blob: 52fd8578a46a8e4765c1e7cc79b8bf21bfd8edc7 [file] [log] [blame]
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001//===-- Process.cpp ---------------------------------------------*- C++ -*-===//
2//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9
10#include "lldb/Target/Process.h"
11
12#include "lldb/lldb-private-log.h"
13
14#include "lldb/Breakpoint/StoppointCallbackContext.h"
15#include "lldb/Breakpoint/BreakpointLocation.h"
16#include "lldb/Core/Event.h"
Caroline Ticeef5c6d02010-11-16 05:07:41 +000017#include "lldb/Core/ConnectionFileDescriptor.h"
Chris Lattner30fdc8d2010-06-08 16:52:24 +000018#include "lldb/Core/Debugger.h"
Caroline Ticeef5c6d02010-11-16 05:07:41 +000019#include "lldb/Core/InputReader.h"
Chris Lattner30fdc8d2010-06-08 16:52:24 +000020#include "lldb/Core/Log.h"
21#include "lldb/Core/PluginManager.h"
22#include "lldb/Core/State.h"
Greg Claytoneb0103f2011-04-07 22:46:35 +000023#include "lldb/Expression/ClangUserExpression.h"
Caroline Tice3df9a8d2010-09-04 00:03:46 +000024#include "lldb/Interpreter/CommandInterpreter.h"
Chris Lattner30fdc8d2010-06-08 16:52:24 +000025#include "lldb/Host/Host.h"
26#include "lldb/Target/ABI.h"
Greg Clayton8f343b02010-11-04 01:54:29 +000027#include "lldb/Target/DynamicLoader.h"
Greg Clayton56d9a1b2011-08-22 02:49:39 +000028#include "lldb/Target/OperatingSystem.h"
Jim Ingham22777012010-09-23 02:01:19 +000029#include "lldb/Target/LanguageRuntime.h"
30#include "lldb/Target/CPPLanguageRuntime.h"
31#include "lldb/Target/ObjCLanguageRuntime.h"
Greg Claytone996fd32011-03-08 22:40:15 +000032#include "lldb/Target/Platform.h"
Chris Lattner30fdc8d2010-06-08 16:52:24 +000033#include "lldb/Target/RegisterContext.h"
Greg Claytonf4b47e12010-08-04 01:40:35 +000034#include "lldb/Target/StopInfo.h"
Chris Lattner30fdc8d2010-06-08 16:52:24 +000035#include "lldb/Target/Target.h"
36#include "lldb/Target/TargetList.h"
37#include "lldb/Target/Thread.h"
38#include "lldb/Target/ThreadPlan.h"
39
40using namespace lldb;
41using namespace lldb_private;
42
Greg Clayton32e0a752011-03-30 18:16:51 +000043void
Greg Clayton8b82f082011-04-12 05:54:46 +000044ProcessInstanceInfo::Dump (Stream &s, Platform *platform) const
Greg Clayton32e0a752011-03-30 18:16:51 +000045{
46 const char *cstr;
Greg Clayton95bf0fd2011-04-01 00:29:43 +000047 if (m_pid != LLDB_INVALID_PROCESS_ID)
48 s.Printf (" pid = %i\n", m_pid);
49
50 if (m_parent_pid != LLDB_INVALID_PROCESS_ID)
51 s.Printf (" parent = %i\n", m_parent_pid);
52
53 if (m_executable)
54 {
55 s.Printf (" name = %s\n", m_executable.GetFilename().GetCString());
56 s.PutCString (" file = ");
57 m_executable.Dump(&s);
58 s.EOL();
59 }
Greg Clayton8b82f082011-04-12 05:54:46 +000060 const uint32_t argc = m_arguments.GetArgumentCount();
Greg Clayton95bf0fd2011-04-01 00:29:43 +000061 if (argc > 0)
62 {
63 for (uint32_t i=0; i<argc; i++)
64 {
Greg Clayton8b82f082011-04-12 05:54:46 +000065 const char *arg = m_arguments.GetArgumentAtIndex(i);
Greg Clayton95bf0fd2011-04-01 00:29:43 +000066 if (i < 10)
Greg Clayton8b82f082011-04-12 05:54:46 +000067 s.Printf (" arg[%u] = %s\n", i, arg);
Greg Clayton95bf0fd2011-04-01 00:29:43 +000068 else
Greg Clayton8b82f082011-04-12 05:54:46 +000069 s.Printf ("arg[%u] = %s\n", i, arg);
Greg Clayton95bf0fd2011-04-01 00:29:43 +000070 }
71 }
Greg Clayton8b82f082011-04-12 05:54:46 +000072
73 const uint32_t envc = m_environment.GetArgumentCount();
74 if (envc > 0)
75 {
76 for (uint32_t i=0; i<envc; i++)
77 {
78 const char *env = m_environment.GetArgumentAtIndex(i);
79 if (i < 10)
80 s.Printf (" env[%u] = %s\n", i, env);
81 else
82 s.Printf ("env[%u] = %s\n", i, env);
83 }
84 }
85
Greg Clayton95bf0fd2011-04-01 00:29:43 +000086 if (m_arch.IsValid())
87 s.Printf (" arch = %s\n", m_arch.GetTriple().str().c_str());
88
Greg Clayton8b82f082011-04-12 05:54:46 +000089 if (m_uid != UINT32_MAX)
Greg Clayton32e0a752011-03-30 18:16:51 +000090 {
Greg Clayton8b82f082011-04-12 05:54:46 +000091 cstr = platform->GetUserName (m_uid);
92 s.Printf (" uid = %-5u (%s)\n", m_uid, cstr ? cstr : "");
Greg Clayton32e0a752011-03-30 18:16:51 +000093 }
Greg Clayton8b82f082011-04-12 05:54:46 +000094 if (m_gid != UINT32_MAX)
Greg Clayton32e0a752011-03-30 18:16:51 +000095 {
Greg Clayton8b82f082011-04-12 05:54:46 +000096 cstr = platform->GetGroupName (m_gid);
97 s.Printf (" gid = %-5u (%s)\n", m_gid, cstr ? cstr : "");
Greg Clayton32e0a752011-03-30 18:16:51 +000098 }
Greg Clayton8b82f082011-04-12 05:54:46 +000099 if (m_euid != UINT32_MAX)
Greg Clayton32e0a752011-03-30 18:16:51 +0000100 {
Greg Clayton8b82f082011-04-12 05:54:46 +0000101 cstr = platform->GetUserName (m_euid);
102 s.Printf (" euid = %-5u (%s)\n", m_euid, cstr ? cstr : "");
Greg Clayton32e0a752011-03-30 18:16:51 +0000103 }
Greg Clayton8b82f082011-04-12 05:54:46 +0000104 if (m_egid != UINT32_MAX)
Greg Clayton32e0a752011-03-30 18:16:51 +0000105 {
Greg Clayton8b82f082011-04-12 05:54:46 +0000106 cstr = platform->GetGroupName (m_egid);
107 s.Printf (" egid = %-5u (%s)\n", m_egid, cstr ? cstr : "");
Greg Clayton32e0a752011-03-30 18:16:51 +0000108 }
109}
110
111void
Greg Clayton8b82f082011-04-12 05:54:46 +0000112ProcessInstanceInfo::DumpTableHeader (Stream &s, Platform *platform, bool show_args, bool verbose)
Greg Clayton32e0a752011-03-30 18:16:51 +0000113{
Greg Clayton8b82f082011-04-12 05:54:46 +0000114 const char *label;
115 if (show_args || verbose)
116 label = "ARGUMENTS";
117 else
118 label = "NAME";
119
Greg Clayton95bf0fd2011-04-01 00:29:43 +0000120 if (verbose)
121 {
Greg Clayton8b82f082011-04-12 05:54:46 +0000122 s.Printf ("PID PARENT USER GROUP EFF USER EFF GROUP TRIPLE %s\n", label);
Greg Clayton95bf0fd2011-04-01 00:29:43 +0000123 s.PutCString ("====== ====== ========== ========== ========== ========== ======================== ============================\n");
124 }
125 else
126 {
Greg Clayton8b82f082011-04-12 05:54:46 +0000127 s.Printf ("PID PARENT USER ARCH %s\n", label);
Greg Clayton95bf0fd2011-04-01 00:29:43 +0000128 s.PutCString ("====== ====== ========== ======= ============================\n");
129 }
Greg Clayton32e0a752011-03-30 18:16:51 +0000130}
131
132void
Greg Clayton8b82f082011-04-12 05:54:46 +0000133ProcessInstanceInfo::DumpAsTableRow (Stream &s, Platform *platform, bool show_args, bool verbose) const
Greg Clayton32e0a752011-03-30 18:16:51 +0000134{
135 if (m_pid != LLDB_INVALID_PROCESS_ID)
136 {
137 const char *cstr;
138 s.Printf ("%-6u %-6u ", m_pid, m_parent_pid);
139
Greg Clayton32e0a752011-03-30 18:16:51 +0000140
Greg Clayton95bf0fd2011-04-01 00:29:43 +0000141 if (verbose)
142 {
Greg Clayton8b82f082011-04-12 05:54:46 +0000143 cstr = platform->GetUserName (m_uid);
Greg Clayton95bf0fd2011-04-01 00:29:43 +0000144 if (cstr && cstr[0]) // Watch for empty string that indicates lookup failed
145 s.Printf ("%-10s ", cstr);
146 else
Greg Clayton8b82f082011-04-12 05:54:46 +0000147 s.Printf ("%-10u ", m_uid);
Greg Clayton32e0a752011-03-30 18:16:51 +0000148
Greg Clayton8b82f082011-04-12 05:54:46 +0000149 cstr = platform->GetGroupName (m_gid);
Greg Clayton95bf0fd2011-04-01 00:29:43 +0000150 if (cstr && cstr[0]) // Watch for empty string that indicates lookup failed
151 s.Printf ("%-10s ", cstr);
152 else
Greg Clayton8b82f082011-04-12 05:54:46 +0000153 s.Printf ("%-10u ", m_gid);
Greg Clayton32e0a752011-03-30 18:16:51 +0000154
Greg Clayton8b82f082011-04-12 05:54:46 +0000155 cstr = platform->GetUserName (m_euid);
Greg Clayton95bf0fd2011-04-01 00:29:43 +0000156 if (cstr && cstr[0]) // Watch for empty string that indicates lookup failed
157 s.Printf ("%-10s ", cstr);
158 else
Greg Clayton8b82f082011-04-12 05:54:46 +0000159 s.Printf ("%-10u ", m_euid);
Greg Clayton95bf0fd2011-04-01 00:29:43 +0000160
Greg Clayton8b82f082011-04-12 05:54:46 +0000161 cstr = platform->GetGroupName (m_egid);
Greg Clayton95bf0fd2011-04-01 00:29:43 +0000162 if (cstr && cstr[0]) // Watch for empty string that indicates lookup failed
163 s.Printf ("%-10s ", cstr);
164 else
Greg Clayton8b82f082011-04-12 05:54:46 +0000165 s.Printf ("%-10u ", m_egid);
Greg Clayton95bf0fd2011-04-01 00:29:43 +0000166 s.Printf ("%-24s ", m_arch.IsValid() ? m_arch.GetTriple().str().c_str() : "");
167 }
168 else
169 {
170 s.Printf ("%-10s %.*-7s ",
Greg Clayton8b82f082011-04-12 05:54:46 +0000171 platform->GetUserName (m_euid),
Greg Clayton95bf0fd2011-04-01 00:29:43 +0000172 (int)m_arch.GetTriple().getArchName().size(),
173 m_arch.GetTriple().getArchName().data());
174 }
175
Greg Clayton8b82f082011-04-12 05:54:46 +0000176 if (verbose || show_args)
Greg Clayton95bf0fd2011-04-01 00:29:43 +0000177 {
Greg Clayton8b82f082011-04-12 05:54:46 +0000178 const uint32_t argc = m_arguments.GetArgumentCount();
Greg Clayton95bf0fd2011-04-01 00:29:43 +0000179 if (argc > 0)
180 {
181 for (uint32_t i=0; i<argc; i++)
182 {
183 if (i > 0)
184 s.PutChar (' ');
Greg Clayton8b82f082011-04-12 05:54:46 +0000185 s.PutCString (m_arguments.GetArgumentAtIndex(i));
Greg Clayton95bf0fd2011-04-01 00:29:43 +0000186 }
187 }
188 }
189 else
190 {
191 s.PutCString (GetName());
192 }
193
194 s.EOL();
Greg Clayton32e0a752011-03-30 18:16:51 +0000195 }
196}
197
Greg Clayton8b82f082011-04-12 05:54:46 +0000198
199void
200ProcessInfo::SetArgumentsFromArgs (const Args& args,
201 bool first_arg_is_executable,
202 bool first_arg_is_executable_and_argument)
203{
204 // Copy all arguments
205 m_arguments = args;
206
207 // Is the first argument the executable?
208 if (first_arg_is_executable)
209 {
210 const char *first_arg = args.GetArgumentAtIndex (0);
211 if (first_arg)
212 {
213 // Yes the first argument is an executable, set it as the executable
214 // in the launch options. Don't resolve the file path as the path
215 // could be a remote platform path
216 const bool resolve = false;
217 m_executable.SetFile(first_arg, resolve);
218
219 // If argument zero is an executable and shouldn't be included
220 // in the arguments, remove it from the front of the arguments
221 if (first_arg_is_executable_and_argument == false)
222 m_arguments.DeleteArgumentAtIndex (0);
223 }
224 }
225}
226
Greg Clayton32e0a752011-03-30 18:16:51 +0000227bool
Greg Clayton8b82f082011-04-12 05:54:46 +0000228ProcessLaunchInfo::FileAction::Open (int fd, const char *path, bool read, bool write)
229{
230 if ((read || write) && fd >= 0 && path && path[0])
231 {
232 m_action = eFileActionOpen;
233 m_fd = fd;
234 if (read && write)
235 m_arg = O_RDWR;
236 else if (read)
237 m_arg = O_RDONLY;
238 else
239 m_arg = O_WRONLY;
240 m_path.assign (path);
241 return true;
242 }
243 else
244 {
245 Clear();
246 }
247 return false;
248}
249
250bool
251ProcessLaunchInfo::FileAction::Close (int fd)
252{
253 Clear();
254 if (fd >= 0)
255 {
256 m_action = eFileActionClose;
257 m_fd = fd;
258 }
259 return m_fd >= 0;
260}
261
262
263bool
264ProcessLaunchInfo::FileAction::Duplicate (int fd, int dup_fd)
265{
266 Clear();
267 if (fd >= 0 && dup_fd >= 0)
268 {
269 m_action = eFileActionDuplicate;
270 m_fd = fd;
271 m_arg = dup_fd;
272 }
273 return m_fd >= 0;
274}
275
276
277
278bool
279ProcessLaunchInfo::FileAction::AddPosixSpawnFileAction (posix_spawn_file_actions_t *file_actions,
280 const FileAction *info,
281 Log *log,
282 Error& error)
283{
284 if (info == NULL)
285 return false;
286
287 switch (info->m_action)
288 {
289 case eFileActionNone:
290 error.Clear();
291 break;
292
293 case eFileActionClose:
294 if (info->m_fd == -1)
295 error.SetErrorString ("invalid fd for posix_spawn_file_actions_addclose(...)");
296 else
297 {
298 error.SetError (::posix_spawn_file_actions_addclose (file_actions, info->m_fd),
299 eErrorTypePOSIX);
300 if (log && (error.Fail() || log))
301 error.PutToLog(log, "posix_spawn_file_actions_addclose (action=%p, fd=%i)",
302 file_actions, info->m_fd);
303 }
304 break;
305
306 case eFileActionDuplicate:
307 if (info->m_fd == -1)
308 error.SetErrorString ("invalid fd for posix_spawn_file_actions_adddup2(...)");
309 else if (info->m_arg == -1)
310 error.SetErrorString ("invalid duplicate fd for posix_spawn_file_actions_adddup2(...)");
311 else
312 {
313 error.SetError (::posix_spawn_file_actions_adddup2 (file_actions, info->m_fd, info->m_arg),
314 eErrorTypePOSIX);
315 if (log && (error.Fail() || log))
316 error.PutToLog(log, "posix_spawn_file_actions_adddup2 (action=%p, fd=%i, dup_fd=%i)",
317 file_actions, info->m_fd, info->m_arg);
318 }
319 break;
320
321 case eFileActionOpen:
322 if (info->m_fd == -1)
323 error.SetErrorString ("invalid fd in posix_spawn_file_actions_addopen(...)");
324 else
325 {
326 int oflag = info->m_arg;
327 mode_t mode = 0;
328
329 error.SetError (::posix_spawn_file_actions_addopen (file_actions,
330 info->m_fd,
331 info->m_path.c_str(),
332 oflag,
333 mode),
334 eErrorTypePOSIX);
335 if (error.Fail() || log)
336 error.PutToLog(log,
337 "posix_spawn_file_actions_addopen (action=%p, fd=%i, path='%s', oflag=%i, mode=%i)",
338 file_actions, info->m_fd, info->m_path.c_str(), oflag, mode);
339 }
340 break;
341
342 default:
343 error.SetErrorStringWithFormat ("invalid file action: %i", info->m_action);
344 break;
345 }
346 return error.Success();
347}
348
349Error
Greg Claytonf6b8b582011-04-13 00:18:08 +0000350ProcessLaunchCommandOptions::SetOptionValue (uint32_t option_idx, const char *option_arg)
Greg Clayton8b82f082011-04-12 05:54:46 +0000351{
352 Error error;
353 char short_option = (char) m_getopt_table[option_idx].val;
354
355 switch (short_option)
356 {
357 case 's': // Stop at program entry point
358 launch_info.GetFlags().Set (eLaunchFlagStopAtEntry);
359 break;
360
361 case 'e': // STDERR for read + write
362 {
363 ProcessLaunchInfo::FileAction action;
364 if (action.Open(STDERR_FILENO, option_arg, true, true))
365 launch_info.AppendFileAction (action);
366 }
367 break;
368
369 case 'i': // STDIN for read only
370 {
371 ProcessLaunchInfo::FileAction action;
372 if (action.Open(STDIN_FILENO, option_arg, true, false))
373 launch_info.AppendFileAction (action);
374 }
375 break;
376
377 case 'o': // Open STDOUT for write only
378 {
379 ProcessLaunchInfo::FileAction action;
380 if (action.Open(STDOUT_FILENO, option_arg, false, true))
381 launch_info.AppendFileAction (action);
382 }
383 break;
384
385 case 'p': // Process plug-in name
386 launch_info.SetProcessPluginName (option_arg);
387 break;
388
389 case 'n': // Disable STDIO
390 {
391 ProcessLaunchInfo::FileAction action;
392 if (action.Open(STDERR_FILENO, "/dev/null", true, true))
393 launch_info.AppendFileAction (action);
394 if (action.Open(STDOUT_FILENO, "/dev/null", false, true))
395 launch_info.AppendFileAction (action);
396 if (action.Open(STDIN_FILENO, "/dev/null", true, false))
397 launch_info.AppendFileAction (action);
398 }
399 break;
400
401 case 'w':
402 launch_info.SetWorkingDirectory (option_arg);
403 break;
404
405 case 't': // Open process in new terminal window
406 launch_info.GetFlags().Set (eLaunchFlagLaunchInTTY);
407 break;
408
409 case 'a':
410 launch_info.GetArchitecture().SetTriple (option_arg,
411 m_interpreter.GetPlatform(true).get());
412 break;
413
414 case 'A':
415 launch_info.GetFlags().Set (eLaunchFlagDisableASLR);
416 break;
417
418 case 'v':
419 launch_info.GetEnvironmentEntries().AppendArgument(option_arg);
420 break;
421
422 default:
423 error.SetErrorStringWithFormat("Invalid short option character '%c'.\n", short_option);
424 break;
425
426 }
427 return error;
428}
429
430OptionDefinition
431ProcessLaunchCommandOptions::g_option_table[] =
432{
433{ LLDB_OPT_SET_ALL, false, "stop-at-entry", 's', no_argument, NULL, 0, eArgTypeNone, "Stop at the entry point of the program when launching a process."},
434{ LLDB_OPT_SET_ALL, false, "disable-aslr", 'A', no_argument, NULL, 0, eArgTypeNone, "Disable address space layout randomization when launching a process."},
435{ LLDB_OPT_SET_ALL, false, "plugin", 'p', required_argument, NULL, 0, eArgTypePlugin, "Name of the process plugin you want to use."},
436{ LLDB_OPT_SET_ALL, false, "working-dir", 'w', required_argument, NULL, 0, eArgTypePath, "Set the current working directory to <path> when running the inferior."},
437{ LLDB_OPT_SET_ALL, false, "arch", 'a', required_argument, NULL, 0, eArgTypeArchitecture, "Set the architecture for the process to launch when ambiguous."},
438{ LLDB_OPT_SET_ALL, false, "environment", 'v', required_argument, NULL, 0, eArgTypeNone, "Specify an environment variable name/value stirng (--environement NAME=VALUE). Can be specified multiple times for subsequent environment entries."},
439
440{ LLDB_OPT_SET_1 , false, "stdin", 'i', required_argument, NULL, 0, eArgTypePath, "Redirect stdin for the process to <path>."},
441{ LLDB_OPT_SET_1 , false, "stdout", 'o', required_argument, NULL, 0, eArgTypePath, "Redirect stdout for the process to <path>."},
442{ LLDB_OPT_SET_1 , false, "stderr", 'e', required_argument, NULL, 0, eArgTypePath, "Redirect stderr for the process to <path>."},
443
444{ LLDB_OPT_SET_2 , false, "tty", 't', no_argument, NULL, 0, eArgTypeNone, "Start the process in a terminal (not supported on all platforms)."},
445
446{ LLDB_OPT_SET_3 , false, "no-stdio", 'n', no_argument, NULL, 0, eArgTypeNone, "Do not set up for terminal I/O to go to running process."},
447
448{ 0 , false, NULL, 0, 0, NULL, 0, eArgTypeNone, NULL }
449};
450
451
452
453bool
454ProcessInstanceInfoMatch::NameMatches (const char *process_name) const
Greg Clayton32e0a752011-03-30 18:16:51 +0000455{
456 if (m_name_match_type == eNameMatchIgnore || process_name == NULL)
457 return true;
458 const char *match_name = m_match_info.GetName();
459 if (!match_name)
460 return true;
461
462 return lldb_private::NameMatches (process_name, m_name_match_type, match_name);
463}
464
465bool
Greg Clayton8b82f082011-04-12 05:54:46 +0000466ProcessInstanceInfoMatch::Matches (const ProcessInstanceInfo &proc_info) const
Greg Clayton32e0a752011-03-30 18:16:51 +0000467{
468 if (!NameMatches (proc_info.GetName()))
469 return false;
470
471 if (m_match_info.ProcessIDIsValid() &&
472 m_match_info.GetProcessID() != proc_info.GetProcessID())
473 return false;
474
475 if (m_match_info.ParentProcessIDIsValid() &&
476 m_match_info.GetParentProcessID() != proc_info.GetParentProcessID())
477 return false;
478
Greg Clayton8b82f082011-04-12 05:54:46 +0000479 if (m_match_info.UserIDIsValid () &&
480 m_match_info.GetUserID() != proc_info.GetUserID())
Greg Clayton32e0a752011-03-30 18:16:51 +0000481 return false;
482
Greg Clayton8b82f082011-04-12 05:54:46 +0000483 if (m_match_info.GroupIDIsValid () &&
484 m_match_info.GetGroupID() != proc_info.GetGroupID())
Greg Clayton32e0a752011-03-30 18:16:51 +0000485 return false;
486
487 if (m_match_info.EffectiveUserIDIsValid () &&
488 m_match_info.GetEffectiveUserID() != proc_info.GetEffectiveUserID())
489 return false;
490
491 if (m_match_info.EffectiveGroupIDIsValid () &&
492 m_match_info.GetEffectiveGroupID() != proc_info.GetEffectiveGroupID())
493 return false;
494
495 if (m_match_info.GetArchitecture().IsValid() &&
496 m_match_info.GetArchitecture() != proc_info.GetArchitecture())
497 return false;
498 return true;
499}
500
501bool
Greg Clayton8b82f082011-04-12 05:54:46 +0000502ProcessInstanceInfoMatch::MatchAllProcesses () const
Greg Clayton32e0a752011-03-30 18:16:51 +0000503{
504 if (m_name_match_type != eNameMatchIgnore)
505 return false;
506
507 if (m_match_info.ProcessIDIsValid())
508 return false;
509
510 if (m_match_info.ParentProcessIDIsValid())
511 return false;
512
Greg Clayton8b82f082011-04-12 05:54:46 +0000513 if (m_match_info.UserIDIsValid ())
Greg Clayton32e0a752011-03-30 18:16:51 +0000514 return false;
515
Greg Clayton8b82f082011-04-12 05:54:46 +0000516 if (m_match_info.GroupIDIsValid ())
Greg Clayton32e0a752011-03-30 18:16:51 +0000517 return false;
518
519 if (m_match_info.EffectiveUserIDIsValid ())
520 return false;
521
522 if (m_match_info.EffectiveGroupIDIsValid ())
523 return false;
524
525 if (m_match_info.GetArchitecture().IsValid())
526 return false;
527
528 if (m_match_all_users)
529 return false;
530
531 return true;
532
533}
534
535void
Greg Clayton8b82f082011-04-12 05:54:46 +0000536ProcessInstanceInfoMatch::Clear()
Greg Clayton32e0a752011-03-30 18:16:51 +0000537{
538 m_match_info.Clear();
539 m_name_match_type = eNameMatchIgnore;
540 m_match_all_users = false;
541}
Greg Clayton58be07b2011-01-07 06:08:19 +0000542
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000543Process*
544Process::FindPlugin (Target &target, const char *plugin_name, Listener &listener)
545{
546 ProcessCreateInstance create_callback = NULL;
547 if (plugin_name)
548 {
549 create_callback = PluginManager::GetProcessCreateCallbackForPluginName (plugin_name);
550 if (create_callback)
551 {
552 std::auto_ptr<Process> debugger_ap(create_callback(target, listener));
Greg Clayton3a29bdb2011-07-17 20:36:25 +0000553 if (debugger_ap->CanDebug(target, true))
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000554 return debugger_ap.release();
555 }
556 }
557 else
558 {
Greg Claytonc982c762010-07-09 20:39:50 +0000559 for (uint32_t idx = 0; (create_callback = PluginManager::GetProcessCreateCallbackAtIndex(idx)) != NULL; ++idx)
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000560 {
Greg Claytonc982c762010-07-09 20:39:50 +0000561 std::auto_ptr<Process> debugger_ap(create_callback(target, listener));
Greg Clayton3a29bdb2011-07-17 20:36:25 +0000562 if (debugger_ap->CanDebug(target, false))
Greg Claytonc982c762010-07-09 20:39:50 +0000563 return debugger_ap.release();
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000564 }
565 }
566 return NULL;
567}
568
569
570//----------------------------------------------------------------------
571// Process constructor
572//----------------------------------------------------------------------
573Process::Process(Target &target, Listener &listener) :
574 UserID (LLDB_INVALID_PROCESS_ID),
Greg Claytoncfd1ace2010-10-31 03:01:06 +0000575 Broadcaster ("lldb.process"),
Greg Claytondbe54502010-11-19 03:46:01 +0000576 ProcessInstanceSettings (*GetSettingsController()),
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000577 m_target (target),
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000578 m_public_state (eStateUnloaded),
579 m_private_state (eStateUnloaded),
580 m_private_state_broadcaster ("lldb.process.internal_state_broadcaster"),
581 m_private_state_control_broadcaster ("lldb.process.internal_state_control_broadcaster"),
582 m_private_state_listener ("lldb.process.internal_state_listener"),
583 m_private_state_control_wait(),
584 m_private_state_thread (LLDB_INVALID_HOST_THREAD),
Jim Ingham4b536182011-08-09 02:12:22 +0000585 m_mod_id (),
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000586 m_thread_index_id (0),
587 m_exit_status (-1),
588 m_exit_string (),
589 m_thread_list (this),
590 m_notifications (),
Greg Clayton3af9ea52010-11-18 05:57:03 +0000591 m_image_tokens (),
592 m_listener (listener),
593 m_breakpoint_site_list (),
Greg Clayton3af9ea52010-11-18 05:57:03 +0000594 m_dynamic_checkers_ap (),
Caroline Ticeef5c6d02010-11-16 05:07:41 +0000595 m_unix_signals (),
Greg Clayton3af9ea52010-11-18 05:57:03 +0000596 m_abi_sp (),
Caroline Ticeef5c6d02010-11-16 05:07:41 +0000597 m_process_input_reader (),
Greg Clayton3e06bd92011-01-09 21:07:35 +0000598 m_stdio_communication ("process.stdio"),
Greg Clayton3af9ea52010-11-18 05:57:03 +0000599 m_stdio_communication_mutex (Mutex::eMutexTypeRecursive),
Greg Clayton58be07b2011-01-07 06:08:19 +0000600 m_stdout_data (),
Greg Claytond495c532011-05-17 03:37:42 +0000601 m_memory_cache (*this),
602 m_allocated_memory_cache (*this),
Greg Clayton513c26c2011-01-29 07:10:55 +0000603 m_next_event_action_ap()
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000604{
Caroline Tice1559a462010-09-27 00:30:10 +0000605 UpdateInstanceName();
606
Greg Clayton2d4edfb2010-11-06 01:53:30 +0000607 LogSP log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_OBJECT));
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000608 if (log)
609 log->Printf ("%p Process::Process()", this);
610
Greg Claytoncfd1ace2010-10-31 03:01:06 +0000611 SetEventName (eBroadcastBitStateChanged, "state-changed");
612 SetEventName (eBroadcastBitInterrupt, "interrupt");
613 SetEventName (eBroadcastBitSTDOUT, "stdout-available");
614 SetEventName (eBroadcastBitSTDERR, "stderr-available");
615
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000616 listener.StartListeningForEvents (this,
617 eBroadcastBitStateChanged |
618 eBroadcastBitInterrupt |
619 eBroadcastBitSTDOUT |
620 eBroadcastBitSTDERR);
621
622 m_private_state_listener.StartListeningForEvents(&m_private_state_broadcaster,
623 eBroadcastBitStateChanged);
624
625 m_private_state_listener.StartListeningForEvents(&m_private_state_control_broadcaster,
626 eBroadcastInternalStateControlStop |
627 eBroadcastInternalStateControlPause |
628 eBroadcastInternalStateControlResume);
629}
630
631//----------------------------------------------------------------------
632// Destructor
633//----------------------------------------------------------------------
634Process::~Process()
635{
Greg Clayton2d4edfb2010-11-06 01:53:30 +0000636 LogSP log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_OBJECT));
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000637 if (log)
638 log->Printf ("%p Process::~Process()", this);
639 StopPrivateStateThread();
640}
641
642void
643Process::Finalize()
644{
645 // Do any cleanup needed prior to being destructed... Subclasses
646 // that override this method should call this superclass method as well.
