078 const bool handle_pop = pop_process_io_handler;
Greg Claytondc6224e2014-10-21 01:00:42 +00001079
1080 pop_process_io_handler = false;
1081 ProcessSP process_sp = Process::ProcessEventData::GetProcessFromEvent(event_sp.get());
1082
1083 if (!process_sp)
1084 return false;
1085
1086 StateType event_state = Process::ProcessEventData::GetStateFromEvent (event_sp.get());
1087 if (event_state == eStateInvalid)
1088 return false;
1089
1090 switch (event_state)
1091 {
1092 case eStateInvalid:
1093 case eStateUnloaded:
Greg Claytondc6224e2014-10-21 01:00:42 +00001094 case eStateAttaching:
1095 case eStateLaunching:
1096 case eStateStepping:
1097 case eStateDetached:
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00001098 if (stream)
1099 stream->Printf("Process %" PRIu64 " %s\n",
1100 process_sp->GetID(),
1101 StateAsCString (event_state));
1102 if (event_state == eStateDetached)
1103 pop_process_io_handler = true;
Greg Claytondc6224e2014-10-21 01:00:42 +00001104 break;
1105
Stephane Sezerf2ef94e2014-12-13 05:23:51 +00001106 case eStateConnected:
Greg Claytondc6224e2014-10-21 01:00:42 +00001107 case eStateRunning:
1108 // Don't be chatty when we run...
1109 break;
1110
1111 case eStateExited:
1112 if (stream)
1113 process_sp->GetStatus(*stream);
1114 pop_process_io_handler = true;
1115 break;
1116
1117 case eStateStopped:
1118 case eStateCrashed:
1119 case eStateSuspended:
1120 // Make sure the program hasn't been auto-restarted:
1121 if (Process::ProcessEventData::GetRestartedFromEvent (event_sp.get()))
1122 {
1123 if (stream)
1124 {
1125 size_t num_reasons = Process::ProcessEventData::GetNumRestartedReasons(event_sp.get());
1126 if (num_reasons > 0)
1127 {
1128 // FIXME: Do we want to report this, or would that just be annoyingly chatty?
1129 if (num_reasons == 1)
1130 {
1131 const char *reason = Process::ProcessEventData::GetRestartedReasonAtIndex (event_sp.get(), 0);
1132 stream->Printf ("Process %" PRIu64 " stopped and restarted: %s\n",
1133 process_sp->GetID(),
1134 reason ? reason : "<UNKNOWN REASON>");
1135 }
1136 else
1137 {
1138 stream->Printf ("Process %" PRIu64 " stopped and restarted, reasons:\n",
1139 process_sp->GetID());
1140
1141
1142 for (size_t i = 0; i < num_reasons; i++)
1143 {
1144 const char *reason = Process::ProcessEventData::GetRestartedReasonAtIndex (event_sp.get(), i);
1145 stream->Printf("\t%s\n", reason ? reason : "<UNKNOWN REASON>");
1146 }
1147 }
1148 }
1149 }
1150 }
1151 else
1152 {
1153 // Lock the thread list so it doesn't change on us, this is the scope for the locker:
1154 {
1155 ThreadList &thread_list = process_sp->GetThreadList();
Saleem Abdulrasoolbb19a132016-05-19 05:13:57 +00001156 std::lock_guard<std::recursive_mutex> guard(thread_list.GetMutex());
Greg Claytondc6224e2014-10-21 01:00:42 +00001157
1158 ThreadSP curr_thread (thread_list.GetSelectedThread());
1159 ThreadSP thread;
1160 StopReason curr_thread_stop_reason = eStopReasonInvalid;
1161 if (curr_thread)
1162 curr_thread_stop_reason = curr_thread->GetStopReason();
1163 if (!curr_thread ||
1164 !curr_thread->IsValid() ||
1165 curr_thread_stop_reason == eStopReasonInvalid ||
1166 curr_thread_stop_reason == eStopReasonNone)
1167 {
1168 // Prefer a thread that has just completed its plan over another thread as current thread.
1169 ThreadSP plan_thread;
1170 ThreadSP other_thread;
Jim Inghamce400d92015-07-08 00:06:30 +00001171
Greg Claytondc6224e2014-10-21 01:00:42 +00001172 const size_t num_threads = thread_list.GetSize();
1173 size_t i;
1174 for (i = 0; i < num_threads; ++i)
1175 {
1176 thread = thread_list.GetThreadAtIndex(i);
1177 StopReason thread_stop_reason = thread->GetStopReason();
1178 switch (thread_stop_reason)
1179 {
1180 case eStopReasonInvalid:
1181 case eStopReasonNone:
1182 break;
1183
Jim Inghamce400d92015-07-08 00:06:30 +00001184 case eStopReasonSignal:
1185 {
1186 // Don't select a signal thread if we weren't going to stop at that
1187 // signal. We have to have had another reason for stopping here, and
1188 // the user doesn't want to see this thread.
1189 uint64_t signo = thread->GetStopInfo()->GetValue();
Chaoren Lin98d0a4b2015-07-14 01:09:28 +00001190 if (process_sp->GetUnixSignals()->GetShouldStop(signo))
Jim Inghamce400d92015-07-08 00:06:30 +00001191 {
1192 if (!other_thread)
1193 other_thread = thread;
1194 }
1195 break;
1196 }
Greg Claytondc6224e2014-10-21 01:00:42 +00001197 case eStopReasonTrace:
1198 case eStopReasonBreakpoint:
1199 case eStopReasonWatchpoint:
Greg Claytondc6224e2014-10-21 01:00:42 +00001200 case eStopReasonException:
1201 case eStopReasonExec:
1202 case eStopReasonThreadExiting:
1203 case eStopReasonInstrumentation:
1204 if (!other_thread)
1205 other_thread = thread;
1206 break;
1207 case eStopReasonPlanComplete:
1208 if (!plan_thread)
1209 plan_thread = thread;
1210 break;
1211 }
1212 }
1213 if (plan_thread)
1214 thread_list.SetSelectedThreadByID (plan_thread->GetID());
1215 else if (other_thread)
1216 thread_list.SetSelectedThreadByID (other_thread->GetID());
1217 else
1218 {
1219 if (curr_thread && curr_thread->IsValid())
1220 thread = curr_thread;
1221 else
1222 thread = thread_list.GetThreadAtIndex(0);
1223
1224 if (thread)
1225 thread_list.SetSelectedThreadByID (thread->GetID());
1226 }
1227 }
1228 }
1229 // Drop the ThreadList mutex by here, since GetThreadStatus below might have to run code,
1230 // e.g. for Data formatters, and if we hold the ThreadList mutex, then the process is going to
1231 // have a hard time restarting the process.
1232 if (stream)
1233 {
1234 Debugger &debugger = process_sp->GetTarget().GetDebugger();
1235 if (debugger.GetTargetList().GetSelectedTarget().get() == &process_sp->GetTarget())
1236 {
1237 const bool only_threads_with_stop_reason = true;
1238 const uint32_t start_frame = 0;
1239 const uint32_t num_frames = 1;
1240 const uint32_t num_frames_with_source = 1;
1241 process_sp->GetStatus(*stream);
1242 process_sp->GetThreadStatus (*stream,
1243 only_threads_with_stop_reason,
1244 start_frame,
1245 num_frames,
1246 num_frames_with_source);
1247 }
1248 else
1249 {
1250 uint32_t target_idx = debugger.GetTargetList().GetIndexOfTarget(process_sp->GetTarget().shared_from_this());
1251 if (target_idx != UINT32_MAX)
1252 stream->Printf ("Target %d: (", target_idx);
1253 else
1254 stream->Printf ("Target <unknown index>: (");
1255 process_sp->GetTarget().Dump (stream, eDescriptionLevelBrief);
1256 stream->Printf (") stopped.\n");
1257 }
1258 }
1259
1260 // Pop the process IO handler
1261 pop_process_io_handler = true;
1262 }
1263 break;
1264 }
1265
1266 if (handle_pop && pop_process_io_handler)
1267 process_sp->PopProcessIOHandler();
1268
1269 return true;
1270}
1271
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001272StateType
Saleem Abdulrasool2d6a9ec2016-07-28 17:32:20 +00001273Process::WaitForState(const std::chrono::microseconds &timeout, const StateType *match_states,
Eugene Zelenko8f30a652015-10-23 18:39:37 +00001274 const uint32_t num_match_states)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001275{
1276 EventSP event_sp;
Greg Clayton05faeb72010-10-07 04:19:01 +00001277 StateType state = GetState();
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001278 while (state != eStateInvalid)
1279 {
Greg Clayton05faeb72010-10-07 04:19:01 +00001280 // If we are exited or detached, we won't ever get back to any
1281 // other valid state...
1282 if (state == eStateDetached || state == eStateExited)
1283 return state;
1284
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00001285 state = WaitForStateChangedEvents(timeout, event_sp, nullptr);
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001286
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00001287 for (uint32_t i = 0; i < num_match_states; ++i)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001288 {
1289 if (match_states[i] == state)
1290 return state;
1291 }
1292 }
1293 return state;
1294}
1295
Jim Ingham30f9b212010-10-11 23:53:14 +00001296bool
Jim Ingham583bbb12016-03-07 21:50:25 +00001297Process::HijackProcessEvents (ListenerSP listener_sp)
Jim Ingham30f9b212010-10-11 23:53:14 +00001298{
Jim Ingham583bbb12016-03-07 21:50:25 +00001299 if (listener_sp)
Jim Ingham30f9b212010-10-11 23:53:14 +00001300 {
Jim Ingham583bbb12016-03-07 21:50:25 +00001301 return HijackBroadcaster(listener_sp, eBroadcastBitStateChanged | eBroadcastBitInterrupt);
Jim Ingham30f9b212010-10-11 23:53:14 +00001302 }
1303 else
1304 return false;
1305}
1306
1307void
1308Process::RestoreProcessEvents ()
1309{
1310 RestoreBroadcaster();
1311}
1312
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001313StateType
Saleem Abdulrasool2d6a9ec2016-07-28 17:32:20 +00001314Process::WaitForStateChangedEvents(const std::chrono::microseconds &timeout, EventSP &event_sp,
1315 ListenerSP hijack_listener_sp)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001316{
Greg Clayton5160ce52013-03-27 23:08:40 +00001317 Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_PROCESS));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001318
1319 if (log)
Saleem Abdulrasool2d6a9ec2016-07-28 17:32:20 +00001320 log->Printf("Process::%s (timeout = %llu, event_sp)...", __FUNCTION__,
1321 static_cast<unsigned long long>(timeout.count()));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001322
Jim Ingham583bbb12016-03-07 21:50:25 +00001323 ListenerSP listener_sp = hijack_listener_sp;
1324 if (!listener_sp)
1325 listener_sp = m_listener_sp;
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00001326
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001327 StateType state = eStateInvalid;
Jim Ingham583bbb12016-03-07 21:50:25 +00001328 if (listener_sp->WaitForEventForBroadcasterWithType (timeout,
1329 this,
1330 eBroadcastBitStateChanged | eBroadcastBitInterrupt,
1331 event_sp))
Jim Inghamcfc09352012-07-27 23:57:19 +00001332 {
1333 if (event_sp && event_sp->GetType() == eBroadcastBitStateChanged)
1334 state = Process::ProcessEventData::GetStateFromEvent(event_sp.get());
1335 else if (log)
1336 log->Printf ("Process::%s got no event or was interrupted.", __FUNCTION__);
1337 }
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001338
1339 if (log)
Saleem Abdulrasool2d6a9ec2016-07-28 17:32:20 +00001340 log->Printf("Process::%s (timeout = %llu, event_sp) => %s", __FUNCTION__,
1341 static_cast<unsigned long long>(timeout.count()), StateAsCString(state));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001342 return state;
1343}
1344
1345Event *
1346Process::PeekAtStateChangedEvents ()
1347{
Greg Clayton5160ce52013-03-27 23:08:40 +00001348 Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_PROCESS));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001349
1350 if (log)
1351 log->Printf ("Process::%s...", __FUNCTION__);
1352
1353 Event *event_ptr;
Jim Ingham583bbb12016-03-07 21:50:25 +00001354 event_ptr = m_listener_sp->PeekAtNextEventForBroadcasterWithType (this,
Greg Clayton3fcbed62010-10-19 03:25:40 +00001355 eBroadcastBitStateChanged);
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001356 if (log)
1357 {
1358 if (event_ptr)
1359 {
1360 log->Printf ("Process::%s (event_ptr) => %s",
1361 __FUNCTION__,
1362 StateAsCString(ProcessEventData::GetStateFromEvent (event_ptr)));
1363 }
1364 else
1365 {
1366 log->Printf ("Process::%s no events found",
1367 __FUNCTION__);
1368 }
1369 }
1370 return event_ptr;
1371}
1372
1373StateType
Saleem Abdulrasool2d6a9ec2016-07-28 17:32:20 +00001374Process::WaitForStateChangedEventsPrivate(const std::chrono::microseconds &timeout, EventSP &event_sp)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001375{
Greg Clayton5160ce52013-03-27 23:08:40 +00001376 Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_PROCESS));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001377
1378 if (log)
Saleem Abdulrasool2d6a9ec2016-07-28 17:32:20 +00001379 log->Printf("Process::%s (timeout = %llu, event_sp)...", __FUNCTION__,
1380 static_cast<unsigned long long>(timeout.count()));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001381
1382 StateType state = eStateInvalid;
Jim Ingham583bbb12016-03-07 21:50:25 +00001383 if (m_private_state_listener_sp->WaitForEventForBroadcasterWithType (timeout,
Greg Clayton6779606a2011-01-22 23:43:18 +00001384 &m_private_state_broadcaster,
Jim Inghamcfc09352012-07-27 23:57:19 +00001385 eBroadcastBitStateChanged | eBroadcastBitInterrupt,
Greg Clayton6779606a2011-01-22 23:43:18 +00001386 event_sp))
Jim Inghamcfc09352012-07-27 23:57:19 +00001387 if (event_sp && event_sp->GetType() == eBroadcastBitStateChanged)
1388 state = Process::ProcessEventData::GetStateFromEvent(event_sp.get());
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001389
1390 // This is a bit of a hack, but when we wait here we could very well return
1391 // to the command-line, and that could disable the log, which would render the
1392 // log we got above invalid.
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001393 if (log)
Saleem Abdulrasool2d6a9ec2016-07-28 17:32:20 +00001394 log->Printf("Process::%s (timeout = %llu, event_sp) => %s", __FUNCTION__,
1395 static_cast<unsigned long long>(timeout.count()),
1396 state == eStateInvalid ? "TIMEOUT" : StateAsCString(state));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001397 return state;
1398}
1399
1400bool
Saleem Abdulrasool2d6a9ec2016-07-28 17:32:20 +00001401Process::WaitForEventsPrivate(const std::chrono::microseconds &timeout, EventSP &event_sp, bool control_only)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001402{
Greg Clayton5160ce52013-03-27 23:08:40 +00001403 Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_PROCESS));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001404
1405 if (log)
Saleem Abdulrasool2d6a9ec2016-07-28 17:32:20 +00001406 log->Printf("Process::%s (timeout = %llu, event_sp)...", __FUNCTION__,
1407 static_cast<unsigned long long>(timeout.count()));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001408
1409 if (control_only)
Jim Ingham583bbb12016-03-07 21:50:25 +00001410 return m_private_state_listener_sp->WaitForEventForBroadcaster(timeout, &m_private_state_control_broadcaster, event_sp);
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001411 else
Jim Ingham583bbb12016-03-07 21:50:25 +00001412 return m_private_state_listener_sp->WaitForEvent(timeout, event_sp);
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001413}
1414
1415bool
1416Process::IsRunning () const
1417{
1418 return StateIsRunningState (m_public_state.GetValue());
1419}
1420
1421int
1422Process::GetExitStatus ()
1423{
Saleem Abdulrasoolbb19a132016-05-19 05:13:57 +00001424 std::lock_guard<std::mutex> guard(m_exit_status_mutex);
Todd Fiala7b0917a2014-09-15 20:07:33 +00001425
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001426 if (m_public_state.GetValue() == eStateExited)
1427 return m_exit_status;
1428 return -1;
1429}
1430
1431const char *
1432Process::GetExitDescription ()
1433{
Saleem Abdulrasoolbb19a132016-05-19 05:13:57 +00001434 std::lock_guard<std::mutex> guard(m_exit_status_mutex);
Todd Fiala7b0917a2014-09-15 20:07:33 +00001435
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001436 if (m_public_state.GetValue() == eStateExited && !m_exit_string.empty())
1437 return m_exit_string.c_str();
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00001438 return nullptr;
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001439}
1440
Greg Clayton6779606a2011-01-22 23:43:18 +00001441bool
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001442Process::SetExitStatus (int status, const char *cstr)
1443{
Greg Clayton81e2b6b2015-06-01 23:14:09 +00001444 // Use a mutex to protect setting the exit status.
Saleem Abdulrasoolbb19a132016-05-19 05:13:57 +00001445 std::lock_guard<std::mutex> guard(m_exit_status_mutex);
Greg Clayton81e2b6b2015-06-01 23:14:09 +00001446
Greg Clayton5160ce52013-03-27 23:08:40 +00001447 Log *log(lldb_private::GetLogIfAnyCategoriesSet (LIBLLDB_LOG_STATE | LIBLLDB_LOG_PROCESS));
Greg Clayton414f5d32011-01-25 02:58:48 +00001448 if (log)
1449 log->Printf("Process::SetExitStatus (status=%i (0x%8.8x), description=%s%s%s)",
1450 status, status,
1451 cstr ? "\"" : "",
1452 cstr ? cstr : "NULL",
1453 cstr ? "\"" : "");
1454
Greg Clayton6779606a2011-01-22 23:43:18 +00001455 // We were already in the exited state
1456 if (m_private_state.GetValue() == eStateExited)
Greg Clayton414f5d32011-01-25 02:58:48 +00001457 {
Greg Clayton385d6032011-01-26 23:47:29 +00001458 if (log)
1459 log->Printf("Process::SetExitStatus () ignoring exit status because state was already set to eStateExited");
Greg Clayton6779606a2011-01-22 23:43:18 +00001460 return false;
Greg Clayton414f5d32011-01-25 02:58:48 +00001461 }
Todd Fiala7b0917a2014-09-15 20:07:33 +00001462
Greg Clayton81e2b6b2015-06-01 23:14:09 +00001463 m_exit_status = status;
1464 if (cstr)
1465 m_exit_string = cstr;
1466 else
1467 m_exit_string.clear();
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001468
Greg Clayton08765fa2015-05-28 03:24:30 +00001469 // Clear the last natural stop ID since it has a strong
1470 // reference to this process
1471 m_mod_id.SetStopEventForLastNaturalStopID(EventSP());
1472
Greg Clayton6779606a2011-01-22 23:43:18 +00001473 SetPrivateState (eStateExited);
Greg Clayton5df78fa2015-05-23 03:54:53 +00001474
1475 // Allow subclasses to do some cleanup
1476 DidExit ();
1477
Greg Clayton6779606a2011-01-22 23:43:18 +00001478 return true;
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001479}
1480
Jason Molendaa814f702015-11-05 23:03:44 +00001481bool
1482Process::IsAlive ()
1483{
1484 switch (m_private_state.GetValue())
1485 {
Jason Molendaa814f702015-11-05 23:03:44 +00001486 case eStateConnected:
1487 case eStateAttaching:
1488 case eStateLaunching:
1489 case eStateStopped:
1490 case eStateRunning:
1491 case eStateStepping:
1492 case eStateCrashed:
1493 case eStateSuspended:
1494 return true;
Davide Italiano13fe2a92016-01-19 22:47:51 +00001495 default:
1496 return false;
Jason Molendaa814f702015-11-05 23:03:44 +00001497 }
1498}
1499
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001500// This static callback can be used to watch for local child processes on
Bruce Mitchenerd93c4a32014-07-01 21:22:11 +00001501// the current host. The child process exits, the process will be
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001502// found in the global target list (we want to be completely sure that the
1503// lldb_private::Process doesn't go away before we can deliver the signal.
1504bool
Pavel Labath998bdc52016-05-11 16:59:04 +00001505Process::SetProcessExitStatus(lldb::pid_t pid, bool exited,
1506 int signo, // Zero for no signal
1507 int exit_status // Exit value of process if signal is zero
1508 )
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001509{
Greg Clayton5160ce52013-03-27 23:08:40 +00001510 Log *log(lldb_private::GetLogIfAnyCategoriesSet (LIBLLDB_LOG_PROCESS));
Greg Claytone4e45922011-11-16 05:37:56 +00001511 if (log)
Pavel Labath998bdc52016-05-11 16:59:04 +00001512 log->Printf("Process::SetProcessExitStatus (pid=%" PRIu64 ", exited=%i, signal=%i, exit_status=%i)\n", pid,
1513 exited, signo, exit_status);
Greg Claytone4e45922011-11-16 05:37:56 +00001514
1515 if (exited)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001516 {
Greg Clayton66111032010-06-23 01:19:29 +00001517 TargetSP target_sp(Debugger::FindTargetWithProcessID (pid));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001518 if (target_sp)
1519 {
1520 ProcessSP process_sp (target_sp->GetProcessSP());
1521 if (process_sp)
1522 {
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00001523 const char *signal_cstr = nullptr;
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001524 if (signo)
Chaoren Lin98d0a4b2015-07-14 01:09:28 +00001525 signal_cstr = process_sp->GetUnixSignals()->GetSignalAsCString(signo);
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001526
1527 process_sp->SetExitStatus (exit_status, signal_cstr);
1528 }
1529 }
1530 return true;
1531 }
1532 return false;
1533}
1534
Greg Clayton56d9a1b2011-08-22 02:49:39 +00001535void
1536Process::UpdateThreadListIfNeeded ()
1537{
1538 const uint32_t stop_id = GetStopID();
1539 if (m_thread_list.GetSize(false) == 0 || stop_id != m_thread_list.GetStopID())
1540 {
Greg Clayton2637f822011-11-17 01:23:07 +00001541 const StateType state = GetPrivateState();
1542 if (StateIsStoppedState (state, true))
1543 {
Saleem Abdulrasoolbb19a132016-05-19 05:13:57 +00001544 std::lock_guard<std::recursive_mutex> guard(m_thread_list.GetMutex());
Greg Claytone24c4ac2011-11-17 04:46:02 +00001545 // m_thread_list does have its own mutex, but we need to
1546 // hold onto the mutex between the call to UpdateThreadList(...)
1547 // and the os->UpdateThreadList(...) so it doesn't change on us
Andrew Kaylorba4e61d2013-05-07 18:35:34 +00001548 ThreadList &old_thread_list = m_thread_list;
1549 ThreadList real_thread_list(this);
Greg Clayton2637f822011-11-17 01:23:07 +00001550 ThreadList new_thread_list(this);
1551 // Always update the thread list with the protocol specific
Greg Clayton9fc13552012-04-10 00:18:59 +00001552 // thread list, but only update if "true" is returned
Andrew Kaylorba4e61d2013-05-07 18:35:34 +00001553 if (UpdateThreadList (m_thread_list_real, real_thread_list))
Greg Clayton9fc13552012-04-10 00:18:59 +00001554 {
Jim Ingham09437922013-03-01 20:04:25 +00001555 // Don't call into the OperatingSystem to update the thread list if we are shutting down, since
1556 // that may call back into the SBAPI's, requiring the API lock which is already held by whoever is
1557 // shutting us down, causing a deadlock.
Pavel Labath862432c2015-11-03 16:05:18 +00001558 OperatingSystem *os = GetOperatingSystem ();
1559 if (os && !m_destroy_in_process)
Jim Ingham09437922013-03-01 20:04:25 +00001560 {
Pavel Labath862432c2015-11-03 16:05:18 +00001561 // Clear any old backing threads where memory threads might have been
1562 // backed by actual threads from the lldb_private::Process subclass
1563 size_t num_old_threads = old_thread_list.GetSize(false);
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00001564 for (size_t i = 0; i < num_old_threads; ++i)
Pavel Labath862432c2015-11-03 16:05:18 +00001565 old_thread_list.GetThreadAtIndex(i, false)->ClearBackingThread();
Greg Claytonb3ae8762013-04-12 20:07:46 +00001566
Pavel Labath862432c2015-11-03 16:05:18 +00001567 // Turn off dynamic types to ensure we don't run any expressions. Objective C
1568 // can run an expression to determine if a SBValue is a dynamic type or not
1569 // and we need to avoid this. OperatingSystem plug-ins can't run expressions
1570 // that require running code...
Greg Clayton15484402015-05-15 18:40:24 +00001571
Pavel Labath862432c2015-11-03 16:05:18 +00001572 Target &target = GetTarget();
1573 const lldb::DynamicValueType saved_prefer_dynamic = target.GetPreferDynamicValue ();
1574 if (saved_prefer_dynamic != lldb::eNoDynamicValues)
1575 target.SetPreferDynamicValue(lldb::eNoDynamicValues);
Greg Clayton15484402015-05-15 18:40:24 +00001576
Pavel Labath862432c2015-11-03 16:05:18 +00001577 // Now let the OperatingSystem plug-in update the thread list
Greg Clayton15484402015-05-15 18:40:24 +00001578
Pavel Labath862432c2015-11-03 16:05:18 +00001579 os->UpdateThreadList (old_thread_list, // Old list full of threads created by OS plug-in
1580 real_thread_list, // The actual thread list full of threads created by each lldb_private::Process subclass
1581 new_thread_list); // The new thread list that we will show to the user that gets filled in
Greg Clayton15484402015-05-15 18:40:24 +00001582
Pavel Labath862432c2015-11-03 16:05:18 +00001583 if (saved_prefer_dynamic != lldb::eNoDynamicValues)
1584 target.SetPreferDynamicValue(saved_prefer_dynamic);
1585 }
1586 else
1587 {
1588 // No OS plug-in, the new thread list is the same as the real thread list
1589 new_thread_list = real_thread_list;
Jim Ingham09437922013-03-01 20:04:25 +00001590 }
Jim Ingham02ff8e02013-06-22 00:55:02 +00001591
1592 m_thread_list_real.Update(real_thread_list);
Andrew Kaylorba4e61d2013-05-07 18:35:34 +00001593 m_thread_list.Update (new_thread_list);
1594 m_thread_list.SetStopID (stop_id);
Jason Molendaa6e91302013-11-19 05:44:41 +00001595
Jason Molenda4ff13262013-11-20 00:31:38 +00001596 if (GetLastNaturalStopID () != m_extended_thread_stop_id)
1597 {
1598 // Clear any extended threads that we may have accumulated previously
1599 m_extended_thread_list.Clear();
1600 m_extended_thread_stop_id = GetLastNaturalStopID ();
Jason Molenda5e8dce42013-12-13 00:29:16 +00001601
1602 m_queue_list.Clear();
1603 m_queue_list_stop_id = GetLastNaturalStopID ();
Jason Molenda4ff13262013-11-20 00:31:38 +00001604 }
Greg Clayton9fc13552012-04-10 00:18:59 +00001605 }
Greg Clayton2637f822011-11-17 01:23:07 +00001606 }
Greg Clayton56d9a1b2011-08-22 02:49:39 +00001607 }
1608}
1609
Jason Molenda5e8dce42013-12-13 00:29:16 +00001610void
1611Process::UpdateQueueListIfNeeded ()
1612{
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00001613 if (m_system_runtime_ap)
Jason Molenda5e8dce42013-12-13 00:29:16 +00001614 {
1615 if (m_queue_list.GetSize() == 0 || m_queue_list_stop_id != GetLastNaturalStopID())
1616 {
1617 const StateType state = GetPrivateState();
1618 if (StateIsStoppedState (state, true))
1619 {
1620 m_system_runtime_ap->PopulateQueueList (m_queue_list);
1621 m_queue_list_stop_id = GetLastNaturalStopID();
1622 }
1623 }
1624 }
1625}
1626
Greg Claytona4d87472013-01-18 23:41:08 +00001627ThreadSP
1628Process::CreateOSPluginThread (lldb::tid_t tid, lldb::addr_t context)
1629{
1630 OperatingSystem *os = GetOperatingSystem ();
1631 if (os)
1632 return os->CreateThread(tid, context);
1633 return ThreadSP();
1634}
1635
Han Ming Ongc2c423e2013-01-08 22:10:01 +00001636uint32_t
1637Process::GetNextThreadIndexID (uint64_t thread_id)
1638{
1639 return AssignIndexIDToThread(thread_id);
1640}
1641
1642bool
1643Process::HasAssignedIndexIDToThread(uint64_t thread_id)
1644{
Eugene Zelenko8f30a652015-10-23 18:39:37 +00001645 return (m_thread_id_to_index_id_map.find(thread_id) != m_thread_id_to_index_id_map.end());
Han Ming Ongc2c423e2013-01-08 22:10:01 +00001646}
1647
1648uint32_t
1649Process::AssignIndexIDToThread(uint64_t thread_id)
1650{
1651 uint32_t result = 0;
1652 std::map<uint64_t, uint32_t>::iterator iterator = m_thread_id_to_index_id_map.find(thread_id);
1653 if (iterator == m_thread_id_to_index_id_map.end())
1654 {
1655 result = ++m_thread_index_id;
1656 m_thread_id_to_index_id_map[thread_id] = result;
1657 }
1658 else
1659 {
1660 result = iterator->second;
1661 }
1662
1663 return result;
1664}
1665
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001666StateType
1667Process::GetState()
1668{
1669 // If any other threads access this we will need a mutex for it
1670 return m_public_state.GetValue ();
1671}
1672
Greg Claytondc6224e2014-10-21 01:00:42 +00001673bool
1674Process::StateChangedIsExternallyHijacked()
1675{
1676 if (IsHijackedForEvent(eBroadcastBitStateChanged))
1677 {
Jim Ingham583bbb12016-03-07 21:50:25 +00001678 const char *hijacking_name = GetHijackingListenerName();
1679 if (hijacking_name && strcmp(hijacking_name, "lldb.Process.ResumeSynchronous.hijack"))
Greg Claytondc6224e2014-10-21 01:00:42 +00001680 return true;
1681 }
1682 return false;
1683}
1684
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001685void
Jim Ingham221d51c2013-05-08 00:35:16 +00001686Process::SetPublicState (StateType new_state, bool restarted)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001687{
Greg Clayton5160ce52013-03-27 23:08:40 +00001688 Log *log(lldb_private::GetLogIfAnyCategoriesSet (LIBLLDB_LOG_STATE | LIBLLDB_LOG_PROCESS));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001689 if (log)
Jim Ingham221d51c2013-05-08 00:35:16 +00001690 log->Printf("Process::SetPublicState (state = %s, restarted = %i)", StateAsCString(new_state), restarted);
Greg Clayton7fdf9ef2012-04-05 16:12:35 +00001691 const StateType old_state = m_public_state.GetValue();
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001692 m_public_state.SetValue (new_state);
Jim Ingham3b8285d2012-04-19 01:40:33 +00001693
1694 // On the transition from Run to Stopped, we unlock the writer end of the
1695 // run lock. The lock gets locked in Resume, which is the public API
1696 // to tell the program to run.
Greg Claytondc6224e2014-10-21 01:00:42 +00001697 if (!StateChangedIsExternallyHijacked())
Greg Clayton7fdf9ef2012-04-05 16:12:35 +00001698 {
Sean Callanan8b0737f2012-06-02 01:16:20 +00001699 if (new_state == eStateDetached)
Greg Clayton7fdf9ef2012-04-05 16:12:35 +00001700 {
Sean Callanan8b0737f2012-06-02 01:16:20 +00001701 if (log)
1702 log->Printf("Process::SetPublicState (%s) -- unlocking run lock for detach", StateAsCString(new_state));
Ed Maste64fad602013-07-29 20:58:06 +00001703 m_public_run_lock.SetStopped();
Sean Callanan8b0737f2012-06-02 01:16:20 +00001704 }
1705 else
1706 {
1707 const bool old_state_is_stopped = StateIsStoppedState(old_state, false);
1708 const bool new_state_is_stopped = StateIsStoppedState(new_state, false);
Jim Ingham221d51c2013-05-08 00:35:16 +00001709 if ((old_state_is_stopped != new_state_is_stopped))
Greg Clayton7fdf9ef2012-04-05 16:12:35 +00001710 {
Jim Ingham221d51c2013-05-08 00:35:16 +00001711 if (new_state_is_stopped && !restarted)
Sean Callanan8b0737f2012-06-02 01:16:20 +00001712 {
1713 if (log)
1714 log->Printf("Process::SetPublicState (%s) -- unlocking run lock", StateAsCString(new_state));
Ed Maste64fad602013-07-29 20:58:06 +00001715 m_public_run_lock.SetStopped();
Sean Callanan8b0737f2012-06-02 01:16:20 +00001716 }
Greg Clayton7fdf9ef2012-04-05 16:12:35 +00001717 }
Greg Clayton7fdf9ef2012-04-05 16:12:35 +00001718 }
1719 }
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001720}
1721
Jim Ingham3b8285d2012-04-19 01:40:33 +00001722Error
1723Process::Resume ()
1724{
Greg Clayton5160ce52013-03-27 23:08:40 +00001725 Log *log(lldb_private::GetLogIfAnyCategoriesSet (LIBLLDB_LOG_STATE | LIBLLDB_LOG_PROCESS));
Jim Ingham3b8285d2012-04-19 01:40:33 +00001726 if (log)
1727 log->Printf("Process::Resume -- locking run lock");
Ed Maste64fad602013-07-29 20:58:06 +00001728 if (!m_public_run_lock.TrySetRunning())
Jim Ingham3b8285d2012-04-19 01:40:33 +00001729 {
1730 Error error("Resume request failed - process still running.");
1731 if (log)
Ed Maste64fad602013-07-29 20:58:06 +00001732 log->Printf ("Process::Resume: -- TrySetRunning failed, not resuming.");
Jim Ingham3b8285d2012-04-19 01:40:33 +00001733 return error;
1734 }
1735 return PrivateResume();
1736}
1737
Greg Claytondc6224e2014-10-21 01:00:42 +00001738Error
1739Process::ResumeSynchronous (Stream *stream)
1740{
1741 Log *log(lldb_private::GetLogIfAnyCategoriesSet (LIBLLDB_LOG_STATE | LIBLLDB_LOG_PROCESS));
1742 if (log)
1743 log->Printf("Process::ResumeSynchronous -- locking run lock");
1744 if (!m_public_run_lock.TrySetRunning())
1745 {
1746 Error error("Resume request failed - process still running.");
1747 if (log)
1748 log->Printf ("Process::Resume: -- TrySetRunning failed, not resuming.");
1749 return error;
1750 }
1751
Jim Ingham583bbb12016-03-07 21:50:25 +00001752 ListenerSP listener_sp (Listener::MakeListener("lldb.Process.ResumeSynchronous.hijack"));
1753 HijackProcessEvents(listener_sp);
Greg Claytondc6224e2014-10-21 01:00:42 +00001754
1755 Error error = PrivateResume();
Ilia Kd8c14752015-04-30 13:10:32 +00001756 if (error.Success())
1757 {
Saleem Abdulrasool2d6a9ec2016-07-28 17:32:20 +00001758 StateType state = WaitForProcessToStop(std::chrono::microseconds(0), NULL, true, listener_sp, stream);
Ilia Kd8c14752015-04-30 13:10:32 +00001759 const bool must_be_alive = false; // eStateExited is ok, so this must be false
1760 if (!StateIsStoppedState(state, must_be_alive))
1761 error.SetErrorStringWithFormat("process not in stopped state after synchronous resume: %s", StateAsCString(state));
1762 }
Greg Claytondc6224e2014-10-21 01:00:42 +00001763
1764 // Undo the hijacking of process events...
1765 RestoreProcessEvents();
1766
Greg Claytondc6224e2014-10-21 01:00:42 +00001767 return error;
1768}
1769
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001770StateType
1771Process::GetPrivateState ()
1772{
1773 return m_private_state.GetValue();
1774}
1775
1776void
1777Process::SetPrivateState (StateType new_state)
1778{
Greg Claytonfb8b37a2014-07-14 23:09:29 +00001779 if (m_finalize_called)
1780 return;
1781
Greg Clayton5160ce52013-03-27 23:08:40 +00001782 Log *log(lldb_private::GetLogIfAnyCategoriesSet (LIBLLDB_LOG_STATE | LIBLLDB_LOG_PROCESS));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001783 bool state_changed = false;
1784
1785 if (log)
1786 log->Printf("Process::SetPrivateState (%s)", StateAsCString(new_state));
1787
Saleem Abdulrasoolbb19a132016-05-19 05:13:57 +00001788 std::lock_guard<std::recursive_mutex> thread_guard(m_thread_list.GetMutex());
Saleem Abdulrasool16ff8602016-05-18 01:59:10 +00001789 std::lock_guard<std::recursive_mutex> guard(m_private_state.GetMutex());
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001790
1791 const StateType old_state = m_private_state.GetValueNoLock ();
1792 state_changed = old_state != new_state;
Ed Mastec29693f2013-07-02 16:35:47 +00001793
Greg Claytonaa49c832013-05-03 22:25:56 +00001794 const bool old_state_is_stopped = StateIsStoppedState(old_state, false);
1795 const bool new_state_is_stopped = StateIsStoppedState(new_state, false);
1796 if (old_state_is_stopped != new_state_is_stopped)
1797 {
1798 if (new_state_is_stopped)
Ed Maste64fad602013-07-29 20:58:06 +00001799 m_private_run_lock.SetStopped();
Greg Claytonaa49c832013-05-03 22:25:56 +00001800 else
Ed Maste64fad602013-07-29 20:58:06 +00001801 m_private_run_lock.SetRunning();
Greg Claytonaa49c832013-05-03 22:25:56 +00001802 }
Andrew Kaylor93132f52013-05-28 23:04:25 +00001803
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001804 if (state_changed)
1805 {
1806 m_private_state.SetValueNoLock (new_state);
Ilia K38810f42015-05-20 10:15:47 +00001807 EventSP event_sp (new Event (eBroadcastBitStateChanged, new ProcessEventData (shared_from_this(), new_state)));
Greg Clayton2637f822011-11-17 01:23:07 +00001808 if (StateIsStoppedState(new_state, false))
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001809 {
Andrew Kaylor29d65742013-05-10 17:19:04 +00001810 // Note, this currently assumes that all threads in the list
1811 // stop when the process stops. In the future we will want to
1812 // support a debugging model where some threads continue to run
1813 // while others are stopped. When that happens we will either need
1814 // a way for the thread list to identify which threads are stopping
1815 // or create a special thread list containing only threads which
1816 // actually stopped.
1817 //
1818 // The process plugin is responsible for managing the actual
1819 // behavior of the threads and should have stopped any threads
1820 // that are going to stop before we get here.
