12#include <AvailabilityMacros.h>
13#include <TargetConditionals.h>
16#define __XPC_PRIVATE_H__
19#define LaunchUsingXPCRightName "com.apple.lldb.RootDebuggingXPCService"
23#define LauncherXPCServiceAuthKey "auth-key"
24#define LauncherXPCServiceArgPrefxKey "arg"
25#define LauncherXPCServiceEnvPrefxKey "env"
26#define LauncherXPCServiceCPUTypeKey "cpuType"
27#define LauncherXPCServicePosixspawnFlagsKey "posixspawnFlags"
28#define LauncherXPCServiceStdInPathKeyKey "stdInPath"
29#define LauncherXPCServiceStdOutPathKeyKey "stdOutPath"
30#define LauncherXPCServiceStdErrPathKeyKey "stdErrPath"
31#define LauncherXPCServiceChildPIDKey "childPID"
32#define LauncherXPCServiceErrorTypeKey "errorType"
33#define LauncherXPCServiceCodeTypeKey "errorCode"
36#include <bsm/audit_session.h>
39#include "llvm/TargetParser/Host.h"
42#include <crt_externs.h>
52#include <sys/sysctl.h>
74#include "llvm/ADT/ScopeExit.h"
75#include "llvm/Support/Errno.h"
76#include "llvm/Support/FileSystem.h"
78#include "../cfcpp/CFCBundle.h"
79#include "../cfcpp/CFCMutableArray.h"
80#include "../cfcpp/CFCMutableDictionary.h"
81#include "../cfcpp/CFCReleaser.h"
82#include "../cfcpp/CFCString.h"
84#include <objc/objc-auto.h>
87#include <CoreFoundation/CoreFoundation.h>
88#include <Foundation/Foundation.h>
90#ifndef _POSIX_SPAWN_DISABLE_ASLR
91#define _POSIX_SPAWN_DISABLE_ASLR 0x0100
106 if (__builtin_available(macos 10.12, iOS 10, tvOS 10, watchOS 3, *)) {
108 g_os_log = os_log_create(
"com.apple.dt.lldb",
"lldb");
113 os_log(
g_os_log,
"%{public}s", message.str().c_str());
116 os_log_error(
g_os_log,
"%{public}s", message.str().c_str());
120 llvm::errs() << message;
126#if defined(__APPLE__)
129 if (file.
GetPath(path,
sizeof(path))) {
131 if (bundle.GetPath(path,
sizeof(path))) {
132 bundle_directory.
SetFile(path, FileSpec::Style::native);
138 bundle_directory.
Clear();
143#if defined(__APPLE__)
146 if (file.
GetPath(path,
sizeof(path))) {
150 if (::CFURLGetFileSystemRepresentation(url.get(), YES, (UInt8 *)path,
152 file.
SetFile(path, FileSpec::Style::native);
164static void *AcceptPIDFromInferior(
const char *connect_url) {
169 ::memset(pid_str, 0,
sizeof(pid_str));
171 const size_t pid_str_len = file_conn.
Read(
172 pid_str,
sizeof(pid_str), std::chrono::seconds(0), status, NULL);
173 if (pid_str_len > 0) {
174 int pid = atoi(pid_str);
175 return (
void *)(intptr_t)pid;
181const char *applscript_in_new_tty =
"tell application \"Terminal\"\n"
183 " do script \"/bin/bash -c '%s';exit\"\n"
186const char *applscript_in_existing_tty =
"\
187set the_shell_script to \"/bin/bash -c '%s';exit\"\n\
188tell application \"Terminal\"\n\
189 repeat with the_window in (get windows)\n\
190 repeat with the_tab in tabs of the_window\n\
191 set the_tty to tty in the_tab\n\
192 if the_tty contains \"%s\" then\n\
193 if the_tab is not busy then\n\
194 set selected of the_tab to true\n\
195 set frontmost of the_window to true\n\
196 do script the_shell_script in the_tab\n\
202 do script the_shell_script\n\
206LaunchInNewTerminalWithAppleScript(
const char *exe_path,
209 char unix_socket_name[
PATH_MAX] =
"/tmp/XXXXXX";
210 if (::mktemp(unix_socket_name) == NULL) {
212 "failed to make temporary path for a unix socket");
217 FileSpec darwin_debug_file_spec = HostInfo::GetSupportExeDir();
218 if (!darwin_debug_file_spec) {
224 darwin_debug_file_spec.
SetFilename(
"darwin-debug");
228 "the 'darwin-debug' executable doesn't exists at '%s'",
229 darwin_debug_file_spec.
GetPath().c_str());
234 darwin_debug_file_spec.
GetPath(launcher_path,
sizeof(launcher_path));
242 command.
Printf(R
"(\"%s\" --unix-socket=%s)", launcher_path, unix_socket_name);
249 command.
Printf(R
"( --working-dir \"%s\")", working_dir.GetPath().c_str());
253 command.
Printf(R
"( --working-dir \"%s\")", cwd);
256 if (launch_info.
GetFlags().
Test(eLaunchFlagDisableASLR))
267 auto host_entry = host_env.find(KV.first());
268 if (host_entry == host_env.end() || host_entry->second != KV.second)
276 for (
size_t i = 0; argv[i] != NULL; ++i) {
278 command.
