blob: 04d0f7b0c2a76dfb969b516b2b33bb33bb0f382f [file] [log] [blame]
Greg Clayton269f91e2011-07-15 18:02:58 +00001//===-- CommunicationKDP.cpp ------------------------------------*- C++ -*-===//
Greg Clayton363be3f2011-07-15 03:27:12 +00002//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9
10
11#include "CommunicationKDP.h"
12
13// C Includes
Jason Molendafac2e622012-09-29 04:02:01 +000014#include <errno.h>
Greg Clayton363be3f2011-07-15 03:27:12 +000015#include <limits.h>
16#include <string.h>
17
18// C++ Includes
Greg Clayton0fa51242011-07-19 03:57:15 +000019#include "llvm/Support/MachO.h"
20
Greg Clayton363be3f2011-07-15 03:27:12 +000021// Other libraries and framework includes
Greg Claytond52d00f2011-07-16 03:19:08 +000022#include "lldb/Core/DataBufferHeap.h"
Greg Clayton1e5b0212011-07-15 16:31:38 +000023#include "lldb/Core/DataExtractor.h"
Greg Clayton363be3f2011-07-15 03:27:12 +000024#include "lldb/Core/Log.h"
Greg Clayton0fa51242011-07-19 03:57:15 +000025#include "lldb/Core/State.h"
Jason Molendafac2e622012-09-29 04:02:01 +000026#include "lldb/Core/UUID.h"
Greg Clayton363be3f2011-07-15 03:27:12 +000027#include "lldb/Host/FileSpec.h"
28#include "lldb/Host/Host.h"
29#include "lldb/Host/TimeValue.h"
30#include "lldb/Target/Process.h"
Greg Clayton363be3f2011-07-15 03:27:12 +000031
32// Project includes
33#include "ProcessKDPLog.h"
34
Greg Clayton363be3f2011-07-15 03:27:12 +000035using namespace lldb;
36using namespace lldb_private;
37
38//----------------------------------------------------------------------
39// CommunicationKDP constructor
40//----------------------------------------------------------------------
41CommunicationKDP::CommunicationKDP (const char *comm_name) :
42 Communication(comm_name),
Greg Clayton0fa51242011-07-19 03:57:15 +000043 m_addr_byte_size (4),
Greg Claytond52d00f2011-07-16 03:19:08 +000044 m_byte_order (eByteOrderLittle),
Greg Clayton363be3f2011-07-15 03:27:12 +000045 m_packet_timeout (1),
46 m_sequence_mutex (Mutex::eMutexTypeRecursive),
Greg Clayton3acaa922012-09-25 02:40:06 +000047 m_is_running (false),
Greg Claytond52d00f2011-07-16 03:19:08 +000048 m_session_key (0u),
49 m_request_sequence_id (0u),
50 m_exception_sequence_id (0u),
51 m_kdp_version_version (0u),
52 m_kdp_version_feature (0u),
53 m_kdp_hostinfo_cpu_mask (0u),
54 m_kdp_hostinfo_cpu_type (0u),
55 m_kdp_hostinfo_cpu_subtype (0u)
Greg Clayton363be3f2011-07-15 03:27:12 +000056{
57}
58
59//----------------------------------------------------------------------
60// Destructor
61//----------------------------------------------------------------------
62CommunicationKDP::~CommunicationKDP()
63{
64 if (IsConnected())
65 {
66 Disconnect();
67 }
68}
69
Greg Clayton1e5b0212011-07-15 16:31:38 +000070bool
Greg Claytond52d00f2011-07-16 03:19:08 +000071CommunicationKDP::SendRequestPacket (const PacketStreamType &request_packet)
Greg Clayton363be3f2011-07-15 03:27:12 +000072{
73 Mutex::Locker locker(m_sequence_mutex);
Greg Clayton1e5b0212011-07-15 16:31:38 +000074 return SendRequestPacketNoLock (request_packet);
Greg Clayton363be3f2011-07-15 03:27:12 +000075}
76
Greg Claytond52d00f2011-07-16 03:19:08 +000077#if 0
78typedef struct {
79 uint8_t request; // Either: CommandType | ePacketTypeRequest, or CommandType | ePacketTypeReply
80 uint8_t sequence;
81 uint16_t length; // Length of entire packet including this header
82 uint32_t key; // Session key
83} kdp_hdr_t;
84#endif
85
Greg Clayton1e5b0212011-07-15 16:31:38 +000086void
Greg Claytond52d00f2011-07-16 03:19:08 +000087CommunicationKDP::MakeRequestPacketHeader (CommandType request_type,
88 PacketStreamType &request_packet,
89 uint16_t request_length)
Greg Clayton363be3f2011-07-15 03:27:12 +000090{
Greg Clayton1e5b0212011-07-15 16:31:38 +000091 request_packet.Clear();
Greg Claytond52d00f2011-07-16 03:19:08 +000092 request_packet.PutHex8 (request_type | ePacketTypeRequest); // Set the request type
93 request_packet.PutHex8 (m_request_sequence_id++); // Sequence number
94 request_packet.PutHex16 (request_length); // Length of the packet including this header
95 request_packet.PutHex32 (m_session_key); // Session key
Greg Clayton363be3f2011-07-15 03:27:12 +000096}
97
Greg Claytond52d00f2011-07-16 03:19:08 +000098bool
99CommunicationKDP::SendRequestAndGetReply (const CommandType command,
100 const uint8_t request_sequence_id,
101 const PacketStreamType &request_packet,
102 DataExtractor &reply_packet)
103{
Greg Clayton3acaa922012-09-25 02:40:06 +0000104 if (IsRunning())
105 {
106 LogSP log (ProcessKDPLog::GetLogIfAllCategoriesSet (KDP_LOG_PACKETS));
107 if (log)
108 {
109 PacketStreamType log_strm;
110 DumpPacket (log_strm, request_packet.GetData(), request_packet.GetSize());
111 log->Printf("error: kdp running, not sending packet: %.*s", (uint32_t)log_strm.GetSize(), log_strm.GetData());
112 }
113 return false;
114 }
Greg Claytond52d00f2011-07-16 03:19:08 +0000115
Greg Clayton3acaa922012-09-25 02:40:06 +0000116 Mutex::Locker locker(m_sequence_mutex);
117#ifdef LLDB_CONFIGURATION_DEBUG
118 // NOTE: this only works for packets that are in native endian byte order
119 assert (request_packet.GetSize() == *((uint16_t *)(request_packet.GetData() + 2)));
120#endif
Greg Claytond52d00f2011-07-16 03:19:08 +0000121 if (SendRequestPacketNoLock(request_packet))
122 {
Greg Clayton8d2ea282011-07-17 20:36:25 +0000123 if (WaitForPacketWithTimeoutMicroSecondsNoLock (reply_packet, GetPacketTimeoutInMicroSeconds ()))
Greg Claytond52d00f2011-07-16 03:19:08 +0000124 {
125 uint32_t offset = 0;
126 const uint8_t reply_command = reply_packet.GetU8 (&offset);
127 const uint8_t reply_sequence_id = reply_packet.GetU8 (&offset);
128 if ((reply_command & eCommandTypeMask) == command)
129 {
130 if (request_sequence_id == reply_sequence_id)
Greg Clayton3acaa922012-09-25 02:40:06 +0000131 {
132 if (command == KDP_RESUMECPUS)
133 m_is_running.SetValue(true, eBroadcastAlways);
Greg Claytond52d00f2011-07-16 03:19:08 +0000134 return true;
Greg Clayton3acaa922012-09-25 02:40:06 +0000135 }
Greg Claytond52d00f2011-07-16 03:19:08 +0000136 }
137 }
138 }
139 reply_packet.Clear();
140 return false;
141}
Greg Clayton363be3f2011-07-15 03:27:12 +0000142
Greg Clayton1e5b0212011-07-15 16:31:38 +0000143bool
Greg Claytond52d00f2011-07-16 03:19:08 +0000144CommunicationKDP::SendRequestPacketNoLock (const PacketStreamType &request_packet)
Greg Clayton363be3f2011-07-15 03:27:12 +0000145{
146 if (IsConnected())
147 {
Greg Clayton1e5b0212011-07-15 16:31:38 +0000148 const char *packet_data = request_packet.GetData();
149 const size_t packet_size = request_packet.GetSize();
Greg Clayton363be3f2011-07-15 03:27:12 +0000150
