forked from OSchip/llvm-project
3278 lines
117 KiB
C++
3278 lines
117 KiB
C++
//===-- Target.cpp ----------------------------------------------*- C++ -*-===//
|
|
//
|
|
// The LLVM Compiler Infrastructure
|
|
//
|
|
// This file is distributed under the University of Illinois Open Source
|
|
// License. See LICENSE.TXT for details.
|
|
//
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
#include "lldb/lldb-python.h"
|
|
|
|
#include "lldb/Target/Target.h"
|
|
|
|
// C Includes
|
|
// C++ Includes
|
|
// Other libraries and framework includes
|
|
// Project includes
|
|
#include "lldb/Breakpoint/BreakpointResolver.h"
|
|
#include "lldb/Breakpoint/BreakpointResolverAddress.h"
|
|
#include "lldb/Breakpoint/BreakpointResolverFileLine.h"
|
|
#include "lldb/Breakpoint/BreakpointResolverFileRegex.h"
|
|
#include "lldb/Breakpoint/BreakpointResolverName.h"
|
|
#include "lldb/Breakpoint/Watchpoint.h"
|
|
#include "lldb/Core/Debugger.h"
|
|
#include "lldb/Core/Event.h"
|
|
#include "lldb/Core/Log.h"
|
|
#include "lldb/Core/Module.h"
|
|
#include "lldb/Core/ModuleSpec.h"
|
|
#include "lldb/Core/Section.h"
|
|
#include "lldb/Core/SourceManager.h"
|
|
#include "lldb/Core/State.h"
|
|
#include "lldb/Core/StreamFile.h"
|
|
#include "lldb/Core/StreamString.h"
|
|
#include "lldb/Core/Timer.h"
|
|
#include "lldb/Core/ValueObject.h"
|
|
#include "lldb/Expression/ClangASTSource.h"
|
|
#include "lldb/Expression/ClangUserExpression.h"
|
|
#include "lldb/Host/FileSpec.h"
|
|
#include "lldb/Host/Host.h"
|
|
#include "lldb/Interpreter/CommandInterpreter.h"
|
|
#include "lldb/Interpreter/CommandReturnObject.h"
|
|
#include "lldb/Interpreter/OptionGroupWatchpoint.h"
|
|
#include "lldb/Interpreter/OptionValues.h"
|
|
#include "lldb/Interpreter/Property.h"
|
|
#include "lldb/lldb-private-log.h"
|
|
#include "lldb/Symbol/ObjectFile.h"
|
|
#include "lldb/Target/Process.h"
|
|
#include "lldb/Target/SectionLoadList.h"
|
|
#include "lldb/Target/StackFrame.h"
|
|
#include "lldb/Target/SystemRuntime.h"
|
|
#include "lldb/Target/Thread.h"
|
|
#include "lldb/Target/ThreadSpec.h"
|
|
|
|
using namespace lldb;
|
|
using namespace lldb_private;
|
|
|
|
ConstString &
|
|
Target::GetStaticBroadcasterClass ()
|
|
{
|
|
static ConstString class_name ("lldb.target");
|
|
return class_name;
|
|
}
|
|
|
|
//----------------------------------------------------------------------
|
|
// Target constructor
|
|
//----------------------------------------------------------------------
|
|
Target::Target(Debugger &debugger, const ArchSpec &target_arch, const lldb::PlatformSP &platform_sp) :
|
|
TargetProperties (this),
|
|
Broadcaster (&debugger, Target::GetStaticBroadcasterClass().AsCString()),
|
|
ExecutionContextScope (),
|
|
m_debugger (debugger),
|
|
m_platform_sp (platform_sp),
|
|
m_mutex (Mutex::eMutexTypeRecursive),
|
|
m_arch (target_arch),
|
|
m_images (this),
|
|
m_section_load_history (),
|
|
m_breakpoint_list (false),
|
|
m_internal_breakpoint_list (true),
|
|
m_watchpoint_list (),
|
|
m_process_sp (),
|
|
m_search_filter_sp (),
|
|
m_image_search_paths (ImageSearchPathsChanged, this),
|
|
m_scratch_ast_context_ap (),
|
|
m_scratch_ast_source_ap (),
|
|
m_ast_importer_ap (),
|
|
m_persistent_variables (),
|
|
m_source_manager_ap(),
|
|
m_stop_hooks (),
|
|
m_stop_hook_next_id (0),
|
|
m_valid (true),
|
|
m_suppress_stop_hooks (false)
|
|
{
|
|
SetEventName (eBroadcastBitBreakpointChanged, "breakpoint-changed");
|
|
SetEventName (eBroadcastBitModulesLoaded, "modules-loaded");
|
|
SetEventName (eBroadcastBitModulesUnloaded, "modules-unloaded");
|
|
SetEventName (eBroadcastBitWatchpointChanged, "watchpoint-changed");
|
|
SetEventName (eBroadcastBitSymbolsLoaded, "symbols-loaded");
|
|
|
|
CheckInWithManager();
|
|
|
|
Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_OBJECT));
|
|
if (log)
|
|
log->Printf ("%p Target::Target()", static_cast<void*>(this));
|
|
if (m_arch.IsValid())
|
|
{
|
|
LogIfAnyCategoriesSet(LIBLLDB_LOG_TARGET, "Target::Target created with architecture %s (%s)", m_arch.GetArchitectureName(), m_arch.GetTriple().getTriple().c_str());
|
|
}
|
|
}
|
|
|
|
//----------------------------------------------------------------------
|
|
// Destructor
|
|
//----------------------------------------------------------------------
|
|
Target::~Target()
|
|
{
|
|
Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_OBJECT));
|
|
if (log)
|
|
log->Printf ("%p Target::~Target()", static_cast<void*>(this));
|
|
DeleteCurrentProcess ();
|
|
}
|
|
|
|
void
|
|
Target::Dump (Stream *s, lldb::DescriptionLevel description_level)
|
|
{
|
|
// s->Printf("%.*p: ", (int)sizeof(void*) * 2, this);
|
|
if (description_level != lldb::eDescriptionLevelBrief)
|
|
{
|
|
s->Indent();
|
|
s->PutCString("Target\n");
|
|
s->IndentMore();
|
|
m_images.Dump(s);
|
|
m_breakpoint_list.Dump(s);
|
|
m_internal_breakpoint_list.Dump(s);
|
|
s->IndentLess();
|
|
}
|
|
else
|
|
{
|
|
Module *exe_module = GetExecutableModulePointer();
|
|
if (exe_module)
|
|
s->PutCString (exe_module->GetFileSpec().GetFilename().GetCString());
|
|
else
|
|
s->PutCString ("No executable module.");
|
|
}
|
|
}
|
|
|
|
void
|
|
Target::CleanupProcess ()
|
|
{
|
|
// Do any cleanup of the target we need to do between process instances.
|
|
// NB It is better to do this before destroying the process in case the
|
|
// clean up needs some help from the process.
|
|
m_breakpoint_list.ClearAllBreakpointSites();
|
|
m_internal_breakpoint_list.ClearAllBreakpointSites();
|
|
// Disable watchpoints just on the debugger side.
|
|
Mutex::Locker locker;
|
|
this->GetWatchpointList().GetListMutex(locker);
|
|
DisableAllWatchpoints(false);
|
|
ClearAllWatchpointHitCounts();
|
|
}
|
|
|
|
void
|
|
Target::DeleteCurrentProcess ()
|
|
{
|
|
if (m_process_sp.get())
|
|
{
|
|
m_section_load_history.Clear();
|
|
if (m_process_sp->IsAlive())
|
|
m_process_sp->Destroy();
|
|
|
|
m_process_sp->Finalize();
|
|
|
|
CleanupProcess ();
|
|
|
|
m_process_sp.reset();
|
|
}
|
|
}
|
|
|
|
const lldb::ProcessSP &
|
|
Target::CreateProcess (Listener &listener, const char *plugin_name, const FileSpec *crash_file)
|
|
{
|
|
DeleteCurrentProcess ();
|
|
m_process_sp = Process::FindPlugin(*this, plugin_name, listener, crash_file);
|
|
return m_process_sp;
|
|
}
|
|
|
|
const lldb::ProcessSP &
|
|
Target::GetProcessSP () const
|
|
{
|
|
return m_process_sp;
|
|
}
|
|
|
|
void
|
|
Target::Destroy()
|
|
{
|
|
Mutex::Locker locker (m_mutex);
|
|
m_valid = false;
|
|
DeleteCurrentProcess ();
|
|
m_platform_sp.reset();
|
|
m_arch.Clear();
|
|
ClearModules(true);
|
|
m_section_load_history.Clear();
|
|
const bool notify = false;
|
|
m_breakpoint_list.RemoveAll(notify);
|
|
m_internal_breakpoint_list.RemoveAll(notify);
|
|
m_last_created_breakpoint.reset();
|
|
m_last_created_watchpoint.reset();
|
|
m_search_filter_sp.reset();
|
|
m_image_search_paths.Clear(notify);
|
|
m_persistent_variables.Clear();
|
|
m_stop_hooks.clear();
|
|
m_stop_hook_next_id = 0;
|
|
m_suppress_stop_hooks = false;
|
|
}
|
|
|
|
|
|
BreakpointList &
|
|
Target::GetBreakpointList(bool internal)
|
|
{
|
|
if (internal)
|
|
return m_internal_breakpoint_list;
|
|
else
|
|
return m_breakpoint_list;
|
|
}
|
|
|
|
const BreakpointList &
|
|
Target::GetBreakpointList(bool internal) const
|
|
{
|
|
if (internal)
|
|
return m_internal_breakpoint_list;
|
|
else
|
|
return m_breakpoint_list;
|
|
}
|
|
|
|
BreakpointSP
|
|
Target::GetBreakpointByID (break_id_t break_id)
|
|
{
|
|
BreakpointSP bp_sp;
|
|
|
|
if (LLDB_BREAK_ID_IS_INTERNAL (break_id))
|
|
bp_sp = m_internal_breakpoint_list.FindBreakpointByID (break_id);
|
|
else
|
|
bp_sp = m_breakpoint_list.FindBreakpointByID (break_id);
|
|
|
|
return bp_sp;
|
|
}
|
|
|
|
BreakpointSP
|
|
Target::CreateSourceRegexBreakpoint (const FileSpecList *containingModules,
|
|
const FileSpecList *source_file_spec_list,
|
|
RegularExpression &source_regex,
|
|
bool internal,
|
|
bool hardware)
|
|
{
|
|
SearchFilterSP filter_sp(GetSearchFilterForModuleAndCUList (containingModules, source_file_spec_list));
|
|
BreakpointResolverSP resolver_sp(new BreakpointResolverFileRegex (NULL, source_regex));
|
|
return CreateBreakpoint (filter_sp, resolver_sp, internal, hardware, true);
|
|
}
|
|
|
|
|
|
BreakpointSP
|
|
Target::CreateBreakpoint (const FileSpecList *containingModules,
|
|
const FileSpec &file,
|
|
uint32_t line_no,
|
|
LazyBool check_inlines,
|
|
LazyBool skip_prologue,
|
|
bool internal,
|
|
bool hardware)
|
|
{
|
|
if (check_inlines == eLazyBoolCalculate)
|
|
{
|
|
const InlineStrategy inline_strategy = GetInlineStrategy();
|
|
switch (inline_strategy)
|
|
{
|
|
case eInlineBreakpointsNever:
|
|
check_inlines = eLazyBoolNo;
|
|
break;
|
|
|
|
case eInlineBreakpointsHeaders:
|
|
if (file.IsSourceImplementationFile())
|
|
check_inlines = eLazyBoolNo;
|
|
else
|
|
check_inlines = eLazyBoolYes;
|
|
break;
|
|
|
|
case eInlineBreakpointsAlways:
|
|
check_inlines = eLazyBoolYes;
|
|
break;
|
|
}
|
|
}
|
|
SearchFilterSP filter_sp;
|
|
if (check_inlines == eLazyBoolNo)
|
|
{
|
|
// Not checking for inlines, we are looking only for matching compile units
|
|
FileSpecList compile_unit_list;
|
|
compile_unit_list.Append (file);
|
|
filter_sp = GetSearchFilterForModuleAndCUList (containingModules, &compile_unit_list);
|
|
}
|
|
else
|
|
{
|
|
filter_sp = GetSearchFilterForModuleList (containingModules);
|
|
}
|
|
if (skip_prologue == eLazyBoolCalculate)
|
|
skip_prologue = GetSkipPrologue() ? eLazyBoolYes : eLazyBoolNo;
|
|
|
|
BreakpointResolverSP resolver_sp(new BreakpointResolverFileLine (NULL,
|
|
file,
|
|
line_no,
|
|
check_inlines,
|
|
skip_prologue));
|
|
return CreateBreakpoint (filter_sp, resolver_sp, internal, hardware, true);
|
|
}
|
|
|
|
|
|
BreakpointSP
|
|
Target::CreateBreakpoint (lldb::addr_t addr, bool internal, bool hardware)
|
|
{
|
|
Address so_addr;
|
|
// Attempt to resolve our load address if possible, though it is ok if
|
|
// it doesn't resolve to section/offset.
|
|
|
|
// Try and resolve as a load address if possible
|
|
GetSectionLoadList().ResolveLoadAddress(addr, so_addr);
|
|
if (!so_addr.IsValid())
|
|
{
|
|
// The address didn't resolve, so just set this as an absolute address
|
|
so_addr.SetOffset (addr);
|
|
}
|
|
BreakpointSP bp_sp (CreateBreakpoint(so_addr, internal, hardware));
|
|
return bp_sp;
|
|
}
|
|
|
|
BreakpointSP
|
|
Target::CreateBreakpoint (Address &addr, bool internal, bool hardware)
|
|
{
|
|
SearchFilterSP filter_sp(new SearchFilterForNonModuleSpecificSearches (shared_from_this()));
|
|
BreakpointResolverSP resolver_sp (new BreakpointResolverAddress (NULL, addr));
|
|
return CreateBreakpoint (filter_sp, resolver_sp, internal, hardware, false);
|
|
}
|
|
|
|
BreakpointSP
|
|
Target::CreateBreakpoint (const FileSpecList *containingModules,
|
|
const FileSpecList *containingSourceFiles,
|
|
const char *func_name,
|
|
uint32_t func_name_type_mask,
|
|
LazyBool skip_prologue,
|
|
bool internal,
|
|
bool hardware)
|
|
{
|
|
BreakpointSP bp_sp;
|
|
if (func_name)
|
|
{
|
|
SearchFilterSP filter_sp(GetSearchFilterForModuleAndCUList (containingModules, containingSourceFiles));
|
|
|
|
if (skip_prologue == eLazyBoolCalculate)
|
|
skip_prologue = GetSkipPrologue() ? eLazyBoolYes : eLazyBoolNo;
|
|
|
|
BreakpointResolverSP resolver_sp (new BreakpointResolverName (NULL,
|
|
func_name,
|
|
func_name_type_mask,
|
|
Breakpoint::Exact,
|
|
skip_prologue));
|
|
bp_sp = CreateBreakpoint (filter_sp, resolver_sp, internal, hardware, true);
|
|
}
|
|
return bp_sp;
|
|
}
|
|
|
|
lldb::BreakpointSP
|
|
Target::CreateBreakpoint (const FileSpecList *containingModules,
|
|
const FileSpecList *containingSourceFiles,
|
|
const std::vector<std::string> &func_names,
|
|
uint32_t func_name_type_mask,
|
|
LazyBool skip_prologue,
|
|
bool internal,
|
|
bool hardware)
|
|
{
|
|
BreakpointSP bp_sp;
|
|
size_t num_names = func_names.size();
|
|
if (num_names > 0)
|
|
{
|
|
SearchFilterSP filter_sp(GetSearchFilterForModuleAndCUList (containingModules, containingSourceFiles));
|
|
|
|
if (skip_prologue == eLazyBoolCalculate)
|
|
skip_prologue = GetSkipPrologue() ? eLazyBoolYes : eLazyBoolNo;
|
|
|
|
BreakpointResolverSP resolver_sp (new BreakpointResolverName (NULL,
|
|
func_names,
|
|
func_name_type_mask,
|
|
skip_prologue));
|
|
bp_sp = CreateBreakpoint (filter_sp, resolver_sp, internal, hardware, true);
|
|
}
|
|
return bp_sp;
|
|
}
|
|
|
|
BreakpointSP
|
|
Target::CreateBreakpoint (const FileSpecList *containingModules,
|
|
const FileSpecList *containingSourceFiles,
|
|
const char *func_names[],
|
|
size_t num_names,
|
|
uint32_t func_name_type_mask,
|
|
LazyBool skip_prologue,
|
|
bool internal,
|
|
bool hardware)
|
|
{
|
|
BreakpointSP bp_sp;
|
|
if (num_names > 0)
|
|
{
|
|
SearchFilterSP filter_sp(GetSearchFilterForModuleAndCUList (containingModules, containingSourceFiles));
|
|
|
|
if (skip_prologue == eLazyBoolCalculate)
|
|
skip_prologue = GetSkipPrologue() ? eLazyBoolYes : eLazyBoolNo;
|
|
|
|
BreakpointResolverSP resolver_sp (new BreakpointResolverName (NULL,
|
|
func_names,
|
|
num_names,
|
|
func_name_type_mask,
|
|
skip_prologue));
|
|
bp_sp = CreateBreakpoint (filter_sp, resolver_sp, internal, hardware, true);
|
|
}
|
|
return bp_sp;
|
|
}
|
|
|
|
SearchFilterSP
|
|
Target::GetSearchFilterForModule (const FileSpec *containingModule)
|
|
{
|
|
SearchFilterSP filter_sp;
|
|
if (containingModule != NULL)
|
|
{
|
|
// TODO: We should look into sharing module based search filters
|
|
// across many breakpoints like we do for the simple target based one
|
|
filter_sp.reset (new SearchFilterByModule (shared_from_this(), *containingModule));
|
|
}
|
|
else
|
|
{
|
|
if (m_search_filter_sp.get() == NULL)
|
|
m_search_filter_sp.reset (new SearchFilterForNonModuleSpecificSearches (shared_from_this()));
|
|
filter_sp = m_search_filter_sp;
|
|
}
|
|
return filter_sp;
|
|
}
|
|
|
|
SearchFilterSP
|
|
Target::GetSearchFilterForModuleList (const FileSpecList *containingModules)
|
|
{
|
|
SearchFilterSP filter_sp;
|
|
if (containingModules && containingModules->GetSize() != 0)
|
|
{
|
|
// TODO: We should look into sharing module based search filters
|
|
// across many breakpoints like we do for the simple target based one
|
|
filter_sp.reset (new SearchFilterByModuleList (shared_from_this(), *containingModules));
|
|
}
|
|
else
|
|
{
|
|
if (m_search_filter_sp.get() == NULL)
|
|
m_search_filter_sp.reset (new SearchFilterForNonModuleSpecificSearches (shared_from_this()));
|
|
filter_sp = m_search_filter_sp;
|
|
}
|
|
return filter_sp;
|
|
}
|
|
|
|
SearchFilterSP
|
|
Target::GetSearchFilterForModuleAndCUList (const FileSpecList *containingModules,
|
|
const FileSpecList *containingSourceFiles)
|
|
{
|
|
if (containingSourceFiles == NULL || containingSourceFiles->GetSize() == 0)
|
|
return GetSearchFilterForModuleList(containingModules);
|
|
|
|
SearchFilterSP filter_sp;
|
|
if (containingModules == NULL)
|
|
{
|
|
// We could make a special "CU List only SearchFilter". Better yet was if these could be composable,
|
|
// but that will take a little reworking.