1821 m_thread_list.DidStop();
1822
Jim Ingham4b536182011-08-09 02:12:22 +00001823 m_mod_id.BumpStopID();
Ilia K38810f42015-05-20 10:15:47 +00001824 if (!m_mod_id.IsLastResumeForUserExpression())
1825 m_mod_id.SetStopEventForLastNaturalStopID(event_sp);
Greg Clayton58be07b2011-01-07 06:08:19 +00001826 m_memory_cache.Clear();
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001827 if (log)
Jim Ingham4b536182011-08-09 02:12:22 +00001828 log->Printf("Process::SetPrivateState (%s) stop_id = %u", StateAsCString(new_state), m_mod_id.GetStopID());
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001829 }
Ilia K38810f42015-05-20 10:15:47 +00001830
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001831 // Use our target to get a shared pointer to ourselves...
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00001832 if (m_finalize_called && !PrivateStateThreadIsValid())
Ilia K38810f42015-05-20 10:15:47 +00001833 BroadcastEvent (event_sp);
Greg Clayton35a4cc52012-10-29 20:52:08 +00001834 else
Ilia K38810f42015-05-20 10:15:47 +00001835 m_private_state_broadcaster.BroadcastEvent (event_sp);
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001836 }
1837 else
1838 {
1839 if (log)
Jason Molendafd54b362011-09-20 21:44:10 +00001840 log->Printf("Process::SetPrivateState (%s) state didn't change. Ignoring...", StateAsCString(new_state));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001841 }
1842}
1843
Jim Ingham0faa43f2011-11-08 03:00:11 +00001844void
1845Process::SetRunningUserExpression (bool on)
1846{
1847 m_mod_id.SetRunningUserExpression (on);
1848}
1849
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001850addr_t
1851Process::GetImageInfoAddress()
1852{
1853 return LLDB_INVALID_ADDRESS;
1854}
1855
Greg Clayton31f1d2f2011-05-11 18:39:18 +00001856const lldb::ABISP &
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001857Process::GetABI()
1858{
Greg Clayton31f1d2f2011-05-11 18:39:18 +00001859 if (!m_abi_sp)
Zachary Turner7529df92015-09-01 20:02:29 +00001860 m_abi_sp = ABI::FindPlugin(GetTarget().GetArchitecture());
Greg Clayton31f1d2f2011-05-11 18:39:18 +00001861 return m_abi_sp;
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001862}
1863
Jim Ingham22777012010-09-23 02:01:19 +00001864LanguageRuntime *
Jim Inghamab175242012-03-10 00:22:19 +00001865Process::GetLanguageRuntime(lldb::LanguageType language, bool retry_if_null)
Jim Ingham22777012010-09-23 02:01:19 +00001866{
Greg Claytonc00ca312015-04-02 18:44:58 +00001867 if (m_finalizing)
1868 return nullptr;
1869
Jim Ingham22777012010-09-23 02:01:19 +00001870 LanguageRuntimeCollection::iterator pos;
1871 pos = m_language_runtimes.find (language);
Jim Inghamab175242012-03-10 00:22:19 +00001872 if (pos == m_language_runtimes.end() || (retry_if_null && !(*pos).second))
Jim Ingham22777012010-09-23 02:01:19 +00001873 {
Jim Inghamab175242012-03-10 00:22:19 +00001874 lldb::LanguageRuntimeSP runtime_sp(LanguageRuntime::FindPlugin(this, language));
Jim Ingham22777012010-09-23 02:01:19 +00001875
Jim Inghamab175242012-03-10 00:22:19 +00001876 m_language_runtimes[language] = runtime_sp;
1877 return runtime_sp.get();
Jim Ingham22777012010-09-23 02:01:19 +00001878 }
1879 else
1880 return (*pos).second.get();
1881}
1882
1883CPPLanguageRuntime *
Jim Inghamab175242012-03-10 00:22:19 +00001884Process::GetCPPLanguageRuntime (bool retry_if_null)
Jim Ingham22777012010-09-23 02:01:19 +00001885{
Jim Inghamab175242012-03-10 00:22:19 +00001886 LanguageRuntime *runtime = GetLanguageRuntime(eLanguageTypeC_plus_plus, retry_if_null);
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00001887 if (runtime != nullptr && runtime->GetLanguageType() == eLanguageTypeC_plus_plus)
Jim Ingham22777012010-09-23 02:01:19 +00001888 return static_cast<CPPLanguageRuntime *> (runtime);
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00001889 return nullptr;
Jim Ingham22777012010-09-23 02:01:19 +00001890}
1891
1892ObjCLanguageRuntime *
Jim Inghamab175242012-03-10 00:22:19 +00001893Process::GetObjCLanguageRuntime (bool retry_if_null)
Jim Ingham22777012010-09-23 02:01:19 +00001894{
Jim Inghamab175242012-03-10 00:22:19 +00001895 LanguageRuntime *runtime = GetLanguageRuntime(eLanguageTypeObjC, retry_if_null);
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00001896 if (runtime != nullptr && runtime->GetLanguageType() == eLanguageTypeObjC)
Jim Ingham22777012010-09-23 02:01:19 +00001897 return static_cast<ObjCLanguageRuntime *> (runtime);
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00001898 return nullptr;
Jim Ingham22777012010-09-23 02:01:19 +00001899}
1900
Enrico Granatafd4c84e2012-05-21 16:51:35 +00001901bool
1902Process::IsPossibleDynamicValue (ValueObject& in_value)
1903{
Greg Claytonc00ca312015-04-02 18:44:58 +00001904 if (m_finalizing)
1905 return false;
1906
Enrico Granatafd4c84e2012-05-21 16:51:35 +00001907 if (in_value.IsDynamic())
1908 return false;
1909 LanguageType known_type = in_value.GetObjectRuntimeLanguage();
1910
1911 if (known_type != eLanguageTypeUnknown && known_type != eLanguageTypeC)
1912 {
1913 LanguageRuntime *runtime = GetLanguageRuntime (known_type);
1914 return runtime ? runtime->CouldHaveDynamicValue(in_value) : false;
1915 }
1916
1917 LanguageRuntime *cpp_runtime = GetLanguageRuntime (eLanguageTypeC_plus_plus);
1918 if (cpp_runtime && cpp_runtime->CouldHaveDynamicValue(in_value))
1919 return true;
1920
1921 LanguageRuntime *objc_runtime = GetLanguageRuntime (eLanguageTypeObjC);
1922 return objc_runtime ? objc_runtime->CouldHaveDynamicValue(in_value) : false;
1923}
1924
Zachary Turner93749ab2015-03-03 21:51:25 +00001925void
1926Process::SetDynamicCheckers(DynamicCheckerFunctions *dynamic_checkers)
1927{
1928 m_dynamic_checkers_ap.reset(dynamic_checkers);
1929}
1930
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001931BreakpointSiteList &
1932Process::GetBreakpointSiteList()
1933{
1934 return m_breakpoint_site_list;
1935}
1936
1937const BreakpointSiteList &
1938Process::GetBreakpointSiteList() const
1939{
1940 return m_breakpoint_site_list;
1941}
1942
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001943void
1944Process::DisableAllBreakpointSites ()
1945{
Greg Claytond8cf1a12013-06-12 00:46:38 +00001946 m_breakpoint_site_list.ForEach([this](BreakpointSite *bp_site) -> void {
1947// bp_site->SetEnabled(true);
1948 DisableBreakpointSite(bp_site);
1949 });
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001950}
1951
1952Error
1953Process::ClearBreakpointSiteByID (lldb::user_id_t break_id)
1954{
1955 Error error (DisableBreakpointSiteByID (break_id));
1956
1957 if (error.Success())
1958 m_breakpoint_site_list.Remove(break_id);
1959
1960 return error;
1961}
1962
1963Error
1964Process::DisableBreakpointSiteByID (lldb::user_id_t break_id)
1965{
1966 Error error;
1967 BreakpointSiteSP bp_site_sp = m_breakpoint_site_list.FindByID (break_id);
1968 if (bp_site_sp)
1969 {
1970 if (bp_site_sp->IsEnabled())
Jim Ingham299c0c12013-02-15 02:06:30 +00001971 error = DisableBreakpointSite (bp_site_sp.get());
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001972 }
1973 else
1974 {
Daniel Malead01b2952012-11-29 21:49:15 +00001975 error.SetErrorStringWithFormat("invalid breakpoint site ID: %" PRIu64, break_id);
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001976 }
1977
1978 return error;
1979}
1980
1981Error
1982Process::EnableBreakpointSiteByID (lldb::user_id_t break_id)
1983{
1984 Error error;
1985 BreakpointSiteSP bp_site_sp = m_breakpoint_site_list.FindByID (break_id);
1986 if (bp_site_sp)
1987 {
1988 if (!bp_site_sp->IsEnabled())
Jim Ingham299c0c12013-02-15 02:06:30 +00001989 error = EnableBreakpointSite (bp_site_sp.get());
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001990 }
1991 else
1992 {
Daniel Malead01b2952012-11-29 21:49:15 +00001993 error.SetErrorStringWithFormat("invalid breakpoint site ID: %" PRIu64, break_id);
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001994 }
1995 return error;
1996}
1997
Stephen Wilson50bd94f2010-07-17 00:56:13 +00001998lldb::break_id_t
Greg Claytone1cd1be2012-01-29 20:56:30 +00001999Process::CreateBreakpointSite (const BreakpointLocationSP &owner, bool use_hardware)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002000{
Jim Ingham1460e4b2014-01-10 23:46:59 +00002001 addr_t load_addr = LLDB_INVALID_ADDRESS;
2002
2003 bool show_error = true;
2004 switch (GetState())
2005 {
2006 case eStateInvalid:
2007 case eStateUnloaded:
2008 case eStateConnected:
2009 case eStateAttaching:
2010 case eStateLaunching:
2011 case eStateDetached:
2012 case eStateExited:
2013 show_error = false;
2014 break;
2015
2016 case eStateStopped:
2017 case eStateRunning:
2018 case eStateStepping:
2019 case eStateCrashed:
2020 case eStateSuspended:
2021 show_error = IsAlive();
2022 break;
2023 }
2024
2025 // Reset the IsIndirect flag here, in case the location changes from
2026 // pointing to a indirect symbol to a regular symbol.
2027 owner->SetIsIndirect (false);
2028
2029 if (owner->ShouldResolveIndirectFunctions())
2030 {
2031 Symbol *symbol = owner->GetAddress().CalculateSymbolContextSymbol();
2032 if (symbol && symbol->IsIndirect())
2033 {
2034 Error error;
Greg Clayton358cf1e2015-06-25 21:46:34 +00002035 Address symbol_address = symbol->GetAddress();
2036 load_addr = ResolveIndirectFunction (&symbol_address, error);
Jim Ingham1460e4b2014-01-10 23:46:59 +00002037 if (!error.Success() && show_error)
2038 {
Zachary Turner7529df92015-09-01 20:02:29 +00002039 GetTarget().GetDebugger().GetErrorFile()->Printf ("warning: failed to resolve indirect function at 0x%" PRIx64 " for breakpoint %i.%i: %s\n",
2040 symbol->GetLoadAddress(&GetTarget()),
2041 owner->GetBreakpoint().GetID(),
2042 owner->GetID(),
2043 error.AsCString() ? error.AsCString() : "unknown error");
Jim Ingham1460e4b2014-01-10 23:46:59 +00002044 return LLDB_INVALID_BREAK_ID;
2045 }
2046 Address resolved_address(load_addr);
Zachary Turner7529df92015-09-01 20:02:29 +00002047 load_addr = resolved_address.GetOpcodeLoadAddress (&GetTarget());
Jim Ingham1460e4b2014-01-10 23:46:59 +00002048 owner->SetIsIndirect(true);
2049 }
2050 else
Zachary Turner7529df92015-09-01 20:02:29 +00002051 load_addr = owner->GetAddress().GetOpcodeLoadAddress (&GetTarget());
Jim Ingham1460e4b2014-01-10 23:46:59 +00002052 }
2053 else
Zachary Turner7529df92015-09-01 20:02:29 +00002054 load_addr = owner->GetAddress().GetOpcodeLoadAddress (&GetTarget());
Jim Ingham1460e4b2014-01-10 23:46:59 +00002055
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002056 if (load_addr != LLDB_INVALID_ADDRESS)
2057 {
2058 BreakpointSiteSP bp_site_sp;
2059
2060 // Look up this breakpoint site. If it exists, then add this new owner, otherwise
2061 // create a new breakpoint site and add it.
2062
2063 bp_site_sp = m_breakpoint_site_list.FindByAddress (load_addr);
2064
2065 if (bp_site_sp)
2066 {
2067 bp_site_sp->AddOwner (owner);
2068 owner->SetBreakpointSite (bp_site_sp);
2069 return bp_site_sp->GetID();
2070 }
2071 else
2072 {
Greg Claytonc7bece562013-01-25 18:06:21 +00002073 bp_site_sp.reset (new BreakpointSite (&m_breakpoint_site_list, owner, load_addr, use_hardware));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002074 if (bp_site_sp)
2075 {
Greg Claytoneb023e72013-10-11 19:48:25 +00002076 Error error = EnableBreakpointSite (bp_site_sp.get());
2077 if (error.Success())
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002078 {
2079 owner->SetBreakpointSite (bp_site_sp);
2080 return m_breakpoint_site_list.Add (bp_site_sp);
2081 }
Greg Claytoneb023e72013-10-11 19:48:25 +00002082 else
2083 {
Greg Claytonfbb76342013-11-20 21:07:01 +00002084 if (show_error)
2085 {
2086 // Report error for setting breakpoint...
Zachary Turner7529df92015-09-01 20:02:29 +00002087 GetTarget().GetDebugger().GetErrorFile()->Printf ("warning: failed to set breakpoint site at 0x%" PRIx64 " for breakpoint %i.%i: %s\n",
2088 load_addr,
2089 owner->GetBreakpoint().GetID(),
2090 owner->GetID(),
2091 error.AsCString() ? error.AsCString() : "unknown error");
Greg Claytonfbb76342013-11-20 21:07:01 +00002092 }
Greg Claytoneb023e72013-10-11 19:48:25 +00002093 }
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002094 }
2095 }
2096 }
2097 // We failed to enable the breakpoint
2098 return LLDB_INVALID_BREAK_ID;
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002099}
2100
2101void
2102Process::RemoveOwnerFromBreakpointSite (lldb::user_id_t owner_id, lldb::user_id_t owner_loc_id, BreakpointSiteSP &bp_site_sp)
2103{
2104 uint32_t num_owners = bp_site_sp->RemoveOwner (owner_id, owner_loc_id);
2105 if (num_owners == 0)
2106 {
Jim Inghamf1ff3bb2013-04-06 00:16:39 +00002107 // Don't try to disable the site if we don't have a live process anymore.
2108 if (IsAlive())
2109 DisableBreakpointSite (bp_site_sp.get());
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002110 m_breakpoint_site_list.RemoveByAddress(bp_site_sp->GetLoadAddress());
2111 }
2112}
2113
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002114size_t
2115Process::RemoveBreakpointOpcodesFromBuffer (addr_t bp_addr, size_t size, uint8_t *buf) const
2116{
2117 size_t bytes_removed = 0;
Jim Ingham20c77192011-06-29 19:42:28 +00002118 BreakpointSiteList bp_sites_in_range;
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002119
Jim Ingham20c77192011-06-29 19:42:28 +00002120 if (m_breakpoint_site_list.FindInRange (bp_addr, bp_addr + size, bp_sites_in_range))
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002121 {
Greg Claytond8cf1a12013-06-12 00:46:38 +00002122 bp_sites_in_range.ForEach([bp_addr, size, buf, &bytes_removed](BreakpointSite *bp_site) -> void {
2123 if (bp_site->GetType() == BreakpointSite::eSoftware)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002124 {
Greg Claytond8cf1a12013-06-12 00:46:38 +00002125 addr_t intersect_addr;
2126 size_t intersect_size;
2127 size_t opcode_offset;
2128 if (bp_site->IntersectsRange(bp_addr, size, &intersect_addr, &intersect_size, &opcode_offset))
Jim Ingham20c77192011-06-29 19:42:28 +00002129 {
2130 assert(bp_addr <= intersect_addr && intersect_addr < bp_addr + size);
2131 assert(bp_addr < intersect_addr + intersect_size && intersect_addr + intersect_size <= bp_addr + size);
Greg Claytond8cf1a12013-06-12 00:46:38 +00002132 assert(opcode_offset + intersect_size <= bp_site->GetByteSize());
Jim Ingham20c77192011-06-29 19:42:28 +00002133 size_t buf_offset = intersect_addr - bp_addr;
Greg Claytond8cf1a12013-06-12 00:46:38 +00002134 ::memcpy(buf + buf_offset, bp_site->GetSavedOpcodeBytes() + opcode_offset, intersect_size);
Jim Ingham20c77192011-06-29 19:42:28 +00002135 }
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002136 }
Greg Claytond8cf1a12013-06-12 00:46:38 +00002137 });
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002138 }
2139 return bytes_removed;
2140}
2141
Greg Claytonded470d2011-03-19 01:12:21 +00002142size_t
2143Process::GetSoftwareBreakpointTrapOpcode (BreakpointSite* bp_site)
2144{
Zachary Turner7529df92015-09-01 20:02:29 +00002145 PlatformSP platform_sp (GetTarget().GetPlatform());
Greg Claytonded470d2011-03-19 01:12:21 +00002146 if (platform_sp)
Zachary Turner7529df92015-09-01 20:02:29 +00002147 return platform_sp->GetSoftwareBreakpointTrapOpcode (GetTarget(), bp_site);
Greg Claytonded470d2011-03-19 01:12:21 +00002148 return 0;
2149}
2150
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002151Error
2152Process::EnableSoftwareBreakpoint (BreakpointSite *bp_site)
2153{
2154 Error error;
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00002155 assert(bp_site != nullptr);
Greg Clayton5160ce52013-03-27 23:08:40 +00002156 Log *log(lldb_private::GetLogIfAnyCategoriesSet (LIBLLDB_LOG_BREAKPOINTS));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002157 const addr_t bp_addr = bp_site->GetLoadAddress();
2158 if (log)
Daniel Malead01b2952012-11-29 21:49:15 +00002159 log->Printf ("Process::EnableSoftwareBreakpoint (site_id = %d) addr = 0x%" PRIx64, bp_site->GetID(), (uint64_t)bp_addr);
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002160 if (bp_site->IsEnabled())
2161 {
2162 if (log)
Daniel Malead01b2952012-11-29 21:49:15 +00002163 log->Printf ("Process::EnableSoftwareBreakpoint (site_id = %d) addr = 0x%" PRIx64 " -- already enabled", bp_site->GetID(), (uint64_t)bp_addr);
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002164 return error;
2165 }
2166
2167 if (bp_addr == LLDB_INVALID_ADDRESS)
2168 {
2169 error.SetErrorString("BreakpointSite contains an invalid load address.");
2170 return error;
2171 }
2172 // Ask the lldb::Process subclass to fill in the correct software breakpoint
2173 // trap for the breakpoint site
2174 const size_t bp_opcode_size = GetSoftwareBreakpointTrapOpcode(bp_site);
2175
2176 if (bp_opcode_size == 0)
2177 {
Daniel Malead01b2952012-11-29 21:49:15 +00002178 error.SetErrorStringWithFormat ("Process::GetSoftwareBreakpointTrapOpcode() returned zero, unable to get breakpoint trap for address 0x%" PRIx64, bp_addr);
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002179 }
2180 else
2181 {
2182 const uint8_t * const bp_opcode_bytes = bp_site->GetTrapOpcodeBytes();
2183
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00002184 if (bp_opcode_bytes == nullptr)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002185 {
2186 error.SetErrorString ("BreakpointSite doesn't contain a valid breakpoint trap opcode.");
2187 return error;
2188 }
2189
2190 // Save the original opcode by reading it
2191 if (DoReadMemory(bp_addr, bp_site->GetSavedOpcodeBytes(), bp_opcode_size, error) == bp_opcode_size)
2192 {
2193 // Write a software breakpoint in place of the original opcode
2194 if (DoWriteMemory(bp_addr, bp_opcode_bytes, bp_opcode_size, error) == bp_opcode_size)
2195 {
2196 uint8_t verify_bp_opcode_bytes[64];
2197 if (DoReadMemory(bp_addr, verify_bp_opcode_bytes, bp_opcode_size, error) == bp_opcode_size)
2198 {
2199 if (::memcmp(bp_opcode_bytes, verify_bp_opcode_bytes, bp_opcode_size) == 0)
2200 {
2201 bp_site->SetEnabled(true);
2202 bp_site->SetType (BreakpointSite::eSoftware);
2203 if (log)
Daniel Malead01b2952012-11-29 21:49:15 +00002204 log->Printf ("Process::EnableSoftwareBreakpoint (site_id = %d) addr = 0x%" PRIx64 " -- SUCCESS",
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002205 bp_site->GetID(),
2206 (uint64_t)bp_addr);
2207 }
2208 else
Greg Clayton86edbf42011-10-26 00:56:27 +00002209 error.SetErrorString("failed to verify the breakpoint trap in memory.");
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002210 }
2211 else
2212 error.SetErrorString("Unable to read memory to verify breakpoint trap.");
2213 }
2214 else
2215 error.SetErrorString("Unable to write breakpoint trap to memory.");
2216 }
2217 else
2218 error.SetErrorString("Unable to read memory at breakpoint address.");
2219 }
Stephen Wilson78a4feb2011-01-12 04:20:03 +00002220 if (log && error.Fail())
Daniel Malead01b2952012-11-29 21:49:15 +00002221 log->Printf ("Process::EnableSoftwareBreakpoint (site_id = %d) addr = 0x%" PRIx64 " -- FAILED: %s",
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002222 bp_site->GetID(),
2223 (uint64_t)bp_addr,
2224 error.AsCString());
2225 return error;
2226}
2227
2228Error
2229Process::DisableSoftwareBreakpoint (BreakpointSite *bp_site)
2230{
2231 Error error;
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00002232 assert(bp_site != nullptr);
Greg Clayton5160ce52013-03-27 23:08:40 +00002233 Log *log(lldb_private::GetLogIfAnyCategoriesSet (LIBLLDB_LOG_BREAKPOINTS));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002234 addr_t bp_addr = bp_site->GetLoadAddress();
2235 lldb::user_id_t breakID = bp_site->GetID();
2236 if (log)
Jim Ingham299c0c12013-02-15 02:06:30 +00002237 log->Printf ("Process::DisableSoftwareBreakpoint (breakID = %" PRIu64 ") addr = 0x%" PRIx64, breakID, (uint64_t)bp_addr);
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002238
2239 if (bp_site->IsHardware())
2240 {
2241 error.SetErrorString("Breakpoint site is a hardware breakpoint.");
2242 }
2243 else if (bp_site->IsEnabled())
2244 {
2245 const size_t break_op_size = bp_site->GetByteSize();
2246 const uint8_t * const break_op = bp_site->GetTrapOpcodeBytes();
2247 if (break_op_size > 0)
2248 {
Bruce Mitchenerd93c4a32014-07-01 21:22:11 +00002249 // Clear a software breakpoint instruction
Greg Claytonc982c762010-07-09 20:39:50 +00002250 uint8_t curr_break_op[8];
Stephen Wilson4ab47682010-07-20 18:41:11 +00002251 assert (break_op_size <= sizeof(curr_break_op));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002252 bool break_op_found = false;
2253
2254 // Read the breakpoint opcode
2255 if (DoReadMemory (bp_addr, curr_break_op, break_op_size, error) == break_op_size)
2256 {
2257 bool verify = false;
Bruce Mitchener58ef3912015-06-18 05:27:05 +00002258 // Make sure the breakpoint opcode exists at this address
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002259 if (::memcmp (curr_break_op, break_op, break_op_size) == 0)
2260 {
2261 break_op_found = true;
2262 // We found a valid breakpoint opcode at this address, now restore
2263 // the saved opcode.
2264 if (DoWriteMemory (bp_addr, bp_site->GetSavedOpcodeBytes(), break_op_size, error) == break_op_size)
2265 {
2266 verify = true;
2267 }
2268 else
2269 error.SetErrorString("Memory write failed when restoring original opcode.");
2270 }
2271 else
2272 {
2273 error.SetErrorString("Original breakpoint trap is no longer in memory.");
2274 // Set verify to true and so we can check if the original opcode has already been restored
2275 verify = true;
2276 }
2277
2278 if (verify)
2279 {
Greg Claytonc982c762010-07-09 20:39:50 +00002280 uint8_t verify_opcode[8];
Stephen Wilson4ab47682010-07-20 18:41:11 +00002281 assert (break_op_size < sizeof(verify_opcode));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002282 // Verify that our original opcode made it back to the inferior
2283 if (DoReadMemory (bp_addr, verify_opcode, break_op_size, error) == break_op_size)
2284 {
2285 // compare the memory we just read with the original opcode
2286 if (::memcmp (bp_site->GetSavedOpcodeBytes(), verify_opcode, break_op_size) == 0)
2287 {
2288 // SUCCESS
2289 bp_site->SetEnabled(false);
2290 if (log)
Daniel Malead01b2952012-11-29 21:49:15 +00002291 log->Printf ("Process::DisableSoftwareBreakpoint (site_id = %d) addr = 0x%" PRIx64 " -- SUCCESS", bp_site->GetID(), (uint64_t)bp_addr);
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002292 return error;
2293 }
2294 else
2295 {
2296 if (break_op_found)
2297 error.SetErrorString("Failed to restore original opcode.");
2298 }
2299 }
2300 else
2301 error.SetErrorString("Failed to read memory to verify that breakpoint trap was restored.");
2302 }
2303 }
2304 else
2305 error.SetErrorString("Unable to read memory that should contain the breakpoint trap.");
2306 }
2307 }
2308 else
2309 {
2310 if (log)
Daniel Malead01b2952012-11-29 21:49:15 +00002311 log->Printf ("Process::DisableSoftwareBreakpoint (site_id = %d) addr = 0x%" PRIx64 " -- already disabled", bp_site->GetID(), (uint64_t)bp_addr);
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002312 return error;
2313 }
2314
2315 if (log)
Daniel Malead01b2952012-11-29 21:49:15 +00002316 log->Printf ("Process::DisableSoftwareBreakpoint (site_id = %d) addr = 0x%" PRIx64 " -- FAILED: %s",
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002317 bp_site->GetID(),
2318 (uint64_t)bp_addr,
2319 error.AsCString());
2320 return error;
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002321}
2322
Greg Clayton58be07b2011-01-07 06:08:19 +00002323// Uncomment to verify memory caching works after making changes to caching code
2324//#define VERIFY_MEMORY_READS
2325
Sean Callanan64c0cf22012-06-07 22:26:42 +00002326size_t
2327Process::ReadMemory (addr_t addr, void *buf, size_t size, Error &error)
2328{
Jason Molendaa7b5afa2013-11-15 00:17:32 +00002329 error.Clear();
Sean Callanan64c0cf22012-06-07 22:26:42 +00002330 if (!GetDisableMemoryCache())
2331 {
Greg Clayton58be07b2011-01-07 06:08:19 +00002332#if defined (VERIFY_MEMORY_READS)
Sean Callanan64c0cf22012-06-07 22:26:42 +00002333 // Memory caching is enabled, with debug verification
2334
2335 if (buf && size)
2336 {
2337 // Uncomment the line below to make sure memory caching is working.
2338 // I ran this through the test suite and got no assertions, so I am
2339 // pretty confident this is working well. If any changes are made to
2340 // memory caching, uncomment the line below and test your changes!
2341
2342 // Verify all memory reads by using the cache first, then redundantly
2343 // reading the same memory from the inferior and comparing to make sure
2344 // everything is exactly the same.
2345 std::string verify_buf (size, '\0');
2346 assert (verify_buf.size() == size);
2347 const size_t cache_bytes_read = m_memory_cache.Read (this, addr, buf, size, error);
2348 Error verify_error;
2349 const size_t verify_bytes_read = ReadMemoryFromInferior (addr, const_cast<char *>(verify_buf.data()), verify_buf.size(), verify_error);
2350 assert (cache_bytes_read == verify_bytes_read);
2351 assert (memcmp(buf, verify_buf.data(), verify_buf.size()) == 0);
2352 assert (verify_error.Success() == error.Success());
2353 return cache_bytes_read;
2354 }
2355 return 0;
2356#else // !defined(VERIFY_MEMORY_READS)
2357 // Memory caching is enabled, without debug verification
2358
2359 return m_memory_cache.Read (addr, buf, size, error);
2360#endif // defined (VERIFY_MEMORY_READS)
Greg Clayton58be07b2011-01-07 06:08:19 +00002361 }
Sean Callanan64c0cf22012-06-07 22:26:42 +00002362 else
2363 {
2364 // Memory caching is disabled
2365
2366 return ReadMemoryFromInferior (addr, buf, size, error);
2367 }
Greg Clayton58be07b2011-01-07 06:08:19 +00002368}
Greg Clayton58be07b2011-01-07 06:08:19 +00002369
Greg Clayton4c82d422012-05-18 23:20:01 +00002370size_t
2371Process::ReadCStringFromMemory (addr_t addr, std::string &out_str, Error &error)
2372{
Greg Claytonde87c0f2012-05-19 00:18:00 +00002373 char buf[256];
Greg Clayton4c82d422012-05-18 23:20:01 +00002374 out_str.clear();
2375 addr_t curr_addr = addr;
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00002376 while (true)
Greg Clayton4c82d422012-05-18 23:20:01 +00002377 {
2378 size_t length = ReadCStringFromMemory (curr_addr, buf, sizeof(buf), error);
2379 if (length == 0)
2380 break;
2381 out_str.append(buf, length);
2382 // If we got "length - 1" bytes, we didn't get the whole C string, we
2383 // need to read some more characters
2384 if (length == sizeof(buf) - 1)
2385 curr_addr += length;
2386 else
2387 break;
2388 }
2389 return out_str.size();
2390}
2391
Greg Clayton58be07b2011-01-07 06:08:19 +00002392size_t
Ashok Thirumurthi6ac9d132013-04-19 15:58:38 +00002393Process::ReadStringFromMemory (addr_t addr, char *dst, size_t max_bytes, Error &error,
2394 size_t type_width)
2395{
2396 size_t total_bytes_read = 0;
2397 if (dst && max_bytes && type_width && max_bytes >= type_width)
2398 {
2399 // Ensure a null terminator independent of the number of bytes that is read.
2400 memset (dst, 0, max_bytes);
2401 size_t bytes_left = max_bytes - type_width;
2402
2403 const char terminator[4] = {'\0', '\0', '\0', '\0'};
2404 assert(sizeof(terminator) >= type_width &&
2405 "Attempting to validate a string with more than 4 bytes per character!");
2406
2407 addr_t curr_addr = addr;
2408 const size_t cache_line_size = m_memory_cache.GetMemoryCacheLineSize();
2409 char *curr_dst = dst;
2410
2411 error.Clear();
2412 while (bytes_left > 0 && error.Success())
2413 {
2414 addr_t cache_line_bytes_left = cache_line_size - (curr_addr % cache_line_size);
2415 addr_t bytes_to_read = std::min<addr_t>(bytes_left, cache_line_bytes_left);
2416 size_t bytes_read = ReadMemory (curr_addr, curr_dst, bytes_to_read, error);
2417
2418 if (bytes_read == 0)
2419 break;
2420
2421 // Search for a null terminator of correct size and alignment in bytes_read
2422 size_t aligned_start = total_bytes_read - total_bytes_read % type_width;
2423 for (size_t i = aligned_start; i + type_width <= total_bytes_read + bytes_read; i += type_width)
Ulrich Weigand0501eeb2016-04-14 14:33:47 +00002424 if (::memcmp(&dst[i], terminator, type_width) == 0)
Ashok Thirumurthi6ac9d132013-04-19 15:58:38 +00002425 {
2426 error.Clear();
2427 return i;
2428 }
2429
2430 total_bytes_read += bytes_read;
2431 curr_dst += bytes_read;
2432 curr_addr += bytes_read;
2433 bytes_left -= bytes_read;
2434 }
2435 }
2436 else
2437 {
2438 if (max_bytes)
2439 error.SetErrorString("invalid arguments");
2440 }
2441 return total_bytes_read;
2442}
2443
2444// Deprecated in favor of ReadStringFromMemory which has wchar support and correct code to find
2445// null terminators.
2446size_t
Greg Claytone91b7952011-12-15 03:14:23 +00002447Process::ReadCStringFromMemory (addr_t addr, char *dst, size_t dst_max_len, Error &result_error)
Greg Clayton8b82f082011-04-12 05:54:46 +00002448{
2449 size_t total_cstr_len = 0;
2450 if (dst && dst_max_len)
2451 {
Greg Claytone91b7952011-12-15 03:14:23 +00002452 result_error.Clear();
Greg Clayton8b82f082011-04-12 05:54:46 +00002453 // NULL out everything just to be safe
2454 memset (dst, 0, dst_max_len);
2455 Error error;
2456 addr_t curr_addr = addr;
2457 const size_t cache_line_size = m_memory_cache.GetMemoryCacheLineSize();
2458 size_t bytes_left = dst_max_len - 1;
2459 char *curr_dst = dst;
2460
2461 while (bytes_left > 0)
2462 {
2463 addr_t cache_line_bytes_left = cache_line_size - (curr_addr % cache_line_size);
2464 addr_t bytes_to_read = std::min<addr_t>(bytes_left, cache_line_bytes_left);
2465 size_t bytes_read = ReadMemory (curr_addr, curr_dst, bytes_to_read, error);
2466
2467 if (bytes_read == 0)
2468 {
Greg Claytone91b7952011-12-15 03:14:23 +00002469 result_error = error;
Greg Clayton8b82f082011-04-12 05:54:46 +00002470 dst[total_cstr_len] = '\0';
2471 break;
2472 }
2473 const size_t len = strlen(curr_dst);
2474
2475 total_cstr_len += len;
2476
2477 if (len < bytes_to_read)
2478 break;
2479
2480 curr_dst += bytes_read;
2481 curr_addr += bytes_read;
2482 bytes_left -= bytes_read;
2483 }
2484 }
Greg Claytone91b7952011-12-15 03:14:23 +00002485 else
2486 {
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00002487 if (dst == nullptr)
Greg Claytone91b7952011-12-15 03:14:23 +00002488 result_error.SetErrorString("invalid arguments");
2489 else
2490 result_error.Clear();
2491 }
Greg Clayton8b82f082011-04-12 05:54:46 +00002492 return total_cstr_len;
2493}
2494
2495size_t
Greg Clayton58be07b2011-01-07 06:08:19 +00002496Process::ReadMemoryFromInferior (addr_t addr, void *buf, size_t size, Error &error)
2497{
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00002498 if (buf == nullptr || size == 0)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002499 return 0;
2500
2501 size_t bytes_read = 0;
2502 uint8_t *bytes = (uint8_t *)buf;
2503
2504 while (bytes_read < size)
2505 {
2506 const size_t curr_size = size - bytes_read;
2507 const size_t curr_bytes_read = DoReadMemory (addr + bytes_read,
2508 bytes + bytes_read,
2509 curr_size,
2510 error);
2511 bytes_read += curr_bytes_read;
2512 if (curr_bytes_read == curr_size || curr_bytes_read == 0)
2513 break;
2514 }
2515
2516 // Replace any software breakpoint opcodes that fall into this range back
2517 // into "buf" before we return
2518 if (bytes_read > 0)
2519 RemoveBreakpointOpcodesFromBuffer (addr, bytes_read, (uint8_t *)buf);
2520 return bytes_read;
2521}
2522
Greg Clayton58a4c462010-12-16 20:01:20 +00002523uint64_t
Greg Claytonc2267782016-05-23 20:37:24 +00002524Process::ReadUnsignedIntegerFromMemory(lldb::addr_t vm_addr, size_t integer_byte_size, uint64_t fail_value,
2525 Error &error)
Greg Clayton58a4c462010-12-16 20:01:20 +00002526{
Greg Claytonf3ef3d22011-05-22 22:46:53 +00002527 Scalar scalar;
2528 if (ReadScalarIntegerFromMemory(vm_addr, integer_byte_size, false, scalar, error))
2529 return scalar.ULongLong(fail_value);
2530 return fail_value;
2531}
2532
Greg Claytonc2267782016-05-23 20:37:24 +00002533int64_t
2534Process::ReadSignedIntegerFromMemory(lldb::addr_t vm_addr, size_t integer_byte_size, int64_t fail_value, Error &error)
2535{
2536 Scalar scalar;
2537 if (ReadScalarIntegerFromMemory(vm_addr, integer_byte_size, true, scalar, error))
2538 return scalar.SLongLong(fail_value);
2539 return fail_value;
2540}
2541
Greg Claytonf3ef3d22011-05-22 22:46:53 +00002542addr_t
2543Process::ReadPointerFromMemory (lldb::addr_t vm_addr, Error &error)
2544{
2545 Scalar scalar;
2546 if (ReadScalarIntegerFromMemory(vm_addr, GetAddressByteSize(), false, scalar, error))
2547 return scalar.ULongLong(LLDB_INVALID_ADDRESS);
2548 return LLDB_INVALID_ADDRESS;
2549}
2550
Greg Claytonf3ef3d22011-05-22 22:46:53 +00002551bool
2552Process::WritePointerToMemory (lldb::addr_t vm_addr,
2553 lldb::addr_t ptr_value,
2554 Error &error)
2555{
2556 Scalar scalar;
2557 const uint32_t addr_byte_size = GetAddressByteSize();
2558 if (addr_byte_size <= 4)
2559 scalar = (uint32_t)ptr_value;
Greg Clayton58a4c462010-12-16 20:01:20 +00002560 else
Greg Claytonf3ef3d22011-05-22 22:46:53 +00002561 scalar = ptr_value;
2562 return WriteScalarToMemory(vm_addr, scalar, addr_byte_size, error) == addr_byte_size;
Greg Clayton58a4c462010-12-16 20:01:20 +00002563}
2564
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002565size_t
2566Process::WriteMemoryPrivate (addr_t addr, const void *buf, size_t size, Error &error)
2567{
2568 size_t bytes_written = 0;
2569 const uint8_t *bytes = (const uint8_t *)buf;
2570
2571 while (bytes_written < size)
2572 {
2573 const size_t curr_size = size - bytes_written;
2574 const size_t curr_bytes_written = DoWriteMemory (addr + bytes_written,
2575 bytes + bytes_written,
2576 curr_size,
2577 error);
2578 bytes_written += curr_bytes_written;
2579 if (curr_bytes_written == curr_size || curr_bytes_written == 0)
2580 break;
2581 }
2582 return bytes_written;
2583}
2584
2585size_t
2586Process::WriteMemory (addr_t addr, const void *buf, size_t size, Error &error)
2587{
Greg Clayton58be07b2011-01-07 06:08:19 +00002588#if defined (ENABLE_MEMORY_CACHING)
2589 m_memory_cache.Flush (addr, size);
2590#endif
2591
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00002592 if (buf == nullptr || size == 0)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002593 return 0;
Jim Ingham78a685a2011-04-16 00:01:13 +00002594
Jim Ingham4b536182011-08-09 02:12:22 +00002595 m_mod_id.BumpMemoryID();
Jim Ingham78a685a2011-04-16 00:01:13 +00002596
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002597 // We need to write any data that would go where any current software traps
2598 // (enabled software breakpoints) any software traps (breakpoints) that we
2599 // may have placed in our tasks memory.
