12#include <AvailabilityMacros.h>
13#include <TargetConditionals.h>
16#define __XPC_PRIVATE_H__
19#define LaunchUsingXPCRightName "com.apple.lldb.RootDebuggingXPCService"
23#define LauncherXPCServiceAuthKey "auth-key"
24#define LauncherXPCServiceArgPrefxKey "arg"
25#define LauncherXPCServiceEnvPrefxKey "env"
26#define LauncherXPCServiceCPUTypeKey "cpuType"
27#define LauncherXPCServicePosixspawnFlagsKey "posixspawnFlags"
28#define LauncherXPCServiceStdInPathKeyKey "stdInPath"
29#define LauncherXPCServiceStdOutPathKeyKey "stdOutPath"
30#define LauncherXPCServiceStdErrPathKeyKey "stdErrPath"
31#define LauncherXPCServiceChildPIDKey "childPID"
32#define LauncherXPCServiceErrorTypeKey "errorType"
33#define LauncherXPCServiceCodeTypeKey "errorCode"
36#include <bsm/audit_session.h>
39#include "llvm/TargetParser/Host.h"
42#include <crt_externs.h>
52#include <sys/sysctl.h>
74#include "llvm/ADT/ScopeExit.h"
75#include "llvm/Support/Errno.h"
76#include "llvm/Support/FileSystem.h"
78#include "../cfcpp/CFCBundle.h"
79#include "../cfcpp/CFCMutableArray.h"
80#include "../cfcpp/CFCMutableDictionary.h"
81#include "../cfcpp/CFCReleaser.h"
82#include "../cfcpp/CFCString.h"
84#include <objc/objc-auto.h>
87#include <CoreFoundation/CoreFoundation.h>
88#include <Foundation/Foundation.h>
90#ifndef _POSIX_SPAWN_DISABLE_ASLR
91#define _POSIX_SPAWN_DISABLE_ASLR 0x0100
106 if (__builtin_available(macos 10.12, iOS 10, tvOS 10, watchOS 3, *)) {
108 g_os_log = os_log_create(
"com.apple.dt.lldb",
"lldb");
110 os_log(
g_os_log,
"%{public}s", message.str().c_str());
112 llvm::errs() << message;
118#if defined(__APPLE__)
121 if (file.
GetPath(path,
sizeof(path))) {
123 if (bundle.GetPath(path,
sizeof(path))) {
124 bundle_directory.
SetFile(path, FileSpec::Style::native);
130 bundle_directory.
Clear();
135#if defined(__APPLE__)
138 if (file.
GetPath(path,
sizeof(path))) {
142 if (::CFURLGetFileSystemRepresentation(url.get(), YES, (UInt8 *)path,
144 file.
SetFile(path, FileSpec::Style::native);
156static void *AcceptPIDFromInferior(
const char *connect_url) {
161 ::memset(pid_str, 0,
sizeof(pid_str));
163 const size_t pid_str_len = file_conn.
Read(
164 pid_str,
sizeof(pid_str), std::chrono::seconds(0), status, NULL);
165 if (pid_str_len > 0) {
166 int pid = atoi(pid_str);
167 return (
void *)(intptr_t)pid;
173const char *applscript_in_new_tty =
"tell application \"Terminal\"\n"
175 " do script \"/bin/bash -c '%s';exit\"\n"
178const char *applscript_in_existing_tty =
"\
179set the_shell_script to \"/bin/bash -c '%s';exit\"\n\
180tell application \"Terminal\"\n\
181 repeat with the_window in (get windows)\n\
182 repeat with the_tab in tabs of the_window\n\
183 set the_tty to tty in the_tab\n\
184 if the_tty contains \"%s\" then\n\
185 if the_tab is not busy then\n\
186 set selected of the_tab to true\n\
187 set frontmost of the_window to true\n\
188 do script the_shell_script in the_tab\n\
194 do script the_shell_script\n\
198LaunchInNewTerminalWithAppleScript(
const char *exe_path,
201 char unix_socket_name[
PATH_MAX] =
"/tmp/XXXXXX";
202 if (::mktemp(unix_socket_name) == NULL) {
203 error.SetErrorString(
"failed to make temporary path for a unix socket");
208 FileSpec darwin_debug_file_spec = HostInfo::GetSupportExeDir();
209 if (!darwin_debug_file_spec) {
210 error.SetErrorString(
"can't locate the 'darwin-debug' executable");
214 darwin_debug_file_spec.
SetFilename(
"darwin-debug");
217 error.SetErrorStringWithFormat(
218 "the 'darwin-debug' executable doesn't exists at '%s'",
219 darwin_debug_file_spec.
GetPath().c_str());
224 darwin_debug_file_spec.
GetPath(launcher_path,
sizeof(launcher_path));
232 command.
Printf(R
"(\"%s\" --unix-socket=%s)", launcher_path, unix_socket_name);
239 command.
Printf(R
"( --working-dir \"%s\")", working_dir.GetPath().c_str());
243 command.
Printf(R
"( --working-dir \"%s\")", cwd);
246 if (launch_info.
GetFlags().
Test(eLaunchFlagDisableASLR))
257 auto host_entry = host_env.find(KV.first());
258 if (host_entry == host_env.end() || host_entry->second != KV.second)
266 for (
size_t i = 0; argv[i] != NULL; ++i) {
268 command.
