65 : m_opaque_wp(process_sp) {
96const char *SBProcess::GetShortPluginName() {
118 return this->
operator bool();
120SBProcess::operator bool()
const {
123 ProcessSP process_sp(m_opaque_wp.lock());
124 return ((
bool)process_sp && process_sp->IsValid());
128 const char *stdin_path,
const char *stdout_path,
129 const char *stderr_path,
130 const char *working_directory,
131 uint32_t launch_flags,
bool stop_at_entry,
134 working_directory, launch_flags, stop_at_entry,
error);
138 std::lock_guard<std::recursive_mutex> guard(
139 process_sp->GetTarget().GetAPIMutex());
142 launch_flags |= eLaunchFlagStopAtEntry;
145 FileSpec(working_directory), launch_flags);
146 Module *exe_module = process_sp->GetTarget().GetExecutableModulePointer();
153 error.SetError(process_sp->Launch(launch_info));
156 "must be in eStateConnected to call RemoteLaunch");
162 return error.Success();
171 std::lock_guard<std::recursive_mutex> guard(
172 process_sp->GetTarget().GetAPIMutex());
176 error.SetError(process_sp->Attach(attach_info));
179 "must be in eStateConnected to call RemoteAttachToProcessWithID");
185 return error.Success();
191 uint32_t num_threads = 0;
196 const bool can_update = stop_locker.
TryLock(&process_sp->GetRunLock());
197 std::lock_guard<std::recursive_mutex> guard(
198 process_sp->GetTarget().GetAPIMutex());
199 num_threads = process_sp->GetThreadList().GetSize(can_update);
212 std::lock_guard<std::recursive_mutex> guard(
213 process_sp->GetTarget().GetAPIMutex());
214 thread_sp = process_sp->GetThreadList().GetSelectedThread();
229 std::lock_guard<std::recursive_mutex> guard(
230 process_sp->GetTarget().GetAPIMutex());
231 thread_sp = process_sp->CreateOSPluginThread(tid, context);
245 target_sp = process_sp->GetTarget().shared_from_this();
246 sb_target.
SetSP(target_sp);
259 ret_val = process_sp->PutSTDIN(src, src_len,
error);
268 size_t bytes_read = 0;
272 bytes_read = process_sp->GetSTDOUT(dst, dst_len,
error);
281 size_t bytes_read = 0;
285 bytes_read = process_sp->GetSTDERR(dst, dst_len,
error);
294 size_t bytes_read = 0;
298 bytes_read = process_sp->GetAsyncProfileData(dst, dst_len,
error);
312 FileSP outfile = std::make_shared<NativeFile>(out,
false);
320 if (!out || !out->IsValid())
327 stream.
Printf(
"Process %" PRIu64
" %s\n", process_sp->GetID(),
340 ::snprintf(message,
sizeof(message),
"Process %" PRIu64
" %s\n",
352 std::lock_guard<std::recursive_mutex> guard(
353 process_sp->GetTarget().GetAPIMutex());
354 return process_sp->GetThreadList().SetSelectedThreadByID(
363 bool ret_val =
false;
366 std::lock_guard<std::recursive_mutex> guard(
367 process_sp->GetTarget().GetAPIMutex());
368 ret_val = process_sp->GetThreadList().SetSelectedThreadByID(tid);
377 bool ret_val =
false;
380 std::lock_guard<std::recursive_mutex> guard(
381 process_sp->GetTarget().GetAPIMutex());
382 ret_val = process_sp->GetThreadList().SetSelectedThreadByIndexID(index_id);
396 const bool can_update = stop_locker.
TryLock(&process_sp->GetRunLock());
397 std::lock_guard<std::recursive_mutex> guard(
398 process_sp->GetTarget().GetAPIMutex());
399 thread_sp = process_sp->GetThreadList().GetThreadAtIndex(index, can_update);
409 uint32_t num_queues = 0;
413 if (stop_locker.
TryLock(&process_sp->GetRunLock())) {
414 std::lock_guard<std::recursive_mutex> guard(
415 process_sp->GetTarget().GetAPIMutex());
416 num_queues = process_sp->GetQueueList().GetSize();
431 if (stop_locker.
