1 //===-- ProcessPOSIX.cpp ----------------------------------------*- C++ -*-===//
3 // The LLVM Compiler Infrastructure
5 // This file is distributed under the University of Illinois Open Source
6 // License. See LICENSE.TXT for details.
8 //===----------------------------------------------------------------------===//
10 #include "lldb/lldb-python.h"
16 // Other libraries and framework includes
17 #include "lldb/Breakpoint/Watchpoint.h"
18 #include "lldb/Core/Module.h"
19 #include "lldb/Core/PluginManager.h"
20 #include "lldb/Core/State.h"
21 #include "lldb/Host/FileSpec.h"
22 #include "lldb/Host/Host.h"
23 #include "lldb/Symbol/ObjectFile.h"
24 #include "lldb/Target/DynamicLoader.h"
25 #include "lldb/Target/Platform.h"
26 #include "lldb/Target/Target.h"
28 #include "ProcessPOSIX.h"
29 #include "ProcessPOSIXLog.h"
30 #include "Plugins/Process/Utility/InferiorCallPOSIX.h"
31 #include "ProcessMonitor.h"
32 #include "POSIXThread.h"
35 using namespace lldb_private;
37 //------------------------------------------------------------------------------
41 ProcessPOSIX::CreateInstance(Target& target, Listener &listener)
43 return new ProcessPOSIX(target, listener);
48 ProcessPOSIX::Initialize()
50 static bool g_initialized = false;
55 PluginManager::RegisterPlugin(GetPluginNameStatic(),
56 GetPluginDescriptionStatic(),
59 Log::Callbacks log_callbacks = {
60 ProcessPOSIXLog::DisableLog,
61 ProcessPOSIXLog::EnableLog,
62 ProcessPOSIXLog::ListLogCategories
65 Log::RegisterLogChannel (ProcessPOSIX::GetPluginNameStatic(), log_callbacks);
70 //------------------------------------------------------------------------------
71 // Constructors and destructors.
73 ProcessPOSIX::ProcessPOSIX(Target& target, Listener &listener)
74 : Process(target, listener),
75 m_byte_order(lldb::endian::InlHostByteOrder()),
78 m_message_mutex (Mutex::eMutexTypeRecursive),
82 // FIXME: Putting this code in the ctor and saving the byte order in a
83 // member variable is a hack to avoid const qual issues in GetByteOrder.
84 lldb::ModuleSP module = GetTarget().GetExecutableModule();
85 if (module && module->GetObjectFile())
86 m_byte_order = module->GetObjectFile()->GetByteOrder();
89 ProcessPOSIX::~ProcessPOSIX()
94 //------------------------------------------------------------------------------
97 ProcessPOSIX::Finalize()
102 m_monitor->StopMonitor();
106 ProcessPOSIX::CanDebug(Target &target, bool plugin_specified_by_name)
108 // For now we are just making sure the file exists for a given module
109 ModuleSP exe_module_sp(target.GetExecutableModule());
110 if (exe_module_sp.get())
111 return exe_module_sp->GetFileSpec().Exists();
112 // If there is no executable module, we return true since we might be preparing to attach.
117 ProcessPOSIX::DoAttachToProcessWithID(lldb::pid_t pid)
120 assert(m_monitor == NULL);
122 Log *log (ProcessPOSIXLog::GetLogIfAllCategoriesSet (POSIX_LOG_PROCESS));
123 if (log && log->GetMask().Test(POSIX_LOG_VERBOSE))
124 log->Printf ("ProcessPOSIX::%s(pid = %" PRIi64 ")", __FUNCTION__, GetID());
126 m_monitor = new ProcessMonitor(this, pid, error);
128 if (!error.Success())
131 PlatformSP platform_sp (m_target.GetPlatform ());
132 assert (platform_sp.get());
134 return error; // FIXME: Detatch?