2600
Greg Claytond8cf1a12013-06-12 00:46:38 +00002601 BreakpointSiteList bp_sites_in_range;
2602
2603 if (m_breakpoint_site_list.FindInRange (addr, addr + size, bp_sites_in_range))
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002604 {
Greg Claytond8cf1a12013-06-12 00:46:38 +00002605 // No breakpoint sites overlap
2606 if (bp_sites_in_range.IsEmpty())
2607 return WriteMemoryPrivate (addr, buf, size, error);
2608 else
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002609 {
Greg Claytond8cf1a12013-06-12 00:46:38 +00002610 const uint8_t *ubuf = (const uint8_t *)buf;
2611 uint64_t bytes_written = 0;
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002612
Greg Claytond8cf1a12013-06-12 00:46:38 +00002613 bp_sites_in_range.ForEach([this, addr, size, &bytes_written, &ubuf, &error](BreakpointSite *bp) -> void {
2614
2615 if (error.Success())
2616 {
2617 addr_t intersect_addr;
2618 size_t intersect_size;
2619 size_t opcode_offset;
2620 const bool intersects = bp->IntersectsRange(addr, size, &intersect_addr, &intersect_size, &opcode_offset);
Bruce Mitchener8a67bf72015-07-24 00:23:29 +00002621 UNUSED_IF_ASSERT_DISABLED(intersects);
Greg Claytond8cf1a12013-06-12 00:46:38 +00002622 assert(intersects);
2623 assert(addr <= intersect_addr && intersect_addr < addr + size);
2624 assert(addr < intersect_addr + intersect_size && intersect_addr + intersect_size <= addr + size);
2625 assert(opcode_offset + intersect_size <= bp->GetByteSize());
2626
2627 // Check for bytes before this breakpoint
2628 const addr_t curr_addr = addr + bytes_written;
2629 if (intersect_addr > curr_addr)
2630 {
2631 // There are some bytes before this breakpoint that we need to
2632 // just write to memory
2633 size_t curr_size = intersect_addr - curr_addr;
2634 size_t curr_bytes_written = WriteMemoryPrivate (curr_addr,
2635 ubuf + bytes_written,
2636 curr_size,
2637 error);
2638 bytes_written += curr_bytes_written;
2639 if (curr_bytes_written != curr_size)
2640 {
2641 // We weren't able to write all of the requested bytes, we
2642 // are done looping and will return the number of bytes that
2643 // we have written so far.
2644 if (error.Success())
2645 error.SetErrorToGenericError();
2646 }
2647 }
2648 // Now write any bytes that would cover up any software breakpoints
2649 // directly into the breakpoint opcode buffer
2650 ::memcpy(bp->GetSavedOpcodeBytes() + opcode_offset, ubuf + bytes_written, intersect_size);
2651 bytes_written += intersect_size;
2652 }
2653 });
2654
2655 if (bytes_written < size)
Jason Molenda8b5f2cf2014-10-16 07:49:27 +00002656 WriteMemoryPrivate (addr + bytes_written,
2657 ubuf + bytes_written,
2658 size - bytes_written,
2659 error);
Greg Claytond8cf1a12013-06-12 00:46:38 +00002660 }
2661 }
2662 else
2663 {
2664 return WriteMemoryPrivate (addr, buf, size, error);
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002665 }
2666
2667 // Write any remaining bytes after the last breakpoint if we have any left
Greg Claytond8cf1a12013-06-12 00:46:38 +00002668 return 0; //bytes_written;
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002669}
Greg Claytonf3ef3d22011-05-22 22:46:53 +00002670
2671size_t
Greg Claytonc7bece562013-01-25 18:06:21 +00002672Process::WriteScalarToMemory (addr_t addr, const Scalar &scalar, size_t byte_size, Error &error)
Greg Claytonf3ef3d22011-05-22 22:46:53 +00002673{
2674 if (byte_size == UINT32_MAX)
2675 byte_size = scalar.GetByteSize();
2676 if (byte_size > 0)
2677 {
2678 uint8_t buf[32];
2679 const size_t mem_size = scalar.GetAsMemoryData (buf, byte_size, GetByteOrder(), error);
2680 if (mem_size > 0)
2681 return WriteMemory(addr, buf, mem_size, error);
2682 else
2683 error.SetErrorString ("failed to get scalar as memory data");
2684 }
2685 else
2686 {
2687 error.SetErrorString ("invalid scalar value");
2688 }
2689 return 0;
2690}
2691
2692size_t
2693Process::ReadScalarIntegerFromMemory (addr_t addr,
2694 uint32_t byte_size,
2695 bool is_signed,
2696 Scalar &scalar,
2697 Error &error)
2698{
Greg Clayton7060f892013-05-01 23:41:30 +00002699 uint64_t uval = 0;
2700 if (byte_size == 0)
Greg Claytonf3ef3d22011-05-22 22:46:53 +00002701 {
Greg Clayton7060f892013-05-01 23:41:30 +00002702 error.SetErrorString ("byte size is zero");
2703 }
2704 else if (byte_size & (byte_size - 1))
2705 {
2706 error.SetErrorStringWithFormat ("byte size %u is not a power of 2", byte_size);
2707 }
2708 else if (byte_size <= sizeof(uval))
2709 {
2710 const size_t bytes_read = ReadMemory (addr, &uval, byte_size, error);
Greg Claytonf3ef3d22011-05-22 22:46:53 +00002711 if (bytes_read == byte_size)
2712 {
2713 DataExtractor data (&uval, sizeof(uval), GetByteOrder(), GetAddressByteSize());
Greg Claytonc7bece562013-01-25 18:06:21 +00002714 lldb::offset_t offset = 0;
Greg Clayton7060f892013-05-01 23:41:30 +00002715 if (byte_size <= 4)
2716 scalar = data.GetMaxU32 (&offset, byte_size);
Greg Claytonf3ef3d22011-05-22 22:46:53 +00002717 else
Greg Clayton7060f892013-05-01 23:41:30 +00002718 scalar = data.GetMaxU64 (&offset, byte_size);
Greg Claytonf3ef3d22011-05-22 22:46:53 +00002719 if (is_signed)
2720 scalar.SignExtend(byte_size * 8);
2721 return bytes_read;
2722 }
2723 }
2724 else
2725 {
2726 error.SetErrorStringWithFormat ("byte size of %u is too large for integer scalar type", byte_size);
2727 }
2728 return 0;
2729}
2730
Greg Claytond495c532011-05-17 03:37:42 +00002731#define USE_ALLOCATE_MEMORY_CACHE 1
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002732addr_t
2733Process::AllocateMemory(size_t size, uint32_t permissions, Error &error)
2734{
Jim Inghamf72ce3a2011-06-20 17:32:44 +00002735 if (GetPrivateState() != eStateStopped)
2736 return LLDB_INVALID_ADDRESS;
2737
Greg Claytond495c532011-05-17 03:37:42 +00002738#if defined (USE_ALLOCATE_MEMORY_CACHE)
2739 return m_allocated_memory_cache.AllocateMemory(size, permissions, error);
2740#else
Greg Claytonb2daec92011-01-23 19:58:49 +00002741 addr_t allocated_addr = DoAllocateMemory (size, permissions, error);
Greg Clayton5160ce52013-03-27 23:08:40 +00002742 Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_PROCESS));
Greg Claytonb2daec92011-01-23 19:58:49 +00002743 if (log)
Greg Clayton45989072013-10-23 18:24:30 +00002744 log->Printf("Process::AllocateMemory(size=%" PRIu64 ", permissions=%s) => 0x%16.16" PRIx64 " (m_stop_id = %u m_memory_id = %u)",
Deepak Panickald66b50c2013-10-22 12:27:43 +00002745 (uint64_t)size,
Greg Claytond495c532011-05-17 03:37:42 +00002746 GetPermissionsAsCString (permissions),
Greg Claytonb2daec92011-01-23 19:58:49 +00002747 (uint64_t)allocated_addr,
Jim Ingham4b536182011-08-09 02:12:22 +00002748 m_mod_id.GetStopID(),
2749 m_mod_id.GetMemoryID());
Greg Claytonb2daec92011-01-23 19:58:49 +00002750 return allocated_addr;
Greg Claytond495c532011-05-17 03:37:42 +00002751#endif
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002752}
2753
Jim Ingham2c381412015-11-04 20:32:27 +00002754addr_t
2755Process::CallocateMemory(size_t size, uint32_t permissions, Error &error)
2756{
2757 addr_t return_addr = AllocateMemory(size, permissions, error);
2758 if (error.Success())
2759 {
2760 std::string buffer(size, 0);
2761 WriteMemory(return_addr, buffer.c_str(), size, error);
2762 }
2763 return return_addr;
2764}
2765
Sean Callanan90539452011-09-20 23:01:51 +00002766bool
2767Process::CanJIT ()
2768{
Sean Callanana7b443a2012-02-14 22:50:38 +00002769 if (m_can_jit == eCanJITDontKnow)
2770 {
Todd Fialaaf245d12014-06-30 21:05:18 +00002771 Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_PROCESS));
Sean Callanana7b443a2012-02-14 22:50:38 +00002772 Error err;
2773
2774 uint64_t allocated_memory = AllocateMemory(8,
2775 ePermissionsReadable | ePermissionsWritable | ePermissionsExecutable,
2776 err);
2777
2778 if (err.Success())
Todd Fialaaf245d12014-06-30 21:05:18 +00002779 {
Sean Callanana7b443a2012-02-14 22:50:38 +00002780 m_can_jit = eCanJITYes;
Todd Fialaaf245d12014-06-30 21:05:18 +00002781 if (log)
2782 log->Printf ("Process::%s pid %" PRIu64 " allocation test passed, CanJIT () is true", __FUNCTION__, GetID ());
2783 }
Sean Callanana7b443a2012-02-14 22:50:38 +00002784 else
Todd Fialaaf245d12014-06-30 21:05:18 +00002785 {
Sean Callanana7b443a2012-02-14 22:50:38 +00002786 m_can_jit = eCanJITNo;
Todd Fialaaf245d12014-06-30 21:05:18 +00002787 if (log)
2788 log->Printf ("Process::%s pid %" PRIu64 " allocation test failed, CanJIT () is false: %s", __FUNCTION__, GetID (), err.AsCString ());
2789 }
Sean Callanana7b443a2012-02-14 22:50:38 +00002790
2791 DeallocateMemory (allocated_memory);
2792 }
2793
Sean Callanan90539452011-09-20 23:01:51 +00002794 return m_can_jit == eCanJITYes;
2795}
2796
2797void
2798Process::SetCanJIT (bool can_jit)
2799{
2800 m_can_jit = (can_jit ? eCanJITYes : eCanJITNo);
2801}
2802
Ewan Crawford90ff7912015-07-14 10:56:58 +00002803void
2804Process::SetCanRunCode (bool can_run_code)
2805{
2806 SetCanJIT(can_run_code);
2807 m_can_interpret_function_calls = can_run_code;
2808}
2809
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002810Error
2811Process::DeallocateMemory (addr_t ptr)
2812{
Greg Claytond495c532011-05-17 03:37:42 +00002813 Error error;
2814#if defined (USE_ALLOCATE_MEMORY_CACHE)
2815 if (!m_allocated_memory_cache.DeallocateMemory(ptr))
2816 {
Daniel Malead01b2952012-11-29 21:49:15 +00002817 error.SetErrorStringWithFormat ("deallocation of memory at 0x%" PRIx64 " failed.", (uint64_t)ptr);
Greg Claytond495c532011-05-17 03:37:42 +00002818 }
2819#else
2820 error = DoDeallocateMemory (ptr);
Greg Claytonb2daec92011-01-23 19:58:49 +00002821
Greg Clayton5160ce52013-03-27 23:08:40 +00002822 Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_PROCESS));
Greg Claytonb2daec92011-01-23 19:58:49 +00002823 if (log)
Daniel Malead01b2952012-11-29 21:49:15 +00002824 log->Printf("Process::DeallocateMemory(addr=0x%16.16" PRIx64 ") => err = %s (m_stop_id = %u, m_memory_id = %u)",
Greg Claytonb2daec92011-01-23 19:58:49 +00002825 ptr,
2826 error.AsCString("SUCCESS"),
Jim Ingham4b536182011-08-09 02:12:22 +00002827 m_mod_id.GetStopID(),
2828 m_mod_id.GetMemoryID());
Greg Claytond495c532011-05-17 03:37:42 +00002829#endif
Greg Claytonb2daec92011-01-23 19:58:49 +00002830 return error;
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002831}
2832
Greg Claytonc9660542012-02-05 02:38:54 +00002833ModuleSP
Greg Claytonc859e2d2012-02-13 23:10:39 +00002834Process::ReadModuleFromMemory (const FileSpec& file_spec,
Andrew MacPherson17220c12014-03-05 10:12:43 +00002835 lldb::addr_t header_addr,
2836 size_t size_to_read)
Greg Claytonc9660542012-02-05 02:38:54 +00002837{
Jason Molenda08a32582015-07-25 02:39:42 +00002838 Log *log = lldb_private::GetLogIfAllCategoriesSet(LIBLLDB_LOG_HOST);
2839 if (log)
2840 {
2841 log->Printf ("Process::ReadModuleFromMemory reading %s binary from memory", file_spec.GetPath().c_str());
2842 }
Greg Claytonc7f09cc2012-02-24 21:55:59 +00002843 ModuleSP module_sp (new Module (file_spec, ArchSpec()));
Greg Claytonc9660542012-02-05 02:38:54 +00002844 if (module_sp)
2845 {
Greg Claytonc7f09cc2012-02-24 21:55:59 +00002846 Error error;
Andrew MacPherson17220c12014-03-05 10:12:43 +00002847 ObjectFile *objfile = module_sp->GetMemoryObjectFile (shared_from_this(), header_addr, error, size_to_read);
Greg Claytonc7f09cc2012-02-24 21:55:59 +00002848 if (objfile)
Greg Claytonc7f09cc2012-02-24 21:55:59 +00002849 return module_sp;
Greg Claytonc9660542012-02-05 02:38:54 +00002850 }
Greg Claytonc7f09cc2012-02-24 21:55:59 +00002851 return ModuleSP();
Greg Claytonc9660542012-02-05 02:38:54 +00002852}
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002853
Zachary Turner93749ab2015-03-03 21:51:25 +00002854bool
2855Process::GetLoadAddressPermissions (lldb::addr_t load_addr, uint32_t &permissions)
2856{
2857 MemoryRegionInfo range_info;
2858 permissions = 0;
2859 Error error (GetMemoryRegionInfo (load_addr, range_info));
2860 if (!error.Success())
2861 return false;
2862 if (range_info.GetReadable() == MemoryRegionInfo::eDontKnow
2863 || range_info.GetWritable() == MemoryRegionInfo::eDontKnow
2864 || range_info.GetExecutable() == MemoryRegionInfo::eDontKnow)
2865 {
2866 return false;
2867 }
2868
2869 if (range_info.GetReadable() == MemoryRegionInfo::eYes)
2870 permissions |= lldb::ePermissionsReadable;
2871
2872 if (range_info.GetWritable() == MemoryRegionInfo::eYes)
2873 permissions |= lldb::ePermissionsWritable;
2874
2875 if (range_info.GetExecutable() == MemoryRegionInfo::eYes)
2876 permissions |= lldb::ePermissionsExecutable;
2877
2878 return true;
2879}
2880
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002881Error
Jim Ingham1b5792e2012-12-18 02:03:49 +00002882Process::EnableWatchpoint (Watchpoint *watchpoint, bool notify)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002883{
2884 Error error;
2885 error.SetErrorString("watchpoints are not supported");
2886 return error;
2887}
2888
2889Error
Jim Ingham1b5792e2012-12-18 02:03:49 +00002890Process::DisableWatchpoint (Watchpoint *watchpoint, bool notify)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002891{
2892 Error error;
2893 error.SetErrorString("watchpoints are not supported");
2894 return error;
2895}
2896
2897StateType
Saleem Abdulrasool2d6a9ec2016-07-28 17:32:20 +00002898Process::WaitForProcessStopPrivate(const std::chrono::microseconds &timeout, EventSP &event_sp)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002899{
2900 StateType state;
2901 // Now wait for the process to launch and return control to us, and then
2902 // call DidLaunch:
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00002903 while (true)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002904 {
Greg Clayton6779606a2011-01-22 23:43:18 +00002905 event_sp.reset();
2906 state = WaitForStateChangedEventsPrivate (timeout, event_sp);
2907
Greg Clayton2637f822011-11-17 01:23:07 +00002908 if (StateIsStoppedState(state, false))
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002909 break;
Greg Clayton6779606a2011-01-22 23:43:18 +00002910
2911 // If state is invalid, then we timed out
2912 if (state == eStateInvalid)
2913 break;
2914
2915 if (event_sp)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002916 HandlePrivateEvent (event_sp);
2917 }
2918 return state;
2919}
2920
Greg Clayton332e8b12015-01-13 21:13:08 +00002921void
2922Process::LoadOperatingSystemPlugin(bool flush)
2923{
2924 if (flush)
2925 m_thread_list.Clear();
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00002926 m_os_ap.reset(OperatingSystem::FindPlugin(this, nullptr));
Greg Clayton332e8b12015-01-13 21:13:08 +00002927 if (flush)
2928 Flush();
2929}
2930
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002931Error
Greg Claytonfbb76342013-11-20 21:07:01 +00002932Process::Launch (ProcessLaunchInfo &launch_info)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002933{
2934 Error error;
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002935 m_abi_sp.reset();
Greg Clayton93d3c8332011-02-16 04:46:07 +00002936 m_dyld_ap.reset();
Andrew MacPherson17220c12014-03-05 10:12:43 +00002937 m_jit_loaders_ap.reset();
Jason Molendaeef51062013-11-05 03:57:19 +00002938 m_system_runtime_ap.reset();
Greg Clayton56d9a1b2011-08-22 02:49:39 +00002939 m_os_ap.reset();
Caroline Ticeef5c6d02010-11-16 05:07:41 +00002940 m_process_input_reader.reset();
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00002941 m_stop_info_override_callback = nullptr;
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002942
Zachary Turner7529df92015-09-01 20:02:29 +00002943 Module *exe_module = GetTarget().GetExecutableModulePointer();
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002944 if (exe_module)
2945 {
Greg Clayton2289fa42011-04-30 01:09:13 +00002946 char local_exec_file_path[PATH_MAX];
2947 char platform_exec_file_path[PATH_MAX];
2948 exe_module->GetFileSpec().GetPath(local_exec_file_path, sizeof(local_exec_file_path));
2949 exe_module->GetPlatformFileSpec().GetPath(platform_exec_file_path, sizeof(platform_exec_file_path));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002950 if (exe_module->GetFileSpec().Exists())
2951 {
Greg Claytonfbb76342013-11-20 21:07:01 +00002952 // Install anything that might need to be installed prior to launching.
2953 // For host systems, this will do nothing, but if we are connected to a
2954 // remote platform it will install any needed binaries
2955 error = GetTarget().Install(&launch_info);
2956 if (error.Fail())
2957 return error;
2958
Greg Clayton71337622011-02-24 22:24:29 +00002959 if (PrivateStateThreadIsValid ())
2960 PausePrivateStateThread ();
2961
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002962 error = WillLaunch (exe_module);
2963 if (error.Success())
2964 {
Jim Ingham221d51c2013-05-08 00:35:16 +00002965 const bool restarted = false;
2966 SetPublicState (eStateLaunching, restarted);
Greg Claytone24c4ac2011-11-17 04:46:02 +00002967 m_should_detach = false;
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002968
Ed Maste64fad602013-07-29 20:58:06 +00002969 if (m_public_run_lock.TrySetRunning())
Greg Clayton69fd4be2012-09-04 20:29:05 +00002970 {
2971 // Now launch using these arguments.
2972 error = DoLaunch (exe_module, launch_info);
2973 }
2974 else
2975 {
2976 // This shouldn't happen
2977 error.SetErrorString("failed to acquire process run lock");
2978 }
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002979
2980 if (error.Fail())
2981 {
2982 if (GetID() != LLDB_INVALID_PROCESS_ID)
2983 {
2984 SetID (LLDB_INVALID_PROCESS_ID);
2985 const char *error_string = error.AsCString();
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00002986 if (error_string == nullptr)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002987 error_string = "launch failed";
2988 SetExitStatus (-1, error_string);
2989 }
2990 }
2991 else
2992 {
2993 EventSP event_sp;
Saleem Abdulrasool2d6a9ec2016-07-28 17:32:20 +00002994 StateType state = WaitForProcessStopPrivate(std::chrono::seconds(10), event_sp);
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002995
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00002996 if (state == eStateInvalid || !event_sp)
Greg Clayton1a38ea72011-06-22 01:42:17 +00002997 {
2998 // We were able to launch the process, but we failed to
2999 // catch the initial stop.
Tamas Berghammer04e63142015-02-23 10:59:54 +00003000 error.SetErrorString ("failed to catch stop after launch");
Greg Clayton1a38ea72011-06-22 01:42:17 +00003001 SetExitStatus (0, "failed to catch stop after launch");
Jason Molendaede31932015-04-17 05:01:58 +00003002 Destroy(false);
Greg Clayton1a38ea72011-06-22 01:42:17 +00003003 }
3004 else if (state == eStateStopped || state == eStateCrashed)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003005 {
3006 DidLaunch ();
3007
Greg Claytonc859e2d2012-02-13 23:10:39 +00003008 DynamicLoader *dyld = GetDynamicLoader ();
3009 if (dyld)
3010 dyld->DidLaunch();
Greg Clayton93d3c8332011-02-16 04:46:07 +00003011
Andrew MacPhersoneb4d0602014-03-13 09:37:02 +00003012 GetJITLoaders().DidLaunch();
Andrew MacPherson17220c12014-03-05 10:12:43 +00003013
Jason Molendaeef51062013-11-05 03:57:19 +00003014 SystemRuntime *system_runtime = GetSystemRuntime ();
3015 if (system_runtime)
3016 system_runtime->DidLaunch();
3017
Greg Clayton332e8b12015-01-13 21:13:08 +00003018 LoadOperatingSystemPlugin(false);
Todd Fialaf72fa672014-10-07 16:05:21 +00003019
3020 // Note, the stop event was consumed above, but not handled. This was done
3021 // to give DidLaunch a chance to run. The target is either stopped or crashed.
3022 // Directly set the state. This is done to prevent a stop message with a bunch
3023 // of spurious output on thread status, as well as not pop a ProcessIOHandler.
3024 SetPublicState(state, false);
Greg Clayton71337622011-02-24 22:24:29 +00003025
3026 if (PrivateStateThreadIsValid ())
3027 ResumePrivateStateThread ();
3028 else
3029 StartPrivateStateThread ();
Greg Claytona97c4d22014-12-09 23:31:02 +00003030
3031 m_stop_info_override_callback = GetTarget().GetArchitecture().GetStopInfoOverrideCallback();
Ilia K6af632f2015-02-06 18:15:05 +00003032
3033 // Target was stopped at entry as was intended. Need to notify the listeners
3034 // about it.
Ilia K333fc182015-02-11 11:24:20 +00003035 if (state == eStateStopped && launch_info.GetFlags().Test(eLaunchFlagStopAtEntry))
Ilia K6af632f2015-02-06 18:15:05 +00003036 HandlePrivateEvent(event_sp);
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003037 }
3038 else if (state == eStateExited)
3039 {
3040 // We exited while trying to launch somehow. Don't call DidLaunch as that's
3041 // not likely to work, and return an invalid pid.
3042 HandlePrivateEvent (event_sp);
3043 }
3044 }
3045 }
3046 }
3047 else
3048 {
Greg Clayton86edbf42011-10-26 00:56:27 +00003049 error.SetErrorStringWithFormat("file doesn't exist: '%s'", local_exec_file_path);
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003050 }
3051 }
3052 return error;
3053}
3054
Greg Claytonc3776bf2012-02-09 06:16:32 +00003055Error
3056Process::LoadCore ()
3057{
3058 Error error = DoLoadCore();
3059 if (error.Success())
3060 {
Jim Ingham583bbb12016-03-07 21:50:25 +00003061 ListenerSP listener_sp (Listener::MakeListener("lldb.process.load_core_listener"));
3062 HijackProcessEvents(listener_sp);
Greg Clayton35824e32015-02-20 20:59:47 +00003063
Greg Claytonc3776bf2012-02-09 06:16:32 +00003064 if (PrivateStateThreadIsValid ())
3065 ResumePrivateStateThread ();
3066 else
3067 StartPrivateStateThread ();
3068
Greg Claytonc859e2d2012-02-13 23:10:39 +00003069 DynamicLoader *dyld = GetDynamicLoader ();
3070 if (dyld)
3071 dyld->DidAttach();
Andrew MacPherson17220c12014-03-05 10:12:43 +00003072
Andrew MacPhersoneb4d0602014-03-13 09:37:02 +00003073 GetJITLoaders().DidAttach();
Greg Claytonc859e2d2012-02-13 23:10:39 +00003074
Jason Molendaeef51062013-11-05 03:57:19 +00003075 SystemRuntime *system_runtime = GetSystemRuntime ();
3076 if (system_runtime)
3077 system_runtime->DidAttach();
3078
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00003079 m_os_ap.reset(OperatingSystem::FindPlugin(this, nullptr));
Greg Claytonc3776bf2012-02-09 06:16:32 +00003080 // We successfully loaded a core file, now pretend we stopped so we can
3081 // show all of the threads in the core file and explore the crashed
3082 // state.
3083 SetPrivateState (eStateStopped);
Greg Clayton35824e32015-02-20 20:59:47 +00003084
3085 // Wait indefinitely for a stopped event since we just posted one above...
3086 lldb::EventSP event_sp;
Saleem Abdulrasool2d6a9ec2016-07-28 17:32:20 +00003087 listener_sp->WaitForEvent(std::chrono::microseconds(0), event_sp);
Greg Clayton35824e32015-02-20 20:59:47 +00003088 StateType state = ProcessEventData::GetStateFromEvent(event_sp.get());
3089
3090 if (!StateIsStoppedState (state, false))
3091 {
3092 Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_PROCESS));
3093 if (log)
3094 log->Printf("Process::Halt() failed to stop, state is: %s", StateAsCString(state));
3095 error.SetErrorString ("Did not get stopped event after loading the core file.");
3096 }
Greg Clayton338d0bd2015-02-20 21:51:06 +00003097 RestoreProcessEvents ();
Greg Claytonc3776bf2012-02-09 06:16:32 +00003098 }
3099 return error;
3100}
3101
Greg Claytonc859e2d2012-02-13 23:10:39 +00003102DynamicLoader *
3103Process::GetDynamicLoader ()
3104{
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00003105 if (!m_dyld_ap)
3106 m_dyld_ap.reset(DynamicLoader::FindPlugin(this, nullptr));
Greg Claytonc859e2d2012-02-13 23:10:39 +00003107 return m_dyld_ap.get();
3108}
Greg Claytonc3776bf2012-02-09 06:16:32 +00003109
Todd Fialaaf245d12014-06-30 21:05:18 +00003110const lldb::DataBufferSP
3111Process::GetAuxvData()
3112{
3113 return DataBufferSP ();
3114}
3115
Andrew MacPherson17220c12014-03-05 10:12:43 +00003116JITLoaderList &
3117Process::GetJITLoaders ()
3118{
3119 if (!m_jit_loaders_ap)
3120 {
3121 m_jit_loaders_ap.reset(new JITLoaderList());
3122 JITLoader::LoadPlugins(this, *m_jit_loaders_ap);
3123 }
3124 return *m_jit_loaders_ap;
3125}
3126
Jason Molendaeef51062013-11-05 03:57:19 +00003127SystemRuntime *
3128Process::GetSystemRuntime ()
3129{
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00003130 if (!m_system_runtime_ap)
3131 m_system_runtime_ap.reset(SystemRuntime::FindPlugin(this));
Jason Molendaeef51062013-11-05 03:57:19 +00003132 return m_system_runtime_ap.get();
3133}
3134
Todd Fiala76e0fc92014-08-27 22:58:26 +00003135Process::AttachCompletionHandler::AttachCompletionHandler (Process *process, uint32_t exec_count) :
3136 NextEventAction (process),
3137 m_exec_count (exec_count)
3138{
3139 Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_PROCESS));
3140 if (log)
3141 log->Printf ("Process::AttachCompletionHandler::%s process=%p, exec_count=%" PRIu32, __FUNCTION__, static_cast<void*>(process), exec_count);
3142}
Greg Claytonc3776bf2012-02-09 06:16:32 +00003143
Jim Inghambb3a2832011-01-29 01:49:25 +00003144Process::NextEventAction::EventActionResult
3145Process::AttachCompletionHandler::PerformAction (lldb::EventSP &event_sp)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003146{
Todd Fiala76e0fc92014-08-27 22:58:26 +00003147 Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_PROCESS));
3148
Jim Inghambb3a2832011-01-29 01:49:25 +00003149 StateType state = ProcessEventData::GetStateFromEvent (event_sp.get());
Todd Fiala76e0fc92014-08-27 22:58:26 +00003150 if (log)
3151 log->Printf ("Process::AttachCompletionHandler::%s called with state %s (%d)", __FUNCTION__, StateAsCString(state), static_cast<int> (state));
3152
3153 switch (state)
Greg Clayton19388cf2010-10-18 01:45:30 +00003154 {
Zachary Turnerc62733b2015-05-20 18:31:17 +00003155 case eStateAttaching:
3156 return eEventActionSuccess;
3157
Greg Clayton513c26c2011-01-29 07:10:55 +00003158 case eStateRunning:
Greg Clayton71337622011-02-24 22:24:29 +00003159 case eStateConnected:
Greg Clayton513c26c2011-01-29 07:10:55 +00003160 return eEventActionRetry;
3161
3162 case eStateStopped:
3163 case eStateCrashed:
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00003164 // During attach, prior to sending the eStateStopped event,
3165 // lldb_private::Process subclasses must set the new process ID.
3166 assert (m_process->GetID() != LLDB_INVALID_PROCESS_ID);
3167 // We don't want these events to be reported, so go set the ShouldReportStop here:
3168 m_process->GetThreadList().SetShouldReportStop (eVoteNo);
3169
3170 if (m_exec_count > 0)
Greg Claytonc9ed4782011-11-12 02:10:56 +00003171 {
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00003172 --m_exec_count;
Todd Fiala76e0fc92014-08-27 22:58:26 +00003173
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00003174 if (log)
3175 log->Printf ("Process::AttachCompletionHandler::%s state %s: reduced remaining exec count to %" PRIu32 ", requesting resume", __FUNCTION__, StateAsCString(state), m_exec_count);
Todd Fiala76e0fc92014-08-27 22:58:26 +00003176
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00003177 RequestResume();
3178 return eEventActionRetry;
3179 }
3180 else
3181 {
3182 if (log)
3183 log->Printf ("Process::AttachCompletionHandler::%s state %s: no more execs expected to start, continuing with attach", __FUNCTION__, StateAsCString(state));
Todd Fiala76e0fc92014-08-27 22:58:26 +00003184
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00003185 m_process->CompleteAttach ();
3186 return eEventActionSuccess;
Greg Claytonc9ed4782011-11-12 02:10:56 +00003187 }
Greg Clayton513c26c2011-01-29 07:10:55 +00003188 break;
Greg Claytonc9ed4782011-11-12 02:10:56 +00003189
Greg Clayton513c26c2011-01-29 07:10:55 +00003190 default:
3191 case eStateExited:
3192 case eStateInvalid:
Greg Clayton513c26c2011-01-29 07:10:55 +00003193 break;
Jim Inghambb3a2832011-01-29 01:49:25 +00003194 }
Greg Claytonc9ed4782011-11-12 02:10:56 +00003195
3196 m_exit_string.assign ("No valid Process");
3197 return eEventActionExit;
Jim Inghambb3a2832011-01-29 01:49:25 +00003198}
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003199
Jim Inghambb3a2832011-01-29 01:49:25 +00003200Process::NextEventAction::EventActionResult
3201Process::AttachCompletionHandler::HandleBeingInterrupted()
3202{
3203 return eEventActionSuccess;
3204}
3205
3206const char *
3207Process::AttachCompletionHandler::GetExitString ()
3208{
3209 return m_exit_string.c_str();
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003210}
3211
Jim Ingham583bbb12016-03-07 21:50:25 +00003212ListenerSP
Greg Clayton8012cad2014-11-17 19:39:20 +00003213ProcessAttachInfo::GetListenerForProcess (Debugger &debugger)
3214{
Jim Ingham583bbb12016-03-07 21:50:25 +00003215 if (m_listener_sp)
3216 return m_listener_sp;
3217 else
3218 return debugger.GetListener();
Greg Clayton8012cad2014-11-17 19:39:20 +00003219}
3220
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003221Error
Greg Clayton144f3a92011-11-15 03:53:30 +00003222Process::Attach (ProcessAttachInfo &attach_info)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003223{
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003224 m_abi_sp.reset();
Caroline Ticeef5c6d02010-11-16 05:07:41 +00003225 m_process_input_reader.reset();
Greg Clayton93d3c8332011-02-16 04:46:07 +00003226 m_dyld_ap.reset();
Andrew MacPherson17220c12014-03-05 10:12:43 +00003227 m_jit_loaders_ap.reset();
Jason Molendaeef51062013-11-05 03:57:19 +00003228 m_system_runtime_ap.reset();
Greg Clayton56d9a1b2011-08-22 02:49:39 +00003229 m_os_ap.reset();
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00003230 m_stop_info_override_callback = nullptr;
Jim Ingham5aee1622010-08-09 23:31:02 +00003231
Greg Clayton144f3a92011-11-15 03:53:30 +00003232 lldb::pid_t attach_pid = attach_info.GetProcessID();
Greg Claytone996fd32011-03-08 22:40:15 +00003233 Error error;
Greg Clayton144f3a92011-11-15 03:53:30 +00003234 if (attach_pid == LLDB_INVALID_PROCESS_ID)
Jim Ingham5aee1622010-08-09 23:31:02 +00003235 {
Greg Clayton144f3a92011-11-15 03:53:30 +00003236 char process_name[PATH_MAX];
Jim Ingham4299fdb2011-09-15 01:10:17 +00003237
Greg Clayton144f3a92011-11-15 03:53:30 +00003238 if (attach_info.GetExecutableFile().GetPath (process_name, sizeof(process_name)))
Jim Ingham2ecb7422010-08-17 21:54:19 +00003239 {
Greg Clayton144f3a92011-11-15 03:53:30 +00003240 const bool wait_for_launch = attach_info.GetWaitForLaunch();
3241
3242 if (wait_for_launch)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003243 {
Greg Clayton144f3a92011-11-15 03:53:30 +00003244 error = WillAttachToProcessWithName(process_name, wait_for_launch);
3245 if (error.Success())
3246 {
Ed Maste64fad602013-07-29 20:58:06 +00003247 if (m_public_run_lock.TrySetRunning())
Greg Clayton926cce72012-10-12 16:10:12 +00003248 {
3249 m_should_detach = true;
Jim Ingham221d51c2013-05-08 00:35:16 +00003250 const bool restarted = false;
3251 SetPublicState (eStateAttaching, restarted);
Greg Clayton926cce72012-10-12 16:10:12 +00003252 // Now attach using these arguments.
Jean-Daniel Dupas9c517c02013-12-23 22:32:54 +00003253 error = DoAttachToProcessWithName (process_name, attach_info);
Greg Clayton926cce72012-10-12 16:10:12 +00003254 }
3255 else
3256 {
3257 // This shouldn't happen
3258 error.SetErrorString("failed to acquire process run lock");
3259 }
Greg Claytone24c4ac2011-11-17 04:46:02 +00003260
Greg Clayton144f3a92011-11-15 03:53:30 +00003261 if (error.Fail())
3262 {
3263 if (GetID() != LLDB_INVALID_PROCESS_ID)
3264 {
3265 SetID (LLDB_INVALID_PROCESS_ID);
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00003266 if (error.AsCString() == nullptr)
Greg Clayton144f3a92011-11-15 03:53:30 +00003267 error.SetErrorString("attach failed");
3268
3269 SetExitStatus(-1, error.AsCString());
3270 }
3271 }
3272 else
3273 {
3274 SetNextEventAction(new Process::AttachCompletionHandler(this, attach_info.GetResumeCount()));
3275 StartPrivateStateThread();
3276 }
3277 return error;
3278 }
Greg Claytone996fd32011-03-08 22:40:15 +00003279 }
Greg Clayton144f3a92011-11-15 03:53:30 +00003280 else
Greg Claytone996fd32011-03-08 22:40:15 +00003281 {
Greg Clayton144f3a92011-11-15 03:53:30 +00003282 ProcessInstanceInfoList process_infos;
Zachary Turner7529df92015-09-01 20:02:29 +00003283 PlatformSP platform_sp (GetTarget().GetPlatform ());
Greg Clayton144f3a92011-11-15 03:53:30 +00003284
3285 if (platform_sp)
3286 {
3287 ProcessInstanceInfoMatch match_info;
3288 match_info.GetProcessInfo() = attach_info;
3289 match_info.SetNameMatchType (eNameMatchEquals);
3290 platform_sp->FindProcesses (match_info, process_infos);
3291 const uint32_t num_matches = process_infos.GetSize();
3292 if (num_matches == 1)
3293 {
3294 attach_pid = process_infos.GetProcessIDAtIndex(0);
3295 // Fall through and attach using the above process ID
3296 }
3297 else
3298 {
3299 match_info.GetProcessInfo().GetExecutableFile().GetPath (process_name, sizeof(process_name));
3300 if (num_matches > 1)
Jim Ingham368ac222014-08-15 17:05:27 +00003301 {
3302 StreamString s;
3303 ProcessInstanceInfo::DumpTableHeader (s, platform_sp.get(), true, false);
3304 for (size_t i = 0; i < num_matches; i++)
3305 {
3306 process_infos.GetProcessInfoAtIndex(i).DumpAsTableRow(s, platform_sp.get(), true, false);
3307 }
3308 error.SetErrorStringWithFormat ("more than one process named %s:\n%s",
3309 process_name,
3310 s.GetData());
3311 }
Greg Clayton144f3a92011-11-15 03:53:30 +00003312 else
3313 error.SetErrorStringWithFormat ("could not find a process named %s", process_name);
3314 }
3315 }
3316 else
3317 {
3318 error.SetErrorString ("invalid platform, can't find processes by name");
3319 return error;
3320 }
Greg Claytone996fd32011-03-08 22:40:15 +00003321 }
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003322 }
3323 else
Greg Clayton144f3a92011-11-15 03:53:30 +00003324 {
3325 error.SetErrorString ("invalid process name");
Greg Claytone996fd32011-03-08 22:40:15 +00003326 }
3327 }
Greg Clayton144f3a92011-11-15 03:53:30 +00003328
3329 if (attach_pid != LLDB_INVALID_PROCESS_ID)
Greg Claytone996fd32011-03-08 22:40:15 +00003330 {
Greg Clayton144f3a92011-11-15 03:53:30 +00003331 error = WillAttachToProcessWithID(attach_pid);
Greg Claytone996fd32011-03-08 22:40:15 +00003332 if (error.Success())
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003333 {
Greg Clayton144f3a92011-11-15 03:53:30 +00003334
Ed Maste64fad602013-07-29 20:58:06 +00003335 if (m_public_run_lock.TrySetRunning())
Greg Clayton926cce72012-10-12 16:10:12 +00003336 {
3337 // Now attach using these arguments.
