blob: 9569750bc5fda9e6ecd9d7071c56574b44d63d48 [file] [log] [blame]
//===-- ProcessLaunchInfo.cpp -----------------------------------*- C++ -*-===//
//
// The LLVM Compiler Infrastructure
//
// This file is distributed under the University of Illinois Open Source
// License. See LICENSE.TXT for details.
//
//===----------------------------------------------------------------------===//
// C Includes
// C++ Includes
#include <climits>
// Other libraries and framework includes
// Project includes
#include "lldb/Core/Debugger.h"
#include "lldb/Host/Config.h"
#include "lldb/Host/FileSystem.h"
#include "lldb/Host/HostInfo.h"
#include "lldb/Target/FileAction.h"
#include "lldb/Target/ProcessLaunchInfo.h"
#include "lldb/Target/Target.h"
#include "lldb/Utility/Log.h"
#include "lldb/Utility/StreamString.h"
#include "llvm/Support/ConvertUTF.h"
#include "llvm/Support/FileSystem.h"
#if !defined(_WIN32)
#include <limits.h>
#endif
using namespace lldb;
using namespace lldb_private;
//----------------------------------------------------------------------------
// ProcessLaunchInfo member functions
//----------------------------------------------------------------------------
ProcessLaunchInfo::ProcessLaunchInfo()
: ProcessInfo(), m_working_dir(), m_plugin_name(), m_flags(0),
m_file_actions(), m_pty(new PseudoTerminal), m_resume_count(0),
m_monitor_callback(nullptr), m_monitor_callback_baton(nullptr),
m_monitor_signals(false), m_listener_sp(), m_hijack_listener_sp() {}
ProcessLaunchInfo::ProcessLaunchInfo(const FileSpec &stdin_file_spec,
const FileSpec &stdout_file_spec,
const FileSpec &stderr_file_spec,
const FileSpec &working_directory,
uint32_t launch_flags)
: ProcessInfo(), m_working_dir(), m_plugin_name(), m_flags(launch_flags),
m_file_actions(), m_pty(new PseudoTerminal), m_resume_count(0),
m_monitor_callback(nullptr), m_monitor_callback_baton(nullptr),
m_monitor_signals(false), m_listener_sp(), m_hijack_listener_sp() {
if (stdin_file_spec) {
FileAction file_action;
const bool read = true;
const bool write = false;
if (file_action.Open(STDIN_FILENO, stdin_file_spec, read, write))
AppendFileAction(file_action);
}
if (stdout_file_spec) {
FileAction file_action;
const bool read = false;
const bool write = true;
if (file_action.Open(STDOUT_FILENO, stdout_file_spec, read, write))
AppendFileAction(file_action);
}
if (stderr_file_spec) {
FileAction file_action;
const bool read = false;
const bool write = true;
if (file_action.Open(STDERR_FILENO, stderr_file_spec, read, write))
AppendFileAction(file_action);
}
if (working_directory)
SetWorkingDirectory(working_directory);
}
bool ProcessLaunchInfo::AppendCloseFileAction(int fd) {
FileAction file_action;
if (file_action.Close(fd)) {
AppendFileAction(file_action);
return true;
}
return false;
}
bool ProcessLaunchInfo::AppendDuplicateFileAction(int fd, int dup_fd) {
FileAction file_action;
if (file_action.Duplicate(fd, dup_fd)) {
AppendFileAction(file_action);
return true;
}
return false;
}
bool ProcessLaunchInfo::AppendOpenFileAction(int fd, const FileSpec &file_spec,
bool read, bool write) {
FileAction file_action;
if (file_action.Open(fd, file_spec, read, write)) {
AppendFileAction(file_action);
return true;
}
return false;
}
bool ProcessLaunchInfo::AppendSuppressFileAction(int fd, bool read,
bool write) {
FileAction file_action;
if (file_action.Open(fd, FileSpec{FileSystem::DEV_NULL, false}, read,
write)) {
