blob: cb2e1f96f6efc9ae0577d8e3816eb5b284fc8e84 [file] [log] [blame]
Greg Clayton576d8832011-03-22 04:00:09 +00001//===-- GDBRemoteCommunicationServer.cpp ------------------------*- C++ -*-===//
2//
3// The LLVM Compiler Infrastructure
4//
5// This file is distributed under the University of Illinois Open Source
6// License. See LICENSE.TXT for details.
7//
8//===----------------------------------------------------------------------===//
9
Sylvestre Ledrud28b9932013-09-28 15:23:41 +000010#include <errno.h>
Greg Clayton576d8832011-03-22 04:00:09 +000011
12#include "GDBRemoteCommunicationServer.h"
Daniel Maleae0f8f572013-08-26 23:57:52 +000013#include "lldb/Core/StreamGDBRemote.h"
Greg Clayton576d8832011-03-22 04:00:09 +000014
15// C Includes
16// C++ Includes
17// Other libraries and framework includes
18#include "llvm/ADT/Triple.h"
19#include "lldb/Interpreter/Args.h"
20#include "lldb/Core/ConnectionFileDescriptor.h"
21#include "lldb/Core/Log.h"
22#include "lldb/Core/State.h"
23#include "lldb/Core/StreamString.h"
Enrico Granataf2bbf712011-07-15 02:26:42 +000024#include "lldb/Host/Endian.h"
Daniel Maleae0f8f572013-08-26 23:57:52 +000025#include "lldb/Host/File.h"
Greg Clayton576d8832011-03-22 04:00:09 +000026#include "lldb/Host/Host.h"
27#include "lldb/Host/TimeValue.h"
Todd Fialab8b49ec2014-01-28 00:34:23 +000028#include "lldb/Target/Platform.h"
Greg Clayton8b82f082011-04-12 05:54:46 +000029#include "lldb/Target/Process.h"
Greg Clayton576d8832011-03-22 04:00:09 +000030
31// Project includes
32#include "Utility/StringExtractorGDBRemote.h"
33#include "ProcessGDBRemote.h"
34#include "ProcessGDBRemoteLog.h"
35
36using namespace lldb;
37using namespace lldb_private;
38
39//----------------------------------------------------------------------
40// GDBRemoteCommunicationServer constructor
41//----------------------------------------------------------------------
Greg Clayton8b82f082011-04-12 05:54:46 +000042GDBRemoteCommunicationServer::GDBRemoteCommunicationServer(bool is_platform) :
43 GDBRemoteCommunication ("gdb-remote.server", "gdb-remote.server.rx_packet", is_platform),
Todd Fialab8b49ec2014-01-28 00:34:23 +000044 m_platform_sp (Platform::GetDefaultPlatform ()),
Greg Clayton8b82f082011-04-12 05:54:46 +000045 m_async_thread (LLDB_INVALID_HOST_THREAD),
46 m_process_launch_info (),
47 m_process_launch_error (),
Daniel Maleae0f8f572013-08-26 23:57:52 +000048 m_spawned_pids (),
49 m_spawned_pids_mutex (Mutex::eMutexTypeRecursive),
Greg Clayton8b82f082011-04-12 05:54:46 +000050 m_proc_infos (),
51 m_proc_infos_index (0),
Greg Clayton2b98c562013-11-22 18:53:12 +000052 m_port_map (),
53 m_port_offset(0)
Greg Clayton576d8832011-03-22 04:00:09 +000054{
55}
56
Todd Fialab8b49ec2014-01-28 00:34:23 +000057GDBRemoteCommunicationServer::GDBRemoteCommunicationServer(bool is_platform,
58 const lldb::PlatformSP& platform_sp) :
59 GDBRemoteCommunication ("gdb-remote.server", "gdb-remote.server.rx_packet", is_platform),
60 m_platform_sp (platform_sp),
61 m_async_thread (LLDB_INVALID_HOST_THREAD),
62 m_process_launch_info (),
63 m_process_launch_error (),
64 m_spawned_pids (),
65 m_spawned_pids_mutex (Mutex::eMutexTypeRecursive),
66 m_proc_infos (),
67 m_proc_infos_index (0),
68 m_port_map (),
69 m_port_offset(0)
70{
71 assert(platform_sp);
72}
73
Greg Clayton576d8832011-03-22 04:00:09 +000074//----------------------------------------------------------------------
75// Destructor
76//----------------------------------------------------------------------
77GDBRemoteCommunicationServer::~GDBRemoteCommunicationServer()
78{
79}
80
81
82//void *
83//GDBRemoteCommunicationServer::AsyncThread (void *arg)
84//{
85// GDBRemoteCommunicationServer *server = (GDBRemoteCommunicationServer*) arg;
86//
Greg Clayton5160ce52013-03-27 23:08:40 +000087// Log *log;// (ProcessGDBRemoteLog::GetLogIfAllCategoriesSet (GDBR_LOG_PROCESS));
Greg Clayton576d8832011-03-22 04:00:09 +000088// if (log)
89// log->Printf ("ProcessGDBRemote::%s (arg = %p, pid = %i) thread starting...", __FUNCTION__, arg, process->GetID());
90//
91// StringExtractorGDBRemote packet;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +000092//
Greg Clayton576d8832011-03-22 04:00:09 +000093// while ()
94// {
95// if (packet.
96// }
97//
98// if (log)
99// log->Printf ("ProcessGDBRemote::%s (arg = %p, pid = %i) thread exiting...", __FUNCTION__, arg, process->GetID());
100//
101// process->m_async_thread = LLDB_INVALID_HOST_THREAD;
102// return NULL;
103//}
104//
105bool
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000106GDBRemoteCommunicationServer::GetPacketAndSendResponse (uint32_t timeout_usec,
Greg Clayton1cb64962011-03-24 04:28:38 +0000107 Error &error,
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000108 bool &interrupt,
Greg Claytond314e812011-03-23 00:09:55 +0000109 bool &quit)
Greg Clayton576d8832011-03-22 04:00:09 +0000110{
111 StringExtractorGDBRemote packet;
Greg Clayton3dedae12013-12-06 21:45:27 +0000112 PacketResult packet_result = WaitForPacketWithTimeoutMicroSecondsNoLock (packet, timeout_usec);
113 if (packet_result == PacketResult::Success)
Greg Clayton576d8832011-03-22 04:00:09 +0000114 {
115 const StringExtractorGDBRemote::ServerPacketType packet_type = packet.GetServerPacketType ();
116 switch (packet_type)
117 {
Greg Clayton3dedae12013-12-06 21:45:27 +0000118 case StringExtractorGDBRemote::eServerPacketType_nack:
119 case StringExtractorGDBRemote::eServerPacketType_ack:
120 break;
Greg Clayton576d8832011-03-22 04:00:09 +0000121
Greg Clayton3dedae12013-12-06 21:45:27 +0000122 case StringExtractorGDBRemote::eServerPacketType_invalid:
123 error.SetErrorString("invalid packet");
124 quit = true;
125 break;
Greg Claytond314e812011-03-23 00:09:55 +0000126
Greg Clayton3dedae12013-12-06 21:45:27 +0000127 case StringExtractorGDBRemote::eServerPacketType_interrupt:
128 error.SetErrorString("interrupt received");
129 interrupt = true;
130 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000131
Greg Clayton3dedae12013-12-06 21:45:27 +0000132 default:
133 case StringExtractorGDBRemote::eServerPacketType_unimplemented:
134 packet_result = SendUnimplementedResponse (packet.GetStringRef().c_str());
135 break;
Greg Clayton576d8832011-03-22 04:00:09 +0000136
Greg Clayton3dedae12013-12-06 21:45:27 +0000137 case StringExtractorGDBRemote::eServerPacketType_A:
138 packet_result = Handle_A (packet);
139 break;
Greg Clayton32e0a752011-03-30 18:16:51 +0000140
Greg Clayton3dedae12013-12-06 21:45:27 +0000141 case StringExtractorGDBRemote::eServerPacketType_qfProcessInfo:
142 packet_result = Handle_qfProcessInfo (packet);
143 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000144
Greg Clayton3dedae12013-12-06 21:45:27 +0000145 case StringExtractorGDBRemote::eServerPacketType_qsProcessInfo:
146 packet_result = Handle_qsProcessInfo (packet);
147 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000148
Greg Clayton3dedae12013-12-06 21:45:27 +0000149 case StringExtractorGDBRemote::eServerPacketType_qC:
150 packet_result = Handle_qC (packet);
151 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000152
Greg Clayton3dedae12013-12-06 21:45:27 +0000153 case StringExtractorGDBRemote::eServerPacketType_qHostInfo:
154 packet_result = Handle_qHostInfo (packet);
155 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000156
Greg Clayton3dedae12013-12-06 21:45:27 +0000157 case StringExtractorGDBRemote::eServerPacketType_qLaunchGDBServer:
158 packet_result = Handle_qLaunchGDBServer (packet);
159 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000160
Greg Clayton3dedae12013-12-06 21:45:27 +0000161 case StringExtractorGDBRemote::eServerPacketType_qKillSpawnedProcess:
162 packet_result = Handle_qKillSpawnedProcess (packet);
163 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000164
Todd Fiala403edc52014-01-23 22:05:44 +0000165 case StringExtractorGDBRemote::eServerPacketType_k:
166 packet_result = Handle_k (packet);
167 break;
168
Greg Clayton3dedae12013-12-06 21:45:27 +0000169 case StringExtractorGDBRemote::eServerPacketType_qLaunchSuccess:
170 packet_result = Handle_qLaunchSuccess (packet);
171 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000172
Greg Clayton3dedae12013-12-06 21:45:27 +0000173 case StringExtractorGDBRemote::eServerPacketType_qGroupName:
174 packet_result = Handle_qGroupName (packet);
175 break;
Greg Clayton32e0a752011-03-30 18:16:51 +0000176
Greg Clayton3dedae12013-12-06 21:45:27 +0000177 case StringExtractorGDBRemote::eServerPacketType_qProcessInfoPID:
178 packet_result = Handle_qProcessInfoPID (packet);
179 break;
Greg Clayton32e0a752011-03-30 18:16:51 +0000180
Greg Clayton3dedae12013-12-06 21:45:27 +0000181 case StringExtractorGDBRemote::eServerPacketType_qSpeedTest:
182 packet_result = Handle_qSpeedTest (packet);
183 break;
Greg Clayton32e0a752011-03-30 18:16:51 +0000184
