blob: 263c5d8a53160c933e01150d32df918538d41ce0 [file] [log] [blame]
Chris Lattner24943d22010-06-08 16:52:24 +00001//===-- ProcessGDBRemote.cpp ------------------------------------*- C++ -*-===//
2//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9
10// C Includes
11#include <errno.h>
Chris Lattner24943d22010-06-08 16:52:24 +000012#include <spawn.h>
Chris Lattner24943d22010-06-08 16:52:24 +000013#include <sys/types.h>
Chris Lattner24943d22010-06-08 16:52:24 +000014#include <sys/stat.h>
Chris Lattner24943d22010-06-08 16:52:24 +000015
16// C++ Includes
17#include <algorithm>
18#include <map>
19
20// Other libraries and framework includes
21
22#include "lldb/Breakpoint/WatchpointLocation.h"
Jim Ingham84cdc152010-06-15 19:49:27 +000023#include "lldb/Interpreter/Args.h"
Chris Lattner24943d22010-06-08 16:52:24 +000024#include "lldb/Core/ArchSpec.h"
25#include "lldb/Core/Debugger.h"
26#include "lldb/Core/ConnectionFileDescriptor.h"
27#include "lldb/Core/FileSpec.h"
28#include "lldb/Core/InputReader.h"
29#include "lldb/Core/Module.h"
30#include "lldb/Core/PluginManager.h"
31#include "lldb/Core/State.h"
32#include "lldb/Core/StreamString.h"
33#include "lldb/Core/Timer.h"
34#include "lldb/Host/TimeValue.h"
35#include "lldb/Symbol/ObjectFile.h"
36#include "lldb/Target/DynamicLoader.h"
37#include "lldb/Target/Target.h"
38#include "lldb/Target/TargetList.h"
Jason Molendadea5ea72010-06-09 21:28:42 +000039#include "lldb/Utility/PseudoTerminal.h"
Chris Lattner24943d22010-06-08 16:52:24 +000040
41// Project includes
42#include "lldb/Host/Host.h"
Greg Clayton54e7afa2010-07-09 20:39:50 +000043#include "Utility/StringExtractorGDBRemote.h"
Chris Lattner24943d22010-06-08 16:52:24 +000044#include "GDBRemoteRegisterContext.h"
45#include "ProcessGDBRemote.h"
46#include "ProcessGDBRemoteLog.h"
47#include "ThreadGDBRemote.h"
Greg Clayton643ee732010-08-04 01:40:35 +000048#include "StopInfoMachException.h"
49
Chris Lattner24943d22010-06-08 16:52:24 +000050
Chris Lattner24943d22010-06-08 16:52:24 +000051
52#define DEBUGSERVER_BASENAME "debugserver"
53using namespace lldb;
54using namespace lldb_private;
55
56static inline uint16_t
57get_random_port ()
58{
59 return (arc4random() % (UINT16_MAX - 1000u)) + 1000u;
60}
61
62
63const char *
64ProcessGDBRemote::GetPluginNameStatic()
65{
66 return "process.gdb-remote";
67}
68
69const char *
70ProcessGDBRemote::GetPluginDescriptionStatic()
71{
72 return "GDB Remote protocol based debugging plug-in.";
73}
74
75void
76ProcessGDBRemote::Terminate()
77{
78 PluginManager::UnregisterPlugin (ProcessGDBRemote::CreateInstance);
79}
80
81
82Process*
83ProcessGDBRemote::CreateInstance (Target &target, Listener &listener)
84{
85 return new ProcessGDBRemote (target, listener);
86}
87
88bool
89ProcessGDBRemote::CanDebug(Target &target)
90{
91 // For now we are just making sure the file exists for a given module
92 ModuleSP exe_module_sp(target.GetExecutableModule());
93 if (exe_module_sp.get())
94 return exe_module_sp->GetFileSpec().Exists();
Jim Ingham7508e732010-08-09 23:31:02 +000095 // However, if there is no executable module, we return true since we might be preparing to attach.
96 return true;
Chris Lattner24943d22010-06-08 16:52:24 +000097}
98
99//----------------------------------------------------------------------
100// ProcessGDBRemote constructor
101//----------------------------------------------------------------------
102ProcessGDBRemote::ProcessGDBRemote(Target& target, Listener &listener) :
103 Process (target, listener),
104 m_dynamic_loader_ap (),
Chris Lattner24943d22010-06-08 16:52:24 +0000105 m_flags (0),
Chris Lattner24943d22010-06-08 16:52:24 +0000106 m_stdio_mutex (Mutex::eMutexTypeRecursive),
Chris Lattner24943d22010-06-08 16:52:24 +0000107 m_gdb_comm(),
108 m_debugserver_pid (LLDB_INVALID_PROCESS_ID),
Greg Clayton75ccf502010-08-21 02:22:51 +0000109 m_debugserver_thread (LLDB_INVALID_HOST_THREAD),
Greg Clayton54e7afa2010-07-09 20:39:50 +0000110 m_last_stop_packet (),
Chris Lattner24943d22010-06-08 16:52:24 +0000111 m_register_info (),
Chris Lattner24943d22010-06-08 16:52:24 +0000112 m_async_broadcaster ("lldb.process.gdb-remote.async-broadcaster"),
113 m_async_thread (LLDB_INVALID_HOST_THREAD),
Greg Clayton54e7afa2010-07-09 20:39:50 +0000114 m_curr_tid (LLDB_INVALID_THREAD_ID),
115 m_curr_tid_run (LLDB_INVALID_THREAD_ID),
Chris Lattner24943d22010-06-08 16:52:24 +0000116 m_z0_supported (1),
117 m_continue_packet(),
118 m_dispatch_queue_offsets_addr (LLDB_INVALID_ADDRESS),
Greg Clayton54e7afa2010-07-09 20:39:50 +0000119 m_packet_timeout (1),
120 m_max_memory_size (512),
Jim Ingham7508e732010-08-09 23:31:02 +0000121 m_waiting_for_attach (false),
Jim Ingham55e01d82011-01-22 01:33:44 +0000122 m_local_debugserver (true),
123 m_thread_observation_bps()
Chris Lattner24943d22010-06-08 16:52:24 +0000124{
125}
126
127//----------------------------------------------------------------------
128// Destructor
129//----------------------------------------------------------------------
130ProcessGDBRemote::~ProcessGDBRemote()
131{
Greg Claytonff5cac22010-12-13 18:11:18 +0000132 m_dynamic_loader_ap.reset();
133
Greg Clayton75ccf502010-08-21 02:22:51 +0000134 if (m_debugserver_thread != LLDB_INVALID_HOST_THREAD)
135 {
136 Host::ThreadCancel (m_debugserver_thread, NULL);
137 thread_result_t thread_result;
138 Host::ThreadJoin (m_debugserver_thread, &thread_result, NULL);
139 m_debugserver_thread = LLDB_INVALID_HOST_THREAD;
140 }
Chris Lattner24943d22010-06-08 16:52:24 +0000141 // m_mach_process.UnregisterNotificationCallbacks (this);
142 Clear();
143}
144
145//----------------------------------------------------------------------
146// PluginInterface
147//----------------------------------------------------------------------
148const char *
149ProcessGDBRemote::GetPluginName()
150{
151 return "Process debugging plug-in that uses the GDB remote protocol";
152}
153
154const char *
155ProcessGDBRemote::GetShortPluginName()
156{
157 return GetPluginNameStatic();
158}
159
160uint32_t
161ProcessGDBRemote::GetPluginVersion()
162{
163 return 1;
164}
165
166void
167ProcessGDBRemote::GetPluginCommandHelp (const char *command, Stream *strm)
168{
169 strm->Printf("TODO: fill this in\n");
170}
171
172Error
173ProcessGDBRemote::ExecutePluginCommand (Args &command, Stream *strm)
174{
175 Error error;
176 error.SetErrorString("No plug-in commands are currently supported.");
177 return error;
178}
179
180Log *
181ProcessGDBRemote::EnablePluginLogging (Stream *strm, Args &command)
182{
183 return NULL;
184}
185
186void
187ProcessGDBRemote::BuildDynamicRegisterInfo ()
188{
189 char register_info_command[64];
190 m_register_info.Clear();
191 StringExtractorGDBRemote::Type packet_type = StringExtractorGDBRemote::eResponse;
192 uint32_t reg_offset = 0;
193 uint32_t reg_num = 0;
194 for (; packet_type == StringExtractorGDBRemote::eResponse; ++reg_num)
195 {
196 ::snprintf (register_info_command, sizeof(register_info_command), "qRegisterInfo%x", reg_num);
197 StringExtractorGDBRemote response;
198 if (m_gdb_comm.SendPacketAndWaitForResponse(register_info_command, response, 2, false))
199 {
200 packet_type = response.GetType();
201 if (packet_type == StringExtractorGDBRemote::eResponse)
202 {
203 std::string name;
204 std::string value;
205 ConstString reg_name;
206 ConstString alt_name;
207 ConstString set_name;
208 RegisterInfo reg_info = { NULL, // Name
209 NULL, // Alt name
210 0, // byte size
211 reg_offset, // offset
212 eEncodingUint, // encoding
213 eFormatHex, // formate
Chris Lattner24943d22010-06-08 16:52:24 +0000214 {
215 LLDB_INVALID_REGNUM, // GCC reg num
216 LLDB_INVALID_REGNUM, // DWARF reg num
217 LLDB_INVALID_REGNUM, // generic reg num
Jason Molenda3a4ea242010-09-10 07:49:16 +0000218 reg_num, // GDB reg num
219 reg_num // native register number
Chris Lattner24943d22010-06-08 16:52:24 +0000220 }
221 };
222
223 while (response.GetNameColonValue(name, value))
224 {
225 if (name.compare("name") == 0)
226 {
227 reg_name.SetCString(value.c_str());
228 }
229 else if (name.compare("alt-name") == 0)
230 {
231 alt_name.SetCString(value.c_str());
232 }
233 else if (name.compare("bitsize") == 0)
234 {
235 reg_info.byte_size = Args::StringToUInt32(value.c_str(), 0, 0) / CHAR_BIT;
236 }
237 else if (name.compare("offset") == 0)
238 {
239 uint32_t offset = Args::StringToUInt32(value.c_str(), UINT32_MAX, 0);
Jason Molenda53d96862010-06-11 23:44:18 +0000240 if (reg_offset != offset)
Chris Lattner24943d22010-06-08 16:52:24 +0000241 {
242 reg_offset = offset;
Chris Lattner24943d22010-06-08 16:52:24 +0000243 }
244 }
245 else if (name.compare("encoding") == 0)
246 {
247 if (value.compare("uint") == 0)
248 reg_info.encoding = eEncodingUint;
249 else if (value.compare("sint") == 0)
250 reg_info.encoding = eEncodingSint;
251 else if (value.compare("ieee754") == 0)
252 reg_info.encoding = eEncodingIEEE754;
253 else if (value.compare("vector") == 0)
254 reg_info.encoding = eEncodingVector;
255 }
256 else if (name.compare("format") == 0)
257 {
258 if (value.compare("binary") == 0)
259 reg_info.format = eFormatBinary;
260 else if (value.compare("decimal") == 0)
261 reg_info.format = eFormatDecimal;
262 else if (value.compare("hex") == 0)
263 reg_info.format = eFormatHex;
264 else if (value.compare("float") == 0)
265 reg_info.format = eFormatFloat;
266 else if (value.compare("vector-sint8") == 0)
267 reg_info.format = eFormatVectorOfSInt8;
268 else if (value.compare("vector-uint8") == 0)
269 reg_info.format = eFormatVectorOfUInt8;
270 else if (value.compare("vector-sint16") == 0)
271 reg_info.format = eFormatVectorOfSInt16;
272 else if (value.compare("vector-uint16") == 0)
273 reg_info.format = eFormatVectorOfUInt16;
274 else if (value.compare("vector-sint32") == 0)
275 reg_info.format = eFormatVectorOfSInt32;
276 else if (value.compare("vector-uint32") == 0)
277 reg_info.format = eFormatVectorOfUInt32;
278 else if (value.compare("vector-float32") == 0)
279 reg_info.format = eFormatVectorOfFloat32;
280 else if (value.compare("vector-uint128") == 0)
281 reg_info.format = eFormatVectorOfUInt128;
282 }
283 else if (name.compare("set") == 0)
284 {
285 set_name.SetCString(value.c_str());
286 }
287 else if (name.compare("gcc") == 0)
288 {
289 reg_info.kinds[eRegisterKindGCC] = Args::StringToUInt32(value.c_str(), LLDB_INVALID_REGNUM, 0);
290 }
291 else if (name.compare("dwarf") == 0)
292 {
293 reg_info.kinds[eRegisterKindDWARF] = Args::StringToUInt32(value.c_str(), LLDB_INVALID_REGNUM, 0);
294 }
295 else if (name.compare("generic") == 0)
296 {
297 if (value.compare("pc") == 0)
298 reg_info.kinds[eRegisterKindGeneric] = LLDB_REGNUM_GENERIC_PC;
299 else if (value.compare("sp") == 0)
300 reg_info.kinds[eRegisterKindGeneric] = LLDB_REGNUM_GENERIC_SP;
301 else if (value.compare("fp") == 0)
302 reg_info.kinds[eRegisterKindGeneric] = LLDB_REGNUM_GENERIC_FP;
303 else if (value.compare("ra") == 0)
304 reg_info.kinds[eRegisterKindGeneric] = LLDB_REGNUM_GENERIC_RA;
305 else if (value.compare("flags") == 0)
306 reg_info.kinds[eRegisterKindGeneric] = LLDB_REGNUM_GENERIC_FLAGS;
307 }
308 }
309
Jason Molenda53d96862010-06-11 23:44:18 +0000310 reg_info.byte_offset = reg_offset;
Chris Lattner24943d22010-06-08 16:52:24 +0000311 assert (reg_info.byte_size != 0);
312 reg_offset += reg_info.byte_size;
313 m_register_info.AddRegister(reg_info, reg_name, alt_name, set_name);
314 }
315 }
316 else
317 {
318 packet_type = StringExtractorGDBRemote::eError;
319 }
320 }
321
322 if (reg_num == 0)
323 {
324 // We didn't get anything. See if we are debugging ARM and fill with
325 // a hard coded register set until we can get an updated debugserver
326 // down on the devices.
