LLDB mainline
GDBRemoteCommunicationServerCommon.cpp
Go to the documentation of this file.
1//===-- GDBRemoteCommunicationServerCommon.cpp ----------------------------===//
2//
3// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4// See https://llvm.org/LICENSE.txt for license information.
5// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6//
7//===----------------------------------------------------------------------===//
8
10
11#include <cerrno>
12
13#ifdef __APPLE__
14#include <TargetConditionals.h>
15#endif
16
17#include <chrono>
18#include <cstring>
19#include <optional>
20
22#include "lldb/Host/Config.h"
23#include "lldb/Host/File.h"
26#include "lldb/Host/Host.h"
27#include "lldb/Host/HostInfo.h"
28#include "lldb/Host/SafeMachO.h"
32#include "lldb/Utility/Endian.h"
35#include "lldb/Utility/Log.h"
38#include "llvm/ADT/StringSwitch.h"
39#include "llvm/Support/JSON.h"
40#include "llvm/TargetParser/Triple.h"
41
42#include "ProcessGDBRemoteLog.h"
44
45#ifdef __ANDROID__
48#endif
49
50using namespace lldb;
52using namespace lldb_private;
53
54#ifdef __ANDROID__
55const static uint32_t g_default_packet_timeout_sec = 20; // seconds
56#else
57const static uint32_t g_default_packet_timeout_sec = 0; // not specified
58#endif
59
60// GDBRemoteCommunicationServerCommon constructor
62 : GDBRemoteCommunicationServer(), m_process_launch_info(),
63 m_process_launch_error(), m_proc_infos(), m_proc_infos_index(0) {
171}
172
173// Destructor
175 default;
176
179 StringExtractorGDBRemote &packet) {
180 StreamString response;
181
182 // $cputype:16777223;cpusubtype:3;ostype:Darwin;vendor:apple;endian:little;ptrsize:8;#00
183
184 ArchSpec host_arch(HostInfo::GetArchitecture());
185 const llvm::Triple &host_triple = host_arch.GetTriple();
186 response.PutCString("triple:");
187 response.PutStringAsRawHex8(host_triple.getTriple());
188 response.Printf(";ptrsize:%u;", host_arch.GetAddressByteSize());
189
190 llvm::StringRef distribution_id = HostInfo::GetDistributionId();
191 if (!distribution_id.empty()) {
192 response.PutCString("distribution_id:");
193 response.PutStringAsRawHex8(distribution_id);
194 response.PutCString(";");
195 }
196
197#if defined(__APPLE__)
198 // For parity with debugserver, we'll include the vendor key.
199 response.PutCString("vendor:apple;");
200
201 // Send out MachO info.
202 uint32_t cpu = host_arch.GetMachOCPUType();
203 uint32_t sub = host_arch.GetMachOCPUSubType();
204 if (cpu != LLDB_INVALID_CPUTYPE)
205 response.Printf("cputype:%u;", cpu);
206 if (sub != LLDB_INVALID_CPUTYPE)
207 response.Printf("cpusubtype:%u;", sub);
208
209 if (cpu == llvm::MachO::CPU_TYPE_ARM || cpu == llvm::MachO::CPU_TYPE_ARM64) {
210// Indicate the OS type.
211#if defined(TARGET_OS_TV) && TARGET_OS_TV == 1
212 response.PutCString("ostype:tvos;");
213#elif defined(TARGET_OS_WATCH) && TARGET_OS_WATCH == 1
214 response.PutCString("ostype:watchos;");
215#elif defined(TARGET_OS_BRIDGE) && TARGET_OS_BRIDGE == 1
216 response.PutCString("ostype:bridgeos;");
217#else
218 response.PutCString("ostype:ios;");
219#endif
220
221 // On arm, we use "synchronous" watchpoints which means the exception is
222 // delivered before the instruction executes.
223 response.PutCString("watchpoint_exceptions_received:before;");
224 } else {
225 response.PutCString("ostype:macosx;");
226 response.Printf("watchpoint_exceptions_received:after;");
227 }
228
229#else
230 if (host_arch.GetMachine() == llvm::Triple::aarch64 ||
231 host_arch.GetMachine() == llvm::Triple::aarch64_32 ||
232 host_arch.GetMachine() == llvm::Triple::aarch64_be ||
233 host_arch.GetMachine() == llvm::Triple::arm ||
234 host_arch.GetMachine() == llvm::Triple::armeb || host_arch.IsMIPS() ||
235 host_arch.GetTriple().isLoongArch())
236 response.Printf("watchpoint_exceptions_received:before;");
237 else
238 response.Printf("watchpoint_exceptions_received:after;");
239#endif
240
241 switch (endian::InlHostByteOrder()) {
242 case eByteOrderBig:
243 response.PutCString("endian:big;");
244 break;
245 case eByteOrderLittle:
246 response.PutCString("endian:little;");
247 break;
248 case eByteOrderPDP:
249 response.PutCString("endian:pdp;");
250 break;
251 default:
252 response.PutCString("endian:unknown;");
253 break;
254 }
255
256 llvm::VersionTuple version = HostInfo::GetOSVersion();
257 if (!version.empty()) {
258 response.Format("os_version:{0}", version.getAsString());
259 response.PutChar(';');
260 }
261
262#if defined(__APPLE__)
263 llvm::VersionTuple maccatalyst_version = HostInfo::GetMacCatalystVersion();
264 if (!maccatalyst_version.empty()) {
265 response.Format("maccatalyst_version:{0}",
266 maccatalyst_version.getAsString());
267 response.PutChar(';');
268 }
269#endif
270
271 if (std::optional<std::string> s = HostInfo::GetOSBuildString()) {
272 response.PutCString("os_build:");
273 response.PutStringAsRawHex8(*s);
274 response.PutChar(';');
275 }
276 if (std::optional<std::string> s = HostInfo::GetOSKernelDescription()) {
277 response.PutCString("os_kernel:");
278 response.PutStringAsRawHex8(*s);
279 response.PutChar(';');
280 }
281
282 std::string s;
283#if defined(__APPLE__)
284
285#if defined(__arm__) || defined(__arm64__) || defined(__aarch64__)
286 // For iOS devices, we are connected through a USB Mux so we never pretend to
287 // actually have a hostname as far as the remote lldb that is connecting to
288 // this lldb-platform is concerned
289 response.PutCString("hostname:");
290 response.PutStringAsRawHex8("127.0.0.1");
291 response.PutChar(';');
292#else // #if defined(__arm__) || defined(__arm64__) || defined(__aarch64__)
293 if (HostInfo::GetHostname(s)) {
294 response.PutCString("hostname:");
295 response.PutStringAsRawHex8(s);
296 response.PutChar(';');
297 }
298#endif // #if defined(__arm__) || defined(__arm64__) || defined(__aarch64__)
299
300#else // #if defined(__APPLE__)
301 if (HostInfo::GetHostname(s)) {
302 response.PutCString("hostname:");
303 response.PutStringAsRawHex8(s);
304 response.PutChar(';');
305 }
306#endif // #if defined(__APPLE__)
307 // coverity[unsigned_compare]
309 response.Printf("default_packet_timeout:%u;", g_default_packet_timeout_sec);
310