Printf(R
"( \"%s\")", exe_path);
270 command.
Printf(R
"( \"%s\")", argv[i]);
273 command.
Printf(R
"( \"%s\")", exe_path);
275 command.PutCString(" ; echo Process exited with status $?");
276 if (launch_info.
GetFlags().
Test(lldb::eLaunchFlagCloseTTYOnExit))
281 applescript_source.
Printf(applscript_in_new_tty,
284 NSAppleScript *applescript = [[NSAppleScript alloc]
285 initWithSource:[NSString stringWithCString:applescript_source.
GetString()
288 encoding:NSUTF8StringEncoding]];
295 char connect_url[128];
296 ::snprintf(connect_url,
sizeof(connect_url),
"unix-accept://%s",
306 unix_socket_name, [&] {
return AcceptPIDFromInferior(connect_url); });
309 return Status(accept_thread.takeError());
311 [applescript executeAndReturnError:nil];
314 lldb_error = accept_thread->Join(&accept_thread_result);
315 if (lldb_error.
Success() && accept_thread_result) {
316 pid = (intptr_t)accept_thread_result;
319 llvm::sys::fs::remove(unix_socket_name);
320 [applescript release];
332 return llvm::errorCodeToError(
333 std::error_code(ENOTSUP, std::system_category()));
337 const std::string file_path = file_spec.
GetPath();
339 LLDB_LOG(log,
"Sending {0}:{1} to external editor",
340 file_path.empty() ?
"<invalid>" : file_path, line_no);
342 if (file_path.empty())
343 return llvm::createStringError(llvm::inconvertibleErrorCode(),
344 "no file specified");
346 CFCString file_cfstr(file_path.c_str(), kCFStringEncodingUTF8);
350 kCFURLPOSIXPathStyle,
354 return llvm::createStringError(
355 llvm::inconvertibleErrorCode(),
356 llvm::formatv(
"could not create CFURL from path \"{0}\"", file_path));
369 BabelAESelInfo file_and_line_info = {
371 (int16_t)(line_no - 1),
378 AEKeyDesc file_and_line_desc;
379 file_and_line_desc.descKey = keyAEPosition;
380 long error = ::AECreateDesc(typeUTF8Text,
382 sizeof(file_and_line_info),
383 &(file_and_line_desc.descContent));
386 return llvm::createStringError(
387 llvm::inconvertibleErrorCode(),
388 llvm::formatv(
"creating Apple Event descriptor failed: error {0}",
392 auto on_exit = llvm::make_scope_exit(
393 [&]() { AEDisposeDesc(&(file_and_line_desc.descContent)); });
395 if (editor.empty()) {
396 if (
const char *lldb_external_editor = ::getenv(
"LLDB_EXTERNAL_EDITOR"))
397 editor = lldb_external_editor;
400 std::optional<FSRef> app_fsref;
401 if (!editor.empty()) {
402 LLDB_LOG(log,
"Looking for external editor: {0}", editor);
405 CFCString editor_name(editor.data(), kCFStringEncodingUTF8);
406 long app_error = ::LSFindApplicationForInfo(
407 kLSUnknownCreator, NULL,
408 editor_name.get(), &(*app_fsref),
410 if (app_error != noErr)
411 return llvm::createStringError(
412 llvm::inconvertibleErrorCode(),
413 llvm::formatv(
"could not find external editor \"{0}\": "
414 "LSFindApplicationForInfo returned error {1}",
419 LSApplicationParameters app_params;
420 ::memset(&app_params, 0,
sizeof(app_params));
422 kLSLaunchDefaults | kLSLaunchDontAddToRecents | kLSLaunchDontSwitch;
424 app_params.application = &(*app_fsref);
426 ProcessSerialNumber psn;
427 std::array<CFURLRef, 1> file_array = {file_URL.
get()};
429 CFArrayCreate(NULL, (
const void **)&file_array,
431 error = ::LSOpenURLsWithRole(
432 cf_array.get(), kLSRolesEditor,
434 &app_params, &psn, 1);
437 return llvm::createStringError(
438 llvm::inconvertibleErrorCode(),
439 llvm::formatv(
"LSOpenURLsWithRole failed: error {0}",
error));
441 return llvm::Error::success();
449 auditinfo_addr_t info;
450 getaudit_addr(&info,
sizeof(info));
451 return info.ai_flags & AU_SESSION_FLAG_HAS_GRAPHIC_ACCESS;
460 int mib[CTL_MAXNAME] = {
463 size_t mib_len = CTL_MAXNAME;
464 if (::sysctlnametomib(
"sysctl.proc_cputype", mib, &mib_len))
471 size_t len =
sizeof(cpu);
472 if (::sysctl(mib, mib_len, &cpu, &len, 0, 0) == 0) {
475 sub = CPU_SUBTYPE_I386_ALL;
477 case CPU_TYPE_X86_64:
478 sub = CPU_SUBTYPE_X86_64_ALL;
481#if defined(CPU_TYPE_ARM64) && defined(CPU_SUBTYPE_ARM64_ALL)
483 sub = CPU_SUBTYPE_ARM64_ALL;
487#if defined(CPU_TYPE_ARM64_32) && defined(CPU_SUBTYPE_ARM64_32_ALL)
489 sub = CPU_SUBTYPE_ARM64_32_ALL;
497 uint32_t cpusubtype = 0;
498 len =
sizeof(cpusubtype);
499 if (::sysctlbyname(
"hw.cpusubtype", &cpusubtype, &len, NULL, 0) == 0)
502 bool host_cpu_is_64bit;
503 uint32_t is64bit_capable;
504 size_t is64bit_capable_len =
sizeof(is64bit_capable);
506 sysctlbyname(
"hw.cpu64bit_capable", &is64bit_capable,
507 &is64bit_capable_len, NULL, 0) == 0;
514 if (host_cpu_is_64bit) {
515 sub = CPU_SUBTYPE_ARM_V7;
533 int proc_args_mib[3] = {CTL_KERN, KERN_PROCARGS2,
536 size_t arg_data_size = 0;
537 if (::sysctl(proc_args_mib, 3,
nullptr, &arg_data_size, NULL, 0) ||
539 arg_data_size = 8192;
546 if (::sysctl(proc_args_mib, 3, arg_data.
