GDBRemoteCommunication.cpp revision b4d1d331a47d3e30f6a4d14fbc2a23317e874744
1//===-- GDBRemoteCommunication.cpp ------------------------------*- C++ -*-===// 2// 3// The LLVM Compiler Infrastructure 4// 5// This file is distributed under the University of Illinois Open Source 6// License. See LICENSE.TXT for details. 7// 8//===----------------------------------------------------------------------===// 9 10 11#include "GDBRemoteCommunication.h" 12 13// C Includes 14// C++ Includes 15// Other libraries and framework includes 16#include "lldb/Interpreter/Args.h" 17#include "lldb/Core/ConnectionFileDescriptor.h" 18#include "lldb/Core/Log.h" 19#include "lldb/Core/State.h" 20#include "lldb/Core/StreamString.h" 21#include "lldb/Host/TimeValue.h" 22 23// Project includes 24#include "Utility/StringExtractorGDBRemote.h" 25#include "ProcessGDBRemote.h" 26#include "ProcessGDBRemoteLog.h" 27 28using namespace lldb; 29using namespace lldb_private; 30 31//---------------------------------------------------------------------- 32// GDBRemoteCommunication constructor 33//---------------------------------------------------------------------- 34GDBRemoteCommunication::GDBRemoteCommunication() : 35 Communication("gdb-remote.packets"), 36 m_send_acks (true), 37 m_rx_packet_listener ("gdbremote.rx_packet"), 38 m_sequence_mutex (Mutex::eMutexTypeRecursive), 39 m_is_running (false), 40 m_async_mutex (Mutex::eMutexTypeRecursive), 41 m_async_packet_predicate (false), 42 m_async_packet (), 43 m_async_response (), 44 m_async_timeout (UINT32_MAX), 45 m_async_signal (-1), 46 m_arch(), 47 m_os(), 48 m_vendor(), 49 m_byte_order(eByteOrderHost), 50 m_pointer_byte_size(0) 51{ 52 m_rx_packet_listener.StartListeningForEvents(this, 53 Communication::eBroadcastBitPacketAvailable | 54 Communication::eBroadcastBitReadThreadDidExit); 55} 56 57//---------------------------------------------------------------------- 58// Destructor 59//---------------------------------------------------------------------- 60GDBRemoteCommunication::~GDBRemoteCommunication() 61{ 62 m_rx_packet_listener.StopListeningForEvents(this, 63 Communication::eBroadcastBitPacketAvailable | 64 Communication::eBroadcastBitReadThreadDidExit); 65 if (IsConnected()) 66 { 67 StopReadThread(); 68 Disconnect(); 69 } 70} 71 72 73char 74GDBRemoteCommunication::CalculcateChecksum (const char *payload, size_t payload_length) 75{ 76 int checksum = 0; 77 78 // We only need to compute the checksum if we are sending acks 79 if (m_send_acks) 80 { 81 for (size_t i = 0; i < payload_length; ++i) 82 checksum += payload[i]; 83 } 84 return checksum & 255; 85} 86 87size_t 88GDBRemoteCommunication::SendAck (char ack_char) 89{ 90 Mutex::Locker locker(m_sequence_mutex); 91 ProcessGDBRemoteLog::LogIf (GDBR_LOG_PACKETS, "send packet: %c", ack_char); 92 ConnectionStatus status = eConnectionStatusSuccess; 93 return Write (&ack_char, 1, status, NULL) == 1; 94} 95 96size_t 97GDBRemoteCommunication::SendPacketAndWaitForResponse 98( 99 const char *payload, 100 StringExtractorGDBRemote &response, 101 uint32_t timeout_seconds, 102 bool send_async 103) 104{ 105 return SendPacketAndWaitForResponse (payload, 106 ::strlen (payload), 107 response, 108 timeout_seconds, 109 send_async); 110} 111 112size_t 113GDBRemoteCommunication::SendPacketAndWaitForResponse 114( 115 const char *payload, 116 size_t payload_length, 