311 return SendPacketNoLock(response.GetString());
312}
313
316 StringExtractorGDBRemote &packet) {
317 // Packet format: "qProcessInfoPID:%i" where %i is the pid
318 packet.SetFilePos(::strlen("qProcessInfoPID:"));
320 if (pid != LLDB_INVALID_PROCESS_ID) {
321 ProcessInstanceInfo proc_info;
322 if (Host::GetProcessInfo(pid, proc_info)) {
323 StreamString response;
324 CreateProcessInfoResponse(proc_info, response);
325 return SendPacketNoLock(response.GetString());
326 }
327 }
328 return SendErrorResponse(1);
329}
330
333 StringExtractorGDBRemote &packet) {
335 m_proc_infos.clear();
336
337 ProcessInstanceInfoMatch match_info;
338 packet.SetFilePos(::strlen("qfProcessInfo"));
339 if (packet.GetChar() == ':') {
340 llvm::StringRef key;
341 llvm::StringRef value;
342 while (packet.GetNameColonValue(key, value)) {
343 bool success = true;
344 if (key == "name") {
345 StringExtractor extractor(value);
346 std::string file;
347 extractor.GetHexByteString(file);
349 file, FileSpec::Style::native);
350 } else if (key == "name_match") {
351 NameMatch name_match = llvm::StringSwitch<NameMatch>(value)
352 .Case("equals", NameMatch::Equals)
353 .Case("starts_with", NameMatch::StartsWith)
354 .Case("ends_with", NameMatch::EndsWith)
355 .Case("contains", NameMatch::Contains)
356 .Case("regex", NameMatch::RegularExpression)
357 .Default(NameMatch::Ignore);
358 match_info.SetNameMatchType(name_match);
359 if (name_match == NameMatch::Ignore)
360 return SendErrorResponse(2);
361 } else if (key == "pid") {
363 if (value.getAsInteger(0, pid))
364 return SendErrorResponse(2);
365 match_info.GetProcessInfo().SetProcessID(pid);
366 } else if (key == "parent_pid") {
368 if (value.getAsInteger(0, pid))
369 return SendErrorResponse(2);
370 match_info.GetProcessInfo().SetParentProcessID(pid);
371 } else if (key == "uid") {
372 uint32_t uid = UINT32_MAX;
373 if (value.getAsInteger(0, uid))
374 return SendErrorResponse(2);
375 match_info.GetProcessInfo().SetUserID(uid);
376 } else if (key == "gid") {
377 uint32_t gid = UINT32_MAX;
378 if (value.getAsInteger(0, gid))
379 return SendErrorResponse(2);
380 match_info.GetProcessInfo().SetGroupID(gid);
381 } else if (key == "euid") {
382 uint32_t uid = UINT32_MAX;
383 if (value.getAsInteger(0, uid))
384 return SendErrorResponse(2);
385 match_info.GetProcessInfo().SetEffectiveUserID(uid);
386 } else if (key == "egid") {
387 uint32_t gid = UINT32_MAX;
388 if (value.getAsInteger(0, gid))
389 return SendErrorResponse(2);
390 match_info.GetProcessInfo().SetEffectiveGroupID(gid);
391 } else if (key == "all_users") {
392 match_info.SetMatchAllUsers(
393 OptionArgParser::ToBoolean(value, false, &success));
394 } else if (key == "triple") {
395 match_info.GetProcessInfo().GetArchitecture() =
396 HostInfo::GetAugmentedArchSpec(value);
397 } else {
398 success = false;
399 }
400
401 if (!success)
402 return SendErrorResponse(2);
403 }
404 }
405
406 if (Host::FindProcesses(match_info, m_proc_infos)) {
407 // We found something, return the first item by calling the get subsequent
408 // process info packet handler...
409 return Handle_qsProcessInfo(packet);
410 }
411 return SendErrorResponse(3);
412}
413
416 StringExtractorGDBRemote &packet) {
417 if (m_proc_infos_index < m_proc_infos.size()) {
418 StreamString response;
421 return SendPacketNoLock(response.GetString());
422 }
423 return SendErrorResponse(4);
424}
425
428 StringExtractorGDBRemote &packet) {
429#if LLDB_ENABLE_POSIX
431 LLDB_LOGF(log, "GDBRemoteCommunicationServerCommon::%s begin", __FUNCTION__);
432
433 // Packet format: "qUserName:%i" where %i is the uid
434 packet.SetFilePos(::strlen("qUserName:"));
435 uint32_t uid = packet.GetU32(UINT32_MAX);
436 if (uid != UINT32_MAX) {
437 if (std::optional<llvm::StringRef> name =
438 HostInfo::GetUserIDResolver().GetUserName(uid)) {
439 StreamString response;
440 response.PutStringAsRawHex8(*name);
441 return SendPacketNoLock(response.GetString());
442 }
443 }
444 LLDB_LOGF(log, "GDBRemoteCommunicationServerCommon::%s end", __FUNCTION__);
445#endif
446 return SendErrorResponse(5);
447}
448
451 StringExtractorGDBRemote &packet) {
452#if LLDB_ENABLE_POSIX
453 // Packet format: "qGroupName:%i" where %i is the gid
454 packet.SetFilePos(::strlen("qGroupName:"));
455 uint32_t gid = packet.GetU32(UINT32_MAX);
456 if (gid != UINT32_MAX) {
457 if (std::optional<llvm::StringRef> name =
458 HostInfo::GetUserIDResolver().GetGroupName(gid)) {
459 StreamString response;
460 response.PutStringAsRawHex8(*name);
461 return SendPacketNoLock(response.GetString());
462 }
463 }
464#endif
465 return SendErrorResponse(6);
466}
467
470 StringExtractorGDBRemote &packet) {
471 packet.SetFilePos(::strlen("qSpeedTest:"));
472
473 llvm::StringRef key;
474 llvm::StringRef value;
475 bool success = packet.GetNameColonValue(key, value);
476 if (success && key == "response_size") {
477 uint32_t response_size = 0;
478 if (!value.getAsInteger(0, response_size)) {
479 if (response_size == 0)
480 return SendOKResponse();
481 StreamString response;
482 uint32_t bytes_left = response_size;
483 response.PutCString("data:");
484 while (bytes_left > 0) {
485 if (bytes_left >= 26) {
486 response.PutCString("ABCDEFGHIJKLMNOPQRSTUVWXYZ");
487 bytes_left -= 26;
488 } else {
489 response.Printf("%*.*s;", bytes_left, bytes_left,
490 "ABCDEFGHIJKLMNOPQRSTUVWXYZ");
491 bytes_left = 0;
492 }
493 }
494 return SendPacketNoLock(response.GetString());
495 }
496 }
497 return SendErrorResponse(7);
498}
499
501 switch (err) {
502#define HANDLE_ERRNO(name, value) \
503 case name: \
504 return GDB_##name;
505#include "Plugins/Process/gdb-remote/GDBRemoteErrno.def"
506 default:
507 return GDB_EUNKNOWN;
508 }
509}
510
513 StringExtractorGDBRemote &packet) {
514 packet.SetFilePos(::strlen("vFile:open:"));
515 std::string path;
516 packet.GetHexByteStringTerminatedBy(path, ',');
517 if (!path.empty()) {
518 if (packet.GetChar() == ',') {
519 auto flags = File::OpenOptions(packet.GetHexMaxU32(false, 0));
520 if (packet.GetChar() == ',') {
521 mode_t mode = packet.GetHexMaxU32(false, 0600);
522 FileSpec path_spec(path);
523 FileSystem::Instance().Resolve(path_spec);
524 // Do not close fd.