|
|
|
|
filter_sp.reset (new SearchFilterByModuleListAndCU (shared_from_this(), FileSpecList(), *containingSourceFiles));
|
|
}
|
|
else
|
|
{
|
|
filter_sp.reset (new SearchFilterByModuleListAndCU (shared_from_this(), *containingModules, *containingSourceFiles));
|
|
}
|
|
return filter_sp;
|
|
}
|
|
|
|
BreakpointSP
|
|
Target::CreateFuncRegexBreakpoint (const FileSpecList *containingModules,
|
|
const FileSpecList *containingSourceFiles,
|
|
RegularExpression &func_regex,
|
|
LazyBool skip_prologue,
|
|
bool internal,
|
|
bool hardware)
|
|
{
|
|
SearchFilterSP filter_sp(GetSearchFilterForModuleAndCUList (containingModules, containingSourceFiles));
|
|
bool skip =
|
|
(skip_prologue == eLazyBoolCalculate) ? GetSkipPrologue()
|
|
: static_cast<bool>(skip_prologue);
|
|
BreakpointResolverSP resolver_sp(new BreakpointResolverName (NULL,
|
|
func_regex,
|
|
skip));
|
|
|
|
return CreateBreakpoint (filter_sp, resolver_sp, internal, hardware, true);
|
|
}
|
|
|
|
lldb::BreakpointSP
|
|
Target::CreateExceptionBreakpoint (enum lldb::LanguageType language, bool catch_bp, bool throw_bp, bool internal)
|
|
{
|
|
return LanguageRuntime::CreateExceptionBreakpoint (*this, language, catch_bp, throw_bp, internal);
|
|
}
|
|
|
|
BreakpointSP
|
|
Target::CreateBreakpoint (SearchFilterSP &filter_sp, BreakpointResolverSP &resolver_sp, bool internal, bool request_hardware, bool resolve_indirect_symbols)
|
|
{
|
|
BreakpointSP bp_sp;
|
|
if (filter_sp && resolver_sp)
|
|
{
|
|
bp_sp.reset(new Breakpoint (*this, filter_sp, resolver_sp, request_hardware, resolve_indirect_symbols));
|
|
resolver_sp->SetBreakpoint (bp_sp.get());
|
|
|
|
if (internal)
|
|
m_internal_breakpoint_list.Add (bp_sp, false);
|
|
else
|
|
m_breakpoint_list.Add (bp_sp, true);
|
|
|
|
Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_BREAKPOINTS));
|
|
if (log)
|
|
{
|
|
StreamString s;
|
|
bp_sp->GetDescription(&s, lldb::eDescriptionLevelVerbose);
|
|
log->Printf ("Target::%s (internal = %s) => break_id = %s\n", __FUNCTION__, internal ? "yes" : "no", s.GetData());
|
|
}
|
|
|
|
bp_sp->ResolveBreakpoint();
|
|
}
|
|
|
|
if (!internal && bp_sp)
|
|
{
|
|
m_last_created_breakpoint = bp_sp;
|
|
}
|
|
|
|
return bp_sp;
|
|
}
|
|
|
|
bool
|
|
Target::ProcessIsValid()
|
|
{
|
|
return (m_process_sp && m_process_sp->IsAlive());
|
|
}
|
|
|
|
static bool
|
|
CheckIfWatchpointsExhausted(Target *target, Error &error)
|
|
{
|
|
uint32_t num_supported_hardware_watchpoints;
|
|
Error rc = target->GetProcessSP()->GetWatchpointSupportInfo(num_supported_hardware_watchpoints);
|
|
if (rc.Success())
|
|
{
|
|
uint32_t num_current_watchpoints = target->GetWatchpointList().GetSize();
|
|
if (num_current_watchpoints >= num_supported_hardware_watchpoints)
|
|
error.SetErrorStringWithFormat("number of supported hardware watchpoints (%u) has been reached",
|
|
num_supported_hardware_watchpoints);
|
|
}
|
|
return false;
|
|
}
|
|
|
|
// See also Watchpoint::SetWatchpointType(uint32_t type) and
|
|
// the OptionGroupWatchpoint::WatchType enum type.
|
|
WatchpointSP
|
|
Target::CreateWatchpoint(lldb::addr_t addr, size_t size, const ClangASTType *type, uint32_t kind, Error &error)
|
|
{
|
|
Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_WATCHPOINTS));
|
|
if (log)
|
|
log->Printf("Target::%s (addr = 0x%8.8" PRIx64 " size = %" PRIu64 " type = %u)\n",
|
|
__FUNCTION__, addr, (uint64_t)size, kind);
|
|
|
|
WatchpointSP wp_sp;
|
|
if (!ProcessIsValid())
|
|
{
|
|
error.SetErrorString("process is not alive");
|
|
return wp_sp;
|
|
}
|
|
|
|
if (addr == LLDB_INVALID_ADDRESS || size == 0)
|
|
{
|
|
if (size == 0)
|
|
error.SetErrorString("cannot set a watchpoint with watch_size of 0");
|
|
else
|
|
error.SetErrorStringWithFormat("invalid watch address: %" PRIu64, addr);
|
|
return wp_sp;
|
|
}
|
|
|
|
if (!LLDB_WATCH_TYPE_IS_VALID(kind))
|
|
{
|
|
error.SetErrorStringWithFormat ("invalid watchpoint type: %d", kind);
|
|
}
|
|
|
|
// Currently we only support one watchpoint per address, with total number
|
|
// of watchpoints limited by the hardware which the inferior is running on.
|
|
|
|
// Grab the list mutex while doing operations.
|
|
const bool notify = false; // Don't notify about all the state changes we do on creating the watchpoint.
|
|
Mutex::Locker locker;
|
|
this->GetWatchpointList().GetListMutex(locker);
|
|
WatchpointSP matched_sp = m_watchpoint_list.FindByAddress(addr);
|
|
if (matched_sp)
|
|
{
|
|
size_t old_size = matched_sp->GetByteSize();
|
|
uint32_t old_type =
|
|
(matched_sp->WatchpointRead() ? LLDB_WATCH_TYPE_READ : 0) |
|
|
(matched_sp->WatchpointWrite() ? LLDB_WATCH_TYPE_WRITE : 0);
|
|
// Return the existing watchpoint if both size and type match.
|
|
if (size == old_size && kind == old_type)
|
|
{
|
|
wp_sp = matched_sp;
|
|
wp_sp->SetEnabled(false, notify);
|
|
}
|
|
else
|
|
{
|
|
// Nil the matched watchpoint; we will be creating a new one.
|
|
m_process_sp->DisableWatchpoint(matched_sp.get(), notify);
|
|
m_watchpoint_list.Remove(matched_sp->GetID(), true);
|
|
}
|
|
}
|
|
|
|
if (!wp_sp)
|
|
{
|
|
wp_sp.reset(new Watchpoint(*this, addr, size, type));
|
|
wp_sp->SetWatchpointType(kind, notify);
|
|
m_watchpoint_list.Add (wp_sp, true);
|
|
}
|
|
|
|
error = m_process_sp->EnableWatchpoint(wp_sp.get(), notify);
|
|
if (log)
|
|
log->Printf("Target::%s (creation of watchpoint %s with id = %u)\n",
|
|
__FUNCTION__,
|
|
error.Success() ? "succeeded" : "failed",
|
|
wp_sp->GetID());
|
|
|
|
if (error.Fail())
|
|
{
|
|
// Enabling the watchpoint on the device side failed.
|
|
// Remove the said watchpoint from the list maintained by the target instance.
|
|
m_watchpoint_list.Remove (wp_sp->GetID(), true);
|
|
// See if we could provide more helpful error message.
|
|
if (!CheckIfWatchpointsExhausted(this, error))
|
|
{
|
|
if (!OptionGroupWatchpoint::IsWatchSizeSupported(size))
|
|
error.SetErrorStringWithFormat("watch size of %" PRIu64 " is not supported", (uint64_t)size);
|
|
}
|
|
wp_sp.reset();
|
|
}
|
|
else
|
|
m_last_created_watchpoint = wp_sp;
|
|
return wp_sp;
|
|
}
|
|
|
|
void
|
|
Target::RemoveAllBreakpoints (bool internal_also)
|
|
{
|
|
Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_BREAKPOINTS));
|
|
if (log)
|
|
log->Printf ("Target::%s (internal_also = %s)\n", __FUNCTION__, internal_also ? "yes" : "no");
|
|
|
|
m_breakpoint_list.RemoveAll (true);
|
|
if (internal_also)
|
|
m_internal_breakpoint_list.RemoveAll (false);
|
|
|
|
m_last_created_breakpoint.reset();
|
|
}
|
|
|
|
void
|
|
Target::DisableAllBreakpoints (bool internal_also)
|
|
{
|
|
Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_BREAKPOINTS));
|
|
if (log)
|
|
log->Printf ("Target::%s (internal_also = %s)\n", __FUNCTION__, internal_also ? "yes" : "no");
|
|
|
|
m_breakpoint_list.SetEnabledAll (false);
|
|
if (internal_also)
|
|
m_internal_breakpoint_list.SetEnabledAll (false);
|
|
}
|
|
|
|
void
|
|
Target::EnableAllBreakpoints (bool internal_also)
|
|
{
|
|
Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_BREAKPOINTS));
|
|
if (log)
|
|
log->Printf ("Target::%s (internal_also = %s)\n", __FUNCTION__, internal_also ? "yes" : "no");
|
|
|
|
m_breakpoint_list.SetEnabledAll (true);
|
|
if (internal_also)
|
|
m_internal_breakpoint_list.SetEnabledAll (true);
|
|
}
|
|
|
|
bool
|
|
Target::RemoveBreakpointByID (break_id_t break_id)
|
|
{
|
|
Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_BREAKPOINTS));
|
|
if (log)
|
|
log->Printf ("Target::%s (break_id = %i, internal = %s)\n", __FUNCTION__, break_id, LLDB_BREAK_ID_IS_INTERNAL (break_id) ? "yes" : "no");
|
|
|
|
if (DisableBreakpointByID (break_id))
|
|
{
|
|
if (LLDB_BREAK_ID_IS_INTERNAL (break_id))
|
|
m_internal_breakpoint_list.Remove(break_id, false);
|
|
else
|
|
{
|
|
if (m_last_created_breakpoint)
|
|
{
|
|
if (m_last_created_breakpoint->GetID() == break_id)
|
|
m_last_created_breakpoint.reset();
|
|
}
|
|
m_breakpoint_list.Remove(break_id, true);
|
|
}
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
bool
|
|
Target::DisableBreakpointByID (break_id_t break_id)
|
|
{
|
|
Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_BREAKPOINTS));
|
|
if (log)
|
|
log->Printf ("Target::%s (break_id = %i, internal = %s)\n", __FUNCTION__, break_id, LLDB_BREAK_ID_IS_INTERNAL (break_id) ? "yes" : "no");
|
|
|
|
BreakpointSP bp_sp;
|
|
|
|
if (LLDB_BREAK_ID_IS_INTERNAL (break_id))
|
|
bp_sp = m_internal_breakpoint_list.FindBreakpointByID (break_id);
|
|
else
|
|
bp_sp = m_breakpoint_list.FindBreakpointByID (break_id);
|
|
if (bp_sp)
|
|
{
|
|
bp_sp->SetEnabled (false);
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
bool
|
|
Target::EnableBreakpointByID (break_id_t break_id)
|
|
{
|
|
Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_BREAKPOINTS));
|
|
if (log)
|
|
log->Printf ("Target::%s (break_id = %i, internal = %s)\n",
|
|
__FUNCTION__,
|
|
break_id,
|
|
LLDB_BREAK_ID_IS_INTERNAL (break_id) ? "yes" : "no");
|
|
|
|
BreakpointSP bp_sp;
|
|
|
|
if (LLDB_BREAK_ID_IS_INTERNAL (break_id))
|
|
bp_sp = m_internal_breakpoint_list.FindBreakpointByID (break_id);
|
|
else
|
|
bp_sp = m_breakpoint_list.FindBreakpointByID (break_id);
|
|
|
|
if (bp_sp)
|
|
{
|
|
bp_sp->SetEnabled (true);
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
// The flag 'end_to_end', default to true, signifies that the operation is
|
|
// performed end to end, for both the debugger and the debuggee.
|
|
|
|
// Assumption: Caller holds the list mutex lock for m_watchpoint_list for end
|
|
// to end operations.
|
|
bool
|
|
Target::RemoveAllWatchpoints (bool end_to_end)
|
|
{
|
|
Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_WATCHPOINTS));
|
|
if (log)
|
|
log->Printf ("Target::%s\n", __FUNCTION__);
|
|
|
|
if (!end_to_end) {
|
|
m_watchpoint_list.RemoveAll(true);
|
|
return true;
|
|
}
|
|
|
|
// Otherwise, it's an end to end operation.
|
|
|
|
if (!ProcessIsValid())
|
|
return false;
|
|
|
|
size_t num_watchpoints = m_watchpoint_list.GetSize();
|
|
for (size_t i = 0; i < num_watchpoints; ++i)
|
|
{
|
|
WatchpointSP wp_sp = m_watchpoint_list.GetByIndex(i);
|
|
if (!wp_sp)
|
|
return false;
|
|
|
|
Error rc = m_process_sp->DisableWatchpoint(wp_sp.get());
|
|
if (rc.Fail())
|
|
return false;
|
|
}
|
|
m_watchpoint_list.RemoveAll (true);
|
|
m_last_created_watchpoint.reset();
|
|
return true; // Success!
|
|
}
|
|
|
|
// Assumption: Caller holds the list mutex lock for m_watchpoint_list for end to
|
|
// end operations.
|
|
bool
|
|
Target::DisableAllWatchpoints (bool end_to_end)
|
|
{
|
|
Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_WATCHPOINTS));
|
|
if (log)
|
|
log->Printf ("Target::%s\n", __FUNCTION__);
|
|
|
|
if (!end_to_end) {
|
|
m_watchpoint_list.SetEnabledAll(false);
|
|
return true;
|
|
}
|
|
|
|
// Otherwise, it's an end to end operation.
|
|
|
|
if (!ProcessIsValid())
|
|
return false;
|
|
|
|
size_t num_watchpoints = m_watchpoint_list.GetSize();
|
|
for (size_t i = 0; i < num_watchpoints; ++i)
|
|
{
|
|
WatchpointSP wp_sp = m_watchpoint_list.GetByIndex(i);
|
|
if (!wp_sp)
|
|
return false;
|
|
|
|
Error rc = m_process_sp->DisableWatchpoint(wp_sp.get());
|
|
if (rc.Fail())
|
|
return false;
|
|
}
|
|
return true; // Success!