151 LogSP log (ProcessKDPLog::GetLogIfAllCategoriesSet (KDP_LOG_PACKETS));
152 if (log)
Greg Clayton1e5b0212011-07-15 16:31:38 +0000153 {
Greg Clayton0fa51242011-07-19 03:57:15 +0000154 PacketStreamType log_strm;
155 DumpPacket (log_strm, packet_data, packet_size);
156 log->Printf("%.*s", (uint32_t)log_strm.GetSize(), log_strm.GetData());
Greg Clayton1e5b0212011-07-15 16:31:38 +0000157 }
Greg Clayton363be3f2011-07-15 03:27:12 +0000158 ConnectionStatus status = eConnectionStatusSuccess;
Greg Clayton363be3f2011-07-15 03:27:12 +0000159
Greg Clayton1e5b0212011-07-15 16:31:38 +0000160 size_t bytes_written = Write (packet_data,
161 packet_size,
162 status,
163 NULL);
164
165 if (bytes_written == packet_size)
166 return true;
167
168 if (log)
Greg Clayton851e30e2012-09-18 18:04:04 +0000169 log->Printf ("error: failed to send packet entire packet %llu of %llu bytes sent", (uint64_t)bytes_written, (uint64_t)packet_size);
Greg Clayton1e5b0212011-07-15 16:31:38 +0000170 }
171 return false;
Greg Clayton363be3f2011-07-15 03:27:12 +0000172}
173
174bool
Greg Clayton516f0842012-04-11 00:24:49 +0000175CommunicationKDP::GetSequenceMutex (Mutex::Locker& locker)
Greg Clayton363be3f2011-07-15 03:27:12 +0000176{
Jim Ingham1b584eb2012-05-04 23:02:50 +0000177 return locker.TryLock (m_sequence_mutex);
Greg Clayton363be3f2011-07-15 03:27:12 +0000178}
179
180
181bool
182CommunicationKDP::WaitForNotRunningPrivate (const TimeValue *timeout_ptr)
183{
Greg Clayton3acaa922012-09-25 02:40:06 +0000184 return m_is_running.WaitForValueEqualTo (false, timeout_ptr, NULL);
Greg Clayton363be3f2011-07-15 03:27:12 +0000185}
186
187size_t
Greg Claytond52d00f2011-07-16 03:19:08 +0000188CommunicationKDP::WaitForPacketWithTimeoutMicroSeconds (DataExtractor &packet, uint32_t timeout_usec)
Greg Clayton363be3f2011-07-15 03:27:12 +0000189{
190 Mutex::Locker locker(m_sequence_mutex);
191 return WaitForPacketWithTimeoutMicroSecondsNoLock (packet, timeout_usec);
192}
193
194size_t
Greg Claytond52d00f2011-07-16 03:19:08 +0000195CommunicationKDP::WaitForPacketWithTimeoutMicroSecondsNoLock (DataExtractor &packet, uint32_t timeout_usec)
Greg Clayton363be3f2011-07-15 03:27:12 +0000196{
197 uint8_t buffer[8192];
198 Error error;
199
200 LogSP log (ProcessKDPLog::GetLogIfAllCategoriesSet (KDP_LOG_PACKETS | KDP_LOG_VERBOSE));
201
202 // Check for a packet from our cache first without trying any reading...
203 if (CheckForPacket (NULL, 0, packet))
Greg Claytond52d00f2011-07-16 03:19:08 +0000204 return packet.GetByteSize();
Greg Clayton363be3f2011-07-15 03:27:12 +0000205
206 bool timed_out = false;
207 while (IsConnected() && !timed_out)
208 {
Johnny Chen1e3a5222011-07-21 19:00:59 +0000209 lldb::ConnectionStatus status = eConnectionStatusNoConnection;
Greg Clayton363be3f2011-07-15 03:27:12 +0000210 size_t bytes_read = Read (buffer, sizeof(buffer), timeout_usec, status, &error);
211
212 if (log)
Greg Clayton851e30e2012-09-18 18:04:04 +0000213 log->Printf ("%s: Read (buffer, (sizeof(buffer), timeout_usec = 0x%x, status = %s, error = %s) => bytes_read = %llu",
Greg Clayton363be3f2011-07-15 03:27:12 +0000214 __PRETTY_FUNCTION__,
215 timeout_usec,
216 Communication::ConnectionStatusAsCString (status),
217 error.AsCString(),
Greg Clayton851e30e2012-09-18 18:04:04 +0000218 (uint64_t)bytes_read);
Greg Clayton363be3f2011-07-15 03:27:12 +0000219
220 if (bytes_read > 0)
221 {
222 if (CheckForPacket (buffer, bytes_read, packet))
Greg Claytond52d00f2011-07-16 03:19:08 +0000223 return packet.GetByteSize();
Greg Clayton363be3f2011-07-15 03:27:12 +0000224 }
225 else
226 {
227 switch (status)
228 {
229 case eConnectionStatusTimedOut:
230 timed_out = true;
231 break;
232 case eConnectionStatusSuccess:
233 //printf ("status = success but error = %s\n", error.AsCString("<invalid>"));
234 break;
235
236 case eConnectionStatusEndOfFile:
237 case eConnectionStatusNoConnection:
238 case eConnectionStatusLostConnection:
239 case eConnectionStatusError:
240 Disconnect();
241 break;
242 }
243 }
244 }
245 packet.Clear ();
246 return 0;
247}
248
249bool
Greg Claytond52d00f2011-07-16 03:19:08 +0000250CommunicationKDP::CheckForPacket (const uint8_t *src, size_t src_len, DataExtractor &packet)
Greg Clayton363be3f2011-07-15 03:27:12 +0000251{
252 // Put the packet data into the buffer in a thread safe fashion
253 Mutex::Locker locker(m_bytes_mutex);
254
255 LogSP log (ProcessKDPLog::GetLogIfAllCategoriesSet (KDP_LOG_PACKETS));
256
257 if (src && src_len > 0)
258 {
259 if (log && log->GetVerbose())
260 {
Greg Claytond52d00f2011-07-16 03:19:08 +0000261 PacketStreamType log_strm;
Greg Clayton8d2ea282011-07-17 20:36:25 +0000262 DataExtractor::DumpHexBytes (&log_strm, src, src_len, UINT32_MAX, LLDB_INVALID_ADDRESS);
Greg Claytond52d00f2011-07-16 03:19:08 +0000263 log->Printf ("CommunicationKDP::%s adding %u bytes: %s",
Greg Clayton363be3f2011-07-15 03:27:12 +0000264 __FUNCTION__,
265 (uint32_t)src_len,
Greg Claytond52d00f2011-07-16 03:19:08 +0000266 log_strm.GetData());
Greg Clayton363be3f2011-07-15 03:27:12 +0000267 }
268 m_bytes.append ((const char *)src, src_len);
269 }
270
Greg Claytond52d00f2011-07-16 03:19:08 +0000271 // Make sure we at least have enough bytes for a packet header
272 const size_t bytes_available = m_bytes.size();
273 if (bytes_available >= 8)
Greg Clayton363be3f2011-07-15 03:27:12 +0000274 {
Greg Claytond52d00f2011-07-16 03:19:08 +0000275 packet.SetData (&m_bytes[0], bytes_available, m_byte_order);
276 uint32_t offset = 0;
277 uint8_t reply_command = packet.GetU8(&offset);
278 switch (reply_command)
279 {
Greg Claytonea636012012-09-21 01:55:30 +0000280 case ePacketTypeRequest | KDP_EXCEPTION:
281 case ePacketTypeRequest | KDP_TERMINATION:
282 // We got an exception request, so be sure to send an ACK
283 {
284 PacketStreamType request_ack_packet (Stream::eBinary, m_addr_byte_size, m_byte_order);
285 // Set the reply but and make the ACK packet
286 request_ack_packet.PutHex8 (reply_command | ePacketTypeReply);
287 request_ack_packet.PutHex8 (packet.GetU8(&offset));
288 request_ack_packet.PutHex16 (packet.GetU16(&offset));
289 request_ack_packet.PutHex32 (packet.GetU32(&offset));
Greg Clayton3acaa922012-09-25 02:40:06 +0000290 m_is_running.SetValue(false, eBroadcastAlways);
Greg Claytonea636012012-09-21 01:55:30 +0000291 // Ack to the exception or termination
292 SendRequestPacketNoLock (request_ack_packet);
293 }
294 // Fall through to case below to get packet contents
Greg Clayton7b139222011-07-21 01:12:01 +0000295 case ePacketTypeReply | KDP_CONNECT:
296 case ePacketTypeReply | KDP_DISCONNECT:
297 case ePacketTypeReply | KDP_HOSTINFO:
298 case ePacketTypeReply | KDP_VERSION:
299 case ePacketTypeReply | KDP_MAXBYTES:
300 case ePacketTypeReply | KDP_READMEM:
301 case ePacketTypeReply | KDP_WRITEMEM:
302 case ePacketTypeReply | KDP_READREGS:
303 case ePacketTypeReply | KDP_WRITEREGS:
304 case ePacketTypeReply | KDP_LOAD:
305 case ePacketTypeReply | KDP_IMAGEPATH:
306 case ePacketTypeReply | KDP_SUSPEND:
307 case ePacketTypeReply | KDP_RESUMECPUS:
Greg Clayton7b139222011-07-21 01:12:01 +0000308 case ePacketTypeReply | KDP_BREAKPOINT_SET:
309 case ePacketTypeReply | KDP_BREAKPOINT_REMOVE:
310 case ePacketTypeReply | KDP_REGIONS:
311 case ePacketTypeReply | KDP_REATTACH:
312 case ePacketTypeReply | KDP_HOSTREBOOT:
313 case ePacketTypeReply | KDP_READMEM64:
314 case ePacketTypeReply | KDP_WRITEMEM64:
315 case ePacketTypeReply | KDP_BREAKPOINT_SET64:
316 case ePacketTypeReply | KDP_BREAKPOINT_REMOVE64:
317 case ePacketTypeReply | KDP_KERNELVERSION:
Greg Claytond52d00f2011-07-16 03:19:08 +0000318 {
319 offset = 2;
320 const uint16_t length = packet.GetU16 (&offset);
321 if (length <= bytes_available)
322 {
323 // We have an entire packet ready, we need to copy the data
324 // bytes into a buffer that will be owned by the packet and
325 // erase the bytes from our communcation buffer "m_bytes"
326 packet.SetData (DataBufferSP (new DataBufferHeap (&m_bytes[0], length)));
327 m_bytes.erase (0, length);
Greg Clayton8d2ea282011-07-17 20:36:25 +0000328
329 if (log)
330 {
331 PacketStreamType log_strm;
Greg Clayton0fa51242011-07-19 03:57:15 +0000332 DumpPacket (log_strm, packet);
Greg Clayton8d2ea282011-07-17 20:36:25 +0000333
Greg Clayton0fa51242011-07-19 03:57:15 +0000334 log->Printf("%.*s", (uint32_t)log_strm.GetSize(), log_strm.GetData());
Greg Clayton8d2ea282011-07-17 20:36:25 +0000335 }
Greg Claytond52d00f2011-07-16 03:19:08 +0000336 return true;
337 }
338 }
339 break;
340
341 default:
342 // Unrecognized reply command byte, erase this byte and try to get back on track
343 if (log)
344 log->Printf ("CommunicationKDP::%s: tossing junk byte: 0x%2.2x",
345 __FUNCTION__,
346 (uint8_t)m_bytes[0]);
347 m_bytes.erase(0, 1);
348 break;
349 }
Greg Clayton363be3f2011-07-15 03:27:12 +0000350 }
351 packet.Clear();
352 return false;
353}
354
Greg Clayton1e5b0212011-07-15 16:31:38 +0000355
Greg Claytond52d00f2011-07-16 03:19:08 +0000356bool
Greg Clayton8d2ea282011-07-17 20:36:25 +0000357CommunicationKDP::SendRequestConnect (uint16_t reply_port,
358 uint16_t exc_port,
359 const char *greeting)
Greg Clayton1e5b0212011-07-15 16:31:38 +0000360{
Greg Clayton0fa51242011-07-19 03:57:15 +0000361 PacketStreamType request_packet (Stream::eBinary, m_addr_byte_size, m_byte_order);
Greg Claytond52d00f2011-07-16 03:19:08 +0000362 if (greeting == NULL)
363 greeting = "";
364
Greg Clayton7b139222011-07-21 01:12:01 +0000365 const CommandType command = KDP_CONNECT;
Greg Clayton8d2ea282011-07-17 20:36:25 +0000366 // Length is 82 uint16_t and the length of the greeting C string with the terminating NULL
367 const uint32_t command_length = 8 + 2 + 2 + ::strlen(greeting) + 1;
Greg Claytond52d00f2011-07-16 03:19:08 +0000368 const uint32_t request_sequence_id = m_request_sequence_id;
369 MakeRequestPacketHeader (command, request_packet, command_length);
Greg Clayton8d2ea282011-07-17 20:36:25 +0000370 // Always send connect ports as little endian
371 request_packet.SetByteOrder (eByteOrderLittle);
372 request_packet.PutHex16 (reply_port);
373 request_packet.PutHex16 (exc_port);
374 request_packet.SetByteOrder (m_byte_order);
375 request_packet.PutCString (greeting);
Greg Claytond52d00f2011-07-16 03:19:08 +0000376 DataExtractor reply_packet;
377 return SendRequestAndGetReply (command, request_sequence_id, request_packet, reply_packet);
Greg Clayton1e5b0212011-07-15 16:31:38 +0000378}
379
Greg Claytond52d00f2011-07-16 03:19:08 +0000380void
381CommunicationKDP::ClearKDPSettings ()
382{
383 m_request_sequence_id = 0;
384 m_kdp_version_version = 0;
385 m_kdp_version_feature = 0;
386 m_kdp_hostinfo_cpu_mask = 0;
387 m_kdp_hostinfo_cpu_type = 0;
388 m_kdp_hostinfo_cpu_subtype = 0;
389}
390
391bool
Greg Clayton8d2ea282011-07-17 20:36:25 +0000392CommunicationKDP::SendRequestReattach (uint16_t reply_port)
Greg Claytond52d00f2011-07-16 03:19:08 +0000393{
Greg Clayton0fa51242011-07-19 03:57:15 +0000394 PacketStreamType request_packet (Stream::eBinary, m_addr_byte_size, m_byte_order);
Greg Clayton7b139222011-07-21 01:12:01 +0000395 const CommandType command = KDP_REATTACH;
Greg Claytond52d00f2011-07-16 03:19:08 +0000396 // Length is 8 bytes for the header plus 2 bytes for the reply UDP port
397 const uint32_t command_length = 8 + 2;
398 const uint32_t request_sequence_id = m_request_sequence_id;
399 MakeRequestPacketHeader (command, request_packet, command_length);
Greg Clayton8d2ea282011-07-17 20:36:25 +0000400 // Always send connect ports as little endian
401 request_packet.SetByteOrder (eByteOrderLittle);
Greg Claytond52d00f2011-07-16 03:19:08 +0000402 request_packet.PutHex16(reply_port);
Greg Clayton8d2ea282011-07-17 20:36:25 +0000403 request_packet.SetByteOrder (m_byte_order);
Greg Claytond52d00f2011-07-16 03:19:08 +0000404 DataExtractor reply_packet;
405 if (SendRequestAndGetReply (command, request_sequence_id, request_packet, reply_packet))
406 {
407 // Reset the sequence ID to zero for reattach
408 ClearKDPSettings ();
409 uint32_t offset = 4;
410 m_session_key = reply_packet.GetU32 (&offset);
411 return true;
412 }
413 return false;
414}
415
416uint32_t
417CommunicationKDP::GetVersion ()
418{
419 if (!VersionIsValid())
420 SendRequestVersion();
421 return m_kdp_version_version;
422}
423
424uint32_t
425CommunicationKDP::GetFeatureFlags ()
426{
427 if (!VersionIsValid())
428 SendRequestVersion();
429 return m_kdp_version_feature;
430}
431
432bool
433CommunicationKDP::SendRequestVersion ()
434{
Greg Clayton0fa51242011-07-19 03:57:15 +0000435 PacketStreamType request_packet (Stream::eBinary, m_addr_byte_size, m_byte_order);
Greg Clayton7b139222011-07-21 01:12:01 +0000436 const CommandType command = KDP_VERSION;
Greg Claytond52d00f2011-07-16 03:19:08 +0000437 const uint32_t command_length = 8;
438 const uint32_t request_sequence_id = m_request_sequence_id;
439 MakeRequestPacketHeader (command, request_packet, command_length);
440 DataExtractor reply_packet;
441 if (SendRequestAndGetReply (command, request_sequence_id, request_packet, reply_packet))
442 {
Greg Claytond52d00f2011-07-16 03:19:08 +0000443 uint32_t offset = 8;
444 m_kdp_version_version = reply_packet.GetU32 (&offset);
445 m_kdp_version_feature = reply_packet.GetU32 (&offset);
446 return true;
447 }
448 return false;
449}
450
Greg Clayton7b139222011-07-21 01:12:01 +0000451#if 0 // Disable KDP_IMAGEPATH for now, it seems to hang the KDP connection...
