73#include "llvm/Support/PrettyStackTrace.h"
74#include "llvm/Support/Regex.h"
79#define DEFAULT_DISASM_BYTE_SIZE 32
82 std::lock_guard<std::recursive_mutex> guard(target.
GetAPIMutex());
86 const auto state = process_sp->GetState();
93 "process is connected and already has a listener, pass "
98 return target.
Attach(attach_info,
nullptr);
166 return this->
operator bool();
168SBTarget::operator
bool()
const {
180 process_sp = target_sp->GetProcessSP();
181 sb_process.
SetSP(process_sp);
203 debugger.
reset(target_sp->GetDebugger().shared_from_this());
218 std::string json_str =
220 target_sp->GetDebugger(), target_sp.get(),
265 ProcessSP process_sp(target_sp->CreateProcess(
266 target_sp->GetDebugger().GetListener(),
"", &filespec,
false));
268 ElapsedTime load_core_time(target_sp->GetStatistics().GetLoadCoreTime());
269 error.SetError(process_sp->LoadCore());
271 sb_process.
SetSP(process_sp);
273 error.SetErrorString(
"Failed to create the process");
276 error.SetErrorString(
"SBTarget is invalid");
282 const char *working_directory) {
291 if (
Module *exe_module = target_sp->GetExecutableModulePointer())
298 if (working_directory)
310 std::lock_guard<std::recursive_mutex> guard(target_sp->GetAPIMutex());
311 sb_error.
ref() = target_sp->Install(
nullptr);
317 char const **envp,
const char *stdin_path,
318 const char *stdout_path,
const char *stderr_path,
319 const char *working_directory,
320 uint32_t launch_flags,
323 stderr_path, working_directory, launch_flags,
324 stop_at_entry,
error);
329 std::lock_guard<std::recursive_mutex> guard(target_sp->GetAPIMutex());
332 launch_flags |= eLaunchFlagStopAtEntry;
334 if (getenv(
"LLDB_LAUNCH_FLAG_DISABLE_ASLR"))
335 launch_flags |= eLaunchFlagDisableASLR;
338 process_sp = target_sp->GetProcessSP();
340 state = process_sp->GetState();
344 error.SetErrorString(
"process attach is in progress");
346 error.SetErrorString(
"a process is already being debugged");
356 error.SetErrorString(
"process is connected and already has a listener, "
357 "pass empty listener");
362 if (getenv(
"LLDB_LAUNCH_FLAG_DISABLE_STDIO"))
363 launch_flags |= eLaunchFlagDisableSTDIO;
367 FileSpec(working_directory), launch_flags);
369 Module *exe_module = target_sp->GetExecutableModulePointer();
375 auto default_launch_info = target_sp->GetProcessLaunchInfo();
377 default_launch_info.GetArguments());
382 auto default_launch_info = target_sp->GetProcessLaunchInfo();
383 launch_info.
GetEnvironment() = default_launch_info.GetEnvironment();
389 error.SetError(target_sp->Launch(launch_info,
nullptr));
391 sb_process.
SetSP(target_sp->GetProcessSP());
393 error.SetErrorString(
"SBTarget is invalid");
404 std::lock_guard<std::recursive_mutex> guard(target_sp->GetAPIMutex());
407 ProcessSP process_sp = target_sp->GetProcessSP();
409 state = process_sp->GetState();
413 error.SetErrorString(
"process attach is in progress");
415 error.SetErrorString(
"a process is already being debugged");
424 Module *exe_module = target_sp->GetExecutableModulePointer();
429 const ArchSpec &arch_spec = target_sp->GetArchitecture();
433 error.SetError(target_sp->Launch(launch_info,
nullptr));
434 sb_launch_info.
set_ref(launch_info);
435 sb_process.
SetSP(target_sp->GetProcessSP());
437 error.SetErrorString(
"SBTarget is invalid");
451 PlatformSP platform_sp = target_sp->GetPlatform();
453 if (platform_sp && platform_sp->IsConnected()) {
456 if (platform_sp->GetProcessInfo(attach_pid, instance_info)) {
460 "no process found with process ID %" PRIu64, attach_pid);
467 sb_process.
SetSP(target_sp->GetProcessSP());
469 error.SetErrorString(
"SBTarget is invalid");
490 if (target_sp->GetPlatform()->GetProcessInfo(pid, instance_info))
495 sb_process.
SetSP(target_sp->GetProcessSP());
497 error.SetErrorString(
"SBTarget is invalid");
513 error.SetErrorString(
"invalid name");
526 sb_process.
SetSP(target_sp->GetProcessSP());
528 error.SetErrorString(
"SBTarget is invalid");
535 const char *plugin_name,
542 std::lock_guard<std::recursive_mutex> guard(target_sp->GetAPIMutex());
545 target_sp->CreateProcess(listener.
m_opaque_sp, plugin_name,
nullptr,
548 process_sp = target_sp->CreateProcess(
549 target_sp->GetDebugger().GetListener(), plugin_name,
nullptr,
true);
552 sb_process.
SetSP(process_sp);
553 error.SetError(process_sp->ConnectRemote(url));
555 error.SetErrorString(
"unable to create lldb_private::Process");
558 error.SetErrorString(
"SBTarget is invalid");
569 Module *exe_module = target_sp->GetExecutableModulePointer();
574 return exe_file_spec;
601 std::lock_guard<std::recursive_mutex> guard(target_sp->GetAPIMutex());
602 if (target_sp->ResolveLoadAddress(vm_addr, addr))
618 std::lock_guard<std::recursive_mutex> guard(target_sp->GetAPIMutex());
619 if (target_sp->ResolveFileAddress(file_addr, addr))
634 std::lock_guard<std::recursive_mutex> guard(target_sp->GetAPIMutex());
635 if (target_sp->ResolveLoadAddress(vm_addr, addr))
647 uint32_t resolve_scope) {
651 SymbolContextItem scope =
static_cast<SymbolContextItem
>(resolve_scope);
656 target_sp->GetImages().ResolveSymbolContextForAddress(addr.
ref(), scope,
667 size_t bytes_read = 0;
669 std::lock_guard<std::recursive_mutex> guard(target_sp->GetAPIMutex());
671 target_sp->ReadMemory(addr.
ref(), buf, size,
error.ref(),
true);
673 error.SetErrorString(
"invalid target");
715 const SBFileSpec &sb_file_spec, uint32_t line, uint32_t column,
721 std::lock_guard<std::recursive_mutex> guard(target_sp->GetAPIMutex());
725 const bool internal =
false;
726 const bool hardware =
false;
729 if (sb_module_list.