Printf(R
"( \"%s\")", exe_path);
280 command.
Printf(R
"( \"%s\")", argv[i]);
283 command.
Printf(R
"( \"%s\")", exe_path);
285 command.PutCString(" ; echo Process exited with status $?");
286 if (launch_info.
GetFlags().
Test(lldb::eLaunchFlagCloseTTYOnExit))
291 applescript_source.
Printf(applscript_in_new_tty,
294 NSAppleScript *applescript = [[NSAppleScript alloc]
295 initWithSource:[NSString stringWithCString:applescript_source.
GetString()
298 encoding:NSUTF8StringEncoding]];
305 char connect_url[128];
306 ::snprintf(connect_url,
sizeof(connect_url),
"unix-accept://%s",
316 unix_socket_name, [&] {
return AcceptPIDFromInferior(connect_url); });
321 [applescript executeAndReturnError:nil];
324 lldb_error = accept_thread->Join(&accept_thread_result);
325 if (lldb_error.
Success() && accept_thread_result) {
326 pid = (intptr_t)accept_thread_result;
329 llvm::sys::fs::remove(unix_socket_name);
330 [applescript release];
342 return llvm::errorCodeToError(
343 std::error_code(ENOTSUP, std::system_category()));
347 const std::string file_path = file_spec.
GetPath();
349 LLDB_LOG(log,
"Sending {0}:{1} to external editor",
350 file_path.empty() ?
"<invalid>" : file_path, line_no);
352 if (file_path.empty())
353 return llvm::createStringError(llvm::inconvertibleErrorCode(),
354 "no file specified");
356 CFCString file_cfstr(file_path.c_str(), kCFStringEncodingUTF8);
360 kCFURLPOSIXPathStyle,
364 return llvm::createStringError(
365 llvm::inconvertibleErrorCode(),
366 llvm::formatv(
"could not create CFURL from path \"{0}\"", file_path));
379 BabelAESelInfo file_and_line_info = {
381 (int16_t)(line_no - 1),
388 AEKeyDesc file_and_line_desc;
389 file_and_line_desc.descKey = keyAEPosition;
390 long error = ::AECreateDesc(typeUTF8Text,
392 sizeof(file_and_line_info),
393 &(file_and_line_desc.descContent));
396 return llvm::createStringError(
397 llvm::inconvertibleErrorCode(),
398 llvm::formatv(
"creating Apple Event descriptor failed: error {0}",
402 auto on_exit = llvm::make_scope_exit(
403 [&]() { AEDisposeDesc(&(file_and_line_desc.descContent)); });
405 if (editor.empty()) {
406 if (
const char *lldb_external_editor = ::getenv(
"LLDB_EXTERNAL_EDITOR"))
407 editor = lldb_external_editor;
410 std::optional<FSRef> app_fsref;
411 if (!editor.empty()) {
412 LLDB_LOG(log,
"Looking for external editor: {0}", editor);
415 CFCString editor_name(editor.data(), kCFStringEncodingUTF8);
416 long app_error = ::LSFindApplicationForInfo(
417 kLSUnknownCreator, NULL,
418 editor_name.get(), &(*app_fsref),
420 if (app_error != noErr)
421 return llvm::createStringError(
422 llvm::inconvertibleErrorCode(),
423 llvm::formatv(
"could not find external editor \"{0}\": "
424 "LSFindApplicationForInfo returned error {1}",
429 LSApplicationParameters app_params;
430 ::memset(&app_params, 0,
sizeof(app_params));
432 kLSLaunchDefaults | kLSLaunchDontAddToRecents | kLSLaunchDontSwitch;
434 app_params.application = &(*app_fsref);
436 ProcessSerialNumber psn;
437 std::array<CFURLRef, 1> file_array = {file_URL.
get()};
439 CFArrayCreate(NULL, (
const void **)&file_array,
441 error = ::LSOpenURLsWithRole(
442 cf_array.get(), kLSRolesEditor,
444 &app_params, &psn, 1);
447 return llvm::createStringError(
448 llvm::inconvertibleErrorCode(),
449 llvm::formatv(
"LSOpenURLsWithRole failed: error {0}",
error));
451 return llvm::Error::success();
459 auditinfo_addr_t info;
460 getaudit_addr(&info,
sizeof(info));
461 return info.ai_flags & AU_SESSION_FLAG_HAS_GRAPHIC_ACCESS;
470 int mib[CTL_MAXNAME] = {
473 size_t mib_len = CTL_MAXNAME;
474 if (::sysctlnametomib(
"sysctl.proc_cputype", mib, &mib_len))
481 size_t len =
sizeof(cpu);
482 if (::sysctl(mib, mib_len, &cpu, &len, 0, 0) == 0) {
485 sub = CPU_SUBTYPE_I386_ALL;
487 case CPU_TYPE_X86_64:
488 sub = CPU_SUBTYPE_X86_64_ALL;
491#if defined(CPU_TYPE_ARM64) && defined(CPU_SUBTYPE_ARM64_ALL)
493 sub = CPU_SUBTYPE_ARM64_ALL;
497#if defined(CPU_TYPE_ARM64_32) && defined(CPU_SUBTYPE_ARM64_32_ALL)
499 sub = CPU_SUBTYPE_ARM64_32_ALL;
507 uint32_t cpusubtype = 0;
508 len =
sizeof(cpusubtype);
509 if (::sysctlbyname(
"hw.cpusubtype", &cpusubtype, &len, NULL, 0) == 0)
512 bool host_cpu_is_64bit;
513 uint32_t is64bit_capable;
514 size_t is64bit_capable_len =
sizeof(is64bit_capable);
516 sysctlbyname(
"hw.cpu64bit_capable", &is64bit_capable,
517 &is64bit_capable_len, NULL, 0) == 0;
524 if (host_cpu_is_64bit) {
525 sub = CPU_SUBTYPE_ARM_V7;
543 int proc_args_mib[3] = {CTL_KERN, KERN_PROCARGS2,
546 size_t arg_data_size = 0;
547 if (::sysctl(proc_args_mib, 3,
nullptr, &arg_data_size, NULL, 0) ||
549 arg_data_size = 8192;
556 if (::sysctl(proc_args_mib, 3, arg_data.
