blob: df95542d2c0fe65c25a2b63b579e2379c6757469 [file] [log] [blame]
Greg Clayton576d8832011-03-22 04:00:09 +00001//===-- GDBRemoteCommunicationServer.cpp ------------------------*- C++ -*-===//
2//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9
Sylvestre Ledrud28b9932013-09-28 15:23:41 +000010#include <errno.h>
Greg Clayton576d8832011-03-22 04:00:09 +000011
12#include "GDBRemoteCommunicationServer.h"
Daniel Maleae0f8f572013-08-26 23:57:52 +000013#include "lldb/Core/StreamGDBRemote.h"
Greg Clayton576d8832011-03-22 04:00:09 +000014
15// C Includes
16// C++ Includes
17// Other libraries and framework includes
18#include "llvm/ADT/Triple.h"
19#include "lldb/Interpreter/Args.h"
20#include "lldb/Core/ConnectionFileDescriptor.h"
21#include "lldb/Core/Log.h"
22#include "lldb/Core/State.h"
23#include "lldb/Core/StreamString.h"
Enrico Granataf2bbf712011-07-15 02:26:42 +000024#include "lldb/Host/Endian.h"
Daniel Maleae0f8f572013-08-26 23:57:52 +000025#include "lldb/Host/File.h"
Greg Clayton576d8832011-03-22 04:00:09 +000026#include "lldb/Host/Host.h"
27#include "lldb/Host/TimeValue.h"
Todd Fialab8b49ec2014-01-28 00:34:23 +000028#include "lldb/Target/Platform.h"
Greg Clayton8b82f082011-04-12 05:54:46 +000029#include "lldb/Target/Process.h"
Greg Clayton576d8832011-03-22 04:00:09 +000030
31// Project includes
32#include "Utility/StringExtractorGDBRemote.h"
33#include "ProcessGDBRemote.h"
34#include "ProcessGDBRemoteLog.h"
35
36using namespace lldb;
37using namespace lldb_private;
38
39//----------------------------------------------------------------------
40// GDBRemoteCommunicationServer constructor
41//----------------------------------------------------------------------
Greg Clayton8b82f082011-04-12 05:54:46 +000042GDBRemoteCommunicationServer::GDBRemoteCommunicationServer(bool is_platform) :
43 GDBRemoteCommunication ("gdb-remote.server", "gdb-remote.server.rx_packet", is_platform),
Todd Fialab8b49ec2014-01-28 00:34:23 +000044 m_platform_sp (Platform::GetDefaultPlatform ()),
Greg Clayton8b82f082011-04-12 05:54:46 +000045 m_async_thread (LLDB_INVALID_HOST_THREAD),
46 m_process_launch_info (),
47 m_process_launch_error (),
Daniel Maleae0f8f572013-08-26 23:57:52 +000048 m_spawned_pids (),
49 m_spawned_pids_mutex (Mutex::eMutexTypeRecursive),
Greg Clayton8b82f082011-04-12 05:54:46 +000050 m_proc_infos (),
51 m_proc_infos_index (0),
Greg Clayton2b98c562013-11-22 18:53:12 +000052 m_port_map (),
53 m_port_offset(0)
Greg Clayton576d8832011-03-22 04:00:09 +000054{
55}
56
Todd Fialab8b49ec2014-01-28 00:34:23 +000057GDBRemoteCommunicationServer::GDBRemoteCommunicationServer(bool is_platform,
58 const lldb::PlatformSP& platform_sp) :
59 GDBRemoteCommunication ("gdb-remote.server", "gdb-remote.server.rx_packet", is_platform),
60 m_platform_sp (platform_sp),
61 m_async_thread (LLDB_INVALID_HOST_THREAD),
62 m_process_launch_info (),
63 m_process_launch_error (),
64 m_spawned_pids (),
65 m_spawned_pids_mutex (Mutex::eMutexTypeRecursive),
66 m_proc_infos (),
67 m_proc_infos_index (0),
68 m_port_map (),
69 m_port_offset(0)
70{
71 assert(platform_sp);
72}
73
Greg Clayton576d8832011-03-22 04:00:09 +000074//----------------------------------------------------------------------
75// Destructor
76//----------------------------------------------------------------------
77GDBRemoteCommunicationServer::~GDBRemoteCommunicationServer()
78{
79}
80
81
82//void *
83//GDBRemoteCommunicationServer::AsyncThread (void *arg)
84//{
85// GDBRemoteCommunicationServer *server = (GDBRemoteCommunicationServer*) arg;
86//
Greg Clayton5160ce52013-03-27 23:08:40 +000087// Log *log;// (ProcessGDBRemoteLog::GetLogIfAllCategoriesSet (GDBR_LOG_PROCESS));
Greg Clayton576d8832011-03-22 04:00:09 +000088// if (log)
89// log->Printf ("ProcessGDBRemote::%s (arg = %p, pid = %i) thread starting...", __FUNCTION__, arg, process->GetID());
90//
91// StringExtractorGDBRemote packet;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +000092//
Greg Clayton576d8832011-03-22 04:00:09 +000093// while ()
94// {
95// if (packet.
96// }
97//
98// if (log)
99// log->Printf ("ProcessGDBRemote::%s (arg = %p, pid = %i) thread exiting...", __FUNCTION__, arg, process->GetID());
100//
101// process->m_async_thread = LLDB_INVALID_HOST_THREAD;
102// return NULL;
103//}
104//
105bool
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000106GDBRemoteCommunicationServer::GetPacketAndSendResponse (uint32_t timeout_usec,
Greg Clayton1cb64962011-03-24 04:28:38 +0000107 Error &error,
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000108 bool &interrupt,
Greg Claytond314e812011-03-23 00:09:55 +0000109 bool &quit)
Greg Clayton576d8832011-03-22 04:00:09 +0000110{
111 StringExtractorGDBRemote packet;
Greg Clayton3dedae12013-12-06 21:45:27 +0000112 PacketResult packet_result = WaitForPacketWithTimeoutMicroSecondsNoLock (packet, timeout_usec);
113 if (packet_result == PacketResult::Success)
Greg Clayton576d8832011-03-22 04:00:09 +0000114 {
115 const StringExtractorGDBRemote::ServerPacketType packet_type = packet.GetServerPacketType ();
116 switch (packet_type)
117 {
Greg Clayton3dedae12013-12-06 21:45:27 +0000118 case StringExtractorGDBRemote::eServerPacketType_nack:
119 case StringExtractorGDBRemote::eServerPacketType_ack:
120 break;
Greg Clayton576d8832011-03-22 04:00:09 +0000121
Greg Clayton3dedae12013-12-06 21:45:27 +0000122 case StringExtractorGDBRemote::eServerPacketType_invalid:
123 error.SetErrorString("invalid packet");
124 quit = true;
125 break;
Greg Claytond314e812011-03-23 00:09:55 +0000126
Greg Clayton3dedae12013-12-06 21:45:27 +0000127 case StringExtractorGDBRemote::eServerPacketType_interrupt:
128 error.SetErrorString("interrupt received");
129 interrupt = true;
130 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000131
Greg Clayton3dedae12013-12-06 21:45:27 +0000132 default:
133 case StringExtractorGDBRemote::eServerPacketType_unimplemented:
134 packet_result = SendUnimplementedResponse (packet.GetStringRef().c_str());
135 break;
Greg Clayton576d8832011-03-22 04:00:09 +0000136
Greg Clayton3dedae12013-12-06 21:45:27 +0000137 case StringExtractorGDBRemote::eServerPacketType_A:
138 packet_result = Handle_A (packet);
139 break;
Greg Clayton32e0a752011-03-30 18:16:51 +0000140
Greg Clayton3dedae12013-12-06 21:45:27 +0000141 case StringExtractorGDBRemote::eServerPacketType_qfProcessInfo:
142 packet_result = Handle_qfProcessInfo (packet);
143 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000144
Greg Clayton3dedae12013-12-06 21:45:27 +0000145 case StringExtractorGDBRemote::eServerPacketType_qsProcessInfo:
146 packet_result = Handle_qsProcessInfo (packet);
147 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000148
Greg Clayton3dedae12013-12-06 21:45:27 +0000149 case StringExtractorGDBRemote::eServerPacketType_qC:
150 packet_result = Handle_qC (packet);
151 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000152
Greg Clayton3dedae12013-12-06 21:45:27 +0000153 case StringExtractorGDBRemote::eServerPacketType_qHostInfo:
154 packet_result = Handle_qHostInfo (packet);
155 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000156
Greg Clayton3dedae12013-12-06 21:45:27 +0000157 case StringExtractorGDBRemote::eServerPacketType_qLaunchGDBServer:
158 packet_result = Handle_qLaunchGDBServer (packet);
159 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000160
Greg Clayton3dedae12013-12-06 21:45:27 +0000161 case StringExtractorGDBRemote::eServerPacketType_qKillSpawnedProcess:
162 packet_result = Handle_qKillSpawnedProcess (packet);
163 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000164
Todd Fiala403edc52014-01-23 22:05:44 +0000165 case StringExtractorGDBRemote::eServerPacketType_k:
166 packet_result = Handle_k (packet);
167 break;
168
Greg Clayton3dedae12013-12-06 21:45:27 +0000169 case StringExtractorGDBRemote::eServerPacketType_qLaunchSuccess:
170 packet_result = Handle_qLaunchSuccess (packet);
171 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000172
Greg Clayton3dedae12013-12-06 21:45:27 +0000173 case StringExtractorGDBRemote::eServerPacketType_qGroupName:
174 packet_result = Handle_qGroupName (packet);
175 break;
Greg Clayton32e0a752011-03-30 18:16:51 +0000176
Greg Clayton3dedae12013-12-06 21:45:27 +0000177 case StringExtractorGDBRemote::eServerPacketType_qProcessInfoPID:
178 packet_result = Handle_qProcessInfoPID (packet);
179 break;
Greg Clayton32e0a752011-03-30 18:16:51 +0000180
Greg Clayton3dedae12013-12-06 21:45:27 +0000181 case StringExtractorGDBRemote::eServerPacketType_qSpeedTest:
182 packet_result = Handle_qSpeedTest (packet);
183 break;
Greg Clayton32e0a752011-03-30 18:16:51 +0000184
Greg Clayton3dedae12013-12-06 21:45:27 +0000185 case StringExtractorGDBRemote::eServerPacketType_qUserName:
186 packet_result = Handle_qUserName (packet);
