1 //===-- Process.cpp ---------------------------------------------*- C++ -*-===//
2 //
3 //                     The LLVM Compiler Infrastructure
4 //
5 // This file is distributed under the University of Illinois Open Source
6 // License. See LICENSE.TXT for details.
7 //
8 //===----------------------------------------------------------------------===//
9 
10 #include "lldb/Target/Process.h"
11 
12 #include "lldb/lldb-private-log.h"
13 
14 #include "lldb/Breakpoint/StoppointCallbackContext.h"
15 #include "lldb/Breakpoint/BreakpointLocation.h"
16 #include "lldb/Core/Event.h"
17 #include "lldb/Core/ConnectionFileDescriptor.h"
18 #include "lldb/Core/Debugger.h"
19 #include "lldb/Core/InputReader.h"
20 #include "lldb/Core/Log.h"
21 #include "lldb/Core/PluginManager.h"
22 #include "lldb/Core/State.h"
23 #include "lldb/Expression/ClangUserExpression.h"
24 #include "lldb/Interpreter/CommandInterpreter.h"
25 #include "lldb/Host/Host.h"
26 #include "lldb/Target/ABI.h"
27 #include "lldb/Target/DynamicLoader.h"
28 #include "lldb/Target/LanguageRuntime.h"
29 #include "lldb/Target/CPPLanguageRuntime.h"
30 #include "lldb/Target/ObjCLanguageRuntime.h"
31 #include "lldb/Target/Platform.h"
32 #include "lldb/Target/RegisterContext.h"
33 #include "lldb/Target/StopInfo.h"
34 #include "lldb/Target/Target.h"
35 #include "lldb/Target/TargetList.h"
36 #include "lldb/Target/Thread.h"
37 #include "lldb/Target/ThreadPlan.h"
38 
39 using namespace lldb;
40 using namespace lldb_private;
41 
42 void
43 ProcessInstanceInfo::Dump (Stream &s, Platform *platform) const
44 {
45     const char *cstr;
46     if (m_pid != LLDB_INVALID_PROCESS_ID)
47         s.Printf ("    pid = %i\n", m_pid);
48 
49     if (m_parent_pid != LLDB_INVALID_PROCESS_ID)
50         s.Printf (" parent = %i\n", m_parent_pid);
51 
52     if (m_executable)
53     {
54         s.Printf ("   name = %s\n", m_executable.GetFilename().GetCString());
55         s.PutCString ("   file = ");
56         m_executable.Dump(&s);
57         s.EOL();
58     }
59     const uint32_t argc = m_arguments.GetArgumentCount();
60     if (argc > 0)
61     {
62         for (uint32_t i=0; i<argc; i++)
63         {
64             const char *arg = m_arguments.GetArgumentAtIndex(i);
65             if (i < 10)
66                 s.Printf (" arg[%u] = %s\n", i, arg);
67             else
68                 s.Printf ("arg[%u] = %s\n", i, arg);
69         }
70     }
71 
72     const uint32_t envc = m_environment.GetArgumentCount();
73     if (envc > 0)
74     {
75         for (uint32_t i=0; i<envc; i++)
76         {
77             const char *env = m_environment.GetArgumentAtIndex(i);
78             if (i < 10)
79                 s.Printf (" env[%u] = %s\n", i, env);
80             else
81                 s.Printf ("env[%u] = %s\n", i, env);
82         }
83     }
84 
85     if (m_arch.IsValid())
86         s.Printf ("   arch = %s\n", m_arch.GetTriple().str().c_str());
87 
88     if (m_uid != UINT32_MAX)
89     {
90         cstr = platform->GetUserName (m_uid);
91         s.Printf ("    uid = %-5u (%s)\n", m_uid, cstr ? cstr : "");
92     }
93     if (m_gid != UINT32_MAX)
94     {
95         cstr = platform->GetGroupName (m_gid);
96         s.Printf ("    gid = %-5u (%s)\n", m_gid, cstr ? cstr : "");
97     }
98     if (m_euid != UINT32_MAX)
99     {
100         cstr = platform->GetUserName (m_euid);
101         s.Printf ("   euid = %-5u (%s)\n", m_euid, cstr ? cstr : "");
102     }
103     if (m_egid != UINT32_MAX)
104     {
105         cstr = platform->GetGroupName (m_egid);
106         s.Printf ("   egid = %-5u (%s)\n", m_egid, cstr ? cstr : "");
107     }
108 }
109 
110 void
111 ProcessInstanceInfo::DumpTableHeader (Stream &s, Platform *platform, bool show_args, bool verbose)
112 {
113     const char *label;
114     if (show_args || verbose)
115         label = "ARGUMENTS";
116     else
117         label = "NAME";
118 
119     if (verbose)
120     {
121         s.Printf     ("PID    PARENT USER       GROUP      EFF USER   EFF GROUP  TRIPLE                   %s\n", label);
122         s.PutCString ("====== ====== ========== ========== ========== ========== ======================== ============================\n");
123     }
124     else
125     {
126         s.Printf     ("PID    PARENT USER       ARCH    %s\n", label);
127         s.PutCString ("====== ====== ========== ======= ============================\n");
128     }
129 }
130 
131 void
132 ProcessInstanceInfo::DumpAsTableRow (Stream &s, Platform *platform, bool show_args, bool verbose) const
133 {
134     if (m_pid != LLDB_INVALID_PROCESS_ID)
135     {
136         const char *cstr;
137         s.Printf ("%-6u %-6u ", m_pid, m_parent_pid);
138 
139 
140         if (verbose)
141         {
142             cstr = platform->GetUserName (m_uid);
143             if (cstr && cstr[0]) // Watch for empty string that indicates lookup failed
144                 s.Printf ("%-10s ", cstr);
145             else
146                 s.Printf ("%-10u ", m_uid);
147 
148             cstr = platform->GetGroupName (m_gid);
149             if (cstr && cstr[0]) // Watch for empty string that indicates lookup failed
150                 s.Printf ("%-10s ", cstr);
151             else
152                 s.Printf ("%-10u ", m_gid);
153 
154             cstr = platform->GetUserName (m_euid);
155             if (cstr && cstr[0]) // Watch for empty string that indicates lookup failed
156                 s.Printf ("%-10s ", cstr);
157             else
158                 s.Printf ("%-10u ", m_euid);
159 
160             cstr = platform->GetGroupName (m_egid);
161             if (cstr && cstr[0]) // Watch for empty string that indicates lookup failed
162                 s.Printf ("%-10s ", cstr);
163             else
164                 s.Printf ("%-10u ", m_egid);
165             s.Printf ("%-24s ", m_arch.IsValid() ? m_arch.GetTriple().str().c_str() : "");
166         }
167         else
168         {
169             s.Printf ("%-10s %.*-7s ",
170                       platform->GetUserName (m_euid),
171                       (int)m_arch.GetTriple().getArchName().size(),
172                       m_arch.GetTriple().getArchName().data());
173         }
174 
175         if (verbose || show_args)
176         {
177             const uint32_t argc = m_arguments.GetArgumentCount();
178             if (argc > 0)
179             {
180                 for (uint32_t i=0; i<argc; i++)
181                 {
182                     if (i > 0)
183                         s.PutChar (' ');
184                     s.PutCString (m_arguments.GetArgumentAtIndex(i));
185                 }
186             }
187         }
188         else
189         {
190             s.PutCString (GetName());
191         }
192 
193         s.EOL();
194     }
195 }
196 
197 
198 void
199 ProcessInfo::SetArgumentsFromArgs (const Args& args,
200                                        bool first_arg_is_executable,
201                                        bool first_arg_is_executable_and_argument)
202 {
203     // Copy all arguments
204     m_arguments = args;
205 
206     // Is the first argument the executable?
207     if (first_arg_is_executable)
208     {
209         const char *first_arg = args.GetArgumentAtIndex (0);
210         if (first_arg)
211         {
212             // Yes the first argument is an executable, set it as the executable
213             // in the launch options. Don't resolve the file path as the path
214             // could be a remote platform path
215             const bool resolve = false;
216             m_executable.SetFile(first_arg, resolve);
217 
218             // If argument zero is an executable and shouldn't be included
219             // in the arguments, remove it from the front of the arguments
220             if (first_arg_is_executable_and_argument == false)
221                 m_arguments.DeleteArgumentAtIndex (0);
222         }
223     }
224 }
225 
226 bool
227 ProcessLaunchInfo::FileAction::Open (int fd, const char *path, bool read, bool write)
228 {
229     if ((read || write) && fd >= 0 && path && path[0])
230     {
231         m_action = eFileActionOpen;
232         m_fd = fd;
233         if (read && write)
234             m_arg = O_RDWR;
235         else if (read)
236             m_arg = O_RDONLY;
237         else
238             m_arg = O_WRONLY;
239         m_path.assign (path);
240         return true;
241     }
242     else
243     {
244         Clear();
245     }
246     return false;
247 }
248 
249 bool
250 ProcessLaunchInfo::FileAction::Close (int fd)
251 {
252     Clear();
253     if (fd >= 0)
254     {
255         m_action = eFileActionClose;
256         m_fd = fd;
257     }
258     return m_fd >= 0;
259 }
260 
261 
262 bool
263 ProcessLaunchInfo::FileAction::Duplicate (int fd, int dup_fd)
264 {
265     Clear();
266     if (fd >= 0 && dup_fd >= 0)
267     {
268         m_action = eFileActionDuplicate;
269         m_fd = fd;
270         m_arg = dup_fd;
271     }
272     return m_fd >= 0;
273 }
274 
275 
276 
277 bool
278 ProcessLaunchInfo::FileAction::AddPosixSpawnFileAction (posix_spawn_file_actions_t *file_actions,
279                                                         const FileAction *info,
280                                                         Log *log,
281                                                         Error& error)
282 {
283     if (info == NULL)
284         return false;
285 
286     switch (info->m_action)
287     {
288         case eFileActionNone:
289             error.Clear();
290             break;
291 
292         case eFileActionClose:
293             if (info->m_fd == -1)
294                 error.SetErrorString ("invalid fd for posix_spawn_file_actions_addclose(...)");
295             else
296             {
297                 error.SetError (::posix_spawn_file_actions_addclose (file_actions, info->m_fd),
298                                 eErrorTypePOSIX);
299                 if (log && (error.Fail() || log))
300                     error.PutToLog(log, "posix_spawn_file_actions_addclose (action=%p, fd=%i)",
301                                    file_actions, info->m_fd);
302             }
303             break;
304 
305         case eFileActionDuplicate:
306             if (info->m_fd == -1)
307                 error.SetErrorString ("invalid fd for posix_spawn_file_actions_adddup2(...)");
308             else if (info->m_arg == -1)
309                 error.SetErrorString ("invalid duplicate fd for posix_spawn_file_actions_adddup2(...)");
310             else
311             {
312                 error.SetError (::posix_spawn_file_actions_adddup2 (file_actions, info->m_fd, info->m_arg),
313                                 eErrorTypePOSIX);
314                 if (log && (error.Fail() || log))
315                     error.PutToLog(log, "posix_spawn_file_actions_adddup2 (action=%p, fd=%i, dup_fd=%i)",
316                                    file_actions, info->m_fd, info->m_arg);
317             }
318             break;
319 
320         case eFileActionOpen:
321             if (info->m_fd == -1)
322                 error.SetErrorString ("invalid fd in posix_spawn_file_actions_addopen(...)");
323             else
324             {
325                 int oflag = info->m_arg;
326                 mode_t mode = 0;
327 
328                 error.SetError (::posix_spawn_file_actions_addopen (file_actions,
329                                                                     info->m_fd,
330                                                                     info->m_path.c_str(),
331                                                                     oflag,
332                                                                     mode),
333                                 eErrorTypePOSIX);
334                 if (error.Fail() || log)
335                     error.PutToLog(log,
336                                    "posix_spawn_file_actions_addopen (action=%p, fd=%i, path='%s', oflag=%i, mode=%i)",
337                                    file_actions, info->m_fd, info->m_path.c_str(), oflag, mode);
338             }
339             break;
340 
341         default:
342             error.SetErrorStringWithFormat ("invalid file action: %i", info->m_action);
343             break;
344     }
345     return error.Success();
346 }
347 
348 Error
349 ProcessLaunchCommandOptions::SetOptionValue (uint32_t option_idx, const char *option_arg)
350 {
351     Error error;
352     char short_option = (char) m_getopt_table[option_idx].val;
353 
354     switch (short_option)
355     {
356         case 's':   // Stop at program entry point
357             launch_info.GetFlags().Set (eLaunchFlagStopAtEntry);
358             break;
359 
360         case 'e':   // STDERR for read + write
361             {
362                 ProcessLaunchInfo::FileAction action;
363                 if (action.Open(STDERR_FILENO, option_arg, true, true))
364                     launch_info.AppendFileAction (action);
365             }
366             break;
367 
368         case 'i':   // STDIN for read only
369             {
370                 ProcessLaunchInfo::FileAction action;
371                 if (action.Open(STDIN_FILENO, option_arg, true, false))
372                     launch_info.AppendFileAction (action);
373             }
374             break;
375 
376         case 'o':   // Open STDOUT for write only
377             {
378                 ProcessLaunchInfo::FileAction action;
379                 if (action.Open(STDOUT_FILENO, option_arg, false, true))
380                     launch_info.AppendFileAction (action);
381             }
382             break;
383 
384         case 'p':   // Process plug-in name
385             launch_info.SetProcessPluginName (option_arg);
386             break;
387 
388         case 'n':   // Disable STDIO
389             {
390                 ProcessLaunchInfo::FileAction action;
391                 if (action.Open(STDERR_FILENO, "/dev/null", true, true))
392                     launch_info.AppendFileAction (action);
393                 if (action.Open(STDOUT_FILENO, "/dev/null", false, true))
394                     launch_info.AppendFileAction (action);
395                 if (action.Open(STDIN_FILENO, "/dev/null", true, false))
396                     launch_info.AppendFileAction (action);
397             }
398             break;
399 
400         case 'w':
401             launch_info.SetWorkingDirectory (option_arg);
402             break;
403 
404         case 't':   // Open process in new terminal window
405             launch_info.GetFlags().Set (eLaunchFlagLaunchInTTY);
406             break;
407 
408         case 'a':
409             launch_info.GetArchitecture().SetTriple (option_arg,
410                                                      m_interpreter.GetPlatform(true).get());
411             break;
412 
413         case 'A':
414             launch_info.GetFlags().Set (eLaunchFlagDisableASLR);
415             break;
416 
417         case 'v':
418             launch_info.GetEnvironmentEntries().AppendArgument(option_arg);
419             break;
420 
421         default:
422             error.SetErrorStringWithFormat("Invalid short option character '%c'.\n", short_option);
423             break;
424 
425     }
426     return error;
427 }
428 
429 OptionDefinition
430 ProcessLaunchCommandOptions::g_option_table[] =
431 {
432 { LLDB_OPT_SET_ALL, false, "stop-at-entry", 's', no_argument,       NULL, 0, eArgTypeNone,          "Stop at the entry point of the program when launching a process."},
433 { LLDB_OPT_SET_ALL, false, "disable-aslr",  'A', no_argument,       NULL, 0, eArgTypeNone,          "Disable address space layout randomization when launching a process."},
434 { LLDB_OPT_SET_ALL, false, "plugin",        'p', required_argument, NULL, 0, eArgTypePlugin,        "Name of the process plugin you want to use."},
435 { LLDB_OPT_SET_ALL, false, "working-dir",   'w', required_argument, NULL, 0, eArgTypePath,          "Set the current working directory to <path> when running the inferior."},
436 { LLDB_OPT_SET_ALL, false, "arch",          'a', required_argument, NULL, 0, eArgTypeArchitecture,  "Set the architecture for the process to launch when ambiguous."},
437 { LLDB_OPT_SET_ALL, false, "environment",   'v', required_argument, NULL, 0, eArgTypeNone,          "Specify an environment variable name/value stirng (--environement NAME=VALUE). Can be specified multiple times for subsequent environment entries."},
438 
439 { LLDB_OPT_SET_1  , false, "stdin",         'i', required_argument, NULL, 0, eArgTypePath,    "Redirect stdin for the process to <path>."},
440 { LLDB_OPT_SET_1  , false, "stdout",        'o', required_argument, NULL, 0, eArgTypePath,    "Redirect stdout for the process to <path>."},
441 { LLDB_OPT_SET_1  , false, "stderr",        'e', required_argument, NULL, 0, eArgTypePath,    "Redirect stderr for the process to <path>."},
442 
443 { LLDB_OPT_SET_2  , false, "tty",           't', no_argument,       NULL, 0, eArgTypeNone,    "Start the process in a terminal (not supported on all platforms)."},
444 
445 { LLDB_OPT_SET_3  , false, "no-stdio",      'n', no_argument,       NULL, 0, eArgTypeNone,    "Do not set up for terminal I/O to go to running process."},
446 
447 { 0               , false, NULL,             0,  0,                 NULL, 0, eArgTypeNone,    NULL }
448 };
449 
450 
451 
452 bool
453 ProcessInstanceInfoMatch::NameMatches (const char *process_name) const
454 {
455     if (m_name_match_type == eNameMatchIgnore || process_name == NULL)
456         return true;
457     const char *match_name = m_match_info.GetName();
458     if (!match_name)
459         return true;
460 
461     return lldb_private::NameMatches (process_name, m_name_match_type, match_name);
462 }
463 
464 bool
465 ProcessInstanceInfoMatch::Matches (const ProcessInstanceInfo &proc_info) const
466 {
467     if (!NameMatches (proc_info.GetName()))
468         return false;
469 
470     if (m_match_info.ProcessIDIsValid() &&
471         m_match_info.GetProcessID() != proc_info.GetProcessID())
472         return false;
473 
474     if (m_match_info.ParentProcessIDIsValid() &&
475         m_match_info.GetParentProcessID() != proc_info.GetParentProcessID())
476         return false;
477 
478     if (m_match_info.UserIDIsValid () &&
479         m_match_info.GetUserID() != proc_info.GetUserID())
480         return false;
481 
482     if (m_match_info.GroupIDIsValid () &&
483         m_match_info.GetGroupID() != proc_info.GetGroupID())
484         return false;
485 
486     if (m_match_info.EffectiveUserIDIsValid () &&
487         m_match_info.GetEffectiveUserID() != proc_info.GetEffectiveUserID())
488         return false;
489 
490     if (m_match_info.EffectiveGroupIDIsValid () &&
491         m_match_info.GetEffectiveGroupID() != proc_info.GetEffectiveGroupID())
492         return false;
493 
494     if (m_match_info.GetArchitecture().IsValid() &&
495         m_match_info.GetArchitecture() != proc_info.GetArchitecture())
496         return false;
497     return true;
498 }
499 
500 bool
501 ProcessInstanceInfoMatch::MatchAllProcesses () const
502 {
503     if (m_name_match_type != eNameMatchIgnore)
504         return false;
505 
506     if (m_match_info.ProcessIDIsValid())
507         return false;
508 
509     if (m_match_info.ParentProcessIDIsValid())
510         return false;
511 
512     if (m_match_info.UserIDIsValid ())
513         return false;
514 
515     if (m_match_info.GroupIDIsValid ())
516         return false;
517 
518     if (m_match_info.EffectiveUserIDIsValid ())
519         return false;
520 
521     if (m_match_info.EffectiveGroupIDIsValid ())
522         return false;
523 
524     if (m_match_info.GetArchitecture().IsValid())
525         return false;
526 
527     if (m_match_all_users)
528         return false;
529 
530     return true;
531 
532 }
533 
534 void
535 ProcessInstanceInfoMatch::Clear()
536 {
537     m_match_info.Clear();
538     m_name_match_type = eNameMatchIgnore;
539     m_match_all_users = false;
540 }
541 
542 //----------------------------------------------------------------------
543 // MemoryCache constructor
544 //----------------------------------------------------------------------
545 Process::MemoryCache::MemoryCache() :
546     m_cache_line_byte_size (512),
547     m_cache_mutex (Mutex::eMutexTypeRecursive),
548     m_cache ()
549 {
550 }
551 
552 //----------------------------------------------------------------------
553 // Destructor
554 //----------------------------------------------------------------------
555 Process::MemoryCache::~MemoryCache()
556 {
557 }
558 
559 void
560 Process::MemoryCache::Clear()
561 {
562     Mutex::Locker locker (m_cache_mutex);
563     m_cache.clear();
564 }
565 
566 void
567 Process::MemoryCache::Flush (addr_t addr, size_t size)
568 {
569     if (size == 0)
570         return;
571 
572     const uint32_t cache_line_byte_size = m_cache_line_byte_size;
573     const addr_t end_addr = (addr + size - 1);
574     const addr_t flush_start_addr = addr - (addr % cache_line_byte_size);
575     const addr_t flush_end_addr = end_addr - (end_addr % cache_line_byte_size);
576 
577     Mutex::Locker locker (m_cache_mutex);
578     if (m_cache.empty())
579         return;
580 
581     assert ((flush_start_addr % cache_line_byte_size) == 0);
582 
583     for (addr_t curr_addr = flush_start_addr; curr_addr <= flush_end_addr; curr_addr += cache_line_byte_size)
584     {
585         collection::iterator pos = m_cache.find (curr_addr);
586         if (pos != m_cache.end())
587             m_cache.erase(pos);
588     }
589 }
590 
591 size_t
592 Process::MemoryCache::Read
593 (
594     Process *process,
595     addr_t addr,
596     void *dst,
597     size_t dst_len,
598     Error &error
599 )
600 {
601     size_t bytes_left = dst_len;
602     if (dst && bytes_left > 0)
603     {
604         const uint32_t cache_line_byte_size = m_cache_line_byte_size;
605         uint8_t *dst_buf = (uint8_t *)dst;
606         addr_t curr_addr = addr - (addr % cache_line_byte_size);
607         addr_t cache_offset = addr - curr_addr;
608         Mutex::Locker locker (m_cache_mutex);
609 
610         while (bytes_left > 0)
611         {
612             collection::const_iterator pos = m_cache.find (curr_addr);
613             collection::const_iterator end = m_cache.end ();
614 
615             if (pos != end)
616             {
617                 size_t curr_read_size = cache_line_byte_size - cache_offset;
618                 if (curr_read_size > bytes_left)
619                     curr_read_size = bytes_left;
620 
621                 memcpy (dst_buf + dst_len - bytes_left, pos->second->GetBytes() + cache_offset, curr_read_size);
622 
623                 bytes_left -= curr_read_size;
624                 curr_addr += curr_read_size + cache_offset;
625                 cache_offset = 0;
626 
627                 if (bytes_left > 0)
628                 {
629                     // Get sequential cache page hits
630                     for (++pos; (pos != end) && (bytes_left > 0); ++pos)
631                     {
632                         assert ((curr_addr % cache_line_byte_size) == 0);
633 
634                         if (pos->first != curr_addr)
635                             break;
636 
637                         curr_read_size = pos->second->GetByteSize();
638                         if (curr_read_size > bytes_left)
639                             curr_read_size = bytes_left;
640 
641                         memcpy (dst_buf + dst_len - bytes_left, pos->second->GetBytes(), curr_read_size);
642 
643                         bytes_left -= curr_read_size;
644                         curr_addr += curr_read_size;
645 
646                         // We have a cache page that succeeded to read some bytes
647                         // but not an entire page. If this happens, we must cap
648                         // off how much data we are able to read...
