| //===-- Host.mm -------------------------------------------------*- C++ -*-===// |
| // |
| // The LLVM Compiler Infrastructure |
| // |
| // This file is distributed under the University of Illinois Open Source |
| // License. See LICENSE.TXT for details. |
| // |
| //===----------------------------------------------------------------------===// |
| |
| #include "lldb/Host/Host.h" |
| |
| #include <AvailabilityMacros.h> |
| |
| #if !defined(MAC_OS_X_VERSION_10_7) || MAC_OS_X_VERSION_MAX_ALLOWED < MAC_OS_X_VERSION_10_7 |
| #define NO_XPC_SERVICES 1 |
| #endif |
| |
| #if !defined(NO_XPC_SERVICES) |
| #define __XPC_PRIVATE_H__ |
| #include <xpc/xpc.h> |
| #include "launcherXPCService/LauncherXPCService.h" |
| #endif |
| |
| #include <asl.h> |
| #include <crt_externs.h> |
| #include <execinfo.h> |
| #include <grp.h> |
| #include <libproc.h> |
| #include <pwd.h> |
| #include <spawn.h> |
| #include <stdio.h> |
| #include <sys/proc.h> |
| #include <sys/stat.h> |
| #include <sys/sysctl.h> |
| #include <sys/types.h> |
| #include <unistd.h> |
| |
| #include "lldb/Core/ArchSpec.h" |
| #include "lldb/Core/Communication.h" |
| #include "lldb/Core/ConnectionFileDescriptor.h" |
| #include "lldb/Core/DataExtractor.h" |
| #include "lldb/Core/Log.h" |
| #include "lldb/Core/Module.h" |
| #include "lldb/Core/StreamFile.h" |
| #include "lldb/Core/StreamString.h" |
| #include "lldb/Host/Endian.h" |
| #include "lldb/Host/FileSpec.h" |
| #include "lldb/Target/Platform.h" |
| #include "lldb/Target/Process.h" |
| #include "lldb/Utility/CleanUp.h" |
| |
| #include "cfcpp/CFCBundle.h" |
| #include "cfcpp/CFCMutableArray.h" |
| #include "cfcpp/CFCMutableDictionary.h" |
| #include "cfcpp/CFCReleaser.h" |
| #include "cfcpp/CFCString.h" |
| |
| #include "llvm/Support/Host.h" |
| #include "llvm/Support/MachO.h" |
| |
| #include <objc/objc-auto.h> |
| |
| #if defined(__arm__) |
| #include <UIKit/UIKit.h> |
| #else |
| #include <ApplicationServices/ApplicationServices.h> |
| #include <Carbon/Carbon.h> |
| #include <Security/Security.h> |
| #endif |
| |
| #ifndef _POSIX_SPAWN_DISABLE_ASLR |
| #define _POSIX_SPAWN_DISABLE_ASLR 0x0100 |
| #endif |
| |
| extern "C" |
| { |
| int __pthread_chdir(const char *path); |
| int __pthread_fchdir (int fildes); |
| } |
| |
| using namespace lldb; |
| using namespace lldb_private; |
| |
| static pthread_once_t g_thread_create_once = PTHREAD_ONCE_INIT; |
| static pthread_key_t g_thread_create_key = 0; |
| |
| class MacOSXDarwinThread |
| { |
| public: |
| MacOSXDarwinThread(const char *thread_name) : |
| m_pool (nil) |
| { |
| // Register our thread with the collector if garbage collection is enabled. |
| if (objc_collectingEnabled()) |
| { |
| #if MAC_OS_X_VERSION_MAX_ALLOWED <= MAC_OS_X_VERSION_10_5 |
| // On Leopard and earlier there is no way objc_registerThreadWithCollector |
| // function, so we do it manually. |
| auto_zone_register_thread(auto_zone()); |
| #else |
| // On SnowLeopard and later we just call the thread registration function. |
| objc_registerThreadWithCollector(); |
| #endif |
| } |
| else |
| { |
| m_pool = [[NSAutoreleasePool alloc] init]; |
| } |
| |
| |
| Host::SetThreadName (LLDB_INVALID_PROCESS_ID, LLDB_INVALID_THREAD_ID, thread_name); |
| } |
| |
| ~MacOSXDarwinThread() |
| { |
| if (m_pool) |
| { |
| [m_pool release]; |
| m_pool = nil; |
| } |
| } |
| |
| static void PThreadDestructor (void *v) |
| { |
| if (v) |
| delete static_cast<MacOSXDarwinThread*>(v); |
| ::pthread_setspecific (g_thread_create_key, NULL); |
| } |
| |
| protected: |
| NSAutoreleasePool * m_pool; |
| private: |
| DISALLOW_COPY_AND_ASSIGN (MacOSXDarwinThread); |
| }; |
| |
| static void |
| InitThreadCreated() |
| { |
| ::pthread_key_create (&g_thread_create_key, MacOSXDarwinThread::PThreadDestructor); |
| } |
| |
| void |
| Host::ThreadCreated (const char *thread_name) |
| { |
| ::pthread_once (&g_thread_create_once, InitThreadCreated); |
| if (g_thread_create_key) |
| { |
| ::pthread_setspecific (g_thread_create_key, new MacOSXDarwinThread(thread_name)); |
| } |
| } |
| |
| bool |
| Host::GetBundleDirectory (const FileSpec &file, FileSpec &bundle_directory) |
| { |
| #if defined (__APPLE__) |
| if (file.GetFileType () == FileSpec::eFileTypeDirectory) |
| { |
| char path[PATH_MAX]; |
| if (file.GetPath(path, sizeof(path))) |
| { |
| CFCBundle bundle (path); |
| if (bundle.GetPath (path, sizeof(path))) |
| { |
| bundle_directory.SetFile (path, false); |
| return true; |
| } |
| } |
| } |
| #endif |
| bundle_directory.Clear(); |
| return false; |
| } |
| |
| |
| bool |
| Host::ResolveExecutableInBundle (FileSpec &file) |
| { |
| #if defined (__APPLE__) |
| if (file.GetFileType () == FileSpec::eFileTypeDirectory) |
| { |
| char path[PATH_MAX]; |
| if (file.GetPath(path, sizeof(path))) |
| { |
| CFCBundle bundle (path); |
| CFCReleaser<CFURLRef> url(bundle.CopyExecutableURL ()); |
| if (url.get()) |
| { |
| if (::CFURLGetFileSystemRepresentation (url.get(), YES, (UInt8*)path, sizeof(path))) |
| { |
| file.SetFile(path, false); |
| return true; |
| } |
| } |
| } |
| } |
| #endif |
| return false; |
| } |
| |
| lldb::pid_t |
| Host::LaunchApplication (const FileSpec &app_file_spec) |
| { |
| #if defined (__arm__) |
| return LLDB_INVALID_PROCESS_ID; |
| #else |
| char app_path[PATH_MAX]; |
| app_file_spec.GetPath(app_path, sizeof(app_path)); |
| |
| LSApplicationParameters app_params; |
| ::memset (&app_params, 0, sizeof (app_params)); |
| app_params.flags = kLSLaunchDefaults | |
| kLSLaunchDontAddToRecents | |
| kLSLaunchNewInstance; |
| |
| |
| FSRef app_fsref; |
| CFCString app_cfstr (app_path, kCFStringEncodingUTF8); |
| |
| OSStatus error = ::FSPathMakeRef ((const UInt8 *)app_path, &app_fsref, NULL); |
| |
| // If we found the app, then store away the name so we don't have to re-look it up. |
| if (error != noErr) |
| return LLDB_INVALID_PROCESS_ID; |
| |
| app_params.application = &app_fsref; |
| |
| ProcessSerialNumber psn; |
| |
| error = ::LSOpenApplication (&app_params, &psn); |
| |
| if (error != noErr) |
| return LLDB_INVALID_PROCESS_ID; |
| |
| ::pid_t pid = LLDB_INVALID_PROCESS_ID; |
| error = ::GetProcessPID(&psn, &pid); |
| return pid; |
| #endif |
| } |
| |
| |
| static void * |
| AcceptPIDFromInferior (void *arg) |
| { |
| const char *connect_url = (const char *)arg; |
| ConnectionFileDescriptor file_conn; |
| Error error; |
| if (file_conn.Connect (connect_url, &error) == eConnectionStatusSuccess) |
| { |
| char pid_str[256]; |
| ::memset (pid_str, 0, sizeof(pid_str)); |
| ConnectionStatus status; |
| const size_t pid_str_len = file_conn.Read (pid_str, sizeof(pid_str), 0, status, NULL); |
| if (pid_str_len > 0) |
| { |