136 // Find out what we can about this process
137 ProcessInstanceInfo process_info;
138 platform_sp->GetProcessInfo (pid, process_info);
140 // Resolve the executable module
141 ModuleSP exe_module_sp;
142 FileSpecList executable_search_paths (Target::GetDefaultExecutableSearchPaths());
143 error = platform_sp->ResolveExecutable(process_info.GetExecutableFile(),
144 m_target.GetArchitecture(),
146 executable_search_paths.GetSize() ? &executable_search_paths : NULL);
147 if (!error.Success())
150 // Fix the target architecture if necessary
151 const ArchSpec &module_arch = exe_module_sp->GetArchitecture();
152 if (module_arch.IsValid() && !m_target.GetArchitecture().IsExactMatch(module_arch))
153 m_target.SetArchitecture(module_arch);
155 // Initialize the target module list
156 m_target.SetExecutableModule (exe_module_sp, true);
158 SetSTDIOFileDescriptor(m_monitor->GetTerminalFD());
166 ProcessPOSIX::DoAttachToProcessWithID (lldb::pid_t pid, const ProcessAttachInfo &attach_info)
168 return DoAttachToProcessWithID(pid);
172 ProcessPOSIX::WillLaunch(Module* module)
179 ProcessPOSIX::GetFilePath(
180 const lldb_private::ProcessLaunchInfo::FileAction *file_action,
181 const char *default_path)
183 const char *pts_name = "/dev/pts/";
184 const char *path = NULL;
188 if (file_action->GetAction () == ProcessLaunchInfo::FileAction::eFileActionOpen)
189 path = file_action->GetPath();
190 // By default the stdio paths passed in will be pseudo-terminal
191 // (/dev/pts). If so, convert to using a different default path
192 // instead to redirect I/O to the debugger console. This should
193 // also handle user overrides to /dev/null or a different file.
194 if (::strncmp(path, pts_name, ::strlen(pts_name)) == 0)
202 ProcessPOSIX::DoLaunch (Module *module,
203 ProcessLaunchInfo &launch_info)
206 assert(m_monitor == NULL);
208 const char* working_dir = launch_info.GetWorkingDirectory();
210 FileSpec WorkingDir(working_dir, true);
211 if (!WorkingDir || WorkingDir.GetFileType() != FileSpec::eFileTypeDirectory)
213 error.SetErrorStringWithFormat("No such file or directory: %s", working_dir);
218 SetPrivateState(eStateLaunching);
220 const lldb_private::ProcessLaunchInfo::FileAction *file_action;
222 // Default of NULL will mean to use existing open file descriptors
223 const char *stdin_path = NULL;
224 const char *stdout_path = NULL;
225 const char *stderr_path = NULL;
227 file_action = launch_info.GetFileActionForFD (STDIN_FILENO);
228 stdin_path = GetFilePath(file_action, stdin_path);
230 file_action = launch_info.GetFileActionForFD (STDOUT_FILENO);
231 stdout_path = GetFilePath(file_action, stdout_path);
233 file_action = launch_info.GetFileActionForFD (STDERR_FILENO);
234 stderr_path = GetFilePath(file_action, stderr_path);
236 m_monitor = new ProcessMonitor (this,
238 launch_info.GetArguments().GetConstArgumentVector(),
239 launch_info.GetEnvironmentEntries().GetConstArgumentVector(),
248 if (!error.Success())
251 SetSTDIOFileDescriptor(m_monitor->GetTerminalFD());
253 SetID(m_monitor->GetPID());
258 ProcessPOSIX::DidLaunch()
263 ProcessPOSIX::DoResume()
265 StateType state = GetPrivateState();
267 assert(state == eStateStopped);
269 SetPrivateState(eStateRunning);
271 bool did_resume = false;
273 Mutex::Locker lock(m_thread_list.GetMutex());
275 uint32_t thread_count = m_thread_list.GetSize(false);
276 for (uint32_t i = 0; i < thread_count; ++i)
278 POSIXThread *thread = static_cast<POSIXThread*>(
279 m_thread_list.GetThreadAtIndex(i, false).get());
280 did_resume = thread->Resume() || did_resume;
