forked from OSchip/llvm-project
1923 lines
64 KiB
C++
1923 lines
64 KiB
C++
//===-- Host.mm -------------------------------------------------*- C++ -*-===//
|
|
//
|
|
// The LLVM Compiler Infrastructure
|
|
//
|
|
// This file is distributed under the University of Illinois Open Source
|
|
// License. See LICENSE.TXT for details.
|
|
//
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
#include "lldb/Host/Host.h"
|
|
|
|
#include <AvailabilityMacros.h>
|
|
|
|
#if !defined(MAC_OS_X_VERSION_10_7) || MAC_OS_X_VERSION_MAX_ALLOWED < MAC_OS_X_VERSION_10_7
|
|
#define NO_XPC_SERVICES 1
|
|
#endif
|
|
|
|
#if !defined(NO_XPC_SERVICES)
|
|
#define __XPC_PRIVATE_H__
|
|
#include <xpc/xpc.h>
|
|
#include "launcherXPCService/LauncherXPCService.h"
|
|
#endif
|
|
|
|
#include <asl.h>
|
|
#include <crt_externs.h>
|
|
#include <execinfo.h>
|
|
#include <grp.h>
|
|
#include <libproc.h>
|
|
#include <pwd.h>
|
|
#include <spawn.h>
|
|
#include <stdio.h>
|
|
#include <sys/proc.h>
|
|
#include <sys/stat.h>
|
|
#include <sys/sysctl.h>
|
|
#include <sys/types.h>
|
|
#include <unistd.h>
|
|
|
|
#include "lldb/Core/ArchSpec.h"
|
|
#include "lldb/Core/Communication.h"
|
|
#include "lldb/Core/ConnectionFileDescriptor.h"
|
|
#include "lldb/Core/DataExtractor.h"
|
|
#include "lldb/Core/Log.h"
|
|
#include "lldb/Core/Module.h"
|
|
#include "lldb/Core/StreamFile.h"
|
|
#include "lldb/Core/StreamString.h"
|
|
#include "lldb/Host/Endian.h"
|
|
#include "lldb/Host/FileSpec.h"
|
|
#include "lldb/Target/Platform.h"
|
|
#include "lldb/Target/Process.h"
|
|
#include "lldb/Utility/CleanUp.h"
|
|
|
|
#include "cfcpp/CFCBundle.h"
|
|
#include "cfcpp/CFCMutableArray.h"
|
|
#include "cfcpp/CFCMutableDictionary.h"
|
|
#include "cfcpp/CFCReleaser.h"
|
|
#include "cfcpp/CFCString.h"
|
|
|
|
#include "llvm/Support/Host.h"
|
|
#include "llvm/Support/MachO.h"
|
|
|
|
#include <objc/objc-auto.h>
|
|
|
|
#include <CoreFoundation/CoreFoundation.h>
|
|
#include <Foundation/Foundation.h>
|
|
|
|
#if !defined(__arm__)
|
|
#include <Carbon/Carbon.h>
|
|
#endif
|
|
|
|
#ifndef _POSIX_SPAWN_DISABLE_ASLR
|
|
#define _POSIX_SPAWN_DISABLE_ASLR 0x0100
|
|
#endif
|
|
|
|
extern "C"
|
|
{
|
|
int __pthread_chdir(const char *path);
|
|
int __pthread_fchdir (int fildes);
|
|
}
|
|
|
|
using namespace lldb;
|
|
using namespace lldb_private;
|
|
|
|
static pthread_once_t g_thread_create_once = PTHREAD_ONCE_INIT;
|
|
static pthread_key_t g_thread_create_key = 0;
|
|
|
|
class MacOSXDarwinThread
|
|
{
|
|
public:
|
|
MacOSXDarwinThread(const char *thread_name) :
|
|
m_pool (nil)
|
|
{
|
|
// Register our thread with the collector if garbage collection is enabled.
|
|
if (objc_collectingEnabled())
|
|
{
|
|
#if MAC_OS_X_VERSION_MAX_ALLOWED <= MAC_OS_X_VERSION_10_5
|
|
// On Leopard and earlier there is no way objc_registerThreadWithCollector
|
|
// function, so we do it manually.
|
|
auto_zone_register_thread(auto_zone());
|
|
#else
|
|
// On SnowLeopard and later we just call the thread registration function.
|
|
objc_registerThreadWithCollector();
|
|
#endif
|
|
}
|
|
else
|
|
{
|
|
m_pool = [[NSAutoreleasePool alloc] init];
|
|
}
|
|
|
|
|
|
Host::SetThreadName (LLDB_INVALID_PROCESS_ID, LLDB_INVALID_THREAD_ID, thread_name);
|
|
}
|
|
|
|
~MacOSXDarwinThread()
|
|
{
|
|
if (m_pool)
|
|
{
|
|
[m_pool drain];
|
|
m_pool = nil;
|
|
}
|
|
}
|
|
|
|
static void PThreadDestructor (void *v)
|
|
{
|
|
if (v)
|
|
delete static_cast<MacOSXDarwinThread*>(v);
|
|
::pthread_setspecific (g_thread_create_key, NULL);
|
|
}
|
|
|
|
protected:
|
|
NSAutoreleasePool * m_pool;
|
|
private:
|
|
DISALLOW_COPY_AND_ASSIGN (MacOSXDarwinThread);
|
|
};
|
|
|
|
static void
|
|
InitThreadCreated()
|
|
{
|
|
::pthread_key_create (&g_thread_create_key, MacOSXDarwinThread::PThreadDestructor);
|
|
}
|
|
|
|
void
|
|
Host::ThreadCreated (const char *thread_name)
|
|
{
|
|
::pthread_once (&g_thread_create_once, InitThreadCreated);
|
|
if (g_thread_create_key)
|
|
{
|
|
::pthread_setspecific (g_thread_create_key, new MacOSXDarwinThread(thread_name));
|
|
}
|
|
}
|
|
|
|
bool
|
|
Host::GetBundleDirectory (const FileSpec &file, FileSpec &bundle_directory)
|
|
{
|
|
#if defined (__APPLE__)
|
|
if (file.GetFileType () == FileSpec::eFileTypeDirectory)
|
|
{
|
|
char path[PATH_MAX];
|
|
if (file.GetPath(path, sizeof(path)))
|
|
{
|
|
CFCBundle bundle (path);
|
|
if (bundle.GetPath (path, sizeof(path)))
|
|
{
|
|
bundle_directory.SetFile (path, false);
|
|
return true;
|
|
}
|
|
}
|
|
}
|
|
#endif
|
|
bundle_directory.Clear();
|
|
return false;
|
|
}
|
|
|
|
|
|
bool
|
|
Host::ResolveExecutableInBundle (FileSpec &file)
|
|
{
|
|
#if defined (__APPLE__)
|
|
if (file.GetFileType () == FileSpec::eFileTypeDirectory)
|
|
{
|
|
char path[PATH_MAX];
|
|
if (file.GetPath(path, sizeof(path)))
|
|
{
|
|
CFCBundle bundle (path);
|
|
CFCReleaser<CFURLRef> url(bundle.CopyExecutableURL ());
|
|
if (url.get())
|
|
{
|
|
if (::CFURLGetFileSystemRepresentation (url.get(), YES, (UInt8*)path, sizeof(path)))
|
|
{
|
|
file.SetFile(path, false);
|
|
return true;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
#endif
|
|
return false;
|
|
}
|
|
|
|
lldb::pid_t
|
|
Host::LaunchApplication (const FileSpec &app_file_spec)
|
|
{
|
|
#if defined (__arm__)
|
|
return LLDB_INVALID_PROCESS_ID;
|
|
#else
|
|
char app_path[PATH_MAX];
|
|
app_file_spec.GetPath(app_path, sizeof(app_path));
|
|
|
|
LSApplicationParameters app_params;
|
|
::memset (&app_params, 0, sizeof (app_params));
|
|
app_params.flags = kLSLaunchDefaults |
|
|
kLSLaunchDontAddToRecents |
|
|
kLSLaunchNewInstance;
|
|
|
|
|
|
FSRef app_fsref;
|
|
CFCString app_cfstr (app_path, kCFStringEncodingUTF8);
|
|
|
|
OSStatus error = ::FSPathMakeRef ((const UInt8 *)app_path, &app_fsref, NULL);
|
|
|
|
// If we found the app, then store away the name so we don't have to re-look it up.