649                         if (pos->second->GetByteSize() != cache_line_byte_size)
650                             return dst_len - bytes_left;
651                     }
652                 }
653             }
654 
655             // We need to read from the process
656 
657             if (bytes_left > 0)
658             {
659                 assert ((curr_addr % cache_line_byte_size) == 0);
660                 std::auto_ptr<DataBufferHeap> data_buffer_heap_ap(new DataBufferHeap (cache_line_byte_size, 0));
661                 size_t process_bytes_read = process->ReadMemoryFromInferior (curr_addr,
662                                                                              data_buffer_heap_ap->GetBytes(),
663                                                                              data_buffer_heap_ap->GetByteSize(),
664                                                                              error);
665                 if (process_bytes_read == 0)
666                     return dst_len - bytes_left;
667 
668                 if (process_bytes_read != cache_line_byte_size)
669                     data_buffer_heap_ap->SetByteSize (process_bytes_read);
670                 m_cache[curr_addr] = DataBufferSP (data_buffer_heap_ap.release());
671                 // We have read data and put it into the cache, continue through the
672                 // loop again to get the data out of the cache...
673             }
674         }
675     }
676 
677     return dst_len - bytes_left;
678 }
679 
680 Process*
681 Process::FindPlugin (Target &target, const char *plugin_name, Listener &listener)
682 {
683     ProcessCreateInstance create_callback = NULL;
684     if (plugin_name)
685     {
686         create_callback  = PluginManager::GetProcessCreateCallbackForPluginName (plugin_name);
687         if (create_callback)
688         {
689             std::auto_ptr<Process> debugger_ap(create_callback(target, listener));
690             if (debugger_ap->CanDebug(target))
691                 return debugger_ap.release();
692         }
693     }
694     else
695     {
696         for (uint32_t idx = 0; (create_callback = PluginManager::GetProcessCreateCallbackAtIndex(idx)) != NULL; ++idx)
697         {
698             std::auto_ptr<Process> debugger_ap(create_callback(target, listener));
699             if (debugger_ap->CanDebug(target))
700                 return debugger_ap.release();
701         }
702     }
703     return NULL;
704 }
705 
706 
707 //----------------------------------------------------------------------
708 // Process constructor
709 //----------------------------------------------------------------------
710 Process::Process(Target &target, Listener &listener) :
711     UserID (LLDB_INVALID_PROCESS_ID),
712     Broadcaster ("lldb.process"),
713     ProcessInstanceSettings (*GetSettingsController()),
714     m_target (target),
715     m_public_state (eStateUnloaded),
716     m_private_state (eStateUnloaded),
717     m_private_state_broadcaster ("lldb.process.internal_state_broadcaster"),
718     m_private_state_control_broadcaster ("lldb.process.internal_state_control_broadcaster"),
719     m_private_state_listener ("lldb.process.internal_state_listener"),
720     m_private_state_control_wait(),
721     m_private_state_thread (LLDB_INVALID_HOST_THREAD),
722     m_stop_id (0),
723     m_thread_index_id (0),
724     m_exit_status (-1),
725     m_exit_string (),
726     m_thread_list (this),
727     m_notifications (),
728     m_image_tokens (),
729     m_listener (listener),
730     m_breakpoint_site_list (),
731     m_dynamic_checkers_ap (),
732     m_unix_signals (),
733     m_abi_sp (),
734     m_process_input_reader (),
735     m_stdio_communication ("process.stdio"),
736     m_stdio_communication_mutex (Mutex::eMutexTypeRecursive),
737     m_stdout_data (),
738     m_memory_cache (),
739     m_next_event_action_ap()
740 {
741     UpdateInstanceName();
742 
743     LogSP log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_OBJECT));
744     if (log)
745         log->Printf ("%p Process::Process()", this);
746 
747     SetEventName (eBroadcastBitStateChanged, "state-changed");
748     SetEventName (eBroadcastBitInterrupt, "interrupt");
749     SetEventName (eBroadcastBitSTDOUT, "stdout-available");
750     SetEventName (eBroadcastBitSTDERR, "stderr-available");
751 
752     listener.StartListeningForEvents (this,
753                                       eBroadcastBitStateChanged |
754                                       eBroadcastBitInterrupt |
755                                       eBroadcastBitSTDOUT |
756                                       eBroadcastBitSTDERR);
757 
758     m_private_state_listener.StartListeningForEvents(&m_private_state_broadcaster,
759                                                      eBroadcastBitStateChanged);
760 
761     m_private_state_listener.StartListeningForEvents(&m_private_state_control_broadcaster,
762                                                      eBroadcastInternalStateControlStop |
763                                                      eBroadcastInternalStateControlPause |
764                                                      eBroadcastInternalStateControlResume);
765 }
766 
767 //----------------------------------------------------------------------
768 // Destructor
769 //----------------------------------------------------------------------
770 Process::~Process()
771 {
772     LogSP log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_OBJECT));
773     if (log)
774         log->Printf ("%p Process::~Process()", this);
775     StopPrivateStateThread();
776 }
777 
778 void
779 Process::Finalize()
780 {
781     // Do any cleanup needed prior to being destructed... Subclasses
782     // that override this method should call this superclass method as well.
783 
784     // We need to destroy the loader before the derived Process class gets destroyed
785     // since it is very likely that undoing the loader will require access to the real process.
786     if (m_dyld_ap.get() != NULL)
787         m_dyld_ap.reset();
788 }
789 
790 void
791 Process::RegisterNotificationCallbacks (const Notifications& callbacks)
792 {
793     m_notifications.push_back(callbacks);
794     if (callbacks.initialize != NULL)
795         callbacks.initialize (callbacks.baton, this);
796 }
797 
798 bool
799 Process::UnregisterNotificationCallbacks(const Notifications& callbacks)
800 {
801     std::vector<Notifications>::iterator pos, end = m_notifications.end();
802     for (pos = m_notifications.begin(); pos != end; ++pos)
803     {
804         if (pos->baton == callbacks.baton &&
805             pos->initialize == callbacks.initialize &&
806             pos->process_state_changed == callbacks.process_state_changed)
807         {
808             m_notifications.erase(pos);
809             return true;
810         }
811     }
812     return false;
813 }
814 
815 void
816 Process::SynchronouslyNotifyStateChanged (StateType state)
817 {
818     std::vector<Notifications>::iterator notification_pos, notification_end = m_notifications.end();
819     for (notification_pos = m_notifications.begin(); notification_pos != notification_end; ++notification_pos)
820     {
821         if (notification_pos->process_state_changed)
822             notification_pos->process_state_changed (notification_pos->baton, this, state);
823     }
824 }
825 
826 // FIXME: We need to do some work on events before the general Listener sees them.
827 // For instance if we are continuing from a breakpoint, we need to ensure that we do
828 // the little "insert real insn, step & stop" trick.  But we can't do that when the
829 // event is delivered by the broadcaster - since that is done on the thread that is
830 // waiting for new events, so if we needed more than one event for our handling, we would
831 // stall.  So instead we do it when we fetch the event off of the queue.
832 //
833 
834 StateType
835 Process::GetNextEvent (EventSP &event_sp)
836 {
837     StateType state = eStateInvalid;
838 
839     if (m_listener.GetNextEventForBroadcaster (this, event_sp) && event_sp)
840         state = Process::ProcessEventData::GetStateFromEvent (event_sp.get());
841 
842     return state;
843 }
844 
845 
846 StateType
847 Process::WaitForProcessToStop (const TimeValue *timeout)
848 {
849     StateType match_states[] = { eStateStopped, eStateCrashed, eStateDetached, eStateExited, eStateUnloaded };
850     return WaitForState (timeout, match_states, sizeof(match_states) / sizeof(StateType));
851 }
852 
853 
854 StateType
855 Process::WaitForState
856 (
857     const TimeValue *timeout,
858     const StateType *match_states, const uint32_t num_match_states
859 )
860 {
861     EventSP event_sp;
862     uint32_t i;
863     StateType state = GetState();
864     while (state != eStateInvalid)
865     {
866         // If we are exited or detached, we won't ever get back to any
867         // other valid state...
868         if (state == eStateDetached || state == eStateExited)
869             return state;
870 
871         state = WaitForStateChangedEvents (timeout, event_sp);
872 
873         for (i=0; i<num_match_states; ++i)
874         {
875             if (match_states[i] == state)
876                 return state;
877         }
878     }
879     return state;
880 }
881 
882 bool
883 Process::HijackProcessEvents (Listener *listener)
884 {
885     if (listener != NULL)
886     {
887         return HijackBroadcaster(listener, eBroadcastBitStateChanged);
888     }
889     else
890         return false;
891 }
892 
893 void
894 Process::RestoreProcessEvents ()
895 {
896     RestoreBroadcaster();
897 }
898 
899 bool
900 Process::HijackPrivateProcessEvents (Listener *listener)
901 {
902     if (listener != NULL)
903     {
904         return m_private_state_broadcaster.HijackBroadcaster(listener, eBroadcastBitStateChanged);
905     }
906     else
907         return false;
908 }
909 
910 void
911 Process::RestorePrivateProcessEvents ()
912 {
913     m_private_state_broadcaster.RestoreBroadcaster();
914 }
915 
916 StateType
917 Process::WaitForStateChangedEvents (const TimeValue *timeout, EventSP &event_sp)
918 {
919     LogSP log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_PROCESS));
920 
921     if (log)
922         log->Printf ("Process::%s (timeout = %p, event_sp)...", __FUNCTION__, timeout);
923 
924     StateType state = eStateInvalid;
925     if (m_listener.WaitForEventForBroadcasterWithType (timeout,
926                                                        this,
927                                                        eBroadcastBitStateChanged,
928                                                        event_sp))
929         state = Process::ProcessEventData::GetStateFromEvent(event_sp.get());
930 
931     if (log)
932         log->Printf ("Process::%s (timeout = %p, event_sp) => %s",
933                      __FUNCTION__,
934                      timeout,
935                      StateAsCString(state));
936     return state;
937 }
938 
939 Event *
940 Process::PeekAtStateChangedEvents ()
941 {
942     LogSP log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_PROCESS));
943 
944     if (log)
945         log->Printf ("Process::%s...", __FUNCTION__);
946 
947     Event *event_ptr;
948     event_ptr = m_listener.PeekAtNextEventForBroadcasterWithType (this,
949                                                                   eBroadcastBitStateChanged);
950     if (log)
951     {
952         if (event_ptr)
953         {
954             log->Printf ("Process::%s (event_ptr) => %s",
955                          __FUNCTION__,
956                          StateAsCString(ProcessEventData::GetStateFromEvent (event_ptr)));
957         }
958         else
959         {
960             log->Printf ("Process::%s no events found",
961                          __FUNCTION__);
962         }
963     }
964     return event_ptr;
965 }
966 
967 StateType
968 Process::WaitForStateChangedEventsPrivate (const TimeValue *timeout, EventSP &event_sp)
969 {
970     LogSP log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_PROCESS));
971 
972     if (log)
973         log->Printf ("Process::%s (timeout = %p, event_sp)...", __FUNCTION__, timeout);
974 
975     StateType state = eStateInvalid;
976     if (m_private_state_listener.WaitForEventForBroadcasterWithType (timeout,
977                                                                      &m_private_state_broadcaster,
978                                                                      eBroadcastBitStateChanged,
979                                                                      event_sp))
980         state = Process::ProcessEventData::GetStateFromEvent(event_sp.get());
981 
982     // This is a bit of a hack, but when we wait here we could very well return
983     // to the command-line, and that could disable the log, which would render the
984     // log we got above invalid.
985     if (log)
986     {
987         if (state == eStateInvalid)
988             log->Printf ("Process::%s (timeout = %p, event_sp) => TIMEOUT", __FUNCTION__, timeout);
989         else
990             log->Printf ("Process::%s (timeout = %p, event_sp) => %s", __FUNCTION__, timeout, StateAsCString(state));
991     }
992     return state;
993 }
994 
995 bool
996 Process::WaitForEventsPrivate (const TimeValue *timeout, EventSP &event_sp, bool control_only)
997 {
998     LogSP log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_PROCESS));
999 
1000     if (log)
1001         log->Printf ("Process::%s (timeout = %p, event_sp)...", __FUNCTION__, timeout);
1002 
1003     if (control_only)
1004         return m_private_state_listener.WaitForEventForBroadcaster(timeout, &m_private_state_control_broadcaster, event_sp);
1005     else
1006         return m_private_state_listener.WaitForEvent(timeout, event_sp);
1007 }
1008 
1009 bool
1010 Process::IsRunning () const
1011 {
1012     return StateIsRunningState (m_public_state.GetValue());
1013 }
1014 
1015 int
1016 Process::GetExitStatus ()
1017 {
1018     if (m_public_state.GetValue() == eStateExited)
1019         return m_exit_status;
1020     return -1;
1021 }
1022 
1023 
1024 void
1025 Process::ProcessInstanceSettings::GetHostEnvironmentIfNeeded ()
1026 {
1027     if (m_inherit_host_env && !m_got_host_env)
1028     {
1029         m_got_host_env = true;
1030         StringList host_env;
1031         const size_t host_env_count = Host::GetEnvironment (host_env);
1032         for (size_t idx=0; idx<host_env_count; idx++)
1033         {
1034             const char *env_entry = host_env.GetStringAtIndex (idx);
1035             if (env_entry)
1036             {
1037                 const char *equal_pos = ::strchr(env_entry, '=');
1038                 if (equal_pos)
1039                 {
1040                     std::string key (env_entry, equal_pos - env_entry);
1041                     std::string value (equal_pos + 1);
1042                     if (m_env_vars.find (key) == m_env_vars.end())
1043                         m_env_vars[key] = value;
1044                 }
1045             }
1046         }
1047     }
1048 }
1049 
1050 
1051 size_t
1052 Process::ProcessInstanceSettings::GetEnvironmentAsArgs (Args &env)
1053 {
1054     GetHostEnvironmentIfNeeded ();
1055 
1056     dictionary::const_iterator pos, end = m_env_vars.end();
1057     for (pos = m_env_vars.begin(); pos != end; ++pos)
1058     {
1059         std::string env_var_equal_value (pos->first);
1060         env_var_equal_value.append(1, '=');
1061         env_var_equal_value.append (pos->second);
1062         env.AppendArgument (env_var_equal_value.c_str());
1063     }
1064     return env.GetArgumentCount();
1065 }
1066 
1067 
1068 const char *
1069 Process::GetExitDescription ()
1070 {
1071     if (m_public_state.GetValue() == eStateExited && !m_exit_string.empty())
1072         return m_exit_string.c_str();
1073     return NULL;
1074 }
1075 
1076 bool
1077 Process::SetExitStatus (int status, const char *cstr)
1078 {
1079     LogSP log(lldb_private::GetLogIfAnyCategoriesSet (LIBLLDB_LOG_STATE | LIBLLDB_LOG_PROCESS));
1080     if (log)
1081         log->Printf("Process::SetExitStatus (status=%i (0x%8.8x), description=%s%s%s)",
1082                     status, status,
1083                     cstr ? "\"" : "",
1084                     cstr ? cstr : "NULL",
1085                     cstr ? "\"" : "");
1086 
1087     // We were already in the exited state
1088     if (m_private_state.GetValue() == eStateExited)
1089     {
1090         if (log)
1091             log->Printf("Process::SetExitStatus () ignoring exit status because state was already set to eStateExited");
1092         return false;
1093     }
1094 
1095     m_exit_status = status;
1096     if (cstr)
1097         m_exit_string = cstr;
1098     else
1099         m_exit_string.clear();
1100 
1101     DidExit ();
1102 
1103     SetPrivateState (eStateExited);
1104     return true;
1105 }
1106 
1107 // This static callback can be used to watch for local child processes on
1108 // the current host. The the child process exits, the process will be
1109 // found in the global target list (we want to be completely sure that the
1110 // lldb_private::Process doesn't go away before we can deliver the signal.