525 auto file = FileSystem::Instance().Open(path_spec, flags, mode, false);
526
527 StreamString response;
528 response.PutChar('F');
529
530 int descriptor = File::kInvalidDescriptor;
531 if (file) {
532 descriptor = file.get()->GetDescriptor();
533 response.Printf("%x", descriptor);
534 } else {
535 response.PutCString("-1");
536 std::error_code code = errorToErrorCode(file.takeError());
537 response.Printf(",%x", system_errno_to_gdb(code.value()));
538 }
539
540 return SendPacketNoLock(response.GetString());
541 }
542 }
543 }
544 return SendErrorResponse(18);
545}
546
549 StringExtractorGDBRemote &packet) {
550 packet.SetFilePos(::strlen("vFile:close:"));
551 int fd = packet.GetS32(-1, 16);
552 int err = -1;
553 int save_errno = 0;
554 if (fd >= 0) {
555 NativeFile file(fd, File::OpenOptions(0), true);
556 Status error = file.Close();
557 err = 0;
558 save_errno = error.GetError();
559 } else {
560 save_errno = EINVAL;
561 }
562 StreamString response;
563 response.PutChar('F');
564 response.Printf("%x", err);
565 if (save_errno)
566 response.Printf(",%x", system_errno_to_gdb(save_errno));
567 return SendPacketNoLock(response.GetString());
568}
569
572 StringExtractorGDBRemote &packet) {
573 StreamGDBRemote response;
574 packet.SetFilePos(::strlen("vFile:pread:"));
575 int fd = packet.GetS32(-1, 16);
576 if (packet.GetChar() == ',') {
577 size_t count = packet.GetHexMaxU64(false, SIZE_MAX);
578 if (packet.GetChar() == ',') {
579 off_t offset = packet.GetHexMaxU32(false, UINT32_MAX);
580 if (count == SIZE_MAX) {
581 response.Printf("F-1:%x", EINVAL);
582 return SendPacketNoLock(response.GetString());
583 }
584
585 std::string buffer(count, 0);
586 NativeFile file(fd, File::eOpenOptionReadOnly, false);
587 Status error = file.Read(static_cast<void *>(&buffer[0]), count, offset);
588 const int save_errno = error.GetError();
589 response.PutChar('F');
590 if (error.Success()) {
591 response.Printf("%zx", count);
592 response.PutChar(';');
593 response.PutEscapedBytes(&buffer[0], count);
594 } else {
595 response.PutCString("-1");
596 if (save_errno)
597 response.Printf(",%x", system_errno_to_gdb(save_errno));
598 }
599 return SendPacketNoLock(response.GetString());
600 }
601 }
602 return SendErrorResponse(21);
603}
604
607 StringExtractorGDBRemote &packet) {
608 packet.SetFilePos(::strlen("vFile:pwrite:"));
609
610 StreamGDBRemote response;
611 response.PutChar('F');
612
613 int fd = packet.GetS32(-1, 16);
614 if (packet.GetChar() == ',') {
615 off_t offset = packet.GetHexMaxU32(false, UINT32_MAX);
616 if (packet.GetChar() == ',') {
617 std::string buffer;
618 if (packet.GetEscapedBinaryData(buffer)) {
619 NativeFile file(fd, File::eOpenOptionWriteOnly, false);
620 size_t count = buffer.size();
621 Status error =
622 file.Write(static_cast<const void *>(&buffer[0]), count, offset);
623 const int save_errno = error.GetError();
624 if (error.Success())
625 response.Printf("%zx", count);
626 else {
627 response.PutCString("-1");
628 if (save_errno)
629 response.Printf(",%x", system_errno_to_gdb(save_errno));
630 }
631 } else {
632 response.Printf("-1,%x", EINVAL);
633 }
634 return SendPacketNoLock(response.GetString());
635 }
636 }
637 return SendErrorResponse(27);
638}
639
642 StringExtractorGDBRemote &packet) {
643 packet.SetFilePos(::strlen("vFile:size:"));
644 std::string path;
645 packet.GetHexByteString(path);
646 if (!path.empty()) {
647 uint64_t Size;
648 if (llvm::sys::fs::file_size(path, Size))
649 return SendErrorResponse(5);
650 StreamString response;
651 response.PutChar('F');
652 response.PutHex64(Size);
653 if (Size == UINT64_MAX) {
654 response.PutChar(',');
655 response.PutHex64(Size); // TODO: replace with Host::GetSyswideErrorCode()
656 }
657 return SendPacketNoLock(response.GetString());
658 }
659 return SendErrorResponse(22);
660}
661
664 StringExtractorGDBRemote &packet) {
665 packet.SetFilePos(::strlen("vFile:mode:"));
666 std::string path;
667 packet.GetHexByteString(path);
668 if (!path.empty()) {
669 FileSpec file_spec(path);
670 FileSystem::Instance().Resolve(file_spec);
671 std::error_code ec;
672 const uint32_t mode = FileSystem::Instance().GetPermissions(file_spec, ec);
673 StreamString response;
674 if (mode != llvm::sys::fs::perms_not_known)
675 response.Printf("F%x", mode);
676 else
677 response.Printf("F-1,%x", (int)Status(ec).GetError());
678 return SendPacketNoLock(response.GetString());
679 }
680 return SendErrorResponse(23);
681}
682
685 StringExtractorGDBRemote &packet) {
686 packet.SetFilePos(::strlen("vFile:exists:"));
687 std::string path;
688 packet.GetHexByteString(path);
689 if (!path.empty()) {
690 bool retcode = llvm::sys::fs::exists(path);
691 StreamString response;
692 response.PutChar('F');
693 response.PutChar(',');
694 if (retcode)
695 response.PutChar('1');
696 else
697 response.PutChar('0');
698 return SendPacketNoLock(response.GetString());
699 }
700 return SendErrorResponse(24);
701}
702
705 StringExtractorGDBRemote &packet) {
706 packet.SetFilePos(::strlen("vFile:symlink:"));
707 std::string dst, src;
708 packet.GetHexByteStringTerminatedBy(dst, ',');
709 packet.GetChar(); // Skip ',' char
710 packet.GetHexByteString(src);
711
712 FileSpec src_spec(src);
713 FileSystem::Instance().Resolve(src_spec);