187 break;
Greg Clayton32e0a752011-03-30 18:16:51 +0000188
Greg Clayton3dedae12013-12-06 21:45:27 +0000189 case StringExtractorGDBRemote::eServerPacketType_qGetWorkingDir:
190 packet_result = Handle_qGetWorkingDir(packet);
191 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000192
Greg Clayton3dedae12013-12-06 21:45:27 +0000193 case StringExtractorGDBRemote::eServerPacketType_QEnvironment:
194 packet_result = Handle_QEnvironment (packet);
195 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000196
Greg Clayton3dedae12013-12-06 21:45:27 +0000197 case StringExtractorGDBRemote::eServerPacketType_QLaunchArch:
198 packet_result = Handle_QLaunchArch (packet);
199 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000200
Greg Clayton3dedae12013-12-06 21:45:27 +0000201 case StringExtractorGDBRemote::eServerPacketType_QSetDisableASLR:
202 packet_result = Handle_QSetDisableASLR (packet);
203 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000204
Greg Clayton3dedae12013-12-06 21:45:27 +0000205 case StringExtractorGDBRemote::eServerPacketType_QSetSTDIN:
206 packet_result = Handle_QSetSTDIN (packet);
207 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000208
Greg Clayton3dedae12013-12-06 21:45:27 +0000209 case StringExtractorGDBRemote::eServerPacketType_QSetSTDOUT:
210 packet_result = Handle_QSetSTDOUT (packet);
211 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000212
Greg Clayton3dedae12013-12-06 21:45:27 +0000213 case StringExtractorGDBRemote::eServerPacketType_QSetSTDERR:
214 packet_result = Handle_QSetSTDERR (packet);
215 break;
Greg Clayton8b82f082011-04-12 05:54:46 +0000216
Greg Clayton3dedae12013-12-06 21:45:27 +0000217 case StringExtractorGDBRemote::eServerPacketType_QSetWorkingDir:
218 packet_result = Handle_QSetWorkingDir (packet);
219 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000220
Greg Clayton3dedae12013-12-06 21:45:27 +0000221 case StringExtractorGDBRemote::eServerPacketType_QStartNoAckMode:
222 packet_result = Handle_QStartNoAckMode (packet);
223 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000224
Greg Clayton3dedae12013-12-06 21:45:27 +0000225 case StringExtractorGDBRemote::eServerPacketType_qPlatform_mkdir:
226 packet_result = Handle_qPlatform_mkdir (packet);
227 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000228
Greg Clayton3dedae12013-12-06 21:45:27 +0000229 case StringExtractorGDBRemote::eServerPacketType_qPlatform_chmod:
230 packet_result = Handle_qPlatform_chmod (packet);
231 break;
Greg Claytonfbb76342013-11-20 21:07:01 +0000232
Greg Clayton3dedae12013-12-06 21:45:27 +0000233 case StringExtractorGDBRemote::eServerPacketType_qPlatform_shell:
234 packet_result = Handle_qPlatform_shell (packet);
235 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000236
Greg Clayton3dedae12013-12-06 21:45:27 +0000237 case StringExtractorGDBRemote::eServerPacketType_vFile_open:
238 packet_result = Handle_vFile_Open (packet);
239 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000240
Greg Clayton3dedae12013-12-06 21:45:27 +0000241 case StringExtractorGDBRemote::eServerPacketType_vFile_close:
242 packet_result = Handle_vFile_Close (packet);
243 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000244
Greg Clayton3dedae12013-12-06 21:45:27 +0000245 case StringExtractorGDBRemote::eServerPacketType_vFile_pread:
246 packet_result = Handle_vFile_pRead (packet);
247 break;
Daniel Maleae0f8f572013-08-26 23:57:52 +0000248
Greg Clayton3dedae12013-12-06 21:45:27 +0000249 case StringExtractorGDBRemote::eServerPacketType_vFile_pwrite:
250 packet_result = Handle_vFile_pWrite (packet);
251 break;
Daniel Maleae0f8f572013-08-26 23:57:52 +0000252
Greg Clayton3dedae12013-12-06 21:45:27 +0000253 case StringExtractorGDBRemote::eServerPacketType_vFile_size:
254 packet_result = Handle_vFile_Size (packet);
255 break;
Daniel Maleae0f8f572013-08-26 23:57:52 +0000256
Greg Clayton3dedae12013-12-06 21:45:27 +0000257 case StringExtractorGDBRemote::eServerPacketType_vFile_mode:
258 packet_result = Handle_vFile_Mode (packet);
259 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000260
Greg Clayton3dedae12013-12-06 21:45:27 +0000261 case StringExtractorGDBRemote::eServerPacketType_vFile_exists:
262 packet_result = Handle_vFile_Exists (packet);
263 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000264
Greg Clayton3dedae12013-12-06 21:45:27 +0000265 case StringExtractorGDBRemote::eServerPacketType_vFile_stat:
266 packet_result = Handle_vFile_Stat (packet);
267 break;
Greg Claytonfbb76342013-11-20 21:07:01 +0000268
Greg Clayton3dedae12013-12-06 21:45:27 +0000269 case StringExtractorGDBRemote::eServerPacketType_vFile_md5:
270 packet_result = Handle_vFile_MD5 (packet);
271 break;
272
273 case StringExtractorGDBRemote::eServerPacketType_vFile_symlink:
274 packet_result = Handle_vFile_symlink (packet);
275 break;
276
277 case StringExtractorGDBRemote::eServerPacketType_vFile_unlink:
278 packet_result = Handle_vFile_unlink (packet);
279 break;
Greg Clayton576d8832011-03-22 04:00:09 +0000280 }
Greg Clayton576d8832011-03-22 04:00:09 +0000281 }
Greg Clayton1cb64962011-03-24 04:28:38 +0000282 else
283 {
284 if (!IsConnected())
Greg Clayton3dedae12013-12-06 21:45:27 +0000285 {
Greg Clayton1cb64962011-03-24 04:28:38 +0000286 error.SetErrorString("lost connection");
Greg Clayton3dedae12013-12-06 21:45:27 +0000287 quit = true;
288 }
Greg Clayton1cb64962011-03-24 04:28:38 +0000289 else
Greg Clayton3dedae12013-12-06 21:45:27 +0000290 {
Greg Clayton1cb64962011-03-24 04:28:38 +0000291 error.SetErrorString("timeout");
Greg Clayton3dedae12013-12-06 21:45:27 +0000292 }
Greg Clayton1cb64962011-03-24 04:28:38 +0000293 }
Greg Clayton3dedae12013-12-06 21:45:27 +0000294 return packet_result == PacketResult::Success;
Greg Clayton576d8832011-03-22 04:00:09 +0000295}
296
Todd Fiala403edc52014-01-23 22:05:44 +0000297lldb_private::Error
Todd Fiala3e92a2b2014-01-24 00:52:53 +0000298GDBRemoteCommunicationServer::SetLaunchArguments (const char *const args[], int argc)
Todd Fiala403edc52014-01-23 22:05:44 +0000299{
300 if ((argc < 1) || !args || !args[0] || !args[0][0])
Todd Fiala3e92a2b2014-01-24 00:52:53 +0000301 return lldb_private::Error ("%s: no process command line specified to launch", __FUNCTION__);
Todd Fiala403edc52014-01-23 22:05:44 +0000302
Todd Fiala403edc52014-01-23 22:05:44 +0000303 m_process_launch_info.SetArguments (const_cast<const char**> (args), true);
Todd Fiala3e92a2b2014-01-24 00:52:53 +0000304 return lldb_private::Error ();
305}
306
307lldb_private::Error
308GDBRemoteCommunicationServer::SetLaunchFlags (unsigned int launch_flags)
309{
Todd Fiala403edc52014-01-23 22:05:44 +0000310 m_process_launch_info.GetFlags ().Set (launch_flags);
Todd Fiala3e92a2b2014-01-24 00:52:53 +0000311 return lldb_private::Error ();
312}
313
314lldb_private::Error
315GDBRemoteCommunicationServer::LaunchProcess ()
316{
317 if (!m_process_launch_info.GetArguments ().GetArgumentCount ())
318 return lldb_private::Error ("%s: no process command line specified to launch", __FUNCTION__);
319
320 // specify the process monitor if not already set. This should
321 // generally be what happens since we need to reap started
322 // processes.
323 if (!m_process_launch_info.GetMonitorProcessCallback ())
324 m_process_launch_info.SetMonitorProcessCallback(ReapDebuggedProcess, this, false);
Todd Fiala403edc52014-01-23 22:05:44 +0000325
Todd Fialab8b49ec2014-01-28 00:34:23 +0000326 lldb_private::Error error = m_platform_sp->LaunchProcess (m_process_launch_info);
Todd Fiala403edc52014-01-23 22:05:44 +0000327 if (!error.Success ())
328 {
Todd Fiala3e92a2b2014-01-24 00:52:53 +0000329 fprintf (stderr, "%s: failed to launch executable %s", __FUNCTION__, m_process_launch_info.GetArguments ().GetArgumentAtIndex (0));
Todd Fiala403edc52014-01-23 22:05:44 +0000330 return error;
331 }
332
Todd Fiala3e92a2b2014-01-24 00:52:53 +0000333 printf ("Launched '%s' as process %" PRIu64 "...\n", m_process_launch_info.GetArguments ().GetArgumentAtIndex (0), m_process_launch_info.GetProcessID());
Todd Fiala403edc52014-01-23 22:05:44 +0000334
335 // add to list of spawned processes. On an lldb-gdbserver, we
336 // would expect there to be only one.
337 lldb::pid_t pid;
338 if ( (pid = m_process_launch_info.GetProcessID()) != LLDB_INVALID_PROCESS_ID )
339 {
340 Mutex::Locker locker (m_spawned_pids_mutex);
341 m_spawned_pids.insert(pid);
342 }
343
344 return error;
345}
346
Greg Clayton3dedae12013-12-06 21:45:27 +0000347GDBRemoteCommunication::PacketResult
Greg Clayton32e0a752011-03-30 18:16:51 +0000348GDBRemoteCommunicationServer::SendUnimplementedResponse (const char *)
Greg Clayton576d8832011-03-22 04:00:09 +0000349{
Greg Clayton32e0a752011-03-30 18:16:51 +0000350 // TODO: Log the packet we aren't handling...