327 ArchSpec arm_arch ("arm");
328 if (GetTarget().GetArchitecture() == arm_arch)
329 m_register_info.HardcodeARMRegisters();
330 }
331 m_register_info.Finalize ();
332}
333
334Error
335ProcessGDBRemote::WillLaunch (Module* module)
336{
337 return WillLaunchOrAttach ();
338}
339
340Error
Greg Clayton20d338f2010-11-18 05:57:03 +0000341ProcessGDBRemote::WillAttachToProcessWithID (lldb::pid_t pid)
Chris Lattner24943d22010-06-08 16:52:24 +0000342{
343 return WillLaunchOrAttach ();
344}
345
346Error
Greg Clayton20d338f2010-11-18 05:57:03 +0000347ProcessGDBRemote::WillAttachToProcessWithName (const char *process_name, bool wait_for_launch)
Chris Lattner24943d22010-06-08 16:52:24 +0000348{
349 return WillLaunchOrAttach ();
350}
351
352Error
353ProcessGDBRemote::WillLaunchOrAttach ()
354{
355 Error error;
356 // TODO: this is hardcoded for macosx right now. We need this to be more dynamic
357 m_dynamic_loader_ap.reset(DynamicLoader::FindPlugin(this, "dynamic-loader.macosx-dyld"));
358
359 if (m_dynamic_loader_ap.get() == NULL)
360 error.SetErrorString("unable to find the dynamic loader named 'dynamic-loader.macosx-dyld'");
361 m_stdio_communication.Clear ();
362
363 return error;
364}
365
366//----------------------------------------------------------------------
367// Process Control
368//----------------------------------------------------------------------
369Error
370ProcessGDBRemote::DoLaunch
371(
372 Module* module,
373 char const *argv[],
374 char const *envp[],
Greg Clayton452bf612010-08-31 18:35:14 +0000375 uint32_t launch_flags,
Chris Lattner24943d22010-06-08 16:52:24 +0000376 const char *stdin_path,
377 const char *stdout_path,
Greg Claytonde915be2011-01-23 05:56:20 +0000378 const char *stderr_path,
379 const char *working_dir
Chris Lattner24943d22010-06-08 16:52:24 +0000380)
381{
Greg Clayton4b407112010-09-30 21:49:03 +0000382 Error error;
Chris Lattner24943d22010-06-08 16:52:24 +0000383 // ::LogSetBitMask (GDBR_LOG_DEFAULT);
384 // ::LogSetOptions (LLDB_LOG_OPTION_THREADSAFE | LLDB_LOG_OPTION_PREPEND_TIMESTAMP | LLDB_LOG_OPTION_PREPEND_PROC_AND_THREAD);
385 // ::LogSetLogFile ("/dev/stdout");
Chris Lattner24943d22010-06-08 16:52:24 +0000386
387 ObjectFile * object_file = module->GetObjectFile();
388 if (object_file)
389 {
390 ArchSpec inferior_arch(module->GetArchitecture());
391 char host_port[128];
392 snprintf (host_port, sizeof(host_port), "localhost:%u", get_random_port ());
393
Greg Clayton23cf0c72010-11-08 04:29:11 +0000394 const bool launch_process = true;
Chris Lattner24943d22010-06-08 16:52:24 +0000395 bool start_debugserver_with_inferior_args = false;
396 if (start_debugserver_with_inferior_args)
397 {
398 // We want to launch debugserver with the inferior program and its
399 // arguments on the command line. We should only do this if we
400 // the GDB server we are talking to doesn't support the 'A' packet.
401 error = StartDebugserverProcess (host_port,
402 argv,
403 envp,
Greg Claytonde915be2011-01-23 05:56:20 +0000404 stdin_path,
405 stdout_path,
406 stderr_path,
407 working_dir,
Greg Clayton23cf0c72010-11-08 04:29:11 +0000408 launch_process,
Chris Lattner24943d22010-06-08 16:52:24 +0000409 LLDB_INVALID_PROCESS_ID,
410 NULL, false,
Caroline Ticebd666012010-12-03 18:46:09 +0000411 launch_flags,
Chris Lattner24943d22010-06-08 16:52:24 +0000412 inferior_arch);
413 if (error.Fail())
414 return error;
415
416 error = ConnectToDebugserver (host_port);
417 if (error.Success())
418 {
419 SetID (m_gdb_comm.GetCurrentProcessID (m_packet_timeout));
420 }
421 }
422 else
423 {
424 error = StartDebugserverProcess (host_port,
425 NULL,
426 NULL,
Greg Claytonde915be2011-01-23 05:56:20 +0000427 stdin_path,
428 stdout_path,
429 stderr_path,
430 working_dir,
Greg Clayton23cf0c72010-11-08 04:29:11 +0000431 launch_process,
Chris Lattner24943d22010-06-08 16:52:24 +0000432 LLDB_INVALID_PROCESS_ID,
Greg Claytonde915be2011-01-23 05:56:20 +0000433 NULL,
434 false,
Caroline Ticebd666012010-12-03 18:46:09 +0000435 launch_flags,
Chris Lattner24943d22010-06-08 16:52:24 +0000436 inferior_arch);
437 if (error.Fail())
438 return error;
439
440 error = ConnectToDebugserver (host_port);
441 if (error.Success())
442 {
443 // Send the environment and the program + arguments after we connect
444 if (envp)
445 {
446 const char *env_entry;
447 for (int i=0; (env_entry = envp[i]); ++i)
448 {
449 if (m_gdb_comm.SendEnvironmentPacket(env_entry, m_packet_timeout) != 0)
450 break;
451 }
452 }
453
Greg Clayton960d6a42010-08-03 00:35:52 +0000454 // FIXME: convert this to use the new set/show variables when they are available
455#if 0
456 if (::getenv ("LLDB_DEBUG_DEBUGSERVER"))
457 {
458 const uint32_t attach_debugserver_secs = 10;
459 ::printf ("attach to debugserver (pid = %i)\n", m_debugserver_pid);
460 for (uint32_t i=0; i<attach_debugserver_secs; ++i)
461 {
462 printf ("%i\n", attach_debugserver_secs - i);
463 sleep (1);
464 }
465 }
466#endif
467
Chris Lattner24943d22010-06-08 16:52:24 +0000468 const uint32_t arg_timeout_seconds = 10;
469 int arg_packet_err = m_gdb_comm.SendArgumentsPacket (argv, arg_timeout_seconds);
470 if (arg_packet_err == 0)
471 {
472 std::string error_str;
473 if (m_gdb_comm.GetLaunchSuccess (m_packet_timeout, error_str))
474 {
475 SetID (m_gdb_comm.GetCurrentProcessID (m_packet_timeout));
476 }
477 else
478 {
479 error.SetErrorString (error_str.c_str());
480 }
481 }
482 else
483 {
484 error.SetErrorStringWithFormat("'A' packet returned an error: %i.\n", arg_packet_err);
485 }
486
487 SetID (m_gdb_comm.GetCurrentProcessID (m_packet_timeout));
488 }
489 }
490
491 if (GetID() == LLDB_INVALID_PROCESS_ID)
492 {
493 KillDebugserverProcess ();
494 return error;
495 }
496
497 StringExtractorGDBRemote response;
498 if (m_gdb_comm.SendPacketAndWaitForResponse("?", 1, response, m_packet_timeout, false))
499 SetPrivateState (SetThreadStopInfo (response));
500
501 }
502 else
503 {
504 // Set our user ID to an invalid process ID.
505 SetID(LLDB_INVALID_PROCESS_ID);
506 error.SetErrorStringWithFormat("Failed to get object file from '%s' for arch %s.\n", module->GetFileSpec().GetFilename().AsCString(), module->GetArchitecture().AsCString());
507 }
Chris Lattner24943d22010-06-08 16:52:24 +0000508 return error;
Greg Clayton4b407112010-09-30 21:49:03 +0000509
Chris Lattner24943d22010-06-08 16:52:24 +0000510}
511
512
513Error
514ProcessGDBRemote::ConnectToDebugserver (const char *host_port)
515{
516 Error error;
517 // Sleep and wait a bit for debugserver to start to listen...
518 std::auto_ptr<ConnectionFileDescriptor> conn_ap(new ConnectionFileDescriptor());
519 if (conn_ap.get())
520 {
521 std::string connect_url("connect://");
522 connect_url.append (host_port);
523 const uint32_t max_retry_count = 50;
524 uint32_t retry_count = 0;
525 while (!m_gdb_comm.IsConnected())
526 {
527 if (conn_ap->Connect(connect_url.c_str(), &error) == eConnectionStatusSuccess)
528 {
529 m_gdb_comm.SetConnection (conn_ap.release());
530 break;
531 }
532 retry_count++;
533
534 if (retry_count >= max_retry_count)
535 break;
536
537 usleep (100000);
538 }
539 }
540
541 if (!m_gdb_comm.IsConnected())
542 {
543 if (error.Success())
544 error.SetErrorString("not connected to remote gdb server");
545 return error;
546 }
547
548 m_gdb_comm.SetAckMode (true);
549 if (m_gdb_comm.StartReadThread(&error))
550 {
551 // Send an initial ack
Greg Claytona4881d02011-01-22 07:12:45 +0000552 m_gdb_comm.SendAck();
Chris Lattner24943d22010-06-08 16:52:24 +0000553
554 if (m_debugserver_pid != LLDB_INVALID_PROCESS_ID)
Greg Clayton75ccf502010-08-21 02:22:51 +0000555 m_debugserver_thread = Host::StartMonitoringChildProcess (MonitorDebugserverProcess,
556 this,
557 m_debugserver_pid,
558 false);
559
Chris Lattner24943d22010-06-08 16:52:24 +0000560 StringExtractorGDBRemote response;
561 if (m_gdb_comm.SendPacketAndWaitForResponse("QStartNoAckMode", response, 1, false))
562 {
563 if (response.IsOKPacket())
564 m_gdb_comm.SetAckMode (false);
565 }
Greg Claytonc71899e2011-01-18 19:36:39 +0000566
567 if (m_gdb_comm.SendPacketAndWaitForResponse("QThreadSuffixSupported", response, 1, false))
568 {
569 if (response.IsOKPacket())
570 m_gdb_comm.SetThreadSuffixSupported (true);
571 }
572
Chris Lattner24943d22010-06-08 16:52:24 +0000573 }
574 return error;
575}
576
577void
578ProcessGDBRemote::DidLaunchOrAttach ()
579{
580 ProcessGDBRemoteLog::LogIf (GDBR_LOG_PROCESS, "ProcessGDBRemote::DidLaunch()");
581 if (GetID() == LLDB_INVALID_PROCESS_ID)
582 {
583 m_dynamic_loader_ap.reset();
584 }
585 else
586 {
587 m_dispatch_queue_offsets_addr = LLDB_INVALID_ADDRESS;
588
Greg Clayton20d338f2010-11-18 05:57:03 +0000589 BuildDynamicRegisterInfo ();
590
591 m_byte_order = m_gdb_comm.GetByteOrder();
592
Chris Lattner24943d22010-06-08 16:52:24 +0000593 StreamString strm;
594
595 ArchSpec inferior_arch;
596 // See if the GDB server supports the qHostInfo information
597 const char *vendor = m_gdb_comm.GetVendorString().AsCString();
598 const char *os_type = m_gdb_comm.GetOSString().AsCString();
Greg Clayton20d338f2010-11-18 05:57:03 +0000599 ArchSpec arch_spec (GetTarget().GetArchitecture());
Chris Lattner24943d22010-06-08 16:52:24 +0000600
Jim Ingham7508e732010-08-09 23:31:02 +0000601 if (arch_spec.IsValid() && arch_spec == ArchSpec ("arm"))
Chris Lattner24943d22010-06-08 16:52:24 +0000602 {
603 // For ARM we can't trust the arch of the process as it could
604 // have an armv6 object file, but be running on armv7 kernel.