|
|
if (error != noErr)
|
|
return LLDB_INVALID_PROCESS_ID;
|
|
|
|
app_params.application = &app_fsref;
|
|
|
|
ProcessSerialNumber psn;
|
|
|
|
error = ::LSOpenApplication (&app_params, &psn);
|
|
|
|
if (error != noErr)
|
|
return LLDB_INVALID_PROCESS_ID;
|
|
|
|
::pid_t pid = LLDB_INVALID_PROCESS_ID;
|
|
error = ::GetProcessPID(&psn, &pid);
|
|
if (error != noErr)
|
|
return LLDB_INVALID_PROCESS_ID;
|
|
return pid;
|
|
#endif
|
|
}
|
|
|
|
|
|
static void *
|
|
AcceptPIDFromInferior (void *arg)
|
|
{
|
|
const char *connect_url = (const char *)arg;
|
|
ConnectionFileDescriptor file_conn;
|
|
Error error;
|
|
if (file_conn.Connect (connect_url, &error) == eConnectionStatusSuccess)
|
|
{
|
|
char pid_str[256];
|
|
::memset (pid_str, 0, sizeof(pid_str));
|
|
ConnectionStatus status;
|
|
const size_t pid_str_len = file_conn.Read (pid_str, sizeof(pid_str), 0, status, NULL);
|
|
if (pid_str_len > 0)
|
|
{
|
|
int pid = atoi (pid_str);
|
|
return (void *)(intptr_t)pid;
|
|
}
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
static bool
|
|
WaitForProcessToSIGSTOP (const lldb::pid_t pid, const int timeout_in_seconds)
|
|
{
|
|
const int time_delta_usecs = 100000;
|
|
const int num_retries = timeout_in_seconds/time_delta_usecs;
|
|
for (int i=0; i<num_retries; i++)
|
|
{
|
|
struct proc_bsdinfo bsd_info;
|
|
int error = ::proc_pidinfo (pid, PROC_PIDTBSDINFO,
|
|
(uint64_t) 0,
|
|
&bsd_info,
|
|
PROC_PIDTBSDINFO_SIZE);
|
|
|
|
switch (error)
|
|
{
|
|
case EINVAL:
|
|
case ENOTSUP:
|
|
case ESRCH:
|
|
case EPERM:
|
|
return false;
|
|
|
|
default:
|
|
break;
|
|
|
|
case 0:
|
|
if (bsd_info.pbi_status == SSTOP)
|
|
return true;
|
|
}
|
|
::usleep (time_delta_usecs);
|
|
}
|
|
return false;
|
|
}
|
|
#if !defined(__arm__)
|
|
|
|
//static lldb::pid_t
|
|
//LaunchInNewTerminalWithCommandFile
|
|
//(
|
|
// const char **argv,
|
|
// const char **envp,
|
|
// const char *working_dir,
|
|
// const ArchSpec *arch_spec,
|
|
// bool stop_at_entry,
|
|
// bool disable_aslr
|
|
//)
|
|
//{
|
|
// if (!argv || !argv[0])
|
|
// return LLDB_INVALID_PROCESS_ID;
|
|
//
|
|
// OSStatus error = 0;
|
|
//
|
|
// FileSpec program (argv[0], false);
|
|
//
|
|
//
|
|
// std::string unix_socket_name;
|
|
//
|
|
// char temp_file_path[PATH_MAX];
|
|
// const char *tmpdir = ::getenv ("TMPDIR");
|
|
// if (tmpdir == NULL)
|
|
// tmpdir = "/tmp/";
|
|
// ::snprintf (temp_file_path, sizeof(temp_file_path), "%s%s-XXXXXX", tmpdir, program.GetFilename().AsCString());
|
|
//
|
|
// if (::mktemp (temp_file_path) == NULL)
|
|
// return LLDB_INVALID_PROCESS_ID;
|
|
//
|
|
// unix_socket_name.assign (temp_file_path);
|
|
//
|
|
// ::strlcat (temp_file_path, ".command", sizeof (temp_file_path));
|
|
//
|
|
// StreamFile command_file;
|
|
// command_file.GetFile().Open (temp_file_path,
|
|
// File::eOpenOptionWrite | File::eOpenOptionCanCreate,
|
|
// File::ePermissionsDefault);
|
|
//
|
|
// if (!command_file.GetFile().IsValid())
|
|
// return LLDB_INVALID_PROCESS_ID;
|
|
//
|
|
// FileSpec darwin_debug_file_spec;
|
|
// if (!Host::GetLLDBPath (ePathTypeSupportExecutableDir, darwin_debug_file_spec))
|
|
// return LLDB_INVALID_PROCESS_ID;
|
|
// darwin_debug_file_spec.GetFilename().SetCString("darwin-debug");
|
|
//
|
|
// if (!darwin_debug_file_spec.Exists())
|
|
// return LLDB_INVALID_PROCESS_ID;
|
|
//
|
|
// char launcher_path[PATH_MAX];
|
|
// darwin_debug_file_spec.GetPath(launcher_path, sizeof(launcher_path));
|
|
// command_file.Printf("\"%s\" ", launcher_path);
|
|
//
|
|
// command_file.Printf("--unix-socket=%s ", unix_socket_name.c_str());
|
|
//
|
|
// if (arch_spec && arch_spec->IsValid())
|
|
// {
|
|
// command_file.Printf("--arch=%s ", arch_spec->GetArchitectureName());
|
|
// }
|
|
//
|
|
// if (disable_aslr)
|
|
// {
|
|
// command_file.PutCString("--disable-aslr ");
|
|
// }
|
|
//
|
|
// command_file.PutCString("-- ");
|
|
//
|
|
// if (argv)
|
|
// {
|
|
// for (size_t i=0; argv[i] != NULL; ++i)
|
|
// {
|
|
// command_file.Printf("\"%s\" ", argv[i]);
|
|
// }
|
|
// }
|
|
// command_file.PutCString("\necho Process exited with status $?\n");
|
|
// command_file.GetFile().Close();
|
|
// if (::chmod (temp_file_path, S_IRWXU | S_IRWXG) != 0)
|
|
// return LLDB_INVALID_PROCESS_ID;
|
|
//
|
|
// CFCMutableDictionary cf_env_dict;
|
|
//
|
|
// const bool can_create = true;
|
|
// if (envp)
|
|
// {
|
|
// for (size_t i=0; envp[i] != NULL; ++i)
|
|
// {
|
|
// const char *env_entry = envp[i];
|
|
// const char *equal_pos = strchr(env_entry, '=');
|
|
// if (equal_pos)
|
|
// {
|
|
// std::string env_key (env_entry, equal_pos);
|
|
// std::string env_val (equal_pos + 1);
|
|
// CFCString cf_env_key (env_key.c_str(), kCFStringEncodingUTF8);
|
|
// CFCString cf_env_val (env_val.c_str(), kCFStringEncodingUTF8);
|
|
// cf_env_dict.AddValue (cf_env_key.get(), cf_env_val.get(), can_create);
|
|
// }
|
|
// }
|
|
// }
|
|
//
|
|
// LSApplicationParameters app_params;
|
|
// ::memset (&app_params, 0, sizeof (app_params));
|
|
// app_params.flags = kLSLaunchDontAddToRecents | kLSLaunchAsync;
|
|
// app_params.argv = NULL;
|
|
// app_params.environment = (CFDictionaryRef)cf_env_dict.get();
|
|
//
|
|
// CFCReleaser<CFURLRef> command_file_url (::CFURLCreateFromFileSystemRepresentation (NULL,
|
|
// (const UInt8 *)temp_file_path,
|
|
// strlen(temp_file_path),
|
|
// false));
|
|
//
|
|
// CFCMutableArray urls;
|
|
//
|
|
// // Terminal.app will open the ".command" file we have created
|
|
// // and run our process inside it which will wait at the entry point
|
|
// // for us to attach.
|
|
// urls.AppendValue(command_file_url.get());
|
|
//
|
|
//
|
|
// lldb::pid_t pid = LLDB_INVALID_PROCESS_ID;
|
|
//
|
|
// Error lldb_error;
|
|
// // Sleep and wait a bit for debugserver to start to listen...
|
|
// char connect_url[128];
|
|
// ::snprintf (connect_url, sizeof(connect_url), "unix-accept://%s", unix_socket_name.c_str());
|
|
//
|
|
// // Spawn a new thread to accept incoming connection on the connect_url
|
|
// // so we can grab the pid from the inferior
|
|
// lldb::thread_t accept_thread = Host::ThreadCreate (unix_socket_name.c_str(),
|
|
// AcceptPIDFromInferior,
|
|
// connect_url,
|
|
// &lldb_error);
|
|
//
|
|
// ProcessSerialNumber psn;
|
|
// error = LSOpenURLsWithRole(urls.get(), kLSRolesShell, NULL, &app_params, &psn, 1);
|
|
// if (error == noErr)
|
|
// {
|
|
// thread_result_t accept_thread_result = NULL;
|
|
// if (Host::ThreadJoin (accept_thread, &accept_thread_result, &lldb_error))
|
|
// {
|
|
// if (accept_thread_result)
|
|
// {
|
|
// pid = (intptr_t)accept_thread_result;
|
|
//
|
|
// // Wait for process to be stopped the the entry point by watching
|
|
// // for the process status to be set to SSTOP which indicates it it
|
|
// // SIGSTOP'ed at the entry point
|
|
// WaitForProcessToSIGSTOP (pid, 5);
|
|
// }
|
|
// }
|
|
// }
|
|
// else
|
|
// {
|
|
// Host::ThreadCancel (accept_thread, &lldb_error);
|
|
// }
|
|
//
|
|
// return pid;
|
|
//}
|
|
|
|
const char *applscript_in_new_tty =
|
|
"tell application \"Terminal\"\n"
|
|
" do script \"%s\"\n"
|
|
"end tell\n";
|
|
|
|
|
|
const char *applscript_in_existing_tty = "\
|
|
set the_shell_script to \"%s\"\n\
|
|
tell application \"Terminal\"\n\
|
|
repeat with the_window in (get windows)\n\
|
|
repeat with the_tab in tabs of the_window\n\
|
|
set the_tty to tty in the_tab\n\
|
|
if the_tty contains \"%s\" then\n\
|
|
if the_tab is not busy then\n\
|
|
set selected of the_tab to true\n\
|
|
set frontmost of the_window to true\n\
|
|
do script the_shell_script in the_tab\n\
|
|
return\n\
|
|
end if\n\
|
|
end if\n\
|
|
end repeat\n\
|
|
end repeat\n\
|
|
do script the_shell_script\n\
|
|
end tell\n";
|
|
|
|
|
|
static Error
|
|
LaunchInNewTerminalWithAppleScript (const char *exe_path, ProcessLaunchInfo &launch_info)
|
|
{
|
|