GetBytes(), &arg_data_size, NULL,
551 uint32_t argc = data.
GetU32(&offset);
553 const llvm::Triple::ArchType triple_arch = triple.getArch();
554 const bool check_for_ios_simulator =
555 (triple_arch == llvm::Triple::x86 ||
556 triple_arch == llvm::Triple::x86_64);
557 const char *cstr = data.
GetCStr(&offset);
561 if (match_info_ptr == NULL ||
568 const uint8_t *p = data.
PeekData(offset, 1);
569 if ((p == NULL) || (*p !=
'\0'))
575 for (
int i = 0; i < static_cast<int>(argc); ++i) {
582 while ((cstr = data.
GetCStr(&offset))) {
586 if (check_for_ios_simulator) {
587 if (strncmp(cstr,
"SIMULATOR_UDID=", strlen(
"SIMULATOR_UDID=")) ==
593 llvm::Triple::MacOSX);
611 mib[2] = KERN_PROC_PID;
613 struct kinfo_proc proc_kinfo;
614 size_t proc_kinfo_size =
sizeof(
struct kinfo_proc);
616 if (::sysctl(mib, 4, &proc_kinfo, &proc_kinfo_size, NULL, 0) == 0) {
617 if (proc_kinfo_size > 0) {
619 process_info.
SetUserID(proc_kinfo.kp_eproc.e_pcred.p_ruid);
620 process_info.
SetGroupID(proc_kinfo.kp_eproc.e_pcred.p_rgid);
622 if (proc_kinfo.kp_eproc.e_ucred.cr_ngroups > 0)
624 proc_kinfo.kp_eproc.e_ucred.cr_groups[0]);
641 std::vector<struct kinfo_proc> kinfos;
643 int mib[3] = {CTL_KERN, KERN_PROC, KERN_PROC_ALL};
645 size_t pid_data_size = 0;
646 if (::sysctl(mib, 3,
nullptr, &pid_data_size,
nullptr, 0) != 0)
650 const size_t estimated_pid_count =
651 (pid_data_size /
sizeof(
struct kinfo_proc)) + 10;
653 kinfos.resize(estimated_pid_count);
654 pid_data_size = kinfos.size() *
sizeof(
struct kinfo_proc);
656 if (::sysctl(mib, 3, &kinfos[0], &pid_data_size,
nullptr, 0) != 0)
659 const size_t actual_pid_count = (pid_data_size /
sizeof(
struct kinfo_proc));
663 const uid_t our_uid = getuid();
664 for (
size_t i = 0; i < actual_pid_count; i++) {
665 const struct kinfo_proc &kinfo = kinfos[i];
667 bool kinfo_user_matches =
false;
669 kinfo_user_matches =
true;
671 kinfo_user_matches = kinfo.kp_eproc.e_pcred.p_ruid == our_uid;
675 kinfo_user_matches =
true;
677 if (!kinfo_user_matches ||
680 kinfo.kp_proc.p_pid == 0 ||
681 kinfo.kp_proc.p_stat == SZOMB ||
682 kinfo.kp_proc.p_flag & P_TRACED ||
683 kinfo.kp_proc.p_flag & P_WEXIT)
689 process_info.
SetUserID(kinfo.kp_eproc.e_pcred.p_ruid);
690 process_info.
SetGroupID(kinfo.kp_eproc.e_pcred.p_rgid);
692 if (kinfo.kp_eproc.e_ucred.cr_ngroups > 0)
706 if (match_info.
Matches(process_info))
707 process_infos.push_back(process_info);
711 return process_infos.size();
716 bool success =
false;
732 process_info.
Clear();
737static void PackageXPCArguments(xpc_object_t message,
const char *prefix,
741 memset(buf, 0,
sizeof(buf));
742 snprintf(buf,
sizeof(buf),
"%sCount", prefix);
743 xpc_dictionary_set_int64(message, buf, count);
744 for (
size_t i = 0; i < count; i++) {
745 memset(buf, 0,
sizeof(buf));
746 snprintf(buf,
sizeof(buf),
"%s%zi", prefix, i);
751static void PackageXPCEnvironment(xpc_object_t message, llvm::StringRef prefix,
753 xpc_dictionary_set_int64(message, (prefix +
"Count").str().c_str(),
756 for (
const auto &KV : env) {
757 xpc_dictionary_set_string(message, (prefix + llvm::Twine(i)).str().c_str(),
768static AuthorizationRef authorizationRef = NULL;
773 if ((launch_info.