Jim Inghamd0a3e122011-02-16 17:54:55 +0000647
648 // We need to destroy the loader before the derived Process class gets destroyed
649 // since it is very likely that undoing the loader will require access to the real process.
Greg Clayton56d9a1b2011-08-22 02:49:39 +0000650 m_dyld_ap.reset();
651 m_os_ap.reset();
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000652}
653
654void
655Process::RegisterNotificationCallbacks (const Notifications& callbacks)
656{
657 m_notifications.push_back(callbacks);
658 if (callbacks.initialize != NULL)
659 callbacks.initialize (callbacks.baton, this);
660}
661
662bool
663Process::UnregisterNotificationCallbacks(const Notifications& callbacks)
664{
665 std::vector<Notifications>::iterator pos, end = m_notifications.end();
666 for (pos = m_notifications.begin(); pos != end; ++pos)
667 {
668 if (pos->baton == callbacks.baton &&
669 pos->initialize == callbacks.initialize &&
670 pos->process_state_changed == callbacks.process_state_changed)
671 {
672 m_notifications.erase(pos);
673 return true;
674 }
675 }
676 return false;
677}
678
679void
680Process::SynchronouslyNotifyStateChanged (StateType state)
681{
682 std::vector<Notifications>::iterator notification_pos, notification_end = m_notifications.end();
683 for (notification_pos = m_notifications.begin(); notification_pos != notification_end; ++notification_pos)
684 {
685 if (notification_pos->process_state_changed)
686 notification_pos->process_state_changed (notification_pos->baton, this, state);
687 }
688}
689
690// FIXME: We need to do some work on events before the general Listener sees them.
691// For instance if we are continuing from a breakpoint, we need to ensure that we do
692// the little "insert real insn, step & stop" trick. But we can't do that when the
693// event is delivered by the broadcaster - since that is done on the thread that is
694// waiting for new events, so if we needed more than one event for our handling, we would
695// stall. So instead we do it when we fetch the event off of the queue.
696//
697
698StateType
699Process::GetNextEvent (EventSP &event_sp)
700{
701 StateType state = eStateInvalid;
702
703 if (m_listener.GetNextEventForBroadcaster (this, event_sp) && event_sp)
704 state = Process::ProcessEventData::GetStateFromEvent (event_sp.get());
705
706 return state;
707}
708
709
710StateType
711Process::WaitForProcessToStop (const TimeValue *timeout)
712{
Jim Ingham4b536182011-08-09 02:12:22 +0000713 // We can't just wait for a "stopped" event, because the stopped event may have restarted the target.
714 // We have to actually check each event, and in the case of a stopped event check the restarted flag
715 // on the event.
716 EventSP event_sp;
717 StateType state = GetState();
718 // If we are exited or detached, we won't ever get back to any
719 // other valid state...
720 if (state == eStateDetached || state == eStateExited)
721 return state;
722
723 while (state != eStateInvalid)
724 {
725 state = WaitForStateChangedEvents (timeout, event_sp);
726 switch (state)
727 {
728 case eStateCrashed:
729 case eStateDetached:
730 case eStateExited:
731 case eStateUnloaded:
732 return state;
733 case eStateStopped:
734 if (Process::ProcessEventData::GetRestartedFromEvent(event_sp.get()))
735 continue;
736 else
737 return state;
738 default:
739 continue;
740 }
741 }
742 return state;
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000743}
744
745
746StateType
747Process::WaitForState
748(
749 const TimeValue *timeout,
750 const StateType *match_states, const uint32_t num_match_states
751)
752{
753 EventSP event_sp;
754 uint32_t i;
Greg Clayton05faeb72010-10-07 04:19:01 +0000755 StateType state = GetState();
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000756 while (state != eStateInvalid)
757 {
Greg Clayton05faeb72010-10-07 04:19:01 +0000758 // If we are exited or detached, we won't ever get back to any
759 // other valid state...
760 if (state == eStateDetached || state == eStateExited)
761 return state;
762
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000763 state = WaitForStateChangedEvents (timeout, event_sp);
764
765 for (i=0; i<num_match_states; ++i)
766 {
767 if (match_states[i] == state)
768 return state;
769 }
770 }
771 return state;
772}
773
Jim Ingham30f9b212010-10-11 23:53:14 +0000774bool
775Process::HijackProcessEvents (Listener *listener)
776{
777 if (listener != NULL)
778 {
779 return HijackBroadcaster(listener, eBroadcastBitStateChanged);
780 }
781 else
782 return false;
783}
784
785void
786Process::RestoreProcessEvents ()
787{
788 RestoreBroadcaster();
789}
790
Jim Ingham0f16e732011-02-08 05:20:59 +0000791bool
792Process::HijackPrivateProcessEvents (Listener *listener)
793{
794 if (listener != NULL)
795 {
796 return m_private_state_broadcaster.HijackBroadcaster(listener, eBroadcastBitStateChanged);
797 }
798 else
799 return false;
800}
801
802void
803Process::RestorePrivateProcessEvents ()
804{
805 m_private_state_broadcaster.RestoreBroadcaster();
806}
807
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000808StateType
809Process::WaitForStateChangedEvents (const TimeValue *timeout, EventSP &event_sp)
810{
Greg Clayton2d4edfb2010-11-06 01:53:30 +0000811 LogSP log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_PROCESS));
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000812
813 if (log)
814 log->Printf ("Process::%s (timeout = %p, event_sp)...", __FUNCTION__, timeout);
815
816 StateType state = eStateInvalid;
Greg Clayton3fcbed62010-10-19 03:25:40 +0000817 if (m_listener.WaitForEventForBroadcasterWithType (timeout,
818 this,
819 eBroadcastBitStateChanged,
820 event_sp))
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000821 state = Process::ProcessEventData::GetStateFromEvent(event_sp.get());
822
823 if (log)
824 log->Printf ("Process::%s (timeout = %p, event_sp) => %s",
825 __FUNCTION__,
826 timeout,
827 StateAsCString(state));
828 return state;
829}
830
831Event *
832Process::PeekAtStateChangedEvents ()
833{
Greg Clayton2d4edfb2010-11-06 01:53:30 +0000834 LogSP log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_PROCESS));
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000835
836 if (log)
837 log->Printf ("Process::%s...", __FUNCTION__);
838
839 Event *event_ptr;
Greg Clayton3fcbed62010-10-19 03:25:40 +0000840 event_ptr = m_listener.PeekAtNextEventForBroadcasterWithType (this,
841 eBroadcastBitStateChanged);
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000842 if (log)
843 {
844 if (event_ptr)
845 {
846 log->Printf ("Process::%s (event_ptr) => %s",
847 __FUNCTION__,
848 StateAsCString(ProcessEventData::GetStateFromEvent (event_ptr)));
849 }
850 else
851 {
852 log->Printf ("Process::%s no events found",
853 __FUNCTION__);
854 }
855 }
856 return event_ptr;
857}
858
859StateType
860Process::WaitForStateChangedEventsPrivate (const TimeValue *timeout, EventSP &event_sp)
861{
Greg Clayton2d4edfb2010-11-06 01:53:30 +0000862 LogSP log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_PROCESS));
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000863
864 if (log)
865 log->Printf ("Process::%s (timeout = %p, event_sp)...", __FUNCTION__, timeout);
866
867 StateType state = eStateInvalid;
Greg Clayton6779606a2011-01-22 23:43:18 +0000868 if (m_private_state_listener.WaitForEventForBroadcasterWithType (timeout,
869 &m_private_state_broadcaster,
870 eBroadcastBitStateChanged,
871 event_sp))
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000872 state = Process::ProcessEventData::GetStateFromEvent(event_sp.get());
873
874 // This is a bit of a hack, but when we wait here we could very well return
875 // to the command-line, and that could disable the log, which would render the
876 // log we got above invalid.
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000877 if (log)
Greg Clayton6779606a2011-01-22 23:43:18 +0000878 {
879 if (state == eStateInvalid)
880 log->Printf ("Process::%s (timeout = %p, event_sp) => TIMEOUT", __FUNCTION__, timeout);
881 else
882 log->Printf ("Process::%s (timeout = %p, event_sp) => %s", __FUNCTION__, timeout, StateAsCString(state));
883 }
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000884 return state;
885}
886
887bool
888Process::WaitForEventsPrivate (const TimeValue *timeout, EventSP &event_sp, bool control_only)
889{
Greg Clayton2d4edfb2010-11-06 01:53:30 +0000890 LogSP log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_PROCESS));
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000891
892 if (log)
893 log->Printf ("Process::%s (timeout = %p, event_sp)...", __FUNCTION__, timeout);
894
895 if (control_only)
896 return m_private_state_listener.WaitForEventForBroadcaster(timeout, &m_private_state_control_broadcaster, event_sp);
897 else
898 return m_private_state_listener.WaitForEvent(timeout, event_sp);
899}
900
901bool
902Process::IsRunning () const
903{
904 return StateIsRunningState (m_public_state.GetValue());
905}
906
907int
908Process::GetExitStatus ()
909{
910 if (m_public_state.GetValue() == eStateExited)
911 return m_exit_status;
912 return -1;
913}
914
Greg Clayton85851dd2010-12-04 00:10:17 +0000915
916void
917Process::ProcessInstanceSettings::GetHostEnvironmentIfNeeded ()
918{
919 if (m_inherit_host_env && !m_got_host_env)
920 {
921 m_got_host_env = true;
922 StringList host_env;
923 const size_t host_env_count = Host::GetEnvironment (host_env);
924 for (size_t idx=0; idx<host_env_count; idx++)
925 {
926 const char *env_entry = host_env.GetStringAtIndex (idx);
927 if (env_entry)
928 {
Greg Claytone2956ee2010-12-15 20:52:40 +0000929 const char *equal_pos = ::strchr(env_entry, '=');
Greg Clayton85851dd2010-12-04 00:10:17 +0000930 if (equal_pos)
931 {
932 std::string key (env_entry, equal_pos - env_entry);
933 std::string value (equal_pos + 1);
934 if (m_env_vars.find (key) == m_env_vars.end())
935 m_env_vars[key] = value;
936 }
937 }
938 }
939 }
940}
941
942
943size_t
944Process::ProcessInstanceSettings::GetEnvironmentAsArgs (Args &env)
945{
946 GetHostEnvironmentIfNeeded ();
947
948 dictionary::const_iterator pos, end = m_env_vars.end();
949 for (pos = m_env_vars.begin(); pos != end; ++pos)
950 {
951 std::string env_var_equal_value (pos->first);
952 env_var_equal_value.append(1, '=');
953 env_var_equal_value.append (pos->second);
954 env.AppendArgument (env_var_equal_value.c_str());
955 }
956 return env.GetArgumentCount();
957}
958
959
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000960const char *
961Process::GetExitDescription ()
962{
963 if (m_public_state.GetValue() == eStateExited && !m_exit_string.empty())
964 return m_exit_string.c_str();
965 return NULL;
966}
967
Greg Clayton6779606a2011-01-22 23:43:18 +0000968bool
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000969Process::SetExitStatus (int status, const char *cstr)
970{
Greg Clayton414f5d32011-01-25 02:58:48 +0000971 LogSP log(lldb_private::GetLogIfAnyCategoriesSet (LIBLLDB_LOG_STATE | LIBLLDB_LOG_PROCESS));
972 if (log)
973 log->Printf("Process::SetExitStatus (status=%i (0x%8.8x), description=%s%s%s)",
974 status, status,
975 cstr ? "\"" : "",
976 cstr ? cstr : "NULL",
977 cstr ? "\"" : "");
978
Greg Clayton6779606a2011-01-22 23:43:18 +0000979 // We were already in the exited state
980 if (m_private_state.GetValue() == eStateExited)
Greg Clayton414f5d32011-01-25 02:58:48 +0000981 {
Greg Clayton385d6032011-01-26 23:47:29 +0000982 if (log)
983 log->Printf("Process::SetExitStatus () ignoring exit status because state was already set to eStateExited");
Greg Clayton6779606a2011-01-22 23:43:18 +0000984 return false;
Greg Clayton414f5d32011-01-25 02:58:48 +0000985 }
Greg Clayton6779606a2011-01-22 23:43:18 +0000986
987 m_exit_status = status;
988 if (cstr)
989 m_exit_string = cstr;
990 else
991 m_exit_string.clear();
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000992
Greg Clayton6779606a2011-01-22 23:43:18 +0000993 DidExit ();
Greg Clayton10177aa2010-12-08 05:08:21 +0000994
Greg Clayton6779606a2011-01-22 23:43:18 +0000995 SetPrivateState (eStateExited);
996 return true;
Chris Lattner30fdc8d2010-06-08 16:52:24 +0000997}
998
999// This static callback can be used to watch for local child processes on
1000// the current host. The the child process exits, the process will be
1001// found in the global target list (we want to be completely sure that the
1002// lldb_private::Process doesn't go away before we can deliver the signal.
1003bool
1004Process::SetProcessExitStatus
1005(
1006 void *callback_baton,
1007 lldb::pid_t pid,
1008 int signo, // Zero for no signal
1009 int exit_status // Exit value of process if signal is zero
1010)
1011{
1012 if (signo == 0 || exit_status)
1013 {
Greg Clayton66111032010-06-23 01:19:29 +00001014 TargetSP target_sp(Debugger::FindTargetWithProcessID (pid));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001015 if (target_sp)
1016 {
1017 ProcessSP process_sp (target_sp->GetProcessSP());
1018 if (process_sp)
1019 {
1020 const char *signal_cstr = NULL;
1021 if (signo)
1022 signal_cstr = process_sp->GetUnixSignals().GetSignalAsCString (signo);
1023
1024 process_sp->SetExitStatus (exit_status, signal_cstr);
1025 }
1026 }
1027 return true;
1028 }
1029 return false;
1030}
1031
1032
Greg Clayton56d9a1b2011-08-22 02:49:39 +00001033void
1034Process::UpdateThreadListIfNeeded ()
1035{
1036 const uint32_t stop_id = GetStopID();
1037 if (m_thread_list.GetSize(false) == 0 || stop_id != m_thread_list.GetStopID())
1038 {
1039 Mutex::Locker locker (m_thread_list.GetMutex ());
1040 ThreadList new_thread_list(this);
1041 // Always update the thread list with the protocol specific
1042 // thread list
1043 UpdateThreadList (m_thread_list, new_thread_list);
1044 OperatingSystem *os = GetOperatingSystem ();
1045 if (os)
1046 os->UpdateThreadList (m_thread_list, new_thread_list);
1047 m_thread_list.Update (new_thread_list);
1048 m_thread_list.SetStopID (stop_id);
1049 }
1050}
1051
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001052uint32_t
1053Process::GetNextThreadIndexID ()
1054{
1055 return ++m_thread_index_id;
1056}
1057
1058StateType
1059Process::GetState()
1060{
1061 // If any other threads access this we will need a mutex for it
1062 return m_public_state.GetValue ();
1063}
1064
1065void
1066Process::SetPublicState (StateType new_state)
1067{
Greg Clayton414f5d32011-01-25 02:58:48 +00001068 LogSP log(lldb_private::GetLogIfAnyCategoriesSet (LIBLLDB_LOG_STATE | LIBLLDB_LOG_PROCESS));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001069 if (log)
1070 log->Printf("Process::SetPublicState (%s)", StateAsCString(new_state));
1071 m_public_state.SetValue (new_state);
1072}
1073
1074StateType
1075Process::GetPrivateState ()
1076{
1077 return m_private_state.GetValue();
1078}
1079
1080void
1081Process::SetPrivateState (StateType new_state)
1082{
Greg Clayton414f5d32011-01-25 02:58:48 +00001083 LogSP log(lldb_private::GetLogIfAnyCategoriesSet (LIBLLDB_LOG_STATE | LIBLLDB_LOG_PROCESS));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001084 bool state_changed = false;
1085
1086 if (log)
1087 log->Printf("Process::SetPrivateState (%s)", StateAsCString(new_state));
1088
1089 Mutex::Locker locker(m_private_state.GetMutex());
1090
1091 const StateType old_state = m_private_state.GetValueNoLock ();
1092 state_changed = old_state != new_state;
1093 if (state_changed)
1094 {
1095 m_private_state.SetValueNoLock (new_state);
1096 if (StateIsStoppedState(new_state))
1097 {
Jim Ingham4b536182011-08-09 02:12:22 +00001098 m_mod_id.BumpStopID();
Greg Clayton58be07b2011-01-07 06:08:19 +00001099 m_memory_cache.Clear();
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001100 if (log)
Jim Ingham4b536182011-08-09 02:12:22 +00001101 log->Printf("Process::SetPrivateState (%s) stop_id = %u", StateAsCString(new_state), m_mod_id.GetStopID());
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001102 }
1103 // Use our target to get a shared pointer to ourselves...
1104 m_private_state_broadcaster.BroadcastEvent (eBroadcastBitStateChanged, new ProcessEventData (GetTarget().GetProcessSP(), new_state));
1105 }
1106 else
1107 {
1108 if (log)
1109 log->Printf("Process::SetPrivateState (%s) state didn't change. Ignoring...", StateAsCString(new_state), StateAsCString(old_state));
1110 }
1111}
1112
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001113addr_t
1114Process::GetImageInfoAddress()
1115{
1116 return LLDB_INVALID_ADDRESS;
1117}
1118
Greg Clayton8f343b02010-11-04 01:54:29 +00001119//----------------------------------------------------------------------
1120// LoadImage
1121//
1122// This function provides a default implementation that works for most
1123// unix variants. Any Process subclasses that need to do shared library
1124// loading differently should override LoadImage and UnloadImage and
1125// do what is needed.