| int pid = atoi (pid_str); |
| return (void *)(intptr_t)pid; |
| } |
| } |
| return NULL; |
| } |
| |
| static bool |
| WaitForProcessToSIGSTOP (const lldb::pid_t pid, const int timeout_in_seconds) |
| { |
| const int time_delta_usecs = 100000; |
| const int num_retries = timeout_in_seconds/time_delta_usecs; |
| for (int i=0; i<num_retries; i++) |
| { |
| struct proc_bsdinfo bsd_info; |
| int error = ::proc_pidinfo (pid, PROC_PIDTBSDINFO, |
| (uint64_t) 0, |
| &bsd_info, |
| PROC_PIDTBSDINFO_SIZE); |
| |
| switch (error) |
| { |
| case EINVAL: |
| case ENOTSUP: |
| case ESRCH: |
| case EPERM: |
| return false; |
| |
| default: |
| break; |
| |
| case 0: |
| if (bsd_info.pbi_status == SSTOP) |
| return true; |
| } |
| ::usleep (time_delta_usecs); |
| } |
| return false; |
| } |
| #if !defined(__arm__) |
| |
| static lldb::pid_t |
| LaunchInNewTerminalWithCommandFile |
| ( |
| const char **argv, |
| const char **envp, |
| const char *working_dir, |
| const ArchSpec *arch_spec, |
| bool stop_at_entry, |
| bool disable_aslr |
| ) |
| { |
| if (!argv || !argv[0]) |
| return LLDB_INVALID_PROCESS_ID; |
| |
| OSStatus error = 0; |
| |
| FileSpec program (argv[0], false); |
| |
| |
| std::string unix_socket_name; |
| |
| char temp_file_path[PATH_MAX]; |
| const char *tmpdir = ::getenv ("TMPDIR"); |
| if (tmpdir == NULL) |
| tmpdir = "/tmp/"; |
| ::snprintf (temp_file_path, sizeof(temp_file_path), "%s%s-XXXXXX", tmpdir, program.GetFilename().AsCString()); |
| |
| if (::mktemp (temp_file_path) == NULL) |
| return LLDB_INVALID_PROCESS_ID; |
| |
| unix_socket_name.assign (temp_file_path); |
| |
| ::strncat (temp_file_path, ".command", sizeof (temp_file_path)); |
| |
| StreamFile command_file; |
| command_file.GetFile().Open (temp_file_path, |
| File::eOpenOptionWrite | File::eOpenOptionCanCreate, |
| File::ePermissionsDefault); |
| |
| if (!command_file.GetFile().IsValid()) |
| return LLDB_INVALID_PROCESS_ID; |
| |
| FileSpec darwin_debug_file_spec; |
| if (!Host::GetLLDBPath (ePathTypeSupportExecutableDir, darwin_debug_file_spec)) |
| return LLDB_INVALID_PROCESS_ID; |
| darwin_debug_file_spec.GetFilename().SetCString("darwin-debug"); |
| |
| if (!darwin_debug_file_spec.Exists()) |
| return LLDB_INVALID_PROCESS_ID; |
| |
| char launcher_path[PATH_MAX]; |
| darwin_debug_file_spec.GetPath(launcher_path, sizeof(launcher_path)); |
| command_file.Printf("\"%s\" ", launcher_path); |
| |
| command_file.Printf("--unix-socket=%s ", unix_socket_name.c_str()); |
| |
| if (arch_spec && arch_spec->IsValid()) |
| { |
| command_file.Printf("--arch=%s ", arch_spec->GetArchitectureName()); |
| } |
| |
| if (disable_aslr) |
| { |
| command_file.PutCString("--disable-aslr "); |
| } |
| |
| command_file.PutCString("-- "); |
| |
| if (argv) |
| { |
| for (size_t i=0; argv[i] != NULL; ++i) |
| { |
| command_file.Printf("\"%s\" ", argv[i]); |
| } |
| } |
| command_file.PutCString("\necho Process exited with status $?\n"); |
| command_file.GetFile().Close(); |
| if (::chmod (temp_file_path, S_IRWXU | S_IRWXG) != 0) |
| return LLDB_INVALID_PROCESS_ID; |
| |
| CFCMutableDictionary cf_env_dict; |
| |
| const bool can_create = true; |
| if (envp) |
| { |
| for (size_t i=0; envp[i] != NULL; ++i) |
| { |
| const char *env_entry = envp[i]; |
| const char *equal_pos = strchr(env_entry, '='); |
| if (equal_pos) |
| { |
| std::string env_key (env_entry, equal_pos); |
| std::string env_val (equal_pos + 1); |
| CFCString cf_env_key (env_key.c_str(), kCFStringEncodingUTF8); |
| CFCString cf_env_val (env_val.c_str(), kCFStringEncodingUTF8); |
| cf_env_dict.AddValue (cf_env_key.get(), cf_env_val.get(), can_create); |
| } |
| } |
| } |
| |
| LSApplicationParameters app_params; |
| ::memset (&app_params, 0, sizeof (app_params)); |
| app_params.flags = kLSLaunchDontAddToRecents | kLSLaunchAsync; |
| app_params.argv = NULL; |
| app_params.environment = (CFDictionaryRef)cf_env_dict.get(); |
| |
| CFCReleaser<CFURLRef> command_file_url (::CFURLCreateFromFileSystemRepresentation (NULL, |
| (const UInt8 *)temp_file_path, |
| strlen(temp_file_path), |
| false)); |
| |
| CFCMutableArray urls; |
| |
| // Terminal.app will open the ".command" file we have created |
| // and run our process inside it which will wait at the entry point |
| // for us to attach. |
| urls.AppendValue(command_file_url.get()); |
| |
| |
| lldb::pid_t pid = LLDB_INVALID_PROCESS_ID; |
| |
| Error lldb_error; |
| // Sleep and wait a bit for debugserver to start to listen... |
| char connect_url[128]; |
| ::snprintf (connect_url, sizeof(connect_url), "unix-accept://%s", unix_socket_name.c_str()); |
| |
| // Spawn a new thread to accept incoming connection on the connect_url |
| // so we can grab the pid from the inferior |
| lldb::thread_t accept_thread = Host::ThreadCreate (unix_socket_name.c_str(), |
| AcceptPIDFromInferior, |
| connect_url, |
| &lldb_error); |
| |
| ProcessSerialNumber psn; |
| error = LSOpenURLsWithRole(urls.get(), kLSRolesShell, NULL, &app_params, &psn, 1); |
| if (error == noErr) |
| { |
| thread_result_t accept_thread_result = NULL; |
| if (Host::ThreadJoin (accept_thread, &accept_thread_result, &lldb_error)) |
| { |
| if (accept_thread_result) |
| { |
| pid = (intptr_t)accept_thread_result; |
| |
| // Wait for process to be stopped the the entry point by watching |
| // for the process status to be set to SSTOP which indicates it it |
| // SIGSTOP'ed at the entry point |
| WaitForProcessToSIGSTOP (pid, 5); |
| } |
| } |
| } |
| else |
| { |
| Host::ThreadCancel (accept_thread, &lldb_error); |
| } |
| |
| return pid; |
| } |
| |
| const char *applscript_in_new_tty = |
| "tell application \"Terminal\"\n" |
| " do script \"%s\"\n" |
| "end tell\n"; |
| |
| |
| const char *applscript_in_existing_tty = "\ |
| set the_shell_script to \"%s\"\n\ |
| tell application \"Terminal\"\n\ |
| repeat with the_window in (get windows)\n\ |
| repeat with the_tab in tabs of the_window\n\ |
| set the_tty to tty in the_tab\n\ |
| if the_tty contains \"%s\" then\n\ |
| if the_tab is not busy then\n\ |
| set selected of the_tab to true\n\ |
| set frontmost of the_window to true\n\ |
| do script the_shell_script in the_tab\n\ |
| return\n\ |
| end if\n\ |
| end if\n\ |
| end repeat\n\ |
| end repeat\n\ |
| do script the_shell_script\n\ |
| end tell\n"; |
| |
| |
| static Error |
| LaunchInNewTerminalWithAppleScript (const char *exe_path, ProcessLaunchInfo &launch_info) |
| { |
| Error error; |
| char unix_socket_name[PATH_MAX] = "/tmp/XXXXXX"; |
| if (::mktemp (unix_socket_name) == NULL) |
| { |
| error.SetErrorString ("failed to make temporary path for a unix socket"); |
| return error; |
| } |
| |
| StreamString command; |
| FileSpec darwin_debug_file_spec; |