|
|
}
|
|
|
|
// Assumption: Caller holds the list mutex lock for m_watchpoint_list for end to
|
|
// end operations.
|
|
bool
|
|
Target::EnableAllWatchpoints (bool end_to_end)
|
|
{
|
|
Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_WATCHPOINTS));
|
|
if (log)
|
|
log->Printf ("Target::%s\n", __FUNCTION__);
|
|
|
|
if (!end_to_end) {
|
|
m_watchpoint_list.SetEnabledAll(true);
|
|
return true;
|
|
}
|
|
|
|
// Otherwise, it's an end to end operation.
|
|
|
|
if (!ProcessIsValid())
|
|
return false;
|
|
|
|
size_t num_watchpoints = m_watchpoint_list.GetSize();
|
|
for (size_t i = 0; i < num_watchpoints; ++i)
|
|
{
|
|
WatchpointSP wp_sp = m_watchpoint_list.GetByIndex(i);
|
|
if (!wp_sp)
|
|
return false;
|
|
|
|
Error rc = m_process_sp->EnableWatchpoint(wp_sp.get());
|
|
if (rc.Fail())
|
|
return false;
|
|
}
|
|
return true; // Success!
|
|
}
|
|
|
|
// Assumption: Caller holds the list mutex lock for m_watchpoint_list.
|
|
bool
|
|
Target::ClearAllWatchpointHitCounts ()
|
|
{
|
|
Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_WATCHPOINTS));
|
|
if (log)
|
|
log->Printf ("Target::%s\n", __FUNCTION__);
|
|
|
|
size_t num_watchpoints = m_watchpoint_list.GetSize();
|
|
for (size_t i = 0; i < num_watchpoints; ++i)
|
|
{
|
|
WatchpointSP wp_sp = m_watchpoint_list.GetByIndex(i);
|
|
if (!wp_sp)
|
|
return false;
|
|
|
|
wp_sp->ResetHitCount();
|
|
}
|
|
return true; // Success!
|
|
}
|
|
|
|
// Assumption: Caller holds the list mutex lock for m_watchpoint_list
|
|
// during these operations.
|
|
bool
|
|
Target::IgnoreAllWatchpoints (uint32_t ignore_count)
|
|
{
|
|
Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_WATCHPOINTS));
|
|
if (log)
|
|
log->Printf ("Target::%s\n", __FUNCTION__);
|
|
|
|
if (!ProcessIsValid())
|
|
return false;
|
|
|
|
size_t num_watchpoints = m_watchpoint_list.GetSize();
|
|
for (size_t i = 0; i < num_watchpoints; ++i)
|
|
{
|
|
WatchpointSP wp_sp = m_watchpoint_list.GetByIndex(i);
|
|
if (!wp_sp)
|
|
return false;
|
|
|
|
wp_sp->SetIgnoreCount(ignore_count);
|
|
}
|
|
return true; // Success!
|
|
}
|
|
|
|
// Assumption: Caller holds the list mutex lock for m_watchpoint_list.
|
|
bool
|
|
Target::DisableWatchpointByID (lldb::watch_id_t watch_id)
|
|
{
|
|
Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_WATCHPOINTS));
|
|
if (log)
|
|
log->Printf ("Target::%s (watch_id = %i)\n", __FUNCTION__, watch_id);
|
|
|
|
if (!ProcessIsValid())
|
|
return false;
|
|
|
|
WatchpointSP wp_sp = m_watchpoint_list.FindByID (watch_id);
|
|
if (wp_sp)
|
|
{
|
|
Error rc = m_process_sp->DisableWatchpoint(wp_sp.get());
|
|
if (rc.Success())
|
|
return true;
|
|
|
|
// Else, fallthrough.
|
|
}
|
|
return false;
|
|
}
|
|
|
|
// Assumption: Caller holds the list mutex lock for m_watchpoint_list.
|
|
bool
|
|
Target::EnableWatchpointByID (lldb::watch_id_t watch_id)
|
|
{
|
|
Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_WATCHPOINTS));
|
|
if (log)
|
|
log->Printf ("Target::%s (watch_id = %i)\n", __FUNCTION__, watch_id);
|
|
|
|
if (!ProcessIsValid())
|
|
return false;
|
|
|
|
WatchpointSP wp_sp = m_watchpoint_list.FindByID (watch_id);
|
|
if (wp_sp)
|
|
{
|
|
Error rc = m_process_sp->EnableWatchpoint(wp_sp.get());
|
|
if (rc.Success())
|
|
return true;
|
|
|
|
// Else, fallthrough.
|
|
}
|
|
return false;
|
|
}
|
|
|
|
// Assumption: Caller holds the list mutex lock for m_watchpoint_list.
|
|
bool
|
|
Target::RemoveWatchpointByID (lldb::watch_id_t watch_id)
|
|
{
|
|
Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_WATCHPOINTS));
|
|
if (log)
|
|
log->Printf ("Target::%s (watch_id = %i)\n", __FUNCTION__, watch_id);
|
|
|
|
WatchpointSP watch_to_remove_sp = m_watchpoint_list.FindByID(watch_id);
|
|
if (watch_to_remove_sp == m_last_created_watchpoint)
|
|
m_last_created_watchpoint.reset();
|
|
|
|
if (DisableWatchpointByID (watch_id))
|
|
{
|
|
m_watchpoint_list.Remove(watch_id, true);
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
// Assumption: Caller holds the list mutex lock for m_watchpoint_list.
|
|
bool
|
|
Target::IgnoreWatchpointByID (lldb::watch_id_t watch_id, uint32_t ignore_count)
|
|
{
|
|
Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_WATCHPOINTS));
|
|
if (log)
|
|
log->Printf ("Target::%s (watch_id = %i)\n", __FUNCTION__, watch_id);
|
|
|
|
if (!ProcessIsValid())
|
|
return false;
|
|
|
|
WatchpointSP wp_sp = m_watchpoint_list.FindByID (watch_id);
|
|
if (wp_sp)
|
|
{
|
|
wp_sp->SetIgnoreCount(ignore_count);
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
ModuleSP
|
|
Target::GetExecutableModule ()
|
|
{
|
|
return m_images.GetModuleAtIndex(0);
|
|
}
|
|
|
|
Module*
|
|
Target::GetExecutableModulePointer ()
|
|
{
|
|
return m_images.GetModulePointerAtIndex(0);
|
|
}
|
|
|
|
static void
|
|
LoadScriptingResourceForModule (const ModuleSP &module_sp, Target *target)
|
|
{
|
|
Error error;
|
|
StreamString feedback_stream;
|
|
if (module_sp && !module_sp->LoadScriptingResourceInTarget(target, error, &feedback_stream))
|
|
{
|
|
if (error.AsCString())
|
|
target->GetDebugger().GetErrorFile()->Printf("unable to load scripting data for module %s - error reported was %s\n",
|
|
module_sp->GetFileSpec().GetFileNameStrippingExtension().GetCString(),
|
|
error.AsCString());
|
|
}
|
|
if (feedback_stream.GetSize())
|
|
target->GetDebugger().GetErrorFile()->Printf("%s\n",
|
|
feedback_stream.GetData());
|
|
}
|
|
|
|
void
|
|
Target::ClearModules(bool delete_locations)
|
|
{
|
|
ModulesDidUnload (m_images, delete_locations);
|
|
m_section_load_history.Clear();
|
|
m_images.Clear();
|
|
m_scratch_ast_context_ap.reset();
|
|
m_scratch_ast_source_ap.reset();
|
|
m_ast_importer_ap.reset();
|
|
}
|
|
|
|
void
|
|
Target::DidExec ()
|
|
{
|
|
// When a process exec's we need to know about it so we can do some cleanup.
|
|
m_breakpoint_list.RemoveInvalidLocations(m_arch);
|
|
m_internal_breakpoint_list.RemoveInvalidLocations(m_arch);
|
|
}
|
|
|
|
void
|
|
Target::SetExecutableModule (ModuleSP& executable_sp, bool get_dependent_files)
|
|
{
|
|
Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_TARGET));
|
|
ClearModules(false);
|
|
|
|
if (executable_sp.get())
|
|
{
|
|
Timer scoped_timer (__PRETTY_FUNCTION__,
|
|
"Target::SetExecutableModule (executable = '%s')",
|
|
executable_sp->GetFileSpec().GetPath().c_str());
|
|
|
|
m_images.Append(executable_sp); // The first image is our executable file
|
|
|
|
// If we haven't set an architecture yet, reset our architecture based on what we found in the executable module.
|
|
if (!m_arch.IsValid())
|
|
{
|
|
m_arch = executable_sp->GetArchitecture();
|
|
if (log)
|
|
log->Printf ("Target::SetExecutableModule setting architecture to %s (%s) based on executable file", m_arch.GetArchitectureName(), m_arch.GetTriple().getTriple().c_str());
|
|
}
|
|
|
|
FileSpecList dependent_files;
|
|
ObjectFile *executable_objfile = executable_sp->GetObjectFile();
|
|
|
|
if (executable_objfile && get_dependent_files)
|
|
{
|
|
executable_objfile->GetDependentModules(dependent_files);
|
|
for (uint32_t i=0; i<dependent_files.GetSize(); i++)
|
|
{
|
|
FileSpec dependent_file_spec (dependent_files.GetFileSpecPointerAtIndex(i));
|
|
FileSpec platform_dependent_file_spec;
|
|
if (m_platform_sp)
|
|
m_platform_sp->GetFileWithUUID (dependent_file_spec, NULL, platform_dependent_file_spec);
|
|
else
|
|
platform_dependent_file_spec = dependent_file_spec;
|
|
|
|
ModuleSpec module_spec (platform_dependent_file_spec, m_arch);
|
|
ModuleSP image_module_sp(GetSharedModule (module_spec));
|
|
if (image_module_sp.get())
|
|
{
|
|
ObjectFile *objfile = image_module_sp->GetObjectFile();
|
|
if (objfile)
|
|
objfile->GetDependentModules(dependent_files);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
bool
|
|
Target::SetArchitecture (const ArchSpec &arch_spec)
|
|
{
|
|
Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_TARGET));
|
|
if (m_arch.IsCompatibleMatch(arch_spec) || !m_arch.IsValid())
|
|
{
|
|
// If we haven't got a valid arch spec, or the architectures are
|
|
// compatible, so just update the architecture. Architectures can be
|
|
// equal, yet the triple OS and vendor might change, so we need to do
|
|
// the assignment here just in case.
|
|
m_arch = arch_spec;
|
|
if (log)
|
|
log->Printf ("Target::SetArchitecture setting architecture to %s (%s)", arch_spec.GetArchitectureName(), arch_spec.GetTriple().getTriple().c_str());
|
|
return true;
|
|
}
|
|
else
|
|
{
|
|
// If we have an executable file, try to reset the executable to the desired architecture
|
|
if (log)
|
|
log->Printf ("Target::SetArchitecture changing architecture to %s (%s)", arch_spec.GetArchitectureName(), arch_spec.GetTriple().getTriple().c_str());
|
|
m_arch = arch_spec;
|
|
ModuleSP executable_sp = GetExecutableModule ();
|
|
|
|
ClearModules(true);
|
|
// Need to do something about unsetting breakpoints.
|
|
|
|
if (executable_sp)
|
|
{
|
|
if (log)
|
|
log->Printf("Target::SetArchitecture Trying to select executable file architecture %s (%s)", arch_spec.GetArchitectureName(), arch_spec.GetTriple().getTriple().c_str());
|
|
ModuleSpec module_spec (executable_sp->GetFileSpec(), arch_spec);
|
|
Error error = ModuleList::GetSharedModule (module_spec,
|
|
executable_sp,
|
|
&GetExecutableSearchPaths(),
|
|
NULL,
|
|
NULL);
|
|
|
|
if (!error.Fail() && executable_sp)
|
|
{
|
|
SetExecutableModule (executable_sp, true);
|
|
return true;
|
|
}
|
|
}
|
|
}
|
|
return false;
|
|
}
|
|
|
|
void
|
|
Target::WillClearList (const ModuleList& module_list)
|
|
{
|
|
}
|
|
|
|
void
|
|
Target::ModuleAdded (const ModuleList& module_list, const ModuleSP &module_sp)
|
|
{
|
|
// A module is being added to this target for the first time
|
|
if (m_valid)
|
|
{
|
|
ModuleList my_module_list;
|
|
my_module_list.Append(module_sp);
|
|
LoadScriptingResourceForModule(module_sp, this);
|
|
ModulesDidLoad (my_module_list);
|
|
}
|
|
}
|
|
|
|
void
|
|
Target::ModuleRemoved (const ModuleList& module_list, const ModuleSP &module_sp)
|
|
{
|
|
// A module is being added to this target for the first time
|
|
if (m_valid)
|
|
{
|
|
ModuleList my_module_list;
|
|
my_module_list.Append(module_sp);
|
|
ModulesDidUnload (my_module_list, false);
|
|
}
|
|
}
|
|
|
|
void
|
|
Target::ModuleUpdated (const ModuleList& module_list, const ModuleSP &old_module_sp, const ModuleSP &new_module_sp)
|
|
{
|
|
// A module is replacing an already added module
|
|
if (m_valid)
|
|
m_breakpoint_list.UpdateBreakpointsWhenModuleIsReplaced(old_module_sp, new_module_sp);
|
|
}
|
|
|
|
void
|
|
Target::ModulesDidLoad (ModuleList &module_list)
|
|
{
|
|
if (m_valid && module_list.GetSize())
|
|
{
|
|
m_breakpoint_list.UpdateBreakpoints (module_list, true, false);
|
|
if (m_process_sp)
|
|
{
|
|
m_process_sp->ModulesDidLoad (module_list);
|
|
}
|
|
// TODO: make event data that packages up the module_list
|
|
BroadcastEvent (eBroadcastBitModulesLoaded, NULL);
|
|
}
|
|
}
|
|
|
|
void
|
|
Target::SymbolsDidLoad (ModuleList &module_list)
|
|
{
|
|
if (m_valid && module_list.GetSize())
|
|
{
|
|
if (m_process_sp)
|
|
{
|
|
LanguageRuntime* runtime = m_process_sp->GetLanguageRuntime(lldb::eLanguageTypeObjC);
|
|
if (runtime)
|
|
{
|
|
ObjCLanguageRuntime *objc_runtime = (ObjCLanguageRuntime*)runtime;
|
|
objc_runtime->SymbolsDidLoad(module_list);
|
|
}
|
|
}
|
|
|
|
m_breakpoint_list.UpdateBreakpoints (module_list, true, false);
|
|
BroadcastEvent(eBroadcastBitSymbolsLoaded, NULL);
|
|
}
|
|
}
|
|
|
|
void
|
|
Target::ModulesDidUnload (ModuleList &module_list, bool delete_locations)
|
|
{
|
|
if (m_valid && module_list.GetSize())
|
|
{
|
|
UnloadModuleSections (module_list);
|
|
m_breakpoint_list.UpdateBreakpoints (module_list, false, delete_locations);
|
|
// TODO: make event data that packages up the module_list
|
|
BroadcastEvent (eBroadcastBitModulesUnloaded, NULL);
|
|
}
|
|
}
|
|
|
|
bool
|
|
Target::ModuleIsExcludedForNonModuleSpecificSearches (const FileSpec &module_file_spec)
|
|
{
|
|
if (GetBreakpointsConsultPlatformAvoidList())
|
|
{
|
|
ModuleList matchingModules;
|
|
ModuleSpec module_spec (module_file_spec);
|
|
size_t num_modules = GetImages().FindModules(module_spec, matchingModules);
|
|
|
|
// If there is more than one module for this file spec, only return true if ALL the modules are on the
|
|
// black list.
|
|
if (num_modules > 0)
|
|
{
|
|
for (size_t i = 0; i < num_modules; i++)
|
|
{
|
|
if (!ModuleIsExcludedForNonModuleSpecificSearches (matchingModules.GetModuleAtIndex(i)))
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
}
|
|
return false;
|
|
}
|
|
|
|
bool
|
|
Target::ModuleIsExcludedForNonModuleSpecificSearches (const lldb::ModuleSP &module_sp)
|
|
{
|
|
if (GetBreakpointsConsultPlatformAvoidList())
|
|
{
|
|
if (m_platform_sp)
|
|
return m_platform_sp->ModuleIsExcludedForNonModuleSpecificSearches (*this, module_sp);
|
|
}
|
|
return false;
|
|
}
|
|
|
|
size_t
|
|
Target::ReadMemoryFromFileCache (const Address& addr, void *dst, size_t dst_len, Error &error)
|
|
{
|
|
SectionSP section_sp (addr.GetSection());
|
|
if (section_sp)
|
|
{
|
|
// If the contents of this section are encrypted, the on-disk file is unusable. Read only from live memory.
