12#include <AvailabilityMacros.h>
13#include <TargetConditionals.h>
16#define __XPC_PRIVATE_H__
19#define LaunchUsingXPCRightName "com.apple.lldb.RootDebuggingXPCService"
23#define LauncherXPCServiceAuthKey "auth-key"
24#define LauncherXPCServiceArgPrefxKey "arg"
25#define LauncherXPCServiceEnvPrefxKey "env"
26#define LauncherXPCServiceCPUTypeKey "cpuType"
27#define LauncherXPCServicePosixspawnFlagsKey "posixspawnFlags"
28#define LauncherXPCServiceStdInPathKeyKey "stdInPath"
29#define LauncherXPCServiceStdOutPathKeyKey "stdOutPath"
30#define LauncherXPCServiceStdErrPathKeyKey "stdErrPath"
31#define LauncherXPCServiceChildPIDKey "childPID"
32#define LauncherXPCServiceErrorTypeKey "errorType"
33#define LauncherXPCServiceCodeTypeKey "errorCode"
36#include <bsm/audit_session.h>
39#include "llvm/TargetParser/Host.h"
42#include <crt_externs.h>
52#include <sys/sysctl.h>
74#include "llvm/ADT/ScopeExit.h"
75#include "llvm/Support/Errno.h"
76#include "llvm/Support/FileSystem.h"
84#include <objc/objc-auto.h>
87#include <CoreFoundation/CoreFoundation.h>
88#include <Foundation/Foundation.h>
90#ifndef _POSIX_SPAWN_DISABLE_ASLR
91#define _POSIX_SPAWN_DISABLE_ASLR 0x0100
106 if (__builtin_available(macos 10.12, iOS 10, tvOS 10, watchOS 3, *)) {
108 g_os_log = os_log_create(
"com.apple.dt.lldb",
"lldb");
113 os_log(
g_os_log,
"%{public}s", message.str().c_str());
116 os_log_error(
g_os_log,
"%{public}s", message.str().c_str());
120 llvm::errs() << message;
126#if defined(__APPLE__)
129 if (file.
GetPath(path,
sizeof(path))) {
130 CFCBundle bundle(path);
131 if (bundle.GetPath(path,
sizeof(path))) {
132 bundle_directory.
SetFile(path, FileSpec::Style::native);
138 bundle_directory.
Clear();
143#if defined(__APPLE__)
146 if (file.
GetPath(path,
sizeof(path))) {
147 CFCBundle bundle(path);
148 CFCReleaser<CFURLRef> url(bundle.CopyExecutableURL());
150 if (::CFURLGetFileSystemRepresentation(url.get(), YES, (UInt8 *)path,
152 file.
SetFile(path, FileSpec::Style::native);
164static void *AcceptPIDFromInferior(
const char *connect_url) {
169 ::memset(pid_str, 0,
sizeof(pid_str));
171 const size_t pid_str_len = file_conn.
Read(
172 pid_str,
sizeof(pid_str), std::chrono::seconds(0), status, NULL);
173 if (pid_str_len > 0) {
174 int pid = atoi(pid_str);
175 return (
void *)(intptr_t)pid;
181const char *applscript_in_new_tty =
"tell application \"Terminal\"\n"
183 " do script \"/bin/bash -c '%s';exit\"\n"
186const char *applscript_in_existing_tty =
"\
187set the_shell_script to \"/bin/bash -c '%s';exit\"\n\
188tell application \"Terminal\"\n\
189 repeat with the_window in (get windows)\n\
190 repeat with the_tab in tabs of the_window\n\
191 set the_tty to tty in the_tab\n\
192 if the_tty contains \"%s\" then\n\
193 if the_tab is not busy then\n\
194 set selected of the_tab to true\n\
195 set frontmost of the_window to true\n\
196 do script the_shell_script in the_tab\n\
202 do script the_shell_script\n\
206LaunchInNewTerminalWithAppleScript(
const char *exe_path,
209 char unix_socket_name[
PATH_MAX] =
"/tmp/XXXXXX";
210 if (::mktemp(unix_socket_name) == NULL) {
212 "failed to make temporary path for a unix socket");
217 FileSpec darwin_debug_file_spec = HostInfo::GetSupportExeDir();
218 if (!darwin_debug_file_spec) {
224 darwin_debug_file_spec.
SetFilename(
"darwin-debug");
228 "the 'darwin-debug' executable doesn't exists at '%s'",
229 darwin_debug_file_spec.
GetPath().c_str());
234 darwin_debug_file_spec.
GetPath(launcher_path,
sizeof(launcher_path));
242 command.
Printf(R
"(\"%s\" --unix-socket=%s)", launcher_path, unix_socket_name);
249 command.
Printf(R
"( --working-dir \"%s\")", working_dir.GetPath().c_str());
253 command.
Printf(R
"( --working-dir \"%s\")", cwd);
256 if (launch_info.
GetFlags().
Test(eLaunchFlagDisableASLR))
267 auto host_entry = host_env.find(KV.first());
268 if (host_entry == host_env.end() || host_entry->second != KV.second)
276 for (
size_t i = 0; argv[i] != NULL; ++i) {
278 command.
Printf(R
"( \"%s\")", exe_path);
280 command.
Printf(R
"( \"%s\")", argv[i]);
283 command.
Printf(R
"( \"%s\")", exe_path);
285 command.PutCString(" ; echo Process exited with status $?");
286 if (launch_info.
GetFlags().