AppendFileAction(file_action);
return true;
}
return false;
}
const FileAction *ProcessLaunchInfo::GetFileActionAtIndex(size_t idx) const {
if (idx < m_file_actions.size())
return &m_file_actions[idx];
return nullptr;
}
const FileAction *ProcessLaunchInfo::GetFileActionForFD(int fd) const {
for (size_t idx = 0, count = m_file_actions.size(); idx < count; ++idx) {
if (m_file_actions[idx].GetFD() == fd)
return &m_file_actions[idx];
}
return nullptr;
}
const FileSpec &ProcessLaunchInfo::GetWorkingDirectory() const {
return m_working_dir;
}
void ProcessLaunchInfo::SetWorkingDirectory(const FileSpec &working_dir) {
m_working_dir = working_dir;
}
const char *ProcessLaunchInfo::GetProcessPluginName() const {
return (m_plugin_name.empty() ? nullptr : m_plugin_name.c_str());
}
void ProcessLaunchInfo::SetProcessPluginName(llvm::StringRef plugin) {
m_plugin_name = plugin;
}
const FileSpec &ProcessLaunchInfo::GetShell() const { return m_shell; }
void ProcessLaunchInfo::SetShell(const FileSpec &shell) {
m_shell = shell;
if (m_shell) {
m_shell.ResolveExecutableLocation();
m_flags.Set(lldb::eLaunchFlagLaunchInShell);
} else
m_flags.Clear(lldb::eLaunchFlagLaunchInShell);
}
void ProcessLaunchInfo::SetLaunchInSeparateProcessGroup(bool separate) {
if (separate)
m_flags.Set(lldb::eLaunchFlagLaunchInSeparateProcessGroup);
else
m_flags.Clear(lldb::eLaunchFlagLaunchInSeparateProcessGroup);
}
void ProcessLaunchInfo::SetShellExpandArguments(bool expand) {
if (expand)
m_flags.Set(lldb::eLaunchFlagShellExpandArguments);
else
m_flags.Clear(lldb::eLaunchFlagShellExpandArguments);
}
void ProcessLaunchInfo::Clear() {
ProcessInfo::Clear();
m_working_dir.Clear();
m_plugin_name.clear();
m_shell.Clear();
m_flags.Clear();
m_file_actions.clear();
m_resume_count = 0;
m_listener_sp.reset();
m_hijack_listener_sp.reset();
}
void ProcessLaunchInfo::SetMonitorProcessCallback(
const Host::MonitorChildProcessCallback &callback, bool monitor_signals) {
m_monitor_callback = callback;
m_monitor_signals = monitor_signals;
}
bool ProcessLaunchInfo::NoOpMonitorCallback(lldb::pid_t pid, bool exited, int signal, int status) {
Log *log = lldb_private::GetLogIfAllCategoriesSet(LIBLLDB_LOG_PROCESS);
LLDB_LOG(log, "pid = {0}, exited = {1}, signal = {2}, status = {3}", pid,
exited, signal, status);
return true;
}
bool ProcessLaunchInfo::MonitorProcess() const {
if (m_monitor_callback && ProcessIDIsValid()) {
Host::StartMonitoringChildProcess(m_monitor_callback, GetProcessID(),
m_monitor_signals);
return true;
}
return false;
}
void ProcessLaunchInfo::SetDetachOnError(bool enable) {
if (enable)
m_flags.Set(lldb::eLaunchFlagDetachOnError);
else
m_flags.Clear(lldb::eLaunchFlagDetachOnError);
}
void ProcessLaunchInfo::FinalizeFileActions(Target *target,
bool default_to_use_pty) {
Log *log(lldb_private::GetLogIfAllCategoriesSet(LIBLLDB_LOG_PROCESS));
// If nothing for stdin or stdout or stderr was specified, then check the
// process for any default settings that were set with "settings set"
if (GetFileActionForFD(STDIN_FILENO) == nullptr ||
GetFileActionForFD(STDOUT_FILENO) == nullptr ||
GetFileActionForFD(STDERR_FILENO) == nullptr) {
if (log)
log->Printf("ProcessLaunchInfo::%s at least one of stdin/stdout/stderr "
"was not set, evaluating default handling",
__FUNCTION__);
if (m_flags.Test(eLaunchFlagLaunchInTTY)) {
// Do nothing, if we are launching in a remote terminal no file actions
// should be done at all.