282 assert(did_resume && "Process resume failed!");
288 ProcessPOSIX::GetImageInfoAddress()
290 Target *target = &GetTarget();
291 ObjectFile *obj_file = target->GetExecutableModule()->GetObjectFile();
292 Address addr = obj_file->GetImageInfoAddress(target);
295 return addr.GetLoadAddress(target);
296 return LLDB_INVALID_ADDRESS;
300 ProcessPOSIX::DoHalt(bool &caused_stop)
308 else if (kill(GetID(), SIGSTOP))
311 error.SetErrorToErrno();
321 ProcessPOSIX::DoSignal(int signal)
325 if (kill(GetID(), signal))
326 error.SetErrorToErrno();
332 ProcessPOSIX::DoDestroy()
340 if (m_monitor->BringProcessIntoLimbo())
342 error.SetErrorToErrno();
346 SetPrivateState(eStateExited);
353 ProcessPOSIX::DoDidExec()
355 Target *target = &GetTarget();
358 PlatformSP platform_sp (target->GetPlatform());
359 assert (platform_sp.get());
362 ProcessInstanceInfo process_info;
363 platform_sp->GetProcessInfo(GetID(), process_info);
364 ModuleSP exe_module_sp;
365 FileSpecList executable_search_paths (Target::GetDefaultExecutableSearchPaths());
366 Error error = platform_sp->ResolveExecutable(process_info.GetExecutableFile(),
367 target->GetArchitecture(),
369 executable_search_paths.GetSize() ? &executable_search_paths : NULL);
370 if (!error.Success())
372 target->SetExecutableModule(exe_module_sp, true);
378 ProcessPOSIX::SendMessage(const ProcessMessage &message)
380 Mutex::Locker lock(m_message_mutex);
382 Mutex::Locker thread_lock(m_thread_list.GetMutex());
384 POSIXThread *thread = static_cast<POSIXThread*>(
385 m_thread_list.FindThreadByID(message.GetTID(), false).get());
387 switch (message.GetKind())
389 case ProcessMessage::eInvalidMessage:
392 case ProcessMessage::eAttachMessage:
393 SetPrivateState(eStateStopped);
396 case ProcessMessage::eLimboMessage:
398 thread->SetState(eStateStopped);
399 if (message.GetTID() == GetID())
401 m_exit_status = message.GetExitStatus();
404 SetPrivateState(eStateExited);
405 m_monitor->Detach(GetID());
409 StopAllThreads(message.GetTID());
410 SetPrivateState(eStateStopped);
415 StopAllThreads(message.GetTID());
416 SetPrivateState(eStateStopped);
420 case ProcessMessage::eExitMessage:
422 thread->SetState(eStateExited);
423 // FIXME: I'm not sure we need to do this.
424 if (message.GetTID() == GetID())
426 m_exit_status = message.GetExitStatus();
427 SetExitStatus(m_exit_status, NULL);
429 else if (!IsAThreadRunning())
430 SetPrivateState(eStateStopped);
433 case ProcessMessage::eSignalMessage:
434 case ProcessMessage::eSignalDeliveredMessage:
435 if (message.GetSignal() == SIGSTOP &&
436 AddThreadForInitialStopIfNeeded(message.GetTID()))
438 // Intentional fall-through
440 case ProcessMessage::eBreakpointMessage:
441 case ProcessMessage::eTraceMessage:
442 case ProcessMessage::eWatchpointMessage:
443 case ProcessMessage::eCrashMessage:
445 thread->SetState(eStateStopped);
446 StopAllThreads(message.GetTID());
447 SetPrivateState(eStateStopped);
450 case ProcessMessage::eNewThreadMessage:
452 lldb::tid_t new_tid = message.GetChildTID();
453 if (WaitingForInitialStop(new_tid))
455 m_monitor->WaitForInitialTIDStop(new_tid);
458 thread->SetState(eStateStopped);
459 StopAllThreads(message.GetTID());
460 SetPrivateState(eStateStopped);
464 case ProcessMessage::eExecMessage:
467 thread->SetState(eStateStopped);
468 StopAllThreads(message.GetTID());
469 SetPrivateState(eStateStopped);
475 m_message_queue.push(message);
479 ProcessPOSIX::StopAllThreads(lldb::tid_t stop_tid)
481 // FIXME: Will this work the same way on FreeBSD and Linux?