715
716 StreamString response;
717 response.Printf("F%x,%x", error.GetError(), error.GetError());
718 return SendPacketNoLock(response.GetString());
719}
720
723 StringExtractorGDBRemote &packet) {
724 packet.SetFilePos(::strlen("vFile:unlink:"));
725 std::string path;
726 packet.GetHexByteString(path);
727 Status error(llvm::sys::fs::remove(path));
728 StreamString response;
729 response.Printf("F%x,%x", error.GetError(),
730 system_errno_to_gdb(error.GetError()));
731 return SendPacketNoLock(response.GetString());
732}
733
736 StringExtractorGDBRemote &packet) {
737 packet.SetFilePos(::strlen("qPlatform_shell:"));
738 std::string path;
739 std::string working_dir;
740 packet.GetHexByteStringTerminatedBy(path, ',');
741 if (!path.empty()) {
742 if (packet.GetChar() == ',') {
743 // FIXME: add timeout to qPlatform_shell packet
744 // uint32_t timeout = packet.GetHexMaxU32(false, 32);
745 if (packet.GetChar() == ',')
746 packet.GetHexByteString(working_dir);
747 int status, signo;
748 std::string output;
749 FileSpec working_spec(working_dir);
750 FileSystem::Instance().Resolve(working_spec);
751 Status err =
752 Host::RunShellCommand(path.c_str(), working_spec, &status, &signo,
753 &output, std::chrono::seconds(10));
754 StreamGDBRemote response;
755 if (err.Fail()) {
756 response.PutCString("F,");
757 response.PutHex32(UINT32_MAX);
758 } else {
759 response.PutCString("F,");
760 response.PutHex32(status);
761 response.PutChar(',');
762 response.PutHex32(signo);
763 response.PutChar(',');
764 response.PutEscapedBytes(output.c_str(), output.size());
765 }
766 return SendPacketNoLock(response.GetString());
767 }
768 }
769 return SendErrorResponse(24);
770}
771
772template <typename T, typename U>
773static void fill_clamp(T &dest, U src, typename T::value_type fallback) {
774 static_assert(std::is_unsigned<typename T::value_type>::value,
775 "Destination type must be unsigned.");
776 using UU = std::make_unsigned_t<U>;
777 constexpr auto T_max = std::numeric_limits<typename T::value_type>::max();
778 dest = src >= 0 && static_cast<UU>(src) <= T_max ? src : fallback;
779}
780
783 StringExtractorGDBRemote &packet) {
784 StreamGDBRemote response;
785 packet.SetFilePos(::strlen("vFile:fstat:"));
786 int fd = packet.GetS32(-1, 16);
787
788 struct stat file_stats;
789 if (::fstat(fd, &file_stats) == -1) {
790 const int save_errno = errno;
791 response.Printf("F-1,%x", system_errno_to_gdb(save_errno));
792 return SendPacketNoLock(response.GetString());
793 }
794
796 fill_clamp(data.gdb_st_dev, file_stats.st_dev, 0);
797 fill_clamp(data.gdb_st_ino, file_stats.st_ino, 0);
798 data.gdb_st_mode = file_stats.st_mode;
799 fill_clamp(data.gdb_st_nlink, file_stats.st_nlink, UINT32_MAX);
800 fill_clamp(data.gdb_st_uid, file_stats.st_uid, 0);
801 fill_clamp(data.gdb_st_gid, file_stats.st_gid, 0);
802 fill_clamp(data.gdb_st_rdev, file_stats.st_rdev, 0);
803 data.gdb_st_size = file_stats.st_size;
804#if !defined(_WIN32)
805 data.gdb_st_blksize = file_stats.st_blksize;
806 data.gdb_st_blocks = file_stats.st_blocks;
807#else
808 data.gdb_st_blksize = 0;
809 data.gdb_st_blocks = 0;
810#endif
811 fill_clamp(data.gdb_st_atime, file_stats.st_atime, 0);
812 fill_clamp(data.gdb_st_mtime, file_stats.st_mtime, 0);
813 fill_clamp(data.gdb_st_ctime, file_stats.st_ctime, 0);
814
815 response.Printf("F%zx;", sizeof(data));
816 response.PutEscapedBytes(&data, sizeof(data));
817 return SendPacketNoLock(response.GetString());
818}
819
822 StringExtractorGDBRemote &packet) {
824 "GDBRemoteCommunicationServerCommon::Handle_vFile_Stat() unimplemented");
825}
826
829 StringExtractorGDBRemote &packet) {
830 packet.SetFilePos(::strlen("vFile:MD5:"));
831 std::string path;
832 packet.GetHexByteString(path);
833 if (!path.empty()) {
834 StreamGDBRemote response;
835 auto Result = llvm::sys::fs::md5_contents(path);
836 if (!Result) {
837 response.PutCString("F,");
838 response.PutCString("x");
839 } else {
840 response.PutCString("F,");
841 response.PutHex64(Result->low());
842 response.PutHex64(Result->high());
843 }
844 return SendPacketNoLock(response.GetString());
845 }
846 return SendErrorResponse(25);
847}
848
851 StringExtractorGDBRemote &packet) {
852 packet.SetFilePos(::strlen("qPlatform_mkdir:"));
853 mode_t mode = packet.GetHexMaxU32(false, UINT32_MAX);
854 if (packet.GetChar() == ',') {
855 std::string path;
856 packet.GetHexByteString(path);
857 Status error(llvm::sys::fs::create_directory(path, mode));
858
859 StreamGDBRemote response;
860 response.Printf("F%x", error.GetError());
861
862 return SendPacketNoLock(response.GetString());
863 }
864 return SendErrorResponse(20);
865}
866
869 StringExtractorGDBRemote &packet) {
870 packet.SetFilePos(::strlen("qPlatform_chmod:"));
871
872 auto perms =
873 static_cast<llvm::sys::fs::perms>(packet.GetHexMaxU32(false, UINT32_MAX));
874 if (packet.GetChar() == ',') {
875 std::string path;
876 packet.GetHexByteString(path);
877 Status error(llvm::sys::fs::setPermissions(path, perms));
878
879 StreamGDBRemote response;
880 response.Printf("F%x", error.GetError());
881
882 return SendPacketNoLock(response.GetString());
883 }
884 return SendErrorResponse(19);
885}
886
889 StringExtractorGDBRemote &packet) {
890 // Parse client-indicated features.