Test(lldb::eLaunchFlagCloseTTYOnExit))
291 applescript_source.
Printf(applscript_in_new_tty,
294 NSAppleScript *applescript = [[NSAppleScript alloc]
295 initWithSource:[NSString stringWithCString:applescript_source.
GetString()
298 encoding:NSUTF8StringEncoding]];
305 char connect_url[128];
306 ::snprintf(connect_url,
sizeof(connect_url),
"unix-accept://%s",
316 unix_socket_name, [&] {
return AcceptPIDFromInferior(connect_url); });
321 [applescript executeAndReturnError:nil];
324 lldb_error = accept_thread->Join(&accept_thread_result);
325 if (lldb_error.
Success() && accept_thread_result) {
326 pid = (intptr_t)accept_thread_result;
329 llvm::sys::fs::remove(unix_socket_name);
330 [applescript release];
342 return llvm::errorCodeToError(
343 std::error_code(ENOTSUP, std::system_category()));
347 const std::string file_path = file_spec.
GetPath();
349 LLDB_LOG(log,
"Sending {0}:{1} to external editor",
350 file_path.empty() ?
"<invalid>" : file_path, line_no);
352 if (file_path.empty())
353 return llvm::createStringError(llvm::inconvertibleErrorCode(),
354 "no file specified");
356 CFCString file_cfstr(file_path.c_str(), kCFStringEncodingUTF8);
357 CFCReleaser<CFURLRef> file_URL = ::CFURLCreateWithFileSystemPath(
360 kCFURLPOSIXPathStyle,
364 return llvm::createStringError(
365 llvm::inconvertibleErrorCode(),
366 llvm::formatv(
"could not create CFURL from path \"{0}\"", file_path));
379 BabelAESelInfo file_and_line_info = {
381 (int16_t)(line_no - 1),
388 AEKeyDesc file_and_line_desc;
389 file_and_line_desc.descKey = keyAEPosition;
390 long error = ::AECreateDesc(typeUTF8Text,
392 sizeof(file_and_line_info),
393 &(file_and_line_desc.descContent));
396 return llvm::createStringError(
397 llvm::inconvertibleErrorCode(),
398 llvm::formatv(
"creating Apple Event descriptor failed: error {0}",
402 auto on_exit = llvm::make_scope_exit(
403 [&]() { AEDisposeDesc(&(file_and_line_desc.descContent)); });
405 if (editor.empty()) {
406 if (
const char *lldb_external_editor = ::getenv(
"LLDB_EXTERNAL_EDITOR"))
407 editor = lldb_external_editor;
410 std::optional<FSRef> app_fsref;
411 if (!editor.empty()) {
412 LLDB_LOG(log,
"Looking for external editor: {0}", editor);
415 CFCString editor_name(editor.data(), kCFStringEncodingUTF8);
416 long app_error = ::LSFindApplicationForInfo(
417 kLSUnknownCreator, NULL,
418 editor_name.get(), &(*app_fsref),
420 if (app_error != noErr)
421 return llvm::createStringError(
422 llvm::inconvertibleErrorCode(),
423 llvm::formatv(
"could not find external editor \"{0}\": "
424 "LSFindApplicationForInfo returned error {1}",
429 LSApplicationParameters app_params;
430 ::memset(&app_params, 0,
sizeof(app_params));
432 kLSLaunchDefaults | kLSLaunchDontAddToRecents | kLSLaunchDontSwitch;
434 app_params.application = &(*app_fsref);
436 ProcessSerialNumber psn;
437 std::array<CFURLRef, 1> file_array = {file_URL.
get()};
438 CFCReleaser<CFArrayRef> cf_array(
439 CFArrayCreate(NULL, (
const void **)&file_array,
441 error = ::LSOpenURLsWithRole(
442 cf_array.get(), kLSRolesEditor,
444 &app_params, &psn, 1);
447 return llvm::createStringError(
448 llvm::inconvertibleErrorCode(),
449 llvm::formatv(
"LSOpenURLsWithRole failed: error {0}",
error));
451 return llvm::Error::success();
457 return llvm::errorCodeToError(
458 std::error_code(ENOTSUP, std::system_category()));
461 return llvm::createStringError(
"Cannot open empty URL.");
465 CFCString url_cfstr(url.data(), kCFStringEncodingUTF8);
472 return llvm::createStringError(
473 llvm::formatv(
"could not create CFURL from URL \"{0}\"", url));
475 OSStatus
error = ::LSOpenCFURLRef(
480 return llvm::createStringError(
481 llvm::formatv(
"LSOpenCFURLRef failed: error {0:x}",
error));
483 return llvm::Error::success();
491 auditinfo_addr_t info;
492 getaudit_addr(&info,
sizeof(info));
493 return info.ai_flags & AU_SESSION_FLAG_HAS_GRAPHIC_ACCESS;
502 int mib[CTL_MAXNAME] = {
505 size_t mib_len = CTL_MAXNAME;
506 if (::sysctlnametomib(
"sysctl.proc_cputype", mib, &mib_len))
513 size_t len =
sizeof(cpu);
514 if (::sysctl(mib, mib_len, &cpu, &len, 0, 0) == 0) {
517 sub = CPU_SUBTYPE_I386_ALL;
519 case CPU_TYPE_X86_64:
520 sub = CPU_SUBTYPE_X86_64_ALL;
523#if defined(CPU_TYPE_ARM64) && defined(CPU_SUBTYPE_ARM64_ALL)
525 sub = CPU_SUBTYPE_ARM64_ALL;
529#if defined(CPU_TYPE_ARM64_32) && defined(CPU_SUBTYPE_ARM64_32_ALL)
531 sub = CPU_SUBTYPE_ARM64_32_ALL;
539 uint32_t cpusubtype = 0;
540 len =
sizeof(cpusubtype);
541 if (::sysctlbyname(
"hw.cpusubtype", &cpusubtype, &len, NULL, 0) == 0)
544 bool host_cpu_is_64bit;
545 uint32_t is64bit_capable;
546 size_t is64bit_capable_len =
sizeof(is64bit_capable);
548 sysctlbyname(
"hw.cpu64bit_capable", &is64bit_capable,
549 &is64bit_capable_len, NULL, 0) == 0;
556 if (host_cpu_is_64bit) {
557 sub = CPU_SUBTYPE_ARM_V7;
575 int proc_args_mib[3] = {CTL_KERN, KERN_PROCARGS2,
578 size_t arg_data_size = 0;
579 if (::sysctl(proc_args_mib, 3,
nullptr, &arg_data_size, NULL, 0) ||
581 arg_data_size = 8192;
588 if (::sysctl(proc_args_mib, 3, arg_data.