TryLock(&process_sp->GetRunLock())) {
432 std::lock_guard<std::recursive_mutex> guard(
433 process_sp->GetTarget().GetAPIMutex());
434 queue_sp = process_sp->GetQueueList().GetQueueAtIndex(index);
447 std::lock_guard<std::recursive_mutex> guard(
448 process_sp->GetTarget().GetAPIMutex());
449 if (include_expression_stops)
450 return process_sp->GetStopID();
452 return process_sp->GetLastNaturalStopID();
464 std::lock_guard<std::recursive_mutex> guard(
465 process_sp->GetTarget().GetAPIMutex());
466 event_sp = process_sp->GetStopEventForStopID(stop_id);
467 sb_event.
reset(event_sp);
477 std::lock_guard<std::recursive_mutex> guard(
478 process_sp->GetTarget().GetAPIMutex());
479 process_sp->ForceScriptedState(new_state);
489 std::lock_guard<std::recursive_mutex> guard(
490 process_sp->GetTarget().GetAPIMutex());
491 ret_val = process_sp->GetState();
503 std::lock_guard<std::recursive_mutex> guard(
504 process_sp->GetTarget().GetAPIMutex());
505 exit_status = process_sp->GetExitStatus();
518 std::lock_guard<std::recursive_mutex> guard(
519 process_sp->GetTarget().GetAPIMutex());
529 ret_val = process_sp->GetID();
537 uint32_t ret_val = 0;
540 ret_val = process_sp->GetUniqueID();
550 byteOrder = process_sp->GetTarget().GetArchitecture().GetByteOrder();
561 size = process_sp->GetTarget().GetArchitecture().GetAddressByteSize();
573 std::lock_guard<std::recursive_mutex> guard(
574 process_sp->GetTarget().GetAPIMutex());
576 if (process_sp->GetTarget().GetDebugger().GetAsyncExecution())
577 sb_error.
ref() = process_sp->Resume();
579 sb_error.
ref() = process_sp->ResumeSynchronous(
nullptr);
592 std::lock_guard<std::recursive_mutex> guard(
593 process_sp->GetTarget().GetAPIMutex());
594 sb_error.
SetError(process_sp->Destroy(
false));
607 std::lock_guard<std::recursive_mutex> guard(
608 process_sp->GetTarget().GetAPIMutex());
609 sb_error.
SetError(process_sp->Halt());
622 std::lock_guard<std::recursive_mutex> guard(
623 process_sp->GetTarget().GetAPIMutex());
624 sb_error.
SetError(process_sp->Destroy(
true));
635 bool keep_stopped =
false;
636 return Detach(keep_stopped);
645 std::lock_guard<std::recursive_mutex> guard(
646 process_sp->GetTarget().GetAPIMutex());
647 sb_error.
SetError(process_sp->Detach(keep_stopped));
660 std::lock_guard<std::recursive_mutex> guard(
661 process_sp->GetTarget().GetAPIMutex());
662 sb_error.
SetError(process_sp->Signal(signo));
672 if (
auto process_sp =
GetSP())
683 process_sp->SendAsyncInterrupt();
695 const bool can_update = stop_locker.
TryLock(&process_sp->GetRunLock());
696 std::lock_guard<std::recursive_mutex> guard(
697 process_sp->GetTarget().GetAPIMutex());
698 thread_sp = process_sp->GetThreadList().FindThreadByID(tid, can_update);
713 const bool can_update = stop_locker.
TryLock(&process_sp->GetRunLock());
714 std::lock_guard<std::recursive_mutex> guard(
715 process_sp->GetTarget().GetAPIMutex());
717 process_sp->GetThreadList().FindThreadByIndexID(index_id, can_update);
792 EventSP event_sp =
event.GetSP();
793 EventData *event_data = event_sp ? event_sp->GetData() :
nullptr;
794 return event_data && (event_data->
GetFlavor() ==
816 uint32_t alignment, uint32_t max_matches,
SBError &
error) {
827 if (!stop_locker.