485 ProcessPOSIX::AddThreadForInitialStopIfNeeded(lldb::tid_t stop_tid)
487 bool added_to_set = false;
488 ThreadStopSet::iterator it = m_seen_initial_stop.find(stop_tid);
489 if (it == m_seen_initial_stop.end())
491 m_seen_initial_stop.insert(stop_tid);
498 ProcessPOSIX::WaitingForInitialStop(lldb::tid_t stop_tid)
500 return (m_seen_initial_stop.find(stop_tid) == m_seen_initial_stop.end());
504 ProcessPOSIX::CreateNewPOSIXThread(lldb_private::Process &process, lldb::tid_t tid)
506 return new POSIXThread(process, tid);
510 ProcessPOSIX::RefreshStateAfterStop()
512 Log *log (ProcessPOSIXLog::GetLogIfAllCategoriesSet (POSIX_LOG_PROCESS));
513 if (log && log->GetMask().Test(POSIX_LOG_VERBOSE))
514 log->Printf ("ProcessPOSIX::%s(), message_queue size = %d", __FUNCTION__, (int)m_message_queue.size());
516 Mutex::Locker lock(m_message_mutex);
518 // This method used to only handle one message. Changing it to loop allows
519 // it to handle the case where we hit a breakpoint while handling a different
521 while (!m_message_queue.empty())
523 ProcessMessage &message = m_message_queue.front();
525 // Resolve the thread this message corresponds to and pass it along.
526 lldb::tid_t tid = message.GetTID();
528 log->Printf ("ProcessPOSIX::%s(), message_queue size = %d, pid = %" PRIi64, __FUNCTION__, (int)m_message_queue.size(), tid);
530 if (message.GetKind() == ProcessMessage::eNewThreadMessage)
533 log->Printf ("ProcessPOSIX::%s() adding thread, tid = %" PRIi64, __FUNCTION__, message.GetChildTID());
534 lldb::tid_t child_tid = message.GetChildTID();
536 thread_sp.reset(CreateNewPOSIXThread(*this, child_tid));
538 Mutex::Locker lock(m_thread_list.GetMutex());
540 m_thread_list.AddThread(thread_sp);
543 m_thread_list.RefreshStateAfterStop();
545 POSIXThread *thread = static_cast<POSIXThread*>(
546 GetThreadList().FindThreadByID(tid, false).get());
548 thread->Notify(message);
550 if (message.GetKind() == ProcessMessage::eExitMessage)
552 // FIXME: We should tell the user about this, but the limbo message is probably better for that.
554 log->Printf ("ProcessPOSIX::%s() removing thread, tid = %" PRIi64, __FUNCTION__, tid);
556 Mutex::Locker lock(m_thread_list.GetMutex());
558 ThreadSP thread_sp = m_thread_list.RemoveThreadByID(tid, false);
560 m_seen_initial_stop.erase(tid);
563 m_message_queue.pop();
568 ProcessPOSIX::IsAlive()
570 StateType state = GetPrivateState();
571 return state != eStateDetached
572 && state != eStateExited
573 && state != eStateInvalid
574 && state != eStateUnloaded;
578 ProcessPOSIX::DoReadMemory(addr_t vm_addr,
579 void *buf, size_t size, Error &error)
582 return m_monitor->ReadMemory(vm_addr, buf, size, error);
586 ProcessPOSIX::DoWriteMemory(addr_t vm_addr, const void *buf, size_t size,
590 return m_monitor->WriteMemory(vm_addr, buf, size, error);
594 ProcessPOSIX::DoAllocateMemory(size_t size, uint32_t permissions,
597 addr_t allocated_addr = LLDB_INVALID_ADDRESS;
600 if (permissions & lldb::ePermissionsReadable)
601 prot |= eMmapProtRead;
602 if (permissions & lldb::ePermissionsWritable)
603 prot |= eMmapProtWrite;
604 if (permissions & lldb::ePermissionsExecutable)
605 prot |= eMmapProtExec;
607 if (InferiorCallMmap(this, allocated_addr, 0, size, prot,
608 eMmapFlagsAnon | eMmapFlagsPrivate, -1, 0)) {