GetSize() > 0) {
730 module_list = sb_module_list.
get();
732 sb_bp = target_sp->CreateBreakpoint(
733 module_list, *sb_file_spec, line, column, offset, check_inlines,
734 skip_prologue, internal, hardware, move_to_nearest_code);
741 const SBFileSpec &sb_file_spec, uint32_t line, uint32_t column,
743 bool move_to_nearest_code) {
745 move_to_nearest_code);
749 std::lock_guard<std::recursive_mutex> guard(target_sp->GetAPIMutex());
753 const bool internal =
false;
754 const bool hardware =
false;
756 if (sb_module_list.
GetSize() > 0) {
757 module_list = sb_module_list.
get();
759 sb_bp = target_sp->CreateBreakpoint(
760 module_list, *sb_file_spec, line, column, offset, check_inlines,
761 skip_prologue, internal, hardware,
769 const char *module_name) {
774 std::lock_guard<std::recursive_mutex> guard(target_sp->GetAPIMutex());
776 const bool internal =
false;
777 const bool hardware =
false;
780 const bool offset_is_insn_count =
false;
781 if (module_name && module_name[0]) {
784 sb_bp = target_sp->CreateBreakpoint(
785 &module_spec_list,
nullptr, symbol_name, eFunctionNameTypeAuto,
789 sb_bp = target_sp->CreateBreakpoint(
790 nullptr,
nullptr, symbol_name, eFunctionNameTypeAuto,
805 lldb::FunctionNameType name_type_mask = eFunctionNameTypeAuto;
812 const char *symbol_name, uint32_t name_type_mask,
823 const char *symbol_name, uint32_t name_type_mask,
827 module_list, comp_unit_list);
829 false, module_list, comp_unit_list);
833 const char *symbol_name, uint32_t name_type_mask,
838 offset_is_insn_count, module_list, comp_unit_list);
842 target_sp && symbol_name && symbol_name[0]) {
843 const bool internal =
false;
844 const bool hardware =
false;
846 std::lock_guard<std::recursive_mutex> guard(target_sp->GetAPIMutex());
847 FunctionNameType mask =
static_cast<FunctionNameType
>(name_type_mask);
848 sb_bp = target_sp->CreateBreakpoint(module_list.
get(), comp_unit_list.
get(),
849 symbol_name, mask, symbol_language,
850 offset, offset_is_insn_count,
851 skip_prologue, internal, hardware);
858 const char *symbol_names[], uint32_t num_names, uint32_t name_type_mask,
869 const char *symbol_names[], uint32_t num_names, uint32_t name_type_mask,
873 symbol_language, module_list, comp_unit_list);
881 const char *symbol_names[], uint32_t num_names, uint32_t name_type_mask,
885 symbol_language, offset, module_list, comp_unit_list);
888 if (
TargetSP target_sp =
GetSP(); target_sp && num_names > 0) {
889 std::lock_guard<std::recursive_mutex> guard(target_sp->GetAPIMutex());
890 const bool internal =
false;
891 const bool hardware =
false;
892 FunctionNameType mask =
static_cast<FunctionNameType
>(name_type_mask);
894 sb_bp = target_sp->CreateBreakpoint(
895 module_list.
get(), comp_unit_list.
get(), symbol_names, num_names, mask,
896 symbol_language, offset, skip_prologue, internal, hardware);
903 const char *module_name) {
908 if (module_name && module_name[0]) {
912 module_spec_list, comp_unit_list);
922 module_list, comp_unit_list);
926 const char *symbol_name_regex,
LanguageType symbol_language,
933 target_sp && symbol_name_regex && symbol_name_regex[0]) {
934 std::lock_guard<std::recursive_mutex> guard(target_sp->GetAPIMutex());
936 const bool internal =
false;
937 const bool hardware =
false;
940 sb_bp = target_sp->CreateFuncRegexBreakpoint(
941 module_list.
get(), comp_unit_list.
get(), std::move(regexp),
942 symbol_language, skip_prologue, internal, hardware);
953 std::lock_guard<std::recursive_mutex> guard(target_sp->GetAPIMutex());
954 const bool hardware =
false;
955 sb_bp = target_sp->CreateBreakpoint(address,
false, hardware);
970 std::lock_guard<std::recursive_mutex> guard(target_sp->GetAPIMutex());
971 const bool hardware =
false;
972 sb_bp = target_sp->CreateBreakpoint(sb_address.
ref(),
false, hardware);
981 const char *module_name) {
986 if (module_name && module_name[0]) {
992 source_file_list.
Append(source_file);
1017 target_sp && source_regex && source_regex[0]) {
1018 std::lock_guard<std::recursive_mutex> guard(target_sp->GetAPIMutex());
1019 const bool hardware =
false;
1022 std::unordered_set<std::string> func_names_set;
1023 for (
size_t i = 0; i < func_names.
GetSize(); i++) {
1027 sb_bp = target_sp->CreateSourceRegexBreakpoint(
1028 module_list.
get(), source_file_list.
get(), func_names_set,
1029 std::move(regexp),
false, hardware, move_to_nearest_code);
1037 bool catch_bp,
bool throw_bp) {
1042 std::lock_guard<std::recursive_mutex> guard(target_sp->GetAPIMutex());
1043 const bool hardware =
false;
1044 sb_bp = target_sp->CreateExceptionBreakpoint(language, catch_bp, throw_bp,
1054 bool request_hardware) {
1060 std::lock_guard<std::recursive_mutex> guard(target_sp->GetAPIMutex());
1065 target_sp->CreateScriptedBreakpoint(class_name,
1082 return target_sp->GetBreakpointList().GetSize();
1093 sb_breakpoint = target_sp->GetBreakpointList().GetBreakpointAtIndex(idx);
1095 return sb_breakpoint;
1101 bool result =
false;
1103 std::lock_guard<std::recursive_mutex> guard(target_sp->GetAPIMutex());
1104 result = target_sp->RemoveBreakpointByID(bp_id);
1116 std::lock_guard<std::recursive_mutex> guard(target_sp->GetAPIMutex());
1117 sb_breakpoint = target_sp->GetBreakpointByID(bp_id);
1120 return sb_breakpoint;
1128 std::lock_guard<std::recursive_mutex> guard(target_sp->GetAPIMutex());
1129 llvm::Expected<std::vector<BreakpointSP>> expected_vector =
1130 target_sp->GetBreakpointList().FindBreakpointsByName(name);
1131 if (!expected_vector) {
1133 "invalid breakpoint name: {0}");
1149 std::lock_guard<std::recursive_mutex> guard(target_sp->GetAPIMutex());
1151 std::vector<std::string> name_vec;
1152 target_sp->GetBreakpointNames(name_vec);
1153 for (
const auto &name : name_vec)
1162 std::lock_guard<std::recursive_mutex> guard(target_sp->GetAPIMutex());
1163 target_sp->DeleteBreakpointName(
ConstString(name));
1171 std::lock_guard<std::recursive_mutex> guard(target_sp->GetAPIMutex());
1172 target_sp->EnableAllowedBreakpoints();
1182 std::lock_guard<std::recursive_mutex> guard(target_sp->GetAPIMutex());
1183 target_sp->DisableAllowedBreakpoints();
1193 std::lock_guard<std::recursive_mutex> guard(target_sp->GetAPIMutex());
1194 target_sp->RemoveAllowedBreakpoints();
1215 std::lock_guard<std::recursive_mutex> guard(target_sp->GetAPIMutex());
1219 std::vector<std::string> name_vector;
1220 size_t num_names = matching_names.