| if (!Host::GetLLDBPath (ePathTypeSupportExecutableDir, darwin_debug_file_spec)) |
| { |
| error.SetErrorString ("can't locate the 'darwin-debug' executable"); |
| return error; |
| } |
| |
| darwin_debug_file_spec.GetFilename().SetCString("darwin-debug"); |
| |
| if (!darwin_debug_file_spec.Exists()) |
| { |
| error.SetErrorStringWithFormat ("the 'darwin-debug' executable doesn't exists at %s/%s", |
| darwin_debug_file_spec.GetDirectory().GetCString(), |
| darwin_debug_file_spec.GetFilename().GetCString()); |
| return error; |
| } |
| |
| char launcher_path[PATH_MAX]; |
| darwin_debug_file_spec.GetPath(launcher_path, sizeof(launcher_path)); |
| |
| const ArchSpec &arch_spec = launch_info.GetArchitecture(); |
| if (arch_spec.IsValid()) |
| command.Printf("arch -arch %s ", arch_spec.GetArchitectureName()); |
| |
| command.Printf("'%s' --unix-socket=%s", launcher_path, unix_socket_name); |
| |
| if (arch_spec.IsValid()) |
| command.Printf(" --arch=%s", arch_spec.GetArchitectureName()); |
| |
| const char *working_dir = launch_info.GetWorkingDirectory(); |
| if (working_dir) |
| command.Printf(" --working-dir '%s'", working_dir); |
| |
| if (launch_info.GetFlags().Test (eLaunchFlagDisableASLR)) |
| command.PutCString(" --disable-aslr"); |
| |
| command.PutCString(" -- "); |
| |
| const char **argv = launch_info.GetArguments().GetConstArgumentVector (); |
| if (argv) |
| { |
| for (size_t i=0; argv[i] != NULL; ++i) |
| { |
| if (i==0) |
| command.Printf(" '%s'", exe_path); |
| else |
| command.Printf(" '%s'", argv[i]); |
| } |
| } |
| else |
| { |
| command.Printf(" '%s'", exe_path); |
| } |
| command.PutCString (" ; echo Process exited with status $?"); |
| |
| StreamString applescript_source; |
| |
| const char *tty_command = command.GetString().c_str(); |
| // if (tty_name && tty_name[0]) |
| // { |
| // applescript_source.Printf (applscript_in_existing_tty, |
| // tty_command, |
| // tty_name); |
| // } |
| // else |
| // { |
| applescript_source.Printf (applscript_in_new_tty, |
| tty_command); |
| // } |
| |
| |
| |
| const char *script_source = applescript_source.GetString().c_str(); |
| //puts (script_source); |
| NSAppleScript* applescript = [[NSAppleScript alloc] initWithSource:[NSString stringWithCString:script_source encoding:NSUTF8StringEncoding]]; |
| |
| lldb::pid_t pid = LLDB_INVALID_PROCESS_ID; |
| |
| Error lldb_error; |
| // Sleep and wait a bit for debugserver to start to listen... |
| ConnectionFileDescriptor file_conn; |
| char connect_url[128]; |
| ::snprintf (connect_url, sizeof(connect_url), "unix-accept://%s", unix_socket_name); |
| |
| // Spawn a new thread to accept incoming connection on the connect_url |
| // so we can grab the pid from the inferior. We have to do this because we |
| // are sending an AppleScript that will launch a process in Terminal.app, |
| // in a shell and the shell will fork/exec a couple of times before we get |
| // to the process that we wanted to launch. So when our process actually |
| // gets launched, we will handshake with it and get the process ID for it. |
| lldb::thread_t accept_thread = Host::ThreadCreate (unix_socket_name, |
| AcceptPIDFromInferior, |
| connect_url, |
| &lldb_error); |
| |
| |
| [applescript executeAndReturnError:nil]; |
| |
| thread_result_t accept_thread_result = NULL; |
| if (Host::ThreadJoin (accept_thread, &accept_thread_result, &lldb_error)) |
| { |
| if (accept_thread_result) |
| { |
| pid = (intptr_t)accept_thread_result; |
| |
| // Wait for process to be stopped the the entry point by watching |
| // for the process status to be set to SSTOP which indicates it it |
| // SIGSTOP'ed at the entry point |
| WaitForProcessToSIGSTOP (pid, 5); |
| } |
| } |
| ::unlink (unix_socket_name); |
| [applescript release]; |
| if (pid != LLDB_INVALID_PROCESS_ID) |
| launch_info.SetProcessID (pid); |
| return error; |
| } |
| |
| #endif // #if !defined(__arm__) |
| |
| |
| // On MacOSX CrashReporter will display a string for each shared library if |
| // the shared library has an exported symbol named "__crashreporter_info__". |
| |
| static Mutex& |
| GetCrashReporterMutex () |
| { |
| static Mutex g_mutex; |
| return g_mutex; |
| } |
| |
| extern "C" { |
| const char *__crashreporter_info__ = NULL; |
| } |
| |
| asm(".desc ___crashreporter_info__, 0x10"); |
| |
| void |
| Host::SetCrashDescriptionWithFormat (const char *format, ...) |
| { |
| static StreamString g_crash_description; |
| Mutex::Locker locker (GetCrashReporterMutex ()); |
| |
| if (format) |
| { |
| va_list args; |
| va_start (args, format); |
| g_crash_description.GetString().clear(); |
| g_crash_description.PrintfVarArg(format, args); |
| va_end (args); |
| __crashreporter_info__ = g_crash_description.GetData(); |
| } |
| else |
| { |
| __crashreporter_info__ = NULL; |
| } |
| } |
| |
| void |
| Host::SetCrashDescription (const char *cstr) |
| { |
| Mutex::Locker locker (GetCrashReporterMutex ()); |
| static std::string g_crash_description; |
| if (cstr) |
| { |
| g_crash_description.assign (cstr); |
| __crashreporter_info__ = g_crash_description.c_str(); |
| } |
| else |
| { |
| __crashreporter_info__ = NULL; |
| } |
| } |
| |
| bool |
| Host::OpenFileInExternalEditor (const FileSpec &file_spec, uint32_t line_no) |
| { |
| #if defined(__arm__) |
| return false; |
| #else |
| // We attach this to an 'odoc' event to specify a particular selection |
| typedef struct { |
| int16_t reserved0; // must be zero |
| int16_t fLineNumber; |
| int32_t fSelStart; |
| int32_t fSelEnd; |
| uint32_t reserved1; // must be zero |
| uint32_t reserved2; // must be zero |
| } BabelAESelInfo; |
| |
| LogSP log(lldb_private::GetLogIfAnyCategoriesSet (LIBLLDB_LOG_HOST)); |
| char file_path[PATH_MAX]; |
| file_spec.GetPath(file_path, PATH_MAX); |
| CFCString file_cfstr (file_path, kCFStringEncodingUTF8); |
| CFCReleaser<CFURLRef> file_URL (::CFURLCreateWithFileSystemPath (NULL, |
| file_cfstr.get(), |
| kCFURLPOSIXPathStyle, |
| false)); |
| |
| if (log) |
| log->Printf("Sending source file: \"%s\" and line: %d to external editor.\n", file_path, line_no); |
| |
| long error; |
| BabelAESelInfo file_and_line_info = |
| { |
| 0, // reserved0 |
| (int16_t)(line_no - 1), // fLineNumber (zero based line number) |
| 1, // fSelStart |
| 1024, // fSelEnd |
| 0, // reserved1 |
| 0 // reserved2 |
| }; |
| |
| AEKeyDesc file_and_line_desc; |
| |
| error = ::AECreateDesc (typeUTF8Text, |
| &file_and_line_info, |
| sizeof (file_and_line_info), |
| &(file_and_line_desc.descContent)); |
| |
| if (error != noErr) |
| { |
| if (log) |
| log->Printf("Error creating AEDesc: %ld.\n", error); |
| return false; |
| } |
| |
| file_and_line_desc.descKey = keyAEPosition; |