Error error;
|
|
char unix_socket_name[PATH_MAX] = "/tmp/XXXXXX";
|
|
if (::mktemp (unix_socket_name) == NULL)
|
|
{
|
|
error.SetErrorString ("failed to make temporary path for a unix socket");
|
|
return error;
|
|
}
|
|
|
|
StreamString command;
|
|
FileSpec darwin_debug_file_spec;
|
|
if (!Host::GetLLDBPath (ePathTypeSupportExecutableDir, darwin_debug_file_spec))
|
|
{
|
|
error.SetErrorString ("can't locate the 'darwin-debug' executable");
|
|
return error;
|
|
}
|
|
|
|
darwin_debug_file_spec.GetFilename().SetCString("darwin-debug");
|
|
|
|
if (!darwin_debug_file_spec.Exists())
|
|
{
|
|
error.SetErrorStringWithFormat ("the 'darwin-debug' executable doesn't exists at %s/%s",
|
|
darwin_debug_file_spec.GetDirectory().GetCString(),
|
|
darwin_debug_file_spec.GetFilename().GetCString());
|
|
return error;
|
|
}
|
|
|
|
char launcher_path[PATH_MAX];
|
|
darwin_debug_file_spec.GetPath(launcher_path, sizeof(launcher_path));
|
|
|
|
const ArchSpec &arch_spec = launch_info.GetArchitecture();
|
|
if (arch_spec.IsValid())
|
|
command.Printf("arch -arch %s ", arch_spec.GetArchitectureName());
|
|
|
|
command.Printf("'%s' --unix-socket=%s", launcher_path, unix_socket_name);
|
|
|
|
if (arch_spec.IsValid())
|
|
command.Printf(" --arch=%s", arch_spec.GetArchitectureName());
|
|
|
|
const char *working_dir = launch_info.GetWorkingDirectory();
|
|
if (working_dir)
|
|
command.Printf(" --working-dir '%s'", working_dir);
|
|
|
|
if (launch_info.GetFlags().Test (eLaunchFlagDisableASLR))
|
|
command.PutCString(" --disable-aslr");
|
|
|
|
command.PutCString(" -- ");
|
|
|
|
const char **argv = launch_info.GetArguments().GetConstArgumentVector ();
|
|
if (argv)
|
|
{
|
|
for (size_t i=0; argv[i] != NULL; ++i)
|
|
{
|
|
if (i==0)
|
|
command.Printf(" '%s'", exe_path);
|
|
else
|
|
command.Printf(" '%s'", argv[i]);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
command.Printf(" '%s'", exe_path);
|
|
}
|
|
command.PutCString (" ; echo Process exited with status $?");
|
|
|
|
StreamString applescript_source;
|
|
|
|
const char *tty_command = command.GetString().c_str();
|
|
// if (tty_name && tty_name[0])
|
|
// {
|
|
// applescript_source.Printf (applscript_in_existing_tty,
|
|
// tty_command,
|
|
// tty_name);
|
|
// }
|
|
// else
|
|
// {
|
|
applescript_source.Printf (applscript_in_new_tty,
|
|
tty_command);
|
|
// }
|
|
|
|
|
|
|
|
const char *script_source = applescript_source.GetString().c_str();
|
|
//puts (script_source);
|
|
NSAppleScript* applescript = [[NSAppleScript alloc] initWithSource:[NSString stringWithCString:script_source encoding:NSUTF8StringEncoding]];
|
|
|
|
lldb::pid_t pid = LLDB_INVALID_PROCESS_ID;
|
|
|
|
Error lldb_error;
|
|
// Sleep and wait a bit for debugserver to start to listen...
|
|
ConnectionFileDescriptor file_conn;
|
|
char connect_url[128];
|
|
::snprintf (connect_url, sizeof(connect_url), "unix-accept://%s", unix_socket_name);
|
|
|
|
// Spawn a new thread to accept incoming connection on the connect_url
|
|
// so we can grab the pid from the inferior. We have to do this because we
|
|
// are sending an AppleScript that will launch a process in Terminal.app,
|
|
// in a shell and the shell will fork/exec a couple of times before we get
|
|
// to the process that we wanted to launch. So when our process actually
|
|
// gets launched, we will handshake with it and get the process ID for it.
|
|
lldb::thread_t accept_thread = Host::ThreadCreate (unix_socket_name,
|
|
AcceptPIDFromInferior,
|
|
connect_url,
|
|
&lldb_error);
|
|
|
|
|
|
[applescript executeAndReturnError:nil];
|
|
|
|
thread_result_t accept_thread_result = NULL;
|
|
if (Host::ThreadJoin (accept_thread, &accept_thread_result, &lldb_error))
|
|
{
|
|
if (accept_thread_result)
|
|
{
|
|
pid = (intptr_t)accept_thread_result;
|
|
|
|
// Wait for process to be stopped the the entry point by watching
|
|
// for the process status to be set to SSTOP which indicates it it
|
|
// SIGSTOP'ed at the entry point
|
|
WaitForProcessToSIGSTOP (pid, 5);
|
|
}
|
|
}
|
|
::unlink (unix_socket_name);
|
|
[applescript release];
|
|
if (pid != LLDB_INVALID_PROCESS_ID)
|
|
launch_info.SetProcessID (pid);
|
|
return error;
|
|
}
|
|
|
|
#endif // #if !defined(__arm__)
|
|
|
|
|
|
// On MacOSX CrashReporter will display a string for each shared library if
|
|
// the shared library has an exported symbol named "__crashreporter_info__".
|
|
|
|
static Mutex&
|
|
GetCrashReporterMutex ()
|
|
{
|
|
static Mutex g_mutex;
|
|
return g_mutex;
|
|
}
|
|
|
|
extern "C" {
|
|
const char *__crashreporter_info__ = NULL;
|
|
}
|
|
|
|
asm(".desc ___crashreporter_info__, 0x10");
|
|
|
|
void
|
|
Host::SetCrashDescriptionWithFormat (const char *format, ...)
|
|
{
|
|
static StreamString g_crash_description;
|
|
Mutex::Locker locker (GetCrashReporterMutex ());
|
|
|
|
if (format)
|
|
{
|
|
va_list args;
|
|
va_start (args, format);
|
|
g_crash_description.GetString().clear();
|
|
g_crash_description.PrintfVarArg(format, args);
|
|
va_end (args);
|
|
__crashreporter_info__ = g_crash_description.GetData();
|
|
}
|
|
else
|
|
{
|
|
__crashreporter_info__ = NULL;
|
|
}
|
|
}
|
|
|
|
void
|
|
Host::SetCrashDescription (const char *cstr)
|
|
{
|
|
Mutex::Locker locker (GetCrashReporterMutex ());
|
|
static std::string g_crash_description;
|
|
if (cstr)
|
|
{
|
|
g_crash_description.assign (cstr);
|
|
__crashreporter_info__ = g_crash_description.c_str();
|
|
}
|
|
else
|
|
{
|
|
__crashreporter_info__ = NULL;
|
|
}
|
|
}
|
|
|
|
bool
|
|
Host::OpenFileInExternalEditor (const FileSpec &file_spec, uint32_t line_no)
|
|
{
|
|
#if defined(__arm__)
|
|
return false;
|
|
#else
|
|
// We attach this to an 'odoc' event to specify a particular selection
|
|
typedef struct {
|
|
int16_t reserved0; // must be zero
|
|
int16_t fLineNumber;
|
|
int32_t fSelStart;
|
|
int32_t fSelEnd;
|
|
uint32_t reserved1; // must be zero
|
|
uint32_t reserved2; // must be zero
|
|
} BabelAESelInfo;
|
|
|
|
LogSP log(lldb_private::GetLogIfAnyCategoriesSet (LIBLLDB_LOG_HOST));
|
|
char file_path[PATH_MAX];
|
|
file_spec.GetPath(file_path, PATH_MAX);
|
|
CFCString file_cfstr (file_path, kCFStringEncodingUTF8);
|
|
CFCReleaser<CFURLRef> file_URL (::CFURLCreateWithFileSystemPath (NULL,
|
|
file_cfstr.get(),
|
|
kCFURLPOSIXPathStyle,
|
|
false));
|
|
|
|
if (log)
|
|
log->Printf("Sending source file: \"%s\" and line: %d to external editor.\n", file_path, line_no);
|
|
|
|
long error;
|
|
BabelAESelInfo file_and_line_info =
|
|
{
|
|
0, // reserved0
|
|
(int16_t)(line_no - 1), // fLineNumber (zero based line number)
|
|
1, // fSelStart
|
|
1024, // fSelEnd
|
|
0, // reserved1
|
|
0 // reserved2
|
|
};
|
|
|
|
AEKeyDesc file_and_line_desc;
|
|
|
|
error = ::AECreateDesc (typeUTF8Text,
|
|
&file_and_line_info,
|
|
sizeof (file_and_line_info),
|
|
&(file_and_line_desc.descContent));
|
|
|
|
if (error != noErr)
|
|
{
|
|
if (log)
|
|
log->Printf("Error creating AEDesc: %ld.\n", error);
|
|
return false;
|
|
}
|
|
|
|
file_and_line_desc.descKey = keyAEPosition;
|
|
|
|
static std::string g_app_name;
|
|
static FSRef g_app_fsref;
|
|
|
|
LSApplicationParameters app_params;
|
|
::memset (&app_params, 0, sizeof (app_params));
|
|
app_params.flags = kLSLaunchDefaults |
|
|
kLSLaunchDontAddToRecents |
|
|
kLSLaunchDontSwitch;
|
|
|
|
char *external_editor = ::getenv ("LLDB_EXTERNAL_EDITOR");
|
|
|
|
if (external_editor)
|
|
{
|
|
if (log)
|
|
log->Printf("Looking for external editor \"%s\".\n", external_editor);
|
|
|
|
if (g_app_name.empty() || strcmp (g_app_name.c_str(), external_editor) != 0)
|
|
{
|
|
CFCString editor_name (external_editor, kCFStringEncodingUTF8);
|
|
error = ::LSFindApplicationForInfo (kLSUnknownCreator,
|
|
NULL,
|
|
editor_name.get(),
|
|
&g_app_fsref,
|
|
NULL);
|
|
|
|
// If we found the app, then store away the name so we don't have to re-look it up.