452const char *
453CommunicationKDP::GetImagePath ()
454{
455 if (m_image_path.empty())
456 SendRequestImagePath();
457 return m_image_path.c_str();
458}
459
460bool
461CommunicationKDP::SendRequestImagePath ()
462{
463 PacketStreamType request_packet (Stream::eBinary, m_addr_byte_size, m_byte_order);
464 const CommandType command = KDP_IMAGEPATH;
465 const uint32_t command_length = 8;
466 const uint32_t request_sequence_id = m_request_sequence_id;
467 MakeRequestPacketHeader (command, request_packet, command_length);
468 DataExtractor reply_packet;
469 if (SendRequestAndGetReply (command, request_sequence_id, request_packet, reply_packet))
470 {
471 const char *path = reply_packet.PeekCStr(8);
472 if (path && path[0])
473 m_kernel_version.assign (path);
474 return true;
475 }
476 return false;
477}
478#endif
479
Greg Claytond52d00f2011-07-16 03:19:08 +0000480uint32_t
481CommunicationKDP::GetCPUMask ()
482{
483 if (!HostInfoIsValid())
484 SendRequestHostInfo();
485 return m_kdp_hostinfo_cpu_mask;
486}
487
488uint32_t
489CommunicationKDP::GetCPUType ()
490{
491 if (!HostInfoIsValid())
492 SendRequestHostInfo();
493 return m_kdp_hostinfo_cpu_type;
494}
495
496uint32_t
497CommunicationKDP::GetCPUSubtype ()
498{
499 if (!HostInfoIsValid())
500 SendRequestHostInfo();
501 return m_kdp_hostinfo_cpu_subtype;
502}
503
Jason Molendafac2e622012-09-29 04:02:01 +0000504lldb_private::UUID
505CommunicationKDP::GetUUID ()
506{
507 UUID uuid;
508 if (GetKernelVersion() == NULL)
509 return uuid;
510
511 if (m_kernel_version.find("UUID=") == std::string::npos)
512 return uuid;
513
514 size_t p = m_kernel_version.find("UUID=") + strlen ("UUID=");
515 std::string uuid_str = m_kernel_version.substr(p, 36);
516 if (uuid_str.size() < 32)
517 return uuid;
518
519 if (uuid.SetFromCString (uuid_str.c_str()) == 0)
520 {
521 UUID invalid_uuid;
522 return invalid_uuid;
523 }
524
525 return uuid;
526}
527
528lldb::addr_t
529CommunicationKDP::GetLoadAddress ()
530{
531 if (GetKernelVersion() == NULL)
532 return LLDB_INVALID_ADDRESS;
533
534 if (m_kernel_version.find("stext=") == std::string::npos)
535 return LLDB_INVALID_ADDRESS;
536 size_t p = m_kernel_version.find("stext=") + strlen ("stext=");
537 if (m_kernel_version[p] != '0' || m_kernel_version[p + 1] != 'x')
538 return LLDB_INVALID_ADDRESS;
539
540 addr_t kernel_load_address;
541 errno = 0;
542 kernel_load_address = ::strtoul (m_kernel_version.c_str() + p, NULL, 16);
543 if (errno != 0 || kernel_load_address == 0)
544 return LLDB_INVALID_ADDRESS;
545
546 return kernel_load_address;
547}
548
Greg Claytond52d00f2011-07-16 03:19:08 +0000549bool
550CommunicationKDP::SendRequestHostInfo ()
551{
Greg Clayton0fa51242011-07-19 03:57:15 +0000552 PacketStreamType request_packet (Stream::eBinary, m_addr_byte_size, m_byte_order);
Greg Clayton7b139222011-07-21 01:12:01 +0000553 const CommandType command = KDP_HOSTINFO;
Greg Claytond52d00f2011-07-16 03:19:08 +0000554 const uint32_t command_length = 8;
555 const uint32_t request_sequence_id = m_request_sequence_id;
556 MakeRequestPacketHeader (command, request_packet, command_length);
557 DataExtractor reply_packet;
558 if (SendRequestAndGetReply (command, request_sequence_id, request_packet, reply_packet))
559 {
Greg Claytond52d00f2011-07-16 03:19:08 +0000560 uint32_t offset = 8;
Greg Clayton0fa51242011-07-19 03:57:15 +0000561 m_kdp_hostinfo_cpu_mask = reply_packet.GetU32 (&offset);
562 m_kdp_hostinfo_cpu_type = reply_packet.GetU32 (&offset);
563 m_kdp_hostinfo_cpu_subtype = reply_packet.GetU32 (&offset);
564
565 ArchSpec kernel_arch;
566 kernel_arch.SetArchitecture (eArchTypeMachO,
567 m_kdp_hostinfo_cpu_type,
568 m_kdp_hostinfo_cpu_subtype);
569
570 m_addr_byte_size = kernel_arch.GetAddressByteSize();
571 m_byte_order = kernel_arch.GetByteOrder();
Greg Claytond52d00f2011-07-16 03:19:08 +0000572 return true;
573 }
574 return false;
575}
576
Greg Clayton234981a2011-07-20 03:41:06 +0000577const char *
578CommunicationKDP::GetKernelVersion ()
579{
580 if (m_kernel_version.empty())
581 SendRequestKernelVersion ();
582 return m_kernel_version.c_str();
583}
584
585bool
586CommunicationKDP::SendRequestKernelVersion ()
587{
588 PacketStreamType request_packet (Stream::eBinary, m_addr_byte_size, m_byte_order);
Greg Clayton7b139222011-07-21 01:12:01 +0000589 const CommandType command = KDP_KERNELVERSION;
Greg Clayton234981a2011-07-20 03:41:06 +0000590 const uint32_t command_length = 8;
591 const uint32_t request_sequence_id = m_request_sequence_id;
592 MakeRequestPacketHeader (command, request_packet, command_length);
593 DataExtractor reply_packet;
594 if (SendRequestAndGetReply (command, request_sequence_id, request_packet, reply_packet))
595 {
596 const char *kernel_version_cstr = reply_packet.PeekCStr(8);
597 if (kernel_version_cstr && kernel_version_cstr[0])
598 m_kernel_version.assign (kernel_version_cstr);
599 return true;
600 }
601 return false;
602}
603
Greg Claytond52d00f2011-07-16 03:19:08 +0000604bool
Greg Clayton8d2ea282011-07-17 20:36:25 +0000605CommunicationKDP::SendRequestDisconnect ()
Greg Clayton1e5b0212011-07-15 16:31:38 +0000606{
Greg Clayton0fa51242011-07-19 03:57:15 +0000607 PacketStreamType request_packet (Stream::eBinary, m_addr_byte_size, m_byte_order);
Greg Clayton7b139222011-07-21 01:12:01 +0000608 const CommandType command = KDP_DISCONNECT;
Greg Claytond52d00f2011-07-16 03:19:08 +0000609 const uint32_t command_length = 8;
610 const uint32_t request_sequence_id = m_request_sequence_id;
611 MakeRequestPacketHeader (command, request_packet, command_length);
612 DataExtractor reply_packet;
613 if (SendRequestAndGetReply (command, request_sequence_id, request_packet, reply_packet))
614 {
615 // Are we supposed to get a reply for disconnect?