891 llvm::SmallVector<llvm::StringRef, 4> client_features;
892 packet.GetStringRef().split(client_features, ';');
893 return SendPacketNoLock(llvm::join(HandleFeatures(client_features), ";"));
894}
895
898 StringExtractorGDBRemote &packet) {
899 packet.SetFilePos(::strlen("QSetDetachOnError:"));
900 if (packet.GetU32(0))
901 m_process_launch_info.GetFlags().Set(eLaunchFlagDetachOnError);
902 else
903 m_process_launch_info.GetFlags().Clear(eLaunchFlagDetachOnError);
904 return SendOKResponse();
905}
906
909 StringExtractorGDBRemote &packet) {
910 // Send response first before changing m_send_acks to we ack this packet
911 PacketResult packet_result = SendOKResponse();
912 m_send_acks = false;
913 return packet_result;
914}
915
918 StringExtractorGDBRemote &packet) {
919 packet.SetFilePos(::strlen("QSetSTDIN:"));
920 FileAction file_action;
921 std::string path;
922 packet.GetHexByteString(path);
923 const bool read = true;
924 const bool write = false;
925 if (file_action.Open(STDIN_FILENO, FileSpec(path), read, write)) {
927 return SendOKResponse();
928 }
929 return SendErrorResponse(15);
930}
931
934 StringExtractorGDBRemote &packet) {
935 packet.SetFilePos(::strlen("QSetSTDOUT:"));
936 FileAction file_action;
937 std::string path;
938 packet.GetHexByteString(path);
939 const bool read = false;
940 const bool write = true;
941 if (file_action.Open(STDOUT_FILENO, FileSpec(path), read, write)) {
943 return SendOKResponse();
944 }
945 return SendErrorResponse(16);
946}
947
950 StringExtractorGDBRemote &packet) {
951 packet.SetFilePos(::strlen("QSetSTDERR:"));
952 FileAction file_action;
953 std::string path;
954 packet.GetHexByteString(path);
955 const bool read = false;
956 const bool write = true;
957 if (file_action.Open(STDERR_FILENO, FileSpec(path), read, write)) {
959 return SendOKResponse();
960 }
961 return SendErrorResponse(17);
962}
963
966 StringExtractorGDBRemote &packet) {
968 return SendOKResponse();
969 StreamString response;
970 response.PutChar('E');
971 response.PutCString(m_process_launch_error.AsCString("<unknown error>"));
972 return SendPacketNoLock(response.GetString());
973}
974
977 StringExtractorGDBRemote &packet) {
978 packet.SetFilePos(::strlen("QEnvironment:"));
979 const uint32_t bytes_left = packet.GetBytesLeft();
980 if (bytes_left > 0) {
982 return SendOKResponse();
983 }
984 return SendErrorResponse(12);
985}
986
989 StringExtractorGDBRemote &packet) {
990 packet.SetFilePos(::strlen("QEnvironmentHexEncoded:"));
991 const uint32_t bytes_left = packet.GetBytesLeft();
992 if (bytes_left > 0) {
993 std::string str;
994 packet.GetHexByteString(str);
996 return SendOKResponse();
997 }
998 return SendErrorResponse(12);
999}
1000
1003 StringExtractorGDBRemote &packet) {
1004 packet.SetFilePos(::strlen("QLaunchArch:"));
1005 const uint32_t bytes_left = packet.GetBytesLeft();
1006 if (bytes_left > 0) {
1007 const char *arch_triple = packet.Peek();
1009 HostInfo::GetAugmentedArchSpec(arch_triple));
1010 return SendOKResponse();
1011 }
1012 return SendErrorResponse(13);
1013}
1014
1017 // The 'A' packet is the most over designed packet ever here with redundant
1018 // argument indexes, redundant argument lengths and needed hex encoded
1019 // argument string values. Really all that is needed is a comma separated hex
1020 // encoded argument value list, but we will stay true to the documented
1021 // version of the 'A' packet here...
1022
1023 Log *log = GetLog(LLDBLog::Process);
1024 int actual_arg_index = 0;
1025
1026 packet.SetFilePos(1); // Skip the 'A'
1027 bool success = true;
1028 while (success && packet.GetBytesLeft() > 0) {
1029 // Decode the decimal argument string length. This length is the number of
1030 // hex nibbles in the argument string value.
1031 const uint32_t arg_len = packet.GetU32(UINT32_MAX);
1032 if (arg_len == UINT32_MAX)
1033 success = false;
1034 else {
1035 // Make sure the argument hex string length is followed by a comma
1036 if (packet.GetChar() != ',')
1037 success = false;
1038 else {
1039 // Decode the argument index. We ignore this really because who would
1040 // really send down the arguments in a random order???
1041 const uint32_t arg_idx = packet.GetU32(UINT32_MAX);
1042 if (arg_idx == UINT32_MAX)
1043 success = false;
1044 else {
1045 // Make sure the argument index is followed by a comma
1046 if (packet.GetChar() != ',')
1047 success = false;
1048 else {
1049 // Decode the argument string value from hex bytes back into a UTF8
1050 // string and make sure the length matches the one supplied in the
1051 // packet
1052 std::string arg;
1053 if (packet.GetHexByteStringFixedLength(arg, arg_len) !=
1054 (arg_len / 2))
1055 success = false;
1056 else {
1057 // If there are any bytes left
1058 if (packet.GetBytesLeft()) {
1059 if (packet.GetChar() != ',')
1060 success = false;
1061 }
1062
1063 if (success) {
1064 if (arg_idx == 0)
1066 arg, FileSpec::Style::native);
1068 LLDB_LOGF(log, "LLGSPacketHandler::%s added arg %d: \"%s\"",
1069 __FUNCTION__, actual_arg_index, arg.c_str());
1070 ++actual_arg_index;
1071 }
1072 }
1073 }
1074 }
1075 }
1076 }
1077 }
1078
1079 if (success) {
1082 return SendOKResponse();
1083 LLDB_LOG(log, "failed to launch exe: {0}", m_process_launch_error);
1084 }
1085 return SendErrorResponse(8);
1086}
1087
1090 StringExtractorGDBRemote &packet) {
1091 // Just echo back the exact same packet for qEcho...