Greg Clayton3dedae12013-12-06 21:45:27 +0000185 case StringExtractorGDBRemote::eServerPacketType_qUserName:
186 packet_result = Handle_qUserName (packet);
187 break;
Greg Clayton32e0a752011-03-30 18:16:51 +0000188
Greg Clayton3dedae12013-12-06 21:45:27 +0000189 case StringExtractorGDBRemote::eServerPacketType_qGetWorkingDir:
190 packet_result = Handle_qGetWorkingDir(packet);
191 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000192
Greg Clayton3dedae12013-12-06 21:45:27 +0000193 case StringExtractorGDBRemote::eServerPacketType_QEnvironment:
194 packet_result = Handle_QEnvironment (packet);
195 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000196
Greg Clayton3dedae12013-12-06 21:45:27 +0000197 case StringExtractorGDBRemote::eServerPacketType_QLaunchArch:
198 packet_result = Handle_QLaunchArch (packet);
199 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000200
Greg Clayton3dedae12013-12-06 21:45:27 +0000201 case StringExtractorGDBRemote::eServerPacketType_QSetDisableASLR:
202 packet_result = Handle_QSetDisableASLR (packet);
203 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000204
Greg Clayton3dedae12013-12-06 21:45:27 +0000205 case StringExtractorGDBRemote::eServerPacketType_QSetSTDIN:
206 packet_result = Handle_QSetSTDIN (packet);
207 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000208
Greg Clayton3dedae12013-12-06 21:45:27 +0000209 case StringExtractorGDBRemote::eServerPacketType_QSetSTDOUT:
210 packet_result = Handle_QSetSTDOUT (packet);
211 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000212
Greg Clayton3dedae12013-12-06 21:45:27 +0000213 case StringExtractorGDBRemote::eServerPacketType_QSetSTDERR:
214 packet_result = Handle_QSetSTDERR (packet);
215 break;
Greg Clayton8b82f082011-04-12 05:54:46 +0000216
Greg Clayton3dedae12013-12-06 21:45:27 +0000217 case StringExtractorGDBRemote::eServerPacketType_QSetWorkingDir:
218 packet_result = Handle_QSetWorkingDir (packet);
219 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000220
Greg Clayton3dedae12013-12-06 21:45:27 +0000221 case StringExtractorGDBRemote::eServerPacketType_QStartNoAckMode:
222 packet_result = Handle_QStartNoAckMode (packet);
223 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000224
Greg Clayton3dedae12013-12-06 21:45:27 +0000225 case StringExtractorGDBRemote::eServerPacketType_qPlatform_mkdir:
226 packet_result = Handle_qPlatform_mkdir (packet);
227 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000228
Greg Clayton3dedae12013-12-06 21:45:27 +0000229 case StringExtractorGDBRemote::eServerPacketType_qPlatform_chmod:
230 packet_result = Handle_qPlatform_chmod (packet);
231 break;
Greg Claytonfbb76342013-11-20 21:07:01 +0000232
Greg Clayton3dedae12013-12-06 21:45:27 +0000233 case StringExtractorGDBRemote::eServerPacketType_qPlatform_shell:
234 packet_result = Handle_qPlatform_shell (packet);
235 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000236
Greg Clayton3dedae12013-12-06 21:45:27 +0000237 case StringExtractorGDBRemote::eServerPacketType_vFile_open:
238 packet_result = Handle_vFile_Open (packet);
239 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000240
Greg Clayton3dedae12013-12-06 21:45:27 +0000241 case StringExtractorGDBRemote::eServerPacketType_vFile_close:
242 packet_result = Handle_vFile_Close (packet);
243 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000244
Greg Clayton3dedae12013-12-06 21:45:27 +0000245 case StringExtractorGDBRemote::eServerPacketType_vFile_pread:
246 packet_result = Handle_vFile_pRead (packet);
247 break;
Daniel Maleae0f8f572013-08-26 23:57:52 +0000248
Greg Clayton3dedae12013-12-06 21:45:27 +0000249 case StringExtractorGDBRemote::eServerPacketType_vFile_pwrite:
250 packet_result = Handle_vFile_pWrite (packet);
251 break;
Daniel Maleae0f8f572013-08-26 23:57:52 +0000252
Greg Clayton3dedae12013-12-06 21:45:27 +0000253 case StringExtractorGDBRemote::eServerPacketType_vFile_size:
254 packet_result = Handle_vFile_Size (packet);
255 break;
Daniel Maleae0f8f572013-08-26 23:57:52 +0000256
Greg Clayton3dedae12013-12-06 21:45:27 +0000257 case StringExtractorGDBRemote::eServerPacketType_vFile_mode:
258 packet_result = Handle_vFile_Mode (packet);
259 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000260
Greg Clayton3dedae12013-12-06 21:45:27 +0000261 case StringExtractorGDBRemote::eServerPacketType_vFile_exists:
262 packet_result = Handle_vFile_Exists (packet);
263 break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000264
Greg Clayton3dedae12013-12-06 21:45:27 +0000265 case StringExtractorGDBRemote::eServerPacketType_vFile_stat:
266 packet_result = Handle_vFile_Stat (packet);
267 break;
Greg Claytonfbb76342013-11-20 21:07:01 +0000268
Greg Clayton3dedae12013-12-06 21:45:27 +0000269 case StringExtractorGDBRemote::eServerPacketType_vFile_md5:
270 packet_result = Handle_vFile_MD5 (packet);
271 break;
272
273 case StringExtractorGDBRemote::eServerPacketType_vFile_symlink:
274 packet_result = Handle_vFile_symlink (packet);
275 break;
276
277 case StringExtractorGDBRemote::eServerPacketType_vFile_unlink:
278 packet_result = Handle_vFile_unlink (packet);
279 break;
Greg Clayton576d8832011-03-22 04:00:09 +0000280 }
Greg Clayton576d8832011-03-22 04:00:09 +0000281 }
Greg Clayton1cb64962011-03-24 04:28:38 +0000282 else
283 {
284 if (!IsConnected())
Greg Clayton3dedae12013-12-06 21:45:27 +0000285 {
Greg Clayton1cb64962011-03-24 04:28:38 +0000286 error.SetErrorString("lost connection");
Greg Clayton3dedae12013-12-06 21:45:27 +0000287 quit = true;
288 }
Greg Clayton1cb64962011-03-24 04:28:38 +0000289 else
Greg Clayton3dedae12013-12-06 21:45:27 +0000290 {
Greg Clayton1cb64962011-03-24 04:28:38 +0000291 error.SetErrorString("timeout");
Greg Clayton3dedae12013-12-06 21:45:27 +0000292 }
Greg Clayton1cb64962011-03-24 04:28:38 +0000293 }
Greg Clayton3dedae12013-12-06 21:45:27 +0000294 return packet_result == PacketResult::Success;
Greg Clayton576d8832011-03-22 04:00:09 +0000295}
296
Todd Fiala403edc52014-01-23 22:05:44 +0000297lldb_private::Error
Todd Fiala3e92a2b2014-01-24 00:52:53 +0000298GDBRemoteCommunicationServer::SetLaunchArguments (const char *const args[], int argc)
Todd Fiala403edc52014-01-23 22:05:44 +0000299{
300 if ((argc < 1) || !args || !args[0] || !args[0][0])
Todd Fiala3e92a2b2014-01-24 00:52:53 +0000301 return lldb_private::Error ("%s: no process command line specified to launch", __FUNCTION__);
Todd Fiala403edc52014-01-23 22:05:44 +0000302
Todd Fiala403edc52014-01-23 22:05:44 +0000303 m_process_launch_info.SetArguments (const_cast<const char**> (args), true);
Todd Fiala3e92a2b2014-01-24 00:52:53 +0000304 return lldb_private::Error ();
305}
306
307lldb_private::Error
308GDBRemoteCommunicationServer::SetLaunchFlags (unsigned int launch_flags)
309{
Todd Fiala403edc52014-01-23 22:05:44 +0000310 m_process_launch_info.GetFlags ().Set (launch_flags);
Todd Fiala3e92a2b2014-01-24 00:52:53 +0000311 return lldb_private::Error ();
312}
313
314lldb_private::Error
315GDBRemoteCommunicationServer::LaunchProcess ()
316{
317 if (!m_process_launch_info.GetArguments ().GetArgumentCount ())
318 return lldb_private::Error ("%s: no process command line specified to launch", __FUNCTION__);
319
320 // specify the process monitor if not already set. This should
321 // generally be what happens since we need to reap started
322 // processes.
323 if (!m_process_launch_info.GetMonitorProcessCallback ())
324 m_process_launch_info.SetMonitorProcessCallback(ReapDebuggedProcess, this, false);
Todd Fiala403edc52014-01-23 22:05:44 +0000325
Todd Fialab8b49ec2014-01-28 00:34:23 +0000326 lldb_private::Error error = m_platform_sp->LaunchProcess (m_process_launch_info);
Todd Fiala403edc52014-01-23 22:05:44 +0000327 if (!error.Success ())
328 {
Todd Fiala3e92a2b2014-01-24 00:52:53 +0000329 fprintf (stderr, "%s: failed to launch executable %s", __FUNCTION__, m_process_launch_info.GetArguments ().GetArgumentAtIndex (0));
Todd Fiala403edc52014-01-23 22:05:44 +0000330 return error;
331 }
332
Todd Fiala3e92a2b2014-01-24 00:52:53 +0000333 printf ("Launched '%s' as process %" PRIu64 "...\n", m_process_launch_info.GetArguments ().GetArgumentAtIndex (0), m_process_launch_info.GetProcessID());
Todd Fiala403edc52014-01-23 22:05:44 +0000334
335 // add to list of spawned processes. On an lldb-gdbserver, we
336 // would expect there to be only one.
337 lldb::pid_t pid;
338 if ( (pid = m_process_launch_info.GetProcessID()) != LLDB_INVALID_PROCESS_ID )
339 {
340 Mutex::Locker locker (m_spawned_pids_mutex);
341 m_spawned_pids.insert(pid);
342 }
343
344 return error;
345}
346
Greg Clayton3dedae12013-12-06 21:45:27 +0000347GDBRemoteCommunication::PacketResult
Greg Clayton32e0a752011-03-30 18:16:51 +0000348GDBRemoteCommunicationServer::SendUnimplementedResponse (const char *)
Greg Clayton576d8832011-03-22 04:00:09 +0000349{
Greg Clayton32e0a752011-03-30 18:16:51 +0000350 // TODO: Log the packet we aren't handling...
