The Process class was only being referenced because of the last-ditch effort in the process launchers to set a process death callback in case one isn't set already. Although launching a process for debugging is the most important kind of "launch" we are doing, it is by far not the only one, so assuming this particular callback is the one to be used is not a good idea (besides breaking layering). Instead of assuming a particular exit callback, I change the launcher code to require the callback to be set by the user (and fix up the two call sites which did not set the callback already). Reviewers: jingham, davide Subscribers: lldb-commits Differential Revision: https://reviews.llvm.org/D46395 llvm-svn: 332250
449 lines
16 KiB
C++
449 lines
16 KiB
C++
//===-- ProcessLaunchInfo.cpp -----------------------------------*- C++ -*-===//
|
|
//
|
|
// The LLVM Compiler Infrastructure
|
|
//
|
|
// This file is distributed under the University of Illinois Open Source
|
|
// License. See LICENSE.TXT for details.
|
|
//
|
|
//===----------------------------------------------------------------------===//
|
|
|
|
// C Includes
|
|
// C++ Includes
|
|
#include <climits>
|
|
|
|
// Other libraries and framework includes
|
|
// Project includes
|
|
#include "lldb/Core/Debugger.h"
|
|
#include "lldb/Host/Config.h"
|
|
#include "lldb/Host/FileSystem.h"
|
|
#include "lldb/Host/HostInfo.h"
|
|
#include "lldb/Target/FileAction.h"
|
|
#include "lldb/Target/ProcessLaunchInfo.h"
|
|
#include "lldb/Target/Target.h"
|
|
#include "lldb/Utility/Log.h"
|
|
#include "lldb/Utility/StreamString.h"
|
|
|
|
#include "llvm/Support/ConvertUTF.h"
|
|
#include "llvm/Support/FileSystem.h"
|
|
|
|
#if !defined(_WIN32)
|
|
#include <limits.h>
|
|
#endif
|
|
|
|
using namespace lldb;
|
|
using namespace lldb_private;
|
|
|
|
//----------------------------------------------------------------------------
|
|
// ProcessLaunchInfo member functions
|
|
//----------------------------------------------------------------------------
|
|
|
|
ProcessLaunchInfo::ProcessLaunchInfo()
|
|
: ProcessInfo(), m_working_dir(), m_plugin_name(), m_flags(0),
|
|
m_file_actions(), m_pty(new PseudoTerminal), m_resume_count(0),
|
|
m_monitor_callback(nullptr), m_monitor_callback_baton(nullptr),
|
|
m_monitor_signals(false), m_listener_sp(), m_hijack_listener_sp() {}
|
|
|
|
ProcessLaunchInfo::ProcessLaunchInfo(const FileSpec &stdin_file_spec,
|
|
const FileSpec &stdout_file_spec,
|
|
const FileSpec &stderr_file_spec,
|
|
const FileSpec &working_directory,
|
|
uint32_t launch_flags)
|
|
: ProcessInfo(), m_working_dir(), m_plugin_name(), m_flags(launch_flags),
|
|
m_file_actions(), m_pty(new PseudoTerminal), m_resume_count(0),
|
|
m_monitor_callback(nullptr), m_monitor_callback_baton(nullptr),
|
|
m_monitor_signals(false), m_listener_sp(), m_hijack_listener_sp() {
|
|
if (stdin_file_spec) {
|
|
FileAction file_action;
|
|
const bool read = true;
|
|
const bool write = false;
|
|
if (file_action.Open(STDIN_FILENO, stdin_file_spec, read, write))
|
|
AppendFileAction(file_action);
|
|
}
|
|
if (stdout_file_spec) {
|
|
FileAction file_action;
|
|
const bool read = false;
|
|
const bool write = true;
|
|
if (file_action.Open(STDOUT_FILENO, stdout_file_spec, read, write))
|
|
AppendFileAction(file_action);
|
|
}
|
|