605 inferior_arch = m_gdb_comm.GetHostArchitecture();
606 }
607
608 if (!inferior_arch.IsValid())
Jim Ingham7508e732010-08-09 23:31:02 +0000609 inferior_arch = arch_spec;
Chris Lattner24943d22010-06-08 16:52:24 +0000610
611 if (vendor == NULL)
612 vendor = Host::GetVendorString().AsCString("apple");
613
614 if (os_type == NULL)
615 os_type = Host::GetOSString().AsCString("darwin");
616
617 strm.Printf ("%s-%s-%s", inferior_arch.AsCString(), vendor, os_type);
618
619 std::transform (strm.GetString().begin(),
620 strm.GetString().end(),
621 strm.GetString().begin(),
622 ::tolower);
623
624 m_target_triple.SetCString(strm.GetString().c_str());
625 }
626}
627
628void
629ProcessGDBRemote::DidLaunch ()
630{
631 DidLaunchOrAttach ();
632 if (m_dynamic_loader_ap.get())
633 m_dynamic_loader_ap->DidLaunch();
634}
635
636Error
Greg Clayton54e7afa2010-07-09 20:39:50 +0000637ProcessGDBRemote::DoAttachToProcessWithID (lldb::pid_t attach_pid)
Chris Lattner24943d22010-06-08 16:52:24 +0000638{
639 Error error;
640 // Clear out and clean up from any current state
641 Clear();
Jim Ingham7508e732010-08-09 23:31:02 +0000642 ArchSpec arch_spec = GetTarget().GetArchitecture();
643
Greg Claytone005f2c2010-11-06 01:53:30 +0000644 //LogSP log (ProcessGDBRemoteLog::GetLogIfAllCategoriesSet (GDBR_LOG_PROCESS));
Jim Ingham7508e732010-08-09 23:31:02 +0000645
646
Chris Lattner24943d22010-06-08 16:52:24 +0000647 if (attach_pid != LLDB_INVALID_PROCESS_ID)
648 {
Chris Lattner24943d22010-06-08 16:52:24 +0000649 char host_port[128];
650 snprintf (host_port, sizeof(host_port), "localhost:%u", get_random_port ());
Greg Clayton452bf612010-08-31 18:35:14 +0000651 error = StartDebugserverProcess (host_port, // debugserver_url
652 NULL, // inferior_argv
653 NULL, // inferior_envp
654 NULL, // stdin_path
Greg Claytonde915be2011-01-23 05:56:20 +0000655 NULL, // stdout_path
656 NULL, // stderr_path
657 NULL, // working_dir
Greg Clayton23cf0c72010-11-08 04:29:11 +0000658 false, // launch_process == false (we are attaching)
659 LLDB_INVALID_PROCESS_ID, // Don't send any attach to pid options to debugserver
660 NULL, // Don't send any attach by process name option to debugserver
661 false, // Don't send any attach wait_for_launch flag as an option to debugserver
Caroline Ticebd666012010-12-03 18:46:09 +0000662 0, // launch_flags
Jim Ingham7508e732010-08-09 23:31:02 +0000663 arch_spec);
Chris Lattner24943d22010-06-08 16:52:24 +0000664
665 if (error.Fail())
666 {
667 const char *error_string = error.AsCString();
668 if (error_string == NULL)
669 error_string = "unable to launch " DEBUGSERVER_BASENAME;
670
671 SetExitStatus (-1, error_string);
672 }
673 else
674 {
675 error = ConnectToDebugserver (host_port);
676 if (error.Success())
677 {
678 char packet[64];
679 const int packet_len = ::snprintf (packet, sizeof(packet), "vAttach;%x", attach_pid);
680 StringExtractorGDBRemote response;
681 StateType stop_state = m_gdb_comm.SendContinuePacketAndWaitForResponse (this,
682 packet,
683 packet_len,
684 response);
685 switch (stop_state)
686 {
687 case eStateStopped:
688 case eStateCrashed:
689 case eStateSuspended:
690 SetID (attach_pid);
691 m_last_stop_packet = response;
692 m_last_stop_packet.SetFilePos (0);
693 SetPrivateState (stop_state);
694 break;
695
696 case eStateExited:
697 m_last_stop_packet = response;
698 m_last_stop_packet.SetFilePos (0);
699 response.SetFilePos(1);
700 SetExitStatus(response.GetHexU8(), NULL);
701 break;
702
703 default:
704 SetExitStatus(-1, "unable to attach to process");
705 break;
706 }
707
708 }
709 }
710 }
711
712 lldb::pid_t pid = GetID();
713 if (pid == LLDB_INVALID_PROCESS_ID)
714 {
715 KillDebugserverProcess();
716 }
717 return error;
718}
719
720size_t
721ProcessGDBRemote::AttachInputReaderCallback
722(
723 void *baton,
724 InputReader *reader,
725 lldb::InputReaderAction notification,
726 const char *bytes,
727 size_t bytes_len
728)
729{
730 if (notification == eInputReaderGotToken)
731 {
732 ProcessGDBRemote *gdb_process = (ProcessGDBRemote *)baton;
733 if (gdb_process->m_waiting_for_attach)
734 gdb_process->m_waiting_for_attach = false;
735 reader->SetIsDone(true);
736 return 1;
737 }
738 return 0;
739}
740
741Error
Greg Clayton54e7afa2010-07-09 20:39:50 +0000742ProcessGDBRemote::DoAttachToProcessWithName (const char *process_name, bool wait_for_launch)
Chris Lattner24943d22010-06-08 16:52:24 +0000743{
744 Error error;
745 // Clear out and clean up from any current state
746 Clear();
747 // HACK: require arch be set correctly at the target level until we can
748 // figure out a good way to determine the arch of what we are attaching to
Chris Lattner24943d22010-06-08 16:52:24 +0000749
Greg Claytone005f2c2010-11-06 01:53:30 +0000750 //LogSP log (ProcessGDBRemoteLog::GetLogIfAllCategoriesSet (GDBR_LOG_PROCESS));
Chris Lattner24943d22010-06-08 16:52:24 +0000751 if (process_name && process_name[0])
752 {
Chris Lattner24943d22010-06-08 16:52:24 +0000753 char host_port[128];
Jim Ingham7508e732010-08-09 23:31:02 +0000754 ArchSpec arch_spec = GetTarget().GetArchitecture();
Chris Lattner24943d22010-06-08 16:52:24 +0000755 snprintf (host_port, sizeof(host_port), "localhost:%u", get_random_port ());
Greg Clayton452bf612010-08-31 18:35:14 +0000756 error = StartDebugserverProcess (host_port, // debugserver_url
757 NULL, // inferior_argv
758 NULL, // inferior_envp
759 NULL, // stdin_path
Greg Claytonde915be2011-01-23 05:56:20 +0000760 NULL, // stdout_path
761 NULL, // stderr_path
762 NULL, // working_dir
Greg Clayton23cf0c72010-11-08 04:29:11 +0000763 false, // launch_process == false (we are attaching)
764 LLDB_INVALID_PROCESS_ID, // Don't send any attach to pid options to debugserver
765 NULL, // Don't send any attach by process name option to debugserver
766 false, // Don't send any attach wait_for_launch flag as an option to debugserver
Caroline Ticebd666012010-12-03 18:46:09 +0000767 0, // launch_flags
Jim Ingham7508e732010-08-09 23:31:02 +0000768 arch_spec);
Chris Lattner24943d22010-06-08 16:52:24 +0000769 if (error.Fail())
770 {
771 const char *error_string = error.AsCString();
772 if (error_string == NULL)
773 error_string = "unable to launch " DEBUGSERVER_BASENAME;
774
775 SetExitStatus (-1, error_string);
776 }
777 else
778 {
779 error = ConnectToDebugserver (host_port);
780 if (error.Success())
781 {
782 StreamString packet;
783
Chris Lattner24943d22010-06-08 16:52:24 +0000784 if (wait_for_launch)
Greg Claytonc1d37752010-10-18 01:45:30 +0000785 packet.PutCString("vAttachWait");
786 else
787 packet.PutCString("vAttachName");
Chris Lattner24943d22010-06-08 16:52:24 +0000788 packet.PutChar(';');
789 packet.PutBytesAsRawHex8(process_name, strlen(process_name), eByteOrderHost, eByteOrderHost);
790 StringExtractorGDBRemote response;
791 StateType stop_state = m_gdb_comm.SendContinuePacketAndWaitForResponse (this,
792 packet.GetData(),
793 packet.GetSize(),
794 response);
795 switch (stop_state)
796 {
797 case eStateStopped:
798 case eStateCrashed:
799 case eStateSuspended:
800 SetID (m_gdb_comm.GetCurrentProcessID(m_packet_timeout));
801 m_last_stop_packet = response;
802 m_last_stop_packet.SetFilePos (0);
803 SetPrivateState (stop_state);
804 break;
805
806 case eStateExited:
807 m_last_stop_packet = response;
808 m_last_stop_packet.SetFilePos (0);
809 response.SetFilePos(1);
810 SetExitStatus(response.GetHexU8(), NULL);
811 break;
812
813 default:
814 SetExitStatus(-1, "unable to attach to process");
815 break;
816 }
817 }
818 }
819 }
820
821 lldb::pid_t pid = GetID();
822 if (pid == LLDB_INVALID_PROCESS_ID)
823 {
824 KillDebugserverProcess();
Greg Claytonc1d37752010-10-18 01:45:30 +0000825
826 if (error.Success())
827 error.SetErrorStringWithFormat("unable to attach to process named '%s'", process_name);
Chris Lattner24943d22010-06-08 16:52:24 +0000828 }
Greg Claytonc1d37752010-10-18 01:45:30 +0000829
Chris Lattner24943d22010-06-08 16:52:24 +0000830 return error;
831}
832
833//
834// if (wait_for_launch)
835// {
836// InputReaderSP reader_sp (new InputReader());
837// StreamString instructions;
838// instructions.Printf("Hit any key to cancel waiting for '%s' to launch...", process_name);
839// error = reader_sp->Initialize (AttachInputReaderCallback, // callback
840// this, // baton
841// eInputReaderGranularityByte,
842// NULL, // End token
843// false);
844//
845// StringExtractorGDBRemote response;
846// m_waiting_for_attach = true;
847// FILE *reader_out_fh = reader_sp->GetOutputFileHandle();
848// while (m_waiting_for_attach)
849// {
850// // Wait for one second for the stop reply packet
851// if (m_gdb_comm.WaitForPacket(response, 1))
852// {
853// // Got some sort of packet, see if it is the stop reply packet?
854// char ch = response.GetChar(0);
855// if (ch == 'T')
856// {
857// m_waiting_for_attach = false;
858// }
859// }
860// else
861// {
862// // Put a period character every second
863// fputc('.', reader_out_fh);
864// }
865// }
866// }
867// }
868// return GetID();
869//}
870
871void
872ProcessGDBRemote::DidAttach ()
873{
Chris Lattner24943d22010-06-08 16:52:24 +0000874 if (m_dynamic_loader_ap.get())
875 m_dynamic_loader_ap->DidAttach();
Jim Ingham7508e732010-08-09 23:31:02 +0000876 DidLaunchOrAttach ();
Chris Lattner24943d22010-06-08 16:52:24 +0000877}
878
879Error
880ProcessGDBRemote::WillResume ()
881{
882 m_continue_packet.Clear();
883 // Start the continue packet we will use to run the target. Each thread
884 // will append what it is supposed to be doing to this packet when the
885 // ThreadList::WillResume() is called. If a thread it supposed
886 // to stay stopped, then don't append anything to this string.
887 m_continue_packet.Printf("vCont");
888 return Error();
889}
890
891Error
892ProcessGDBRemote::DoResume ()
893{
Jim Ingham3ae449a2010-11-17 02:32:00 +0000894 Error error;
Chris Lattner24943d22010-06-08 16:52:24 +0000895 ProcessGDBRemoteLog::LogIf (GDBR_LOG_PROCESS, "ProcessGDBRemote::Resume()");
Greg Claytonb749a262010-12-03 06:02:24 +0000896
897 Listener listener ("gdb-remote.resume-packet-sent");
898 if (listener.StartListeningForEvents (&m_gdb_comm, GDBRemoteCommunication::eBroadcastBitRunPacketSent))
899 {
900 EventSP event_sp;
901 TimeValue timeout;
902 timeout = TimeValue::Now();
903 timeout.OffsetWithSeconds (5);
904 m_async_broadcaster.BroadcastEvent (eBroadcastBitAsyncContinue, new EventDataBytes (m_continue_packet.GetData(), m_continue_packet.GetSize()));
905
906 if (listener.WaitForEvent (&timeout, event_sp) == false)
907 error.SetErrorString("Resume timed out.");
908 }
909
Jim Ingham3ae449a2010-11-17 02:32:00 +0000910 return error;
Chris Lattner24943d22010-06-08 16:52:24 +0000911}
912
913size_t
914ProcessGDBRemote::GetSoftwareBreakpointTrapOpcode (BreakpointSite* bp_site)
915{
916 const uint8_t *trap_opcode = NULL;
917 uint32_t trap_opcode_size = 0;
918
919 static const uint8_t g_arm_breakpoint_opcode[] = { 0xFE, 0xDE, 0xFF, 0xE7 };
920 //static const uint8_t g_thumb_breakpooint_opcode[] = { 0xFE, 0xDE };
921 static const uint8_t g_ppc_breakpoint_opcode[] = { 0x7F, 0xC0, 0x00, 0x08 };
922 static const uint8_t g_i386_breakpoint_opcode[] = { 0xCC };
923
Jim Ingham7508e732010-08-09 23:31:02 +0000924 ArchSpec::CPU arch_cpu = GetTarget().GetArchitecture().GetGenericCPUType();
Greg Claytoncf015052010-06-11 03:25:34 +0000925 switch (arch_cpu)
Chris Lattner24943d22010-06-08 16:52:24 +0000926 {
Greg Claytoncf015052010-06-11 03:25:34 +0000927 case ArchSpec::eCPU_i386:
928 case ArchSpec::eCPU_x86_64:
929 trap_opcode = g_i386_breakpoint_opcode;
930 trap_opcode_size = sizeof(g_i386_breakpoint_opcode);
931 break;
932
933 case ArchSpec::eCPU_arm:
934 // TODO: fill this in for ARM. We need to dig up the symbol for
935 // the address in the breakpoint locaiton and figure out if it is
936 // an ARM or Thumb breakpoint.
937 trap_opcode = g_arm_breakpoint_opcode;
938 trap_opcode_size = sizeof(g_arm_breakpoint_opcode);
939 break;
940
941 case ArchSpec::eCPU_ppc:
942 case ArchSpec::eCPU_ppc64:
943 trap_opcode = g_ppc_breakpoint_opcode;
944 trap_opcode_size = sizeof(g_ppc_breakpoint_opcode);
945 break;
Chris Lattner24943d22010-06-08 16:52:24 +0000946
Greg Claytoncf015052010-06-11 03:25:34 +0000947 default:
948 assert(!"Unhandled architecture in ProcessMacOSX::GetSoftwareBreakpointTrapOpcode()");
949 break;
Chris Lattner24943d22010-06-08 16:52:24 +0000950 }
951
952 if (trap_opcode && trap_opcode_size)
953 {
954 if (bp_site->SetTrapOpcode(trap_opcode, trap_opcode_size))
955 return trap_opcode_size;
956 }
957 return 0;
958}
959
960uint32_t
961ProcessGDBRemote::UpdateThreadListIfNeeded ()
962{
963 // locker will keep a mutex locked until it goes out of scope
Greg Claytone005f2c2010-11-06 01:53:30 +0000964 LogSP log (ProcessGDBRemoteLog::GetLogIfAllCategoriesSet (GDBR_LOG_THREAD));
Greg Claytonf3d0b0c2010-10-27 03:32:59 +0000965 if (log && log->GetMask().Test(GDBR_LOG_VERBOSE))
Chris Lattner24943d22010-06-08 16:52:24 +0000966 log->Printf ("ProcessGDBRemote::%s (pid = %i)", __FUNCTION__, GetID());
967
Greg Clayton5205f0b2010-09-03 17:10:42 +0000968 Mutex::Locker locker (m_thread_list.GetMutex ());
Chris Lattner24943d22010-06-08 16:52:24 +0000969 const uint32_t stop_id = GetStopID();
970 if (m_thread_list.GetSize(false) == 0 || stop_id != m_thread_list.GetStopID())
971 {
972 // Update the thread list's stop id immediately so we don't recurse into this function.