|
|
if (error != noErr)
|
|
{
|
|
if (log)
|
|
log->Printf("Could not find External Editor application, error: %ld.\n", error);
|
|
return false;
|
|
}
|
|
|
|
}
|
|
app_params.application = &g_app_fsref;
|
|
}
|
|
|
|
ProcessSerialNumber psn;
|
|
CFCReleaser<CFArrayRef> file_array(CFArrayCreate (NULL, (const void **) file_URL.ptr_address(false), 1, NULL));
|
|
error = ::LSOpenURLsWithRole (file_array.get(),
|
|
kLSRolesAll,
|
|
&file_and_line_desc,
|
|
&app_params,
|
|
&psn,
|
|
1);
|
|
|
|
AEDisposeDesc (&(file_and_line_desc.descContent));
|
|
|
|
if (error != noErr)
|
|
{
|
|
if (log)
|
|
log->Printf("LSOpenURLsWithRole failed, error: %ld.\n", error);
|
|
|
|
return false;
|
|
}
|
|
|
|
ProcessInfoRec which_process;
|
|
::memset(&which_process, 0, sizeof(which_process));
|
|
unsigned char ap_name[PATH_MAX];
|
|
which_process.processName = ap_name;
|
|
error = ::GetProcessInformation (&psn, &which_process);
|
|
|
|
bool using_xcode;
|
|
if (error != noErr)
|
|
{
|
|
if (log)
|
|
log->Printf("GetProcessInformation failed, error: %ld.\n", error);
|
|
using_xcode = false;
|
|
}
|
|
else
|
|
using_xcode = strncmp((char *) ap_name+1, "Xcode", (int) ap_name[0]) == 0;
|
|
|
|
// Xcode doesn't obey the line number in the Open Apple Event. So I have to send
|
|
// it an AppleScript to focus on the right line.
|
|
|
|
if (using_xcode)
|
|
{
|
|
static ComponentInstance osa_component = NULL;
|
|
static const char *as_template = "tell application \"Xcode\"\n"
|
|
"set doc to the first document whose path is \"%s\"\n"
|
|
"set the selection to paragraph %d of doc\n"
|
|
"--- set the selected paragraph range to {%d, %d} of doc\n"
|
|
"end tell\n";
|
|
const int chars_for_int = 32;
|
|
static int as_template_len = strlen (as_template);
|
|
|
|
|
|
char *as_str;
|
|
AEDesc as_desc;
|
|
|
|
if (osa_component == NULL)
|
|
{
|
|
osa_component = ::OpenDefaultComponent (kOSAComponentType,
|
|
kAppleScriptSubtype);
|
|
}
|
|
|
|
if (osa_component == NULL)
|
|
{
|
|
if (log)
|
|
log->Printf("Could not get default AppleScript component.\n");
|
|
return false;
|
|
}
|
|
|
|
uint32_t as_str_size = as_template_len + strlen (file_path) + 3 * chars_for_int + 1;
|
|
as_str = (char *) malloc (as_str_size);
|
|
::snprintf (as_str,
|
|
as_str_size - 1,
|
|
as_template,
|
|
file_path,
|
|
line_no,
|
|
line_no,
|
|
line_no);
|
|
|
|
error = ::AECreateDesc (typeChar,
|
|
as_str,
|
|
strlen (as_str),
|
|
&as_desc);
|
|
|
|
::free (as_str);
|
|
|
|
if (error != noErr)
|
|
{
|
|
if (log)
|
|
log->Printf("Failed to create AEDesc for Xcode AppleEvent: %ld.\n", error);
|
|
return false;
|
|
}
|
|
|
|
OSAID ret_OSAID;
|
|
error = ::OSACompileExecute (osa_component,
|
|
&as_desc,
|
|
kOSANullScript,
|
|
kOSAModeNeverInteract,
|
|
&ret_OSAID);
|
|
|
|
::OSADispose (osa_component, ret_OSAID);
|
|
|
|
::AEDisposeDesc (&as_desc);
|
|
|
|
if (error != noErr)
|
|
{
|
|
if (log)
|
|
log->Printf("Sending AppleEvent to Xcode failed, error: %ld.\n", error);
|
|
return false;
|
|
}
|
|
}
|
|
return true;
|
|
#endif // #if !defined(__arm__)
|
|
}
|
|
|
|
|
|
void
|
|
Host::Backtrace (Stream &strm, uint32_t max_frames)
|
|
{
|
|
if (max_frames > 0)
|
|
{
|
|
std::vector<void *> frame_buffer (max_frames, NULL);
|
|
int num_frames = ::backtrace (&frame_buffer[0], frame_buffer.size());
|
|
char** strs = ::backtrace_symbols (&frame_buffer[0], num_frames);
|
|
if (strs)
|
|
{
|
|
// Start at 1 to skip the "Host::Backtrace" frame
|
|
for (int i = 1; i < num_frames; ++i)
|
|
strm.Printf("%s\n", strs[i]);
|
|
::free (strs);
|
|
}
|
|
}
|
|
}
|
|
|
|
size_t
|
|
Host::GetEnvironment (StringList &env)
|
|
{
|
|
char **host_env = *_NSGetEnviron();
|
|
char *env_entry;
|
|
size_t i;
|
|
for (i=0; (env_entry = host_env[i]) != NULL; ++i)
|
|
env.AppendString(env_entry);
|
|
return i;
|
|
|
|
}
|
|
|
|
|
|
bool
|
|
Host::GetOSBuildString (std::string &s)
|
|
{
|
|
int mib[2] = { CTL_KERN, KERN_OSVERSION };
|
|
char cstr[PATH_MAX];
|
|
size_t cstr_len = sizeof(cstr);
|
|
if (::sysctl (mib, 2, cstr, &cstr_len, NULL, 0) == 0)
|
|
{
|
|
s.assign (cstr, cstr_len);
|
|
return true;
|
|
}
|
|
|
|
s.clear();
|
|
return false;
|
|
}
|
|
|
|
bool
|
|
Host::GetOSKernelDescription (std::string &s)
|
|
{
|
|
int mib[2] = { CTL_KERN, KERN_VERSION };
|
|
char cstr[PATH_MAX];
|
|
size_t cstr_len = sizeof(cstr);
|
|
if (::sysctl (mib, 2, cstr, &cstr_len, NULL, 0) == 0)
|
|
{
|
|
s.assign (cstr, cstr_len);
|
|
return true;
|
|
}
|
|
s.clear();
|
|
return false;
|
|
}
|
|
|
|
#include <libxml/parser.h>
|
|
#include <libxml/tree.h>
|
|
|
|
bool
|
|
Host::GetOSVersion
|
|
(
|
|
uint32_t &major,
|
|
uint32_t &minor,
|
|
uint32_t &update
|
|
)
|
|
{
|
|
static const char *version_plist_file = "/System/Library/CoreServices/SystemVersion.plist";
|
|
char buffer[256];
|
|
const char *product_version_str = NULL;
|
|
|
|
CFCReleaser<CFURLRef> plist_url(CFURLCreateFromFileSystemRepresentation(kCFAllocatorDefault,
|
|
(UInt8 *) version_plist_file,
|
|
strlen (version_plist_file), NO));
|
|
if (plist_url.get())
|
|
{
|
|
CFCReleaser<CFPropertyListRef> property_list;
|
|
CFCReleaser<CFStringRef> error_string;
|
|
CFCReleaser<CFDataRef> resource_data;
|
|
SInt32 error_code;
|
|
|
|
// Read the XML file.
|
|
if (CFURLCreateDataAndPropertiesFromResource (kCFAllocatorDefault,
|
|
plist_url.get(),
|
|
resource_data.ptr_address(),
|
|
NULL,
|
|
NULL,
|
|
&error_code))
|
|
{
|
|
// Reconstitute the dictionary using the XML data.