GetSize();
1221 for (
size_t i = 0; i < num_names; i++)
1224 sberr.
ref() = target_sp->CreateBreakpointsFromFile(source_file.
ref(),
1225 name_vector, bp_ids);
1229 size_t num_bkpts = bp_ids.
GetSize();
1230 for (
size_t i = 0; i < num_bkpts; i++) {
1236 "BreakpointCreateFromFile called with invalid target.");
1249 sberr.
SetErrorString(
"BreakpointWriteToFile called with invalid target.");
1260 std::lock_guard<std::recursive_mutex> guard(target_sp->GetAPIMutex());
1263 sberr.
ref() = target_sp->SerializeBreakpointsToFile(dest_file.
ref(),
1264 bp_id_list, append);
1266 sberr.
SetErrorString(
"BreakpointWriteToFile called with invalid target.");
1276 return target_sp->GetWatchpointList().GetSize();
1287 sb_watchpoint.
SetSP(target_sp->GetWatchpointList().GetByIndex(idx));
1289 return sb_watchpoint;
1295 bool result =
false;
1297 std::lock_guard<std::recursive_mutex> guard(target_sp->GetAPIMutex());
1298 std::unique_lock<std::recursive_mutex> lock;
1299 target_sp->GetWatchpointList().GetListMutex(lock);
1300 result = target_sp->RemoveWatchpointByID(wp_id);
1313 std::lock_guard<std::recursive_mutex> guard(target_sp->GetAPIMutex());
1314 std::unique_lock<std::recursive_mutex> lock;
1315 target_sp->GetWatchpointList().GetListMutex(lock);
1316 watchpoint_sp = target_sp->GetWatchpointList().FindByID(wp_id);
1317 sb_watchpoint.
SetSP(watchpoint_sp);
1320 return sb_watchpoint;
1324 bool read,
bool modify,
1343 uint32_t watch_type = 0;
1350 if (watch_type == 0) {
1351 error.SetErrorString(
"Can't create a watchpoint that is neither read nor "
1352 "write nor modify.");
1353 return sb_watchpoint;
1358 std::lock_guard<std::recursive_mutex> guard(target_sp->GetAPIMutex());
1364 target_sp->CreateWatchpoint(addr, size, type, watch_type, cw_error);
1365 error.SetError(std::move(cw_error));
1366 sb_watchpoint.
SetSP(watchpoint_sp);
1369 return sb_watchpoint;
1376 std::lock_guard<std::recursive_mutex> guard(target_sp->GetAPIMutex());
1377 std::unique_lock<std::recursive_mutex> lock;
1378 target_sp->GetWatchpointList().GetListMutex(lock);
1379 target_sp->EnableAllWatchpoints();
1389 std::lock_guard<std::recursive_mutex> guard(target_sp->GetAPIMutex());
1390 std::unique_lock<std::recursive_mutex> lock;
1391 target_sp->GetWatchpointList().GetListMutex(lock);
1392 target_sp->DisableAllWatchpoints();
1412 sb_value.
SetSP(new_value_sp);
1430 sb_value.
SetSP(new_value_sp);
1440 if (
IsValid() && name && *name && expr && *expr) {
1446 sb_value.
SetSP(new_value_sp);
1454 std::lock_guard<std::recursive_mutex> guard(target_sp->GetAPIMutex());
1455 std::unique_lock<std::recursive_mutex> lock;
1456 target_sp->GetWatchpointList().GetListMutex(lock);
1457 target_sp->RemoveAllWatchpoints();
1468 llvm::StringRef srFrom = from, srTo = to;
1470 return error.SetErrorString(
"<from> path can't be empty");
1472 return error.SetErrorString(
"<to> path can't be empty");
1474 target_sp->GetImageSearchPathList().Append(srFrom, srTo,
true);
1476 error.SetErrorString(
"invalid target");
1481 const char *uuid_cstr) {
1484 return AddModule(path, triple, uuid_cstr,
nullptr);
1488 const char *uuid_cstr,
const char *symfile) {
1501 target_sp->GetPlatform().get(), triple);
1537 if (sb_module.
IsValid() && !target_sp->GetArchitecture().IsValid() &&
1538 sb_module.
GetSP()->GetArchitecture().IsValid())
1539 target_sp->SetArchitecture(sb_module.
GetSP()->GetArchitecture());
1548 target_sp->GetImages().AppendIfNeeded(module.
GetSP());
1560 num = target_sp->GetImages().GetSize();
1579 sb_module.
SetSP(target_sp->GetImages().FindFirstModule(module_spec));
1591 target_sp->GetImages().FindFirstModule(*sb_module_spec.
m_opaque_up));
1601 target_sp->GetImages().FindCompileUnits(*sb_file_spec, *sb_sc_list);
1609 return target_sp->GetArchitecture().GetByteOrder();
1617 std::string triple(target_sp->GetArchitecture().GetTriple().str());
1631 llvm::StringRef arch_name =
1632 target_sp->GetArchitecture().GetTriple().getArchName();
1644 std::string abi_name(target_sp->GetABIName().str());
1663 return target_sp->GetGloballyUniqueID();
1687 return target_sp->GetArchitecture().GetMinimumOpcodeByteSize();
1696 return target_sp->GetArchitecture().GetMaximumOpcodeByteSize();
1705 return target_sp->GetArchitecture().GetDataByteSize();
1713 return target_sp->GetArchitecture().GetCodeByteSize();
1721 return target_sp->GetMaximumNumberOfChildrenToDisplay();
1729 return target_sp->GetArchitecture().GetAddressByteSize();
1730 return sizeof(
void *);
1740 module_sp = target_sp->GetImages().GetModuleAtIndex(idx);
1741 sb_module.
SetSP(module_sp);
1751 return target_sp->GetImages().Remove(module.