616 }
617 ClearKDPSettings ();
618 return true;
Greg Clayton1e5b0212011-07-15 16:31:38 +0000619}
620
Greg Clayton0fa51242011-07-19 03:57:15 +0000621uint32_t
622CommunicationKDP::SendRequestReadMemory (lldb::addr_t addr,
623 void *dst,
624 uint32_t dst_len,
625 Error &error)
626{
627 PacketStreamType request_packet (Stream::eBinary, m_addr_byte_size, m_byte_order);
628 bool use_64 = (GetVersion() >= 11);
629 uint32_t command_addr_byte_size = use_64 ? 8 : 4;
Greg Clayton7b139222011-07-21 01:12:01 +0000630 const CommandType command = use_64 ? KDP_READMEM64 : KDP_READMEM;
Greg Clayton0fa51242011-07-19 03:57:15 +0000631 // Size is header + address size + uint32_t length
632 const uint32_t command_length = 8 + command_addr_byte_size + 4;
633 const uint32_t request_sequence_id = m_request_sequence_id;
634 MakeRequestPacketHeader (command, request_packet, command_length);
635 request_packet.PutMaxHex64 (addr, command_addr_byte_size);
636 request_packet.PutHex32 (dst_len);
637 DataExtractor reply_packet;
638 if (SendRequestAndGetReply (command, request_sequence_id, request_packet, reply_packet))
639 {
Greg Clayton0fa51242011-07-19 03:57:15 +0000640 uint32_t offset = 8;
641 uint32_t kdp_error = reply_packet.GetU32 (&offset);
642 uint32_t src_len = reply_packet.GetByteSize() - 12;
643
644 if (src_len > 0)
645 {
646 const void *src = reply_packet.GetData(&offset, src_len);
647 if (src)
648 {
649 ::memcpy (dst, src, src_len);
650 error.Clear();
651 return src_len;
652 }
653 }
654 if (kdp_error)
655 error.SetErrorStringWithFormat ("kdp read memory failed (error %u)", kdp_error);
656 else
657 error.SetErrorString ("kdp read memory failed");
658 }
659 return 0;
660}
661
Greg Claytonec15f502011-07-20 01:32:50 +0000662
663uint32_t
664CommunicationKDP::SendRequestWriteMemory (lldb::addr_t addr,
665 const void *src,
666 uint32_t src_len,
667 Error &error)
668{
669 PacketStreamType request_packet (Stream::eBinary, m_addr_byte_size, m_byte_order);
670 bool use_64 = (GetVersion() >= 11);
671 uint32_t command_addr_byte_size = use_64 ? 8 : 4;
Greg Clayton7b139222011-07-21 01:12:01 +0000672 const CommandType command = use_64 ? KDP_WRITEMEM64 : KDP_WRITEMEM;
Greg Claytonec15f502011-07-20 01:32:50 +0000673 // Size is header + address size + uint32_t length
Greg Claytonfe3150f2012-10-12 23:24:05 +0000674 const uint32_t command_length = 8 + command_addr_byte_size + 4 + src_len;
Greg Claytonec15f502011-07-20 01:32:50 +0000675 const uint32_t request_sequence_id = m_request_sequence_id;
676 MakeRequestPacketHeader (command, request_packet, command_length);
677 request_packet.PutMaxHex64 (addr, command_addr_byte_size);
678 request_packet.PutHex32 (src_len);
Jason Molenda62377462012-10-19 02:16:22 +0000679 request_packet.PutRawBytes(src, src_len);
Greg Claytonec15f502011-07-20 01:32:50 +0000680
681 DataExtractor reply_packet;
682 if (SendRequestAndGetReply (command, request_sequence_id, request_packet, reply_packet))
683 {
684 uint32_t offset = 8;
685 uint32_t kdp_error = reply_packet.GetU32 (&offset);
686 if (kdp_error)
687 error.SetErrorStringWithFormat ("kdp write memory failed (error %u)", kdp_error);
688 else
689 {
690 error.Clear();
691 return src_len;
692 }
693 }
694 return 0;
695}
696
Greg Clayton0fa51242011-07-19 03:57:15 +0000697const char *
698CommunicationKDP::GetCommandAsCString (uint8_t command)
699{
700 switch (command)
701 {
Greg Clayton7b139222011-07-21 01:12:01 +0000702 case KDP_CONNECT: return "KDP_CONNECT";
703 case KDP_DISCONNECT: return "KDP_DISCONNECT";
704 case KDP_HOSTINFO: return "KDP_HOSTINFO";
705 case KDP_VERSION: return "KDP_VERSION";
706 case KDP_MAXBYTES: return "KDP_MAXBYTES";
707 case KDP_READMEM: return "KDP_READMEM";
708 case KDP_WRITEMEM: return "KDP_WRITEMEM";
709 case KDP_READREGS: return "KDP_READREGS";
710 case KDP_WRITEREGS: return "KDP_WRITEREGS";
711 case KDP_LOAD: return "KDP_LOAD";
712 case KDP_IMAGEPATH: return "KDP_IMAGEPATH";
713 case KDP_SUSPEND: return "KDP_SUSPEND";
714 case KDP_RESUMECPUS: return "KDP_RESUMECPUS";
715 case KDP_EXCEPTION: return "KDP_EXCEPTION";
716 case KDP_TERMINATION: return "KDP_TERMINATION";
717 case KDP_BREAKPOINT_SET: return "KDP_BREAKPOINT_SET";
718 case KDP_BREAKPOINT_REMOVE: return "KDP_BREAKPOINT_REMOVE";
719 case KDP_REGIONS: return "KDP_REGIONS";
720 case KDP_REATTACH: return "KDP_REATTACH";
721 case KDP_HOSTREBOOT: return "KDP_HOSTREBOOT";
722 case KDP_READMEM64: return "KDP_READMEM64";
723 case KDP_WRITEMEM64: return "KDP_WRITEMEM64";
724 case KDP_BREAKPOINT_SET64: return "KDP_BREAKPOINT64_SET";
725 case KDP_BREAKPOINT_REMOVE64: return "KDP_BREAKPOINT64_REMOVE";
726 case KDP_KERNELVERSION: return "KDP_KERNELVERSION";
Greg Clayton0fa51242011-07-19 03:57:15 +0000727 }
728 return NULL;
729}
730
731void
732CommunicationKDP::DumpPacket (Stream &s, const void *data, uint32_t data_len)
733{
734 DataExtractor extractor (data, data_len, m_byte_order, m_addr_byte_size);
735 DumpPacket (s, extractor);
736}
737
738void
739CommunicationKDP::DumpPacket (Stream &s, const DataExtractor& packet)
740{
741 const char *error_desc = NULL;
742 if (packet.GetByteSize() < 8)
743 {
744 error_desc = "error: invalid packet (too short): ";
745 }
746 else
747 {
748 uint32_t offset = 0;
749 const uint8_t first_packet_byte = packet.GetU8 (&offset);
750 const uint8_t sequence_id = packet.GetU8 (&offset);
751 const uint16_t length = packet.GetU16 (&offset);
752 const uint32_t key = packet.GetU32 (&offset);
753 const CommandType command = ExtractCommand (first_packet_byte);
754 const char *command_name = GetCommandAsCString (command);
755 if (command_name)
756 {
757 const bool is_reply = ExtractIsReply(first_packet_byte);
Greg Clayton3acaa922012-09-25 02:40:06 +0000758 s.Printf ("(running=%i) %s %24s: 0x%2.2x 0x%2.2x 0x%4.4x 0x%8.8x ",
759 IsRunning(),
760 is_reply ? "<--" : "-->",
761 command_name,
762 first_packet_byte,
Greg Clayton0fa51242011-07-19 03:57:15 +0000763 sequence_id,
764 length,
Greg Clayton3acaa922012-09-25 02:40:06 +0000765 key);
Greg Clayton0fa51242011-07-19 03:57:15 +0000766