973 ThreadList curr_thread_list (this);
974 curr_thread_list.SetStopID(stop_id);
975
976 Error err;
977 StringExtractorGDBRemote response;
978 for (m_gdb_comm.SendPacketAndWaitForResponse("qfThreadInfo", response, 1, false);
979 response.IsNormalPacket();
980 m_gdb_comm.SendPacketAndWaitForResponse("qsThreadInfo", response, 1, false))
981 {
982 char ch = response.GetChar();
983 if (ch == 'l')
984 break;
985 if (ch == 'm')
986 {
987 do
988 {
989 tid_t tid = response.GetHexMaxU32(false, LLDB_INVALID_THREAD_ID);
990
991 if (tid != LLDB_INVALID_THREAD_ID)
992 {
993 ThreadSP thread_sp (GetThreadList().FindThreadByID (tid, false));
Greg Claytona875b642011-01-09 21:07:35 +0000994 if (!thread_sp)
Chris Lattner24943d22010-06-08 16:52:24 +0000995 thread_sp.reset (new ThreadGDBRemote (*this, tid));
996 curr_thread_list.AddThread(thread_sp);
997 }
998
999 ch = response.GetChar();
1000 } while (ch == ',');
1001 }
1002 }
1003
1004 m_thread_list = curr_thread_list;
1005
1006 SetThreadStopInfo (m_last_stop_packet);
1007 }
1008 return GetThreadList().GetSize(false);
1009}
1010
1011
1012StateType
1013ProcessGDBRemote::SetThreadStopInfo (StringExtractor& stop_packet)
1014{
1015 const char stop_type = stop_packet.GetChar();
1016 switch (stop_type)
1017 {
1018 case 'T':
1019 case 'S':
1020 {
1021 // Stop with signal and thread info
1022 const uint8_t signo = stop_packet.GetHexU8();
1023 std::string name;
1024 std::string value;
1025 std::string thread_name;
1026 uint32_t exc_type = 0;
Greg Clayton7661a982010-07-23 16:45:51 +00001027 std::vector<addr_t> exc_data;
Chris Lattner24943d22010-06-08 16:52:24 +00001028 uint32_t tid = LLDB_INVALID_THREAD_ID;
1029 addr_t thread_dispatch_qaddr = LLDB_INVALID_ADDRESS;
1030 uint32_t exc_data_count = 0;
Greg Claytona875b642011-01-09 21:07:35 +00001031 ThreadSP thread_sp;
1032
Chris Lattner24943d22010-06-08 16:52:24 +00001033 while (stop_packet.GetNameColonValue(name, value))
1034 {
1035 if (name.compare("metype") == 0)
1036 {
1037 // exception type in big endian hex
1038 exc_type = Args::StringToUInt32 (value.c_str(), 0, 16);
1039 }
1040 else if (name.compare("mecount") == 0)
1041 {
1042 // exception count in big endian hex
1043 exc_data_count = Args::StringToUInt32 (value.c_str(), 0, 16);
1044 }
1045 else if (name.compare("medata") == 0)
1046 {
1047 // exception data in big endian hex
1048 exc_data.push_back(Args::StringToUInt64 (value.c_str(), 0, 16));
1049 }
1050 else if (name.compare("thread") == 0)
1051 {
1052 // thread in big endian hex
1053 tid = Args::StringToUInt32 (value.c_str(), 0, 16);
Greg Claytona875b642011-01-09 21:07:35 +00001054 thread_sp = m_thread_list.FindThreadByID(tid, false);
Chris Lattner24943d22010-06-08 16:52:24 +00001055 }
Greg Clayton4862fa22011-01-08 03:17:57 +00001056 else if (name.compare("hexname") == 0)
1057 {
1058 StringExtractor name_extractor;
1059 // Swap "value" over into "name_extractor"
1060 name_extractor.GetStringRef().swap(value);
1061 // Now convert the HEX bytes into a string value
1062 name_extractor.GetHexByteString (value);
1063 thread_name.swap (value);
1064 }
Chris Lattner24943d22010-06-08 16:52:24 +00001065 else if (name.compare("name") == 0)
1066 {
1067 thread_name.swap (value);
1068 }
Greg Clayton0a7f75f2010-09-09 06:32:46 +00001069 else if (name.compare("qaddr") == 0)
Chris Lattner24943d22010-06-08 16:52:24 +00001070 {
1071 thread_dispatch_qaddr = Args::StringToUInt64 (value.c_str(), 0, 16);
1072 }
Greg Claytona875b642011-01-09 21:07:35 +00001073 else if (name.size() == 2 && ::isxdigit(name[0]) && ::isxdigit(name[1]))
1074 {
1075 // We have a register number that contains an expedited
1076 // register value. Lets supply this register to our thread
1077 // so it won't have to go and read it.
1078 if (thread_sp)
1079 {
1080 uint32_t reg = Args::StringToUInt32 (name.c_str(), UINT32_MAX, 16);
1081
1082 if (reg != UINT32_MAX)
1083 {
1084 StringExtractor reg_value_extractor;
1085 // Swap "value" over into "reg_value_extractor"
1086 reg_value_extractor.GetStringRef().swap(value);
1087 static_cast<ThreadGDBRemote *> (thread_sp.get())->PrivateSetRegisterValue (reg, reg_value_extractor);
1088 }
1089 }
1090 }
Chris Lattner24943d22010-06-08 16:52:24 +00001091 }
Chris Lattner24943d22010-06-08 16:52:24 +00001092
1093 if (thread_sp)
1094 {
1095 ThreadGDBRemote *gdb_thread = static_cast<ThreadGDBRemote *> (thread_sp.get());
1096
1097 gdb_thread->SetThreadDispatchQAddr (thread_dispatch_qaddr);
1098 gdb_thread->SetName (thread_name.empty() ? thread_name.c_str() : NULL);
Chris Lattner24943d22010-06-08 16:52:24 +00001099 if (exc_type != 0)
1100 {
Greg Clayton643ee732010-08-04 01:40:35 +00001101 const size_t exc_data_count = exc_data.size();
1102
1103 gdb_thread->SetStopInfo (StopInfoMachException::CreateStopReasonWithMachException (*thread_sp,
1104 exc_type,
1105 exc_data_count,
1106 exc_data_count >= 1 ? exc_data[0] : 0,
1107 exc_data_count >= 2 ? exc_data[1] : 0));
Chris Lattner24943d22010-06-08 16:52:24 +00001108 }
1109 else if (signo)
1110 {
Greg Clayton643ee732010-08-04 01:40:35 +00001111 gdb_thread->SetStopInfo (StopInfo::CreateStopReasonWithSignal (*thread_sp, signo));
Chris Lattner24943d22010-06-08 16:52:24 +00001112 }
1113 else
1114 {
Greg Clayton643ee732010-08-04 01:40:35 +00001115 StopInfoSP invalid_stop_info_sp;
1116 gdb_thread->SetStopInfo (invalid_stop_info_sp);
Chris Lattner24943d22010-06-08 16:52:24 +00001117 }
1118 }
1119 return eStateStopped;
1120 }
1121 break;
1122
1123 case 'W':
1124 // process exited
1125 return eStateExited;
1126
1127 default:
1128 break;
1129 }
1130 return eStateInvalid;
1131}
1132
1133void
1134ProcessGDBRemote::RefreshStateAfterStop ()
1135{
Jim Ingham7508e732010-08-09 23:31:02 +00001136 // FIXME - add a variable to tell that we're in the middle of attaching if we
1137 // need to know that.
Chris Lattner24943d22010-06-08 16:52:24 +00001138 // We must be attaching if we don't already have a valid architecture
Jim Ingham7508e732010-08-09 23:31:02 +00001139// if (!GetTarget().GetArchitecture().IsValid())
1140// {
1141// Module *exe_module = GetTarget().GetExecutableModule().get();
1142// if (exe_module)
1143// m_arch_spec = exe_module->GetArchitecture();
1144// }
1145
Chris Lattner24943d22010-06-08 16:52:24 +00001146 // Let all threads recover from stopping and do any clean up based
1147 // on the previous thread state (if any).
1148 m_thread_list.RefreshStateAfterStop();
1149
1150 // Discover new threads:
1151 UpdateThreadListIfNeeded ();
1152}
1153
1154Error
Jim Ingham3ae449a2010-11-17 02:32:00 +00001155ProcessGDBRemote::DoHalt (bool &caused_stop)
Chris Lattner24943d22010-06-08 16:52:24 +00001156{
1157 Error error;
Jim Ingham3ae449a2010-11-17 02:32:00 +00001158
Greg Claytona4881d02011-01-22 07:12:45 +00001159 bool timed_out = false;
1160 Mutex::Locker locker;
1161
1162 if (!m_gdb_comm.SendInterrupt (locker, 2, caused_stop, timed_out))
Greg Clayton20d338f2010-11-18 05:57:03 +00001163 {
Greg Claytona4881d02011-01-22 07:12:45 +00001164 if (timed_out)
1165 error.SetErrorString("timed out sending interrupt packet");
1166 else
1167 error.SetErrorString("unknown error sending interrupt packet");
Greg Clayton20d338f2010-11-18 05:57:03 +00001168 }
1169
Chris Lattner24943d22010-06-08 16:52:24 +00001170 return error;
1171}
1172
1173Error
Greg Clayton72e1c782011-01-22 23:43:18 +00001174ProcessGDBRemote::InterruptIfRunning
1175(
1176 bool discard_thread_plans,
1177 bool catch_stop_event,
Greg Clayton72e1c782011-01-22 23:43:18 +00001178 EventSP &stop_event_sp
1179)
Chris Lattner24943d22010-06-08 16:52:24 +00001180{
1181 Error error;
Chris Lattner24943d22010-06-08 16:52:24 +00001182
Greg Clayton2860ba92011-01-23 19:58:49 +00001183 LogSP log (ProcessGDBRemoteLog::GetLogIfAllCategoriesSet(GDBR_LOG_PROCESS));
1184
Greg Clayton68ca8232011-01-25 02:58:48 +00001185 bool paused_private_state_thread = false;
Greg Clayton2860ba92011-01-23 19:58:49 +00001186 const bool is_running = m_gdb_comm.IsRunning();
1187 if (log)
Greg Clayton68ca8232011-01-25 02:58:48 +00001188 log->Printf ("ProcessGDBRemote::InterruptIfRunning(discard_thread_plans=%i, catch_stop_event=%i) is_running=%i",
Greg Clayton2860ba92011-01-23 19:58:49 +00001189 discard_thread_plans,
Greg Clayton68ca8232011-01-25 02:58:48 +00001190 catch_stop_event,
Greg Clayton2860ba92011-01-23 19:58:49 +00001191 is_running);
1192
Greg Clayton2860ba92011-01-23 19:58:49 +00001193 if (discard_thread_plans)
1194 {
1195 if (log)
1196 log->Printf ("ProcessGDBRemote::InterruptIfRunning() discarding all thread plans");
1197 m_thread_list.DiscardThreadPlans();
1198 }
1199 if (is_running)
Greg Clayton4fb400f2010-09-27 21:07:38 +00001200 {
Greg Clayton68ca8232011-01-25 02:58:48 +00001201 if (catch_stop_event)
1202 {
1203 if (log)
1204 log->Printf ("ProcessGDBRemote::InterruptIfRunning() pausing private state thread");
1205 PausePrivateStateThread();
1206 paused_private_state_thread = true;
1207 }
1208
Greg Clayton4fb400f2010-09-27 21:07:38 +00001209 bool timed_out = false;
Greg Claytona4881d02011-01-22 07:12:45 +00001210 bool sent_interrupt = false;
Greg Clayton4fb400f2010-09-27 21:07:38 +00001211 Mutex::Locker locker;
Greg Clayton72e1c782011-01-22 23:43:18 +00001212
Greg Clayton72e1c782011-01-22 23:43:18 +00001213 //m_debugserver_pid = LLDB_INVALID_PROCESS_ID;
1214 if (!m_gdb_comm.SendInterrupt (locker, 1, sent_interrupt, timed_out))
Greg Clayton4fb400f2010-09-27 21:07:38 +00001215 {
1216 if (timed_out)
1217 error.SetErrorString("timed out sending interrupt packet");
1218 else
1219 error.SetErrorString("unknown error sending interrupt packet");
Greg Clayton68ca8232011-01-25 02:58:48 +00001220 if (paused_private_state_thread)
Greg Clayton72e1c782011-01-22 23:43:18 +00001221 ResumePrivateStateThread();
1222 return error;
Greg Clayton4fb400f2010-09-27 21:07:38 +00001223 }
Greg Clayton72e1c782011-01-22 23:43:18 +00001224
Greg Clayton72e1c782011-01-22 23:43:18 +00001225 if (catch_stop_event)
1226 {
Greg Clayton68ca8232011-01-25 02:58:48 +00001227 // LISTEN HERE
Greg Clayton72e1c782011-01-22 23:43:18 +00001228 TimeValue timeout_time;
1229 timeout_time = TimeValue::Now();
Greg Clayton68ca8232011-01-25 02:58:48 +00001230 timeout_time.OffsetWithSeconds(5);
1231 StateType state = WaitForStateChangedEventsPrivate (&timeout_time, stop_event_sp);
Greg Clayton2860ba92011-01-23 19:58:49 +00001232
1233 const bool timed_out = state == eStateInvalid;
1234 if (log)
1235 log->Printf ("ProcessGDBRemote::InterruptIfRunning() catch stop event: state = %s, timed-out=%i", StateAsCString(state), timed_out);
Greg Clayton3b2c41c2010-10-18 04:14:23 +00001236
Greg Clayton2860ba92011-01-23 19:58:49 +00001237 if (timed_out)
Greg Clayton72e1c782011-01-22 23:43:18 +00001238 error.SetErrorString("unable to verify target stopped");
1239 }
1240
Greg Clayton68ca8232011-01-25 02:58:48 +00001241 if (paused_private_state_thread)
Greg Clayton2860ba92011-01-23 19:58:49 +00001242 {
1243 if (log)
1244 log->Printf ("ProcessGDBRemote::InterruptIfRunning() resuming private state thread");
Greg Clayton72e1c782011-01-22 23:43:18 +00001245 ResumePrivateStateThread();
Greg Clayton2860ba92011-01-23 19:58:49 +00001246 }
Greg Clayton4fb400f2010-09-27 21:07:38 +00001247 }
Chris Lattner24943d22010-06-08 16:52:24 +00001248 return error;
1249}
1250
Greg Clayton4fb400f2010-09-27 21:07:38 +00001251Error
Greg Clayton72e1c782011-01-22 23:43:18 +00001252ProcessGDBRemote::WillDetach ()
1253{
Greg Clayton2860ba92011-01-23 19:58:49 +00001254 LogSP log (ProcessGDBRemoteLog::GetLogIfAllCategoriesSet(GDBR_LOG_PROCESS));
1255 if (log)
1256 log->Printf ("ProcessGDBRemote::WillDetach()");
1257
Greg Clayton72e1c782011-01-22 23:43:18 +00001258 bool discard_thread_plans = true;
1259 bool catch_stop_event = true;
Greg Clayton72e1c782011-01-22 23:43:18 +00001260 EventSP event_sp;
Greg Clayton68ca8232011-01-25 02:58:48 +00001261 return InterruptIfRunning (discard_thread_plans, catch_stop_event, event_sp);
Greg Clayton72e1c782011-01-22 23:43:18 +00001262}
1263
1264Error
Greg Clayton4fb400f2010-09-27 21:07:38 +00001265ProcessGDBRemote::DoDetach()
1266{
1267 Error error;
Greg Claytone005f2c2010-11-06 01:53:30 +00001268 LogSP log (ProcessGDBRemoteLog::GetLogIfAllCategoriesSet(GDBR_LOG_PROCESS));
Greg Clayton4fb400f2010-09-27 21:07:38 +00001269 if (log)
1270 log->Printf ("ProcessGDBRemote::DoDetach()");
1271
1272 DisableAllBreakpointSites ();
1273
Greg Clayton3b2c41c2010-10-18 04:14:23 +00001274 m_thread_list.DiscardThreadPlans();
Greg Clayton4fb400f2010-09-27 21:07:38 +00001275
Greg Clayton3b2c41c2010-10-18 04:14:23 +00001276 size_t response_size = m_gdb_comm.SendPacket ("D", 1);
1277 if (log)
Greg Clayton4fb400f2010-09-27 21:07:38 +00001278 {
Greg Clayton3b2c41c2010-10-18 04:14:23 +00001279 if (response_size)
1280 log->PutCString ("ProcessGDBRemote::DoDetach() detach packet sent successfully");
1281 else
1282 log->PutCString ("ProcessGDBRemote::DoDetach() detach packet send failed");
Greg Clayton4fb400f2010-09-27 21:07:38 +00001283 }
Greg Clayton3b2c41c2010-10-18 04:14:23 +00001284 // Sleep for one second to let the process get all detached...