|
|
if (section_sp->IsEncrypted())
|
|
{
|
|
error.SetErrorString("section is encrypted");
|
|
return 0;
|
|
}
|
|
ModuleSP module_sp (section_sp->GetModule());
|
|
if (module_sp)
|
|
{
|
|
ObjectFile *objfile = section_sp->GetModule()->GetObjectFile();
|
|
if (objfile)
|
|
{
|
|
size_t bytes_read = objfile->ReadSectionData (section_sp.get(),
|
|
addr.GetOffset(),
|
|
dst,
|
|
dst_len);
|
|
if (bytes_read > 0)
|
|
return bytes_read;
|
|
else
|
|
error.SetErrorStringWithFormat("error reading data from section %s", section_sp->GetName().GetCString());
|
|
}
|
|
else
|
|
error.SetErrorString("address isn't from a object file");
|
|
}
|
|
else
|
|
error.SetErrorString("address isn't in a module");
|
|
}
|
|
else
|
|
error.SetErrorString("address doesn't contain a section that points to a section in a object file");
|
|
|
|
return 0;
|
|
}
|
|
|
|
size_t
|
|
Target::ReadMemory (const Address& addr,
|
|
bool prefer_file_cache,
|
|
void *dst,
|
|
size_t dst_len,
|
|
Error &error,
|
|
lldb::addr_t *load_addr_ptr)
|
|
{
|
|
error.Clear();
|
|
|
|
// if we end up reading this from process memory, we will fill this
|
|
// with the actual load address
|
|
if (load_addr_ptr)
|
|
*load_addr_ptr = LLDB_INVALID_ADDRESS;
|
|
|
|
size_t bytes_read = 0;
|
|
|
|
addr_t load_addr = LLDB_INVALID_ADDRESS;
|
|
addr_t file_addr = LLDB_INVALID_ADDRESS;
|
|
Address resolved_addr;
|
|
if (!addr.IsSectionOffset())
|
|
{
|
|
SectionLoadList §ion_load_list = GetSectionLoadList();
|
|
if (section_load_list.IsEmpty())
|
|
{
|
|
// No sections are loaded, so we must assume we are not running
|
|
// yet and anything we are given is a file address.
|
|
file_addr = addr.GetOffset(); // "addr" doesn't have a section, so its offset is the file address
|
|
m_images.ResolveFileAddress (file_addr, resolved_addr);
|
|
}
|
|
else
|
|
{
|
|
// We have at least one section loaded. This can be because
|
|
// we have manually loaded some sections with "target modules load ..."
|
|
// or because we have have a live process that has sections loaded
|
|
// through the dynamic loader
|
|
load_addr = addr.GetOffset(); // "addr" doesn't have a section, so its offset is the load address
|
|
section_load_list.ResolveLoadAddress (load_addr, resolved_addr);
|
|
}
|
|
}
|
|
if (!resolved_addr.IsValid())
|
|
resolved_addr = addr;
|
|
|
|
|
|
if (prefer_file_cache)
|
|
{
|
|
bytes_read = ReadMemoryFromFileCache (resolved_addr, dst, dst_len, error);
|
|
if (bytes_read > 0)
|
|
return bytes_read;
|
|
}
|
|
|
|
if (ProcessIsValid())
|
|
{
|
|
if (load_addr == LLDB_INVALID_ADDRESS)
|
|
load_addr = resolved_addr.GetLoadAddress (this);
|
|
|
|
if (load_addr == LLDB_INVALID_ADDRESS)
|
|
{
|
|
ModuleSP addr_module_sp (resolved_addr.GetModule());
|
|
if (addr_module_sp && addr_module_sp->GetFileSpec())
|
|
error.SetErrorStringWithFormat("%s[0x%" PRIx64 "] can't be resolved, %s in not currently loaded",
|
|
addr_module_sp->GetFileSpec().GetFilename().AsCString(),
|
|
resolved_addr.GetFileAddress(),
|
|
addr_module_sp->GetFileSpec().GetFilename().AsCString());
|
|
else
|
|
error.SetErrorStringWithFormat("0x%" PRIx64 " can't be resolved", resolved_addr.GetFileAddress());
|
|
}
|
|
else
|
|
{
|
|
bytes_read = m_process_sp->ReadMemory(load_addr, dst, dst_len, error);
|
|
if (bytes_read != dst_len)
|
|
{
|
|
if (error.Success())
|
|
{
|
|
if (bytes_read == 0)
|
|
error.SetErrorStringWithFormat("read memory from 0x%" PRIx64 " failed", load_addr);
|
|
else
|
|
error.SetErrorStringWithFormat("only %" PRIu64 " of %" PRIu64 " bytes were read from memory at 0x%" PRIx64, (uint64_t)bytes_read, (uint64_t)dst_len, load_addr);
|
|
}
|
|
}
|
|
if (bytes_read)
|
|
{
|
|
if (load_addr_ptr)
|
|
*load_addr_ptr = load_addr;
|
|
return bytes_read;
|
|
}
|
|
// If the address is not section offset we have an address that
|
|
// doesn't resolve to any address in any currently loaded shared
|
|
// libraries and we failed to read memory so there isn't anything
|
|
// more we can do. If it is section offset, we might be able to
|
|
// read cached memory from the object file.
|
|
if (!resolved_addr.IsSectionOffset())
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
if (!prefer_file_cache && resolved_addr.IsSectionOffset())
|
|
{
|
|
// If we didn't already try and read from the object file cache, then
|
|
// try it after failing to read from the process.
|
|
return ReadMemoryFromFileCache (resolved_addr, dst, dst_len, error);
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
size_t
|
|
Target::ReadCStringFromMemory (const Address& addr, std::string &out_str, Error &error)
|
|
{
|
|
char buf[256];
|
|
out_str.clear();
|
|
addr_t curr_addr = addr.GetLoadAddress(this);
|
|
Address address(addr);
|
|
while (1)
|
|
{
|
|
size_t length = ReadCStringFromMemory (address, buf, sizeof(buf), error);
|
|
if (length == 0)
|
|
break;
|
|
out_str.append(buf, length);
|
|
// If we got "length - 1" bytes, we didn't get the whole C string, we
|
|
// need to read some more characters
|
|
if (length == sizeof(buf) - 1)
|
|
curr_addr += length;
|
|
else
|
|
break;
|
|
address = Address(curr_addr);
|
|
}
|
|
return out_str.size();
|
|
}
|
|
|
|
|
|
size_t
|
|
Target::ReadCStringFromMemory (const Address& addr, char *dst, size_t dst_max_len, Error &result_error)
|
|
{
|
|
size_t total_cstr_len = 0;
|
|
if (dst && dst_max_len)
|
|
{
|
|
result_error.Clear();
|
|
// NULL out everything just to be safe
|
|
memset (dst, 0, dst_max_len);
|
|
Error error;
|
|
addr_t curr_addr = addr.GetLoadAddress(this);
|
|
Address address(addr);
|
|
|
|
// We could call m_process_sp->GetMemoryCacheLineSize() but I don't
|
|
// think this really needs to be tied to the memory cache subsystem's
|
|
// cache line size, so leave this as a fixed constant.
|
|
const size_t cache_line_size = 512;
|
|
|
|
size_t bytes_left = dst_max_len - 1;
|
|
char *curr_dst = dst;
|
|
|
|
while (bytes_left > 0)
|
|
{
|
|
addr_t cache_line_bytes_left = cache_line_size - (curr_addr % cache_line_size);
|
|
addr_t bytes_to_read = std::min<addr_t>(bytes_left, cache_line_bytes_left);
|
|
size_t bytes_read = ReadMemory (address, false, curr_dst, bytes_to_read, error);
|
|
|
|
if (bytes_read == 0)
|
|
{
|
|
result_error = error;
|
|
dst[total_cstr_len] = '\0';
|
|
break;
|
|
}
|
|
const size_t len = strlen(curr_dst);
|
|
|
|
total_cstr_len += len;
|
|
|
|
if (len < bytes_to_read)
|
|
break;
|
|
|
|
curr_dst += bytes_read;
|
|
curr_addr += bytes_read;
|
|
bytes_left -= bytes_read;
|
|
address = Address(curr_addr);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
if (dst == NULL)
|
|
result_error.SetErrorString("invalid arguments");
|
|
else
|
|
result_error.Clear();
|
|
}
|
|
return total_cstr_len;
|
|
}
|
|
|
|
size_t
|
|
Target::ReadScalarIntegerFromMemory (const Address& addr,
|
|
bool prefer_file_cache,
|
|
uint32_t byte_size,
|
|
bool is_signed,
|
|
Scalar &scalar,
|
|
Error &error)
|
|
{
|
|
uint64_t uval;
|
|
|
|
if (byte_size <= sizeof(uval))
|
|
{
|
|
size_t bytes_read = ReadMemory (addr, prefer_file_cache, &uval, byte_size, error);
|
|
if (bytes_read == byte_size)
|
|
{
|
|
DataExtractor data (&uval, sizeof(uval), m_arch.GetByteOrder(), m_arch.GetAddressByteSize());
|
|
lldb::offset_t offset = 0;
|
|
if (byte_size <= 4)
|
|
scalar = data.GetMaxU32 (&offset, byte_size);
|
|
else
|
|
scalar = data.GetMaxU64 (&offset, byte_size);
|
|
|
|
if (is_signed)
|
|
scalar.SignExtend(byte_size * 8);
|
|
return bytes_read;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
error.SetErrorStringWithFormat ("byte size of %u is too large for integer scalar type", byte_size);
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
uint64_t
|
|
Target::ReadUnsignedIntegerFromMemory (const Address& addr,
|
|
bool prefer_file_cache,
|
|
size_t integer_byte_size,
|
|
uint64_t fail_value,
|
|
Error &error)
|
|
{
|
|
Scalar scalar;
|
|
if (ReadScalarIntegerFromMemory (addr,
|
|
prefer_file_cache,
|
|
integer_byte_size,
|
|
false,
|
|
scalar,
|
|
error))
|
|
return scalar.ULongLong(fail_value);
|
|
return fail_value;
|
|
}
|
|
|
|
bool
|
|
Target::ReadPointerFromMemory (const Address& addr,
|
|
bool prefer_file_cache,
|
|
Error &error,
|
|
Address &pointer_addr)
|
|
{
|
|
Scalar scalar;
|
|
if (ReadScalarIntegerFromMemory (addr,
|
|
prefer_file_cache,
|
|
m_arch.GetAddressByteSize(),
|
|
false,
|
|
scalar,
|
|
error))
|
|
{
|
|
addr_t pointer_vm_addr = scalar.ULongLong(LLDB_INVALID_ADDRESS);
|
|
if (pointer_vm_addr != LLDB_INVALID_ADDRESS)
|
|
{
|
|
SectionLoadList §ion_load_list = GetSectionLoadList();
|
|
if (section_load_list.IsEmpty())
|
|
{
|
|
// No sections are loaded, so we must assume we are not running
|
|
// yet and anything we are given is a file address.
|
|
m_images.ResolveFileAddress (pointer_vm_addr, pointer_addr);
|
|
}
|
|
else
|
|
{
|
|
// We have at least one section loaded. This can be because
|
|
// we have manually loaded some sections with "target modules load ..."
|
|
// or because we have have a live process that has sections loaded
|
|
// through the dynamic loader
|
|
section_load_list.ResolveLoadAddress (pointer_vm_addr, pointer_addr);
|
|
}
|
|
// We weren't able to resolve the pointer value, so just return
|
|
// an address with no section
|
|
if (!pointer_addr.IsValid())
|
|
pointer_addr.SetOffset (pointer_vm_addr);
|
|
return true;
|
|
|
|
}
|
|
}
|
|
return false;
|
|
}
|
|
|
|
ModuleSP
|
|
Target::GetSharedModule (const ModuleSpec &module_spec, Error *error_ptr)
|
|
{
|
|
ModuleSP module_sp;
|
|
|
|
Error error;
|
|
|
|
// First see if we already have this module in our module list. If we do, then we're done, we don't need
|
|
// to consult the shared modules list. But only do this if we are passed a UUID.
|
|
|
|
if (module_spec.GetUUID().IsValid())
|
|
module_sp = m_images.FindFirstModule(module_spec);
|
|
|
|
if (!module_sp)
|
|
{
|
|
ModuleSP old_module_sp; // This will get filled in if we have a new version of the library
|
|
bool did_create_module = false;
|
|
|
|
// If there are image search path entries, try to use them first to acquire a suitable image.
|
|
if (m_image_search_paths.GetSize())
|
|
{
|
|
ModuleSpec transformed_spec (module_spec);
|
|
if (m_image_search_paths.RemapPath (module_spec.GetFileSpec().GetDirectory(), transformed_spec.GetFileSpec().GetDirectory()))
|
|
{
|
|
transformed_spec.GetFileSpec().GetFilename() = module_spec.GetFileSpec().GetFilename();
|
|
error = ModuleList::GetSharedModule (transformed_spec,
|
|
module_sp,
|
|
&GetExecutableSearchPaths(),
|
|
&old_module_sp,
|
|
&did_create_module);
|
|
}
|
|
}
|
|
|
|
if (!module_sp)
|
|
{
|
|
// If we have a UUID, we can check our global shared module list in case
|
|
// we already have it. If we don't have a valid UUID, then we can't since
|
|
// the path in "module_spec" will be a platform path, and we will need to
|
|
// let the platform find that file. For example, we could be asking for
|
|
// "/usr/lib/dyld" and if we do not have a UUID, we don't want to pick
|
|
// the local copy of "/usr/lib/dyld" since our platform could be a remote
|
|
// platform that has its own "/usr/lib/dyld" in an SDK or in a local file
|
|
// cache.
|
|
if (module_spec.GetUUID().IsValid())
|
|
{
|
|
// We have a UUID, it is OK to check the global module list...
|
|
error = ModuleList::GetSharedModule (module_spec,
|
|
module_sp,
|
|
&GetExecutableSearchPaths(),
|
|
&old_module_sp,
|
|
&did_create_module);
|
|
}
|
|
|
|
if (!module_sp)
|
|
{
|
|
// The platform is responsible for finding and caching an appropriate
|
|
// module in the shared module cache.
|
|
if (m_platform_sp)
|
|
{
|
|
FileSpec platform_file_spec;
|
|
error = m_platform_sp->GetSharedModule (module_spec,
|
|
module_sp,
|
|
&GetExecutableSearchPaths(),
|
|
&old_module_sp,
|
|
&did_create_module);
|
|
}
|
|
else
|
|
{
|
|
error.SetErrorString("no platform is currently set");
|
|
}
|
|
}
|
|
}
|
|
|
|
// We found a module that wasn't in our target list. Let's make sure that there wasn't an equivalent
|
|
// module in the list already, and if there was, let's remove it.
|
|
if (module_sp)
|
|
{
|
|
ObjectFile *objfile = module_sp->GetObjectFile();
|
|
if (objfile)
|
|
{
|
|
switch (objfile->GetType())
|
|
{
|
|
case ObjectFile::eTypeCoreFile: /// A core file that has a checkpoint of a program's execution state
|
|
case ObjectFile::eTypeExecutable: /// A normal executable
|
|
case ObjectFile::eTypeDynamicLinker: /// The platform's dynamic linker executable
|
|
case ObjectFile::eTypeObjectFile: /// An intermediate object file
|
|
case ObjectFile::eTypeSharedLibrary: /// A shared library that can be used during execution
|
|
break;
|
|
case ObjectFile::eTypeDebugInfo: /// An object file that contains only debug information
|
|
if (error_ptr)
|
|
error_ptr->SetErrorString("debug info files aren't valid target modules, please specify an executable");
|
|
return ModuleSP();
|
|
case ObjectFile::eTypeStubLibrary: /// A library that can be linked against but not used for execution
|
|
if (error_ptr)
|
|
error_ptr->SetErrorString("stub libraries aren't valid target modules, please specify an executable");
|
|
return ModuleSP();
|
|
default:
|
|
if (error_ptr)
|
|
error_ptr->SetErrorString("unsupported file type, please specify an executable");
|
|
return ModuleSP();
|
|
}
|
|
// GetSharedModule is not guaranteed to find the old shared module, for instance
|
|
// in the common case where you pass in the UUID, it is only going to find the one
|
|
// module matching the UUID. In fact, it has no good way to know what the "old module"
|
|
// relevant to this target is, since there might be many copies of a module with this file spec
|
|
// in various running debug sessions, but only one of them will belong to this target.
|
|
// So let's remove the UUID from the module list, and look in the target's module list.
|
|
// Only do this if there is SOMETHING else in the module spec...