GetSP());
1772 target_sp->Dump(&strm, description_level);
1780 uint32_t name_type_mask) {
1784 if (!name || !name[0])
1792 FunctionNameType mask =
static_cast<FunctionNameType
>(name_type_mask);
1793 target_sp->GetImages().FindFunctions(
ConstString(name), mask,
1794 function_options, *sb_sc_list);
1800 uint32_t max_matches,
1805 if (name && name[0]) {
1806 llvm::StringRef name_ref(name);
1812 std::string regexstr;
1813 switch (matchtype) {
1816 function_options, *sb_sc_list);
1819 target_sp->GetImages().FindFunctions(
1821 function_options, *sb_sc_list);
1824 regexstr = llvm::Regex::escape(name) +
".*";
1826 function_options, *sb_sc_list);
1829 target_sp->GetImages().FindFunctions(
ConstString(name),
1830 eFunctionNameTypeAny,
1831 function_options, *sb_sc_list);
1843 target_sp && typename_cstr && typename_cstr[0]) {
1846 TypeQueryOptions::e_find_one);
1848 target_sp->GetImages().FindTypes(
nullptr, query, results);
1852 if (
auto process_sp = target_sp->GetProcessSP()) {
1853 for (
auto *runtime : process_sp->GetLanguageRuntimes()) {
1854 if (
auto vendor = runtime->GetDeclVendor()) {
1855 auto types = vendor->FindTypes(const_typename, 1);
1857 return SBType(types.front());
1863 for (
auto type_system_sp : target_sp->GetScratchTypeSystems())
1864 if (
auto type = type_system_sp->GetBuiltinTypeByName(const_typename))
1875 for (
auto type_system_sp : target_sp->GetScratchTypeSystems())
1876 if (
auto compiler_type = type_system_sp->GetBasicTypeFromAST(type))
1877 return SBType(compiler_type);
1887 target_sp && typename_cstr && typename_cstr[0]) {
1892 images.
FindTypes(
nullptr, query, results);
1897 if (
ProcessSP process_sp = target_sp->GetProcessSP()) {
1898 for (
auto *runtime : process_sp->GetLanguageRuntimes()) {
1899 if (
auto *vendor = runtime->GetDeclVendor()) {
1901 vendor->FindTypes(const_typename,
UINT32_MAX);
1902 for (
auto type : types)
1908 if (sb_type_list.
GetSize() == 0) {
1910 for (
auto type_system_sp : target_sp->GetScratchTypeSystems())
1911 if (
auto compiler_type =
1912 type_system_sp->GetBuiltinTypeByName(const_typename))
1916 return sb_type_list;
1920 uint32_t max_matches) {
1927 target_sp->GetImages().FindGlobalVariables(
ConstString(name), max_matches,
1929 if (!variable_list.
Empty()) {
1931 if (exe_scope ==
nullptr)
1932 exe_scope = target_sp.get();
1933 for (
const VariableSP &var_sp : variable_list) {
1942 return sb_value_list;
1946 uint32_t max_matches,
1953 llvm::StringRef name_ref(name);
1956 std::string regexstr;
1957 switch (matchtype) {
1959 target_sp->GetImages().FindGlobalVariables(
ConstString(name), max_matches,
1964 max_matches, variable_list);
1967 target_sp->GetImages().FindGlobalVariables(
1972 regexstr =
"^" + llvm::Regex::escape(name) +
".*";
1974 max_matches, variable_list);
1977 if (!variable_list.
Empty()) {
1979 if (exe_scope ==
nullptr)
1980 exe_scope = target_sp.get();
1981 for (
const VariableSP &var_sp : variable_list) {
1990 return sb_value_list;
2006 return source_manager;
2018 const char *flavor_string) {
2025 if (llvm::Expected<DisassemblerSP> disassembler =
2026 target_sp->ReadInstructions(*addr_ptr, count, flavor_string)) {
2032 return sb_instructions;
2037 const char *flavor_string) {
2045 if (end_load_addr > start_load_addr) {
2049 const bool force_live_memory =
true;
2051 target_sp->GetArchitecture(),
nullptr, flavor_string,
2052 target_sp->GetDisassemblyCPU(), target_sp->GetDisassemblyFeatures(),
2053 *target_sp, range, force_live_memory));
2056 return sb_instructions;
2069 const char *flavor_string,
const void *buf,
2078 if (base_addr.
get())
2079 addr = *base_addr.
get();
2081 constexpr bool data_from_file =
true;
2082 if (!flavor_string || flavor_string[0] ==
'\0') {
2086 const llvm::Triple::ArchType arch =
2087 target_sp->GetArchitecture().GetTriple().getArch();
2088 if (arch == llvm::Triple::x86 || arch == llvm::Triple::x86_64)
2089 flavor_string = target_sp->GetDisassemblyFlavor();
2093 target_sp->GetArchitecture(),
nullptr, flavor_string,
2094 target_sp->GetDisassemblyCPU(), target_sp->GetDisassemblyFeatures(),
2095 addr, buf, size,
UINT32_MAX, data_from_file));
2098 return sb_instructions;
2112 const char *flavor_string,
const void *buf,
2127 sb_error.SetErrorStringWithFormat(
"invalid section");
2131 if (section_sp->IsThreadSpecific()) {
2133 "thread specific sections are not yet supported");
2135 ProcessSP process_sp(target_sp->GetProcessSP());
2136 if (target_sp->SetSectionLoadAddress(section_sp, section_base_addr)) {
2137 ModuleSP module_sp(section_sp->GetModule());
2140 module_list.
Append(module_sp);
2141 target_sp->ModulesDidLoad(module_list);
2145 process_sp->Flush();
2163 sb_error.SetErrorStringWithFormat(
"invalid section");
2167 ProcessSP process_sp(target_sp->GetProcessSP());
2168 if (target_sp->SetSectionUnloaded(section_sp)) {
2169 ModuleSP module_sp(section_sp->GetModule());
2172 module_list.
Append(module_sp);
2173 target_sp->ModulesDidUnload(module_list,
false);
2177 process_sp->Flush();
2180 sb_error.SetErrorStringWithFormat(
"invalid section");
2184 sb_error.SetErrorStringWithFormat(
"invalid target");
2190 int64_t slide_offset) {
2193 if (slide_offset < 0) {
2195 sb_error.SetErrorStringWithFormat(
"slide must be positive");
2203 uint64_t slide_offset) {
2210 bool changed =
false;
2211 if (module_sp->SetLoadAddress(*target_sp, slide_offset,
true, changed)) {
2216 module_list.
Append(module_sp);
2217 target_sp->ModulesDidLoad(module_list);
2219 ProcessSP process_sp(target_sp->GetProcessSP());
2221 process_sp->Flush();
2225 sb_error.SetErrorStringWithFormat(
"invalid module");
2229 sb_error.SetErrorStringWithFormat(
"invalid target");
2243 ObjectFile *objfile = module_sp->GetObjectFile();
2247 ProcessSP process_sp(target_sp->GetProcessSP());
2249 bool changed =
false;
2250 const size_t num_sections = section_list->
GetSize();
2251 for (
size_t sect_idx = 0; sect_idx < num_sections; ++sect_idx) {
2254 changed |= target_sp->SetSectionUnloaded(section_sp);
2258 module_list.