1111 bool
1112 Process::SetProcessExitStatus
1113 (
1114     void *callback_baton,
1115     lldb::pid_t pid,
1116     int signo,      // Zero for no signal
1117     int exit_status      // Exit value of process if signal is zero
1118 )
1119 {
1120     if (signo == 0 || exit_status)
1121     {
1122         TargetSP target_sp(Debugger::FindTargetWithProcessID (pid));
1123         if (target_sp)
1124         {
1125             ProcessSP process_sp (target_sp->GetProcessSP());
1126             if (process_sp)
1127             {
1128                 const char *signal_cstr = NULL;
1129                 if (signo)
1130                     signal_cstr = process_sp->GetUnixSignals().GetSignalAsCString (signo);
1131 
1132                 process_sp->SetExitStatus (exit_status, signal_cstr);
1133             }
1134         }
1135         return true;
1136     }
1137     return false;
1138 }
1139 
1140 
1141 uint32_t
1142 Process::GetNextThreadIndexID ()
1143 {
1144     return ++m_thread_index_id;
1145 }
1146 
1147 StateType
1148 Process::GetState()
1149 {
1150     // If any other threads access this we will need a mutex for it
1151     return m_public_state.GetValue ();
1152 }
1153 
1154 void
1155 Process::SetPublicState (StateType new_state)
1156 {
1157     LogSP log(lldb_private::GetLogIfAnyCategoriesSet (LIBLLDB_LOG_STATE | LIBLLDB_LOG_PROCESS));
1158     if (log)
1159         log->Printf("Process::SetPublicState (%s)", StateAsCString(new_state));
1160     m_public_state.SetValue (new_state);
1161 }
1162 
1163 StateType
1164 Process::GetPrivateState ()
1165 {
1166     return m_private_state.GetValue();
1167 }
1168 
1169 void
1170 Process::SetPrivateState (StateType new_state)
1171 {
1172     LogSP log(lldb_private::GetLogIfAnyCategoriesSet (LIBLLDB_LOG_STATE | LIBLLDB_LOG_PROCESS));
1173     bool state_changed = false;
1174 
1175     if (log)
1176         log->Printf("Process::SetPrivateState (%s)", StateAsCString(new_state));
1177 
1178     Mutex::Locker locker(m_private_state.GetMutex());
1179 
1180     const StateType old_state = m_private_state.GetValueNoLock ();
1181     state_changed = old_state != new_state;
1182     if (state_changed)
1183     {
1184         m_private_state.SetValueNoLock (new_state);
1185         if (StateIsStoppedState(new_state))
1186         {
1187             m_stop_id++;
1188             m_memory_cache.Clear();
1189             if (log)
1190                 log->Printf("Process::SetPrivateState (%s) stop_id = %u", StateAsCString(new_state), m_stop_id);
1191         }
1192         // Use our target to get a shared pointer to ourselves...
1193         m_private_state_broadcaster.BroadcastEvent (eBroadcastBitStateChanged, new ProcessEventData (GetTarget().GetProcessSP(), new_state));
1194     }
1195     else
1196     {
1197         if (log)
1198             log->Printf("Process::SetPrivateState (%s) state didn't change. Ignoring...", StateAsCString(new_state), StateAsCString(old_state));
1199     }
1200 }
1201 
1202 
1203 uint32_t
1204 Process::GetStopID() const
1205 {
1206     return m_stop_id;
1207 }
1208 
1209 addr_t
1210 Process::GetImageInfoAddress()
1211 {
1212     return LLDB_INVALID_ADDRESS;
1213 }
1214 
1215 //----------------------------------------------------------------------
1216 // LoadImage
1217 //
1218 // This function provides a default implementation that works for most
1219 // unix variants. Any Process subclasses that need to do shared library
1220 // loading differently should override LoadImage and UnloadImage and
1221 // do what is needed.
1222 //----------------------------------------------------------------------
1223 uint32_t
1224 Process::LoadImage (const FileSpec &image_spec, Error &error)
1225 {
1226     DynamicLoader *loader = GetDynamicLoader();
1227     if (loader)
1228     {
1229         error = loader->CanLoadImage();
1230         if (error.Fail())
1231             return LLDB_INVALID_IMAGE_TOKEN;
1232     }
1233 
1234     if (error.Success())
1235     {
1236         ThreadSP thread_sp(GetThreadList ().GetSelectedThread());
1237         if (thread_sp == NULL)
1238             thread_sp = GetThreadList ().GetThreadAtIndex(0, true);
1239 
1240         if (thread_sp)
1241         {
1242             StackFrameSP frame_sp (thread_sp->GetStackFrameAtIndex (0));
1243 
1244             if (frame_sp)
1245             {
1246                 ExecutionContext exe_ctx;
1247                 frame_sp->CalculateExecutionContext (exe_ctx);
1248                 bool unwind_on_error = true;
1249                 bool keep_in_memory = false;
1250                 StreamString expr;
1251                 char path[PATH_MAX];
1252                 image_spec.GetPath(path, sizeof(path));
1253                 expr.Printf("dlopen (\"%s\", 2)", path);
1254                 const char *prefix = "extern \"C\" void* dlopen (const char *path, int mode);\n";
1255                 lldb::ValueObjectSP result_valobj_sp;
1256                 ClangUserExpression::Evaluate (exe_ctx, keep_in_memory, unwind_on_error, expr.GetData(), prefix, result_valobj_sp);
1257                 if (result_valobj_sp->GetError().Success())
1258                 {
1259                     Scalar scalar;
1260                     if (result_valobj_sp->ResolveValue (scalar))
1261                     {
1262                         addr_t image_ptr = scalar.ULongLong(LLDB_INVALID_ADDRESS);
1263                         if (image_ptr != 0 && image_ptr != LLDB_INVALID_ADDRESS)
1264                         {
1265                             uint32_t image_token = m_image_tokens.size();
1266                             m_image_tokens.push_back (image_ptr);
1267                             return image_token;
1268                         }
1269                     }
1270                 }
1271             }
1272         }
1273     }
1274     return LLDB_INVALID_IMAGE_TOKEN;
1275 }
1276 
1277 //----------------------------------------------------------------------
1278 // UnloadImage
1279 //
1280 // This function provides a default implementation that works for most
1281 // unix variants. Any Process subclasses that need to do shared library
1282 // loading differently should override LoadImage and UnloadImage and
1283 // do what is needed.
1284 //----------------------------------------------------------------------
1285 Error
1286 Process::UnloadImage (uint32_t image_token)
1287 {
1288     Error error;
1289     if (image_token < m_image_tokens.size())
1290     {
1291         const addr_t image_addr = m_image_tokens[image_token];
1292         if (image_addr == LLDB_INVALID_ADDRESS)
1293         {
1294             error.SetErrorString("image already unloaded");
1295         }
1296         else
1297         {
1298             DynamicLoader *loader = GetDynamicLoader();
1299             if (loader)
1300                 error = loader->CanLoadImage();
1301 
1302             if (error.Success())
1303             {
1304                 ThreadSP thread_sp(GetThreadList ().GetSelectedThread());
1305                 if (thread_sp == NULL)
1306                     thread_sp = GetThreadList ().GetThreadAtIndex(0, true);
1307 
1308                 if (thread_sp)
1309                 {
1310                     StackFrameSP frame_sp (thread_sp->GetStackFrameAtIndex (0));
1311 
1312                     if (frame_sp)
1313                     {
1314                         ExecutionContext exe_ctx;
1315                         frame_sp->CalculateExecutionContext (exe_ctx);
1316                         bool unwind_on_error = true;
1317                         bool keep_in_memory = false;
1318                         StreamString expr;
1319                         expr.Printf("dlclose ((void *)0x%llx)", image_addr);
1320                         const char *prefix = "extern \"C\" int dlclose(void* handle);\n";
1321                         lldb::ValueObjectSP result_valobj_sp;
1322                         ClangUserExpression::Evaluate (exe_ctx, unwind_on_error, keep_in_memory, expr.GetData(), prefix, result_valobj_sp);
1323                         if (result_valobj_sp->GetError().Success())
1324                         {
1325                             Scalar scalar;
1326                             if (result_valobj_sp->ResolveValue (scalar))
1327                             {
1328                                 if (scalar.UInt(1))
1329                                 {
1330                                     error.SetErrorStringWithFormat("expression failed: \"%s\"", expr.GetData());
1331                                 }
1332                                 else
1333                                 {
1334                                     m_image_tokens[image_token] = LLDB_INVALID_ADDRESS;
1335                                 }
1336                             }
1337                         }
1338                         else
1339                         {
1340                             error = result_valobj_sp->GetError();
1341                         }
1342                     }
1343                 }
1344             }
1345         }
1346     }
1347     else
1348     {
1349         error.SetErrorString("invalid image token");
1350     }
1351     return error;
1352 }
1353 
1354 const ABI *
1355 Process::GetABI()
1356 {
1357     if (m_abi_sp.get() == NULL)
1358         m_abi_sp.reset(ABI::FindPlugin(m_target.GetArchitecture()));
1359 
1360     return m_abi_sp.get();
1361 }
1362 
1363 LanguageRuntime *
1364 Process::GetLanguageRuntime(lldb::LanguageType language)
1365 {
1366     LanguageRuntimeCollection::iterator pos;
1367     pos = m_language_runtimes.find (language);
1368     if (pos == m_language_runtimes.end())
1369     {
1370         lldb::LanguageRuntimeSP runtime(LanguageRuntime::FindPlugin(this, language));
1371 
1372         m_language_runtimes[language]
1373             = runtime;
1374         return runtime.get();
1375     }
1376     else
1377         return (*pos).second.get();
1378 }
1379 
1380 CPPLanguageRuntime *
1381 Process::GetCPPLanguageRuntime ()
1382 {
1383     LanguageRuntime *runtime = GetLanguageRuntime(eLanguageTypeC_plus_plus);
1384     if (runtime != NULL && runtime->GetLanguageType() == eLanguageTypeC_plus_plus)
1385         return static_cast<CPPLanguageRuntime *> (runtime);
1386     return NULL;
1387 }
1388 
1389 ObjCLanguageRuntime *
1390 Process::GetObjCLanguageRuntime ()
1391 {
1392     LanguageRuntime *runtime = GetLanguageRuntime(eLanguageTypeObjC);
1393     if (runtime != NULL && runtime->GetLanguageType() == eLanguageTypeObjC)
1394         return static_cast<ObjCLanguageRuntime *> (runtime);
1395     return NULL;
1396 }
1397 
1398 BreakpointSiteList &
1399 Process::GetBreakpointSiteList()
1400 {
1401     return m_breakpoint_site_list;
1402 }
1403 
1404 const BreakpointSiteList &
1405 Process::GetBreakpointSiteList() const
1406 {
1407     return m_breakpoint_site_list;
1408 }
1409 
1410 
1411 void
1412 Process::DisableAllBreakpointSites ()
1413 {
1414     m_breakpoint_site_list.SetEnabledForAll (false);
1415 }
1416 
1417 Error
1418 Process::ClearBreakpointSiteByID (lldb::user_id_t break_id)
1419 {
1420     Error error (DisableBreakpointSiteByID (break_id));
1421 
1422     if (error.Success())
1423         m_breakpoint_site_list.Remove(break_id);
1424 
1425     return error;
1426 }
1427 
1428 Error
1429 Process::DisableBreakpointSiteByID (lldb::user_id_t break_id)
1430 {
1431     Error error;
1432     BreakpointSiteSP bp_site_sp = m_breakpoint_site_list.FindByID (break_id);
1433     if (bp_site_sp)
1434     {
1435         if (bp_site_sp->IsEnabled())
1436             error = DisableBreakpoint (bp_site_sp.get());
1437     }
1438     else
1439     {
1440         error.SetErrorStringWithFormat("invalid breakpoint site ID: %i", break_id);
1441     }
1442 
1443     return error;
1444 }
1445 
1446 Error
1447 Process::EnableBreakpointSiteByID (lldb::user_id_t break_id)
1448 {
1449     Error error;
1450     BreakpointSiteSP bp_site_sp = m_breakpoint_site_list.FindByID (break_id);
1451     if (bp_site_sp)
1452     {
1453         if (!bp_site_sp->IsEnabled())
1454             error = EnableBreakpoint (bp_site_sp.get());
1455     }
1456     else
1457     {
1458         error.SetErrorStringWithFormat("invalid breakpoint site ID: %i", break_id);
1459     }
1460     return error;
1461 }
1462 
1463 lldb::break_id_t
1464 Process::CreateBreakpointSite (BreakpointLocationSP &owner, bool use_hardware)
1465 {
1466     const addr_t load_addr = owner->GetAddress().GetLoadAddress (&m_target);
1467     if (load_addr != LLDB_INVALID_ADDRESS)
1468     {
1469         BreakpointSiteSP bp_site_sp;
1470 
1471         // Look up this breakpoint site.  If it exists, then add this new owner, otherwise
1472         // create a new breakpoint site and add it.
1473 
1474         bp_site_sp = m_breakpoint_site_list.FindByAddress (load_addr);
1475 
1476         if (bp_site_sp)
1477         {
1478             bp_site_sp->AddOwner (owner);
1479             owner->SetBreakpointSite (bp_site_sp);
1480             return bp_site_sp->GetID();
1481         }
1482         else
1483         {
1484             bp_site_sp.reset (new BreakpointSite (&m_breakpoint_site_list, owner, load_addr, LLDB_INVALID_THREAD_ID, use_hardware));
1485             if (bp_site_sp)
1486             {
1487                 if (EnableBreakpoint (bp_site_sp.get()).Success())
1488                 {
1489                     owner->SetBreakpointSite (bp_site_sp);
1490                     return m_breakpoint_site_list.Add (bp_site_sp);
1491                 }
1492             }
1493         }
1494     }
1495     // We failed to enable the breakpoint
1496     return LLDB_INVALID_BREAK_ID;
1497 
1498 }
1499 
1500 void
1501 Process::RemoveOwnerFromBreakpointSite (lldb::user_id_t owner_id, lldb::user_id_t owner_loc_id, BreakpointSiteSP &bp_site_sp)
1502 {
1503     uint32_t num_owners = bp_site_sp->RemoveOwner (owner_id, owner_loc_id);
1504     if (num_owners == 0)
1505     {
1506         DisableBreakpoint(bp_site_sp.get());
1507         m_breakpoint_site_list.RemoveByAddress(bp_site_sp->GetLoadAddress());
1508     }
1509 }
1510 
1511 
1512 size_t
1513 Process::RemoveBreakpointOpcodesFromBuffer (addr_t bp_addr, size_t size, uint8_t *buf) const
1514 {
1515     size_t bytes_removed = 0;
1516     addr_t intersect_addr;
1517     size_t intersect_size;
1518     size_t opcode_offset;
1519     size_t idx;
1520     BreakpointSiteSP bp;
1521 
1522     for (idx = 0; (bp = m_breakpoint_site_list.GetByIndex(idx)) != NULL; ++idx)
1523     {
1524         if (bp->GetType() == BreakpointSite::eSoftware)
1525         {
1526             if (bp->IntersectsRange(bp_addr, size, &intersect_addr, &intersect_size, &opcode_offset))
1527             {
1528                 assert(bp_addr <= intersect_addr && intersect_addr < bp_addr + size);
1529                 assert(bp_addr < intersect_addr + intersect_size && intersect_addr + intersect_size <= bp_addr + size);
1530                 assert(opcode_offset + intersect_size <= bp->GetByteSize());
1531                 size_t buf_offset = intersect_addr - bp_addr;
1532                 ::memcpy(buf + buf_offset, bp->GetSavedOpcodeBytes() + opcode_offset, intersect_size);
1533             }
1534         }
1535     }
1536     return bytes_removed;
1537 }
1538 
1539 
1540 
1541 size_t
1542 Process::GetSoftwareBreakpointTrapOpcode (BreakpointSite* bp_site)
1543 {
1544     PlatformSP platform_sp (m_target.GetPlatform());
1545     if (platform_sp)
1546         return platform_sp->GetSoftwareBreakpointTrapOpcode (m_target, bp_site);
1547     return 0;
1548 }
1549 
1550 Error
1551 Process::EnableSoftwareBreakpoint (BreakpointSite *bp_site)
1552 {
1553     Error error;
1554     assert (bp_site != NULL);
1555     LogSP log(lldb_private::GetLogIfAnyCategoriesSet (LIBLLDB_LOG_BREAKPOINTS));
1556     const addr_t bp_addr = bp_site->GetLoadAddress();
1557     if (log)
1558         log->Printf ("Process::EnableSoftwareBreakpoint (site_id = %d) addr = 0x%llx", bp_site->GetID(), (uint64_t)bp_addr);
1559     if (bp_site->IsEnabled())
1560     {
1561         if (log)
1562             log->Printf ("Process::EnableSoftwareBreakpoint (site_id = %d) addr = 0x%llx -- already enabled", bp_site->GetID(), (uint64_t)bp_addr);
1563         return error;
1564     }
1565 
1566     if (bp_addr == LLDB_INVALID_ADDRESS)
1567     {
1568         error.SetErrorString("BreakpointSite contains an invalid load address.");
1569         return error;
1570     }
1571     // Ask the lldb::Process subclass to fill in the correct software breakpoint
1572     // trap for the breakpoint site
1573     const size_t bp_opcode_size = GetSoftwareBreakpointTrapOpcode(bp_site);
1574 
1575     if (bp_opcode_size == 0)
1576     {
1577         error.SetErrorStringWithFormat ("Process::GetSoftwareBreakpointTrapOpcode() returned zero, unable to get breakpoint trap for address 0x%llx.\n", bp_addr);
1578     }
1579     else
1580     {
1581         const uint8_t * const bp_opcode_bytes = bp_site->GetTrapOpcodeBytes();
1582 
1583         if (bp_opcode_bytes == NULL)
1584         {
1585             error.SetErrorString ("BreakpointSite doesn't contain a valid breakpoint trap opcode.");
1586             return error;
1587         }
1588 
1589         // Save the original opcode by reading it
1590         if (DoReadMemory(bp_addr, bp_site->GetSavedOpcodeBytes(), bp_opcode_size, error) == bp_opcode_size)
1591         {
1592             // Write a software breakpoint in place of the original opcode
1593             if (DoWriteMemory(bp_addr, bp_opcode_bytes, bp_opcode_size, error) == bp_opcode_size)
1594             {
1595                 uint8_t verify_bp_opcode_bytes[64];
1596                 if (DoReadMemory(bp_addr, verify_bp_opcode_bytes, bp_opcode_size, error) == bp_opcode_size)
1597                 {
1598                     if (::memcmp(bp_opcode_bytes, verify_bp_opcode_bytes, bp_opcode_size) == 0)
1599                     {
1600                         bp_site->SetEnabled(true);
1601                         bp_site->SetType (BreakpointSite::eSoftware);
1602                         if (log)
1603                             log->Printf ("Process::EnableSoftwareBreakpoint (site_id = %d) addr = 0x%llx -- SUCCESS",
1604                                          bp_site->GetID(),
1605                                          (uint64_t)bp_addr);
1606                     }
1607                     else
1608                         error.SetErrorString("Failed to verify the breakpoint trap in memory.");
1609                 }
1610                 else
1611                     error.SetErrorString("Unable to read memory to verify breakpoint trap.");
1612             }
1613             else
1614                 error.SetErrorString("Unable to write breakpoint trap to memory.");
1615         }
1616         else
1617             error.SetErrorString("Unable to read memory at breakpoint address.");
1618     }
1619     if (log && error.Fail())
1620         log->Printf ("Process::EnableSoftwareBreakpoint (site_id = %d) addr = 0x%llx -- FAILED: %s",
1621                      bp_site->GetID(),
1622                      (uint64_t)bp_addr,
1623                      error.AsCString());
1624     return error;
1625 }
1626 
1627 Error
1628 Process::DisableSoftwareBreakpoint (BreakpointSite *bp_site)
1629 {
1630     Error error;
1631     assert (bp_site != NULL);
1632     LogSP log(lldb_private::GetLogIfAnyCategoriesSet (LIBLLDB_LOG_BREAKPOINTS));
1633     addr_t bp_addr = bp_site->GetLoadAddress();
1634     lldb::user_id_t breakID = bp_site->GetID();
1635     if (log)
1636         log->Printf ("Process::DisableBreakpoint (breakID = %d) addr = 0x%llx", breakID, (uint64_t)bp_addr);
1637 
1638     if (bp_site->IsHardware())
1639     {
1640         error.SetErrorString("Breakpoint site is a hardware breakpoint.");
1641     }
1642     else if (bp_site->IsEnabled())
1643     {
1644         const size_t break_op_size = bp_site->GetByteSize();
1645         const uint8_t * const break_op = bp_site->GetTrapOpcodeBytes();
1646         if (break_op_size > 0)
1647         {
1648             // Clear a software breakoint instruction
1649             uint8_t curr_break_op[8];
1650             assert (break_op_size <= sizeof(curr_break_op));
1651             bool break_op_found = false;
1652 
1653             // Read the breakpoint opcode
1654             if (DoReadMemory (bp_addr, curr_break_op, break_op_size, error) == break_op_size)
1655             {
1656                 bool verify = false;
1657                 // Make sure we have the a breakpoint opcode exists at this address
1658                 if (::memcmp (curr_break_op, break_op, break_op_size) == 0)
1659                 {
1660                     break_op_found = true;
1661                     // We found a valid breakpoint opcode at this address, now restore
1662                     // the saved opcode.