|
|
if (!old_module_sp)
|
|
{
|
|
if (module_spec.GetUUID().IsValid() && !module_spec.GetFileSpec().GetFilename().IsEmpty() && !module_spec.GetFileSpec().GetDirectory().IsEmpty())
|
|
{
|
|
ModuleSpec module_spec_copy(module_spec.GetFileSpec());
|
|
module_spec_copy.GetUUID().Clear();
|
|
|
|
ModuleList found_modules;
|
|
size_t num_found = m_images.FindModules (module_spec_copy, found_modules);
|
|
if (num_found == 1)
|
|
{
|
|
old_module_sp = found_modules.GetModuleAtIndex(0);
|
|
}
|
|
}
|
|
}
|
|
|
|
if (old_module_sp && m_images.GetIndexForModule (old_module_sp.get()) != LLDB_INVALID_INDEX32)
|
|
{
|
|
m_images.ReplaceModule(old_module_sp, module_sp);
|
|
Module *old_module_ptr = old_module_sp.get();
|
|
old_module_sp.reset();
|
|
ModuleList::RemoveSharedModuleIfOrphaned (old_module_ptr);
|
|
}
|
|
else
|
|
m_images.Append(module_sp);
|
|
}
|
|
else
|
|
module_sp.reset();
|
|
}
|
|
}
|
|
if (error_ptr)
|
|
*error_ptr = error;
|
|
return module_sp;
|
|
}
|
|
|
|
|
|
TargetSP
|
|
Target::CalculateTarget ()
|
|
{
|
|
return shared_from_this();
|
|
}
|
|
|
|
ProcessSP
|
|
Target::CalculateProcess ()
|
|
{
|
|
return ProcessSP();
|
|
}
|
|
|
|
ThreadSP
|
|
Target::CalculateThread ()
|
|
{
|
|
return ThreadSP();
|
|
}
|
|
|
|
StackFrameSP
|
|
Target::CalculateStackFrame ()
|
|
{
|
|
return StackFrameSP();
|
|
}
|
|
|
|
void
|
|
Target::CalculateExecutionContext (ExecutionContext &exe_ctx)
|
|
{
|
|
exe_ctx.Clear();
|
|
exe_ctx.SetTargetPtr(this);
|
|
}
|
|
|
|
PathMappingList &
|
|
Target::GetImageSearchPathList ()
|
|
{
|
|
return m_image_search_paths;
|
|
}
|
|
|
|
void
|
|
Target::ImageSearchPathsChanged
|
|
(
|
|
const PathMappingList &path_list,
|
|
void *baton
|
|
)
|
|
{
|
|
Target *target = (Target *)baton;
|
|
ModuleSP exe_module_sp (target->GetExecutableModule());
|
|
if (exe_module_sp)
|
|
target->SetExecutableModule (exe_module_sp, true);
|
|
}
|
|
|
|
ClangASTContext *
|
|
Target::GetScratchClangASTContext(bool create_on_demand)
|
|
{
|
|
// Now see if we know the target triple, and if so, create our scratch AST context:
|
|
if (m_scratch_ast_context_ap.get() == NULL && m_arch.IsValid() && create_on_demand)
|
|
{
|
|
m_scratch_ast_context_ap.reset (new ClangASTContext(m_arch.GetTriple().str().c_str()));
|
|
m_scratch_ast_source_ap.reset (new ClangASTSource(shared_from_this()));
|
|
m_scratch_ast_source_ap->InstallASTContext(m_scratch_ast_context_ap->getASTContext());
|
|
llvm::IntrusiveRefCntPtr<clang::ExternalASTSource> proxy_ast_source(m_scratch_ast_source_ap->CreateProxy());
|
|
m_scratch_ast_context_ap->SetExternalSource(proxy_ast_source);
|
|
}
|
|
return m_scratch_ast_context_ap.get();
|
|
}
|
|
|
|
ClangASTImporter *
|
|
Target::GetClangASTImporter()
|
|
{
|
|
ClangASTImporter *ast_importer = m_ast_importer_ap.get();
|
|
|
|
if (!ast_importer)
|
|
{
|
|
ast_importer = new ClangASTImporter();
|
|
m_ast_importer_ap.reset(ast_importer);
|
|
}
|
|
|
|
return ast_importer;
|
|
}
|
|
|
|
void
|
|
Target::SettingsInitialize ()
|
|
{
|
|
Process::SettingsInitialize ();
|
|
}
|
|
|
|
void
|
|
Target::SettingsTerminate ()
|
|
{
|
|
Process::SettingsTerminate ();
|
|
}
|
|
|
|
FileSpecList
|
|
Target::GetDefaultExecutableSearchPaths ()
|
|
{
|
|
TargetPropertiesSP properties_sp(Target::GetGlobalProperties());
|
|
if (properties_sp)
|
|
return properties_sp->GetExecutableSearchPaths();
|
|
return FileSpecList();
|
|
}
|
|
|
|
FileSpecList
|
|
Target::GetDefaultDebugFileSearchPaths ()
|
|
{
|
|
TargetPropertiesSP properties_sp(Target::GetGlobalProperties());
|
|
if (properties_sp)
|
|
return properties_sp->GetDebugFileSearchPaths();
|
|
return FileSpecList();
|
|
}
|
|
|
|
ArchSpec
|
|
Target::GetDefaultArchitecture ()
|
|
{
|
|
TargetPropertiesSP properties_sp(Target::GetGlobalProperties());
|
|
if (properties_sp)
|
|
return properties_sp->GetDefaultArchitecture();
|
|
return ArchSpec();
|
|
}
|
|
|
|
void
|
|
Target::SetDefaultArchitecture (const ArchSpec &arch)
|
|
{
|
|
TargetPropertiesSP properties_sp(Target::GetGlobalProperties());
|
|
if (properties_sp)
|
|
{
|
|
LogIfAnyCategoriesSet(LIBLLDB_LOG_TARGET, "Target::SetDefaultArchitecture setting target's default architecture to %s (%s)", arch.GetArchitectureName(), arch.GetTriple().getTriple().c_str());
|
|
return properties_sp->SetDefaultArchitecture(arch);
|
|
}
|
|
}
|
|
|
|
Target *
|
|
Target::GetTargetFromContexts (const ExecutionContext *exe_ctx_ptr, const SymbolContext *sc_ptr)
|
|
{
|
|
// The target can either exist in the "process" of ExecutionContext, or in
|
|
// the "target_sp" member of SymbolContext. This accessor helper function
|
|
// will get the target from one of these locations.
|
|
|
|
Target *target = NULL;
|
|
if (sc_ptr != NULL)
|
|
target = sc_ptr->target_sp.get();
|
|
if (target == NULL && exe_ctx_ptr)
|
|
target = exe_ctx_ptr->GetTargetPtr();
|
|
return target;
|
|
}
|
|
|
|
ExpressionResults
|
|
Target::EvaluateExpression
|
|
(
|
|
const char *expr_cstr,
|
|
StackFrame *frame,
|
|
lldb::ValueObjectSP &result_valobj_sp,
|
|
const EvaluateExpressionOptions& options
|
|
)
|
|
{
|
|
result_valobj_sp.reset();
|
|
|
|
ExpressionResults execution_results = eExpressionSetupError;
|
|
|
|
if (expr_cstr == NULL || expr_cstr[0] == '\0')
|
|
return execution_results;
|
|
|
|
// We shouldn't run stop hooks in expressions.
|
|
// Be sure to reset this if you return anywhere within this function.
|
|
bool old_suppress_value = m_suppress_stop_hooks;
|
|
m_suppress_stop_hooks = true;
|
|
|
|
ExecutionContext exe_ctx;
|
|
|
|
if (frame)
|
|
{
|
|
frame->CalculateExecutionContext(exe_ctx);
|
|
}
|
|
else if (m_process_sp)
|
|
{
|
|
m_process_sp->CalculateExecutionContext(exe_ctx);
|
|
}
|
|
else
|
|
{
|
|
CalculateExecutionContext(exe_ctx);
|
|
}
|
|
|
|
// Make sure we aren't just trying to see the value of a persistent
|
|
// variable (something like "$0")
|
|
lldb::ClangExpressionVariableSP persistent_var_sp;
|
|
// Only check for persistent variables the expression starts with a '$'
|
|
if (expr_cstr[0] == '$')
|
|
persistent_var_sp = m_persistent_variables.GetVariable (expr_cstr);
|
|
|
|
if (persistent_var_sp)
|
|
{
|
|
result_valobj_sp = persistent_var_sp->GetValueObject ();
|
|
execution_results = eExpressionCompleted;
|
|
}
|
|
else
|
|
{
|
|
const char *prefix = GetExpressionPrefixContentsAsCString();
|
|
Error error;
|
|
execution_results = ClangUserExpression::Evaluate (exe_ctx,
|
|
options,
|
|
expr_cstr,
|
|
prefix,
|
|
result_valobj_sp,
|
|
error);
|
|
}
|
|
|
|
m_suppress_stop_hooks = old_suppress_value;
|
|
|
|
return execution_results;
|
|
}
|
|
|
|
lldb::addr_t
|
|
Target::GetCallableLoadAddress (lldb::addr_t load_addr, AddressClass addr_class) const
|
|
{
|
|
addr_t code_addr = load_addr;
|
|
switch (m_arch.GetMachine())
|
|
{
|
|
case llvm::Triple::arm:
|
|
case llvm::Triple::thumb:
|
|
switch (addr_class)
|
|
{
|
|
case eAddressClassData:
|
|
case eAddressClassDebug:
|
|
return LLDB_INVALID_ADDRESS;
|
|
|
|
case eAddressClassUnknown:
|
|
case eAddressClassInvalid:
|
|
case eAddressClassCode:
|
|
case eAddressClassCodeAlternateISA:
|
|
case eAddressClassRuntime:
|
|
// Check if bit zero it no set?
|
|
if ((code_addr & 1ull) == 0)
|
|
{
|
|
// Bit zero isn't set, check if the address is a multiple of 2?
|
|
if (code_addr & 2ull)
|
|
{
|
|
// The address is a multiple of 2 so it must be thumb, set bit zero
|
|
code_addr |= 1ull;
|
|
}
|
|
else if (addr_class == eAddressClassCodeAlternateISA)
|
|
{
|
|
// We checked the address and the address claims to be the alternate ISA
|
|
// which means thumb, so set bit zero.
|
|
code_addr |= 1ull;
|
|
}
|
|
}
|
|
break;
|
|
}
|
|
break;
|
|
|
|
default:
|
|
break;
|
|
}
|
|
return code_addr;
|
|
}
|
|
|
|
lldb::addr_t
|
|
Target::GetOpcodeLoadAddress (lldb::addr_t load_addr, AddressClass addr_class) const
|
|
{
|
|
addr_t opcode_addr = load_addr;
|
|
switch (m_arch.GetMachine())
|
|
{
|
|
case llvm::Triple::arm:
|
|
case llvm::Triple::thumb:
|
|
switch (addr_class)
|
|
{
|
|
case eAddressClassData:
|
|
case eAddressClassDebug:
|
|
return LLDB_INVALID_ADDRESS;
|
|
|
|
case eAddressClassInvalid:
|
|
case eAddressClassUnknown:
|
|
case eAddressClassCode:
|
|
case eAddressClassCodeAlternateISA:
|
|
case eAddressClassRuntime:
|
|
opcode_addr &= ~(1ull);
|
|
break;
|
|
}
|
|
break;
|
|
|
|
default:
|
|
break;
|
|
}
|
|
return opcode_addr;
|
|
}
|
|
|
|
SourceManager &
|
|
Target::GetSourceManager ()
|
|
{
|
|
if (m_source_manager_ap.get() == NULL)
|
|
m_source_manager_ap.reset (new SourceManager(shared_from_this()));
|
|
return *m_source_manager_ap;
|
|
}
|
|
|
|
|
|
Target::StopHookSP
|
|
Target::CreateStopHook ()
|
|
{
|
|
lldb::user_id_t new_uid = ++m_stop_hook_next_id;
|
|
Target::StopHookSP stop_hook_sp (new StopHook(shared_from_this(), new_uid));
|
|
m_stop_hooks[new_uid] = stop_hook_sp;
|
|
return stop_hook_sp;
|
|
}
|
|
|
|
bool
|
|
Target::RemoveStopHookByID (lldb::user_id_t user_id)
|
|
{
|
|
size_t num_removed;
|
|
num_removed = m_stop_hooks.erase (user_id);
|
|
if (num_removed == 0)
|
|
return false;
|
|
else
|
|
return true;
|
|
}
|
|
|
|
void
|
|
Target::RemoveAllStopHooks ()
|
|
{
|
|
m_stop_hooks.clear();
|
|
}
|
|
|
|
Target::StopHookSP
|
|
Target::GetStopHookByID (lldb::user_id_t user_id)
|
|
{
|
|
StopHookSP found_hook;
|
|
|
|
StopHookCollection::iterator specified_hook_iter;
|
|
specified_hook_iter = m_stop_hooks.find (user_id);
|
|
if (specified_hook_iter != m_stop_hooks.end())
|
|
found_hook = (*specified_hook_iter).second;
|
|
return found_hook;
|
|
}
|
|
|
|
bool
|
|
Target::SetStopHookActiveStateByID (lldb::user_id_t user_id, bool active_state)
|
|
{
|
|
StopHookCollection::iterator specified_hook_iter;
|
|
specified_hook_iter = m_stop_hooks.find (user_id);
|
|
if (specified_hook_iter == m_stop_hooks.end())
|
|
return false;
|
|
|
|
(*specified_hook_iter).second->SetIsActive (active_state);
|
|
return true;
|
|
}
|
|
|
|
void
|
|
Target::SetAllStopHooksActiveState (bool active_state)
|
|
{
|
|
StopHookCollection::iterator pos, end = m_stop_hooks.end();
|
|
for (pos = m_stop_hooks.begin(); pos != end; pos++)
|
|
{
|
|
(*pos).second->SetIsActive (active_state);
|
|
}
|
|
}
|
|
|
|
void
|
|
Target::RunStopHooks ()
|
|
{
|
|
if (m_suppress_stop_hooks)
|
|
return;
|
|
|
|
if (!m_process_sp)
|
|
return;
|
|
|
|
// <rdar://problem/12027563> make sure we check that we are not stopped because of us running a user expression
|
|
// since in that case we do not want to run the stop-hooks
|
|
if (m_process_sp->GetModIDRef().IsLastResumeForUserExpression())
|
|
return;
|
|
|
|
if (m_stop_hooks.empty())
|
|
return;
|
|
|
|
StopHookCollection::iterator pos, end = m_stop_hooks.end();
|
|
|
|
// If there aren't any active stop hooks, don't bother either:
|
|
bool any_active_hooks = false;
|
|
for (pos = m_stop_hooks.begin(); pos != end; pos++)
|
|
{
|
|
if ((*pos).second->IsActive())
|
|
{
|
|
any_active_hooks = true;
|
|
break;
|
|
}
|
|
}
|
|
if (!any_active_hooks)
|
|
return;
|
|
|
|
CommandReturnObject result;
|
|
|
|
std::vector<ExecutionContext> exc_ctx_with_reasons;
|
|
std::vector<SymbolContext> sym_ctx_with_reasons;
|
|
|
|
ThreadList &cur_threadlist = m_process_sp->GetThreadList();
|
|
size_t num_threads = cur_threadlist.GetSize();
|
|
for (size_t i = 0; i < num_threads; i++)
|
|
{
|
|
lldb::ThreadSP cur_thread_sp = cur_threadlist.GetThreadAtIndex (i);
|
|
if (cur_thread_sp->ThreadStoppedForAReason())
|
|
{
|
|
lldb::StackFrameSP cur_frame_sp = cur_thread_sp->GetStackFrameAtIndex(0);
|
|
exc_ctx_with_reasons.push_back(ExecutionContext(m_process_sp.get(), cur_thread_sp.get(), cur_frame_sp.get()));
|
|
sym_ctx_with_reasons.push_back(cur_frame_sp->GetSymbolContext(eSymbolContextEverything));
|
|
}
|
|
}
|
|
|
|
// If no threads stopped for a reason, don't run the stop-hooks.
|
|
size_t num_exe_ctx = exc_ctx_with_reasons.size();
|
|
if (num_exe_ctx == 0)
|
|
return;
|
|
|
|
result.SetImmediateOutputStream (m_debugger.GetAsyncOutputStream());
|
|
result.SetImmediateErrorStream (m_debugger.GetAsyncErrorStream());
|
|
|
|
bool keep_going = true;
|
|
bool hooks_ran = false;
|
|
bool print_hook_header;
|
|
bool print_thread_header;
|
|
|
|
if (num_exe_ctx == 1)
|
|
print_thread_header = false;
|
|
else
|
|
print_thread_header = true;
|
|
|
|
if (m_stop_hooks.size() == 1)
|
|
print_hook_header = false;
|
|
else
|
|
print_hook_header = true;
|
|
|
|
for (pos = m_stop_hooks.begin(); keep_going && pos != end; pos++)
|
|
{
|
|
// result.Clear();
|
|
StopHookSP cur_hook_sp = (*pos).second;
|
|
if (!cur_hook_sp->IsActive())
|
|
continue;
|
|
|
|
bool any_thread_matched = false;
|
|
for (size_t i = 0; keep_going && i < num_exe_ctx; i++)
|
|
{
|
|
if ((cur_hook_sp->GetSpecifier () == NULL
|
|
|| cur_hook_sp->GetSpecifier()->SymbolContextMatches(sym_ctx_with_reasons[i]))
|
|
&& (cur_hook_sp->GetThreadSpecifier() == NULL
|
|
|| cur_hook_sp->GetThreadSpecifier()->ThreadPassesBasicTests(exc_ctx_with_reasons[i].GetThreadRef())))
|
|
{
|
|
if (!hooks_ran)
|
|
{
|
|
hooks_ran = true;
|
|
}
|
|
if (print_hook_header && !any_thread_matched)
|
|
{
|
|
const char *cmd = (cur_hook_sp->GetCommands().GetSize() == 1 ?