767 if (is_reply)
768 {
769 // Dump request reply packets
770 switch (command)
771 {
Greg Claytonec15f502011-07-20 01:32:50 +0000772 // Commands that return a single 32 bit error
Greg Clayton7b139222011-07-21 01:12:01 +0000773 case KDP_CONNECT:
774 case KDP_WRITEMEM:
775 case KDP_WRITEMEM64:
776 case KDP_BREAKPOINT_SET:
777 case KDP_BREAKPOINT_REMOVE:
778 case KDP_BREAKPOINT_SET64:
779 case KDP_BREAKPOINT_REMOVE64:
780 case KDP_WRITEREGS:
781 case KDP_LOAD:
Greg Clayton0fa51242011-07-19 03:57:15 +0000782 {
783 const uint32_t error = packet.GetU32 (&offset);
784 s.Printf(" (error=0x%8.8x)", error);
785 }
786 break;
787
Greg Clayton7b139222011-07-21 01:12:01 +0000788 case KDP_DISCONNECT:
789 case KDP_REATTACH:
790 case KDP_HOSTREBOOT:
791 case KDP_SUSPEND:
792 case KDP_RESUMECPUS:
793 case KDP_EXCEPTION:
794 case KDP_TERMINATION:
Greg Clayton0fa51242011-07-19 03:57:15 +0000795 // No return value for the reply, just the header to ack
Greg Claytonec15f502011-07-20 01:32:50 +0000796 s.PutCString(" ()");
Greg Clayton0fa51242011-07-19 03:57:15 +0000797 break;
798
Greg Clayton7b139222011-07-21 01:12:01 +0000799 case KDP_HOSTINFO:
Greg Clayton0fa51242011-07-19 03:57:15 +0000800 {
801 const uint32_t cpu_mask = packet.GetU32 (&offset);
802 const uint32_t cpu_type = packet.GetU32 (&offset);
803 const uint32_t cpu_subtype = packet.GetU32 (&offset);
804 s.Printf(" (cpu_mask=0x%8.8x, cpu_type=0x%8.8x, cpu_subtype=0x%8.8x)", cpu_mask, cpu_type, cpu_subtype);
805 }
806 break;
807
Greg Clayton7b139222011-07-21 01:12:01 +0000808 case KDP_VERSION:
Greg Clayton0fa51242011-07-19 03:57:15 +0000809 {
810 const uint32_t version = packet.GetU32 (&offset);
811 const uint32_t feature = packet.GetU32 (&offset);
812 s.Printf(" (version=0x%8.8x, feature=0x%8.8x)", version, feature);
813 }
814 break;
815
Greg Clayton7b139222011-07-21 01:12:01 +0000816 case KDP_REGIONS:
Greg Clayton0fa51242011-07-19 03:57:15 +0000817 {
818 const uint32_t region_count = packet.GetU32 (&offset);
819 s.Printf(" (count = %u", region_count);
820 for (uint32_t i=0; i<region_count; ++i)
821 {
822 const addr_t region_addr = packet.GetPointer (&offset);
823 const uint32_t region_size = packet.GetU32 (&offset);
824 const uint32_t region_prot = packet.GetU32 (&offset);
Jason Molenda7e5fa7f2011-09-20 21:44:10 +0000825 s.Printf("\n\tregion[%llu] = { range = [0x%16.16llx - 0x%16.16llx), size = 0x%8.8x, prot = %s }", region_addr, region_addr, region_addr + region_size, region_size, GetPermissionsAsCString (region_prot));
Greg Clayton0fa51242011-07-19 03:57:15 +0000826 }
827 }
828 break;
829
Greg Clayton7b139222011-07-21 01:12:01 +0000830 case KDP_READMEM:
831 case KDP_READMEM64:
Greg Clayton0fa51242011-07-19 03:57:15 +0000832 {
833 const uint32_t error = packet.GetU32 (&offset);
Greg Claytonec15f502011-07-20 01:32:50 +0000834 const uint32_t count = packet.GetByteSize() - offset;
Greg Clayton1bc04ed2011-07-29 22:26:36 +0000835 s.Printf(" (error = 0x%8.8x:\n", error);
Greg Clayton0fa51242011-07-19 03:57:15 +0000836 if (count > 0)
Greg Clayton234981a2011-07-20 03:41:06 +0000837 packet.Dump (&s, // Stream to dump to
838 offset, // Offset within "packet"
839 eFormatBytesWithASCII, // Format to use
840 1, // Size of each item in bytes
841 count, // Number of items
842 16, // Number per line
843 m_last_read_memory_addr, // Don't show addresses before each line
844 0, 0); // No bitfields
Greg Clayton0fa51242011-07-19 03:57:15 +0000845 }
846 break;
847
Greg Clayton7b139222011-07-21 01:12:01 +0000848 case KDP_READREGS:
Greg Claytonec15f502011-07-20 01:32:50 +0000849 {
850 const uint32_t error = packet.GetU32 (&offset);
851 const uint32_t count = packet.GetByteSize() - offset;
Greg Clayton1bc04ed2011-07-29 22:26:36 +0000852 s.Printf(" (error = 0x%8.8x regs:\n", error);
Greg Claytonec15f502011-07-20 01:32:50 +0000853 if (count > 0)
854 packet.Dump (&s, // Stream to dump to
855 offset, // Offset within "packet"
856 eFormatHex, // Format to use
857 m_addr_byte_size, // Size of each item in bytes
858 count / m_addr_byte_size, // Number of items
859 16 / m_addr_byte_size, // Number per line
860 LLDB_INVALID_ADDRESS, // Don't show addresses before each line
861 0, 0); // No bitfields
862 }
863 break;
864
Greg Clayton7b139222011-07-21 01:12:01 +0000865 case KDP_KERNELVERSION:
Greg Clayton234981a2011-07-20 03:41:06 +0000866 {
867 const char *kernel_version = packet.PeekCStr(8);
868 s.Printf(" (version = \"%s\")", kernel_version);
869 }
870 break;
871
Greg Clayton7b139222011-07-21 01:12:01 +0000872 case KDP_MAXBYTES:
Greg Clayton234981a2011-07-20 03:41:06 +0000873 {
874 const uint32_t max_bytes = packet.GetU32 (&offset);
875 s.Printf(" (max_bytes = 0x%8.8x (%u))", max_bytes, max_bytes);
876 }
877 break;
Greg Clayton7b139222011-07-21 01:12:01 +0000878 case KDP_IMAGEPATH:
Greg Clayton234981a2011-07-20 03:41:06 +0000879 {
880 const char *path = packet.GetCStr(&offset);
881 s.Printf(" (path = \"%s\")", path);
882 }
883 break;
884 default:
Greg Claytonec15f502011-07-20 01:32:50 +0000885 s.Printf(" (add support for dumping this packet reply!!!");
Greg Clayton0fa51242011-07-19 03:57:15 +0000886 break;
887
888 }
889 }
890 else
891 {
892 // Dump request packets
893 switch (command)
894 {
Greg Clayton7b139222011-07-21 01:12:01 +0000895 case KDP_CONNECT:
Greg Clayton0fa51242011-07-19 03:57:15 +0000896 {
897 const uint16_t reply_port = packet.GetU16 (&offset);
898 const uint16_t exc_port = packet.GetU16 (&offset);
Greg Clayton1bc04ed2011-07-29 22:26:36 +0000899 s.Printf(" (reply_port = %u, exc_port = %u, greeting = \"%s\")", reply_port, exc_port, packet.GetCStr(&offset));
Greg Clayton0fa51242011-07-19 03:57:15 +0000900 }
901 break;
902
Greg Clayton7b139222011-07-21 01:12:01 +0000903 case KDP_DISCONNECT:
904 case KDP_HOSTREBOOT:
905 case KDP_HOSTINFO:
906 case KDP_VERSION:
907 case KDP_REGIONS:
908 case KDP_KERNELVERSION:
909 case KDP_MAXBYTES:
910 case KDP_IMAGEPATH:
911 case KDP_SUSPEND:
Greg Clayton0fa51242011-07-19 03:57:15 +0000912 // No args, just the header in the request...