1663                     if (DoWriteMemory (bp_addr, bp_site->GetSavedOpcodeBytes(), break_op_size, error) == break_op_size)
1664                     {
1665                         verify = true;
1666                     }
1667                     else
1668                         error.SetErrorString("Memory write failed when restoring original opcode.");
1669                 }
1670                 else
1671                 {
1672                     error.SetErrorString("Original breakpoint trap is no longer in memory.");
1673                     // Set verify to true and so we can check if the original opcode has already been restored
1674                     verify = true;
1675                 }
1676 
1677                 if (verify)
1678                 {
1679                     uint8_t verify_opcode[8];
1680                     assert (break_op_size < sizeof(verify_opcode));
1681                     // Verify that our original opcode made it back to the inferior
1682                     if (DoReadMemory (bp_addr, verify_opcode, break_op_size, error) == break_op_size)
1683                     {
1684                         // compare the memory we just read with the original opcode
1685                         if (::memcmp (bp_site->GetSavedOpcodeBytes(), verify_opcode, break_op_size) == 0)
1686                         {
1687                             // SUCCESS
1688                             bp_site->SetEnabled(false);
1689                             if (log)
1690                                 log->Printf ("Process::DisableSoftwareBreakpoint (site_id = %d) addr = 0x%llx -- SUCCESS", bp_site->GetID(), (uint64_t)bp_addr);
1691                             return error;
1692                         }
1693                         else
1694                         {
1695                             if (break_op_found)
1696                                 error.SetErrorString("Failed to restore original opcode.");
1697                         }
1698                     }
1699                     else
1700                         error.SetErrorString("Failed to read memory to verify that breakpoint trap was restored.");
1701                 }
1702             }
1703             else
1704                 error.SetErrorString("Unable to read memory that should contain the breakpoint trap.");
1705         }
1706     }
1707     else
1708     {
1709         if (log)
1710             log->Printf ("Process::DisableSoftwareBreakpoint (site_id = %d) addr = 0x%llx -- already disabled", bp_site->GetID(), (uint64_t)bp_addr);
1711         return error;
1712     }
1713 
1714     if (log)
1715         log->Printf ("Process::DisableSoftwareBreakpoint (site_id = %d) addr = 0x%llx -- FAILED: %s",
1716                      bp_site->GetID(),
1717                      (uint64_t)bp_addr,
1718                      error.AsCString());
1719     return error;
1720 
1721 }
1722 
1723 // Comment out line below to disable memory caching
1724 #define ENABLE_MEMORY_CACHING
1725 // Uncomment to verify memory caching works after making changes to caching code
1726 //#define VERIFY_MEMORY_READS
1727 
1728 #if defined (ENABLE_MEMORY_CACHING)
1729 
1730 #if defined (VERIFY_MEMORY_READS)
1731 
1732 size_t
1733 Process::ReadMemory (addr_t addr, void *buf, size_t size, Error &error)
1734 {
1735     // Memory caching is enabled, with debug verification
1736     if (buf && size)
1737     {
1738         // Uncomment the line below to make sure memory caching is working.
1739         // I ran this through the test suite and got no assertions, so I am
1740         // pretty confident this is working well. If any changes are made to
1741         // memory caching, uncomment the line below and test your changes!
1742 
1743         // Verify all memory reads by using the cache first, then redundantly
1744         // reading the same memory from the inferior and comparing to make sure
1745         // everything is exactly the same.
1746         std::string verify_buf (size, '\0');
1747         assert (verify_buf.size() == size);
1748         const size_t cache_bytes_read = m_memory_cache.Read (this, addr, buf, size, error);
1749         Error verify_error;
1750         const size_t verify_bytes_read = ReadMemoryFromInferior (addr, const_cast<char *>(verify_buf.data()), verify_buf.size(), verify_error);
1751         assert (cache_bytes_read == verify_bytes_read);
1752         assert (memcmp(buf, verify_buf.data(), verify_buf.size()) == 0);
1753         assert (verify_error.Success() == error.Success());
1754         return cache_bytes_read;
1755     }
1756     return 0;
1757 }
1758 
1759 #else   // #if defined (VERIFY_MEMORY_READS)
1760 
1761 size_t
1762 Process::ReadMemory (addr_t addr, void *buf, size_t size, Error &error)
1763 {
1764     // Memory caching enabled, no verification
1765     return m_memory_cache.Read (this, addr, buf, size, error);
1766 }
1767 
1768 #endif  // #else for #if defined (VERIFY_MEMORY_READS)
1769 
1770 #else   // #if defined (ENABLE_MEMORY_CACHING)
1771 
1772 size_t
1773 Process::ReadMemory (addr_t addr, void *buf, size_t size, Error &error)
1774 {
1775     // Memory caching is disabled
1776     return ReadMemoryFromInferior (addr, buf, size, error);
1777 }
1778 
1779 #endif  // #else for #if defined (ENABLE_MEMORY_CACHING)
1780 
1781 
1782 size_t
1783 Process::ReadCStringFromMemory (addr_t addr, char *dst, size_t dst_max_len)
1784 {
1785     size_t total_cstr_len = 0;
1786     if (dst && dst_max_len)
1787     {
1788         // NULL out everything just to be safe
1789         memset (dst, 0, dst_max_len);
1790         Error error;
1791         addr_t curr_addr = addr;
1792         const size_t cache_line_size = m_memory_cache.GetMemoryCacheLineSize();
1793         size_t bytes_left = dst_max_len - 1;
1794         char *curr_dst = dst;
1795 
1796         while (bytes_left > 0)
1797         {
1798             addr_t cache_line_bytes_left = cache_line_size - (curr_addr % cache_line_size);
1799             addr_t bytes_to_read = std::min<addr_t>(bytes_left, cache_line_bytes_left);
1800             size_t bytes_read = ReadMemory (curr_addr, curr_dst, bytes_to_read, error);
1801 
1802             if (bytes_read == 0)
1803             {
1804                 dst[total_cstr_len] = '\0';
1805                 break;
1806             }
1807             const size_t len = strlen(curr_dst);
1808 
1809             total_cstr_len += len;
1810 
1811             if (len < bytes_to_read)
1812                 break;
1813 
1814             curr_dst += bytes_read;
1815             curr_addr += bytes_read;
1816             bytes_left -= bytes_read;
1817         }
1818     }
1819     return total_cstr_len;
1820 }
1821 
1822 size_t
1823 Process::ReadMemoryFromInferior (addr_t addr, void *buf, size_t size, Error &error)
1824 {
1825     if (buf == NULL || size == 0)
1826         return 0;
1827 
1828     size_t bytes_read = 0;
1829     uint8_t *bytes = (uint8_t *)buf;
1830 
1831     while (bytes_read < size)
1832     {
1833         const size_t curr_size = size - bytes_read;
1834         const size_t curr_bytes_read = DoReadMemory (addr + bytes_read,
1835                                                      bytes + bytes_read,
1836                                                      curr_size,
1837                                                      error);
1838         bytes_read += curr_bytes_read;
1839         if (curr_bytes_read == curr_size || curr_bytes_read == 0)
1840             break;
1841     }
1842 
1843     // Replace any software breakpoint opcodes that fall into this range back
1844     // into "buf" before we return
1845     if (bytes_read > 0)
1846         RemoveBreakpointOpcodesFromBuffer (addr, bytes_read, (uint8_t *)buf);
1847     return bytes_read;
1848 }
1849 
1850 uint64_t
1851 Process::ReadUnsignedInteger (lldb::addr_t vm_addr, size_t integer_byte_size, Error &error)
1852 {
1853     if (integer_byte_size > sizeof(uint64_t))
1854     {
1855         error.SetErrorString ("unsupported integer size");
1856     }
1857     else
1858     {
1859         uint8_t tmp[sizeof(uint64_t)];
1860         DataExtractor data (tmp,
1861                             integer_byte_size,
1862                             m_target.GetArchitecture().GetByteOrder(),
1863                             m_target.GetArchitecture().GetAddressByteSize());
1864         if (ReadMemory (vm_addr, tmp, integer_byte_size, error) == integer_byte_size)
1865         {
1866             uint32_t offset = 0;
1867             return data.GetMaxU64 (&offset, integer_byte_size);
1868         }
1869     }
1870     // Any plug-in that doesn't return success a memory read with the number
1871     // of bytes that were requested should be setting the error
1872     assert (error.Fail());
1873     return 0;
1874 }
1875 
1876 size_t
1877 Process::WriteMemoryPrivate (addr_t addr, const void *buf, size_t size, Error &error)
1878 {
1879     size_t bytes_written = 0;
1880     const uint8_t *bytes = (const uint8_t *)buf;
1881 
1882     while (bytes_written < size)
1883     {
1884         const size_t curr_size = size - bytes_written;
1885         const size_t curr_bytes_written = DoWriteMemory (addr + bytes_written,
1886                                                          bytes + bytes_written,
1887                                                          curr_size,
1888                                                          error);
1889         bytes_written += curr_bytes_written;
1890         if (curr_bytes_written == curr_size || curr_bytes_written == 0)
1891             break;
1892     }
1893     return bytes_written;
1894 }
1895 
1896 size_t
1897 Process::WriteMemory (addr_t addr, const void *buf, size_t size, Error &error)
1898 {
1899 #if defined (ENABLE_MEMORY_CACHING)
1900     m_memory_cache.Flush (addr, size);
1901 #endif
1902 
1903     if (buf == NULL || size == 0)
1904         return 0;
1905 
1906     // Need to bump the stop ID after writing so that ValueObjects will know to re-read themselves.
1907     // FUTURE: Doing this should be okay, but if anybody else gets upset about the stop_id changing when
1908     // the target hasn't run, then we will need to add a "memory generation" as well as a stop_id...
1909     m_stop_id++;
1910 
1911     // We need to write any data that would go where any current software traps
1912     // (enabled software breakpoints) any software traps (breakpoints) that we
1913     // may have placed in our tasks memory.
1914 
1915     BreakpointSiteList::collection::const_iterator iter = m_breakpoint_site_list.GetMap()->lower_bound (addr);
1916     BreakpointSiteList::collection::const_iterator end =  m_breakpoint_site_list.GetMap()->end();
1917 
1918     if (iter == end || iter->second->GetLoadAddress() > addr + size)
1919         return DoWriteMemory(addr, buf, size, error);
1920 
1921     BreakpointSiteList::collection::const_iterator pos;
1922     size_t bytes_written = 0;
1923     addr_t intersect_addr = 0;
1924     size_t intersect_size = 0;
1925     size_t opcode_offset = 0;
1926     const uint8_t *ubuf = (const uint8_t *)buf;
1927 
1928     for (pos = iter; pos != end; ++pos)
1929     {
1930         BreakpointSiteSP bp;
1931         bp = pos->second;
1932 
1933         assert(bp->IntersectsRange(addr, size, &intersect_addr, &intersect_size, &opcode_offset));
1934         assert(addr <= intersect_addr && intersect_addr < addr + size);
1935         assert(addr < intersect_addr + intersect_size && intersect_addr + intersect_size <= addr + size);
1936         assert(opcode_offset + intersect_size <= bp->GetByteSize());
1937 
1938         // Check for bytes before this breakpoint
1939         const addr_t curr_addr = addr + bytes_written;
1940         if (intersect_addr > curr_addr)
1941         {
1942             // There are some bytes before this breakpoint that we need to
1943             // just write to memory
1944             size_t curr_size = intersect_addr - curr_addr;
1945             size_t curr_bytes_written = WriteMemoryPrivate (curr_addr,
1946                                                             ubuf + bytes_written,
1947                                                             curr_size,
1948                                                             error);
1949             bytes_written += curr_bytes_written;
1950             if (curr_bytes_written != curr_size)
1951             {
1952                 // We weren't able to write all of the requested bytes, we
1953                 // are done looping and will return the number of bytes that
1954                 // we have written so far.
1955                 break;
1956             }
1957         }
1958 
1959         // Now write any bytes that would cover up any software breakpoints
1960         // directly into the breakpoint opcode buffer
1961         ::memcpy(bp->GetSavedOpcodeBytes() + opcode_offset, ubuf + bytes_written, intersect_size);
1962         bytes_written += intersect_size;
1963     }
1964 
1965     // Write any remaining bytes after the last breakpoint if we have any left
1966     if (bytes_written < size)
1967         bytes_written += WriteMemoryPrivate (addr + bytes_written,
1968                                              ubuf + bytes_written,
1969                                              size - bytes_written,
1970                                              error);
1971 
1972     return bytes_written;
1973 }
1974 
1975 addr_t
1976 Process::AllocateMemory(size_t size, uint32_t permissions, Error &error)
1977 {
1978     // Fixme: we should track the blocks we've allocated, and clean them up...
1979     // We could even do our own allocator here if that ends up being more efficient.
1980     addr_t allocated_addr = DoAllocateMemory (size, permissions, error);
1981     LogSP log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_PROCESS));
1982     if (log)
1983         log->Printf("Process::AllocateMemory(size=%4zu, permissions=%c%c%c) => 0x%16.16llx (m_stop_id = %u)",
1984                     size,
1985                     permissions & ePermissionsReadable ? 'r' : '-',
1986                     permissions & ePermissionsWritable ? 'w' : '-',
1987                     permissions & ePermissionsExecutable ? 'x' : '-',
1988                     (uint64_t)allocated_addr,
1989                     m_stop_id);
1990     return allocated_addr;
1991 }
1992 
1993 Error
1994 Process::DeallocateMemory (addr_t ptr)
1995 {
1996     Error error(DoDeallocateMemory (ptr));
1997 
1998     LogSP log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_PROCESS));
1999     if (log)
2000         log->Printf("Process::DeallocateMemory(addr=0x%16.16llx) => err = %s (m_stop_id = %u)",
2001                     ptr,
2002                     error.AsCString("SUCCESS"),
2003                     m_stop_id);
2004     return error;
2005 }
2006 
2007 
2008 Error
2009 Process::EnableWatchpoint (WatchpointLocation *watchpoint)
2010 {
2011     Error error;
2012     error.SetErrorString("watchpoints are not supported");
2013     return error;
2014 }
2015 
2016 Error
2017 Process::DisableWatchpoint (WatchpointLocation *watchpoint)
2018 {
2019     Error error;
2020     error.SetErrorString("watchpoints are not supported");
2021     return error;
2022 }
2023 
2024 StateType
2025 Process::WaitForProcessStopPrivate (const TimeValue *timeout, EventSP &event_sp)
2026 {
2027     StateType state;
2028     // Now wait for the process to launch and return control to us, and then
2029     // call DidLaunch:
2030     while (1)
2031     {
2032         event_sp.reset();
2033         state = WaitForStateChangedEventsPrivate (timeout, event_sp);
2034 
2035         if (StateIsStoppedState(state))
2036             break;
2037 
2038         // If state is invalid, then we timed out
2039         if (state == eStateInvalid)
2040             break;
2041 
2042         if (event_sp)
2043             HandlePrivateEvent (event_sp);
2044     }
2045     return state;
2046 }
2047 
2048 Error
2049 Process::Launch
2050 (
2051     char const *argv[],
2052     char const *envp[],
2053     uint32_t launch_flags,
2054     const char *stdin_path,
2055     const char *stdout_path,
2056     const char *stderr_path,
2057     const char *working_directory
2058 )
2059 {
2060     Error error;
2061     m_abi_sp.reset();
2062     m_dyld_ap.reset();
2063     m_process_input_reader.reset();
2064 
2065     Module *exe_module = m_target.GetExecutableModule().get();
2066     if (exe_module)
2067     {
2068         char exec_file_path[PATH_MAX];
2069         exe_module->GetFileSpec().GetPath(exec_file_path, sizeof(exec_file_path));
2070         if (exe_module->GetFileSpec().Exists())
2071         {
2072             if (PrivateStateThreadIsValid ())
2073                 PausePrivateStateThread ();
2074 
2075             error = WillLaunch (exe_module);
2076             if (error.Success())
2077             {
2078                 SetPublicState (eStateLaunching);
2079                 // The args coming in should not contain the application name, the
2080                 // lldb_private::Process class will add this in case the executable
2081                 // gets resolved to a different file than was given on the command
2082                 // line (like when an applicaiton bundle is specified and will
2083                 // resolve to the contained exectuable file, or the file given was
2084                 // a symlink or other file system link that resolves to a different
2085                 // file).
2086 
2087                 // Get the resolved exectuable path
2088 
2089                 // Make a new argument vector
2090                 std::vector<const char *> exec_path_plus_argv;
2091                 // Append the resolved executable path
2092                 exec_path_plus_argv.push_back (exec_file_path);
2093 
2094                 // Push all args if there are any
2095                 if (argv)
2096                 {
2097                     for (int i = 0; argv[i]; ++i)
2098                         exec_path_plus_argv.push_back(argv[i]);
2099                 }
2100 
2101                 // Push a NULL to terminate the args.