Append(module_sp);
2259 target_sp->ModulesDidUnload(module_list,
false);
2261 ProcessSP process_sp(target_sp->GetProcessSP());
2263 process_sp->Flush();
2266 module_sp->GetFileSpec().GetPath(path,
sizeof(path));
2267 sb_error.SetErrorStringWithFormat(
"no sections in object file '%s'",
2271 module_sp->GetFileSpec().GetPath(path,
sizeof(path));
2272 sb_error.SetErrorStringWithFormat(
"no object file for module '%s'",
2276 sb_error.SetErrorStringWithFormat(
"invalid module");
2279 sb_error.SetErrorStringWithFormat(
"invalid target");
2289 if (name && name[0]) {
2291 target_sp->GetImages().FindSymbolsWithNameAndType(
2304 target_sp->GetPreferDynamicValue();
2321 if (expr ==
nullptr || expr[0] ==
'\0')
2324 std::lock_guard<std::recursive_mutex> guard(target_sp->GetAPIMutex());
2340 "process is running.");
2352 "** [SBTarget::EvaluateExpression] Expression result is "
2353 "%s, summary %s **",
2363 ProcessSP process_sp(target_sp->GetProcessSP());
2365 abi_sp = process_sp->GetABI();
2369 return abi_sp->GetRedZoneSize();
2380 return module_sp->IsLoadedInTarget(target_sp.get());
2414 return SBTrace(target_sp->GetTrace());
2424 if (llvm::Expected<lldb::TraceSP> trace_sp = target_sp->CreateTrace()) {
2427 error.SetErrorString(llvm::toString(trace_sp.takeError()).c_str());
2430 error.SetErrorString(
"missing target");
2451 error.SetErrorString(
"invalid target");
2455 if (!class_name || !class_name[0]) {
2456 error.SetErrorString(
"invalid class name");
2465 error.SetErrorString(
"SBStructuredData argument isn't a dictionary");
2468 dict_sp = std::make_shared<StructuredData::Dictionary>(obj_sp);
2473 std::make_shared<ScriptedMetadata>(class_name, dict_sp);
2477 target_sp->GetDebugger()
2478 .GetScriptInterpreter()
2479 ->CreateScriptedFrameProviderInterface();
2485 llvm::Expected<uint32_t> descriptor_id_or_err =
2486 target_sp->AddScriptedFrameProviderDescriptor(descriptor);
2487 if (!descriptor_id_or_err) {
2488 error.SetErrorString(
2489 llvm::toString(descriptor_id_or_err.takeError()).c_str());
2494 return *descriptor_id_or_err;
2503 error.SetErrorString(
"invalid target");
2508 error.SetErrorString(
"invalid provider id");
2512 if (!target_sp->RemoveScriptedFrameProviderDescriptor(provider_id)) {
2513 error.SetErrorStringWithFormat(
"no frame provider named '%u' found",
static llvm::raw_ostream & error(Stream &strm)
#define LLDB_INSTRUMENT()
#define LLDB_INSTRUMENT_VA(...)
#define LLDB_LOGF(log,...)
#define LLDB_LOG_ERROR(log, error,...)
static Status AttachToProcess(ProcessAttachInfo &attach_info, Target &target)
lldb_private::Address * get()
addr_t GetLoadAddress(const lldb::SBTarget &target) const
lldb_private::Address & ref()
lldb_private::ProcessAttachInfo & ref()
void CopyToBreakpointIDList(lldb_private::BreakpointIDList &bp_id_list)
void AppendByID(lldb::break_id_t id)
void reset(const lldb::DebuggerSP &debugger_sp)
void SetErrorString(const char *err_str)
lldb_private::Status & ref()
lldb_private::Event * get() const
void SetFetchDynamicValue(lldb::DynamicValueType dynamic=lldb::eDynamicCanRunTarget)
lldb_private::EvaluateExpressionOptions & ref() const
void SetUnwindOnError(bool unwind=true)
lldb::DynamicValueType GetFetchDynamicValue() const
const lldb_private::FileSpecList * get() const
void Append(const SBFileSpec &sb_file)
void SetFileSpec(const lldb_private::FileSpec &fspec)
const lldb_private::FileSpec & ref() const
void SetDisassembler(const lldb::DisassemblerSP &opaque_sp)
void SetWorkingDirectory(const char *working_dir)
void SetExecutableFile(SBFileSpec exe_file, bool add_as_first_arg)
Set the executable file that will be used to launch the process and optionally set it as the first ar...
void set_ref(const lldb_private::ProcessLaunchInfo &info)
void SetEnvironmentEntries(const char **envp, bool append)
Update this object with the given environment variables.
const lldb_private::ProcessLaunchInfo & ref() const
void SetArguments(const char **argv, bool append)
lldb::ListenerSP m_opaque_sp
std::unique_ptr< lldb_private::ModuleSpec > m_opaque_up
void SetSP(const ModuleSP &module_sp)
void SetSP(const lldb::ProcessSP &process_sp)
lldb::SectionSP GetSP() const
This class handles the verbosity when dumping statistics.
const lldb_private::StatisticsOptions & ref() const
lldb_private::Stream & ref()
void AppendString(const char *str)
const char * GetStringAtIndex(size_t idx)
StructuredDataImplUP m_impl_up
lldb_private::SymbolContext & ref()
SBSourceManager GetSourceManager()
const char * GetTargetSessionName() const
Get the target session name for this target.
bool AddModule(lldb::SBModule &module)
bool DisableAllBreakpoints()
uint32_t GetNumWatchpoints() const
bool GetDescription(lldb::SBStream &description, lldb::DescriptionLevel description_level)
lldb::SBError ClearSectionLoadAddress(lldb::SBSection section)
Clear the base load address for a module section.
bool DeleteWatchpoint(lldb::watch_id_t watch_id)
lldb::ByteOrder GetByteOrder()
uint32_t GetNumBreakpoints() const
lldb::SBInstructionList GetInstructionsWithFlavor(lldb::SBAddress base_addr, const char *flavor_string, const void *buf, size_t size)
void SetCollectingStats(bool v)
Sets whether we should collect statistics on lldb or not.
bool BreakpointDelete(break_id_t break_id)
void SetSP(const lldb::TargetSP &target_sp)
bool IsLoaded(const lldb::SBModule &module) const
static lldb::SBModule GetModuleAtIndexFromEvent(const uint32_t idx, const lldb::SBEvent &event)
bool GetCollectingStats()
Returns whether statistics collection are enabled.