117 StringExtractorGDBRemote &response, 118 uint32_t timeout_seconds, 119 bool send_async 120) 121{ 122 Mutex::Locker locker; 123 TimeValue timeout_time; 124 timeout_time = TimeValue::Now(); 125 timeout_time.OffsetWithSeconds (timeout_seconds); 126 127 if (GetSequenceMutex (locker)) 128 { 129 if (SendPacketNoLock (payload, strlen(payload))) 130 return WaitForPacketNoLock (response, &timeout_time); 131 } 132 else 133 { 134 if (send_async) 135 { 136 Mutex::Locker async_locker (m_async_mutex); 137 m_async_packet.assign(payload, payload_length); 138 m_async_timeout = timeout_seconds; 139 m_async_packet_predicate.SetValue (true, eBroadcastNever); 140 141 bool timed_out = false; 142 if (SendInterrupt(locker, 1, &timed_out)) 143 { 144 if (m_async_packet_predicate.WaitForValueEqualTo (false, &timeout_time, &timed_out)) 145 { 146 response = m_async_response; 147 return response.GetStringRef().size(); 148 } 149 } 150// if (timed_out) 151// m_error.SetErrorString("Timeout."); 152// else 153// m_error.SetErrorString("Unknown error."); 154 } 155 else 156 { 157// m_error.SetErrorString("Sequence mutex is locked."); 158 } 159 } 160 return 0; 161} 162 163//template<typename _Tp> 164//class ScopedValueChanger 165//{ 166//public: 167// // Take a value reference and the value to assing it to when this class 168// // instance goes out of scope. 169// ScopedValueChanger (_Tp &value_ref, _Tp value) : 170// m_value_ref (value_ref), 171// m_value (value) 172// { 173// } 174// 175// // This object is going out of scope, change the value pointed to by 176// // m_value_ref to the value we got during construction which was stored in 177// // m_value; 178// ~ScopedValueChanger () 179// { 180// m_value_ref = m_value; 181// } 182//protected: 183// _Tp &m_value_ref; // A reference to the value we wil change when this object destructs 184// _Tp m_value; // The value to assign to m_value_ref when this goes out of scope. 185//}; 186 187StateType 188GDBRemoteCommunication::SendContinuePacketAndWaitForResponse 189( 190 ProcessGDBRemote *process, 191 const char *payload, 192 size_t packet_length, 193 StringExtractorGDBRemote &response 194) 195{ 196 Log *log = ProcessGDBRemoteLog::GetLogIfAllCategoriesSet (GDBR_LOG_PROCESS); 197 Log *async_log = ProcessGDBRemoteLog::GetLogIfAllCategoriesSet (GDBR_LOG_ASYNC); 198 if (log) 199 log->Printf ("GDBRemoteCommunication::%s ()", __FUNCTION__); 200 201 Mutex::Locker locker(m_sequence_mutex); 202 m_is_running.SetValue (true, eBroadcastNever); 203 204// ScopedValueChanger<bool> restore_running_to_false (m_is_running, false); 205 StateType state = eStateRunning; 206 207 if (SendPacket(payload, packet_length) == 0) 208 state = eStateInvalid; 209 210 while (state == eStateRunning) 211 { 212 if (log) 213 log->Printf ("GDBRemoteCommunication::%s () WaitForPacket(...)", __FUNCTION__); 214 215 if (WaitForPacket (response, (TimeValue*)NULL)) 216 { 217 if (response.Empty()) 218 state = eStateInvalid; 219 else 220 { 221 const char stop_type = response.GetChar(); 222 if (log) 223 log->Printf ("GDBRemoteCommunication::%s () got '%c' packet", __FUNCTION__, stop_type); 224 switch (stop_type) 225 { 226 case 'T': 227 case 'S': 228 if (m_async_signal != -1) 229 { 230 if (async_log) 231 async_log->Printf ("async: send signo = %s", Host::GetSignalAsCString (m_async_signal)); 232 233 // Save off the async signal we are supposed to send 234 const int async_signal = m_async_signal; 235 // Clear the async signal member so we don't end up 236 // sending the signal multiple times... 