|
|
property_list = CFPropertyListCreateFromXMLData (kCFAllocatorDefault,
|
|
resource_data.get(),
|
|
kCFPropertyListImmutable,
|
|
error_string.ptr_address());
|
|
if (CFGetTypeID(property_list.get()) == CFDictionaryGetTypeID())
|
|
{
|
|
CFDictionaryRef property_dict = (CFDictionaryRef) property_list.get();
|
|
CFStringRef product_version_key = CFSTR("ProductVersion");
|
|
CFPropertyListRef product_version_value;
|
|
product_version_value = CFDictionaryGetValue(property_dict, product_version_key);
|
|
if (product_version_value && CFGetTypeID(product_version_value) == CFStringGetTypeID())
|
|
{
|
|
CFStringRef product_version_cfstr = (CFStringRef) product_version_value;
|
|
product_version_str = CFStringGetCStringPtr(product_version_cfstr, kCFStringEncodingUTF8);
|
|
if (product_version_str == NULL) {
|
|
if (CFStringGetCString(product_version_cfstr, buffer, 256, kCFStringEncodingUTF8))
|
|
product_version_str = buffer;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
if (product_version_str)
|
|
{
|
|
Args::StringToVersion(product_version_str, major, minor, update);
|
|
return true;
|
|
}
|
|
else
|
|
return false;
|
|
|
|
}
|
|
|
|
static bool
|
|
GetMacOSXProcessName (const ProcessInstanceInfoMatch *match_info_ptr,
|
|
ProcessInstanceInfo &process_info)
|
|
{
|
|
if (process_info.ProcessIDIsValid())
|
|
{
|
|
char process_name[MAXCOMLEN * 2 + 1];
|
|
int name_len = ::proc_name(process_info.GetProcessID(), process_name, MAXCOMLEN * 2);
|
|
if (name_len == 0)
|
|
return false;
|
|
|
|
if (match_info_ptr == NULL || NameMatches(process_name,
|
|
match_info_ptr->GetNameMatchType(),
|
|
match_info_ptr->GetProcessInfo().GetName()))
|
|
{
|
|
process_info.GetExecutableFile().SetFile (process_name, false);
|
|
return true;
|
|
}
|
|
}
|
|
process_info.GetExecutableFile().Clear();
|
|
return false;
|
|
}
|
|
|
|
|
|
static bool
|
|
GetMacOSXProcessCPUType (ProcessInstanceInfo &process_info)
|
|
{
|
|
if (process_info.ProcessIDIsValid())
|
|
{
|
|
// Make a new mib to stay thread safe
|
|
int mib[CTL_MAXNAME]={0,};
|
|
size_t mib_len = CTL_MAXNAME;
|
|
if (::sysctlnametomib("sysctl.proc_cputype", mib, &mib_len))
|
|
return false;
|
|
|
|
mib[mib_len] = process_info.GetProcessID();
|
|
mib_len++;
|
|
|
|
cpu_type_t cpu, sub = 0;
|
|
size_t len = sizeof(cpu);
|
|
if (::sysctl (mib, mib_len, &cpu, &len, 0, 0) == 0)
|
|
{
|
|
switch (cpu)
|
|
{
|
|
case llvm::MachO::CPUTypeI386: sub = llvm::MachO::CPUSubType_I386_ALL; break;
|
|
case llvm::MachO::CPUTypeX86_64: sub = llvm::MachO::CPUSubType_X86_64_ALL; break;
|
|
case llvm::MachO::CPUTypeARM:
|
|
{
|
|
uint32_t cpusubtype = 0;
|
|
len = sizeof(cpusubtype);
|
|
if (::sysctlbyname("hw.cpusubtype", &cpusubtype, &len, NULL, 0) == 0)
|
|
sub = cpusubtype;
|
|
}
|
|
break;
|
|
|
|
default:
|
|
break;
|
|
}
|
|
process_info.GetArchitecture ().SetArchitecture (eArchTypeMachO, cpu, sub);
|
|
return true;
|
|
}
|
|
}
|
|
process_info.GetArchitecture().Clear();
|
|
return false;
|
|
}
|
|
|
|
static bool
|
|
GetMacOSXProcessArgs (const ProcessInstanceInfoMatch *match_info_ptr,
|
|
ProcessInstanceInfo &process_info)
|
|
{
|
|
if (process_info.ProcessIDIsValid())
|
|
{
|
|
int proc_args_mib[3] = { CTL_KERN, KERN_PROCARGS2, (int)process_info.GetProcessID() };
|
|
|
|
char arg_data[8192];
|
|
size_t arg_data_size = sizeof(arg_data);
|
|
if (::sysctl (proc_args_mib, 3, arg_data, &arg_data_size , NULL, 0) == 0)
|
|
{
|
|
DataExtractor data (arg_data, arg_data_size, lldb::endian::InlHostByteOrder(), sizeof(void *));
|
|
lldb::offset_t offset = 0;
|
|
uint32_t argc = data.GetU32 (&offset);
|
|
const char *cstr;
|
|
|
|
cstr = data.GetCStr (&offset);
|
|
if (cstr)
|
|
{
|
|
process_info.GetExecutableFile().SetFile(cstr, false);
|
|
|
|
if (match_info_ptr == NULL ||
|
|
NameMatches (process_info.GetExecutableFile().GetFilename().GetCString(),
|
|
match_info_ptr->GetNameMatchType(),
|
|
match_info_ptr->GetProcessInfo().GetName()))
|
|
{
|
|
// Skip NULLs
|
|
while (1)
|
|
{
|
|
const uint8_t *p = data.PeekData(offset, 1);
|
|
if ((p == NULL) || (*p != '\0'))
|
|
break;
|
|
++offset;
|
|
}
|
|
// Now extract all arguments
|
|
Args &proc_args = process_info.GetArguments();
|
|
for (int i=0; i<argc; ++i)
|
|
{
|
|
cstr = data.GetCStr(&offset);
|
|
if (cstr)
|
|
proc_args.AppendArgument(cstr);
|
|
}
|
|
return true;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
return false;
|
|
}
|
|
|
|
static bool
|
|
GetMacOSXProcessUserAndGroup (ProcessInstanceInfo &process_info)
|
|
{
|
|
if (process_info.ProcessIDIsValid())
|
|
{
|
|
int mib[4];
|
|
mib[0] = CTL_KERN;
|
|
mib[1] = KERN_PROC;
|
|
mib[2] = KERN_PROC_PID;
|
|
mib[3] = process_info.GetProcessID();
|
|
struct kinfo_proc proc_kinfo;
|
|
size_t proc_kinfo_size = sizeof(struct kinfo_proc);
|
|
|
|
if (::sysctl (mib, 4, &proc_kinfo, &proc_kinfo_size, NULL, 0) == 0)
|
|
{
|
|
if (proc_kinfo_size > 0)
|
|
{
|
|
process_info.SetParentProcessID (proc_kinfo.kp_eproc.e_ppid);
|
|
process_info.SetUserID (proc_kinfo.kp_eproc.e_pcred.p_ruid);
|
|
process_info.SetGroupID (proc_kinfo.kp_eproc.e_pcred.p_rgid);
|
|
process_info.SetEffectiveUserID (proc_kinfo.kp_eproc.e_ucred.cr_uid);
|
|
if (proc_kinfo.kp_eproc.e_ucred.cr_ngroups > 0)
|
|
process_info.SetEffectiveGroupID (proc_kinfo.kp_eproc.e_ucred.cr_groups[0]);
|
|
else
|
|
process_info.SetEffectiveGroupID (UINT32_MAX);
|
|
return true;
|
|
}
|
|
}
|
|
}
|
|
process_info.SetParentProcessID (LLDB_INVALID_PROCESS_ID);
|
|
process_info.SetUserID (UINT32_MAX);
|
|
process_info.SetGroupID (UINT32_MAX);
|
|
process_info.SetEffectiveUserID (UINT32_MAX);
|
|
process_info.SetEffectiveGroupID (UINT32_MAX);
|
|
return false;
|
|
}
|
|
|
|
|
|
uint32_t
|
|
Host::FindProcesses (const ProcessInstanceInfoMatch &match_info, ProcessInstanceInfoList &process_infos)
|
|
{
|
|
std::vector<struct kinfo_proc> kinfos;
|
|
|
|
int mib[3] = { CTL_KERN, KERN_PROC, KERN_PROC_ALL };
|
|
|
|
size_t pid_data_size = 0;
|
|
if (::sysctl (mib, 4, NULL, &pid_data_size, NULL, 0) != 0)
|
|
return 0;
|
|
|
|
// Add a few extra in case a few more show up
|
|
const size_t estimated_pid_count = (pid_data_size / sizeof(struct kinfo_proc)) + 10;
|
|
|
|
kinfos.resize (estimated_pid_count);
|
|
pid_data_size = kinfos.size() * sizeof(struct kinfo_proc);
|
|
|
|
if (::sysctl (mib, 4, &kinfos[0], &pid_data_size, NULL, 0) != 0)
|
|
return 0;
|
|
|
|
const size_t actual_pid_count = (pid_data_size / sizeof(struct kinfo_proc));
|
|
|
|
bool all_users = match_info.GetMatchAllUsers();
|
|
const lldb::pid_t our_pid = getpid();
|
|
const uid_t our_uid = getuid();
|
|
for (int i = 0; i < actual_pid_count; i++)
|
|
{
|
|
const struct kinfo_proc &kinfo = kinfos[i];
|
|
|
|
bool kinfo_user_matches = false;
|
|
if (all_users)
|
|
kinfo_user_matches = true;
|
|
else
|
|
kinfo_user_matches = kinfo.kp_eproc.e_pcred.p_ruid == our_uid;
|
|
|
|
// Special case, if lldb is being run as root we can attach to anything.
|
|
if (our_uid == 0)
|
|
kinfo_user_matches = true;
|
|
|
|
if (kinfo_user_matches == false || // Make sure the user is acceptable
|
|
kinfo.kp_proc.p_pid == our_pid || // Skip this process
|
|
kinfo.kp_proc.p_pid == 0 || // Skip kernel (kernel pid is zero)
|
|
kinfo.kp_proc.p_stat == SZOMB || // Zombies are bad, they like brains...
|
|
kinfo.kp_proc.p_flag & P_TRACED || // Being debugged?
|
|
kinfo.kp_proc.p_flag & P_WEXIT || // Working on exiting?