GetBytes(), &arg_data_size, NULL,
593 uint32_t argc = data.
GetU32(&offset);
595 const llvm::Triple::ArchType triple_arch = triple.getArch();
596 const bool check_for_ios_simulator =
597 (triple_arch == llvm::Triple::x86 ||
598 triple_arch == llvm::Triple::x86_64 ||
599 triple_arch == llvm::Triple::aarch64);
601 const char *cstr = data.
GetCStr(&offset);
605 if (match_info_ptr == NULL ||
612 const uint8_t *p = data.
PeekData(offset, 1);
613 if ((p == NULL) || (*p !=
'\0'))
619 for (
int i = 0; i < static_cast<int>(argc); ++i) {
626 bool is_simulator =
false;
627 llvm::StringRef env_var;
628 while (!(env_var = data.
GetCStr(&offset)).empty()) {
629 if (check_for_ios_simulator &&
630 env_var.starts_with(
"SIMULATOR_UDID="))
636 triple.setOS(llvm::Triple::IOS);
637 triple.setEnvironment(llvm::Triple::Simulator);
639 triple.setOS(llvm::Triple::MacOSX);
654 mib[2] = KERN_PROC_PID;
656 struct kinfo_proc proc_kinfo;
657 size_t proc_kinfo_size =
sizeof(
struct kinfo_proc);
659 if (::sysctl(mib, 4, &proc_kinfo, &proc_kinfo_size, NULL, 0) == 0) {
660 if (proc_kinfo_size > 0) {
662 process_info.
SetUserID(proc_kinfo.kp_eproc.e_pcred.p_ruid);
663 process_info.
SetGroupID(proc_kinfo.kp_eproc.e_pcred.p_rgid);
665 if (proc_kinfo.kp_eproc.e_ucred.cr_ngroups > 0)
667 proc_kinfo.kp_eproc.e_ucred.cr_groups[0]);
684 std::vector<struct kinfo_proc> kinfos;
686 int mib[3] = {CTL_KERN, KERN_PROC, KERN_PROC_ALL};
688 size_t pid_data_size = 0;
689 if (::sysctl(mib, 3,
nullptr, &pid_data_size,
nullptr, 0) != 0)
693 const size_t estimated_pid_count =
694 (pid_data_size /
sizeof(
struct kinfo_proc)) + 10;
696 kinfos.resize(estimated_pid_count);
697 pid_data_size = kinfos.size() *
sizeof(
struct kinfo_proc);
699 if (::sysctl(mib, 3, &kinfos[0], &pid_data_size,
nullptr, 0) != 0)
702 const size_t actual_pid_count = (pid_data_size /
sizeof(
struct kinfo_proc));
706 const uid_t our_uid = getuid();
707 for (
size_t i = 0; i < actual_pid_count; i++) {
708 const struct kinfo_proc &kinfo = kinfos[i];
710 bool kinfo_user_matches =
false;
712 kinfo_user_matches =
true;
714 kinfo_user_matches = kinfo.kp_eproc.e_pcred.p_ruid == our_uid;
718 kinfo_user_matches =
true;
720 if (!kinfo_user_matches ||
723 kinfo.kp_proc.p_pid == 0 ||
724 kinfo.kp_proc.p_stat == SZOMB ||
725 kinfo.kp_proc.p_flag & P_TRACED ||
726 kinfo.kp_proc.p_flag & P_WEXIT)
729 ProcessInstanceInfo process_info;
732 process_info.
SetUserID(kinfo.kp_eproc.e_pcred.p_ruid);
733 process_info.
SetGroupID(kinfo.kp_eproc.e_pcred.p_rgid);
735 if (kinfo.kp_eproc.e_ucred.cr_ngroups > 0)
749 if (match_info.
Matches(process_info))
750 process_infos.push_back(process_info);
754 return process_infos.size();
759 bool success =
false;
775 process_info.