3338 m_should_detach = true;
Jim Ingham221d51c2013-05-08 00:35:16 +00003339 const bool restarted = false;
3340 SetPublicState (eStateAttaching, restarted);
Greg Clayton926cce72012-10-12 16:10:12 +00003341 error = DoAttachToProcessWithID (attach_pid, attach_info);
3342 }
3343 else
3344 {
3345 // This shouldn't happen
3346 error.SetErrorString("failed to acquire process run lock");
3347 }
3348
Greg Clayton144f3a92011-11-15 03:53:30 +00003349 if (error.Success())
3350 {
Greg Clayton144f3a92011-11-15 03:53:30 +00003351 SetNextEventAction(new Process::AttachCompletionHandler(this, attach_info.GetResumeCount()));
3352 StartPrivateStateThread();
3353 }
3354 else
Greg Claytone996fd32011-03-08 22:40:15 +00003355 {
3356 if (GetID() != LLDB_INVALID_PROCESS_ID)
Greg Claytone996fd32011-03-08 22:40:15 +00003357 SetID (LLDB_INVALID_PROCESS_ID);
Greg Claytone996fd32011-03-08 22:40:15 +00003358
Oleksiy Vyalov5d064742014-11-19 18:27:45 +00003359 const char *error_string = error.AsCString();
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00003360 if (error_string == nullptr)
Oleksiy Vyalov5d064742014-11-19 18:27:45 +00003361 error_string = "attach failed";
3362
3363 SetExitStatus(-1, error_string);
Greg Claytone996fd32011-03-08 22:40:15 +00003364 }
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003365 }
3366 }
3367 return error;
3368}
3369
Greg Clayton93d3c8332011-02-16 04:46:07 +00003370void
3371Process::CompleteAttach ()
3372{
Jason Molenda7d002762016-04-07 22:00:55 +00003373 Log *log(lldb_private::GetLogIfAnyCategoriesSet (LIBLLDB_LOG_PROCESS | LIBLLDB_LOG_TARGET));
Todd Fiala76e0fc92014-08-27 22:58:26 +00003374 if (log)
3375 log->Printf ("Process::%s()", __FUNCTION__);
3376
Greg Clayton93d3c8332011-02-16 04:46:07 +00003377 // Let the process subclass figure out at much as it can about the process
3378 // before we go looking for a dynamic loader plug-in.
Jim Inghambb006ce2014-08-02 00:33:35 +00003379 ArchSpec process_arch;
3380 DidAttach(process_arch);
3381
3382 if (process_arch.IsValid())
Todd Fiala76e0fc92014-08-27 22:58:26 +00003383 {
Zachary Turner7529df92015-09-01 20:02:29 +00003384 GetTarget().SetArchitecture(process_arch);
Todd Fiala76e0fc92014-08-27 22:58:26 +00003385 if (log)
3386 {
3387 const char *triple_str = process_arch.GetTriple().getTriple().c_str ();
3388 log->Printf ("Process::%s replacing process architecture with DidAttach() architecture: %s",
3389 __FUNCTION__,
3390 triple_str ? triple_str : "<null>");
3391 }
3392 }
Greg Clayton93d3c8332011-02-16 04:46:07 +00003393
Jim Ingham4299fdb2011-09-15 01:10:17 +00003394 // We just attached. If we have a platform, ask it for the process architecture, and if it isn't
3395 // the same as the one we've already set, switch architectures.
Zachary Turner7529df92015-09-01 20:02:29 +00003396 PlatformSP platform_sp (GetTarget().GetPlatform ());
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00003397 assert(platform_sp);
Jim Ingham4299fdb2011-09-15 01:10:17 +00003398 if (platform_sp)
3399 {
Zachary Turner7529df92015-09-01 20:02:29 +00003400 const ArchSpec &target_arch = GetTarget().GetArchitecture();
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00003401 if (target_arch.IsValid() && !platform_sp->IsCompatibleArchitecture(target_arch, false, nullptr))
Greg Clayton70512312012-05-08 01:45:38 +00003402 {
3403 ArchSpec platform_arch;
3404 platform_sp = platform_sp->GetPlatformForArchitecture (target_arch, &platform_arch);
3405 if (platform_sp)
3406 {
Zachary Turner7529df92015-09-01 20:02:29 +00003407 GetTarget().SetPlatform (platform_sp);
3408 GetTarget().SetArchitecture(platform_arch);
Todd Fiala76e0fc92014-08-27 22:58:26 +00003409 if (log)
3410 log->Printf ("Process::%s switching platform to %s and architecture to %s based on info from attach", __FUNCTION__, platform_sp->GetName().AsCString (""), platform_arch.GetTriple().getTriple().c_str ());
Greg Clayton70512312012-05-08 01:45:38 +00003411 }
3412 }
Jim Inghambb006ce2014-08-02 00:33:35 +00003413 else if (!process_arch.IsValid())
Greg Clayton70512312012-05-08 01:45:38 +00003414 {
3415 ProcessInstanceInfo process_info;
Pavel Labatha933d512016-04-05 13:07:16 +00003416 GetProcessInfo(process_info);
Greg Clayton70512312012-05-08 01:45:38 +00003417 const ArchSpec &process_arch = process_info.GetArchitecture();
Zachary Turner7529df92015-09-01 20:02:29 +00003418 if (process_arch.IsValid() && !GetTarget().GetArchitecture().IsExactMatch(process_arch))
Todd Fiala76e0fc92014-08-27 22:58:26 +00003419 {
Zachary Turner7529df92015-09-01 20:02:29 +00003420 GetTarget().SetArchitecture (process_arch);
Todd Fiala76e0fc92014-08-27 22:58:26 +00003421 if (log)
3422 log->Printf ("Process::%s switching architecture to %s based on info the platform retrieved for pid %" PRIu64, __FUNCTION__, process_arch.GetTriple().getTriple().c_str (), GetID ());
3423 }
Greg Clayton70512312012-05-08 01:45:38 +00003424 }
Jim Ingham4299fdb2011-09-15 01:10:17 +00003425 }
3426
3427 // We have completed the attach, now it is time to find the dynamic loader
Greg Clayton93d3c8332011-02-16 04:46:07 +00003428 // plug-in
Greg Claytonc859e2d2012-02-13 23:10:39 +00003429 DynamicLoader *dyld = GetDynamicLoader ();
3430 if (dyld)
Todd Fiala76e0fc92014-08-27 22:58:26 +00003431 {
Greg Claytonc859e2d2012-02-13 23:10:39 +00003432 dyld->DidAttach();
Todd Fiala76e0fc92014-08-27 22:58:26 +00003433 if (log)
3434 {
Zachary Turner7529df92015-09-01 20:02:29 +00003435 ModuleSP exe_module_sp = GetTarget().GetExecutableModule ();
Todd Fiala76e0fc92014-08-27 22:58:26 +00003436 log->Printf ("Process::%s after DynamicLoader::DidAttach(), target executable is %s (using %s plugin)",
3437 __FUNCTION__,
3438 exe_module_sp ? exe_module_sp->GetFileSpec().GetPath().c_str () : "<none>",
3439 dyld->GetPluginName().AsCString ("<unnamed>"));
3440 }
3441 }
Greg Clayton93d3c8332011-02-16 04:46:07 +00003442
Andrew MacPhersoneb4d0602014-03-13 09:37:02 +00003443 GetJITLoaders().DidAttach();
Andrew MacPherson17220c12014-03-05 10:12:43 +00003444
Jason Molendaeef51062013-11-05 03:57:19 +00003445 SystemRuntime *system_runtime = GetSystemRuntime ();
3446 if (system_runtime)
Todd Fiala76e0fc92014-08-27 22:58:26 +00003447 {
Jason Molendaeef51062013-11-05 03:57:19 +00003448 system_runtime->DidAttach();
Todd Fiala76e0fc92014-08-27 22:58:26 +00003449 if (log)
3450 {
Zachary Turner7529df92015-09-01 20:02:29 +00003451 ModuleSP exe_module_sp = GetTarget().GetExecutableModule ();
Todd Fiala76e0fc92014-08-27 22:58:26 +00003452 log->Printf ("Process::%s after SystemRuntime::DidAttach(), target executable is %s (using %s plugin)",
3453 __FUNCTION__,
3454 exe_module_sp ? exe_module_sp->GetFileSpec().GetPath().c_str () : "<none>",
3455 system_runtime->GetPluginName().AsCString("<unnamed>"));
3456 }
3457 }
Jason Molendaeef51062013-11-05 03:57:19 +00003458
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00003459 m_os_ap.reset(OperatingSystem::FindPlugin(this, nullptr));
Greg Clayton93d3c8332011-02-16 04:46:07 +00003460 // Figure out which one is the executable, and set that in our target:
Zachary Turner7529df92015-09-01 20:02:29 +00003461 const ModuleList &target_modules = GetTarget().GetImages();
Saleem Abdulrasoolbb19a132016-05-19 05:13:57 +00003462 std::lock_guard<std::recursive_mutex> guard(target_modules.GetMutex());
Jim Ingham3ee12ef2012-05-30 02:19:25 +00003463 size_t num_modules = target_modules.GetSize();
3464 ModuleSP new_executable_module_sp;
Greg Clayton93d3c8332011-02-16 04:46:07 +00003465
Andy Gibbsa297a972013-06-19 19:04:53 +00003466 for (size_t i = 0; i < num_modules; i++)
Greg Clayton93d3c8332011-02-16 04:46:07 +00003467 {
Jim Ingham3ee12ef2012-05-30 02:19:25 +00003468 ModuleSP module_sp (target_modules.GetModuleAtIndexUnlocked (i));
Greg Clayton8b82f082011-04-12 05:54:46 +00003469 if (module_sp && module_sp->IsExecutable())
Greg Clayton93d3c8332011-02-16 04:46:07 +00003470 {
Zachary Turner7529df92015-09-01 20:02:29 +00003471 if (GetTarget().GetExecutableModulePointer() != module_sp.get())
Jim Ingham3ee12ef2012-05-30 02:19:25 +00003472 new_executable_module_sp = module_sp;
Greg Clayton93d3c8332011-02-16 04:46:07 +00003473 break;
3474 }
3475 }
Jim Ingham3ee12ef2012-05-30 02:19:25 +00003476 if (new_executable_module_sp)
Todd Fiala76e0fc92014-08-27 22:58:26 +00003477 {
Zachary Turner7529df92015-09-01 20:02:29 +00003478 GetTarget().SetExecutableModule (new_executable_module_sp, false);
Todd Fiala76e0fc92014-08-27 22:58:26 +00003479 if (log)
3480 {
Zachary Turner7529df92015-09-01 20:02:29 +00003481 ModuleSP exe_module_sp = GetTarget().GetExecutableModule ();
Todd Fiala76e0fc92014-08-27 22:58:26 +00003482 log->Printf ("Process::%s after looping through modules, target executable is %s",
3483 __FUNCTION__,
3484 exe_module_sp ? exe_module_sp->GetFileSpec().GetPath().c_str () : "<none>");
3485 }
3486 }
Greg Claytona97c4d22014-12-09 23:31:02 +00003487
3488 m_stop_info_override_callback = process_arch.GetStopInfoOverrideCallback();
Greg Clayton93d3c8332011-02-16 04:46:07 +00003489}
3490
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003491Error
Jason Molenda4bd4e7e2012-09-29 04:02:01 +00003492Process::ConnectRemote (Stream *strm, const char *remote_url)
Greg Claytonb766a732011-02-04 01:58:07 +00003493{
Greg Claytonb766a732011-02-04 01:58:07 +00003494 m_abi_sp.reset();
3495 m_process_input_reader.reset();
3496
3497 // Find the process and its architecture. Make sure it matches the architecture
3498 // of the current Target, and if not adjust it.
3499
Jason Molenda4bd4e7e2012-09-29 04:02:01 +00003500 Error error (DoConnectRemote (strm, remote_url));
Greg Claytonb766a732011-02-04 01:58:07 +00003501 if (error.Success())
3502 {
Greg Clayton71337622011-02-24 22:24:29 +00003503 if (GetID() != LLDB_INVALID_PROCESS_ID)
3504 {
Greg Clayton32e0a752011-03-30 18:16:51 +00003505 EventSP event_sp;
Saleem Abdulrasool2d6a9ec2016-07-28 17:32:20 +00003506 StateType state = WaitForProcessStopPrivate(std::chrono::microseconds(0), event_sp);
3507
Greg Clayton32e0a752011-03-30 18:16:51 +00003508 if (state == eStateStopped || state == eStateCrashed)
3509 {
3510 // If we attached and actually have a process on the other end, then
3511 // this ended up being the equivalent of an attach.
3512 CompleteAttach ();
3513
3514 // This delays passing the stopped event to listeners till
3515 // CompleteAttach gets a chance to complete...
3516 HandlePrivateEvent (event_sp);
Greg Clayton32e0a752011-03-30 18:16:51 +00003517 }
Greg Clayton71337622011-02-24 22:24:29 +00003518 }
Greg Clayton32e0a752011-03-30 18:16:51 +00003519
3520 if (PrivateStateThreadIsValid ())
3521 ResumePrivateStateThread ();
3522 else
3523 StartPrivateStateThread ();
Greg Claytonb766a732011-02-04 01:58:07 +00003524 }
3525 return error;
3526}
3527
Greg Claytonb766a732011-02-04 01:58:07 +00003528Error
Jim Ingham3b8285d2012-04-19 01:40:33 +00003529Process::PrivateResume ()
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003530{
Greg Clayton5160ce52013-03-27 23:08:40 +00003531 Log *log(lldb_private::GetLogIfAnyCategoriesSet (LIBLLDB_LOG_PROCESS|LIBLLDB_LOG_STEP));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003532 if (log)
Jim Ingham0161b492013-02-09 01:29:05 +00003533 log->Printf("Process::PrivateResume() m_stop_id = %u, public state: %s private state: %s",
Jim Ingham4b536182011-08-09 02:12:22 +00003534 m_mod_id.GetStopID(),
Jim Ingham444586b2011-01-24 06:34:17 +00003535 StateAsCString(m_public_state.GetValue()),
3536 StateAsCString(m_private_state.GetValue()));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003537
3538 Error error (WillResume());
3539 // Tell the process it is about to resume before the thread list
3540 if (error.Success())
3541 {
Johnny Chenc4221e42010-12-02 20:53:05 +00003542 // Now let the thread list know we are about to resume so it
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003543 // can let all of our threads know that they are about to be
3544 // resumed. Threads will each be called with
3545 // Thread::WillResume(StateType) where StateType contains the state
3546 // that they are supposed to have when the process is resumed
3547 // (suspended/running/stepping). Threads should also check
3548 // their resume signal in lldb::Thread::GetResumeSignal()
Jim Ingham221d51c2013-05-08 00:35:16 +00003549 // to see if they are supposed to start back up with a signal.
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003550 if (m_thread_list.WillResume())
3551 {
Jim Ingham372787f2012-04-07 00:00:41 +00003552 // Last thing, do the PreResumeActions.
3553 if (!RunPreResumeActions())
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003554 {
Jim Ingham0161b492013-02-09 01:29:05 +00003555 error.SetErrorStringWithFormat ("Process::PrivateResume PreResumeActions failed, not resuming.");
Jim Ingham372787f2012-04-07 00:00:41 +00003556 }
3557 else
3558 {
3559 m_mod_id.BumpResumeID();
3560 error = DoResume();
3561 if (error.Success())
3562 {
3563 DidResume();
3564 m_thread_list.DidResume();
3565 if (log)
3566 log->Printf ("Process thinks the process has resumed.");
3567 }
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003568 }
3569 }
3570 else
3571 {
Jim Inghamd5ac1ab2015-01-19 23:51:51 +00003572 // Somebody wanted to run without running (e.g. we were faking a step from one frame of a set of inlined
3573 // frames that share the same PC to another.) So generate a continue & a stopped event,
Jim Ingham513c6bb2012-09-01 01:02:41 +00003574 // and let the world handle them.
3575 if (log)
3576 log->Printf ("Process::PrivateResume() asked to simulate a start & stop.");
3577
3578 SetPrivateState(eStateRunning);
3579 SetPrivateState(eStateStopped);
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003580 }
3581 }
Jim Ingham444586b2011-01-24 06:34:17 +00003582 else if (log)
Jim Ingham0161b492013-02-09 01:29:05 +00003583 log->Printf ("Process::PrivateResume() got an error \"%s\".", error.AsCString("<unknown error>"));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003584 return error;
3585}
3586
3587Error
Pavel Labath19da1f12015-12-07 12:36:52 +00003588Process::Halt (bool clear_thread_plans, bool use_run_lock)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003589{
Pavel Labath19da1f12015-12-07 12:36:52 +00003590 if (! StateIsRunningState(m_public_state.GetValue()))
3591 return Error("Process is not running.");
3592
Greg Claytonf9b57b92013-05-10 23:48:10 +00003593 // Don't clear the m_clear_thread_plans_on_stop, only set it to true if
3594 // in case it was already set and some thread plan logic calls halt on its
3595 // own.
3596 m_clear_thread_plans_on_stop |= clear_thread_plans;
3597
Jim Ingham583bbb12016-03-07 21:50:25 +00003598 ListenerSP halt_listener_sp (Listener::MakeListener("lldb.process.halt_listener"));
3599 HijackProcessEvents(halt_listener_sp);
Greg Clayton3af9ea52010-11-18 05:57:03 +00003600
Jim Inghambb3a2832011-01-29 01:49:25 +00003601 EventSP event_sp;
Jim Inghambb3a2832011-01-29 01:49:25 +00003602
Pavel Labath19da1f12015-12-07 12:36:52 +00003603 SendAsyncInterrupt();
3604
3605 if (m_public_state.GetValue() == eStateAttaching)
Jim Inghambb3a2832011-01-29 01:49:25 +00003606 {
Pavel Labath19da1f12015-12-07 12:36:52 +00003607 // Don't hijack and eat the eStateExited as the code that was doing
3608 // the attach will be waiting for this event...
3609 RestoreProcessEvents();
3610 SetExitStatus(SIGKILL, "Cancelled async attach.");
3611 Destroy (false);
3612 return Error();
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003613 }
Jim Inghambb3a2832011-01-29 01:49:25 +00003614
Pavel Labath19da1f12015-12-07 12:36:52 +00003615 // Wait for 10 second for the process to stop.
Saleem Abdulrasool2d6a9ec2016-07-28 17:32:20 +00003616 StateType state =
3617 WaitForProcessToStop(std::chrono::seconds(10), &event_sp, true, halt_listener_sp, nullptr, use_run_lock);
Pavel Labath19da1f12015-12-07 12:36:52 +00003618 RestoreProcessEvents();
Jim Inghambb3a2832011-01-29 01:49:25 +00003619
Pavel Labath19da1f12015-12-07 12:36:52 +00003620 if (state == eStateInvalid || ! event_sp)
3621 {
3622 // We timed out and didn't get a stop event...
3623 return Error("Halt timed out. State = %s", StateAsCString(GetState()));
3624 }
3625
3626 BroadcastEvent(event_sp);
3627
3628 return Error();
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003629}
3630
3631Error
Pavel Labathfcc7f662015-10-07 15:11:11 +00003632Process::StopForDestroyOrDetach(lldb::EventSP &exit_event_sp)
Jim Ingham8af3b9c2013-03-29 01:18:12 +00003633{
3634 Error error;
Jim Ingham0f5f7652016-07-26 19:47:45 +00003635
3636 // Check both the public & private states here. If we're hung evaluating an expression, for instance, then
3637 // the public state will be stopped, but we still need to interrupt.
3638 if (m_public_state.GetValue() == eStateRunning || m_private_state.GetValue() == eStateRunning)
Jim Ingham8af3b9c2013-03-29 01:18:12 +00003639 {
3640 Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_PROCESS));
3641 if (log)
Pavel Labathfcc7f662015-10-07 15:11:11 +00003642 log->Printf("Process::%s() About to stop.", __FUNCTION__);
3643
Jim Ingham583bbb12016-03-07 21:50:25 +00003644 ListenerSP listener_sp (Listener::MakeListener("lldb.Process.StopForDestroyOrDetach.hijack"));
3645 HijackProcessEvents(listener_sp);
Pavel Labathfcc7f662015-10-07 15:11:11 +00003646
3647 SendAsyncInterrupt();
3648
3649 // Consume the interrupt event.
Saleem Abdulrasool2d6a9ec2016-07-28 17:32:20 +00003650 StateType state = WaitForProcessToStop(std::chrono::seconds(10), &exit_event_sp, true, listener_sp);
Pavel Labathfcc7f662015-10-07 15:11:11 +00003651
3652 RestoreProcessEvents();
3653
3654 // If the process exited while we were waiting for it to stop, put the exited event into
3655 // the shared pointer passed in and return. Our caller doesn't need to do anything else, since
3656 // they don't have a process anymore...
3657
3658 if (state == eStateExited || m_private_state.GetValue() == eStateExited)
Pavel Labathc8c77d42015-09-28 09:37:51 +00003659 {
3660 if (log)
Pavel Labathfcc7f662015-10-07 15:11:11 +00003661 log->Printf("Process::%s() Process exited while waiting to stop.", __FUNCTION__);
3662 return error;
3663 }
3664 else
3665 exit_event_sp.reset(); // It is ok to consume any non-exit stop events
3666
3667 if (state != eStateStopped)
3668 {
3669 if (log)
3670 log->Printf("Process::%s() failed to stop, state is: %s", __FUNCTION__, StateAsCString(state));
3671 // If we really couldn't stop the process then we should just error out here, but if the
3672 // lower levels just bobbled sending the event and we really are stopped, then continue on.
3673 StateType private_state = m_private_state.GetValue();
3674 if (private_state != eStateStopped)
3675 {
Jim Ingham1d107722016-06-28 16:35:58 +00003676 return Error("Attempt to stop the target in order to detach timed out. State = %s", StateAsCString(GetState()));
Pavel Labathfcc7f662015-10-07 15:11:11 +00003677 }
Jim Ingham8af3b9c2013-03-29 01:18:12 +00003678 }
3679 }
3680 return error;
3681}
3682
3683Error
Jim Inghamacff8952013-05-02 00:27:30 +00003684Process::Detach (bool keep_stopped)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003685{
Jim Ingham8af3b9c2013-03-29 01:18:12 +00003686 EventSP exit_event_sp;
3687 Error error;
3688 m_destroy_in_process = true;
3689
3690 error = WillDetach();
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003691
3692 if (error.Success())
3693 {
Jim Ingham8af3b9c2013-03-29 01:18:12 +00003694 if (DetachRequiresHalt())
3695 {
Pavel Labathfcc7f662015-10-07 15:11:11 +00003696 error = StopForDestroyOrDetach (exit_event_sp);
Jim Ingham8af3b9c2013-03-29 01:18:12 +00003697 if (!error.Success())
3698 {
3699 m_destroy_in_process = false;
3700 return error;
3701 }
3702 else if (exit_event_sp)
3703 {
3704 // We shouldn't need to do anything else here. There's no process left to detach from...
3705 StopPrivateStateThread();
3706 m_destroy_in_process = false;
3707 return error;
3708 }
3709 }
3710
Andrew MacPhersonc3826b52014-03-25 19:59:36 +00003711 m_thread_list.DiscardThreadPlans();
3712 DisableAllBreakpointSites();
3713
Jim Inghamacff8952013-05-02 00:27:30 +00003714 error = DoDetach(keep_stopped);
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003715 if (error.Success())
3716 {
3717 DidDetach();
3718 StopPrivateStateThread();
3719 }
Jim Inghamacff8952013-05-02 00:27:30 +00003720 else
3721 {
3722 return error;
3723 }
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003724 }
Jim Ingham8af3b9c2013-03-29 01:18:12 +00003725 m_destroy_in_process = false;
3726
3727 // If we exited when we were waiting for a process to stop, then
3728 // forward the event here so we don't lose the event
3729 if (exit_event_sp)
3730 {
3731 // Directly broadcast our exited event because we shut down our
3732 // private state thread above
3733 BroadcastEvent(exit_event_sp);
3734 }
3735
3736 // If we have been interrupted (to kill us) in the middle of running, we may not end up propagating
3737 // the last events through the event system, in which case we might strand the write lock. Unlock
3738 // it here so when we do to tear down the process we don't get an error destroying the lock.
3739
Ed Maste64fad602013-07-29 20:58:06 +00003740 m_public_run_lock.SetStopped();
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003741 return error;
3742}
3743
3744Error
Jason Molendaede31932015-04-17 05:01:58 +00003745Process::Destroy (bool force_kill)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003746{
Pavel Labath19da1f12015-12-07 12:36:52 +00003747
Jim Ingham09437922013-03-01 20:04:25 +00003748 // Tell ourselves we are in the process of destroying the process, so that we don't do any unnecessary work
3749 // that might hinder the destruction. Remember to set this back to false when we are done. That way if the attempt
3750 // failed and the process stays around for some reason it won't be in a confused state.
Jason Molendaede31932015-04-17 05:01:58 +00003751
3752 if (force_kill)
3753 m_should_detach = false;
Jim Ingham09437922013-03-01 20:04:25 +00003754
Ilia Kfcc89a02015-03-26 07:08:47 +00003755 if (GetShouldDetach())
3756 {
3757 // FIXME: This will have to be a process setting:
3758 bool keep_stopped = false;
3759 Detach(keep_stopped);
3760 }
3761
Jim Ingham09437922013-03-01 20:04:25 +00003762 m_destroy_in_process = true;
3763
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003764 Error error (WillDestroy());
3765 if (error.Success())
3766 {
Greg Clayton85fb1b92012-09-11 02:33:37 +00003767 EventSP exit_event_sp;
Jim Ingham8af3b9c2013-03-29 01:18:12 +00003768 if (DestroyRequiresHalt())
Jim Ingham04e0a222012-05-23 15:46:31 +00003769 {
Pavel Labathfcc7f662015-10-07 15:11:11 +00003770 error = StopForDestroyOrDetach(exit_event_sp);
Jim Ingham04e0a222012-05-23 15:46:31 +00003771 }
Jim Ingham8af3b9c2013-03-29 01:18:12 +00003772
Jim Inghamaacc3182012-06-06 00:29:30 +00003773 if (m_public_state.GetValue() != eStateRunning)
3774 {
3775 // Ditch all thread plans, and remove all our breakpoints: in case we have to restart the target to
3776 // kill it, we don't want it hitting a breakpoint...
3777 // Only do this if we've stopped, however, since if we didn't manage to halt it above, then
3778 // we're not going to have much luck doing this now.
3779 m_thread_list.DiscardThreadPlans();
3780 DisableAllBreakpointSites();
3781 }
Jim Ingham8af3b9c2013-03-29 01:18:12 +00003782
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003783 error = DoDestroy();
3784 if (error.Success())
3785 {
3786 DidDestroy();
3787 StopPrivateStateThread();
3788 }
Caroline Ticeef5c6d02010-11-16 05:07:41 +00003789 m_stdio_communication.Disconnect();
Greg Clayton23d54f42015-06-03 00:34:01 +00003790 m_stdio_communication.StopReadThread();
Vince Harrondf3f00f2015-02-10 21:09:04 +00003791 m_stdin_forward = false;
Greg Claytonb4874f12014-02-28 18:22:24 +00003792
Caroline Ticeef5c6d02010-11-16 05:07:41 +00003793 if (m_process_input_reader)
Greg Claytonb4874f12014-02-28 18:22:24 +00003794 {
3795 m_process_input_reader->SetIsDone(true);
3796 m_process_input_reader->Cancel();
Caroline Ticeef5c6d02010-11-16 05:07:41 +00003797 m_process_input_reader.reset();
Greg Claytonb4874f12014-02-28 18:22:24 +00003798 }
3799
Greg Clayton85fb1b92012-09-11 02:33:37 +00003800 // If we exited when we were waiting for a process to stop, then
3801 // forward the event here so we don't lose the event
3802 if (exit_event_sp)
3803 {
3804 // Directly broadcast our exited event because we shut down our
3805 // private state thread above
3806 BroadcastEvent(exit_event_sp);
3807 }
3808
Jim Inghamb1e2e842012-04-12 18:49:31 +00003809 // If we have been interrupted (to kill us) in the middle of running, we may not end up propagating
3810 // the last events through the event system, in which case we might strand the write lock. Unlock
3811 // it here so when we do to tear down the process we don't get an error destroying the lock.
Ed Maste64fad602013-07-29 20:58:06 +00003812 m_public_run_lock.SetStopped();
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003813 }
Jim Ingham09437922013-03-01 20:04:25 +00003814
3815 m_destroy_in_process = false;
3816
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003817 return error;
3818}
3819
3820Error
3821Process::Signal (int signal)
3822{
3823 Error error (WillSignal());
3824 if (error.Success())
3825 {
3826 error = DoSignal(signal);
3827 if (error.Success())
3828 DidSignal();
3829 }
3830 return error;
3831}
3832
Zachary Turner93749ab2015-03-03 21:51:25 +00003833void
Chaoren Linc963a222015-09-01 16:58:45 +00003834Process::SetUnixSignals(UnixSignalsSP &&signals_sp)
Zachary Turner93749ab2015-03-03 21:51:25 +00003835{
3836 assert (signals_sp && "null signals_sp");
3837 m_unix_signals_sp = signals_sp;
3838}
3839
Chaoren Lin98d0a4b2015-07-14 01:09:28 +00003840const lldb::UnixSignalsSP &
Zachary Turner93749ab2015-03-03 21:51:25 +00003841Process::GetUnixSignals ()
3842{
3843 assert (m_unix_signals_sp && "null m_unix_signals_sp");
Chaoren Lin98d0a4b2015-07-14 01:09:28 +00003844 return m_unix_signals_sp;
Zachary Turner93749ab2015-03-03 21:51:25 +00003845}
3846
Greg Clayton514487e2011-02-15 21:59:32 +00003847lldb::ByteOrder
3848Process::GetByteOrder () const
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003849{
Zachary Turner7529df92015-09-01 20:02:29 +00003850 return GetTarget().GetArchitecture().GetByteOrder();
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003851}
3852
3853uint32_t
Greg Clayton514487e2011-02-15 21:59:32 +00003854Process::GetAddressByteSize () const
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003855{
Zachary Turner7529df92015-09-01 20:02:29 +00003856 return GetTarget().GetArchitecture().GetAddressByteSize();
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003857}
3858
3859bool
3860Process::ShouldBroadcastEvent (Event *event_ptr)
3861{
3862 const StateType state = Process::ProcessEventData::GetStateFromEvent (event_ptr);
3863 bool return_value = true;
Greg Clayton5160ce52013-03-27 23:08:40 +00003864 Log *log(lldb_private::GetLogIfAnyCategoriesSet(LIBLLDB_LOG_EVENTS | LIBLLDB_LOG_PROCESS));
Jim Ingham0161b492013-02-09 01:29:05 +00003865
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003866 switch (state)
3867 {
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003868 case eStateDetached:
3869 case eStateExited:
3870 case eStateUnloaded:
Pavel Labath3f5df532015-03-12 10:12:41 +00003871 m_stdio_communication.SynchronizeWithReadThread();
Pavel Labatha9a43372015-09-03 09:30:17 +00003872 m_stdio_communication.Disconnect();
3873 m_stdio_communication.StopReadThread();
3874 m_stdin_forward = false;
3875
Jason Molenda62e06812016-02-16 04:14:33 +00003876 LLVM_FALLTHROUGH;
Pavel Labath3f5df532015-03-12 10:12:41 +00003877 case eStateConnected:
3878 case eStateAttaching:
3879 case eStateLaunching:
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003880 // These events indicate changes in the state of the debugging session, always report them.
3881 return_value = true;
3882 break;
3883 case eStateInvalid:
3884 // We stopped for no apparent reason, don't report it.
3885 return_value = false;
3886 break;
3887 case eStateRunning:
3888 case eStateStepping:
3889 // If we've started the target running, we handle the cases where we
3890 // are already running and where there is a transition from stopped to
3891 // running differently.
3892 // running -> running: Automatically suppress extra running events
3893 // stopped -> running: Report except when there is one or more no votes
3894 // and no yes votes.
3895 SynchronouslyNotifyStateChanged (state);
Jim Ingham1460e4b2014-01-10 23:46:59 +00003896 if (m_force_next_event_delivery)
3897 return_value = true;
3898 else
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003899 {
Jim Ingham1460e4b2014-01-10 23:46:59 +00003900 switch (m_last_broadcast_state)
3901 {
3902 case eStateRunning:
3903 case eStateStepping:
3904 // We always suppress multiple runnings with no PUBLIC stop in between.
3905 return_value = false;
3906 break;
3907 default:
3908 // TODO: make this work correctly. For now always report
Bruce Mitchenerd93c4a32014-07-01 21:22:11 +00003909 // run if we aren't running so we don't miss any running
Jim Ingham1460e4b2014-01-10 23:46:59 +00003910 // events. If I run the lldb/test/thread/a.out file and
3911 // break at main.cpp:58, run and hit the breakpoints on
3912 // multiple threads, then somehow during the stepping over
3913 // of all breakpoints no run gets reported.
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003914
Jim Ingham1460e4b2014-01-10 23:46:59 +00003915 // This is a transition from stop to run.
3916 switch (m_thread_list.ShouldReportRun (event_ptr))
3917 {
3918 case eVoteYes:
3919 case eVoteNoOpinion:
3920 return_value = true;
3921 break;
3922 case eVoteNo:
3923 return_value = false;
3924 break;
3925 }
3926 break;
3927 }
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003928 }
3929 break;
3930 case eStateStopped:
3931 case eStateCrashed:
3932 case eStateSuspended:
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003933 // We've stopped. First see if we're going to restart the target.
3934 // If we are going to stop, then we always broadcast the event.
3935 // If we aren't going to stop, let the thread plans decide if we're going to report this event.
Jim Inghamb01e7422010-06-19 04:45:32 +00003936 // If no thread has an opinion, we don't report it.
Jim Ingham221d51c2013-05-08 00:35:16 +00003937
Pavel Labath3f5df532015-03-12 10:12:41 +00003938 m_stdio_communication.SynchronizeWithReadThread();
Jim Inghamcb4ca112012-05-16 01:32:14 +00003939 RefreshStateAfterStop ();
Jim Ingham0d8bcc72010-11-17 02:32:00 +00003940 if (ProcessEventData::GetInterruptedFromEvent (event_ptr))
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003941 {
Greg Clayton3af9ea52010-11-18 05:57:03 +00003942 if (log)
Jim Ingham0161b492013-02-09 01:29:05 +00003943 log->Printf ("Process::ShouldBroadcastEvent (%p) stopped due to an interrupt, state: %s",
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00003944 static_cast<void*>(event_ptr),
Jim Ingham0161b492013-02-09 01:29:05 +00003945 StateAsCString(state));
Jim Ingham35878c42014-04-08 21:33:21 +00003946 // Even though we know we are going to stop, we should let the threads have a look at the stop,
3947 // so they can properly set their state.
3948 m_thread_list.ShouldStop (event_ptr);
Jim Ingham0161b492013-02-09 01:29:05 +00003949 return_value = true;
Jim Ingham0d8bcc72010-11-17 02:32:00 +00003950 }
3951 else
3952 {
Jim Ingham221d51c2013-05-08 00:35:16 +00003953 bool was_restarted = ProcessEventData::GetRestartedFromEvent (event_ptr);
3954 bool should_resume = false;
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00003955
Jim Ingham0161b492013-02-09 01:29:05 +00003956 // It makes no sense to ask "ShouldStop" if we've already been restarted...
3957 // Asking the thread list is also not likely to go well, since we are running again.
3958 // So in that case just report the event.
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00003959
Jim Ingham0161b492013-02-09 01:29:05 +00003960 if (!was_restarted)
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00003961 should_resume = !m_thread_list.ShouldStop(event_ptr);
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00003962
Jim Ingham221d51c2013-05-08 00:35:16 +00003963 if (was_restarted || should_resume || m_resume_requested)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003964 {
Jim Ingham0161b492013-02-09 01:29:05 +00003965 Vote stop_vote = m_thread_list.ShouldReportStop (event_ptr);
3966 if (log)
Pavel Labath2acc4882016-01-05 17:55:32 +00003967 log->Printf ("Process::ShouldBroadcastEvent: should_resume: %i state: %s was_restarted: %i stop_vote: %d.",
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00003968 should_resume, StateAsCString(state),
3969 was_restarted, stop_vote);
3970
Jim Ingham0161b492013-02-09 01:29:05 +00003971 switch (stop_vote)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003972 {
3973 case eVoteYes:
Jim Ingham0161b492013-02-09 01:29:05 +00003974 return_value = true;
3975 break;
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003976 case eVoteNoOpinion:
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003977 case eVoteNo:
3978 return_value = false;
3979 break;
3980 }
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00003981
Jim Inghamcb95f342012-09-05 21:13:56 +00003982 if (!was_restarted)
Jim Ingham0161b492013-02-09 01:29:05 +00003983 {
3984 if (log)
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00003985 log->Printf ("Process::ShouldBroadcastEvent (%p) Restarting process from state: %s",
3986 static_cast<void*>(event_ptr),
3987 StateAsCString(state));
Jim Ingham0161b492013-02-09 01:29:05 +00003988 ProcessEventData::SetRestartedInEvent(event_ptr, true);
Jim Inghamcb95f342012-09-05 21:13:56 +00003989 PrivateResume ();
Jim Ingham0161b492013-02-09 01:29:05 +00003990 }
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003991 }
3992 else
3993 {
3994 return_value = true;
3995 SynchronouslyNotifyStateChanged (state);
3996 }
3997 }
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00003998 break;
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003999 }
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00004000
Jim Ingham1460e4b2014-01-10 23:46:59 +00004001 // Forcing the next event delivery is a one shot deal. So reset it here.
4002 m_force_next_event_delivery = false;
4003
Jim Ingham0161b492013-02-09 01:29:05 +00004004 // We do some coalescing of events (for instance two consecutive running events get coalesced.)
4005 // But we only coalesce against events we actually broadcast. So we use m_last_broadcast_state
4006 // to track that. NB - you can't use "m_public_state.GetValue()" for that purpose, as was originally done,
4007 // because the PublicState reflects the last event pulled off the queue, and there may be several
4008 // events stacked up on the queue unserviced. So the PublicState may not reflect the last broadcasted event
4009 // yet. m_last_broadcast_state gets updated here.