if (stderr_file_spec) {
|
|
FileAction file_action;
|
|
const bool read = false;
|
|
const bool write = true;
|
|
if (file_action.Open(STDERR_FILENO, stderr_file_spec, read, write))
|
|
AppendFileAction(file_action);
|
|
}
|
|
if (working_directory)
|
|
SetWorkingDirectory(working_directory);
|
|
}
|
|
|
|
bool ProcessLaunchInfo::AppendCloseFileAction(int fd) {
|
|
FileAction file_action;
|
|
if (file_action.Close(fd)) {
|
|
AppendFileAction(file_action);
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
bool ProcessLaunchInfo::AppendDuplicateFileAction(int fd, int dup_fd) {
|
|
FileAction file_action;
|
|
if (file_action.Duplicate(fd, dup_fd)) {
|
|
AppendFileAction(file_action);
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
bool ProcessLaunchInfo::AppendOpenFileAction(int fd, const FileSpec &file_spec,
|
|
bool read, bool write) {
|
|
FileAction file_action;
|
|
if (file_action.Open(fd, file_spec, read, write)) {
|
|
AppendFileAction(file_action);
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
bool ProcessLaunchInfo::AppendSuppressFileAction(int fd, bool read,
|
|
bool write) {
|
|
FileAction file_action;
|
|
if (file_action.Open(fd, FileSpec{FileSystem::DEV_NULL, false}, read,
|
|
write)) {
|
|
AppendFileAction(file_action);
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
const FileAction *ProcessLaunchInfo::GetFileActionAtIndex(size_t idx) const {
|
|
if (idx < m_file_actions.size())
|
|
return &m_file_actions[idx];
|
|
return nullptr;
|
|
}
|
|
|
|
const FileAction *ProcessLaunchInfo::GetFileActionForFD(int fd) const {
|
|
for (size_t idx = 0, count = m_file_actions.size(); idx < count; ++idx) {
|
|
if (m_file_actions[idx].GetFD() == fd)
|
|
return &m_file_actions[idx];
|
|
}
|
|
return nullptr;
|
|
}
|
|
|
|
const FileSpec &ProcessLaunchInfo::GetWorkingDirectory() const {
|
|
return m_working_dir;
|
|
}
|
|
|
|
void ProcessLaunchInfo::SetWorkingDirectory(const FileSpec &working_dir) {
|
|
m_working_dir = working_dir;
|
|
}
|
|
|
|
const char *ProcessLaunchInfo::GetProcessPluginName() const {
|
|
return (m_plugin_name.empty() ? nullptr : m_plugin_name.c_str());
|
|
}
|
|
|
|
void ProcessLaunchInfo::SetProcessPluginName(llvm::StringRef plugin) {
|
|
m_plugin_name = plugin;
|
|
}
|
|
|
|
const FileSpec &ProcessLaunchInfo::GetShell() const { return m_shell; }
|
|
|
|
void ProcessLaunchInfo::SetShell(const FileSpec &shell) {
|
|
m_shell = shell;
|
|
if (m_shell) {
|
|
m_shell.ResolveExecutableLocation();
|
|
m_flags.Set(lldb::eLaunchFlagLaunchInShell);
|
|
} else
|
|
m_flags.Clear(lldb::eLaunchFlagLaunchInShell);
|
|
}
|
|
|
|
void ProcessLaunchInfo::SetLaunchInSeparateProcessGroup(bool separate) {
|
|
if (separate)
|
|
m_flags.Set(lldb::eLaunchFlagLaunchInSeparateProcessGroup);
|
|
else
|
|
m_flags.Clear(lldb::eLaunchFlagLaunchInSeparateProcessGroup);
|
|
}
|
|
|
|
void ProcessLaunchInfo::SetShellExpandArguments(bool expand) {
|
|
if (expand)
|
|
m_flags.Set(lldb::eLaunchFlagShellExpandArguments);
|
|
else
|
|
m_flags.Clear(lldb::eLaunchFlagShellExpandArguments);
|
|
}
|
|
|
|
void ProcessLaunchInfo::Clear() {
|
|
ProcessInfo::Clear();
|
|
m_working_dir.Clear();
|
|
m_plugin_name.clear();
|
|
m_shell.Clear();
|
|
m_flags.Clear();
|
|
m_file_actions.clear();
|
|
m_resume_count = 0;
|
|
m_listener_sp.reset();
|
|