Clear();
780static void PackageXPCArguments(xpc_object_t message,
const char *prefix,
784 memset(buf, 0,
sizeof(buf));
785 snprintf(buf,
sizeof(buf),
"%sCount", prefix);
786 xpc_dictionary_set_int64(message, buf, count);
787 for (
size_t i = 0; i < count; i++) {
788 memset(buf, 0,
sizeof(buf));
789 snprintf(buf,
sizeof(buf),
"%s%zi", prefix, i);
794static void PackageXPCEnvironment(xpc_object_t message, llvm::StringRef prefix,
796 xpc_dictionary_set_int64(message, (prefix +
"Count").str().c_str(),
799 for (
const auto &KV : env) {
800 xpc_dictionary_set_string(message, (prefix + llvm::Twine(i)).str().c_str(),
811static AuthorizationRef authorizationRef = NULL;
816 if ((launch_info.
GetUserID() == 0) && !authorizationRef) {
817 OSStatus createStatus =
818 AuthorizationCreate(NULL, kAuthorizationEmptyEnvironment,
819 kAuthorizationFlagDefaults, &authorizationRef);
820 if (createStatus != errAuthorizationSuccess) {
827 OSStatus rightsStatus =
828 AuthorizationRightGet(LaunchUsingXPCRightName, NULL);
829 if (rightsStatus != errAuthorizationSuccess) {
832 CFSTR(
"Xcode is trying to take control of a root process.");
833 CFStringRef keys[] = {CFSTR(
"en")};
834 CFTypeRef values[] = {prompt};
835 CFDictionaryRef promptDict = CFDictionaryCreate(
836 kCFAllocatorDefault, (
const void **)keys, (
const void **)values, 1,
837 &kCFCopyStringDictionaryKeyCallBacks,
838 &kCFTypeDictionaryValueCallBacks);
840 CFStringRef keys1[] = {CFSTR(
"class"), CFSTR(
"group"), CFSTR(
"comment"),
841 CFSTR(
"default-prompt"), CFSTR(
"shared")};
842 CFTypeRef values1[] = {CFSTR(
"user"), CFSTR(
"admin"),
843 CFSTR(LaunchUsingXPCRightName), promptDict,
845 CFDictionaryRef dict = CFDictionaryCreate(
846 kCFAllocatorDefault, (
const void **)keys1, (
const void **)values1, 5,
847 &kCFCopyStringDictionaryKeyCallBacks,
848 &kCFTypeDictionaryValueCallBacks);
849 rightsStatus = AuthorizationRightSet(
850 authorizationRef, LaunchUsingXPCRightName, dict, NULL, NULL, NULL);
851 CFRelease(promptDict);
855 OSStatus copyRightStatus = errAuthorizationDenied;
856 if (rightsStatus == errAuthorizationSuccess) {
857 AuthorizationItem item1 = {LaunchUsingXPCRightName, 0, NULL, 0};
858 AuthorizationItem items[] = {item1};
859 AuthorizationRights requestedRights = {1, items};
860 AuthorizationFlags authorizationFlags =
861 kAuthorizationFlagInteractionAllowed | kAuthorizationFlagExtendRights;
862 copyRightStatus = AuthorizationCopyRights(
863 authorizationRef, &requestedRights, kAuthorizationEmptyEnvironment,
864 authorizationFlags, NULL);
867 if (copyRightStatus != errAuthorizationSuccess) {
875 "Launching as root needs root authorization.");
878 if (authorizationRef) {
879 AuthorizationFree(authorizationRef, kAuthorizationFlagDefaults);
880 authorizationRef = NULL;
890 short flags = POSIX_SPAWN_SETSIGDEF | POSIX_SPAWN_SETSIGMASK;
893 flags |= POSIX_SPAWN_SETEXEC;
896 flags |= POSIX_SPAWN_START_SUSPENDED;
898 if (launch_info.
GetFlags().
Test(eLaunchFlagDisableASLR))
902 flags |= POSIX_SPAWN_SETPGROUP;
904#ifdef POSIX_SPAWN_CLOEXEC_DEFAULT
905#if defined(__x86_64__) || defined(__i386__)
910 llvm::VersionTuple version = HostInfo::GetOSVersion();
911 if (version > llvm::VersionTuple(10, 7)) {
922 flags |= POSIX_SPAWN_CLOEXEC_DEFAULT;
928 xpc_release((xpc_object_t)xpc_object);
941 uid_t requested_uid = launch_info.