GetBytes(), &arg_data_size, NULL,
561 uint32_t argc = data.
GetU32(&offset);
563 const llvm::Triple::ArchType triple_arch = triple.getArch();
564 const bool check_for_ios_simulator =
565 (triple_arch == llvm::Triple::x86 ||
566 triple_arch == llvm::Triple::x86_64);
567 const char *cstr = data.
GetCStr(&offset);
571 if (match_info_ptr == NULL ||
578 const uint8_t *p = data.
PeekData(offset, 1);
579 if ((p == NULL) || (*p !=
'\0'))
585 for (
int i = 0; i < static_cast<int>(argc); ++i) {
592 while ((cstr = data.
GetCStr(&offset))) {
596 if (check_for_ios_simulator) {
597 if (strncmp(cstr,
"SIMULATOR_UDID=", strlen(
"SIMULATOR_UDID=")) ==
603 llvm::Triple::MacOSX);
621 mib[2] = KERN_PROC_PID;
623 struct kinfo_proc proc_kinfo;
624 size_t proc_kinfo_size =
sizeof(
struct kinfo_proc);
626 if (::sysctl(mib, 4, &proc_kinfo, &proc_kinfo_size, NULL, 0) == 0) {
627 if (proc_kinfo_size > 0) {
629 process_info.
SetUserID(proc_kinfo.kp_eproc.e_pcred.p_ruid);
630 process_info.
SetGroupID(proc_kinfo.kp_eproc.e_pcred.p_rgid);
632 if (proc_kinfo.kp_eproc.e_ucred.cr_ngroups > 0)
634 proc_kinfo.kp_eproc.e_ucred.cr_groups[0]);
651 std::vector<struct kinfo_proc> kinfos;
653 int mib[3] = {CTL_KERN, KERN_PROC, KERN_PROC_ALL};
655 size_t pid_data_size = 0;
656 if (::sysctl(mib, 3,
nullptr, &pid_data_size,
nullptr, 0) != 0)
660 const size_t estimated_pid_count =
661 (pid_data_size /
sizeof(
struct kinfo_proc)) + 10;
663 kinfos.resize(estimated_pid_count);
664 pid_data_size = kinfos.size() *
sizeof(
struct kinfo_proc);
666 if (::sysctl(mib, 3, &kinfos[0], &pid_data_size,
nullptr, 0) != 0)
669 const size_t actual_pid_count = (pid_data_size /
sizeof(
struct kinfo_proc));
673 const uid_t our_uid = getuid();
674 for (
size_t i = 0; i < actual_pid_count; i++) {
675 const struct kinfo_proc &kinfo = kinfos[i];
677 bool kinfo_user_matches =
false;
679 kinfo_user_matches =
true;
681 kinfo_user_matches = kinfo.kp_eproc.e_pcred.p_ruid == our_uid;
685 kinfo_user_matches =
true;
687 if (!kinfo_user_matches ||
690 kinfo.kp_proc.p_pid == 0 ||
691 kinfo.kp_proc.p_stat == SZOMB ||
692 kinfo.kp_proc.p_flag & P_TRACED ||
693 kinfo.kp_proc.p_flag & P_WEXIT)
699 process_info.
SetUserID(kinfo.kp_eproc.e_pcred.p_ruid);
700 process_info.
SetGroupID(kinfo.kp_eproc.e_pcred.p_rgid);
702 if (kinfo.kp_eproc.e_ucred.cr_ngroups > 0)
716 if (match_info.
Matches(process_info))
717 process_infos.push_back(process_info);
721 return process_infos.size();
726 bool success =
false;
742 process_info.
Clear();
747static void PackageXPCArguments(xpc_object_t message,
const char *prefix,
751 memset(buf, 0,
sizeof(buf));
752 snprintf(buf,
sizeof(buf),
"%sCount", prefix);
753 xpc_dictionary_set_int64(message, buf, count);
754 for (
size_t i = 0; i < count; i++) {
755 memset(buf, 0,
sizeof(buf));
756 snprintf(buf,
sizeof(buf),
"%s%zi", prefix, i);
761static void PackageXPCEnvironment(xpc_object_t message, llvm::StringRef prefix,
763 xpc_dictionary_set_int64(message, (prefix +
"Count").str().c_str(),
766 for (
const auto &KV : env) {
767 xpc_dictionary_set_string(message, (prefix + llvm::Twine(i)).str().c_str(),
778static AuthorizationRef authorizationRef = NULL;
783 if ((launch_info.