|
|
kinfo.kp_proc.p_flag & P_TRANSLATED) // Skip translated ppc (Rosetta)
|
|
continue;
|
|
|
|
ProcessInstanceInfo process_info;
|
|
process_info.SetProcessID (kinfo.kp_proc.p_pid);
|
|
process_info.SetParentProcessID (kinfo.kp_eproc.e_ppid);
|
|
process_info.SetUserID (kinfo.kp_eproc.e_pcred.p_ruid);
|
|
process_info.SetGroupID (kinfo.kp_eproc.e_pcred.p_rgid);
|
|
process_info.SetEffectiveUserID (kinfo.kp_eproc.e_ucred.cr_uid);
|
|
if (kinfo.kp_eproc.e_ucred.cr_ngroups > 0)
|
|
process_info.SetEffectiveGroupID (kinfo.kp_eproc.e_ucred.cr_groups[0]);
|
|
else
|
|
process_info.SetEffectiveGroupID (UINT32_MAX);
|
|
|
|
// Make sure our info matches before we go fetch the name and cpu type
|
|
if (match_info.Matches (process_info))
|
|
{
|
|
if (GetMacOSXProcessArgs (&match_info, process_info))
|
|
{
|
|
GetMacOSXProcessCPUType (process_info);
|
|
if (match_info.Matches (process_info))
|
|
process_infos.Append (process_info);
|
|
}
|
|
}
|
|
}
|
|
return process_infos.GetSize();
|
|
}
|
|
|
|
bool
|
|
Host::GetProcessInfo (lldb::pid_t pid, ProcessInstanceInfo &process_info)
|
|
{
|
|
process_info.SetProcessID(pid);
|
|
bool success = false;
|
|
|
|
if (GetMacOSXProcessArgs (NULL, process_info))
|
|
success = true;
|
|
|
|
if (GetMacOSXProcessCPUType (process_info))
|
|
success = true;
|
|
|
|
if (GetMacOSXProcessUserAndGroup (process_info))
|
|
success = true;
|
|
|
|
if (success)
|
|
return true;
|
|
|
|
process_info.Clear();
|
|
return false;
|
|
}
|
|
|
|
static short
|
|
GetPosixspawnFlags (ProcessLaunchInfo &launch_info)
|
|
{
|
|
short flags = POSIX_SPAWN_SETSIGDEF | POSIX_SPAWN_SETSIGMASK;
|
|
if (launch_info.GetFlags().Test (eLaunchFlagExec))
|
|
flags |= POSIX_SPAWN_SETEXEC; // Darwin specific posix_spawn flag
|
|
|
|
if (launch_info.GetFlags().Test (eLaunchFlagDebug))
|
|
flags |= POSIX_SPAWN_START_SUSPENDED; // Darwin specific posix_spawn flag
|
|
|
|
if (launch_info.GetFlags().Test (eLaunchFlagDisableASLR))
|
|
flags |= _POSIX_SPAWN_DISABLE_ASLR; // Darwin specific posix_spawn flag
|
|
|
|
if (launch_info.GetLaunchInSeparateProcessGroup())
|
|
flags |= POSIX_SPAWN_SETPGROUP;
|
|
|
|
//#ifdef POSIX_SPAWN_CLOEXEC_DEFAULT
|
|
// // Close all files exception those with file actions if this is supported.
|
|
// flags |= POSIX_SPAWN_CLOEXEC_DEFAULT;
|
|
//#endif
|
|
|
|
return flags;
|
|
}
|
|
|
|
#if !NO_XPC_SERVICES
|
|
static void
|
|
PackageXPCArguments (xpc_object_t message, const char *prefix, const Args& args)
|
|
{
|
|
size_t count = args.GetArgumentCount();
|
|
char buf[50]; // long enough for 'argXXX'
|
|
memset(buf, 0, 50);
|
|
sprintf(buf, "%sCount", prefix);
|
|
xpc_dictionary_set_int64(message, buf, count);
|
|
for (int i=0; i<count; i++) {
|
|
memset(buf, 0, 50);
|
|
sprintf(buf, "%s%i", prefix, i);
|
|
xpc_dictionary_set_string(message, buf, args.GetArgumentAtIndex(i));
|
|
}
|
|
}
|
|
|
|
/*
|
|
A valid authorizationRef means that
|
|
- there is the LaunchUsingXPCRightName rights in the /etc/authorization
|
|
- we have successfully copied the rights to be send over the XPC wire
|
|
Once obtained, it will be valid for as long as the process lives.
|
|
*/
|
|
static AuthorizationRef authorizationRef = NULL;
|
|
static Error
|
|
getXPCAuthorization (ProcessLaunchInfo &launch_info)
|
|
{
|
|
Error error;
|
|
LogSP log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_HOST | LIBLLDB_LOG_PROCESS));
|
|
|
|
if ((launch_info.GetUserID() == 0) && !authorizationRef)
|
|
{
|
|
OSStatus createStatus = AuthorizationCreate(NULL, kAuthorizationEmptyEnvironment, kAuthorizationFlagDefaults, &authorizationRef);
|
|
if (createStatus != errAuthorizationSuccess)
|
|
{
|
|
error.SetError(1, eErrorTypeGeneric);
|
|
error.SetErrorString("Can't create authorizationRef.");
|
|
if (log)
|
|
{
|
|
error.PutToLog(log.get(), "%s", error.AsCString());
|
|
}
|
|
return error;
|
|
}
|
|
|
|
OSStatus rightsStatus = AuthorizationRightGet(LaunchUsingXPCRightName, NULL);
|
|
if (rightsStatus != errAuthorizationSuccess)
|
|
{
|
|
// No rights in the security database, Create it with the right prompt.
|
|
CFStringRef prompt = CFSTR("Xcode is trying to take control of a root process.");
|
|
CFStringRef keys[] = { CFSTR("en") };
|
|
CFTypeRef values[] = { prompt };
|
|
CFDictionaryRef promptDict = CFDictionaryCreate(kCFAllocatorDefault, (const void **)keys, (const void **)values, 1, &kCFCopyStringDictionaryKeyCallBacks, &kCFTypeDictionaryValueCallBacks);
|
|
|
|
CFStringRef keys1[] = { CFSTR("class"), CFSTR("group"), CFSTR("comment"), CFSTR("default-prompt"), CFSTR("shared") };
|
|
CFTypeRef values1[] = { CFSTR("user"), CFSTR("admin"), CFSTR(LaunchUsingXPCRightName), promptDict, kCFBooleanFalse };
|
|
CFDictionaryRef dict = CFDictionaryCreate(kCFAllocatorDefault, (const void **)keys1, (const void **)values1, 5, &kCFCopyStringDictionaryKeyCallBacks, &kCFTypeDictionaryValueCallBacks);
|
|
rightsStatus = AuthorizationRightSet(authorizationRef, LaunchUsingXPCRightName, dict, NULL, NULL, NULL);
|
|
CFRelease(promptDict);
|
|
CFRelease(dict);
|
|
}
|
|
|
|
OSStatus copyRightStatus = errAuthorizationDenied;
|
|
if (rightsStatus == errAuthorizationSuccess)
|
|
{
|
|
AuthorizationItem item1 = { LaunchUsingXPCRightName, 0, NULL, 0 };
|
|
AuthorizationItem items[] = {item1};
|
|
AuthorizationRights requestedRights = {1, items };
|
|
AuthorizationFlags authorizationFlags = kAuthorizationFlagInteractionAllowed | kAuthorizationFlagExtendRights;
|
|
copyRightStatus = AuthorizationCopyRights(authorizationRef, &requestedRights, kAuthorizationEmptyEnvironment, authorizationFlags, NULL);
|
|
}
|
|
|
|
if (copyRightStatus != errAuthorizationSuccess)
|
|
{
|
|
// Eventually when the commandline supports running as root and the user is not
|
|
// logged in in the current audit session, we will need the trick in gdb where
|
|
// we ask the user to type in the root passwd in the terminal.
|
|
error.SetError(2, eErrorTypeGeneric);
|
|
error.SetErrorStringWithFormat("Launching as root needs root authorization.");
|
|
if (log)
|
|
{
|
|
error.PutToLog(log.get(), "%s", error.AsCString());
|
|
}
|
|
|
|
if (authorizationRef)
|
|
{
|
|
AuthorizationFree(authorizationRef, kAuthorizationFlagDefaults);
|
|
authorizationRef = NULL;
|
|
}
|
|
}
|
|
}
|
|
|
|
return error;
|
|
}
|
|
#endif
|
|
|
|
static Error
|
|
LaunchProcessXPC (const char *exe_path, ProcessLaunchInfo &launch_info, ::pid_t &pid)
|
|
{
|
|
#if !NO_XPC_SERVICES
|
|
Error error = getXPCAuthorization(launch_info);
|
|
if (error.Fail())
|
|
return error;
|
|
|
|
LogSP log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_HOST | LIBLLDB_LOG_PROCESS));
|
|
|
|
uid_t requested_uid = launch_info.GetUserID();
|
|
const char *xpc_service = nil;
|
|
bool send_auth = false;
|
|
AuthorizationExternalForm extForm;
|
|
if ((requested_uid == UINT32_MAX) || (requested_uid == Host::GetEffectiveUserID()))
|
|
{
|
|
xpc_service = "com.apple.lldb.launcherXPCService";
|
|
}
|
|
else if (requested_uid == 0)
|
|
{
|
|
if (AuthorizationMakeExternalForm(authorizationRef, &extForm) == errAuthorizationSuccess)
|
|
{
|
|
send_auth = true;
|
|
}
|
|
else
|
|
{
|
|
error.SetError(3, eErrorTypeGeneric);
|
|
error.SetErrorStringWithFormat("Launching root via XPC needs to externalize authorization reference.");
|
|
if (log)
|
|
{
|
|
error.PutToLog(log.get(), "%s", error.AsCString());
|
|
}
|
|
return error;
|
|
}
|
|
xpc_service = "com.apple.lldb.launcherRootXPCService";
|
|
}
|
|
else
|
|
{
|
|
error.SetError(4, eErrorTypeGeneric);
|
|
error.SetErrorStringWithFormat("Launching via XPC is only currently available for either the login user or root.");
|
|
if (log)
|
|
{
|
|
error.PutToLog(log.get(), "%s", error.AsCString());
|
|
}
|
|
return error;
|
|
}
|
|
|
|
xpc_connection_t conn = xpc_connection_create(xpc_service, NULL);
|
|
|
|
xpc_connection_set_event_handler(conn, ^(xpc_object_t event) {
|
|
xpc_type_t type = xpc_get_type(event);
|
|
|
|
if (type == XPC_TYPE_ERROR) {
|
|
if (event == XPC_ERROR_CONNECTION_INTERRUPTED) {
|
|
// The service has either canceled itself, crashed, or been terminated.
|
|
// The XPC connection is still valid and sending a message to it will re-launch the service.
|
|
// If the service is state-full, this is the time to initialize the new service.
|
|
return;
|
|
} else if (event == XPC_ERROR_CONNECTION_INVALID) {
|
|
// The service is invalid. Either the service name supplied to xpc_connection_create() is incorrect
|
|
// or we (this process) have canceled the service; we can do any cleanup of appliation state at this point.