GetUserID();
942 const char *xpc_service = nil;
943 bool send_auth =
false;
944 AuthorizationExternalForm extForm;
945 if (requested_uid == 0) {
946 if (AuthorizationMakeExternalForm(authorizationRef, &extForm) ==
947 errAuthorizationSuccess) {
952 "Launching root via XPC needs to "
953 "externalize authorization reference.");
957 xpc_service = LaunchUsingXPCRightName;
961 "Launching via XPC is only currently available for root.");
966 xpc_connection_t conn = xpc_connection_create(xpc_service, NULL);
968 xpc_connection_set_event_handler(conn, ^(xpc_object_t event) {
969 xpc_type_t type = xpc_get_type(event);
971 if (type == XPC_TYPE_ERROR) {
972 if (event == XPC_ERROR_CONNECTION_INTERRUPTED) {
979 }
else if (event == XPC_ERROR_CONNECTION_INVALID) {
997 xpc_connection_resume(conn);
998 xpc_object_t message = xpc_dictionary_create(nil, nil, 0);
1001 xpc_dictionary_set_data(message, LauncherXPCServiceAuthKey, extForm.bytes,
1002 sizeof(AuthorizationExternalForm));
1005 PackageXPCArguments(message, LauncherXPCServiceArgPrefxKey,
1007 PackageXPCEnvironment(message, LauncherXPCServiceEnvPrefxKey,
1011 xpc_dictionary_set_int64(message, LauncherXPCServiceCPUTypeKey,
1013 xpc_dictionary_set_int64(message, LauncherXPCServicePosixspawnFlagsKey,
1016 if (file_action && !file_action->
GetPath().empty()) {
1017 xpc_dictionary_set_string(message, LauncherXPCServiceStdInPathKeyKey,
1018 file_action->
GetPath().str().c_str());
1021 if (file_action && !file_action->
GetPath().empty()) {
1022 xpc_dictionary_set_string(message, LauncherXPCServiceStdOutPathKeyKey,
1023 file_action->
GetPath().str().c_str());
1026 if (file_action && !file_action->
GetPath().empty()) {
1027 xpc_dictionary_set_string(message, LauncherXPCServiceStdErrPathKeyKey,
1028 file_action->
GetPath().str().c_str());
1031 xpc_object_t reply =
1032 xpc_connection_send_message_with_reply_sync(conn, message);
1033 xpc_type_t returnType = xpc_get_type(reply);
1034 if (returnType == XPC_TYPE_DICTIONARY) {
1035 pid = xpc_dictionary_get_int64(reply, LauncherXPCServiceChildPIDKey);
1038 xpc_dictionary_get_int64(reply, LauncherXPCServiceErrorTypeKey);
1040 xpc_dictionary_get_int64(reply, LauncherXPCServiceCodeTypeKey);
1044 "Problems with launching via XPC. Error type : %i, code : %i",
1045 errorType, errorCode);
1048 if (authorizationRef) {
1049 AuthorizationFree(authorizationRef, kAuthorizationFlagDefaults);
1050 authorizationRef = NULL;
1053 }
else if (returnType == XPC_TYPE_ERROR) {
1056 "Problems with launching via XPC. XPC error : %s",
1057 xpc_dictionary_get_string(reply, XPC_ERROR_KEY_DESCRIPTION));
1073 posix_spawn_file_actions_t *file_actions =
1074 static_cast<posix_spawn_file_actions_t *
>(_file_actions);
1082 if (info->
GetFD() == -1)
1084 "invalid fd for posix_spawn_file_actions_addclose(...)");
1087 ::posix_spawn_file_actions_addclose(file_actions, info->
GetFD()),
1091 "error: {0}, posix_spawn_file_actions_addclose "
1092 "(action={1}, fd={2})",
1098 if (info->
GetFD() == -1)
1100 "invalid fd for posix_spawn_file_actions_adddup2(...)");
1103 "invalid duplicate fd for posix_spawn_file_actions_adddup2(...)");
1106 Status(::posix_spawn_file_actions_adddup2(file_actions, info->
GetFD(),
1111 "error: {0}, posix_spawn_file_actions_adddup2 "
1112 "(action={1}, fd={2}, dup_fd={3})",
1116 Status(::posix_spawn_file_actions_addinherit_np(file_actions, info->
GetFD()),
1120 "error: {0}, posix_spawn_file_actions_addinherit_np "
1121 "(action={1}, fd={2})",
1127 if (info->
GetFD() == -1)
1129 "invalid fd in posix_spawn_file_actions_addopen(...)");
1135 if (oflag & O_CREAT)
1138 error =
Status(::posix_spawn_file_actions_addopen(
1139 file_actions, info->
GetFD(),
1140 info->
GetPath().str().c_str(), oflag, mode),
1144 "error: {0}, posix_spawn_file_actions_addopen (action={1}, "
1145 "fd={2}, path='{3}', oflag={4}, mode={5})",
1151 return error.Success();
1160 posix_spawnattr_t attr;
1164 LLDB_LOG(log,
"error: {0}, ::posix_spawnattr_init ( &attr )",
error);
1170 llvm::make_scope_exit([&]() { posix_spawnattr_destroy(&attr); });
1172 sigset_t no_signals;
1173 sigset_t all_signals;
1174 sigemptyset(&no_signals);
1175 sigfillset(&all_signals);
1176 ::posix_spawnattr_setsigmask(&attr, &no_signals);
1177 ::posix_spawnattr_setsigdefault(&attr, &all_signals);
1184 "error: {0}, ::posix_spawnattr_setflags ( &attr, flags={1:x} )",
1189 bool is_graphical =
true;
1192 SecuritySessionId session_id;
1193 SessionAttributeBits session_attributes;
1195 SessionGetInfo(callerSecuritySession, &session_id, &session_attributes);
1196 if (status == errSessionSuccess)
1197 is_graphical = session_attributes & sessionHasGraphicAccess;
1203 if (is_graphical && launch_info.
GetFlags().
Test(eLaunchFlagDebug) &&
1204 !launch_info.
GetFlags().