1126//----------------------------------------------------------------------
1127uint32_t
1128Process::LoadImage (const FileSpec &image_spec, Error &error)
1129{
1130 DynamicLoader *loader = GetDynamicLoader();
1131 if (loader)
1132 {
1133 error = loader->CanLoadImage();
1134 if (error.Fail())
1135 return LLDB_INVALID_IMAGE_TOKEN;
1136 }
1137
1138 if (error.Success())
1139 {
1140 ThreadSP thread_sp(GetThreadList ().GetSelectedThread());
Greg Clayton8f343b02010-11-04 01:54:29 +00001141
1142 if (thread_sp)
1143 {
1144 StackFrameSP frame_sp (thread_sp->GetStackFrameAtIndex (0));
1145
1146 if (frame_sp)
1147 {
1148 ExecutionContext exe_ctx;
1149 frame_sp->CalculateExecutionContext (exe_ctx);
Jim Ingham399f1ca2010-11-05 19:25:48 +00001150 bool unwind_on_error = true;
Greg Clayton8f343b02010-11-04 01:54:29 +00001151 StreamString expr;
1152 char path[PATH_MAX];
1153 image_spec.GetPath(path, sizeof(path));
1154 expr.Printf("dlopen (\"%s\", 2)", path);
1155 const char *prefix = "extern \"C\" void* dlopen (const char *path, int mode);\n";
Jim Inghamf48169b2010-11-30 02:22:11 +00001156 lldb::ValueObjectSP result_valobj_sp;
Sean Callanan63697e52011-05-07 01:06:41 +00001157 ClangUserExpression::Evaluate (exe_ctx, unwind_on_error, expr.GetData(), prefix, result_valobj_sp);
Johnny Chene92aa432011-09-09 00:01:43 +00001158 error = result_valobj_sp->GetError();
1159 if (error.Success())
Greg Clayton8f343b02010-11-04 01:54:29 +00001160 {
1161 Scalar scalar;
Jim Ingham6035b672011-03-31 00:19:25 +00001162 if (result_valobj_sp->ResolveValue (scalar))
Greg Clayton8f343b02010-11-04 01:54:29 +00001163 {
1164 addr_t image_ptr = scalar.ULongLong(LLDB_INVALID_ADDRESS);
1165 if (image_ptr != 0 && image_ptr != LLDB_INVALID_ADDRESS)
1166 {
1167 uint32_t image_token = m_image_tokens.size();
1168 m_image_tokens.push_back (image_ptr);
1169 return image_token;
1170 }
1171 }
1172 }
1173 }
1174 }
1175 }
1176 return LLDB_INVALID_IMAGE_TOKEN;
1177}
1178
1179//----------------------------------------------------------------------
1180// UnloadImage
1181//
1182// This function provides a default implementation that works for most
1183// unix variants. Any Process subclasses that need to do shared library
1184// loading differently should override LoadImage and UnloadImage and
1185// do what is needed.
1186//----------------------------------------------------------------------
1187Error
1188Process::UnloadImage (uint32_t image_token)
1189{
1190 Error error;
1191 if (image_token < m_image_tokens.size())
1192 {
1193 const addr_t image_addr = m_image_tokens[image_token];
1194 if (image_addr == LLDB_INVALID_ADDRESS)
1195 {
1196 error.SetErrorString("image already unloaded");
1197 }
1198 else
1199 {
1200 DynamicLoader *loader = GetDynamicLoader();
1201 if (loader)
1202 error = loader->CanLoadImage();
1203
1204 if (error.Success())
1205 {
1206 ThreadSP thread_sp(GetThreadList ().GetSelectedThread());
Greg Clayton8f343b02010-11-04 01:54:29 +00001207
1208 if (thread_sp)
1209 {
1210 StackFrameSP frame_sp (thread_sp->GetStackFrameAtIndex (0));
1211
1212 if (frame_sp)
1213 {
1214 ExecutionContext exe_ctx;
1215 frame_sp->CalculateExecutionContext (exe_ctx);
Jim Ingham399f1ca2010-11-05 19:25:48 +00001216 bool unwind_on_error = true;
Greg Clayton8f343b02010-11-04 01:54:29 +00001217 StreamString expr;
1218 expr.Printf("dlclose ((void *)0x%llx)", image_addr);
1219 const char *prefix = "extern \"C\" int dlclose(void* handle);\n";
Jim Inghamf48169b2010-11-30 02:22:11 +00001220 lldb::ValueObjectSP result_valobj_sp;
Sean Callanan63697e52011-05-07 01:06:41 +00001221 ClangUserExpression::Evaluate (exe_ctx, unwind_on_error, expr.GetData(), prefix, result_valobj_sp);
Greg Clayton8f343b02010-11-04 01:54:29 +00001222 if (result_valobj_sp->GetError().Success())
1223 {
1224 Scalar scalar;
Jim Ingham6035b672011-03-31 00:19:25 +00001225 if (result_valobj_sp->ResolveValue (scalar))
Greg Clayton8f343b02010-11-04 01:54:29 +00001226 {
1227 if (scalar.UInt(1))
1228 {
1229 error.SetErrorStringWithFormat("expression failed: \"%s\"", expr.GetData());
1230 }
1231 else
1232 {
1233 m_image_tokens[image_token] = LLDB_INVALID_ADDRESS;
1234 }
1235 }
1236 }
1237 else
1238 {
1239 error = result_valobj_sp->GetError();
1240 }
1241 }
1242 }
1243 }
1244 }
1245 }
1246 else
1247 {
1248 error.SetErrorString("invalid image token");
1249 }
1250 return error;
1251}
1252
Greg Clayton31f1d2f2011-05-11 18:39:18 +00001253const lldb::ABISP &
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001254Process::GetABI()
1255{
Greg Clayton31f1d2f2011-05-11 18:39:18 +00001256 if (!m_abi_sp)
1257 m_abi_sp = ABI::FindPlugin(m_target.GetArchitecture());
1258 return m_abi_sp;
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001259}
1260
Jim Ingham22777012010-09-23 02:01:19 +00001261LanguageRuntime *
1262Process::GetLanguageRuntime(lldb::LanguageType language)
1263{
1264 LanguageRuntimeCollection::iterator pos;
1265 pos = m_language_runtimes.find (language);
1266 if (pos == m_language_runtimes.end())
1267 {
1268 lldb::LanguageRuntimeSP runtime(LanguageRuntime::FindPlugin(this, language));
1269
1270 m_language_runtimes[language]
1271 = runtime;
1272 return runtime.get();
1273 }
1274 else
1275 return (*pos).second.get();
1276}
1277
1278CPPLanguageRuntime *
1279Process::GetCPPLanguageRuntime ()
1280{
1281 LanguageRuntime *runtime = GetLanguageRuntime(eLanguageTypeC_plus_plus);
1282 if (runtime != NULL && runtime->GetLanguageType() == eLanguageTypeC_plus_plus)
1283 return static_cast<CPPLanguageRuntime *> (runtime);
1284 return NULL;
1285}
1286
1287ObjCLanguageRuntime *
1288Process::GetObjCLanguageRuntime ()
1289{
1290 LanguageRuntime *runtime = GetLanguageRuntime(eLanguageTypeObjC);
1291 if (runtime != NULL && runtime->GetLanguageType() == eLanguageTypeObjC)
1292 return static_cast<ObjCLanguageRuntime *> (runtime);
1293 return NULL;
1294}
1295
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001296BreakpointSiteList &
1297Process::GetBreakpointSiteList()
1298{
1299 return m_breakpoint_site_list;
1300}
1301
1302const BreakpointSiteList &
1303Process::GetBreakpointSiteList() const
1304{
1305 return m_breakpoint_site_list;
1306}
1307
1308
1309void
1310Process::DisableAllBreakpointSites ()
1311{
1312 m_breakpoint_site_list.SetEnabledForAll (false);
1313}
1314
1315Error
1316Process::ClearBreakpointSiteByID (lldb::user_id_t break_id)
1317{
1318 Error error (DisableBreakpointSiteByID (break_id));
1319
1320 if (error.Success())
1321 m_breakpoint_site_list.Remove(break_id);
1322
1323 return error;
1324}
1325
1326Error
1327Process::DisableBreakpointSiteByID (lldb::user_id_t break_id)
1328{
1329 Error error;
1330 BreakpointSiteSP bp_site_sp = m_breakpoint_site_list.FindByID (break_id);
1331 if (bp_site_sp)
1332 {
1333 if (bp_site_sp->IsEnabled())
1334 error = DisableBreakpoint (bp_site_sp.get());
1335 }
1336 else
1337 {
1338 error.SetErrorStringWithFormat("invalid breakpoint site ID: %i", break_id);
1339 }
1340
1341 return error;
1342}
1343
1344Error
1345Process::EnableBreakpointSiteByID (lldb::user_id_t break_id)
1346{
1347 Error error;
1348 BreakpointSiteSP bp_site_sp = m_breakpoint_site_list.FindByID (break_id);
1349 if (bp_site_sp)
1350 {
1351 if (!bp_site_sp->IsEnabled())
1352 error = EnableBreakpoint (bp_site_sp.get());
1353 }
1354 else
1355 {
1356 error.SetErrorStringWithFormat("invalid breakpoint site ID: %i", break_id);
1357 }
1358 return error;
1359}
1360
Stephen Wilson50bd94f2010-07-17 00:56:13 +00001361lldb::break_id_t
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001362Process::CreateBreakpointSite (BreakpointLocationSP &owner, bool use_hardware)
1363{
Greg Clayton92bb12c2011-05-19 18:17:41 +00001364 const addr_t load_addr = owner->GetAddress().GetOpcodeLoadAddress (&m_target);
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001365 if (load_addr != LLDB_INVALID_ADDRESS)
1366 {
1367 BreakpointSiteSP bp_site_sp;
1368
1369 // Look up this breakpoint site. If it exists, then add this new owner, otherwise
1370 // create a new breakpoint site and add it.
1371
1372 bp_site_sp = m_breakpoint_site_list.FindByAddress (load_addr);
1373
1374 if (bp_site_sp)
1375 {
1376 bp_site_sp->AddOwner (owner);
1377 owner->SetBreakpointSite (bp_site_sp);
1378 return bp_site_sp->GetID();
1379 }
1380 else
1381 {
1382 bp_site_sp.reset (new BreakpointSite (&m_breakpoint_site_list, owner, load_addr, LLDB_INVALID_THREAD_ID, use_hardware));
1383 if (bp_site_sp)
1384 {
1385 if (EnableBreakpoint (bp_site_sp.get()).Success())
1386 {
1387 owner->SetBreakpointSite (bp_site_sp);
1388 return m_breakpoint_site_list.Add (bp_site_sp);
1389 }
1390 }
1391 }
1392 }
1393 // We failed to enable the breakpoint
1394 return LLDB_INVALID_BREAK_ID;
1395
1396}
1397
1398void
1399Process::RemoveOwnerFromBreakpointSite (lldb::user_id_t owner_id, lldb::user_id_t owner_loc_id, BreakpointSiteSP &bp_site_sp)
1400{
1401 uint32_t num_owners = bp_site_sp->RemoveOwner (owner_id, owner_loc_id);
1402 if (num_owners == 0)
1403 {
1404 DisableBreakpoint(bp_site_sp.get());
1405 m_breakpoint_site_list.RemoveByAddress(bp_site_sp->GetLoadAddress());
1406 }
1407}
1408
1409
1410size_t
1411Process::RemoveBreakpointOpcodesFromBuffer (addr_t bp_addr, size_t size, uint8_t *buf) const
1412{
1413 size_t bytes_removed = 0;
1414 addr_t intersect_addr;
1415 size_t intersect_size;
1416 size_t opcode_offset;
1417 size_t idx;
1418 BreakpointSiteSP bp;
Jim Ingham20c77192011-06-29 19:42:28 +00001419 BreakpointSiteList bp_sites_in_range;
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001420
Jim Ingham20c77192011-06-29 19:42:28 +00001421 if (m_breakpoint_site_list.FindInRange (bp_addr, bp_addr + size, bp_sites_in_range))
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001422 {
Jim Ingham20c77192011-06-29 19:42:28 +00001423 for (idx = 0; (bp = bp_sites_in_range.GetByIndex(idx)) != NULL; ++idx)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001424 {
Jim Ingham20c77192011-06-29 19:42:28 +00001425 if (bp->GetType() == BreakpointSite::eSoftware)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001426 {
Jim Ingham20c77192011-06-29 19:42:28 +00001427 if (bp->IntersectsRange(bp_addr, size, &intersect_addr, &intersect_size, &opcode_offset))
1428 {
1429 assert(bp_addr <= intersect_addr && intersect_addr < bp_addr + size);
1430 assert(bp_addr < intersect_addr + intersect_size && intersect_addr + intersect_size <= bp_addr + size);
1431 assert(opcode_offset + intersect_size <= bp->GetByteSize());
1432 size_t buf_offset = intersect_addr - bp_addr;
1433 ::memcpy(buf + buf_offset, bp->GetSavedOpcodeBytes() + opcode_offset, intersect_size);
1434 }
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001435 }
1436 }
1437 }
1438 return bytes_removed;
1439}
1440
1441
Greg Claytonded470d2011-03-19 01:12:21 +00001442
1443size_t
1444Process::GetSoftwareBreakpointTrapOpcode (BreakpointSite* bp_site)
1445{
1446 PlatformSP platform_sp (m_target.GetPlatform());
1447 if (platform_sp)
1448 return platform_sp->GetSoftwareBreakpointTrapOpcode (m_target, bp_site);
1449 return 0;
1450}
1451
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001452Error
1453Process::EnableSoftwareBreakpoint (BreakpointSite *bp_site)
1454{
1455 Error error;
1456 assert (bp_site != NULL);
Greg Clayton2d4edfb2010-11-06 01:53:30 +00001457 LogSP log(lldb_private::GetLogIfAnyCategoriesSet (LIBLLDB_LOG_BREAKPOINTS));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001458 const addr_t bp_addr = bp_site->GetLoadAddress();
1459 if (log)
1460 log->Printf ("Process::EnableSoftwareBreakpoint (site_id = %d) addr = 0x%llx", bp_site->GetID(), (uint64_t)bp_addr);
1461 if (bp_site->IsEnabled())
1462 {
1463 if (log)
1464 log->Printf ("Process::EnableSoftwareBreakpoint (site_id = %d) addr = 0x%llx -- already enabled", bp_site->GetID(), (uint64_t)bp_addr);
1465 return error;
1466 }
1467
1468 if (bp_addr == LLDB_INVALID_ADDRESS)
1469 {
1470 error.SetErrorString("BreakpointSite contains an invalid load address.");
1471 return error;
1472 }
1473 // Ask the lldb::Process subclass to fill in the correct software breakpoint
1474 // trap for the breakpoint site
1475 const size_t bp_opcode_size = GetSoftwareBreakpointTrapOpcode(bp_site);
1476
1477 if (bp_opcode_size == 0)
1478 {
1479 error.SetErrorStringWithFormat ("Process::GetSoftwareBreakpointTrapOpcode() returned zero, unable to get breakpoint trap for address 0x%llx.\n", bp_addr);
1480 }
1481 else
1482 {
1483 const uint8_t * const bp_opcode_bytes = bp_site->GetTrapOpcodeBytes();
1484
1485 if (bp_opcode_bytes == NULL)
1486 {
1487 error.SetErrorString ("BreakpointSite doesn't contain a valid breakpoint trap opcode.");
1488 return error;
1489 }
1490
1491 // Save the original opcode by reading it
1492 if (DoReadMemory(bp_addr, bp_site->GetSavedOpcodeBytes(), bp_opcode_size, error) == bp_opcode_size)
1493 {
1494 // Write a software breakpoint in place of the original opcode
1495 if (DoWriteMemory(bp_addr, bp_opcode_bytes, bp_opcode_size, error) == bp_opcode_size)
1496 {
1497 uint8_t verify_bp_opcode_bytes[64];
1498 if (DoReadMemory(bp_addr, verify_bp_opcode_bytes, bp_opcode_size, error) == bp_opcode_size)
1499 {
1500 if (::memcmp(bp_opcode_bytes, verify_bp_opcode_bytes, bp_opcode_size) == 0)
1501 {
1502 bp_site->SetEnabled(true);
1503 bp_site->SetType (BreakpointSite::eSoftware);
1504 if (log)
1505 log->Printf ("Process::EnableSoftwareBreakpoint (site_id = %d) addr = 0x%llx -- SUCCESS",
1506 bp_site->GetID(),
1507 (uint64_t)bp_addr);
1508 }
1509 else
1510 error.SetErrorString("Failed to verify the breakpoint trap in memory.");
1511 }
1512 else
1513 error.SetErrorString("Unable to read memory to verify breakpoint trap.");
1514 }
1515 else
1516 error.SetErrorString("Unable to write breakpoint trap to memory.");
1517 }
1518 else
1519 error.SetErrorString("Unable to read memory at breakpoint address.");
1520 }
Stephen Wilson78a4feb2011-01-12 04:20:03 +00001521 if (log && error.Fail())
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001522 log->Printf ("Process::EnableSoftwareBreakpoint (site_id = %d) addr = 0x%llx -- FAILED: %s",
1523 bp_site->GetID(),
1524 (uint64_t)bp_addr,
1525 error.AsCString());
1526 return error;
1527}
1528
1529Error
1530Process::DisableSoftwareBreakpoint (BreakpointSite *bp_site)
1531{
1532 Error error;
1533 assert (bp_site != NULL);
Greg Clayton2d4edfb2010-11-06 01:53:30 +00001534 LogSP log(lldb_private::GetLogIfAnyCategoriesSet (LIBLLDB_LOG_BREAKPOINTS));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001535 addr_t bp_addr = bp_site->GetLoadAddress();
1536 lldb::user_id_t breakID = bp_site->GetID();
1537 if (log)
Stephen Wilson5394e0d2011-01-14 21:07:07 +00001538 log->Printf ("Process::DisableBreakpoint (breakID = %d) addr = 0x%llx", breakID, (uint64_t)bp_addr);
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001539
1540 if (bp_site->IsHardware())
1541 {
1542 error.SetErrorString("Breakpoint site is a hardware breakpoint.");
1543 }
1544 else if (bp_site->IsEnabled())
1545 {
1546 const size_t break_op_size = bp_site->GetByteSize();
1547 const uint8_t * const break_op = bp_site->GetTrapOpcodeBytes();
1548 if (break_op_size > 0)
1549 {
1550 // Clear a software breakoint instruction
Greg Claytonc982c762010-07-09 20:39:50 +00001551 uint8_t curr_break_op[8];
Stephen Wilson4ab47682010-07-20 18:41:11 +00001552 assert (break_op_size <= sizeof(curr_break_op));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001553 bool break_op_found = false;
1554
1555 // Read the breakpoint opcode
1556 if (DoReadMemory (bp_addr, curr_break_op, break_op_size, error) == break_op_size)
1557 {
1558 bool verify = false;
1559 // Make sure we have the a breakpoint opcode exists at this address
1560 if (::memcmp (curr_break_op, break_op, break_op_size) == 0)
1561 {
1562 break_op_found = true;
1563 // We found a valid breakpoint opcode at this address, now restore
1564 // the saved opcode.
1565 if (DoWriteMemory (bp_addr, bp_site->GetSavedOpcodeBytes(), break_op_size, error) == break_op_size)
1566 {
1567 verify = true;
1568 }
1569 else
1570 error.SetErrorString("Memory write failed when restoring original opcode.");
1571 }
1572 else
1573 {
1574 error.SetErrorString("Original breakpoint trap is no longer in memory.");
1575 // Set verify to true and so we can check if the original opcode has already been restored
1576 verify = true;
1577 }
1578
1579 if (verify)
1580 {
Greg Claytonc982c762010-07-09 20:39:50 +00001581 uint8_t verify_opcode[8];
Stephen Wilson4ab47682010-07-20 18:41:11 +00001582 assert (break_op_size < sizeof(verify_opcode));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001583 // Verify that our original opcode made it back to the inferior
1584 if (DoReadMemory (bp_addr, verify_opcode, break_op_size, error) == break_op_size)
1585 {
1586 // compare the memory we just read with the original opcode
1587 if (::memcmp (bp_site->GetSavedOpcodeBytes(), verify_opcode, break_op_size) == 0)
1588 {
1589 // SUCCESS
1590 bp_site->SetEnabled(false);
1591 if (log)
1592 log->Printf ("Process::DisableSoftwareBreakpoint (site_id = %d) addr = 0x%llx -- SUCCESS", bp_site->GetID(), (uint64_t)bp_addr);
1593 return error;
1594 }
1595 else
1596 {
1597 if (break_op_found)
1598 error.SetErrorString("Failed to restore original opcode.");
1599 }
1600 }
1601 else
1602 error.SetErrorString("Failed to read memory to verify that breakpoint trap was restored.");
1603 }
1604 }
1605 else
1606 error.SetErrorString("Unable to read memory that should contain the breakpoint trap.");
1607 }
1608 }
1609 else
1610 {
1611 if (log)
1612 log->Printf ("Process::DisableSoftwareBreakpoint (site_id = %d) addr = 0x%llx -- already disabled", bp_site->GetID(), (uint64_t)bp_addr);
1613 return error;
1614 }
1615
1616 if (log)
1617 log->Printf ("Process::DisableSoftwareBreakpoint (site_id = %d) addr = 0x%llx -- FAILED: %s",
1618 bp_site->GetID(),
1619 (uint64_t)bp_addr,
1620 error.AsCString());
1621 return error;
1622
1623}
1624
Greg Clayton58be07b2011-01-07 06:08:19 +00001625// Comment out line below to disable memory caching
1626#define ENABLE_MEMORY_CACHING
1627// Uncomment to verify memory caching works after making changes to caching code
1628//#define VERIFY_MEMORY_READS
1629
1630#if defined (ENABLE_MEMORY_CACHING)
1631
1632#if defined (VERIFY_MEMORY_READS)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001633
1634size_t
1635Process::ReadMemory (addr_t addr, void *buf, size_t size, Error &error)
1636{
Greg Clayton58be07b2011-01-07 06:08:19 +00001637 // Memory caching is enabled, with debug verification
1638 if (buf && size)
1639 {
1640 // Uncomment the line below to make sure memory caching is working.
1641 // I ran this through the test suite and got no assertions, so I am
1642 // pretty confident this is working well. If any changes are made to
1643 // memory caching, uncomment the line below and test your changes!
1644
1645 // Verify all memory reads by using the cache first, then redundantly
1646 // reading the same memory from the inferior and comparing to make sure
1647 // everything is exactly the same.