TryLock(&process_sp->GetRunLock())) {
831 std::lock_guard<std::recursive_mutex> guard(
832 process_sp->GetTarget().GetAPIMutex());
833 matches.
m_opaque_up->ref() = process_sp->FindRangesInMemory(
834 reinterpret_cast<const uint8_t *
>(buf), size, ranges.
ref().
ref(),
835 alignment, max_matches,
error.ref());
852 if (!stop_locker.
TryLock(&process_sp->GetRunLock())) {
857 std::lock_guard<std::recursive_mutex> guard(
858 process_sp->GetTarget().GetAPIMutex());
859 return process_sp->FindInMemory(
reinterpret_cast<const uint8_t *
>(buf), size,
860 range.
ref(), alignment,
error.ref());
869 "no buffer provided to read %zu bytes into", dst_len);
873 size_t bytes_read = 0;
879 if (stop_locker.
TryLock(&process_sp->GetRunLock())) {
880 std::lock_guard<std::recursive_mutex> guard(
881 process_sp->GetTarget().GetAPIMutex());
882 bytes_read = process_sp->ReadMemory(addr, dst, dst_len, sb_error.
ref());
897 size_t bytes_read = 0;
901 if (stop_locker.
TryLock(&process_sp->GetRunLock())) {
902 std::lock_guard<std::recursive_mutex> guard(
903 process_sp->GetTarget().GetAPIMutex());
904 bytes_read = process_sp->ReadCStringFromMemory(addr, (
char *)buf, size,
923 if (stop_locker.
TryLock(&process_sp->GetRunLock())) {
924 std::lock_guard<std::recursive_mutex> guard(
925 process_sp->GetTarget().GetAPIMutex());
926 value = process_sp->ReadUnsignedIntegerFromMemory(addr, byte_size, 0,
945 if (stop_locker.
TryLock(&process_sp->GetRunLock())) {
946 std::lock_guard<std::recursive_mutex> guard(
947 process_sp->GetTarget().GetAPIMutex());
948 ptr = process_sp->ReadPointerFromMemory(addr, sb_error.
ref());
962 size_t bytes_written = 0;
968 if (stop_locker.
TryLock(&process_sp->GetRunLock())) {
969 std::lock_guard<std::recursive_mutex> guard(
970 process_sp->GetTarget().GetAPIMutex());
972 process_sp->WriteMemory(addr, src, src_len, sb_error.
ref());
978 return bytes_written;
986 process_sp->GetStatus(status.
ref());
998 Module *exe_module = process_sp->GetTarget().GetExecutableModulePointer();
999 const char *exe_name =
nullptr;
1003 strm.
Printf(
"SBProcess: pid = %" PRIu64
", state = %s, threads = %d%s%s",
1006 exe_name ? exe_name :
"");
1020 PlatformSP platform_sp = process_sp->GetTarget().GetPlatform();
1025 auto expected_data =
1026 platform_sp->FetchExtendedCrashInformation(*process_sp.get());
1032 data.
m_impl_up->SetObjectSP(fetched_data);
1043 std::lock_guard<std::recursive_mutex> guard(
1044 process_sp->GetTarget().GetAPIMutex());
1045 std::optional<uint32_t> actual_num = process_sp->GetWatchpointSlotCount();
1073 if (stop_locker.
TryLock(&process_sp->GetRunLock())) {
1074 std::lock_guard<std::recursive_mutex> guard(
1075 process_sp->GetTarget().GetAPIMutex());
1076 PlatformSP platform_sp = process_sp->GetTarget().GetPlatform();
1077 return platform_sp->LoadImage(process_sp.get(), *sb_local_image_spec,
1078 *sb_remote_image_spec, sb_error.
ref());
1097 if (stop_locker.
TryLock(&process_sp->GetRunLock())) {
1098 std::lock_guard<std::recursive_mutex> guard(
1099 process_sp->GetTarget().GetAPIMutex());
1100 PlatformSP platform_sp = process_sp->GetTarget().GetPlatform();
1101 size_t num_paths = paths.
GetSize();
1102 std::vector<std::string> paths_vec;
1103 paths_vec.reserve(num_paths);
1104 for (
size_t i = 0; i < num_paths; i++)
1108 uint32_t token = platform_sp->LoadImageUsingPaths(
1109 process_sp.get(), *image_spec, paths_vec,
error.ref(), &loaded_spec);
1111 loaded_path = loaded_spec;
1130 if (stop_locker.