GetUserID() == 0) && !authorizationRef) {
784 OSStatus createStatus =
785 AuthorizationCreate(NULL, kAuthorizationEmptyEnvironment,
786 kAuthorizationFlagDefaults, &authorizationRef);
787 if (createStatus != errAuthorizationSuccess) {
794 OSStatus rightsStatus =
795 AuthorizationRightGet(LaunchUsingXPCRightName, NULL);
796 if (rightsStatus != errAuthorizationSuccess) {
799 CFSTR(
"Xcode is trying to take control of a root process.");
801 CFTypeRef values[] = {prompt};
802 CFDictionaryRef promptDict = CFDictionaryCreate(
803 kCFAllocatorDefault, (
const void **)keys, (
const void **)values, 1,
804 &kCFCopyStringDictionaryKeyCallBacks,
805 &kCFTypeDictionaryValueCallBacks);
807 CFStringRef keys1[] = {CFSTR(
"class"), CFSTR(
"group"), CFSTR(
"comment"),
808 CFSTR(
"default-prompt"), CFSTR(
"shared")};
809 CFTypeRef values1[] = {CFSTR(
"user"), CFSTR(
"admin"),
810 CFSTR(LaunchUsingXPCRightName), promptDict,
812 CFDictionaryRef dict = CFDictionaryCreate(
813 kCFAllocatorDefault, (
const void **)keys1, (
const void **)values1, 5,
814 &kCFCopyStringDictionaryKeyCallBacks,
815 &kCFTypeDictionaryValueCallBacks);
816 rightsStatus = AuthorizationRightSet(
817 authorizationRef, LaunchUsingXPCRightName, dict, NULL, NULL, NULL);
818 CFRelease(promptDict);
822 OSStatus copyRightStatus = errAuthorizationDenied;
823 if (rightsStatus == errAuthorizationSuccess) {
824 AuthorizationItem item1 = {LaunchUsingXPCRightName, 0, NULL, 0};
825 AuthorizationItem items[] = {item1};
826 AuthorizationRights requestedRights = {1, items};
827 AuthorizationFlags authorizationFlags =
828 kAuthorizationFlagInteractionAllowed | kAuthorizationFlagExtendRights;
829 copyRightStatus = AuthorizationCopyRights(
830 authorizationRef, &requestedRights, kAuthorizationEmptyEnvironment,
831 authorizationFlags, NULL);
834 if (copyRightStatus != errAuthorizationSuccess) {
842 "Launching as root needs root authorization.");
845 if (authorizationRef) {
846 AuthorizationFree(authorizationRef, kAuthorizationFlagDefaults);
847 authorizationRef = NULL;
857 short flags = POSIX_SPAWN_SETSIGDEF | POSIX_SPAWN_SETSIGMASK;
860 flags |= POSIX_SPAWN_SETEXEC;
863 flags |= POSIX_SPAWN_START_SUSPENDED;
865 if (launch_info.
GetFlags().
Test(eLaunchFlagDisableASLR))
869 flags |= POSIX_SPAWN_SETPGROUP;
871#ifdef POSIX_SPAWN_CLOEXEC_DEFAULT
872#if defined(__x86_64__) || defined(__i386__)
877 llvm::VersionTuple version = HostInfo::GetOSVersion();
878 if (version > llvm::VersionTuple(10, 7)) {
889 flags |= POSIX_SPAWN_CLOEXEC_DEFAULT;
895 xpc_release((xpc_object_t)xpc_object);
908 uid_t requested_uid = launch_info.