|
|
cur_hook_sp->GetCommands().GetStringAtIndex(0) :
|
|
NULL);
|
|
if (cmd)
|
|
result.AppendMessageWithFormat("\n- Hook %" PRIu64 " (%s)\n", cur_hook_sp->GetID(), cmd);
|
|
else
|
|
result.AppendMessageWithFormat("\n- Hook %" PRIu64 "\n", cur_hook_sp->GetID());
|
|
any_thread_matched = true;
|
|
}
|
|
|
|
if (print_thread_header)
|
|
result.AppendMessageWithFormat("-- Thread %d\n", exc_ctx_with_reasons[i].GetThreadPtr()->GetIndexID());
|
|
|
|
CommandInterpreterRunOptions options;
|
|
options.SetStopOnContinue (true);
|
|
options.SetStopOnError (true);
|
|
options.SetEchoCommands (false);
|
|
options.SetPrintResults (true);
|
|
options.SetAddToHistory (false);
|
|
|
|
GetDebugger().GetCommandInterpreter().HandleCommands (cur_hook_sp->GetCommands(),
|
|
&exc_ctx_with_reasons[i],
|
|
options,
|
|
result);
|
|
|
|
// If the command started the target going again, we should bag out of
|
|
// running the stop hooks.
|
|
if ((result.GetStatus() == eReturnStatusSuccessContinuingNoResult) ||
|
|
(result.GetStatus() == eReturnStatusSuccessContinuingResult))
|
|
{
|
|
result.AppendMessageWithFormat ("Aborting stop hooks, hook %" PRIu64 " set the program running.", cur_hook_sp->GetID());
|
|
keep_going = false;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
result.GetImmediateOutputStream()->Flush();
|
|
result.GetImmediateErrorStream()->Flush();
|
|
}
|
|
|
|
const TargetPropertiesSP &
|
|
Target::GetGlobalProperties()
|
|
{
|
|
static TargetPropertiesSP g_settings_sp;
|
|
if (!g_settings_sp)
|
|
{
|
|
g_settings_sp.reset (new TargetProperties (NULL));
|
|
}
|
|
return g_settings_sp;
|
|
}
|
|
|
|
Error
|
|
Target::Install (ProcessLaunchInfo *launch_info)
|
|
{
|
|
Error error;
|
|
PlatformSP platform_sp (GetPlatform());
|
|
if (platform_sp)
|
|
{
|
|
if (platform_sp->IsRemote())
|
|
{
|
|
if (platform_sp->IsConnected())
|
|
{
|
|
// Install all files that have an install path, and always install the
|
|
// main executable when connected to a remote platform
|
|
const ModuleList& modules = GetImages();
|
|
const size_t num_images = modules.GetSize();
|
|
for (size_t idx = 0; idx < num_images; ++idx)
|
|
{
|
|
const bool is_main_executable = idx == 0;
|
|
ModuleSP module_sp(modules.GetModuleAtIndex(idx));
|
|
if (module_sp)
|
|
{
|
|
FileSpec local_file (module_sp->GetFileSpec());
|
|
if (local_file)
|
|
{
|
|
FileSpec remote_file (module_sp->GetRemoteInstallFileSpec());
|
|
if (!remote_file)
|
|
{
|
|
if (is_main_executable) // TODO: add setting for always installing main executable???
|
|
{
|
|
// Always install the main executable
|
|
remote_file.GetDirectory() = platform_sp->GetWorkingDirectory();
|
|
remote_file.GetFilename() = module_sp->GetFileSpec().GetFilename();
|
|
}
|
|
}
|
|
if (remote_file)
|
|
{
|
|
error = platform_sp->Install(local_file, remote_file);
|
|
if (error.Success())
|
|
{
|
|
module_sp->SetPlatformFileSpec(remote_file);
|
|
if (is_main_executable)
|
|
{
|
|
if (launch_info)
|
|
launch_info->SetExecutableFile(remote_file, false);
|
|
}
|
|
}
|
|
else
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
return error;
|
|
}
|
|
|
|
bool
|
|
Target::ResolveLoadAddress (addr_t load_addr, Address &so_addr, uint32_t stop_id)
|
|
{
|
|
return m_section_load_history.ResolveLoadAddress(stop_id, load_addr, so_addr);
|
|
}
|
|
|
|
bool
|
|
Target::ResolveFileAddress (lldb::addr_t file_addr, Address &resolved_addr)
|
|
{
|
|
return m_images.ResolveFileAddress(file_addr, resolved_addr);
|
|
}
|
|
|
|
bool
|
|
Target::SetSectionLoadAddress (const SectionSP §ion_sp, addr_t new_section_load_addr, bool warn_multiple)
|
|
{
|
|
const addr_t old_section_load_addr = m_section_load_history.GetSectionLoadAddress (SectionLoadHistory::eStopIDNow, section_sp);
|
|
if (old_section_load_addr != new_section_load_addr)
|
|
{
|
|
uint32_t stop_id = 0;
|
|
ProcessSP process_sp(GetProcessSP());
|
|
if (process_sp)
|
|
stop_id = process_sp->GetStopID();
|
|
else
|
|
stop_id = m_section_load_history.GetLastStopID();
|
|
if (m_section_load_history.SetSectionLoadAddress (stop_id, section_sp, new_section_load_addr, warn_multiple))
|
|
return true; // Return true if the section load address was changed...
|
|
}
|
|
return false; // Return false to indicate nothing changed
|
|
|
|
}
|
|
|
|
size_t
|
|
Target::UnloadModuleSections (const ModuleList &module_list)
|
|
{
|
|
size_t section_unload_count = 0;
|
|
size_t num_modules = module_list.GetSize();
|
|
for (size_t i=0; i<num_modules; ++i)
|
|
{
|
|
section_unload_count += UnloadModuleSections (module_list.GetModuleAtIndex(i));
|
|
}
|
|
return section_unload_count;
|
|
}
|
|
|
|
size_t
|
|
Target::UnloadModuleSections (const lldb::ModuleSP &module_sp)
|
|
{
|
|
uint32_t stop_id = 0;
|
|
ProcessSP process_sp(GetProcessSP());
|
|
if (process_sp)
|
|
stop_id = process_sp->GetStopID();
|
|
else
|
|
stop_id = m_section_load_history.GetLastStopID();
|
|
SectionList *sections = module_sp->GetSectionList();
|
|
size_t section_unload_count = 0;
|
|
if (sections)
|
|
{
|
|
const uint32_t num_sections = sections->GetNumSections(0);
|
|
for (uint32_t i = 0; i < num_sections; ++i)
|
|
{
|
|
section_unload_count += m_section_load_history.SetSectionUnloaded(stop_id, sections->GetSectionAtIndex(i));
|
|
}
|
|
}
|
|
return section_unload_count;
|
|
}
|
|
|
|
bool
|
|
Target::SetSectionUnloaded (const lldb::SectionSP §ion_sp)
|
|
{
|
|
uint32_t stop_id = 0;
|
|
ProcessSP process_sp(GetProcessSP());
|
|
if (process_sp)
|
|
stop_id = process_sp->GetStopID();
|
|
else
|
|
stop_id = m_section_load_history.GetLastStopID();
|
|
return m_section_load_history.SetSectionUnloaded (stop_id, section_sp);
|
|
}
|
|
|
|
bool
|
|
Target::SetSectionUnloaded (const lldb::SectionSP §ion_sp, addr_t load_addr)
|
|
{
|
|
uint32_t stop_id = 0;
|
|
ProcessSP process_sp(GetProcessSP());
|
|
if (process_sp)
|
|
stop_id = process_sp->GetStopID();
|
|
else
|
|
stop_id = m_section_load_history.GetLastStopID();
|
|
return m_section_load_history.SetSectionUnloaded (stop_id, section_sp, load_addr);
|
|
}
|
|
|
|
void
|
|
Target::ClearAllLoadedSections ()
|
|
{
|
|
m_section_load_history.Clear();
|
|
}
|
|
|
|
|
|
Error
|
|
Target::Launch (ProcessLaunchInfo &launch_info, Stream *stream)
|
|
{
|
|
Error error;
|
|
Log *log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_TARGET));
|
|
|
|
if (log)
|
|
log->Printf ("Target::%s() called for %s", __FUNCTION__, launch_info.GetExecutableFile().GetPath().c_str ());
|
|
|
|
StateType state = eStateInvalid;
|
|
|
|
// Scope to temporarily get the process state in case someone has manually
|
|
// remotely connected already to a process and we can skip the platform
|
|
// launching.
|
|
{
|
|
ProcessSP process_sp (GetProcessSP());
|
|
|
|
if (process_sp)
|
|
{
|
|
state = process_sp->GetState();
|
|
if (log)
|
|
log->Printf ("Target::%s the process exists, and its current state is %s", __FUNCTION__, StateAsCString (state));
|
|
}
|
|
else
|
|
{
|
|
if (log)
|
|
log->Printf ("Target::%s the process instance doesn't currently exist.", __FUNCTION__);
|
|
}
|
|
}
|
|
|
|
launch_info.GetFlags().Set (eLaunchFlagDebug);
|
|
|
|
// Get the value of synchronous execution here. If you wait till after you have started to
|
|
// run, then you could have hit a breakpoint, whose command might switch the value, and
|
|
// then you'll pick up that incorrect value.
|
|
Debugger &debugger = GetDebugger();
|
|
const bool synchronous_execution = debugger.GetCommandInterpreter().GetSynchronous ();
|
|
|
|
PlatformSP platform_sp (GetPlatform());
|
|
|
|
// Finalize the file actions, and if none were given, default to opening
|
|
// up a pseudo terminal
|
|
const bool default_to_use_pty = platform_sp ? platform_sp->IsHost() : false;
|
|
if (log)
|
|
log->Printf ("Target::%s have platform=%s, platform_sp->IsHost()=%s, default_to_use_pty=%s",
|
|
__FUNCTION__,
|
|
platform_sp ? "true" : "false",
|
|
platform_sp ? (platform_sp->IsHost () ? "true" : "false") : "n/a",
|
|
default_to_use_pty ? "true" : "false");
|
|
|
|
launch_info.FinalizeFileActions (this, default_to_use_pty);
|
|
|
|
if (state == eStateConnected)
|
|
{
|
|
if (launch_info.GetFlags().Test (eLaunchFlagLaunchInTTY))
|
|
{
|
|
error.SetErrorString("can't launch in tty when launching through a remote connection");
|
|
return error;
|
|
}
|
|
}
|
|
|
|
if (!launch_info.GetArchitecture().IsValid())
|
|
launch_info.GetArchitecture() = GetArchitecture();
|
|
|
|
// If we're not already connected to the process, and if we have a platform that can launch a process for debugging, go ahead and do that here.
|
|
if (state != eStateConnected && platform_sp && platform_sp->CanDebugProcess ())
|
|
{
|
|
if (log)
|
|
log->Printf ("Target::%s asking the platform to debug the process", __FUNCTION__);
|
|
|
|
m_process_sp = GetPlatform()->DebugProcess (launch_info,
|
|
debugger,
|
|
this,
|
|
error);
|
|
}
|
|
else
|
|
{
|
|
if (log)
|
|
log->Printf ("Target::%s the platform doesn't know how to debug a process, getting a process plugin to do this for us.", __FUNCTION__);
|
|
|
|
if (state == eStateConnected)
|
|
{
|
|
assert(m_process_sp);
|
|
}
|
|
else
|
|
{
|
|
// Use a Process plugin to construct the process.
|
|
const char *plugin_name = launch_info.GetProcessPluginName();
|
|
CreateProcess (launch_info.GetListenerForProcess(debugger), plugin_name, NULL);
|
|
}
|
|
|
|
// Since we didn't have a platform launch the process, launch it here.
|
|
if (m_process_sp)
|
|
error = m_process_sp->Launch (launch_info);
|
|
}
|
|
|
|
if (!m_process_sp)
|
|
{
|
|
if (error.Success())
|
|
error.SetErrorString("failed to launch or debug process");
|
|
return error;
|
|
}
|
|
|
|
if (error.Success())
|
|
{
|
|
if (launch_info.GetFlags().Test(eLaunchFlagStopAtEntry) == false)
|
|
{
|
|
ListenerSP hijack_listener_sp (launch_info.GetHijackListener());
|
|
|
|
StateType state = m_process_sp->WaitForProcessToStop (NULL, NULL, false, hijack_listener_sp.get(), NULL);
|
|
|
|
if (state == eStateStopped)
|
|
{
|
|
if (!synchronous_execution)
|
|
m_process_sp->RestoreProcessEvents ();
|
|
|
|
error = m_process_sp->PrivateResume();
|
|
|
|
if (error.Success())
|
|
{
|
|
// there is a race condition where this thread will return up the call stack to the main command
|
|
// handler and show an (lldb) prompt before HandlePrivateEvent (from PrivateStateThread) has
|
|
// a chance to call PushProcessIOHandler()
|
|
m_process_sp->SyncIOHandler(2000);
|
|
|
|
if (synchronous_execution)
|
|
{
|
|
state = m_process_sp->WaitForProcessToStop (NULL, NULL, true, hijack_listener_sp.get(), stream);
|
|
const bool must_be_alive = false; // eStateExited is ok, so this must be false
|
|
if (!StateIsStoppedState(state, must_be_alive))
|
|
{
|
|
error.SetErrorStringWithFormat("process isn't stopped: %s", StateAsCString(state));
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
Error error2;
|
|
error2.SetErrorStringWithFormat("process resume at entry point failed: %s", error.AsCString());
|
|
error = error2;
|
|
}
|
|
}
|
|
else if (state == eStateExited)
|
|
{
|
|
bool with_shell = !!launch_info.GetShell();
|
|
const int exit_status = m_process_sp->GetExitStatus();
|
|
const char *exit_desc = m_process_sp->GetExitDescription();
|
|
#define LAUNCH_SHELL_MESSAGE "\n'r' and 'run' are aliases that default to launching through a shell.\nTry launching without going through a shell by using 'process launch'."