|
|
// printf("Service disconnected");
|
|
return;
|
|
} else {
|
|
// printf("Unexpected error from service: %s", xpc_dictionary_get_string(event, XPC_ERROR_KEY_DESCRIPTION));
|
|
}
|
|
|
|
} else {
|
|
// printf("Received unexpected event in handler");
|
|
}
|
|
});
|
|
|
|
xpc_connection_set_finalizer_f (conn, xpc_finalizer_t(xpc_release));
|
|
xpc_connection_resume (conn);
|
|
xpc_object_t message = xpc_dictionary_create (nil, nil, 0);
|
|
|
|
if (send_auth)
|
|
{
|
|
xpc_dictionary_set_data(message, LauncherXPCServiceAuthKey, extForm.bytes, sizeof(AuthorizationExternalForm));
|
|
}
|
|
|
|
PackageXPCArguments(message, LauncherXPCServiceArgPrefxKey, launch_info.GetArguments());
|
|
PackageXPCArguments(message, LauncherXPCServiceEnvPrefxKey, launch_info.GetEnvironmentEntries());
|
|
|
|
// Posix spawn stuff.
|
|
xpc_dictionary_set_int64(message, LauncherXPCServiceCPUTypeKey, launch_info.GetArchitecture().GetMachOCPUType());
|
|
xpc_dictionary_set_int64(message, LauncherXPCServicePosixspawnFlagsKey, GetPosixspawnFlags(launch_info));
|
|
|
|
xpc_object_t reply = xpc_connection_send_message_with_reply_sync(conn, message);
|
|
xpc_type_t returnType = xpc_get_type(reply);
|
|
if (returnType == XPC_TYPE_DICTIONARY)
|
|
{
|
|
pid = xpc_dictionary_get_int64(reply, LauncherXPCServiceChildPIDKey);
|
|
if (pid == 0)
|
|
{
|
|
int errorType = xpc_dictionary_get_int64(reply, LauncherXPCServiceErrorTypeKey);
|
|
int errorCode = xpc_dictionary_get_int64(reply, LauncherXPCServiceCodeTypeKey);
|
|
|
|
error.SetError(errorCode, eErrorTypeGeneric);
|
|
error.SetErrorStringWithFormat("Problems with launching via XPC. Error type : %i, code : %i", errorType, errorCode);
|
|
if (log)
|
|
{
|
|
error.PutToLog(log.get(), "%s", error.AsCString());
|
|
}
|
|
|
|
if (authorizationRef)
|
|
{
|
|
AuthorizationFree(authorizationRef, kAuthorizationFlagDefaults);
|
|
authorizationRef = NULL;
|
|
}
|
|
}
|
|
}
|
|
else if (returnType == XPC_TYPE_ERROR)
|
|
{
|
|
error.SetError(5, eErrorTypeGeneric);
|
|
error.SetErrorStringWithFormat("Problems with launching via XPC. XPC error : %s", xpc_dictionary_get_string(reply, XPC_ERROR_KEY_DESCRIPTION));
|
|
if (log)
|
|
{
|
|
error.PutToLog(log.get(), "%s", error.AsCString());
|
|
}
|
|
}
|
|
|
|
return error;
|
|
#else
|
|
Error error;
|
|
return error;
|
|
#endif
|
|
}
|
|
|
|
static Error
|
|
LaunchProcessPosixSpawn (const char *exe_path, ProcessLaunchInfo &launch_info, ::pid_t &pid)
|
|
{
|
|
Error error;
|
|
LogSP log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_HOST | LIBLLDB_LOG_PROCESS));
|
|
|
|
posix_spawnattr_t attr;
|
|
error.SetError( ::posix_spawnattr_init (&attr), eErrorTypePOSIX);
|
|
|
|
if (error.Fail() || log)
|
|
error.PutToLog(log.get(), "::posix_spawnattr_init ( &attr )");
|
|
if (error.Fail())
|
|
return error;
|
|
|
|
// Make a quick class that will cleanup the posix spawn attributes in case
|
|
// we return in the middle of this function.
|
|
lldb_utility::CleanUp <posix_spawnattr_t *, int> posix_spawnattr_cleanup(&attr, posix_spawnattr_destroy);
|
|
|
|
sigset_t no_signals;
|
|
sigset_t all_signals;
|
|
sigemptyset (&no_signals);
|
|
sigfillset (&all_signals);
|
|
::posix_spawnattr_setsigmask(&attr, &no_signals);
|
|
::posix_spawnattr_setsigdefault(&attr, &all_signals);
|
|
|
|
short flags = GetPosixspawnFlags(launch_info);
|
|
error.SetError( ::posix_spawnattr_setflags (&attr, flags), eErrorTypePOSIX);
|
|
if (error.Fail() || log)
|
|
error.PutToLog(log.get(), "::posix_spawnattr_setflags ( &attr, flags=0x%8.8x )", flags);
|
|
if (error.Fail())
|
|
return error;
|
|
|
|
#if !defined(__arm__)
|
|
|
|
// We don't need to do this for ARM, and we really shouldn't now that we
|
|
// have multiple CPU subtypes and no posix_spawnattr call that allows us
|
|
// to set which CPU subtype to launch...
|
|
const ArchSpec &arch_spec = launch_info.GetArchitecture();
|
|
cpu_type_t cpu = arch_spec.GetMachOCPUType();
|
|
if (cpu != 0 &&
|
|
cpu != UINT32_MAX &&
|
|
cpu != LLDB_INVALID_CPUTYPE)
|
|
{
|
|
size_t ocount = 0;
|
|
error.SetError( ::posix_spawnattr_setbinpref_np (&attr, 1, &cpu, &ocount), eErrorTypePOSIX);
|
|
if (error.Fail() || log)
|
|
error.PutToLog(log.get(), "::posix_spawnattr_setbinpref_np ( &attr, 1, cpu_type = 0x%8.8x, count => %llu )", cpu, (uint64_t)ocount);
|
|
|
|
if (error.Fail() || ocount != 1)
|
|
return error;
|
|
}
|
|
|
|
#endif
|
|
|
|
const char *tmp_argv[2];
|
|
char * const *argv = (char * const*)launch_info.GetArguments().GetConstArgumentVector();
|
|
char * const *envp = (char * const*)launch_info.GetEnvironmentEntries().GetConstArgumentVector();
|
|
if (argv == NULL)
|
|
{
|
|
// posix_spawn gets very unhappy if it doesn't have at least the program
|
|
// name in argv[0]. One of the side affects I have noticed is the environment
|
|
// variables don't make it into the child process if "argv == NULL"!!!
|
|
tmp_argv[0] = exe_path;
|
|
tmp_argv[1] = NULL;
|
|
argv = (char * const*)tmp_argv;
|
|
}
|
|
|
|
const char *working_dir = launch_info.GetWorkingDirectory();
|
|
if (working_dir)
|
|
{
|
|
// No more thread specific current working directory
|
|
if (__pthread_chdir (working_dir) < 0) {
|
|
if (errno == ENOENT) {
|
|
error.SetErrorStringWithFormat("No such file or directory: %s", working_dir);
|
|
} else if (errno == ENOTDIR) {
|
|
error.SetErrorStringWithFormat("Path doesn't name a directory: %s", working_dir);
|
|
} else {
|
|
error.SetErrorStringWithFormat("An unknown error occurred when changing directory for process execution.");
|
|
}
|
|
return error;
|
|
}
|
|
}
|
|
|
|
const size_t num_file_actions = launch_info.GetNumFileActions ();
|
|
if (num_file_actions > 0)
|
|
{
|
|
posix_spawn_file_actions_t file_actions;
|
|
error.SetError( ::posix_spawn_file_actions_init (&file_actions), eErrorTypePOSIX);
|
|
if (error.Fail() || log)
|
|
error.PutToLog(log.get(), "::posix_spawn_file_actions_init ( &file_actions )");
|
|
if (error.Fail())
|
|
return error;
|
|
|
|
// Make a quick class that will cleanup the posix spawn attributes in case
|
|
// we return in the middle of this function.
|
|
lldb_utility::CleanUp <posix_spawn_file_actions_t *, int> posix_spawn_file_actions_cleanup (&file_actions, posix_spawn_file_actions_destroy);
|
|
|
|
for (size_t i=0; i<num_file_actions; ++i)
|
|
{
|
|
const ProcessLaunchInfo::FileAction *launch_file_action = launch_info.GetFileActionAtIndex(i);
|
|
if (launch_file_action)
|
|
{
|
|
if (!ProcessLaunchInfo::FileAction::AddPosixSpawnFileAction (&file_actions,
|
|
launch_file_action,
|
|
log.get(),
|
|
error))
|
|
return error;
|
|
}
|
|
}
|
|
|
|
error.SetError (::posix_spawnp (&pid,
|
|
exe_path,
|
|
&file_actions,
|
|
&attr,
|
|
argv,
|
|
envp),
|
|
eErrorTypePOSIX);
|
|
|
|
if (error.Fail() || log)
|
|
{
|
|
error.PutToLog(log.get(), "::posix_spawnp ( pid => %i, path = '%s', file_actions = %p, attr = %p, argv = %p, envp = %p )",
|
|
pid,
|
|
exe_path,
|
|
&file_actions,
|
|
&attr,
|
|
argv,
|
|
envp);
|
|
if (log)
|
|
{
|
|
for (int ii=0; argv[ii]; ++ii)
|
|
log->Printf("argv[%i] = '%s'", ii, argv[ii]);
|
|
}
|
|
}
|
|
|
|
}
|
|
else
|
|
{
|
|
error.SetError (::posix_spawnp (&pid,
|
|
exe_path,
|
|
NULL,
|
|
&attr,
|
|
argv,
|
|
envp),
|
|
eErrorTypePOSIX);
|
|
|
|
if (error.Fail() || log)
|
|
{
|
|
error.PutToLog(log.get(), "::posix_spawnp ( pid => %i, path = '%s', file_actions = NULL, attr = %p, argv = %p, envp = %p )",
|
|
pid,
|
|
exe_path,
|
|
&attr,
|
|
argv,
|
|
envp);
|
|
if (log)
|
|
{
|
|
for (int ii=0; argv[ii]; ++ii)
|
|
log->Printf("argv[%i] = '%s'", ii, argv[ii]);
|
|
}
|
|
}
|
|
}
|
|
|
|
if (working_dir)
|
|
{
|
|
// No more thread specific current working directory
|
|
__pthread_fchdir (-1);
|
|
}
|
|
|
|
return error;
|
|
}
|
|
|
|
static bool
|
|
ShouldLaunchUsingXPC(const char *exe_path, ProcessLaunchInfo &launch_info)
|
|
{
|
|
bool result = false;
|
|
|
|
#if !NO_XPC_SERVICES
|
|
const char *debugserver = "/debugserver";
|
|
int len = strlen(debugserver);
|
|
int exe_len = strlen(exe_path);
|
|
if (exe_len >= len)
|
|
{
|
|
const char *part = exe_path + (exe_len - len);
|
|
if (strcmp(part, debugserver) == 0)
|
|
{
|
|
// We are dealing with debugserver.