GetUserID();
909 const char *xpc_service = nil;
910 bool send_auth =
false;
911 AuthorizationExternalForm extForm;
912 if (requested_uid == 0) {
913 if (AuthorizationMakeExternalForm(authorizationRef, &extForm) ==
914 errAuthorizationSuccess) {
919 "Launching root via XPC needs to "
920 "externalize authorization reference.");
924 xpc_service = LaunchUsingXPCRightName;
928 "Launching via XPC is only currently available for root.");
933 xpc_connection_t conn = xpc_connection_create(xpc_service, NULL);
935 xpc_connection_set_event_handler(conn, ^(xpc_object_t event) {
936 xpc_type_t type = xpc_get_type(event);
938 if (type == XPC_TYPE_ERROR) {
939 if (event == XPC_ERROR_CONNECTION_INTERRUPTED) {
946 }
else if (event == XPC_ERROR_CONNECTION_INVALID) {
964 xpc_connection_resume(conn);
965 xpc_object_t message = xpc_dictionary_create(nil, nil, 0);
968 xpc_dictionary_set_data(message, LauncherXPCServiceAuthKey, extForm.bytes,
969 sizeof(AuthorizationExternalForm));
972 PackageXPCArguments(message, LauncherXPCServiceArgPrefxKey,
974 PackageXPCEnvironment(message, LauncherXPCServiceEnvPrefxKey,
978 xpc_dictionary_set_int64(message, LauncherXPCServiceCPUTypeKey,
980 xpc_dictionary_set_int64(message, LauncherXPCServicePosixspawnFlagsKey,
983 if (file_action && !file_action->
GetPath().empty()) {
984 xpc_dictionary_set_string(message, LauncherXPCServiceStdInPathKeyKey,
985 file_action->
GetPath().str().c_str());
988 if (file_action && !file_action->
GetPath().empty()) {
989 xpc_dictionary_set_string(message, LauncherXPCServiceStdOutPathKeyKey,
990 file_action->
GetPath().str().c_str());
993 if (file_action && !file_action->
GetPath().empty()) {
994 xpc_dictionary_set_string(message, LauncherXPCServiceStdErrPathKeyKey,
995 file_action->
GetPath().str().c_str());
999 xpc_connection_send_message_with_reply_sync(conn, message);
1000 xpc_type_t returnType = xpc_get_type(reply);
1001 if (returnType == XPC_TYPE_DICTIONARY) {
1002 pid = xpc_dictionary_get_int64(reply, LauncherXPCServiceChildPIDKey);
1005 xpc_dictionary_get_int64(reply, LauncherXPCServiceErrorTypeKey);
1007 xpc_dictionary_get_int64(reply, LauncherXPCServiceCodeTypeKey);
1011 "Problems with launching via XPC. Error type : %i, code : %i",
1012 errorType, errorCode);
1015 if (authorizationRef) {
1016 AuthorizationFree(authorizationRef, kAuthorizationFlagDefaults);
1017 authorizationRef = NULL;
1020 }
else if (returnType == XPC_TYPE_ERROR) {
1023 "Problems with launching via XPC. XPC error : %s",
1024 xpc_dictionary_get_string(reply, XPC_ERROR_KEY_DESCRIPTION));
1040 posix_spawn_file_actions_t *file_actions =
1041 static_cast<posix_spawn_file_actions_t *
>(_file_actions);
1049 if (info->
GetFD() == -1)
1051 "invalid fd for posix_spawn_file_actions_addclose(...)");
1054 ::posix_spawn_file_actions_addclose(file_actions, info->
GetFD()),
1058 "error: {0}, posix_spawn_file_actions_addclose "
1059 "(action={1}, fd={2})",
1065 if (info->
GetFD() == -1)
1067 "invalid fd for posix_spawn_file_actions_adddup2(...)");
1070 "invalid duplicate fd for posix_spawn_file_actions_adddup2(...)");
1073 Status(::posix_spawn_file_actions_adddup2(file_actions, info->
GetFD(),
1078 "error: {0}, posix_spawn_file_actions_adddup2 "
1079 "(action={1}, fd={2}, dup_fd={3})",
1085 if (info->
GetFD() == -1)
1087 "invalid fd in posix_spawn_file_actions_addopen(...)");
1093 if (oflag & O_CREAT)
1096 error =
Status(::posix_spawn_file_actions_addopen(
1097 file_actions, info->
GetFD(),
1098 info->
GetPath().str().c_str(), oflag, mode),
1102 "error: {0}, posix_spawn_file_actions_addopen (action={1}, "
1103 "fd={2}, path='{3}', oflag={4}, mode={5})",
1109 return error.Success();
1118 posix_spawnattr_t attr;
1122 LLDB_LOG(log,
"error: {0}, ::posix_spawnattr_init ( &attr )",
error);
1128 llvm::make_scope_exit([&]() { posix_spawnattr_destroy(&attr); });
1130 sigset_t no_signals;
1131 sigset_t all_signals;
1132 sigemptyset(&no_signals);
1133 sigfillset(&all_signals);
1134 ::posix_spawnattr_setsigmask(&attr, &no_signals);
1135 ::posix_spawnattr_setsigdefault(&attr, &all_signals);
1142 "error: {0}, ::posix_spawnattr_setflags ( &attr, flags={1:x} )",
1147 bool is_graphical =
true;
1150 SecuritySessionId session_id;
1151 SessionAttributeBits session_attributes;
1153 SessionGetInfo(callerSecuritySession, &session_id, &session_attributes);
1154 if (status == errSessionSuccess)
1155 is_graphical = session_attributes & sessionHasGraphicAccess;
1161 if (is_graphical && launch_info.
GetFlags().
Test(eLaunchFlagDebug) &&
1162 !launch_info.
GetFlags().
Test(eLaunchFlagInheritTCCFromParent)) {
1165 LLDB_LOG(log,
"error: {0}, setup_posix_spawn_responsible_flag(&attr)",
1179 const bool set_cpu_type =
1182 const bool set_cpu_subtype =
1188 typedef int (*posix_spawnattr_setarchpref_np_t)(
1190 posix_spawnattr_setarchpref_np_t posix_spawnattr_setarchpref_np_fn =
1191 (posix_spawnattr_setarchpref_np_t)dlsym(
1192 RTLD_DEFAULT,
"posix_spawnattr_setarchpref_np");
1193 if (set_cpu_subtype && posix_spawnattr_setarchpref_np_fn) {
1194 error =
Status((*posix_spawnattr_setarchpref_np_fn)(
1195 &attr, 1, &cpu_type, &cpu_subtype, &ocount),
1199 "error: {0}, ::posix_spawnattr_setarchpref_np ( &attr, 1, "
1200 "cpu_type = {1:x}, cpu_subtype = {1:x}, count => {2} )",
1201 error, cpu_type, cpu_subtype, ocount);
1203 if (
error.Fail() || ocount != 1)
1207 ::posix_spawnattr_setbinpref_np(&attr, 1, &cpu_type, &ocount),
1211 "error: {0}, ::posix_spawnattr_setbinpref_np ( &attr, 1, "
1212 "cpu_type = {1:x}, count => {2} )",
1213 error, cpu_type, ocount);
1214 if (
error.Fail() || ocount != 1)
1220 const char *tmp_argv[2];
1221 char *
const *argv =
const_cast<char *
const *
>(
1229 tmp_argv[0] = exe_path;
1231 argv =
const_cast<char *
const *
>(tmp_argv);
1237 std::string working_dir_path = working_dir.