1092 return SendPacketNoLock(packet.GetStringRef());
1093}
1094
1097 StringExtractorGDBRemote &packet) {
1098 packet.SetFilePos(::strlen("qModuleInfo:"));
1099
1100 std::string module_path;
1101 packet.GetHexByteStringTerminatedBy(module_path, ';');
1102 if (module_path.empty())
1103 return SendErrorResponse(1);
1104
1105 if (packet.GetChar() != ';')
1106 return SendErrorResponse(2);
1107
1108 std::string triple;
1109 packet.GetHexByteString(triple);
1110
1111 ModuleSpec matched_module_spec = GetModuleInfo(module_path, triple);
1112 if (!matched_module_spec.GetFileSpec())
1113 return SendErrorResponse(3);
1114
1115 const auto file_offset = matched_module_spec.GetObjectOffset();
1116 const auto file_size = matched_module_spec.GetObjectSize();
1117 const auto uuid_str = matched_module_spec.GetUUID().GetAsString("");
1118
1119 StreamGDBRemote response;
1120
1121 if (uuid_str.empty()) {
1122 auto Result = llvm::sys::fs::md5_contents(
1123 matched_module_spec.GetFileSpec().GetPath());
1124 if (!Result)
1125 return SendErrorResponse(5);
1126 response.PutCString("md5:");
1127 response.PutStringAsRawHex8(Result->digest());
1128 } else {
1129 response.PutCString("uuid:");
1130 response.PutStringAsRawHex8(uuid_str);
1131 }
1132 response.PutChar(';');
1133
1134 const auto &module_arch = matched_module_spec.GetArchitecture();
1135 response.PutCString("triple:");
1136 response.PutStringAsRawHex8(module_arch.GetTriple().getTriple());
1137 response.PutChar(';');
1138
1139 response.PutCString("file_path:");
1140 response.PutStringAsRawHex8(
1141 matched_module_spec.GetFileSpec().GetPath().c_str());
1142 response.PutChar(';');
1143 response.PutCString("file_offset:");
1144 response.PutHex64(file_offset);
1145 response.PutChar(';');
1146 response.PutCString("file_size:");
1147 response.PutHex64(file_size);
1148 response.PutChar(';');
1149
1150 return SendPacketNoLock(response.GetString());
1151}
1152
1155 StringExtractorGDBRemote &packet) {
1156 namespace json = llvm::json;
1157
1158 packet.SetFilePos(::strlen("jModulesInfo:"));
1159
1161 if (!object_sp)
1162 return SendErrorResponse(1);
1163
1164 StructuredData::Array *packet_array = object_sp->GetAsArray();
1165 if (!packet_array)
1166 return SendErrorResponse(2);
1167
1168 json::Array response_array;
1169 for (size_t i = 0; i < packet_array->GetSize(); ++i) {
1171 packet_array->GetItemAtIndex(i)->GetAsDictionary();
1172 if (!query)
1173 continue;
1174 llvm::StringRef file, triple;
1175 if (!query->GetValueForKeyAsString("file", file) ||
1176 !query->GetValueForKeyAsString("triple", triple))
1177 continue;
1178
1179 ModuleSpec matched_module_spec = GetModuleInfo(file, triple);
1180 if (!matched_module_spec.GetFileSpec())
1181 continue;
1182
1183 const auto file_offset = matched_module_spec.GetObjectOffset();
1184 const auto file_size = matched_module_spec.GetObjectSize();
1185 const auto uuid_str = matched_module_spec.GetUUID().GetAsString("");
1186 if (uuid_str.empty())
1187 continue;
1188 const auto triple_str =
1189 matched_module_spec.GetArchitecture().GetTriple().getTriple();
1190 const auto file_path = matched_module_spec.GetFileSpec().GetPath();
1191
1192 json::Object response{{"uuid", uuid_str},
1193 {"triple", triple_str},
1194 {"file_path", file_path},
1195 {"file_offset", static_cast<int64_t>(file_offset)},
1196 {"file_size", static_cast<int64_t>(file_size)}};
1197 response_array.push_back(std::move(response));
1198 }
1199
1200 StreamString response;
1201 response.AsRawOstream() << std::move(response_array);
1202 StreamGDBRemote escaped_response;
1203 escaped_response.PutEscapedBytes(response.GetString().data(),
1204 response.GetSize());
1205 return SendPacketNoLock(escaped_response.GetString());
1206}
1207
1209 const ProcessInstanceInfo &proc_info, StreamString &response) {
1210 response.Printf(
1211 "pid:%" PRIu64 ";ppid:%" PRIu64 ";uid:%i;gid:%i;euid:%i;egid:%i;",
1212 proc_info.GetProcessID(), proc_info.GetParentProcessID(),
1213 proc_info.GetUserID(), proc_info.GetGroupID(),
1214 proc_info.GetEffectiveUserID(), proc_info.GetEffectiveGroupID());
1215 response.PutCString("name:");
1216 response.PutStringAsRawHex8(proc_info.GetExecutableFile().GetPath().c_str());
1217
1218 response.PutChar(';');
1219 response.PutCString("args:");
1220 response.PutStringAsRawHex8(proc_info.GetArg0());
1221 for (auto &arg : proc_info.GetArguments()) {
1222 response.PutChar('-');
1223 response.PutStringAsRawHex8(arg.ref());
1224 }
1225
1226 response.PutChar(';');
1227 const ArchSpec &proc_arch = proc_info.GetArchitecture();
1228 if (proc_arch.IsValid()) {
1229 const llvm::Triple &proc_triple = proc_arch.GetTriple();
1230 response.PutCString("triple:");
1231 response.PutStringAsRawHex8(proc_triple.getTriple());
1232 response.PutChar(';');
1233 }
1234}
1235
1238 const ProcessInstanceInfo &proc_info, StreamString &response) {
1239 response.Printf("pid:%" PRIx64 ";parent-pid:%" PRIx64
1240 ";real-uid:%x;real-gid:%x;effective-uid:%x;effective-gid:%x;",
1241 proc_info.GetProcessID(), proc_info.GetParentProcessID(),
1242 proc_info.GetUserID(), proc_info.GetGroupID(),
1243 proc_info.GetEffectiveUserID(),
1244 proc_info.GetEffectiveGroupID());
1245
1246 const ArchSpec &proc_arch = proc_info.GetArchitecture();
1247 if (proc_arch.IsValid()) {
1248 const llvm::Triple &proc_triple = proc_arch.GetTriple();
1249#if defined(__APPLE__)
1250 // We'll send cputype/cpusubtype.
1251 const uint32_t cpu_type = proc_arch.GetMachOCPUType();
1252 if (cpu_type != 0)
1253 response.Printf("cputype:%" PRIx32 ";", cpu_type);
1254
1255 const uint32_t cpu_subtype = proc_arch.GetMachOCPUSubType();
1256 if (cpu_subtype != 0)
1257 response.Printf("cpusubtype:%" PRIx32 ";", cpu_subtype);
1258
1259 const std::string vendor = proc_triple.getVendorName().str();
1260 if (!vendor.empty())
1261 response.Printf("vendor:%s;", vendor.c_str());
1262#else
1263 // We'll send the triple.
1264 response.PutCString("triple:");
1265 response.PutStringAsRawHex8(proc_triple.getTriple());
1266 response.PutChar(';');
1267#endif
1268 std::string ostype = std::string(proc_triple.getOSName());
1269 // Adjust so ostype reports ios for Apple/ARM and Apple/ARM64.
1270 if (proc_triple.getVendor() == llvm::Triple::Apple) {
1271 switch (proc_triple.getArch()) {
1272 case llvm::Triple::arm:
1273 case llvm::Triple::thumb:
1274 case llvm::Triple::aarch64:
1275 case llvm::Triple::aarch64_32:
1276 ostype = "ios";
1277 break;
1278 default:
1279 // No change.
1280 break;
1281 }
1282 }
1283 response.Printf("ostype:%s;", ostype.c_str());
1284
1285 switch (proc_arch.GetByteOrder()) {
1287 response.PutCString("endian:little;");
1288 break;
1290 response.PutCString("endian:big;");
1291 break;
1293 response.PutCString("endian:pdp;");
1294 break;
1295 default:
1296 // Nothing.