GetUserID() == 0) && !authorizationRef) {
774 OSStatus createStatus =
775 AuthorizationCreate(NULL, kAuthorizationEmptyEnvironment,
776 kAuthorizationFlagDefaults, &authorizationRef);
777 if (createStatus != errAuthorizationSuccess) {
779 error.SetErrorString(
"Can't create authorizationRef.");
784 OSStatus rightsStatus =
785 AuthorizationRightGet(LaunchUsingXPCRightName, NULL);
786 if (rightsStatus != errAuthorizationSuccess) {
789 CFSTR(
"Xcode is trying to take control of a root process.");
791 CFTypeRef values[] = {prompt};
792 CFDictionaryRef promptDict = CFDictionaryCreate(
793 kCFAllocatorDefault, (
const void **)keys, (
const void **)values, 1,
794 &kCFCopyStringDictionaryKeyCallBacks,
795 &kCFTypeDictionaryValueCallBacks);
797 CFStringRef keys1[] = {CFSTR(
"class"), CFSTR(
"group"), CFSTR(
"comment"),
798 CFSTR(
"default-prompt"), CFSTR(
"shared")};
799 CFTypeRef values1[] = {CFSTR(
"user"), CFSTR(
"admin"),
800 CFSTR(LaunchUsingXPCRightName), promptDict,
802 CFDictionaryRef dict = CFDictionaryCreate(
803 kCFAllocatorDefault, (
const void **)keys1, (
const void **)values1, 5,
804 &kCFCopyStringDictionaryKeyCallBacks,
805 &kCFTypeDictionaryValueCallBacks);
806 rightsStatus = AuthorizationRightSet(
807 authorizationRef, LaunchUsingXPCRightName, dict, NULL, NULL, NULL);
808 CFRelease(promptDict);
812 OSStatus copyRightStatus = errAuthorizationDenied;
813 if (rightsStatus == errAuthorizationSuccess) {
814 AuthorizationItem item1 = {LaunchUsingXPCRightName, 0, NULL, 0};
815 AuthorizationItem items[] = {item1};
816 AuthorizationRights requestedRights = {1, items};
817 AuthorizationFlags authorizationFlags =
818 kAuthorizationFlagInteractionAllowed | kAuthorizationFlagExtendRights;
819 copyRightStatus = AuthorizationCopyRights(
820 authorizationRef, &requestedRights, kAuthorizationEmptyEnvironment,
821 authorizationFlags, NULL);
824 if (copyRightStatus != errAuthorizationSuccess) {
831 error.SetErrorStringWithFormat(
832 "Launching as root needs root authorization.");
835 if (authorizationRef) {
836 AuthorizationFree(authorizationRef, kAuthorizationFlagDefaults);
837 authorizationRef = NULL;
847 short flags = POSIX_SPAWN_SETSIGDEF | POSIX_SPAWN_SETSIGMASK;
850 flags |= POSIX_SPAWN_SETEXEC;
853 flags |= POSIX_SPAWN_START_SUSPENDED;
855 if (launch_info.
GetFlags().
Test(eLaunchFlagDisableASLR))
859 flags |= POSIX_SPAWN_SETPGROUP;
861#ifdef POSIX_SPAWN_CLOEXEC_DEFAULT
862#if defined(__x86_64__) || defined(__i386__)
867 llvm::VersionTuple version = HostInfo::GetOSVersion();
868 if (version > llvm::VersionTuple(10, 7)) {
879 flags |= POSIX_SPAWN_CLOEXEC_DEFAULT;
894 uid_t requested_uid = launch_info.
GetUserID();
895 const char *xpc_service = nil;
896 bool send_auth =
false;
897 AuthorizationExternalForm extForm;
898 if (requested_uid == 0) {
899 if (AuthorizationMakeExternalForm(authorizationRef, &extForm) ==
900 errAuthorizationSuccess) {
904 error.SetErrorStringWithFormat(
"Launching root via XPC needs to "
905 "externalize authorization reference.");
909 xpc_service = LaunchUsingXPCRightName;
912 error.SetErrorStringWithFormat(
913 "Launching via XPC is only currently available for root.");
918 xpc_connection_t conn = xpc_connection_create(xpc_service, NULL);
920 xpc_connection_set_event_handler(conn, ^(xpc_object_t event) {
921 xpc_type_t type = xpc_get_type(event);
923 if (type == XPC_TYPE_ERROR) {
924 if (event == XPC_ERROR_CONNECTION_INTERRUPTED) {
931 }
else if (event == XPC_ERROR_CONNECTION_INVALID) {
948 xpc_connection_set_finalizer_f(conn, xpc_finalizer_t(xpc_release));
949 xpc_connection_resume(conn);
950 xpc_object_t message = xpc_dictionary_create(nil, nil, 0);
953 xpc_dictionary_set_data(message, LauncherXPCServiceAuthKey, extForm.bytes,
954 sizeof(AuthorizationExternalForm));