Greg Clayton4fb400f2010-09-27 21:07:38 +00001285 StopAsyncThread ();
Greg Clayton3b2c41c2010-10-18 04:14:23 +00001286
Greg Clayton4fb400f2010-09-27 21:07:38 +00001287 m_gdb_comm.StopReadThread();
Greg Clayton4fb400f2010-09-27 21:07:38 +00001288 m_gdb_comm.Disconnect(); // Disconnect from the debug server.
Greg Clayton3b2c41c2010-10-18 04:14:23 +00001289
1290 SetPrivateState (eStateDetached);
1291 ResumePrivateStateThread();
1292
1293 //KillDebugserverProcess ();
Greg Clayton4fb400f2010-09-27 21:07:38 +00001294 return error;
1295}
Chris Lattner24943d22010-06-08 16:52:24 +00001296
1297Error
1298ProcessGDBRemote::DoDestroy ()
1299{
1300 Error error;
Greg Claytone005f2c2010-11-06 01:53:30 +00001301 LogSP log (ProcessGDBRemoteLog::GetLogIfAllCategoriesSet(GDBR_LOG_PROCESS));
Chris Lattner24943d22010-06-08 16:52:24 +00001302 if (log)
1303 log->Printf ("ProcessGDBRemote::DoDestroy()");
1304
1305 // Interrupt if our inferior is running...
Greg Claytona4881d02011-01-22 07:12:45 +00001306 if (m_gdb_comm.IsConnected())
Chris Lattner24943d22010-06-08 16:52:24 +00001307 {
Greg Clayton68ca8232011-01-25 02:58:48 +00001308 StringExtractorGDBRemote response;
1309 bool send_async = true;
Greg Clayton27a8dd72011-01-25 04:57:42 +00001310 if (m_gdb_comm.SendPacketAndWaitForResponse("k", 1, response, 3, send_async))
1311 {
1312 char packet_cmd = response.GetChar(0);
1313
1314 if (packet_cmd == 'W' || packet_cmd == 'X')
1315 {
1316 m_last_stop_packet = response;
1317 SetExitStatus(response.GetHexU8(), NULL);
1318 }
1319 }
1320 else
Greg Clayton72e1c782011-01-22 23:43:18 +00001321 {
Greg Clayton68ca8232011-01-25 02:58:48 +00001322 error.SetErrorString("kill packet failed");
Greg Clayton72e1c782011-01-22 23:43:18 +00001323 }
1324 }
Chris Lattner24943d22010-06-08 16:52:24 +00001325 StopAsyncThread ();
1326 m_gdb_comm.StopReadThread();
1327 KillDebugserverProcess ();
Johnny Chenc5b15db2010-09-03 22:35:47 +00001328 m_gdb_comm.Disconnect(); // Disconnect from the debug server.
Chris Lattner24943d22010-06-08 16:52:24 +00001329 return error;
1330}
1331
Chris Lattner24943d22010-06-08 16:52:24 +00001332//------------------------------------------------------------------
1333// Process Queries
1334//------------------------------------------------------------------
1335
1336bool
1337ProcessGDBRemote::IsAlive ()
1338{
Greg Clayton58e844b2010-12-08 05:08:21 +00001339 return m_gdb_comm.IsConnected() && m_private_state.GetValue() != eStateExited;
Chris Lattner24943d22010-06-08 16:52:24 +00001340}
1341
1342addr_t
1343ProcessGDBRemote::GetImageInfoAddress()
1344{
1345 if (!m_gdb_comm.IsRunning())
1346 {
1347 StringExtractorGDBRemote response;
1348 if (m_gdb_comm.SendPacketAndWaitForResponse("qShlibInfoAddr", ::strlen ("qShlibInfoAddr"), response, 2, false))
1349 {
1350 if (response.IsNormalPacket())
1351 return response.GetHexMaxU64(false, LLDB_INVALID_ADDRESS);
1352 }
1353 }
1354 return LLDB_INVALID_ADDRESS;
1355}
1356
1357DynamicLoader *
1358ProcessGDBRemote::GetDynamicLoader()
1359{
1360 return m_dynamic_loader_ap.get();
1361}
1362
1363//------------------------------------------------------------------
1364// Process Memory
1365//------------------------------------------------------------------
1366size_t
1367ProcessGDBRemote::DoReadMemory (addr_t addr, void *buf, size_t size, Error &error)
1368{
1369 if (size > m_max_memory_size)
1370 {
1371 // Keep memory read sizes down to a sane limit. This function will be
1372 // called multiple times in order to complete the task by
1373 // lldb_private::Process so it is ok to do this.
1374 size = m_max_memory_size;
1375 }
1376
1377 char packet[64];
1378 const int packet_len = ::snprintf (packet, sizeof(packet), "m%llx,%zx", (uint64_t)addr, size);
1379 assert (packet_len + 1 < sizeof(packet));
1380 StringExtractorGDBRemote response;
1381 if (m_gdb_comm.SendPacketAndWaitForResponse(packet, packet_len, response, 2, true))
1382 {
1383 if (response.IsNormalPacket())
1384 {
1385 error.Clear();
1386 return response.GetHexBytes(buf, size, '\xdd');
1387 }
1388 else if (response.IsErrorPacket())
1389 error.SetErrorStringWithFormat("gdb remote returned an error: %s", response.GetStringRef().c_str());
1390 else if (response.IsUnsupportedPacket())
1391 error.SetErrorStringWithFormat("'%s' packet unsupported", packet);
1392 else
1393 error.SetErrorStringWithFormat("unexpected response to '%s': '%s'", packet, response.GetStringRef().c_str());
1394 }
1395 else
1396 {
1397 error.SetErrorStringWithFormat("failed to sent packet: '%s'", packet);
1398 }
1399 return 0;
1400}
1401
1402size_t
1403ProcessGDBRemote::DoWriteMemory (addr_t addr, const void *buf, size_t size, Error &error)
1404{
1405 StreamString packet;
1406 packet.Printf("M%llx,%zx:", addr, size);
1407 packet.PutBytesAsRawHex8(buf, size, eByteOrderHost, eByteOrderHost);
1408 StringExtractorGDBRemote response;
1409 if (m_gdb_comm.SendPacketAndWaitForResponse(packet.GetData(), packet.GetSize(), response, 2, true))
1410 {
1411 if (response.IsOKPacket())
1412 {
1413 error.Clear();
1414 return size;
1415 }
1416 else if (response.IsErrorPacket())
1417 error.SetErrorStringWithFormat("gdb remote returned an error: %s", response.GetStringRef().c_str());
1418 else if (response.IsUnsupportedPacket())
1419 error.SetErrorStringWithFormat("'%s' packet unsupported", packet.GetString().c_str());
1420 else
1421 error.SetErrorStringWithFormat("unexpected response to '%s': '%s'", packet.GetString().c_str(), response.GetStringRef().c_str());
1422 }
1423 else
1424 {
1425 error.SetErrorStringWithFormat("failed to sent packet: '%s'", packet.GetString().c_str());
1426 }
1427 return 0;
1428}
1429
1430lldb::addr_t
1431ProcessGDBRemote::DoAllocateMemory (size_t size, uint32_t permissions, Error &error)
1432{
1433 addr_t allocated_addr = m_gdb_comm.AllocateMemory (size, permissions, m_packet_timeout);
1434 if (allocated_addr == LLDB_INVALID_ADDRESS)
1435 error.SetErrorStringWithFormat("unable to allocate %zu bytes of memory with permissions %u", size, permissions);
1436 else
1437 error.Clear();
1438 return allocated_addr;
1439}
1440
1441Error
1442ProcessGDBRemote::DoDeallocateMemory (lldb::addr_t addr)
1443{
1444 Error error;
1445 if (!m_gdb_comm.DeallocateMemory (addr, m_packet_timeout))
1446 error.SetErrorStringWithFormat("unable to deallocate memory at 0x%llx", addr);
1447 return error;
1448}
1449
1450
1451//------------------------------------------------------------------
1452// Process STDIO
1453//------------------------------------------------------------------
1454
1455size_t
1456ProcessGDBRemote::GetSTDOUT (char *buf, size_t buf_size, Error &error)
1457{
1458 Mutex::Locker locker(m_stdio_mutex);
1459 size_t bytes_available = m_stdout_data.size();
1460 if (bytes_available > 0)
1461 {
1462 ProcessGDBRemoteLog::LogIf (GDBR_LOG_PROCESS, "ProcessGDBRemote::%s (&%p[%u]) ...", __FUNCTION__, buf, buf_size);
1463 if (bytes_available > buf_size)
1464 {
Greg Clayton53d68e72010-07-20 22:52:08 +00001465 memcpy(buf, m_stdout_data.c_str(), buf_size);
Chris Lattner24943d22010-06-08 16:52:24 +00001466 m_stdout_data.erase(0, buf_size);
1467 bytes_available = buf_size;
1468 }
1469 else
1470 {
Greg Clayton53d68e72010-07-20 22:52:08 +00001471 memcpy(buf, m_stdout_data.c_str(), bytes_available);
Chris Lattner24943d22010-06-08 16:52:24 +00001472 m_stdout_data.clear();
1473
1474 //ResetEventBits(eBroadcastBitSTDOUT);
1475 }
1476 }
1477 return bytes_available;
1478}
1479
1480size_t
1481ProcessGDBRemote::GetSTDERR (char *buf, size_t buf_size, Error &error)
1482{
1483 // Can we get STDERR through the remote protocol?
1484 return 0;
1485}
1486
1487size_t
1488ProcessGDBRemote::PutSTDIN (const char *src, size_t src_len, Error &error)
1489{
1490 if (m_stdio_communication.IsConnected())
1491 {
1492 ConnectionStatus status;
1493 m_stdio_communication.Write(src, src_len, status, NULL);
1494 }
1495 return 0;
1496}
1497
1498Error
1499ProcessGDBRemote::EnableBreakpoint (BreakpointSite *bp_site)
1500{
1501 Error error;
1502 assert (bp_site != NULL);
1503
Greg Claytone005f2c2010-11-06 01:53:30 +00001504 LogSP log (ProcessGDBRemoteLog::GetLogIfAllCategoriesSet(GDBR_LOG_BREAKPOINTS));
Chris Lattner24943d22010-06-08 16:52:24 +00001505 user_id_t site_id = bp_site->GetID();
1506 const addr_t addr = bp_site->GetLoadAddress();
1507 if (log)
1508 log->Printf ("ProcessGDBRemote::EnableBreakpoint (size_id = %d) address = 0x%llx", site_id, (uint64_t)addr);
1509
1510 if (bp_site->IsEnabled())
1511 {
1512 if (log)
1513 log->Printf ("ProcessGDBRemote::EnableBreakpoint (size_id = %d) address = 0x%llx -- SUCCESS (already enabled)", site_id, (uint64_t)addr);
1514 return error;
1515 }
1516 else
1517 {
1518 const size_t bp_op_size = GetSoftwareBreakpointTrapOpcode (bp_site);
1519
1520 if (bp_site->HardwarePreferred())
1521 {
1522 // Try and set hardware breakpoint, and if that fails, fall through
1523 // and set a software breakpoint?
1524 }
1525
1526 if (m_z0_supported)
1527 {
1528 char packet[64];
1529 const int packet_len = ::snprintf (packet, sizeof(packet), "Z0,%llx,%zx", addr, bp_op_size);
1530 assert (packet_len + 1 < sizeof(packet));
1531 StringExtractorGDBRemote response;
1532 if (m_gdb_comm.SendPacketAndWaitForResponse(packet, packet_len, response, 2, true))
1533 {
1534 if (response.IsUnsupportedPacket())
1535 {
1536 // Disable z packet support and try again
1537 m_z0_supported = 0;
1538 return EnableBreakpoint (bp_site);
1539 }
1540 else if (response.IsOKPacket())
1541 {
1542 bp_site->SetEnabled(true);
1543 bp_site->SetType (BreakpointSite::eExternal);
1544 return error;
1545 }
1546 else
1547 {
1548 uint8_t error_byte = response.GetError();
1549 if (error_byte)
1550 error.SetErrorStringWithFormat("%x packet failed with error: %i (0x%2.2x).\n", packet, error_byte, error_byte);
1551 }
1552 }
1553 }
1554 else
1555 {
1556 return EnableSoftwareBreakpoint (bp_site);
1557 }
1558 }
1559
1560 if (log)
1561 {
1562 const char *err_string = error.AsCString();
1563 log->Printf ("ProcessGDBRemote::EnableBreakpoint() error for breakpoint at 0x%8.8llx: %s",
1564 bp_site->GetLoadAddress(),
1565 err_string ? err_string : "NULL");
1566 }
1567 // We shouldn't reach here on a successful breakpoint enable...
1568 if (error.Success())
1569 error.SetErrorToGenericError();
1570 return error;
1571}
1572
1573Error
1574ProcessGDBRemote::DisableBreakpoint (BreakpointSite *bp_site)
1575{
1576 Error error;
1577 assert (bp_site != NULL);
1578 addr_t addr = bp_site->GetLoadAddress();
1579 user_id_t site_id = bp_site->GetID();
Greg Claytone005f2c2010-11-06 01:53:30 +00001580 LogSP log (ProcessGDBRemoteLog::GetLogIfAllCategoriesSet(GDBR_LOG_BREAKPOINTS));
Chris Lattner24943d22010-06-08 16:52:24 +00001581 if (log)
1582 log->Printf ("ProcessGDBRemote::DisableBreakpoint (site_id = %d) addr = 0x%8.8llx", site_id, (uint64_t)addr);
1583
1584 if (bp_site->IsEnabled())
1585 {
1586 const size_t bp_op_size = GetSoftwareBreakpointTrapOpcode (bp_site);
1587
1588 if (bp_site->IsHardware())
1589 {
1590 // TODO: disable hardware breakpoint...