Greg Clayton37a0a242012-04-11 00:24:49 +0000351 return SendPacketNoLock ("", 0);
Greg Clayton576d8832011-03-22 04:00:09 +0000352}
353
Greg Clayton3dedae12013-12-06 21:45:27 +0000354GDBRemoteCommunication::PacketResult
Greg Clayton32e0a752011-03-30 18:16:51 +0000355GDBRemoteCommunicationServer::SendErrorResponse (uint8_t err)
356{
357 char packet[16];
358 int packet_len = ::snprintf (packet, sizeof(packet), "E%2.2x", err);
Andy Gibbsa297a972013-06-19 19:04:53 +0000359 assert (packet_len < (int)sizeof(packet));
Greg Clayton37a0a242012-04-11 00:24:49 +0000360 return SendPacketNoLock (packet, packet_len);
Greg Clayton32e0a752011-03-30 18:16:51 +0000361}
362
363
Greg Clayton3dedae12013-12-06 21:45:27 +0000364GDBRemoteCommunication::PacketResult
Greg Clayton1cb64962011-03-24 04:28:38 +0000365GDBRemoteCommunicationServer::SendOKResponse ()
366{
Greg Clayton37a0a242012-04-11 00:24:49 +0000367 return SendPacketNoLock ("OK", 2);
Greg Clayton1cb64962011-03-24 04:28:38 +0000368}
369
370bool
371GDBRemoteCommunicationServer::HandshakeWithClient(Error *error_ptr)
372{
Greg Clayton3dedae12013-12-06 21:45:27 +0000373 return GetAck() == PacketResult::Success;
Greg Clayton1cb64962011-03-24 04:28:38 +0000374}
Greg Clayton576d8832011-03-22 04:00:09 +0000375
Greg Clayton3dedae12013-12-06 21:45:27 +0000376GDBRemoteCommunication::PacketResult
Greg Clayton32e0a752011-03-30 18:16:51 +0000377GDBRemoteCommunicationServer::Handle_qHostInfo (StringExtractorGDBRemote &packet)
Greg Clayton576d8832011-03-22 04:00:09 +0000378{
379 StreamString response;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000380
Greg Clayton576d8832011-03-22 04:00:09 +0000381 // $cputype:16777223;cpusubtype:3;ostype:Darwin;vendor:apple;endian:little;ptrsize:8;#00
382
383 ArchSpec host_arch (Host::GetArchitecture ());
Greg Clayton576d8832011-03-22 04:00:09 +0000384 const llvm::Triple &host_triple = host_arch.GetTriple();
Greg Clayton1cb64962011-03-24 04:28:38 +0000385 response.PutCString("triple:");
386 response.PutCStringAsRawHex8(host_triple.getTriple().c_str());
387 response.Printf (";ptrsize:%u;",host_arch.GetAddressByteSize());
Greg Clayton576d8832011-03-22 04:00:09 +0000388
Todd Fialaa9ddb0e2014-01-18 03:02:39 +0000389 const char* distribution_id = host_arch.GetDistributionId ().AsCString ();
390 if (distribution_id)
391 {
392 response.PutCString("distribution_id:");
393 response.PutCStringAsRawHex8(distribution_id);
394 response.PutCString(";");
395 }
396
Greg Clayton1cb64962011-03-24 04:28:38 +0000397 uint32_t cpu = host_arch.GetMachOCPUType();
398 uint32_t sub = host_arch.GetMachOCPUSubType();
399 if (cpu != LLDB_INVALID_CPUTYPE)
400 response.Printf ("cputype:%u;", cpu);
401 if (sub != LLDB_INVALID_CPUTYPE)
402 response.Printf ("cpusubtype:%u;", sub);
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000403
Enrico Granata1c5431a2012-07-13 23:55:22 +0000404 if (cpu == ArchSpec::kCore_arm_any)
Enrico Granataf04a2192012-07-13 23:18:48 +0000405 response.Printf("watchpoint_exceptions_received:before;"); // On armv7 we use "synchronous" watchpoints which means the exception is delivered before the instruction executes.
406 else
407 response.Printf("watchpoint_exceptions_received:after;");
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000408
Greg Clayton576d8832011-03-22 04:00:09 +0000409 switch (lldb::endian::InlHostByteOrder())
410 {
411 case eByteOrderBig: response.PutCString ("endian:big;"); break;
412 case eByteOrderLittle: response.PutCString ("endian:little;"); break;
413 case eByteOrderPDP: response.PutCString ("endian:pdp;"); break;
414 default: response.PutCString ("endian:unknown;"); break;
415 }
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000416
Greg Clayton1cb64962011-03-24 04:28:38 +0000417 uint32_t major = UINT32_MAX;
418 uint32_t minor = UINT32_MAX;
419 uint32_t update = UINT32_MAX;
420 if (Host::GetOSVersion (major, minor, update))
421 {
422 if (major != UINT32_MAX)
423 {
424 response.Printf("os_version:%u", major);
425 if (minor != UINT32_MAX)
426 {
427 response.Printf(".%u", minor);
428 if (update != UINT32_MAX)
429 response.Printf(".%u", update);
430 }
431 response.PutChar(';');
432 }
433 }
434
435 std::string s;
436 if (Host::GetOSBuildString (s))
437 {
438 response.PutCString ("os_build:");
439 response.PutCStringAsRawHex8(s.c_str());
440 response.PutChar(';');
441 }
442 if (Host::GetOSKernelDescription (s))
443 {
444 response.PutCString ("os_kernel:");
445 response.PutCStringAsRawHex8(s.c_str());
446 response.PutChar(';');
447 }
Greg Clayton2b98c562013-11-22 18:53:12 +0000448#if defined(__APPLE__)
449
450#if defined(__arm__)
451 // For iOS devices, we are connected through a USB Mux so we never pretend
452 // to actually have a hostname as far as the remote lldb that is connecting
453 // to this lldb-platform is concerned
454 response.PutCString ("hostname:");
455 response.PutCStringAsRawHex8("localhost");
456 response.PutChar(';');
457#else // #if defined(__arm__)
Greg Clayton1cb64962011-03-24 04:28:38 +0000458 if (Host::GetHostname (s))
459 {
460 response.PutCString ("hostname:");
461 response.PutCStringAsRawHex8(s.c_str());
462 response.PutChar(';');
463 }
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000464
Greg Clayton2b98c562013-11-22 18:53:12 +0000465#endif // #if defined(__arm__)
466
467#else // #if defined(__APPLE__)
468 if (Host::GetHostname (s))
469 {
470 response.PutCString ("hostname:");
471 response.PutCStringAsRawHex8(s.c_str());
472 response.PutChar(';');
473 }
474#endif // #if defined(__APPLE__)
475
Greg Clayton3dedae12013-12-06 21:45:27 +0000476 return SendPacketNoLock (response.GetData(), response.GetSize());
Greg Clayton576d8832011-03-22 04:00:09 +0000477}
Greg Clayton1cb64962011-03-24 04:28:38 +0000478
Greg Clayton32e0a752011-03-30 18:16:51 +0000479static void
Greg Clayton8b82f082011-04-12 05:54:46 +0000480CreateProcessInfoResponse (const ProcessInstanceInfo &proc_info, StreamString &response)
Greg Clayton32e0a752011-03-30 18:16:51 +0000481{
Daniel Malead01b2952012-11-29 21:49:15 +0000482 response.Printf ("pid:%" PRIu64 ";ppid:%" PRIu64 ";uid:%i;gid:%i;euid:%i;egid:%i;",
Greg Clayton32e0a752011-03-30 18:16:51 +0000483 proc_info.GetProcessID(),
484 proc_info.GetParentProcessID(),
Greg Clayton8b82f082011-04-12 05:54:46 +0000485 proc_info.GetUserID(),
486 proc_info.GetGroupID(),
Greg Clayton32e0a752011-03-30 18:16:51 +0000487 proc_info.GetEffectiveUserID(),
488 proc_info.GetEffectiveGroupID());
489 response.PutCString ("name:");
490 response.PutCStringAsRawHex8(proc_info.GetName());
491 response.PutChar(';');
492 const ArchSpec &proc_arch = proc_info.GetArchitecture();
493 if (proc_arch.IsValid())
494 {
495 const llvm::Triple &proc_triple = proc_arch.GetTriple();
496 response.PutCString("triple:");
497 response.PutCStringAsRawHex8(proc_triple.getTriple().c_str());
498 response.PutChar(';');
499 }
500}
Greg Clayton1cb64962011-03-24 04:28:38 +0000501
Greg Clayton3dedae12013-12-06 21:45:27 +0000502GDBRemoteCommunication::PacketResult
Greg Clayton32e0a752011-03-30 18:16:51 +0000503GDBRemoteCommunicationServer::Handle_qProcessInfoPID (StringExtractorGDBRemote &packet)
Greg Clayton1cb64962011-03-24 04:28:38 +0000504{
Greg Clayton32e0a752011-03-30 18:16:51 +0000505 // Packet format: "qProcessInfoPID:%i" where %i is the pid
Greg Clayton8b82f082011-04-12 05:54:46 +0000506 packet.SetFilePos(::strlen ("qProcessInfoPID:"));
Greg Clayton32e0a752011-03-30 18:16:51 +0000507 lldb::pid_t pid = packet.GetU32 (LLDB_INVALID_PROCESS_ID);
508 if (pid != LLDB_INVALID_PROCESS_ID)
509 {
Greg Clayton8b82f082011-04-12 05:54:46 +0000510 ProcessInstanceInfo proc_info;
Greg Clayton32e0a752011-03-30 18:16:51 +0000511 if (Host::GetProcessInfo(pid, proc_info))
512 {
513 StreamString response;
514 CreateProcessInfoResponse (proc_info, response);
Greg Clayton37a0a242012-04-11 00:24:49 +0000515 return SendPacketNoLock (response.GetData(), response.GetSize());
Greg Clayton32e0a752011-03-30 18:16:51 +0000516 }
517 }
518 return SendErrorResponse (1);
519}
520
Greg Clayton3dedae12013-12-06 21:45:27 +0000521GDBRemoteCommunication::PacketResult
Greg Clayton32e0a752011-03-30 18:16:51 +0000522GDBRemoteCommunicationServer::Handle_qfProcessInfo (StringExtractorGDBRemote &packet)
523{
524 m_proc_infos_index = 0;
525 m_proc_infos.Clear();
526
Greg Clayton8b82f082011-04-12 05:54:46 +0000527 ProcessInstanceInfoMatch match_info;
528 packet.SetFilePos(::strlen ("qfProcessInfo"));
Greg Clayton32e0a752011-03-30 18:16:51 +0000529 if (packet.GetChar() == ':')
530 {
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000531
Greg Clayton32e0a752011-03-30 18:16:51 +0000532 std::string key;
533 std::string value;
534 while (packet.GetNameColonValue(key, value))
535 {
536 bool success = true;
537 if (key.compare("name") == 0)
538 {
539 StringExtractor extractor;
540 extractor.GetStringRef().swap(value);
541 extractor.GetHexByteString (value);
Greg Clayton144f3a92011-11-15 03:53:30 +0000542 match_info.GetProcessInfo().GetExecutableFile().SetFile(value.c_str(), false);
Greg Clayton32e0a752011-03-30 18:16:51 +0000543 }
544 else if (key.compare("name_match") == 0)
545 {
546 if (value.compare("equals") == 0)
547 {
548 match_info.SetNameMatchType (eNameMatchEquals);
549 }
550 else if (value.compare("starts_with") == 0)
551 {
552 match_info.SetNameMatchType (eNameMatchStartsWith);
553 }
554 else if (value.compare("ends_with") == 0)
555 {
556 match_info.SetNameMatchType (eNameMatchEndsWith);
557 }
558 else if (value.compare("contains") == 0)
559 {
560 match_info.SetNameMatchType (eNameMatchContains);
561 }
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000562 else if (value.compare("regex") == 0)
Greg Clayton32e0a752011-03-30 18:16:51 +0000563 {
564 match_info.SetNameMatchType (eNameMatchRegularExpression);
565 }
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000566 else
Greg Clayton32e0a752011-03-30 18:16:51 +0000567 {
568 success = false;
569 }
570 }
571 else if (key.compare("pid") == 0)
572 {
573 match_info.GetProcessInfo().SetProcessID (Args::StringToUInt32(value.c_str(), LLDB_INVALID_PROCESS_ID, 0, &success));
574 }
575 else if (key.compare("parent_pid") == 0)
576 {
577 match_info.GetProcessInfo().SetParentProcessID (Args::StringToUInt32(value.c_str(), LLDB_INVALID_PROCESS_ID, 0, &success));
578 }
579 else if (key.compare("uid") == 0)
580 {
Greg Clayton8b82f082011-04-12 05:54:46 +0000581 match_info.GetProcessInfo().SetUserID (Args::StringToUInt32(value.c_str(), UINT32_MAX, 0, &success));
Greg Clayton32e0a752011-03-30 18:16:51 +0000582 }
583 else if (key.compare("gid") == 0)
584 {
Greg Clayton8b82f082011-04-12 05:54:46 +0000585 match_info.GetProcessInfo().SetGroupID (Args::StringToUInt32(value.c_str(), UINT32_MAX, 0, &success));
Greg Clayton32e0a752011-03-30 18:16:51 +0000586 }
587 else if (key.compare("euid") == 0)
588 {
589 match_info.GetProcessInfo().SetEffectiveUserID (Args::StringToUInt32(value.c_str(), UINT32_MAX, 0, &success));
590 }
591 else if (key.compare("egid") == 0)
592 {
593 match_info.GetProcessInfo().SetEffectiveGroupID (Args::StringToUInt32(value.c_str(), UINT32_MAX, 0, &success));
594 }
595 else if (key.compare("all_users") == 0)
596 {
597 match_info.SetMatchAllUsers(Args::StringToBoolean(value.c_str(), false, &success));
598 }
599 else if (key.compare("triple") == 0)
600 {
Greg Claytoneb0103f2011-04-07 22:46:35 +0000601 match_info.GetProcessInfo().GetArchitecture().SetTriple (value.c_str(), NULL);
Greg Clayton32e0a752011-03-30 18:16:51 +0000602 }
603 else
604 {
605 success = false;
606 }
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000607
Greg Clayton32e0a752011-03-30 18:16:51 +0000608 if (!success)
609 return SendErrorResponse (2);
610 }
611 }
612
613 if (Host::FindProcesses (match_info, m_proc_infos))
614 {
615 // We found something, return the first item by calling the get
616 // subsequent process info packet handler...