609 m_addr_to_mmap_size[allocated_addr] = size;
612 allocated_addr = LLDB_INVALID_ADDRESS;
613 error.SetErrorStringWithFormat("unable to allocate %zu bytes of memory with permissions %s", size, GetPermissionsAsCString (permissions));
616 return allocated_addr;
620 ProcessPOSIX::DoDeallocateMemory(lldb::addr_t addr)
623 MMapMap::iterator pos = m_addr_to_mmap_size.find(addr);
624 if (pos != m_addr_to_mmap_size.end() &&
625 InferiorCallMunmap(this, addr, pos->second))
626 m_addr_to_mmap_size.erase (pos);
628 error.SetErrorStringWithFormat("unable to deallocate memory at 0x%" PRIx64, addr);
634 ProcessPOSIX::GetSoftwareBreakpointTrapOpcode(BreakpointSite* bp_site)
636 static const uint8_t g_i386_opcode[] = { 0xCC };
638 ArchSpec arch = GetTarget().GetArchitecture();
639 const uint8_t *opcode = NULL;
640 size_t opcode_size = 0;
642 switch (arch.GetCore())
645 assert(false && "CPU type not supported!");
648 case ArchSpec::eCore_x86_32_i386:
649 case ArchSpec::eCore_x86_64_x86_64:
650 opcode = g_i386_opcode;
651 opcode_size = sizeof(g_i386_opcode);
655 bp_site->SetTrapOpcode(opcode, opcode_size);
660 ProcessPOSIX::EnableBreakpointSite(BreakpointSite *bp_site)
662 return EnableSoftwareBreakpoint(bp_site);
666 ProcessPOSIX::DisableBreakpointSite(BreakpointSite *bp_site)
668 return DisableSoftwareBreakpoint(bp_site);
672 ProcessPOSIX::EnableWatchpoint(Watchpoint *wp, bool notify)
677 user_id_t watchID = wp->GetID();
678 addr_t addr = wp->GetLoadAddress();
679 Log *log (ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_WATCHPOINTS));
681 log->Printf ("ProcessPOSIX::EnableWatchpoint(watchID = %" PRIu64 ")",
686 log->Printf("ProcessPOSIX::EnableWatchpoint(watchID = %" PRIu64
687 ") addr = 0x%8.8" PRIx64 ": watchpoint already enabled.",
688 watchID, (uint64_t)addr);
692 // Try to find a vacant watchpoint slot in the inferiors' main thread
693 uint32_t wp_hw_index = LLDB_INVALID_INDEX32;
694 Mutex::Locker lock(m_thread_list.GetMutex());
695 POSIXThread *thread = static_cast<POSIXThread*>(
696 m_thread_list.GetThreadAtIndex(0, false).get());
699 wp_hw_index = thread->FindVacantWatchpointIndex();
701 if (wp_hw_index == LLDB_INVALID_INDEX32)
703 error.SetErrorString("Setting hardware watchpoint failed.");
707 wp->SetHardwareIndex(wp_hw_index);
708 bool wp_enabled = true;
709 uint32_t thread_count = m_thread_list.GetSize(false);
710 for (uint32_t i = 0; i < thread_count; ++i)
712 thread = static_cast<POSIXThread*>(
713 m_thread_list.GetThreadAtIndex(i, false).get());
715 wp_enabled &= thread->EnableHardwareWatchpoint(wp);
721 wp->SetEnabled(true, notify);
726 // Watchpoint enabling failed on at least one
727 // of the threads so roll back all of them
728 DisableWatchpoint(wp, false);
729 error.SetErrorString("Setting hardware watchpoint failed");
734 error.SetErrorString("Watchpoint argument was NULL.");
739 ProcessPOSIX::DisableWatchpoint(Watchpoint *wp, bool notify)
744 user_id_t watchID = wp->GetID();
745 addr_t addr = wp->GetLoadAddress();
746 Log *log (ProcessPOSIXLog::GetLogIfAllCategoriesSet(POSIX_LOG_WATCHPOINTS));
748 log->Printf("ProcessPOSIX::DisableWatchpoint(watchID = %" PRIu64 ")",
750 if (!wp->IsEnabled())
753 log->Printf("ProcessPOSIX::DisableWatchpoint(watchID = %" PRIu64
754 ") addr = 0x%8.8" PRIx64 ": watchpoint already disabled.",