| |
| static std::string g_app_name; |
| static FSRef g_app_fsref; |
| |
| LSApplicationParameters app_params; |
| ::memset (&app_params, 0, sizeof (app_params)); |
| app_params.flags = kLSLaunchDefaults | |
| kLSLaunchDontAddToRecents | |
| kLSLaunchDontSwitch; |
| |
| char *external_editor = ::getenv ("LLDB_EXTERNAL_EDITOR"); |
| |
| if (external_editor) |
| { |
| if (log) |
| log->Printf("Looking for external editor \"%s\".\n", external_editor); |
| |
| if (g_app_name.empty() || strcmp (g_app_name.c_str(), external_editor) != 0) |
| { |
| CFCString editor_name (external_editor, kCFStringEncodingUTF8); |
| error = ::LSFindApplicationForInfo (kLSUnknownCreator, |
| NULL, |
| editor_name.get(), |
| &g_app_fsref, |
| NULL); |
| |
| // If we found the app, then store away the name so we don't have to re-look it up. |
| if (error != noErr) |
| { |
| if (log) |
| log->Printf("Could not find External Editor application, error: %ld.\n", error); |
| return false; |
| } |
| |
| } |
| app_params.application = &g_app_fsref; |
| } |
| |
| ProcessSerialNumber psn; |
| CFCReleaser<CFArrayRef> file_array(CFArrayCreate (NULL, (const void **) file_URL.ptr_address(false), 1, NULL)); |
| error = ::LSOpenURLsWithRole (file_array.get(), |
| kLSRolesAll, |
| &file_and_line_desc, |
| &app_params, |
| &psn, |
| 1); |
| |
| AEDisposeDesc (&(file_and_line_desc.descContent)); |
| |
| if (error != noErr) |
| { |
| if (log) |
| log->Printf("LSOpenURLsWithRole failed, error: %ld.\n", error); |
| |
| return false; |
| } |
| |
| ProcessInfoRec which_process; |
| ::memset(&which_process, 0, sizeof(which_process)); |
| unsigned char ap_name[PATH_MAX]; |
| which_process.processName = ap_name; |
| error = ::GetProcessInformation (&psn, &which_process); |
| |
| bool using_xcode; |
| if (error != noErr) |
| { |
| if (log) |
| log->Printf("GetProcessInformation failed, error: %ld.\n", error); |
| using_xcode = false; |
| } |
| else |
| using_xcode = strncmp((char *) ap_name+1, "Xcode", (int) ap_name[0]) == 0; |
| |
| // Xcode doesn't obey the line number in the Open Apple Event. So I have to send |
| // it an AppleScript to focus on the right line. |
| |
| if (using_xcode) |
| { |
| static ComponentInstance osa_component = NULL; |
| static const char *as_template = "tell application \"Xcode\"\n" |
| "set doc to the first document whose path is \"%s\"\n" |
| "set the selection to paragraph %d of doc\n" |
| "--- set the selected paragraph range to {%d, %d} of doc\n" |
| "end tell\n"; |
| const int chars_for_int = 32; |
| static int as_template_len = strlen (as_template); |
| |
| |
| char *as_str; |
| AEDesc as_desc; |
| |
| if (osa_component == NULL) |
| { |
| osa_component = ::OpenDefaultComponent (kOSAComponentType, |
| kAppleScriptSubtype); |
| } |
| |
| if (osa_component == NULL) |
| { |
| if (log) |
| log->Printf("Could not get default AppleScript component.\n"); |
| return false; |
| } |
| |
| uint32_t as_str_size = as_template_len + strlen (file_path) + 3 * chars_for_int + 1; |
| as_str = (char *) malloc (as_str_size); |
| ::snprintf (as_str, |
| as_str_size - 1, |
| as_template, |
| file_path, |
| line_no, |
| line_no, |
| line_no); |
| |
| error = ::AECreateDesc (typeChar, |
| as_str, |
| strlen (as_str), |
| &as_desc); |
| |
| ::free (as_str); |
| |
| if (error != noErr) |
| { |
| if (log) |
| log->Printf("Failed to create AEDesc for Xcode AppleEvent: %ld.\n", error); |
| return false; |
| } |
| |
| OSAID ret_OSAID; |
| error = ::OSACompileExecute (osa_component, |
| &as_desc, |
| kOSANullScript, |
| kOSAModeNeverInteract, |
| &ret_OSAID); |
| |
| ::OSADispose (osa_component, ret_OSAID); |
| |
| ::AEDisposeDesc (&as_desc); |
| |
| if (error != noErr) |
| { |
| if (log) |
| log->Printf("Sending AppleEvent to Xcode failed, error: %ld.\n", error); |
| return false; |
| } |
| } |
| return true; |
| #endif // #if !defined(__arm__) |
| } |
| |
| |
| void |
| Host::Backtrace (Stream &strm, uint32_t max_frames) |
| { |
| if (max_frames > 0) |
| { |
| std::vector<void *> frame_buffer (max_frames, NULL); |
| int num_frames = ::backtrace (&frame_buffer[0], frame_buffer.size()); |
| char** strs = ::backtrace_symbols (&frame_buffer[0], num_frames); |
| if (strs) |
| { |
| // Start at 1 to skip the "Host::Backtrace" frame |
| for (int i = 1; i < num_frames; ++i) |
| strm.Printf("%s\n", strs[i]); |
| ::free (strs); |
| } |
| } |
| } |
| |
| size_t |
| Host::GetEnvironment (StringList &env) |
| { |
| char **host_env = *_NSGetEnviron(); |
| char *env_entry; |
| size_t i; |
| for (i=0; (env_entry = host_env[i]) != NULL; ++i) |
| env.AppendString(env_entry); |
| return i; |
| |
| } |
| |
| |
| bool |
| Host::GetOSBuildString (std::string &s) |
| { |
| int mib[2] = { CTL_KERN, KERN_OSVERSION }; |
| char cstr[PATH_MAX]; |
| size_t cstr_len = sizeof(cstr); |
| if (::sysctl (mib, 2, cstr, &cstr_len, NULL, 0) == 0) |
| { |
| s.assign (cstr, cstr_len); |
| return true; |
| } |
| |
| s.clear(); |
| return false; |
| } |
| |
| bool |
| Host::GetOSKernelDescription (std::string &s) |
| { |
| int mib[2] = { CTL_KERN, KERN_VERSION }; |
| char cstr[PATH_MAX]; |
| size_t cstr_len = sizeof(cstr); |
| if (::sysctl (mib, 2, cstr, &cstr_len, NULL, 0) == 0) |
| { |
| s.assign (cstr, cstr_len); |
| return true; |
| } |
| s.clear(); |
| return false; |
| } |
| |
| bool |
| Host::GetOSVersion |
| ( |
| uint32_t &major, |
| uint32_t &minor, |
| uint32_t &update |
| ) |
| { |
| |
| #if defined (__arm__) |
| major = UINT32_MAX; |
| minor = UINT32_MAX; |
| update = UINT32_MAX; |
| |
| NSString *system_version_nstr = [[UIDevice currentDevice] systemVersion]; |
| if (system_version_nstr) |
| { |
| const char *system_version_cstr = system_version_nstr.UTF8String; |
| Args::StringToVersion(system_version_cstr, major, minor, update); |
| } |
| return major != UINT32_MAX; |
| #else |
| SInt32 version; |
| |
| OSErr err = ::Gestalt (gestaltSystemVersion, &version); |
| if (err != noErr) |
| return false; |
| |
| if (version < 0x1040) |
| { |
| major = ((version & 0xF000) >> 12) * 10 + ((version & 0x0F00) >> 8); |
| minor = (version & 0x00F0) >> 4; |
| update = (version & 0x000F); |
| } |
| else |
| { |
| if (::Gestalt (gestaltSystemVersionMajor, &version) != noErr) |
| return false; |
| major = version; |
| |
| if (::Gestalt (gestaltSystemVersionMinor, &version) == noErr) |
| minor = version; |
| else |
| minor = 0; |
| |
| if (::Gestalt (gestaltSystemVersionBugFix, &version) == noErr) |
| update = version; |
| else |
| update = 0; |
| } |
| |
| return true; |
| #endif |
| } |
| |
| static bool |
| GetMacOSXProcessName (const ProcessInstanceInfoMatch *match_info_ptr, |
| ProcessInstanceInfo &process_info) |