2102                 exec_path_plus_argv.push_back(NULL);
2103 
2104                 // Now launch using these arguments.
2105                 error = DoLaunch (exe_module,
2106                                   exec_path_plus_argv.empty() ? NULL : &exec_path_plus_argv.front(),
2107                                   envp,
2108                                   launch_flags,
2109                                   stdin_path,
2110                                   stdout_path,
2111                                   stderr_path,
2112                                   working_directory);
2113 
2114                 if (error.Fail())
2115                 {
2116                     if (GetID() != LLDB_INVALID_PROCESS_ID)
2117                     {
2118                         SetID (LLDB_INVALID_PROCESS_ID);
2119                         const char *error_string = error.AsCString();
2120                         if (error_string == NULL)
2121                             error_string = "launch failed";
2122                         SetExitStatus (-1, error_string);
2123                     }
2124                 }
2125                 else
2126                 {
2127                     EventSP event_sp;
2128                     StateType state = WaitForProcessStopPrivate(NULL, event_sp);
2129 
2130                     if (state == eStateStopped || state == eStateCrashed)
2131                     {
2132 
2133                         DidLaunch ();
2134 
2135                         m_dyld_ap.reset (DynamicLoader::FindPlugin(this, NULL));
2136                         if (m_dyld_ap.get())
2137                             m_dyld_ap->DidLaunch();
2138 
2139                         // This delays passing the stopped event to listeners till DidLaunch gets
2140                         // a chance to complete...
2141                         HandlePrivateEvent (event_sp);
2142 
2143                         if (PrivateStateThreadIsValid ())
2144                             ResumePrivateStateThread ();
2145                         else
2146                             StartPrivateStateThread ();
2147                     }
2148                     else if (state == eStateExited)
2149                     {
2150                         // We exited while trying to launch somehow.  Don't call DidLaunch as that's
2151                         // not likely to work, and return an invalid pid.
2152                         HandlePrivateEvent (event_sp);
2153                     }
2154                 }
2155             }
2156         }
2157         else
2158         {
2159             error.SetErrorStringWithFormat("File doesn't exist: '%s'.\n", exec_file_path);
2160         }
2161     }
2162     return error;
2163 }
2164 
2165 Process::NextEventAction::EventActionResult
2166 Process::AttachCompletionHandler::PerformAction (lldb::EventSP &event_sp)
2167 {
2168     StateType state = ProcessEventData::GetStateFromEvent (event_sp.get());
2169     switch (state)
2170     {
2171         case eStateRunning:
2172         case eStateConnected:
2173             return eEventActionRetry;
2174 
2175         case eStateStopped:
2176         case eStateCrashed:
2177         {
2178             // During attach, prior to sending the eStateStopped event,
2179             // lldb_private::Process subclasses must set the process must set
2180             // the new process ID.
2181             assert (m_process->GetID() != LLDB_INVALID_PROCESS_ID);
2182             m_process->CompleteAttach ();
2183             return eEventActionSuccess;
2184         }
2185 
2186 
2187             break;
2188         default:
2189         case eStateExited:
2190         case eStateInvalid:
2191             m_exit_string.assign ("No valid Process");
2192             return eEventActionExit;
2193             break;
2194     }
2195 }
2196 
2197 Process::NextEventAction::EventActionResult
2198 Process::AttachCompletionHandler::HandleBeingInterrupted()
2199 {
2200     return eEventActionSuccess;
2201 }
2202 
2203 const char *
2204 Process::AttachCompletionHandler::GetExitString ()
2205 {
2206     return m_exit_string.c_str();
2207 }
2208 
2209 Error
2210 Process::Attach (lldb::pid_t attach_pid)
2211 {
2212 
2213     m_abi_sp.reset();
2214     m_process_input_reader.reset();
2215 
2216     // Find the process and its architecture.  Make sure it matches the architecture
2217     // of the current Target, and if not adjust it.
2218 
2219     ProcessInstanceInfo process_info;
2220     PlatformSP platform_sp (m_target.GetDebugger().GetPlatformList().GetSelectedPlatform ());
2221     if (platform_sp)
2222     {
2223         if (platform_sp->GetProcessInfo (attach_pid, process_info))
2224         {
2225             const ArchSpec &process_arch = process_info.GetArchitecture();
2226             if (process_arch.IsValid())
2227                 GetTarget().SetArchitecture(process_arch);
2228         }
2229     }
2230 
2231     m_dyld_ap.reset();
2232 
2233     Error error (WillAttachToProcessWithID(attach_pid));
2234     if (error.Success())
2235     {
2236         SetPublicState (eStateAttaching);
2237 
2238         error = DoAttachToProcessWithID (attach_pid);
2239         if (error.Success())
2240         {
2241             SetNextEventAction(new Process::AttachCompletionHandler(this));
2242             StartPrivateStateThread();
2243         }
2244         else
2245         {
2246             if (GetID() != LLDB_INVALID_PROCESS_ID)
2247             {
2248                 SetID (LLDB_INVALID_PROCESS_ID);
2249                 const char *error_string = error.AsCString();
2250                 if (error_string == NULL)
2251                     error_string = "attach failed";
2252 
2253                 SetExitStatus(-1, error_string);
2254             }
2255         }
2256     }
2257     return error;
2258 }
2259 
2260 Error
2261 Process::Attach (const char *process_name, bool wait_for_launch)
2262 {
2263     m_abi_sp.reset();
2264     m_process_input_reader.reset();
2265 
2266     // Find the process and its architecture.  Make sure it matches the architecture
2267     // of the current Target, and if not adjust it.
2268     Error error;
2269 
2270     if (!wait_for_launch)
2271     {
2272         ProcessInstanceInfoList process_infos;
2273         PlatformSP platform_sp (m_target.GetDebugger().GetPlatformList().GetSelectedPlatform ());
2274         if (platform_sp)
2275         {
2276             ProcessInstanceInfoMatch match_info;
2277             match_info.GetProcessInfo().SetName(process_name);
2278             match_info.SetNameMatchType (eNameMatchEquals);
2279             platform_sp->FindProcesses (match_info, process_infos);
2280             if (process_infos.GetSize() > 1)
2281             {
2282                 error.SetErrorStringWithFormat ("More than one process named %s\n", process_name);
2283             }
2284             else if (process_infos.GetSize() == 0)
2285             {
2286                 error.SetErrorStringWithFormat ("Could not find a process named %s\n", process_name);
2287             }
2288             else
2289             {
2290                 ProcessInstanceInfo process_info;
2291                 if (process_infos.GetInfoAtIndex (0, process_info))
2292                 {
2293                     const ArchSpec &process_arch = process_info.GetArchitecture();
2294                     if (process_arch.IsValid() && process_arch != GetTarget().GetArchitecture())
2295                     {
2296                         // Set the architecture on the target.
2297                         GetTarget().SetArchitecture (process_arch);
2298                     }
2299                 }
2300             }
2301         }
2302         else
2303         {
2304             error.SetErrorString ("Invalid platform");
2305         }
2306     }
2307 
2308     if (error.Success())
2309     {
2310         m_dyld_ap.reset();
2311 
2312         error = WillAttachToProcessWithName(process_name, wait_for_launch);
2313         if (error.Success())
2314         {
2315             SetPublicState (eStateAttaching);
2316             error = DoAttachToProcessWithName (process_name, wait_for_launch);
2317             if (error.Fail())
2318             {
2319                 if (GetID() != LLDB_INVALID_PROCESS_ID)
2320                 {
2321                     SetID (LLDB_INVALID_PROCESS_ID);
2322                     const char *error_string = error.AsCString();
2323                     if (error_string == NULL)
2324                         error_string = "attach failed";
2325 
2326                     SetExitStatus(-1, error_string);
2327                 }
2328             }
2329             else
2330             {
2331                 SetNextEventAction(new Process::AttachCompletionHandler(this));
2332                 StartPrivateStateThread();
2333             }
2334         }
2335     }
2336     return error;
2337 }
2338 
2339 void
2340 Process::CompleteAttach ()
2341 {
2342     // Let the process subclass figure out at much as it can about the process
2343     // before we go looking for a dynamic loader plug-in.
2344     DidAttach();
2345 
2346     // We have complete the attach, now it is time to find the dynamic loader
2347     // plug-in
2348     m_dyld_ap.reset (DynamicLoader::FindPlugin(this, NULL));
2349     if (m_dyld_ap.get())
2350         m_dyld_ap->DidAttach();
2351 
2352     // Figure out which one is the executable, and set that in our target:
2353     ModuleList &modules = m_target.GetImages();
2354 
2355     size_t num_modules = modules.GetSize();
2356     for (int i = 0; i < num_modules; i++)
2357     {
2358         ModuleSP module_sp (modules.GetModuleAtIndex(i));
2359         if (module_sp && module_sp->IsExecutable())
2360         {
2361             ModuleSP target_exe_module_sp (m_target.GetExecutableModule());
2362             if (target_exe_module_sp != module_sp)
2363                 m_target.SetExecutableModule (module_sp, false);
2364             break;
2365         }
2366     }
2367 }
2368 
2369 Error
2370 Process::ConnectRemote (const char *remote_url)
2371 {
2372     m_abi_sp.reset();
2373     m_process_input_reader.reset();
2374 
2375     // Find the process and its architecture.  Make sure it matches the architecture
2376     // of the current Target, and if not adjust it.
2377 
2378     Error error (DoConnectRemote (remote_url));
2379     if (error.Success())
2380     {
2381         if (GetID() != LLDB_INVALID_PROCESS_ID)
2382         {
2383             EventSP event_sp;
2384             StateType state = WaitForProcessStopPrivate(NULL, event_sp);
2385 
2386             if (state == eStateStopped || state == eStateCrashed)
2387             {
2388                 // If we attached and actually have a process on the other end, then
2389                 // this ended up being the equivalent of an attach.
2390                 CompleteAttach ();
2391 
2392                 // This delays passing the stopped event to listeners till
2393                 // CompleteAttach gets a chance to complete...
2394                 HandlePrivateEvent (event_sp);
2395 
2396             }
2397         }
2398 
2399         if (PrivateStateThreadIsValid ())
2400             ResumePrivateStateThread ();
2401         else
2402             StartPrivateStateThread ();
2403     }
2404     return error;
2405 }
2406 
2407 
2408 Error
2409 Process::Resume ()
2410 {
2411     LogSP log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_PROCESS));
2412     if (log)
2413         log->Printf("Process::Resume() m_stop_id = %u, public state: %s private state: %s",
2414                     m_stop_id,
2415                     StateAsCString(m_public_state.GetValue()),
2416                     StateAsCString(m_private_state.GetValue()));
2417 
2418     Error error (WillResume());
2419     // Tell the process it is about to resume before the thread list
2420     if (error.Success())
2421     {
2422         // Now let the thread list know we are about to resume so it
2423         // can let all of our threads know that they are about to be
2424         // resumed. Threads will each be called with
2425         // Thread::WillResume(StateType) where StateType contains the state
2426         // that they are supposed to have when the process is resumed
2427         // (suspended/running/stepping). Threads should also check
2428         // their resume signal in lldb::Thread::GetResumeSignal()
2429         // to see if they are suppoed to start back up with a signal.
2430         if (m_thread_list.WillResume())
2431         {
2432             error = DoResume();
2433             if (error.Success())
2434             {
2435                 DidResume();
2436                 m_thread_list.DidResume();
2437                 if (log)
2438                     log->Printf ("Process thinks the process has resumed.");
2439             }
2440         }
2441         else
2442         {
2443             error.SetErrorStringWithFormat("Process::WillResume() thread list returned false after WillResume");
2444         }
2445     }
2446     else if (log)
2447         log->Printf ("Process::WillResume() got an error \"%s\".", error.AsCString("<unknown error>"));
2448     return error;
2449 }
2450 
2451 Error
2452 Process::Halt ()
2453 {
2454     // Pause our private state thread so we can ensure no one else eats
2455     // the stop event out from under us.
2456     Listener halt_listener ("lldb.process.halt_listener");
2457     HijackPrivateProcessEvents(&halt_listener);
2458 
2459     EventSP event_sp;
2460     Error error (WillHalt());
2461 
2462     if (error.Success())
2463     {
2464 
2465         bool caused_stop = false;
2466 
2467         // Ask the process subclass to actually halt our process
2468         error = DoHalt(caused_stop);
2469         if (error.Success())
2470         {
2471             if (m_public_state.GetValue() == eStateAttaching)
2472             {
2473                 SetExitStatus(SIGKILL, "Cancelled async attach.");
2474                 Destroy ();
2475             }
2476             else
2477             {
2478                 // If "caused_stop" is true, then DoHalt stopped the process. If
2479                 // "caused_stop" is false, the process was already stopped.
2480                 // If the DoHalt caused the process to stop, then we want to catch
2481                 // this event and set the interrupted bool to true before we pass
2482                 // this along so clients know that the process was interrupted by
2483                 // a halt command.
2484                 if (caused_stop)
2485                 {
2486                     // Wait for 1 second for the process to stop.
2487                     TimeValue timeout_time;
2488                     timeout_time = TimeValue::Now();
2489                     timeout_time.OffsetWithSeconds(1);
2490                     bool got_event = halt_listener.WaitForEvent (&timeout_time, event_sp);
2491                     StateType state = ProcessEventData::GetStateFromEvent(event_sp.get());
2492 
2493                     if (!got_event || state == eStateInvalid)
2494                     {
2495                         // We timeout out and didn't get a stop event...
2496                         error.SetErrorStringWithFormat ("Halt timed out. State = %s", StateAsCString(GetState()));
2497                     }
2498                     else
2499                     {
2500                         if (StateIsStoppedState (state))
2501                         {
2502                             // We caused the process to interrupt itself, so mark this
2503                             // as such in the stop event so clients can tell an interrupted
2504                             // process from a natural stop
2505                             ProcessEventData::SetInterruptedInEvent (event_sp.get(), true);
2506                         }
2507                         else
2508                         {
2509                             LogSP log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_PROCESS));
2510                             if (log)
2511                                 log->Printf("Process::Halt() failed to stop, state is: %s", StateAsCString(state));
2512                             error.SetErrorString ("Did not get stopped event after halt.");
2513                         }
2514                     }
2515                 }
2516                 DidHalt();
2517             }
2518         }
2519     }
2520     // Resume our private state thread before we post the event (if any)
2521     RestorePrivateProcessEvents();
2522 
2523     // Post any event we might have consumed. If all goes well, we will have
2524     // stopped the process, intercepted the event and set the interrupted
2525     // bool in the event.  Post it to the private event queue and that will end up
2526     // correctly setting the state.
2527     if (event_sp)
2528         m_private_state_broadcaster.BroadcastEvent(event_sp);
2529 
2530     return error;
2531 }
2532 
2533 Error
2534 Process::Detach ()
2535 {
2536     Error error (WillDetach());
2537 
2538     if (error.Success())
2539     {
2540         DisableAllBreakpointSites();
2541         error = DoDetach();
2542         if (error.Success())
2543         {
2544             DidDetach();
2545             StopPrivateStateThread();
2546         }
2547     }
2548     return error;
2549 }
2550 
2551 Error
2552 Process::Destroy ()
2553 {
2554     Error error (WillDestroy());
2555     if (error.Success())
2556     {
2557         DisableAllBreakpointSites();
2558         error = DoDestroy();
2559         if (error.Success())
2560         {
2561             DidDestroy();
2562             StopPrivateStateThread();
2563         }
2564         m_stdio_communication.StopReadThread();
2565         m_stdio_communication.Disconnect();
2566         if (m_process_input_reader && m_process_input_reader->IsActive())
2567             m_target.GetDebugger().PopInputReader (m_process_input_reader);
2568         if (m_process_input_reader)
2569             m_process_input_reader.reset();
2570     }
2571     return error;
2572 }
2573 
2574 Error
2575 Process::Signal (int signal)
2576 {
2577     Error error (WillSignal());
2578     if (error.Success())
2579     {
2580         error = DoSignal(signal);
2581         if (error.Success())
2582             DidSignal();
2583     }
2584     return error;
2585 }
2586 
2587 lldb::ByteOrder
2588 Process::GetByteOrder () const
2589 {
2590     return m_target.GetArchitecture().GetByteOrder();
2591 }
2592 
2593 uint32_t
2594 Process::GetAddressByteSize () const
2595 {
2596     return m_target.GetArchitecture().GetAddressByteSize();
2597 }
2598 
2599 
2600 bool
2601 Process::ShouldBroadcastEvent (Event *event_ptr)
2602 {
2603     const StateType state = Process::ProcessEventData::GetStateFromEvent (event_ptr);
2604     bool return_value = true;
2605     LogSP log(lldb_private::GetLogIfAllCategoriesSet(LIBLLDB_LOG_EVENTS));
2606 
2607     switch (state)
2608     {
2609         case eStateConnected:
2610         case eStateAttaching:
2611         case eStateLaunching:
2612         case eStateDetached:
2613         case eStateExited:
2614         case eStateUnloaded:
2615             // These events indicate changes in the state of the debugging session, always report them.
2616             return_value = true;
2617             break;
2618         case eStateInvalid:
2619             // We stopped for no apparent reason, don't report it.
2620             return_value = false;
2621             break;
2622         case eStateRunning:
2623         case eStateStepping:
2624             // If we've started the target running, we handle the cases where we
2625             // are already running and where there is a transition from stopped to
2626             // running differently.
2627             // running -> running: Automatically suppress extra running events
2628             // stopped -> running: Report except when there is one or more no votes
2629             //     and no yes votes.
2630             SynchronouslyNotifyStateChanged (state);
2631             switch (m_public_state.GetValue())
2632             {
2633                 case eStateRunning:
2634                 case eStateStepping:
2635                     // We always suppress multiple runnings with no PUBLIC stop in between.
2636                     return_value = false;
2637                     break;
2638                 default:
2639                     // TODO: make this work correctly. For now always report
2640                     // run if we aren't running so we don't miss any runnning
2641                     // events. If I run the lldb/test/thread/a.out file and
2642                     // break at main.cpp:58, run and hit the breakpoints on
2643                     // multiple threads, then somehow during the stepping over
2644                     // of all breakpoints no run gets reported.
2645                     return_value = true;
2646 
2647                     // This is a transition from stop to run.
2648                     switch (m_thread_list.ShouldReportRun (event_ptr))
2649                     {
2650                         case eVoteYes:
2651                         case eVoteNoOpinion:
2652                             return_value = true;
2653                             break;
2654                         case eVoteNo:
2655                             return_value = false;
2656                             break;
2657                     }
2658                     break;
2659             }
2660             break;
2661         case eStateStopped:
2662         case eStateCrashed:
2663         case eStateSuspended:
2664         {
2665             // We've stopped.  First see if we're going to restart the target.
2666             // If we are going to stop, then we always broadcast the event.
2667             // If we aren't going to stop, let the thread plans decide if we're going to report this event.
2668             // If no thread has an opinion, we don't report it.