Greg Clayton37a0a242012-04-11 00:24:49 +0000351 return SendPacketNoLock ("", 0);
Greg Clayton576d8832011-03-22 04:00:09 +0000352}
353
Greg Clayton3dedae12013-12-06 21:45:27 +0000354GDBRemoteCommunication::PacketResult
Greg Clayton32e0a752011-03-30 18:16:51 +0000355GDBRemoteCommunicationServer::SendErrorResponse (uint8_t err)
356{
357 char packet[16];
358 int packet_len = ::snprintf (packet, sizeof(packet), "E%2.2x", err);
Andy Gibbsa297a972013-06-19 19:04:53 +0000359 assert (packet_len < (int)sizeof(packet));
Greg Clayton37a0a242012-04-11 00:24:49 +0000360 return SendPacketNoLock (packet, packet_len);
Greg Clayton32e0a752011-03-30 18:16:51 +0000361}
362
363
Greg Clayton3dedae12013-12-06 21:45:27 +0000364GDBRemoteCommunication::PacketResult
Greg Clayton1cb64962011-03-24 04:28:38 +0000365GDBRemoteCommunicationServer::SendOKResponse ()
366{
Greg Clayton37a0a242012-04-11 00:24:49 +0000367 return SendPacketNoLock ("OK", 2);
Greg Clayton1cb64962011-03-24 04:28:38 +0000368}
369
370bool
371GDBRemoteCommunicationServer::HandshakeWithClient(Error *error_ptr)
372{
Greg Clayton3dedae12013-12-06 21:45:27 +0000373 return GetAck() == PacketResult::Success;
Greg Clayton1cb64962011-03-24 04:28:38 +0000374}
Greg Clayton576d8832011-03-22 04:00:09 +0000375
Greg Clayton3dedae12013-12-06 21:45:27 +0000376GDBRemoteCommunication::PacketResult
Greg Clayton32e0a752011-03-30 18:16:51 +0000377GDBRemoteCommunicationServer::Handle_qHostInfo (StringExtractorGDBRemote &packet)
Greg Clayton576d8832011-03-22 04:00:09 +0000378{
379 StreamString response;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000380
Greg Clayton576d8832011-03-22 04:00:09 +0000381 // $cputype:16777223;cpusubtype:3;ostype:Darwin;vendor:apple;endian:little;ptrsize:8;#00
382
383 ArchSpec host_arch (Host::GetArchitecture ());
Greg Clayton576d8832011-03-22 04:00:09 +0000384 const llvm::Triple &host_triple = host_arch.GetTriple();
Greg Clayton1cb64962011-03-24 04:28:38 +0000385 response.PutCString("triple:");
386 response.PutCStringAsRawHex8(host_triple.getTriple().c_str());
387 response.Printf (";ptrsize:%u;",host_arch.GetAddressByteSize());
Greg Clayton576d8832011-03-22 04:00:09 +0000388
Todd Fialaa9ddb0e2014-01-18 03:02:39 +0000389 const char* distribution_id = host_arch.GetDistributionId ().AsCString ();
390 if (distribution_id)
391 {
392 response.PutCString("distribution_id:");
393 response.PutCStringAsRawHex8(distribution_id);
394 response.PutCString(";");
395 }
396
Greg Clayton1cb64962011-03-24 04:28:38 +0000397 uint32_t cpu = host_arch.GetMachOCPUType();
398 uint32_t sub = host_arch.GetMachOCPUSubType();
399 if (cpu != LLDB_INVALID_CPUTYPE)
400 response.Printf ("cputype:%u;", cpu);
401 if (sub != LLDB_INVALID_CPUTYPE)
402 response.Printf ("cpusubtype:%u;", sub);
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000403
Enrico Granata1c5431a2012-07-13 23:55:22 +0000404 if (cpu == ArchSpec::kCore_arm_any)
Enrico Granataf04a2192012-07-13 23:18:48 +0000405 response.Printf("watchpoint_exceptions_received:before;"); // On armv7 we use "synchronous" watchpoints which means the exception is delivered before the instruction executes.
406 else
407 response.Printf("watchpoint_exceptions_received:after;");
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000408
Greg Clayton576d8832011-03-22 04:00:09 +0000409 switch (lldb::endian::InlHostByteOrder())
410 {
411 case eByteOrderBig: response.PutCString ("endian:big;"); break;
412 case eByteOrderLittle: response.PutCString ("endian:little;"); break;
413 case eByteOrderPDP: response.PutCString ("endian:pdp;"); break;
414 default: response.PutCString ("endian:unknown;"); break;
415 }
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000416
Greg Clayton1cb64962011-03-24 04:28:38 +0000417 uint32_t major = UINT32_MAX;
418 uint32_t minor = UINT32_MAX;
419 uint32_t update = UINT32_MAX;
420 if (Host::GetOSVersion (major, minor, update))
421 {
422 if (major != UINT32_MAX)
423 {
424 response.Printf("os_version:%u", major);
425 if (minor != UINT32_MAX)
426 {
427 response.Printf(".%u", minor);
428 if (update != UINT32_MAX)
429 response.Printf(".%u", update);
430 }
431 response.PutChar(';');
432 }
433 }
434
435 std::string s;
436 if (Host::GetOSBuildString (s))
437 {
438 response.PutCString ("os_build:");
439 response.PutCStringAsRawHex8(s.c_str());
440 response.PutChar(';');
441 }
442 if (Host::GetOSKernelDescription (s))
443 {
444 response.PutCString ("os_kernel:");
445 response.PutCStringAsRawHex8(s.c_str());
446 response.PutChar(';');
447 }
Greg Clayton2b98c562013-11-22 18:53:12 +0000448#if defined(__APPLE__)
449
450#if defined(__arm__)
451 // For iOS devices, we are connected through a USB Mux so we never pretend
452 // to actually have a hostname as far as the remote lldb that is connecting
453 // to this lldb-platform is concerned
454 response.PutCString ("hostname:");
Greg Clayton16810922014-02-27 19:38:18 +0000455 response.PutCStringAsRawHex8("127.0.0.1");
Greg Clayton2b98c562013-11-22 18:53:12 +0000456 response.PutChar(';');
457#else // #if defined(__arm__)
Greg Clayton1cb64962011-03-24 04:28:38 +0000458 if (Host::GetHostname (s))
459 {
460 response.PutCString ("hostname:");
461 response.PutCStringAsRawHex8(s.c_str());
462 response.PutChar(';');
463 }
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000464
Greg Clayton2b98c562013-11-22 18:53:12 +0000465#endif // #if defined(__arm__)
466
467#else // #if defined(__APPLE__)
468 if (Host::GetHostname (s))
469 {
470 response.PutCString ("hostname:");
471 response.PutCStringAsRawHex8(s.c_str());
472 response.PutChar(';');
473 }
474#endif // #if defined(__APPLE__)
475
Greg Clayton3dedae12013-12-06 21:45:27 +0000476 return SendPacketNoLock (response.GetData(), response.GetSize());
Greg Clayton576d8832011-03-22 04:00:09 +0000477}
Greg Clayton1cb64962011-03-24 04:28:38 +0000478
Greg Clayton32e0a752011-03-30 18:16:51 +0000479static void
Greg Clayton8b82f082011-04-12 05:54:46 +0000480CreateProcessInfoResponse (const ProcessInstanceInfo &proc_info, StreamString &response)
Greg Clayton32e0a752011-03-30 18:16:51 +0000481{
Daniel Malead01b2952012-11-29 21:49:15 +0000482 response.Printf ("pid:%" PRIu64 ";ppid:%" PRIu64 ";uid:%i;gid:%i;euid:%i;egid:%i;",
Greg Clayton32e0a752011-03-30 18:16:51 +0000483 proc_info.GetProcessID(),
484 proc_info.GetParentProcessID(),
Greg Clayton8b82f082011-04-12 05:54:46 +0000485 proc_info.GetUserID(),
486 proc_info.GetGroupID(),
Greg Clayton32e0a752011-03-30 18:16:51 +0000487 proc_info.GetEffectiveUserID(),
488 proc_info.GetEffectiveGroupID());
489 response.PutCString ("name:");
490 response.PutCStringAsRawHex8(proc_info.GetName());
491 response.PutChar(';');
492 const ArchSpec &proc_arch = proc_info.GetArchitecture();
493 if (proc_arch.IsValid())
494 {
495 const llvm::Triple &proc_triple = proc_arch.GetTriple();
496 response.PutCString("triple:");
497 response.PutCStringAsRawHex8(proc_triple.getTriple().c_str());
498 response.PutChar(';');
499 }
500}
Greg Clayton1cb64962011-03-24 04:28:38 +0000501
Greg Clayton3dedae12013-12-06 21:45:27 +0000502GDBRemoteCommunication::PacketResult
Greg Clayton32e0a752011-03-30 18:16:51 +0000503GDBRemoteCommunicationServer::Handle_qProcessInfoPID (StringExtractorGDBRemote &packet)
Greg Clayton1cb64962011-03-24 04:28:38 +0000504{
Greg Clayton32e0a752011-03-30 18:16:51 +0000505 // Packet format: "qProcessInfoPID:%i" where %i is the pid
Greg Clayton8b82f082011-04-12 05:54:46 +0000506 packet.SetFilePos(::strlen ("qProcessInfoPID:"));
Greg Clayton32e0a752011-03-30 18:16:51 +0000507 lldb::pid_t pid = packet.GetU32 (LLDB_INVALID_PROCESS_ID);
508 if (pid != LLDB_INVALID_PROCESS_ID)
509 {
Greg Clayton8b82f082011-04-12 05:54:46 +0000510 ProcessInstanceInfo proc_info;
Greg Clayton32e0a752011-03-30 18:16:51 +0000511 if (Host::GetProcessInfo(pid, proc_info))
512 {
513 StreamString response;
514 CreateProcessInfoResponse (proc_info, response);
Greg Clayton37a0a242012-04-11 00:24:49 +0000515 return SendPacketNoLock (response.GetData(), response.GetSize());
Greg Clayton32e0a752011-03-30 18:16:51 +0000516 }
517 }
518 return SendErrorResponse (1);
519}
520
Greg Clayton3dedae12013-12-06 21:45:27 +0000521GDBRemoteCommunication::PacketResult
Greg Clayton32e0a752011-03-30 18:16:51 +0000522GDBRemoteCommunicationServer::Handle_qfProcessInfo (StringExtractorGDBRemote &packet)
523{
524 m_proc_infos_index = 0;
525 m_proc_infos.Clear();
526
Greg Clayton8b82f082011-04-12 05:54:46 +0000527 ProcessInstanceInfoMatch match_info;
528 packet.SetFilePos(::strlen ("qfProcessInfo"));
Greg Clayton32e0a752011-03-30 18:16:51 +0000529 if (packet.GetChar() == ':')
530 {
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000531
Greg Clayton32e0a752011-03-30 18:16:51 +0000532 std::string key;
533 std::string value;
534 while (packet.GetNameColonValue(key, value))
535 {
536 bool success = true;
537 if (key.compare("name") == 0)
538 {
539 StringExtractor extractor;
540 extractor.GetStringRef().swap(value);
541 extractor.GetHexByteString (value);
Greg Clayton144f3a92011-11-15 03:53:30 +0000542 match_info.GetProcessInfo().GetExecutableFile().SetFile(value.c_str(), false);
Greg Clayton32e0a752011-03-30 18:16:51 +0000543 }
544 else if (key.compare("name_match") == 0)
545 {
546 if (value.compare("equals") == 0)
547 {
548 match_info.SetNameMatchType (eNameMatchEquals);
549 }
550 else if (value.compare("starts_with") == 0)
551 {
552 match_info.SetNameMatchType (eNameMatchStartsWith);
553 }
554 else if (value.compare("ends_with") == 0)
555 {
556 match_info.SetNameMatchType (eNameMatchEndsWith);
557 }
558 else if (value.compare("contains") == 0)
559 {
560 match_info.SetNameMatchType (eNameMatchContains);
561 }
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000562 else if (value.compare("regex") == 0)
Greg Clayton32e0a752011-03-30 18:16:51 +0000563 {
564 match_info.SetNameMatchType (eNameMatchRegularExpression);
565 }
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000566 else
Greg Clayton32e0a752011-03-30 18:16:51 +0000567 {
568 success = false;
569 }
570 }
571 else if (key.compare("pid") == 0)
572 {
573 match_info.GetProcessInfo().SetProcessID (Args::StringToUInt32(value.c_str(), LLDB_INVALID_PROCESS_ID, 0, &success));
574 }
575 else if (key.compare("parent_pid") == 0)
576 {
577 match_info.GetProcessInfo().SetParentProcessID (Args::StringToUInt32(value.c_str(), LLDB_INVALID_PROCESS_ID, 0, &success));
578 }
579 else if (key.compare("uid") == 0)
580 {
Greg Clayton8b82f082011-04-12 05:54:46 +0000581 match_info.GetProcessInfo().SetUserID (Args::StringToUInt32(value.c_str(), UINT32_MAX, 0, &success));
Greg Clayton32e0a752011-03-30 18:16:51 +0000582 }
583 else if (key.compare("gid") == 0)
584 {
Greg Clayton8b82f082011-04-12 05:54:46 +0000585 match_info.GetProcessInfo().SetGroupID (Args::StringToUInt32(value.c_str(), UINT32_MAX, 0, &success));
Greg Clayton32e0a752011-03-30 18:16:51 +0000586 }
587 else if (key.compare("euid") == 0)
588 {
589 match_info.GetProcessInfo().SetEffectiveUserID (Args::StringToUInt32(value.c_str(), UINT32_MAX, 0, &success));
590 }
591 else if (key.compare("egid") == 0)
592 {
593 match_info.GetProcessInfo().SetEffectiveGroupID (Args::StringToUInt32(value.c_str(), UINT32_MAX, 0, &success));
594 }
595 else if (key.compare("all_users") == 0)
596 {
597 match_info.SetMatchAllUsers(Args::StringToBoolean(value.c_str(), false, &success));
598 }
599 else if (key.compare("triple") == 0)
600 {
Greg Claytoneb0103f2011-04-07 22:46:35 +0000601 match_info.GetProcessInfo().GetArchitecture().SetTriple (value.c_str(), NULL);
Greg Clayton32e0a752011-03-30 18:16:51 +0000602 }
603 else
604 {
605 success = false;
606 }
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000607
Greg Clayton32e0a752011-03-30 18:16:51 +0000608 if (!success)
609 return SendErrorResponse (2);
610 }
611 }
612
613 if (Host::FindProcesses (match_info, m_proc_infos))
614 {
615 // We found something, return the first item by calling the get
616 // subsequent process info packet handler...