957 PackageXPCArguments(message, LauncherXPCServiceArgPrefxKey,
959 PackageXPCEnvironment(message, LauncherXPCServiceEnvPrefxKey,
963 xpc_dictionary_set_int64(message, LauncherXPCServiceCPUTypeKey,
965 xpc_dictionary_set_int64(message, LauncherXPCServicePosixspawnFlagsKey,
968 if (file_action && !file_action->
GetPath().empty()) {
969 xpc_dictionary_set_string(message, LauncherXPCServiceStdInPathKeyKey,
970 file_action->
GetPath().str().c_str());
973 if (file_action && !file_action->
GetPath().empty()) {
974 xpc_dictionary_set_string(message, LauncherXPCServiceStdOutPathKeyKey,
975 file_action->
GetPath().str().c_str());
978 if (file_action && !file_action->
GetPath().empty()) {
979 xpc_dictionary_set_string(message, LauncherXPCServiceStdErrPathKeyKey,
980 file_action->
GetPath().str().c_str());
984 xpc_connection_send_message_with_reply_sync(conn, message);
985 xpc_type_t returnType = xpc_get_type(reply);
986 if (returnType == XPC_TYPE_DICTIONARY) {
987 pid = xpc_dictionary_get_int64(reply, LauncherXPCServiceChildPIDKey);
990 xpc_dictionary_get_int64(reply, LauncherXPCServiceErrorTypeKey);
992 xpc_dictionary_get_int64(reply, LauncherXPCServiceCodeTypeKey);
995 error.SetErrorStringWithFormat(
996 "Problems with launching via XPC. Error type : %i, code : %i",
997 errorType, errorCode);
1000 if (authorizationRef) {
1001 AuthorizationFree(authorizationRef, kAuthorizationFlagDefaults);
1002 authorizationRef = NULL;
1005 }
else if (returnType == XPC_TYPE_ERROR) {
1007 error.SetErrorStringWithFormat(
1008 "Problems with launching via XPC. XPC error : %s",
1009 xpc_dictionary_get_string(reply, XPC_ERROR_KEY_DESCRIPTION));
1025 posix_spawn_file_actions_t *file_actions =
1026 static_cast<posix_spawn_file_actions_t *
>(_file_actions);
1034 if (info->
GetFD() == -1)
1035 error.SetErrorString(
1036 "invalid fd for posix_spawn_file_actions_addclose(...)");
1039 ::posix_spawn_file_actions_addclose(file_actions, info->
GetFD()),
1043 "error: {0}, posix_spawn_file_actions_addclose "
1044 "(action={1}, fd={2})",
1050 if (info->
GetFD() == -1)
1051 error.SetErrorString(
1052 "invalid fd for posix_spawn_file_actions_adddup2(...)");
1054 error.SetErrorString(
1055 "invalid duplicate fd for posix_spawn_file_actions_adddup2(...)");
1058 ::posix_spawn_file_actions_adddup2(file_actions, info->
GetFD(),
1063 "error: {0}, posix_spawn_file_actions_adddup2 "
1064 "(action={1}, fd={2}, dup_fd={3})",
1070 if (info->
GetFD() == -1)
1071 error.SetErrorString(
1072 "invalid fd in posix_spawn_file_actions_addopen(...)");
1078 if (oflag & O_CREAT)
1081 error.SetError(::posix_spawn_file_actions_addopen(
1082 file_actions, info->
GetFD(),
1083 info->
GetPath().str().c_str(), oflag, mode),
1087 "error: {0}, posix_spawn_file_actions_addopen (action={1}, "
1088 "fd={2}, path='{3}', oflag={4}, mode={5})",
1094 return error.Success();
1103 posix_spawnattr_t attr;
1107 LLDB_LOG(log,
"error: {0}, ::posix_spawnattr_init ( &attr )",
error);
1113 llvm::make_scope_exit([&]() { posix_spawnattr_destroy(&attr); });
1115 sigset_t no_signals;
1116 sigset_t all_signals;
1117 sigemptyset(&no_signals);
1118 sigfillset(&all_signals);
1119 ::posix_spawnattr_setsigmask(&attr, &no_signals);
1120 ::posix_spawnattr_setsigdefault(&attr, &all_signals);
1127 "error: {0}, ::posix_spawnattr_setflags ( &attr, flags={1:x} )",
1132 bool is_graphical =
true;
1135 SecuritySessionId session_id;
1136 SessionAttributeBits session_attributes;
1138 SessionGetInfo(callerSecuritySession, &session_id, &session_attributes);
1139 if (status == errSessionSuccess)
1140 is_graphical = session_attributes & sessionHasGraphicAccess;
1146 if (is_graphical && launch_info.
GetFlags().
Test(eLaunchFlagDebug) &&
1147 !launch_info.
GetFlags().