TryLock(&process_sp->GetRunLock())) {
1131 std::lock_guard<std::recursive_mutex> guard(
1132 process_sp->GetTarget().GetAPIMutex());
1133 PlatformSP platform_sp = process_sp->GetTarget().GetPlatform();
1135 platform_sp->UnloadImage(process_sp.get(), image_token));
1151 if (stop_locker.
TryLock(&process_sp->GetRunLock())) {
1152 std::lock_guard<std::recursive_mutex> guard(
1153 process_sp->GetTarget().GetAPIMutex());
1154 sb_error.
SetError(process_sp->SendEventData(event_data));
1167 if (process_sp && process_sp->GetSystemRuntime()) {
1178 if (process_sp && process_sp->GetSystemRuntime()) {
1180 const std::vector<ConstString> &names =
1182 if (idx < names.size()) {
1183 return names[idx].AsCString();
1208 std::lock_guard<std::recursive_mutex> guard(
1209 process_sp->GetTarget().GetAPIMutex());
1212 process_sp->GetInstrumentationRuntime(type);
1214 if (!runtime_sp.get())
1217 return runtime_sp->IsActive();
1252 std::lock_guard<std::recursive_mutex> guard(
1253 process_sp->GetTarget().GetAPIMutex());
1274 if (stop_locker.
TryLock(&process_sp->GetRunLock())) {
1275 std::lock_guard<std::recursive_mutex> guard(
1276 process_sp->GetTarget().GetAPIMutex());
1279 process_sp->GetMemoryRegionInfo(load_addr, sb_region_info.
ref());
1296 if (process_sp && stop_locker.
TryLock(&process_sp->GetRunLock())) {
1297 std::lock_guard<std::recursive_mutex> guard(
1298 process_sp->GetTarget().GetAPIMutex());
1300 process_sp->GetMemoryRegions(sb_region_list.
ref());
1303 return sb_region_list;
1312 if (process_sp && process_sp->GetProcessInfo(proc_info)) {
1315 return sb_proc_info;
1324 core_file = process_sp->GetCoreFile();
1337 return process_sp->GetHighmemCodeAddressMask();
1339 return process_sp->GetCodeAddressMask();
1342 return process_sp->GetHighmemDataAddressMask();
1344 return process_sp->GetDataAddressMask();
1347 return process_sp->GetHighmemDataAddressMask();
1349 return process_sp->GetDataAddressMask();
1363 process_sp->SetCodeAddressMask(mask);
1364 process_sp->SetHighmemCodeAddressMask(mask);
1366 process_sp->SetHighmemCodeAddressMask(mask);
1368 process_sp->SetCodeAddressMask(mask);
1373 process_sp->SetDataAddressMask(mask);
1374 process_sp->SetHighmemDataAddressMask(mask);
1376 process_sp->SetHighmemDataAddressMask(mask);
1378 process_sp->SetDataAddressMask(mask);
1383 process_sp->SetCodeAddressMask(mask);
1384 process_sp->SetDataAddressMask(mask);
1385 process_sp->SetHighmemCodeAddressMask(mask);
1386 process_sp->SetHighmemDataAddressMask(mask);
1388 process_sp->SetHighmemCodeAddressMask(mask);
1389 process_sp->SetHighmemDataAddressMask(mask);
1391 process_sp->SetCodeAddressMask(mask);
1392 process_sp->SetDataAddressMask(mask);
1412 return process_sp->FixAnyAddress(addr);
1414 return process_sp->FixDataAddress(addr);
1416 return process_sp->FixCodeAddress(addr);
1429 if (stop_locker.
TryLock(&process_sp->GetRunLock())) {
1430 std::lock_guard<std::recursive_mutex> guard(
1431 process_sp->GetTarget().GetAPIMutex());
1432 addr = process_sp->AllocateMemory(size, permissions, sb_error.
ref());
1449 if (stop_locker.