Test(eLaunchFlagInheritTCCFromParent)) {
1207 LLDB_LOG(log,
"error: {0}, setup_posix_spawn_responsible_flag(&attr)",
1221 const bool set_cpu_type =
1224 const bool set_cpu_subtype =
1230 typedef int (*posix_spawnattr_setarchpref_np_t)(
1232 posix_spawnattr_setarchpref_np_t posix_spawnattr_setarchpref_np_fn =
1233 (posix_spawnattr_setarchpref_np_t)dlsym(
1234 RTLD_DEFAULT,
"posix_spawnattr_setarchpref_np");
1235 if (set_cpu_subtype && posix_spawnattr_setarchpref_np_fn) {
1236 error =
Status((*posix_spawnattr_setarchpref_np_fn)(
1237 &attr, 1, &cpu_type, &cpu_subtype, &ocount),
1241 "error: {0}, ::posix_spawnattr_setarchpref_np ( &attr, 1, "
1242 "cpu_type = {1:x}, cpu_subtype = {1:x}, count => {2} )",
1243 error, cpu_type, cpu_subtype, ocount);
1245 if (
error.Fail() || ocount != 1)
1249 ::posix_spawnattr_setbinpref_np(&attr, 1, &cpu_type, &ocount),
1253 "error: {0}, ::posix_spawnattr_setbinpref_np ( &attr, 1, "
1254 "cpu_type = {1:x}, count => {2} )",
1255 error, cpu_type, ocount);
1256 if (
error.Fail() || ocount != 1)
1262 const char *tmp_argv[2];
1263 char *
const *argv =
const_cast<char *
const *
>(
1271 tmp_argv[0] = exe_path;
1273 argv =
const_cast<char *
const *
>(tmp_argv);
1279 std::string working_dir_path = working_dir.
GetPath();
1281 if (errno == ENOENT) {
1283 "No such file or directory: %s", working_dir_path.c_str());
1284 }
else if (errno == ENOTDIR) {
1286 "Path doesn't name a directory: %s", working_dir_path.c_str());
1290 "changing directory for process "
1299 if (num_file_actions > 0) {
1300 posix_spawn_file_actions_t file_actions;
1305 "error: {0}, ::posix_spawn_file_actions_init ( &file_actions )",
1311 auto cleanup_fileact = llvm::make_scope_exit(
1312 [&]() { posix_spawn_file_actions_destroy(&file_actions); });
1314 for (
size_t i = 0; i < num_file_actions; ++i) {
1317 if (launch_file_action) {
1325 ::posix_spawnp(&result_pid, exe_path, &file_actions, &attr, argv, envp),
1330 "error: {0}, ::posix_spawnp(pid => {1}, path = '{2}', "
1331 "file_actions = {3}, "
1332 "attr = {4}, argv = {5}, envp = {6} )",
1333 error, result_pid, exe_path, &file_actions, &attr, argv,
1336 for (
int ii = 0; argv[ii]; ++ii)
1337 LLDB_LOG(log,
"argv[{0}] = '{1}'", ii, argv[ii]);
1343 Status(::posix_spawnp(&result_pid, exe_path, NULL, &attr, argv, envp),
1348 "error: {0}, ::posix_spawnp ( pid => {1}, path = '{2}', "
1349 "file_actions = NULL, attr = {3}, argv = {4}, envp = {5} )",
1350 error, result_pid, exe_path, &attr, argv, envp.
get());
1352 for (
int ii = 0; argv[ii]; ++ii)
1353 LLDB_LOG(log,
"argv[{0}] = '{1}'", ii, argv[ii]);
1368 bool result =
false;
1371 bool launchingAsRoot = launch_info.
GetUserID() == 0;
1372 bool currentUserIsRoot = HostInfo::GetEffectiveUserID() == 0;
1374 if (launchingAsRoot && !currentUserIsRoot) {
1389 if (!fs.
Exists(exe_spec))
1392 if (!fs.
Exists(exe_spec))
1395 if (!fs.
Exists(exe_spec)) {
1397 "executable doesn't exist: '{0}'", exe_spec);
1401 if (launch_info.
GetFlags().
Test(eLaunchFlagLaunchInTTY)) {
1403 return LaunchInNewTerminalWithAppleScript(exe_spec.GetPath().c_str(),
1408 "supported on iOS devices");
1415 auto exe_path = exe_spec.GetPath();
1432 if (
error.Success())
1441 if (launch_info.
GetFlags().
Test(eLaunchFlagShellExpandArguments)) {
1442 FileSpec expand_tool_spec;
1444 std::string env_argdumper_path = host_env.lookup(
"LLDB_ARGDUMPER_PATH");
1445 if (!env_argdumper_path.empty()) {
1446 expand_tool_spec.
SetFile(env_argdumper_path, FileSpec::Style::native);
1449 "lldb-argdumper exe path set from environment variable: %s",
1450 env_argdumper_path.c_str());
1453 if (!argdumper_exists) {
1454 expand_tool_spec = HostInfo::GetSupportExeDir();
1455 if (!expand_tool_spec) {
1457 "could not get support executable directory for "
1458 "lldb-argdumper tool");
1464 "could not find the lldb-argdumper tool: %s",
1465 expand_tool_spec.
GetPath().c_str());
1470 StreamString expand_tool_spec_stream;
1471 expand_tool_spec_stream.
Printf(
"\"%s\"",
1472 expand_tool_spec.
GetPath().c_str());
1474 Args expand_command(expand_tool_spec_stream.
GetData());
1475 expand_command.AppendArguments(launch_info.