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00004010
Jim Ingham0161b492013-02-09 01:29:05 +00004011 if (return_value)
4012 m_last_broadcast_state = state;
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00004013
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004014 if (log)
Jim Ingham0161b492013-02-09 01:29:05 +00004015 log->Printf ("Process::ShouldBroadcastEvent (%p) => new state: %s, last broadcast state: %s - %s",
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00004016 static_cast<void*>(event_ptr), StateAsCString(state),
Jim Ingham0161b492013-02-09 01:29:05 +00004017 StateAsCString(m_last_broadcast_state),
4018 return_value ? "YES" : "NO");
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004019 return return_value;
4020}
4021
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004022bool
Jim Ingham60c915e2015-06-23 21:02:45 +00004023Process::StartPrivateStateThread (bool is_secondary_thread)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004024{
Greg Clayton5160ce52013-03-27 23:08:40 +00004025 Log *log(lldb_private::GetLogIfAllCategoriesSet(LIBLLDB_LOG_EVENTS));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004026
Greg Clayton8b82f082011-04-12 05:54:46 +00004027 bool already_running = PrivateStateThreadIsValid ();
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004028 if (log)
Greg Clayton8b82f082011-04-12 05:54:46 +00004029 log->Printf ("Process::%s()%s ", __FUNCTION__, already_running ? " already running" : " starting private state thread");
4030
Jim Ingham60c915e2015-06-23 21:02:45 +00004031 if (!is_secondary_thread && already_running)
Greg Clayton8b82f082011-04-12 05:54:46 +00004032 return true;
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004033
4034 // Create a thread that watches our internal state and controls which
4035 // events make it to clients (into the DCProcess event queue).
Greg Clayton3e06bd92011-01-09 21:07:35 +00004036 char thread_name[1024];
Todd Fiala17096d72014-07-16 19:03:16 +00004037
Zachary Turner39de3112014-09-09 20:54:56 +00004038 if (HostInfo::GetMaxThreadNameLength() <= 30)
Todd Fiala17096d72014-07-16 19:03:16 +00004039 {
Zachary Turner39de3112014-09-09 20:54:56 +00004040 // On platforms with abbreviated thread name lengths, choose thread names that fit within the limit.
4041 if (already_running)
4042 snprintf(thread_name, sizeof(thread_name), "intern-state-OV");
4043 else
4044 snprintf(thread_name, sizeof(thread_name), "intern-state");
Todd Fiala17096d72014-07-16 19:03:16 +00004045 }
Jim Ingham372787f2012-04-07 00:00:41 +00004046 else
Todd Fiala17096d72014-07-16 19:03:16 +00004047 {
4048 if (already_running)
Zachary Turner39de3112014-09-09 20:54:56 +00004049 snprintf(thread_name, sizeof(thread_name), "<lldb.process.internal-state-override(pid=%" PRIu64 ")>", GetID());
Todd Fiala17096d72014-07-16 19:03:16 +00004050 else
Zachary Turner39de3112014-09-09 20:54:56 +00004051 snprintf(thread_name, sizeof(thread_name), "<lldb.process.internal-state(pid=%" PRIu64 ")>", GetID());
Todd Fiala17096d72014-07-16 19:03:16 +00004052 }
4053
Jim Ingham076b3042012-04-10 01:21:57 +00004054 // Create the private state thread, and start it running.
Jim Inghama1ca8142016-02-04 01:34:33 +00004055 PrivateStateThreadArgs *args_ptr = new PrivateStateThreadArgs(this, is_secondary_thread);
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00004056 m_private_state_thread = ThreadLauncher::LaunchThread(thread_name, Process::PrivateStateThread, (void *) args_ptr, nullptr, 8 * 1024 * 1024);
Zachary Turneracee96a2014-09-23 18:32:09 +00004057 if (m_private_state_thread.IsJoinable())
Jim Ingham076b3042012-04-10 01:21:57 +00004058 {
4059 ResumePrivateStateThread();
4060 return true;
4061 }
4062 else
4063 return false;
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004064}
4065
4066void
4067Process::PausePrivateStateThread ()
4068{
4069 ControlPrivateStateThread (eBroadcastInternalStateControlPause);
4070}
4071
4072void
4073Process::ResumePrivateStateThread ()
4074{
4075 ControlPrivateStateThread (eBroadcastInternalStateControlResume);
4076}
4077
4078void
4079Process::StopPrivateStateThread ()
4080{
Cameron Desrochers2c00fc42016-06-14 16:22:45 +00004081 if (m_private_state_thread.IsJoinable ())
Greg Clayton8b82f082011-04-12 05:54:46 +00004082 ControlPrivateStateThread (eBroadcastInternalStateControlStop);
Jim Inghamb1e2e842012-04-12 18:49:31 +00004083 else
4084 {
Greg Clayton5160ce52013-03-27 23:08:40 +00004085 Log *log(lldb_private::GetLogIfAllCategoriesSet(LIBLLDB_LOG_PROCESS));
Jim Inghamb1e2e842012-04-12 18:49:31 +00004086 if (log)
Jim Ingham0161b492013-02-09 01:29:05 +00004087 log->Printf ("Went to stop the private state thread, but it was already invalid.");
Jim Inghamb1e2e842012-04-12 18:49:31 +00004088 }
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004089}
4090
4091void
4092Process::ControlPrivateStateThread (uint32_t signal)
4093{
Greg Clayton5160ce52013-03-27 23:08:40 +00004094 Log *log(lldb_private::GetLogIfAllCategoriesSet(LIBLLDB_LOG_PROCESS));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004095
4096 assert (signal == eBroadcastInternalStateControlStop ||
4097 signal == eBroadcastInternalStateControlPause ||
4098 signal == eBroadcastInternalStateControlResume);
4099
4100 if (log)
Greg Clayton7ecb3a02011-01-22 17:43:17 +00004101 log->Printf ("Process::%s (signal = %d)", __FUNCTION__, signal);
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004102
Cameron Desrochers2c00fc42016-06-14 16:22:45 +00004103 // Signal the private state thread
4104 if (m_private_state_thread.IsJoinable())
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004105 {
Cameron Desrochers2c00fc42016-06-14 16:22:45 +00004106 // Broadcast the event.
4107 // It is important to do this outside of the if below, because
4108 // it's possible that the thread state is invalid but that the
4109 // thread is waiting on a control event instead of simply being
4110 // on its way out (this should not happen, but it apparently can).
4111 if (log)
4112 log->Printf ("Sending control event of type: %d.", signal);
4113 std::shared_ptr<EventDataReceipt> event_receipt_sp(new EventDataReceipt());
4114 m_private_state_control_broadcaster.BroadcastEvent(signal, event_receipt_sp);
Greg Clayton1e20f022016-05-12 22:58:52 +00004115
Cameron Desrochers2c00fc42016-06-14 16:22:45 +00004116 // Wait for the event receipt or for the private state thread to exit
4117 bool receipt_received = false;
4118 if (PrivateStateThreadIsValid())
4119 {
Greg Clayton1e20f022016-05-12 22:58:52 +00004120 while (!receipt_received)
Jim Inghamb1e2e842012-04-12 18:49:31 +00004121 {
Greg Clayton1e20f022016-05-12 22:58:52 +00004122 bool timed_out = false;
Greg Clayton1e20f022016-05-12 22:58:52 +00004123 // Check for a receipt for 2 seconds and then check if the private state
4124 // thread is still around.
Saleem Abdulrasool2d6a9ec2016-07-28 17:32:20 +00004125 receipt_received = event_receipt_sp->WaitForEventReceived(std::chrono::seconds(2), &timed_out);
Greg Clayton1e20f022016-05-12 22:58:52 +00004126 if (!receipt_received)
4127 {
4128 // Check if the private state thread is still around. If it isn't then we are done waiting
Cameron Desrochers2c00fc42016-06-14 16:22:45 +00004129 if (!PrivateStateThreadIsValid())
4130 break; // Private state thread exited or is exiting, we are done
Greg Clayton1e20f022016-05-12 22:58:52 +00004131 }
Jim Inghamb1e2e842012-04-12 18:49:31 +00004132 }
Cameron Desrochers2c00fc42016-06-14 16:22:45 +00004133 }
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004134
Cameron Desrochers2c00fc42016-06-14 16:22:45 +00004135 if (signal == eBroadcastInternalStateControlStop)
Greg Clayton1e20f022016-05-12 22:58:52 +00004136 {
Cameron Desrochers2c00fc42016-06-14 16:22:45 +00004137 thread_result_t result = NULL;
4138 m_private_state_thread.Join(&result);
4139 m_private_state_thread.Reset();
Greg Clayton1e20f022016-05-12 22:58:52 +00004140 }
Jim Inghamb1e2e842012-04-12 18:49:31 +00004141 }
Cameron Desrochers2c00fc42016-06-14 16:22:45 +00004142 else
4143 {
4144 if (log)
4145 log->Printf("Private state thread already dead, no need to signal it to stop.");
4146 }
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004147}
4148
4149void
Jim Inghamcfc09352012-07-27 23:57:19 +00004150Process::SendAsyncInterrupt ()
4151{
4152 if (PrivateStateThreadIsValid())
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00004153 m_private_state_broadcaster.BroadcastEvent(Process::eBroadcastBitInterrupt, nullptr);
Jim Inghamcfc09352012-07-27 23:57:19 +00004154 else
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00004155 BroadcastEvent(Process::eBroadcastBitInterrupt, nullptr);
Jim Inghamcfc09352012-07-27 23:57:19 +00004156}
4157
4158void
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004159Process::HandlePrivateEvent (EventSP &event_sp)
4160{
Greg Clayton5160ce52013-03-27 23:08:40 +00004161 Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_PROCESS));
Jim Ingham221d51c2013-05-08 00:35:16 +00004162 m_resume_requested = false;
4163
Greg Clayton414f5d32011-01-25 02:58:48 +00004164 const StateType new_state = Process::ProcessEventData::GetStateFromEvent(event_sp.get());
Jim Inghambb3a2832011-01-29 01:49:25 +00004165
4166 // First check to see if anybody wants a shot at this event:
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00004167 if (m_next_event_action_ap)
Jim Inghambb3a2832011-01-29 01:49:25 +00004168 {
Jim Ingham754ab982011-01-29 04:05:41 +00004169 NextEventAction::EventActionResult action_result = m_next_event_action_ap->PerformAction(event_sp);
Jim Ingham0161b492013-02-09 01:29:05 +00004170 if (log)
4171 log->Printf ("Ran next event action, result was %d.", action_result);
4172
Jim Inghambb3a2832011-01-29 01:49:25 +00004173 switch (action_result)
4174 {
4175 case NextEventAction::eEventActionSuccess:
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00004176 SetNextEventAction(nullptr);
Jim Inghambb3a2832011-01-29 01:49:25 +00004177 break;
Greg Claytonc9ed4782011-11-12 02:10:56 +00004178
Jim Inghambb3a2832011-01-29 01:49:25 +00004179 case NextEventAction::eEventActionRetry:
4180 break;
Greg Claytonc9ed4782011-11-12 02:10:56 +00004181
Jim Inghambb3a2832011-01-29 01:49:25 +00004182 case NextEventAction::eEventActionExit:
Jim Ingham2a5fdd42011-01-29 01:57:31 +00004183 // Handle Exiting Here. If we already got an exited event,
4184 // we should just propagate it. Otherwise, swallow this event,
4185 // and set our state to exit so the next event will kill us.
4186 if (new_state != eStateExited)
4187 {
4188 // FIXME: should cons up an exited event, and discard this one.
Jim Ingham754ab982011-01-29 04:05:41 +00004189 SetExitStatus(0, m_next_event_action_ap->GetExitString());
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00004190 SetNextEventAction(nullptr);
Jim Ingham2a5fdd42011-01-29 01:57:31 +00004191 return;
4192 }
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00004193 SetNextEventAction(nullptr);
Jim Inghambb3a2832011-01-29 01:49:25 +00004194 break;
4195 }
4196 }
4197
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004198 // See if we should broadcast this state to external clients?
4199 const bool should_broadcast = ShouldBroadcastEvent (event_sp.get());
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004200
4201 if (should_broadcast)
4202 {
Greg Claytonb4874f12014-02-28 18:22:24 +00004203 const bool is_hijacked = IsHijackedForEvent(eBroadcastBitStateChanged);
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004204 if (log)
4205 {
Daniel Malead01b2952012-11-29 21:49:15 +00004206 log->Printf ("Process::%s (pid = %" PRIu64 ") broadcasting new state %s (old state %s) to %s",
Greg Clayton414f5d32011-01-25 02:58:48 +00004207 __FUNCTION__,
4208 GetID(),
4209 StateAsCString(new_state),
4210 StateAsCString (GetState ()),
Greg Claytonb4874f12014-02-28 18:22:24 +00004211 is_hijacked ? "hijacked" : "public");
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004212 }
Jim Ingham9575d842011-03-11 03:53:59 +00004213 Process::ProcessEventData::SetUpdateStateOnRemoval(event_sp.get());
Greg Clayton414f5d32011-01-25 02:58:48 +00004214 if (StateIsRunningState (new_state))
Greg Clayton44d93782014-01-27 23:43:24 +00004215 {
4216 // Only push the input handler if we aren't fowarding events,
4217 // as this means the curses GUI is in use...
Todd Fialaf72fa672014-10-07 16:05:21 +00004218 // Or don't push it if we are launching since it will come up stopped.
Zachary Turnerc62733b2015-05-20 18:31:17 +00004219 if (!GetTarget().GetDebugger().IsForwardingEvents() && new_state != eStateLaunching &&
4220 new_state != eStateAttaching)
Pavel Labath44464872015-05-27 12:40:32 +00004221 {
Greg Clayton44d93782014-01-27 23:43:24 +00004222 PushProcessIOHandler ();
Pavel Labath44464872015-05-27 12:40:32 +00004223 m_iohandler_sync.SetValue(m_iohandler_sync.GetValue()+1, eBroadcastAlways);
4224 if (log)
4225 log->Printf("Process::%s updated m_iohandler_sync to %d", __FUNCTION__, m_iohandler_sync.GetValue());
4226 }
Greg Clayton44d93782014-01-27 23:43:24 +00004227 }
Greg Claytonb4874f12014-02-28 18:22:24 +00004228 else if (StateIsStoppedState(new_state, false))
4229 {
4230 if (!Process::ProcessEventData::GetRestartedFromEvent(event_sp.get()))
4231 {
4232 // If the lldb_private::Debugger is handling the events, we don't
4233 // want to pop the process IOHandler here, we want to do it when
4234 // we receive the stopped event so we can carefully control when
4235 // the process IOHandler is popped because when we stop we want to
4236 // display some text stating how and why we stopped, then maybe some
4237 // process/thread/frame info, and then we want the "(lldb) " prompt
4238 // to show up. If we pop the process IOHandler here, then we will
4239 // cause the command interpreter to become the top IOHandler after
4240 // the process pops off and it will update its prompt right away...
4241 // See the Debugger.cpp file where it calls the function as
4242 // "process_sp->PopProcessIOHandler()" to see where I am talking about.
4243 // Otherwise we end up getting overlapping "(lldb) " prompts and
4244 // garbled output.
4245 //
4246 // If we aren't handling the events in the debugger (which is indicated
4247 // by "m_target.GetDebugger().IsHandlingEvents()" returning false) or we
4248 // are hijacked, then we always pop the process IO handler manually.
4249 // Hijacking happens when the internal process state thread is running
4250 // thread plans, or when commands want to run in synchronous mode
4251 // and they call "process->WaitForProcessToStop()". An example of something
4252 // that will hijack the events is a simple expression:
4253 //
4254 // (lldb) expr (int)puts("hello")
4255 //
4256 // This will cause the internal process state thread to resume and halt
4257 // the process (and _it_ will hijack the eBroadcastBitStateChanged
4258 // events) and we do need the IO handler to be pushed and popped
4259 // correctly.
4260
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00004261 if (is_hijacked || !GetTarget().GetDebugger().IsHandlingEvents())
Greg Claytonb4874f12014-02-28 18:22:24 +00004262 PopProcessIOHandler ();
4263 }
4264 }
Jim Ingham9575d842011-03-11 03:53:59 +00004265
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004266 BroadcastEvent (event_sp);
4267 }
4268 else
4269 {
4270 if (log)
4271 {
Daniel Malead01b2952012-11-29 21:49:15 +00004272 log->Printf ("Process::%s (pid = %" PRIu64 ") suppressing state %s (old state %s): should_broadcast == false",
Greg Clayton414f5d32011-01-25 02:58:48 +00004273 __FUNCTION__,
4274 GetID(),
4275 StateAsCString(new_state),
Jason Molendafd54b362011-09-20 21:44:10 +00004276 StateAsCString (GetState ()));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004277 }
4278 }
Pavel Labath19da1f12015-12-07 12:36:52 +00004279}
4280
4281Error
4282Process::HaltPrivate()
4283{
4284 EventSP event_sp;
4285 Error error (WillHalt());
4286 if (error.Fail())
4287 return error;
4288
4289 // Ask the process subclass to actually halt our process
4290 bool caused_stop;
4291 error = DoHalt(caused_stop);
4292
4293 DidHalt();
4294 return error;
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004295}
4296
Virgile Bellob2f1fb22013-08-23 12:44:05 +00004297thread_result_t
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004298Process::PrivateStateThread (void *arg)
4299{
Jim Inghama1ca8142016-02-04 01:34:33 +00004300 PrivateStateThreadArgs real_args = *static_cast<PrivateStateThreadArgs *> (arg);
4301 free (arg);
4302 thread_result_t result = real_args.process->RunPrivateStateThread(real_args.is_secondary_thread);
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004303 return result;
4304}
4305
Virgile Bellob2f1fb22013-08-23 12:44:05 +00004306thread_result_t
Jim Ingham60c915e2015-06-23 21:02:45 +00004307Process::RunPrivateStateThread (bool is_secondary_thread)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004308{
Jim Ingham076b3042012-04-10 01:21:57 +00004309 bool control_only = true;
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004310
Greg Clayton5160ce52013-03-27 23:08:40 +00004311 Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_PROCESS));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004312 if (log)
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00004313 log->Printf ("Process::%s (arg = %p, pid = %" PRIu64 ") thread starting...",
4314 __FUNCTION__, static_cast<void*>(this), GetID());
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004315
4316 bool exit_now = false;
Pavel Labath19da1f12015-12-07 12:36:52 +00004317 bool interrupt_requested = false;
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004318 while (!exit_now)
4319 {
4320 EventSP event_sp;
Saleem Abdulrasool2d6a9ec2016-07-28 17:32:20 +00004321 WaitForEventsPrivate(std::chrono::microseconds(0), event_sp, control_only);
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004322 if (event_sp->BroadcasterIs(&m_private_state_control_broadcaster))
4323 {
Jim Inghamb1e2e842012-04-12 18:49:31 +00004324 if (log)
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00004325 log->Printf ("Process::%s (arg = %p, pid = %" PRIu64 ") got a control event: %d",
4326 __FUNCTION__, static_cast<void*>(this), GetID(),
4327 event_sp->GetType());
Jim Inghamb1e2e842012-04-12 18:49:31 +00004328
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004329 switch (event_sp->GetType())
4330 {
4331 case eBroadcastInternalStateControlStop:
4332 exit_now = true;
Bruce Mitchenerd93c4a32014-07-01 21:22:11 +00004333 break; // doing any internal state management below
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004334
4335 case eBroadcastInternalStateControlPause:
4336 control_only = true;
4337 break;
4338
4339 case eBroadcastInternalStateControlResume:
4340 control_only = false;
4341 break;
4342 }
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00004343
Jim Ingham0d8bcc72010-11-17 02:32:00 +00004344 continue;
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004345 }
Jim Inghamcfc09352012-07-27 23:57:19 +00004346 else if (event_sp->GetType() == eBroadcastBitInterrupt)
4347 {
4348 if (m_public_state.GetValue() == eStateAttaching)
4349 {
4350 if (log)
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00004351 log->Printf ("Process::%s (arg = %p, pid = %" PRIu64 ") woke up with an interrupt while attaching - forwarding interrupt.",
4352 __FUNCTION__, static_cast<void*>(this),
4353 GetID());
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00004354 BroadcastEvent(eBroadcastBitInterrupt, nullptr);
Jim Inghamcfc09352012-07-27 23:57:19 +00004355 }
Pavel Labath19da1f12015-12-07 12:36:52 +00004356 else if(StateIsRunningState(m_last_broadcast_state))
Jim Inghamcfc09352012-07-27 23:57:19 +00004357 {
4358 if (log)
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00004359 log->Printf ("Process::%s (arg = %p, pid = %" PRIu64 ") woke up with an interrupt - Halting.",
4360 __FUNCTION__, static_cast<void*>(this),
4361 GetID());
Pavel Labath19da1f12015-12-07 12:36:52 +00004362 Error error = HaltPrivate();
4363 if (error.Fail() && log)
4364 log->Printf ("Process::%s (arg = %p, pid = %" PRIu64 ") failed to halt the process: %s",
4365 __FUNCTION__, static_cast<void*>(this),
4366 GetID(), error.AsCString());
4367 // Halt should generate a stopped event. Make a note of the fact that we were
4368 // doing the interrupt, so we can set the interrupted flag after we receive the
4369 // event. We deliberately set this to true even if HaltPrivate failed, so that we
4370 // can interrupt on the next natural stop.
4371 interrupt_requested = true;
4372 }
4373 else
4374 {
4375 // This can happen when someone (e.g. Process::Halt) sees that we are running and
4376 // sends an interrupt request, but the process actually stops before we receive
4377 // it. In that case, we can just ignore the request. We use
4378 // m_last_broadcast_state, because the Stopped event may not have been popped of
4379 // the event queue yet, which is when the public state gets updated.
4380 if (log)
4381 log->Printf("Process::%s ignoring interrupt as we have already stopped.", __FUNCTION__);
Jim Inghamcfc09352012-07-27 23:57:19 +00004382 }
4383 continue;
4384 }
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004385
4386 const StateType internal_state = Process::ProcessEventData::GetStateFromEvent(event_sp.get());
4387
4388 if (internal_state != eStateInvalid)
4389 {
Greg Claytonf9b57b92013-05-10 23:48:10 +00004390 if (m_clear_thread_plans_on_stop &&
4391 StateIsStoppedState(internal_state, true))
4392 {
4393 m_clear_thread_plans_on_stop = false;
4394 m_thread_list.DiscardThreadPlans();
4395 }
Pavel Labath19da1f12015-12-07 12:36:52 +00004396
4397 if (interrupt_requested)
4398 {
4399 if (StateIsStoppedState (internal_state, true))
4400 {
4401 // We requested the interrupt, so mark this as such in the stop event so
4402 // clients can tell an interrupted process from a natural stop
4403 ProcessEventData::SetInterruptedInEvent (event_sp.get(), true);
4404 interrupt_requested = false;
4405 }
4406 else if (log)
4407 {
4408 log->Printf("Process::%s interrupt_requested, but a non-stopped state '%s' received.",
4409 __FUNCTION__, StateAsCString(internal_state));
4410 }
4411 }
4412
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004413 HandlePrivateEvent (event_sp);
4414 }
4415
Greg Clayton58d1c9a2010-10-18 04:14:23 +00004416 if (internal_state == eStateInvalid ||
4417 internal_state == eStateExited ||
4418 internal_state == eStateDetached )
Jim Ingham0d8bcc72010-11-17 02:32:00 +00004419 {
Jim Ingham0d8bcc72010-11-17 02:32:00 +00004420 if (log)
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00004421 log->Printf ("Process::%s (arg = %p, pid = %" PRIu64 ") about to exit with internal state %s...",
4422 __FUNCTION__, static_cast<void*>(this), GetID(),
4423 StateAsCString(internal_state));
Jim Ingham0d8bcc72010-11-17 02:32:00 +00004424
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004425 break;
Jim Ingham0d8bcc72010-11-17 02:32:00 +00004426 }
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004427 }
4428
Caroline Tice20ad3c42010-10-29 21:48:37 +00004429 // Verify log is still enabled before attempting to write to it...
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004430 if (log)
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00004431 log->Printf ("Process::%s (arg = %p, pid = %" PRIu64 ") thread exiting...",
4432 __FUNCTION__, static_cast<void*>(this), GetID());
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004433
Jim Ingham60c915e2015-06-23 21:02:45 +00004434 // If we are a secondary thread, then the primary thread we are working for will have already
4435 // acquired the public_run_lock, and isn't done with what it was doing yet, so don't
4436 // try to change it on the way out.
4437 if (!is_secondary_thread)
4438 m_public_run_lock.SetStopped();
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004439 return NULL;
4440}
4441
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004442//------------------------------------------------------------------
4443// Process Event Data
4444//------------------------------------------------------------------
4445
4446Process::ProcessEventData::ProcessEventData () :
4447 EventData (),
Greg Claytonaeb3b8b2015-05-29 03:20:37 +00004448 m_process_wp (),
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004449 m_state (eStateInvalid),
Greg Claytonc982c762010-07-09 20:39:50 +00004450 m_restarted (false),
Jim Inghama8604692011-05-22 21:45:01 +00004451 m_update_state (0),
Jim Ingham0d8bcc72010-11-17 02:32:00 +00004452 m_interrupted (false)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004453{
4454}
4455
4456Process::ProcessEventData::ProcessEventData (const ProcessSP &process_sp, StateType state) :
4457 EventData (),
Greg Claytonaeb3b8b2015-05-29 03:20:37 +00004458 m_process_wp (),
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004459 m_state (state),
Greg Claytonc982c762010-07-09 20:39:50 +00004460 m_restarted (false),
Jim Inghama8604692011-05-22 21:45:01 +00004461 m_update_state (0),
Jim Ingham0d8bcc72010-11-17 02:32:00 +00004462 m_interrupted (false)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004463{
Greg Claytonaeb3b8b2015-05-29 03:20:37 +00004464 if (process_sp)
4465 m_process_wp = process_sp;
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004466}
4467
Eugene Zelenko8f30a652015-10-23 18:39:37 +00004468Process::ProcessEventData::~ProcessEventData() = default;
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004469
4470const ConstString &
4471Process::ProcessEventData::GetFlavorString ()
4472{
4473 static ConstString g_flavor ("Process::ProcessEventData");
4474 return g_flavor;
4475}
4476
4477const ConstString &
4478Process::ProcessEventData::GetFlavor () const
4479{
4480 return ProcessEventData::GetFlavorString ();
4481}
4482
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004483void
4484Process::ProcessEventData::DoOnRemoval (Event *event_ptr)
4485{
Greg Claytonaeb3b8b2015-05-29 03:20:37 +00004486 ProcessSP process_sp(m_process_wp.lock());
4487
4488 if (!process_sp)
4489 return;
4490
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004491 // This function gets called twice for each event, once when the event gets pulled
Jim Inghama8604692011-05-22 21:45:01 +00004492 // off of the private process event queue, and then any number of times, first when it gets pulled off of
4493 // the public event queue, then other times when we're pretending that this is where we stopped at the
4494 // end of expression evaluation. m_update_state is used to distinguish these
4495 // three cases; it is 0 when we're just pulling it off for private handling,
Jim Ingham221d51c2013-05-08 00:35:16 +00004496 // and > 1 for expression evaluation, and we don't want to do the breakpoint command handling then.
Jim Inghama8604692011-05-22 21:45:01 +00004497 if (m_update_state != 1)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004498 return;
Jim Ingham0161b492013-02-09 01:29:05 +00004499
Greg Claytonaeb3b8b2015-05-29 03:20:37 +00004500 process_sp->SetPublicState (m_state, Process::ProcessEventData::GetRestartedFromEvent(event_ptr));
Jim Ingham35878c42014-04-08 21:33:21 +00004501
4502 // If this is a halt event, even if the halt stopped with some reason other than a plain interrupt (e.g. we had
4503 // already stopped for a breakpoint when the halt request came through) don't do the StopInfo actions, as they may
4504 // end up restarting the process.
4505 if (m_interrupted)
4506 return;
4507
4508 // If we're stopped and haven't restarted, then do the StopInfo actions here:
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004509 if (m_state == eStateStopped && ! m_restarted)
Greg Clayton2e309072015-07-17 23:42:28 +00004510 {
4511 // Let process subclasses know we are about to do a public stop and
4512 // do anything they might need to in order to speed up register and
4513 // memory accesses.
4514 process_sp->WillPublicStop();
4515
Greg Claytonaeb3b8b2015-05-29 03:20:37 +00004516 ThreadList &curr_thread_list = process_sp->GetThreadList();
Greg Clayton61e7a582011-12-01 23:28:38 +00004517 uint32_t num_threads = curr_thread_list.GetSize();
4518 uint32_t idx;
Greg Claytonf4b47e12010-08-04 01:40:35 +00004519
Jim Ingham4b536182011-08-09 02:12:22 +00004520 // The actions might change one of the thread's stop_info's opinions about whether we should
4521 // stop the process, so we need to query that as we go.
Jim Ingham0faa43f2011-11-08 03:00:11 +00004522
4523 // One other complication here, is that we try to catch any case where the target has run (except for expressions)
4524 // and immediately exit, but if we get that wrong (which is possible) then the thread list might have changed, and
4525 // that would cause our iteration here to crash. We could make a copy of the thread list, but we'd really like
4526 // to also know if it has changed at all, so we make up a vector of the thread ID's and check what we get back
4527 // against this list & bag out if anything differs.
Greg Clayton61e7a582011-12-01 23:28:38 +00004528 std::vector<uint32_t> thread_index_array(num_threads);
Jim Ingham0faa43f2011-11-08 03:00:11 +00004529 for (idx = 0; idx < num_threads; ++idx)
4530 thread_index_array[idx] = curr_thread_list.GetThreadAtIndex(idx)->GetIndexID();
4531
Jim Inghamc7078c22012-12-13 22:24:15 +00004532 // Use this to track whether we should continue from here. We will only continue the target running if
4533 // no thread says we should stop. Of course if some thread's PerformAction actually sets the target running,
4534 // then it doesn't matter what the other threads say...
4535
4536 bool still_should_stop = false;
Jim Ingham4b536182011-08-09 02:12:22 +00004537
Jim Ingham0ad7e052013-04-25 02:04:59 +00004538 // Sometimes - for instance if we have a bug in the stub we are talking to, we stop but no thread has a
4539 // valid stop reason. In that case we should just stop, because we have no way of telling what the right
4540 // thing to do is, and it's better to let the user decide than continue behind their backs.
4541
4542 bool does_anybody_have_an_opinion = false;
4543
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004544 for (idx = 0; idx < num_threads; ++idx)
4545 {
Greg Claytonaeb3b8b2015-05-29 03:20:37 +00004546 curr_thread_list = process_sp->GetThreadList();
Jim Ingham0faa43f2011-11-08 03:00:11 +00004547 if (curr_thread_list.GetSize() != num_threads)
4548 {
Greg Clayton5160ce52013-03-27 23:08:40 +00004549 Log *log(lldb_private::GetLogIfAnyCategoriesSet (LIBLLDB_LOG_STEP | LIBLLDB_LOG_PROCESS));
Jim Ingham87c665f2011-12-01 20:26:15 +00004550 if (log)
Greg Clayton61e7a582011-12-01 23:28:38 +00004551 log->Printf("Number of threads changed from %u to %u while processing event.", num_threads, curr_thread_list.GetSize());
Jim Ingham0faa43f2011-11-08 03:00:11 +00004552 break;
4553 }
4554
4555 lldb::ThreadSP thread_sp = curr_thread_list.GetThreadAtIndex(idx);
4556
4557 if (thread_sp->GetIndexID() != thread_index_array[idx])
4558 {
Greg Clayton5160ce52013-03-27 23:08:40 +00004559 Log *log(lldb_private::GetLogIfAnyCategoriesSet (LIBLLDB_LOG_STEP | LIBLLDB_LOG_PROCESS));
Jim Ingham87c665f2011-12-01 20:26:15 +00004560 if (log)
Greg Clayton61e7a582011-12-01 23:28:38 +00004561 log->Printf("The thread at position %u changed from %u to %u while processing event.",
Jim Ingham87c665f2011-12-01 20:26:15 +00004562 idx,
4563 thread_index_array[idx],
4564 thread_sp->GetIndexID());
Jim Ingham0faa43f2011-11-08 03:00:11 +00004565 break;
4566 }
4567
Jim Inghamb15bfc72010-10-20 00:39:53 +00004568 StopInfoSP stop_info_sp = thread_sp->GetStopInfo ();
Jim Ingham5d88a062012-10-16 00:09:33 +00004569 if (stop_info_sp && stop_info_sp->IsValid())
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004570 {
Jim Ingham0ad7e052013-04-25 02:04:59 +00004571 does_anybody_have_an_opinion = true;
Jim Ingham0161b492013-02-09 01:29:05 +00004572 bool this_thread_wants_to_stop;
4573 if (stop_info_sp->GetOverrideShouldStop())
Jim Ingham4b536182011-08-09 02:12:22 +00004574 {
Jim Ingham0161b492013-02-09 01:29:05 +00004575 this_thread_wants_to_stop = stop_info_sp->GetOverriddenShouldStopValue();
4576 }
4577 else
4578 {
4579 stop_info_sp->PerformAction(event_ptr);
4580 // The stop action might restart the target. If it does, then we want to mark that in the
4581 // event so that whoever is receiving it will know to wait for the running event and reflect
4582 // that state appropriately.
4583 // We also need to stop processing actions, since they aren't expecting the target to be running.
4584
4585 // FIXME: we might have run.
4586 if (stop_info_sp->HasTargetRunSinceMe())
4587 {
4588 SetRestarted (true);
4589 break;
4590 }
4591
4592 this_thread_wants_to_stop = stop_info_sp->ShouldStop(event_ptr);
Jim Ingham4b536182011-08-09 02:12:22 +00004593 }
Jim Inghamc7078c22012-12-13 22:24:15 +00004594
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00004595 if (!still_should_stop)
Jim Inghamc7078c22012-12-13 22:24:15 +00004596 still_should_stop = this_thread_wants_to_stop;
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004597 }
4598 }
Ashok Thirumurthicf7c55e2013-04-18 14:38:20 +00004599
Jim Inghama8ca6e22013-05-03 23:04:37 +00004600 if (!GetRestarted())
Jim Ingham9575d842011-03-11 03:53:59 +00004601 {
Jim Ingham0ad7e052013-04-25 02:04:59 +00004602 if (!still_should_stop && does_anybody_have_an_opinion)
Jim Ingham4b536182011-08-09 02:12:22 +00004603 {
4604 // We've been asked to continue, so do that here.
Jim Ingham9575d842011-03-11 03:53:59 +00004605 SetRestarted(true);
Jim Ingham3b8285d2012-04-19 01:40:33 +00004606 // Use the public resume method here, since this is just
4607 // extending a public resume.
Greg Claytonaeb3b8b2015-05-29 03:20:37 +00004608 process_sp->PrivateResume();
Jim Ingham4b536182011-08-09 02:12:22 +00004609 }
4610 else
4611 {
4612 // If we didn't restart, run the Stop Hooks here:
4613 // They might also restart the target, so watch for that.