GetPath();
1239 if (errno == ENOENT) {
1241 "No such file or directory: %s", working_dir_path.c_str());
1242 }
else if (errno == ENOTDIR) {
1244 "Path doesn't name a directory: %s", working_dir_path.c_str());
1248 "changing directory for process "
1257 if (num_file_actions > 0) {
1258 posix_spawn_file_actions_t file_actions;
1263 "error: {0}, ::posix_spawn_file_actions_init ( &file_actions )",
1269 auto cleanup_fileact = llvm::make_scope_exit(
1270 [&]() { posix_spawn_file_actions_destroy(&file_actions); });
1272 for (
size_t i = 0; i < num_file_actions; ++i) {
1275 if (launch_file_action) {
1283 ::posix_spawnp(&result_pid, exe_path, &file_actions, &attr, argv, envp),
1288 "error: {0}, ::posix_spawnp(pid => {1}, path = '{2}', "
1289 "file_actions = {3}, "
1290 "attr = {4}, argv = {5}, envp = {6} )",
1291 error, result_pid, exe_path, &file_actions, &attr, argv,
1294 for (
int ii = 0; argv[ii]; ++ii)
1295 LLDB_LOG(log,
"argv[{0}] = '{1}'", ii, argv[ii]);
1301 Status(::posix_spawnp(&result_pid, exe_path, NULL, &attr, argv, envp),
1306 "error: {0}, ::posix_spawnp ( pid => {1}, path = '{2}', "
1307 "file_actions = NULL, attr = {3}, argv = {4}, envp = {5} )",
1308 error, result_pid, exe_path, &attr, argv, envp.
get());
1310 for (
int ii = 0; argv[ii]; ++ii)
1311 LLDB_LOG(log,
"argv[{0}] = '{1}'", ii, argv[ii]);
1326 bool result =
false;
1329 bool launchingAsRoot = launch_info.
GetUserID() == 0;
1330 bool currentUserIsRoot = HostInfo::GetEffectiveUserID() == 0;
1332 if (launchingAsRoot && !currentUserIsRoot) {
1347 if (!fs.
Exists(exe_spec))
1350 if (!fs.
Exists(exe_spec))
1353 if (!fs.
Exists(exe_spec)) {
1355 "executable doesn't exist: '{0}'", exe_spec);
1359 if (launch_info.
GetFlags().
Test(eLaunchFlagLaunchInTTY)) {
1361 return LaunchInNewTerminalWithAppleScript(exe_spec.GetPath().c_str(),
1366 "supported on iOS devices");
1373 auto exe_path = exe_spec.GetPath();
1390 if (
error.Success())
1399 if (launch_info.
GetFlags().
Test(eLaunchFlagShellExpandArguments)) {
1402 std::string env_argdumper_path = host_env.lookup(
"LLDB_ARGDUMPER_PATH");
1403 if (!env_argdumper_path.empty()) {
1404 expand_tool_spec.
SetFile(env_argdumper_path, FileSpec::Style::native);
1407 "lldb-argdumper exe path set from environment variable: %s",
1408 env_argdumper_path.c_str());
1411 if (!argdumper_exists) {
1412 expand_tool_spec = HostInfo::GetSupportExeDir();
1413 if (!expand_tool_spec) {
1415 "could not get support executable directory for "
1416 "lldb-argdumper tool");
1422 "could not find the lldb-argdumper tool: %s",
1423 expand_tool_spec.
GetPath().c_str());
1429 expand_tool_spec_stream.
Printf(
"\"%s\"",
1430 expand_tool_spec.
GetPath().c_str());
1432 Args expand_command(expand_tool_spec_stream.
GetData());
1433 expand_command.AppendArguments(launch_info.