| { |
| if (process_info.ProcessIDIsValid()) |
| { |
| char process_name[MAXCOMLEN * 2 + 1]; |
| int name_len = ::proc_name(process_info.GetProcessID(), process_name, MAXCOMLEN * 2); |
| if (name_len == 0) |
| return false; |
| |
| if (match_info_ptr == NULL || NameMatches(process_name, |
| match_info_ptr->GetNameMatchType(), |
| match_info_ptr->GetProcessInfo().GetName())) |
| { |
| process_info.GetExecutableFile().SetFile (process_name, false); |
| return true; |
| } |
| } |
| process_info.GetExecutableFile().Clear(); |
| return false; |
| } |
| |
| |
| static bool |
| GetMacOSXProcessCPUType (ProcessInstanceInfo &process_info) |
| { |
| if (process_info.ProcessIDIsValid()) |
| { |
| // Make a new mib to stay thread safe |
| int mib[CTL_MAXNAME]={0,}; |
| size_t mib_len = CTL_MAXNAME; |
| if (::sysctlnametomib("sysctl.proc_cputype", mib, &mib_len)) |
| return false; |
| |
| mib[mib_len] = process_info.GetProcessID(); |
| mib_len++; |
| |
| cpu_type_t cpu, sub = 0; |
| size_t cpu_len = sizeof(cpu); |
| if (::sysctl (mib, mib_len, &cpu, &cpu_len, 0, 0) == 0) |
| { |
| switch (cpu) |
| { |
| case llvm::MachO::CPUTypeI386: sub = llvm::MachO::CPUSubType_I386_ALL; break; |
| case llvm::MachO::CPUTypeX86_64: sub = llvm::MachO::CPUSubType_X86_64_ALL; break; |
| default: break; |
| } |
| process_info.GetArchitecture ().SetArchitecture (eArchTypeMachO, cpu, sub); |
| return true; |
| } |
| } |
| process_info.GetArchitecture().Clear(); |
| return false; |
| } |
| |
| static bool |
| GetMacOSXProcessArgs (const ProcessInstanceInfoMatch *match_info_ptr, |
| ProcessInstanceInfo &process_info) |
| { |
| if (process_info.ProcessIDIsValid()) |
| { |
| int proc_args_mib[3] = { CTL_KERN, KERN_PROCARGS2, (int)process_info.GetProcessID() }; |
| |
| char arg_data[8192]; |
| size_t arg_data_size = sizeof(arg_data); |
| if (::sysctl (proc_args_mib, 3, arg_data, &arg_data_size , NULL, 0) == 0) |
| { |
| DataExtractor data (arg_data, arg_data_size, lldb::endian::InlHostByteOrder(), sizeof(void *)); |
| uint32_t offset = 0; |
| uint32_t start_offset; |
| uint32_t argc = data.GetU32 (&offset); |
| const char *cstr; |
| |
| cstr = data.GetCStr (&offset); |
| if (cstr) |
| { |
| process_info.GetExecutableFile().SetFile(cstr, false); |
| |
| if (match_info_ptr == NULL || |
| NameMatches (process_info.GetExecutableFile().GetFilename().GetCString(), |
| match_info_ptr->GetNameMatchType(), |
| match_info_ptr->GetProcessInfo().GetName())) |
| { |
| // Skip NULLs |
| while (1) |
| { |
| const uint8_t *p = data.PeekData(offset, 1); |
| if ((p == NULL) || (*p != '\0')) |
| break; |
| ++offset; |
| } |
| // Now extract all arguments |
| Args &proc_args = process_info.GetArguments(); |
| for (int i=0; i<argc; ++i) |
| { |
| start_offset = offset; |
| cstr = data.GetCStr(&offset); |
| if (cstr) |
| proc_args.AppendArgument(cstr); |
| } |
| return true; |
| } |
| } |
| } |
| } |
| return false; |
| } |
| |
| static bool |
| GetMacOSXProcessUserAndGroup (ProcessInstanceInfo &process_info) |
| { |
| if (process_info.ProcessIDIsValid()) |
| { |
| int mib[4]; |
| mib[0] = CTL_KERN; |
| mib[1] = KERN_PROC; |
| mib[2] = KERN_PROC_PID; |
| mib[3] = process_info.GetProcessID(); |
| struct kinfo_proc proc_kinfo; |
| size_t proc_kinfo_size = sizeof(struct kinfo_proc); |
| |
| if (::sysctl (mib, 4, &proc_kinfo, &proc_kinfo_size, NULL, 0) == 0) |
| { |
| if (proc_kinfo_size > 0) |
| { |
| process_info.SetParentProcessID (proc_kinfo.kp_eproc.e_ppid); |
| process_info.SetUserID (proc_kinfo.kp_eproc.e_pcred.p_ruid); |
| process_info.SetGroupID (proc_kinfo.kp_eproc.e_pcred.p_rgid); |
| process_info.SetEffectiveUserID (proc_kinfo.kp_eproc.e_ucred.cr_uid); |
| if (proc_kinfo.kp_eproc.e_ucred.cr_ngroups > 0) |
| process_info.SetEffectiveGroupID (proc_kinfo.kp_eproc.e_ucred.cr_groups[0]); |
| else |
| process_info.SetEffectiveGroupID (UINT32_MAX); |
| return true; |
| } |
| } |
| } |
| process_info.SetParentProcessID (LLDB_INVALID_PROCESS_ID); |
| process_info.SetUserID (UINT32_MAX); |
| process_info.SetGroupID (UINT32_MAX); |
| process_info.SetEffectiveUserID (UINT32_MAX); |
| process_info.SetEffectiveGroupID (UINT32_MAX); |
| return false; |
| } |
| |
| |
| uint32_t |
| Host::FindProcesses (const ProcessInstanceInfoMatch &match_info, ProcessInstanceInfoList &process_infos) |
| { |
| std::vector<struct kinfo_proc> kinfos; |
| |
| int mib[3] = { CTL_KERN, KERN_PROC, KERN_PROC_ALL }; |
| |
| size_t pid_data_size = 0; |
| if (::sysctl (mib, 4, NULL, &pid_data_size, NULL, 0) != 0) |
| return 0; |
| |
| // Add a few extra in case a few more show up |
| const size_t estimated_pid_count = (pid_data_size / sizeof(struct kinfo_proc)) + 10; |
| |
| kinfos.resize (estimated_pid_count); |
| pid_data_size = kinfos.size() * sizeof(struct kinfo_proc); |
| |
| if (::sysctl (mib, 4, &kinfos[0], &pid_data_size, NULL, 0) != 0) |
| return 0; |
| |
| const size_t actual_pid_count = (pid_data_size / sizeof(struct kinfo_proc)); |
| |
| bool all_users = match_info.GetMatchAllUsers(); |
| const lldb::pid_t our_pid = getpid(); |
| const uid_t our_uid = getuid(); |
| for (int i = 0; i < actual_pid_count; i++) |
| { |
| const struct kinfo_proc &kinfo = kinfos[i]; |
| |
| bool kinfo_user_matches = false; |
| if (all_users) |
| kinfo_user_matches = true; |
| else |
| kinfo_user_matches = kinfo.kp_eproc.e_pcred.p_ruid == our_uid; |
| |
| // Special case, if lldb is being run as root we can attach to anything. |
| if (our_uid == 0) |
| kinfo_user_matches = true; |
| |
| if (kinfo_user_matches == false || // Make sure the user is acceptable |
| kinfo.kp_proc.p_pid == our_pid || // Skip this process |
| kinfo.kp_proc.p_pid == 0 || // Skip kernel (kernel pid is zero) |
| kinfo.kp_proc.p_stat == SZOMB || // Zombies are bad, they like brains... |
| kinfo.kp_proc.p_flag & P_TRACED || // Being debugged? |
| kinfo.kp_proc.p_flag & P_WEXIT || // Working on exiting? |
| kinfo.kp_proc.p_flag & P_TRANSLATED) // Skip translated ppc (Rosetta) |
| continue; |
| |
| ProcessInstanceInfo process_info; |
| process_info.SetProcessID (kinfo.kp_proc.p_pid); |
| process_info.SetParentProcessID (kinfo.kp_eproc.e_ppid); |
| process_info.SetUserID (kinfo.kp_eproc.e_pcred.p_ruid); |
| process_info.SetGroupID (kinfo.kp_eproc.e_pcred.p_rgid); |
| process_info.SetEffectiveUserID (kinfo.kp_eproc.e_ucred.cr_uid); |
| if (kinfo.kp_eproc.e_ucred.cr_ngroups > 0) |
| process_info.SetEffectiveGroupID (kinfo.kp_eproc.e_ucred.cr_groups[0]); |
| else |
| process_info.SetEffectiveGroupID (UINT32_MAX); |
| |
| // Make sure our info matches before we go fetch the name and cpu type |
| if (match_info.Matches (process_info)) |
| { |
| if (GetMacOSXProcessArgs (&match_info, process_info)) |