Greg Clayton234981a2011-07-20 03:41:06 +0000913 s.PutCString(" ()");
914 break;
915
Greg Clayton7b139222011-07-21 01:12:01 +0000916 case KDP_RESUMECPUS:
Greg Clayton234981a2011-07-20 03:41:06 +0000917 {
918 const uint32_t cpu_mask = packet.GetU32 (&offset);
919 s.Printf(" (cpu_mask = 0x%8.8x)", cpu_mask);
920 }
Greg Clayton0fa51242011-07-19 03:57:15 +0000921 break;
922
Greg Clayton7b139222011-07-21 01:12:01 +0000923 case KDP_READMEM:
Greg Clayton0fa51242011-07-19 03:57:15 +0000924 {
925 const uint32_t addr = packet.GetU32 (&offset);
926 const uint32_t size = packet.GetU32 (&offset);
Greg Clayton1bc04ed2011-07-29 22:26:36 +0000927 s.Printf(" (addr = 0x%8.8x, size = %u)", addr, size);
Greg Clayton234981a2011-07-20 03:41:06 +0000928 m_last_read_memory_addr = addr;
Greg Clayton0fa51242011-07-19 03:57:15 +0000929 }
930 break;
931
Greg Clayton7b139222011-07-21 01:12:01 +0000932 case KDP_WRITEMEM:
Greg Claytonec15f502011-07-20 01:32:50 +0000933 {
934 const uint32_t addr = packet.GetU32 (&offset);
935 const uint32_t size = packet.GetU32 (&offset);
Greg Clayton1bc04ed2011-07-29 22:26:36 +0000936 s.Printf(" (addr = 0x%8.8x, size = %u, bytes = \n", addr, size);
Greg Claytonec15f502011-07-20 01:32:50 +0000937 if (size > 0)
938 DataExtractor::DumpHexBytes(&s, packet.GetData(&offset, size), size, 32, addr);
939 }
940 break;
941
Greg Clayton7b139222011-07-21 01:12:01 +0000942 case KDP_READMEM64:
Greg Clayton0fa51242011-07-19 03:57:15 +0000943 {
944 const uint64_t addr = packet.GetU64 (&offset);
945 const uint32_t size = packet.GetU32 (&offset);
Greg Clayton1bc04ed2011-07-29 22:26:36 +0000946 s.Printf(" (addr = 0x%16.16llx, size = %u)", addr, size);
Greg Clayton234981a2011-07-20 03:41:06 +0000947 m_last_read_memory_addr = addr;
Greg Clayton0fa51242011-07-19 03:57:15 +0000948 }
949 break;
950
Greg Clayton7b139222011-07-21 01:12:01 +0000951 case KDP_WRITEMEM64:
Greg Claytonec15f502011-07-20 01:32:50 +0000952 {
953 const uint64_t addr = packet.GetU64 (&offset);
954 const uint32_t size = packet.GetU32 (&offset);
Greg Clayton1bc04ed2011-07-29 22:26:36 +0000955 s.Printf(" (addr = 0x%16.16llx, size = %u, bytes = \n", addr, size);
Greg Claytonec15f502011-07-20 01:32:50 +0000956 if (size > 0)
957 DataExtractor::DumpHexBytes(&s, packet.GetData(&offset, size), size, 32, addr);
958 }
959 break;
960
Greg Clayton7b139222011-07-21 01:12:01 +0000961 case KDP_READREGS:
Greg Clayton0fa51242011-07-19 03:57:15 +0000962 {
963 const uint32_t cpu = packet.GetU32 (&offset);
964 const uint32_t flavor = packet.GetU32 (&offset);
Greg Clayton1bc04ed2011-07-29 22:26:36 +0000965 s.Printf(" (cpu = %u, flavor = %u)", cpu, flavor);
Greg Clayton0fa51242011-07-19 03:57:15 +0000966 }
967 break;
968
Greg Clayton7b139222011-07-21 01:12:01 +0000969 case KDP_WRITEREGS:
Greg Claytonec15f502011-07-20 01:32:50 +0000970 {
971 const uint32_t cpu = packet.GetU32 (&offset);
972 const uint32_t flavor = packet.GetU32 (&offset);
973 const uint32_t nbytes = packet.GetByteSize() - offset;
Greg Clayton1bc04ed2011-07-29 22:26:36 +0000974 s.Printf(" (cpu = %u, flavor = %u, regs = \n", cpu, flavor);
Greg Claytonec15f502011-07-20 01:32:50 +0000975 if (nbytes > 0)
976 packet.Dump (&s, // Stream to dump to
977 offset, // Offset within "packet"
978 eFormatHex, // Format to use
979 m_addr_byte_size, // Size of each item in bytes
980 nbytes / m_addr_byte_size, // Number of items
981 16 / m_addr_byte_size, // Number per line
982 LLDB_INVALID_ADDRESS, // Don't show addresses before each line
983 0, 0); // No bitfields
984 }
985 break;
986
Greg Claytonec15f502011-07-20 01:32:50 +0000987
Greg Clayton7b139222011-07-21 01:12:01 +0000988 case KDP_BREAKPOINT_SET:
989 case KDP_BREAKPOINT_REMOVE:
Greg Clayton234981a2011-07-20 03:41:06 +0000990 {
991 const uint32_t addr = packet.GetU32 (&offset);
992 s.Printf(" (addr = 0x%8.8x)", addr);
993 }
994 break;
995
Greg Clayton7b139222011-07-21 01:12:01 +0000996 case KDP_BREAKPOINT_SET64:
997 case KDP_BREAKPOINT_REMOVE64:
Greg Clayton234981a2011-07-20 03:41:06 +0000998 {
999 const uint64_t addr = packet.GetU64 (&offset);
1000 s.Printf(" (addr = 0x%16.16llx)", addr);
1001 }
1002 break;
1003
1004
Greg Clayton7b139222011-07-21 01:12:01 +00001005 case KDP_LOAD:
Greg Clayton234981a2011-07-20 03:41:06 +00001006 {
1007 const char *path = packet.GetCStr(&offset);
1008 s.Printf(" (path = \"%s\")", path);
1009 }
1010 break;
1011
Greg Clayton7b139222011-07-21 01:12:01 +00001012 case KDP_EXCEPTION:
Greg Clayton234981a2011-07-20 03:41:06 +00001013 {
1014 const uint32_t count = packet.GetU32 (&offset);
1015
Greg Clayton234981a2011-07-20 03:41:06 +00001016 for (uint32_t i=0; i<count; ++i)
1017 {
1018 const uint32_t cpu = packet.GetU32 (&offset);
1019 const uint32_t exc = packet.GetU32 (&offset);
1020 const uint32_t code = packet.GetU32 (&offset);
1021 const uint32_t subcode = packet.GetU32 (&offset);
1022 const char *exc_cstr = NULL;
1023 switch (exc)
1024 {
1025 case 1: exc_cstr = "EXC_BAD_ACCESS"; break;
1026 case 2: exc_cstr = "EXC_BAD_INSTRUCTION"; break;
1027 case 3: exc_cstr = "EXC_ARITHMETIC"; break;
1028 case 4: exc_cstr = "EXC_EMULATION"; break;
1029 case 5: exc_cstr = "EXC_SOFTWARE"; break;
1030 case 6: exc_cstr = "EXC_BREAKPOINT"; break;
1031 case 7: exc_cstr = "EXC_SYSCALL"; break;
1032 case 8: exc_cstr = "EXC_MACH_SYSCALL"; break;
1033 case 9: exc_cstr = "EXC_RPC_ALERT"; break;
1034 case 10: exc_cstr = "EXC_CRASH"; break;
1035 default:
1036 break;
1037 }
1038
Greg Clayton3acaa922012-09-25 02:40:06 +00001039 s.Printf ("{ cpu = 0x%8.8x, exc = %s (%u), code = %u (0x%8.8x), subcode = %u (0x%8.8x)} ",
Greg Clayton234981a2011-07-20 03:41:06 +00001040 cpu, exc_cstr, exc, code, code, subcode, subcode);
1041 }
1042 }
1043 break;
1044
Greg Clayton7b139222011-07-21 01:12:01 +00001045 case KDP_TERMINATION:
Greg Clayton234981a2011-07-20 03:41:06 +00001046 {
1047 const uint32_t term_code = packet.GetU32 (&offset);
1048 const uint32_t exit_code = packet.GetU32 (&offset);
1049 s.Printf(" (term_code = 0x%8.8x (%u), exit_code = 0x%8.8x (%u))", term_code, term_code, exit_code, exit_code);
1050 }
Greg Clayton0fa51242011-07-19 03:57:15 +00001051 break;
1052
Greg Clayton7b139222011-07-21 01:12:01 +00001053 case KDP_REATTACH:
Greg Clayton0fa51242011-07-19 03:57:15 +00001054 {
1055 const uint16_t reply_port = packet.GetU16 (&offset);
Greg Clayton1bc04ed2011-07-29 22:26:36 +00001056 s.Printf(" (reply_port = %u)", reply_port);
Greg Clayton0fa51242011-07-19 03:57:15 +00001057 }
1058 break;
Greg Clayton0fa51242011-07-19 03:57:15 +00001059 }