617 return Handle_qsProcessInfo (packet);
618 }
619 return SendErrorResponse (3);
620}
621
Greg Clayton3dedae12013-12-06 21:45:27 +0000622GDBRemoteCommunication::PacketResult
Greg Clayton32e0a752011-03-30 18:16:51 +0000623GDBRemoteCommunicationServer::Handle_qsProcessInfo (StringExtractorGDBRemote &packet)
624{
625 if (m_proc_infos_index < m_proc_infos.GetSize())
626 {
627 StreamString response;
628 CreateProcessInfoResponse (m_proc_infos.GetProcessInfoAtIndex(m_proc_infos_index), response);
629 ++m_proc_infos_index;
Greg Clayton37a0a242012-04-11 00:24:49 +0000630 return SendPacketNoLock (response.GetData(), response.GetSize());
Greg Clayton32e0a752011-03-30 18:16:51 +0000631 }
632 return SendErrorResponse (4);
633}
634
Greg Clayton3dedae12013-12-06 21:45:27 +0000635GDBRemoteCommunication::PacketResult
Greg Clayton32e0a752011-03-30 18:16:51 +0000636GDBRemoteCommunicationServer::Handle_qUserName (StringExtractorGDBRemote &packet)
637{
638 // Packet format: "qUserName:%i" where %i is the uid
Greg Clayton8b82f082011-04-12 05:54:46 +0000639 packet.SetFilePos(::strlen ("qUserName:"));
Greg Clayton32e0a752011-03-30 18:16:51 +0000640 uint32_t uid = packet.GetU32 (UINT32_MAX);
641 if (uid != UINT32_MAX)
642 {
643 std::string name;
644 if (Host::GetUserName (uid, name))
645 {
646 StreamString response;
647 response.PutCStringAsRawHex8 (name.c_str());
Greg Clayton37a0a242012-04-11 00:24:49 +0000648 return SendPacketNoLock (response.GetData(), response.GetSize());
Greg Clayton32e0a752011-03-30 18:16:51 +0000649 }
650 }
651 return SendErrorResponse (5);
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000652
Greg Clayton32e0a752011-03-30 18:16:51 +0000653}
654
Greg Clayton3dedae12013-12-06 21:45:27 +0000655GDBRemoteCommunication::PacketResult
Greg Clayton32e0a752011-03-30 18:16:51 +0000656GDBRemoteCommunicationServer::Handle_qGroupName (StringExtractorGDBRemote &packet)
657{
658 // Packet format: "qGroupName:%i" where %i is the gid
Greg Clayton8b82f082011-04-12 05:54:46 +0000659 packet.SetFilePos(::strlen ("qGroupName:"));
Greg Clayton32e0a752011-03-30 18:16:51 +0000660 uint32_t gid = packet.GetU32 (UINT32_MAX);
661 if (gid != UINT32_MAX)
662 {
663 std::string name;
664 if (Host::GetGroupName (gid, name))
665 {
666 StreamString response;
667 response.PutCStringAsRawHex8 (name.c_str());
Greg Clayton37a0a242012-04-11 00:24:49 +0000668 return SendPacketNoLock (response.GetData(), response.GetSize());
Greg Clayton32e0a752011-03-30 18:16:51 +0000669 }
670 }
671 return SendErrorResponse (6);
672}
673
Greg Clayton3dedae12013-12-06 21:45:27 +0000674GDBRemoteCommunication::PacketResult
Greg Clayton9b1e1cd2011-04-04 18:18:57 +0000675GDBRemoteCommunicationServer::Handle_qSpeedTest (StringExtractorGDBRemote &packet)
676{
Greg Clayton8b82f082011-04-12 05:54:46 +0000677 packet.SetFilePos(::strlen ("qSpeedTest:"));
Greg Clayton9b1e1cd2011-04-04 18:18:57 +0000678
679 std::string key;
680 std::string value;
681 bool success = packet.GetNameColonValue(key, value);
682 if (success && key.compare("response_size") == 0)
683 {
684 uint32_t response_size = Args::StringToUInt32(value.c_str(), 0, 0, &success);
685 if (success)
686 {
687 if (response_size == 0)
688 return SendOKResponse();
689 StreamString response;
690 uint32_t bytes_left = response_size;
691 response.PutCString("data:");
692 while (bytes_left > 0)
693 {
694 if (bytes_left >= 26)
695 {
696 response.PutCString("ABCDEFGHIJKLMNOPQRSTUVWXYZ");
697 bytes_left -= 26;
698 }
699 else
700 {
701 response.Printf ("%*.*s;", bytes_left, bytes_left, "ABCDEFGHIJKLMNOPQRSTUVWXYZ");
702 bytes_left = 0;
703 }
704 }
Greg Clayton37a0a242012-04-11 00:24:49 +0000705 return SendPacketNoLock (response.GetData(), response.GetSize());
Greg Clayton9b1e1cd2011-04-04 18:18:57 +0000706 }
707 }
708 return SendErrorResponse (7);
709}
Greg Clayton8b82f082011-04-12 05:54:46 +0000710
Greg Clayton8b82f082011-04-12 05:54:46 +0000711//
712//static bool
713//WaitForProcessToSIGSTOP (const lldb::pid_t pid, const int timeout_in_seconds)
714//{
715// const int time_delta_usecs = 100000;
716// const int num_retries = timeout_in_seconds/time_delta_usecs;
717// for (int i=0; i<num_retries; i++)
718// {
719// struct proc_bsdinfo bsd_info;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000720// int error = ::proc_pidinfo (pid, PROC_PIDTBSDINFO,
721// (uint64_t) 0,
722// &bsd_info,
Greg Clayton8b82f082011-04-12 05:54:46 +0000723// PROC_PIDTBSDINFO_SIZE);
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000724//
Greg Clayton8b82f082011-04-12 05:54:46 +0000725// switch (error)
726// {
727// case EINVAL:
728// case ENOTSUP:
729// case ESRCH:
730// case EPERM:
731// return false;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000732//
Greg Clayton8b82f082011-04-12 05:54:46 +0000733// default:
734// break;
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000735//
Greg Clayton8b82f082011-04-12 05:54:46 +0000736// case 0:
737// if (bsd_info.pbi_status == SSTOP)
738// return true;
739// }
740// ::usleep (time_delta_usecs);
741// }
742// return false;
743//}
744
Greg Clayton3dedae12013-12-06 21:45:27 +0000745GDBRemoteCommunication::PacketResult
Greg Clayton8b82f082011-04-12 05:54:46 +0000746GDBRemoteCommunicationServer::Handle_A (StringExtractorGDBRemote &packet)
747{
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000748 // The 'A' packet is the most over designed packet ever here with
749 // redundant argument indexes, redundant argument lengths and needed hex
750 // encoded argument string values. Really all that is needed is a comma
Greg Clayton8b82f082011-04-12 05:54:46 +0000751 // separated hex encoded argument value list, but we will stay true to the
752 // documented version of the 'A' packet here...
753
754 packet.SetFilePos(1); // Skip the 'A'
755 bool success = true;
756 while (success && packet.GetBytesLeft() > 0)
757 {
758 // Decode the decimal argument string length. This length is the
759 // number of hex nibbles in the argument string value.
760 const uint32_t arg_len = packet.GetU32(UINT32_MAX);
761 if (arg_len == UINT32_MAX)
762 success = false;
763 else
764 {
765 // Make sure the argument hex string length is followed by a comma
766 if (packet.GetChar() != ',')
767 success = false;
768 else
769 {
770 // Decode the argument index. We ignore this really becuase
771 // who would really send down the arguments in a random order???