617 return Handle_qsProcessInfo (packet);
618 }
619 return SendErrorResponse (3);
620}
621
Greg Clayton3dedae12013-12-06 21:45:27 +0000622GDBRemoteCommunication::PacketResult
Greg Clayton32e0a752011-03-30 18:16:51 +0000623GDBRemoteCommunicationServer::Handle_qsProcessInfo (StringExtractorGDBRemote &packet)
624{
625 if (m_proc_infos_index < m_proc_infos.GetSize())
626 {
627 StreamString response;
628 CreateProcessInfoResponse (m_proc_infos.GetProcessInfoAtIndex(m_proc_infos_index), response);
629 ++m_proc_infos_index;
Greg Clayton37a0a242012-04-11 00:24:49 +0000630 return SendPacketNoLock (response.GetData(), response.GetSize());
Greg Clayton32e0a752011-03-30 18:16:51 +0000631 }
632 return SendErrorResponse (4);
633}
634
Greg Clayton3dedae12013-12-06 21:45:27 +0000635GDBRemoteCommunication::PacketResult
Greg Clayton32e0a752011-03-30 18:16:51 +0000636GDBRemoteCommunicationServer::Handle_qUserName (StringExtractorGDBRemote &packet)
637{
638 // Packet format: "qUserName:%i" where %i is the uid
Greg Clayton8b82f082011-04-12 05:54:46 +0000639 packet.SetFilePos(::strlen ("qUserName:"));
Greg Clayton32e0a752011-03-30 18:16:51 +0000640 uint32_t uid = packet.GetU32 (UINT32_MAX);
641 if (uid != UINT32_MAX)
642 {
643 std::string name;
644 if (Host::GetUserName (uid, name))
645 {
646 StreamString response;
647 response.PutCStringAsRawHex8 (name.c_str());
Greg Clayton37a0a242012-04-11 00:24:49 +0000648 return SendPacketNoLock (response.GetData(), response.GetSize());
Greg Clayton32e0a752011-03-30 18:16:51 +0000649 }
650 }
651 return SendErrorResponse (5);
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000652
Greg Clayton32e0a752011-03-30 18:16:51 +0000653}
654
Greg Clayton3dedae12013-12-06 21:45:27 +0000655GDBRemoteCommunication::PacketResult
Greg Clayton32e0a752011-03-30 18:16:51 +0000656GDBRemoteCommunicationServer::Handle_qGroupName (StringExtractorGDBRemote &packet)
657{
658 // Packet format: "qGroupName:%i" where %i is the gid
Greg Clayton8b82f082011-04-12 05:54:46 +0000659 packet.SetFilePos(::strlen ("qGroupName:"));
Greg Clayton32e0a752011-03-30 18:16:51 +0000660 uint32_t gid = packet.GetU32 (UINT32_MAX);
661 if (gid != UINT32_MAX)
662 {
663 std::string name;
664 if (Host::GetGroupName (gid, name))
665 {
666 StreamString response;
667 response.PutCStringAsRawHex8 (name.c_str());
Greg Clayton37a0a242012-04-11 00:24:49 +0000668 return SendPacketNoLock (response.GetData(), response.GetSize());
Greg Clayton32e0a752011-03-30 18:16:51 +0000669 }
670 }
671 return SendErrorResponse (6);
672}
673
Greg Clayton3dedae12013-12-06 21:45:27 +0000674GDBRemoteCommunication::PacketResult
Greg Clayton9b1e1cd2011-04-04 18:18:57 +0000675GDBRemoteCommunicationServer::Handle_qSpeedTest (StringExtractorGDBRemote &packet)
676{
Greg Clayton8b82f082011-04-12 05:54:46 +0000677 packet.SetFilePos(::strlen ("qSpeedTest:"));
Greg Clayton9b1e1cd2011-04-04 18:18:57 +0000678
679 std::string key;
680 std::string value;
681 bool success = packet.GetNameColonValue(key, value);
682 if (success && key.compare("response_size") == 0)
683 {
684 uint32_t response_size = Args::StringToUInt32(value.c_str(), 0, 0, &success);
685 if (success)
686 {
687 if (response_size == 0)
688 return SendOKResponse();
689 StreamString response;
690 uint32_t bytes_left = response_size;
691 response.PutCString("data:");
692 while (bytes_left > 0)
693 {
694 if (bytes_left >= 26)
695 {
696 response.PutCString("ABCDEFGHIJKLMNOPQRSTUVWXYZ");
697 bytes_left -= 26;
698 }
699 else
700 {
701 response.Printf ("%*.*s;", bytes_left, bytes_left, "ABCDEFGHIJKLMNOPQRSTUVWXYZ");
702 bytes_left = 0;
703 }
704 }
Greg Clayton37a0a242012-04-11 00:24:49 +0000705 return SendPacketNoLock (response.GetData(), response.GetSize());
Greg Clayton9b1e1cd2011-04-04 18:18:57 +0000706 }
707 }
708 return SendErrorResponse (7);
709}
Greg Clayton8b82f082011-04-12 05:54:46 +0000710
711
712static void *
713AcceptPortFromInferior (void *arg)
714{
715 const char *connect_url = (const char *)arg;
716 ConnectionFileDescriptor file_conn;
717 Error error;
718 if (file_conn.Connect (connect_url, &error) == eConnectionStatusSuccess)
719 {
720 char pid_str[256];
721 ::memset (pid_str, 0, sizeof(pid_str));
722 ConnectionStatus status;
Bill Wendlinged24dcc2012-04-03 07:50:11 +0000723 const size_t pid_str_len = file_conn.Read (pid_str, sizeof(pid_str), 0, status, NULL);
Greg Clayton8b82f082011-04-12 05:54:46 +0000724 if (pid_str_len > 0)
725 {
726 int pid = atoi (pid_str);
727 return (void *)(intptr_t)pid;
728 }
729 }
730 return NULL;
731}
732//
733//static bool
734//WaitForProcessToSIGSTOP (const lldb::pid_t pid, const int timeout_in_seconds)
735//{
736// const int time_delta_usecs = 100000;
737// const int num_retries = timeout_in_seconds/time_delta_usecs;
738// for (int i=0; i<num_retries; i++)
739// {
740// struct proc_bsdinfo bsd_info;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000741// int error = ::proc_pidinfo (pid, PROC_PIDTBSDINFO,
742// (uint64_t) 0,
743// &bsd_info,
Greg Clayton8b82f082011-04-12 05:54:46 +0000744// PROC_PIDTBSDINFO_SIZE);
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000745//
Greg Clayton8b82f082011-04-12 05:54:46 +0000746// switch (error)
747// {
748// case EINVAL:
749// case ENOTSUP:
750// case ESRCH:
751// case EPERM:
752// return false;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000753//
Greg Clayton8b82f082011-04-12 05:54:46 +0000754// default:
755// break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000756//
Greg Clayton8b82f082011-04-12 05:54:46 +0000757// case 0:
758// if (bsd_info.pbi_status == SSTOP)
759// return true;
760// }
761// ::usleep (time_delta_usecs);
762// }
763// return false;
764//}
765
Greg Clayton3dedae12013-12-06 21:45:27 +0000766GDBRemoteCommunication::PacketResult
Greg Clayton8b82f082011-04-12 05:54:46 +0000767GDBRemoteCommunicationServer::Handle_A (StringExtractorGDBRemote &packet)
768{
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000769 // The 'A' packet is the most over designed packet ever here with
770 // redundant argument indexes, redundant argument lengths and needed hex
771 // encoded argument string values. Really all that is needed is a comma
Greg Clayton8b82f082011-04-12 05:54:46 +0000772 // separated hex encoded argument value list, but we will stay true to the
773 // documented version of the 'A' packet here...
774
775 packet.SetFilePos(1); // Skip the 'A'
776 bool success = true;
777 while (success && packet.GetBytesLeft() > 0)
778 {
779 // Decode the decimal argument string length. This length is the
780 // number of hex nibbles in the argument string value.
781 const uint32_t arg_len = packet.GetU32(UINT32_MAX);
782 if (arg_len == UINT32_MAX)
783 success = false;
784 else
785 {
786 // Make sure the argument hex string length is followed by a comma
787 if (packet.GetChar() != ',')
788 success = false;
789 else
790 {
791 // Decode the argument index. We ignore this really becuase
792 // who would really send down the arguments in a random order???