TryLock(&process_sp->GetRunLock())) {
1450 std::lock_guard<std::recursive_mutex> guard(
1451 process_sp->GetTarget().GetAPIMutex());
static llvm::raw_ostream & error(Stream &strm)
#define LLDB_INSTRUMENT()
#define LLDB_INSTRUMENT_VA(...)
std::unique_ptr< lldb_private::AddressRangeListImpl > m_opaque_up
lldb_private::AddressRangeListImpl & ref() const
lldb_private::AddressRange & ref() const
void AppendMessage(const char *message)
static const char * StateAsCString(lldb::StateType state)
void SetError(uint32_t err, lldb::ErrorType type)
lldb_private::Status & ref()
lldb_private::Event * get() const
void reset(lldb::EventSP &event_sp)
lldb::EventSP & GetSP() const
uint32_t GetPath(char *dst_path, size_t dst_len) const
lldb_private::MemoryRegionInfos & ref()
lldb_private::MemoryRegionInfo & ref()
void SetProcessInfo(const lldb_private::ProcessInstanceInfo &proc_info_ref)
const lldb::SBProcess & operator=(const lldb::SBProcess &rhs)
static size_t GetNumRestartedReasonsFromEvent(const lldb::SBEvent &event)
lldb::SBError SendEventData(const char *data)
lldb::SBBroadcaster GetBroadcaster() const
lldb::SBThread GetThreadAtIndex(size_t index)
static const char * GetBroadcasterClassName()
void AppendEventStateReport(const lldb::SBEvent &event, lldb::SBCommandReturnObject &result)
uint32_t GetNumExtendedBacktraceTypes()
Return the number of different thread-origin extended backtraces this process can support.
size_t PutSTDIN(const char *src, size_t src_len)
lldb::SBQueue GetQueueAtIndex(size_t index)
void ReportEventState(const lldb::SBEvent &event, FILE *out) const
lldb::SBFileSpec GetCoreFile()
Get the file specification for the core file that is currently being used for the process.
const char * GetExitDescription()
lldb::SBThread GetThreadByIndexID(uint32_t index_id)
static const char * GetBroadcasterClass()
static lldb::SBStructuredData GetStructuredDataFromEvent(const lldb::SBEvent &event)
lldb::ProcessSP GetSP() const
lldb::addr_t FindInMemory(const void *buf, uint64_t size, const SBAddressRange &range, uint32_t alignment, SBError &error)
lldb::pid_t GetProcessID()
Gets the process ID.
lldb::addr_t AllocateMemory(size_t size, uint32_t permissions, lldb::SBError &error)
Allocate memory within the process.
static bool EventIsStructuredDataEvent(const lldb::SBEvent &event)
lldb::SBError UnloadImage(uint32_t image_token)
lldb::SBProcessInfo GetProcessInfo()
Return information about the process.
uint32_t GetUniqueID()
Gets the unique ID associated with this process object.
bool GetDescription(lldb::SBStream &description)
size_t GetAsyncProfileData(char *dst, size_t dst_len) const
lldb::addr_t FixAddress(lldb::addr_t addr, lldb::AddressMaskType type=lldb::eAddressMaskTypeAny)
Clear the non-address bits of an addr value and return a virtual address in memory.
lldb::StateType GetState()
lldb::SBThread CreateOSPluginThread(lldb::tid_t tid, lldb::addr_t context)
lldb::SBScriptObject GetScriptedImplementation()
void GetStatus(SBStream &status)
lldb::ByteOrder GetByteOrder() const
size_t ReadCStringFromMemory(addr_t addr, void *char_buf, size_t size, lldb::SBError &error)
lldb::addr_t ReadPointerFromMemory(addr_t addr, lldb::SBError &error)
lldb::SBError DeallocateMemory(lldb::addr_t ptr)
Deallocate memory in the process.
static lldb::StateType GetStateFromEvent(const lldb::SBEvent &event)
lldb::SBThread GetSelectedThread() const
bool SetSelectedThreadByIndexID(uint32_t index_id)
size_t ReadMemory(addr_t addr, void *buf, size_t size, lldb::SBError &error)
const char * GetExtendedBacktraceTypeAtIndex(uint32_t idx)
Return the name of one of the thread-origin extended backtrace methods.