772 const uint32_t arg_idx = packet.GetU32(UINT32_MAX);
773 if (arg_idx == UINT32_MAX)
774 success = false;
775 else
776 {
777 // Make sure the argument index is followed by a comma
778 if (packet.GetChar() != ',')
779 success = false;
780 else
781 {
782 // Decode the argument string value from hex bytes
783 // back into a UTF8 string and make sure the length
784 // matches the one supplied in the packet
785 std::string arg;
786 if (packet.GetHexByteString(arg) != (arg_len / 2))
787 success = false;
788 else
789 {
790 // If there are any bytes lft
791 if (packet.GetBytesLeft())
792 {
793 if (packet.GetChar() != ',')
794 success = false;
795 }
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000796
Greg Clayton8b82f082011-04-12 05:54:46 +0000797 if (success)
798 {
799 if (arg_idx == 0)
800 m_process_launch_info.GetExecutableFile().SetFile(arg.c_str(), false);
801 m_process_launch_info.GetArguments().AppendArgument(arg.c_str());
802 }
803 }
804 }
805 }
806 }
807 }
808 }
809
810 if (success)
811 {
Todd Fiala9f377372014-01-27 20:44:50 +0000812 // FIXME: remove linux restriction once eLaunchFlagDebug is supported
813#if !defined (__linux__)
Greg Clayton8b82f082011-04-12 05:54:46 +0000814 m_process_launch_info.GetFlags().Set (eLaunchFlagDebug);
Todd Fiala9f377372014-01-27 20:44:50 +0000815#endif
816 m_process_launch_error = LaunchProcess ();
Greg Clayton8b82f082011-04-12 05:54:46 +0000817 if (m_process_launch_info.GetProcessID() != LLDB_INVALID_PROCESS_ID)
818 {
819 return SendOKResponse ();
820 }
821 }
822 return SendErrorResponse (8);
823}
824
Greg Clayton3dedae12013-12-06 21:45:27 +0000825GDBRemoteCommunication::PacketResult
Greg Clayton8b82f082011-04-12 05:54:46 +0000826GDBRemoteCommunicationServer::Handle_qC (StringExtractorGDBRemote &packet)
827{
828 lldb::pid_t pid = m_process_launch_info.GetProcessID();
829 StreamString response;
Daniel Malead01b2952012-11-29 21:49:15 +0000830 response.Printf("QC%" PRIx64, pid);
Greg Clayton8b82f082011-04-12 05:54:46 +0000831 if (m_is_platform)
832 {
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000833 // If we launch a process and this GDB server is acting as a platform,
834 // then we need to clear the process launch state so we can start
Greg Clayton8b82f082011-04-12 05:54:46 +0000835 // launching another process. In order to launch a process a bunch or
836 // packets need to be sent: environment packets, working directory,
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000837 // disable ASLR, and many more settings. When we launch a process we
Greg Clayton8b82f082011-04-12 05:54:46 +0000838 // then need to know when to clear this information. Currently we are
839 // selecting the 'qC' packet as that packet which seems to make the most
840 // sense.
841 if (pid != LLDB_INVALID_PROCESS_ID)
842 {
843 m_process_launch_info.Clear();
844 }
845 }
Greg Clayton37a0a242012-04-11 00:24:49 +0000846 return SendPacketNoLock (response.GetData(), response.GetSize());
Greg Clayton8b82f082011-04-12 05:54:46 +0000847}
848
849bool
Daniel Maleae0f8f572013-08-26 23:57:52 +0000850GDBRemoteCommunicationServer::DebugserverProcessReaped (lldb::pid_t pid)
851{
852 Mutex::Locker locker (m_spawned_pids_mutex);
Greg Clayton29b8fc42013-11-21 01:44:58 +0000853 FreePortForProcess(pid);
Daniel Maleae0f8f572013-08-26 23:57:52 +0000854 return m_spawned_pids.erase(pid) > 0;
855}
856bool
857GDBRemoteCommunicationServer::ReapDebugserverProcess (void *callback_baton,
858 lldb::pid_t pid,
859 bool exited,
860 int signal, // Zero for no signal
861 int status) // Exit value of process if signal is zero
862{
863 GDBRemoteCommunicationServer *server = (GDBRemoteCommunicationServer *)callback_baton;
864 server->DebugserverProcessReaped (pid);
865 return true;
866}
867
Todd Fiala3e92a2b2014-01-24 00:52:53 +0000868bool
869GDBRemoteCommunicationServer::DebuggedProcessReaped (lldb::pid_t pid)
870{
871 // reap a process that we were debugging (but not debugserver)
872 Mutex::Locker locker (m_spawned_pids_mutex);
873 return m_spawned_pids.erase(pid) > 0;
874}
875
876bool
877GDBRemoteCommunicationServer::ReapDebuggedProcess (void *callback_baton,
878 lldb::pid_t pid,
879 bool exited,
880 int signal, // Zero for no signal
881 int status) // Exit value of process if signal is zero
882{
883 GDBRemoteCommunicationServer *server = (GDBRemoteCommunicationServer *)callback_baton;
884 server->DebuggedProcessReaped (pid);
885 return true;
886}
887
Greg Clayton3dedae12013-12-06 21:45:27 +0000888GDBRemoteCommunication::PacketResult
Greg Clayton8b82f082011-04-12 05:54:46 +0000889GDBRemoteCommunicationServer::Handle_qLaunchGDBServer (StringExtractorGDBRemote &packet)
890{
Virgile Bellob2f1fb22013-08-23 12:44:05 +0000891#ifdef _WIN32
Deepak Panickal263fde02014-01-14 11:34:44 +0000892 return SendErrorResponse(9);
Virgile Bellob2f1fb22013-08-23 12:44:05 +0000893#else
Greg Clayton8b82f082011-04-12 05:54:46 +0000894 // Spawn a local debugserver as a platform so we can then attach or launch
895 // a process...
896
897 if (m_is_platform)
898 {
899 // Sleep and wait a bit for debugserver to start to listen...
900 ConnectionFileDescriptor file_conn;
Greg Clayton8b82f082011-04-12 05:54:46 +0000901 Error error;
Daniel Maleae0f8f572013-08-26 23:57:52 +0000902 std::string hostname;
Sylvestre Ledrufaa63ce2013-09-28 15:57:37 +0000903 // TODO: /tmp/ should not be hardcoded. User might want to override /tmp
904 // with the TMPDIR environnement variable
Greg Clayton29b8fc42013-11-21 01:44:58 +0000905 packet.SetFilePos(::strlen ("qLaunchGDBServer;"));
906 std::string name;
907 std::string value;
908 uint16_t port = UINT16_MAX;
909 while (packet.GetNameColonValue(name, value))
Greg Clayton8b82f082011-04-12 05:54:46 +0000910 {
Greg Clayton29b8fc42013-11-21 01:44:58 +0000911 if (name.compare ("host") == 0)
912 hostname.swap(value);
913 else if (name.compare ("port") == 0)
914 port = Args::StringToUInt32(value.c_str(), 0, 0);
Greg Clayton8b82f082011-04-12 05:54:46 +0000915 }
Greg Clayton29b8fc42013-11-21 01:44:58 +0000916 if (port == UINT16_MAX)
917 port = GetNextAvailablePort();
918
919 // Spawn a new thread to accept the port that gets bound after
920 // binding to port 0 (zero).
Greg Claytonfbb76342013-11-20 21:07:01 +0000921
Greg Clayton29b8fc42013-11-21 01:44:58 +0000922 if (error.Success())
923 {
924 // Spawn a debugserver and try to get the port it listens to.
925 ProcessLaunchInfo debugserver_launch_info;
Greg Clayton29b8fc42013-11-21 01:44:58 +0000926 if (hostname.empty())
Greg Clayton16810922014-02-27 19:38:18 +0000927 hostname = "127.0.0.1";
Greg Clayton29b8fc42013-11-21 01:44:58 +0000928 Log *log(GetLogIfAnyCategoriesSet(LIBLLDB_LOG_PLATFORM));
929 if (log)
Greg Claytonfda4fab2014-01-10 22:24:11 +0000930 log->Printf("Launching debugserver with: %s:%u...\n", hostname.c_str(), port);
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000931
Greg Clayton29b8fc42013-11-21 01:44:58 +0000932 debugserver_launch_info.SetMonitorProcessCallback(ReapDebugserverProcess, this, false);
933
Greg Claytonfda4fab2014-01-10 22:24:11 +0000934 error = StartDebugserverProcess (hostname.empty() ? NULL : hostname.c_str(),
935 port,
Greg Clayton00fe87b2013-12-05 22:58:22 +0000936 debugserver_launch_info,
937 port);
Greg Clayton29b8fc42013-11-21 01:44:58 +0000938
939 lldb::pid_t debugserver_pid = debugserver_launch_info.GetProcessID();
Sylvestre Ledrub027bd22013-09-28 14:35:00 +0000940
Greg Claytonfbb76342013-11-20 21:07:01 +0000941
Greg Clayton29b8fc42013-11-21 01:44:58 +0000942 if (debugserver_pid != LLDB_INVALID_PROCESS_ID)
943 {
944 Mutex::Locker locker (m_spawned_pids_mutex);
945 m_spawned_pids.insert(debugserver_pid);
946 if (port > 0)
947 AssociatePortWithProcess(port, debugserver_pid);
948 }
949 else
950 {
951 if (port > 0)
952 FreePort (port);
953 }
954
955 if (error.Success())
956 {
Greg Clayton91a9b2472013-12-04 19:19:12 +0000957 char response[256];
958 const int response_len = ::snprintf (response, sizeof(response), "pid:%" PRIu64 ";port:%u;", debugserver_pid, port + m_port_offset);
959 assert (response_len < sizeof(response));
Greg Clayton3dedae12013-12-06 21:45:27 +0000960 PacketResult packet_result = SendPacketNoLock (response, response_len);
Greg Clayton29b8fc42013-11-21 01:44:58 +0000961
Greg Clayton3dedae12013-12-06 21:45:27 +0000962 if (packet_result != PacketResult::Success)
Greg Clayton29b8fc42013-11-21 01:44:58 +0000963 {
964 if (debugserver_pid != LLDB_INVALID_PROCESS_ID)
965 ::kill (debugserver_pid, SIGINT);
966 }
Greg Clayton3dedae12013-12-06 21:45:27 +0000967 return packet_result;
Greg Clayton29b8fc42013-11-21 01:44:58 +0000968 }
Greg Clayton8b82f082011-04-12 05:54:46 +0000969 }
970 }
Daniel Maleae0f8f572013-08-26 23:57:52 +0000971 return SendErrorResponse (9);
Virgile Bellob2f1fb22013-08-23 12:44:05 +0000972#endif
Greg Clayton8b82f082011-04-12 05:54:46 +0000973}
974
Todd Fiala403edc52014-01-23 22:05:44 +0000975bool
976GDBRemoteCommunicationServer::KillSpawnedProcess (lldb::pid_t pid)
977{
978 // make sure we know about this process
979 {
980 Mutex::Locker locker (m_spawned_pids_mutex);
981 if (m_spawned_pids.find(pid) == m_spawned_pids.end())
982 return false;
983 }
984
985 // first try a SIGTERM (standard kill)
986 Host::Kill (pid, SIGTERM);
987
988 // check if that worked
989 for (size_t i=0; i<10; ++i)
990 {
991 {
992 Mutex::Locker locker (m_spawned_pids_mutex);
993 if (m_spawned_pids.find(pid) == m_spawned_pids.end())
994 {
995 // it is now killed
996 return true;
997 }
998 }
999 usleep (10000);
1000 }
1001
1002 // check one more time after the final usleep
1003 {
1004 Mutex::Locker locker (m_spawned_pids_mutex);
1005 if (m_spawned_pids.find(pid) == m_spawned_pids.end())
1006 return true;
1007 }
1008
1009 // the launched process still lives. Now try killling it again,
1010 // this time with an unblockable signal.