|
|
if (exit_desc && exit_desc[0])
|
|
{
|
|
if (with_shell)
|
|
error.SetErrorStringWithFormat ("process exited with status %i (%s)" LAUNCH_SHELL_MESSAGE, exit_status, exit_desc);
|
|
else
|
|
error.SetErrorStringWithFormat ("process exited with status %i (%s)", exit_status, exit_desc);
|
|
}
|
|
else
|
|
{
|
|
if (with_shell)
|
|
error.SetErrorStringWithFormat ("process exited with status %i" LAUNCH_SHELL_MESSAGE, exit_status);
|
|
else
|
|
error.SetErrorStringWithFormat ("process exited with status %i", exit_status);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
error.SetErrorStringWithFormat ("initial process state wasn't stopped: %s", StateAsCString(state));
|
|
}
|
|
}
|
|
m_process_sp->RestoreProcessEvents ();
|
|
}
|
|
else
|
|
{
|
|
Error error2;
|
|
error2.SetErrorStringWithFormat ("process launch failed: %s", error.AsCString());
|
|
error = error2;
|
|
}
|
|
return error;
|
|
}
|
|
//--------------------------------------------------------------
|
|
// Target::StopHook
|
|
//--------------------------------------------------------------
|
|
Target::StopHook::StopHook (lldb::TargetSP target_sp, lldb::user_id_t uid) :
|
|
UserID (uid),
|
|
m_target_sp (target_sp),
|
|
m_commands (),
|
|
m_specifier_sp (),
|
|
m_thread_spec_ap(),
|
|
m_active (true)
|
|
{
|
|
}
|
|
|
|
Target::StopHook::StopHook (const StopHook &rhs) :
|
|
UserID (rhs.GetID()),
|
|
m_target_sp (rhs.m_target_sp),
|
|
m_commands (rhs.m_commands),
|
|
m_specifier_sp (rhs.m_specifier_sp),
|
|
m_thread_spec_ap (),
|
|
m_active (rhs.m_active)
|
|
{
|
|
if (rhs.m_thread_spec_ap.get() != NULL)
|
|
m_thread_spec_ap.reset (new ThreadSpec(*rhs.m_thread_spec_ap.get()));
|
|
}
|
|
|
|
|
|
Target::StopHook::~StopHook ()
|
|
{
|
|
}
|
|
|
|
void
|
|
Target::StopHook::SetThreadSpecifier (ThreadSpec *specifier)
|
|
{
|
|
m_thread_spec_ap.reset (specifier);
|
|
}
|
|
|
|
|
|
void
|
|
Target::StopHook::GetDescription (Stream *s, lldb::DescriptionLevel level) const
|
|
{
|
|
int indent_level = s->GetIndentLevel();
|
|
|
|
s->SetIndentLevel(indent_level + 2);
|
|
|
|
s->Printf ("Hook: %" PRIu64 "\n", GetID());
|
|
if (m_active)
|
|
s->Indent ("State: enabled\n");
|
|
else
|
|
s->Indent ("State: disabled\n");
|
|
|
|
if (m_specifier_sp)
|
|
{
|
|
s->Indent();
|
|
s->PutCString ("Specifier:\n");
|
|
s->SetIndentLevel (indent_level + 4);
|
|
m_specifier_sp->GetDescription (s, level);
|
|
s->SetIndentLevel (indent_level + 2);
|
|
}
|
|
|
|
if (m_thread_spec_ap.get() != NULL)
|
|
{
|
|
StreamString tmp;
|
|
s->Indent("Thread:\n");
|
|
m_thread_spec_ap->GetDescription (&tmp, level);
|
|
s->SetIndentLevel (indent_level + 4);
|
|
s->Indent (tmp.GetData());
|
|
s->PutCString ("\n");
|
|
s->SetIndentLevel (indent_level + 2);
|
|
}
|
|
|
|
s->Indent ("Commands: \n");
|
|
s->SetIndentLevel (indent_level + 4);
|
|
uint32_t num_commands = m_commands.GetSize();
|
|
for (uint32_t i = 0; i < num_commands; i++)
|
|
{
|
|
s->Indent(m_commands.GetStringAtIndex(i));
|
|
s->PutCString ("\n");
|
|
}
|
|
s->SetIndentLevel (indent_level);
|
|
}
|
|
|
|
//--------------------------------------------------------------
|
|
// class TargetProperties
|
|
//--------------------------------------------------------------
|
|
|
|
OptionEnumValueElement
|
|
lldb_private::g_dynamic_value_types[] =
|
|
{
|
|
{ eNoDynamicValues, "no-dynamic-values", "Don't calculate the dynamic type of values"},
|
|
{ eDynamicCanRunTarget, "run-target", "Calculate the dynamic type of values even if you have to run the target."},
|
|
{ eDynamicDontRunTarget, "no-run-target", "Calculate the dynamic type of values, but don't run the target."},
|
|
{ 0, NULL, NULL }
|
|
};
|
|
|
|
static OptionEnumValueElement
|
|
g_inline_breakpoint_enums[] =
|
|
{
|
|
{ eInlineBreakpointsNever, "never", "Never look for inline breakpoint locations (fastest). This setting should only be used if you know that no inlining occurs in your programs."},
|
|
{ eInlineBreakpointsHeaders, "headers", "Only check for inline breakpoint locations when setting breakpoints in header files, but not when setting breakpoint in implementation source files (default)."},
|
|
{ eInlineBreakpointsAlways, "always", "Always look for inline breakpoint locations when setting file and line breakpoints (slower but most accurate)."},
|
|
{ 0, NULL, NULL }
|
|
};
|
|
|
|
typedef enum x86DisassemblyFlavor
|
|
{
|
|
eX86DisFlavorDefault,
|
|
eX86DisFlavorIntel,
|
|
eX86DisFlavorATT
|
|
} x86DisassemblyFlavor;
|
|
|
|
static OptionEnumValueElement
|
|
g_x86_dis_flavor_value_types[] =
|
|
{
|
|
{ eX86DisFlavorDefault, "default", "Disassembler default (currently att)."},
|
|
{ eX86DisFlavorIntel, "intel", "Intel disassembler flavor."},
|
|
{ eX86DisFlavorATT, "att", "AT&T disassembler flavor."},
|
|
{ 0, NULL, NULL }
|
|
};
|
|
|
|
static OptionEnumValueElement
|
|
g_hex_immediate_style_values[] =
|
|
{
|
|
{ Disassembler::eHexStyleC, "c", "C-style (0xffff)."},
|
|
{ Disassembler::eHexStyleAsm, "asm", "Asm-style (0ffffh)."},
|
|
{ 0, NULL, NULL }
|
|
};
|
|
|
|
static OptionEnumValueElement
|
|
g_load_script_from_sym_file_values[] =
|
|
{
|
|
{ eLoadScriptFromSymFileTrue, "true", "Load debug scripts inside symbol files"},
|
|
{ eLoadScriptFromSymFileFalse, "false", "Do not load debug scripts inside symbol files."},
|
|
{ eLoadScriptFromSymFileWarn, "warn", "Warn about debug scripts inside symbol files but do not load them."},
|
|
{ 0, NULL, NULL }
|
|
};
|
|
|
|
|
|
static OptionEnumValueElement
|
|
g_memory_module_load_level_values[] =
|
|
{
|
|
{ eMemoryModuleLoadLevelMinimal, "minimal" , "Load minimal information when loading modules from memory. Currently this setting loads sections only."},
|
|
{ eMemoryModuleLoadLevelPartial, "partial" , "Load partial information when loading modules from memory. Currently this setting loads sections and function bounds."},
|
|
{ eMemoryModuleLoadLevelComplete, "complete", "Load complete information when loading modules from memory. Currently this setting loads sections and all symbols."},
|
|
{ 0, NULL, NULL }
|
|
};
|
|
|
|
static PropertyDefinition
|
|
g_properties[] =
|
|
{
|
|
{ "default-arch" , OptionValue::eTypeArch , true , 0 , NULL, NULL, "Default architecture to choose, when there's a choice." },
|
|
{ "expr-prefix" , OptionValue::eTypeFileSpec , false, 0 , NULL, NULL, "Path to a file containing expressions to be prepended to all expressions." },
|
|
{ "prefer-dynamic-value" , OptionValue::eTypeEnum , false, eNoDynamicValues , NULL, g_dynamic_value_types, "Should printed values be shown as their dynamic value." },
|
|
{ "enable-synthetic-value" , OptionValue::eTypeBoolean , false, true , NULL, NULL, "Should synthetic values be used by default whenever available." },
|
|
{ "skip-prologue" , OptionValue::eTypeBoolean , false, true , NULL, NULL, "Skip function prologues when setting breakpoints by name." },
|
|
{ "source-map" , OptionValue::eTypePathMap , false, 0 , NULL, NULL, "Source path remappings used to track the change of location between a source file when built, and "
|
|
"where it exists on the current system. It consists of an array of duples, the first element of each duple is "
|
|
"some part (starting at the root) of the path to the file when it was built, "
|
|
"and the second is where the remainder of the original build hierarchy is rooted on the local system. "
|
|
"Each element of the array is checked in order and the first one that results in a match wins." },
|
|
{ "exec-search-paths" , OptionValue::eTypeFileSpecList, false, 0 , NULL, NULL, "Executable search paths to use when locating executable files whose paths don't match the local file system." },
|
|
{ "debug-file-search-paths" , OptionValue::eTypeFileSpecList, false, 0 , NULL, NULL, "List of directories to be searched when locating debug symbol files." },
|
|
{ "max-children-count" , OptionValue::eTypeSInt64 , false, 256 , NULL, NULL, "Maximum number of children to expand in any level of depth." },
|
|
{ "max-string-summary-length" , OptionValue::eTypeSInt64 , false, 1024 , NULL, NULL, "Maximum number of characters to show when using %s in summary strings." },
|
|
{ "max-memory-read-size" , OptionValue::eTypeSInt64 , false, 1024 , NULL, NULL, "Maximum number of bytes that 'memory read' will fetch before --force must be specified." },
|
|
{ "breakpoints-use-platform-avoid-list", OptionValue::eTypeBoolean , false, true , NULL, NULL, "Consult the platform module avoid list when setting non-module specific breakpoints." },
|
|
{ "arg0" , OptionValue::eTypeString , false, 0 , NULL, NULL, "The first argument passed to the program in the argument array which can be different from the executable itself." },
|
|
{ "run-args" , OptionValue::eTypeArgs , false, 0 , NULL, NULL, "A list containing all the arguments to be passed to the executable when it is run. Note that this does NOT include the argv[0] which is in target.arg0." },
|
|
{ "env-vars" , OptionValue::eTypeDictionary, false, OptionValue::eTypeString , NULL, NULL, "A list of all the environment variables to be passed to the executable's environment, and their values." },
|
|
{ "inherit-env" , OptionValue::eTypeBoolean , false, true , NULL, NULL, "Inherit the environment from the process that is running LLDB." },
|
|
{ "input-path" , OptionValue::eTypeFileSpec , false, 0 , NULL, NULL, "The file/path to be used by the executable program for reading its standard input." },
|
|
{ "output-path" , OptionValue::eTypeFileSpec , false, 0 , NULL, NULL, "The file/path to be used by the executable program for writing its standard output." },
|
|
{ "error-path" , OptionValue::eTypeFileSpec , false, 0 , NULL, NULL, "The file/path to be used by the executable program for writing its standard error." },
|
|
{ "detach-on-error" , OptionValue::eTypeBoolean , false, true , NULL, NULL, "debugserver will detach (rather than killing) a process if it loses connection with lldb." },
|
|
{ "disable-aslr" , OptionValue::eTypeBoolean , false, true , NULL, NULL, "Disable Address Space Layout Randomization (ASLR)" },
|
|
{ "disable-stdio" , OptionValue::eTypeBoolean , false, false , NULL, NULL, "Disable stdin/stdout for process (e.g. for a GUI application)" },
|
|
{ "inline-breakpoint-strategy" , OptionValue::eTypeEnum , false, eInlineBreakpointsAlways , NULL, g_inline_breakpoint_enums, "The strategy to use when settings breakpoints by file and line. "
|
|
"Breakpoint locations can end up being inlined by the compiler, so that a compile unit 'a.c' might contain an inlined function from another source file. "
|
|
"Usually this is limitted to breakpoint locations from inlined functions from header or other include files, or more accurately non-implementation source files. "
|
|
"Sometimes code might #include implementation files and cause inlined breakpoint locations in inlined implementation files. "
|
|
"Always checking for inlined breakpoint locations can be expensive (memory and time), so if you have a project with many headers "
|
|
"and find that setting breakpoints is slow, then you can change this setting to headers. "
|
|
"This setting allows you to control exactly which strategy is used when setting "
|
|
"file and line breakpoints." },
|
|
// FIXME: This is the wrong way to do per-architecture settings, but we don't have a general per architecture settings system in place yet.
|
|
{ "x86-disassembly-flavor" , OptionValue::eTypeEnum , false, eX86DisFlavorDefault, NULL, g_x86_dis_flavor_value_types, "The default disassembly flavor to use for x86 or x86-64 targets." },
|
|
{ "use-hex-immediates" , OptionValue::eTypeBoolean , false, true, NULL, NULL, "Show immediates in disassembly as hexadecimal." },
|
|
{ "hex-immediate-style" , OptionValue::eTypeEnum , false, Disassembler::eHexStyleC, NULL, g_hex_immediate_style_values, "Which style to use for printing hexadecimal disassembly values." },
|
|
{ "use-fast-stepping" , OptionValue::eTypeBoolean , false, true, NULL, NULL, "Use a fast stepping algorithm based on running from branch to branch rather than instruction single-stepping." },
|
|
{ "load-script-from-symbol-file" , OptionValue::eTypeEnum , false, eLoadScriptFromSymFileWarn, NULL, g_load_script_from_sym_file_values, "Allow LLDB to load scripting resources embedded in symbol files when available." },
|
|
{ "memory-module-load-level" , OptionValue::eTypeEnum , false, eMemoryModuleLoadLevelComplete, NULL, g_memory_module_load_level_values,
|
|
"Loading modules from memory can be slow as reading the symbol tables and other data can take a long time depending on your connection to the debug target. "
|
|
"This setting helps users control how much information gets loaded when loading modules from memory."
|
|
"'complete' is the default value for this setting which will load all sections and symbols by reading them from memory (slowest, most accurate). "
|
|
"'partial' will load sections and attempt to find function bounds without downloading the symbol table (faster, still accurate, missing symbol names). "
|
|
"'minimal' is the fastest setting and will load section data with no symbols, but should rarely be used as stack frames in these memory regions will be inaccurate and not provide any context (fastest). " },
|
|
{ "display-expression-in-crashlogs" , OptionValue::eTypeBoolean , false, false, NULL, NULL, "Expressions that crash will show up in crash logs if the host system supports executable specific crash log strings and this setting is set to true." },
|
|
{ "trap-handler-names" , OptionValue::eTypeArray , true, OptionValue::eTypeString, NULL, NULL, "A list of trap handler function names, e.g. a common Unix user process one is _sigtramp." },
|
|
{ NULL , OptionValue::eTypeInvalid , false, 0 , NULL, NULL, NULL }
|
|
};
|
|
enum
|
|
{
|
|
ePropertyDefaultArch,
|
|
ePropertyExprPrefix,
|
|
ePropertyPreferDynamic,
|
|
ePropertyEnableSynthetic,
|
|
ePropertySkipPrologue,
|
|
ePropertySourceMap,
|
|
ePropertyExecutableSearchPaths,
|
|
ePropertyDebugFileSearchPaths,
|
|
ePropertyMaxChildrenCount,
|
|
ePropertyMaxSummaryLength,
|
|
ePropertyMaxMemReadSize,
|
|
ePropertyBreakpointUseAvoidList,
|
|
ePropertyArg0,
|
|
ePropertyRunArgs,
|
|
ePropertyEnvVars,
|
|
ePropertyInheritEnv,
|
|
ePropertyInputPath,
|
|
ePropertyOutputPath,
|
|
ePropertyErrorPath,
|
|
ePropertyDetachOnError,
|
|
ePropertyDisableASLR,
|
|
ePropertyDisableSTDIO,
|
|
ePropertyInlineStrategy,
|
|
ePropertyDisassemblyFlavor,
|
|
ePropertyUseHexImmediates,
|
|
ePropertyHexImmediateStyle,
|
|
ePropertyUseFastStepping,
|
|
ePropertyLoadScriptFromSymbolFile,
|
|
ePropertyMemoryModuleLoadLevel,
|
|
ePropertyDisplayExpressionsInCrashlogs,
|
|
ePropertyTrapHandlerNames
|
|
};
|
|
|
|
|
|
class TargetOptionValueProperties : public OptionValueProperties
|
|
{
|
|
public:
|
|
TargetOptionValueProperties (const ConstString &name) :
|
|
OptionValueProperties (name),
|
|
m_target (NULL),
|
|
m_got_host_env (false)
|
|
{
|
|
}
|
|
|
|
// This constructor is used when creating TargetOptionValueProperties when it
|
|
// is part of a new lldb_private::Target instance. It will copy all current
|
|
// global property values as needed
|
|
TargetOptionValueProperties (Target *target, const TargetPropertiesSP &target_properties_sp) :
|
|
OptionValueProperties(*target_properties_sp->GetValueProperties()),
|
|
m_target (target),
|
|
m_got_host_env (false)
|
|
{
|
|
}
|
|
|
|
virtual const Property *
|
|
GetPropertyAtIndex (const ExecutionContext *exe_ctx, bool will_modify, uint32_t idx) const
|
|
{
|
|
// When getting the value for a key from the target options, we will always
|
|
// try and grab the setting from the current target if there is one. Else we just
|
|
// use the one from this instance.