1591 }
1592 else
1593 {
1594 if (m_z0_supported)
1595 {
1596 char packet[64];
1597 const int packet_len = ::snprintf (packet, sizeof(packet), "z0,%llx,%zx", addr, bp_op_size);
1598 assert (packet_len + 1 < sizeof(packet));
1599 StringExtractorGDBRemote response;
1600 if (m_gdb_comm.SendPacketAndWaitForResponse(packet, packet_len, response, 2, true))
1601 {
1602 if (response.IsUnsupportedPacket())
1603 {
1604 error.SetErrorString("Breakpoint site was set with Z packet, yet remote debugserver states z packets are not supported.");
1605 }
1606 else if (response.IsOKPacket())
1607 {
1608 if (log)
1609 log->Printf ("ProcessGDBRemote::DisableBreakpoint (site_id = %d) addr = 0x%8.8llx -- SUCCESS", site_id, (uint64_t)addr);
1610 bp_site->SetEnabled(false);
1611 return error;
1612 }
1613 else
1614 {
1615 uint8_t error_byte = response.GetError();
1616 if (error_byte)
1617 error.SetErrorStringWithFormat("%x packet failed with error: %i (0x%2.2x).\n", packet, error_byte, error_byte);
1618 }
1619 }
1620 }
1621 else
1622 {
1623 return DisableSoftwareBreakpoint (bp_site);
1624 }
1625 }
1626 }
1627 else
1628 {
1629 if (log)
1630 log->Printf ("ProcessGDBRemote::DisableBreakpoint (site_id = %d) addr = 0x%8.8llx -- SUCCESS (already disabled)", site_id, (uint64_t)addr);
1631 return error;
1632 }
1633
1634 if (error.Success())
1635 error.SetErrorToGenericError();
1636 return error;
1637}
1638
1639Error
1640ProcessGDBRemote::EnableWatchpoint (WatchpointLocation *wp)
1641{
1642 Error error;
1643 if (wp)
1644 {
1645 user_id_t watchID = wp->GetID();
1646 addr_t addr = wp->GetLoadAddress();
Greg Claytone005f2c2010-11-06 01:53:30 +00001647 LogSP log (ProcessGDBRemoteLog::GetLogIfAllCategoriesSet(GDBR_LOG_WATCHPOINTS));
Chris Lattner24943d22010-06-08 16:52:24 +00001648 if (log)
1649 log->Printf ("ProcessGDBRemote::EnableWatchpoint(watchID = %d)", watchID);
1650 if (wp->IsEnabled())
1651 {
1652 if (log)
1653 log->Printf("ProcessGDBRemote::EnableWatchpoint(watchID = %d) addr = 0x%8.8llx: watchpoint already enabled.", watchID, (uint64_t)addr);
1654 return error;
1655 }
1656 else
1657 {
1658 // Pass down an appropriate z/Z packet...
1659 error.SetErrorString("watchpoints not supported");
1660 }
1661 }
1662 else
1663 {
1664 error.SetErrorString("Watchpoint location argument was NULL.");
1665 }
1666 if (error.Success())
1667 error.SetErrorToGenericError();
1668 return error;
1669}
1670
1671Error
1672ProcessGDBRemote::DisableWatchpoint (WatchpointLocation *wp)
1673{
1674 Error error;
1675 if (wp)
1676 {
1677 user_id_t watchID = wp->GetID();
1678
Greg Claytone005f2c2010-11-06 01:53:30 +00001679 LogSP log (ProcessGDBRemoteLog::GetLogIfAllCategoriesSet(GDBR_LOG_WATCHPOINTS));
Chris Lattner24943d22010-06-08 16:52:24 +00001680
1681 addr_t addr = wp->GetLoadAddress();
1682 if (log)
1683 log->Printf ("ProcessGDBRemote::DisableWatchpoint (watchID = %d) addr = 0x%8.8llx", watchID, (uint64_t)addr);
1684
1685 if (wp->IsHardware())
1686 {
1687 // Pass down an appropriate z/Z packet...
1688 error.SetErrorString("watchpoints not supported");
1689 }
1690 // TODO: clear software watchpoints if we implement them
1691 }
1692 else
1693 {
1694 error.SetErrorString("Watchpoint location argument was NULL.");
1695 }
1696 if (error.Success())
1697 error.SetErrorToGenericError();
1698 return error;
1699}
1700
1701void
1702ProcessGDBRemote::Clear()
1703{
1704 m_flags = 0;
1705 m_thread_list.Clear();
1706 {
1707 Mutex::Locker locker(m_stdio_mutex);
1708 m_stdout_data.clear();
1709 }
Chris Lattner24943d22010-06-08 16:52:24 +00001710}
1711
1712Error
1713ProcessGDBRemote::DoSignal (int signo)
1714{
1715 Error error;
Greg Claytone005f2c2010-11-06 01:53:30 +00001716 LogSP log (ProcessGDBRemoteLog::GetLogIfAllCategoriesSet(GDBR_LOG_PROCESS));
Chris Lattner24943d22010-06-08 16:52:24 +00001717 if (log)
1718 log->Printf ("ProcessGDBRemote::DoSignal (signal = %d)", signo);
1719
1720 if (!m_gdb_comm.SendAsyncSignal (signo))
1721 error.SetErrorStringWithFormat("failed to send signal %i", signo);
1722 return error;
1723}
1724
Caroline Tice861efb32010-11-16 05:07:41 +00001725//void
1726//ProcessGDBRemote::STDIOReadThreadBytesReceived (void *baton, const void *src, size_t src_len)
1727//{
1728// ProcessGDBRemote *process = (ProcessGDBRemote *)baton;
1729// process->AppendSTDOUT(static_cast<const char *>(src), src_len);
1730//}
Chris Lattner24943d22010-06-08 16:52:24 +00001731
Caroline Tice861efb32010-11-16 05:07:41 +00001732//void
1733//ProcessGDBRemote::AppendSTDOUT (const char* s, size_t len)
1734//{
1735// ProcessGDBRemoteLog::LogIf (GDBR_LOG_PROCESS, "ProcessGDBRemote::%s (<%d> %s) ...", __FUNCTION__, len, s);
1736// Mutex::Locker locker(m_stdio_mutex);
1737// m_stdout_data.append(s, len);
1738//
1739// // FIXME: Make a real data object for this and put it out.
1740// BroadcastEventIfUnique (eBroadcastBitSTDOUT);
1741//}
Chris Lattner24943d22010-06-08 16:52:24 +00001742
1743
1744Error
1745ProcessGDBRemote::StartDebugserverProcess
1746(
1747 const char *debugserver_url, // The connection string to use in the spawned debugserver ("localhost:1234" or "/dev/tty...")
1748 char const *inferior_argv[], // Arguments for the inferior program including the path to the inferior itself as the first argument
1749 char const *inferior_envp[], // Environment to pass along to the inferior program
Greg Claytonde915be2011-01-23 05:56:20 +00001750 const char *stdin_path,
1751 const char *stdout_path,
1752 const char *stderr_path,
1753 const char *working_dir,
Greg Clayton23cf0c72010-11-08 04:29:11 +00001754 bool launch_process, // Set to true if we are going to be launching a the process
1755 lldb::pid_t attach_pid, // If inferior inferior_argv == NULL, and attach_pid != LLDB_INVALID_PROCESS_ID send this pid as an argument to debugserver
Chris Lattner24943d22010-06-08 16:52:24 +00001756 const char *attach_name, // Wait for the next process to launch whose basename matches "attach_name"
1757 bool wait_for_launch, // Wait for the process named "attach_name" to launch
Caroline Ticebd666012010-12-03 18:46:09 +00001758 uint32_t launch_flags, // Launch flags
Chris Lattner24943d22010-06-08 16:52:24 +00001759 ArchSpec& inferior_arch // The arch of the inferior that we will launch
1760)
1761{
1762 Error error;
Caroline Ticebd666012010-12-03 18:46:09 +00001763 bool disable_aslr = (launch_flags & eLaunchFlagDisableASLR) != 0;
1764 bool no_stdio = (launch_flags & eLaunchFlagDisableSTDIO) != 0;
Chris Lattner24943d22010-06-08 16:52:24 +00001765 if (m_debugserver_pid == LLDB_INVALID_PROCESS_ID)
1766 {
1767 // If we locate debugserver, keep that located version around
1768 static FileSpec g_debugserver_file_spec;
1769
1770 FileSpec debugserver_file_spec;
1771 char debugserver_path[PATH_MAX];
1772
1773 // Always check to see if we have an environment override for the path
1774 // to the debugserver to use and use it if we do.
1775 const char *env_debugserver_path = getenv("LLDB_DEBUGSERVER_PATH");
1776 if (env_debugserver_path)
Greg Clayton537a7a82010-10-20 20:54:39 +00001777 debugserver_file_spec.SetFile (env_debugserver_path, false);
Chris Lattner24943d22010-06-08 16:52:24 +00001778 else
1779 debugserver_file_spec = g_debugserver_file_spec;
1780 bool debugserver_exists = debugserver_file_spec.Exists();
1781 if (!debugserver_exists)
1782 {
1783 // The debugserver binary is in the LLDB.framework/Resources
1784 // directory.
Greg Clayton24b48ff2010-10-17 22:03:32 +00001785 if (Host::GetLLDBPath (ePathTypeSupportExecutableDir, debugserver_file_spec))
Chris Lattner24943d22010-06-08 16:52:24 +00001786 {
Greg Clayton24b48ff2010-10-17 22:03:32 +00001787 debugserver_file_spec.GetFilename().SetCString(DEBUGSERVER_BASENAME);
Chris Lattner24943d22010-06-08 16:52:24 +00001788 debugserver_exists = debugserver_file_spec.Exists();
Greg Clayton24b48ff2010-10-17 22:03:32 +00001789 if (debugserver_exists)
1790 {
1791 g_debugserver_file_spec = debugserver_file_spec;
1792 }
1793 else
1794 {
1795 g_debugserver_file_spec.Clear();
1796 debugserver_file_spec.Clear();
1797 }
Chris Lattner24943d22010-06-08 16:52:24 +00001798 }
1799 }
1800
1801 if (debugserver_exists)
1802 {
1803 debugserver_file_spec.GetPath (debugserver_path, sizeof(debugserver_path));
1804
1805 m_stdio_communication.Clear();
1806 posix_spawnattr_t attr;
1807
Greg Claytone005f2c2010-11-06 01:53:30 +00001808 LogSP log (ProcessGDBRemoteLog::GetLogIfAllCategoriesSet (GDBR_LOG_PROCESS));
Chris Lattner24943d22010-06-08 16:52:24 +00001809
1810 Error local_err; // Errors that don't affect the spawning.
1811 if (log)
1812 log->Printf ("%s ( path='%s', argv=%p, envp=%p, arch=%s )", __FUNCTION__, debugserver_path, inferior_argv, inferior_envp, inferior_arch.AsCString());
1813 error.SetError( ::posix_spawnattr_init (&attr), eErrorTypePOSIX);
1814 if (error.Fail() || log)
Greg Claytone005f2c2010-11-06 01:53:30 +00001815 error.PutToLog(log.get(), "::posix_spawnattr_init ( &attr )");
Chris Lattner24943d22010-06-08 16:52:24 +00001816 if (error.Fail())
1817 return error;;
1818
1819#if !defined (__arm__)
1820
Greg Clayton24b48ff2010-10-17 22:03:32 +00001821 // We don't need to do this for ARM, and we really shouldn't now
1822 // that we have multiple CPU subtypes and no posix_spawnattr call
1823 // that allows us to set which CPU subtype to launch...
Greg Claytoncf015052010-06-11 03:25:34 +00001824 if (inferior_arch.GetType() == eArchTypeMachO)
Chris Lattner24943d22010-06-08 16:52:24 +00001825 {
Greg Claytoncf015052010-06-11 03:25:34 +00001826 cpu_type_t cpu = inferior_arch.GetCPUType();
1827 if (cpu != 0 && cpu != UINT32_MAX && cpu != LLDB_INVALID_CPUTYPE)
1828 {
1829 size_t ocount = 0;
1830 error.SetError( ::posix_spawnattr_setbinpref_np (&attr, 1, &cpu, &ocount), eErrorTypePOSIX);
1831 if (error.Fail() || log)
Greg Claytone005f2c2010-11-06 01:53:30 +00001832 error.PutToLog(log.get(), "::posix_spawnattr_setbinpref_np ( &attr, 1, cpu_type = 0x%8.8x, count => %zu )", cpu, ocount);
Chris Lattner24943d22010-06-08 16:52:24 +00001833
Greg Claytoncf015052010-06-11 03:25:34 +00001834 if (error.Fail() != 0 || ocount != 1)
1835 return error;
1836 }
Chris Lattner24943d22010-06-08 16:52:24 +00001837 }
1838
1839#endif
1840
1841 Args debugserver_args;
1842 char arg_cstr[PATH_MAX];
Chris Lattner24943d22010-06-08 16:52:24 +00001843
Chris Lattner24943d22010-06-08 16:52:24 +00001844 lldb_utility::PseudoTerminal pty;
Greg Claytonde915be2011-01-23 05:56:20 +00001845 const char *stdio_path = NULL;
1846 if (launch_process &&
1847 stdin_path == NULL &&
1848 stdout_path == NULL &&
1849 stderr_path == NULL &&
1850 m_local_debugserver &&
1851 no_stdio == false)
Chris Lattner24943d22010-06-08 16:52:24 +00001852 {
Chris Lattner24943d22010-06-08 16:52:24 +00001853 if (pty.OpenFirstAvailableMaster(O_RDWR|O_NOCTTY, NULL, 0))
Chris Lattner24943d22010-06-08 16:52:24 +00001854 stdio_path = pty.GetSlaveName (NULL, 0);
Chris Lattner24943d22010-06-08 16:52:24 +00001855 }
1856
1857 // Start args with "debugserver /file/path -r --"
1858 debugserver_args.AppendArgument(debugserver_path);
1859 debugserver_args.AppendArgument(debugserver_url);
Greg Clayton24b48ff2010-10-17 22:03:32 +00001860 // use native registers, not the GDB registers
1861 debugserver_args.AppendArgument("--native-regs");
1862 // make debugserver run in its own session so signals generated by
1863 // special terminal key sequences (^C) don't affect debugserver
1864 debugserver_args.AppendArgument("--setsid");
Chris Lattner24943d22010-06-08 16:52:24 +00001865
Greg Clayton452bf612010-08-31 18:35:14 +00001866 if (disable_aslr)
1867 debugserver_args.AppendArguments("--disable-aslr");
1868
Chris Lattner24943d22010-06-08 16:52:24 +00001869 // Only set the inferior
Greg Claytonde915be2011-01-23 05:56:20 +00001870 if (launch_process)
Chris Lattner24943d22010-06-08 16:52:24 +00001871 {
Greg Claytonde915be2011-01-23 05:56:20 +00001872 if (no_stdio)
1873 debugserver_args.AppendArgument("--no-stdio");
1874 else
1875 {
1876 if (stdin_path && stdout_path && stderr_path &&
1877 strcmp(stdin_path, stdout_path) == 0 &&
1878 strcmp(stdin_path, stderr_path) == 0)
1879 {
1880 stdio_path = stdin_path;
1881 stdin_path = stdout_path = stderr_path = NULL;
1882 }
1883
1884 if (stdio_path)
1885 {
1886 // All file handles to stdin, stdout, stderr are the same...