1060 }
1061 }
1062 else
1063 {
1064 error_desc = "error: invalid packet command: ";
1065 }
1066 }
1067
1068 if (error_desc)
1069 {
1070 s.PutCString (error_desc);
1071
1072 packet.Dump (&s, // Stream to dump to
1073 0, // Offset into "packet"
1074 eFormatBytes, // Dump as hex bytes
1075 1, // Size of each item is 1 for single bytes
1076 packet.GetByteSize(), // Number of bytes
1077 UINT32_MAX, // Num bytes per line
1078 LLDB_INVALID_ADDRESS, // Base address
1079 0, 0); // Bitfield info set to not do anything bitfield related
1080 }
1081}
1082
1083uint32_t
1084CommunicationKDP::SendRequestReadRegisters (uint32_t cpu,
1085 uint32_t flavor,
Greg Claytonea636012012-09-21 01:55:30 +00001086 void *dst,
Greg Clayton0fa51242011-07-19 03:57:15 +00001087 uint32_t dst_len,
1088 Error &error)
1089{
1090 PacketStreamType request_packet (Stream::eBinary, m_addr_byte_size, m_byte_order);
Greg Clayton7b139222011-07-21 01:12:01 +00001091 const CommandType command = KDP_READREGS;
Greg Clayton0fa51242011-07-19 03:57:15 +00001092 // Size is header + 4 byte cpu and 4 byte flavor
1093 const uint32_t command_length = 8 + 4 + 4;
1094 const uint32_t request_sequence_id = m_request_sequence_id;
1095 MakeRequestPacketHeader (command, request_packet, command_length);
1096 request_packet.PutHex32 (cpu);
1097 request_packet.PutHex32 (flavor);
1098 DataExtractor reply_packet;
1099 if (SendRequestAndGetReply (command, request_sequence_id, request_packet, reply_packet))
1100 {
Greg Clayton0fa51242011-07-19 03:57:15 +00001101 uint32_t offset = 8;
1102 uint32_t kdp_error = reply_packet.GetU32 (&offset);
1103 uint32_t src_len = reply_packet.GetByteSize() - 12;
1104
1105 if (src_len > 0)
1106 {
1107 const uint32_t bytes_to_copy = std::min<uint32_t>(src_len, dst_len);
1108 const void *src = reply_packet.GetData(&offset, bytes_to_copy);
1109 if (src)
1110 {
1111 ::memcpy (dst, src, bytes_to_copy);
1112 error.Clear();
1113 // Return the number of bytes we could have returned regardless if
1114 // we copied them or not, just so we know when things don't match up
Greg Claytonea636012012-09-21 01:55:30 +00001115 return src_len;
Greg Clayton0fa51242011-07-19 03:57:15 +00001116 }
1117 }
1118 if (kdp_error)
1119 error.SetErrorStringWithFormat("failed to read kdp registers for cpu %u flavor %u (error %u)", cpu, flavor, kdp_error);
1120 else
1121 error.SetErrorStringWithFormat("failed to read kdp registers for cpu %u flavor %u", cpu, flavor);
1122 }
1123 return 0;
1124}
1125
Greg Claytonea636012012-09-21 01:55:30 +00001126uint32_t
1127CommunicationKDP::SendRequestWriteRegisters (uint32_t cpu,
1128 uint32_t flavor,
1129 const void *src,
1130 uint32_t src_len,
1131 Error &error)
1132{
1133 PacketStreamType request_packet (Stream::eBinary, m_addr_byte_size, m_byte_order);
1134 const CommandType command = KDP_WRITEREGS;
1135 // Size is header + 4 byte cpu and 4 byte flavor
Greg Clayton3acaa922012-09-25 02:40:06 +00001136 const uint32_t command_length = 8 + 4 + 4 + src_len;
Greg Claytonea636012012-09-21 01:55:30 +00001137 const uint32_t request_sequence_id = m_request_sequence_id;
1138 MakeRequestPacketHeader (command, request_packet, command_length);
1139 request_packet.PutHex32 (cpu);
1140 request_packet.PutHex32 (flavor);
1141 request_packet.Write(src, src_len);
1142 DataExtractor reply_packet;
1143 if (SendRequestAndGetReply (command, request_sequence_id, request_packet, reply_packet))
1144 {
1145 uint32_t offset = 8;
1146 uint32_t kdp_error = reply_packet.GetU32 (&offset);
1147 if (kdp_error == 0)
1148 return src_len;
1149 error.SetErrorStringWithFormat("failed to read kdp registers for cpu %u flavor %u (error %u)", cpu, flavor, kdp_error);
1150 }
1151 return 0;
1152}
1153
Greg Clayton234981a2011-07-20 03:41:06 +00001154
1155bool
Greg Clayton3acaa922012-09-25 02:40:06 +00001156CommunicationKDP::SendRequestResume ()
Greg Clayton234981a2011-07-20 03:41:06 +00001157{
Greg Clayton234981a2011-07-20 03:41:06 +00001158 PacketStreamType request_packet (Stream::eBinary, m_addr_byte_size, m_byte_order);
Greg Clayton7b139222011-07-21 01:12:01 +00001159 const CommandType command = KDP_RESUMECPUS;
Greg Clayton234981a2011-07-20 03:41:06 +00001160 const uint32_t command_length = 12;
1161 const uint32_t request_sequence_id = m_request_sequence_id;
1162 MakeRequestPacketHeader (command, request_packet, command_length);
Greg Clayton3acaa922012-09-25 02:40:06 +00001163 request_packet.PutHex32(GetCPUMask());
Greg Clayton234981a2011-07-20 03:41:06 +00001164
1165 DataExtractor reply_packet;
1166 if (SendRequestAndGetReply (command, request_sequence_id, request_packet, reply_packet))
1167 return true;
1168 return false;
1169}
1170
1171bool
1172CommunicationKDP::SendRequestBreakpoint (bool set, addr_t addr)
1173{
1174 PacketStreamType request_packet (Stream::eBinary, m_addr_byte_size, m_byte_order);
1175 bool use_64 = (GetVersion() >= 11);
1176 uint32_t command_addr_byte_size = use_64 ? 8 : 4;
Greg Clayton7b139222011-07-21 01:12:01 +00001177 const CommandType command = set ? (use_64 ? KDP_BREAKPOINT_SET64 : KDP_BREAKPOINT_SET ):
1178 (use_64 ? KDP_BREAKPOINT_REMOVE64 : KDP_BREAKPOINT_REMOVE);
Greg Clayton234981a2011-07-20 03:41:06 +00001179
1180 const uint32_t command_length = 8 + command_addr_byte_size;
1181 const uint32_t request_sequence_id = m_request_sequence_id;
1182 MakeRequestPacketHeader (command, request_packet, command_length);
1183 request_packet.PutMaxHex64 (addr, command_addr_byte_size);
1184
1185 DataExtractor reply_packet;
1186 if (SendRequestAndGetReply (command, request_sequence_id, request_packet, reply_packet))
Greg Clayton1bc04ed2011-07-29 22:26:36 +00001187 {
1188 uint32_t offset = 8;
1189 uint32_t kdp_error = reply_packet.GetU32 (&offset);
1190 if (kdp_error == 0)
1191 return true;
1192 }
Greg Clayton234981a2011-07-20 03:41:06 +00001193 return false;
1194}
1195
1196bool
1197CommunicationKDP::SendRequestSuspend ()
1198{
1199 PacketStreamType request_packet (Stream::eBinary, m_addr_byte_size, m_byte_order);
Greg Clayton7b139222011-07-21 01:12:01 +00001200 const CommandType command = KDP_SUSPEND;
Greg Clayton234981a2011-07-20 03:41:06 +00001201 const uint32_t command_length = 8;
1202 const uint32_t request_sequence_id = m_request_sequence_id;
1203 MakeRequestPacketHeader (command, request_packet, command_length);
1204 DataExtractor reply_packet;
1205 if (SendRequestAndGetReply (command, request_sequence_id, request_packet, reply_packet))
1206 return true;
1207 return false;
1208}
1209