|
|
if (idx == ePropertyEnvVars)
|
|
GetHostEnvironmentIfNeeded ();
|
|
|
|
if (exe_ctx)
|
|
{
|
|
Target *target = exe_ctx->GetTargetPtr();
|
|
if (target)
|
|
{
|
|
TargetOptionValueProperties *target_properties = static_cast<TargetOptionValueProperties *>(target->GetValueProperties().get());
|
|
if (this != target_properties)
|
|
return target_properties->ProtectedGetPropertyAtIndex (idx);
|
|
}
|
|
}
|
|
return ProtectedGetPropertyAtIndex (idx);
|
|
}
|
|
|
|
lldb::TargetSP
|
|
GetTargetSP ()
|
|
{
|
|
return m_target->shared_from_this();
|
|
}
|
|
|
|
protected:
|
|
|
|
void
|
|
GetHostEnvironmentIfNeeded () const
|
|
{
|
|
if (!m_got_host_env)
|
|
{
|
|
if (m_target)
|
|
{
|
|
m_got_host_env = true;
|
|
const uint32_t idx = ePropertyInheritEnv;
|
|
if (GetPropertyAtIndexAsBoolean (NULL, idx, g_properties[idx].default_uint_value != 0))
|
|
{
|
|
PlatformSP platform_sp (m_target->GetPlatform());
|
|
if (platform_sp)
|
|
{
|
|
StringList env;
|
|
if (platform_sp->GetEnvironment(env))
|
|
{
|
|
OptionValueDictionary *env_dict = GetPropertyAtIndexAsOptionValueDictionary (NULL, ePropertyEnvVars);
|
|
if (env_dict)
|
|
{
|
|
const bool can_replace = false;
|
|
const size_t envc = env.GetSize();
|
|
for (size_t idx=0; idx<envc; idx++)
|
|
{
|
|
const char *env_entry = env.GetStringAtIndex (idx);
|
|
if (env_entry)
|
|
{
|
|
const char *equal_pos = ::strchr(env_entry, '=');
|
|
ConstString key;
|
|
// It is ok to have environment variables with no values
|
|
const char *value = NULL;
|
|
if (equal_pos)
|
|
{
|
|
key.SetCStringWithLength(env_entry, equal_pos - env_entry);
|
|
if (equal_pos[1])
|
|
value = equal_pos + 1;
|
|
}
|
|
else
|
|
{
|
|
key.SetCString(env_entry);
|
|
}
|
|
// Don't allow existing keys to be replaced with ones we get from the platform environment
|
|
env_dict->SetValueForKey(key, OptionValueSP(new OptionValueString(value)), can_replace);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
Target *m_target;
|
|
mutable bool m_got_host_env;
|
|
};
|
|
|
|
//----------------------------------------------------------------------
|
|
// TargetProperties
|
|
//----------------------------------------------------------------------
|
|
TargetProperties::TargetProperties (Target *target) :
|
|
Properties ()
|
|
{
|
|
if (target)
|
|
{
|
|
m_collection_sp.reset (new TargetOptionValueProperties(target, Target::GetGlobalProperties()));
|
|
}
|
|
else
|
|
{
|
|
m_collection_sp.reset (new TargetOptionValueProperties(ConstString("target")));
|
|
m_collection_sp->Initialize(g_properties);
|
|
m_collection_sp->AppendProperty(ConstString("process"),
|
|
ConstString("Settings specify to processes."),
|
|
true,
|
|
Process::GetGlobalProperties()->GetValueProperties());
|
|
}
|
|
}
|
|
|
|
TargetProperties::~TargetProperties ()
|
|
{
|
|
}
|
|
ArchSpec
|
|
TargetProperties::GetDefaultArchitecture () const
|
|
{
|
|
OptionValueArch *value = m_collection_sp->GetPropertyAtIndexAsOptionValueArch (NULL, ePropertyDefaultArch);
|
|
if (value)
|
|
return value->GetCurrentValue();
|
|
return ArchSpec();
|
|
}
|
|
|
|
void
|
|
TargetProperties::SetDefaultArchitecture (const ArchSpec& arch)
|
|
{
|
|
OptionValueArch *value = m_collection_sp->GetPropertyAtIndexAsOptionValueArch (NULL, ePropertyDefaultArch);
|
|
if (value)
|
|
return value->SetCurrentValue(arch, true);
|
|
}
|
|
|
|
lldb::DynamicValueType
|
|
TargetProperties::GetPreferDynamicValue() const
|
|
{
|
|
const uint32_t idx = ePropertyPreferDynamic;
|
|
return (lldb::DynamicValueType)m_collection_sp->GetPropertyAtIndexAsEnumeration (NULL, idx, g_properties[idx].default_uint_value);
|
|
}
|
|
|
|
bool
|
|
TargetProperties::GetDisableASLR () const
|
|
{
|
|
const uint32_t idx = ePropertyDisableASLR;
|
|
return m_collection_sp->GetPropertyAtIndexAsBoolean (NULL, idx, g_properties[idx].default_uint_value != 0);
|
|
}
|
|
|
|
void
|
|
TargetProperties::SetDisableASLR (bool b)
|
|
{
|
|
const uint32_t idx = ePropertyDisableASLR;
|
|
m_collection_sp->SetPropertyAtIndexAsBoolean (NULL, idx, b);
|
|
}
|
|
|
|
bool
|
|
TargetProperties::GetDetachOnError () const
|
|
{
|
|
const uint32_t idx = ePropertyDetachOnError;
|
|
return m_collection_sp->GetPropertyAtIndexAsBoolean (NULL, idx, g_properties[idx].default_uint_value != 0);
|
|
}
|
|
|
|
void
|
|
TargetProperties::SetDetachOnError (bool b)
|
|
{
|
|
const uint32_t idx = ePropertyDetachOnError;
|
|
m_collection_sp->SetPropertyAtIndexAsBoolean (NULL, idx, b);
|
|
}
|
|
|
|
bool
|
|
TargetProperties::GetDisableSTDIO () const
|
|
{
|
|
const uint32_t idx = ePropertyDisableSTDIO;
|
|
return m_collection_sp->GetPropertyAtIndexAsBoolean (NULL, idx, g_properties[idx].default_uint_value != 0);
|
|
}
|
|
|
|
void
|
|
TargetProperties::SetDisableSTDIO (bool b)
|
|
{
|
|
const uint32_t idx = ePropertyDisableSTDIO;
|
|
m_collection_sp->SetPropertyAtIndexAsBoolean (NULL, idx, b);
|
|
}
|
|
|
|
const char *
|
|
TargetProperties::GetDisassemblyFlavor () const
|
|
{
|
|
const uint32_t idx = ePropertyDisassemblyFlavor;
|
|
const char *return_value;
|
|
|
|
x86DisassemblyFlavor flavor_value = (x86DisassemblyFlavor) m_collection_sp->GetPropertyAtIndexAsEnumeration (NULL, idx, g_properties[idx].default_uint_value);
|
|
return_value = g_x86_dis_flavor_value_types[flavor_value].string_value;
|
|
return return_value;
|
|
}
|
|
|
|
InlineStrategy
|
|
TargetProperties::GetInlineStrategy () const
|
|
{
|
|
const uint32_t idx = ePropertyInlineStrategy;
|
|
return (InlineStrategy)m_collection_sp->GetPropertyAtIndexAsEnumeration (NULL, idx, g_properties[idx].default_uint_value);
|
|
}
|
|
|
|
const char *
|
|
TargetProperties::GetArg0 () const
|
|
{
|
|
const uint32_t idx = ePropertyArg0;
|
|
return m_collection_sp->GetPropertyAtIndexAsString (NULL, idx, NULL);
|
|
}
|
|
|
|
void
|
|
TargetProperties::SetArg0 (const char *arg)
|
|
{
|
|
const uint32_t idx = ePropertyArg0;
|
|
m_collection_sp->SetPropertyAtIndexAsString (NULL, idx, arg);
|
|
}
|
|
|
|
bool
|
|
TargetProperties::GetRunArguments (Args &args) const
|
|
{
|
|
const uint32_t idx = ePropertyRunArgs;
|
|
return m_collection_sp->GetPropertyAtIndexAsArgs (NULL, idx, args);
|
|
}
|
|
|
|
void
|
|
TargetProperties::SetRunArguments (const Args &args)
|
|
{
|
|
const uint32_t idx = ePropertyRunArgs;
|
|
m_collection_sp->SetPropertyAtIndexFromArgs (NULL, idx, args);
|
|
}
|
|
|
|
size_t
|
|
TargetProperties::GetEnvironmentAsArgs (Args &env) const
|
|
{
|
|
const uint32_t idx = ePropertyEnvVars;
|
|
return m_collection_sp->GetPropertyAtIndexAsArgs (NULL, idx, env);
|
|
}
|
|
|
|
bool
|
|
TargetProperties::GetSkipPrologue() const
|
|
{
|
|
const uint32_t idx = ePropertySkipPrologue;
|
|
return m_collection_sp->GetPropertyAtIndexAsBoolean (NULL, idx, g_properties[idx].default_uint_value != 0);
|
|
}
|
|
|
|
PathMappingList &
|
|
TargetProperties::GetSourcePathMap () const
|
|
{
|
|
const uint32_t idx = ePropertySourceMap;
|
|
OptionValuePathMappings *option_value = m_collection_sp->GetPropertyAtIndexAsOptionValuePathMappings (NULL, false, idx);
|
|
assert(option_value);
|
|
return option_value->GetCurrentValue();
|
|
}
|
|
|
|
FileSpecList &
|
|
TargetProperties::GetExecutableSearchPaths ()
|
|
{
|
|
const uint32_t idx = ePropertyExecutableSearchPaths;
|
|
OptionValueFileSpecList *option_value = m_collection_sp->GetPropertyAtIndexAsOptionValueFileSpecList (NULL, false, idx);
|
|
assert(option_value);
|
|
return option_value->GetCurrentValue();
|
|
}
|
|
|
|
FileSpecList &
|
|
TargetProperties::GetDebugFileSearchPaths ()
|
|
{
|
|
const uint32_t idx = ePropertyDebugFileSearchPaths;
|
|
OptionValueFileSpecList *option_value = m_collection_sp->GetPropertyAtIndexAsOptionValueFileSpecList (NULL, false, idx);
|
|
assert(option_value);
|
|
return option_value->GetCurrentValue();
|
|
}
|
|
|
|
bool
|
|
TargetProperties::GetEnableSyntheticValue () const
|
|
{
|
|
const uint32_t idx = ePropertyEnableSynthetic;
|
|
return m_collection_sp->GetPropertyAtIndexAsBoolean (NULL, idx, g_properties[idx].default_uint_value != 0);
|
|
}
|
|
|
|
uint32_t
|
|
TargetProperties::GetMaximumNumberOfChildrenToDisplay() const
|
|
{
|
|
const uint32_t idx = ePropertyMaxChildrenCount;
|
|
return m_collection_sp->GetPropertyAtIndexAsSInt64 (NULL, idx, g_properties[idx].default_uint_value);
|
|
}
|
|
|
|
uint32_t
|
|
TargetProperties::GetMaximumSizeOfStringSummary() const
|
|
{
|
|
const uint32_t idx = ePropertyMaxSummaryLength;
|
|
return m_collection_sp->GetPropertyAtIndexAsSInt64 (NULL, idx, g_properties[idx].default_uint_value);
|
|
}
|
|
|
|
uint32_t
|
|
TargetProperties::GetMaximumMemReadSize () const
|
|
{
|
|
const uint32_t idx = ePropertyMaxMemReadSize;
|
|
return m_collection_sp->GetPropertyAtIndexAsSInt64 (NULL, idx, g_properties[idx].default_uint_value);
|
|
}
|
|
|
|
FileSpec
|
|
TargetProperties::GetStandardInputPath () const
|
|
{
|
|
const uint32_t idx = ePropertyInputPath;
|
|
return m_collection_sp->GetPropertyAtIndexAsFileSpec (NULL, idx);
|
|
}
|
|
|
|
void
|
|
TargetProperties::SetStandardInputPath (const char *p)
|
|
{
|
|
const uint32_t idx = ePropertyInputPath;
|
|
m_collection_sp->SetPropertyAtIndexAsString (NULL, idx, p);
|
|
}
|
|
|
|
FileSpec
|
|
TargetProperties::GetStandardOutputPath () const
|
|
{
|
|
const uint32_t idx = ePropertyOutputPath;
|
|
return m_collection_sp->GetPropertyAtIndexAsFileSpec (NULL, idx);
|
|
}
|
|
|
|
void
|
|
TargetProperties::SetStandardOutputPath (const char *p)
|
|
{
|
|
const uint32_t idx = ePropertyOutputPath;
|
|
m_collection_sp->SetPropertyAtIndexAsString (NULL, idx, p);
|
|
}
|
|
|
|
FileSpec
|
|
TargetProperties::GetStandardErrorPath () const
|
|
{
|
|
const uint32_t idx = ePropertyErrorPath;
|
|
return m_collection_sp->GetPropertyAtIndexAsFileSpec(NULL, idx);
|
|
}
|
|
|
|
const char *
|
|
TargetProperties::GetExpressionPrefixContentsAsCString ()
|
|
{
|
|
const uint32_t idx = ePropertyExprPrefix;
|
|
OptionValueFileSpec *file = m_collection_sp->GetPropertyAtIndexAsOptionValueFileSpec (NULL, false, idx);
|
|
if (file)
|
|
{
|
|
const bool null_terminate = true;
|
|
DataBufferSP data_sp(file->GetFileContents(null_terminate));
|
|
if (data_sp)
|
|
return (const char *) data_sp->GetBytes();
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
void
|
|
TargetProperties::SetStandardErrorPath (const char *p)
|
|
{
|
|
const uint32_t idx = ePropertyErrorPath;
|
|
m_collection_sp->SetPropertyAtIndexAsString (NULL, idx, p);
|
|
}
|
|
|
|
bool
|
|
TargetProperties::GetBreakpointsConsultPlatformAvoidList ()
|
|
{
|
|
const uint32_t idx = ePropertyBreakpointUseAvoidList;
|
|
return m_collection_sp->GetPropertyAtIndexAsBoolean (NULL, idx, g_properties[idx].default_uint_value != 0);
|
|
}
|
|
|
|
bool
|
|
TargetProperties::GetUseHexImmediates () const
|
|
{
|
|
const uint32_t idx = ePropertyUseHexImmediates;
|
|
return m_collection_sp->GetPropertyAtIndexAsBoolean (NULL, idx, g_properties[idx].default_uint_value != 0);
|
|
}
|
|
|
|
bool
|
|
TargetProperties::GetUseFastStepping () const
|
|
{
|
|
const uint32_t idx = ePropertyUseFastStepping;
|
|
return m_collection_sp->GetPropertyAtIndexAsBoolean (NULL, idx, g_properties[idx].default_uint_value != 0);
|
|
}
|
|
|
|
bool
|
|
TargetProperties::GetDisplayExpressionsInCrashlogs () const
|
|
{
|
|
const uint32_t idx = ePropertyDisplayExpressionsInCrashlogs;
|
|
return m_collection_sp->GetPropertyAtIndexAsBoolean (NULL, idx, g_properties[idx].default_uint_value != 0);
|
|
}
|
|
|
|
LoadScriptFromSymFile
|
|
TargetProperties::GetLoadScriptFromSymbolFile () const
|
|
{
|
|
const uint32_t idx = ePropertyLoadScriptFromSymbolFile;
|
|
return (LoadScriptFromSymFile)m_collection_sp->GetPropertyAtIndexAsEnumeration(NULL, idx, g_properties[idx].default_uint_value);
|
|
}
|
|
|
|
Disassembler::HexImmediateStyle
|
|
TargetProperties::GetHexImmediateStyle () const
|
|
{
|
|
const uint32_t idx = ePropertyHexImmediateStyle;
|
|
return (Disassembler::HexImmediateStyle)m_collection_sp->GetPropertyAtIndexAsEnumeration(NULL, idx, g_properties[idx].default_uint_value);
|
|
}
|
|
|
|
MemoryModuleLoadLevel
|
|
TargetProperties::GetMemoryModuleLoadLevel() const
|
|
{
|
|
const uint32_t idx = ePropertyMemoryModuleLoadLevel;
|
|
return (MemoryModuleLoadLevel)m_collection_sp->GetPropertyAtIndexAsEnumeration(NULL, idx, g_properties[idx].default_uint_value);
|
|
}
|
|
|
|
bool
|
|
TargetProperties::GetUserSpecifiedTrapHandlerNames (Args &args) const
|
|
{
|
|
const uint32_t idx = ePropertyTrapHandlerNames;
|
|
return m_collection_sp->GetPropertyAtIndexAsArgs (NULL, idx, args);
|
|
}
|
|
|
|
void
|
|
TargetProperties::SetUserSpecifiedTrapHandlerNames (const Args &args)
|
|
{
|
|
const uint32_t idx = ePropertyTrapHandlerNames;
|
|
m_collection_sp->SetPropertyAtIndexFromArgs (NULL, idx, args);
|
|
}
|
|
|
|
//----------------------------------------------------------------------
|
|
// Target::TargetEventData
|
|
//----------------------------------------------------------------------
|
|
const ConstString &
|
|
Target::TargetEventData::GetFlavorString ()
|
|
{
|
|
static ConstString g_flavor ("Target::TargetEventData");
|
|
return g_flavor;
|
|
}
|
|
|
|
const ConstString &
|
|
Target::TargetEventData::GetFlavor () const
|
|
{
|
|
return TargetEventData::GetFlavorString ();
|
|
}
|
|
|
|
Target::TargetEventData::TargetEventData (const lldb::TargetSP &new_target_sp) :
|
|
EventData(),
|
|
m_target_sp (new_target_sp)
|
|
{
|
|
}
|
|
|
|
Target::TargetEventData::~TargetEventData()
|
|
{
|
|
|
|
}
|
|
|
|
void
|
|
Target::TargetEventData::Dump (Stream *s) const
|
|
{
|
|
|
|
}
|
|
|
|
const TargetSP
|
|
Target::TargetEventData::GetTargetFromEvent (const lldb::EventSP &event_sp)
|
|
{
|
|
TargetSP target_sp;
|
|
|
|
const TargetEventData *data = GetEventDataFromEvent (event_sp.get());
|
|
if (data)
|
|
target_sp = data->m_target_sp;
|
|
|
|
return target_sp;
|
|
}
|
|
|
|
const Target::TargetEventData *
|
|
Target::TargetEventData::GetEventDataFromEvent (const Event *event_ptr)
|
|
{
|
|
if (event_ptr)
|
|
{
|
|
const EventData *event_data = event_ptr->GetData();
|
|
if (event_data && event_data->GetFlavor() == TargetEventData::GetFlavorString())
|
|
return static_cast <const TargetEventData *> (event_ptr->GetData());
|
|
}
|
|
return NULL;
|
|
}
|
|
|