Test(eLaunchFlagInheritTCCFromParent)) {
1150 LLDB_LOG(log,
"error: {0}, setup_posix_spawn_responsible_flag(&attr)",
1164 const bool set_cpu_type =
1167 const bool set_cpu_subtype =
1173 typedef int (*posix_spawnattr_setarchpref_np_t)(
1175 posix_spawnattr_setarchpref_np_t posix_spawnattr_setarchpref_np_fn =
1176 (posix_spawnattr_setarchpref_np_t)dlsym(
1177 RTLD_DEFAULT,
"posix_spawnattr_setarchpref_np");
1178 if (set_cpu_subtype && posix_spawnattr_setarchpref_np_fn) {
1179 error.SetError((*posix_spawnattr_setarchpref_np_fn)(
1180 &attr, 1, &cpu_type, &cpu_subtype, &ocount),
1184 "error: {0}, ::posix_spawnattr_setarchpref_np ( &attr, 1, "
1185 "cpu_type = {1:x}, cpu_subtype = {1:x}, count => {2} )",
1186 error, cpu_type, cpu_subtype, ocount);
1188 if (
error.Fail() || ocount != 1)
1192 ::posix_spawnattr_setbinpref_np(&attr, 1, &cpu_type, &ocount),
1196 "error: {0}, ::posix_spawnattr_setbinpref_np ( &attr, 1, "
1197 "cpu_type = {1:x}, count => {2} )",
1198 error, cpu_type, ocount);
1199 if (
error.Fail() || ocount != 1)
1205 const char *tmp_argv[2];
1206 char *
const *argv =
const_cast<char *
const *
>(
1214 tmp_argv[0] = exe_path;
1216 argv =
const_cast<char *
const *
>(tmp_argv);
1222 std::string working_dir_path = working_dir.
GetPath();
1224 if (errno == ENOENT) {
1225 error.SetErrorStringWithFormat(
"No such file or directory: %s",
1226 working_dir_path.c_str());
1227 }
else if (errno == ENOTDIR) {
1228 error.SetErrorStringWithFormat(
"Path doesn't name a directory: %s",
1229 working_dir_path.c_str());
1231 error.SetErrorStringWithFormat(
"An unknown error occurred when "
1232 "changing directory for process "
1241 if (num_file_actions > 0) {
1242 posix_spawn_file_actions_t file_actions;
1243 error.SetError(::posix_spawn_file_actions_init(&file_actions),
1247 "error: {0}, ::posix_spawn_file_actions_init ( &file_actions )",
1253 auto cleanup_fileact = llvm::make_scope_exit(
1254 [&]() { posix_spawn_file_actions_destroy(&file_actions); });
1256 for (
size_t i = 0; i < num_file_actions; ++i) {
1259 if (launch_file_action) {
1267 ::posix_spawnp(&result_pid, exe_path, &file_actions, &attr, argv, envp),
1272 "error: {0}, ::posix_spawnp(pid => {1}, path = '{2}', "
1273 "file_actions = {3}, "
1274 "attr = {4}, argv = {5}, envp = {6} )",
1275 error, result_pid, exe_path, &file_actions, &attr, argv,
1278 for (
int ii = 0; argv[ii]; ++ii)
1279 LLDB_LOG(log,
"argv[{0}] = '{1}'", ii, argv[ii]);
1285 ::posix_spawnp(&result_pid, exe_path, NULL, &attr, argv, envp),
1290 "error: {0}, ::posix_spawnp ( pid => {1}, path = '{2}', "
1291 "file_actions = NULL, attr = {3}, argv = {4}, envp = {5} )",
1292 error, result_pid, exe_path, &attr, argv, envp.
get());
1294 for (
int ii = 0; argv[ii]; ++ii)
1295 LLDB_LOG(log,
"argv[{0}] = '{1}'", ii, argv[ii]);
1310 bool result =
false;
1313 bool launchingAsRoot = launch_info.
GetUserID() == 0;
1314 bool currentUserIsRoot = HostInfo::GetEffectiveUserID() == 0;
1316 if (launchingAsRoot && !currentUserIsRoot) {
1331 if (!fs.
Exists(exe_spec))
1334 if (!fs.
Exists(exe_spec))
1337 if (!fs.
Exists(exe_spec)) {
1338 error.SetErrorStringWithFormatv(
"executable doesn't exist: '{0}'",
1343 if (launch_info.
GetFlags().
Test(eLaunchFlagLaunchInTTY)) {
1345 return LaunchInNewTerminalWithAppleScript(exe_spec.GetPath().c_str(),
1348 error.SetErrorString(
"launching a process in a new terminal is not "
1349 "supported on iOS devices");
1356 auto exe_path = exe_spec.GetPath();
1373 if (
error.Success())
1374 error.SetErrorString(
"process launch failed for unknown reasons");
1381 if (launch_info.
GetFlags().
Test(eLaunchFlagShellExpandArguments)) {
1382 FileSpec expand_tool_spec = HostInfo::GetSupportExeDir();
1383 if (!expand_tool_spec) {
1384 error.SetErrorString(
1385 "could not get support executable directory for lldb-argdumper tool");
1390 error.SetErrorStringWithFormat(
1391 "could not find the lldb-argdumper tool: %s",
1392 expand_tool_spec.
GetPath().c_str());
1397 expand_tool_spec_stream.
Printf(
"\"%s\"",
1398 expand_tool_spec.
GetPath().c_str());
1400 Args expand_command(expand_tool_spec_stream.
GetData());
1401 expand_command.AppendArguments(launch_info.