Greg Claytonaeb3b8b2015-05-29 03:20:37 +00004614 process_sp->GetTarget().RunStopHooks();
4615 if (process_sp->GetPrivateState() == eStateRunning)
Jim Ingham4b536182011-08-09 02:12:22 +00004616 SetRestarted(true);
4617 }
Jim Ingham9575d842011-03-11 03:53:59 +00004618 }
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004619 }
4620}
4621
4622void
4623Process::ProcessEventData::Dump (Stream *s) const
4624{
Greg Claytonaeb3b8b2015-05-29 03:20:37 +00004625 ProcessSP process_sp(m_process_wp.lock());
4626
4627 if (process_sp)
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00004628 s->Printf(" process = %p (pid = %" PRIu64 "), ",
Greg Claytonaeb3b8b2015-05-29 03:20:37 +00004629 static_cast<void*>(process_sp.get()), process_sp->GetID());
4630 else
4631 s->PutCString(" process = NULL, ");
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004632
Greg Clayton8b82f082011-04-12 05:54:46 +00004633 s->Printf("state = %s", StateAsCString(GetState()));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004634}
4635
4636const Process::ProcessEventData *
4637Process::ProcessEventData::GetEventDataFromEvent (const Event *event_ptr)
4638{
4639 if (event_ptr)
4640 {
4641 const EventData *event_data = event_ptr->GetData();
4642 if (event_data && event_data->GetFlavor() == ProcessEventData::GetFlavorString())
4643 return static_cast <const ProcessEventData *> (event_ptr->GetData());
4644 }
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00004645 return nullptr;
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004646}
4647
4648ProcessSP
4649Process::ProcessEventData::GetProcessFromEvent (const Event *event_ptr)
4650{
4651 ProcessSP process_sp;
4652 const ProcessEventData *data = GetEventDataFromEvent (event_ptr);
4653 if (data)
4654 process_sp = data->GetProcessSP();
4655 return process_sp;
4656}
4657
4658StateType
4659Process::ProcessEventData::GetStateFromEvent (const Event *event_ptr)
4660{
4661 const ProcessEventData *data = GetEventDataFromEvent (event_ptr);
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00004662 if (data == nullptr)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004663 return eStateInvalid;
4664 else
4665 return data->GetState();
4666}
4667
4668bool
4669Process::ProcessEventData::GetRestartedFromEvent (const Event *event_ptr)
4670{
4671 const ProcessEventData *data = GetEventDataFromEvent (event_ptr);
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00004672 if (data == nullptr)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004673 return false;
4674 else
4675 return data->GetRestarted();
4676}
4677
4678void
4679Process::ProcessEventData::SetRestartedInEvent (Event *event_ptr, bool new_value)
4680{
4681 ProcessEventData *data = const_cast<ProcessEventData *>(GetEventDataFromEvent (event_ptr));
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00004682 if (data != nullptr)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004683 data->SetRestarted(new_value);
4684}
4685
Jim Ingham0161b492013-02-09 01:29:05 +00004686size_t
4687Process::ProcessEventData::GetNumRestartedReasons(const Event *event_ptr)
4688{
4689 ProcessEventData *data = const_cast<ProcessEventData *>(GetEventDataFromEvent (event_ptr));
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00004690 if (data != nullptr)
Jim Ingham0161b492013-02-09 01:29:05 +00004691 return data->GetNumRestartedReasons();
4692 else
4693 return 0;
4694}
4695
4696const char *
4697Process::ProcessEventData::GetRestartedReasonAtIndex(const Event *event_ptr, size_t idx)
4698{
4699 ProcessEventData *data = const_cast<ProcessEventData *>(GetEventDataFromEvent (event_ptr));
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00004700 if (data != nullptr)
Jim Ingham0161b492013-02-09 01:29:05 +00004701 return data->GetRestartedReasonAtIndex(idx);
4702 else
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00004703 return nullptr;
Jim Ingham0161b492013-02-09 01:29:05 +00004704}
4705
4706void
4707Process::ProcessEventData::AddRestartedReason (Event *event_ptr, const char *reason)
4708{
4709 ProcessEventData *data = const_cast<ProcessEventData *>(GetEventDataFromEvent (event_ptr));
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00004710 if (data != nullptr)
Jim Ingham0161b492013-02-09 01:29:05 +00004711 data->AddRestartedReason(reason);
4712}
4713
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004714bool
Jim Ingham0d8bcc72010-11-17 02:32:00 +00004715Process::ProcessEventData::GetInterruptedFromEvent (const Event *event_ptr)
4716{
4717 const ProcessEventData *data = GetEventDataFromEvent (event_ptr);
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00004718 if (data == nullptr)
Jim Ingham0d8bcc72010-11-17 02:32:00 +00004719 return false;
4720 else
4721 return data->GetInterrupted ();
4722}
4723
4724void
4725Process::ProcessEventData::SetInterruptedInEvent (Event *event_ptr, bool new_value)
4726{
4727 ProcessEventData *data = const_cast<ProcessEventData *>(GetEventDataFromEvent (event_ptr));
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00004728 if (data != nullptr)
Jim Ingham0d8bcc72010-11-17 02:32:00 +00004729 data->SetInterrupted(new_value);
4730}
4731
4732bool
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004733Process::ProcessEventData::SetUpdateStateOnRemoval (Event *event_ptr)
4734{
4735 ProcessEventData *data = const_cast<ProcessEventData *>(GetEventDataFromEvent (event_ptr));
4736 if (data)
4737 {
4738 data->SetUpdateStateOnRemoval();
4739 return true;
4740 }
4741 return false;
4742}
4743
Greg Claytond9e416c2012-02-18 05:35:26 +00004744lldb::TargetSP
4745Process::CalculateTarget ()
4746{
Zachary Turner7529df92015-09-01 20:02:29 +00004747 return m_target_sp.lock();
Greg Claytond9e416c2012-02-18 05:35:26 +00004748}
4749
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004750void
Greg Clayton0603aa92010-10-04 01:05:56 +00004751Process::CalculateExecutionContext (ExecutionContext &exe_ctx)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004752{
Zachary Turner7529df92015-09-01 20:02:29 +00004753 exe_ctx.SetTargetPtr (&GetTarget());
Greg Claytonc14ee322011-09-22 04:58:26 +00004754 exe_ctx.SetProcessPtr (this);
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00004755 exe_ctx.SetThreadPtr(nullptr);
4756 exe_ctx.SetFramePtr(nullptr);
Chris Lattner30fdc8d2010-06-08 16:52:24 +00004757}
4758
Greg Claytone996fd32011-03-08 22:40:15 +00004759//uint32_t
4760//Process::ListProcessesMatchingName (const char *name, StringList &matches, std::vector<lldb::pid_t> &pids)
4761//{
4762// return 0;
4763//}
4764//
4765//ArchSpec
4766//Process::GetArchSpecForExistingProcess (lldb::pid_t pid)
4767//{
4768// return Host::GetArchSpecForExistingProcess (pid);
4769//}
4770//
4771//ArchSpec
4772//Process::GetArchSpecForExistingProcess (const char *process_name)
4773//{
4774// return Host::GetArchSpecForExistingProcess (process_name);
4775//}
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00004776
Caroline Ticeef5c6d02010-11-16 05:07:41 +00004777void
4778Process::AppendSTDOUT (const char * s, size_t len)
4779{
Saleem Abdulrasoolbb19a132016-05-19 05:13:57 +00004780 std::lock_guard<std::recursive_mutex> guard(m_stdio_communication_mutex);
Caroline Ticeef5c6d02010-11-16 05:07:41 +00004781 m_stdout_data.append (s, len);
Greg Clayton35a4cc52012-10-29 20:52:08 +00004782 BroadcastEventIfUnique (eBroadcastBitSTDOUT, new ProcessEventData (shared_from_this(), GetState()));
Caroline Ticeef5c6d02010-11-16 05:07:41 +00004783}
4784
4785void
Greg Clayton93e86192011-11-13 04:45:22 +00004786Process::AppendSTDERR (const char * s, size_t len)
4787{
Saleem Abdulrasoolbb19a132016-05-19 05:13:57 +00004788 std::lock_guard<std::recursive_mutex> guard(m_stdio_communication_mutex);
Greg Clayton93e86192011-11-13 04:45:22 +00004789 m_stderr_data.append (s, len);
Greg Clayton35a4cc52012-10-29 20:52:08 +00004790 BroadcastEventIfUnique (eBroadcastBitSTDERR, new ProcessEventData (shared_from_this(), GetState()));
Greg Clayton93e86192011-11-13 04:45:22 +00004791}
4792
Han Ming Ongab3b8b22012-11-17 00:21:04 +00004793void
Han Ming Ong91ed6b82013-06-24 18:15:05 +00004794Process::BroadcastAsyncProfileData(const std::string &one_profile_data)
Han Ming Ongab3b8b22012-11-17 00:21:04 +00004795{
Saleem Abdulrasoolbb19a132016-05-19 05:13:57 +00004796 std::lock_guard<std::recursive_mutex> guard(m_profile_data_comm_mutex);
Han Ming Ong91ed6b82013-06-24 18:15:05 +00004797 m_profile_data.push_back(one_profile_data);
Han Ming Ongab3b8b22012-11-17 00:21:04 +00004798 BroadcastEventIfUnique (eBroadcastBitProfileData, new ProcessEventData (shared_from_this(), GetState()));
4799}
4800
Todd Fiala75930012016-08-19 04:21:48 +00004801void
4802Process::BroadcastStructuredData(const StructuredData::ObjectSP &object_sp,
4803 const StructuredDataPluginSP &plugin_sp)
4804{
4805 BroadcastEvent(eBroadcastBitStructuredData,
4806 new EventDataStructuredData(shared_from_this(),
4807 object_sp, plugin_sp));
4808}
4809
4810StructuredDataPluginSP
4811Process::GetStructuredDataPlugin(const ConstString &type_name) const
4812{
4813 auto find_it = m_structured_data_plugin_map.find(type_name);
4814 if (find_it != m_structured_data_plugin_map.end())
4815 return find_it->second;
4816 else
4817 return StructuredDataPluginSP();
4818}
4819
Han Ming Ongab3b8b22012-11-17 00:21:04 +00004820size_t
4821Process::GetAsyncProfileData (char *buf, size_t buf_size, Error &error)
4822{
Saleem Abdulrasoolbb19a132016-05-19 05:13:57 +00004823 std::lock_guard<std::recursive_mutex> guard(m_profile_data_comm_mutex);
Han Ming Ong929a94f2012-11-29 22:14:45 +00004824 if (m_profile_data.empty())
4825 return 0;
Han Ming Ong91ed6b82013-06-24 18:15:05 +00004826
4827 std::string &one_profile_data = m_profile_data.front();
4828 size_t bytes_available = one_profile_data.size();
Han Ming Ongab3b8b22012-11-17 00:21:04 +00004829 if (bytes_available > 0)
4830 {
Greg Clayton5160ce52013-03-27 23:08:40 +00004831 Log *log (lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_PROCESS));
Han Ming Ongab3b8b22012-11-17 00:21:04 +00004832 if (log)
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00004833 log->Printf ("Process::GetProfileData (buf = %p, size = %" PRIu64 ")",
4834 static_cast<void*>(buf),
4835 static_cast<uint64_t>(buf_size));
Han Ming Ongab3b8b22012-11-17 00:21:04 +00004836 if (bytes_available > buf_size)
4837 {
Han Ming Ong91ed6b82013-06-24 18:15:05 +00004838 memcpy(buf, one_profile_data.c_str(), buf_size);
4839 one_profile_data.erase(0, buf_size);
Han Ming Ongab3b8b22012-11-17 00:21:04 +00004840 bytes_available = buf_size;
4841 }
4842 else
4843 {
Han Ming Ong91ed6b82013-06-24 18:15:05 +00004844 memcpy(buf, one_profile_data.c_str(), bytes_available);
Han Ming Ong929a94f2012-11-29 22:14:45 +00004845 m_profile_data.erase(m_profile_data.begin());
Han Ming Ongab3b8b22012-11-17 00:21:04 +00004846 }
4847 }
4848 return bytes_available;
4849}
4850
Greg Clayton93e86192011-11-13 04:45:22 +00004851//------------------------------------------------------------------
4852// Process STDIO
4853//------------------------------------------------------------------
4854
4855size_t
4856Process::GetSTDOUT (char *buf, size_t buf_size, Error &error)
4857{
Saleem Abdulrasoolbb19a132016-05-19 05:13:57 +00004858 std::lock_guard<std::recursive_mutex> guard(m_stdio_communication_mutex);
Greg Clayton93e86192011-11-13 04:45:22 +00004859 size_t bytes_available = m_stdout_data.size();
4860 if (bytes_available > 0)
4861 {
Greg Clayton5160ce52013-03-27 23:08:40 +00004862 Log *log (lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_PROCESS));
Greg Clayton93e86192011-11-13 04:45:22 +00004863 if (log)
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00004864 log->Printf ("Process::GetSTDOUT (buf = %p, size = %" PRIu64 ")",
4865 static_cast<void*>(buf),
4866 static_cast<uint64_t>(buf_size));
Greg Clayton93e86192011-11-13 04:45:22 +00004867 if (bytes_available > buf_size)
4868 {
4869 memcpy(buf, m_stdout_data.c_str(), buf_size);
4870 m_stdout_data.erase(0, buf_size);
4871 bytes_available = buf_size;
4872 }
4873 else
4874 {
4875 memcpy(buf, m_stdout_data.c_str(), bytes_available);
4876 m_stdout_data.clear();
4877 }
4878 }
4879 return bytes_available;
4880}
4881
Greg Clayton93e86192011-11-13 04:45:22 +00004882size_t
4883Process::GetSTDERR (char *buf, size_t buf_size, Error &error)
4884{
Saleem Abdulrasoolbb19a132016-05-19 05:13:57 +00004885 std::lock_guard<std::recursive_mutex> gaurd(m_stdio_communication_mutex);
Greg Clayton93e86192011-11-13 04:45:22 +00004886 size_t bytes_available = m_stderr_data.size();
4887 if (bytes_available > 0)
4888 {
Greg Clayton5160ce52013-03-27 23:08:40 +00004889 Log *log (lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_PROCESS));
Greg Clayton93e86192011-11-13 04:45:22 +00004890 if (log)
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00004891 log->Printf ("Process::GetSTDERR (buf = %p, size = %" PRIu64 ")",
4892 static_cast<void*>(buf),
4893 static_cast<uint64_t>(buf_size));
Greg Clayton93e86192011-11-13 04:45:22 +00004894 if (bytes_available > buf_size)
4895 {
4896 memcpy(buf, m_stderr_data.c_str(), buf_size);
4897 m_stderr_data.erase(0, buf_size);
4898 bytes_available = buf_size;
4899 }
4900 else
4901 {
4902 memcpy(buf, m_stderr_data.c_str(), bytes_available);
4903 m_stderr_data.clear();
4904 }
4905 }
4906 return bytes_available;
4907}
4908
4909void
Caroline Ticeef5c6d02010-11-16 05:07:41 +00004910Process::STDIOReadThreadBytesReceived (void *baton, const void *src, size_t src_len)
4911{
4912 Process *process = (Process *) baton;
4913 process->AppendSTDOUT (static_cast<const char *>(src), src_len);
4914}
4915
Greg Clayton44d93782014-01-27 23:43:24 +00004916class IOHandlerProcessSTDIO :
4917 public IOHandler
4918{
4919public:
4920 IOHandlerProcessSTDIO (Process *process,
4921 int write_fd) :
Kate Stonee30f11d2014-11-17 19:06:59 +00004922 IOHandler(process->GetTarget().GetDebugger(), IOHandler::Type::ProcessIO),
Greg Clayton44d93782014-01-27 23:43:24 +00004923 m_process (process),
4924 m_read_file (),
4925 m_write_file (write_fd, false),
Greg Clayton100eb932014-07-02 21:10:39 +00004926 m_pipe ()
Greg Clayton44d93782014-01-27 23:43:24 +00004927 {
Pavel Labathfb7d5b82015-05-28 13:41:08 +00004928 m_pipe.CreateNew(false);
Greg Clayton44d93782014-01-27 23:43:24 +00004929 m_read_file.SetDescriptor(GetInputFD(), false);
4930 }
4931
Eugene Zelenko8f30a652015-10-23 18:39:37 +00004932 ~IOHandlerProcessSTDIO() override = default;
4933
Greg Clayton44d93782014-01-27 23:43:24 +00004934 // Each IOHandler gets to run until it is done. It should read data
4935 // from the "in" and place output into "out" and "err and return
4936 // when done.
Pavel Labath44464872015-05-27 12:40:32 +00004937 void
4938 Run () override
Greg Clayton44d93782014-01-27 23:43:24 +00004939 {
Pavel Labathfb7d5b82015-05-28 13:41:08 +00004940 if (!m_read_file.IsValid() || !m_write_file.IsValid() || !m_pipe.CanRead() || !m_pipe.CanWrite())
Greg Clayton44d93782014-01-27 23:43:24 +00004941 {
Pavel Labathfb7d5b82015-05-28 13:41:08 +00004942 SetIsDone(true);
4943 return;
4944 }
4945
4946 SetIsDone(false);
4947 const int read_fd = m_read_file.GetDescriptor();
4948 TerminalState terminal_state;
4949 terminal_state.Save (read_fd, false);
4950 Terminal terminal(read_fd);
4951 terminal.SetCanonical(false);
4952 terminal.SetEcho(false);
Deepak Panickal914b8d92014-01-31 18:48:46 +00004953// FD_ZERO, FD_SET are not supported on windows
Hafiz Abid Qadeer6eff1012014-03-12 10:45:23 +00004954#ifndef _WIN32
Pavel Labathfb7d5b82015-05-28 13:41:08 +00004955 const int pipe_read_fd = m_pipe.GetReadFileDescriptor();
Greg Clayton860582f2016-02-26 17:36:44 +00004956 m_is_running = true;
Pavel Labathfb7d5b82015-05-28 13:41:08 +00004957 while (!GetIsDone())
4958 {
Greg Claytonee1f5782016-08-10 22:43:48 +00004959 SelectHelper select_helper;
4960 select_helper.FDSetRead(read_fd);
4961 select_helper.FDSetRead(pipe_read_fd);
4962 Error error = select_helper.Select();
Greg Clayton860582f2016-02-26 17:36:44 +00004963
Greg Claytonee1f5782016-08-10 22:43:48 +00004964 if (error.Fail())
Pavel Labathfb7d5b82015-05-28 13:41:08 +00004965 {
Greg Claytonee1f5782016-08-10 22:43:48 +00004966 SetIsDone(true);
Pavel Labathfb7d5b82015-05-28 13:41:08 +00004967 }
Greg Claytonee1f5782016-08-10 22:43:48 +00004968 else
Pavel Labathfb7d5b82015-05-28 13:41:08 +00004969 {
4970 char ch = 0;
4971 size_t n;
Greg Claytonee1f5782016-08-10 22:43:48 +00004972 if (select_helper.FDIsSetRead(read_fd))
Greg Clayton44d93782014-01-27 23:43:24 +00004973 {
Pavel Labathfb7d5b82015-05-28 13:41:08 +00004974 n = 1;
4975 if (m_read_file.Read(&ch, n).Success() && n == 1)
Greg Clayton44d93782014-01-27 23:43:24 +00004976 {
Pavel Labathfb7d5b82015-05-28 13:41:08 +00004977 if (m_write_file.Write(&ch, n).Fail() || n != 1)
Greg Clayton44d93782014-01-27 23:43:24 +00004978 SetIsDone(true);
4979 }
Pavel Labathfb7d5b82015-05-28 13:41:08 +00004980 else
4981 SetIsDone(true);
4982 }
Greg Claytonee1f5782016-08-10 22:43:48 +00004983 if (select_helper.FDIsSetRead(pipe_read_fd))
Pavel Labathfb7d5b82015-05-28 13:41:08 +00004984 {
4985 size_t bytes_read;
4986 // Consume the interrupt byte
4987 Error error = m_pipe.Read(&ch, 1, bytes_read);
4988 if (error.Success())
Greg Clayton44d93782014-01-27 23:43:24 +00004989 {
Pavel Labathfb7d5b82015-05-28 13:41:08 +00004990 switch (ch)
Greg Clayton44d93782014-01-27 23:43:24 +00004991 {
Pavel Labathfb7d5b82015-05-28 13:41:08 +00004992 case 'q':
Greg Clayton44d93782014-01-27 23:43:24 +00004993 SetIsDone(true);
Pavel Labathfb7d5b82015-05-28 13:41:08 +00004994 break;
4995 case 'i':
4996 if (StateIsRunningState(m_process->GetState()))
Pavel Labathfcc7f662015-10-07 15:11:11 +00004997 m_process->SendAsyncInterrupt();
Pavel Labathfb7d5b82015-05-28 13:41:08 +00004998 break;
Greg Clayton44d93782014-01-27 23:43:24 +00004999 }
5000 }
5001 }
Greg Clayton44d93782014-01-27 23:43:24 +00005002 }
Greg Clayton44d93782014-01-27 23:43:24 +00005003 }
Greg Clayton860582f2016-02-26 17:36:44 +00005004 m_is_running = false;
Pavel Labathfb7d5b82015-05-28 13:41:08 +00005005#endif
5006 terminal_state.Restore();
Greg Clayton44d93782014-01-27 23:43:24 +00005007 }
5008
Pavel Labath44464872015-05-27 12:40:32 +00005009 void
5010 Cancel () override
Greg Clayton44d93782014-01-27 23:43:24 +00005011 {
Greg Clayton860582f2016-02-26 17:36:44 +00005012 SetIsDone(true);
5013 // Only write to our pipe to cancel if we are in IOHandlerProcessSTDIO::Run().
5014 // We can end up with a python command that is being run from the command
5015 // interpreter:
5016 //
5017 // (lldb) step_process_thousands_of_times
5018 //
5019 // In this case the command interpreter will be in the middle of handling
5020 // the command and if the process pushes and pops the IOHandler thousands
5021 // of times, we can end up writing to m_pipe without ever consuming the
5022 // bytes from the pipe in IOHandlerProcessSTDIO::Run() and end up
5023 // deadlocking when the pipe gets fed up and blocks until data is consumed.
5024 if (m_is_running)
5025 {
5026 char ch = 'q'; // Send 'q' for quit
5027 size_t bytes_written = 0;
5028 m_pipe.Write(&ch, 1, bytes_written);
5029 }
Greg Clayton44d93782014-01-27 23:43:24 +00005030 }
Greg Claytone68f5d62014-02-24 22:50:57 +00005031
Pavel Labath44464872015-05-27 12:40:32 +00005032 bool
5033 Interrupt () override
Greg Claytone68f5d62014-02-24 22:50:57 +00005034 {
Greg Clayton19e11352014-02-26 22:47:33 +00005035 // Do only things that are safe to do in an interrupt context (like in
5036 // a SIGINT handler), like write 1 byte to a file descriptor. This will
5037 // interrupt the IOHandlerProcessSTDIO::Run() and we can look at the byte
Pavel Labathfcc7f662015-10-07 15:11:11 +00005038 // that was written to the pipe and then call m_process->SendAsyncInterrupt()
5039 // from a much safer location in code.
Greg Clayton0fdd3ae2014-07-16 21:05:41 +00005040 if (m_active)
5041 {
5042 char ch = 'i'; // Send 'i' for interrupt
Zachary Turner0b9d3ee2014-12-17 18:02:19 +00005043 size_t bytes_written = 0;
5044 Error result = m_pipe.Write(&ch, 1, bytes_written);
5045 return result.Success();
Greg Clayton0fdd3ae2014-07-16 21:05:41 +00005046 }
5047 else
5048 {
5049 // This IOHandler might be pushed on the stack, but not being run currently
5050 // so do the right thing if we aren't actively watching for STDIN by sending
5051 // the interrupt to the process. Otherwise the write to the pipe above would
5052 // do nothing. This can happen when the command interpreter is running and
5053 // gets a "expression ...". It will be on the IOHandler thread and sending
5054 // the input is complete to the delegate which will cause the expression to
5055 // run, which will push the process IO handler, but not run it.
5056
5057 if (StateIsRunningState(m_process->GetState()))
5058 {
5059 m_process->SendAsyncInterrupt();
5060 return true;
5061 }
5062 }
5063 return false;
Greg Claytone68f5d62014-02-24 22:50:57 +00005064 }
Greg Clayton44d93782014-01-27 23:43:24 +00005065
Pavel Labath44464872015-05-27 12:40:32 +00005066 void
5067 GotEOF() override
Greg Clayton44d93782014-01-27 23:43:24 +00005068 {
Greg Clayton44d93782014-01-27 23:43:24 +00005069 }
5070
5071protected:
5072 Process *m_process;
5073 File m_read_file; // Read from this file (usually actual STDIN for LLDB
5074 File m_write_file; // Write to this file (usually the master pty for getting io to debuggee)
Greg Clayton100eb932014-07-02 21:10:39 +00005075 Pipe m_pipe;
Greg Clayton860582f2016-02-26 17:36:44 +00005076 std::atomic<bool> m_is_running;
Greg Clayton44d93782014-01-27 23:43:24 +00005077};
5078
Caroline Ticeef5c6d02010-11-16 05:07:41 +00005079void
Greg Clayton44d93782014-01-27 23:43:24 +00005080Process::SetSTDIOFileDescriptor (int fd)
Caroline Ticeef5c6d02010-11-16 05:07:41 +00005081{
5082 // First set up the Read Thread for reading/handling process I/O
5083
Greg Clayton44d93782014-01-27 23:43:24 +00005084 std::unique_ptr<ConnectionFileDescriptor> conn_ap (new ConnectionFileDescriptor (fd, true));
Caroline Ticeef5c6d02010-11-16 05:07:41 +00005085
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00005086 if (conn_ap)
Caroline Ticeef5c6d02010-11-16 05:07:41 +00005087 {
5088 m_stdio_communication.SetConnection (conn_ap.release());
5089 if (m_stdio_communication.IsConnected())
5090 {
5091 m_stdio_communication.SetReadThreadBytesReceivedCallback (STDIOReadThreadBytesReceived, this);
5092 m_stdio_communication.StartReadThread();
5093
5094 // Now read thread is set up, set up input reader.
5095
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00005096 if (!m_process_input_reader)
Greg Clayton44d93782014-01-27 23:43:24 +00005097 m_process_input_reader.reset (new IOHandlerProcessSTDIO (this, fd));
Caroline Ticeef5c6d02010-11-16 05:07:41 +00005098 }
5099 }
5100}
5101
Greg Claytonb4874f12014-02-28 18:22:24 +00005102bool
Greg Clayton6fea17e2014-03-03 19:15:20 +00005103Process::ProcessIOHandlerIsActive ()
5104{
5105 IOHandlerSP io_handler_sp (m_process_input_reader);
5106 if (io_handler_sp)
Zachary Turner7529df92015-09-01 20:02:29 +00005107 return GetTarget().GetDebugger().IsTopIOHandler (io_handler_sp);
Greg Clayton6fea17e2014-03-03 19:15:20 +00005108 return false;
5109}
5110bool
Greg Clayton44d93782014-01-27 23:43:24 +00005111Process::PushProcessIOHandler ()
Caroline Ticeef5c6d02010-11-16 05:07:41 +00005112{
Greg Clayton44d93782014-01-27 23:43:24 +00005113 IOHandlerSP io_handler_sp (m_process_input_reader);
5114 if (io_handler_sp)
5115 {
Pavel Labath44464872015-05-27 12:40:32 +00005116 Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_PROCESS));
5117 if (log)
5118 log->Printf("Process::%s pushing IO handler", __FUNCTION__);
5119
Greg Clayton44d93782014-01-27 23:43:24 +00005120 io_handler_sp->SetIsDone(false);
Zachary Turner7529df92015-09-01 20:02:29 +00005121 GetTarget().GetDebugger().PushIOHandler (io_handler_sp);
Greg Claytonb4874f12014-02-28 18:22:24 +00005122 return true;
Greg Clayton44d93782014-01-27 23:43:24 +00005123 }
Greg Claytonb4874f12014-02-28 18:22:24 +00005124 return false;
Caroline Ticeef5c6d02010-11-16 05:07:41 +00005125}
5126
Greg Claytonb4874f12014-02-28 18:22:24 +00005127bool
Greg Clayton44d93782014-01-27 23:43:24 +00005128Process::PopProcessIOHandler ()
Caroline Ticeef5c6d02010-11-16 05:07:41 +00005129{
Greg Clayton44d93782014-01-27 23:43:24 +00005130 IOHandlerSP io_handler_sp (m_process_input_reader);
5131 if (io_handler_sp)
Zachary Turner7529df92015-09-01 20:02:29 +00005132 return GetTarget().GetDebugger().PopIOHandler (io_handler_sp);
Greg Claytonb4874f12014-02-28 18:22:24 +00005133 return false;
Caroline Ticeef5c6d02010-11-16 05:07:41 +00005134}
5135
Greg Claytonbfe5f3b2011-02-18 01:44:25 +00005136// The process needs to know about installed plug-ins
Greg Clayton99d0faf2010-11-18 23:32:35 +00005137void
Caroline Tice20bd37f2011-03-10 22:14:10 +00005138Process::SettingsInitialize ()
Caroline Tice3df9a8d2010-09-04 00:03:46 +00005139{
Greg Clayton6920b522012-08-22 18:39:03 +00005140 Thread::SettingsInitialize ();
Greg Clayton99d0faf2010-11-18 23:32:35 +00005141}
Caroline Tice3df9a8d2010-09-04 00:03:46 +00005142
Greg Clayton99d0faf2010-11-18 23:32:35 +00005143void
Caroline Tice20bd37f2011-03-10 22:14:10 +00005144Process::SettingsTerminate ()
Greg Claytonbfe5f3b2011-02-18 01:44:25 +00005145{
Greg Clayton6920b522012-08-22 18:39:03 +00005146 Thread::SettingsTerminate ();
Greg Clayton99d0faf2010-11-18 23:32:35 +00005147}
Caroline Tice3df9a8d2010-09-04 00:03:46 +00005148
Jim Inghamc60963c2015-10-12 19:11:03 +00005149namespace
5150{
5151 // RestorePlanState is used to record the "is private", "is master" and "okay to discard" fields of
5152 // the plan we are running, and reset it on Clean or on destruction.
5153 // It will only reset the state once, so you can call Clean and then monkey with the state and it
5154 // won't get reset on you again.
5155
5156 class RestorePlanState
5157 {
5158 public:
5159 RestorePlanState (lldb::ThreadPlanSP thread_plan_sp) :
5160 m_thread_plan_sp(thread_plan_sp),
5161 m_already_reset(false)
5162 {
5163 if (m_thread_plan_sp)
5164 {
5165 m_private = m_thread_plan_sp->GetPrivate();
5166 m_is_master = m_thread_plan_sp->IsMasterPlan();
5167 m_okay_to_discard = m_thread_plan_sp->OkayToDiscard();
5168 }
5169 }
5170
5171 ~RestorePlanState()
5172 {
5173 Clean();
5174 }
5175
5176 void
5177 Clean ()
5178 {
5179 if (!m_already_reset && m_thread_plan_sp)
5180 {
5181 m_already_reset = true;
5182 m_thread_plan_sp->SetPrivate(m_private);
5183 m_thread_plan_sp->SetIsMasterPlan (m_is_master);
5184 m_thread_plan_sp->SetOkayToDiscard(m_okay_to_discard);
5185 }
5186 }
Eugene Zelenko8f30a652015-10-23 18:39:37 +00005187
Jim Inghamc60963c2015-10-12 19:11:03 +00005188 private:
5189 lldb::ThreadPlanSP m_thread_plan_sp;
5190 bool m_already_reset;
5191 bool m_private;
5192 bool m_is_master;
5193 bool m_okay_to_discard;
5194 };
Eugene Zelenko8f30a652015-10-23 18:39:37 +00005195} // anonymous namespace
Jim Inghamc60963c2015-10-12 19:11:03 +00005196
Jim Ingham1624a2d2014-05-05 02:26:40 +00005197ExpressionResults
Sean Callanan579e70c2016-03-19 00:03:59 +00005198Process::RunThreadPlan(ExecutionContext &exe_ctx, lldb::ThreadPlanSP &thread_plan_sp,
5199 const EvaluateExpressionOptions &options, DiagnosticManager &diagnostic_manager)
Jim Inghamf48169b2010-11-30 02:22:11 +00005200{
Jim Ingham8646d3c2014-05-05 02:47:44 +00005201 ExpressionResults return_value = eExpressionSetupError;
Jim Ingham3cc425832016-05-24 18:29:36 +00005202
5203 std::lock_guard<std::mutex> run_thread_plan_locker(m_run_thread_plan_lock);
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005204
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00005205 if (!thread_plan_sp)
Jim Ingham77787032011-01-20 02:03:18 +00005206 {
Sean Callanan579e70c2016-03-19 00:03:59 +00005207 diagnostic_manager.PutCString(eDiagnosticSeverityError, "RunThreadPlan called with empty thread plan.");
Jim Ingham8646d3c2014-05-05 02:47:44 +00005208 return eExpressionSetupError;
Jim Ingham77787032011-01-20 02:03:18 +00005209 }
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005210
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00005211 if (!thread_plan_sp->ValidatePlan(nullptr))
Jim Ingham7d7931d2013-03-28 00:05:34 +00005212 {
Sean Callanan579e70c2016-03-19 00:03:59 +00005213 diagnostic_manager.PutCString(eDiagnosticSeverityError, "RunThreadPlan called with an invalid thread plan.");
Jim Ingham8646d3c2014-05-05 02:47:44 +00005214 return eExpressionSetupError;
Jim Ingham7d7931d2013-03-28 00:05:34 +00005215 }
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005216
Greg Claytonc14ee322011-09-22 04:58:26 +00005217 if (exe_ctx.GetProcessPtr() != this)
5218 {
Sean Callanan579e70c2016-03-19 00:03:59 +00005219 diagnostic_manager.PutCString(eDiagnosticSeverityError, "RunThreadPlan called on wrong process.");
Jim Ingham8646d3c2014-05-05 02:47:44 +00005220 return eExpressionSetupError;
Greg Claytonc14ee322011-09-22 04:58:26 +00005221 }
5222
5223 Thread *thread = exe_ctx.GetThreadPtr();
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00005224 if (thread == nullptr)
Greg Claytonc14ee322011-09-22 04:58:26 +00005225 {
Sean Callanan579e70c2016-03-19 00:03:59 +00005226 diagnostic_manager.PutCString(eDiagnosticSeverityError, "RunThreadPlan called with invalid thread.");
Jim Ingham8646d3c2014-05-05 02:47:44 +00005227 return eExpressionSetupError;
Greg Claytonc14ee322011-09-22 04:58:26 +00005228 }
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005229
Jim Inghamc60963c2015-10-12 19:11:03 +00005230 // We need to change some of the thread plan attributes for the thread plan runner. This will restore them
5231 // when we are done:
Jim Ingham3cc425832016-05-24 18:29:36 +00005232
Jim Inghamc60963c2015-10-12 19:11:03 +00005233 RestorePlanState thread_plan_restorer(thread_plan_sp);
5234
Jim Ingham17e5c4e2011-05-17 22:24:54 +00005235 // We rely on the thread plan we are running returning "PlanCompleted" if when it successfully completes.
5236 // For that to be true the plan can't be private - since private plans suppress themselves in the
5237 // GetCompletedPlan call.
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005238
Jim Ingham17e5c4e2011-05-17 22:24:54 +00005239 thread_plan_sp->SetPrivate(false);
Jim Inghamc60963c2015-10-12 19:11:03 +00005240
5241 // The plans run with RunThreadPlan also need to be terminal master plans or when they are done we will end
5242 // up asking the plan above us whether we should stop, which may give the wrong answer.
5243
5244 thread_plan_sp->SetIsMasterPlan (true);
5245 thread_plan_sp->SetOkayToDiscard(false);
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005246
Jim Ingham444586b2011-01-24 06:34:17 +00005247 if (m_private_state.GetValue() != eStateStopped)
5248 {
Sean Callanan579e70c2016-03-19 00:03:59 +00005249 diagnostic_manager.PutCString(eDiagnosticSeverityError,
5250 "RunThreadPlan called while the private state was not stopped.");
Jim Ingham8646d3c2014-05-05 02:47:44 +00005251 return eExpressionSetupError;
Jim Ingham444586b2011-01-24 06:34:17 +00005252 }
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005253
Jim Ingham66243842011-08-13 00:56:10 +00005254 // Save the thread & frame from the exe_ctx for restoration after we run
Greg Claytonc14ee322011-09-22 04:58:26 +00005255 const uint32_t thread_idx_id = thread->GetIndexID();
Jason Molendab57e4a12013-11-04 09:33:30 +00005256 StackFrameSP selected_frame_sp = thread->GetSelectedFrame();
Jim Ingham11b0e052013-02-19 23:22:45 +00005257 if (!selected_frame_sp)
5258 {
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00005259 thread->SetSelectedFrame(nullptr);
Jim Ingham11b0e052013-02-19 23:22:45 +00005260 selected_frame_sp = thread->GetSelectedFrame();
5261 if (!selected_frame_sp)
5262 {
Sean Callanan579e70c2016-03-19 00:03:59 +00005263 diagnostic_manager.Printf(eDiagnosticSeverityError,
5264 "RunThreadPlan called without a selected frame on thread %d", thread_idx_id);
Jim Ingham8646d3c2014-05-05 02:47:44 +00005265 return eExpressionSetupError;
Jim Ingham11b0e052013-02-19 23:22:45 +00005266 }
5267 }
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005268
Jim Ingham11b0e052013-02-19 23:22:45 +00005269 StackID ctx_frame_id = selected_frame_sp->GetStackID();
Jim Inghamf48169b2010-11-30 02:22:11 +00005270
5271 // N.B. Running the target may unset the currently selected thread and frame. We don't want to do that either,
5272 // so we should arrange to reset them as well.
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005273
Greg Claytonc14ee322011-09-22 04:58:26 +00005274 lldb::ThreadSP selected_thread_sp = GetThreadList().GetSelectedThread();
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005275
Jim Ingham66243842011-08-13 00:56:10 +00005276 uint32_t selected_tid;
5277 StackID selected_stack_id;
Greg Clayton762f7132011-09-18 18:59:15 +00005278 if (selected_thread_sp)
Jim Inghamf48169b2010-11-30 02:22:11 +00005279 {
5280 selected_tid = selected_thread_sp->GetIndexID();
Jim Ingham66243842011-08-13 00:56:10 +00005281 selected_stack_id = selected_thread_sp->GetSelectedFrame()->GetStackID();
Jim Inghamf48169b2010-11-30 02:22:11 +00005282 }
5283 else
5284 {
5285 selected_tid = LLDB_INVALID_THREAD_ID;
5286 }
5287
Zachary Turner39de3112014-09-09 20:54:56 +00005288 HostThread backup_private_state_thread;
Jason Molenda76513fd2014-10-15 23:39:31 +00005289 lldb::StateType old_state = eStateInvalid;
Jim Ingham076b3042012-04-10 01:21:57 +00005290 lldb::ThreadPlanSP stopper_base_plan_sp;
Jim Ingham372787f2012-04-07 00:00:41 +00005291
Greg Clayton5160ce52013-03-27 23:08:40 +00005292 Log *log(lldb_private::GetLogIfAnyCategoriesSet (LIBLLDB_LOG_STEP | LIBLLDB_LOG_PROCESS));
Zachary Turner39de3112014-09-09 20:54:56 +00005293 if (m_private_state_thread.EqualsThread(Host::GetCurrentThread()))
Jim Ingham372787f2012-04-07 00:00:41 +00005294 {
Jim Ingham076b3042012-04-10 01:21:57 +00005295 // Yikes, we are running on the private state thread! So we can't wait for public events on this thread, since
5296 // we are the thread that is generating public events.
Jim Ingham372787f2012-04-07 00:00:41 +00005297 // The simplest thing to do is to spin up a temporary thread to handle private state thread events while
Jim Ingham076b3042012-04-10 01:21:57 +00005298 // we are fielding public events here.
5299 if (log)
Jason Molendad251c9d2012-11-17 01:41:04 +00005300 log->Printf ("Running thread plan on private state thread, spinning up another state thread to handle the events.");
Jim Ingham076b3042012-04-10 01:21:57 +00005301
Jim Ingham372787f2012-04-07 00:00:41 +00005302 backup_private_state_thread = m_private_state_thread;
Jim Ingham076b3042012-04-10 01:21:57 +00005303
5304 // One other bit of business: we want to run just this thread plan and anything it pushes, and then stop,
5305 // returning control here.
5306 // But in the normal course of things, the plan above us on the stack would be given a shot at the stop
5307 // event before deciding to stop, and we don't want that. So we insert a "stopper" base plan on the stack
5308 // before the plan we want to run. Since base plans always stop and return control to the user, that will
5309 // do just what we want.
5310 stopper_base_plan_sp.reset(new ThreadPlanBase (*thread));
5311 thread->QueueThreadPlan (stopper_base_plan_sp, false);
5312 // Have to make sure our public state is stopped, since otherwise the reporting logic below doesn't work correctly.
5313 old_state = m_public_state.GetValue();
5314 m_public_state.SetValueNoLock(eStateStopped);
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005315
Jim Ingham076b3042012-04-10 01:21:57 +00005316 // Now spin up the private state thread:
Jim Ingham372787f2012-04-07 00:00:41 +00005317 StartPrivateStateThread(true);
5318 }
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005319
Jim Ingham372787f2012-04-07 00:00:41 +00005320 thread->QueueThreadPlan(thread_plan_sp, false); // This used to pass "true" does that make sense?
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005321
Jim Ingham6fbc48b2013-11-07 00:11:47 +00005322 if (options.GetDebug())
5323 {
5324 // In this case, we aren't actually going to run, we just want to stop right away.
5325 // Flush this thread so we will refetch the stacks and show the correct backtrace.
5326 // FIXME: To make this prettier we should invent some stop reason for this, but that
5327 // is only cosmetic, and this functionality is only of use to lldb developers who can
5328 // live with not pretty...
5329 thread->Flush();
Jim Ingham8646d3c2014-05-05 02:47:44 +00005330 return eExpressionStoppedForDebug;
Jim Ingham6fbc48b2013-11-07 00:11:47 +00005331 }
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005332
Jim Ingham583bbb12016-03-07 21:50:25 +00005333 ListenerSP listener_sp(Listener::MakeListener("lldb.process.listener.run-thread-plan"));
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005334
Sean Callanana46ec452012-07-11 21:31:24 +00005335 lldb::EventSP event_to_broadcast_sp;
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005336
Jim Ingham77787032011-01-20 02:03:18 +00005337 {
Sean Callanana46ec452012-07-11 21:31:24 +00005338 // This process event hijacker Hijacks the Public events and its destructor makes sure that the process events get
5339 // restored on exit to the function.
5340 //
5341 // If the event needs to propagate beyond the hijacker (e.g., the process exits during execution), then the event
5342 // is put into event_to_broadcast_sp for rebroadcasting.