return;
}
if (m_flags.Test(eLaunchFlagDisableSTDIO)) {
if (log)
log->Printf("ProcessLaunchInfo::%s eLaunchFlagDisableSTDIO set, adding "
"suppression action for stdin, stdout and stderr",
__FUNCTION__);
AppendSuppressFileAction(STDIN_FILENO, true, false);
AppendSuppressFileAction(STDOUT_FILENO, false, true);
AppendSuppressFileAction(STDERR_FILENO, false, true);
} else {
// Check for any values that might have gotten set with any of: (lldb)
// settings set target.input-path (lldb) settings set target.output-path
// (lldb) settings set target.error-path
FileSpec in_file_spec;
FileSpec out_file_spec;
FileSpec err_file_spec;
if (target) {
// Only override with the target settings if we don't already have an
// action for in, out or error
if (GetFileActionForFD(STDIN_FILENO) == nullptr)
in_file_spec = target->GetStandardInputPath();
if (GetFileActionForFD(STDOUT_FILENO) == nullptr)
out_file_spec = target->GetStandardOutputPath();
if (GetFileActionForFD(STDERR_FILENO) == nullptr)
err_file_spec = target->GetStandardErrorPath();
}
if (log)
log->Printf("ProcessLaunchInfo::%s target stdin='%s', target "
"stdout='%s', stderr='%s'",
__FUNCTION__,
in_file_spec ? in_file_spec.GetCString() : "<null>",
out_file_spec ? out_file_spec.GetCString() : "<null>",
err_file_spec ? err_file_spec.GetCString() : "<null>");
if (in_file_spec) {
AppendOpenFileAction(STDIN_FILENO, in_file_spec, true, false);
if (log)
log->Printf(
"ProcessLaunchInfo::%s appended stdin open file action for %s",
__FUNCTION__, in_file_spec.GetCString());
}
if (out_file_spec) {
AppendOpenFileAction(STDOUT_FILENO, out_file_spec, false, true);
if (log)
log->Printf(
"ProcessLaunchInfo::%s appended stdout open file action for %s",
__FUNCTION__, out_file_spec.GetCString());
}
if (err_file_spec) {
AppendOpenFileAction(STDERR_FILENO, err_file_spec, false, true);
if (log)
log->Printf(
"ProcessLaunchInfo::%s appended stderr open file action for %s",
__FUNCTION__, err_file_spec.GetCString());
}
if (default_to_use_pty &&
(!in_file_spec || !out_file_spec || !err_file_spec)) {
if (log)
log->Printf("ProcessLaunchInfo::%s default_to_use_pty is set, and at "
"least one stdin/stderr/stdout is unset, so generating a "
"pty to use for it",
__FUNCTION__);
int open_flags = O_RDWR | O_NOCTTY;
#if !defined(_WIN32)
// We really shouldn't be specifying platform specific flags that are
// intended for a system call in generic code. But this will have to
// do for now.