1011 Host::Kill (pid, SIGKILL);
1012
1013 for (size_t i=0; i<10; ++i)
1014 {
1015 {
1016 Mutex::Locker locker (m_spawned_pids_mutex);
1017 if (m_spawned_pids.find(pid) == m_spawned_pids.end())
1018 {
1019 // it is now killed
1020 return true;
1021 }
1022 }
1023 usleep (10000);
1024 }
1025
1026 // check one more time after the final usleep
1027 // Scope for locker
1028 {
1029 Mutex::Locker locker (m_spawned_pids_mutex);
1030 if (m_spawned_pids.find(pid) == m_spawned_pids.end())
1031 return true;
1032 }
1033
1034 // no luck - the process still lives
1035 return false;
1036}
1037
Greg Clayton3dedae12013-12-06 21:45:27 +00001038GDBRemoteCommunication::PacketResult
Daniel Maleae0f8f572013-08-26 23:57:52 +00001039GDBRemoteCommunicationServer::Handle_qKillSpawnedProcess (StringExtractorGDBRemote &packet)
1040{
Todd Fiala403edc52014-01-23 22:05:44 +00001041 packet.SetFilePos(::strlen ("qKillSpawnedProcess:"));
Sylvestre Ledrub027bd22013-09-28 14:35:00 +00001042
Todd Fiala403edc52014-01-23 22:05:44 +00001043 lldb::pid_t pid = packet.GetU64(LLDB_INVALID_PROCESS_ID);
1044
1045 // verify that we know anything about this pid.
1046 // Scope for locker
Daniel Maleae0f8f572013-08-26 23:57:52 +00001047 {
Todd Fiala403edc52014-01-23 22:05:44 +00001048 Mutex::Locker locker (m_spawned_pids_mutex);
1049 if (m_spawned_pids.find(pid) == m_spawned_pids.end())
Daniel Maleae0f8f572013-08-26 23:57:52 +00001050 {
Todd Fiala403edc52014-01-23 22:05:44 +00001051 // not a pid we know about
1052 return SendErrorResponse (10);
Daniel Maleae0f8f572013-08-26 23:57:52 +00001053 }
1054 }
Todd Fiala403edc52014-01-23 22:05:44 +00001055
1056 // go ahead and attempt to kill the spawned process
1057 if (KillSpawnedProcess (pid))
1058 return SendOKResponse ();
1059 else
1060 return SendErrorResponse (11);
1061}
1062
1063GDBRemoteCommunication::PacketResult
1064GDBRemoteCommunicationServer::Handle_k (StringExtractorGDBRemote &packet)
1065{
1066 // ignore for now if we're lldb_platform
1067 if (m_is_platform)
1068 return SendUnimplementedResponse (packet.GetStringRef().c_str());
1069
1070 // shutdown all spawned processes
1071 std::set<lldb::pid_t> spawned_pids_copy;
1072
1073 // copy pids
1074 {
1075 Mutex::Locker locker (m_spawned_pids_mutex);
1076 spawned_pids_copy.insert (m_spawned_pids.begin (), m_spawned_pids.end ());
1077 }
1078
1079 // nuke the spawned processes
1080 for (auto it = spawned_pids_copy.begin (); it != spawned_pids_copy.end (); ++it)
1081 {
1082 lldb::pid_t spawned_pid = *it;
1083 if (!KillSpawnedProcess (spawned_pid))
1084 {
1085 fprintf (stderr, "%s: failed to kill spawned pid %" PRIu64 ", ignoring.\n", __FUNCTION__, spawned_pid);
1086 }
1087 }
1088
1089 // TODO figure out how to shut down gracefully at this point
1090 return SendOKResponse ();
Daniel Maleae0f8f572013-08-26 23:57:52 +00001091}
1092
Greg Clayton3dedae12013-12-06 21:45:27 +00001093GDBRemoteCommunication::PacketResult
Greg Clayton8b82f082011-04-12 05:54:46 +00001094GDBRemoteCommunicationServer::Handle_qLaunchSuccess (StringExtractorGDBRemote &packet)
1095{
1096 if (m_process_launch_error.Success())
1097 return SendOKResponse();
Sylvestre Ledrub027bd22013-09-28 14:35:00 +00001098 StreamString response;
Greg Clayton8b82f082011-04-12 05:54:46 +00001099 response.PutChar('E');
1100 response.PutCString(m_process_launch_error.AsCString("<unknown error>"));
Greg Clayton37a0a242012-04-11 00:24:49 +00001101 return SendPacketNoLock (response.GetData(), response.GetSize());
Greg Clayton8b82f082011-04-12 05:54:46 +00001102}
1103
Greg Clayton3dedae12013-12-06 21:45:27 +00001104GDBRemoteCommunication::PacketResult
Greg Clayton8b82f082011-04-12 05:54:46 +00001105GDBRemoteCommunicationServer::Handle_QEnvironment (StringExtractorGDBRemote &packet)
1106{
1107 packet.SetFilePos(::strlen ("QEnvironment:"));
1108 const uint32_t bytes_left = packet.GetBytesLeft();
1109 if (bytes_left > 0)
1110 {
1111 m_process_launch_info.GetEnvironmentEntries ().AppendArgument (packet.Peek());
1112 return SendOKResponse ();
1113 }
Greg Clayton2b98c562013-11-22 18:53:12 +00001114 return SendErrorResponse (12);
Daniel Maleae0f8f572013-08-26 23:57:52 +00001115}
1116
Greg Clayton3dedae12013-12-06 21:45:27 +00001117GDBRemoteCommunication::PacketResult
Daniel Maleae0f8f572013-08-26 23:57:52 +00001118GDBRemoteCommunicationServer::Handle_QLaunchArch (StringExtractorGDBRemote &packet)
1119{
1120 packet.SetFilePos(::strlen ("QLaunchArch:"));
1121 const uint32_t bytes_left = packet.GetBytesLeft();
1122 if (bytes_left > 0)
1123 {
1124 const char* arch_triple = packet.Peek();
1125 ArchSpec arch_spec(arch_triple,NULL);
1126 m_process_launch_info.SetArchitecture(arch_spec);
1127 return SendOKResponse();
1128 }
Greg Clayton2b98c562013-11-22 18:53:12 +00001129 return SendErrorResponse(13);
Greg Clayton8b82f082011-04-12 05:54:46 +00001130}
1131
Greg Clayton3dedae12013-12-06 21:45:27 +00001132GDBRemoteCommunication::PacketResult
Greg Clayton8b82f082011-04-12 05:54:46 +00001133GDBRemoteCommunicationServer::Handle_QSetDisableASLR (StringExtractorGDBRemote &packet)
1134{
1135 packet.SetFilePos(::strlen ("QSetDisableASLR:"));
1136 if (packet.GetU32(0))
1137 m_process_launch_info.GetFlags().Set (eLaunchFlagDisableASLR);
1138 else
1139 m_process_launch_info.GetFlags().Clear (eLaunchFlagDisableASLR);
1140 return SendOKResponse ();
1141}
1142
Greg Clayton3dedae12013-12-06 21:45:27 +00001143GDBRemoteCommunication::PacketResult
Greg Clayton8b82f082011-04-12 05:54:46 +00001144GDBRemoteCommunicationServer::Handle_QSetWorkingDir (StringExtractorGDBRemote &packet)
1145{
1146 packet.SetFilePos(::strlen ("QSetWorkingDir:"));
1147 std::string path;
1148 packet.GetHexByteString(path);
Greg Claytonfbb76342013-11-20 21:07:01 +00001149 if (m_is_platform)
1150 {
Colin Riley909bb7a2013-11-26 15:10:46 +00001151#ifdef _WIN32
1152 // Not implemented on Windows
1153 return SendUnimplementedResponse("GDBRemoteCommunicationServer::Handle_QSetWorkingDir unimplemented");
1154#else
Greg Claytonfbb76342013-11-20 21:07:01 +00001155 // If this packet is sent to a platform, then change the current working directory
1156 if (::chdir(path.c_str()) != 0)
1157 return SendErrorResponse(errno);
Colin Riley909bb7a2013-11-26 15:10:46 +00001158#endif
Greg Claytonfbb76342013-11-20 21:07:01 +00001159 }
1160 else
1161 {
1162 m_process_launch_info.SwapWorkingDirectory (path);
1163 }
Greg Clayton8b82f082011-04-12 05:54:46 +00001164 return SendOKResponse ();
1165}
1166
Greg Clayton3dedae12013-12-06 21:45:27 +00001167GDBRemoteCommunication::PacketResult
Greg Claytonfbb76342013-11-20 21:07:01 +00001168GDBRemoteCommunicationServer::Handle_qGetWorkingDir (StringExtractorGDBRemote &packet)
1169{
1170 StreamString response;
1171
1172 if (m_is_platform)
1173 {
1174 // If this packet is sent to a platform, then change the current working directory
1175 char cwd[PATH_MAX];
1176 if (getcwd(cwd, sizeof(cwd)) == NULL)
1177 {
1178 return SendErrorResponse(errno);
1179 }
1180 else
1181 {
1182 response.PutBytesAsRawHex8(cwd, strlen(cwd));
Greg Clayton3dedae12013-12-06 21:45:27 +00001183 return SendPacketNoLock(response.GetData(), response.GetSize());
Greg Claytonfbb76342013-11-20 21:07:01 +00001184 }
1185 }
1186 else
1187 {
1188 const char *working_dir = m_process_launch_info.GetWorkingDirectory();
1189 if (working_dir && working_dir[0])
1190 {
1191 response.PutBytesAsRawHex8(working_dir, strlen(working_dir));
Greg Clayton3dedae12013-12-06 21:45:27 +00001192 return SendPacketNoLock(response.GetData(), response.GetSize());
Greg Claytonfbb76342013-11-20 21:07:01 +00001193 }
1194 else
1195 {
Greg Clayton2b98c562013-11-22 18:53:12 +00001196 return SendErrorResponse(14);
Greg Claytonfbb76342013-11-20 21:07:01 +00001197 }
1198 }
1199}
1200
Greg Clayton3dedae12013-12-06 21:45:27 +00001201GDBRemoteCommunication::PacketResult
Greg Clayton8b82f082011-04-12 05:54:46 +00001202GDBRemoteCommunicationServer::Handle_QSetSTDIN (StringExtractorGDBRemote &packet)
1203{
1204 packet.SetFilePos(::strlen ("QSetSTDIN:"));
1205 ProcessLaunchInfo::FileAction file_action;
1206 std::string path;
1207 packet.GetHexByteString(path);
1208 const bool read = false;
1209 const bool write = true;
1210 if (file_action.Open(STDIN_FILENO, path.c_str(), read, write))
1211 {
1212 m_process_launch_info.AppendFileAction(file_action);
1213 return SendOKResponse ();
1214 }
Greg Clayton2b98c562013-11-22 18:53:12 +00001215 return SendErrorResponse (15);
Greg Clayton8b82f082011-04-12 05:54:46 +00001216}
1217