GetArguments());
1407 char *wd = getcwd(
nullptr, 0);
1408 if (wd ==
nullptr) {
1409 error.SetErrorStringWithFormat(
1410 "cwd does not exist; cannot launch with shell argument expansion");
1418 bool run_in_shell =
true;
1419 bool hide_stderr =
true;
1422 std::chrono::seconds(10), run_in_shell, hide_stderr);
1428 error.SetErrorStringWithFormat(
"lldb-argdumper exited with error %d",
1435 error.SetErrorString(
"invalid JSON");
1439 auto dict_sp = data_sp->GetAsDictionary();
1441 error.SetErrorString(
"invalid JSON");
1445 auto args_sp = dict_sp->GetObjectForDotSeparatedPath(
"arguments");
1447 error.SetErrorString(
"invalid JSON");
1451 auto args_array_sp = args_sp->GetAsArray();
1452 if (!args_array_sp) {
1453 error.SetErrorString(
"invalid JSON");
1459 for (
size_t i = 0; i < args_array_sp->GetSize(); i++) {
1460 auto item_sp = args_array_sp->GetItemAtIndex(i);
1463 auto str_sp = item_sp->GetAsString();
1476 unsigned long mask = DISPATCH_PROC_EXIT;
1480 dispatch_source_t source = ::dispatch_source_create(
1481 DISPATCH_SOURCE_TYPE_PROC, pid, mask,
1482 ::dispatch_get_global_queue(DISPATCH_QUEUE_PRIORITY_DEFAULT, 0));
1485 "Host::StartMonitoringChildProcess(callback, pid=%i) source = %p\n",
1486 static_cast<int>(pid),
static_cast<void *
>(source));
1490 ::dispatch_source_set_cancel_handler(source, ^{
1491 dispatch_release(source);
1493 ::dispatch_source_set_event_handler(source, ^{
1497 wait_pid = llvm::sys::RetryAfterSignal(-1, ::waitpid, pid, &status, 0);
1498 if (wait_pid >= 0) {
1500 int exit_status = 0;
1501 const char *status_cstr = NULL;
1502 if (WIFEXITED(status)) {
1503 exit_status = WEXITSTATUS(status);
1504 status_cstr =
"EXITED";
1505 }
else if (WIFSIGNALED(status)) {
1506 signal = WTERMSIG(status);
1507 status_cstr =
"SIGNALED";
1510 llvm_unreachable(
"Unknown status");
1514 "::waitpid (pid = %llu, &status, 0) => pid = %i, status "
1515 "= 0x%8.8x (%s), signal = %i, exit_status = %i",
1516 pid, wait_pid, status, status_cstr, signal, exit_status);
1519 callback_copy(pid, signal, exit_status);
1521 ::dispatch_source_cancel(source);
1525 ::dispatch_resume(source);
static llvm::raw_ostream & error(Stream &strm)
#define CPU_SUBTYPE_X86_64_H
#define CPU_TYPE_ARM64_32
static Status LaunchProcessPosixSpawn(const char *exe_path, const ProcessLaunchInfo &launch_info, lldb::pid_t &pid)
static Status LaunchProcessXPC(const char *exe_path, ProcessLaunchInfo &launch_info, lldb::pid_t &pid)
static short GetPosixspawnFlags(const ProcessLaunchInfo &launch_info)
#define _POSIX_SPAWN_DISABLE_ASLR
int __pthread_chdir(const char *path)
static bool GetMacOSXProcessUserAndGroup(ProcessInstanceInfo &process_info)
static std::once_flag g_os_log_once
static bool GetMacOSXProcessCPUType(ProcessInstanceInfo &process_info)
int __pthread_fchdir(int fildes)
static bool ShouldLaunchUsingXPC(ProcessLaunchInfo &launch_info)
static bool AddPosixSpawnFileAction(void *_file_actions, const FileAction *info, Log *log, Status &error)
static bool GetMacOSXProcessArgs(const ProcessInstanceInfoMatch *match_info_ptr, ProcessInstanceInfo &process_info)
#define LLDB_LOG(log,...)
The LLDB_LOG* macros defined below are the way to emit log messages.
#define LLDB_LOGF(log,...)
static int setup_posix_spawn_responsible_flag(posix_spawnattr_t *attr)
An architecture specification class.
bool IsValid() const
Tests if this ArchSpec is valid.
void Clear()
Clears the object state.
llvm::Triple & GetTriple()
Architecture triple accessor.
bool SetArchitecture(ArchitectureType arch_type, uint32_t cpu, uint32_t sub, uint32_t os=0)
Change the architecture object type, CPU type and OS type.
uint32_t GetMachOCPUSubType() const
uint32_t GetMachOCPUType() const
const char * GetArchitectureName() const
Returns a static string representing the current architecture.
A command line argument class.
size_t GetArgumentCount() const
Gets the number of arguments left in this command object.
void AppendArgument(llvm::StringRef arg_str, char quote_char='\0')
Appends a new argument to the end of the list argument list.
const char * GetArgumentAtIndex(size_t idx) const
Gets the NULL terminated C string argument pointer for the argument at index idx.
const char ** GetConstArgumentVector() const
Gets the argument vector.
void Clear()
Clear the arguments.
lldb::ConnectionStatus Connect(llvm::StringRef url, Status *error_ptr) override
Connect using the connect string url.
size_t Read(void *dst, size_t dst_len, const Timeout< std::micro > &timeout, lldb::ConnectionStatus &status, Status *error_ptr) override
The read function that attempts to read from the connection.
const char * GetCString() const
Get the string value as a C string.