1648 std::string verify_buf (size, '\0');
1649 assert (verify_buf.size() == size);
1650 const size_t cache_bytes_read = m_memory_cache.Read (this, addr, buf, size, error);
1651 Error verify_error;
1652 const size_t verify_bytes_read = ReadMemoryFromInferior (addr, const_cast<char *>(verify_buf.data()), verify_buf.size(), verify_error);
1653 assert (cache_bytes_read == verify_bytes_read);
1654 assert (memcmp(buf, verify_buf.data(), verify_buf.size()) == 0);
1655 assert (verify_error.Success() == error.Success());
1656 return cache_bytes_read;
1657 }
1658 return 0;
1659}
1660
1661#else // #if defined (VERIFY_MEMORY_READS)
1662
1663size_t
1664Process::ReadMemory (addr_t addr, void *buf, size_t size, Error &error)
1665{
1666 // Memory caching enabled, no verification
Greg Claytond495c532011-05-17 03:37:42 +00001667 return m_memory_cache.Read (addr, buf, size, error);
Greg Clayton58be07b2011-01-07 06:08:19 +00001668}
1669
1670#endif // #else for #if defined (VERIFY_MEMORY_READS)
1671
1672#else // #if defined (ENABLE_MEMORY_CACHING)
1673
1674size_t
1675Process::ReadMemory (addr_t addr, void *buf, size_t size, Error &error)
1676{
1677 // Memory caching is disabled
1678 return ReadMemoryFromInferior (addr, buf, size, error);
1679}
1680
1681#endif // #else for #if defined (ENABLE_MEMORY_CACHING)
1682
1683
1684size_t
Greg Clayton8b82f082011-04-12 05:54:46 +00001685Process::ReadCStringFromMemory (addr_t addr, char *dst, size_t dst_max_len)
1686{
1687 size_t total_cstr_len = 0;
1688 if (dst && dst_max_len)
1689 {
1690 // NULL out everything just to be safe
1691 memset (dst, 0, dst_max_len);
1692 Error error;
1693 addr_t curr_addr = addr;
1694 const size_t cache_line_size = m_memory_cache.GetMemoryCacheLineSize();
1695 size_t bytes_left = dst_max_len - 1;
1696 char *curr_dst = dst;
1697
1698 while (bytes_left > 0)
1699 {
1700 addr_t cache_line_bytes_left = cache_line_size - (curr_addr % cache_line_size);
1701 addr_t bytes_to_read = std::min<addr_t>(bytes_left, cache_line_bytes_left);
1702 size_t bytes_read = ReadMemory (curr_addr, curr_dst, bytes_to_read, error);
1703
1704 if (bytes_read == 0)
1705 {
1706 dst[total_cstr_len] = '\0';
1707 break;
1708 }
1709 const size_t len = strlen(curr_dst);
1710
1711 total_cstr_len += len;
1712
1713 if (len < bytes_to_read)
1714 break;
1715
1716 curr_dst += bytes_read;
1717 curr_addr += bytes_read;
1718 bytes_left -= bytes_read;
1719 }
1720 }
1721 return total_cstr_len;
1722}
1723
1724size_t
Greg Clayton58be07b2011-01-07 06:08:19 +00001725Process::ReadMemoryFromInferior (addr_t addr, void *buf, size_t size, Error &error)
1726{
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001727 if (buf == NULL || size == 0)
1728 return 0;
1729
1730 size_t bytes_read = 0;
1731 uint8_t *bytes = (uint8_t *)buf;
1732
1733 while (bytes_read < size)
1734 {
1735 const size_t curr_size = size - bytes_read;
1736 const size_t curr_bytes_read = DoReadMemory (addr + bytes_read,
1737 bytes + bytes_read,
1738 curr_size,
1739 error);
1740 bytes_read += curr_bytes_read;
1741 if (curr_bytes_read == curr_size || curr_bytes_read == 0)
1742 break;
1743 }
1744
1745 // Replace any software breakpoint opcodes that fall into this range back
1746 // into "buf" before we return
1747 if (bytes_read > 0)
1748 RemoveBreakpointOpcodesFromBuffer (addr, bytes_read, (uint8_t *)buf);
1749 return bytes_read;
1750}
1751
Greg Clayton58a4c462010-12-16 20:01:20 +00001752uint64_t
Greg Claytonf3ef3d22011-05-22 22:46:53 +00001753Process::ReadUnsignedIntegerFromMemory (lldb::addr_t vm_addr, size_t integer_byte_size, uint64_t fail_value, Error &error)
Greg Clayton58a4c462010-12-16 20:01:20 +00001754{
Greg Claytonf3ef3d22011-05-22 22:46:53 +00001755 Scalar scalar;
1756 if (ReadScalarIntegerFromMemory(vm_addr, integer_byte_size, false, scalar, error))
1757 return scalar.ULongLong(fail_value);
1758 return fail_value;
1759}
1760
1761addr_t
1762Process::ReadPointerFromMemory (lldb::addr_t vm_addr, Error &error)
1763{
1764 Scalar scalar;
1765 if (ReadScalarIntegerFromMemory(vm_addr, GetAddressByteSize(), false, scalar, error))
1766 return scalar.ULongLong(LLDB_INVALID_ADDRESS);
1767 return LLDB_INVALID_ADDRESS;
1768}
1769
1770
1771bool
1772Process::WritePointerToMemory (lldb::addr_t vm_addr,
1773 lldb::addr_t ptr_value,
1774 Error &error)
1775{
1776 Scalar scalar;
1777 const uint32_t addr_byte_size = GetAddressByteSize();
1778 if (addr_byte_size <= 4)
1779 scalar = (uint32_t)ptr_value;
Greg Clayton58a4c462010-12-16 20:01:20 +00001780 else
Greg Claytonf3ef3d22011-05-22 22:46:53 +00001781 scalar = ptr_value;
1782 return WriteScalarToMemory(vm_addr, scalar, addr_byte_size, error) == addr_byte_size;
Greg Clayton58a4c462010-12-16 20:01:20 +00001783}
1784
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001785size_t
1786Process::WriteMemoryPrivate (addr_t addr, const void *buf, size_t size, Error &error)
1787{
1788 size_t bytes_written = 0;
1789 const uint8_t *bytes = (const uint8_t *)buf;
1790
1791 while (bytes_written < size)
1792 {
1793 const size_t curr_size = size - bytes_written;
1794 const size_t curr_bytes_written = DoWriteMemory (addr + bytes_written,
1795 bytes + bytes_written,
1796 curr_size,
1797 error);
1798 bytes_written += curr_bytes_written;
1799 if (curr_bytes_written == curr_size || curr_bytes_written == 0)
1800 break;
1801 }
1802 return bytes_written;
1803}
1804
1805size_t
1806Process::WriteMemory (addr_t addr, const void *buf, size_t size, Error &error)
1807{
Greg Clayton58be07b2011-01-07 06:08:19 +00001808#if defined (ENABLE_MEMORY_CACHING)
1809 m_memory_cache.Flush (addr, size);
1810#endif
1811
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001812 if (buf == NULL || size == 0)
1813 return 0;
Jim Ingham78a685a2011-04-16 00:01:13 +00001814
Jim Ingham4b536182011-08-09 02:12:22 +00001815 m_mod_id.BumpMemoryID();
Jim Ingham78a685a2011-04-16 00:01:13 +00001816
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001817 // We need to write any data that would go where any current software traps
1818 // (enabled software breakpoints) any software traps (breakpoints) that we
1819 // may have placed in our tasks memory.
1820
1821 BreakpointSiteList::collection::const_iterator iter = m_breakpoint_site_list.GetMap()->lower_bound (addr);
1822 BreakpointSiteList::collection::const_iterator end = m_breakpoint_site_list.GetMap()->end();
1823
1824 if (iter == end || iter->second->GetLoadAddress() > addr + size)
Greg Claytonb4aaf2e2011-05-16 02:35:02 +00001825 return WriteMemoryPrivate (addr, buf, size, error);
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001826
1827 BreakpointSiteList::collection::const_iterator pos;
1828 size_t bytes_written = 0;
Greg Claytonc982c762010-07-09 20:39:50 +00001829 addr_t intersect_addr = 0;
1830 size_t intersect_size = 0;
1831 size_t opcode_offset = 0;
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001832 const uint8_t *ubuf = (const uint8_t *)buf;
1833
1834 for (pos = iter; pos != end; ++pos)
1835 {
1836 BreakpointSiteSP bp;
1837 bp = pos->second;
1838
1839 assert(bp->IntersectsRange(addr, size, &intersect_addr, &intersect_size, &opcode_offset));
1840 assert(addr <= intersect_addr && intersect_addr < addr + size);
1841 assert(addr < intersect_addr + intersect_size && intersect_addr + intersect_size <= addr + size);
1842 assert(opcode_offset + intersect_size <= bp->GetByteSize());
1843
1844 // Check for bytes before this breakpoint
1845 const addr_t curr_addr = addr + bytes_written;
1846 if (intersect_addr > curr_addr)
1847 {
1848 // There are some bytes before this breakpoint that we need to
1849 // just write to memory
1850 size_t curr_size = intersect_addr - curr_addr;
1851 size_t curr_bytes_written = WriteMemoryPrivate (curr_addr,
1852 ubuf + bytes_written,
1853 curr_size,
1854 error);
1855 bytes_written += curr_bytes_written;
1856 if (curr_bytes_written != curr_size)
1857 {
1858 // We weren't able to write all of the requested bytes, we
1859 // are done looping and will return the number of bytes that
1860 // we have written so far.
1861 break;
1862 }
1863 }
1864
1865 // Now write any bytes that would cover up any software breakpoints
1866 // directly into the breakpoint opcode buffer
1867 ::memcpy(bp->GetSavedOpcodeBytes() + opcode_offset, ubuf + bytes_written, intersect_size);
1868 bytes_written += intersect_size;
1869 }
1870
1871 // Write any remaining bytes after the last breakpoint if we have any left
1872 if (bytes_written < size)
1873 bytes_written += WriteMemoryPrivate (addr + bytes_written,
1874 ubuf + bytes_written,
1875 size - bytes_written,
1876 error);
Jim Ingham78a685a2011-04-16 00:01:13 +00001877
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001878 return bytes_written;
1879}
Greg Claytonf3ef3d22011-05-22 22:46:53 +00001880
1881size_t
1882Process::WriteScalarToMemory (addr_t addr, const Scalar &scalar, uint32_t byte_size, Error &error)
1883{
1884 if (byte_size == UINT32_MAX)
1885 byte_size = scalar.GetByteSize();
1886 if (byte_size > 0)
1887 {
1888 uint8_t buf[32];
1889 const size_t mem_size = scalar.GetAsMemoryData (buf, byte_size, GetByteOrder(), error);
1890 if (mem_size > 0)
1891 return WriteMemory(addr, buf, mem_size, error);
1892 else
1893 error.SetErrorString ("failed to get scalar as memory data");
1894 }
1895 else
1896 {
1897 error.SetErrorString ("invalid scalar value");
1898 }
1899 return 0;
1900}
1901
1902size_t
1903Process::ReadScalarIntegerFromMemory (addr_t addr,
1904 uint32_t byte_size,
1905 bool is_signed,
1906 Scalar &scalar,
1907 Error &error)
1908{
1909 uint64_t uval;
1910
1911 if (byte_size <= sizeof(uval))
1912 {
1913 size_t bytes_read = ReadMemory (addr, &uval, byte_size, error);
1914 if (bytes_read == byte_size)
1915 {
1916 DataExtractor data (&uval, sizeof(uval), GetByteOrder(), GetAddressByteSize());
1917 uint32_t offset = 0;
1918 if (byte_size <= 4)
1919 scalar = data.GetMaxU32 (&offset, byte_size);
1920 else
1921 scalar = data.GetMaxU64 (&offset, byte_size);
1922
1923 if (is_signed)
1924 scalar.SignExtend(byte_size * 8);
1925 return bytes_read;
1926 }
1927 }
1928 else
1929 {
1930 error.SetErrorStringWithFormat ("byte size of %u is too large for integer scalar type", byte_size);
1931 }
1932 return 0;
1933}
1934
Greg Claytond495c532011-05-17 03:37:42 +00001935#define USE_ALLOCATE_MEMORY_CACHE 1
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001936addr_t
1937Process::AllocateMemory(size_t size, uint32_t permissions, Error &error)
1938{
Jim Inghamf72ce3a2011-06-20 17:32:44 +00001939 if (GetPrivateState() != eStateStopped)
1940 return LLDB_INVALID_ADDRESS;
1941
Greg Claytond495c532011-05-17 03:37:42 +00001942#if defined (USE_ALLOCATE_MEMORY_CACHE)
1943 return m_allocated_memory_cache.AllocateMemory(size, permissions, error);
1944#else
Greg Claytonb2daec92011-01-23 19:58:49 +00001945 addr_t allocated_addr = DoAllocateMemory (size, permissions, error);
1946 LogSP log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_PROCESS));
1947 if (log)
Jim Ingham4b536182011-08-09 02:12:22 +00001948 log->Printf("Process::AllocateMemory(size=%4zu, permissions=%s) => 0x%16.16llx (m_stop_id = %u m_memory_id = %u)",
Greg Claytonb2daec92011-01-23 19:58:49 +00001949 size,
Greg Claytond495c532011-05-17 03:37:42 +00001950 GetPermissionsAsCString (permissions),
Greg Claytonb2daec92011-01-23 19:58:49 +00001951 (uint64_t)allocated_addr,
Jim Ingham4b536182011-08-09 02:12:22 +00001952 m_mod_id.GetStopID(),
1953 m_mod_id.GetMemoryID());
Greg Claytonb2daec92011-01-23 19:58:49 +00001954 return allocated_addr;
Greg Claytond495c532011-05-17 03:37:42 +00001955#endif
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001956}
1957
1958Error
1959Process::DeallocateMemory (addr_t ptr)
1960{
Greg Claytond495c532011-05-17 03:37:42 +00001961 Error error;
1962#if defined (USE_ALLOCATE_MEMORY_CACHE)
1963 if (!m_allocated_memory_cache.DeallocateMemory(ptr))
1964 {
1965 error.SetErrorStringWithFormat ("deallocation of memory at 0x%llx failed.", (uint64_t)ptr);
1966 }
1967#else
1968 error = DoDeallocateMemory (ptr);
Greg Claytonb2daec92011-01-23 19:58:49 +00001969
1970 LogSP log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_PROCESS));
1971 if (log)
Jim Ingham4b536182011-08-09 02:12:22 +00001972 log->Printf("Process::DeallocateMemory(addr=0x%16.16llx) => err = %s (m_stop_id = %u, m_memory_id = %u)",
Greg Claytonb2daec92011-01-23 19:58:49 +00001973 ptr,
1974 error.AsCString("SUCCESS"),
Jim Ingham4b536182011-08-09 02:12:22 +00001975 m_mod_id.GetStopID(),
1976 m_mod_id.GetMemoryID());
Greg Claytond495c532011-05-17 03:37:42 +00001977#endif
Greg Claytonb2daec92011-01-23 19:58:49 +00001978 return error;
Chris Lattner30fdc8d2010-06-08 16:52:24 +00001979}
1980
1981
1982Error
1983Process::EnableWatchpoint (WatchpointLocation *watchpoint)
1984{
1985 Error error;
1986 error.SetErrorString("watchpoints are not supported");
1987 return error;
1988}
1989
1990Error
1991Process::DisableWatchpoint (WatchpointLocation *watchpoint)
1992{
1993 Error error;
1994 error.SetErrorString("watchpoints are not supported");
1995 return error;
1996}
1997
1998StateType
1999Process::WaitForProcessStopPrivate (const TimeValue *timeout, EventSP &event_sp)
2000{
2001 StateType state;
2002 // Now wait for the process to launch and return control to us, and then
2003 // call DidLaunch:
2004 while (1)
2005 {
Greg Clayton6779606a2011-01-22 23:43:18 +00002006 event_sp.reset();
2007 state = WaitForStateChangedEventsPrivate (timeout, event_sp);
2008
2009 if (StateIsStoppedState(state))
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002010 break;
Greg Clayton6779606a2011-01-22 23:43:18 +00002011
2012 // If state is invalid, then we timed out
2013 if (state == eStateInvalid)
2014 break;
2015
2016 if (event_sp)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002017 HandlePrivateEvent (event_sp);
2018 }
2019 return state;
2020}
2021
2022Error
2023Process::Launch
2024(
2025 char const *argv[],
2026 char const *envp[],
Greg Claytonf681b942010-08-31 18:35:14 +00002027 uint32_t launch_flags,
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002028 const char *stdin_path,
2029 const char *stdout_path,
Greg Claytonbd82a5d2011-01-23 05:56:20 +00002030 const char *stderr_path,
2031 const char *working_directory
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002032)
2033{
2034 Error error;
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002035 m_abi_sp.reset();
Greg Clayton93d3c8332011-02-16 04:46:07 +00002036 m_dyld_ap.reset();
Greg Clayton56d9a1b2011-08-22 02:49:39 +00002037 m_os_ap.reset();
Caroline Ticeef5c6d02010-11-16 05:07:41 +00002038 m_process_input_reader.reset();
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002039
Greg Claytonaa149cb2011-08-11 02:48:45 +00002040 Module *exe_module = m_target.GetExecutableModulePointer();
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002041 if (exe_module)
2042 {
Greg Clayton2289fa42011-04-30 01:09:13 +00002043 char local_exec_file_path[PATH_MAX];
2044 char platform_exec_file_path[PATH_MAX];
2045 exe_module->GetFileSpec().GetPath(local_exec_file_path, sizeof(local_exec_file_path));
2046 exe_module->GetPlatformFileSpec().GetPath(platform_exec_file_path, sizeof(platform_exec_file_path));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002047 if (exe_module->GetFileSpec().Exists())
2048 {
Greg Clayton71337622011-02-24 22:24:29 +00002049 if (PrivateStateThreadIsValid ())
2050 PausePrivateStateThread ();
2051
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002052 error = WillLaunch (exe_module);
2053 if (error.Success())
2054 {
Greg Clayton05faeb72010-10-07 04:19:01 +00002055 SetPublicState (eStateLaunching);
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002056 // The args coming in should not contain the application name, the
2057 // lldb_private::Process class will add this in case the executable
2058 // gets resolved to a different file than was given on the command
2059 // line (like when an applicaiton bundle is specified and will
2060 // resolve to the contained exectuable file, or the file given was
2061 // a symlink or other file system link that resolves to a different
2062 // file).
2063
2064 // Get the resolved exectuable path
2065
2066 // Make a new argument vector
2067 std::vector<const char *> exec_path_plus_argv;
2068 // Append the resolved executable path
Greg Clayton2289fa42011-04-30 01:09:13 +00002069 exec_path_plus_argv.push_back (platform_exec_file_path);
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002070
2071 // Push all args if there are any
2072 if (argv)
2073 {
2074 for (int i = 0; argv[i]; ++i)
2075 exec_path_plus_argv.push_back(argv[i]);
2076 }
2077
2078 // Push a NULL to terminate the args.
2079 exec_path_plus_argv.push_back(NULL);
2080
2081 // Now launch using these arguments.
Greg Clayton471b31c2010-07-20 22:52:08 +00002082 error = DoLaunch (exe_module,
2083 exec_path_plus_argv.empty() ? NULL : &exec_path_plus_argv.front(),
2084 envp,
Greg Claytonf681b942010-08-31 18:35:14 +00002085 launch_flags,
Greg Clayton471b31c2010-07-20 22:52:08 +00002086 stdin_path,
2087 stdout_path,
Greg Claytonbd82a5d2011-01-23 05:56:20 +00002088 stderr_path,
2089 working_directory);
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002090
2091 if (error.Fail())
2092 {
2093 if (GetID() != LLDB_INVALID_PROCESS_ID)
2094 {
2095 SetID (LLDB_INVALID_PROCESS_ID);
2096 const char *error_string = error.AsCString();
2097 if (error_string == NULL)
2098 error_string = "launch failed";
2099 SetExitStatus (-1, error_string);
2100 }
2101 }
2102 else
2103 {
2104 EventSP event_sp;
Greg Clayton1a38ea72011-06-22 01:42:17 +00002105 TimeValue timeout_time;
2106 timeout_time = TimeValue::Now();
2107 timeout_time.OffsetWithSeconds(10);
2108 StateType state = WaitForProcessStopPrivate(&timeout_time, event_sp);
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002109
Greg Clayton1a38ea72011-06-22 01:42:17 +00002110 if (state == eStateInvalid || event_sp.get() == NULL)
2111 {
2112 // We were able to launch the process, but we failed to
2113 // catch the initial stop.
2114 SetExitStatus (0, "failed to catch stop after launch");
2115 Destroy();
2116 }
2117 else if (state == eStateStopped || state == eStateCrashed)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002118 {
Greg Clayton93d3c8332011-02-16 04:46:07 +00002119
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002120 DidLaunch ();
2121
Greg Clayton56d9a1b2011-08-22 02:49:39 +00002122 m_dyld_ap.reset (DynamicLoader::FindPlugin (this, NULL));
Greg Clayton93d3c8332011-02-16 04:46:07 +00002123 if (m_dyld_ap.get())
2124 m_dyld_ap->DidLaunch();
2125
Greg Clayton56d9a1b2011-08-22 02:49:39 +00002126 m_os_ap.reset (OperatingSystem::FindPlugin (this, NULL));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002127 // This delays passing the stopped event to listeners till DidLaunch gets
2128 // a chance to complete...
2129 HandlePrivateEvent (event_sp);
Greg Clayton71337622011-02-24 22:24:29 +00002130
2131 if (PrivateStateThreadIsValid ())
2132 ResumePrivateStateThread ();
2133 else
2134 StartPrivateStateThread ();
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002135 }
2136 else if (state == eStateExited)
2137 {
2138 // We exited while trying to launch somehow. Don't call DidLaunch as that's
2139 // not likely to work, and return an invalid pid.
2140 HandlePrivateEvent (event_sp);
2141 }
2142 }
2143 }
2144 }
2145 else
2146 {
Greg Clayton2289fa42011-04-30 01:09:13 +00002147 error.SetErrorStringWithFormat("File doesn't exist: '%s'.\n", local_exec_file_path);
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002148 }
2149 }
2150 return error;
2151}
2152
Jim Inghambb3a2832011-01-29 01:49:25 +00002153Process::NextEventAction::EventActionResult
2154Process::AttachCompletionHandler::PerformAction (lldb::EventSP &event_sp)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002155{
Jim Inghambb3a2832011-01-29 01:49:25 +00002156 StateType state = ProcessEventData::GetStateFromEvent (event_sp.get());
2157 switch (state)
Greg Clayton19388cf2010-10-18 01:45:30 +00002158 {
Greg Clayton513c26c2011-01-29 07:10:55 +00002159 case eStateRunning:
Greg Clayton71337622011-02-24 22:24:29 +00002160 case eStateConnected:
Greg Clayton513c26c2011-01-29 07:10:55 +00002161 return eEventActionRetry;
2162
2163 case eStateStopped:
2164 case eStateCrashed:
Jim Ingham5aee1622010-08-09 23:31:02 +00002165 {
Greg Clayton513c26c2011-01-29 07:10:55 +00002166 // During attach, prior to sending the eStateStopped event,
2167 // lldb_private::Process subclasses must set the process must set
2168 // the new process ID.
2169 assert (m_process->GetID() != LLDB_INVALID_PROCESS_ID);
Greg Clayton93d3c8332011-02-16 04:46:07 +00002170 m_process->CompleteAttach ();
Greg Clayton513c26c2011-01-29 07:10:55 +00002171 return eEventActionSuccess;
Jim Ingham5aee1622010-08-09 23:31:02 +00002172 }
Greg Clayton513c26c2011-01-29 07:10:55 +00002173
2174
2175 break;
2176 default:
2177 case eStateExited:
2178 case eStateInvalid:
2179 m_exit_string.assign ("No valid Process");
2180 return eEventActionExit;
2181 break;
Jim Inghambb3a2832011-01-29 01:49:25 +00002182 }
2183}
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002184
Jim Inghambb3a2832011-01-29 01:49:25 +00002185Process::NextEventAction::EventActionResult
2186Process::AttachCompletionHandler::HandleBeingInterrupted()
2187{
2188 return eEventActionSuccess;
2189}
2190
2191const char *
2192Process::AttachCompletionHandler::GetExitString ()
2193{
2194 return m_exit_string.c_str();
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002195}
2196
2197Error
2198Process::Attach (lldb::pid_t attach_pid)
2199{
2200
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002201 m_abi_sp.reset();
Caroline Ticeef5c6d02010-11-16 05:07:41 +00002202 m_process_input_reader.reset();
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002203
Jim Ingham5aee1622010-08-09 23:31:02 +00002204 // Find the process and its architecture. Make sure it matches the architecture
2205 // of the current Target, and if not adjust it.
2206
Greg Clayton8b82f082011-04-12 05:54:46 +00002207 ProcessInstanceInfo process_info;
Greg Claytonded470d2011-03-19 01:12:21 +00002208 PlatformSP platform_sp (m_target.GetDebugger().GetPlatformList().GetSelectedPlatform ());
Greg Claytone996fd32011-03-08 22:40:15 +00002209 if (platform_sp)
Jim Ingham5aee1622010-08-09 23:31:02 +00002210 {
Greg Claytone996fd32011-03-08 22:40:15 +00002211 if (platform_sp->GetProcessInfo (attach_pid, process_info))
2212 {
2213 const ArchSpec &process_arch = process_info.GetArchitecture();
2214 if (process_arch.IsValid())
2215 GetTarget().SetArchitecture(process_arch);
2216 }
Jim Ingham5aee1622010-08-09 23:31:02 +00002217 }
2218
Greg Clayton93d3c8332011-02-16 04:46:07 +00002219 m_dyld_ap.reset();
Greg Clayton56d9a1b2011-08-22 02:49:39 +00002220 m_os_ap.reset();
Greg Clayton93d3c8332011-02-16 04:46:07 +00002221
Greg Claytonc982c762010-07-09 20:39:50 +00002222 Error error (WillAttachToProcessWithID(attach_pid));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002223 if (error.Success())
2224 {
Greg Clayton05faeb72010-10-07 04:19:01 +00002225 SetPublicState (eStateAttaching);
2226
Greg Claytonc982c762010-07-09 20:39:50 +00002227 error = DoAttachToProcessWithID (attach_pid);
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002228 if (error.Success())
2229 {
Jim Inghambb3a2832011-01-29 01:49:25 +00002230 SetNextEventAction(new Process::AttachCompletionHandler(this));
2231 StartPrivateStateThread();
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002232 }
2233 else
2234 {
2235 if (GetID() != LLDB_INVALID_PROCESS_ID)
2236 {
2237 SetID (LLDB_INVALID_PROCESS_ID);
2238 const char *error_string = error.AsCString();
2239 if (error_string == NULL)
2240 error_string = "attach failed";
2241
2242 SetExitStatus(-1, error_string);
2243 }
2244 }
2245 }
2246 return error;
2247}
2248
2249Error
2250Process::Attach (const char *process_name, bool wait_for_launch)
2251{
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002252 m_abi_sp.reset();
Caroline Ticeef5c6d02010-11-16 05:07:41 +00002253 m_process_input_reader.reset();
Jim Ingham5aee1622010-08-09 23:31:02 +00002254
2255 // Find the process and its architecture. Make sure it matches the architecture
2256 // of the current Target, and if not adjust it.