2669             if (ProcessEventData::GetInterruptedFromEvent (event_ptr))
2670             {
2671                 if (log)
2672                     log->Printf ("Process::ShouldBroadcastEvent (%p) stopped due to an interrupt, state: %s", event_ptr, StateAsCString(state));
2673                 return true;
2674             }
2675             else
2676             {
2677                 RefreshStateAfterStop ();
2678 
2679                 if (m_thread_list.ShouldStop (event_ptr) == false)
2680                 {
2681                     switch (m_thread_list.ShouldReportStop (event_ptr))
2682                     {
2683                         case eVoteYes:
2684                             Process::ProcessEventData::SetRestartedInEvent (event_ptr, true);
2685                             // Intentional fall-through here.
2686                         case eVoteNoOpinion:
2687                         case eVoteNo:
2688                             return_value = false;
2689                             break;
2690                     }
2691 
2692                     if (log)
2693                         log->Printf ("Process::ShouldBroadcastEvent (%p) Restarting process from state: %s", event_ptr, StateAsCString(state));
2694                     Resume ();
2695                 }
2696                 else
2697                 {
2698                     return_value = true;
2699                     SynchronouslyNotifyStateChanged (state);
2700                 }
2701             }
2702         }
2703     }
2704 
2705     if (log)
2706         log->Printf ("Process::ShouldBroadcastEvent (%p) => %s", event_ptr, StateAsCString(state), return_value ? "YES" : "NO");
2707     return return_value;
2708 }
2709 
2710 
2711 bool
2712 Process::StartPrivateStateThread ()
2713 {
2714     LogSP log(lldb_private::GetLogIfAllCategoriesSet(LIBLLDB_LOG_EVENTS));
2715 
2716     bool already_running = PrivateStateThreadIsValid ();
2717     if (log)
2718         log->Printf ("Process::%s()%s ", __FUNCTION__, already_running ? " already running" : " starting private state thread");
2719 
2720     if (already_running)
2721         return true;
2722 
2723     // Create a thread that watches our internal state and controls which
2724     // events make it to clients (into the DCProcess event queue).
2725     char thread_name[1024];
2726     snprintf(thread_name, sizeof(thread_name), "<lldb.process.internal-state(pid=%i)>", GetID());
2727     m_private_state_thread = Host::ThreadCreate (thread_name, Process::PrivateStateThread, this, NULL);
2728     return IS_VALID_LLDB_HOST_THREAD(m_private_state_thread);
2729 }
2730 
2731 void
2732 Process::PausePrivateStateThread ()
2733 {
2734     ControlPrivateStateThread (eBroadcastInternalStateControlPause);
2735 }
2736 
2737 void
2738 Process::ResumePrivateStateThread ()
2739 {
2740     ControlPrivateStateThread (eBroadcastInternalStateControlResume);
2741 }
2742 
2743 void
2744 Process::StopPrivateStateThread ()
2745 {
2746     if (PrivateStateThreadIsValid ())
2747         ControlPrivateStateThread (eBroadcastInternalStateControlStop);
2748 }
2749 
2750 void
2751 Process::ControlPrivateStateThread (uint32_t signal)
2752 {
2753     LogSP log(lldb_private::GetLogIfAllCategoriesSet(LIBLLDB_LOG_EVENTS));
2754 
2755     assert (signal == eBroadcastInternalStateControlStop ||
2756             signal == eBroadcastInternalStateControlPause ||
2757             signal == eBroadcastInternalStateControlResume);
2758 
2759     if (log)
2760         log->Printf ("Process::%s (signal = %d)", __FUNCTION__, signal);
2761 
2762     // Signal the private state thread. First we should copy this is case the
2763     // thread starts exiting since the private state thread will NULL this out
2764     // when it exits
2765     const lldb::thread_t private_state_thread = m_private_state_thread;
2766     if (IS_VALID_LLDB_HOST_THREAD(private_state_thread))
2767     {
2768         TimeValue timeout_time;
2769         bool timed_out;
2770 
2771         m_private_state_control_broadcaster.BroadcastEvent (signal, NULL);
2772 
2773         timeout_time = TimeValue::Now();
2774         timeout_time.OffsetWithSeconds(2);
2775         m_private_state_control_wait.WaitForValueEqualTo (true, &timeout_time, &timed_out);
2776         m_private_state_control_wait.SetValue (false, eBroadcastNever);
2777 
2778         if (signal == eBroadcastInternalStateControlStop)
2779         {
2780             if (timed_out)
2781                 Host::ThreadCancel (private_state_thread, NULL);
2782 
2783             thread_result_t result = NULL;
2784             Host::ThreadJoin (private_state_thread, &result, NULL);
2785             m_private_state_thread = LLDB_INVALID_HOST_THREAD;
2786         }
2787     }
2788 }
2789 
2790 void
2791 Process::HandlePrivateEvent (EventSP &event_sp)
2792 {
2793     LogSP log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_PROCESS));
2794 
2795     const StateType new_state = Process::ProcessEventData::GetStateFromEvent(event_sp.get());
2796 
2797     // First check to see if anybody wants a shot at this event:
2798     if (m_next_event_action_ap.get() != NULL)
2799     {
2800         NextEventAction::EventActionResult action_result = m_next_event_action_ap->PerformAction(event_sp);
2801         switch (action_result)
2802         {
2803             case NextEventAction::eEventActionSuccess:
2804                 SetNextEventAction(NULL);
2805                 break;
2806             case NextEventAction::eEventActionRetry:
2807                 break;
2808             case NextEventAction::eEventActionExit:
2809                 // Handle Exiting Here.  If we already got an exited event,
2810                 // we should just propagate it.  Otherwise, swallow this event,
2811                 // and set our state to exit so the next event will kill us.
2812                 if (new_state != eStateExited)
2813                 {
2814                     // FIXME: should cons up an exited event, and discard this one.
2815                     SetExitStatus(0, m_next_event_action_ap->GetExitString());
2816                     SetNextEventAction(NULL);
2817                     return;
2818                 }
2819                 SetNextEventAction(NULL);
2820                 break;
2821         }
2822     }
2823 
2824     // See if we should broadcast this state to external clients?
2825     const bool should_broadcast = ShouldBroadcastEvent (event_sp.get());
2826 
2827     if (should_broadcast)
2828     {
2829         if (log)
2830         {
2831             log->Printf ("Process::%s (pid = %i) broadcasting new state %s (old state %s) to %s",
2832                          __FUNCTION__,
2833                          GetID(),
2834                          StateAsCString(new_state),
2835                          StateAsCString (GetState ()),
2836                          IsHijackedForEvent(eBroadcastBitStateChanged) ? "hijacked" : "public");
2837         }
2838         Process::ProcessEventData::SetUpdateStateOnRemoval(event_sp.get());
2839         if (StateIsRunningState (new_state))
2840             PushProcessInputReader ();
2841         else
2842             PopProcessInputReader ();
2843 
2844         BroadcastEvent (event_sp);
2845     }
2846     else
2847     {
2848         if (log)
2849         {
2850             log->Printf ("Process::%s (pid = %i) suppressing state %s (old state %s): should_broadcast == false",
2851                          __FUNCTION__,
2852                          GetID(),
2853                          StateAsCString(new_state),
2854                          StateAsCString (GetState ()),
2855                          IsHijackedForEvent(eBroadcastBitStateChanged) ? "hijacked" : "public");
2856         }
2857     }
2858 }
2859 
2860 void *
2861 Process::PrivateStateThread (void *arg)
2862 {
2863     Process *proc = static_cast<Process*> (arg);
2864     void *result = proc->RunPrivateStateThread ();
2865     return result;
2866 }
2867 
2868 void *
2869 Process::RunPrivateStateThread ()
2870 {
2871     bool control_only = false;
2872     m_private_state_control_wait.SetValue (false, eBroadcastNever);
2873 
2874     LogSP log(lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_PROCESS));
2875     if (log)
2876         log->Printf ("Process::%s (arg = %p, pid = %i) thread starting...", __FUNCTION__, this, GetID());
2877 
2878     bool exit_now = false;
2879     while (!exit_now)
2880     {
2881         EventSP event_sp;
2882         WaitForEventsPrivate (NULL, event_sp, control_only);
2883         if (event_sp->BroadcasterIs(&m_private_state_control_broadcaster))
2884         {
2885             switch (event_sp->GetType())
2886             {
2887             case eBroadcastInternalStateControlStop:
2888                 exit_now = true;
2889                 continue;   // Go to next loop iteration so we exit without
2890                 break;      // doing any internal state managment below
2891 
2892             case eBroadcastInternalStateControlPause:
2893                 control_only = true;
2894                 break;
2895 
2896             case eBroadcastInternalStateControlResume:
2897                 control_only = false;
2898                 break;
2899             }
2900 
2901             if (log)
2902                 log->Printf ("Process::%s (arg = %p, pid = %i) got a control event: %d", __FUNCTION__, this, GetID(), event_sp->GetType());
2903 
2904             m_private_state_control_wait.SetValue (true, eBroadcastAlways);
2905             continue;
2906         }
2907 
2908 
2909         const StateType internal_state = Process::ProcessEventData::GetStateFromEvent(event_sp.get());
2910 
2911         if (internal_state != eStateInvalid)
2912         {
2913             HandlePrivateEvent (event_sp);
2914         }
2915 
2916         if (internal_state == eStateInvalid ||
2917             internal_state == eStateExited  ||
2918             internal_state == eStateDetached )
2919         {
2920             if (log)
2921                 log->Printf ("Process::%s (arg = %p, pid = %i) about to exit with internal state %s...", __FUNCTION__, this, GetID(), StateAsCString(internal_state));
2922 
2923             break;
2924         }
2925     }
2926 
2927     // Verify log is still enabled before attempting to write to it...
2928     if (log)
2929         log->Printf ("Process::%s (arg = %p, pid = %i) thread exiting...", __FUNCTION__, this, GetID());
2930 
2931     m_private_state_control_wait.SetValue (true, eBroadcastAlways);
2932     m_private_state_thread = LLDB_INVALID_HOST_THREAD;
2933     return NULL;
2934 }
2935 
2936 //------------------------------------------------------------------
2937 // Process Event Data
2938 //------------------------------------------------------------------
2939 
2940 Process::ProcessEventData::ProcessEventData () :
2941     EventData (),
2942     m_process_sp (),
2943     m_state (eStateInvalid),
2944     m_restarted (false),
2945     m_update_state (false),
2946     m_interrupted (false)
2947 {
2948 }
2949 
2950 Process::ProcessEventData::ProcessEventData (const ProcessSP &process_sp, StateType state) :
2951     EventData (),
2952     m_process_sp (process_sp),
2953     m_state (state),
2954     m_restarted (false),
2955     m_update_state (false),
2956     m_interrupted (false)
2957 {
2958 }
2959 
2960 Process::ProcessEventData::~ProcessEventData()
2961 {
2962 }
2963 
2964 const ConstString &
2965 Process::ProcessEventData::GetFlavorString ()
2966 {
2967     static ConstString g_flavor ("Process::ProcessEventData");
2968     return g_flavor;
2969 }
2970 
2971 const ConstString &
2972 Process::ProcessEventData::GetFlavor () const
2973 {
2974     return ProcessEventData::GetFlavorString ();
2975 }
2976 
2977 void
2978 Process::ProcessEventData::DoOnRemoval (Event *event_ptr)
2979 {
2980     // This function gets called twice for each event, once when the event gets pulled
2981     // off of the private process event queue, and once when it gets pulled off of
2982     // the public event queue.  m_update_state is used to distinguish these
2983     // two cases; it is false when we're just pulling it off for private handling,
2984     // and we don't want to do the breakpoint command handling then.
2985 
2986     if (!m_update_state)
2987         return;
2988 
2989     m_process_sp->SetPublicState (m_state);
2990 
2991     // If we're stopped and haven't restarted, then do the breakpoint commands here:
2992     if (m_state == eStateStopped && ! m_restarted)
2993     {
2994         int num_threads = m_process_sp->GetThreadList().GetSize();
2995         int idx;
2996 
2997         for (idx = 0; idx < num_threads; ++idx)
2998         {
2999             lldb::ThreadSP thread_sp = m_process_sp->GetThreadList().GetThreadAtIndex(idx);
3000 
3001             StopInfoSP stop_info_sp = thread_sp->GetStopInfo ();
3002             if (stop_info_sp)
3003             {
3004                 stop_info_sp->PerformAction(event_ptr);
3005             }
3006         }
3007 
3008         // The stop action might restart the target.  If it does, then we want to mark that in the
3009         // event so that whoever is receiving it will know to wait for the running event and reflect
3010         // that state appropriately.
3011 
3012         if (m_process_sp->GetPrivateState() == eStateRunning)
3013             SetRestarted(true);
3014         else
3015         {
3016             // Finally, if we didn't restart, run the Stop Hooks here:
3017             // They might also restart the target, so watch for that.
3018             m_process_sp->GetTarget().RunStopHooks();
3019             if (m_process_sp->GetPrivateState() == eStateRunning)
3020                 SetRestarted(true);
3021         }
3022 
3023     }
3024 }
3025 
3026 void
3027 Process::ProcessEventData::Dump (Stream *s) const
3028 {
3029     if (m_process_sp)
3030         s->Printf(" process = %p (pid = %u), ", m_process_sp.get(), m_process_sp->GetID());
3031 
3032     s->Printf("state = %s", StateAsCString(GetState()));
3033 }
3034 
3035 const Process::ProcessEventData *
3036 Process::ProcessEventData::GetEventDataFromEvent (const Event *event_ptr)
3037 {
3038     if (event_ptr)
3039     {
3040         const EventData *event_data = event_ptr->GetData();
3041         if (event_data && event_data->GetFlavor() == ProcessEventData::GetFlavorString())
3042             return static_cast <const ProcessEventData *> (event_ptr->GetData());
3043     }
3044     return NULL;
3045 }
3046 
3047 ProcessSP
3048 Process::ProcessEventData::GetProcessFromEvent (const Event *event_ptr)
3049 {
3050     ProcessSP process_sp;
3051     const ProcessEventData *data = GetEventDataFromEvent (event_ptr);
3052     if (data)
3053         process_sp = data->GetProcessSP();
3054     return process_sp;
3055 }
3056 
3057 StateType
3058 Process::ProcessEventData::GetStateFromEvent (const Event *event_ptr)
3059 {
3060     const ProcessEventData *data = GetEventDataFromEvent (event_ptr);
3061     if (data == NULL)
3062         return eStateInvalid;
3063     else
3064         return data->GetState();
3065 }
3066 
3067 bool
3068 Process::ProcessEventData::GetRestartedFromEvent (const Event *event_ptr)
3069 {
3070     const ProcessEventData *data = GetEventDataFromEvent (event_ptr);
3071     if (data == NULL)
3072         return false;
3073     else
3074         return data->GetRestarted();
3075 }
3076 
3077 void
3078 Process::ProcessEventData::SetRestartedInEvent (Event *event_ptr, bool new_value)
3079 {
3080     ProcessEventData *data = const_cast<ProcessEventData *>(GetEventDataFromEvent (event_ptr));
3081     if (data != NULL)
3082         data->SetRestarted(new_value);
3083 }
3084 
3085 bool
3086 Process::ProcessEventData::GetInterruptedFromEvent (const Event *event_ptr)
3087 {
3088     const ProcessEventData *data = GetEventDataFromEvent (event_ptr);
3089     if (data == NULL)
3090         return false;
3091     else
3092         return data->GetInterrupted ();
3093 }
3094 
3095 void
3096 Process::ProcessEventData::SetInterruptedInEvent (Event *event_ptr, bool new_value)
3097 {
3098     ProcessEventData *data = const_cast<ProcessEventData *>(GetEventDataFromEvent (event_ptr));
3099     if (data != NULL)
3100         data->SetInterrupted(new_value);
3101 }
3102 
3103 bool
3104 Process::ProcessEventData::SetUpdateStateOnRemoval (Event *event_ptr)
3105 {
3106     ProcessEventData *data = const_cast<ProcessEventData *>(GetEventDataFromEvent (event_ptr));
3107     if (data)
3108     {
3109         data->SetUpdateStateOnRemoval();
3110         return true;
3111     }
3112     return false;
3113 }
3114 
3115 void
3116 Process::CalculateExecutionContext (ExecutionContext &exe_ctx)
3117 {
3118     exe_ctx.target = &m_target;
3119     exe_ctx.process = this;
3120     exe_ctx.thread = NULL;
3121     exe_ctx.frame = NULL;
3122 }
3123 
3124 lldb::ProcessSP
3125 Process::GetSP ()
3126 {
3127     return GetTarget().GetProcessSP();
3128 }
3129 
3130 //uint32_t
3131 //Process::ListProcessesMatchingName (const char *name, StringList &matches, std::vector<lldb::pid_t> &pids)
3132 //{
3133 //    return 0;
3134 //}
3135 //
3136 //ArchSpec
3137 //Process::GetArchSpecForExistingProcess (lldb::pid_t pid)
3138 //{
3139 //    return Host::GetArchSpecForExistingProcess (pid);
3140 //}
3141 //
3142 //ArchSpec
3143 //Process::GetArchSpecForExistingProcess (const char *process_name)
3144 //{
3145 //    return Host::GetArchSpecForExistingProcess (process_name);
3146 //}
3147 //
3148 void
3149 Process::AppendSTDOUT (const char * s, size_t len)
3150 {
3151     Mutex::Locker locker (m_stdio_communication_mutex);
3152     m_stdout_data.append (s, len);
3153 
3154     BroadcastEventIfUnique (eBroadcastBitSTDOUT, new ProcessEventData (GetTarget().GetProcessSP(), GetState()));
3155 }
3156 
3157 void
3158 Process::STDIOReadThreadBytesReceived (void *baton, const void *src, size_t src_len)
3159 {
3160     Process *process = (Process *) baton;
3161     process->AppendSTDOUT (static_cast<const char *>(src), src_len);
3162 }
3163 
3164 size_t
3165 Process::ProcessInputReaderCallback (void *baton,
3166                                      InputReader &reader,
3167                                      lldb::InputReaderAction notification,
3168                                      const char *bytes,
3169                                      size_t bytes_len)
3170 {
3171     Process *process = (Process *) baton;
3172 
3173     switch (notification)
3174     {
3175     case eInputReaderActivate:
3176         break;
3177 
3178     case eInputReaderDeactivate:
3179         break;
3180 
3181     case eInputReaderReactivate:
3182         break;
3183 
3184     case eInputReaderGotToken:
3185         {
3186             Error error;
3187             process->PutSTDIN (bytes, bytes_len, error);
3188         }
3189         break;
3190 
3191     case eInputReaderInterrupt:
3192         process->Halt ();
3193         break;
3194 
3195     case eInputReaderEndOfFile:
3196         process->AppendSTDOUT ("^D", 2);
3197         break;
3198 
3199     case eInputReaderDone:
3200         break;
3201 
3202     }
3203 
3204     return bytes_len;
3205 }
3206 
3207 void
3208 Process::ResetProcessInputReader ()
3209 {
3210     m_process_input_reader.reset();
3211 }
3212 
3213 void
3214 Process::SetUpProcessInputReader (int file_descriptor)
3215 {
3216     // First set up the Read Thread for reading/handling process I/O
3217 
3218     std::auto_ptr<ConnectionFileDescriptor> conn_ap (new ConnectionFileDescriptor (file_descriptor, true));
3219 
3220     if (conn_ap.get())
3221     {
3222         m_stdio_communication.SetConnection (conn_ap.release());
3223         if (m_stdio_communication.IsConnected())
3224         {
3225             m_stdio_communication.SetReadThreadBytesReceivedCallback (STDIOReadThreadBytesReceived, this);
3226             m_stdio_communication.StartReadThread();
3227 
3228             // Now read thread is set up, set up input reader.