|
|
uid_t requested_uid = launch_info.GetUserID();
|
|
if (requested_uid == 0)
|
|
{
|
|
// Launching XPC works for root. It also works for the non-attaching case for current login
|
|
// but unfortunately, we can't detect it here.
|
|
result = true;
|
|
}
|
|
}
|
|
}
|
|
#endif
|
|
|
|
return result;
|
|
}
|
|
|
|
Error
|
|
Host::LaunchProcess (ProcessLaunchInfo &launch_info)
|
|
{
|
|
Error error;
|
|
char exe_path[PATH_MAX];
|
|
PlatformSP host_platform_sp (Platform::GetDefaultPlatform ());
|
|
|
|
const ArchSpec &arch_spec = launch_info.GetArchitecture();
|
|
|
|
FileSpec exe_spec(launch_info.GetExecutableFile());
|
|
|
|
FileSpec::FileType file_type = exe_spec.GetFileType();
|
|
if (file_type != FileSpec::eFileTypeRegular)
|
|
{
|
|
lldb::ModuleSP exe_module_sp;
|
|
error = host_platform_sp->ResolveExecutable (exe_spec,
|
|
arch_spec,
|
|
exe_module_sp,
|
|
NULL);
|
|
|
|
if (error.Fail())
|
|
return error;
|
|
|
|
if (exe_module_sp)
|
|
exe_spec = exe_module_sp->GetFileSpec();
|
|
}
|
|
|
|
if (exe_spec.Exists())
|
|
{
|
|
exe_spec.GetPath (exe_path, sizeof(exe_path));
|
|
}
|
|
else
|
|
{
|
|
launch_info.GetExecutableFile().GetPath (exe_path, sizeof(exe_path));
|
|
error.SetErrorStringWithFormat ("executable doesn't exist: '%s'", exe_path);
|
|
return error;
|
|
}
|
|
|
|
if (launch_info.GetFlags().Test (eLaunchFlagLaunchInTTY))
|
|
{
|
|
#if !defined(__arm__)
|
|
return LaunchInNewTerminalWithAppleScript (exe_path, launch_info);
|
|
#else
|
|
error.SetErrorString ("launching a processs in a new terminal is not supported on iOS devices");
|
|
return error;
|
|
#endif
|
|
}
|
|
|
|
::pid_t pid = LLDB_INVALID_PROCESS_ID;
|
|
|
|
if (ShouldLaunchUsingXPC(exe_path, launch_info))
|
|
{
|
|
error = LaunchProcessXPC(exe_path, launch_info, pid);
|
|
}
|
|
else
|
|
{
|
|
error = LaunchProcessPosixSpawn(exe_path, launch_info, pid);
|
|
}
|
|
|
|
if (pid != LLDB_INVALID_PROCESS_ID)
|
|
{
|
|
// If all went well, then set the process ID into the launch info
|
|
launch_info.SetProcessID(pid);
|
|
|
|
// Make sure we reap any processes we spawn or we will have zombies.
|
|
if (!launch_info.MonitorProcess())
|
|
{
|
|
const bool monitor_signals = false;
|
|
StartMonitoringChildProcess (Process::SetProcessExitStatus,
|
|
NULL,
|
|
pid,
|
|
monitor_signals);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
// Invalid process ID, something didn't go well
|
|
if (error.Success())
|
|
error.SetErrorString ("process launch failed for unknown reasons");
|
|
}
|
|
return error;
|
|
}
|
|
|
|
lldb::thread_t
|
|
Host::StartMonitoringChildProcess (Host::MonitorChildProcessCallback callback,
|
|
void *callback_baton,
|
|
lldb::pid_t pid,
|
|
bool monitor_signals)
|
|
{
|
|
lldb::thread_t thread = LLDB_INVALID_HOST_THREAD;
|
|
unsigned long mask = DISPATCH_PROC_EXIT;
|
|
if (monitor_signals)
|
|
mask |= DISPATCH_PROC_SIGNAL;
|
|
|
|
LogSP log(lldb_private::GetLogIfAnyCategoriesSet (LIBLLDB_LOG_HOST | LIBLLDB_LOG_PROCESS));
|
|
|
|
|
|
dispatch_source_t source = ::dispatch_source_create (DISPATCH_SOURCE_TYPE_PROC,
|
|
pid,
|
|
mask,
|
|
::dispatch_get_global_queue (DISPATCH_QUEUE_PRIORITY_DEFAULT,0));
|
|
|
|
if (log)
|
|
log->Printf ("Host::StartMonitoringChildProcess (callback=%p, baton=%p, pid=%i, monitor_signals=%i) source = %p\n",
|
|
callback,
|
|
callback_baton,
|
|
(int)pid,
|
|
monitor_signals,
|
|
source);
|
|
|
|
if (source)
|
|
{
|
|
::dispatch_source_set_cancel_handler (source, ^{
|
|
::dispatch_release (source);
|
|
});
|
|
::dispatch_source_set_event_handler (source, ^{
|
|
|
|
int status= 0;
|
|
int wait_pid = 0;
|
|
bool cancel = false;
|
|
bool exited = false;
|
|
do
|
|
{
|
|
wait_pid = ::waitpid (pid, &status, 0);
|
|
} while (wait_pid < 0 && errno == EINTR);
|
|
|
|
if (wait_pid >= 0)
|
|
{
|
|
int signal = 0;
|
|
int exit_status = 0;
|
|
const char *status_cstr = NULL;
|
|
if (WIFSTOPPED(status))
|
|
{
|
|
signal = WSTOPSIG(status);
|
|
status_cstr = "STOPPED";
|
|
}
|
|
else if (WIFEXITED(status))
|
|
{
|
|
exit_status = WEXITSTATUS(status);
|
|
status_cstr = "EXITED";
|
|
exited = true;
|
|
}
|
|
else if (WIFSIGNALED(status))
|
|
{
|
|
signal = WTERMSIG(status);
|
|
status_cstr = "SIGNALED";
|
|
exited = true;
|
|
exit_status = -1;
|
|
}
|
|
else
|
|
{
|
|
status_cstr = "???";
|
|
}
|
|
|
|
if (log)
|
|
log->Printf ("::waitpid (pid = %llu, &status, 0) => pid = %i, status = 0x%8.8x (%s), signal = %i, exit_status = %i",
|
|
pid,
|
|
wait_pid,
|
|
status,
|
|
status_cstr,
|
|
signal,
|
|
exit_status);
|
|
|
|
if (callback)
|
|
cancel = callback (callback_baton, pid, exited, signal, exit_status);
|
|
|
|
if (exited || cancel)
|
|
{
|
|
::dispatch_source_cancel(source);
|
|
}
|
|
}
|
|
});
|
|
|
|
::dispatch_resume (source);
|
|
}
|
|
return thread;
|
|
}
|
|
|
|
//----------------------------------------------------------------------
|
|
// Log to both stderr and to ASL Logging when running on MacOSX.
|
|
//----------------------------------------------------------------------
|
|
void
|
|
Host::SystemLog (SystemLogType type, const char *format, va_list args)
|
|
{
|
|
if (format && format[0])
|
|
{
|
|
static aslmsg g_aslmsg = NULL;
|
|
if (g_aslmsg == NULL)
|
|
{
|
|
g_aslmsg = ::asl_new (ASL_TYPE_MSG);
|
|
char asl_key_sender[PATH_MAX];
|
|
snprintf(asl_key_sender, sizeof(asl_key_sender), "com.apple.LLDB.framework");
|
|
::asl_set (g_aslmsg, ASL_KEY_SENDER, asl_key_sender);
|
|
}
|
|
|
|
// Copy the va_list so we can log this message twice
|
|
va_list copy_args;
|
|
va_copy (copy_args, args);
|
|
// Log to stderr
|
|
::vfprintf (stderr, format, copy_args);
|
|
va_end (copy_args);
|
|
|
|
int asl_level;
|
|
switch (type)
|
|
{
|
|
case eSystemLogError:
|
|
asl_level = ASL_LEVEL_ERR;
|
|
break;
|
|
|
|
case eSystemLogWarning:
|
|
asl_level = ASL_LEVEL_WARNING;
|
|
break;
|
|
}
|
|
|
|
// Log to ASL
|
|
::asl_vlog (NULL, g_aslmsg, asl_level, format, args);
|
|
}
|
|
}
|
|
|
|
lldb::DataBufferSP
|
|
Host::GetAuxvData(lldb_private::Process *process)
|
|
{
|
|
return lldb::DataBufferSP();
|
|
}
|