Greg Claytone996fd32011-03-08 22:40:15 +00002257 Error error;
Jim Ingham5aee1622010-08-09 23:31:02 +00002258
Jim Ingham2ecb7422010-08-17 21:54:19 +00002259 if (!wait_for_launch)
Jim Ingham5aee1622010-08-09 23:31:02 +00002260 {
Greg Clayton8b82f082011-04-12 05:54:46 +00002261 ProcessInstanceInfoList process_infos;
Greg Claytonded470d2011-03-19 01:12:21 +00002262 PlatformSP platform_sp (m_target.GetDebugger().GetPlatformList().GetSelectedPlatform ());
Greg Claytone996fd32011-03-08 22:40:15 +00002263 if (platform_sp)
Jim Ingham2ecb7422010-08-17 21:54:19 +00002264 {
Greg Clayton8b82f082011-04-12 05:54:46 +00002265 ProcessInstanceInfoMatch match_info;
Greg Clayton32e0a752011-03-30 18:16:51 +00002266 match_info.GetProcessInfo().SetName(process_name);
2267 match_info.SetNameMatchType (eNameMatchEquals);
2268 platform_sp->FindProcesses (match_info, process_infos);
Greg Claytone996fd32011-03-08 22:40:15 +00002269 if (process_infos.GetSize() > 1)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002270 {
Greg Claytone996fd32011-03-08 22:40:15 +00002271 error.SetErrorStringWithFormat ("More than one process named %s\n", process_name);
2272 }
2273 else if (process_infos.GetSize() == 0)
2274 {
2275 error.SetErrorStringWithFormat ("Could not find a process named %s\n", process_name);
2276 }
2277 else
2278 {
Greg Clayton8b82f082011-04-12 05:54:46 +00002279 ProcessInstanceInfo process_info;
Greg Claytone996fd32011-03-08 22:40:15 +00002280 if (process_infos.GetInfoAtIndex (0, process_info))
2281 {
2282 const ArchSpec &process_arch = process_info.GetArchitecture();
2283 if (process_arch.IsValid() && process_arch != GetTarget().GetArchitecture())
2284 {
2285 // Set the architecture on the target.
2286 GetTarget().SetArchitecture (process_arch);
2287 }
2288 }
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002289 }
2290 }
2291 else
Greg Claytone996fd32011-03-08 22:40:15 +00002292 {
2293 error.SetErrorString ("Invalid platform");
2294 }
2295 }
2296
2297 if (error.Success())
2298 {
2299 m_dyld_ap.reset();
Greg Clayton56d9a1b2011-08-22 02:49:39 +00002300 m_os_ap.reset();
Greg Claytone996fd32011-03-08 22:40:15 +00002301
2302 error = WillAttachToProcessWithName(process_name, wait_for_launch);
2303 if (error.Success())
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002304 {
Greg Claytone996fd32011-03-08 22:40:15 +00002305 SetPublicState (eStateAttaching);
2306 error = DoAttachToProcessWithName (process_name, wait_for_launch);
2307 if (error.Fail())
2308 {
2309 if (GetID() != LLDB_INVALID_PROCESS_ID)
2310 {
2311 SetID (LLDB_INVALID_PROCESS_ID);
2312 const char *error_string = error.AsCString();
2313 if (error_string == NULL)
2314 error_string = "attach failed";
2315
2316 SetExitStatus(-1, error_string);
2317 }
2318 }
2319 else
2320 {
2321 SetNextEventAction(new Process::AttachCompletionHandler(this));
2322 StartPrivateStateThread();
2323 }
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002324 }
2325 }
2326 return error;
2327}
2328
Greg Clayton93d3c8332011-02-16 04:46:07 +00002329void
2330Process::CompleteAttach ()
2331{
2332 // Let the process subclass figure out at much as it can about the process
2333 // before we go looking for a dynamic loader plug-in.
2334 DidAttach();
2335
2336 // We have complete the attach, now it is time to find the dynamic loader
2337 // plug-in
Greg Clayton7a5388b2011-03-20 04:57:14 +00002338 m_dyld_ap.reset (DynamicLoader::FindPlugin(this, NULL));
Greg Clayton93d3c8332011-02-16 04:46:07 +00002339 if (m_dyld_ap.get())
2340 m_dyld_ap->DidAttach();
2341
Greg Clayton56d9a1b2011-08-22 02:49:39 +00002342 m_os_ap.reset (OperatingSystem::FindPlugin (this, NULL));
Greg Clayton93d3c8332011-02-16 04:46:07 +00002343 // Figure out which one is the executable, and set that in our target:
2344 ModuleList &modules = m_target.GetImages();
2345
2346 size_t num_modules = modules.GetSize();
2347 for (int i = 0; i < num_modules; i++)
2348 {
2349 ModuleSP module_sp (modules.GetModuleAtIndex(i));
Greg Clayton8b82f082011-04-12 05:54:46 +00002350 if (module_sp && module_sp->IsExecutable())
Greg Clayton93d3c8332011-02-16 04:46:07 +00002351 {
Greg Claytonaa149cb2011-08-11 02:48:45 +00002352 if (m_target.GetExecutableModulePointer() != module_sp.get())
Greg Clayton93d3c8332011-02-16 04:46:07 +00002353 m_target.SetExecutableModule (module_sp, false);
2354 break;
2355 }
2356 }
2357}
2358
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002359Error
Greg Claytonb766a732011-02-04 01:58:07 +00002360Process::ConnectRemote (const char *remote_url)
2361{
Greg Claytonb766a732011-02-04 01:58:07 +00002362 m_abi_sp.reset();
2363 m_process_input_reader.reset();
2364
2365 // Find the process and its architecture. Make sure it matches the architecture
2366 // of the current Target, and if not adjust it.
2367
2368 Error error (DoConnectRemote (remote_url));
2369 if (error.Success())
2370 {
Greg Clayton71337622011-02-24 22:24:29 +00002371 if (GetID() != LLDB_INVALID_PROCESS_ID)
2372 {
Greg Clayton32e0a752011-03-30 18:16:51 +00002373 EventSP event_sp;
2374 StateType state = WaitForProcessStopPrivate(NULL, event_sp);
2375
2376 if (state == eStateStopped || state == eStateCrashed)
2377 {
2378 // If we attached and actually have a process on the other end, then
2379 // this ended up being the equivalent of an attach.
2380 CompleteAttach ();
2381
2382 // This delays passing the stopped event to listeners till
2383 // CompleteAttach gets a chance to complete...
2384 HandlePrivateEvent (event_sp);
2385
2386 }
Greg Clayton71337622011-02-24 22:24:29 +00002387 }
Greg Clayton32e0a752011-03-30 18:16:51 +00002388
2389 if (PrivateStateThreadIsValid ())
2390 ResumePrivateStateThread ();
2391 else
2392 StartPrivateStateThread ();
Greg Claytonb766a732011-02-04 01:58:07 +00002393 }
2394 return error;
2395}
2396
2397
2398Error
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002399Process::Resume ()
2400{
Greg Clayton2d4edfb2010-11-06 01:53:30 +00002401 LogSP log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_PROCESS));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002402 if (log)
Jim Ingham444586b2011-01-24 06:34:17 +00002403 log->Printf("Process::Resume() m_stop_id = %u, public state: %s private state: %s",
Jim Ingham4b536182011-08-09 02:12:22 +00002404 m_mod_id.GetStopID(),
Jim Ingham444586b2011-01-24 06:34:17 +00002405 StateAsCString(m_public_state.GetValue()),
2406 StateAsCString(m_private_state.GetValue()));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002407
2408 Error error (WillResume());
2409 // Tell the process it is about to resume before the thread list
2410 if (error.Success())
2411 {
Johnny Chenc4221e42010-12-02 20:53:05 +00002412 // Now let the thread list know we are about to resume so it
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002413 // can let all of our threads know that they are about to be
2414 // resumed. Threads will each be called with
2415 // Thread::WillResume(StateType) where StateType contains the state
2416 // that they are supposed to have when the process is resumed
2417 // (suspended/running/stepping). Threads should also check
2418 // their resume signal in lldb::Thread::GetResumeSignal()
2419 // to see if they are suppoed to start back up with a signal.
2420 if (m_thread_list.WillResume())
2421 {
2422 error = DoResume();
2423 if (error.Success())
2424 {
2425 DidResume();
2426 m_thread_list.DidResume();
Jim Ingham444586b2011-01-24 06:34:17 +00002427 if (log)
2428 log->Printf ("Process thinks the process has resumed.");
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002429 }
2430 }
2431 else
2432 {
Jim Ingham444586b2011-01-24 06:34:17 +00002433 error.SetErrorStringWithFormat("Process::WillResume() thread list returned false after WillResume");
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002434 }
2435 }
Jim Ingham444586b2011-01-24 06:34:17 +00002436 else if (log)
2437 log->Printf ("Process::WillResume() got an error \"%s\".", error.AsCString("<unknown error>"));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002438 return error;
2439}
2440
2441Error
2442Process::Halt ()
2443{
Jim Inghambb3a2832011-01-29 01:49:25 +00002444 // Pause our private state thread so we can ensure no one else eats
2445 // the stop event out from under us.
Jim Ingham0f16e732011-02-08 05:20:59 +00002446 Listener halt_listener ("lldb.process.halt_listener");
2447 HijackPrivateProcessEvents(&halt_listener);
Greg Clayton3af9ea52010-11-18 05:57:03 +00002448
Jim Inghambb3a2832011-01-29 01:49:25 +00002449 EventSP event_sp;
Greg Clayton513c26c2011-01-29 07:10:55 +00002450 Error error (WillHalt());
Jim Inghambb3a2832011-01-29 01:49:25 +00002451
Greg Clayton513c26c2011-01-29 07:10:55 +00002452 if (error.Success())
Jim Inghambb3a2832011-01-29 01:49:25 +00002453 {
Jim Inghambb3a2832011-01-29 01:49:25 +00002454
Greg Clayton513c26c2011-01-29 07:10:55 +00002455 bool caused_stop = false;
2456
2457 // Ask the process subclass to actually halt our process
2458 error = DoHalt(caused_stop);
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002459 if (error.Success())
Jim Ingham0d8bcc72010-11-17 02:32:00 +00002460 {
Greg Clayton513c26c2011-01-29 07:10:55 +00002461 if (m_public_state.GetValue() == eStateAttaching)
2462 {
2463 SetExitStatus(SIGKILL, "Cancelled async attach.");
2464 Destroy ();
2465 }
2466 else
Jim Ingham0d8bcc72010-11-17 02:32:00 +00002467 {
Jim Inghambb3a2832011-01-29 01:49:25 +00002468 // If "caused_stop" is true, then DoHalt stopped the process. If
2469 // "caused_stop" is false, the process was already stopped.
2470 // If the DoHalt caused the process to stop, then we want to catch
2471 // this event and set the interrupted bool to true before we pass
2472 // this along so clients know that the process was interrupted by
2473 // a halt command.
2474 if (caused_stop)
Greg Clayton3af9ea52010-11-18 05:57:03 +00002475 {
Jim Ingham0f16e732011-02-08 05:20:59 +00002476 // Wait for 1 second for the process to stop.
Jim Inghambb3a2832011-01-29 01:49:25 +00002477 TimeValue timeout_time;
2478 timeout_time = TimeValue::Now();
2479 timeout_time.OffsetWithSeconds(1);
Jim Ingham0f16e732011-02-08 05:20:59 +00002480 bool got_event = halt_listener.WaitForEvent (&timeout_time, event_sp);
2481 StateType state = ProcessEventData::GetStateFromEvent(event_sp.get());
Jim Inghambb3a2832011-01-29 01:49:25 +00002482
Jim Ingham0f16e732011-02-08 05:20:59 +00002483 if (!got_event || state == eStateInvalid)
Greg Clayton3af9ea52010-11-18 05:57:03 +00002484 {
Jim Inghambb3a2832011-01-29 01:49:25 +00002485 // We timeout out and didn't get a stop event...
Jim Ingham0f16e732011-02-08 05:20:59 +00002486 error.SetErrorStringWithFormat ("Halt timed out. State = %s", StateAsCString(GetState()));
Greg Clayton3af9ea52010-11-18 05:57:03 +00002487 }
2488 else
2489 {
Jim Inghambb3a2832011-01-29 01:49:25 +00002490 if (StateIsStoppedState (state))
2491 {
2492 // We caused the process to interrupt itself, so mark this
2493 // as such in the stop event so clients can tell an interrupted
2494 // process from a natural stop
2495 ProcessEventData::SetInterruptedInEvent (event_sp.get(), true);
2496 }
2497 else
2498 {
2499 LogSP log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_PROCESS));
2500 if (log)
2501 log->Printf("Process::Halt() failed to stop, state is: %s", StateAsCString(state));
2502 error.SetErrorString ("Did not get stopped event after halt.");
2503 }
Greg Clayton3af9ea52010-11-18 05:57:03 +00002504 }
2505 }
Jim Inghambb3a2832011-01-29 01:49:25 +00002506 DidHalt();
Jim Ingham0d8bcc72010-11-17 02:32:00 +00002507 }
2508 }
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002509 }
Jim Inghambb3a2832011-01-29 01:49:25 +00002510 // Resume our private state thread before we post the event (if any)
Jim Ingham0f16e732011-02-08 05:20:59 +00002511 RestorePrivateProcessEvents();
Jim Inghambb3a2832011-01-29 01:49:25 +00002512
2513 // Post any event we might have consumed. If all goes well, we will have
2514 // stopped the process, intercepted the event and set the interrupted
2515 // bool in the event. Post it to the private event queue and that will end up
2516 // correctly setting the state.
2517 if (event_sp)
2518 m_private_state_broadcaster.BroadcastEvent(event_sp);
2519
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002520 return error;
2521}
2522
2523Error
2524Process::Detach ()
2525{
2526 Error error (WillDetach());
2527
2528 if (error.Success())
2529 {
2530 DisableAllBreakpointSites();
2531 error = DoDetach();
2532 if (error.Success())
2533 {
2534 DidDetach();
2535 StopPrivateStateThread();
2536 }
2537 }
2538 return error;
2539}
2540
2541Error
2542Process::Destroy ()
2543{
2544 Error error (WillDestroy());
2545 if (error.Success())
2546 {
2547 DisableAllBreakpointSites();
2548 error = DoDestroy();
2549 if (error.Success())
2550 {
2551 DidDestroy();
2552 StopPrivateStateThread();
2553 }
Caroline Ticeef5c6d02010-11-16 05:07:41 +00002554 m_stdio_communication.StopReadThread();
2555 m_stdio_communication.Disconnect();
2556 if (m_process_input_reader && m_process_input_reader->IsActive())
2557 m_target.GetDebugger().PopInputReader (m_process_input_reader);
2558 if (m_process_input_reader)
2559 m_process_input_reader.reset();
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002560 }
2561 return error;
2562}
2563
2564Error
2565Process::Signal (int signal)
2566{
2567 Error error (WillSignal());
2568 if (error.Success())
2569 {
2570 error = DoSignal(signal);
2571 if (error.Success())
2572 DidSignal();
2573 }
2574 return error;
2575}
2576
Greg Clayton514487e2011-02-15 21:59:32 +00002577lldb::ByteOrder
2578Process::GetByteOrder () const
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002579{
Greg Clayton514487e2011-02-15 21:59:32 +00002580 return m_target.GetArchitecture().GetByteOrder();
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002581}
2582
2583uint32_t
Greg Clayton514487e2011-02-15 21:59:32 +00002584Process::GetAddressByteSize () const
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002585{
Greg Clayton514487e2011-02-15 21:59:32 +00002586 return m_target.GetArchitecture().GetAddressByteSize();
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002587}
2588
Greg Clayton514487e2011-02-15 21:59:32 +00002589
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002590bool
2591Process::ShouldBroadcastEvent (Event *event_ptr)
2592{
2593 const StateType state = Process::ProcessEventData::GetStateFromEvent (event_ptr);
2594 bool return_value = true;
Greg Clayton2d4edfb2010-11-06 01:53:30 +00002595 LogSP log(lldb_private::GetLogIfAllCategoriesSet(LIBLLDB_LOG_EVENTS));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002596
2597 switch (state)
2598 {
Greg Claytonb766a732011-02-04 01:58:07 +00002599 case eStateConnected:
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002600 case eStateAttaching:
2601 case eStateLaunching:
2602 case eStateDetached:
2603 case eStateExited:
2604 case eStateUnloaded:
2605 // These events indicate changes in the state of the debugging session, always report them.
2606 return_value = true;
2607 break;
2608 case eStateInvalid:
2609 // We stopped for no apparent reason, don't report it.
2610 return_value = false;
2611 break;
2612 case eStateRunning:
2613 case eStateStepping:
2614 // If we've started the target running, we handle the cases where we
2615 // are already running and where there is a transition from stopped to
2616 // running differently.
2617 // running -> running: Automatically suppress extra running events
2618 // stopped -> running: Report except when there is one or more no votes
2619 // and no yes votes.
2620 SynchronouslyNotifyStateChanged (state);
2621 switch (m_public_state.GetValue())
2622 {
2623 case eStateRunning:
2624 case eStateStepping:
2625 // We always suppress multiple runnings with no PUBLIC stop in between.
2626 return_value = false;
2627 break;
2628 default:
2629 // TODO: make this work correctly. For now always report
2630 // run if we aren't running so we don't miss any runnning
2631 // events. If I run the lldb/test/thread/a.out file and
2632 // break at main.cpp:58, run and hit the breakpoints on
2633 // multiple threads, then somehow during the stepping over
2634 // of all breakpoints no run gets reported.
2635 return_value = true;
2636
2637 // This is a transition from stop to run.
2638 switch (m_thread_list.ShouldReportRun (event_ptr))
2639 {
2640 case eVoteYes:
2641 case eVoteNoOpinion:
2642 return_value = true;
2643 break;
2644 case eVoteNo:
2645 return_value = false;
2646 break;
2647 }
2648 break;
2649 }
2650 break;
2651 case eStateStopped:
2652 case eStateCrashed:
2653 case eStateSuspended:
2654 {
2655 // We've stopped. First see if we're going to restart the target.
2656 // If we are going to stop, then we always broadcast the event.
2657 // If we aren't going to stop, let the thread plans decide if we're going to report this event.
Jim Inghamb01e7422010-06-19 04:45:32 +00002658 // If no thread has an opinion, we don't report it.
Jim Ingham0d8bcc72010-11-17 02:32:00 +00002659 if (ProcessEventData::GetInterruptedFromEvent (event_ptr))
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002660 {
Greg Clayton3af9ea52010-11-18 05:57:03 +00002661 if (log)
2662 log->Printf ("Process::ShouldBroadcastEvent (%p) stopped due to an interrupt, state: %s", event_ptr, StateAsCString(state));
Jim Ingham0d8bcc72010-11-17 02:32:00 +00002663 return true;
2664 }
2665 else
2666 {
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002667 RefreshStateAfterStop ();
2668
2669 if (m_thread_list.ShouldStop (event_ptr) == false)
2670 {
2671 switch (m_thread_list.ShouldReportStop (event_ptr))
2672 {
2673 case eVoteYes:
2674 Process::ProcessEventData::SetRestartedInEvent (event_ptr, true);
Johnny Chen3c230652010-10-14 00:54:32 +00002675 // Intentional fall-through here.
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002676 case eVoteNoOpinion:
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002677 case eVoteNo:
2678 return_value = false;
2679 break;
2680 }
2681
2682 if (log)
Jim Ingham0d8bcc72010-11-17 02:32:00 +00002683 log->Printf ("Process::ShouldBroadcastEvent (%p) Restarting process from state: %s", event_ptr, StateAsCString(state));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002684 Resume ();
2685 }
2686 else
2687 {
2688 return_value = true;
2689 SynchronouslyNotifyStateChanged (state);
2690 }
2691 }
2692 }
2693 }
2694
2695 if (log)
2696 log->Printf ("Process::ShouldBroadcastEvent (%p) => %s", event_ptr, StateAsCString(state), return_value ? "YES" : "NO");
2697 return return_value;
2698}
2699
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002700
2701bool
2702Process::StartPrivateStateThread ()
2703{
Greg Clayton2d4edfb2010-11-06 01:53:30 +00002704 LogSP log(lldb_private::GetLogIfAllCategoriesSet(LIBLLDB_LOG_EVENTS));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002705
Greg Clayton8b82f082011-04-12 05:54:46 +00002706 bool already_running = PrivateStateThreadIsValid ();
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002707 if (log)
Greg Clayton8b82f082011-04-12 05:54:46 +00002708 log->Printf ("Process::%s()%s ", __FUNCTION__, already_running ? " already running" : " starting private state thread");
2709
2710 if (already_running)
2711 return true;
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002712
2713 // Create a thread that watches our internal state and controls which
2714 // events make it to clients (into the DCProcess event queue).
Greg Clayton3e06bd92011-01-09 21:07:35 +00002715 char thread_name[1024];
2716 snprintf(thread_name, sizeof(thread_name), "<lldb.process.internal-state(pid=%i)>", GetID());
2717 m_private_state_thread = Host::ThreadCreate (thread_name, Process::PrivateStateThread, this, NULL);
Greg Clayton2da6d492011-02-08 01:34:25 +00002718 return IS_VALID_LLDB_HOST_THREAD(m_private_state_thread);
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002719}
2720
2721void
2722Process::PausePrivateStateThread ()
2723{
2724 ControlPrivateStateThread (eBroadcastInternalStateControlPause);
2725}
2726
2727void
2728Process::ResumePrivateStateThread ()
2729{
2730 ControlPrivateStateThread (eBroadcastInternalStateControlResume);
2731}
2732
2733void
2734Process::StopPrivateStateThread ()
2735{
Greg Clayton8b82f082011-04-12 05:54:46 +00002736 if (PrivateStateThreadIsValid ())
2737 ControlPrivateStateThread (eBroadcastInternalStateControlStop);
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002738}
2739
2740void
2741Process::ControlPrivateStateThread (uint32_t signal)
2742{
Greg Clayton2d4edfb2010-11-06 01:53:30 +00002743 LogSP log(lldb_private::GetLogIfAllCategoriesSet(LIBLLDB_LOG_EVENTS));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002744
2745 assert (signal == eBroadcastInternalStateControlStop ||
2746 signal == eBroadcastInternalStateControlPause ||
2747 signal == eBroadcastInternalStateControlResume);
2748
2749 if (log)
Greg Clayton7ecb3a02011-01-22 17:43:17 +00002750 log->Printf ("Process::%s (signal = %d)", __FUNCTION__, signal);
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002751
Greg Clayton7ecb3a02011-01-22 17:43:17 +00002752 // Signal the private state thread. First we should copy this is case the
2753 // thread starts exiting since the private state thread will NULL this out
2754 // when it exits
2755 const lldb::thread_t private_state_thread = m_private_state_thread;
Greg Clayton2da6d492011-02-08 01:34:25 +00002756 if (IS_VALID_LLDB_HOST_THREAD(private_state_thread))
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002757 {
2758 TimeValue timeout_time;
2759 bool timed_out;
2760
2761 m_private_state_control_broadcaster.BroadcastEvent (signal, NULL);
2762
2763 timeout_time = TimeValue::Now();
2764 timeout_time.OffsetWithSeconds(2);
2765 m_private_state_control_wait.WaitForValueEqualTo (true, &timeout_time, &timed_out);
2766 m_private_state_control_wait.SetValue (false, eBroadcastNever);
2767
2768 if (signal == eBroadcastInternalStateControlStop)
2769 {
2770 if (timed_out)
Greg Clayton7ecb3a02011-01-22 17:43:17 +00002771 Host::ThreadCancel (private_state_thread, NULL);
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002772
2773 thread_result_t result = NULL;
Greg Clayton7ecb3a02011-01-22 17:43:17 +00002774 Host::ThreadJoin (private_state_thread, &result, NULL);
Greg Clayton49182ed2010-07-22 18:34:21 +00002775 m_private_state_thread = LLDB_INVALID_HOST_THREAD;
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002776 }
2777 }
2778}
2779
2780void
2781Process::HandlePrivateEvent (EventSP &event_sp)
2782{
Greg Clayton2d4edfb2010-11-06 01:53:30 +00002783 LogSP log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_PROCESS));
Jim Inghambb3a2832011-01-29 01:49:25 +00002784
Greg Clayton414f5d32011-01-25 02:58:48 +00002785 const StateType new_state = Process::ProcessEventData::GetStateFromEvent(event_sp.get());
Jim Inghambb3a2832011-01-29 01:49:25 +00002786
2787 // First check to see if anybody wants a shot at this event:
Jim Ingham754ab982011-01-29 04:05:41 +00002788 if (m_next_event_action_ap.get() != NULL)
Jim Inghambb3a2832011-01-29 01:49:25 +00002789 {
Jim Ingham754ab982011-01-29 04:05:41 +00002790 NextEventAction::EventActionResult action_result = m_next_event_action_ap->PerformAction(event_sp);
Jim Inghambb3a2832011-01-29 01:49:25 +00002791 switch (action_result)
2792 {
2793 case NextEventAction::eEventActionSuccess:
2794 SetNextEventAction(NULL);
2795 break;
2796 case NextEventAction::eEventActionRetry:
2797 break;
2798 case NextEventAction::eEventActionExit:
Jim Ingham2a5fdd42011-01-29 01:57:31 +00002799 // Handle Exiting Here. If we already got an exited event,
2800 // we should just propagate it. Otherwise, swallow this event,
2801 // and set our state to exit so the next event will kill us.
2802 if (new_state != eStateExited)
2803 {
2804 // FIXME: should cons up an exited event, and discard this one.