3229 
3230             if (!m_process_input_reader.get())
3231             {
3232                 m_process_input_reader.reset (new InputReader(m_target.GetDebugger()));
3233                 Error err (m_process_input_reader->Initialize (Process::ProcessInputReaderCallback,
3234                                                                this,
3235                                                                eInputReaderGranularityByte,
3236                                                                NULL,
3237                                                                NULL,
3238                                                                false));
3239 
3240                 if  (err.Fail())
3241                     m_process_input_reader.reset();
3242             }
3243         }
3244     }
3245 }
3246 
3247 void
3248 Process::PushProcessInputReader ()
3249 {
3250     if (m_process_input_reader && !m_process_input_reader->IsActive())
3251         m_target.GetDebugger().PushInputReader (m_process_input_reader);
3252 }
3253 
3254 void
3255 Process::PopProcessInputReader ()
3256 {
3257     if (m_process_input_reader && m_process_input_reader->IsActive())
3258         m_target.GetDebugger().PopInputReader (m_process_input_reader);
3259 }
3260 
3261 // The process needs to know about installed plug-ins
3262 void
3263 Process::SettingsInitialize ()
3264 {
3265     static std::vector<OptionEnumValueElement> g_plugins;
3266 
3267     int i=0;
3268     const char *name;
3269     OptionEnumValueElement option_enum;
3270     while ((name = PluginManager::GetProcessPluginNameAtIndex (i)) != NULL)
3271     {
3272         if (name)
3273         {
3274             option_enum.value = i;
3275             option_enum.string_value = name;
3276             option_enum.usage = PluginManager::GetProcessPluginDescriptionAtIndex (i);
3277             g_plugins.push_back (option_enum);
3278         }
3279         ++i;
3280     }
3281     option_enum.value = 0;
3282     option_enum.string_value = NULL;
3283     option_enum.usage = NULL;
3284     g_plugins.push_back (option_enum);
3285 
3286     for (i=0; (name = SettingsController::instance_settings_table[i].var_name); ++i)
3287     {
3288         if (::strcmp (name, "plugin") == 0)
3289         {
3290             SettingsController::instance_settings_table[i].enum_values = &g_plugins[0];
3291             break;
3292         }
3293     }
3294     UserSettingsControllerSP &usc = GetSettingsController();
3295     usc.reset (new SettingsController);
3296     UserSettingsController::InitializeSettingsController (usc,
3297                                                           SettingsController::global_settings_table,
3298                                                           SettingsController::instance_settings_table);
3299 
3300     // Now call SettingsInitialize() for each 'child' of Process settings
3301     Thread::SettingsInitialize ();
3302 }
3303 
3304 void
3305 Process::SettingsTerminate ()
3306 {
3307     // Must call SettingsTerminate() on each 'child' of Process settings before terminating Process settings.
3308 
3309     Thread::SettingsTerminate ();
3310 
3311     // Now terminate Process Settings.
3312 
3313     UserSettingsControllerSP &usc = GetSettingsController();
3314     UserSettingsController::FinalizeSettingsController (usc);
3315     usc.reset();
3316 }
3317 
3318 UserSettingsControllerSP &
3319 Process::GetSettingsController ()
3320 {
3321     static UserSettingsControllerSP g_settings_controller;
3322     return g_settings_controller;
3323 }
3324 
3325 void
3326 Process::UpdateInstanceName ()
3327 {
3328     ModuleSP module_sp = GetTarget().GetExecutableModule();
3329     if (module_sp)
3330     {
3331         StreamString sstr;
3332         sstr.Printf ("%s", module_sp->GetFileSpec().GetFilename().AsCString());
3333 
3334         GetSettingsController()->RenameInstanceSettings (GetInstanceName().AsCString(),
3335                                                          sstr.GetData());
3336     }
3337 }
3338 
3339 ExecutionResults
3340 Process::RunThreadPlan (ExecutionContext &exe_ctx,
3341                         lldb::ThreadPlanSP &thread_plan_sp,
3342                         bool stop_others,
3343                         bool try_all_threads,
3344                         bool discard_on_error,
3345                         uint32_t single_thread_timeout_usec,
3346                         Stream &errors)
3347 {
3348     ExecutionResults return_value = eExecutionSetupError;
3349 
3350     if (thread_plan_sp.get() == NULL)
3351     {
3352         errors.Printf("RunThreadPlan called with empty thread plan.");
3353         return eExecutionSetupError;
3354     }
3355 
3356     if (m_private_state.GetValue() != eStateStopped)
3357     {
3358         errors.Printf ("RunThreadPlan called while the private state was not stopped.");
3359         return eExecutionSetupError;
3360     }
3361 
3362     // Save this value for restoration of the execution context after we run
3363     uint32_t tid = exe_ctx.thread->GetIndexID();
3364 
3365     // N.B. Running the target may unset the currently selected thread and frame.  We don't want to do that either,
3366     // so we should arrange to reset them as well.
3367 
3368     lldb::ThreadSP selected_thread_sp = exe_ctx.process->GetThreadList().GetSelectedThread();
3369     lldb::StackFrameSP selected_frame_sp;
3370 
3371     uint32_t selected_tid;
3372     if (selected_thread_sp != NULL)
3373     {
3374         selected_tid = selected_thread_sp->GetIndexID();
3375         selected_frame_sp = selected_thread_sp->GetSelectedFrame();
3376     }
3377     else
3378     {
3379         selected_tid = LLDB_INVALID_THREAD_ID;
3380     }
3381 
3382     exe_ctx.thread->QueueThreadPlan(thread_plan_sp, true);
3383 
3384     Listener listener("lldb.process.listener.run-thread-plan");
3385 
3386     // This process event hijacker Hijacks the Public events and its destructor makes sure that the process events get
3387     // restored on exit to the function.
3388 
3389     ProcessEventHijacker run_thread_plan_hijacker (*this, &listener);
3390 
3391     lldb::LogSP log(lldb_private::GetLogIfAnyCategoriesSet (LIBLLDB_LOG_STEP | LIBLLDB_LOG_PROCESS));
3392     if (log)
3393     {
3394         StreamString s;
3395         thread_plan_sp->GetDescription(&s, lldb::eDescriptionLevelVerbose);
3396         log->Printf ("Process::RunThreadPlan(): Resuming thread %u - 0x%4.4x to run thread plan \"%s\".",
3397                      exe_ctx.thread->GetIndexID(),
3398                      exe_ctx.thread->GetID(),
3399                      s.GetData());
3400     }
3401 
3402     bool got_event;
3403     lldb::EventSP event_sp;
3404     lldb::StateType stop_state = lldb::eStateInvalid;
3405 
3406     TimeValue* timeout_ptr = NULL;
3407     TimeValue real_timeout;
3408 
3409     bool first_timeout = true;
3410     bool do_resume = true;
3411 
3412     while (1)
3413     {
3414         // We usually want to resume the process if we get to the top of the loop.
3415         // The only exception is if we get two running events with no intervening
3416         // stop, which can happen, we will just wait for then next stop event.
3417 
3418         if (do_resume)
3419         {
3420             // Do the initial resume and wait for the running event before going further.
3421 
3422             Error resume_error = exe_ctx.process->Resume ();
3423             if (!resume_error.Success())
3424             {
3425                 errors.Printf("Error resuming inferior: \"%s\".\n", resume_error.AsCString());
3426                 return_value = eExecutionSetupError;
3427                 break;
3428             }
3429 
3430             real_timeout = TimeValue::Now();
3431             real_timeout.OffsetWithMicroSeconds(500000);
3432             timeout_ptr = &real_timeout;
3433 
3434             got_event = listener.WaitForEvent(NULL, event_sp);
3435             if (!got_event)
3436             {
3437                 if (log)
3438                     log->Printf("Didn't get any event after initial resume, exiting.");
3439 
3440                 errors.Printf("Didn't get any event after initial resume, exiting.");
3441                 return_value = eExecutionSetupError;
3442                 break;
3443             }
3444 
3445             stop_state = Process::ProcessEventData::GetStateFromEvent(event_sp.get());
3446             if (stop_state != eStateRunning)
3447             {
3448                 if (log)
3449                     log->Printf("Didn't get running event after initial resume, got %s instead.", StateAsCString(stop_state));
3450 
3451                 errors.Printf("Didn't get running event after initial resume, got %s instead.", StateAsCString(stop_state));
3452                 return_value = eExecutionSetupError;
3453                 break;
3454             }
3455 
3456             if (log)
3457                 log->Printf ("Resuming succeeded.");
3458             // We need to call the function synchronously, so spin waiting for it to return.
3459             // If we get interrupted while executing, we're going to lose our context, and
3460             // won't be able to gather the result at this point.
3461             // We set the timeout AFTER the resume, since the resume takes some time and we
3462             // don't want to charge that to the timeout.
3463 
3464             if (single_thread_timeout_usec != 0)
3465             {
3466                 real_timeout = TimeValue::Now();
3467                 if (first_timeout)
3468                     real_timeout.OffsetWithMicroSeconds(single_thread_timeout_usec);
3469                 else
3470                     real_timeout.OffsetWithSeconds(10);
3471 
3472                 timeout_ptr = &real_timeout;
3473             }
3474         }
3475         else
3476         {
3477             if (log)
3478                 log->Printf ("Handled an extra running event.");
3479             do_resume = true;
3480         }
3481 
3482         // Now wait for the process to stop again:
3483         stop_state = lldb::eStateInvalid;
3484         event_sp.reset();
3485         got_event = listener.WaitForEvent (timeout_ptr, event_sp);
3486 
3487         if (got_event)
3488         {
3489             if (event_sp.get())
3490             {
3491                 bool keep_going = false;
3492                 stop_state = Process::ProcessEventData::GetStateFromEvent(event_sp.get());
3493                 if (log)
3494                     log->Printf("In while loop, got event: %s.", StateAsCString(stop_state));
3495 
3496                 switch (stop_state)
3497                 {
3498                 case lldb::eStateStopped:
3499                     // Yay, we're done.
3500                     if (log)
3501                         log->Printf ("Execution completed successfully.");
3502                     return_value = eExecutionCompleted;
3503                     break;
3504                 case lldb::eStateCrashed:
3505                     if (log)
3506                         log->Printf ("Execution crashed.");
3507                     return_value = eExecutionInterrupted;
3508                     break;
3509                 case lldb::eStateRunning:
3510                     do_resume = false;
3511                     keep_going = true;
3512                     break;
3513                 default:
3514                     if (log)
3515                         log->Printf("Execution stopped with unexpected state: %s.", StateAsCString(stop_state));
3516                     return_value = eExecutionInterrupted;
3517                     break;
3518                 }
3519                 if (keep_going)
3520                     continue;
3521                 else
3522                     break;
3523             }
3524             else
3525             {
3526                 if (log)
3527                     log->Printf ("got_event was true, but the event pointer was null.  How odd...");
3528                 return_value = eExecutionInterrupted;
3529                 break;
3530             }
3531         }
3532         else
3533         {
3534             // If we didn't get an event that means we've timed out...
3535             // We will interrupt the process here.  Depending on what we were asked to do we will
3536             // either exit, or try with all threads running for the same timeout.
3537             // Not really sure what to do if Halt fails here...
3538 
3539             if (log) {
3540                 if (try_all_threads)
3541                 {
3542                     if (first_timeout)
3543                         log->Printf ("Process::RunThreadPlan(): Running function with timeout: %d timed out, "
3544                                      "trying with all threads enabled.",
3545                                      single_thread_timeout_usec);
3546                     else
3547                         log->Printf ("Process::RunThreadPlan(): Restarting function with all threads enabled "
3548                                      "and timeout: %d timed out.",
3549                                      single_thread_timeout_usec);
3550                 }
3551                 else
3552                     log->Printf ("Process::RunThreadPlan(): Running function with timeout: %d timed out, "
3553                                  "halt and abandoning execution.",
3554                                  single_thread_timeout_usec);
3555             }
3556 
3557             Error halt_error = exe_ctx.process->Halt();
3558             if (halt_error.Success())
3559             {
3560                 if (log)
3561                     log->Printf ("Process::RunThreadPlan(): Halt succeeded.");
3562 
3563                 // If halt succeeds, it always produces a stopped event.  Wait for that:
3564 
3565                 real_timeout = TimeValue::Now();
3566                 real_timeout.OffsetWithMicroSeconds(500000);
3567 
3568                 got_event = listener.WaitForEvent(&real_timeout, event_sp);
3569 
3570                 if (got_event)
3571                 {
3572                     stop_state = Process::ProcessEventData::GetStateFromEvent(event_sp.get());
3573                     if (log)
3574                     {
3575                         log->Printf ("Process::RunThreadPlan(): Stopped with event: %s", StateAsCString(stop_state));
3576                         if (stop_state == lldb::eStateStopped
3577                             && Process::ProcessEventData::GetInterruptedFromEvent(event_sp.get()))
3578                             log->Printf ("    Event was the Halt interruption event.");
3579                     }
3580 
3581                     if (stop_state == lldb::eStateStopped)
3582                     {
3583                         // Between the time we initiated the Halt and the time we delivered it, the process could have
3584                         // already finished its job.  Check that here:
3585 
3586                         if (exe_ctx.thread->IsThreadPlanDone (thread_plan_sp.get()))
3587                         {
3588                             if (log)
3589                                 log->Printf ("Process::RunThreadPlan(): Even though we timed out, the call plan was done.  "
3590                                              "Exiting wait loop.");
3591                             return_value = eExecutionCompleted;
3592                             break;
3593                         }
3594 
3595                         if (!try_all_threads)
3596                         {
3597                             if (log)
3598                                 log->Printf ("try_all_threads was false, we stopped so now we're quitting.");
3599                             return_value = eExecutionInterrupted;
3600                             break;
3601                         }
3602 
3603                         if (first_timeout)
3604                         {
3605                             // Set all the other threads to run, and return to the top of the loop, which will continue;
3606                             first_timeout = false;
3607                             thread_plan_sp->SetStopOthers (false);
3608                             if (log)
3609                                 log->Printf ("Process::RunThreadPlan(): About to resume.");
3610 
3611                             continue;
3612                         }
3613                         else
3614                         {
3615                             // Running all threads failed, so return Interrupted.
3616                             if (log)
3617                                 log->Printf("Process::RunThreadPlan(): running all threads timed out.");
3618                             return_value = eExecutionInterrupted;
3619                             break;
3620                         }
3621                     }
3622                 }
3623                 else
3624                 {   if (log)
3625                         log->Printf("Process::RunThreadPlan(): halt said it succeeded, but I got no event.  "
3626                                 "I'm getting out of here passing Interrupted.");
3627                     return_value = eExecutionInterrupted;
3628                     break;
3629                 }
3630             }
3631             else
3632             {
3633                 // This branch is to work around some problems with gdb-remote's Halt.  It is a little racy, and can return
3634                 // an error from halt, but if you wait a bit you'll get a stopped event anyway.
3635                 if (log)
3636                     log->Printf ("Process::RunThreadPlan(): halt failed: error = \"%s\", I'm just going to wait a little longer and see if I get a stopped event.",
3637                                  halt_error.AsCString());
3638                 real_timeout = TimeValue::Now();
3639                 real_timeout.OffsetWithMicroSeconds(500000);
3640                 timeout_ptr = &real_timeout;
3641                 got_event = listener.WaitForEvent(&real_timeout, event_sp);
3642                 if (!got_event || event_sp.get() == NULL)
3643                 {
3644                     // This is not going anywhere, bag out.
3645                     if (log)
3646                         log->Printf ("Process::RunThreadPlan(): halt failed: and waiting for the stopped event failed.");
3647                     return_value = eExecutionInterrupted;
3648                     break;
3649                 }
3650                 else
3651                 {
3652                     stop_state = Process::ProcessEventData::GetStateFromEvent(event_sp.get());
3653                     if (log)
3654                         log->Printf ("Process::RunThreadPlan(): halt failed: but then I got a stopped event.  Whatever...");
3655                     if (stop_state == lldb::eStateStopped)
3656                     {
3657                         // Between the time we initiated the Halt and the time we delivered it, the process could have
3658                         // already finished its job.  Check that here:
3659 
3660                         if (exe_ctx.thread->IsThreadPlanDone (thread_plan_sp.get()))
3661                         {
3662                             if (log)
3663                                 log->Printf ("Process::RunThreadPlan(): Even though we timed out, the call plan was done.  "
3664                                              "Exiting wait loop.");
3665                             return_value = eExecutionCompleted;
3666                             break;
3667                         }
3668 
3669                         if (first_timeout)
3670                         {
3671                             // Set all the other threads to run, and return to the top of the loop, which will continue;
3672                             first_timeout = false;
3673                             thread_plan_sp->SetStopOthers (false);
3674                             if (log)
3675                                 log->Printf ("Process::RunThreadPlan(): About to resume.");
3676 
3677                             continue;
3678                         }
3679                         else
3680                         {
3681                             // Running all threads failed, so return Interrupted.