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005343
Jim Ingham583bbb12016-03-07 21:50:25 +00005344 ProcessEventHijacker run_thread_plan_hijacker (*this, listener_sp);
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005345
Jim Inghamf48169b2010-11-30 02:22:11 +00005346 if (log)
Jim Ingham0f16e732011-02-08 05:20:59 +00005347 {
5348 StreamString s;
Sean Callanana46ec452012-07-11 21:31:24 +00005349 thread_plan_sp->GetDescription(&s, lldb::eDescriptionLevelVerbose);
Daniel Malead01b2952012-11-29 21:49:15 +00005350 log->Printf ("Process::RunThreadPlan(): Resuming thread %u - 0x%4.4" PRIx64 " to run thread plan \"%s\".",
Sean Callanana46ec452012-07-11 21:31:24 +00005351 thread->GetIndexID(),
5352 thread->GetID(),
5353 s.GetData());
5354 }
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005355
Sean Callanana46ec452012-07-11 21:31:24 +00005356 bool got_event;
5357 lldb::EventSP event_sp;
5358 lldb::StateType stop_state = lldb::eStateInvalid;
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005359
Jim Ingham0161b492013-02-09 01:29:05 +00005360 bool before_first_timeout = true; // This is set to false the first time that we have to halt the target.
Sean Callanana46ec452012-07-11 21:31:24 +00005361 bool do_resume = true;
Jim Ingham184e9812013-01-15 02:47:48 +00005362 bool handle_running_event = true;
Jim Ingham35e1bda2012-10-16 21:41:58 +00005363 const uint64_t default_one_thread_timeout_usec = 250000;
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005364
Jim Ingham0161b492013-02-09 01:29:05 +00005365 // This is just for accounting:
5366 uint32_t num_resumes = 0;
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005367
Jim Ingham6fbc48b2013-11-07 00:11:47 +00005368 uint32_t timeout_usec = options.GetTimeoutUsec();
Jim Inghamfd95f892014-04-22 01:41:52 +00005369 uint32_t one_thread_timeout_usec;
5370 uint32_t all_threads_timeout_usec = 0;
Jim Inghamfe1c3422014-04-16 02:24:48 +00005371
5372 // If we are going to run all threads the whole time, or if we are only going to run one thread,
5373 // then we don't need the first timeout. So we set the final timeout, and pretend we are after the
5374 // first timeout already.
5375
5376 if (!options.GetStopOthers() || !options.GetTryAllThreads())
Jim Ingham286fb1e2014-02-28 02:52:06 +00005377 {
5378 before_first_timeout = false;
Jim Inghamfd95f892014-04-22 01:41:52 +00005379 one_thread_timeout_usec = 0;
5380 all_threads_timeout_usec = timeout_usec;
Jim Ingham286fb1e2014-02-28 02:52:06 +00005381 }
Jim Inghamfe1c3422014-04-16 02:24:48 +00005382 else
Jim Ingham0161b492013-02-09 01:29:05 +00005383 {
Jim Inghamfd95f892014-04-22 01:41:52 +00005384 uint32_t option_one_thread_timeout = options.GetOneThreadTimeoutUsec();
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005385
Jim Ingham914f4e72014-03-28 21:58:28 +00005386 // If the overall wait is forever, then we only need to set the one thread timeout:
5387 if (timeout_usec == 0)
5388 {
Ed Maste801335c2014-03-31 19:28:14 +00005389 if (option_one_thread_timeout != 0)
Jim Inghamfd95f892014-04-22 01:41:52 +00005390 one_thread_timeout_usec = option_one_thread_timeout;
Jim Ingham914f4e72014-03-28 21:58:28 +00005391 else
Jim Inghamfd95f892014-04-22 01:41:52 +00005392 one_thread_timeout_usec = default_one_thread_timeout_usec;
Jim Ingham914f4e72014-03-28 21:58:28 +00005393 }
Jim Ingham0161b492013-02-09 01:29:05 +00005394 else
5395 {
Jim Ingham914f4e72014-03-28 21:58:28 +00005396 // Otherwise, if the one thread timeout is set, make sure it isn't longer than the overall timeout,
5397 // and use it, otherwise use half the total timeout, bounded by the default_one_thread_timeout_usec.
5398 uint64_t computed_one_thread_timeout;
5399 if (option_one_thread_timeout != 0)
5400 {
5401 if (timeout_usec < option_one_thread_timeout)
5402 {
Sean Callanan579e70c2016-03-19 00:03:59 +00005403 diagnostic_manager.PutCString(
5404 eDiagnosticSeverityError,
5405 "RunThreadPlan called without one thread timeout greater than total timeout");
Jim Ingham8646d3c2014-05-05 02:47:44 +00005406 return eExpressionSetupError;
Jim Ingham914f4e72014-03-28 21:58:28 +00005407 }
5408 computed_one_thread_timeout = option_one_thread_timeout;
5409 }
5410 else
5411 {
5412 computed_one_thread_timeout = timeout_usec / 2;
5413 if (computed_one_thread_timeout > default_one_thread_timeout_usec)
5414 computed_one_thread_timeout = default_one_thread_timeout_usec;
5415 }
Jim Inghamfd95f892014-04-22 01:41:52 +00005416 one_thread_timeout_usec = computed_one_thread_timeout;
5417 all_threads_timeout_usec = timeout_usec - one_thread_timeout_usec;
Jim Ingham0161b492013-02-09 01:29:05 +00005418 }
Jim Ingham0161b492013-02-09 01:29:05 +00005419 }
Jim Inghamfe1c3422014-04-16 02:24:48 +00005420
5421 if (log)
Jim Inghamfd95f892014-04-22 01:41:52 +00005422 log->Printf ("Stop others: %u, try all: %u, before_first: %u, one thread: %" PRIu32 " - all threads: %" PRIu32 ".\n",
Jim Inghamfe1c3422014-04-16 02:24:48 +00005423 options.GetStopOthers(),
5424 options.GetTryAllThreads(),
Jim Inghamfd95f892014-04-22 01:41:52 +00005425 before_first_timeout,
5426 one_thread_timeout_usec,
5427 all_threads_timeout_usec);
Jim Ingham0161b492013-02-09 01:29:05 +00005428
Jim Ingham1460e4b2014-01-10 23:46:59 +00005429 // This isn't going to work if there are unfetched events on the queue.
5430 // Are there cases where we might want to run the remaining events here, and then try to
5431 // call the function? That's probably being too tricky for our own good.
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005432
Jim Ingham583bbb12016-03-07 21:50:25 +00005433 Event *other_events = listener_sp->PeekAtNextEvent();
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00005434 if (other_events != nullptr)
Jim Ingham1460e4b2014-01-10 23:46:59 +00005435 {
Sean Callanan579e70c2016-03-19 00:03:59 +00005436 diagnostic_manager.PutCString(eDiagnosticSeverityError,
5437 "RunThreadPlan called with pending events on the queue.");
Jim Ingham8646d3c2014-05-05 02:47:44 +00005438 return eExpressionSetupError;
Jim Ingham1460e4b2014-01-10 23:46:59 +00005439 }
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005440
Jim Ingham1460e4b2014-01-10 23:46:59 +00005441 // We also need to make sure that the next event is delivered. We might be calling a function as part of
5442 // a thread plan, in which case the last delivered event could be the running event, and we don't want
5443 // event coalescing to cause us to lose OUR running event...
5444 ForceNextEventDelivery();
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005445
Jim Ingham8559a352012-11-26 23:52:18 +00005446 // This while loop must exit out the bottom, there's cleanup that we need to do when we are done.
5447 // So don't call return anywhere within it.
Jim Ingham35878c42014-04-08 21:33:21 +00005448
5449#ifdef LLDB_RUN_THREAD_HALT_WITH_EVENT
5450 // It's pretty much impossible to write test cases for things like:
5451 // One thread timeout expires, I go to halt, but the process already stopped
5452 // on the function call stop breakpoint. Turning on this define will make us not
5453 // fetch the first event till after the halt. So if you run a quick function, it will have
5454 // completed, and the completion event will be waiting, when you interrupt for halt.
5455 // The expression evaluation should still succeed.
5456 bool miss_first_event = true;
5457#endif
Jim Inghamfd95f892014-04-22 01:41:52 +00005458 TimeValue one_thread_timeout;
5459 TimeValue final_timeout;
Saleem Abdulrasool2d6a9ec2016-07-28 17:32:20 +00005460 std::chrono::microseconds timeout = std::chrono::microseconds(0);
Eugene Zelenko8f30a652015-10-23 18:39:37 +00005461
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00005462 while (true)
Sean Callanana46ec452012-07-11 21:31:24 +00005463 {
5464 // We usually want to resume the process if we get to the top of the loop.
5465 // The only exception is if we get two running events with no intervening
5466 // stop, which can happen, we will just wait for then next stop event.
Jim Ingham0161b492013-02-09 01:29:05 +00005467 if (log)
5468 log->Printf ("Top of while loop: do_resume: %i handle_running_event: %i before_first_timeout: %i.",
5469 do_resume,
5470 handle_running_event,
5471 before_first_timeout);
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005472
Jim Ingham184e9812013-01-15 02:47:48 +00005473 if (do_resume || handle_running_event)
Sean Callanana46ec452012-07-11 21:31:24 +00005474 {
5475 // Do the initial resume and wait for the running event before going further.
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005476
Jim Ingham184e9812013-01-15 02:47:48 +00005477 if (do_resume)
Sean Callanana46ec452012-07-11 21:31:24 +00005478 {
Jim Ingham0161b492013-02-09 01:29:05 +00005479 num_resumes++;
Sean Callanan579e70c2016-03-19 00:03:59 +00005480 Error resume_error = PrivateResume();
Jim Ingham184e9812013-01-15 02:47:48 +00005481 if (!resume_error.Success())
5482 {
Sean Callanan579e70c2016-03-19 00:03:59 +00005483 diagnostic_manager.Printf(eDiagnosticSeverityError,
5484 "couldn't resume inferior the %d time: \"%s\".", num_resumes,
5485 resume_error.AsCString());
Jim Ingham8646d3c2014-05-05 02:47:44 +00005486 return_value = eExpressionSetupError;
Jim Ingham184e9812013-01-15 02:47:48 +00005487 break;
5488 }
Sean Callanana46ec452012-07-11 21:31:24 +00005489 }
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005490
Saleem Abdulrasool2d6a9ec2016-07-28 17:32:20 +00005491 got_event = listener_sp->WaitForEvent(std::chrono::microseconds(500000), event_sp);
Sean Callanana46ec452012-07-11 21:31:24 +00005492 if (!got_event)
5493 {
5494 if (log)
Sean Callanan579e70c2016-03-19 00:03:59 +00005495 log->Printf("Process::RunThreadPlan(): didn't get any event after resume %" PRIu32 ", exiting.",
5496 num_resumes);
Sean Callanana46ec452012-07-11 21:31:24 +00005497
Sean Callanan579e70c2016-03-19 00:03:59 +00005498 diagnostic_manager.Printf(eDiagnosticSeverityError,
5499 "didn't get any event after resume %" PRIu32 ", exiting.", num_resumes);
Jim Ingham8646d3c2014-05-05 02:47:44 +00005500 return_value = eExpressionSetupError;
Sean Callanana46ec452012-07-11 21:31:24 +00005501 break;
5502 }
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005503
Sean Callanana46ec452012-07-11 21:31:24 +00005504 stop_state = Process::ProcessEventData::GetStateFromEvent(event_sp.get());
Jim Ingham0161b492013-02-09 01:29:05 +00005505
Sean Callanana46ec452012-07-11 21:31:24 +00005506 if (stop_state != eStateRunning)
5507 {
Jim Ingham0161b492013-02-09 01:29:05 +00005508 bool restarted = false;
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005509
Jim Ingham0161b492013-02-09 01:29:05 +00005510 if (stop_state == eStateStopped)
5511 {
5512 restarted = Process::ProcessEventData::GetRestartedFromEvent(event_sp.get());
5513 if (log)
5514 log->Printf("Process::RunThreadPlan(): didn't get running event after "
5515 "resume %d, got %s instead (restarted: %i, do_resume: %i, handle_running_event: %i).",
5516 num_resumes,
5517 StateAsCString(stop_state),
5518 restarted,
5519 do_resume,
5520 handle_running_event);
5521 }
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005522
Jim Ingham0161b492013-02-09 01:29:05 +00005523 if (restarted)
5524 {
5525 // This is probably an overabundance of caution, I don't think I should ever get a stopped & restarted
5526 // event here. But if I do, the best thing is to Halt and then get out of here.
Pavel Labath19da1f12015-12-07 12:36:52 +00005527 const bool clear_thread_plans = false;
5528 const bool use_run_lock = false;
5529 Halt(clear_thread_plans, use_run_lock);
Jim Ingham0161b492013-02-09 01:29:05 +00005530 }
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005531
Sean Callanan579e70c2016-03-19 00:03:59 +00005532 diagnostic_manager.Printf(eDiagnosticSeverityError,
5533 "didn't get running event after initial resume, got %s instead.",
5534 StateAsCString(stop_state));
Jim Ingham8646d3c2014-05-05 02:47:44 +00005535 return_value = eExpressionSetupError;
Sean Callanana46ec452012-07-11 21:31:24 +00005536 break;
5537 }
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005538
Sean Callanana46ec452012-07-11 21:31:24 +00005539 if (log)
5540 log->PutCString ("Process::RunThreadPlan(): resuming succeeded.");
5541 // We need to call the function synchronously, so spin waiting for it to return.
5542 // If we get interrupted while executing, we're going to lose our context, and
5543 // won't be able to gather the result at this point.
5544 // We set the timeout AFTER the resume, since the resume takes some time and we
5545 // don't want to charge that to the timeout.
Sean Callanana46ec452012-07-11 21:31:24 +00005546 }
Jim Ingham0f16e732011-02-08 05:20:59 +00005547 else
5548 {
Sean Callanana46ec452012-07-11 21:31:24 +00005549 if (log)
Jim Ingham0161b492013-02-09 01:29:05 +00005550 log->PutCString ("Process::RunThreadPlan(): waiting for next event.");
Jim Ingham0f16e732011-02-08 05:20:59 +00005551 }
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005552
Jim Ingham0161b492013-02-09 01:29:05 +00005553 if (before_first_timeout)
5554 {
Jim Ingham6fbc48b2013-11-07 00:11:47 +00005555 if (options.GetTryAllThreads())
Saleem Abdulrasool2d6a9ec2016-07-28 17:32:20 +00005556 timeout = std::chrono::microseconds(one_thread_timeout_usec);
Jim Ingham0161b492013-02-09 01:29:05 +00005557 else
Saleem Abdulrasool2d6a9ec2016-07-28 17:32:20 +00005558 timeout = std::chrono::microseconds(timeout_usec);
Jim Ingham0161b492013-02-09 01:29:05 +00005559 }
5560 else
5561 {
5562 if (timeout_usec == 0)
Saleem Abdulrasool2d6a9ec2016-07-28 17:32:20 +00005563 timeout = std::chrono::microseconds(0);
Jim Ingham0161b492013-02-09 01:29:05 +00005564 else
Saleem Abdulrasool2d6a9ec2016-07-28 17:32:20 +00005565 timeout = std::chrono::microseconds(all_threads_timeout_usec);
Jim Ingham0161b492013-02-09 01:29:05 +00005566 }
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005567
Jim Ingham0161b492013-02-09 01:29:05 +00005568 do_resume = true;
5569 handle_running_event = true;
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005570
Sean Callanana46ec452012-07-11 21:31:24 +00005571 // Now wait for the process to stop again:
Sean Callanana46ec452012-07-11 21:31:24 +00005572 event_sp.reset();
Jim Ingham0f16e732011-02-08 05:20:59 +00005573
Jim Ingham0f16e732011-02-08 05:20:59 +00005574 if (log)
Jim Ingham20829ac2011-08-09 22:24:33 +00005575 {
Saleem Abdulrasool2d6a9ec2016-07-28 17:32:20 +00005576 if (timeout.count())
Sean Callanana46ec452012-07-11 21:31:24 +00005577 {
Saleem Abdulrasool2d6a9ec2016-07-28 17:32:20 +00005578 log->Printf(
5579 "Process::RunThreadPlan(): about to wait - now is %llu - endpoint is %llu",
5580 static_cast<unsigned long long>(std::chrono::system_clock::now().time_since_epoch().count()),
5581 static_cast<unsigned long long>(
5582 std::chrono::time_point<std::chrono::system_clock, std::chrono::microseconds>(timeout)
5583 .time_since_epoch()
5584 .count()));
Sean Callanana46ec452012-07-11 21:31:24 +00005585 }
Jim Ingham20829ac2011-08-09 22:24:33 +00005586 else
Sean Callanana46ec452012-07-11 21:31:24 +00005587 {
5588 log->Printf ("Process::RunThreadPlan(): about to wait forever.");
5589 }
5590 }
Jim Ingham35878c42014-04-08 21:33:21 +00005591
5592#ifdef LLDB_RUN_THREAD_HALT_WITH_EVENT
5593 // See comment above...
5594 if (miss_first_event)
5595 {
5596 usleep(1000);
5597 miss_first_event = false;
5598 got_event = false;
5599 }
5600 else
5601#endif
Saleem Abdulrasool2d6a9ec2016-07-28 17:32:20 +00005602 got_event = listener_sp->WaitForEvent(timeout, event_sp);
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005603
Sean Callanana46ec452012-07-11 21:31:24 +00005604 if (got_event)
5605 {
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00005606 if (event_sp)
Sean Callanana46ec452012-07-11 21:31:24 +00005607 {
5608 bool keep_going = false;
Jim Inghamcfc09352012-07-27 23:57:19 +00005609 if (event_sp->GetType() == eBroadcastBitInterrupt)
Sean Callanana46ec452012-07-11 21:31:24 +00005610 {
Pavel Labath19da1f12015-12-07 12:36:52 +00005611 const bool clear_thread_plans = false;
5612 const bool use_run_lock = false;
5613 Halt(clear_thread_plans, use_run_lock);
Jim Ingham8646d3c2014-05-05 02:47:44 +00005614 return_value = eExpressionInterrupted;
Sean Callanan579e70c2016-03-19 00:03:59 +00005615 diagnostic_manager.PutCString(eDiagnosticSeverityRemark, "execution halted by user interrupt.");
Jim Inghamcfc09352012-07-27 23:57:19 +00005616 if (log)
Sean Callanan579e70c2016-03-19 00:03:59 +00005617 log->Printf(
5618 "Process::RunThreadPlan(): Got interrupted by eBroadcastBitInterrupted, exiting.");
Jim Ingham0161b492013-02-09 01:29:05 +00005619 break;
Jim Inghamcfc09352012-07-27 23:57:19 +00005620 }
5621 else
5622 {
5623 stop_state = Process::ProcessEventData::GetStateFromEvent(event_sp.get());
5624 if (log)
5625 log->Printf("Process::RunThreadPlan(): in while loop, got event: %s.", StateAsCString(stop_state));
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005626
Jim Inghamcfc09352012-07-27 23:57:19 +00005627 switch (stop_state)
Sean Callanana46ec452012-07-11 21:31:24 +00005628 {
Jim Inghamcfc09352012-07-27 23:57:19 +00005629 case lldb::eStateStopped:
Sean Callanana46ec452012-07-11 21:31:24 +00005630 {
Jim Ingham0161b492013-02-09 01:29:05 +00005631 // We stopped, figure out what we are going to do now.
Jim Inghamcfc09352012-07-27 23:57:19 +00005632 ThreadSP thread_sp = GetThreadList().FindThreadByIndexID (thread_idx_id);
5633 if (!thread_sp)
Sean Callanana46ec452012-07-11 21:31:24 +00005634 {
Jim Inghamcfc09352012-07-27 23:57:19 +00005635 // Ooh, our thread has vanished. Unlikely that this was successful execution...
Sean Callanana46ec452012-07-11 21:31:24 +00005636 if (log)
Jim Inghamcfc09352012-07-27 23:57:19 +00005637 log->Printf ("Process::RunThreadPlan(): execution completed but our thread (index-id=%u) has vanished.", thread_idx_id);
Jim Ingham8646d3c2014-05-05 02:47:44 +00005638 return_value = eExpressionInterrupted;
Sean Callanana46ec452012-07-11 21:31:24 +00005639 }
5640 else
5641 {
Jim Ingham0161b492013-02-09 01:29:05 +00005642 // If we were restarted, we just need to go back up to fetch another event.
5643 if (Process::ProcessEventData::GetRestartedFromEvent(event_sp.get()))
Jim Inghamcfc09352012-07-27 23:57:19 +00005644 {
5645 if (log)
Jim Ingham0161b492013-02-09 01:29:05 +00005646 {
5647 log->Printf ("Process::RunThreadPlan(): Got a stop and restart, so we'll continue waiting.");
5648 }
5649 keep_going = true;
5650 do_resume = false;
5651 handle_running_event = true;
Jim Inghamcfc09352012-07-27 23:57:19 +00005652 }
5653 else
5654 {
Jim Ingham0161b492013-02-09 01:29:05 +00005655 StopInfoSP stop_info_sp (thread_sp->GetStopInfo ());
5656 StopReason stop_reason = eStopReasonInvalid;
5657 if (stop_info_sp)
5658 stop_reason = stop_info_sp->GetStopReason();
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005659
Jim Ingham0161b492013-02-09 01:29:05 +00005660 // FIXME: We only check if the stop reason is plan complete, should we make sure that
5661 // it is OUR plan that is complete?
5662 if (stop_reason == eStopReasonPlanComplete)
Jim Ingham184e9812013-01-15 02:47:48 +00005663 {
5664 if (log)
Jim Ingham0161b492013-02-09 01:29:05 +00005665 log->PutCString ("Process::RunThreadPlan(): execution completed successfully.");
Jim Inghamc60963c2015-10-12 19:11:03 +00005666
5667 // Restore the plan state so it will get reported as intended when we are done.
5668 thread_plan_restorer.Clean();
5669
Jim Ingham8646d3c2014-05-05 02:47:44 +00005670 return_value = eExpressionCompleted;
Jim Ingham184e9812013-01-15 02:47:48 +00005671 }
5672 else
5673 {
Jim Ingham0161b492013-02-09 01:29:05 +00005674 // Something restarted the target, so just wait for it to stop for real.
Jim Ingham184e9812013-01-15 02:47:48 +00005675 if (stop_reason == eStopReasonBreakpoint)
Jim Ingham0161b492013-02-09 01:29:05 +00005676 {
5677 if (log)
5678 log->Printf ("Process::RunThreadPlan() stopped for breakpoint: %s.", stop_info_sp->GetDescription());
Jim Ingham8646d3c2014-05-05 02:47:44 +00005679 return_value = eExpressionHitBreakpoint;
Jim Ingham6fbc48b2013-11-07 00:11:47 +00005680 if (!options.DoesIgnoreBreakpoints())
Sean Callanan4b388c92013-07-30 19:54:09 +00005681 {
Jim Inghamc60963c2015-10-12 19:11:03 +00005682 // Restore the plan state and then force Private to false. We are
5683 // going to stop because of this plan so we need it to become a public
5684 // plan or it won't report correctly when we continue to its termination
5685 // later on.
5686 thread_plan_restorer.Clean();
5687 if (thread_plan_sp)
5688 thread_plan_sp->SetPrivate(false);
Sean Callanan4b388c92013-07-30 19:54:09 +00005689 event_to_broadcast_sp = event_sp;
5690 }
Jim Ingham0161b492013-02-09 01:29:05 +00005691 }
Jim Ingham184e9812013-01-15 02:47:48 +00005692 else
Jim Ingham0161b492013-02-09 01:29:05 +00005693 {
5694 if (log)
5695 log->PutCString ("Process::RunThreadPlan(): thread plan didn't successfully complete.");
Jim Ingham6fbc48b2013-11-07 00:11:47 +00005696 if (!options.DoesUnwindOnError())
Sean Callanan4b388c92013-07-30 19:54:09 +00005697 event_to_broadcast_sp = event_sp;
Jim Ingham8646d3c2014-05-05 02:47:44 +00005698 return_value = eExpressionInterrupted;
Jim Ingham0161b492013-02-09 01:29:05 +00005699 }
Jim Ingham184e9812013-01-15 02:47:48 +00005700 }
Jim Inghamcfc09352012-07-27 23:57:19 +00005701 }
Sean Callanana46ec452012-07-11 21:31:24 +00005702 }
Jim Inghamcfc09352012-07-27 23:57:19 +00005703 }
5704 break;
Sean Callanana46ec452012-07-11 21:31:24 +00005705
Jim Inghamcfc09352012-07-27 23:57:19 +00005706 case lldb::eStateRunning:
Jim Ingham0161b492013-02-09 01:29:05 +00005707 // This shouldn't really happen, but sometimes we do get two running events without an
5708 // intervening stop, and in that case we should just go back to waiting for the stop.
Jim Inghamcfc09352012-07-27 23:57:19 +00005709 do_resume = false;
5710 keep_going = true;
Jim Ingham184e9812013-01-15 02:47:48 +00005711 handle_running_event = false;
Jim Inghamcfc09352012-07-27 23:57:19 +00005712 break;
Sean Callanana46ec452012-07-11 21:31:24 +00005713
Jim Inghamcfc09352012-07-27 23:57:19 +00005714 default:
5715 if (log)
5716 log->Printf("Process::RunThreadPlan(): execution stopped with unexpected state: %s.", StateAsCString(stop_state));
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005717
Jim Inghamcfc09352012-07-27 23:57:19 +00005718 if (stop_state == eStateExited)
5719 event_to_broadcast_sp = event_sp;
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005720
Sean Callanan579e70c2016-03-19 00:03:59 +00005721 diagnostic_manager.PutCString(eDiagnosticSeverityError,
5722 "execution stopped with unexpected state.");
Jim Ingham8646d3c2014-05-05 02:47:44 +00005723 return_value = eExpressionInterrupted;
Jim Inghamcfc09352012-07-27 23:57:19 +00005724 break;
5725 }
Sean Callanana46ec452012-07-11 21:31:24 +00005726 }
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005727
Sean Callanana46ec452012-07-11 21:31:24 +00005728 if (keep_going)
5729 continue;
5730 else
5731 break;
5732 }
5733 else
5734 {
5735 if (log)
5736 log->PutCString ("Process::RunThreadPlan(): got_event was true, but the event pointer was null. How odd...");
Jim Ingham8646d3c2014-05-05 02:47:44 +00005737 return_value = eExpressionInterrupted;
Sean Callanana46ec452012-07-11 21:31:24 +00005738 break;
5739 }
5740 }
5741 else
5742 {
5743 // If we didn't get an event that means we've timed out...
5744 // We will interrupt the process here. Depending on what we were asked to do we will
5745 // either exit, or try with all threads running for the same timeout.
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005746
Sean Callanana46ec452012-07-11 21:31:24 +00005747 if (log) {
Jim Ingham6fbc48b2013-11-07 00:11:47 +00005748 if (options.GetTryAllThreads())
Sean Callanana46ec452012-07-11 21:31:24 +00005749 {
Jim Ingham0161b492013-02-09 01:29:05 +00005750 if (before_first_timeout)
Jim Inghamfe1c3422014-04-16 02:24:48 +00005751 {
5752 if (timeout_usec != 0)
5753 {
Jim Inghamfe1c3422014-04-16 02:24:48 +00005754 log->Printf ("Process::RunThreadPlan(): Running function with one thread timeout timed out, "
Jim Inghamfd95f892014-04-22 01:41:52 +00005755 "running for %" PRIu32 " usec with all threads enabled.",
5756 all_threads_timeout_usec);
Jim Inghamfe1c3422014-04-16 02:24:48 +00005757 }
5758 else
5759 {
5760 log->Printf ("Process::RunThreadPlan(): Running function with one thread timeout timed out, "
Ed Mastee61c7b02014-04-29 17:48:06 +00005761 "running forever with all threads enabled.");
Jim Inghamfe1c3422014-04-16 02:24:48 +00005762 }
5763 }
Sean Callanana46ec452012-07-11 21:31:24 +00005764 else
5765 log->Printf ("Process::RunThreadPlan(): Restarting function with all threads enabled "
Jason Molenda6a8658a2013-10-27 02:32:23 +00005766 "and timeout: %u timed out, abandoning execution.",
Jim Ingham35e1bda2012-10-16 21:41:58 +00005767 timeout_usec);
Sean Callanana46ec452012-07-11 21:31:24 +00005768 }
5769 else
Jason Molenda6a8658a2013-10-27 02:32:23 +00005770 log->Printf ("Process::RunThreadPlan(): Running function with timeout: %u timed out, "
Jim Ingham35e1bda2012-10-16 21:41:58 +00005771 "abandoning execution.",
5772 timeout_usec);
Sean Callanana46ec452012-07-11 21:31:24 +00005773 }
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005774
Jim Ingham0161b492013-02-09 01:29:05 +00005775 // It is possible that between the time we issued the Halt, and we get around to calling Halt the target
5776 // could have stopped. That's fine, Halt will figure that out and send the appropriate Stopped event.
5777 // BUT it is also possible that we stopped & restarted (e.g. hit a signal with "stop" set to false.) In
5778 // that case, we'll get the stopped & restarted event, and we should go back to waiting for the Halt's
5779 // stopped event. That's what this while loop does.
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005780
Jim Ingham0161b492013-02-09 01:29:05 +00005781 bool back_to_top = true;
5782 uint32_t try_halt_again = 0;
5783 bool do_halt = true;
5784 const uint32_t num_retries = 5;
5785 while (try_halt_again < num_retries)
Sean Callanana46ec452012-07-11 21:31:24 +00005786 {
Jim Ingham0161b492013-02-09 01:29:05 +00005787 Error halt_error;
5788 if (do_halt)
5789 {
5790 if (log)
5791 log->Printf ("Process::RunThreadPlan(): Running Halt.");
Pavel Labath19da1f12015-12-07 12:36:52 +00005792 const bool clear_thread_plans = false;
5793 const bool use_run_lock = false;
5794 Halt(clear_thread_plans, use_run_lock);
Jim Ingham0161b492013-02-09 01:29:05 +00005795 }
5796 if (halt_error.Success())
5797 {
5798 if (log)
5799 log->PutCString ("Process::RunThreadPlan(): Halt succeeded.");
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005800
Saleem Abdulrasool2d6a9ec2016-07-28 17:32:20 +00005801 got_event = listener_sp->WaitForEvent(std::chrono::microseconds(500000), event_sp);
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005802
Jim Ingham0161b492013-02-09 01:29:05 +00005803 if (got_event)
Sean Callanana46ec452012-07-11 21:31:24 +00005804 {
Jim Ingham0161b492013-02-09 01:29:05 +00005805 stop_state = Process::ProcessEventData::GetStateFromEvent(event_sp.get());
5806 if (log)
Sean Callanana46ec452012-07-11 21:31:24 +00005807 {
Jim Ingham0161b492013-02-09 01:29:05 +00005808 log->Printf ("Process::RunThreadPlan(): Stopped with event: %s", StateAsCString(stop_state));
5809 if (stop_state == lldb::eStateStopped
5810 && Process::ProcessEventData::GetInterruptedFromEvent(event_sp.get()))
5811 log->PutCString (" Event was the Halt interruption event.");
Sean Callanana46ec452012-07-11 21:31:24 +00005812 }
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005813
Jim Ingham0161b492013-02-09 01:29:05 +00005814 if (stop_state == lldb::eStateStopped)
Sean Callanana46ec452012-07-11 21:31:24 +00005815 {
Jim Ingham0161b492013-02-09 01:29:05 +00005816 // Between the time we initiated the Halt and the time we delivered it, the process could have
5817 // already finished its job. Check that here:
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005818
Jim Ingham0161b492013-02-09 01:29:05 +00005819 if (thread->IsThreadPlanDone (thread_plan_sp.get()))
5820 {
5821 if (log)
5822 log->PutCString ("Process::RunThreadPlan(): Even though we timed out, the call plan was done. "
5823 "Exiting wait loop.");
Jim Ingham8646d3c2014-05-05 02:47:44 +00005824 return_value = eExpressionCompleted;
Jim Ingham0161b492013-02-09 01:29:05 +00005825 back_to_top = false;
5826 break;
5827 }
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005828
Jim Ingham0161b492013-02-09 01:29:05 +00005829 if (Process::ProcessEventData::GetRestartedFromEvent(event_sp.get()))
5830 {
5831 if (log)
5832 log->PutCString ("Process::RunThreadPlan(): Went to halt but got a restarted event, there must be an un-restarted stopped event so try again... "
5833 "Exiting wait loop.");
5834 try_halt_again++;
5835 do_halt = false;
5836 continue;
5837 }
Sean Callanana46ec452012-07-11 21:31:24 +00005838
Jim Ingham6fbc48b2013-11-07 00:11:47 +00005839 if (!options.GetTryAllThreads())
Jim Ingham0161b492013-02-09 01:29:05 +00005840 {
5841 if (log)
5842 log->PutCString ("Process::RunThreadPlan(): try_all_threads was false, we stopped so now we're quitting.");
Jim Ingham8646d3c2014-05-05 02:47:44 +00005843 return_value = eExpressionInterrupted;
Jim Ingham0161b492013-02-09 01:29:05 +00005844 back_to_top = false;
5845 break;
5846 }
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005847
Jim Ingham0161b492013-02-09 01:29:05 +00005848 if (before_first_timeout)
5849 {
5850 // Set all the other threads to run, and return to the top of the loop, which will continue;
5851 before_first_timeout = false;
5852 thread_plan_sp->SetStopOthers (false);
5853 if (log)
5854 log->PutCString ("Process::RunThreadPlan(): about to resume.");
Sean Callanana46ec452012-07-11 21:31:24 +00005855
Jim Ingham0161b492013-02-09 01:29:05 +00005856 back_to_top = true;
5857 break;
5858 }
5859 else
5860 {
5861 // Running all threads failed, so return Interrupted.
5862 if (log)
5863 log->PutCString("Process::RunThreadPlan(): running all threads timed out.");
Jim Ingham8646d3c2014-05-05 02:47:44 +00005864 return_value = eExpressionInterrupted;
Jim Ingham0161b492013-02-09 01:29:05 +00005865 back_to_top = false;
5866 break;
5867 }
Sean Callanana46ec452012-07-11 21:31:24 +00005868 }
5869 }
5870 else
Jim Ingham0161b492013-02-09 01:29:05 +00005871 { if (log)
5872 log->PutCString("Process::RunThreadPlan(): halt said it succeeded, but I got no event. "
5873 "I'm getting out of here passing Interrupted.");
Jim Ingham8646d3c2014-05-05 02:47:44 +00005874 return_value = eExpressionInterrupted;
Jim Ingham0161b492013-02-09 01:29:05 +00005875 back_to_top = false;
5876 break;
Sean Callanana46ec452012-07-11 21:31:24 +00005877 }
5878 }
Jim Ingham0161b492013-02-09 01:29:05 +00005879 else
5880 {
5881 try_halt_again++;
5882 continue;
5883 }
Sean Callanana46ec452012-07-11 21:31:24 +00005884 }
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005885
Jim Ingham0161b492013-02-09 01:29:05 +00005886 if (!back_to_top || try_halt_again > num_retries)
5887 break;
5888 else
5889 continue;
Sean Callanana46ec452012-07-11 21:31:24 +00005890 }
Sean Callanana46ec452012-07-11 21:31:24 +00005891 } // END WAIT LOOP
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005892
Sean Callanana46ec452012-07-11 21:31:24 +00005893 // If we had to start up a temporary private state thread to run this thread plan, shut it down now.
Zachary Turneracee96a2014-09-23 18:32:09 +00005894 if (backup_private_state_thread.IsJoinable())
Sean Callanana46ec452012-07-11 21:31:24 +00005895 {
5896 StopPrivateStateThread();
5897 Error error;
5898 m_private_state_thread = backup_private_state_thread;
Sean Callanan9a028512012-08-09 00:50:26 +00005899 if (stopper_base_plan_sp)
Sean Callanana46ec452012-07-11 21:31:24 +00005900 {
5901 thread->DiscardThreadPlansUpToPlan(stopper_base_plan_sp);
5902 }
Jason Molenda76513fd2014-10-15 23:39:31 +00005903 if (old_state != eStateInvalid)
5904 m_public_state.SetValueNoLock(old_state);
Sean Callanana46ec452012-07-11 21:31:24 +00005905 }
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005906
Jim Inghamc60963c2015-10-12 19:11:03 +00005907 if (return_value != eExpressionCompleted && log)
5908 {
5909 // Print a backtrace into the log so we can figure out where we are:
5910 StreamString s;
5911 s.PutCString("Thread state after unsuccessful completion: \n");
5912 thread->GetStackFrameStatus (s,
5913 0,
5914 UINT32_MAX,
5915 true,
5916 UINT32_MAX);
5917 log->PutCString(s.GetData());
5918
5919 }
Jim Ingham184e9812013-01-15 02:47:48 +00005920 // Restore the thread state if we are going to discard the plan execution. There are three cases where this
5921 // could happen:
5922 // 1) The execution successfully completed
5923 // 2) We hit a breakpoint, and ignore_breakpoints was true
5924 // 3) We got some other error, and discard_on_error was true
Jim Ingham8646d3c2014-05-05 02:47:44 +00005925 bool should_unwind = (return_value == eExpressionInterrupted && options.DoesUnwindOnError())
5926 || (return_value == eExpressionHitBreakpoint && options.DoesIgnoreBreakpoints());
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005927
Jim Ingham8646d3c2014-05-05 02:47:44 +00005928 if (return_value == eExpressionCompleted
Jim Ingham184e9812013-01-15 02:47:48 +00005929 || should_unwind)
Jim Ingham8559a352012-11-26 23:52:18 +00005930 {
5931 thread_plan_sp->RestoreThreadState();
5932 }
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005933
Sean Callanana46ec452012-07-11 21:31:24 +00005934 // Now do some processing on the results of the run:
Jim Ingham8646d3c2014-05-05 02:47:44 +00005935 if (return_value == eExpressionInterrupted || return_value == eExpressionHitBreakpoint)
Sean Callanana46ec452012-07-11 21:31:24 +00005936 {
5937 if (log)
5938 {
5939 StreamString s;
5940 if (event_sp)
5941 event_sp->Dump (&s);
5942 else
5943 {
5944 log->PutCString ("Process::RunThreadPlan(): Stop event that interrupted us is NULL.");
5945 }
5946
5947 StreamString ts;
5948
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00005949 const char *event_explanation = nullptr;
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005950
Sean Callanana46ec452012-07-11 21:31:24 +00005951 do
5952 {
Jim Inghamcfc09352012-07-27 23:57:19 +00005953 if (!event_sp)
Sean Callanana46ec452012-07-11 21:31:24 +00005954 {
Jim Inghamcfc09352012-07-27 23:57:19 +00005955 event_explanation = "<no event>";
Sean Callanana46ec452012-07-11 21:31:24 +00005956 break;
5957 }
Jim Inghamcfc09352012-07-27 23:57:19 +00005958 else if (event_sp->GetType() == eBroadcastBitInterrupt)
Sean Callanana46ec452012-07-11 21:31:24 +00005959 {
Jim Inghamcfc09352012-07-27 23:57:19 +00005960 event_explanation = "<user interrupt>";
Sean Callanana46ec452012-07-11 21:31:24 +00005961 break;
5962 }
Jim Inghamcfc09352012-07-27 23:57:19 +00005963 else
Sean Callanana46ec452012-07-11 21:31:24 +00005964 {
Jim Inghamcfc09352012-07-27 23:57:19 +00005965 const Process::ProcessEventData *event_data = Process::ProcessEventData::GetEventDataFromEvent (event_sp.get());
5966
5967 if (!event_data)
Sean Callanana46ec452012-07-11 21:31:24 +00005968 {
Jim Inghamcfc09352012-07-27 23:57:19 +00005969 event_explanation = "<no event data>";
5970 break;
Sean Callanana46ec452012-07-11 21:31:24 +00005971 }
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005972
Jim Inghamcfc09352012-07-27 23:57:19 +00005973 Process *process = event_data->GetProcessSP().get();
5974
5975 if (!process)
Sean Callanana46ec452012-07-11 21:31:24 +00005976 {
Jim Inghamcfc09352012-07-27 23:57:19 +00005977 event_explanation = "<no process>";
5978 break;
Sean Callanana46ec452012-07-11 21:31:24 +00005979 }
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005980
Jim Inghamcfc09352012-07-27 23:57:19 +00005981 ThreadList &thread_list = process->GetThreadList();
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005982
Jim Inghamcfc09352012-07-27 23:57:19 +00005983 uint32_t num_threads = thread_list.GetSize();
5984 uint32_t thread_index;
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005985
Jim Inghamcfc09352012-07-27 23:57:19 +00005986 ts.Printf("<%u threads> ", num_threads);
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005987
Jim Inghamcfc09352012-07-27 23:57:19 +00005988 for (thread_index = 0;
5989 thread_index < num_threads;
5990 ++thread_index)
5991 {
5992 Thread *thread = thread_list.GetThreadAtIndex(thread_index).get();
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005993
Jim Inghamcfc09352012-07-27 23:57:19 +00005994 if (!thread)
5995 {
5996 ts.Printf("<?> ");
5997 continue;
5998 }
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00005999
Daniel Malead01b2952012-11-29 21:49:15 +00006000 ts.Printf("<0x%4.4" PRIx64 " ", thread->GetID());
Jim Inghamcfc09352012-07-27 23:57:19 +00006001 RegisterContext *register_context = thread->GetRegisterContext().get();
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00006002
Jim Inghamcfc09352012-07-27 23:57:19 +00006003 if (register_context)
Daniel Malead01b2952012-11-29 21:49:15 +00006004 ts.Printf("[ip 0x%" PRIx64 "] ", register_context->GetPC());
Jim Inghamcfc09352012-07-27 23:57:19 +00006005 else
6006 ts.Printf("[ip unknown] ");
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00006007
Jim Inghamc60963c2015-10-12 19:11:03 +00006008 // Show the private stop info here, the public stop info will be from the last natural stop.