Jim Ingham754ab982011-01-29 04:05:41 +00002805 SetExitStatus(0, m_next_event_action_ap->GetExitString());
Jim Ingham2a5fdd42011-01-29 01:57:31 +00002806 SetNextEventAction(NULL);
2807 return;
2808 }
2809 SetNextEventAction(NULL);
Jim Inghambb3a2832011-01-29 01:49:25 +00002810 break;
2811 }
2812 }
2813
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002814 // See if we should broadcast this state to external clients?
2815 const bool should_broadcast = ShouldBroadcastEvent (event_sp.get());
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002816
2817 if (should_broadcast)
2818 {
2819 if (log)
2820 {
Greg Clayton414f5d32011-01-25 02:58:48 +00002821 log->Printf ("Process::%s (pid = %i) broadcasting new state %s (old state %s) to %s",
2822 __FUNCTION__,
2823 GetID(),
2824 StateAsCString(new_state),
2825 StateAsCString (GetState ()),
2826 IsHijackedForEvent(eBroadcastBitStateChanged) ? "hijacked" : "public");
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002827 }
Jim Ingham9575d842011-03-11 03:53:59 +00002828 Process::ProcessEventData::SetUpdateStateOnRemoval(event_sp.get());
Greg Clayton414f5d32011-01-25 02:58:48 +00002829 if (StateIsRunningState (new_state))
Caroline Ticeef5c6d02010-11-16 05:07:41 +00002830 PushProcessInputReader ();
2831 else
2832 PopProcessInputReader ();
Jim Ingham9575d842011-03-11 03:53:59 +00002833
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002834 BroadcastEvent (event_sp);
2835 }
2836 else
2837 {
2838 if (log)
2839 {
Greg Clayton414f5d32011-01-25 02:58:48 +00002840 log->Printf ("Process::%s (pid = %i) suppressing state %s (old state %s): should_broadcast == false",
2841 __FUNCTION__,
2842 GetID(),
2843 StateAsCString(new_state),
2844 StateAsCString (GetState ()),
2845 IsHijackedForEvent(eBroadcastBitStateChanged) ? "hijacked" : "public");
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002846 }
2847 }
2848}
2849
2850void *
2851Process::PrivateStateThread (void *arg)
2852{
2853 Process *proc = static_cast<Process*> (arg);
2854 void *result = proc->RunPrivateStateThread ();
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002855 return result;
2856}
2857
2858void *
2859Process::RunPrivateStateThread ()
2860{
2861 bool control_only = false;
2862 m_private_state_control_wait.SetValue (false, eBroadcastNever);
2863
Greg Clayton2d4edfb2010-11-06 01:53:30 +00002864 LogSP log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_PROCESS));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002865 if (log)
2866 log->Printf ("Process::%s (arg = %p, pid = %i) thread starting...", __FUNCTION__, this, GetID());
2867
2868 bool exit_now = false;
2869 while (!exit_now)
2870 {
2871 EventSP event_sp;
2872 WaitForEventsPrivate (NULL, event_sp, control_only);
2873 if (event_sp->BroadcasterIs(&m_private_state_control_broadcaster))
2874 {
2875 switch (event_sp->GetType())
2876 {
2877 case eBroadcastInternalStateControlStop:
2878 exit_now = true;
2879 continue; // Go to next loop iteration so we exit without
2880 break; // doing any internal state managment below
2881
2882 case eBroadcastInternalStateControlPause:
2883 control_only = true;
2884 break;
2885
2886 case eBroadcastInternalStateControlResume:
2887 control_only = false;
2888 break;
2889 }
Jim Ingham0d8bcc72010-11-17 02:32:00 +00002890
Jim Ingham0d8bcc72010-11-17 02:32:00 +00002891 if (log)
2892 log->Printf ("Process::%s (arg = %p, pid = %i) got a control event: %d", __FUNCTION__, this, GetID(), event_sp->GetType());
2893
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002894 m_private_state_control_wait.SetValue (true, eBroadcastAlways);
Jim Ingham0d8bcc72010-11-17 02:32:00 +00002895 continue;
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002896 }
2897
2898
2899 const StateType internal_state = Process::ProcessEventData::GetStateFromEvent(event_sp.get());
2900
2901 if (internal_state != eStateInvalid)
2902 {
2903 HandlePrivateEvent (event_sp);
2904 }
2905
Greg Clayton58d1c9a2010-10-18 04:14:23 +00002906 if (internal_state == eStateInvalid ||
2907 internal_state == eStateExited ||
2908 internal_state == eStateDetached )
Jim Ingham0d8bcc72010-11-17 02:32:00 +00002909 {
Jim Ingham0d8bcc72010-11-17 02:32:00 +00002910 if (log)
2911 log->Printf ("Process::%s (arg = %p, pid = %i) about to exit with internal state %s...", __FUNCTION__, this, GetID(), StateAsCString(internal_state));
2912
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002913 break;
Jim Ingham0d8bcc72010-11-17 02:32:00 +00002914 }
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002915 }
2916
Caroline Tice20ad3c42010-10-29 21:48:37 +00002917 // Verify log is still enabled before attempting to write to it...
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002918 if (log)
2919 log->Printf ("Process::%s (arg = %p, pid = %i) thread exiting...", __FUNCTION__, this, GetID());
2920
Greg Clayton6ed95942011-01-22 07:12:45 +00002921 m_private_state_control_wait.SetValue (true, eBroadcastAlways);
2922 m_private_state_thread = LLDB_INVALID_HOST_THREAD;
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002923 return NULL;
2924}
2925
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002926//------------------------------------------------------------------
2927// Process Event Data
2928//------------------------------------------------------------------
2929
2930Process::ProcessEventData::ProcessEventData () :
2931 EventData (),
2932 m_process_sp (),
2933 m_state (eStateInvalid),
Greg Claytonc982c762010-07-09 20:39:50 +00002934 m_restarted (false),
Jim Inghama8604692011-05-22 21:45:01 +00002935 m_update_state (0),
Jim Ingham0d8bcc72010-11-17 02:32:00 +00002936 m_interrupted (false)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002937{
2938}
2939
2940Process::ProcessEventData::ProcessEventData (const ProcessSP &process_sp, StateType state) :
2941 EventData (),
2942 m_process_sp (process_sp),
2943 m_state (state),
Greg Claytonc982c762010-07-09 20:39:50 +00002944 m_restarted (false),
Jim Inghama8604692011-05-22 21:45:01 +00002945 m_update_state (0),
Jim Ingham0d8bcc72010-11-17 02:32:00 +00002946 m_interrupted (false)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002947{
2948}
2949
2950Process::ProcessEventData::~ProcessEventData()
2951{
2952}
2953
2954const ConstString &
2955Process::ProcessEventData::GetFlavorString ()
2956{
2957 static ConstString g_flavor ("Process::ProcessEventData");
2958 return g_flavor;
2959}
2960
2961const ConstString &
2962Process::ProcessEventData::GetFlavor () const
2963{
2964 return ProcessEventData::GetFlavorString ();
2965}
2966
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002967void
2968Process::ProcessEventData::DoOnRemoval (Event *event_ptr)
2969{
2970 // This function gets called twice for each event, once when the event gets pulled
Jim Inghama8604692011-05-22 21:45:01 +00002971 // off of the private process event queue, and then any number of times, first when it gets pulled off of
2972 // the public event queue, then other times when we're pretending that this is where we stopped at the
2973 // end of expression evaluation. m_update_state is used to distinguish these
2974 // three cases; it is 0 when we're just pulling it off for private handling,
2975 // and > 1 for expression evaluation, and we don't want to do the breakpoint command handling then.
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002976
Jim Inghama8604692011-05-22 21:45:01 +00002977 if (m_update_state != 1)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002978 return;
2979
2980 m_process_sp->SetPublicState (m_state);
2981
2982 // If we're stopped and haven't restarted, then do the breakpoint commands here:
2983 if (m_state == eStateStopped && ! m_restarted)
2984 {
2985 int num_threads = m_process_sp->GetThreadList().GetSize();
2986 int idx;
Greg Claytonf4b47e12010-08-04 01:40:35 +00002987
Jim Ingham4b536182011-08-09 02:12:22 +00002988 // The actions might change one of the thread's stop_info's opinions about whether we should
2989 // stop the process, so we need to query that as we go.
2990 bool still_should_stop = true;
2991
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002992 for (idx = 0; idx < num_threads; ++idx)
2993 {
2994 lldb::ThreadSP thread_sp = m_process_sp->GetThreadList().GetThreadAtIndex(idx);
2995
Jim Inghamb15bfc72010-10-20 00:39:53 +00002996 StopInfoSP stop_info_sp = thread_sp->GetStopInfo ();
2997 if (stop_info_sp)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00002998 {
Jim Inghamb15bfc72010-10-20 00:39:53 +00002999 stop_info_sp->PerformAction(event_ptr);
Jim Ingham4b536182011-08-09 02:12:22 +00003000 // The stop action might restart the target. If it does, then we want to mark that in the
3001 // event so that whoever is receiving it will know to wait for the running event and reflect
3002 // that state appropriately.
3003 // We also need to stop processing actions, since they aren't expecting the target to be running.
3004 if (m_process_sp->GetPrivateState() == eStateRunning)
3005 {
3006 SetRestarted (true);
3007 break;
3008 }
3009 else if (!stop_info_sp->ShouldStop(event_ptr))
3010 {
3011 still_should_stop = false;
3012 }
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003013 }
3014 }
Jim Ingham3ebcf7f2010-08-10 00:59:59 +00003015
Jim Ingham4b536182011-08-09 02:12:22 +00003016
3017 if (m_process_sp->GetPrivateState() != eStateRunning)
Jim Ingham9575d842011-03-11 03:53:59 +00003018 {
Jim Ingham4b536182011-08-09 02:12:22 +00003019 if (!still_should_stop)
3020 {
3021 // We've been asked to continue, so do that here.
Jim Ingham9575d842011-03-11 03:53:59 +00003022 SetRestarted(true);
Jim Ingham4b536182011-08-09 02:12:22 +00003023 m_process_sp->Resume();
3024 }
3025 else
3026 {
3027 // If we didn't restart, run the Stop Hooks here:
3028 // They might also restart the target, so watch for that.
3029 m_process_sp->GetTarget().RunStopHooks();
3030 if (m_process_sp->GetPrivateState() == eStateRunning)
3031 SetRestarted(true);
3032 }
Jim Ingham9575d842011-03-11 03:53:59 +00003033 }
3034
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003035 }
3036}
3037
3038void
3039Process::ProcessEventData::Dump (Stream *s) const
3040{
3041 if (m_process_sp)
3042 s->Printf(" process = %p (pid = %u), ", m_process_sp.get(), m_process_sp->GetID());
3043
Greg Clayton8b82f082011-04-12 05:54:46 +00003044 s->Printf("state = %s", StateAsCString(GetState()));
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003045}
3046
3047const Process::ProcessEventData *
3048Process::ProcessEventData::GetEventDataFromEvent (const Event *event_ptr)
3049{
3050 if (event_ptr)
3051 {
3052 const EventData *event_data = event_ptr->GetData();
3053 if (event_data && event_data->GetFlavor() == ProcessEventData::GetFlavorString())
3054 return static_cast <const ProcessEventData *> (event_ptr->GetData());
3055 }
3056 return NULL;
3057}
3058
3059ProcessSP
3060Process::ProcessEventData::GetProcessFromEvent (const Event *event_ptr)
3061{
3062 ProcessSP process_sp;
3063 const ProcessEventData *data = GetEventDataFromEvent (event_ptr);
3064 if (data)
3065 process_sp = data->GetProcessSP();
3066 return process_sp;
3067}
3068
3069StateType
3070Process::ProcessEventData::GetStateFromEvent (const Event *event_ptr)
3071{
3072 const ProcessEventData *data = GetEventDataFromEvent (event_ptr);
3073 if (data == NULL)
3074 return eStateInvalid;
3075 else
3076 return data->GetState();
3077}
3078
3079bool
3080Process::ProcessEventData::GetRestartedFromEvent (const Event *event_ptr)
3081{
3082 const ProcessEventData *data = GetEventDataFromEvent (event_ptr);
3083 if (data == NULL)
3084 return false;
3085 else
3086 return data->GetRestarted();
3087}
3088
3089void
3090Process::ProcessEventData::SetRestartedInEvent (Event *event_ptr, bool new_value)
3091{
3092 ProcessEventData *data = const_cast<ProcessEventData *>(GetEventDataFromEvent (event_ptr));
3093 if (data != NULL)
3094 data->SetRestarted(new_value);
3095}
3096
3097bool
Jim Ingham0d8bcc72010-11-17 02:32:00 +00003098Process::ProcessEventData::GetInterruptedFromEvent (const Event *event_ptr)
3099{
3100 const ProcessEventData *data = GetEventDataFromEvent (event_ptr);
3101 if (data == NULL)
3102 return false;
3103 else
3104 return data->GetInterrupted ();
3105}
3106
3107void
3108Process::ProcessEventData::SetInterruptedInEvent (Event *event_ptr, bool new_value)
3109{
3110 ProcessEventData *data = const_cast<ProcessEventData *>(GetEventDataFromEvent (event_ptr));
3111 if (data != NULL)
3112 data->SetInterrupted(new_value);
3113}
3114
3115bool
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003116Process::ProcessEventData::SetUpdateStateOnRemoval (Event *event_ptr)
3117{
3118 ProcessEventData *data = const_cast<ProcessEventData *>(GetEventDataFromEvent (event_ptr));
3119 if (data)
3120 {
3121 data->SetUpdateStateOnRemoval();
3122 return true;
3123 }
3124 return false;
3125}
3126
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003127void
Greg Clayton0603aa92010-10-04 01:05:56 +00003128Process::CalculateExecutionContext (ExecutionContext &exe_ctx)
Chris Lattner30fdc8d2010-06-08 16:52:24 +00003129{
3130 exe_ctx.target = &m_target;
3131 exe_ctx.process = this;
3132 exe_ctx.thread = NULL;
3133 exe_ctx.frame = NULL;
3134}
3135
3136lldb::ProcessSP
3137Process::GetSP ()
3138{
3139 return GetTarget().GetProcessSP();
3140}
3141
Greg Claytone996fd32011-03-08 22:40:15 +00003142//uint32_t
3143//Process::ListProcessesMatchingName (const char *name, StringList &matches, std::vector<lldb::pid_t> &pids)
3144//{
3145// return 0;
3146//}
3147//
3148//ArchSpec
3149//Process::GetArchSpecForExistingProcess (lldb::pid_t pid)
3150//{
3151// return Host::GetArchSpecForExistingProcess (pid);
3152//}
3153//
3154//ArchSpec
3155//Process::GetArchSpecForExistingProcess (const char *process_name)
3156//{
3157// return Host::GetArchSpecForExistingProcess (process_name);
3158//}
3159//
Caroline Ticeef5c6d02010-11-16 05:07:41 +00003160void
3161Process::AppendSTDOUT (const char * s, size_t len)
3162{
Greg Clayton3af9ea52010-11-18 05:57:03 +00003163 Mutex::Locker locker (m_stdio_communication_mutex);
Caroline Ticeef5c6d02010-11-16 05:07:41 +00003164 m_stdout_data.append (s, len);
3165
Greg Claytona9ff3062010-12-05 19:16:56 +00003166 BroadcastEventIfUnique (eBroadcastBitSTDOUT, new ProcessEventData (GetTarget().GetProcessSP(), GetState()));
Caroline Ticeef5c6d02010-11-16 05:07:41 +00003167}
3168
3169void
3170Process::STDIOReadThreadBytesReceived (void *baton, const void *src, size_t src_len)
3171{
3172 Process *process = (Process *) baton;
3173 process->AppendSTDOUT (static_cast<const char *>(src), src_len);
3174}
3175
3176size_t
3177Process::ProcessInputReaderCallback (void *baton,
3178 InputReader &reader,
3179 lldb::InputReaderAction notification,
3180 const char *bytes,
3181 size_t bytes_len)
3182{
3183 Process *process = (Process *) baton;
3184
3185 switch (notification)
3186 {
3187 case eInputReaderActivate:
3188 break;
3189
3190 case eInputReaderDeactivate:
3191 break;
3192
3193 case eInputReaderReactivate:
3194 break;
3195
Caroline Tice969ed3d2011-05-02 20:41:46 +00003196 case eInputReaderAsynchronousOutputWritten:
3197 break;
3198
Caroline Ticeef5c6d02010-11-16 05:07:41 +00003199 case eInputReaderGotToken:
3200 {
3201 Error error;
3202 process->PutSTDIN (bytes, bytes_len, error);
3203 }
3204 break;
3205
Caroline Ticeefed6132010-11-19 20:47:54 +00003206 case eInputReaderInterrupt:
3207 process->Halt ();
3208 break;
3209
3210 case eInputReaderEndOfFile:
3211 process->AppendSTDOUT ("^D", 2);
3212 break;
3213
Caroline Ticeef5c6d02010-11-16 05:07:41 +00003214 case eInputReaderDone:
3215 break;
3216
3217 }
3218
3219 return bytes_len;
3220}
3221
3222void
3223Process::ResetProcessInputReader ()
3224{
3225 m_process_input_reader.reset();
3226}
3227
3228void
3229Process::SetUpProcessInputReader (int file_descriptor)
3230{
3231 // First set up the Read Thread for reading/handling process I/O
3232
3233 std::auto_ptr<ConnectionFileDescriptor> conn_ap (new ConnectionFileDescriptor (file_descriptor, true));
3234
3235 if (conn_ap.get())
3236 {
3237 m_stdio_communication.SetConnection (conn_ap.release());
3238 if (m_stdio_communication.IsConnected())
3239 {
3240 m_stdio_communication.SetReadThreadBytesReceivedCallback (STDIOReadThreadBytesReceived, this);
3241 m_stdio_communication.StartReadThread();
3242
3243 // Now read thread is set up, set up input reader.
3244
3245 if (!m_process_input_reader.get())
3246 {
3247 m_process_input_reader.reset (new InputReader(m_target.GetDebugger()));
3248 Error err (m_process_input_reader->Initialize (Process::ProcessInputReaderCallback,
3249 this,
3250 eInputReaderGranularityByte,
3251 NULL,
3252 NULL,
3253 false));
3254
3255 if (err.Fail())
3256 m_process_input_reader.reset();
3257 }
3258 }
3259 }
3260}
3261
3262void
3263Process::PushProcessInputReader ()
3264{
3265 if (m_process_input_reader && !m_process_input_reader->IsActive())
3266 m_target.GetDebugger().PushInputReader (m_process_input_reader);
3267}
3268
3269void
3270Process::PopProcessInputReader ()
3271{
3272 if (m_process_input_reader && m_process_input_reader->IsActive())
3273 m_target.GetDebugger().PopInputReader (m_process_input_reader);
3274}
3275
Greg Claytonbfe5f3b2011-02-18 01:44:25 +00003276// The process needs to know about installed plug-ins
Greg Clayton99d0faf2010-11-18 23:32:35 +00003277void
Caroline Tice20bd37f2011-03-10 22:14:10 +00003278Process::SettingsInitialize ()
Caroline Tice3df9a8d2010-09-04 00:03:46 +00003279{
Greg Claytone0d378b2011-03-24 21:19:54 +00003280 static std::vector<OptionEnumValueElement> g_plugins;
Greg Claytonbfe5f3b2011-02-18 01:44:25 +00003281
3282 int i=0;
3283 const char *name;
3284 OptionEnumValueElement option_enum;
3285 while ((name = PluginManager::GetProcessPluginNameAtIndex (i)) != NULL)
3286 {
3287 if (name)
3288 {
3289 option_enum.value = i;
3290 option_enum.string_value = name;
3291 option_enum.usage = PluginManager::GetProcessPluginDescriptionAtIndex (i);
3292 g_plugins.push_back (option_enum);
3293 }
3294 ++i;
3295 }
3296 option_enum.value = 0;
3297 option_enum.string_value = NULL;
3298 option_enum.usage = NULL;
3299 g_plugins.push_back (option_enum);
3300
3301 for (i=0; (name = SettingsController::instance_settings_table[i].var_name); ++i)
3302 {
3303 if (::strcmp (name, "plugin") == 0)
3304 {
3305 SettingsController::instance_settings_table[i].enum_values = &g_plugins[0];
3306 break;
3307 }
3308 }
Greg Clayton99d0faf2010-11-18 23:32:35 +00003309 UserSettingsControllerSP &usc = GetSettingsController();
3310 usc.reset (new SettingsController);
3311 UserSettingsController::InitializeSettingsController (usc,
3312 SettingsController::global_settings_table,
3313 SettingsController::instance_settings_table);
Caroline Tice20bd37f2011-03-10 22:14:10 +00003314
3315 // Now call SettingsInitialize() for each 'child' of Process settings
3316 Thread::SettingsInitialize ();
Greg Clayton99d0faf2010-11-18 23:32:35 +00003317}
Caroline Tice3df9a8d2010-09-04 00:03:46 +00003318
Greg Clayton99d0faf2010-11-18 23:32:35 +00003319void
Caroline Tice20bd37f2011-03-10 22:14:10 +00003320Process::SettingsTerminate ()
Greg Claytonbfe5f3b2011-02-18 01:44:25 +00003321{
Caroline Tice20bd37f2011-03-10 22:14:10 +00003322 // Must call SettingsTerminate() on each 'child' of Process settings before terminating Process settings.
3323
3324 Thread::SettingsTerminate ();
3325
3326 // Now terminate Process Settings.
3327
Greg Clayton99d0faf2010-11-18 23:32:35 +00003328 UserSettingsControllerSP &usc = GetSettingsController();
3329 UserSettingsController::FinalizeSettingsController (usc);
3330 usc.reset();
3331}
Caroline Tice3df9a8d2010-09-04 00:03:46 +00003332
Greg Clayton99d0faf2010-11-18 23:32:35 +00003333UserSettingsControllerSP &
3334Process::GetSettingsController ()
3335{
3336 static UserSettingsControllerSP g_settings_controller;
Caroline Tice3df9a8d2010-09-04 00:03:46 +00003337 return g_settings_controller;
3338}
3339
Caroline Tice1559a462010-09-27 00:30:10 +00003340void
3341Process::UpdateInstanceName ()
3342{
Greg Claytonaa149cb2011-08-11 02:48:45 +00003343 Module *module = GetTarget().GetExecutableModulePointer();
3344 if (module)
Caroline Tice1559a462010-09-27 00:30:10 +00003345 {
3346 StreamString sstr;
Greg Claytonaa149cb2011-08-11 02:48:45 +00003347 sstr.Printf ("%s", module->GetFileSpec().GetFilename().AsCString());
Caroline Tice1559a462010-09-27 00:30:10 +00003348
Greg Claytondbe54502010-11-19 03:46:01 +00003349 GetSettingsController()->RenameInstanceSettings (GetInstanceName().AsCString(),
Greg Clayton8b82f082011-04-12 05:54:46 +00003350 sstr.GetData());
Caroline Tice1559a462010-09-27 00:30:10 +00003351 }
3352}
3353
Greg Clayton8b2fe6d2010-12-14 02:59:59 +00003354ExecutionResults
Jim Inghamf48169b2010-11-30 02:22:11 +00003355Process::RunThreadPlan (ExecutionContext &exe_ctx,
3356 lldb::ThreadPlanSP &thread_plan_sp,
3357 bool stop_others,
3358 bool try_all_threads,
3359 bool discard_on_error,
3360 uint32_t single_thread_timeout_usec,
3361 Stream &errors)
3362{
3363 ExecutionResults return_value = eExecutionSetupError;
3364
Jim Ingham77787032011-01-20 02:03:18 +00003365 if (thread_plan_sp.get() == NULL)
3366 {
3367 errors.Printf("RunThreadPlan called with empty thread plan.");
Greg Claytone0d378b2011-03-24 21:19:54 +00003368 return eExecutionSetupError;
Jim Ingham77787032011-01-20 02:03:18 +00003369 }
3370
Jim Ingham17e5c4e2011-05-17 22:24:54 +00003371 // We rely on the thread plan we are running returning "PlanCompleted" if when it successfully completes.
3372 // For that to be true the plan can't be private - since private plans suppress themselves in the
3373 // GetCompletedPlan call.
3374
3375 bool orig_plan_private = thread_plan_sp->GetPrivate();
3376 thread_plan_sp->SetPrivate(false);
3377
Jim Ingham444586b2011-01-24 06:34:17 +00003378 if (m_private_state.GetValue() != eStateStopped)
3379 {
3380 errors.Printf ("RunThreadPlan called while the private state was not stopped.");
Greg Claytone0d378b2011-03-24 21:19:54 +00003381 return eExecutionSetupError;
Jim Ingham444586b2011-01-24 06:34:17 +00003382 }
3383
Jim Ingham66243842011-08-13 00:56:10 +00003384 // Save the thread & frame from the exe_ctx for restoration after we run
Greg Clayton92bb12c2011-05-19 18:17:41 +00003385 const uint32_t thread_idx_id = exe_ctx.thread->GetIndexID();
Jim Ingham66243842011-08-13 00:56:10 +00003386 StackID ctx_frame_id = exe_ctx.thread->GetSelectedFrame()->GetStackID();
Jim Inghamf48169b2010-11-30 02:22:11 +00003387
3388 // N.B. Running the target may unset the currently selected thread and frame. We don't want to do that either,
3389 // so we should arrange to reset them as well.