Greg Clayton3dedae12013-12-06 21:45:27 +00001218GDBRemoteCommunication::PacketResult
Greg Clayton8b82f082011-04-12 05:54:46 +00001219GDBRemoteCommunicationServer::Handle_QSetSTDOUT (StringExtractorGDBRemote &packet)
1220{
1221 packet.SetFilePos(::strlen ("QSetSTDOUT:"));
1222 ProcessLaunchInfo::FileAction file_action;
1223 std::string path;
1224 packet.GetHexByteString(path);
1225 const bool read = true;
1226 const bool write = false;
1227 if (file_action.Open(STDOUT_FILENO, path.c_str(), read, write))
1228 {
1229 m_process_launch_info.AppendFileAction(file_action);
1230 return SendOKResponse ();
1231 }
Greg Clayton2b98c562013-11-22 18:53:12 +00001232 return SendErrorResponse (16);
Greg Clayton8b82f082011-04-12 05:54:46 +00001233}
1234
Greg Clayton3dedae12013-12-06 21:45:27 +00001235GDBRemoteCommunication::PacketResult
Greg Clayton8b82f082011-04-12 05:54:46 +00001236GDBRemoteCommunicationServer::Handle_QSetSTDERR (StringExtractorGDBRemote &packet)
1237{
1238 packet.SetFilePos(::strlen ("QSetSTDERR:"));
1239 ProcessLaunchInfo::FileAction file_action;
1240 std::string path;
1241 packet.GetHexByteString(path);
1242 const bool read = true;
Greg Clayton9845a8d2012-03-06 04:01:04 +00001243 const bool write = false;
Greg Clayton8b82f082011-04-12 05:54:46 +00001244 if (file_action.Open(STDERR_FILENO, path.c_str(), read, write))
1245 {
1246 m_process_launch_info.AppendFileAction(file_action);
1247 return SendOKResponse ();
1248 }
Greg Clayton2b98c562013-11-22 18:53:12 +00001249 return SendErrorResponse (17);
Greg Clayton8b82f082011-04-12 05:54:46 +00001250}
1251
Greg Clayton3dedae12013-12-06 21:45:27 +00001252GDBRemoteCommunication::PacketResult
Greg Clayton32e0a752011-03-30 18:16:51 +00001253GDBRemoteCommunicationServer::Handle_QStartNoAckMode (StringExtractorGDBRemote &packet)
1254{
1255 // Send response first before changing m_send_acks to we ack this packet
Greg Clayton3dedae12013-12-06 21:45:27 +00001256 PacketResult packet_result = SendOKResponse ();
Greg Clayton1cb64962011-03-24 04:28:38 +00001257 m_send_acks = false;
Greg Clayton3dedae12013-12-06 21:45:27 +00001258 return packet_result;
Greg Clayton1cb64962011-03-24 04:28:38 +00001259}
Daniel Maleae0f8f572013-08-26 23:57:52 +00001260
Greg Clayton3dedae12013-12-06 21:45:27 +00001261GDBRemoteCommunication::PacketResult
Greg Claytonfbb76342013-11-20 21:07:01 +00001262GDBRemoteCommunicationServer::Handle_qPlatform_mkdir (StringExtractorGDBRemote &packet)
Daniel Maleae0f8f572013-08-26 23:57:52 +00001263{
Greg Claytonfbb76342013-11-20 21:07:01 +00001264 packet.SetFilePos(::strlen("qPlatform_mkdir:"));
Daniel Maleae0f8f572013-08-26 23:57:52 +00001265 mode_t mode = packet.GetHexMaxU32(false, UINT32_MAX);
Greg Clayton2b98c562013-11-22 18:53:12 +00001266 if (packet.GetChar() == ',')
1267 {
1268 std::string path;
1269 packet.GetHexByteString(path);
1270 Error error = Host::MakeDirectory(path.c_str(),mode);
1271 if (error.Success())
1272 return SendPacketNoLock ("OK", 2);
1273 else
1274 return SendErrorResponse(error.GetError());
1275 }
1276 return SendErrorResponse(20);
Greg Claytonfbb76342013-11-20 21:07:01 +00001277}
1278
Greg Clayton3dedae12013-12-06 21:45:27 +00001279GDBRemoteCommunication::PacketResult
Greg Claytonfbb76342013-11-20 21:07:01 +00001280GDBRemoteCommunicationServer::Handle_qPlatform_chmod (StringExtractorGDBRemote &packet)
1281{
1282 packet.SetFilePos(::strlen("qPlatform_chmod:"));
1283
1284 mode_t mode = packet.GetHexMaxU32(false, UINT32_MAX);
Greg Clayton2b98c562013-11-22 18:53:12 +00001285 if (packet.GetChar() == ',')
1286 {
1287 std::string path;
1288 packet.GetHexByteString(path);
1289 Error error = Host::SetFilePermissions (path.c_str(), mode);
1290 if (error.Success())
1291 return SendPacketNoLock ("OK", 2);
1292 else
1293 return SendErrorResponse(error.GetError());
1294 }
1295 return SendErrorResponse(19);
Daniel Maleae0f8f572013-08-26 23:57:52 +00001296}
1297
Greg Clayton3dedae12013-12-06 21:45:27 +00001298GDBRemoteCommunication::PacketResult
Daniel Maleae0f8f572013-08-26 23:57:52 +00001299GDBRemoteCommunicationServer::Handle_vFile_Open (StringExtractorGDBRemote &packet)
1300{
1301 packet.SetFilePos(::strlen("vFile:open:"));
1302 std::string path;
1303 packet.GetHexByteStringTerminatedBy(path,',');
Greg Clayton2b98c562013-11-22 18:53:12 +00001304 if (!path.empty())
1305 {
1306 if (packet.GetChar() == ',')
1307 {
1308 uint32_t flags = packet.GetHexMaxU32(false, 0);
1309 if (packet.GetChar() == ',')
1310 {
1311 mode_t mode = packet.GetHexMaxU32(false, 0600);
1312 Error error;
1313 int fd = ::open (path.c_str(), flags, mode);
Greg Clayton2b98c562013-11-22 18:53:12 +00001314 const int save_errno = fd == -1 ? errno : 0;
1315 StreamString response;
1316 response.PutChar('F');
1317 response.Printf("%i", fd);
1318 if (save_errno)
1319 response.Printf(",%i", save_errno);
1320 return SendPacketNoLock(response.GetData(), response.GetSize());
1321 }
1322 }
1323 }
1324 return SendErrorResponse(18);
Daniel Maleae0f8f572013-08-26 23:57:52 +00001325}
1326
Greg Clayton3dedae12013-12-06 21:45:27 +00001327GDBRemoteCommunication::PacketResult
Daniel Maleae0f8f572013-08-26 23:57:52 +00001328GDBRemoteCommunicationServer::Handle_vFile_Close (StringExtractorGDBRemote &packet)
1329{
1330 packet.SetFilePos(::strlen("vFile:close:"));
1331 int fd = packet.GetS32(-1);
1332 Error error;
1333 int err = -1;
1334 int save_errno = 0;
1335 if (fd >= 0)
1336 {
1337 err = close(fd);
1338 save_errno = err == -1 ? errno : 0;
1339 }
1340 else
1341 {
1342 save_errno = EINVAL;
1343 }
1344 StreamString response;
1345 response.PutChar('F');
1346 response.Printf("%i", err);
1347 if (save_errno)
1348 response.Printf(",%i", save_errno);
Greg Clayton2b98c562013-11-22 18:53:12 +00001349 return SendPacketNoLock(response.GetData(), response.GetSize());
Daniel Maleae0f8f572013-08-26 23:57:52 +00001350}
1351
Greg Clayton3dedae12013-12-06 21:45:27 +00001352GDBRemoteCommunication::PacketResult
Daniel Maleae0f8f572013-08-26 23:57:52 +00001353GDBRemoteCommunicationServer::Handle_vFile_pRead (StringExtractorGDBRemote &packet)
1354{
Virgile Belloae12a362013-08-27 16:21:49 +00001355#ifdef _WIN32
1356 // Not implemented on Windows
Greg Clayton2b98c562013-11-22 18:53:12 +00001357 return SendUnimplementedResponse("GDBRemoteCommunicationServer::Handle_vFile_pRead() unimplemented");
Virgile Belloae12a362013-08-27 16:21:49 +00001358#else
Daniel Maleae0f8f572013-08-26 23:57:52 +00001359 StreamGDBRemote response;
1360 packet.SetFilePos(::strlen("vFile:pread:"));
1361 int fd = packet.GetS32(-1);
Greg Clayton2b98c562013-11-22 18:53:12 +00001362 if (packet.GetChar() == ',')
Daniel Maleae0f8f572013-08-26 23:57:52 +00001363 {
Greg Clayton2b98c562013-11-22 18:53:12 +00001364 uint64_t count = packet.GetU64(UINT64_MAX);
1365 if (packet.GetChar() == ',')
1366 {
1367 uint64_t offset = packet.GetU64(UINT32_MAX);
1368 if (count == UINT64_MAX)
1369 {
1370 response.Printf("F-1:%i", EINVAL);
1371 return SendPacketNoLock(response.GetData(), response.GetSize());
1372 }
1373
1374 std::string buffer(count, 0);
1375 const ssize_t bytes_read = ::pread (fd, &buffer[0], buffer.size(), offset);
1376 const int save_errno = bytes_read == -1 ? errno : 0;
1377 response.PutChar('F');
1378 response.Printf("%zi", bytes_read);
1379 if (save_errno)
1380 response.Printf(",%i", save_errno);
1381 else
1382 {
1383 response.PutChar(';');
1384 response.PutEscapedBytes(&buffer[0], bytes_read);
1385 }
1386 return SendPacketNoLock(response.GetData(), response.GetSize());
1387 }
Daniel Maleae0f8f572013-08-26 23:57:52 +00001388 }
Greg Clayton2b98c562013-11-22 18:53:12 +00001389 return SendErrorResponse(21);
1390
Virgile Belloae12a362013-08-27 16:21:49 +00001391#endif
Daniel Maleae0f8f572013-08-26 23:57:52 +00001392}
1393
Greg Clayton3dedae12013-12-06 21:45:27 +00001394GDBRemoteCommunication::PacketResult
Daniel Maleae0f8f572013-08-26 23:57:52 +00001395GDBRemoteCommunicationServer::Handle_vFile_pWrite (StringExtractorGDBRemote &packet)
1396{
Virgile Belloae12a362013-08-27 16:21:49 +00001397#ifdef _WIN32
Greg Clayton2b98c562013-11-22 18:53:12 +00001398 return SendUnimplementedResponse("GDBRemoteCommunicationServer::Handle_vFile_pWrite() unimplemented");
Virgile Belloae12a362013-08-27 16:21:49 +00001399#else
Daniel Maleae0f8f572013-08-26 23:57:52 +00001400 packet.SetFilePos(::strlen("vFile:pwrite:"));
1401
1402 StreamGDBRemote response;
1403 response.PutChar('F');
1404
1405 int fd = packet.GetU32(UINT32_MAX);