GetArguments());
1481 char *wd = getcwd(
nullptr, 0);
1482 if (wd ==
nullptr) {
1484 "cwd does not exist: Cannot launch with shell argument expansion");
1487 FileSpec working_dir(wd);
1492 bool run_in_shell =
true;
1493 bool hide_stderr =
true;
1496 std::chrono::seconds(10), run_in_shell, hide_stderr);
1503 "lldb-argdumper exited with error %d", status);
1513 auto dict_sp = data_sp->GetAsDictionary();
1519 auto args_sp = dict_sp->GetObjectForDotSeparatedPath(
"arguments");
1525 auto args_array_sp = args_sp->GetAsArray();
1526 if (!args_array_sp) {
1533 for (
size_t i = 0; i < args_array_sp->GetSize(); i++) {
1534 auto item_sp = args_array_sp->GetItemAtIndex(i);
1537 auto str_sp = item_sp->GetAsString();
1550 unsigned long mask = DISPATCH_PROC_EXIT;
1554 dispatch_source_t source = ::dispatch_source_create(
1555 DISPATCH_SOURCE_TYPE_PROC, pid, mask,
1556 ::dispatch_get_global_queue(DISPATCH_QUEUE_PRIORITY_DEFAULT, 0));
1559 "Host::StartMonitoringChildProcess(callback, pid=%i) source = %p\n",
1560 static_cast<int>(pid),
static_cast<void *
>(source));
1564 ::dispatch_source_set_cancel_handler(source, ^{
1565 dispatch_release(source);
1567 ::dispatch_source_set_event_handler(source, ^{
1571 wait_pid = llvm::sys::RetryAfterSignal(-1, ::waitpid, pid, &status, 0);
1572 if (wait_pid >= 0) {
1574 int exit_status = 0;
1575 const char *status_cstr = NULL;
1576 if (WIFEXITED(status)) {
1577 exit_status = WEXITSTATUS(status);
1578 status_cstr =
"EXITED";
1579 }
else if (WIFSIGNALED(status)) {
1580 signal = WTERMSIG(status);
1581 status_cstr =
"SIGNALED";
1584 llvm_unreachable(
"Unknown status");
1588 "::waitpid (pid = %llu, &status, 0) => pid = %i, status "
1589 "= 0x%8.8x (%s), signal = %i, exit_status = %i",
1590 pid, wait_pid, status, status_cstr, signal, exit_status);
1593 callback_copy(pid, signal, exit_status);
1595 ::dispatch_source_cancel(source);
1599 ::dispatch_resume(source);
1601 return HostThread();
static llvm::raw_ostream & error(Stream &strm)
#define CPU_SUBTYPE_X86_64_H
#define CPU_TYPE_ARM64_32
static Status LaunchProcessPosixSpawn(const char *exe_path, const ProcessLaunchInfo &launch_info, lldb::pid_t &pid)
static Status LaunchProcessXPC(const char *exe_path, ProcessLaunchInfo &launch_info, lldb::pid_t &pid)
static short GetPosixspawnFlags(const ProcessLaunchInfo &launch_info)
#define _POSIX_SPAWN_DISABLE_ASLR
int __pthread_chdir(const char *path)
static bool GetMacOSXProcessUserAndGroup(ProcessInstanceInfo &process_info)
static std::once_flag g_os_log_once
static bool GetMacOSXProcessCPUType(ProcessInstanceInfo &process_info)
static void finalize_xpc(void *xpc_object)
int __pthread_fchdir(int fildes)
static bool ShouldLaunchUsingXPC(ProcessLaunchInfo &launch_info)
static bool AddPosixSpawnFileAction(void *_file_actions, const FileAction *info, Log *log, Status &error)
static bool GetMacOSXProcessArgs(const ProcessInstanceInfoMatch *match_info_ptr, ProcessInstanceInfo &process_info)
#define LLDB_LOG(log,...)
The LLDB_LOG* macros defined below are the way to emit log messages.
#define LLDB_LOGF(log,...)
static int setup_posix_spawn_responsible_flag(posix_spawnattr_t *attr)
An architecture specification class.
bool IsValid() const
Tests if this ArchSpec is valid.
void Clear()
Clears the object state.
llvm::Triple & GetTriple()
Architecture triple accessor.
bool SetArchitecture(ArchitectureType arch_type, uint32_t cpu, uint32_t sub, uint32_t os=0)
Change the architecture object type, CPU type and OS type.
uint32_t GetMachOCPUSubType() const
uint32_t GetMachOCPUType() const
const char * GetArchitectureName() const
Returns a static string representing the current architecture.
A command line argument class.
size_t GetArgumentCount() const
Gets the number of arguments left in this command object.
void AppendArgument(llvm::StringRef arg_str, char quote_char='\0')
Appends a new argument to the end of the list argument list.
const char * GetArgumentAtIndex(size_t idx) const
Gets the NULL terminated C string argument pointer for the argument at index idx.
const char ** GetConstArgumentVector() const
Gets the argument vector.
void Clear()
Clear the arguments.
lldb::ConnectionStatus Connect(llvm::StringRef url, Status *error_ptr) override
Connect using the connect string url.
size_t Read(void *dst, size_t dst_len, const Timeout< std::micro > &timeout, lldb::ConnectionStatus &status, Status *error_ptr) override
The read function that attempts to read from the connection.
const char * GetCString() const
Get the string value as a C string.
