ProcessMachCore: Fix a -Wmisleading-indentation warning

llvm-svn: 366803
This commit is contained in:
Pavel Labath 2019-07-23 12:53:45 +00:00
parent 402bf28ecc
commit c4c25e11b1
1 changed files with 31 additions and 32 deletions

View File

@ -338,44 +338,43 @@ Status ProcessMachCore::DoLoadCore() {
"from LC_IDENT/LC_NOTE 'kern ver str' string: '%s'",
corefile_identifier.c_str());
// We're only given a UUID here, not a load address.
// But there are python scripts in the EFI binary's dSYM which
// know how to relocate the binary to the correct load address.
// lldb only needs to locate & load the binary + dSYM.
ModuleSpec module_spec;
module_spec.GetUUID() = uuid;
module_spec.GetArchitecture() = GetTarget().GetArchitecture();
// We're only given a UUID here, not a load address.
// But there are python scripts in the EFI binary's dSYM which
// know how to relocate the binary to the correct load address.
// lldb only needs to locate & load the binary + dSYM.
ModuleSpec module_spec;
module_spec.GetUUID() = uuid;
module_spec.GetArchitecture() = GetTarget().GetArchitecture();
// Lookup UUID locally, before attempting dsymForUUID like action
FileSpecList search_paths =
Target::GetDefaultDebugFileSearchPaths();
module_spec.GetSymbolFileSpec() =
Symbols::LocateExecutableSymbolFile(module_spec, search_paths);
if (module_spec.GetSymbolFileSpec()) {
ModuleSpec executable_module_spec =
Symbols::LocateExecutableObjectFile(module_spec);
if (FileSystem::Instance().Exists(executable_module_spec.GetFileSpec())) {
module_spec.GetFileSpec() =
executable_module_spec.GetFileSpec();
}
// Lookup UUID locally, before attempting dsymForUUID like action
FileSpecList search_paths = Target::GetDefaultDebugFileSearchPaths();
module_spec.GetSymbolFileSpec() =
Symbols::LocateExecutableSymbolFile(module_spec, search_paths);
if (module_spec.GetSymbolFileSpec()) {
ModuleSpec executable_module_spec =
Symbols::LocateExecutableObjectFile(module_spec);
if (FileSystem::Instance().Exists(
executable_module_spec.GetFileSpec())) {
module_spec.GetFileSpec() = executable_module_spec.GetFileSpec();
}
}
// Force a a dsymForUUID lookup, if that tool is available.
if (!module_spec.GetSymbolFileSpec())
Symbols::DownloadObjectAndSymbolFile(module_spec, true);
// Force a a dsymForUUID lookup, if that tool is available.
if (!module_spec.GetSymbolFileSpec())
Symbols::DownloadObjectAndSymbolFile(module_spec, true);
if (FileSystem::Instance().Exists(module_spec.GetFileSpec())) {
ModuleSP module_sp(new Module(module_spec));
if (module_sp.get() && module_sp->GetObjectFile()) {
// Get the current target executable
ModuleSP exe_module_sp(GetTarget().GetExecutableModule());
if (FileSystem::Instance().Exists(module_spec.GetFileSpec())) {
ModuleSP module_sp(new Module(module_spec));
if (module_sp.get() && module_sp->GetObjectFile()) {
// Get the current target executable
ModuleSP exe_module_sp(GetTarget().GetExecutableModule());
// Make sure you don't already have the right module loaded
// and they will be uniqued
if (exe_module_sp.get() != module_sp.get())
GetTarget().SetExecutableModule(module_sp, eLoadDependentsNo);
}
// Make sure you don't already have the right module loaded
// and they will be uniqued
if (exe_module_sp.get() != module_sp.get())
GetTarget().SetExecutableModule(module_sp, eLoadDependentsNo);
}
}
}
}