237 m_async_signal = -1; 238 // Check which signal we stopped with 239 uint8_t signo = response.GetHexU8(255); 240 if (signo == async_signal) 241 { 242 if (async_log) 243 async_log->Printf ("async: stopped with signal %s, we are done running", Host::GetSignalAsCString (signo)); 244 245 // We already stopped with a signal that we wanted 246 // to stop with, so we are done 247 response.SetFilePos (0); 248 } 249 else 250 { 251 // We stopped with a different signal that the one 252 // we wanted to stop with, so now we must resume 253 // with the signal we want 254 char signal_packet[32]; 255 int signal_packet_len = 0; 256 signal_packet_len = ::snprintf (signal_packet, 257 sizeof (signal_packet), 258 "C%2.2x", 259 async_signal); 260 261 if (async_log) 262 async_log->Printf ("async: stopped with signal %s, resume with %s", 263 Host::GetSignalAsCString (signo), 264 Host::GetSignalAsCString (async_signal)); 265 266 if (SendPacket(signal_packet, signal_packet_len) == 0) 267 { 268 if (async_log) 269 async_log->Printf ("async: error: failed to resume with %s", 270 Host::GetSignalAsCString (async_signal)); 271 state = eStateInvalid; 272 break; 273 } 274 else 275 continue; 276 } 277 } 278 else if (m_async_packet_predicate.GetValue()) 279 { 280 if (async_log) 281 async_log->Printf ("async: send async packet: %s", 282 m_async_packet.c_str()); 283 284 // We are supposed to send an asynchronous packet while 285 // we are running. 286 m_async_response.Clear(); 287 if (!m_async_packet.empty()) 288 { 289 SendPacketAndWaitForResponse (&m_async_packet[0], 290 m_async_packet.size(), 291 m_async_response, 292 m_async_timeout, 293 false); 294 } 295 // Let the other thread that was trying to send the async 296 // packet know that the packet has been sent. 297 m_async_packet_predicate.SetValue(false, eBroadcastAlways); 298 299 if (async_log) 300 async_log->Printf ("async: resume after async response received: %s", 301 m_async_response.GetStringRef().c_str()); 302 303 // Continue again 304 if (SendPacket("c", 1) == 0) 305 { 306 state = eStateInvalid; 307 break; 308 } 309 else 310 continue; 311 } 312 // Stop with signal and thread info 313 state = eStateStopped; 314 break; 315 316 case 'W': 317 // process exited 318 state = eStateExited; 319 break; 320 321 case 'O': 322 // STDOUT 323 { 324 std::string inferior_stdout; 325 inferior_stdout.reserve(response.GetBytesLeft () / 2); 326 char ch; 327 while ((ch = response.GetHexU8()) != '\0') 328 inferior_stdout.append(1, ch); 329 process->AppendSTDOUT (inferior_stdout.c_str(), inferior_stdout.size()); 330 } 331 break; 332 333 case 'E': 334 // ERROR 335 state = eStateInvalid; 336 break; 337 338 default: 339 if (log) 340 log->Printf ("GDBRemoteCommunication::%s () got unrecognized async packet: '%s'", __FUNCTION__, stop_type); 341 break; 342 } 343 } 344 } 345 else 346 { 347 if (log) 348 log->Printf ("GDBRemoteCommunication::%s () WaitForPacket(...) => false", __FUNCTION__); 349 state = eStateInvalid; 350 } 351 } 352 if (log) 353 log->Printf ("GDBRemoteCommunication::%s () => %s", __FUNCTION__, StateAsCString(state)); 354 response.SetFilePos(0); 355 m_is_running.SetValue (false, eBroadcastOnChange); 356 return state; 357} 358 359size_t 