3682                             if (log)
3683                                 log->Printf("Process::RunThreadPlan(): running all threads timed out.");
3684                             return_value = eExecutionInterrupted;
3685                             break;
3686                         }
3687                     }
3688                     else
3689                     {
3690                         log->Printf ("Process::RunThreadPlan(): halt failed, I waited and didn't get"
3691                                      " a stopped event, instead got %s.", StateAsCString(stop_state));
3692                         return_value = eExecutionInterrupted;
3693                         break;
3694                     }
3695                 }
3696             }
3697 
3698         }
3699 
3700     }  // END WAIT LOOP
3701 
3702     // Now do some processing on the results of the run:
3703     if (return_value == eExecutionInterrupted)
3704     {
3705         if (log)
3706         {
3707             StreamString s;
3708             if (event_sp)
3709                 event_sp->Dump (&s);
3710             else
3711             {
3712                 log->Printf ("Process::RunThreadPlan(): Stop event that interrupted us is NULL.");
3713             }
3714 
3715             StreamString ts;
3716 
3717             const char *event_explanation;
3718 
3719             do
3720             {
3721                 const Process::ProcessEventData *event_data = Process::ProcessEventData::GetEventDataFromEvent (event_sp.get());
3722 
3723                 if (!event_data)
3724                 {
3725                     event_explanation = "<no event data>";
3726                     break;
3727                 }
3728 
3729                 Process *process = event_data->GetProcessSP().get();
3730 
3731                 if (!process)
3732                 {
3733                     event_explanation = "<no process>";
3734                     break;
3735                 }
3736 
3737                 ThreadList &thread_list = process->GetThreadList();
3738 
3739                 uint32_t num_threads = thread_list.GetSize();
3740                 uint32_t thread_index;
3741 
3742                 ts.Printf("<%u threads> ", num_threads);
3743 
3744                 for (thread_index = 0;
3745                      thread_index < num_threads;
3746                      ++thread_index)
3747                 {
3748                     Thread *thread = thread_list.GetThreadAtIndex(thread_index).get();
3749 
3750                     if (!thread)
3751                     {
3752                         ts.Printf("<?> ");
3753                         continue;
3754                     }
3755 
3756                     ts.Printf("<0x%4.4x ", thread->GetID());
3757                     RegisterContext *register_context = thread->GetRegisterContext().get();
3758 
3759                     if (register_context)
3760                         ts.Printf("[ip 0x%llx] ", register_context->GetPC());
3761                     else
3762                         ts.Printf("[ip unknown] ");
3763 
3764                     lldb::StopInfoSP stop_info_sp = thread->GetStopInfo();
3765                     if (stop_info_sp)
3766                     {
3767                         const char *stop_desc = stop_info_sp->GetDescription();
3768                         if (stop_desc)
3769                             ts.PutCString (stop_desc);
3770                     }
3771                     ts.Printf(">");
3772                 }
3773 
3774                 event_explanation = ts.GetData();
3775             } while (0);
3776 
3777             if (log)
3778                 log->Printf("Process::RunThreadPlan(): execution interrupted: %s %s", s.GetData(), event_explanation);
3779 
3780             if (discard_on_error && thread_plan_sp)
3781             {
3782                 exe_ctx.thread->DiscardThreadPlansUpToPlan (thread_plan_sp);
3783             }
3784         }
3785     }
3786     else if (return_value == eExecutionSetupError)
3787     {
3788         if (log)
3789             log->Printf("Process::RunThreadPlan(): execution set up error.");
3790 
3791         if (discard_on_error && thread_plan_sp)
3792         {
3793             exe_ctx.thread->DiscardThreadPlansUpToPlan (thread_plan_sp);
3794         }
3795     }
3796     else
3797     {
3798         if (exe_ctx.thread->IsThreadPlanDone (thread_plan_sp.get()))
3799         {
3800             if (log)
3801                 log->Printf("Process::RunThreadPlan(): thread plan is done");
3802             return_value = eExecutionCompleted;
3803         }
3804         else if (exe_ctx.thread->WasThreadPlanDiscarded (thread_plan_sp.get()))
3805         {
3806             if (log)
3807                 log->Printf("Process::RunThreadPlan(): thread plan was discarded");
3808             return_value = eExecutionDiscarded;
3809         }
3810         else
3811         {
3812             if (log)
3813                 log->Printf("Process::RunThreadPlan(): thread plan stopped in mid course");
3814             if (discard_on_error && thread_plan_sp)
3815             {
3816                 if (log)
3817                     log->Printf("Process::RunThreadPlan(): discarding thread plan 'cause discard_on_error is set.");
3818                 exe_ctx.thread->DiscardThreadPlansUpToPlan (thread_plan_sp);
3819             }
3820         }
3821     }
3822 
3823     // Thread we ran the function in may have gone away because we ran the target
3824     // Check that it's still there.
3825     exe_ctx.thread = exe_ctx.process->GetThreadList().FindThreadByIndexID(tid, true).get();
3826     if (exe_ctx.thread)
3827         exe_ctx.frame = exe_ctx.thread->GetStackFrameAtIndex(0).get();
3828 
3829     // Also restore the current process'es selected frame & thread, since this function calling may
3830     // be done behind the user's back.
3831 
3832     if (selected_tid != LLDB_INVALID_THREAD_ID)
3833     {
3834         if (exe_ctx.process->GetThreadList().SetSelectedThreadByIndexID (selected_tid))
3835         {
3836             // We were able to restore the selected thread, now restore the frame:
3837             exe_ctx.process->GetThreadList().GetSelectedThread()->SetSelectedFrame(selected_frame_sp.get());
3838         }
3839     }
3840 
3841     return return_value;
3842 }
3843 
3844 const char *
3845 Process::ExecutionResultAsCString (ExecutionResults result)
3846 {
3847     const char *result_name;
3848 
3849     switch (result)
3850     {
3851         case eExecutionCompleted:
3852             result_name = "eExecutionCompleted";
3853             break;
3854         case eExecutionDiscarded:
3855             result_name = "eExecutionDiscarded";
3856             break;
3857         case eExecutionInterrupted:
3858             result_name = "eExecutionInterrupted";
3859             break;
3860         case eExecutionSetupError:
3861             result_name = "eExecutionSetupError";
3862             break;
3863         case eExecutionTimedOut:
3864             result_name = "eExecutionTimedOut";
3865             break;
3866     }
3867     return result_name;
3868 }
3869 
3870 void
3871 Process::GetStatus (Stream &strm)
3872 {
3873     const StateType state = GetState();
3874     if (StateIsStoppedState(state))
3875     {
3876         if (state == eStateExited)
3877         {
3878             int exit_status = GetExitStatus();
3879             const char *exit_description = GetExitDescription();
3880             strm.Printf ("Process %d exited with status = %i (0x%8.8x) %s\n",
3881                           GetID(),
3882                           exit_status,
3883                           exit_status,
3884                           exit_description ? exit_description : "");
3885         }
3886         else
3887         {
3888             if (state == eStateConnected)
3889                 strm.Printf ("Connected to remote target.\n");
3890             else
3891                 strm.Printf ("Process %d %s\n", GetID(), StateAsCString (state));
3892         }
3893     }
3894     else
3895     {
3896         strm.Printf ("Process %d is running.\n", GetID());
3897     }
3898 }
3899 
3900 size_t
3901 Process::GetThreadStatus (Stream &strm,
3902                           bool only_threads_with_stop_reason,
3903                           uint32_t start_frame,
3904                           uint32_t num_frames,
3905                           uint32_t num_frames_with_source)
3906 {
3907     size_t num_thread_infos_dumped = 0;
3908 
3909     const size_t num_threads = GetThreadList().GetSize();
3910     for (uint32_t i = 0; i < num_threads; i++)
3911     {
3912         Thread *thread = GetThreadList().GetThreadAtIndex(i).get();
3913         if (thread)
3914         {
3915             if (only_threads_with_stop_reason)
3916             {
3917                 if (thread->GetStopInfo().get() == NULL)
3918                     continue;
3919             }
3920             thread->GetStatus (strm,
3921                                start_frame,
3922                                num_frames,
3923                                num_frames_with_source);
3924             ++num_thread_infos_dumped;
3925         }
3926     }
3927     return num_thread_infos_dumped;
3928 }
3929 
3930 //--------------------------------------------------------------
3931 // class Process::SettingsController
3932 //--------------------------------------------------------------
3933 
3934 Process::SettingsController::SettingsController () :
3935     UserSettingsController ("process", Target::GetSettingsController())
3936 {
3937     m_default_settings.reset (new ProcessInstanceSettings (*this,
3938                                                            false,
3939                                                            InstanceSettings::GetDefaultName().AsCString()));
3940 }
3941 
3942 Process::SettingsController::~SettingsController ()
3943 {
3944 }
3945 
3946 lldb::InstanceSettingsSP
3947 Process::SettingsController::CreateInstanceSettings (const char *instance_name)
3948 {
3949     ProcessInstanceSettings *new_settings = new ProcessInstanceSettings (*GetSettingsController(),
3950                                                                          false,
3951                                                                          instance_name);
3952     lldb::InstanceSettingsSP new_settings_sp (new_settings);
3953     return new_settings_sp;
3954 }
3955 
3956 //--------------------------------------------------------------
3957 // class ProcessInstanceSettings
3958 //--------------------------------------------------------------
3959 
3960 ProcessInstanceSettings::ProcessInstanceSettings
3961 (
3962     UserSettingsController &owner,
3963     bool live_instance,
3964     const char *name
3965 ) :
3966     InstanceSettings (owner, name ? name : InstanceSettings::InvalidName().AsCString(), live_instance),
3967     m_run_args (),
3968     m_env_vars (),
3969     m_input_path (),
3970     m_output_path (),
3971     m_error_path (),
3972     m_disable_aslr (true),
3973     m_disable_stdio (false),
3974     m_inherit_host_env (true),
3975     m_got_host_env (false)
3976 {
3977     // CopyInstanceSettings is a pure virtual function in InstanceSettings; it therefore cannot be called
3978     // until the vtables for ProcessInstanceSettings are properly set up, i.e. AFTER all the initializers.
3979     // For this reason it has to be called here, rather than in the initializer or in the parent constructor.
3980     // This is true for CreateInstanceName() too.
3981 
3982     if (GetInstanceName () == InstanceSettings::InvalidName())
3983     {
3984         ChangeInstanceName (std::string (CreateInstanceName().AsCString()));
3985         m_owner.RegisterInstanceSettings (this);
3986     }
3987 
3988     if (live_instance)
3989     {
3990         const lldb::InstanceSettingsSP &pending_settings = m_owner.FindPendingSettings (m_instance_name);
3991         CopyInstanceSettings (pending_settings,false);
3992         //m_owner.RemovePendingSettings (m_instance_name);
3993     }
3994 }
3995 
3996 ProcessInstanceSettings::ProcessInstanceSettings (const ProcessInstanceSettings &rhs) :
3997     InstanceSettings (*Process::GetSettingsController(), CreateInstanceName().AsCString()),
3998     m_run_args (rhs.m_run_args),
3999     m_env_vars (rhs.m_env_vars),
4000     m_input_path (rhs.m_input_path),
4001     m_output_path (rhs.m_output_path),
4002     m_error_path (rhs.m_error_path),
4003     m_disable_aslr (rhs.m_disable_aslr),
4004     m_disable_stdio (rhs.m_disable_stdio)
4005 {
4006     if (m_instance_name != InstanceSettings::GetDefaultName())
4007     {
4008         const lldb::InstanceSettingsSP &pending_settings = m_owner.FindPendingSettings (m_instance_name);
4009         CopyInstanceSettings (pending_settings,false);
4010         m_owner.RemovePendingSettings (m_instance_name);
4011     }
4012 }
4013 
4014 ProcessInstanceSettings::~ProcessInstanceSettings ()
4015 {
4016 }
4017 
4018 ProcessInstanceSettings&
4019 ProcessInstanceSettings::operator= (const ProcessInstanceSettings &rhs)
4020 {
4021     if (this != &rhs)
4022     {
4023         m_run_args = rhs.m_run_args;
4024         m_env_vars = rhs.m_env_vars;
4025         m_input_path = rhs.m_input_path;
4026         m_output_path = rhs.m_output_path;
4027         m_error_path = rhs.m_error_path;
4028         m_disable_aslr = rhs.m_disable_aslr;
4029         m_disable_stdio = rhs.m_disable_stdio;
4030         m_inherit_host_env = rhs.m_inherit_host_env;
4031     }
4032 
4033     return *this;
4034 }
4035 
4036 
4037 void
4038 ProcessInstanceSettings::UpdateInstanceSettingsVariable (const ConstString &var_name,
4039                                                          const char *index_value,
4040                                                          const char *value,
4041                                                          const ConstString &instance_name,
4042                                                          const SettingEntry &entry,
4043                                                          VarSetOperationType op,
4044                                                          Error &err,
4045                                                          bool pending)
4046 {
4047     if (var_name == RunArgsVarName())
4048         UserSettingsController::UpdateStringArrayVariable (op, index_value, m_run_args, value, err);
4049     else if (var_name == EnvVarsVarName())
4050     {
4051         // This is nice for local debugging, but it is isn't correct for
4052         // remote debugging. We need to stop process.env-vars from being
4053         // populated with the host environment and add this as a launch option
4054         // and get the correct environment from the Target's platform.
4055         // GetHostEnvironmentIfNeeded ();
4056         UserSettingsController::UpdateDictionaryVariable (op, index_value, m_env_vars, value, err);
4057     }
4058     else if (var_name == InputPathVarName())
4059         UserSettingsController::UpdateStringVariable (op, m_input_path, value, err);
4060     else if (var_name == OutputPathVarName())
4061         UserSettingsController::UpdateStringVariable (op, m_output_path, value, err);
4062     else if (var_name == ErrorPathVarName())
4063         UserSettingsController::UpdateStringVariable (op, m_error_path, value, err);
4064     else if (var_name == DisableASLRVarName())
4065         UserSettingsController::UpdateBooleanVariable (op, m_disable_aslr, value, true, err);
4066     else if (var_name == DisableSTDIOVarName ())
4067         UserSettingsController::UpdateBooleanVariable (op, m_disable_stdio, value, false, err);
4068 }
4069 
4070 void
4071 ProcessInstanceSettings::CopyInstanceSettings (const lldb::InstanceSettingsSP &new_settings,
4072                                                bool pending)
4073 {
4074     if (new_settings.get() == NULL)
4075         return;
4076 
4077     ProcessInstanceSettings *new_process_settings = (ProcessInstanceSettings *) new_settings.get();
4078 
4079     m_run_args = new_process_settings->m_run_args;
4080     m_env_vars = new_process_settings->m_env_vars;
4081     m_input_path = new_process_settings->m_input_path;
4082     m_output_path = new_process_settings->m_output_path;
4083     m_error_path = new_process_settings->m_error_path;
4084     m_disable_aslr = new_process_settings->m_disable_aslr;
4085     m_disable_stdio = new_process_settings->m_disable_stdio;
4086 }
4087 
4088 bool
4089 ProcessInstanceSettings::GetInstanceSettingsValue (const SettingEntry &entry,
4090                                                    const ConstString &var_name,
4091                                                    StringList &value,
4092                                                    Error *err)
4093 {
4094     if (var_name == RunArgsVarName())
4095     {
4096         if (m_run_args.GetArgumentCount() > 0)
4097         {
4098             for (int i = 0; i < m_run_args.GetArgumentCount(); ++i)
4099                 value.AppendString (m_run_args.GetArgumentAtIndex (i));
4100         }
4101     }
4102     else if (var_name == EnvVarsVarName())
4103     {
4104         GetHostEnvironmentIfNeeded ();
4105 
4106         if (m_env_vars.size() > 0)
4107         {
4108             std::map<std::string, std::string>::iterator pos;
4109             for (pos = m_env_vars.begin(); pos != m_env_vars.end(); ++pos)
4110             {
4111                 StreamString value_str;
4112                 value_str.Printf ("%s=%s", pos->first.c_str(), pos->second.c_str());
4113                 value.AppendString (value_str.GetData());
4114             }
4115         }
4116     }
4117     else if (var_name == InputPathVarName())
4118     {
4119         value.AppendString (m_input_path.c_str());
4120     }
4121     else if (var_name == OutputPathVarName())
4122     {
4123         value.AppendString (m_output_path.c_str());
4124     }
4125     else if (var_name == ErrorPathVarName())
4126     {
4127         value.AppendString (m_error_path.c_str());
4128     }
4129     else if (var_name == InheritHostEnvVarName())
4130     {
4131         if (m_inherit_host_env)
4132             value.AppendString ("true");
4133         else
4134             value.AppendString ("false");
4135     }
4136     else if (var_name == DisableASLRVarName())
4137     {
4138         if (m_disable_aslr)
4139             value.AppendString ("true");
4140         else
4141             value.AppendString ("false");
4142     }
4143     else if (var_name == DisableSTDIOVarName())
4144     {
4145         if (m_disable_stdio)
4146             value.AppendString ("true");
4147         else
4148             value.AppendString ("false");
4149     }
4150     else
4151     {
4152         if (err)
4153             err->SetErrorStringWithFormat ("unrecognized variable name '%s'", var_name.AsCString());
4154         return false;
4155     }
4156     return true;
4157 }
4158 
4159 const ConstString
4160 ProcessInstanceSettings::CreateInstanceName ()
4161 {
4162     static int instance_count = 1;
4163     StreamString sstr;
4164 
4165     sstr.Printf ("process_%d", instance_count);
4166     ++instance_count;
4167 
4168     const ConstString ret_val (sstr.GetData());
4169     return ret_val;
4170 }
4171 
4172 const ConstString &
4173 ProcessInstanceSettings::RunArgsVarName ()
4174 {
4175     static ConstString run_args_var_name ("run-args");
4176 
4177     return run_args_var_name;
4178 }
4179 
4180 const ConstString &
4181 ProcessInstanceSettings::EnvVarsVarName ()
4182 {
4183     static ConstString env_vars_var_name ("env-vars");
4184 
4185     return env_vars_var_name;
4186 }
4187 
4188 const ConstString &
4189 ProcessInstanceSettings::InheritHostEnvVarName ()
4190 {
4191     static ConstString g_name ("inherit-env");
4192 
4193     return g_name;
4194 }
4195 
4196 const ConstString &
4197 ProcessInstanceSettings::InputPathVarName ()
4198 {
4199   static ConstString input_path_var_name ("input-path");
4200 
4201     return input_path_var_name;
4202 }
4203 
4204 const ConstString &
4205 ProcessInstanceSettings::OutputPathVarName ()
4206 {
4207     static ConstString output_path_var_name ("output-path");
4208 
4209     return output_path_var_name;
4210 }
4211 
4212 const ConstString &
4213 ProcessInstanceSettings::ErrorPathVarName ()
4214 {
4215     static ConstString error_path_var_name ("error-path");
4216 
4217     return error_path_var_name;
4218 }
4219 
4220 const ConstString &
4221 ProcessInstanceSettings::DisableASLRVarName ()
4222 {
4223     static ConstString disable_aslr_var_name ("disable-aslr");
4224 
4225     return disable_aslr_var_name;
4226 }
4227 
4228 const ConstString &
4229 ProcessInstanceSettings::DisableSTDIOVarName ()
4230 {
4231     static ConstString disable_stdio_var_name ("disable-stdio");
4232 
4233     return disable_stdio_var_name;
4234 }
4235 
4236 //--------------------------------------------------
4237 // SettingsController Variable Tables
4238 //--------------------------------------------------
4239 
4240 SettingEntry
4241 Process::SettingsController::global_settings_table[] =
4242 {
4243   //{ "var-name",    var-type  ,        "default", enum-table, init'd, hidden, "help-text"},
4244     {  NULL, eSetVarTypeNone, NULL, NULL, 0, 0, NULL }
4245 };
4246 
4247 
4248 SettingEntry
4249 Process::SettingsController::instance_settings_table[] =
4250 {
4251   //{ "var-name",       var-type,              "default",       enum-table, init'd, hidden, "help-text"},
4252     { "run-args",       eSetVarTypeArray,       NULL,           NULL,       false,  false,  "A list containing all the arguments to be passed to the executable when it is run." },
4253     { "env-vars",       eSetVarTypeDictionary,  NULL,           NULL,       false,  false,  "A list of all the environment variables to be passed to the executable's environment, and their values." },
4254     { "inherit-env",    eSetVarTypeBoolean,     "true",         NULL,       false,  false,  "Inherit the environment from the process that is running LLDB." },
4255     { "input-path",     eSetVarTypeString,      NULL,           NULL,       false,  false,  "The file/path to be used by the executable program for reading its input." },
4256     { "output-path",    eSetVarTypeString,      NULL,           NULL,       false,  false,  "The file/path to be used by the executable program for writing its output." },
4257     { "error-path",     eSetVarTypeString,      NULL,           NULL,       false,  false,  "The file/path to be used by the executable program for writings its error messages." },
4258     { "plugin",         eSetVarTypeEnum,        NULL,           NULL,       false,  false,  "The plugin to be used to run the process." },
4259     { "disable-aslr",   eSetVarTypeBoolean,     "true",         NULL,       false,  false,  "Disable Address Space Layout Randomization (ASLR)" },
4260     { "disable-stdio",  eSetVarTypeBoolean,     "false",        NULL,       false,  false,  "Disable stdin/stdout for process (e.g. for a GUI application)" },
4261     {  NULL,            eSetVarTypeNone,        NULL,           NULL,       false,  false,  NULL }
4262 };
4263 
4264 
4265 
4266