GetArguments());
1439 char *wd = getcwd(
nullptr, 0);
1440 if (wd ==
nullptr) {
1442 "cwd does not exist; cannot launch with shell argument expansion");
1450 bool run_in_shell =
true;
1451 bool hide_stderr =
true;
1454 std::chrono::seconds(10), run_in_shell, hide_stderr);
1461 "lldb-argdumper exited with error %d", status);
1471 auto dict_sp = data_sp->GetAsDictionary();
1477 auto args_sp = dict_sp->GetObjectForDotSeparatedPath(
"arguments");
1483 auto args_array_sp = args_sp->GetAsArray();
1484 if (!args_array_sp) {
1491 for (
size_t i = 0; i < args_array_sp->GetSize(); i++) {
1492 auto item_sp = args_array_sp->GetItemAtIndex(i);
1495 auto str_sp = item_sp->GetAsString();
1508 unsigned long mask = DISPATCH_PROC_EXIT;
1512 dispatch_source_t source = ::dispatch_source_create(
1513 DISPATCH_SOURCE_TYPE_PROC, pid, mask,
1514 ::dispatch_get_global_queue(DISPATCH_QUEUE_PRIORITY_DEFAULT, 0));
1517 "Host::StartMonitoringChildProcess(callback, pid=%i) source = %p\n",
1518 static_cast<int>(pid),
static_cast<void *
>(source));
1522 ::dispatch_source_set_cancel_handler(source, ^{
1523 dispatch_release(source);
1525 ::dispatch_source_set_event_handler(source, ^{
1529 wait_pid = llvm::sys::RetryAfterSignal(-1, ::waitpid, pid, &status, 0);
1530 if (wait_pid >= 0) {
1532 int exit_status = 0;
1533 const char *status_cstr = NULL;
1534 if (WIFEXITED(status)) {
1535 exit_status = WEXITSTATUS(status);
1536 status_cstr =
"EXITED";
1537 }
else if (WIFSIGNALED(status)) {
1538 signal = WTERMSIG(status);
1539 status_cstr =
"SIGNALED";
1542 llvm_unreachable(
"Unknown status");
1546 "::waitpid (pid = %llu, &status, 0) => pid = %i, status "
1547 "= 0x%8.8x (%s), signal = %i, exit_status = %i",
1548 pid, wait_pid, status, status_cstr, signal, exit_status);
1551 callback_copy(pid, signal, exit_status);
1553 ::dispatch_source_cancel(source);
1557 ::dispatch_resume(source);
static llvm::raw_ostream & error(Stream &strm)
#define CPU_SUBTYPE_X86_64_H
#define CPU_TYPE_ARM64_32
static Status LaunchProcessPosixSpawn(const char *exe_path, const ProcessLaunchInfo &launch_info, lldb::pid_t &pid)
static Status LaunchProcessXPC(const char *exe_path, ProcessLaunchInfo &launch_info, lldb::pid_t &pid)
static short GetPosixspawnFlags(const ProcessLaunchInfo &launch_info)
#define _POSIX_SPAWN_DISABLE_ASLR
int __pthread_chdir(const char *path)
static bool GetMacOSXProcessUserAndGroup(ProcessInstanceInfo &process_info)
static std::once_flag g_os_log_once
static bool GetMacOSXProcessCPUType(ProcessInstanceInfo &process_info)
static void finalize_xpc(void *xpc_object)
int __pthread_fchdir(int fildes)
static bool ShouldLaunchUsingXPC(ProcessLaunchInfo &launch_info)
static bool AddPosixSpawnFileAction(void *_file_actions, const FileAction *info, Log *log, Status &error)
static bool GetMacOSXProcessArgs(const ProcessInstanceInfoMatch *match_info_ptr, ProcessInstanceInfo &process_info)
#define LLDB_LOG(log,...)
The LLDB_LOG* macros defined below are the way to emit log messages.
#define LLDB_LOGF(log,...)
static int setup_posix_spawn_responsible_flag(posix_spawnattr_t *attr)
An architecture specification class.
bool IsValid() const
Tests if this ArchSpec is valid.
void Clear()
Clears the object state.
llvm::Triple & GetTriple()
Architecture triple accessor.
bool SetArchitecture(ArchitectureType arch_type, uint32_t cpu, uint32_t sub, uint32_t os=0)
Change the architecture object type, CPU type and OS type.
uint32_t GetMachOCPUSubType() const
uint32_t GetMachOCPUType() const
const char * GetArchitectureName() const
Returns a static string representing the current architecture.
A command line argument class.
size_t GetArgumentCount() const
Gets the number of arguments left in this command object.
void AppendArgument(llvm::StringRef arg_str, char quote_char='\0')
Appends a new argument to the end of the list argument list.
const char * GetArgumentAtIndex(size_t idx) const
Gets the NULL terminated C string argument pointer for the argument at index idx.
const char ** GetConstArgumentVector() const
Gets the argument vector.
void Clear()
Clear the arguments.
lldb::ConnectionStatus Connect(llvm::StringRef url, Status *error_ptr) override
Connect using the connect string url.
size_t Read(void *dst, size_t dst_len, const Timeout< std::micro > &timeout, lldb::ConnectionStatus &status, Status *error_ptr) override
The read function that attempts to read from the connection.
const char * GetCString() const
Get the string value as a C string.