m_hijack_listener_sp.reset();
|
|
}
|
|
|
|
void ProcessLaunchInfo::SetMonitorProcessCallback(
|
|
const Host::MonitorChildProcessCallback &callback, bool monitor_signals) {
|
|
m_monitor_callback = callback;
|
|
m_monitor_signals = monitor_signals;
|
|
}
|
|
|
|
bool ProcessLaunchInfo::NoOpMonitorCallback(lldb::pid_t pid, bool exited, int signal, int status) {
|
|
Log *log = lldb_private::GetLogIfAllCategoriesSet(LIBLLDB_LOG_PROCESS);
|
|
LLDB_LOG(log, "pid = {0}, exited = {1}, signal = {2}, status = {3}", pid,
|
|
exited, signal, status);
|
|
return true;
|
|
}
|
|
|
|
bool ProcessLaunchInfo::MonitorProcess() const {
|
|
if (m_monitor_callback && ProcessIDIsValid()) {
|
|
Host::StartMonitoringChildProcess(m_monitor_callback, GetProcessID(),
|
|
m_monitor_signals);
|
|
return true;
|
|
}
|
|
return false;
|
|
}
|
|
|
|
void ProcessLaunchInfo::SetDetachOnError(bool enable) {
|
|
if (enable)
|
|
m_flags.Set(lldb::eLaunchFlagDetachOnError);
|
|
else
|
|
m_flags.Clear(lldb::eLaunchFlagDetachOnError);
|
|
}
|
|
|
|
void ProcessLaunchInfo::FinalizeFileActions(Target *target,
|
|
bool default_to_use_pty) {
|
|
Log *log(lldb_private::GetLogIfAllCategoriesSet(LIBLLDB_LOG_PROCESS));
|
|
|
|
// If nothing for stdin or stdout or stderr was specified, then check the
|
|
// process for any default settings that were set with "settings set"
|
|
if (GetFileActionForFD(STDIN_FILENO) == nullptr ||
|
|
GetFileActionForFD(STDOUT_FILENO) == nullptr ||
|
|
GetFileActionForFD(STDERR_FILENO) == nullptr) {
|
|
if (log)
|
|
log->Printf("ProcessLaunchInfo::%s at least one of stdin/stdout/stderr "
|
|
"was not set, evaluating default handling",
|
|
__FUNCTION__);
|
|
|
|
if (m_flags.Test(eLaunchFlagLaunchInTTY)) {
|
|
// Do nothing, if we are launching in a remote terminal no file actions
|
|
// should be done at all.
|
|
return;
|
|
}
|
|
|
|
if (m_flags.Test(eLaunchFlagDisableSTDIO)) {
|
|
if (log)
|
|
log->Printf("ProcessLaunchInfo::%s eLaunchFlagDisableSTDIO set, adding "
|
|
"suppression action for stdin, stdout and stderr",
|
|
__FUNCTION__);
|
|
AppendSuppressFileAction(STDIN_FILENO, true, false);
|
|
AppendSuppressFileAction(STDOUT_FILENO, false, true);
|
|
AppendSuppressFileAction(STDERR_FILENO, false, true);
|
|
} else {
|
|
// Check for any values that might have gotten set with any of: (lldb)
|
|
// settings set target.input-path (lldb) settings set target.output-path
|
|
// (lldb) settings set target.error-path
|
|
FileSpec in_file_spec;
|
|
FileSpec out_file_spec;
|
|
FileSpec err_file_spec;
|
|
if (target) {
|
|
// Only override with the target settings if we don't already have an
|
|
// action for in, out or error
|
|
if (GetFileActionForFD(STDIN_FILENO) == nullptr)
|
|
in_file_spec = target->GetStandardInputPath();
|
|
if (GetFileActionForFD(STDOUT_FILENO) == nullptr)
|
|
out_file_spec = target->GetStandardOutputPath();
|
|
if (GetFileActionForFD(STDERR_FILENO) == nullptr)
|
|
err_file_spec = target->GetStandardErrorPath();
|
|
}
|
|
|
|
if (log)
|
|
log->Printf("ProcessLaunchInfo::%s target stdin='%s', target "
|
|
"stdout='%s', stderr='%s'",
|
|
__FUNCTION__,
|
|
in_file_spec ? in_file_spec.GetCString() : "<null>",
|
|
out_file_spec ? out_file_spec.GetCString() : "<null>",
|
|
err_file_spec ? err_file_spec.GetCString() : "<null>");
|
|
|
|
if (in_file_spec) {