793 const uint32_t arg_idx = packet.GetU32(UINT32_MAX);
794 if (arg_idx == UINT32_MAX)
795 success = false;
796 else
797 {
798 // Make sure the argument index is followed by a comma
799 if (packet.GetChar() != ',')
800 success = false;
801 else
802 {
803 // Decode the argument string value from hex bytes
804 // back into a UTF8 string and make sure the length
805 // matches the one supplied in the packet
806 std::string arg;
807 if (packet.GetHexByteString(arg) != (arg_len / 2))
808 success = false;
809 else
810 {
811 // If there are any bytes lft
812 if (packet.GetBytesLeft())
813 {
814 if (packet.GetChar() != ',')
815 success = false;
816 }
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000817
Greg Clayton8b82f082011-04-12 05:54:46 +0000818 if (success)
819 {
820 if (arg_idx == 0)
821 m_process_launch_info.GetExecutableFile().SetFile(arg.c_str(), false);
822 m_process_launch_info.GetArguments().AppendArgument(arg.c_str());
823 }
824 }
825 }
826 }
827 }
828 }
829 }
830
831 if (success)
832 {
Todd Fiala9f377372014-01-27 20:44:50 +0000833 // FIXME: remove linux restriction once eLaunchFlagDebug is supported
834#if !defined (__linux__)
Greg Clayton8b82f082011-04-12 05:54:46 +0000835 m_process_launch_info.GetFlags().Set (eLaunchFlagDebug);
Todd Fiala9f377372014-01-27 20:44:50 +0000836#endif
837 m_process_launch_error = LaunchProcess ();
Greg Clayton8b82f082011-04-12 05:54:46 +0000838 if (m_process_launch_info.GetProcessID() != LLDB_INVALID_PROCESS_ID)
839 {
840 return SendOKResponse ();
841 }
842 }
843 return SendErrorResponse (8);
844}
845
Greg Clayton3dedae12013-12-06 21:45:27 +0000846GDBRemoteCommunication::PacketResult
Greg Clayton8b82f082011-04-12 05:54:46 +0000847GDBRemoteCommunicationServer::Handle_qC (StringExtractorGDBRemote &packet)
848{
849 lldb::pid_t pid = m_process_launch_info.GetProcessID();
850 StreamString response;
Daniel Malead01b2952012-11-29 21:49:15 +0000851 response.Printf("QC%" PRIx64, pid);
Greg Clayton8b82f082011-04-12 05:54:46 +0000852 if (m_is_platform)
853 {
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000854 // If we launch a process and this GDB server is acting as a platform,
855 // then we need to clear the process launch state so we can start
Greg Clayton8b82f082011-04-12 05:54:46 +0000856 // launching another process. In order to launch a process a bunch or
857 // packets need to be sent: environment packets, working directory,
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000858 // disable ASLR, and many more settings. When we launch a process we
Greg Clayton8b82f082011-04-12 05:54:46 +0000859 // then need to know when to clear this information. Currently we are
860 // selecting the 'qC' packet as that packet which seems to make the most
861 // sense.
862 if (pid != LLDB_INVALID_PROCESS_ID)
863 {
864 m_process_launch_info.Clear();
865 }
866 }
Greg Clayton37a0a242012-04-11 00:24:49 +0000867 return SendPacketNoLock (response.GetData(), response.GetSize());
Greg Clayton8b82f082011-04-12 05:54:46 +0000868}
869
870bool
Daniel Maleae0f8f572013-08-26 23:57:52 +0000871GDBRemoteCommunicationServer::DebugserverProcessReaped (lldb::pid_t pid)
872{
873 Mutex::Locker locker (m_spawned_pids_mutex);
Greg Clayton29b8fc42013-11-21 01:44:58 +0000874 FreePortForProcess(pid);
Daniel Maleae0f8f572013-08-26 23:57:52 +0000875 return m_spawned_pids.erase(pid) > 0;
876}
877bool
878GDBRemoteCommunicationServer::ReapDebugserverProcess (void *callback_baton,
879 lldb::pid_t pid,
880 bool exited,
881 int signal, // Zero for no signal
882 int status) // Exit value of process if signal is zero
883{
884 GDBRemoteCommunicationServer *server = (GDBRemoteCommunicationServer *)callback_baton;
885 server->DebugserverProcessReaped (pid);
886 return true;
887}
888
Todd Fiala3e92a2b2014-01-24 00:52:53 +0000889bool
890GDBRemoteCommunicationServer::DebuggedProcessReaped (lldb::pid_t pid)
891{
892 // reap a process that we were debugging (but not debugserver)
893 Mutex::Locker locker (m_spawned_pids_mutex);
894 return m_spawned_pids.erase(pid) > 0;
895}
896
897bool
898GDBRemoteCommunicationServer::ReapDebuggedProcess (void *callback_baton,
899 lldb::pid_t pid,
900 bool exited,
901 int signal, // Zero for no signal
902 int status) // Exit value of process if signal is zero
903{
904 GDBRemoteCommunicationServer *server = (GDBRemoteCommunicationServer *)callback_baton;
905 server->DebuggedProcessReaped (pid);
906 return true;
907}
908
Greg Clayton3dedae12013-12-06 21:45:27 +0000909GDBRemoteCommunication::PacketResult
Greg Clayton8b82f082011-04-12 05:54:46 +0000910GDBRemoteCommunicationServer::Handle_qLaunchGDBServer (StringExtractorGDBRemote &packet)
911{
Virgile Bellob2f1fb22013-08-23 12:44:05 +0000912#ifdef _WIN32
Deepak Panickal263fde02014-01-14 11:34:44 +0000913 return SendErrorResponse(9);
Virgile Bellob2f1fb22013-08-23 12:44:05 +0000914#else
Greg Clayton8b82f082011-04-12 05:54:46 +0000915 // Spawn a local debugserver as a platform so we can then attach or launch
916 // a process...
917
918 if (m_is_platform)
919 {
920 // Sleep and wait a bit for debugserver to start to listen...
921 ConnectionFileDescriptor file_conn;
Greg Clayton8b82f082011-04-12 05:54:46 +0000922 Error error;
Daniel Maleae0f8f572013-08-26 23:57:52 +0000923 std::string hostname;
Sylvestre Ledrufaa63ce2013-09-28 15:57:37 +0000924 // TODO: /tmp/ should not be hardcoded. User might want to override /tmp
925 // with the TMPDIR environnement variable
Greg Clayton29b8fc42013-11-21 01:44:58 +0000926 packet.SetFilePos(::strlen ("qLaunchGDBServer;"));
927 std::string name;
928 std::string value;
929 uint16_t port = UINT16_MAX;
930 while (packet.GetNameColonValue(name, value))
Greg Clayton8b82f082011-04-12 05:54:46 +0000931 {
Greg Clayton29b8fc42013-11-21 01:44:58 +0000932 if (name.compare ("host") == 0)
933 hostname.swap(value);
934 else if (name.compare ("port") == 0)
935 port = Args::StringToUInt32(value.c_str(), 0, 0);
Greg Clayton8b82f082011-04-12 05:54:46 +0000936 }
Greg Clayton29b8fc42013-11-21 01:44:58 +0000937 if (port == UINT16_MAX)
938 port = GetNextAvailablePort();
939
940 // Spawn a new thread to accept the port that gets bound after
941 // binding to port 0 (zero).
Greg Claytonfbb76342013-11-20 21:07:01 +0000942
Greg Clayton29b8fc42013-11-21 01:44:58 +0000943 if (error.Success())
944 {
945 // Spawn a debugserver and try to get the port it listens to.
946 ProcessLaunchInfo debugserver_launch_info;
Greg Clayton29b8fc42013-11-21 01:44:58 +0000947 if (hostname.empty())
948 hostname = "localhost";
Greg Clayton29b8fc42013-11-21 01:44:58 +0000949 Log *log(GetLogIfAnyCategoriesSet(LIBLLDB_LOG_PLATFORM));
950 if (log)
Greg Claytonfda4fab2014-01-10 22:24:11 +0000951 log->Printf("Launching debugserver with: %s:%u...\n", hostname.c_str(), port);
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000952
Greg Clayton29b8fc42013-11-21 01:44:58 +0000953 debugserver_launch_info.SetMonitorProcessCallback(ReapDebugserverProcess, this, false);
954
Greg Claytonfda4fab2014-01-10 22:24:11 +0000955 error = StartDebugserverProcess (hostname.empty() ? NULL : hostname.c_str(),
956 port,
Greg Clayton00fe87b2013-12-05 22:58:22 +0000957 debugserver_launch_info,
958 port);
Greg Clayton29b8fc42013-11-21 01:44:58 +0000959
960 lldb::pid_t debugserver_pid = debugserver_launch_info.GetProcessID();
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000961
Greg Claytonfbb76342013-11-20 21:07:01 +0000962
Greg Clayton29b8fc42013-11-21 01:44:58 +0000963 if (debugserver_pid != LLDB_INVALID_PROCESS_ID)
964 {
965 Mutex::Locker locker (m_spawned_pids_mutex);
966 m_spawned_pids.insert(debugserver_pid);
967 if (port > 0)
968 AssociatePortWithProcess(port, debugserver_pid);
969 }
970 else
971 {
972 if (port > 0)
973 FreePort (port);
974 }
975
976 if (error.Success())
977 {
Greg Clayton91a9b2472013-12-04 19:19:12 +0000978 char response[256];
979 const int response_len = ::snprintf (response, sizeof(response), "pid:%" PRIu64 ";port:%u;", debugserver_pid, port + m_port_offset);
980 assert (response_len < sizeof(response));
Greg Clayton3dedae12013-12-06 21:45:27 +0000981 PacketResult packet_result = SendPacketNoLock (response, response_len);
Greg Clayton29b8fc42013-11-21 01:44:58 +0000982
Greg Clayton3dedae12013-12-06 21:45:27 +0000983 if (packet_result != PacketResult::Success)
Greg Clayton29b8fc42013-11-21 01:44:58 +0000984 {
985 if (debugserver_pid != LLDB_INVALID_PROCESS_ID)
986 ::kill (debugserver_pid, SIGINT);
987 }
Greg Clayton3dedae12013-12-06 21:45:27 +0000988 return packet_result;
Greg Clayton29b8fc42013-11-21 01:44:58 +0000989 }
Greg Clayton8b82f082011-04-12 05:54:46 +0000990 }
991 }
Daniel Maleae0f8f572013-08-26 23:57:52 +0000992 return SendErrorResponse (9);
Virgile Bellob2f1fb22013-08-23 12:44:05 +0000993#endif
Greg Clayton8b82f082011-04-12 05:54:46 +0000994}
995
Todd Fiala403edc52014-01-23 22:05:44 +0000996bool
997GDBRemoteCommunicationServer::KillSpawnedProcess (lldb::pid_t pid)
998{
999 // make sure we know about this process
1000 {
1001 Mutex::Locker locker (m_spawned_pids_mutex);
1002 if (m_spawned_pids.find(pid) == m_spawned_pids.end())
1003 return false;
1004 }
1005
1006 // first try a SIGTERM (standard kill)
1007 Host::Kill (pid, SIGTERM);
1008
1009 // check if that worked
1010 for (size_t i=0; i<10; ++i)
1011 {
1012 {
1013 Mutex::Locker locker (m_spawned_pids_mutex);
1014 if (m_spawned_pids.find(pid) == m_spawned_pids.end())
1015 {
1016 // it is now killed
1017 return true;
1018 }
1019 }
1020 usleep (10000);
1021 }
1022
1023 // check one more time after the final usleep
1024 {
1025 Mutex::Locker locker (m_spawned_pids_mutex);
1026 if (m_spawned_pids.find(pid) == m_spawned_pids.end())
1027 return true;
1028 }
1029
1030 // the launched process still lives. Now try killling it again,
1031 // this time with an unblockable signal.