A subclass of DataBuffer that stores a data buffer on the heap.
lldb::offset_t GetByteSize() const override
Get the number of bytes in the data buffer.
char *const * get() const
static std::string compose(const value_type &KeyValue)
std::pair< iterator, bool > insert(llvm::StringRef KeyEqValue)
llvm::StringRef GetPath() const
int GetActionArgument() const
void SetFile(llvm::StringRef path, Style style)
Change the file specified with a new path.
void AppendPathComponent(llvm::StringRef component)
const ConstString & GetFilename() const
Filename string const get accessor.
size_t GetPath(char *path, size_t max_path_length, bool denormalize=true) const
Extract the full path to the file.
void Clear()
Clears the object state.
void SetFilename(ConstString filename)
Filename string set accessor.
void Resolve(llvm::SmallVectorImpl< char > &path)
Resolve path to make it canonical.
bool ResolveExecutableLocation(FileSpec &file_spec)
Call into the Host to see if it can help find the file.
bool Exists(const FileSpec &file_spec) const
Returns whether the given file exists.
static FileSystem & Instance()
bool Test(ValueType bit) const
Test a single flag bit.
static Status LaunchProcess(ProcessLaunchInfo &launch_info)
Launch the process specified in launch_info.
static bool ResolveExecutableInBundle(FileSpec &file)
When executable files may live within a directory, where the directory represents an executable bundl...
static void SystemLog(lldb::Severity severity, llvm::StringRef message)
Emit the given message to the operating system log.
static Status ShellExpandArguments(ProcessLaunchInfo &launch_info)
Perform expansion of the command-line for this launch info This can potentially involve wildcard expa...
static Status RunShellCommand(llvm::StringRef command, const FileSpec &working_dir, int *status_ptr, int *signo_ptr, std::string *command_output, const Timeout< std::micro > &timeout, bool run_in_shell=true, bool hide_stderr=false)
Run a shell command.
static Environment GetEnvironment()
static uint32_t FindProcessesImpl(const ProcessInstanceInfoMatch &match_info, ProcessInstanceInfoList &proc_infos)
static bool GetProcessInfo(lldb::pid_t pid, ProcessInstanceInfo &proc_info)
std::function< void(lldb::pid_t pid, int signal, int status)> MonitorChildProcessCallback
static llvm::Expected< HostThread > StartMonitoringChildProcess(const MonitorChildProcessCallback &callback, lldb::pid_t pid)
Start monitoring a child process.
static bool IsInteractiveGraphicSession()
Check if we're running in an interactive graphical session.
static bool GetBundleDirectory(const FileSpec &file, FileSpec &bundle_directory)
If you have an executable that is in a bundle and want to get back to the bundle directory from the p...
static llvm::Error OpenFileInExternalEditor(llvm::StringRef editor, const FileSpec &file_spec, uint32_t line_no)
void SetGroupID(uint32_t gid)
bool ProcessIDIsValid() const
const char * GetName() const
lldb::pid_t GetProcessID() const
void SetProcessID(lldb::pid_t pid)
FileSpec & GetExecutableFile()
uint32_t GetUserID() const
Environment & GetEnvironment()
void SetUserID(uint32_t uid)
ArchSpec & GetArchitecture()
NameMatch GetNameMatchType() const
bool Matches(const ProcessInstanceInfo &proc_info) const
bool GetMatchAllUsers() const
ProcessInstanceInfo & GetProcessInfo()
bool ProcessIDsMatch(const ProcessInstanceInfo &proc_info) const
Return true iff the process ID and parent process IDs in this object match the ones in proc_info.
bool UserIDsMatch(const ProcessInstanceInfo &proc_info) const
Return true iff the (both effective and real) user and group IDs in this object match the ones in pro...
void SetEffectiveGroupID(uint32_t gid)
void SetParentProcessID(lldb::pid_t pid)
void SetEffectiveUserID(uint32_t uid)
const FileSpec & GetShell() const
bool MonitorProcess() const
const FileAction * GetFileActionAtIndex(size_t idx) const
const FileAction * GetFileActionForFD(int fd) const
bool GetLaunchInSeparateProcessGroup() const
void SetWorkingDirectory(const FileSpec &working_dir)
const FileSpec & GetWorkingDirectory() const
size_t GetNumFileActions() const
static Status FromErrorStringWithFormat(const char *format,...) __attribute__((format(printf
static Status FromErrorString(const char *str)
bool Fail() const
Test for error condition.
static Status static Status FromErrorStringWithFormatv(const char *format, Args &&...args)
static Status FromError(llvm::Error error)
Avoid using this in new code. Migrate APIs to llvm::Expected instead.
bool Success() const
Test for success condition.
const char * GetData() const
llvm::StringRef GetString() const
void Format(const char *format, Args &&... args)
size_t Printf(const char *format,...) __attribute__((format(printf
Output printf formatted output to the stream.
size_t PutCString(llvm::StringRef cstr)
Output a C string to the stream.
static ObjectSP ParseJSON(llvm::StringRef json_text)
static llvm::Expected< HostThread > LaunchThread(llvm::StringRef name, std::function< lldb::thread_result_t()> thread_function, size_t min_stack_byte_size=0)
uint8_t * GetBytes()
Get a pointer to the data.
#define LLDB_INVALID_CPUTYPE
#define UNUSED_IF_ASSERT_DISABLED(x)
#define LLDB_INVALID_PROCESS_ID
lldb::ByteOrder InlHostByteOrder()
A class that represents a running process on the host machine.
Log * GetLog(Cat mask)
Retrieve the Log object for the channel associated with the given log enum.
bool NameMatches(llvm::StringRef name, NameMatch match_type, llvm::StringRef match)
std::vector< ProcessInstanceInfo > ProcessInstanceInfoList
Severity
Used for expressing severity in logs and diagnostics.
ConnectionStatus
Connection Status Types.
@ eConnectionStatusSuccess
Success.
@ eErrorTypeGeneric
Generic errors that can be any value.
@ eErrorTypePOSIX
POSIX error codes.