1297 break;
1298 }
1299 // In case of MIPS64, pointer size is depend on ELF ABI For N32 the pointer
1300 // size is 4 and for N64 it is 8
1301 std::string abi = proc_arch.GetTargetABI();
1302 if (!abi.empty())
1303 response.Printf("elf_abi:%s;", abi.c_str());
1304 response.Printf("ptrsize:%d;", proc_arch.GetAddressByteSize());
1305 }
1306}
1307
1309 const std::string &module_path, const ArchSpec &arch) {
1310#ifdef __ANDROID__
1311 return HostInfoAndroid::ResolveLibraryPath(module_path, arch);
1312#else
1313 FileSpec file_spec(module_path);
1314 FileSystem::Instance().Resolve(file_spec);
1315 return file_spec;
1316#endif
1317}
1318
1321 llvm::StringRef triple) {
1322 ArchSpec arch(triple);
1323
1324 FileSpec req_module_path_spec(module_path);
1325 FileSystem::Instance().Resolve(req_module_path_spec);
1326
1327 const FileSpec module_path_spec =
1328 FindModuleFile(req_module_path_spec.GetPath(), arch);
1329
1330 lldb::offset_t file_offset = 0;
1331 lldb::offset_t file_size = 0;
1332#ifdef __ANDROID__
1333 // In Android API level 23 and above, dynamic loader is able to load .so file
1334 // directly from zip file. In that case, module_path will be
1335 // "zip_path!/so_path". Resolve the zip file path, .so file offset and size.
1337 std::string file_path;
1339 module_path_spec, file_kind, file_path, file_offset, file_size)) {
1340 return ModuleSpec();
1341 }
1343 // For zip .so file, this file_path will contain only the actual zip file
1344 // path for the object file processing. Otherwise it is the same as
1345 // module_path.
1346 const FileSpec actual_module_path_spec(file_path);
1347#else
1348 // It is just module_path_spec reference for other platforms.
1349 const FileSpec &actual_module_path_spec = module_path_spec;
1350#endif
1351
1352 const ModuleSpec module_spec(actual_module_path_spec, arch);
1353
1354 ModuleSpecList module_specs;
1355 if (!ObjectFile::GetModuleSpecifications(actual_module_path_spec, file_offset,
1356 file_size, module_specs))
1357 return ModuleSpec();
1358
1359 ModuleSpec matched_module_spec;
1360 if (!module_specs.FindMatchingModuleSpec(module_spec, matched_module_spec))
1361 return ModuleSpec();
1362
1363#ifdef __ANDROID__
1364 if (file_kind == ZipFileResolver::eFileKindZip) {
1365 // For zip .so file, matched_module_spec contains only the actual zip file
1366 // path for the object file processing. Overwrite the matched_module_spec
1367 // file spec with the original module_path_spec to pass "zip_path!/so_path"
1368 // through to PlatformAndroid::DownloadModuleSlice.
1369 *matched_module_spec.GetFileSpecPtr() = module_path_spec;
1370 }
1371#endif
1372
1373 return matched_module_spec;
1374}
1375
1377 const llvm::ArrayRef<llvm::StringRef> client_features) {
1378 // 128KBytes is a reasonable max packet size--debugger can always use less.
1379 constexpr uint32_t max_packet_size = 128 * 1024;
1380
1381 // Features common to platform server and llgs.
1382 return {
1383 llvm::formatv("PacketSize={0}", max_packet_size),
1384 "QStartNoAckMode+",
1385 "qEcho+",
1386 "native-signals+",
1387 };
1388}
static llvm::raw_ostream & error(Stream &strm)
static const uint32_t g_default_packet_timeout_sec
static void fill_clamp(T &dest, U src, typename T::value_type fallback)
static GDBErrno system_errno_to_gdb(int err)
#define lldbassert(x)
Definition: LLDBAssert.h:15
#define LLDB_LOG(log,...)
The LLDB_LOG* macros defined below are the way to emit log messages.
Definition: Log.h:369
#define LLDB_LOGF(log,...)
Definition: Log.h:376
size_t GetEscapedBinaryData(std::string &str)
void SetFilePos(uint32_t idx)
uint32_t GetHexMaxU32(bool little_endian, uint32_t fail_value)
uint64_t GetHexMaxU64(bool little_endian, uint64_t fail_value)
size_t GetBytesLeft()
bool GetNameColonValue(llvm::StringRef &name, llvm::StringRef &value)
size_t GetHexByteString(std::string &str)
char GetChar(char fail_value='\0')
const char * Peek()
int32_t GetS32(int32_t fail_value, int base=0)
size_t GetHexByteStringTerminatedBy(std::string &str, char terminator)
llvm::StringRef GetStringRef() const
size_t GetHexByteStringFixedLength(std::string &str, uint32_t nibble_length)
uint32_t GetU32(uint32_t fail_value, int base=0)
An architecture specification class.
Definition: ArchSpec.h:31
uint32_t GetAddressByteSize() const
Returns the size in bytes of an address of the current architecture.
Definition: ArchSpec.cpp:709
bool IsValid() const
Tests if this ArchSpec is valid.
Definition: ArchSpec.h:359
llvm::Triple & GetTriple()
Architecture triple accessor.
Definition: ArchSpec.h:461
uint32_t GetMachOCPUSubType() const
Definition: ArchSpec.cpp:681
bool IsMIPS() const
if MIPS architecture return true.
Definition: ArchSpec.cpp:577
uint32_t GetMachOCPUType() const
Definition: ArchSpec.cpp:669
std::string GetTargetABI() const
Return a string representing target application ABI.
Definition: ArchSpec.cpp:579
lldb::ByteOrder GetByteOrder() const
Returns the byte order for the architecture specification.
Definition: ArchSpec.cpp:756
llvm::Triple::ArchType GetMachine() const
Returns a machine family for the current architecture.
Definition: ArchSpec.cpp:701
void AppendArgument(llvm::StringRef arg_str, char quote_char='\0')
Appends a new argument to the end of the list argument list.
Definition: Args.cpp:332
std::pair< iterator, bool > insert(llvm::StringRef KeyEqValue)
Definition: Environment.h:71
bool Open(int fd, const FileSpec &file_spec, bool read, bool write)
Definition: FileAction.cpp:34
A file utility class.
Definition: FileSpec.h:56
void SetFile(llvm::StringRef path, Style style)
Change the file specified with a new path.
Definition: FileSpec.cpp:174
size_t GetPath(char *path, size_t max_path_length, bool denormalize=true) const
Extract the full path to the file.
Definition: FileSpec.cpp:367
void Resolve(llvm::SmallVectorImpl< char > &path)
Resolve path to make it canonical.
Status Symlink(const FileSpec &src, const FileSpec &dst)
int Open(const char *path, int flags, int mode=0600)
Wraps ::open in a platform-independent way.
uint32_t GetPermissions(const FileSpec &file_spec) const
Return the current permissions of the given file.
static FileSystem & Instance()
static int kInvalidDescriptor
Definition: File.h:38
@ eOpenOptionReadOnly
Definition: File.h:51
@ eOpenOptionWriteOnly
Definition: File.h:52
ValueType Clear(ValueType mask=~static_cast< ValueType >(0))
Clear one or more flags.
Definition: Flags.h:61
ValueType Set(ValueType mask)
Set one or more flags by logical OR'ing mask with the current flags.