| { |
| GetMacOSXProcessCPUType (process_info); |
| if (match_info.Matches (process_info)) |
| process_infos.Append (process_info); |
| } |
| } |
| } |
| return process_infos.GetSize(); |
| } |
| |
| bool |
| Host::GetProcessInfo (lldb::pid_t pid, ProcessInstanceInfo &process_info) |
| { |
| process_info.SetProcessID(pid); |
| bool success = false; |
| |
| if (GetMacOSXProcessArgs (NULL, process_info)) |
| success = true; |
| |
| if (GetMacOSXProcessCPUType (process_info)) |
| success = true; |
| |
| if (GetMacOSXProcessUserAndGroup (process_info)) |
| success = true; |
| |
| if (success) |
| return true; |
| |
| process_info.Clear(); |
| return false; |
| } |
| |
| static short |
| GetPosixspawnFlags (ProcessLaunchInfo &launch_info) |
| { |
| short flags = POSIX_SPAWN_SETSIGDEF | POSIX_SPAWN_SETSIGMASK; |
| if (launch_info.GetFlags().Test (eLaunchFlagExec)) |
| flags |= POSIX_SPAWN_SETEXEC; // Darwin specific posix_spawn flag |
| |
| if (launch_info.GetFlags().Test (eLaunchFlagDebug)) |
| flags |= POSIX_SPAWN_START_SUSPENDED; // Darwin specific posix_spawn flag |
| |
| if (launch_info.GetFlags().Test (eLaunchFlagDisableASLR)) |
| flags |= _POSIX_SPAWN_DISABLE_ASLR; // Darwin specific posix_spawn flag |
| |
| //#ifdef POSIX_SPAWN_CLOEXEC_DEFAULT |
| // // Close all files exception those with file actions if this is supported. |
| // flags |= POSIX_SPAWN_CLOEXEC_DEFAULT; |
| //#endif |
| |
| return flags; |
| } |
| |
| #if !NO_XPC_SERVICES |
| static void |
| PackageXPCArguments (xpc_object_t message, const char *prefix, const Args& args) |
| { |
| size_t count = args.GetArgumentCount(); |
| char buf[50]; // long enough for 'argXXX' |
| memset(buf, 0, 50); |
| sprintf(buf, "%sCount", prefix); |
| xpc_dictionary_set_int64(message, buf, count); |
| for (int i=0; i<count; i++) { |
| memset(buf, 0, 50); |
| sprintf(buf, "%s%i", prefix, i); |
| xpc_dictionary_set_string(message, buf, args.GetArgumentAtIndex(i)); |
| } |
| } |
| |
| static AuthorizationRef authorizationRef = NULL; |
| static Error |
| getXPCAuthorization (ProcessLaunchInfo &launch_info) |
| { |
| Error error; |
| LogSP log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_HOST | LIBLLDB_LOG_PROCESS)); |
| |
| if (launch_info.GetUserID() == 0) |
| { |
| CFDictionaryRef dict = NULL; |
| OSStatus osStatus; |
| |
| AuthorizationFlags authorizationFlags = kAuthorizationFlagDefaults; |
| if (!authorizationRef) |
| { |
| osStatus = AuthorizationCreate(NULL, kAuthorizationEmptyEnvironment, authorizationFlags, &authorizationRef); |
| if (osStatus != errAuthorizationSuccess) |
| { |
| error.SetError(1, eErrorTypeGeneric); |
| error.SetErrorString("Can't create authorizationRef."); |
| if (log) |
| { |
| error.PutToLog(log.get(), "%s", error.AsCString()); |
| } |
| return error; |
| } |
| |
| osStatus = AuthorizationRightGet(LaunchUsingXPCRightName, &dict); |
| if (dict) CFRelease(dict); |
| if (osStatus != errAuthorizationSuccess) |
| { |
| // No rights in the security database, Create it with the right prompt. |
| |
| CFStringRef prompt = CFSTR("The debugger needs administrator rights to debug a root process."); |
| CFStringRef keys[] = { CFSTR("en") }; |
| CFTypeRef values[] = { prompt }; |
| CFDictionaryRef promptDict = CFDictionaryCreate(kCFAllocatorDefault, (const void **)keys, (const void **)values, 1, &kCFCopyStringDictionaryKeyCallBacks, &kCFTypeDictionaryValueCallBacks); |
| |
| CFStringRef keys1[] = { CFSTR("class"), CFSTR("group"), CFSTR("comment"), CFSTR("default-prompt"), CFSTR("shared") }; |
| CFTypeRef values1[] = { CFSTR("user"), CFSTR("admin"), CFSTR(LaunchUsingXPCRightName), promptDict, kCFBooleanFalse }; |
| dict = CFDictionaryCreate(kCFAllocatorDefault, (const void **)keys1, (const void **)values1, 5, &kCFCopyStringDictionaryKeyCallBacks, &kCFTypeDictionaryValueCallBacks); |
| osStatus = AuthorizationRightSet(authorizationRef, LaunchUsingXPCRightName, dict, NULL, NULL, NULL); |
| CFRelease(promptDict); |
| CFRelease(dict); |
| } |
| } |
| |
| AuthorizationItem item1 = { LaunchUsingXPCRightName, 0, NULL, 0 }; |
| AuthorizationItem items[] = {item1}; |
| AuthorizationRights requestedRights = {1, items }; |
| authorizationFlags = kAuthorizationFlagInteractionAllowed | kAuthorizationFlagExtendRights; |
| osStatus = AuthorizationCopyRights(authorizationRef, &requestedRights, kAuthorizationEmptyEnvironment, authorizationFlags, NULL); |
| if (osStatus != errAuthorizationSuccess) |
| { |
| // Eventually when the commandline supports running as root and the user is not |
| // logged in in the current audit session, we will need the trick in gdb where |
| // we ask the user to type in the root passwd in the terminal. |
| error.SetError(2, eErrorTypeGeneric); |
| error.SetErrorStringWithFormat("Launching as root needs root authorization."); |
| if (log) |
| { |
| error.PutToLog(log.get(), "%s", error.AsCString()); |
| } |
| } |
| } |
| |
| return error; |
| } |
| #endif |
| |
| static Error |
| LaunchProcessXPC (const char *exe_path, ProcessLaunchInfo &launch_info, ::pid_t &pid) |
| { |
| #if !NO_XPC_SERVICES |
| Error error = getXPCAuthorization(launch_info); |
| if (error.Fail()) |
| return error; |
| |
| LogSP log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_HOST | LIBLLDB_LOG_PROCESS)); |
| |
| uid_t requested_uid = launch_info.GetUserID(); |
| const char *xpc_service = nil; |
| bool send_auth = false; |
| AuthorizationExternalForm extForm; |
| if ((requested_uid == UINT32_MAX) || (requested_uid == Host::GetEffectiveUserID())) |
| { |
| xpc_service = "com.apple.lldb.launcherXPCService"; |
| } |
| else if (requested_uid == 0) |
| { |
| if (AuthorizationMakeExternalForm(authorizationRef, &extForm) == errAuthorizationSuccess) |
| { |
| send_auth = true; |
| } |
| else |
| { |
| error.SetError(2, eErrorTypeGeneric); |
| error.SetErrorStringWithFormat("Launching root via XPC needs to externalize authorization reference."); |
| if (log) |
| { |
| error.PutToLog(log.get(), "%s", error.AsCString()); |
| } |
| return error; |
| } |
| xpc_service = "com.apple.lldb.launcherRootXPCService"; |
| } |
| else |
| { |
| error.SetError(3, eErrorTypeGeneric); |
| error.SetErrorStringWithFormat("Launching via XPC is only currently available for either the login user or root."); |
| if (log) |
| { |
| error.PutToLog(log.get(), "%s", error.AsCString()); |
| } |
| return error; |
| } |
| |
| xpc_connection_t conn = xpc_connection_create(xpc_service, NULL); |
| |
| xpc_connection_set_event_handler(conn, ^(xpc_object_t event) { |
| xpc_type_t type = xpc_get_type(event); |
| |
| if (type == XPC_TYPE_ERROR) { |
| if (event == XPC_ERROR_CONNECTION_INTERRUPTED) { |