open_flags |= O_CLOEXEC;
#endif
if (m_pty->OpenFirstAvailableMaster(open_flags, nullptr, 0)) {
const FileSpec slave_file_spec{m_pty->GetSlaveName(nullptr, 0),
false};
// Only use the slave tty if we don't have anything specified for
// input and don't have an action for stdin
if (!in_file_spec && GetFileActionForFD(STDIN_FILENO) == nullptr) {
AppendOpenFileAction(STDIN_FILENO, slave_file_spec, true, false);
}
// Only use the slave tty if we don't have anything specified for
// output and don't have an action for stdout
if (!out_file_spec && GetFileActionForFD(STDOUT_FILENO) == nullptr) {
AppendOpenFileAction(STDOUT_FILENO, slave_file_spec, false, true);
}
// Only use the slave tty if we don't have anything specified for
// error and don't have an action for stderr
if (!err_file_spec && GetFileActionForFD(STDERR_FILENO) == nullptr) {
AppendOpenFileAction(STDERR_FILENO, slave_file_spec, false, true);
}
}
}
}
}
}
bool ProcessLaunchInfo::ConvertArgumentsForLaunchingInShell(
Status &error, bool localhost, bool will_debug,
bool first_arg_is_full_shell_command, int32_t num_resumes) {
error.Clear();
if (GetFlags().Test(eLaunchFlagLaunchInShell)) {
if (m_shell) {
std::string shell_executable = m_shell.GetPath();
const char **argv = GetArguments().GetConstArgumentVector();
if (argv == nullptr || argv[0] == nullptr)
return false;
Args shell_arguments;
std::string safe_arg;
shell_arguments.AppendArgument(shell_executable);
const llvm::Triple &triple = GetArchitecture().GetTriple();
if (triple.getOS() == llvm::Triple::Win32 &&
!triple.isWindowsCygwinEnvironment())
shell_arguments.AppendArgument(llvm::StringRef("/C"));
else
shell_arguments.AppendArgument(llvm::StringRef("-c"));
StreamString shell_command;
if (will_debug) {
// Add a modified PATH environment variable in case argv[0] is a
// relative path.
const char *argv0 = argv[0];
FileSpec arg_spec(argv0, false);
if (arg_spec.IsRelative()) {
// We have a relative path to our executable which may not work if we
// just try to run "a.out" (without it being converted to "./a.out")
FileSpec working_dir = GetWorkingDirectory();
// Be sure to put quotes around PATH's value in case any paths have
// spaces...
std::string new_path("PATH=\"");
const size_t empty_path_len = new_path.size();
if (working_dir) {
new_path += working_dir.GetPath();
} else {
llvm::SmallString<64> cwd;
if (! llvm::sys::fs::current_path(cwd))
new_path += cwd;
}
std::string curr_path;
if (HostInfo::GetEnvironmentVar("PATH", curr_path)) {
if (new_path.size() > empty_path_len)
new_path += ':';
new_path += curr_path;
}
new_path += "\" ";
shell_command.PutCString(new_path);
}
if (triple.getOS() != llvm::Triple::Win32 ||
triple.isWindowsCygwinEnvironment())
shell_command.PutCString("exec");
// Only Apple supports /usr/bin/arch being able to specify the
// architecture
if (GetArchitecture().IsValid() && // Valid architecture
GetArchitecture().GetTriple().getVendor() ==
llvm::Triple::Apple && // Apple only
GetArchitecture().GetCore() !=
ArchSpec::eCore_x86_64_x86_64h) // Don't do this for x86_64h
{
shell_command.Printf(" /usr/bin/arch -arch %s",
GetArchitecture().GetArchitectureName());
// Set the resume count to 2:
// 1 - stop in shell
// 2 - stop in /usr/bin/arch
// 3 - then we will stop in our program
SetResumeCount(num_resumes + 1);
} else {
// Set the resume count to 1:
// 1 - stop in shell
// 2 - then we will stop in our program
SetResumeCount(num_resumes);
}
}
if (first_arg_is_full_shell_command) {
// There should only be one argument that is the shell command itself
// to be used as is
if (argv[0] && !argv[1])
shell_command.Printf("%s", argv[0]);
else
return false;
} else {
for (size_t i = 0; argv[i] != nullptr; ++i) {
const char *arg =
Args::GetShellSafeArgument(m_shell, argv[i], safe_arg);
shell_command.Printf(" %s", arg);
}
}
shell_arguments.AppendArgument(shell_command.GetString());
m_executable = m_shell;
m_arguments = shell_arguments;
return true;
} else {
error.SetErrorString("invalid shell path");
}
} else {
error.SetErrorString("not launching in shell");
}
return false;
}
ListenerSP ProcessLaunchInfo::GetListenerForProcess(Debugger &debugger) {
if (m_listener_sp)
return m_listener_sp;
else
return debugger.GetListener();
}