1032 Host::Kill (pid, SIGKILL);
1033
1034 for (size_t i=0; i<10; ++i)
1035 {
1036 {
1037 Mutex::Locker locker (m_spawned_pids_mutex);
1038 if (m_spawned_pids.find(pid) == m_spawned_pids.end())
1039 {
1040 // it is now killed
1041 return true;
1042 }
1043 }
1044 usleep (10000);
1045 }
1046
1047 // check one more time after the final usleep
1048 // Scope for locker
1049 {
1050 Mutex::Locker locker (m_spawned_pids_mutex);
1051 if (m_spawned_pids.find(pid) == m_spawned_pids.end())
1052 return true;
1053 }
1054
1055 // no luck - the process still lives
1056 return false;
1057}
1058
Greg Clayton3dedae12013-12-06 21:45:27 +00001059GDBRemoteCommunication::PacketResult
Daniel Maleae0f8f572013-08-26 23:57:52 +00001060GDBRemoteCommunicationServer::Handle_qKillSpawnedProcess (StringExtractorGDBRemote &packet)
1061{
Todd Fiala403edc52014-01-23 22:05:44 +00001062 packet.SetFilePos(::strlen ("qKillSpawnedProcess:"));
Sylvestre Ledrub027bd22013-09-28 14:35:00 +00001063
Todd Fiala403edc52014-01-23 22:05:44 +00001064 lldb::pid_t pid = packet.GetU64(LLDB_INVALID_PROCESS_ID);
1065
1066 // verify that we know anything about this pid.
1067 // Scope for locker
Daniel Maleae0f8f572013-08-26 23:57:52 +00001068 {
Todd Fiala403edc52014-01-23 22:05:44 +00001069 Mutex::Locker locker (m_spawned_pids_mutex);
1070 if (m_spawned_pids.find(pid) == m_spawned_pids.end())
Daniel Maleae0f8f572013-08-26 23:57:52 +00001071 {
Todd Fiala403edc52014-01-23 22:05:44 +00001072 // not a pid we know about
1073 return SendErrorResponse (10);
Daniel Maleae0f8f572013-08-26 23:57:52 +00001074 }
1075 }
Todd Fiala403edc52014-01-23 22:05:44 +00001076
1077 // go ahead and attempt to kill the spawned process
1078 if (KillSpawnedProcess (pid))
1079 return SendOKResponse ();
1080 else
1081 return SendErrorResponse (11);
1082}
1083
1084GDBRemoteCommunication::PacketResult
1085GDBRemoteCommunicationServer::Handle_k (StringExtractorGDBRemote &packet)
1086{
1087 // ignore for now if we're lldb_platform
1088 if (m_is_platform)
1089 return SendUnimplementedResponse (packet.GetStringRef().c_str());
1090
1091 // shutdown all spawned processes
1092 std::set<lldb::pid_t> spawned_pids_copy;
1093
1094 // copy pids
1095 {
1096 Mutex::Locker locker (m_spawned_pids_mutex);
1097 spawned_pids_copy.insert (m_spawned_pids.begin (), m_spawned_pids.end ());
1098 }
1099
1100 // nuke the spawned processes
1101 for (auto it = spawned_pids_copy.begin (); it != spawned_pids_copy.end (); ++it)
1102 {
1103 lldb::pid_t spawned_pid = *it;
1104 if (!KillSpawnedProcess (spawned_pid))
1105 {
1106 fprintf (stderr, "%s: failed to kill spawned pid %" PRIu64 ", ignoring.\n", __FUNCTION__, spawned_pid);
1107 }
1108 }
1109
1110 // TODO figure out how to shut down gracefully at this point
1111 return SendOKResponse ();
Daniel Maleae0f8f572013-08-26 23:57:52 +00001112}
1113
Greg Clayton3dedae12013-12-06 21:45:27 +00001114GDBRemoteCommunication::PacketResult
Greg Clayton8b82f082011-04-12 05:54:46 +00001115GDBRemoteCommunicationServer::Handle_qLaunchSuccess (StringExtractorGDBRemote &packet)
1116{
1117 if (m_process_launch_error.Success())
1118 return SendOKResponse();
Sylvestre Ledrub027bd22013-09-28 14:35:00 +00001119 StreamString response;
Greg Clayton8b82f082011-04-12 05:54:46 +00001120 response.PutChar('E');
1121 response.PutCString(m_process_launch_error.AsCString("<unknown error>"));
Greg Clayton37a0a242012-04-11 00:24:49 +00001122 return SendPacketNoLock (response.GetData(), response.GetSize());
Greg Clayton8b82f082011-04-12 05:54:46 +00001123}
1124
Greg Clayton3dedae12013-12-06 21:45:27 +00001125GDBRemoteCommunication::PacketResult
Greg Clayton8b82f082011-04-12 05:54:46 +00001126GDBRemoteCommunicationServer::Handle_QEnvironment (StringExtractorGDBRemote &packet)
1127{
1128 packet.SetFilePos(::strlen ("QEnvironment:"));
1129 const uint32_t bytes_left = packet.GetBytesLeft();
1130 if (bytes_left > 0)
1131 {
1132 m_process_launch_info.GetEnvironmentEntries ().AppendArgument (packet.Peek());
1133 return SendOKResponse ();
1134 }
Greg Clayton2b98c562013-11-22 18:53:12 +00001135 return SendErrorResponse (12);
Daniel Maleae0f8f572013-08-26 23:57:52 +00001136}
1137
Greg Clayton3dedae12013-12-06 21:45:27 +00001138GDBRemoteCommunication::PacketResult
Daniel Maleae0f8f572013-08-26 23:57:52 +00001139GDBRemoteCommunicationServer::Handle_QLaunchArch (StringExtractorGDBRemote &packet)
1140{
1141 packet.SetFilePos(::strlen ("QLaunchArch:"));
1142 const uint32_t bytes_left = packet.GetBytesLeft();
1143 if (bytes_left > 0)
1144 {
1145 const char* arch_triple = packet.Peek();
1146 ArchSpec arch_spec(arch_triple,NULL);
1147 m_process_launch_info.SetArchitecture(arch_spec);
1148 return SendOKResponse();
1149 }
Greg Clayton2b98c562013-11-22 18:53:12 +00001150 return SendErrorResponse(13);
Greg Clayton8b82f082011-04-12 05:54:46 +00001151}
1152
Greg Clayton3dedae12013-12-06 21:45:27 +00001153GDBRemoteCommunication::PacketResult
Greg Clayton8b82f082011-04-12 05:54:46 +00001154GDBRemoteCommunicationServer::Handle_QSetDisableASLR (StringExtractorGDBRemote &packet)
1155{
1156 packet.SetFilePos(::strlen ("QSetDisableASLR:"));
1157 if (packet.GetU32(0))
1158 m_process_launch_info.GetFlags().Set (eLaunchFlagDisableASLR);
1159 else
1160 m_process_launch_info.GetFlags().Clear (eLaunchFlagDisableASLR);
1161 return SendOKResponse ();
1162}
1163
Greg Clayton3dedae12013-12-06 21:45:27 +00001164GDBRemoteCommunication::PacketResult
Greg Clayton8b82f082011-04-12 05:54:46 +00001165GDBRemoteCommunicationServer::Handle_QSetWorkingDir (StringExtractorGDBRemote &packet)
1166{
1167 packet.SetFilePos(::strlen ("QSetWorkingDir:"));
1168 std::string path;
1169 packet.GetHexByteString(path);
Greg Claytonfbb76342013-11-20 21:07:01 +00001170 if (m_is_platform)
1171 {
Colin Riley909bb7a2013-11-26 15:10:46 +00001172#ifdef _WIN32
1173 // Not implemented on Windows
1174 return SendUnimplementedResponse("GDBRemoteCommunicationServer::Handle_QSetWorkingDir unimplemented");
1175#else
Greg Claytonfbb76342013-11-20 21:07:01 +00001176 // If this packet is sent to a platform, then change the current working directory
1177 if (::chdir(path.c_str()) != 0)
1178 return SendErrorResponse(errno);
Colin Riley909bb7a2013-11-26 15:10:46 +00001179#endif
Greg Claytonfbb76342013-11-20 21:07:01 +00001180 }
1181 else
1182 {
1183 m_process_launch_info.SwapWorkingDirectory (path);
1184 }
Greg Clayton8b82f082011-04-12 05:54:46 +00001185 return SendOKResponse ();
1186}
1187
Greg Clayton3dedae12013-12-06 21:45:27 +00001188GDBRemoteCommunication::PacketResult
Greg Claytonfbb76342013-11-20 21:07:01 +00001189GDBRemoteCommunicationServer::Handle_qGetWorkingDir (StringExtractorGDBRemote &packet)
1190{
1191 StreamString response;
1192
1193 if (m_is_platform)
1194 {
1195 // If this packet is sent to a platform, then change the current working directory
1196 char cwd[PATH_MAX];
1197 if (getcwd(cwd, sizeof(cwd)) == NULL)
1198 {
1199 return SendErrorResponse(errno);
1200 }
1201 else
1202 {
1203 response.PutBytesAsRawHex8(cwd, strlen(cwd));
Greg Clayton3dedae12013-12-06 21:45:27 +00001204 return SendPacketNoLock(response.GetData(), response.GetSize());
Greg Claytonfbb76342013-11-20 21:07:01 +00001205 }
1206 }
1207 else
1208 {
1209 const char *working_dir = m_process_launch_info.GetWorkingDirectory();
1210 if (working_dir && working_dir[0])
1211 {
1212 response.PutBytesAsRawHex8(working_dir, strlen(working_dir));
Greg Clayton3dedae12013-12-06 21:45:27 +00001213 return SendPacketNoLock(response.GetData(), response.GetSize());
Greg Claytonfbb76342013-11-20 21:07:01 +00001214 }
1215 else
1216 {
Greg Clayton2b98c562013-11-22 18:53:12 +00001217 return SendErrorResponse(14);
Greg Claytonfbb76342013-11-20 21:07:01 +00001218 }
1219 }
1220}
1221
Greg Clayton3dedae12013-12-06 21:45:27 +00001222GDBRemoteCommunication::PacketResult
Greg Clayton8b82f082011-04-12 05:54:46 +00001223GDBRemoteCommunicationServer::Handle_QSetSTDIN (StringExtractorGDBRemote &packet)
1224{
1225 packet.SetFilePos(::strlen ("QSetSTDIN:"));
1226 ProcessLaunchInfo::FileAction file_action;
1227 std::string path;
1228 packet.GetHexByteString(path);
1229 const bool read = false;
1230 const bool write = true;
1231 if (file_action.Open(STDIN_FILENO, path.c_str(), read, write))
1232 {
1233 m_process_launch_info.AppendFileAction(file_action);
1234 return SendOKResponse ();
1235 }
Greg Clayton2b98c562013-11-22 18:53:12 +00001236 return SendErrorResponse (15);
Greg Clayton8b82f082011-04-12 05:54:46 +00001237}
1238