lldb::SBBreakpoint BreakpointCreateByAddress(addr_t address)
lldb::SBValue CreateValueFromExpression(const char *name, const char *expr)
lldb::SBSymbolContextList FindGlobalFunctions(const char *name, uint32_t max_matches, MatchType matchtype)
Find global functions by their name with pattern matching.
lldb::SBBreakpoint BreakpointCreateByRegex(const char *symbol_name_regex, const char *module_name=nullptr)
lldb::SBTrace GetTrace()
Get a SBTrace object the can manage the processor trace information of this target.
const lldb::SBTarget & operator=(const lldb::SBTarget &rhs)
const char * GetLabel() const
static bool EventIsTargetEvent(const lldb::SBEvent &event)
lldb::SBAddress ResolvePastLoadAddress(uint32_t stop_id, lldb::addr_t vm_addr)
Resolve a current load address into a section offset address using the process stop ID to identify a ...
bool DisableAllWatchpoints()
lldb::addr_t GetStackRedZoneSize()
lldb::SBBreakpoint GetBreakpointAtIndex(uint32_t idx) const
SBError Install()
Install any binaries that need to be installed.
lldb::SBSymbolContextList FindCompileUnits(const lldb::SBFileSpec &sb_file_spec)
Find compile units related to *this target and passed source file.
lldb::SBAddress ResolveLoadAddress(lldb::addr_t vm_addr)
Resolve a current load address into a section offset address.
lldb::SBWatchpoint WatchpointCreateByAddress(lldb::addr_t addr, size_t size, lldb::SBWatchpointOptions options, SBError &error)
lldb::SBMutex GetAPIMutex() const
lldb::SBStructuredData GetStatistics()
Returns a dump of the collected statistics.
lldb::SBModule GetModuleAtIndex(uint32_t idx)
SBError SetLabel(const char *label)
lldb::SBValueList FindGlobalVariables(const char *name, uint32_t max_matches)
Find global and static variables by name.
lldb::SBType GetBasicType(lldb::BasicType type)
lldb::SBFileSpec GetExecutable()
const char * GetABIName()
lldb::SBError SetSectionLoadAddress(lldb::SBSection section, lldb::addr_t section_base_addr)
Set the base load address for a module section.
lldb::SBProcess ConnectRemote(SBListener &listener, const char *url, const char *plugin_name, SBError &error)
Connect to a remote debug server with url.
friend class SBBreakpoint
lldb::SBBreakpoint BreakpointCreateByName(const char *symbol_name, const char *module_name=nullptr)
void DeleteBreakpointName(const char *name)
lldb::SBWatchpoint WatchAddress(lldb::addr_t addr, size_t size, bool read, bool modify, SBError &error)
SBProcess Attach(SBAttachInfo &attach_info, SBError &error)
bool EnableAllWatchpoints()
lldb::SBBreakpoint BreakpointCreateBySBAddress(SBAddress &address)
LLDB_DEPRECATED_FIXME("Use SetModuleLoadAddress(lldb::SBModule, uint64_t)", "SetModuleLoadAddress(lldb::SBModule, uint64_t)") lldb lldb::SBError SetModuleLoadAddress(lldb::SBModule module, uint64_t sections_offset)
Slide all file addresses for all module sections so that module appears to loaded at these slide addr...
lldb::SBProcess GetProcess()
uint32_t RegisterScriptedFrameProvider(const char *class_name, lldb::SBStructuredData args_dict, lldb::SBError &error)
Register a scripted frame provider for this target.
SBSymbolContext ResolveSymbolContextForAddress(const SBAddress &addr, uint32_t resolve_scope)
lldb::SBProcess AttachToProcessWithID(SBListener &listener, lldb::pid_t pid, lldb::SBError &error)
Attach to process with pid.
lldb::SBPlatform GetPlatform()
Return the platform object associated with the target.
lldb::SBBreakpoint BreakpointCreateByLocation(const char *file, uint32_t line)
lldb::SBBreakpoint BreakpointCreateForException(lldb::LanguageType language, bool catch_bp, bool throw_bp)
uint32_t GetNumModules() const
lldb::TargetSP GetSP() const
uint32_t GetDataByteSize()
Architecture data byte width accessor.
uint32_t GetMaximumNumberOfChildrenToDisplay() const
Gets the target.max-children-count value It should be used to limit the number of children of large d...
bool DeleteAllWatchpoints()
lldb::SBInstructionList GetInstructions(lldb::SBAddress base_addr, const void *buf, size_t size)
friend class SBModuleSpec
lldb::SBProcess Launch(SBListener &listener, char const **argv, char const **envp, const char *stdin_path, const char *stdout_path, const char *stderr_path, const char *working_directory, uint32_t launch_flags, bool stop_at_entry, lldb::SBError &error)
Launch a new process.
bool RemoveModule(lldb::SBModule module)
lldb::SBSymbolContextList FindFunctions(const char *name, uint32_t name_type_mask=lldb::eFunctionNameTypeAny)
Find functions by name.
lldb::SBValue FindFirstGlobalVariable(const char *name)
Find the first global (or static) variable by name.
lldb::SBValue EvaluateExpression(const char *expr)
lldb::SBBreakpoint BreakpointCreateFromScript(const char *class_name, SBStructuredData &extra_args, const SBFileSpecList &module_list, const SBFileSpecList &file_list, bool request_hardware=false)
Create a breakpoint using a scripted resolver.
static const char * GetBroadcasterClassName()
SBEnvironment GetEnvironment()
Return the environment variables that would be used to launch a new process.
lldb::SBTypeList FindTypes(const char *type)
static lldb::SBTarget GetCreatedTargetFromEvent(const lldb::SBEvent &event)
For eBroadcastBitNewTargetCreated events, returns the newly created target.
lldb::SBValue CreateValueFromAddress(const char *name, lldb::SBAddress addr, lldb::SBType type)
static lldb::SBTarget GetTargetFromEvent(const lldb::SBEvent &event)
lldb::SBError BreakpointsCreateFromFile(SBFileSpec &source_file, SBBreakpointList &new_bps)
Read breakpoints from source_file and return the newly created breakpoints in bkpt_list.
uint32_t GetAddressByteSize()
bool operator==(const lldb::SBTarget &rhs) const
bool operator!=(const lldb::SBTarget &rhs) const
lldb::TargetSP m_opaque_sp
lldb::SBWatchpoint GetWatchpointAtIndex(uint32_t idx) const
lldb::SBLaunchInfo GetLaunchInfo() const
lldb::SBSymbolContextList FindSymbols(const char *name, lldb::SymbolType type=eSymbolTypeAny)
lldb::user_id_t GetGloballyUniqueID() const
Get the globally unique ID for this target.