| // The service has either canceled itself, crashed, or been terminated. |
| // The XPC connection is still valid and sending a message to it will re-launch the service. |
| // If the service is state-full, this is the time to initialize the new service. |
| return; |
| } else if (event == XPC_ERROR_CONNECTION_INVALID) { |
| // The service is invalid. Either the service name supplied to xpc_connection_create() is incorrect |
| // or we (this process) have canceled the service; we can do any cleanup of appliation state at this point. |
| // printf("Service disconnected"); |
| return; |
| } else { |
| // printf("Unexpected error from service: %s", xpc_dictionary_get_string(event, XPC_ERROR_KEY_DESCRIPTION)); |
| } |
| |
| } else { |
| // printf("Received unexpected event in handler"); |
| } |
| }); |
| |
| xpc_connection_set_finalizer_f (conn, xpc_finalizer_t(xpc_release)); |
| xpc_connection_resume (conn); |
| xpc_object_t message = xpc_dictionary_create (nil, nil, 0); |
| |
| if (send_auth) |
| { |
| xpc_dictionary_set_data(message, LauncherXPCServiceAuthKey, extForm.bytes, sizeof(AuthorizationExternalForm)); |
| } |
| |
| PackageXPCArguments(message, LauncherXPCServiceArgPrefxKey, launch_info.GetArguments()); |
| PackageXPCArguments(message, LauncherXPCServiceEnvPrefxKey, launch_info.GetEnvironmentEntries()); |
| |
| // Posix spawn stuff. |
| xpc_dictionary_set_int64(message, LauncherXPCServiceCPUTypeKey, launch_info.GetArchitecture().GetMachOCPUType()); |
| xpc_dictionary_set_int64(message, LauncherXPCServicePosixspawnFlagsKey, GetPosixspawnFlags(launch_info)); |
| |
| xpc_object_t reply = xpc_connection_send_message_with_reply_sync(conn, message); |
| |
| pid = xpc_dictionary_get_int64(reply, LauncherXPCServiceChildPIDKey); |
| if (pid == 0) |
| { |
| int errorType = xpc_dictionary_get_int64(reply, LauncherXPCServiceErrorTypeKey); |
| int errorCode = xpc_dictionary_get_int64(reply, LauncherXPCServiceCodeTypeKey); |
| |
| error.SetError(errorCode, eErrorTypeGeneric); |
| error.SetErrorStringWithFormat("Problems with launching via XPC. Error type : %i, code : %i", errorType, errorCode); |
| if (log) |
| { |
| error.PutToLog(log.get(), "%s", error.AsCString()); |
| } |
| } |
| |
| return error; |
| #endif |
| } |
| |
| static Error |
| LaunchProcessPosixSpawn (const char *exe_path, ProcessLaunchInfo &launch_info, ::pid_t &pid) |
| { |
| Error error; |
| LogSP log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_HOST | LIBLLDB_LOG_PROCESS)); |
| |
| posix_spawnattr_t attr; |
| error.SetError( ::posix_spawnattr_init (&attr), eErrorTypePOSIX); |
| |
| if (error.Fail() || log) |
| error.PutToLog(log.get(), "::posix_spawnattr_init ( &attr )"); |
| if (error.Fail()) |
| return error; |
| |
| // Make a quick class that will cleanup the posix spawn attributes in case |
| // we return in the middle of this function. |
| lldb_utility::CleanUp <posix_spawnattr_t *, int> posix_spawnattr_cleanup(&attr, posix_spawnattr_destroy); |
| |
| sigset_t no_signals; |
| sigset_t all_signals; |
| sigemptyset (&no_signals); |
| sigfillset (&all_signals); |
| ::posix_spawnattr_setsigmask(&attr, &no_signals); |
| ::posix_spawnattr_setsigdefault(&attr, &all_signals); |
| |
| short flags = GetPosixspawnFlags(launch_info); |
| error.SetError( ::posix_spawnattr_setflags (&attr, flags), eErrorTypePOSIX); |
| if (error.Fail() || log) |
| error.PutToLog(log.get(), "::posix_spawnattr_setflags ( &attr, flags=0x%8.8x )", flags); |
| if (error.Fail()) |
| return error; |
| |
| #if !defined(__arm__) |
| |
| // We don't need to do this for ARM, and we really shouldn't now that we |
| // have multiple CPU subtypes and no posix_spawnattr call that allows us |
| // to set which CPU subtype to launch... |
| const ArchSpec &arch_spec = launch_info.GetArchitecture(); |
| cpu_type_t cpu = arch_spec.GetMachOCPUType(); |
| if (cpu != 0 && |
| cpu != UINT32_MAX && |
| cpu != LLDB_INVALID_CPUTYPE) |
| { |
| size_t ocount = 0; |
| error.SetError( ::posix_spawnattr_setbinpref_np (&attr, 1, &cpu, &ocount), eErrorTypePOSIX); |
| if (error.Fail() || log) |
| error.PutToLog(log.get(), "::posix_spawnattr_setbinpref_np ( &attr, 1, cpu_type = 0x%8.8x, count => %zu )", cpu, ocount); |
| |
| if (error.Fail() || ocount != 1) |
| return error; |
| } |
| |
| #endif |
| |
| const char *tmp_argv[2]; |
| char * const *argv = (char * const*)launch_info.GetArguments().GetConstArgumentVector(); |
| char * const *envp = (char * const*)launch_info.GetEnvironmentEntries().GetConstArgumentVector(); |
| if (argv == NULL) |
| { |
| // posix_spawn gets very unhappy if it doesn't have at least the program |
| // name in argv[0]. One of the side affects I have noticed is the environment |
| // variables don't make it into the child process if "argv == NULL"!!! |
| tmp_argv[0] = exe_path; |
| tmp_argv[1] = NULL; |
| argv = (char * const*)tmp_argv; |
| } |
| |
| |
| const char *working_dir = launch_info.GetWorkingDirectory(); |
| if (working_dir) |
| { |
| // No more thread specific current working directory |
| __pthread_chdir (working_dir); |
| } |
| |
| const size_t num_file_actions = launch_info.GetNumFileActions (); |
| if (num_file_actions > 0) |
| { |
| posix_spawn_file_actions_t file_actions; |
| error.SetError( ::posix_spawn_file_actions_init (&file_actions), eErrorTypePOSIX); |
| if (error.Fail() || log) |
| error.PutToLog(log.get(), "::posix_spawn_file_actions_init ( &file_actions )"); |
| if (error.Fail()) |
| return error; |
| |
| // Make a quick class that will cleanup the posix spawn attributes in case |
| // we return in the middle of this function. |
| lldb_utility::CleanUp <posix_spawn_file_actions_t *, int> posix_spawn_file_actions_cleanup (&file_actions, posix_spawn_file_actions_destroy); |
| |
| for (size_t i=0; i<num_file_actions; ++i) |
| { |
| const ProcessLaunchInfo::FileAction *launch_file_action = launch_info.GetFileActionAtIndex(i); |
| if (launch_file_action) |
| { |
| if (!ProcessLaunchInfo::FileAction::AddPosixSpawnFileAction (&file_actions, |
| launch_file_action, |
| log.get(), |
| error)) |
| return error; |
| } |
| } |
| |
| error.SetError (::posix_spawnp (&pid, |
| exe_path, |
| &file_actions, |
| &attr, |
| argv, |
| envp), |
| eErrorTypePOSIX); |
| |
| if (error.Fail() || log) |
| error.PutToLog(log.get(), "::posix_spawnp ( pid => %i, path = '%s', file_actions = %p, attr = %p, argv = %p, envp = %p )", |
| pid, |
| exe_path, |
| &file_actions, |
| &attr, |
| argv, |
| envp); |
| } |
| else |
| { |
| error.SetError (::posix_spawnp (&pid, |
| exe_path, |
| NULL, |
| &attr, |
| argv, |
| envp), |
| eErrorTypePOSIX); |
| |
| if (error.Fail() || log) |
| error.PutToLog(log.get(), "::posix_spawnp ( pid => %i, path = '%s', file_actions = NULL, attr = %p, argv = %p, envp = %p )", |