A subclass of DataBuffer that stores a data buffer on the heap.
lldb::offset_t GetByteSize() const override
Get the number of bytes in the data buffer.
char *const * get() const
static std::string compose(const value_type &KeyValue)
std::pair< iterator, bool > insert(llvm::StringRef KeyEqValue)
llvm::StringRef GetPath() const
int GetActionArgument() const
void SetFile(llvm::StringRef path, Style style)
Change the file specified with a new path.
void AppendPathComponent(llvm::StringRef component)
const ConstString & GetFilename() const
Filename string const get accessor.
size_t GetPath(char *path, size_t max_path_length, bool denormalize=true) const
Extract the full path to the file.
void Clear()
Clears the object state.
void SetFilename(ConstString filename)
Filename string set accessor.
void Resolve(llvm::SmallVectorImpl< char > &path)
Resolve path to make it canonical.
bool ResolveExecutableLocation(FileSpec &file_spec)
Call into the Host to see if it can help find the file.
bool Exists(const FileSpec &file_spec) const
Returns whether the given file exists.
static FileSystem & Instance()
bool Test(ValueType bit) const
Test a single flag bit.
static Status LaunchProcess(ProcessLaunchInfo &launch_info)
Launch the process specified in launch_info.
static bool ResolveExecutableInBundle(FileSpec &file)
When executable files may live within a directory, where the directory represents an executable bundl...
static void SystemLog(lldb::Severity severity, llvm::StringRef message)
Emit the given message to the operating system log.
static llvm::Error OpenURL(llvm::StringRef url)
static Status ShellExpandArguments(ProcessLaunchInfo &launch_info)
Perform expansion of the command-line for this launch info This can potentially involve wildcard expa...
static Status RunShellCommand(llvm::StringRef command, const FileSpec &working_dir, int *status_ptr, int *signo_ptr, std::string *command_output, const Timeout< std::micro > &timeout, bool run_in_shell=true, bool hide_stderr=false)
Run a shell command.
static Environment GetEnvironment()
static uint32_t FindProcessesImpl(const ProcessInstanceInfoMatch &match_info, ProcessInstanceInfoList &proc_infos)
static bool GetProcessInfo(lldb::pid_t pid, ProcessInstanceInfo &proc_info)
std::function< void(lldb::pid_t pid, int signal, int status)> MonitorChildProcessCallback
static llvm::Expected< HostThread > StartMonitoringChildProcess(const MonitorChildProcessCallback &callback, lldb::pid_t pid)
Start monitoring a child process.
static bool IsInteractiveGraphicSession()
Check if we're running in an interactive graphical session.
static bool GetBundleDirectory(const FileSpec &file, FileSpec &bundle_directory)
If you have an executable that is in a bundle and want to get back to the bundle directory from the p...
static llvm::Error OpenFileInExternalEditor(llvm::StringRef editor, const FileSpec &file_spec, uint32_t line_no)
void SetGroupID(uint32_t gid)
bool ProcessIDIsValid() const
const char * GetName() const
lldb::pid_t GetProcessID() const
void SetProcessID(lldb::pid_t pid)
FileSpec & GetExecutableFile()
uint32_t GetUserID() const
Environment & GetEnvironment()
void SetUserID(uint32_t uid)
ArchSpec & GetArchitecture()
NameMatch GetNameMatchType() const
bool Matches(const ProcessInstanceInfo &proc_info) const
bool GetMatchAllUsers() const
ProcessInstanceInfo & GetProcessInfo()
bool ProcessIDsMatch(const ProcessInstanceInfo &proc_info) const
Return true iff the process ID and parent process IDs in this object match the ones in proc_info.
bool UserIDsMatch(const ProcessInstanceInfo &proc_info) const
Return true iff the (both effective and real) user and group IDs in this object match the ones in pro...
void SetEffectiveGroupID(uint32_t gid)
void SetParentProcessID(lldb::pid_t pid)
void SetEffectiveUserID(uint32_t uid)
const FileSpec & GetShell() const
bool MonitorProcess() const
const FileAction * GetFileActionAtIndex(size_t idx) const
const FileAction * GetFileActionForFD(int fd) const
bool GetLaunchInSeparateProcessGroup() const
void SetWorkingDirectory(const FileSpec &working_dir)
const FileSpec & GetWorkingDirectory() const
size_t GetNumFileActions() const
static Status FromErrorStringWithFormat(const char *format,...) __attribute__((format(printf
static Status FromErrorString(const char *str)
bool Fail() const
Test for error condition.
static Status static Status FromErrorStringWithFormatv(const char *format, Args &&...args)
static Status FromError(llvm::Error error)
Avoid using this in new code. Migrate APIs to llvm::Expected instead.
bool Success() const
Test for success condition.
const char * GetData() const
llvm::StringRef GetString() const
void Format(const char *format, Args &&... args)
size_t Printf(const char *format,...) __attribute__((format(printf
Output printf formatted output to the stream.
size_t PutCString(llvm::StringRef cstr)
Output a C string to the stream.
static ObjectSP ParseJSON(llvm::StringRef json_text)
static llvm::Expected< HostThread > LaunchThread(llvm::StringRef name, std::function< lldb::thread_result_t()> thread_function, size_t min_stack_byte_size=0)
uint8_t * GetBytes()
Get a pointer to the data.
#define LLDB_INVALID_CPUTYPE
#define UNUSED_IF_ASSERT_DISABLED(x)
#define LLDB_INVALID_PROCESS_ID
lldb::ByteOrder InlHostByteOrder()
A class that represents a running process on the host machine.
Log * GetLog(Cat mask)
Retrieve the Log object for the channel associated with the given log enum.
bool NameMatches(llvm::StringRef name, NameMatch match_type, llvm::StringRef match)
std::vector< ProcessInstanceInfo > ProcessInstanceInfoList
Severity
Used for expressing severity in logs and diagnostics.
ConnectionStatus
Connection Status Types.
@ eConnectionStatusSuccess
Success.
@ eErrorTypeGeneric
Generic errors that can be any value.
@ eErrorTypePOSIX
POSIX error codes.