lldb::SBThread GetThreadByID(lldb::tid_t sb_thread_id)
bool RemoteAttachToProcessWithID(lldb::pid_t pid, lldb::SBError &error)
Remote connection related functions.
lldb::SBTarget GetTarget() const
lldb::SBAddressRangeList FindRangesInMemory(const void *buf, uint64_t size, const SBAddressRangeList &ranges, uint32_t alignment, uint32_t max_matches, SBError &error)
const char * GetPluginName()
bool RemoteLaunch(char const **argv, char const **envp, const char *stdin_path, const char *stdout_path, const char *stderr_path, const char *working_directory, uint32_t launch_flags, bool stop_at_entry, lldb::SBError &error)
void SetAddressMask(lldb::AddressMaskType type, lldb::addr_t mask, lldb::AddressMaskRange addr_range=lldb::eAddressMaskRangeLow)
Set the current address mask that can be applied to addresses before reading from memory.
size_t GetSTDOUT(char *dst, size_t dst_len) const
lldb::SBEvent GetStopEventForStopID(uint32_t stop_id)
Gets the stop event corresponding to stop ID.
lldb::SBError Signal(int signal)
static bool GetInterruptedFromEvent(const lldb::SBEvent &event)
lldb::addr_t GetAddressMask(lldb::AddressMaskType type, lldb::AddressMaskRange addr_range=lldb::eAddressMaskRangeLow)
Get the current address mask that will be applied to addresses before reading from memory.
lldb::ProcessWP m_opaque_wp
uint32_t GetNumSupportedHardwareWatchpoints(lldb::SBError &error) const
uint32_t LoadImageUsingPaths(const lldb::SBFileSpec &image_spec, SBStringList &paths, lldb::SBFileSpec &loaded_path, lldb::SBError &error)
Load a shared library into this process, starting with a library name and a list of paths,...
uint32_t LoadImage(lldb::SBFileSpec &remote_image_spec, lldb::SBError &error)
Load a shared library into this process.
void SetAddressableBits(AddressMaskType type, uint32_t num_bits, AddressMaskRange addr_range=lldb::eAddressMaskRangeLow)
Set the number of bits used for addressing in this Process.
static const char * GetRestartedReasonAtIndexFromEvent(const lldb::SBEvent &event, size_t idx)
lldb::SBUnixSignals GetUnixSignals()
lldb::SBThreadCollection GetHistoryThreads(addr_t addr)
bool IsInstrumentationRuntimePresent(InstrumentationRuntimeType type)
bool SetSelectedThread(const lldb::SBThread &thread)
bool SetSelectedThreadByID(lldb::tid_t tid)
void SendAsyncInterrupt()
static bool GetRestartedFromEvent(const lldb::SBEvent &event)
static bool EventIsProcessEvent(const lldb::SBEvent &event)
lldb::SBError GetMemoryRegionInfo(lldb::addr_t load_addr, lldb::SBMemoryRegionInfo ®ion_info)
Query the address load_addr and store the details of the memory region that contains it in the suppli...
void SetSP(const lldb::ProcessSP &process_sp)
size_t WriteMemory(addr_t addr, const void *buf, size_t size, lldb::SBError &error)
lldb::SBError SaveCore(const char *file_name, const char *flavor, SaveCoreStyle core_style)
Save the state of the process in a core file.
lldb::SBMemoryRegionInfoList GetMemoryRegions()
Return the list of memory regions within the process.
uint32_t GetAddressByteSize() const
SBStructuredData GetExtendedCrashInformation()
uint32_t GetStopID(bool include_expression_stops=false)
uint64_t ReadUnsignedFromMemory(addr_t addr, uint32_t byte_size, lldb::SBError &error)
void ForceScriptedState(StateType new_state)
If the process is a scripted process, changes its state to the new state.
static lldb::SBProcess GetProcessFromEvent(const lldb::SBEvent &event)
size_t GetSTDERR(char *dst, size_t dst_len) const
void SetQueue(const lldb::QueueSP &queue_sp)
void SetStyle(lldb::SaveCoreStyle style)
Set the Core dump style.