| pid, |
| exe_path, |
| &attr, |
| argv, |
| envp); |
| } |
| |
| if (working_dir) |
| { |
| // No more thread specific current working directory |
| __pthread_fchdir (-1); |
| } |
| |
| return error; |
| } |
| |
| static bool |
| ShouldLaunchUsingXPC(const char *exe_path, ProcessLaunchInfo &launch_info) |
| { |
| bool result = false; |
| |
| #if !NO_XPC_SERVICES |
| const char *debugserver = "/debugserver"; |
| int len = strlen(debugserver); |
| int exe_len = strlen(exe_path); |
| if (exe_len >= len) |
| { |
| const char *part = exe_path + (exe_len - len); |
| if (strcmp(part, debugserver) == 0) |
| { |
| // We are dealing with debugserver. |
| uid_t requested_uid = launch_info.GetUserID(); |
| if (requested_uid == 0) |
| { |
| // Launching XPC works for root. It also works for the non-attaching case for current login |
| // but unfortunately, we can't detect it here. |
| result = true; |
| } |
| } |
| } |
| #endif |
| |
| return result; |
| } |
| |
| Error |
| Host::LaunchProcess (ProcessLaunchInfo &launch_info) |
| { |
| Error error; |
| char exe_path[PATH_MAX]; |
| PlatformSP host_platform_sp (Platform::GetDefaultPlatform ()); |
| |
| const ArchSpec &arch_spec = launch_info.GetArchitecture(); |
| |
| FileSpec exe_spec(launch_info.GetExecutableFile()); |
| |
| FileSpec::FileType file_type = exe_spec.GetFileType(); |
| if (file_type != FileSpec::eFileTypeRegular) |
| { |
| lldb::ModuleSP exe_module_sp; |
| error = host_platform_sp->ResolveExecutable (exe_spec, |
| arch_spec, |
| exe_module_sp, |
| NULL); |
| |
| if (error.Fail()) |
| return error; |
| |
| if (exe_module_sp) |
| exe_spec = exe_module_sp->GetFileSpec(); |
| } |
| |
| if (exe_spec.Exists()) |
| { |
| exe_spec.GetPath (exe_path, sizeof(exe_path)); |
| } |
| else |
| { |
| launch_info.GetExecutableFile().GetPath (exe_path, sizeof(exe_path)); |
| error.SetErrorStringWithFormat ("executable doesn't exist: '%s'", exe_path); |
| return error; |
| } |
| |
| if (launch_info.GetFlags().Test (eLaunchFlagLaunchInTTY)) |
| { |
| #if !defined(__arm__) |
| return LaunchInNewTerminalWithAppleScript (exe_path, launch_info); |
| #else |
| error.SetErrorString ("launching a processs in a new terminal is not supported on iOS devices"); |
| return error; |
| #endif |
| } |
| |
| ::pid_t pid = LLDB_INVALID_PROCESS_ID; |
| |
| if (ShouldLaunchUsingXPC(exe_path, launch_info)) |
| { |
| error = LaunchProcessXPC(exe_path, launch_info, pid); |
| } |
| else |
| { |
| error = LaunchProcessPosixSpawn(exe_path, launch_info, pid); |
| } |
| |
| if (pid != LLDB_INVALID_PROCESS_ID) |
| { |
| // If all went well, then set the process ID into the launch info |
| launch_info.SetProcessID(pid); |
| |
| // Make sure we reap any processes we spawn or we will have zombies. |
| if (!launch_info.MonitorProcess()) |
| { |
| const bool monitor_signals = false; |
| StartMonitoringChildProcess (Process::SetProcessExitStatus, |
| NULL, |
| pid, |
| monitor_signals); |
| } |
| } |
| else |
| { |
| // Invalid process ID, something didn't go well |
| if (error.Success()) |
| error.SetErrorString ("process launch failed for unknown reasons"); |
| } |
| return error; |
| } |
| |
| lldb::thread_t |
| Host::StartMonitoringChildProcess (Host::MonitorChildProcessCallback callback, |
| void *callback_baton, |
| lldb::pid_t pid, |
| bool monitor_signals) |
| { |
| lldb::thread_t thread = LLDB_INVALID_HOST_THREAD; |
| unsigned long mask = DISPATCH_PROC_EXIT; |
| if (monitor_signals) |
| mask |= DISPATCH_PROC_SIGNAL; |
| |
| LogSP log(lldb_private::GetLogIfAnyCategoriesSet (LIBLLDB_LOG_HOST | LIBLLDB_LOG_PROCESS)); |
| |
| |
| dispatch_source_t source = ::dispatch_source_create (DISPATCH_SOURCE_TYPE_PROC, |
| pid, |
| mask, |
| ::dispatch_get_global_queue (DISPATCH_QUEUE_PRIORITY_DEFAULT,0)); |
| |
| if (log) |
| log->Printf ("Host::StartMonitoringChildProcess (callback=%p, baton=%p, pid=%i, monitor_signals=%i) source = %p\n", |
| callback, |
| callback_baton, |
| (int)pid, |
| monitor_signals, |
| source); |
| |
| if (source) |
| { |
| ::dispatch_source_set_cancel_handler (source, ^{ |
| ::dispatch_release (source); |
| }); |
| ::dispatch_source_set_event_handler (source, ^{ |
| |
| int status= 0; |
| int wait_pid = 0; |
| bool cancel = false; |
| bool exited = false; |
| do |
| { |
| wait_pid = ::waitpid (pid, &status, 0); |
| } while (wait_pid < 0 && errno == EINTR); |
| |
| if (wait_pid >= 0) |
| { |
| int signal = 0; |
| int exit_status = 0; |
| const char *status_cstr = NULL; |
| if (WIFSTOPPED(status)) |
| { |
| signal = WSTOPSIG(status); |
| status_cstr = "STOPPED"; |
| } |
| else if (WIFEXITED(status)) |
| { |
| exit_status = WEXITSTATUS(status); |
| status_cstr = "EXITED"; |
| exited = true; |
| } |
| else if (WIFSIGNALED(status)) |
| { |
| signal = WTERMSIG(status); |
| status_cstr = "SIGNALED"; |
| exited = true; |
| exit_status = -1; |
| } |
| else |
| { |
| status_cstr = "???"; |
| } |
| |
| if (log) |
| log->Printf ("::waitpid (pid = %llu, &status, 0) => pid = %i, status = 0x%8.8x (%s), signal = %i, exit_status = %i", |
| pid, |
| wait_pid, |
| status, |
| status_cstr, |
| signal, |
| exit_status); |
| |
| if (callback) |
| cancel = callback (callback_baton, pid, exited, signal, exit_status); |
| |
| if (exited) |
| { |
| ::dispatch_source_cancel(source); |
| } |
| } |
| }); |
| |
| ::dispatch_resume (source); |
| } |
| return thread; |
| } |
| |
| //---------------------------------------------------------------------- |
| // Log to both stderr and to ASL Logging when running on MacOSX. |
| //---------------------------------------------------------------------- |
| void |
| Host::SystemLog (SystemLogType type, const char *format, va_list args) |
| { |
| if (format && format[0]) |
| { |
| static aslmsg g_aslmsg = NULL; |
| if (g_aslmsg == NULL) |
| { |
| g_aslmsg = ::asl_new (ASL_TYPE_MSG); |
| char asl_key_sender[PATH_MAX]; |
| snprintf(asl_key_sender, sizeof(asl_key_sender), "com.apple.LLDB.framework"); |
| ::asl_set (g_aslmsg, ASL_KEY_SENDER, asl_key_sender); |
| } |
| |
| // Copy the va_list so we can log this message twice |
| va_list copy_args; |
| va_copy (copy_args, args); |
| // Log to stderr |
| ::vfprintf (stderr, format, copy_args); |
| va_end (copy_args); |
| |
| int asl_level; |
| switch (type) |
| { |
| case eSystemLogError: |
| asl_level = ASL_LEVEL_ERR; |
| break; |
| |
| case eSystemLogWarning: |
| asl_level = ASL_LEVEL_WARNING; |
| break; |
| } |
| |
| // Log to ASL |
| ::asl_vlog (NULL, g_aslmsg, asl_level, format, args); |
| } |
| } |
| |
| lldb::DataBufferSP |
| Host::GetAuxvData(lldb_private::Process *process) |
| { |
| return lldb::DataBufferSP(); |
| } |