void AppendImageSearchPath(const char *from, const char *to, lldb::SBError &error)
const char * GetArchName()
lldb::SBError RemoveScriptedFrameProvider(uint32_t provider_id)
Remove a scripted frame provider from this target by name.
friend class SBBreakpointList
lldb::SBTrace CreateTrace(SBError &error)
Create a Trace object for the current target using the using the default supported tracing technology...
lldb::SBBreakpoint BreakpointCreateBySourceRegex(const char *source_regex, const SBFileSpec &source_file, const char *module_name=nullptr)
bool DeleteAllBreakpoints()
lldb::SBValue CreateValueFromData(const char *name, lldb::SBData data, lldb::SBType type)
void ResetStatistics()
Reset the statistics collected for this target.
lldb::SBBroadcaster GetBroadcaster() const
uint32_t GetMinimumOpcodeByteSize() const
Architecture opcode byte size width accessor.
bool FindBreakpointsByName(const char *name, SBBreakpointList &bkpt_list)
size_t ReadMemory(const SBAddress addr, void *buf, size_t size, lldb::SBError &error)
Read target memory.
lldb::SBBreakpoint BreakpointCreateByNames(const char *symbol_name[], uint32_t num_names, uint32_t name_type_mask, const SBFileSpecList &module_list, const SBFileSpecList &comp_unit_list)
uint32_t GetMaximumOpcodeByteSize() const
Architecture opcode byte size width accessor.
SBProcess LaunchSimple(const char **argv, const char **envp, const char *working_directory)
Launch a new process with sensible defaults.
lldb::SBModule FindModule(const lldb::SBFileSpec &file_spec)
friend class SBSourceManager
lldb::SBBreakpoint FindBreakpointByID(break_id_t break_id)
lldb::SBInstructionList ReadInstructions(lldb::SBAddress base_addr, uint32_t count)
void GetBreakpointNames(SBStringList &names)
lldb::SBDebugger GetDebugger() const
lldb::SBError BreakpointsWriteToFile(SBFileSpec &dest_file)
Write breakpoints to dest_file.
lldb::SBWatchpoint FindWatchpointByID(lldb::watch_id_t watch_id)
lldb::SBAddress ResolveFileAddress(lldb::addr_t file_addr)
Resolve a current file address into a section offset address.
void SetLaunchInfo(const lldb::SBLaunchInfo &launch_info)
lldb::SBError ClearModuleLoadAddress(lldb::SBModule module)
Clear the section base load addresses for all sections in a module.
lldb::SBType FindFirstType(const char *type)
uint32_t GetCodeByteSize()
Architecture code byte width accessor.
lldb::SBProcess AttachToProcessWithName(SBListener &listener, const char *name, bool wait_for, lldb::SBError &error)
Attach to process with name.
SBProcess LoadCore(const char *core_file)
static uint32_t GetNumModulesFromEvent(const lldb::SBEvent &event)
bool EnableAllBreakpoints()
void Append(lldb::SBType type)
void Append(const lldb::SBValue &val_obj)
lldb::SBValue GetValueAtIndex(uint32_t idx) const
void SetSP(const lldb::ValueObjectSP &sp)
const char * GetSummary()
void SetWatchpointTypeWrite(lldb::WatchpointWriteType write_type)
Stop when the watched memory region is written to/modified.
lldb::WatchpointWriteType GetWatchpointTypeWrite() const
void SetWatchpointTypeRead(bool read)
Stop when the watched memory region is read.
bool GetWatchpointTypeRead() const
void SetSP(const lldb::WatchpointSP &sp)
static lldb::ABISP FindPlugin(lldb::ProcessSP process_sp, const ArchSpec &arch)
A section + offset based address range class.
A section + offset based address class.
void SetRawAddress(lldb::addr_t addr)
An architecture specification class.
bool IsValid() const
Tests if this ArchSpec is valid.
void AppendArguments(const Args &rhs)
BreakpointID GetBreakpointIDAtIndex(size_t index) const
lldb::break_id_t GetBreakpointID() const
Generic representation of a type in a programming language.
A uniqued constant string class.
const char * AsCString(const char *value_if_empty=nullptr) const
Get the string value as a C string.
llvm::StringRef GetStringRef() const
Get the string value as a llvm::StringRef.
const char * GetCString() const
Get the string value as a C string.
static void SetCollectingStats(bool enable)
static bool GetCollectingStats()
static void ResetStatistics(Debugger &debugger, Target *target)
Reset metrics associated with one or all targets in a debugger.
static llvm::json::Value ReportStatistics(Debugger &debugger, Target *target, const lldb_private::StatisticsOptions &options)
Get metrics associated with one or all targets in a debugger in JSON format.
static lldb::DisassemblerSP DisassembleRange(const ArchSpec &arch, const char *plugin_name, const char *flavor, const char *cpu, const char *features, Target &target, llvm::ArrayRef< AddressRange > disasm_ranges, bool force_live_memory=false)
static lldb::DisassemblerSP DisassembleBytes(const ArchSpec &arch, const char *plugin_name, const char *flavor, const char *cpu, const char *features, const Address &start, const void *bytes, size_t length, uint32_t max_num_instructions, bool data_from_file)
A class that measures elapsed time in an exception safe way.
Execution context objects refer to objects in the execution of the program that is being debugged.
"lldb/Target/ExecutionContextScope.h" Inherit from this if your object can reconstruct its execution ...
"lldb/Target/ExecutionContext.h" A class that contains an execution context.
StackFrame * GetFramePtr() const
Returns a pointer to the frame object.
Target * GetTargetPtr() const
Returns a pointer to the target object.
Process * GetProcessPtr() const
Returns a pointer to the process object.
void Append(const FileSpec &file)
Append a FileSpec object to the list.
void SetFile(llvm::StringRef path, Style style)
Change the file specified with a new path.
void Resolve(llvm::SmallVectorImpl< char > &path)
Resolve path to make it canonical.
static FileSystem & Instance()
A collection class for Module objects.
void FindTypes(Module *search_first, const TypeQuery &query, lldb_private::TypeResults &results) const
Find types using a type-matching object that contains all search parameters.
lldb::ModuleSP GetModuleAtIndex(size_t idx) const
Get the module shared pointer for the module at index idx.
void Append(const lldb::ModuleSP &module_sp, bool notify=true)
Append a module to the module list.
size_t GetSize() const
Gets the size of the module list.
ArchSpec & GetArchitecture()
FileSpec & GetSymbolFileSpec()
A class that describes an executable image and its associated object and symbol files.
const FileSpec & GetPlatformFileSpec() const
Get accessor for the module platform file specification.
const FileSpec & GetFileSpec() const
Get const accessor for the module file specification.