755 watchID, (uint64_t)addr);
756 // This is needed (for now) to keep watchpoints disabled correctly
757 wp->SetEnabled(false, notify);
761 if (wp->IsHardware())
763 bool wp_disabled = true;
764 Mutex::Locker lock(m_thread_list.GetMutex());
765 uint32_t thread_count = m_thread_list.GetSize(false);
766 for (uint32_t i = 0; i < thread_count; ++i)
768 POSIXThread *thread = static_cast<POSIXThread*>(
769 m_thread_list.GetThreadAtIndex(i, false).get());
771 wp_disabled &= thread->DisableHardwareWatchpoint(wp);
777 wp->SetHardwareIndex(LLDB_INVALID_INDEX32);
778 wp->SetEnabled(false, notify);
782 error.SetErrorString("Disabling hardware watchpoint failed");
786 error.SetErrorString("Watchpoint argument was NULL.");
791 ProcessPOSIX::GetWatchpointSupportInfo(uint32_t &num)
794 Mutex::Locker lock(m_thread_list.GetMutex());
795 POSIXThread *thread = static_cast<POSIXThread*>(
796 m_thread_list.GetThreadAtIndex(0, false).get());
798 num = thread->NumSupportedHardwareWatchpoints();
800 error.SetErrorString("Process does not exist.");
805 ProcessPOSIX::GetWatchpointSupportInfo(uint32_t &num, bool &after)
807 Error error = GetWatchpointSupportInfo(num);
808 // Watchpoints trigger and halt the inferior after
809 // the corresponding instruction has been executed.
815 ProcessPOSIX::UpdateThreadListIfNeeded()
817 Mutex::Locker lock(m_thread_list.GetMutex());
818 // Do not allow recursive updates.
819 return m_thread_list.GetSize(false);
823 ProcessPOSIX::UpdateThreadList(ThreadList &old_thread_list, ThreadList &new_thread_list)
825 Log *log (ProcessPOSIXLog::GetLogIfAllCategoriesSet (POSIX_LOG_THREAD));
826 if (log && log->GetMask().Test(POSIX_LOG_VERBOSE))
827 log->Printf ("ProcessPOSIX::%s() (pid = %" PRIi64 ")", __FUNCTION__, GetID());
829 bool has_updated = false;
830 // Update the process thread list with this new thread.
831 // FIXME: We should be using tid, not pid.
833 ThreadSP thread_sp (old_thread_list.FindThreadByID (GetID(), false));
835 thread_sp.reset(CreateNewPOSIXThread(*this, GetID()));
839 if (log && log->GetMask().Test(POSIX_LOG_VERBOSE))
840 log->Printf ("ProcessPOSIX::%s() updated pid = %" PRIi64, __FUNCTION__, GetID());
841 new_thread_list.AddThread(thread_sp);
843 return has_updated; // the list has been updated
847 ProcessPOSIX::GetByteOrder() const
849 // FIXME: We should be able to extract this value directly. See comment in
855 ProcessPOSIX::PutSTDIN(const char *buf, size_t len, Error &error)
858 if ((status = write(m_monitor->GetTerminalFD(), buf, len)) < 0)
860 error.SetErrorToErrno();
867 ProcessPOSIX::GetUnixSignals()
872 //------------------------------------------------------------------------------
873 // Utility functions.
876 ProcessPOSIX::HasExited()
878 switch (GetPrivateState())
892 ProcessPOSIX::IsStopped()
894 switch (GetPrivateState())
901 case eStateSuspended:
909 ProcessPOSIX::IsAThreadRunning()
911 bool is_running = false;
912 Mutex::Locker lock(m_thread_list.GetMutex());
913 uint32_t thread_count = m_thread_list.GetSize(false);
914 for (uint32_t i = 0; i < thread_count; ++i)
916 POSIXThread *thread = static_cast<POSIXThread*>(
917 m_thread_list.GetThreadAtIndex(i, false).get());
918 StateType thread_state = thread->GetState();
919 if (thread_state == eStateRunning || thread_state == eStateStepping)