A subclass of DataBuffer that stores a data buffer on the heap.
lldb::offset_t GetByteSize() const override
Get the number of bytes in the data buffer.
char *const * get() const
static std::string compose(const value_type &KeyValue)
std::pair< iterator, bool > insert(llvm::StringRef KeyEqValue)
llvm::StringRef GetPath() const
int GetActionArgument() const
void SetFile(llvm::StringRef path, Style style)
Change the file specified with a new path.
void AppendPathComponent(llvm::StringRef component)
const ConstString & GetFilename() const
Filename string const get accessor.
size_t GetPath(char *path, size_t max_path_length, bool denormalize=true) const
Extract the full path to the file.
void Clear()
Clears the object state.
void SetFilename(ConstString filename)
Filename string set accessor.
void Resolve(llvm::SmallVectorImpl< char > &path)
Resolve path to make it canonical.
bool ResolveExecutableLocation(FileSpec &file_spec)
Call into the Host to see if it can help find the file.
bool Exists(const FileSpec &file_spec) const
Returns whether the given file exists.
static FileSystem & Instance()
bool Test(ValueType bit) const
Test a single flag bit.
static Status LaunchProcess(ProcessLaunchInfo &launch_info)
Launch the process specified in launch_info.
static bool ResolveExecutableInBundle(FileSpec &file)
When executable files may live within a directory, where the directory represents an executable bundl...
static Status ShellExpandArguments(ProcessLaunchInfo &launch_info)
Perform expansion of the command-line for this launch info This can potentially involve wildcard expa...
static Status RunShellCommand(llvm::StringRef command, const FileSpec &working_dir, int *status_ptr, int *signo_ptr, std::string *command_output, const Timeout< std::micro > &timeout, bool run_in_shell=true, bool hide_stderr=false)
Run a shell command.
static Environment GetEnvironment()
static void SystemLog(llvm::StringRef message)
Emit the given message to the operating system log.
static uint32_t FindProcessesImpl(const ProcessInstanceInfoMatch &match_info, ProcessInstanceInfoList &proc_infos)
static bool GetProcessInfo(lldb::pid_t pid, ProcessInstanceInfo &proc_info)
std::function< void(lldb::pid_t pid, int signal, int status)> MonitorChildProcessCallback
static llvm::Expected< HostThread > StartMonitoringChildProcess(const MonitorChildProcessCallback &callback, lldb::pid_t pid)
Start monitoring a child process.
static bool IsInteractiveGraphicSession()
Check if we're running in an interactive graphical session.
static bool GetBundleDirectory(const FileSpec &file, FileSpec &bundle_directory)
If you have an executable that is in a bundle and want to get back to the bundle directory from the p...
static llvm::Error OpenFileInExternalEditor(llvm::StringRef editor, const FileSpec &file_spec, uint32_t line_no)
void SetGroupID(uint32_t gid)
bool ProcessIDIsValid() const
const char * GetName() const
lldb::pid_t GetProcessID() const
void SetProcessID(lldb::pid_t pid)
FileSpec & GetExecutableFile()
uint32_t GetUserID() const
Environment & GetEnvironment()
void SetUserID(uint32_t uid)
ArchSpec & GetArchitecture()
NameMatch GetNameMatchType() const
bool Matches(const ProcessInstanceInfo &proc_info) const
bool GetMatchAllUsers() const
ProcessInstanceInfo & GetProcessInfo()
bool ProcessIDsMatch(const ProcessInstanceInfo &proc_info) const
Return true iff the process ID and parent process IDs in this object match the ones in proc_info.
bool UserIDsMatch(const ProcessInstanceInfo &proc_info) const
Return true iff the (both effective and real) user and group IDs in this object match the ones in pro...
void SetEffectiveGroupID(uint32_t gid)
void SetParentProcessID(lldb::pid_t pid)
void SetEffectiveUserID(uint32_t uid)
const FileSpec & GetShell() const
bool MonitorProcess() const
const FileAction * GetFileActionAtIndex(size_t idx) const
const FileAction * GetFileActionForFD(int fd) const
bool GetLaunchInSeparateProcessGroup() const
void SetWorkingDirectory(const FileSpec &working_dir)
const FileSpec & GetWorkingDirectory() const
size_t GetNumFileActions() const
bool Fail() const
Test for error condition.
bool Success() const
Test for success condition.
const char * GetData() const
llvm::StringRef GetString() const
void Format(const char *format, Args &&... args)
size_t Printf(const char *format,...) __attribute__((format(printf
Output printf formatted output to the stream.
size_t PutCString(llvm::StringRef cstr)
Output a C string to the stream.
static ObjectSP ParseJSON(llvm::StringRef json_text)
static llvm::Expected< HostThread > LaunchThread(llvm::StringRef name, std::function< lldb::thread_result_t()> thread_function, size_t min_stack_byte_size=0)
uint8_t * GetBytes()
Get a pointer to the data.
#define LLDB_INVALID_CPUTYPE
#define UNUSED_IF_ASSERT_DISABLED(x)
#define LLDB_INVALID_PROCESS_ID
lldb::ByteOrder InlHostByteOrder()
A class that represents a running process on the host machine.
Log * GetLog(Cat mask)
Retrieve the Log object for the channel associated with the given log enum.
bool NameMatches(llvm::StringRef name, NameMatch match_type, llvm::StringRef match)
std::vector< ProcessInstanceInfo > ProcessInstanceInfoList
ConnectionStatus
Connection Status Types.
@ eConnectionStatusSuccess
Success.
@ eErrorTypeGeneric
Generic errors that can be any value.
@ eErrorTypePOSIX
POSIX error codes.