A plug-in interface definition class for object file parsers.
virtual SectionList * GetSectionList(bool update_module_section_list=true)
Gets the section list for the currently selected architecture (and object for archives).
static bool DownloadObjectAndSymbolFile(ModuleSpec &module_spec, Status &error, bool force_lookup=true, bool copy_executable=true)
void SetWaitForLaunch(bool b)
void SetExecutableFile(const FileSpec &exe_file, bool add_exe_file_as_first_arg)
bool ProcessIDIsValid() const
lldb::pid_t GetProcessID() const
void SetProcessID(lldb::pid_t pid)
FileSpec & GetExecutableFile()
void SetListener(const lldb::ListenerSP &listener_sp)
lldb::ListenerSP GetListener() const
bool UserIDIsValid() const
Environment & GetEnvironment()
bool IsScriptedProcess() const
void SetUserID(uint32_t uid)
ArchSpec & GetArchitecture()
uint32_t GetEffectiveUserID() const
bool TryLock(ProcessRunLock *lock)
A plug-in interface definition class for debugging a process.
ProcessRunLock::ProcessRunLocker StopLocker
ProcessRunLock & GetRunLock()
lldb::SectionSP GetSectionAtIndex(size_t idx) const
This base class provides an interface to stack frames.
static Status FromErrorStringWithFormat(const char *format,...) __attribute__((format(printf
static Status FromErrorString(const char *str)
static Status FromError(llvm::Error error)
Avoid using this in new code. Migrate APIs to llvm::Expected instead.
A stream class that can stream formatted output to a file.
size_t PutCString(llvm::StringRef cstr)
Output a C string to the stream.
std::shared_ptr< Dictionary > DictionarySP
std::shared_ptr< Object > ObjectSP
static ObjectSP ParseJSON(llvm::StringRef json_text)
Defines a symbol context baton that can be handed other debug core functions.
lldb::TargetSP target_sp
The Target for a given query.
static lldb::TargetSP GetCreatedTargetFromEvent(const Event *event_ptr)
static ModuleList GetModuleListFromEvent(const Event *event_ptr)
static const TargetEventData * GetEventDataFromEvent(const Event *event_ptr)
static lldb::TargetSP GetTargetFromEvent(const Event *event_ptr)
const lldb::ProcessSP & GetProcessSP() const
std::recursive_mutex & GetAPIMutex()
static llvm::StringRef GetStaticBroadcasterClass()
Status Attach(ProcessAttachInfo &attach_info, Stream *stream)
lldb::ExpressionResults EvaluateExpression(llvm::StringRef expression, ExecutionContextScope *exe_scope, lldb::ValueObjectSP &result_valobj_sp, const EvaluateExpressionOptions &options=EvaluateExpressionOptions(), std::string *fixed_expression=nullptr, ValueObject *ctx_obj=nullptr)
TypeIterable Types() const
A class that contains all state required for type lookups.
This class tracks the state and results of a TypeQuery.
lldb::TypeSP GetFirstType() const
bool SetFromStringRef(llvm::StringRef str)
static lldb::ValueObjectSP Create(ExecutionContextScope *exe_scope, lldb::ByteOrder byte_order, uint32_t addr_byte_size, lldb::addr_t address=LLDB_INVALID_ADDRESS)
static lldb::ValueObjectSP Create(ExecutionContextScope *exe_scope, const lldb::VariableSP &var_sp)
static lldb::ValueObjectSP CreateValueObjectFromExpression(llvm::StringRef name, llvm::StringRef expression, const ExecutionContext &exe_ctx)
static lldb::ValueObjectSP CreateValueObjectFromAddress(llvm::StringRef name, uint64_t address, const ExecutionContext &exe_ctx, CompilerType type, bool do_deref=true)
Given an address either create a value object containing the value at that address,...
static lldb::ValueObjectSP CreateValueObjectFromData(llvm::StringRef name, const DataExtractor &data, const ExecutionContext &exe_ctx, CompilerType type)
#define LLDB_INVALID_GLOBALLY_UNIQUE_TARGET_ID
#define LLDB_WATCH_TYPE_WRITE
#define LLDB_INVALID_BREAK_ID
#define LLDB_INVALID_WATCH_ID
#define LLDB_WATCH_TYPE_MODIFY
#define LLDB_WATCH_TYPE_READ
#define LLDB_INVALID_ADDRESS
A class that represents a running process on the host machine.
Log * GetLog(Cat mask)
Retrieve the Log object for the channel associated with the given log enum.
MatchType
String matching algorithm used by SBTarget.
@ eMatchTypeRegexInsensitive
class LLDB_API SBBroadcaster
std::shared_ptr< lldb_private::ABI > ABISP
class LLDB_API SBFileSpec
DescriptionLevel
Description levels for "void GetDescription(Stream *, DescriptionLevel)" calls.
BasicType
Basic types enumeration for the public API SBType::GetBasicType().
@ eWatchpointWriteTypeOnModify
Stop on a write to the memory region that changes its value.
@ eWatchpointWriteTypeAlways
Stop on any write access to the memory region, even if the value doesn't change.
std::shared_ptr< lldb_private::ScriptedMetadata > ScriptedMetadataSP
std::shared_ptr< lldb_private::ValueObject > ValueObjectSP
std::shared_ptr< lldb_private::Platform > PlatformSP
StateType
Process and Thread States.
@ eStateConnected
Process is connected to remote debug services, but not launched or attached to anything yet.
@ eStateAttaching
Process is currently trying to attach.
LanguageType
Programming language type.
@ eLanguageTypeUnknown
Unknown or invalid language value.
std::shared_ptr< lldb_private::Breakpoint > BreakpointSP
std::shared_ptr< lldb_private::Type > TypeSP
std::shared_ptr< lldb_private::Process > ProcessSP
ByteOrder
Byte ordering definitions.
class LLDB_API SBEnvironment
std::shared_ptr< lldb_private::Watchpoint > WatchpointSP
std::shared_ptr< lldb_private::Variable > VariableSP
std::shared_ptr< lldb_private::ScriptedFrameProviderInterface > ScriptedFrameProviderInterfaceSP
class LLDB_API SBStringList
std::shared_ptr< lldb_private::Section > SectionSP
std::shared_ptr< lldb_private::Target > TargetSP
@ eStructuredDataTypeDictionary
std::shared_ptr< lldb_private::DataExtractor > DataExtractorSP
std::shared_ptr< lldb_private::Module > ModuleSP
Options used by Module::FindFunctions.
bool include_inlines
Include inlined functions.
bool include_symbols
Include the symbol table.
This struct contains the metadata needed to instantiate a frame provider and optional filters to cont...
lldb::ScriptedFrameProviderInterfaceSP interface_sp
Interface for calling static methods on the provider class.