3390
3391 lldb::ThreadSP selected_thread_sp = exe_ctx.process->GetThreadList().GetSelectedThread();
Jim Inghamf48169b2010-11-30 02:22:11 +00003392
Jim Ingham66243842011-08-13 00:56:10 +00003393 uint32_t selected_tid;
3394 StackID selected_stack_id;
Jim Inghamf48169b2010-11-30 02:22:11 +00003395 if (selected_thread_sp != NULL)
3396 {
3397 selected_tid = selected_thread_sp->GetIndexID();
Jim Ingham66243842011-08-13 00:56:10 +00003398 selected_stack_id = selected_thread_sp->GetSelectedFrame()->GetStackID();
Jim Inghamf48169b2010-11-30 02:22:11 +00003399 }
3400 else
3401 {
3402 selected_tid = LLDB_INVALID_THREAD_ID;
3403 }
3404
3405 exe_ctx.thread->QueueThreadPlan(thread_plan_sp, true);
3406
Jim Ingham1e7a9ee2011-01-23 21:14:08 +00003407 Listener listener("lldb.process.listener.run-thread-plan");
Jim Ingham0f16e732011-02-08 05:20:59 +00003408
3409 // This process event hijacker Hijacks the Public events and its destructor makes sure that the process events get
3410 // restored on exit to the function.
3411
3412 ProcessEventHijacker run_thread_plan_hijacker (*this, &listener);
Jim Ingham444586b2011-01-24 06:34:17 +00003413
Jim Ingham1e7a9ee2011-01-23 21:14:08 +00003414 lldb::LogSP log(lldb_private::GetLogIfAnyCategoriesSet (LIBLLDB_LOG_STEP | LIBLLDB_LOG_PROCESS));
Jim Ingham77787032011-01-20 02:03:18 +00003415 if (log)
3416 {
3417 StreamString s;
3418 thread_plan_sp->GetDescription(&s, lldb::eDescriptionLevelVerbose);
Jim Ingham0f16e732011-02-08 05:20:59 +00003419 log->Printf ("Process::RunThreadPlan(): Resuming thread %u - 0x%4.4x to run thread plan \"%s\".",
3420 exe_ctx.thread->GetIndexID(),
3421 exe_ctx.thread->GetID(),
3422 s.GetData());
Jim Ingham77787032011-01-20 02:03:18 +00003423 }
3424
Jim Ingham0f16e732011-02-08 05:20:59 +00003425 bool got_event;
3426 lldb::EventSP event_sp;
3427 lldb::StateType stop_state = lldb::eStateInvalid;
Jim Inghamf48169b2010-11-30 02:22:11 +00003428
3429 TimeValue* timeout_ptr = NULL;
3430 TimeValue real_timeout;
3431
Jim Ingham0f16e732011-02-08 05:20:59 +00003432 bool first_timeout = true;
3433 bool do_resume = true;
Jim Inghamf48169b2010-11-30 02:22:11 +00003434
Jim Inghamf48169b2010-11-30 02:22:11 +00003435 while (1)
3436 {
Jim Ingham0f16e732011-02-08 05:20:59 +00003437 // We usually want to resume the process if we get to the top of the loop.
3438 // The only exception is if we get two running events with no intervening
3439 // stop, which can happen, we will just wait for then next stop event.
Jim Inghamf48169b2010-11-30 02:22:11 +00003440
Jim Ingham0f16e732011-02-08 05:20:59 +00003441 if (do_resume)
Jim Inghamf48169b2010-11-30 02:22:11 +00003442 {
Jim Ingham0f16e732011-02-08 05:20:59 +00003443 // Do the initial resume and wait for the running event before going further.
3444
3445 Error resume_error = exe_ctx.process->Resume ();
3446 if (!resume_error.Success())
3447 {
3448 errors.Printf("Error resuming inferior: \"%s\".\n", resume_error.AsCString());
Greg Claytone0d378b2011-03-24 21:19:54 +00003449 return_value = eExecutionSetupError;
Jim Ingham0f16e732011-02-08 05:20:59 +00003450 break;
3451 }
3452
3453 real_timeout = TimeValue::Now();
3454 real_timeout.OffsetWithMicroSeconds(500000);
3455 timeout_ptr = &real_timeout;
3456
3457 got_event = listener.WaitForEvent(NULL, event_sp);
3458 if (!got_event)
3459 {
3460 if (log)
Jim Ingham20829ac2011-08-09 22:24:33 +00003461 log->PutCString("Didn't get any event after initial resume, exiting.");
Jim Ingham0f16e732011-02-08 05:20:59 +00003462
3463 errors.Printf("Didn't get any event after initial resume, exiting.");
Greg Claytone0d378b2011-03-24 21:19:54 +00003464 return_value = eExecutionSetupError;
Jim Ingham0f16e732011-02-08 05:20:59 +00003465 break;
3466 }
3467
3468 stop_state = Process::ProcessEventData::GetStateFromEvent(event_sp.get());
3469 if (stop_state != eStateRunning)
3470 {
3471 if (log)
3472 log->Printf("Didn't get running event after initial resume, got %s instead.", StateAsCString(stop_state));
3473
3474 errors.Printf("Didn't get running event after initial resume, got %s instead.", StateAsCString(stop_state));
Greg Claytone0d378b2011-03-24 21:19:54 +00003475 return_value = eExecutionSetupError;
Jim Ingham0f16e732011-02-08 05:20:59 +00003476 break;
3477 }
3478
3479 if (log)
Jim Ingham20829ac2011-08-09 22:24:33 +00003480 log->PutCString ("Resuming succeeded.");
Jim Ingham0f16e732011-02-08 05:20:59 +00003481 // We need to call the function synchronously, so spin waiting for it to return.
3482 // If we get interrupted while executing, we're going to lose our context, and
3483 // won't be able to gather the result at this point.
3484 // We set the timeout AFTER the resume, since the resume takes some time and we
3485 // don't want to charge that to the timeout.
3486
3487 if (single_thread_timeout_usec != 0)
3488 {
3489 real_timeout = TimeValue::Now();
3490 if (first_timeout)
3491 real_timeout.OffsetWithMicroSeconds(single_thread_timeout_usec);
3492 else
3493 real_timeout.OffsetWithSeconds(10);
3494
3495 timeout_ptr = &real_timeout;
3496 }
3497 }
3498 else
3499 {
3500 if (log)
Jim Ingham20829ac2011-08-09 22:24:33 +00003501 log->PutCString ("Handled an extra running event.");
Jim Ingham0f16e732011-02-08 05:20:59 +00003502 do_resume = true;
3503 }
3504
3505 // Now wait for the process to stop again:
3506 stop_state = lldb::eStateInvalid;
3507 event_sp.reset();
3508 got_event = listener.WaitForEvent (timeout_ptr, event_sp);
3509
3510 if (got_event)
3511 {
3512 if (event_sp.get())
3513 {
3514 bool keep_going = false;
3515 stop_state = Process::ProcessEventData::GetStateFromEvent(event_sp.get());
3516 if (log)
3517 log->Printf("In while loop, got event: %s.", StateAsCString(stop_state));
3518
3519 switch (stop_state)
3520 {
3521 case lldb::eStateStopped:
Jim Ingham160f78c2011-05-17 01:10:11 +00003522 {
Greg Clayton54e8ac52011-06-03 22:12:42 +00003523 // Yay, we're done. Now make sure that our thread plan actually completed.
3524 ThreadSP thread_sp = exe_ctx.process->GetThreadList().FindThreadByIndexID (thread_idx_id);
3525 if (!thread_sp)
Jim Ingham160f78c2011-05-17 01:10:11 +00003526 {
Greg Clayton54e8ac52011-06-03 22:12:42 +00003527 // Ooh, our thread has vanished. Unlikely that this was successful execution...
Jim Ingham160f78c2011-05-17 01:10:11 +00003528 if (log)
Greg Clayton54e8ac52011-06-03 22:12:42 +00003529 log->Printf ("Execution completed but our thread (index-id=%u) has vanished.", thread_idx_id);
3530 return_value = eExecutionInterrupted;
Jim Ingham160f78c2011-05-17 01:10:11 +00003531 }
3532 else
3533 {
Greg Clayton54e8ac52011-06-03 22:12:42 +00003534 StopInfoSP stop_info_sp (thread_sp->GetStopInfo ());
3535 StopReason stop_reason = eStopReasonInvalid;
3536 if (stop_info_sp)
3537 stop_reason = stop_info_sp->GetStopReason();
3538 if (stop_reason == eStopReasonPlanComplete)
3539 {
3540 if (log)
Jim Ingham20829ac2011-08-09 22:24:33 +00003541 log->PutCString ("Execution completed successfully.");
Greg Clayton54e8ac52011-06-03 22:12:42 +00003542 // Now mark this plan as private so it doesn't get reported as the stop reason
3543 // after this point.
3544 if (thread_plan_sp)
3545 thread_plan_sp->SetPrivate (orig_plan_private);
3546 return_value = eExecutionCompleted;
3547 }
3548 else
3549 {
3550 if (log)
Jim Ingham20829ac2011-08-09 22:24:33 +00003551 log->PutCString ("Thread plan didn't successfully complete.");
Greg Clayton54e8ac52011-06-03 22:12:42 +00003552
3553 return_value = eExecutionInterrupted;
3554 }
Jim Ingham160f78c2011-05-17 01:10:11 +00003555 }
Greg Clayton54e8ac52011-06-03 22:12:42 +00003556 }
3557 break;
3558
Jim Ingham0f16e732011-02-08 05:20:59 +00003559 case lldb::eStateCrashed:
3560 if (log)
Jim Ingham20829ac2011-08-09 22:24:33 +00003561 log->PutCString ("Execution crashed.");
Greg Claytone0d378b2011-03-24 21:19:54 +00003562 return_value = eExecutionInterrupted;
Jim Ingham0f16e732011-02-08 05:20:59 +00003563 break;
Greg Clayton54e8ac52011-06-03 22:12:42 +00003564
Jim Ingham0f16e732011-02-08 05:20:59 +00003565 case lldb::eStateRunning:
3566 do_resume = false;
3567 keep_going = true;
3568 break;
Greg Clayton54e8ac52011-06-03 22:12:42 +00003569
Jim Ingham0f16e732011-02-08 05:20:59 +00003570 default:
3571 if (log)
3572 log->Printf("Execution stopped with unexpected state: %s.", StateAsCString(stop_state));
Jim Ingham160f78c2011-05-17 01:10:11 +00003573
3574 errors.Printf ("Execution stopped with unexpected state.");
Greg Claytone0d378b2011-03-24 21:19:54 +00003575 return_value = eExecutionInterrupted;
Jim Ingham0f16e732011-02-08 05:20:59 +00003576 break;
3577 }
3578 if (keep_going)
3579 continue;
3580 else
3581 break;
3582 }
3583 else
3584 {
3585 if (log)
Jim Ingham20829ac2011-08-09 22:24:33 +00003586 log->PutCString ("got_event was true, but the event pointer was null. How odd...");
Greg Claytone0d378b2011-03-24 21:19:54 +00003587 return_value = eExecutionInterrupted;
Jim Ingham0f16e732011-02-08 05:20:59 +00003588 break;
3589 }
3590 }
3591 else
3592 {
3593 // If we didn't get an event that means we've timed out...
3594 // We will interrupt the process here. Depending on what we were asked to do we will
3595 // either exit, or try with all threads running for the same timeout.
Jim Inghamf48169b2010-11-30 02:22:11 +00003596 // Not really sure what to do if Halt fails here...
Jim Ingham0f16e732011-02-08 05:20:59 +00003597
Stephen Wilson78a4feb2011-01-12 04:20:03 +00003598 if (log) {
Jim Inghamf48169b2010-11-30 02:22:11 +00003599 if (try_all_threads)
Jim Ingham0f16e732011-02-08 05:20:59 +00003600 {
3601 if (first_timeout)
3602 log->Printf ("Process::RunThreadPlan(): Running function with timeout: %d timed out, "
3603 "trying with all threads enabled.",
3604 single_thread_timeout_usec);
3605 else
3606 log->Printf ("Process::RunThreadPlan(): Restarting function with all threads enabled "
3607 "and timeout: %d timed out.",
3608 single_thread_timeout_usec);
3609 }
Jim Inghamf48169b2010-11-30 02:22:11 +00003610 else
Jim Ingham0f16e732011-02-08 05:20:59 +00003611 log->Printf ("Process::RunThreadPlan(): Running function with timeout: %d timed out, "
3612 "halt and abandoning execution.",
Jim Inghamf48169b2010-11-30 02:22:11 +00003613 single_thread_timeout_usec);
Stephen Wilson78a4feb2011-01-12 04:20:03 +00003614 }
Jim Inghamf48169b2010-11-30 02:22:11 +00003615
Jim Inghame22e88b2011-01-22 01:30:53 +00003616 Error halt_error = exe_ctx.process->Halt();
Jim Inghame22e88b2011-01-22 01:30:53 +00003617 if (halt_error.Success())
Jim Inghamf48169b2010-11-30 02:22:11 +00003618 {
Jim Inghamf48169b2010-11-30 02:22:11 +00003619 if (log)
Jim Ingham20829ac2011-08-09 22:24:33 +00003620 log->PutCString ("Process::RunThreadPlan(): Halt succeeded.");
Jim Inghamf48169b2010-11-30 02:22:11 +00003621
Jim Ingham0f16e732011-02-08 05:20:59 +00003622 // If halt succeeds, it always produces a stopped event. Wait for that:
3623
3624 real_timeout = TimeValue::Now();
3625 real_timeout.OffsetWithMicroSeconds(500000);
3626
3627 got_event = listener.WaitForEvent(&real_timeout, event_sp);
Jim Inghamf48169b2010-11-30 02:22:11 +00003628
3629 if (got_event)
3630 {
3631 stop_state = Process::ProcessEventData::GetStateFromEvent(event_sp.get());
3632 if (log)
3633 {
Greg Clayton414f5d32011-01-25 02:58:48 +00003634 log->Printf ("Process::RunThreadPlan(): Stopped with event: %s", StateAsCString(stop_state));
Jim Ingham0f16e732011-02-08 05:20:59 +00003635 if (stop_state == lldb::eStateStopped
3636 && Process::ProcessEventData::GetInterruptedFromEvent(event_sp.get()))
Jim Ingham20829ac2011-08-09 22:24:33 +00003637 log->PutCString (" Event was the Halt interruption event.");
Jim Inghamf48169b2010-11-30 02:22:11 +00003638 }
3639
Jim Ingham0f16e732011-02-08 05:20:59 +00003640 if (stop_state == lldb::eStateStopped)
Jim Inghamf48169b2010-11-30 02:22:11 +00003641 {
Jim Ingham0f16e732011-02-08 05:20:59 +00003642 // Between the time we initiated the Halt and the time we delivered it, the process could have
3643 // already finished its job. Check that here:
Jim Inghamf48169b2010-11-30 02:22:11 +00003644
Jim Ingham0f16e732011-02-08 05:20:59 +00003645 if (exe_ctx.thread->IsThreadPlanDone (thread_plan_sp.get()))
3646 {
3647 if (log)
Jim Ingham20829ac2011-08-09 22:24:33 +00003648 log->PutCString ("Process::RunThreadPlan(): Even though we timed out, the call plan was done. "
Jim Ingham0f16e732011-02-08 05:20:59 +00003649 "Exiting wait loop.");
Greg Claytone0d378b2011-03-24 21:19:54 +00003650 return_value = eExecutionCompleted;
Jim Ingham0f16e732011-02-08 05:20:59 +00003651 break;
3652 }
Jim Inghamf48169b2010-11-30 02:22:11 +00003653
Jim Ingham0f16e732011-02-08 05:20:59 +00003654 if (!try_all_threads)
3655 {
3656 if (log)
Jim Ingham20829ac2011-08-09 22:24:33 +00003657 log->PutCString ("try_all_threads was false, we stopped so now we're quitting.");
Greg Claytone0d378b2011-03-24 21:19:54 +00003658 return_value = eExecutionInterrupted;
Jim Ingham0f16e732011-02-08 05:20:59 +00003659 break;
3660 }
3661
3662 if (first_timeout)
3663 {
3664 // Set all the other threads to run, and return to the top of the loop, which will continue;
3665 first_timeout = false;
3666 thread_plan_sp->SetStopOthers (false);
3667 if (log)
Jim Ingham20829ac2011-08-09 22:24:33 +00003668 log->PutCString ("Process::RunThreadPlan(): About to resume.");
Jim Ingham0f16e732011-02-08 05:20:59 +00003669
3670 continue;
3671 }
3672 else
3673 {
3674 // Running all threads failed, so return Interrupted.
3675 if (log)
Jim Ingham20829ac2011-08-09 22:24:33 +00003676 log->PutCString("Process::RunThreadPlan(): running all threads timed out.");
Greg Claytone0d378b2011-03-24 21:19:54 +00003677 return_value = eExecutionInterrupted;
Jim Ingham0f16e732011-02-08 05:20:59 +00003678 break;
3679 }
Jim Inghamf48169b2010-11-30 02:22:11 +00003680 }
Jim Ingham0f16e732011-02-08 05:20:59 +00003681 }
3682 else
3683 { if (log)
Jim Ingham20829ac2011-08-09 22:24:33 +00003684 log->PutCString("Process::RunThreadPlan(): halt said it succeeded, but I got no event. "
Jim Ingham0f16e732011-02-08 05:20:59 +00003685 "I'm getting out of here passing Interrupted.");
Greg Claytone0d378b2011-03-24 21:19:54 +00003686 return_value = eExecutionInterrupted;
Jim Ingham0f16e732011-02-08 05:20:59 +00003687 break;
Jim Inghamf48169b2010-11-30 02:22:11 +00003688 }
3689 }
Jim Inghame22e88b2011-01-22 01:30:53 +00003690 else
3691 {
Jim Ingham0f16e732011-02-08 05:20:59 +00003692 // This branch is to work around some problems with gdb-remote's Halt. It is a little racy, and can return
3693 // an error from halt, but if you wait a bit you'll get a stopped event anyway.
Jim Inghame22e88b2011-01-22 01:30:53 +00003694 if (log)
Jim Ingham0f16e732011-02-08 05:20:59 +00003695 log->Printf ("Process::RunThreadPlan(): halt failed: error = \"%s\", I'm just going to wait a little longer and see if I get a stopped event.",
3696 halt_error.AsCString());
3697 real_timeout = TimeValue::Now();
3698 real_timeout.OffsetWithMicroSeconds(500000);
3699 timeout_ptr = &real_timeout;
3700 got_event = listener.WaitForEvent(&real_timeout, event_sp);
3701 if (!got_event || event_sp.get() == NULL)
Jim Ingham1e7a9ee2011-01-23 21:14:08 +00003702 {
Jim Ingham0f16e732011-02-08 05:20:59 +00003703 // This is not going anywhere, bag out.
3704 if (log)
Jim Ingham20829ac2011-08-09 22:24:33 +00003705 log->PutCString ("Process::RunThreadPlan(): halt failed: and waiting for the stopped event failed.");
Greg Claytone0d378b2011-03-24 21:19:54 +00003706 return_value = eExecutionInterrupted;
Jim Ingham0f16e732011-02-08 05:20:59 +00003707 break;
Jim Ingham1e7a9ee2011-01-23 21:14:08 +00003708 }
Jim Ingham0f16e732011-02-08 05:20:59 +00003709 else
3710 {
3711 stop_state = Process::ProcessEventData::GetStateFromEvent(event_sp.get());
3712 if (log)
Jim Ingham20829ac2011-08-09 22:24:33 +00003713 log->PutCString ("Process::RunThreadPlan(): halt failed: but then I got a stopped event. Whatever...");
Jim Ingham0f16e732011-02-08 05:20:59 +00003714 if (stop_state == lldb::eStateStopped)
3715 {
3716 // Between the time we initiated the Halt and the time we delivered it, the process could have
3717 // already finished its job. Check that here:
3718
3719 if (exe_ctx.thread->IsThreadPlanDone (thread_plan_sp.get()))
3720 {
3721 if (log)
Jim Ingham20829ac2011-08-09 22:24:33 +00003722 log->PutCString ("Process::RunThreadPlan(): Even though we timed out, the call plan was done. "
Jim Ingham0f16e732011-02-08 05:20:59 +00003723 "Exiting wait loop.");
Greg Claytone0d378b2011-03-24 21:19:54 +00003724 return_value = eExecutionCompleted;
Jim Ingham0f16e732011-02-08 05:20:59 +00003725 break;
3726 }
3727
3728 if (first_timeout)
3729 {
3730 // Set all the other threads to run, and return to the top of the loop, which will continue;
3731 first_timeout = false;
3732 thread_plan_sp->SetStopOthers (false);
3733 if (log)
Jim Ingham20829ac2011-08-09 22:24:33 +00003734 log->PutCString ("Process::RunThreadPlan(): About to resume.");
Jim Ingham0f16e732011-02-08 05:20:59 +00003735
3736 continue;
3737 }
3738 else
3739 {
3740 // Running all threads failed, so return Interrupted.