1887 debugserver_args.AppendArgument("--stdio-path");
1888 debugserver_args.AppendArgument(stdio_path);
1889 }
1890 else
1891 {
1892 if (stdin_path == NULL && (stdout_path || stderr_path))
1893 stdin_path = "/dev/null";
1894
1895 if (stdout_path == NULL && (stdin_path || stderr_path))
1896 stdout_path = "/dev/null";
1897
1898 if (stderr_path == NULL && (stdin_path || stdout_path))
1899 stderr_path = "/dev/null";
1900
1901 if (stdin_path)
1902 {
1903 debugserver_args.AppendArgument("--stdin-path");
1904 debugserver_args.AppendArgument(stdin_path);
1905 }
1906 if (stdout_path)
1907 {
1908 debugserver_args.AppendArgument("--stdout-path");
1909 debugserver_args.AppendArgument(stdout_path);
1910 }
1911 if (stderr_path)
1912 {
1913 debugserver_args.AppendArgument("--stderr-path");
1914 debugserver_args.AppendArgument(stderr_path);
1915 }
1916 }
1917 }
Chris Lattner24943d22010-06-08 16:52:24 +00001918 }
Greg Claytonde915be2011-01-23 05:56:20 +00001919
1920 if (working_dir)
Caroline Ticebd666012010-12-03 18:46:09 +00001921 {
Greg Claytonde915be2011-01-23 05:56:20 +00001922 debugserver_args.AppendArgument("--working-dir");
1923 debugserver_args.AppendArgument(working_dir);
Caroline Ticebd666012010-12-03 18:46:09 +00001924 }
Chris Lattner24943d22010-06-08 16:52:24 +00001925
1926 const char *env_debugserver_log_file = getenv("LLDB_DEBUGSERVER_LOG_FILE");
1927 if (env_debugserver_log_file)
1928 {
1929 ::snprintf (arg_cstr, sizeof(arg_cstr), "--log-file=%s", env_debugserver_log_file);
1930 debugserver_args.AppendArgument(arg_cstr);
1931 }
1932
1933 const char *env_debugserver_log_flags = getenv("LLDB_DEBUGSERVER_LOG_FLAGS");
1934 if (env_debugserver_log_flags)
1935 {
1936 ::snprintf (arg_cstr, sizeof(arg_cstr), "--log-flags=%s", env_debugserver_log_flags);
1937 debugserver_args.AppendArgument(arg_cstr);
1938 }
Jim Ingham9ed3ebf2011-01-24 06:35:54 +00001939// debugserver_args.AppendArgument("--log-file=/tmp/debugserver.txt");
1940// debugserver_args.AppendArgument("--log-flags=0x800e0e");
Chris Lattner24943d22010-06-08 16:52:24 +00001941
1942 // Now append the program arguments
1943 if (launch_process)
1944 {
1945 if (inferior_argv)
1946 {
1947 // Terminate the debugserver args so we can now append the inferior args
1948 debugserver_args.AppendArgument("--");
1949
1950 for (int i = 0; inferior_argv[i] != NULL; ++i)
1951 debugserver_args.AppendArgument (inferior_argv[i]);
1952 }
1953 else
1954 {
1955 // Will send environment entries with the 'QEnvironment:' packet
1956 // Will send arguments with the 'A' packet
1957 }
1958 }
1959 else if (attach_pid != LLDB_INVALID_PROCESS_ID)
1960 {
1961 ::snprintf (arg_cstr, sizeof(arg_cstr), "--attach=%u", attach_pid);
1962 debugserver_args.AppendArgument (arg_cstr);
1963 }
1964 else if (attach_name && attach_name[0])
1965 {
1966 if (wait_for_launch)
1967 debugserver_args.AppendArgument ("--waitfor");
1968 else
1969 debugserver_args.AppendArgument ("--attach");
1970 debugserver_args.AppendArgument (attach_name);
1971 }
1972
1973 Error file_actions_err;
1974 posix_spawn_file_actions_t file_actions;
1975#if DONT_CLOSE_DEBUGSERVER_STDIO
1976 file_actions_err.SetErrorString ("Remove this after uncommenting the code block below.");
1977#else
1978 file_actions_err.SetError( ::posix_spawn_file_actions_init (&file_actions), eErrorTypePOSIX);
1979 if (file_actions_err.Success())
1980 {
1981 ::posix_spawn_file_actions_addclose (&file_actions, STDIN_FILENO);
1982 ::posix_spawn_file_actions_addclose (&file_actions, STDOUT_FILENO);
1983 ::posix_spawn_file_actions_addclose (&file_actions, STDERR_FILENO);
1984 }
1985#endif
1986
1987 if (log)
1988 {
1989 StreamString strm;
1990 debugserver_args.Dump (&strm);
1991 log->Printf("%s arguments:\n%s", debugserver_args.GetArgumentAtIndex(0), strm.GetData());
1992 }
1993
Greg Clayton72e1c782011-01-22 23:43:18 +00001994 error.SetError (::posix_spawnp (&m_debugserver_pid,
1995 debugserver_path,
1996 file_actions_err.Success() ? &file_actions : NULL,
1997 &attr,
1998 debugserver_args.GetArgumentVector(),
1999 (char * const*)inferior_envp),
2000 eErrorTypePOSIX);
2001
Greg Claytone9d0df42010-07-02 01:29:13 +00002002
2003 ::posix_spawnattr_destroy (&attr);
2004
Chris Lattner24943d22010-06-08 16:52:24 +00002005 if (file_actions_err.Success())
2006 ::posix_spawn_file_actions_destroy (&file_actions);
2007
2008 // We have seen some cases where posix_spawnp was returning a valid
2009 // looking pid even when an error was returned, so clear it out
2010 if (error.Fail())
2011 m_debugserver_pid = LLDB_INVALID_PROCESS_ID;
2012
2013 if (error.Fail() || log)
Greg Claytone005f2c2010-11-06 01:53:30 +00002014 error.PutToLog(log.get(), "::posix_spawnp ( pid => %i, path = '%s', file_actions = %p, attr = %p, argv = %p, envp = %p )", m_debugserver_pid, debugserver_path, NULL, &attr, inferior_argv, inferior_envp);
Chris Lattner24943d22010-06-08 16:52:24 +00002015
Caroline Ticebd666012010-12-03 18:46:09 +00002016 if (m_debugserver_pid != LLDB_INVALID_PROCESS_ID && !no_stdio)
Caroline Tice91a1dab2010-11-05 22:37:44 +00002017 {
Greg Clayton23cf0c72010-11-08 04:29:11 +00002018 if (pty.GetMasterFileDescriptor() != lldb_utility::PseudoTerminal::invalid_fd)
Caroline Tice861efb32010-11-16 05:07:41 +00002019 SetUpProcessInputReader (pty.ReleaseMasterFileDescriptor());
Caroline Tice91a1dab2010-11-05 22:37:44 +00002020 }
Chris Lattner24943d22010-06-08 16:52:24 +00002021 }
2022 else
2023 {
2024 error.SetErrorStringWithFormat ("Unable to locate " DEBUGSERVER_BASENAME ".\n");
2025 }
2026
2027 if (m_debugserver_pid != LLDB_INVALID_PROCESS_ID)
2028 StartAsyncThread ();
2029 }
2030 return error;
2031}
2032
2033bool
2034ProcessGDBRemote::MonitorDebugserverProcess
2035(
2036 void *callback_baton,
2037 lldb::pid_t debugserver_pid,
2038 int signo, // Zero for no signal
2039 int exit_status // Exit value of process if signal is zero
2040)
2041{
2042 // We pass in the ProcessGDBRemote inferior process it and name it
2043 // "gdb_remote_pid". The process ID is passed in the "callback_baton"
2044 // pointer value itself, thus we need the double cast...
2045
2046 // "debugserver_pid" argument passed in is the process ID for
2047 // debugserver that we are tracking...
2048
Greg Clayton75ccf502010-08-21 02:22:51 +00002049 ProcessGDBRemote *process = (ProcessGDBRemote *)callback_baton;
Greg Clayton72e1c782011-01-22 23:43:18 +00002050
2051 LogSP log (ProcessGDBRemoteLog::GetLogIfAllCategoriesSet(GDBR_LOG_PROCESS));
2052 if (log)
2053 log->Printf ("ProcessGDBRemote::MonitorDebugserverProcess (baton=%p, pid=%i, signo=%i (0x%x), exit_status=%i)", callback_baton, debugserver_pid, signo, signo, exit_status);
2054
Greg Clayton75ccf502010-08-21 02:22:51 +00002055 if (process)
Chris Lattner24943d22010-06-08 16:52:24 +00002056 {
Greg Clayton75ccf502010-08-21 02:22:51 +00002057 // Sleep for a half a second to make sure our inferior process has
2058 // time to set its exit status before we set it incorrectly when
2059 // both the debugserver and the inferior process shut down.
2060 usleep (500000);
2061 // If our process hasn't yet exited, debugserver might have died.
2062 // If the process did exit, the we are reaping it.
Greg Clayton3b2c41c2010-10-18 04:14:23 +00002063 const StateType state = process->GetState();
2064
2065 if (process->m_debugserver_pid != LLDB_INVALID_PROCESS_ID &&
2066 state != eStateInvalid &&
2067 state != eStateUnloaded &&
2068 state != eStateExited &&
2069 state != eStateDetached)
Chris Lattner24943d22010-06-08 16:52:24 +00002070 {
Greg Clayton75ccf502010-08-21 02:22:51 +00002071 char error_str[1024];
2072 if (signo)
Chris Lattner24943d22010-06-08 16:52:24 +00002073 {
Greg Clayton75ccf502010-08-21 02:22:51 +00002074 const char *signal_cstr = process->GetUnixSignals().GetSignalAsCString (signo);
2075 if (signal_cstr)
2076 ::snprintf (error_str, sizeof (error_str), DEBUGSERVER_BASENAME " died with signal %s", signal_cstr);
Chris Lattner24943d22010-06-08 16:52:24 +00002077 else
Greg Clayton75ccf502010-08-21 02:22:51 +00002078 ::snprintf (error_str, sizeof (error_str), DEBUGSERVER_BASENAME " died with signal %i", signo);
Chris Lattner24943d22010-06-08 16:52:24 +00002079 }
2080 else
2081 {
Greg Clayton75ccf502010-08-21 02:22:51 +00002082 ::snprintf (error_str, sizeof (error_str), DEBUGSERVER_BASENAME " died with an exit status of 0x%8.8x", exit_status);
Chris Lattner24943d22010-06-08 16:52:24 +00002083 }
Greg Clayton75ccf502010-08-21 02:22:51 +00002084
2085 process->SetExitStatus (-1, error_str);
2086 }
Greg Clayton3b2c41c2010-10-18 04:14:23 +00002087 // Debugserver has exited we need to let our ProcessGDBRemote
2088 // know that it no longer has a debugserver instance
2089 process->m_debugserver_pid = LLDB_INVALID_PROCESS_ID;
2090 // We are returning true to this function below, so we can
2091 // forget about the monitor handle.
2092 process->m_debugserver_thread = LLDB_INVALID_HOST_THREAD;
Chris Lattner24943d22010-06-08 16:52:24 +00002093 }
2094 return true;
2095}
2096
2097void
2098ProcessGDBRemote::KillDebugserverProcess ()
2099{
2100 if (m_debugserver_pid != LLDB_INVALID_PROCESS_ID)
2101 {
2102 ::kill (m_debugserver_pid, SIGINT);
2103 m_debugserver_pid = LLDB_INVALID_PROCESS_ID;
2104 }
2105}
2106
2107void
2108ProcessGDBRemote::Initialize()
2109{
2110 static bool g_initialized = false;
2111
2112 if (g_initialized == false)
2113 {
2114 g_initialized = true;
2115 PluginManager::RegisterPlugin (GetPluginNameStatic(),
2116 GetPluginDescriptionStatic(),
2117 CreateInstance);
2118
2119 Log::Callbacks log_callbacks = {
2120 ProcessGDBRemoteLog::DisableLog,
2121 ProcessGDBRemoteLog::EnableLog,
2122 ProcessGDBRemoteLog::ListLogCategories
2123 };
2124
2125 Log::RegisterLogChannel (ProcessGDBRemote::GetPluginNameStatic(), log_callbacks);
2126 }
2127}
2128
2129bool
2130ProcessGDBRemote::SetCurrentGDBRemoteThread (int tid)
2131{
2132 if (m_curr_tid == tid)
2133 return true;
2134
2135 char packet[32];
2136 const int packet_len = ::snprintf (packet, sizeof(packet), "Hg%x", tid);
2137 assert (packet_len + 1 < sizeof(packet));
2138 StringExtractorGDBRemote response;
2139 if (m_gdb_comm.SendPacketAndWaitForResponse(packet, packet_len, response, 2, false))
2140 {
2141 if (response.IsOKPacket())
2142 {
2143 m_curr_tid = tid;
2144 return true;
2145 }
2146 }
2147 return false;
2148}
2149
2150bool
2151ProcessGDBRemote::SetCurrentGDBRemoteThreadForRun (int tid)
2152{
2153 if (m_curr_tid_run == tid)
2154 return true;
2155
2156 char packet[32];
Greg Claytonc71899e2011-01-18 19:36:39 +00002157 const int packet_len = ::snprintf (packet, sizeof(packet), "Hc%x", tid);
Chris Lattner24943d22010-06-08 16:52:24 +00002158 assert (packet_len + 1 < sizeof(packet));
2159 StringExtractorGDBRemote response;
2160 if (m_gdb_comm.SendPacketAndWaitForResponse(packet, packet_len, response, 2, false))
2161 {
2162 if (response.IsOKPacket())
2163 {
2164 m_curr_tid_run = tid;
2165 return true;
2166 }
2167 }
2168 return false;
2169}
2170
2171void
2172ProcessGDBRemote::ResetGDBRemoteState ()
2173{
2174 // Reset and GDB remote state
2175 m_curr_tid = LLDB_INVALID_THREAD_ID;
2176 m_curr_tid_run = LLDB_INVALID_THREAD_ID;
2177 m_z0_supported = 1;
2178}
2179
2180
2181bool
2182ProcessGDBRemote::StartAsyncThread ()
2183{
2184 ResetGDBRemoteState ();
2185
Greg Claytone005f2c2010-11-06 01:53:30 +00002186 LogSP log (ProcessGDBRemoteLog::GetLogIfAllCategoriesSet(GDBR_LOG_PROCESS));
Chris Lattner24943d22010-06-08 16:52:24 +00002187
2188 if (log)
2189 log->Printf ("ProcessGDBRemote::%s ()", __FUNCTION__);
2190
2191 // Create a thread that watches our internal state and controls which
2192 // events make it to clients (into the DCProcess event queue).