|
|
AppendOpenFileAction(STDIN_FILENO, in_file_spec, true, false);
|
|
if (log)
|
|
log->Printf(
|
|
"ProcessLaunchInfo::%s appended stdin open file action for %s",
|
|
__FUNCTION__, in_file_spec.GetCString());
|
|
}
|
|
|
|
if (out_file_spec) {
|
|
AppendOpenFileAction(STDOUT_FILENO, out_file_spec, false, true);
|
|
if (log)
|
|
log->Printf(
|
|
"ProcessLaunchInfo::%s appended stdout open file action for %s",
|
|
__FUNCTION__, out_file_spec.GetCString());
|
|
}
|
|
|
|
if (err_file_spec) {
|
|
AppendOpenFileAction(STDERR_FILENO, err_file_spec, false, true);
|
|
if (log)
|
|
log->Printf(
|
|
"ProcessLaunchInfo::%s appended stderr open file action for %s",
|
|
__FUNCTION__, err_file_spec.GetCString());
|
|
}
|
|
|
|
if (default_to_use_pty &&
|
|
(!in_file_spec || !out_file_spec || !err_file_spec)) {
|
|
if (log)
|
|
log->Printf("ProcessLaunchInfo::%s default_to_use_pty is set, and at "
|
|
"least one stdin/stderr/stdout is unset, so generating a "
|
|
"pty to use for it",
|
|
__FUNCTION__);
|
|
|
|
int open_flags = O_RDWR | O_NOCTTY;
|
|
#if !defined(_WIN32)
|
|
// We really shouldn't be specifying platform specific flags that are
|
|
// intended for a system call in generic code. But this will have to
|
|
// do for now.
|
|
open_flags |= O_CLOEXEC;
|
|
#endif
|
|
if (m_pty->OpenFirstAvailableMaster(open_flags, nullptr, 0)) {
|
|
const FileSpec slave_file_spec{m_pty->GetSlaveName(nullptr, 0),
|
|
false};
|
|
|
|
// Only use the slave tty if we don't have anything specified for
|
|
// input and don't have an action for stdin
|
|
if (!in_file_spec && GetFileActionForFD(STDIN_FILENO) == nullptr) {
|
|
AppendOpenFileAction(STDIN_FILENO, slave_file_spec, true, false);
|
|
}
|
|
|
|
// Only use the slave tty if we don't have anything specified for
|
|
// output and don't have an action for stdout
|
|
if (!out_file_spec && GetFileActionForFD(STDOUT_FILENO) == nullptr) {
|
|
AppendOpenFileAction(STDOUT_FILENO, slave_file_spec, false, true);
|
|
}
|
|
|
|
// Only use the slave tty if we don't have anything specified for
|
|
// error and don't have an action for stderr
|
|
if (!err_file_spec && GetFileActionForFD(STDERR_FILENO) == nullptr) {
|
|
AppendOpenFileAction(STDERR_FILENO, slave_file_spec, false, true);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
bool ProcessLaunchInfo::ConvertArgumentsForLaunchingInShell(
|
|
Status &error, bool localhost, bool will_debug,
|
|
bool first_arg_is_full_shell_command, int32_t num_resumes) {
|
|
error.Clear();
|
|
|
|
if (GetFlags().Test(eLaunchFlagLaunchInShell)) {
|
|
if (m_shell) {
|
|
std::string shell_executable = m_shell.GetPath();
|
|
|
|
const char **argv = GetArguments().GetConstArgumentVector();
|
|
if (argv == nullptr || argv[0] == nullptr)
|
|
return false;
|
|
Args shell_arguments;
|
|
std::string safe_arg;
|
|
shell_arguments.AppendArgument(shell_executable);
|
|
const llvm::Triple &triple = GetArchitecture().GetTriple();
|
|
if (triple.getOS() == llvm::Triple::Win32 &&
|
|
!triple.isWindowsCygwinEnvironment())
|
|
shell_arguments.AppendArgument(llvm::StringRef("/C"));
|
|
else
|
|
shell_arguments.AppendArgument(llvm::StringRef("-c"));
|
|
|
|
StreamString shell_command;
|
|
if (will_debug) {
|
|
// Add a modified PATH environment variable in case argv[0] is a
|
|
// relative path.