6009 lldb::StopInfoSP stop_info_sp = thread->GetPrivateStopInfo();
Jim Inghamcfc09352012-07-27 23:57:19 +00006010 if (stop_info_sp)
6011 {
6012 const char *stop_desc = stop_info_sp->GetDescription();
6013 if (stop_desc)
6014 ts.PutCString (stop_desc);
6015 }
6016 ts.Printf(">");
6017 }
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00006018
Jim Inghamcfc09352012-07-27 23:57:19 +00006019 event_explanation = ts.GetData();
Sean Callanana46ec452012-07-11 21:31:24 +00006020 }
Sean Callanana46ec452012-07-11 21:31:24 +00006021 } while (0);
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00006022
Jim Inghamcfc09352012-07-27 23:57:19 +00006023 if (event_explanation)
6024 log->Printf("Process::RunThreadPlan(): execution interrupted: %s %s", s.GetData(), event_explanation);
Sean Callanana46ec452012-07-11 21:31:24 +00006025 else
Jim Inghamcfc09352012-07-27 23:57:19 +00006026 log->Printf("Process::RunThreadPlan(): execution interrupted: %s", s.GetData());
6027 }
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00006028
Jim Inghame4483cf2013-09-27 01:13:01 +00006029 if (should_unwind)
Jim Inghamcfc09352012-07-27 23:57:19 +00006030 {
6031 if (log)
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00006032 log->Printf ("Process::RunThreadPlan: ExecutionInterrupted - discarding thread plans up to %p.",
6033 static_cast<void*>(thread_plan_sp.get()));
Jim Inghamcfc09352012-07-27 23:57:19 +00006034 thread->DiscardThreadPlansUpToPlan (thread_plan_sp);
Jim Inghamcfc09352012-07-27 23:57:19 +00006035 }
6036 else
6037 {
6038 if (log)
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00006039 log->Printf ("Process::RunThreadPlan: ExecutionInterrupted - for plan: %p not discarding.",
6040 static_cast<void*>(thread_plan_sp.get()));
Sean Callanana46ec452012-07-11 21:31:24 +00006041 }
6042 }
Jim Ingham8646d3c2014-05-05 02:47:44 +00006043 else if (return_value == eExpressionSetupError)
Sean Callanana46ec452012-07-11 21:31:24 +00006044 {
6045 if (log)
6046 log->PutCString("Process::RunThreadPlan(): execution set up error.");
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00006047
Jim Ingham6fbc48b2013-11-07 00:11:47 +00006048 if (options.DoesUnwindOnError())
Jim Ingham0f16e732011-02-08 05:20:59 +00006049 {
Greg Claytonc14ee322011-09-22 04:58:26 +00006050 thread->DiscardThreadPlansUpToPlan (thread_plan_sp);
Jim Ingham0f16e732011-02-08 05:20:59 +00006051 }
Jim Inghamf48169b2010-11-30 02:22:11 +00006052 }
6053 else
6054 {
Sean Callanana46ec452012-07-11 21:31:24 +00006055 if (thread->IsThreadPlanDone (thread_plan_sp.get()))
Jim Inghamf48169b2010-11-30 02:22:11 +00006056 {
Jim Ingham0f16e732011-02-08 05:20:59 +00006057 if (log)
Sean Callanana46ec452012-07-11 21:31:24 +00006058 log->PutCString("Process::RunThreadPlan(): thread plan is done");
Jim Ingham8646d3c2014-05-05 02:47:44 +00006059 return_value = eExpressionCompleted;
Sean Callanana46ec452012-07-11 21:31:24 +00006060 }
6061 else if (thread->WasThreadPlanDiscarded (thread_plan_sp.get()))
6062 {
6063 if (log)
6064 log->PutCString("Process::RunThreadPlan(): thread plan was discarded");
Jim Ingham8646d3c2014-05-05 02:47:44 +00006065 return_value = eExpressionDiscarded;
Sean Callanana46ec452012-07-11 21:31:24 +00006066 }
6067 else
6068 {
6069 if (log)
6070 log->PutCString("Process::RunThreadPlan(): thread plan stopped in mid course");
Jim Ingham6fbc48b2013-11-07 00:11:47 +00006071 if (options.DoesUnwindOnError() && thread_plan_sp)
Sean Callanana46ec452012-07-11 21:31:24 +00006072 {
6073 if (log)
Jim Ingham184e9812013-01-15 02:47:48 +00006074 log->PutCString("Process::RunThreadPlan(): discarding thread plan 'cause unwind_on_error is set.");
Sean Callanana46ec452012-07-11 21:31:24 +00006075 thread->DiscardThreadPlansUpToPlan (thread_plan_sp);
Sean Callanana46ec452012-07-11 21:31:24 +00006076 }
6077 }
6078 }
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00006079
Sean Callanana46ec452012-07-11 21:31:24 +00006080 // Thread we ran the function in may have gone away because we ran the target
6081 // Check that it's still there, and if it is put it back in the context. Also restore the
6082 // frame in the context if it is still present.
6083 thread = GetThreadList().FindThreadByIndexID(thread_idx_id, true).get();
6084 if (thread)
6085 {
6086 exe_ctx.SetFrameSP (thread->GetFrameWithStackID (ctx_frame_id));
6087 }
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00006088
Sean Callanana46ec452012-07-11 21:31:24 +00006089 // Also restore the current process'es selected frame & thread, since this function calling may
6090 // be done behind the user's back.
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00006091
Sean Callanana46ec452012-07-11 21:31:24 +00006092 if (selected_tid != LLDB_INVALID_THREAD_ID)
6093 {
6094 if (GetThreadList().SetSelectedThreadByIndexID (selected_tid) && selected_stack_id.IsValid())
6095 {
6096 // We were able to restore the selected thread, now restore the frame:
Saleem Abdulrasoolbb19a132016-05-19 05:13:57 +00006097 std::lock_guard<std::recursive_mutex> guard(GetThreadList().GetMutex());
Jason Molendab57e4a12013-11-04 09:33:30 +00006098 StackFrameSP old_frame_sp = GetThreadList().GetSelectedThread()->GetFrameWithStackID(selected_stack_id);
Sean Callanana46ec452012-07-11 21:31:24 +00006099 if (old_frame_sp)
6100 GetThreadList().GetSelectedThread()->SetSelectedFrame(old_frame_sp.get());
Jim Inghamf48169b2010-11-30 02:22:11 +00006101 }
Jim Inghamf48169b2010-11-30 02:22:11 +00006102 }
6103 }
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00006104
Sean Callanana46ec452012-07-11 21:31:24 +00006105 // If the process exited during the run of the thread plan, notify everyone.
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00006106
Sean Callanana46ec452012-07-11 21:31:24 +00006107 if (event_to_broadcast_sp)
Jim Inghamf48169b2010-11-30 02:22:11 +00006108 {
Sean Callanana46ec452012-07-11 21:31:24 +00006109 if (log)
6110 log->PutCString("Process::RunThreadPlan(): rebroadcasting event.");
6111 BroadcastEvent(event_to_broadcast_sp);
Jim Inghamf48169b2010-11-30 02:22:11 +00006112 }
Saleem Abdulrasool324a1032014-04-04 04:06:10 +00006113
Jim Inghamf48169b2010-11-30 02:22:11 +00006114 return return_value;
6115}
6116
6117const char *
Jim Ingham1624a2d2014-05-05 02:26:40 +00006118Process::ExecutionResultAsCString (ExpressionResults result)
Jim Inghamf48169b2010-11-30 02:22:11 +00006119{
6120 const char *result_name;
6121
6122 switch (result)
6123 {
Jim Ingham8646d3c2014-05-05 02:47:44 +00006124 case eExpressionCompleted:
6125 result_name = "eExpressionCompleted";
Jim Inghamf48169b2010-11-30 02:22:11 +00006126 break;
Jim Ingham8646d3c2014-05-05 02:47:44 +00006127 case eExpressionDiscarded:
6128 result_name = "eExpressionDiscarded";
Jim Inghamf48169b2010-11-30 02:22:11 +00006129 break;
Jim Ingham8646d3c2014-05-05 02:47:44 +00006130 case eExpressionInterrupted:
6131 result_name = "eExpressionInterrupted";
Jim Inghamf48169b2010-11-30 02:22:11 +00006132 break;
Jim Ingham8646d3c2014-05-05 02:47:44 +00006133 case eExpressionHitBreakpoint:
6134 result_name = "eExpressionHitBreakpoint";
Jim Ingham184e9812013-01-15 02:47:48 +00006135 break;
Jim Ingham8646d3c2014-05-05 02:47:44 +00006136 case eExpressionSetupError:
6137 result_name = "eExpressionSetupError";
Jim Inghamf48169b2010-11-30 02:22:11 +00006138 break;
Jim Ingham8646d3c2014-05-05 02:47:44 +00006139 case eExpressionParseError:
6140 result_name = "eExpressionParseError";
Jim Ingham1624a2d2014-05-05 02:26:40 +00006141 break;
Jim Ingham8646d3c2014-05-05 02:47:44 +00006142 case eExpressionResultUnavailable:
6143 result_name = "eExpressionResultUnavailable";
Jim Ingham1624a2d2014-05-05 02:26:40 +00006144 break;
Jim Ingham8646d3c2014-05-05 02:47:44 +00006145 case eExpressionTimedOut:
6146 result_name = "eExpressionTimedOut";
Jim Inghamf48169b2010-11-30 02:22:11 +00006147 break;
Jim Ingham8646d3c2014-05-05 02:47:44 +00006148 case eExpressionStoppedForDebug:
6149 result_name = "eExpressionStoppedForDebug";
Jim Ingham6fbc48b2013-11-07 00:11:47 +00006150 break;
Jim Inghamf48169b2010-11-30 02:22:11 +00006151 }
6152 return result_name;
6153}
6154
Greg Clayton7260f622011-04-18 08:33:37 +00006155void
6156Process::GetStatus (Stream &strm)
6157{
6158 const StateType state = GetState();
Greg Clayton2637f822011-11-17 01:23:07 +00006159 if (StateIsStoppedState(state, false))
Greg Clayton7260f622011-04-18 08:33:37 +00006160 {
6161 if (state == eStateExited)
6162 {
6163 int exit_status = GetExitStatus();
6164 const char *exit_description = GetExitDescription();
Daniel Malead01b2952012-11-29 21:49:15 +00006165 strm.Printf ("Process %" PRIu64 " exited with status = %i (0x%8.8x) %s\n",
Greg Clayton7260f622011-04-18 08:33:37 +00006166 GetID(),
6167 exit_status,
6168 exit_status,
6169 exit_description ? exit_description : "");
6170 }
6171 else
6172 {
6173 if (state == eStateConnected)
6174 strm.Printf ("Connected to remote target.\n");
6175 else
Daniel Malead01b2952012-11-29 21:49:15 +00006176 strm.Printf ("Process %" PRIu64 " %s\n", GetID(), StateAsCString (state));
Greg Clayton7260f622011-04-18 08:33:37 +00006177 }
6178 }
6179 else
6180 {
Daniel Malead01b2952012-11-29 21:49:15 +00006181 strm.Printf ("Process %" PRIu64 " is running.\n", GetID());
Greg Clayton7260f622011-04-18 08:33:37 +00006182 }
6183}
6184
6185size_t
6186Process::GetThreadStatus (Stream &strm,
6187 bool only_threads_with_stop_reason,
6188 uint32_t start_frame,
6189 uint32_t num_frames,
6190 uint32_t num_frames_with_source)
6191{
6192 size_t num_thread_infos_dumped = 0;
6193
Jim Ingham4a65fb12014-03-07 11:20:03 +00006194 // You can't hold the thread list lock while calling Thread::GetStatus. That very well might run code (e.g. if we need it
6195 // to get return values or arguments.) For that to work the process has to be able to acquire it. So instead copy the thread
6196 // ID's, and look them up one by one:
6197
6198 uint32_t num_threads;
Greg Clayton332e8b12015-01-13 21:13:08 +00006199 std::vector<lldb::tid_t> thread_id_array;
Jim Ingham4a65fb12014-03-07 11:20:03 +00006200 //Scope for thread list locker;
6201 {
Saleem Abdulrasoolbb19a132016-05-19 05:13:57 +00006202 std::lock_guard<std::recursive_mutex> guard(GetThreadList().GetMutex());
Jim Ingham4a65fb12014-03-07 11:20:03 +00006203 ThreadList &curr_thread_list = GetThreadList();
6204 num_threads = curr_thread_list.GetSize();
6205 uint32_t idx;
Greg Clayton332e8b12015-01-13 21:13:08 +00006206 thread_id_array.resize(num_threads);
Jim Ingham4a65fb12014-03-07 11:20:03 +00006207 for (idx = 0; idx < num_threads; ++idx)
Greg Clayton332e8b12015-01-13 21:13:08 +00006208 thread_id_array[idx] = curr_thread_list.GetThreadAtIndex(idx)->GetID();
Jim Ingham4a65fb12014-03-07 11:20:03 +00006209 }
6210
Greg Clayton7260f622011-04-18 08:33:37 +00006211 for (uint32_t i = 0; i < num_threads; i++)
6212 {
Greg Clayton332e8b12015-01-13 21:13:08 +00006213 ThreadSP thread_sp(GetThreadList().FindThreadByID(thread_id_array[i]));
Jim Ingham4a65fb12014-03-07 11:20:03 +00006214 if (thread_sp)
Greg Clayton7260f622011-04-18 08:33:37 +00006215 {
6216 if (only_threads_with_stop_reason)
6217 {
Jim Ingham4a65fb12014-03-07 11:20:03 +00006218 StopInfoSP stop_info_sp = thread_sp->GetStopInfo();
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00006219 if (!stop_info_sp || !stop_info_sp->IsValid())
Greg Clayton7260f622011-04-18 08:33:37 +00006220 continue;
6221 }
Jim Ingham4a65fb12014-03-07 11:20:03 +00006222 thread_sp->GetStatus (strm,
Greg Clayton7260f622011-04-18 08:33:37 +00006223 start_frame,
6224 num_frames,
6225 num_frames_with_source);
6226 ++num_thread_infos_dumped;
6227 }
Jim Ingham4a65fb12014-03-07 11:20:03 +00006228 else
6229 {
6230 Log *log(lldb_private::GetLogIfAnyCategoriesSet (LIBLLDB_LOG_PROCESS));
6231 if (log)
6232 log->Printf("Process::GetThreadStatus - thread 0x" PRIu64 " vanished while running Thread::GetStatus.");
Jim Ingham4a65fb12014-03-07 11:20:03 +00006233 }
Greg Clayton7260f622011-04-18 08:33:37 +00006234 }
6235 return num_thread_infos_dumped;
6236}
6237
Greg Claytona9f40ad2012-02-22 04:37:26 +00006238void
6239Process::AddInvalidMemoryRegion (const LoadRange &region)
6240{
6241 m_memory_cache.AddInvalidRange(region.GetRangeBase(), region.GetByteSize());
6242}
6243
6244bool
6245Process::RemoveInvalidMemoryRange (const LoadRange &region)
6246{
6247 return m_memory_cache.RemoveInvalidRange(region.GetRangeBase(), region.GetByteSize());
6248}
6249
Jim Ingham372787f2012-04-07 00:00:41 +00006250void
6251Process::AddPreResumeAction (PreResumeActionCallback callback, void *baton)
6252{
6253 m_pre_resume_actions.push_back(PreResumeCallbackAndBaton (callback, baton));
6254}
6255
6256bool
6257Process::RunPreResumeActions ()
6258{
6259 bool result = true;
6260 while (!m_pre_resume_actions.empty())
6261 {
6262 struct PreResumeCallbackAndBaton action = m_pre_resume_actions.back();
6263 m_pre_resume_actions.pop_back();
6264 bool this_result = action.callback (action.baton);
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00006265 if (result)
Jason Molenda55710932014-11-17 20:10:15 +00006266 result = this_result;
Jim Ingham372787f2012-04-07 00:00:41 +00006267 }
6268 return result;
6269}
6270
6271void
6272Process::ClearPreResumeActions ()
6273{
6274 m_pre_resume_actions.clear();
6275}
Greg Claytona9f40ad2012-02-22 04:37:26 +00006276
Zachary Turner93749ab2015-03-03 21:51:25 +00006277ProcessRunLock &
6278Process::GetRunLock()
6279{
6280 if (m_private_state_thread.EqualsThread(Host::GetCurrentThread()))
6281 return m_private_run_lock;
6282 else
6283 return m_public_run_lock;
6284}
6285
Greg Claytonfa559e52012-05-18 02:38:05 +00006286void
6287Process::Flush ()
6288{
6289 m_thread_list.Flush();
Jason Molenda5e8dce42013-12-13 00:29:16 +00006290 m_extended_thread_list.Flush();
6291 m_extended_thread_stop_id = 0;
6292 m_queue_list.Clear();
6293 m_queue_list_stop_id = 0;
Greg Claytonfa559e52012-05-18 02:38:05 +00006294}
Greg Clayton90ba8112012-12-05 00:16:59 +00006295
6296void
6297Process::DidExec ()
6298{
Todd Fiala76e0fc92014-08-27 22:58:26 +00006299 Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_PROCESS));
6300 if (log)
6301 log->Printf ("Process::%s()", __FUNCTION__);
6302
Greg Clayton90ba8112012-12-05 00:16:59 +00006303 Target &target = GetTarget();
6304 target.CleanupProcess ();
Greg Claytonb35db632013-11-09 00:03:31 +00006305 target.ClearModules(false);
Greg Clayton90ba8112012-12-05 00:16:59 +00006306 m_dynamic_checkers_ap.reset();
6307 m_abi_sp.reset();
Jason Molendaeef51062013-11-05 03:57:19 +00006308 m_system_runtime_ap.reset();
Greg Clayton90ba8112012-12-05 00:16:59 +00006309 m_os_ap.reset();
Greg Clayton15fc2be2013-05-21 01:00:52 +00006310 m_dyld_ap.reset();
Andrew MacPherson17220c12014-03-05 10:12:43 +00006311 m_jit_loaders_ap.reset();
Greg Clayton90ba8112012-12-05 00:16:59 +00006312 m_image_tokens.clear();
6313 m_allocated_memory_cache.Clear();
6314 m_language_runtimes.clear();
Kuba Breckaafdf8422014-10-10 23:43:03 +00006315 m_instrumentation_runtimes.clear();
Greg Clayton15fc2be2013-05-21 01:00:52 +00006316 m_thread_list.DiscardThreadPlans();
Greg Clayton15fc2be2013-05-21 01:00:52 +00006317 m_memory_cache.Clear(true);
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00006318 m_stop_info_override_callback = nullptr;
Greg Clayton90ba8112012-12-05 00:16:59 +00006319 DoDidExec();
6320 CompleteAttach ();
Greg Clayton095eeaa2013-11-05 23:28:00 +00006321 // Flush the process (threads and all stack frames) after running CompleteAttach()
6322 // in case the dynamic loader loaded things in new locations.
6323 Flush();
Greg Claytonb35db632013-11-09 00:03:31 +00006324
6325 // After we figure out what was loaded/unloaded in CompleteAttach,
6326 // we need to let the target know so it can do any cleanup it needs to.
6327 target.DidExec();
Greg Clayton90ba8112012-12-05 00:16:59 +00006328}
Greg Clayton095eeaa2013-11-05 23:28:00 +00006329
Jim Ingham1460e4b2014-01-10 23:46:59 +00006330addr_t
6331Process::ResolveIndirectFunction(const Address *address, Error &error)
6332{
6333 if (address == nullptr)
6334 {
Jean-Daniel Dupasef37711f2014-02-08 20:22:05 +00006335 error.SetErrorString("Invalid address argument");
Jim Ingham1460e4b2014-01-10 23:46:59 +00006336 return LLDB_INVALID_ADDRESS;
6337 }
6338
6339 addr_t function_addr = LLDB_INVALID_ADDRESS;
6340
6341 addr_t addr = address->GetLoadAddress(&GetTarget());
6342 std::map<addr_t,addr_t>::const_iterator iter = m_resolved_indirect_addresses.find(addr);
6343 if (iter != m_resolved_indirect_addresses.end())
6344 {
6345 function_addr = (*iter).second;
6346 }
6347 else
6348 {
6349 if (!InferiorCall(this, address, function_addr))
6350 {
6351 Symbol *symbol = address->CalculateSymbolContextSymbol();
6352 error.SetErrorStringWithFormat ("Unable to call resolver for indirect function %s",
6353 symbol ? symbol->GetName().AsCString() : "<UNKNOWN>");
6354 function_addr = LLDB_INVALID_ADDRESS;
6355 }
6356 else
6357 {
6358 m_resolved_indirect_addresses.insert(std::pair<addr_t, addr_t>(addr, function_addr));
6359 }
6360 }
6361 return function_addr;
6362}
6363
Andrew MacPhersoneb4d0602014-03-13 09:37:02 +00006364void
6365Process::ModulesDidLoad (ModuleList &module_list)
6366{
Kuba Breckaafdf8422014-10-10 23:43:03 +00006367 SystemRuntime *sys_runtime = GetSystemRuntime();
6368 if (sys_runtime)
6369 {
6370 sys_runtime->ModulesDidLoad (module_list);
6371 }
Andrew MacPhersoneb4d0602014-03-13 09:37:02 +00006372
Kuba Breckaafdf8422014-10-10 23:43:03 +00006373 GetJITLoaders().ModulesDidLoad (module_list);
6374
6375 // Give runtimes a chance to be created.
6376 InstrumentationRuntime::ModulesDidLoad(module_list, this, m_instrumentation_runtimes);
6377
6378 // Tell runtimes about new modules.
6379 for (auto pos = m_instrumentation_runtimes.begin(); pos != m_instrumentation_runtimes.end(); ++pos)
6380 {
6381 InstrumentationRuntimeSP runtime = pos->second;
6382 runtime->ModulesDidLoad(module_list);
6383 }
6384
Greg Clayton35ca64b2015-04-16 17:13:34 +00006385 // Let any language runtimes we have already created know
6386 // about the modules that loaded.
6387
6388 // Iterate over a copy of this language runtime list in case
6389 // the language runtime ModulesDidLoad somehow causes the language
6390 // riuntime to be unloaded.
6391 LanguageRuntimeCollection language_runtimes(m_language_runtimes);
6392 for (const auto &pair: language_runtimes)
6393 {
6394 // We must check language_runtime_sp to make sure it is not
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00006395 // nullptr as we might cache the fact that we didn't have a
Greg Clayton35ca64b2015-04-16 17:13:34 +00006396 // language runtime for a language.
6397 LanguageRuntimeSP language_runtime_sp = pair.second;
6398 if (language_runtime_sp)
6399 language_runtime_sp->ModulesDidLoad(module_list);
6400 }
Ryan Brown65d4d5c2015-09-16 21:20:44 +00006401
Greg Clayton2591fe12016-03-15 22:44:07 +00006402 // If we don't have an operating system plug-in, try to load one since
6403 // loading shared libraries might cause a new one to try and load
6404 if (!m_os_ap)
6405 LoadOperatingSystemPlugin(false);
Todd Fiala75930012016-08-19 04:21:48 +00006406
6407 // Give structured-data plugins a chance to see the modified modules.
6408 for (auto pair : m_structured_data_plugin_map)
6409 {
6410 if (pair.second)
6411 pair.second->ModulesDidLoad(*this, module_list);
6412 }
Andrew MacPhersoneb4d0602014-03-13 09:37:02 +00006413}
Kuba Breckaa51ea382014-09-06 01:33:13 +00006414
Jason Molendaef7d6412015-08-06 03:27:10 +00006415void
Sean Callanan77decf52015-12-09 01:25:01 +00006416Process::PrintWarning (uint64_t warning_type, const void *repeat_key, const char *fmt, ...)
Jason Molendaef7d6412015-08-06 03:27:10 +00006417{
6418 bool print_warning = true;
6419
6420 StreamSP stream_sp = GetTarget().GetDebugger().GetAsyncOutputStream();
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00006421 if (!stream_sp)
Jason Molendaef7d6412015-08-06 03:27:10 +00006422 return;
6423 if (warning_type == eWarningsOptimization
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00006424 && !GetWarningsOptimization())
Jason Molendaef7d6412015-08-06 03:27:10 +00006425 {
6426 return;
6427 }
6428
6429 if (repeat_key != nullptr)
6430 {
6431 WarningsCollection::iterator it = m_warnings_issued.find (warning_type);
6432 if (it == m_warnings_issued.end())
6433 {
6434 m_warnings_issued[warning_type] = WarningsPointerSet();
6435 m_warnings_issued[warning_type].insert (repeat_key);
6436 }
6437 else
6438 {
6439 if (it->second.find (repeat_key) != it->second.end())
6440 {
6441 print_warning = false;
6442 }
6443 else
6444 {
6445 it->second.insert (repeat_key);
6446 }
6447 }
6448 }
6449
6450 if (print_warning)
6451 {
6452 va_list args;
6453 va_start (args, fmt);
6454 stream_sp->PrintfVarArg (fmt, args);
6455 va_end (args);
6456 }
6457}
6458
Jason Molenda484900b2015-08-10 07:55:25 +00006459void
6460Process::PrintWarningOptimization (const SymbolContext &sc)
6461{
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00006462 if (GetWarningsOptimization()
6463 && sc.module_sp
6464 && !sc.module_sp->GetFileSpec().GetFilename().IsEmpty()
Jason Molenda484900b2015-08-10 07:55:25 +00006465 && sc.function
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00006466 && sc.function->GetIsOptimized())
Jason Molenda484900b2015-08-10 07:55:25 +00006467 {
6468 PrintWarning (Process::Warnings::eWarningsOptimization, sc.module_sp.get(), "%s was compiled with optimization - stepping may behave oddly; variables may not be available.\n", sc.module_sp->GetFileSpec().GetFilename().GetCString());
6469 }
6470}
6471
Pavel Labatha933d512016-04-05 13:07:16 +00006472bool
6473Process::GetProcessInfo(ProcessInstanceInfo &info)
6474{
6475 info.Clear();
6476
6477 PlatformSP platform_sp = GetTarget().GetPlatform();
6478 if (! platform_sp)
6479 return false;
6480
6481 return platform_sp->GetProcessInfo(GetID(), info);
6482}
6483
Kuba Breckaa51ea382014-09-06 01:33:13 +00006484ThreadCollectionSP
6485Process::GetHistoryThreads(lldb::addr_t addr)
6486{
6487 ThreadCollectionSP threads;
Greg Clayton35ca64b2015-04-16 17:13:34 +00006488
Kuba Breckaa51ea382014-09-06 01:33:13 +00006489 const MemoryHistorySP &memory_history = MemoryHistory::FindPlugin(shared_from_this());
6490
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00006491 if (!memory_history) {
Kuba Breckaa51ea382014-09-06 01:33:13 +00006492 return threads;
6493 }
6494
6495 threads.reset(new ThreadCollection(memory_history->GetHistoryThreads(addr)));
6496
6497 return threads;
6498}
Kuba Brecka63927542014-10-11 01:59:32 +00006499
6500InstrumentationRuntimeSP
6501Process::GetInstrumentationRuntime(lldb::InstrumentationRuntimeType type)
6502{
6503 InstrumentationRuntimeCollection::iterator pos;
6504 pos = m_instrumentation_runtimes.find (type);
6505 if (pos == m_instrumentation_runtimes.end())
6506 {
6507 return InstrumentationRuntimeSP();
6508 }
6509 else
6510 return (*pos).second;
6511}
Tamas Berghammer7cb18bf2015-03-24 11:15:23 +00006512
6513bool
6514Process::GetModuleSpec(const FileSpec& module_file_spec,
6515 const ArchSpec& arch,
6516 ModuleSpec& module_spec)
6517{
6518 module_spec.Clear();
6519 return false;
6520}
Tamas Berghammer3cb132a2015-12-02 11:58:51 +00006521
6522size_t
6523Process::AddImageToken(lldb::addr_t image_ptr)
6524{
6525 m_image_tokens.push_back(image_ptr);
6526 return m_image_tokens.size() - 1;
6527}
6528
6529lldb::addr_t
6530Process::GetImagePtrFromToken(size_t token) const
6531{
6532 if (token < m_image_tokens.size())
6533 return m_image_tokens[token];
6534 return LLDB_INVALID_IMAGE_TOKEN;
6535}
6536
6537void
6538Process::ResetImageToken(size_t token)
6539{
6540 if (token < m_image_tokens.size())
6541 m_image_tokens[token] = LLDB_INVALID_IMAGE_TOKEN;
Enrico Granataf3129cb2015-12-03 23:53:45 +00006542}
Jason Molendafd4cea52016-01-08 21:40:11 +00006543
6544Address
6545Process::AdvanceAddressToNextBranchInstruction (Address default_stop_addr, AddressRange range_bounds)
6546{
6547 Target &target = GetTarget();
6548 DisassemblerSP disassembler_sp;
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00006549 InstructionList *insn_list = nullptr;
Jason Molendafd4cea52016-01-08 21:40:11 +00006550
6551 Address retval = default_stop_addr;
6552
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00006553 if (!target.GetUseFastStepping())
Jason Molendafd4cea52016-01-08 21:40:11 +00006554 return retval;
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00006555 if (!default_stop_addr.IsValid())
Jason Molendafd4cea52016-01-08 21:40:11 +00006556 return retval;
6557
6558 ExecutionContext exe_ctx (this);
6559 const char *plugin_name = nullptr;
6560 const char *flavor = nullptr;
6561 const bool prefer_file_cache = true;
6562 disassembler_sp = Disassembler::DisassembleRange(target.GetArchitecture(),
6563 plugin_name,
6564 flavor,
6565 exe_ctx,
6566 range_bounds,
6567 prefer_file_cache);
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00006568 if (disassembler_sp)
Jason Molendafd4cea52016-01-08 21:40:11 +00006569 insn_list = &disassembler_sp->GetInstructionList();
6570
Eugene Zelenkoda8cf8a2016-03-01 00:55:51 +00006571 if (insn_list == nullptr)
Jason Molendafd4cea52016-01-08 21:40:11 +00006572 {
6573 return retval;
6574 }
6575
6576 size_t insn_offset = insn_list->GetIndexOfInstructionAtAddress (default_stop_addr);
6577 if (insn_offset == UINT32_MAX)
6578 {
6579 return retval;
6580 }
6581
6582 uint32_t branch_index = insn_list->GetIndexOfNextBranchInstruction (insn_offset, target);
6583 if (branch_index == UINT32_MAX)
6584 {
6585 return retval;
6586 }
6587
6588 if (branch_index > insn_offset)
6589 {
6590 Address next_branch_insn_address = insn_list->GetInstructionAtIndex (branch_index)->GetAddress();
6591 if (next_branch_insn_address.IsValid() && range_bounds.ContainsFileAddress (next_branch_insn_address))
6592 {
6593 retval = next_branch_insn_address;
6594 }
6595 }
6596
Jason Molendafd4cea52016-01-08 21:40:11 +00006597 return retval;
6598}
Howard Hellyerad007562016-07-07 08:21:28 +00006599
6600Error
6601Process::GetMemoryRegions (std::vector<lldb::MemoryRegionInfoSP>& region_list)
6602{
6603
6604 Error error;
6605
6606 lldb::addr_t range_base = 0;
6607 lldb::addr_t range_end = 0;
6608
6609 region_list.clear();
6610 do
6611 {
6612 lldb::MemoryRegionInfoSP region_info( new lldb_private::MemoryRegionInfo() );
6613 error = GetMemoryRegionInfo (range_end, *region_info);
6614 // GetMemoryRegionInfo should only return an error if it is unimplemented.
6615 if (error.Fail())
6616 {
6617 region_list.clear();
6618 break;
6619 }
6620
6621 range_base = region_info->GetRange().GetRangeBase();
6622 range_end = region_info->GetRange().GetRangeEnd();
6623 if( region_info->GetMapped() == MemoryRegionInfo::eYes )
6624 {
6625 region_list.push_back(region_info);
6626 }
6627 } while (range_end != LLDB_INVALID_ADDRESS);
6628
6629 return error;
Todd Fiala75930012016-08-19 04:21:48 +00006630}
Howard Hellyerad007562016-07-07 08:21:28 +00006631
Todd Fiala75930012016-08-19 04:21:48 +00006632Error
6633Process::ConfigureStructuredData(const ConstString &type_name,
6634 const StructuredData::ObjectSP &config_sp)
6635{
6636 // If you get this, the Process-derived class needs to implement a method
6637 // to enable an already-reported asynchronous structured data feature.
6638 // See ProcessGDBRemote for an example implementation over gdb-remote.
6639 return Error("unimplemented");
6640}
6641
6642void
6643Process::MapSupportedStructuredDataPlugins(const StructuredData::Array
6644 &supported_type_names)
6645{
6646 Log *log(lldb_private::GetLogIfAnyCategoriesSet(LIBLLDB_LOG_PROCESS));
6647
6648 // Bail out early if there are no type names to map.
6649 if (supported_type_names.GetSize() == 0)
6650 {
6651 if (log)
6652 log->Printf("Process::%s(): no structured data types supported",
6653 __FUNCTION__);
6654 return;
6655 }
6656
6657 // Convert StructuredData type names to ConstString instances.
6658 std::set<ConstString> const_type_names;
6659
6660 if (log)
6661 log->Printf("Process::%s(): the process supports the following async "
6662 "structured data types:", __FUNCTION__);
6663
6664 supported_type_names.ForEach([&const_type_names, &log]
6665 (StructuredData::Object *object) {
6666 if (!object)
6667 {
6668 // Invalid - shouldn't be null objects in the array.
6669 return false;
6670 }
6671
6672 auto type_name = object->GetAsString();
6673 if (!type_name)
6674 {
6675 // Invalid format - all type names should be strings.
6676 return false;
6677 }
6678
6679 const_type_names.insert(ConstString(type_name->GetValue()));
6680 if (log)
6681 log->Printf("- %s", type_name->GetValue().c_str());
6682 return true;
6683 });
6684
6685 // For each StructuredDataPlugin, if the plugin handles any of the
6686 // types in the supported_type_names, map that type name to that plugin.
6687 uint32_t plugin_index = 0;
6688 for (auto create_instance =
6689 PluginManager::GetStructuredDataPluginCreateCallbackAtIndex(plugin_index);
6690 create_instance && !const_type_names.empty();
6691 ++plugin_index)
6692 {
6693 // Create the plugin.
6694 StructuredDataPluginSP plugin_sp = (*create_instance)(*this);
6695 if (!plugin_sp)
6696 {
6697 // This plugin doesn't think it can work with the process.
6698 // Move on to the next.
6699 continue;
6700 }
6701
6702 // For any of the remaining type names, map any that this plugin
6703 // supports.
6704 std::vector<ConstString> names_to_remove;
6705 for (auto &type_name : const_type_names)
6706 {
6707 if (plugin_sp->SupportsStructuredDataType(type_name))
6708 {
6709 m_structured_data_plugin_map.insert(std::make_pair(type_name,
6710 plugin_sp));
6711 names_to_remove.push_back(type_name);
6712 if (log)
6713 log->Printf("Process::%s(): using plugin %s for type name "
6714 "%s", __FUNCTION__,
6715 plugin_sp->GetPluginName().GetCString(),
6716 type_name.GetCString());
6717 }
6718 }
6719
6720 // Remove the type names that were consumed by this plugin.
6721 for (auto &type_name : names_to_remove)
6722 const_type_names.erase(type_name);
6723 }
6724}
6725
6726bool
6727Process::RouteAsyncStructuredData(const StructuredData::ObjectSP object_sp)
6728{
6729 // Nothing to do if there's no data.
6730 if (!object_sp)
6731 return false;
6732
6733 // The contract is this must be a dictionary, so we can look up the
6734 // routing key via the top-level 'type' string value within the dictionary.
6735 StructuredData::Dictionary *dictionary = object_sp->GetAsDictionary();
6736 if (!dictionary)
6737 return false;
6738
6739 // Grab the async structured type name (i.e. the feature/plugin name).
6740 ConstString type_name;
6741 if (!dictionary->GetValueForKeyAsString("type", type_name))
6742 return false;
6743
6744 // Check if there's a plugin registered for this type name.
6745 auto find_it = m_structured_data_plugin_map.find(type_name);
6746 if (find_it == m_structured_data_plugin_map.end())
6747 {
6748 // We don't have a mapping for this structured data type.
6749 return false;
6750 }
6751
6752 // Route the structured data to the plugin.
6753 find_it->second->HandleArrivalOfStructuredData(*this, type_name, object_sp);
6754 return true;
Howard Hellyerad007562016-07-07 08:21:28 +00006755}