Greg Clayton2b98c562013-11-22 18:53:12 +00001406 if (packet.GetChar() == ',')
Daniel Maleae0f8f572013-08-26 23:57:52 +00001407 {
Greg Clayton2b98c562013-11-22 18:53:12 +00001408 off_t offset = packet.GetU64(UINT32_MAX);
1409 if (packet.GetChar() == ',')
1410 {
1411 std::string buffer;
1412 if (packet.GetEscapedBinaryData(buffer))
1413 {
1414 const ssize_t bytes_written = ::pwrite (fd, buffer.data(), buffer.size(), offset);
1415 const int save_errno = bytes_written == -1 ? errno : 0;
1416 response.Printf("%zi", bytes_written);
1417 if (save_errno)
1418 response.Printf(",%i", save_errno);
1419 }
1420 else
1421 {
1422 response.Printf ("-1,%i", EINVAL);
1423 }
1424 return SendPacketNoLock(response.GetData(), response.GetSize());
1425 }
Daniel Maleae0f8f572013-08-26 23:57:52 +00001426 }
Greg Clayton2b98c562013-11-22 18:53:12 +00001427 return SendErrorResponse(27);
Virgile Belloae12a362013-08-27 16:21:49 +00001428#endif
Daniel Maleae0f8f572013-08-26 23:57:52 +00001429}
1430
Greg Clayton3dedae12013-12-06 21:45:27 +00001431GDBRemoteCommunication::PacketResult
Daniel Maleae0f8f572013-08-26 23:57:52 +00001432GDBRemoteCommunicationServer::Handle_vFile_Size (StringExtractorGDBRemote &packet)
1433{
1434 packet.SetFilePos(::strlen("vFile:size:"));
1435 std::string path;
1436 packet.GetHexByteString(path);
Greg Clayton2b98c562013-11-22 18:53:12 +00001437 if (!path.empty())
Daniel Maleae0f8f572013-08-26 23:57:52 +00001438 {
Greg Clayton2b98c562013-11-22 18:53:12 +00001439 lldb::user_id_t retcode = Host::GetFileSize(FileSpec(path.c_str(), false));
1440 StreamString response;
1441 response.PutChar('F');
1442 response.PutHex64(retcode);
1443 if (retcode == UINT64_MAX)
1444 {
1445 response.PutChar(',');
1446 response.PutHex64(retcode); // TODO: replace with Host::GetSyswideErrorCode()
1447 }
1448 return SendPacketNoLock(response.GetData(), response.GetSize());
Daniel Maleae0f8f572013-08-26 23:57:52 +00001449 }
Greg Clayton2b98c562013-11-22 18:53:12 +00001450 return SendErrorResponse(22);
Daniel Maleae0f8f572013-08-26 23:57:52 +00001451}
1452
Greg Clayton3dedae12013-12-06 21:45:27 +00001453GDBRemoteCommunication::PacketResult
Daniel Maleae0f8f572013-08-26 23:57:52 +00001454GDBRemoteCommunicationServer::Handle_vFile_Mode (StringExtractorGDBRemote &packet)
1455{
1456 packet.SetFilePos(::strlen("vFile:mode:"));
1457 std::string path;
1458 packet.GetHexByteString(path);
Greg Clayton2b98c562013-11-22 18:53:12 +00001459 if (!path.empty())
1460 {
1461 Error error;
1462 const uint32_t mode = File::GetPermissions(path.c_str(), error);
1463 StreamString response;
1464 response.Printf("F%u", mode);
1465 if (mode == 0 || error.Fail())
1466 response.Printf(",%i", (int)error.GetError());
1467 return SendPacketNoLock(response.GetData(), response.GetSize());
1468 }
1469 return SendErrorResponse(23);
Daniel Maleae0f8f572013-08-26 23:57:52 +00001470}
1471
Greg Clayton3dedae12013-12-06 21:45:27 +00001472GDBRemoteCommunication::PacketResult
Daniel Maleae0f8f572013-08-26 23:57:52 +00001473GDBRemoteCommunicationServer::Handle_vFile_Exists (StringExtractorGDBRemote &packet)
1474{
1475 packet.SetFilePos(::strlen("vFile:exists:"));
1476 std::string path;
1477 packet.GetHexByteString(path);
Greg Clayton2b98c562013-11-22 18:53:12 +00001478 if (!path.empty())
1479 {
1480 bool retcode = Host::GetFileExists(FileSpec(path.c_str(), false));
1481 StreamString response;
1482 response.PutChar('F');
1483 response.PutChar(',');
1484 if (retcode)
1485 response.PutChar('1');
1486 else
1487 response.PutChar('0');
1488 return SendPacketNoLock(response.GetData(), response.GetSize());
1489 }
1490 return SendErrorResponse(24);
Daniel Maleae0f8f572013-08-26 23:57:52 +00001491}
1492
Greg Clayton3dedae12013-12-06 21:45:27 +00001493GDBRemoteCommunication::PacketResult
Greg Claytonfbb76342013-11-20 21:07:01 +00001494GDBRemoteCommunicationServer::Handle_vFile_symlink (StringExtractorGDBRemote &packet)
Daniel Maleae0f8f572013-08-26 23:57:52 +00001495{
Greg Claytonfbb76342013-11-20 21:07:01 +00001496 packet.SetFilePos(::strlen("vFile:symlink:"));
1497 std::string dst, src;
1498 packet.GetHexByteStringTerminatedBy(dst, ',');
1499 packet.GetChar(); // Skip ',' char
1500 packet.GetHexByteString(src);
1501 Error error = Host::Symlink(src.c_str(), dst.c_str());
1502 StreamString response;
1503 response.Printf("F%u,%u", error.GetError(), error.GetError());
Greg Clayton2b98c562013-11-22 18:53:12 +00001504 return SendPacketNoLock(response.GetData(), response.GetSize());
Greg Claytonfbb76342013-11-20 21:07:01 +00001505}
1506
Greg Clayton3dedae12013-12-06 21:45:27 +00001507GDBRemoteCommunication::PacketResult
Greg Claytonfbb76342013-11-20 21:07:01 +00001508GDBRemoteCommunicationServer::Handle_vFile_unlink (StringExtractorGDBRemote &packet)
1509{
1510 packet.SetFilePos(::strlen("vFile:unlink:"));
1511 std::string path;
1512 packet.GetHexByteString(path);
1513 Error error = Host::Unlink(path.c_str());
1514 StreamString response;
1515 response.Printf("F%u,%u", error.GetError(), error.GetError());
Greg Clayton2b98c562013-11-22 18:53:12 +00001516 return SendPacketNoLock(response.GetData(), response.GetSize());
Greg Claytonfbb76342013-11-20 21:07:01 +00001517}
1518
Greg Clayton3dedae12013-12-06 21:45:27 +00001519GDBRemoteCommunication::PacketResult
Greg Claytonfbb76342013-11-20 21:07:01 +00001520GDBRemoteCommunicationServer::Handle_qPlatform_shell (StringExtractorGDBRemote &packet)
1521{
1522 packet.SetFilePos(::strlen("qPlatform_shell:"));
Daniel Maleae0f8f572013-08-26 23:57:52 +00001523 std::string path;
1524 std::string working_dir;
1525 packet.GetHexByteStringTerminatedBy(path,',');
Greg Clayton2b98c562013-11-22 18:53:12 +00001526 if (!path.empty())
Daniel Maleae0f8f572013-08-26 23:57:52 +00001527 {
Greg Clayton2b98c562013-11-22 18:53:12 +00001528 if (packet.GetChar() == ',')
1529 {
1530 // FIXME: add timeout to qPlatform_shell packet
1531 // uint32_t timeout = packet.GetHexMaxU32(false, 32);
1532 uint32_t timeout = 10;
1533 if (packet.GetChar() == ',')
1534 packet.GetHexByteString(working_dir);
1535 int status, signo;
1536 std::string output;
1537 Error err = Host::RunShellCommand(path.c_str(),
1538 working_dir.empty() ? NULL : working_dir.c_str(),
1539 &status, &signo, &output, timeout);
1540 StreamGDBRemote response;
1541 if (err.Fail())
1542 {
1543 response.PutCString("F,");
1544 response.PutHex32(UINT32_MAX);
1545 }
1546 else
1547 {
1548 response.PutCString("F,");
1549 response.PutHex32(status);
1550 response.PutChar(',');
1551 response.PutHex32(signo);
1552 response.PutChar(',');
1553 response.PutEscapedBytes(output.c_str(), output.size());
1554 }
1555 return SendPacketNoLock(response.GetData(), response.GetSize());
1556 }
Daniel Maleae0f8f572013-08-26 23:57:52 +00001557 }
Greg Clayton2b98c562013-11-22 18:53:12 +00001558 return SendErrorResponse(24);
Daniel Maleae0f8f572013-08-26 23:57:52 +00001559}
1560
Greg Clayton3dedae12013-12-06 21:45:27 +00001561GDBRemoteCommunication::PacketResult
Daniel Maleae0f8f572013-08-26 23:57:52 +00001562GDBRemoteCommunicationServer::Handle_vFile_Stat (StringExtractorGDBRemote &packet)
1563{
Greg Clayton2b98c562013-11-22 18:53:12 +00001564 return SendUnimplementedResponse("GDBRemoteCommunicationServer::Handle_vFile_Stat() unimplemented");
Daniel Maleae0f8f572013-08-26 23:57:52 +00001565}
1566
Greg Clayton3dedae12013-12-06 21:45:27 +00001567GDBRemoteCommunication::PacketResult
Daniel Maleae0f8f572013-08-26 23:57:52 +00001568GDBRemoteCommunicationServer::Handle_vFile_MD5 (StringExtractorGDBRemote &packet)
1569{
Greg Clayton2b98c562013-11-22 18:53:12 +00001570 packet.SetFilePos(::strlen("vFile:MD5:"));
Daniel Maleae0f8f572013-08-26 23:57:52 +00001571 std::string path;
1572 packet.GetHexByteString(path);
Greg Clayton2b98c562013-11-22 18:53:12 +00001573 if (!path.empty())
Daniel Maleae0f8f572013-08-26 23:57:52 +00001574 {
Greg Clayton2b98c562013-11-22 18:53:12 +00001575 uint64_t a,b;
1576 StreamGDBRemote response;
1577 if (Host::CalculateMD5(FileSpec(path.c_str(),false),a,b) == false)
1578 {
1579 response.PutCString("F,");
1580 response.PutCString("x");
1581 }
1582 else
1583 {
1584 response.PutCString("F,");
1585 response.PutHex64(a);
1586 response.PutHex64(b);
1587 }
1588 return SendPacketNoLock(response.GetData(), response.GetSize());
Daniel Maleae0f8f572013-08-26 23:57:52 +00001589 }
Greg Clayton2b98c562013-11-22 18:53:12 +00001590 return SendErrorResponse(25);
Daniel Maleae0f8f572013-08-26 23:57:52 +00001591}
Greg Clayton2b98c562013-11-22 18:53:12 +00001592