void SetOutputFile(SBFileSpec output_file)
lldb_private::SaveCoreOptions & ref() const
SBError SetPluginName(const char *plugin)
Set the plugin name.
lldb_private::Stream & ref()
const char * GetStringAtIndex(size_t idx)
StructuredDataImplUP m_impl_up
void SetSP(const lldb::TargetSP &target_sp)
lldb::SBFileSpec GetExecutable()
lldb::tid_t GetThreadID() const
void SetThread(const lldb::ThreadSP &lldb_object_sp)
static lldb::addr_t AddressableBitToMask(uint32_t addressable_bits)
void AppendArguments(const Args &rhs)
A uniqued constant string class.
const char * AsCString(const char *value_if_empty=nullptr) const
Get the string value as a C string.
const char * GetCString() const
Get the string value as a C string.
static llvm::StringRef GetFlavorString()
static lldb::ProcessSP GetProcessFromEvent(const Event *event_ptr)
virtual llvm::StringRef GetFlavor() const =0
const ConstString & GetFilename() const
Filename string const get accessor.
A class that describes an executable image and its associated object and symbol files.
const FileSpec & GetPlatformFileSpec() const
Get accessor for the module platform file specification.
const FileSpec & GetFileSpec() const
Get const accessor for the module file specification.
static Status SaveCore(const lldb::ProcessSP &process_sp, lldb_private::SaveCoreOptions &core_options)
void SetExecutableFile(const FileSpec &exe_file, bool add_exe_file_as_first_arg)
void SetProcessID(lldb::pid_t pid)
Environment & GetEnvironment()
bool TryLock(ProcessRunLock *lock)
static bool GetRestartedFromEvent(const Event *event_ptr)
static lldb::ProcessSP GetProcessFromEvent(const Event *event_ptr)
size_t GetNumRestartedReasons()
static bool GetInterruptedFromEvent(const Event *event_ptr)
const char * GetRestartedReasonAtIndex(size_t idx)
static lldb::StateType GetStateFromEvent(const Event *event_ptr)
static const Process::ProcessEventData * GetEventDataFromEvent(const Event *event_ptr)
static llvm::StringRef GetStaticBroadcasterClass()
static Status FromErrorStringWithFormat(const char *format,...) __attribute__((format(printf
static Status FromErrorString(const char *str)
A stream class that can stream formatted output to a file.
size_t Printf(const char *format,...) __attribute__((format(printf
Output printf formatted output to the stream.
size_t PutCString(llvm::StringRef cstr)
Output a C string to the stream.
std::shared_ptr< Object > ObjectSP
A plug-in interface definition class for system runtimes.
virtual const std::vector< ConstString > & GetExtendedBacktraceTypes()
Return a list of thread origin extended backtraces that may be available.
#define LLDB_INVALID_ADDRESS_MASK
Address Mask Bits not used for addressing are set to 1 in the mask; all mask bits set is an invalid v...
#define LLDB_INVALID_IMAGE_TOKEN
#define LLDB_INVALID_ADDRESS
#define LLDB_INVALID_PROCESS_ID
A class that represents a running process on the host machine.
const char * StateAsCString(lldb::StateType state)
Converts a StateType to a C string.
std::shared_ptr< lldb_private::Queue > QueueSP
std::shared_ptr< lldb_private::Thread > ThreadSP
AddressMaskRange
Used in the SBProcess AddressMask/FixAddress methods.
std::shared_ptr< lldb_private::Platform > PlatformSP
StateType
Process and Thread States.
@ eStateConnected
Process is connected to remote debug services, but not launched or attached to anything yet.
@ eStateStopped
Process or thread is stopped and can be examined.
std::shared_ptr< lldb_private::Process > ProcessSP
InstrumentationRuntimeType
std::shared_ptr< lldb_private::Event > EventSP
ByteOrder
Byte ordering definitions.
std::shared_ptr< lldb_private::Target > TargetSP
AddressMaskType
Used in the SBProcess AddressMask/FixAddress methods.
std::shared_ptr< lldb_private::File > FileSP
std::shared_ptr< lldb_private::InstrumentationRuntime > InstrumentationRuntimeSP