3741 if (log)
Jim Ingham20829ac2011-08-09 22:24:33 +00003742 log->PutCString ("Process::RunThreadPlan(): running all threads timed out.");
Greg Claytone0d378b2011-03-24 21:19:54 +00003743 return_value = eExecutionInterrupted;
Jim Ingham0f16e732011-02-08 05:20:59 +00003744 break;
3745 }
3746 }
3747 else
3748 {
Sean Callanan39821ac2011-08-09 22:07:08 +00003749 if (log)
3750 log->Printf ("Process::RunThreadPlan(): halt failed, I waited and didn't get"
3751 " a stopped event, instead got %s.", StateAsCString(stop_state));
Greg Claytone0d378b2011-03-24 21:19:54 +00003752 return_value = eExecutionInterrupted;
Jim Ingham0f16e732011-02-08 05:20:59 +00003753 break;
3754 }
3755 }
Jim Inghame22e88b2011-01-22 01:30:53 +00003756 }
3757
Jim Inghamf48169b2010-11-30 02:22:11 +00003758 }
3759
Jim Ingham0f16e732011-02-08 05:20:59 +00003760 } // END WAIT LOOP
3761
3762 // Now do some processing on the results of the run:
3763 if (return_value == eExecutionInterrupted)
3764 {
Jim Inghamf48169b2010-11-30 02:22:11 +00003765 if (log)
Jim Ingham0f16e732011-02-08 05:20:59 +00003766 {
3767 StreamString s;
3768 if (event_sp)
3769 event_sp->Dump (&s);
3770 else
3771 {
Jim Ingham20829ac2011-08-09 22:24:33 +00003772 log->PutCString ("Process::RunThreadPlan(): Stop event that interrupted us is NULL.");
Jim Ingham0f16e732011-02-08 05:20:59 +00003773 }
3774
3775 StreamString ts;
3776
Jim Ingham20829ac2011-08-09 22:24:33 +00003777 const char *event_explanation = NULL;
Jim Ingham0f16e732011-02-08 05:20:59 +00003778
3779 do
3780 {
3781 const Process::ProcessEventData *event_data = Process::ProcessEventData::GetEventDataFromEvent (event_sp.get());
3782
3783 if (!event_data)
3784 {
3785 event_explanation = "<no event data>";
3786 break;
3787 }
3788
3789 Process *process = event_data->GetProcessSP().get();
3790
3791 if (!process)
3792 {
3793 event_explanation = "<no process>";
3794 break;
3795 }
3796
3797 ThreadList &thread_list = process->GetThreadList();
3798
3799 uint32_t num_threads = thread_list.GetSize();
3800 uint32_t thread_index;
3801
3802 ts.Printf("<%u threads> ", num_threads);
3803
3804 for (thread_index = 0;
3805 thread_index < num_threads;
3806 ++thread_index)
3807 {
3808 Thread *thread = thread_list.GetThreadAtIndex(thread_index).get();
3809
3810 if (!thread)
3811 {
3812 ts.Printf("<?> ");
3813 continue;
3814 }
3815
3816 ts.Printf("<0x%4.4x ", thread->GetID());
3817 RegisterContext *register_context = thread->GetRegisterContext().get();
3818
3819 if (register_context)
3820 ts.Printf("[ip 0x%llx] ", register_context->GetPC());
3821 else
3822 ts.Printf("[ip unknown] ");
3823
3824 lldb::StopInfoSP stop_info_sp = thread->GetStopInfo();
3825 if (stop_info_sp)
3826 {
3827 const char *stop_desc = stop_info_sp->GetDescription();
3828 if (stop_desc)
3829 ts.PutCString (stop_desc);
3830 }
3831 ts.Printf(">");
3832 }
3833
3834 event_explanation = ts.GetData();
3835 } while (0);
3836
3837 if (log)
Jim Ingham20829ac2011-08-09 22:24:33 +00003838 {
3839 if (event_explanation)
3840 log->Printf("Process::RunThreadPlan(): execution interrupted: %s %s", s.GetData(), event_explanation);
3841 else
3842 log->Printf("Process::RunThreadPlan(): execution interrupted: %s", s.GetData());
3843 }
Jim Ingham0f16e732011-02-08 05:20:59 +00003844
3845 if (discard_on_error && thread_plan_sp)
3846 {
3847 exe_ctx.thread->DiscardThreadPlansUpToPlan (thread_plan_sp);
Jim Ingham4b536182011-08-09 02:12:22 +00003848 thread_plan_sp->SetPrivate (orig_plan_private);
Jim Ingham0f16e732011-02-08 05:20:59 +00003849 }
3850 }
3851 }
3852 else if (return_value == eExecutionSetupError)
3853 {
3854 if (log)
Jim Ingham20829ac2011-08-09 22:24:33 +00003855 log->PutCString("Process::RunThreadPlan(): execution set up error.");
Jim Ingham0f16e732011-02-08 05:20:59 +00003856
3857 if (discard_on_error && thread_plan_sp)
3858 {
3859 exe_ctx.thread->DiscardThreadPlansUpToPlan (thread_plan_sp);
Jim Ingham4b536182011-08-09 02:12:22 +00003860 thread_plan_sp->SetPrivate (orig_plan_private);
Jim Ingham0f16e732011-02-08 05:20:59 +00003861 }
3862 }
3863 else
3864 {
Jim Inghamf48169b2010-11-30 02:22:11 +00003865 if (exe_ctx.thread->IsThreadPlanDone (thread_plan_sp.get()))
3866 {
Greg Clayton414f5d32011-01-25 02:58:48 +00003867 if (log)
Jim Ingham20829ac2011-08-09 22:24:33 +00003868 log->PutCString("Process::RunThreadPlan(): thread plan is done");
Greg Claytone0d378b2011-03-24 21:19:54 +00003869 return_value = eExecutionCompleted;
Jim Inghamf48169b2010-11-30 02:22:11 +00003870 }
3871 else if (exe_ctx.thread->WasThreadPlanDiscarded (thread_plan_sp.get()))
3872 {
Greg Clayton414f5d32011-01-25 02:58:48 +00003873 if (log)
Jim Ingham20829ac2011-08-09 22:24:33 +00003874 log->PutCString("Process::RunThreadPlan(): thread plan was discarded");
Greg Claytone0d378b2011-03-24 21:19:54 +00003875 return_value = eExecutionDiscarded;
Jim Inghamf48169b2010-11-30 02:22:11 +00003876 }
3877 else
3878 {
3879 if (log)
Jim Ingham20829ac2011-08-09 22:24:33 +00003880 log->PutCString("Process::RunThreadPlan(): thread plan stopped in mid course");
Jim Inghamf48169b2010-11-30 02:22:11 +00003881 if (discard_on_error && thread_plan_sp)
3882 {
Jim Ingham0f16e732011-02-08 05:20:59 +00003883 if (log)
Jim Ingham20829ac2011-08-09 22:24:33 +00003884 log->PutCString("Process::RunThreadPlan(): discarding thread plan 'cause discard_on_error is set.");
Jim Inghamf48169b2010-11-30 02:22:11 +00003885 exe_ctx.thread->DiscardThreadPlansUpToPlan (thread_plan_sp);
Jim Ingham4b536182011-08-09 02:12:22 +00003886 thread_plan_sp->SetPrivate (orig_plan_private);
Jim Inghamf48169b2010-11-30 02:22:11 +00003887 }
Jim Inghamf48169b2010-11-30 02:22:11 +00003888 }
3889 }
Jim Ingham0f16e732011-02-08 05:20:59 +00003890
Jim Inghamf48169b2010-11-30 02:22:11 +00003891 // Thread we ran the function in may have gone away because we ran the target
Jim Ingham66243842011-08-13 00:56:10 +00003892 // Check that it's still there, and if it is put it back in the context. Also restore the
3893 // frame in the context if it is still present.
Greg Clayton92bb12c2011-05-19 18:17:41 +00003894 exe_ctx.thread = exe_ctx.process->GetThreadList().FindThreadByIndexID(thread_idx_id, true).get();
Jim Inghamf48169b2010-11-30 02:22:11 +00003895 if (exe_ctx.thread)
Jim Ingham66243842011-08-13 00:56:10 +00003896 {
3897 exe_ctx.frame = exe_ctx.thread->GetFrameWithStackID (ctx_frame_id).get();
3898 }
Jim Inghamf48169b2010-11-30 02:22:11 +00003899
3900 // Also restore the current process'es selected frame & thread, since this function calling may
3901 // be done behind the user's back.
3902
3903 if (selected_tid != LLDB_INVALID_THREAD_ID)
3904 {
Jim Ingham66243842011-08-13 00:56:10 +00003905 if (exe_ctx.process->GetThreadList().SetSelectedThreadByIndexID (selected_tid) && selected_stack_id.IsValid())
Jim Inghamf48169b2010-11-30 02:22:11 +00003906 {
3907 // We were able to restore the selected thread, now restore the frame:
Jim Ingham66243842011-08-13 00:56:10 +00003908 StackFrameSP old_frame_sp = exe_ctx.process->GetThreadList().GetSelectedThread()->GetFrameWithStackID(selected_stack_id);
3909 if (old_frame_sp)
3910 exe_ctx.process->GetThreadList().GetSelectedThread()->SetSelectedFrame(old_frame_sp.get());
Jim Inghamf48169b2010-11-30 02:22:11 +00003911 }
3912 }
3913
3914 return return_value;
3915}
3916
3917const char *
3918Process::ExecutionResultAsCString (ExecutionResults result)
3919{
3920 const char *result_name;
3921
3922 switch (result)
3923 {
Greg Claytone0d378b2011-03-24 21:19:54 +00003924 case eExecutionCompleted:
Jim Inghamf48169b2010-11-30 02:22:11 +00003925 result_name = "eExecutionCompleted";
3926 break;
Greg Claytone0d378b2011-03-24 21:19:54 +00003927 case eExecutionDiscarded:
Jim Inghamf48169b2010-11-30 02:22:11 +00003928 result_name = "eExecutionDiscarded";
3929 break;
Greg Claytone0d378b2011-03-24 21:19:54 +00003930 case eExecutionInterrupted:
Jim Inghamf48169b2010-11-30 02:22:11 +00003931 result_name = "eExecutionInterrupted";
3932 break;
Greg Claytone0d378b2011-03-24 21:19:54 +00003933 case eExecutionSetupError:
Jim Inghamf48169b2010-11-30 02:22:11 +00003934 result_name = "eExecutionSetupError";
3935 break;
Greg Claytone0d378b2011-03-24 21:19:54 +00003936 case eExecutionTimedOut:
Jim Inghamf48169b2010-11-30 02:22:11 +00003937 result_name = "eExecutionTimedOut";
3938 break;
3939 }
3940 return result_name;
3941}
3942
Greg Clayton7260f622011-04-18 08:33:37 +00003943void
3944Process::GetStatus (Stream &strm)
3945{
3946 const StateType state = GetState();
3947 if (StateIsStoppedState(state))
3948 {
3949 if (state == eStateExited)
3950 {
3951 int exit_status = GetExitStatus();
3952 const char *exit_description = GetExitDescription();
3953 strm.Printf ("Process %d exited with status = %i (0x%8.8x) %s\n",
3954 GetID(),
3955 exit_status,
3956 exit_status,
3957 exit_description ? exit_description : "");
3958 }
3959 else
3960 {
3961 if (state == eStateConnected)
3962 strm.Printf ("Connected to remote target.\n");
3963 else
3964 strm.Printf ("Process %d %s\n", GetID(), StateAsCString (state));
3965 }
3966 }
3967 else
3968 {
3969 strm.Printf ("Process %d is running.\n", GetID());
3970 }
3971}
3972
3973size_t
3974Process::GetThreadStatus (Stream &strm,
3975 bool only_threads_with_stop_reason,
3976 uint32_t start_frame,
3977 uint32_t num_frames,
3978 uint32_t num_frames_with_source)
3979{
3980 size_t num_thread_infos_dumped = 0;
3981
3982 const size_t num_threads = GetThreadList().GetSize();
3983 for (uint32_t i = 0; i < num_threads; i++)
3984 {
3985 Thread *thread = GetThreadList().GetThreadAtIndex(i).get();
3986 if (thread)
3987 {
3988 if (only_threads_with_stop_reason)
3989 {
3990 if (thread->GetStopInfo().get() == NULL)
3991 continue;
3992 }
3993 thread->GetStatus (strm,
3994 start_frame,
3995 num_frames,
3996 num_frames_with_source);
3997 ++num_thread_infos_dumped;
3998 }
3999 }
4000 return num_thread_infos_dumped;
4001}
4002
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004003//--------------------------------------------------------------
Greg Clayton1b654882010-09-19 02:33:57 +00004004// class Process::SettingsController
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004005//--------------------------------------------------------------
4006
Greg Clayton1b654882010-09-19 02:33:57 +00004007Process::SettingsController::SettingsController () :
Caroline Ticedaccaa92010-09-20 20:44:43 +00004008 UserSettingsController ("process", Target::GetSettingsController())
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004009{
Greg Clayton85851dd2010-12-04 00:10:17 +00004010 m_default_settings.reset (new ProcessInstanceSettings (*this,
4011 false,
Caroline Tice91123da2010-09-08 17:48:55 +00004012 InstanceSettings::GetDefaultName().AsCString()));
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004013}
4014
Greg Clayton1b654882010-09-19 02:33:57 +00004015Process::SettingsController::~SettingsController ()
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004016{
4017}
4018
4019lldb::InstanceSettingsSP
Greg Clayton1b654882010-09-19 02:33:57 +00004020Process::SettingsController::CreateInstanceSettings (const char *instance_name)
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004021{
Greg Claytondbe54502010-11-19 03:46:01 +00004022 ProcessInstanceSettings *new_settings = new ProcessInstanceSettings (*GetSettingsController(),
4023 false,
4024 instance_name);
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004025 lldb::InstanceSettingsSP new_settings_sp (new_settings);
4026 return new_settings_sp;
4027}
4028
4029//--------------------------------------------------------------
4030// class ProcessInstanceSettings
4031//--------------------------------------------------------------
4032
Greg Clayton85851dd2010-12-04 00:10:17 +00004033ProcessInstanceSettings::ProcessInstanceSettings
4034(
4035 UserSettingsController &owner,
4036 bool live_instance,
4037 const char *name
4038) :
4039 InstanceSettings (owner, name ? name : InstanceSettings::InvalidName().AsCString(), live_instance),
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004040 m_run_args (),
4041 m_env_vars (),
4042 m_input_path (),
4043 m_output_path (),
4044 m_error_path (),
Caroline Ticef8da8632010-12-03 18:46:09 +00004045 m_disable_aslr (true),
Greg Clayton85851dd2010-12-04 00:10:17 +00004046 m_disable_stdio (false),
4047 m_inherit_host_env (true),
4048 m_got_host_env (false)
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004049{
Caroline Ticef20e8232010-09-09 18:26:37 +00004050 // CopyInstanceSettings is a pure virtual function in InstanceSettings; it therefore cannot be called
4051 // until the vtables for ProcessInstanceSettings are properly set up, i.e. AFTER all the initializers.
4052 // For this reason it has to be called here, rather than in the initializer or in the parent constructor.
Caroline Tice9e41c152010-09-16 19:05:55 +00004053 // This is true for CreateInstanceName() too.
4054
4055 if (GetInstanceName () == InstanceSettings::InvalidName())
4056 {
4057 ChangeInstanceName (std::string (CreateInstanceName().AsCString()));
4058 m_owner.RegisterInstanceSettings (this);
4059 }
Caroline Ticef20e8232010-09-09 18:26:37 +00004060
4061 if (live_instance)
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004062 {
4063 const lldb::InstanceSettingsSP &pending_settings = m_owner.FindPendingSettings (m_instance_name);
4064 CopyInstanceSettings (pending_settings,false);
Caroline Ticef20e8232010-09-09 18:26:37 +00004065 //m_owner.RemovePendingSettings (m_instance_name);
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004066 }
4067}
4068
4069ProcessInstanceSettings::ProcessInstanceSettings (const ProcessInstanceSettings &rhs) :
Greg Claytondbe54502010-11-19 03:46:01 +00004070 InstanceSettings (*Process::GetSettingsController(), CreateInstanceName().AsCString()),
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004071 m_run_args (rhs.m_run_args),
4072 m_env_vars (rhs.m_env_vars),
4073 m_input_path (rhs.m_input_path),
4074 m_output_path (rhs.m_output_path),
4075 m_error_path (rhs.m_error_path),
Caroline Ticef8da8632010-12-03 18:46:09 +00004076 m_disable_aslr (rhs.m_disable_aslr),
4077 m_disable_stdio (rhs.m_disable_stdio)
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004078{
4079 if (m_instance_name != InstanceSettings::GetDefaultName())
4080 {
4081 const lldb::InstanceSettingsSP &pending_settings = m_owner.FindPendingSettings (m_instance_name);
4082 CopyInstanceSettings (pending_settings,false);
4083 m_owner.RemovePendingSettings (m_instance_name);
4084 }
4085}
4086
4087ProcessInstanceSettings::~ProcessInstanceSettings ()
4088{
4089}
4090
4091ProcessInstanceSettings&
4092ProcessInstanceSettings::operator= (const ProcessInstanceSettings &rhs)
4093{
4094 if (this != &rhs)
4095 {
4096 m_run_args = rhs.m_run_args;
4097 m_env_vars = rhs.m_env_vars;
4098 m_input_path = rhs.m_input_path;
4099 m_output_path = rhs.m_output_path;
4100 m_error_path = rhs.m_error_path;
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004101 m_disable_aslr = rhs.m_disable_aslr;
Caroline Ticef8da8632010-12-03 18:46:09 +00004102 m_disable_stdio = rhs.m_disable_stdio;
Greg Clayton85851dd2010-12-04 00:10:17 +00004103 m_inherit_host_env = rhs.m_inherit_host_env;
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004104 }
4105
4106 return *this;
4107}
4108
4109
4110void
4111ProcessInstanceSettings::UpdateInstanceSettingsVariable (const ConstString &var_name,
4112 const char *index_value,
4113 const char *value,
4114 const ConstString &instance_name,
4115 const SettingEntry &entry,
Greg Claytone0d378b2011-03-24 21:19:54 +00004116 VarSetOperationType op,
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004117 Error &err,
4118 bool pending)
4119{
4120 if (var_name == RunArgsVarName())
4121 UserSettingsController::UpdateStringArrayVariable (op, index_value, m_run_args, value, err);
4122 else if (var_name == EnvVarsVarName())
Greg Clayton85851dd2010-12-04 00:10:17 +00004123 {
Greg Clayton8b82f082011-04-12 05:54:46 +00004124 // This is nice for local debugging, but it is isn't correct for
4125 // remote debugging. We need to stop process.env-vars from being
4126 // populated with the host environment and add this as a launch option
4127 // and get the correct environment from the Target's platform.
4128 // GetHostEnvironmentIfNeeded ();
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004129 UserSettingsController::UpdateDictionaryVariable (op, index_value, m_env_vars, value, err);
Greg Clayton85851dd2010-12-04 00:10:17 +00004130 }
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004131 else if (var_name == InputPathVarName())
4132 UserSettingsController::UpdateStringVariable (op, m_input_path, value, err);
4133 else if (var_name == OutputPathVarName())
4134 UserSettingsController::UpdateStringVariable (op, m_output_path, value, err);
4135 else if (var_name == ErrorPathVarName())
4136 UserSettingsController::UpdateStringVariable (op, m_error_path, value, err);
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004137 else if (var_name == DisableASLRVarName())
Greg Clayton385aa282011-04-22 03:55:06 +00004138 UserSettingsController::UpdateBooleanVariable (op, m_disable_aslr, value, true, err);
Caroline Ticef8da8632010-12-03 18:46:09 +00004139 else if (var_name == DisableSTDIOVarName ())
Greg Clayton385aa282011-04-22 03:55:06 +00004140 UserSettingsController::UpdateBooleanVariable (op, m_disable_stdio, value, false, err);
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004141}
4142
4143void
4144ProcessInstanceSettings::CopyInstanceSettings (const lldb::InstanceSettingsSP &new_settings,
4145 bool pending)
4146{
4147 if (new_settings.get() == NULL)
4148 return;
4149
4150 ProcessInstanceSettings *new_process_settings = (ProcessInstanceSettings *) new_settings.get();
4151
4152 m_run_args = new_process_settings->m_run_args;
4153 m_env_vars = new_process_settings->m_env_vars;
4154 m_input_path = new_process_settings->m_input_path;
4155 m_output_path = new_process_settings->m_output_path;
4156 m_error_path = new_process_settings->m_error_path;
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004157 m_disable_aslr = new_process_settings->m_disable_aslr;
Caroline Ticef8da8632010-12-03 18:46:09 +00004158 m_disable_stdio = new_process_settings->m_disable_stdio;
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004159}
4160
Caroline Tice12cecd72010-09-20 21:37:42 +00004161bool
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004162ProcessInstanceSettings::GetInstanceSettingsValue (const SettingEntry &entry,
4163 const ConstString &var_name,
Caroline Ticedaccaa92010-09-20 20:44:43 +00004164 StringList &value,
Caroline Tice12cecd72010-09-20 21:37:42 +00004165 Error *err)
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004166{
4167 if (var_name == RunArgsVarName())
4168 {
4169 if (m_run_args.GetArgumentCount() > 0)
Greg Claytona52c1552010-09-14 03:47:41 +00004170 {
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004171 for (int i = 0; i < m_run_args.GetArgumentCount(); ++i)
4172 value.AppendString (m_run_args.GetArgumentAtIndex (i));
Greg Claytona52c1552010-09-14 03:47:41 +00004173 }
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004174 }
4175 else if (var_name == EnvVarsVarName())
4176 {
Greg Clayton85851dd2010-12-04 00:10:17 +00004177 GetHostEnvironmentIfNeeded ();
4178
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004179 if (m_env_vars.size() > 0)
4180 {
4181 std::map<std::string, std::string>::iterator pos;
4182 for (pos = m_env_vars.begin(); pos != m_env_vars.end(); ++pos)
4183 {
4184 StreamString value_str;
4185 value_str.Printf ("%s=%s", pos->first.c_str(), pos->second.c_str());
4186 value.AppendString (value_str.GetData());
4187 }
4188 }
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004189 }
4190 else if (var_name == InputPathVarName())
4191 {
4192 value.AppendString (m_input_path.c_str());
4193 }
4194 else if (var_name == OutputPathVarName())
4195 {
4196 value.AppendString (m_output_path.c_str());
4197 }
4198 else if (var_name == ErrorPathVarName())
4199 {
4200 value.AppendString (m_error_path.c_str());
4201 }
Greg Clayton5c5f1a12010-12-04 00:12:24 +00004202 else if (var_name == InheritHostEnvVarName())
4203 {
4204 if (m_inherit_host_env)
4205 value.AppendString ("true");
4206 else
4207 value.AppendString ("false");
4208 }
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004209 else if (var_name == DisableASLRVarName())
4210 {
4211 if (m_disable_aslr)
4212 value.AppendString ("true");
4213 else
4214 value.AppendString ("false");
4215 }
Caroline Ticef8da8632010-12-03 18:46:09 +00004216 else if (var_name == DisableSTDIOVarName())
4217 {
4218 if (m_disable_stdio)
4219 value.AppendString ("true");
4220 else
4221 value.AppendString ("false");
4222 }
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004223 else
Caroline Tice12cecd72010-09-20 21:37:42 +00004224 {
4225 if (err)
4226 err->SetErrorStringWithFormat ("unrecognized variable name '%s'", var_name.AsCString());
4227 return false;
4228 }
4229 return true;
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004230}
4231
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004232const ConstString
4233ProcessInstanceSettings::CreateInstanceName ()
4234{
4235 static int instance_count = 1;
4236 StreamString sstr;
4237
4238 sstr.Printf ("process_%d", instance_count);
4239 ++instance_count;
4240
4241 const ConstString ret_val (sstr.GetData());
4242 return ret_val;
4243}
4244
4245const ConstString &
4246ProcessInstanceSettings::RunArgsVarName ()
4247{
4248 static ConstString run_args_var_name ("run-args");
4249
4250 return run_args_var_name;
4251}
4252
4253const ConstString &
4254ProcessInstanceSettings::EnvVarsVarName ()
4255{
4256 static ConstString env_vars_var_name ("env-vars");
4257
4258 return env_vars_var_name;
4259}
4260
4261const ConstString &
Greg Clayton85851dd2010-12-04 00:10:17 +00004262ProcessInstanceSettings::InheritHostEnvVarName ()
4263{
4264 static ConstString g_name ("inherit-env");
4265
4266 return g_name;
4267}
4268
4269const ConstString &
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004270ProcessInstanceSettings::InputPathVarName ()
4271{
4272 static ConstString input_path_var_name ("input-path");
4273
4274 return input_path_var_name;
4275}
4276
4277const ConstString &
4278ProcessInstanceSettings::OutputPathVarName ()
4279{
Caroline Tice49e27372010-09-07 18:35:40 +00004280 static ConstString output_path_var_name ("output-path");
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004281
4282 return output_path_var_name;
4283}
4284
4285const ConstString &
4286ProcessInstanceSettings::ErrorPathVarName ()
4287{
Caroline Tice49e27372010-09-07 18:35:40 +00004288 static ConstString error_path_var_name ("error-path");
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004289
4290 return error_path_var_name;
4291}
4292
4293const ConstString &
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004294ProcessInstanceSettings::DisableASLRVarName ()
4295{
4296 static ConstString disable_aslr_var_name ("disable-aslr");
4297
4298 return disable_aslr_var_name;
4299}
4300
Caroline Ticef8da8632010-12-03 18:46:09 +00004301const ConstString &
4302ProcessInstanceSettings::DisableSTDIOVarName ()
4303{
4304 static ConstString disable_stdio_var_name ("disable-stdio");
4305
4306 return disable_stdio_var_name;
4307}
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004308
4309//--------------------------------------------------
Greg Clayton1b654882010-09-19 02:33:57 +00004310// SettingsController Variable Tables
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004311//--------------------------------------------------
4312
4313SettingEntry
Greg Clayton1b654882010-09-19 02:33:57 +00004314Process::SettingsController::global_settings_table[] =
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004315{
4316 //{ "var-name", var-type , "default", enum-table, init'd, hidden, "help-text"},
4317 { NULL, eSetVarTypeNone, NULL, NULL, 0, 0, NULL }
4318};
4319
4320
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004321SettingEntry
Greg Clayton1b654882010-09-19 02:33:57 +00004322Process::SettingsController::instance_settings_table[] =
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004323{
Greg Clayton85851dd2010-12-04 00:10:17 +00004324 //{ "var-name", var-type, "default", enum-table, init'd, hidden, "help-text"},
4325 { "run-args", eSetVarTypeArray, NULL, NULL, false, false, "A list containing all the arguments to be passed to the executable when it is run." },
4326 { "env-vars", eSetVarTypeDictionary, NULL, NULL, false, false, "A list of all the environment variables to be passed to the executable's environment, and their values." },
4327 { "inherit-env", eSetVarTypeBoolean, "true", NULL, false, false, "Inherit the environment from the process that is running LLDB." },
Greg Claytonbd82a5d2011-01-23 05:56:20 +00004328 { "input-path", eSetVarTypeString, NULL, NULL, false, false, "The file/path to be used by the executable program for reading its input." },
4329 { "output-path", eSetVarTypeString, NULL, NULL, false, false, "The file/path to be used by the executable program for writing its output." },
4330 { "error-path", eSetVarTypeString, NULL, NULL, false, false, "The file/path to be used by the executable program for writings its error messages." },
Greg Claytonbfe5f3b2011-02-18 01:44:25 +00004331 { "plugin", eSetVarTypeEnum, NULL, NULL, false, false, "The plugin to be used to run the process." },
Greg Clayton85851dd2010-12-04 00:10:17 +00004332 { "disable-aslr", eSetVarTypeBoolean, "true", NULL, false, false, "Disable Address Space Layout Randomization (ASLR)" },
4333 { "disable-stdio", eSetVarTypeBoolean, "false", NULL, false, false, "Disable stdin/stdout for process (e.g. for a GUI application)" },
4334 { NULL, eSetVarTypeNone, NULL, NULL, false, false, NULL }
Caroline Tice3df9a8d2010-09-04 00:03:46 +00004335};
4336
4337
Jim Ingham5aee1622010-08-09 23:31:02 +00004338