2193 m_async_thread = Host::ThreadCreate ("<lldb.process.gdb-remote.async>", ProcessGDBRemote::AsyncThread, this, NULL);
2194 return m_async_thread != LLDB_INVALID_HOST_THREAD;
2195}
2196
2197void
2198ProcessGDBRemote::StopAsyncThread ()
2199{
Greg Claytone005f2c2010-11-06 01:53:30 +00002200 LogSP log (ProcessGDBRemoteLog::GetLogIfAllCategoriesSet(GDBR_LOG_PROCESS));
Chris Lattner24943d22010-06-08 16:52:24 +00002201
2202 if (log)
2203 log->Printf ("ProcessGDBRemote::%s ()", __FUNCTION__);
2204
2205 m_async_broadcaster.BroadcastEvent (eBroadcastBitAsyncThreadShouldExit);
2206
2207 // Stop the stdio thread
2208 if (m_async_thread != LLDB_INVALID_HOST_THREAD)
2209 {
2210 Host::ThreadJoin (m_async_thread, NULL, NULL);
2211 }
2212}
2213
2214
2215void *
2216ProcessGDBRemote::AsyncThread (void *arg)
2217{
2218 ProcessGDBRemote *process = (ProcessGDBRemote*) arg;
2219
Greg Claytone005f2c2010-11-06 01:53:30 +00002220 LogSP log (ProcessGDBRemoteLog::GetLogIfAllCategoriesSet (GDBR_LOG_PROCESS));
Chris Lattner24943d22010-06-08 16:52:24 +00002221 if (log)
2222 log->Printf ("ProcessGDBRemote::%s (arg = %p, pid = %i) thread starting...", __FUNCTION__, arg, process->GetID());
2223
2224 Listener listener ("ProcessGDBRemote::AsyncThread");
2225 EventSP event_sp;
2226 const uint32_t desired_event_mask = eBroadcastBitAsyncContinue |
2227 eBroadcastBitAsyncThreadShouldExit;
2228
2229 if (listener.StartListeningForEvents (&process->m_async_broadcaster, desired_event_mask) == desired_event_mask)
2230 {
2231 bool done = false;
2232 while (!done)
2233 {
Caroline Tice926060e2010-10-29 21:48:37 +00002234 log = ProcessGDBRemoteLog::GetLogIfAllCategoriesSet (GDBR_LOG_PROCESS);
Chris Lattner24943d22010-06-08 16:52:24 +00002235 if (log)
2236 log->Printf ("ProcessGDBRemote::%s (arg = %p, pid = %i) listener.WaitForEvent (NULL, event_sp)...", __FUNCTION__, arg, process->GetID());
2237 if (listener.WaitForEvent (NULL, event_sp))
2238 {
2239 const uint32_t event_type = event_sp->GetType();
Jim Ingham3ae449a2010-11-17 02:32:00 +00002240 if (log)
2241 log->Printf ("ProcessGDBRemote::%s (arg = %p, pid = %i) Got an event of type: %d...", __FUNCTION__, arg, process->GetID(), event_type);
2242
Chris Lattner24943d22010-06-08 16:52:24 +00002243 switch (event_type)
2244 {
2245 case eBroadcastBitAsyncContinue:
2246 {
2247 const EventDataBytes *continue_packet = EventDataBytes::GetEventDataFromEvent(event_sp.get());
2248
2249 if (continue_packet)
2250 {
2251 const char *continue_cstr = (const char *)continue_packet->GetBytes ();
2252 const size_t continue_cstr_len = continue_packet->GetByteSize ();
Caroline Tice926060e2010-10-29 21:48:37 +00002253 log = ProcessGDBRemoteLog::GetLogIfAllCategoriesSet (GDBR_LOG_PROCESS);
Chris Lattner24943d22010-06-08 16:52:24 +00002254 if (log)
2255 log->Printf ("ProcessGDBRemote::%s (arg = %p, pid = %i) got eBroadcastBitAsyncContinue: %s", __FUNCTION__, arg, process->GetID(), continue_cstr);
2256
2257 process->SetPrivateState(eStateRunning);
2258 StringExtractorGDBRemote response;
2259 StateType stop_state = process->GetGDBRemote().SendContinuePacketAndWaitForResponse (process, continue_cstr, continue_cstr_len, response);
2260
2261 switch (stop_state)
2262 {
2263 case eStateStopped:
2264 case eStateCrashed:
2265 case eStateSuspended:
2266 process->m_last_stop_packet = response;
2267 process->m_last_stop_packet.SetFilePos (0);
2268 process->SetPrivateState (stop_state);
2269 break;
2270
2271 case eStateExited:
2272 process->m_last_stop_packet = response;
2273 process->m_last_stop_packet.SetFilePos (0);
2274 response.SetFilePos(1);
2275 process->SetExitStatus(response.GetHexU8(), NULL);
2276 done = true;
2277 break;
2278
2279 case eStateInvalid:
2280 break;
2281
2282 default:
2283 process->SetPrivateState (stop_state);
2284 break;
2285 }
2286 }
2287 }
2288 break;
2289
2290 case eBroadcastBitAsyncThreadShouldExit:
Caroline Tice926060e2010-10-29 21:48:37 +00002291 log = ProcessGDBRemoteLog::GetLogIfAllCategoriesSet (GDBR_LOG_PROCESS);
Chris Lattner24943d22010-06-08 16:52:24 +00002292 if (log)
2293 log->Printf ("ProcessGDBRemote::%s (arg = %p, pid = %i) got eBroadcastBitAsyncThreadShouldExit...", __FUNCTION__, arg, process->GetID());
2294 done = true;
2295 break;
2296
2297 default:
Caroline Tice926060e2010-10-29 21:48:37 +00002298 log = ProcessGDBRemoteLog::GetLogIfAllCategoriesSet (GDBR_LOG_PROCESS);
Chris Lattner24943d22010-06-08 16:52:24 +00002299 if (log)
2300 log->Printf ("ProcessGDBRemote::%s (arg = %p, pid = %i) got unknown event 0x%8.8x", __FUNCTION__, arg, process->GetID(), event_type);
2301 done = true;
2302 break;
2303 }
2304 }
2305 else
2306 {
Caroline Tice926060e2010-10-29 21:48:37 +00002307 log = ProcessGDBRemoteLog::GetLogIfAllCategoriesSet (GDBR_LOG_PROCESS);
Chris Lattner24943d22010-06-08 16:52:24 +00002308 if (log)
2309 log->Printf ("ProcessGDBRemote::%s (arg = %p, pid = %i) listener.WaitForEvent (NULL, event_sp) => false", __FUNCTION__, arg, process->GetID());
2310 done = true;
2311 }
2312 }
2313 }
2314
Caroline Tice926060e2010-10-29 21:48:37 +00002315 log = ProcessGDBRemoteLog::GetLogIfAllCategoriesSet (GDBR_LOG_PROCESS);
Chris Lattner24943d22010-06-08 16:52:24 +00002316 if (log)
2317 log->Printf ("ProcessGDBRemote::%s (arg = %p, pid = %i) thread exiting...", __FUNCTION__, arg, process->GetID());
2318
2319 process->m_async_thread = LLDB_INVALID_HOST_THREAD;
2320 return NULL;
2321}
2322
Chris Lattner24943d22010-06-08 16:52:24 +00002323const char *
2324ProcessGDBRemote::GetDispatchQueueNameForThread
2325(
2326 addr_t thread_dispatch_qaddr,
2327 std::string &dispatch_queue_name
2328)
2329{
2330 dispatch_queue_name.clear();
2331 if (thread_dispatch_qaddr != 0 && thread_dispatch_qaddr != LLDB_INVALID_ADDRESS)
2332 {
2333 // Cache the dispatch_queue_offsets_addr value so we don't always have
2334 // to look it up
2335 if (m_dispatch_queue_offsets_addr == LLDB_INVALID_ADDRESS)
2336 {
Greg Claytonaf6e9e42010-10-12 17:33:06 +00002337 static ConstString g_dispatch_queue_offsets_symbol_name ("dispatch_queue_offsets");
2338 const Symbol *dispatch_queue_offsets_symbol = NULL;
Greg Clayton537a7a82010-10-20 20:54:39 +00002339 ModuleSP module_sp(GetTarget().GetImages().FindFirstModuleForFileSpec (FileSpec("libSystem.B.dylib", false)));
Greg Claytonaf6e9e42010-10-12 17:33:06 +00002340 if (module_sp)
2341 dispatch_queue_offsets_symbol = module_sp->FindFirstSymbolWithNameAndType (g_dispatch_queue_offsets_symbol_name, eSymbolTypeData);
2342
2343 if (dispatch_queue_offsets_symbol == NULL)
2344 {
Greg Clayton537a7a82010-10-20 20:54:39 +00002345 module_sp = GetTarget().GetImages().FindFirstModuleForFileSpec (FileSpec("libdispatch.dylib", false));
Greg Claytonaf6e9e42010-10-12 17:33:06 +00002346 if (module_sp)
2347 dispatch_queue_offsets_symbol = module_sp->FindFirstSymbolWithNameAndType (g_dispatch_queue_offsets_symbol_name, eSymbolTypeData);
2348 }
Chris Lattner24943d22010-06-08 16:52:24 +00002349 if (dispatch_queue_offsets_symbol)
Greg Claytoneea26402010-09-14 23:36:40 +00002350 m_dispatch_queue_offsets_addr = dispatch_queue_offsets_symbol->GetValue().GetLoadAddress(&m_target);
Chris Lattner24943d22010-06-08 16:52:24 +00002351
2352 if (m_dispatch_queue_offsets_addr == LLDB_INVALID_ADDRESS)
2353 return NULL;
2354 }
2355
2356 uint8_t memory_buffer[8];
2357 DataExtractor data(memory_buffer, sizeof(memory_buffer), GetByteOrder(), GetAddressByteSize());
2358
2359 // Excerpt from src/queue_private.h
2360 struct dispatch_queue_offsets_s
2361 {
2362 uint16_t dqo_version;
2363 uint16_t dqo_label;
2364 uint16_t dqo_label_size;
2365 } dispatch_queue_offsets;
2366
2367
2368 Error error;
2369 if (ReadMemory (m_dispatch_queue_offsets_addr, memory_buffer, sizeof(dispatch_queue_offsets), error) == sizeof(dispatch_queue_offsets))
2370 {
2371 uint32_t data_offset = 0;
2372 if (data.GetU16(&data_offset, &dispatch_queue_offsets.dqo_version, sizeof(dispatch_queue_offsets)/sizeof(uint16_t)))
2373 {
2374 if (ReadMemory (thread_dispatch_qaddr, &memory_buffer, data.GetAddressByteSize(), error) == data.GetAddressByteSize())
2375 {
2376 data_offset = 0;
2377 lldb::addr_t queue_addr = data.GetAddress(&data_offset);
2378 lldb::addr_t label_addr = queue_addr + dispatch_queue_offsets.dqo_label;
2379 dispatch_queue_name.resize(dispatch_queue_offsets.dqo_label_size, '\0');
2380 size_t bytes_read = ReadMemory (label_addr, &dispatch_queue_name[0], dispatch_queue_offsets.dqo_label_size, error);
2381 if (bytes_read < dispatch_queue_offsets.dqo_label_size)
2382 dispatch_queue_name.erase (bytes_read);
2383 }
2384 }
2385 }
2386 }
2387 if (dispatch_queue_name.empty())
2388 return NULL;
2389 return dispatch_queue_name.c_str();
2390}
2391
Jim Ingham7508e732010-08-09 23:31:02 +00002392uint32_t
2393ProcessGDBRemote::ListProcessesMatchingName (const char *name, StringList &matches, std::vector<lldb::pid_t> &pids)
2394{
2395 // If we are planning to launch the debugserver remotely, then we need to fire up a debugserver
2396 // process and ask it for the list of processes. But if we are local, we can let the Host do it.
2397 if (m_local_debugserver)
2398 {
2399 return Host::ListProcessesMatchingName (name, matches, pids);
2400 }
2401 else
2402 {
2403 // FIXME: Implement talking to the remote debugserver.
2404 return 0;
2405 }
2406
2407}
Jim Ingham55e01d82011-01-22 01:33:44 +00002408
2409bool
2410ProcessGDBRemote::NewThreadNotifyBreakpointHit (void *baton,
2411 lldb_private::StoppointCallbackContext *context,
2412 lldb::user_id_t break_id,
2413 lldb::user_id_t break_loc_id)
2414{
2415 // I don't think I have to do anything here, just make sure I notice the new thread when it starts to
2416 // run so I can stop it if that's what I want to do.
2417 LogSP log (lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_STEP));
2418 if (log)
2419 log->Printf("Hit New Thread Notification breakpoint.");
2420 return false;
2421}
2422
2423
2424bool
2425ProcessGDBRemote::StartNoticingNewThreads()
2426{
2427 static const char *bp_names[] =
2428 {
2429 "start_wqthread",
2430 "_pthread_start",
2431 NULL
2432 };
2433
2434 LogSP log (lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_STEP));
2435 size_t num_bps = m_thread_observation_bps.size();
2436 if (num_bps != 0)
2437 {
2438 for (int i = 0; i < num_bps; i++)
2439 {
2440 lldb::BreakpointSP break_sp = m_target.GetBreakpointByID(m_thread_observation_bps[i]);
2441 if (break_sp)
2442 {
2443 if (log)
2444 log->Printf("Enabled noticing new thread breakpoint.");
2445 break_sp->SetEnabled(true);
2446 }
2447 }
2448 }
2449 else
2450 {
2451 for (int i = 0; bp_names[i] != NULL; i++)
2452 {
2453 Breakpoint *breakpoint = m_target.CreateBreakpoint (NULL, bp_names[i], eFunctionNameTypeFull, true).get();
2454 if (breakpoint)
2455 {
2456 if (log)
2457 log->Printf("Successfully created new thread notification breakpoint at \"%s\".", bp_names[i]);
2458 m_thread_observation_bps.push_back(breakpoint->GetID());
2459 breakpoint->SetCallback (ProcessGDBRemote::NewThreadNotifyBreakpointHit, this, true);
2460 }
2461 else
2462 {
2463 if (log)
2464 log->Printf("Failed to create new thread notification breakpoint.");
2465 return false;
2466 }
2467 }
2468 }
2469
2470 return true;
2471}
2472
2473bool
2474ProcessGDBRemote::StopNoticingNewThreads()
2475{
2476 size_t num_bps = m_thread_observation_bps.size();
2477 if (num_bps != 0)
2478 {
2479 for (int i = 0; i < num_bps; i++)
2480 {
2481 LogSP log (lldb_private::GetLogIfAllCategoriesSet (LIBLLDB_LOG_STEP));
2482
2483 lldb::BreakpointSP break_sp = m_target.GetBreakpointByID(m_thread_observation_bps[i]);
2484 if (break_sp)
2485 {
2486 if (log)
2487 log->Printf ("Disabling new thread notification breakpoint.");
2488 break_sp->SetEnabled(false);
2489 }
2490 }
2491 }
2492 return true;
2493}
2494
2495