|
|
const char *argv0 = argv[0];
|
|
FileSpec arg_spec(argv0, false);
|
|
if (arg_spec.IsRelative()) {
|
|
// We have a relative path to our executable which may not work if we
|
|
// just try to run "a.out" (without it being converted to "./a.out")
|
|
FileSpec working_dir = GetWorkingDirectory();
|
|
// Be sure to put quotes around PATH's value in case any paths have
|
|
// spaces...
|
|
std::string new_path("PATH=\"");
|
|
const size_t empty_path_len = new_path.size();
|
|
|
|
if (working_dir) {
|
|
new_path += working_dir.GetPath();
|
|
} else {
|
|
llvm::SmallString<64> cwd;
|
|
if (! llvm::sys::fs::current_path(cwd))
|
|
new_path += cwd;
|
|
}
|
|
std::string curr_path;
|
|
if (HostInfo::GetEnvironmentVar("PATH", curr_path)) {
|
|
if (new_path.size() > empty_path_len)
|
|
new_path += ':';
|
|
new_path += curr_path;
|
|
}
|
|
new_path += "\" ";
|
|
shell_command.PutCString(new_path);
|
|
}
|
|
|
|
if (triple.getOS() != llvm::Triple::Win32 ||
|
|
triple.isWindowsCygwinEnvironment())
|
|
shell_command.PutCString("exec");
|
|
|
|
// Only Apple supports /usr/bin/arch being able to specify the
|
|
// architecture
|
|
if (GetArchitecture().IsValid() && // Valid architecture
|
|
GetArchitecture().GetTriple().getVendor() ==
|
|
llvm::Triple::Apple && // Apple only
|
|
GetArchitecture().GetCore() !=
|
|
ArchSpec::eCore_x86_64_x86_64h) // Don't do this for x86_64h
|
|
{
|
|
shell_command.Printf(" /usr/bin/arch -arch %s",
|
|
GetArchitecture().GetArchitectureName());
|
|
// Set the resume count to 2:
|
|
// 1 - stop in shell
|
|
// 2 - stop in /usr/bin/arch
|
|
// 3 - then we will stop in our program
|
|
SetResumeCount(num_resumes + 1);
|
|
} else {
|
|
// Set the resume count to 1:
|
|
// 1 - stop in shell
|
|
// 2 - then we will stop in our program
|
|
SetResumeCount(num_resumes);
|
|
}
|
|
}
|
|
|
|
if (first_arg_is_full_shell_command) {
|
|
// There should only be one argument that is the shell command itself
|
|
// to be used as is
|
|
if (argv[0] && !argv[1])
|
|
shell_command.Printf("%s", argv[0]);
|
|
else
|
|
return false;
|
|
} else {
|
|
for (size_t i = 0; argv[i] != nullptr; ++i) {
|
|
const char *arg =
|
|
Args::GetShellSafeArgument(m_shell, argv[i], safe_arg);
|
|
shell_command.Printf(" %s", arg);
|
|
}
|
|
}
|
|
shell_arguments.AppendArgument(shell_command.GetString());
|
|
m_executable = m_shell;
|
|
m_arguments = shell_arguments;
|
|
return true;
|
|
} else {
|
|
error.SetErrorString("invalid shell path");
|
|
}
|
|
} else {
|
|
error.SetErrorString("not launching in shell");
|
|
}
|
|
return false;
|
|
}
|
|
|
|
ListenerSP ProcessLaunchInfo::GetListenerForProcess(Debugger &debugger) {
|
|
if (m_listener_sp)
|
|
return m_listener_sp;
|
|
else
|
|
return debugger.GetListener();
|
|
}
|