Greg Clayton3dedae12013-12-06 21:45:27 +00001239GDBRemoteCommunication::PacketResult
Greg Clayton8b82f082011-04-12 05:54:46 +00001240GDBRemoteCommunicationServer::Handle_QSetSTDOUT (StringExtractorGDBRemote &packet)
1241{
1242 packet.SetFilePos(::strlen ("QSetSTDOUT:"));
1243 ProcessLaunchInfo::FileAction file_action;
1244 std::string path;
1245 packet.GetHexByteString(path);
1246 const bool read = true;
1247 const bool write = false;
1248 if (file_action.Open(STDOUT_FILENO, path.c_str(), read, write))
1249 {
1250 m_process_launch_info.AppendFileAction(file_action);
1251 return SendOKResponse ();
1252 }
Greg Clayton2b98c562013-11-22 18:53:12 +00001253 return SendErrorResponse (16);
Greg Clayton8b82f082011-04-12 05:54:46 +00001254}
1255
Greg Clayton3dedae12013-12-06 21:45:27 +00001256GDBRemoteCommunication::PacketResult
Greg Clayton8b82f082011-04-12 05:54:46 +00001257GDBRemoteCommunicationServer::Handle_QSetSTDERR (StringExtractorGDBRemote &packet)
1258{
1259 packet.SetFilePos(::strlen ("QSetSTDERR:"));
1260 ProcessLaunchInfo::FileAction file_action;
1261 std::string path;
1262 packet.GetHexByteString(path);
1263 const bool read = true;
Greg Clayton9845a8d2012-03-06 04:01:04 +00001264 const bool write = false;
Greg Clayton8b82f082011-04-12 05:54:46 +00001265 if (file_action.Open(STDERR_FILENO, path.c_str(), read, write))
1266 {
1267 m_process_launch_info.AppendFileAction(file_action);
1268 return SendOKResponse ();
1269 }
Greg Clayton2b98c562013-11-22 18:53:12 +00001270 return SendErrorResponse (17);
Greg Clayton8b82f082011-04-12 05:54:46 +00001271}
1272
Greg Clayton3dedae12013-12-06 21:45:27 +00001273GDBRemoteCommunication::PacketResult
Greg Clayton32e0a752011-03-30 18:16:51 +00001274GDBRemoteCommunicationServer::Handle_QStartNoAckMode (StringExtractorGDBRemote &packet)
1275{
1276 // Send response first before changing m_send_acks to we ack this packet
Greg Clayton3dedae12013-12-06 21:45:27 +00001277 PacketResult packet_result = SendOKResponse ();
Greg Clayton1cb64962011-03-24 04:28:38 +00001278 m_send_acks = false;
Greg Clayton3dedae12013-12-06 21:45:27 +00001279 return packet_result;
Greg Clayton1cb64962011-03-24 04:28:38 +00001280}
Daniel Maleae0f8f572013-08-26 23:57:52 +00001281
Greg Clayton3dedae12013-12-06 21:45:27 +00001282GDBRemoteCommunication::PacketResult
Greg Claytonfbb76342013-11-20 21:07:01 +00001283GDBRemoteCommunicationServer::Handle_qPlatform_mkdir (StringExtractorGDBRemote &packet)
Daniel Maleae0f8f572013-08-26 23:57:52 +00001284{
Greg Claytonfbb76342013-11-20 21:07:01 +00001285 packet.SetFilePos(::strlen("qPlatform_mkdir:"));
Daniel Maleae0f8f572013-08-26 23:57:52 +00001286 mode_t mode = packet.GetHexMaxU32(false, UINT32_MAX);
Greg Clayton2b98c562013-11-22 18:53:12 +00001287 if (packet.GetChar() == ',')
1288 {
1289 std::string path;
1290 packet.GetHexByteString(path);
1291 Error error = Host::MakeDirectory(path.c_str(),mode);
1292 if (error.Success())
1293 return SendPacketNoLock ("OK", 2);
1294 else
1295 return SendErrorResponse(error.GetError());
1296 }
1297 return SendErrorResponse(20);
Greg Claytonfbb76342013-11-20 21:07:01 +00001298}
1299
Greg Clayton3dedae12013-12-06 21:45:27 +00001300GDBRemoteCommunication::PacketResult
Greg Claytonfbb76342013-11-20 21:07:01 +00001301GDBRemoteCommunicationServer::Handle_qPlatform_chmod (StringExtractorGDBRemote &packet)
1302{
1303 packet.SetFilePos(::strlen("qPlatform_chmod:"));
1304
1305 mode_t mode = packet.GetHexMaxU32(false, UINT32_MAX);
Greg Clayton2b98c562013-11-22 18:53:12 +00001306 if (packet.GetChar() == ',')
1307 {
1308 std::string path;
1309 packet.GetHexByteString(path);
1310 Error error = Host::SetFilePermissions (path.c_str(), mode);
1311 if (error.Success())
1312 return SendPacketNoLock ("OK", 2);
1313 else
1314 return SendErrorResponse(error.GetError());
1315 }
1316 return SendErrorResponse(19);
Daniel Maleae0f8f572013-08-26 23:57:52 +00001317}
1318
Greg Clayton3dedae12013-12-06 21:45:27 +00001319GDBRemoteCommunication::PacketResult
Daniel Maleae0f8f572013-08-26 23:57:52 +00001320GDBRemoteCommunicationServer::Handle_vFile_Open (StringExtractorGDBRemote &packet)
1321{
1322 packet.SetFilePos(::strlen("vFile:open:"));
1323 std::string path;
1324 packet.GetHexByteStringTerminatedBy(path,',');
Greg Clayton2b98c562013-11-22 18:53:12 +00001325 if (!path.empty())
1326 {
1327 if (packet.GetChar() == ',')
1328 {
1329 uint32_t flags = packet.GetHexMaxU32(false, 0);
1330 if (packet.GetChar() == ',')
1331 {
1332 mode_t mode = packet.GetHexMaxU32(false, 0600);
1333 Error error;
1334 int fd = ::open (path.c_str(), flags, mode);
Greg Clayton2b98c562013-11-22 18:53:12 +00001335 const int save_errno = fd == -1 ? errno : 0;
1336 StreamString response;
1337 response.PutChar('F');
1338 response.Printf("%i", fd);
1339 if (save_errno)
1340 response.Printf(",%i", save_errno);
1341 return SendPacketNoLock(response.GetData(), response.GetSize());
1342 }
1343 }
1344 }
1345 return SendErrorResponse(18);
Daniel Maleae0f8f572013-08-26 23:57:52 +00001346}
1347
Greg Clayton3dedae12013-12-06 21:45:27 +00001348GDBRemoteCommunication::PacketResult
Daniel Maleae0f8f572013-08-26 23:57:52 +00001349GDBRemoteCommunicationServer::Handle_vFile_Close (StringExtractorGDBRemote &packet)
1350{
1351 packet.SetFilePos(::strlen("vFile:close:"));
1352 int fd = packet.GetS32(-1);
1353 Error error;
1354 int err = -1;
1355 int save_errno = 0;
1356 if (fd >= 0)
1357 {
1358 err = close(fd);
1359 save_errno = err == -1 ? errno : 0;
1360 }
1361 else
1362 {
1363 save_errno = EINVAL;
1364 }
1365 StreamString response;
1366 response.PutChar('F');
1367 response.Printf("%i", err);
1368 if (save_errno)
1369 response.Printf(",%i", save_errno);
Greg Clayton2b98c562013-11-22 18:53:12 +00001370 return SendPacketNoLock(response.GetData(), response.GetSize());
Daniel Maleae0f8f572013-08-26 23:57:52 +00001371}
1372
Greg Clayton3dedae12013-12-06 21:45:27 +00001373GDBRemoteCommunication::PacketResult
Daniel Maleae0f8f572013-08-26 23:57:52 +00001374GDBRemoteCommunicationServer::Handle_vFile_pRead (StringExtractorGDBRemote &packet)
1375{
Virgile Belloae12a362013-08-27 16:21:49 +00001376#ifdef _WIN32
1377 // Not implemented on Windows
Greg Clayton2b98c562013-11-22 18:53:12 +00001378 return SendUnimplementedResponse("GDBRemoteCommunicationServer::Handle_vFile_pRead() unimplemented");
Virgile Belloae12a362013-08-27 16:21:49 +00001379#else
Daniel Maleae0f8f572013-08-26 23:57:52 +00001380 StreamGDBRemote response;
1381 packet.SetFilePos(::strlen("vFile:pread:"));
1382 int fd = packet.GetS32(-1);
Greg Clayton2b98c562013-11-22 18:53:12 +00001383 if (packet.GetChar() == ',')
Daniel Maleae0f8f572013-08-26 23:57:52 +00001384 {
Greg Clayton2b98c562013-11-22 18:53:12 +00001385 uint64_t count = packet.GetU64(UINT64_MAX);
1386 if (packet.GetChar() == ',')
1387 {
1388 uint64_t offset = packet.GetU64(UINT32_MAX);
1389 if (count == UINT64_MAX)
1390 {
1391 response.Printf("F-1:%i", EINVAL);
1392 return SendPacketNoLock(response.GetData(), response.GetSize());
1393 }
1394
1395 std::string buffer(count, 0);
1396 const ssize_t bytes_read = ::pread (fd, &buffer[0], buffer.size(), offset);
1397 const int save_errno = bytes_read == -1 ? errno : 0;
1398 response.PutChar('F');
1399 response.Printf("%zi", bytes_read);
1400 if (save_errno)
1401 response.Printf(",%i", save_errno);
1402 else
1403 {
1404 response.PutChar(';');
1405 response.PutEscapedBytes(&buffer[0], bytes_read);
1406 }
1407 return SendPacketNoLock(response.GetData(), response.GetSize());
1408 }
Daniel Maleae0f8f572013-08-26 23:57:52 +00001409 }
Greg Clayton2b98c562013-11-22 18:53:12 +00001410 return SendErrorResponse(21);
1411
Virgile Belloae12a362013-08-27 16:21:49 +00001412#endif
Daniel Maleae0f8f572013-08-26 23:57:52 +00001413}
1414
Greg Clayton3dedae12013-12-06 21:45:27 +00001415GDBRemoteCommunication::PacketResult
Daniel Maleae0f8f572013-08-26 23:57:52 +00001416GDBRemoteCommunicationServer::Handle_vFile_pWrite (StringExtractorGDBRemote &packet)
1417{
Virgile Belloae12a362013-08-27 16:21:49 +00001418#ifdef _WIN32
Greg Clayton2b98c562013-11-22 18:53:12 +00001419 return SendUnimplementedResponse("GDBRemoteCommunicationServer::Handle_vFile_pWrite() unimplemented");
Virgile Belloae12a362013-08-27 16:21:49 +00001420#else
Daniel Maleae0f8f572013-08-26 23:57:52 +00001421 packet.SetFilePos(::strlen("vFile:pwrite:"));
1422
1423 StreamGDBRemote response;
1424 response.PutChar('F');
1425
1426 int fd = packet.GetU32(UINT32_MAX);