Definition: Flags.h:73
static FileSpec ResolveLibraryPath(const std::string &path, const ArchSpec &arch)
static Status RunShellCommand(llvm::StringRef command, const FileSpec &working_dir, int *status_ptr, int *signo_ptr, std::string *command_output, const Timeout< std::micro > &timeout, bool run_in_shell=true, bool hide_stderr=false)
Run a shell command.
static bool GetProcessInfo(lldb::pid_t pid, ProcessInstanceInfo &proc_info)
static uint32_t FindProcesses(const ProcessInstanceInfoMatch &match_info, ProcessInstanceInfoList &proc_infos)
bool FindMatchingModuleSpec(const ModuleSpec &module_spec, ModuleSpec &match_module_spec) const
Definition: ModuleSpec.h:333
uint64_t GetObjectOffset() const
Definition: ModuleSpec.h:107
FileSpec & GetFileSpec()
Definition: ModuleSpec.h:53
ArchSpec & GetArchitecture()
Definition: ModuleSpec.h:89
FileSpec * GetFileSpecPtr()
Definition: ModuleSpec.h:47
uint64_t GetObjectSize() const
Definition: ModuleSpec.h:113
Status Close() override
Flush any buffers and release any resources owned by the file.
Definition: File.cpp:315
Status Write(const void *buf, size_t &num_bytes) override
Write bytes from buf to a file at the current file position.
Definition: File.cpp:582
Status Read(void *buf, size_t &num_bytes) override
Read bytes from a file from the current file position into buf.
Definition: File.cpp:518
static size_t GetModuleSpecifications(const FileSpec &file, lldb::offset_t file_offset, lldb::offset_t file_size, ModuleSpecList &specs, lldb::DataBufferSP data_sp=lldb::DataBufferSP())
Definition: ObjectFile.cpp:196
void SetGroupID(uint32_t gid)
Definition: ProcessInfo.h:60
void SetArchitecture(const ArchSpec &arch)
Definition: ProcessInfo.h:66
lldb::pid_t GetProcessID() const
Definition: ProcessInfo.h:68
llvm::StringRef GetArg0() const
Definition: ProcessInfo.cpp:80
void SetProcessID(lldb::pid_t pid)
Definition: ProcessInfo.h:70
FileSpec & GetExecutableFile()
Definition: ProcessInfo.h:43
uint32_t GetUserID() const
Definition: ProcessInfo.h:50
Environment & GetEnvironment()
Definition: ProcessInfo.h:88
uint32_t GetGroupID() const
Definition: ProcessInfo.h:52
void SetUserID(uint32_t uid)
Definition: ProcessInfo.h:58
ArchSpec & GetArchitecture()
Definition: ProcessInfo.h:62
void SetNameMatchType(NameMatch name_match_type)
Definition: ProcessInfo.h:318
ProcessInstanceInfo & GetProcessInfo()
Definition: ProcessInfo.h:308
uint32_t GetEffectiveUserID() const
Definition: ProcessInfo.h:160
void SetEffectiveGroupID(uint32_t gid)
Definition: ProcessInfo.h:170
lldb::pid_t GetParentProcessID() const
Definition: ProcessInfo.h:172
uint32_t GetEffectiveGroupID() const
Definition: ProcessInfo.h:162
void SetParentProcessID(lldb::pid_t pid)
Definition: ProcessInfo.h:174
void SetEffectiveUserID(uint32_t uid)
Definition: ProcessInfo.h:168
void AppendFileAction(const FileAction &info)
An error handling class.
Definition: Status.h:115
bool Fail() const
Test for error condition.
Definition: Status.cpp:270
const char * AsCString(const char *default_error_str="unknown error") const
Get the error string associated with the current error.
Definition: Status.cpp:195
bool Success() const
Test for success condition.
Definition: Status.cpp:280
int PutEscapedBytes(const void *s, size_t src_len)
Output a block of data to the stream performing GDB-remote escaping.
Definition: GDBRemote.cpp:28
llvm::StringRef GetString() const
void Format(const char *format, Args &&... args)
Definition: Stream.h:353
llvm::raw_ostream & AsRawOstream()
Returns a raw_ostream that forwards the data to this Stream object.
Definition: Stream.h:401
size_t PutStringAsRawHex8(llvm::StringRef s)
Definition: Stream.cpp:410
size_t PutHex64(uint64_t uvalue, lldb::ByteOrder byte_order=lldb::eByteOrderInvalid)
Definition: Stream.cpp:299
size_t Printf(const char *format,...) __attribute__((format(printf
Output printf formatted output to the stream.
Definition: Stream.cpp:134
size_t PutCString(llvm::StringRef cstr)
Output a C string to the stream.
Definition: Stream.cpp:65
size_t PutChar(char ch)
Definition: Stream.cpp:131
size_t PutHex32(uint32_t uvalue, lldb::ByteOrder byte_order=lldb::eByteOrderInvalid)
Definition: Stream.cpp:283
ObjectSP GetItemAtIndex(size_t idx) const
bool GetValueForKeyAsString(llvm::StringRef key, llvm::StringRef &result) const
std::shared_ptr< Object > ObjectSP
static ObjectSP ParseJSON(llvm::StringRef json_text)
std::string GetAsString(llvm::StringRef separator="-") const
Definition: UUID.cpp:49
static bool ResolveSharedLibraryPath(const FileSpec &file_spec, FileKind &file_kind, std::string &file_path, lldb::offset_t &so_file_offset, lldb::offset_t &so_file_size)
virtual Status LaunchProcess()=0
Launch a process with the current launch settings.
ModuleSpec GetModuleInfo(llvm::StringRef module_path, llvm::StringRef triple)
virtual FileSpec FindModuleFile(const std::string &module_path, const ArchSpec &arch)
void RegisterMemberFunctionHandler(StringExtractorGDBRemote::ServerPacketType packet_type, PacketResult(T::*handler)(StringExtractorGDBRemote &packet))
static void CreateProcessInfoResponse_DebugServerStyle(const ProcessInstanceInfo &proc_info, StreamString &response)
virtual std::vector< std::string > HandleFeatures(llvm::ArrayRef< llvm::StringRef > client_features)
static void CreateProcessInfoResponse(const ProcessInstanceInfo &proc_info, StreamString &response)
#define UINT64_MAX
Definition: lldb-defines.h:23
#define LLDB_INVALID_CPUTYPE
Definition: lldb-defines.h:104
#define UINT32_MAX
Definition: lldb-defines.h:19
#define LLDB_INVALID_PROCESS_ID
Definition: lldb-defines.h:89
lldb::ByteOrder InlHostByteOrder()
Definition: Endian.h:25
A class that represents a running process on the host machine.
Log * GetLog(Cat mask)
Retrieve the Log object for the channel associated with the given log enum.
Definition: Log.h:332
Definition: SBAddress.h:15
uint64_t offset_t
Definition: lldb-types.h:85
uint64_t pid_t
Definition: lldb-types.h:83
@ eByteOrderLittle
static bool ToBoolean(llvm::StringRef s, bool fail_value, bool *success_ptr)