Greg Clayton2b98c562013-11-22 18:53:12 +00001427 if (packet.GetChar() == ',')
Daniel Maleae0f8f572013-08-26 23:57:52 +00001428 {
Greg Clayton2b98c562013-11-22 18:53:12 +00001429 off_t offset = packet.GetU64(UINT32_MAX);
1430 if (packet.GetChar() == ',')
1431 {
1432 std::string buffer;
1433 if (packet.GetEscapedBinaryData(buffer))
1434 {
1435 const ssize_t bytes_written = ::pwrite (fd, buffer.data(), buffer.size(), offset);
1436 const int save_errno = bytes_written == -1 ? errno : 0;
1437 response.Printf("%zi", bytes_written);
1438 if (save_errno)
1439 response.Printf(",%i", save_errno);
1440 }
1441 else
1442 {
1443 response.Printf ("-1,%i", EINVAL);
1444 }
1445 return SendPacketNoLock(response.GetData(), response.GetSize());
1446 }
Daniel Maleae0f8f572013-08-26 23:57:52 +00001447 }
Greg Clayton2b98c562013-11-22 18:53:12 +00001448 return SendErrorResponse(27);
Virgile Belloae12a362013-08-27 16:21:49 +00001449#endif
Daniel Maleae0f8f572013-08-26 23:57:52 +00001450}
1451
Greg Clayton3dedae12013-12-06 21:45:27 +00001452GDBRemoteCommunication::PacketResult
Daniel Maleae0f8f572013-08-26 23:57:52 +00001453GDBRemoteCommunicationServer::Handle_vFile_Size (StringExtractorGDBRemote &packet)
1454{
1455 packet.SetFilePos(::strlen("vFile:size:"));
1456 std::string path;
1457 packet.GetHexByteString(path);
Greg Clayton2b98c562013-11-22 18:53:12 +00001458 if (!path.empty())
Daniel Maleae0f8f572013-08-26 23:57:52 +00001459 {
Greg Clayton2b98c562013-11-22 18:53:12 +00001460 lldb::user_id_t retcode = Host::GetFileSize(FileSpec(path.c_str(), false));
1461 StreamString response;
1462 response.PutChar('F');
1463 response.PutHex64(retcode);
1464 if (retcode == UINT64_MAX)
1465 {
1466 response.PutChar(',');
1467 response.PutHex64(retcode); // TODO: replace with Host::GetSyswideErrorCode()
1468 }
1469 return SendPacketNoLock(response.GetData(), response.GetSize());
Daniel Maleae0f8f572013-08-26 23:57:52 +00001470 }
Greg Clayton2b98c562013-11-22 18:53:12 +00001471 return SendErrorResponse(22);
Daniel Maleae0f8f572013-08-26 23:57:52 +00001472}
1473
Greg Clayton3dedae12013-12-06 21:45:27 +00001474GDBRemoteCommunication::PacketResult
Daniel Maleae0f8f572013-08-26 23:57:52 +00001475GDBRemoteCommunicationServer::Handle_vFile_Mode (StringExtractorGDBRemote &packet)
1476{
1477 packet.SetFilePos(::strlen("vFile:mode:"));
1478 std::string path;
1479 packet.GetHexByteString(path);
Greg Clayton2b98c562013-11-22 18:53:12 +00001480 if (!path.empty())
1481 {
1482 Error error;
1483 const uint32_t mode = File::GetPermissions(path.c_str(), error);
1484 StreamString response;
1485 response.Printf("F%u", mode);
1486 if (mode == 0 || error.Fail())
1487 response.Printf(",%i", (int)error.GetError());
1488 return SendPacketNoLock(response.GetData(), response.GetSize());
1489 }
1490 return SendErrorResponse(23);
Daniel Maleae0f8f572013-08-26 23:57:52 +00001491}
1492
Greg Clayton3dedae12013-12-06 21:45:27 +00001493GDBRemoteCommunication::PacketResult
Daniel Maleae0f8f572013-08-26 23:57:52 +00001494GDBRemoteCommunicationServer::Handle_vFile_Exists (StringExtractorGDBRemote &packet)
1495{
1496 packet.SetFilePos(::strlen("vFile:exists:"));
1497 std::string path;
1498 packet.GetHexByteString(path);
Greg Clayton2b98c562013-11-22 18:53:12 +00001499 if (!path.empty())
1500 {
1501 bool retcode = Host::GetFileExists(FileSpec(path.c_str(), false));
1502 StreamString response;
1503 response.PutChar('F');
1504 response.PutChar(',');
1505 if (retcode)
1506 response.PutChar('1');
1507 else
1508 response.PutChar('0');
1509 return SendPacketNoLock(response.GetData(), response.GetSize());
1510 }
1511 return SendErrorResponse(24);
Daniel Maleae0f8f572013-08-26 23:57:52 +00001512}
1513
Greg Clayton3dedae12013-12-06 21:45:27 +00001514GDBRemoteCommunication::PacketResult
Greg Claytonfbb76342013-11-20 21:07:01 +00001515GDBRemoteCommunicationServer::Handle_vFile_symlink (StringExtractorGDBRemote &packet)
Daniel Maleae0f8f572013-08-26 23:57:52 +00001516{
Greg Claytonfbb76342013-11-20 21:07:01 +00001517 packet.SetFilePos(::strlen("vFile:symlink:"));
1518 std::string dst, src;
1519 packet.GetHexByteStringTerminatedBy(dst, ',');
1520 packet.GetChar(); // Skip ',' char
1521 packet.GetHexByteString(src);
1522 Error error = Host::Symlink(src.c_str(), dst.c_str());
1523 StreamString response;
1524 response.Printf("F%u,%u", error.GetError(), error.GetError());
Greg Clayton2b98c562013-11-22 18:53:12 +00001525 return SendPacketNoLock(response.GetData(), response.GetSize());
Greg Claytonfbb76342013-11-20 21:07:01 +00001526}
1527
Greg Clayton3dedae12013-12-06 21:45:27 +00001528GDBRemoteCommunication::PacketResult
Greg Claytonfbb76342013-11-20 21:07:01 +00001529GDBRemoteCommunicationServer::Handle_vFile_unlink (StringExtractorGDBRemote &packet)
1530{
1531 packet.SetFilePos(::strlen("vFile:unlink:"));
1532 std::string path;
1533 packet.GetHexByteString(path);
1534 Error error = Host::Unlink(path.c_str());
1535 StreamString response;
1536 response.Printf("F%u,%u", error.GetError(), error.GetError());
Greg Clayton2b98c562013-11-22 18:53:12 +00001537 return SendPacketNoLock(response.GetData(), response.GetSize());
Greg Claytonfbb76342013-11-20 21:07:01 +00001538}
1539
Greg Clayton3dedae12013-12-06 21:45:27 +00001540GDBRemoteCommunication::PacketResult
Greg Claytonfbb76342013-11-20 21:07:01 +00001541GDBRemoteCommunicationServer::Handle_qPlatform_shell (StringExtractorGDBRemote &packet)
1542{
1543 packet.SetFilePos(::strlen("qPlatform_shell:"));
Daniel Maleae0f8f572013-08-26 23:57:52 +00001544 std::string path;
1545 std::string working_dir;
1546 packet.GetHexByteStringTerminatedBy(path,',');
Greg Clayton2b98c562013-11-22 18:53:12 +00001547 if (!path.empty())
Daniel Maleae0f8f572013-08-26 23:57:52 +00001548 {
Greg Clayton2b98c562013-11-22 18:53:12 +00001549 if (packet.GetChar() == ',')
1550 {
1551 // FIXME: add timeout to qPlatform_shell packet
1552 // uint32_t timeout = packet.GetHexMaxU32(false, 32);
1553 uint32_t timeout = 10;
1554 if (packet.GetChar() == ',')
1555 packet.GetHexByteString(working_dir);
1556 int status, signo;
1557 std::string output;
1558 Error err = Host::RunShellCommand(path.c_str(),
1559 working_dir.empty() ? NULL : working_dir.c_str(),
1560 &status, &signo, &output, timeout);
1561 StreamGDBRemote response;
1562 if (err.Fail())
1563 {
1564 response.PutCString("F,");
1565 response.PutHex32(UINT32_MAX);
1566 }
1567 else
1568 {
1569 response.PutCString("F,");
1570 response.PutHex32(status);
1571 response.PutChar(',');
1572 response.PutHex32(signo);
1573 response.PutChar(',');
1574 response.PutEscapedBytes(output.c_str(), output.size());
1575 }
1576 return SendPacketNoLock(response.GetData(), response.GetSize());
1577 }
Daniel Maleae0f8f572013-08-26 23:57:52 +00001578 }
Greg Clayton2b98c562013-11-22 18:53:12 +00001579 return SendErrorResponse(24);
Daniel Maleae0f8f572013-08-26 23:57:52 +00001580}
1581
Greg Clayton3dedae12013-12-06 21:45:27 +00001582GDBRemoteCommunication::PacketResult
Daniel Maleae0f8f572013-08-26 23:57:52 +00001583GDBRemoteCommunicationServer::Handle_vFile_Stat (StringExtractorGDBRemote &packet)
1584{
Greg Clayton2b98c562013-11-22 18:53:12 +00001585 return SendUnimplementedResponse("GDBRemoteCommunicationServer::Handle_vFile_Stat() unimplemented");
Daniel Maleae0f8f572013-08-26 23:57:52 +00001586}
1587
Greg Clayton3dedae12013-12-06 21:45:27 +00001588GDBRemoteCommunication::PacketResult
Daniel Maleae0f8f572013-08-26 23:57:52 +00001589GDBRemoteCommunicationServer::Handle_vFile_MD5 (StringExtractorGDBRemote &packet)
1590{
Greg Clayton2b98c562013-11-22 18:53:12 +00001591 packet.SetFilePos(::strlen("vFile:MD5:"));
Daniel Maleae0f8f572013-08-26 23:57:52 +00001592 std::string path;
1593 packet.GetHexByteString(path);
Greg Clayton2b98c562013-11-22 18:53:12 +00001594 if (!path.empty())
Daniel Maleae0f8f572013-08-26 23:57:52 +00001595 {
Greg Clayton2b98c562013-11-22 18:53:12 +00001596 uint64_t a,b;
1597 StreamGDBRemote response;
1598 if (Host::CalculateMD5(FileSpec(path.c_str(),false),a,b) == false)
1599 {
1600 response.PutCString("F,");
1601 response.PutCString("x");
1602 }
1603 else
1604 {
1605 response.PutCString("F,");
1606 response.PutHex64(a);
1607 response.PutHex64(b);
1608 }
1609 return SendPacketNoLock(response.GetData(), response.GetSize());
Daniel Maleae0f8f572013-08-26 23:57:52 +00001610 }
Greg Clayton2b98c562013-11-22 18:53:12 +00001611 return SendErrorResponse(25);
Daniel Maleae0f8f572013-08-26 23:57:52 +00001612}
Greg Clayton2b98c562013-11-22 18:53:12 +00001613