360GDBRemoteCommunication::SendPacket (const char *payload) 361{ 362 Mutex::Locker locker(m_sequence_mutex); 363 return SendPacketNoLock (payload, ::strlen (payload)); 364} 365 366size_t 367GDBRemoteCommunication::SendPacket (const char *payload, size_t payload_length) 368{ 369 Mutex::Locker locker(m_sequence_mutex); 370 return SendPacketNoLock (payload, payload_length); 371} 372 373size_t 374GDBRemoteCommunication::SendPacketNoLock (const char *payload, size_t payload_length) 375{ 376 if (IsConnected()) 377 { 378 StreamString packet(0, 4, eByteOrderBig); 379 380 packet.PutChar('$'); 381 packet.Write (payload, payload_length); 382 packet.PutChar('#'); 383 packet.PutHex8(CalculcateChecksum (payload, payload_length)); 384 385 ProcessGDBRemoteLog::LogIf (GDBR_LOG_PACKETS, "send packet: %s", packet.GetData()); 386 ConnectionStatus status = eConnectionStatusSuccess; 387 size_t bytes_written = Write (packet.GetData(), packet.GetSize(), status, NULL); 388 if (bytes_written == packet.GetSize()) 389 { 390 if (m_send_acks) 391 { 392 if (GetAck (1) != '+') 393 return 0; 394 } 395 } 396 return bytes_written; 397 } 398 //m_error.SetErrorString("Not connected."); 399 return 0; 400} 401 402char 403GDBRemoteCommunication::GetAck (uint32_t timeout_seconds) 404{ 405 StringExtractorGDBRemote response; 406 if (WaitForPacket (response, timeout_seconds) == 1) 407 return response.GetChar(); 408 return 0; 409} 410 411bool 412GDBRemoteCommunication::GetSequenceMutex (Mutex::Locker& locker) 413{ 414 return locker.TryLock (m_sequence_mutex.GetMutex()); 415} 416 417bool 418GDBRemoteCommunication::SendAsyncSignal (int signo) 419{ 420 m_async_signal = signo; 421 bool timed_out = false; 422 Mutex::Locker locker; 423 if (SendInterrupt (locker, 1, &timed_out)) 424 return true; 425 m_async_signal = -1; 426 return false; 427} 428 429// This function takes a mutex locker as a parameter in case the GetSequenceMutex 430// actually succeeds. If it doesn't succeed in acquiring the sequence mutex 431// (the expected result), then it will send the halt packet. If it does succeed 432// then the caller that requested the interrupt will want to keep the sequence 433// locked down so that no one else can send packets while the caller has control. 434// This function usually gets called when we are running and need to stop the 435// target. It can also be used when we are running and and we need to do something 436// else (like read/write memory), so we need to interrupt the running process 437// (gdb remote protocol requires this), and do what we need to do, then resume. 438 439bool 440GDBRemoteCommunication::SendInterrupt (Mutex::Locker& locker, uint32_t seconds_to_wait_for_stop, bool *timed_out) 441{ 442 if (timed_out) 443 *timed_out = false; 444 445 if (IsConnected() && IsRunning()) 446 { 447 // Only send an interrupt if our debugserver is running... 448 if (GetSequenceMutex (locker) == false) 449 { 450 // Someone has the mutex locked waiting for a response or for the 451 // inferior to stop, so send the interrupt on the down low... 452 char ctrl_c = '\x03'; 453 ConnectionStatus status = eConnectionStatusSuccess; 454 TimeValue timeout; 455 if (seconds_to_wait_for_stop) 456 { 457 timeout = TimeValue::Now(); 458 timeout.OffsetWithSeconds (seconds_to_wait_for_stop); 459 } 460 ProcessGDBRemoteLog::LogIf (GDBR_LOG_PACKETS, "send packet: \\x03"); 461 if (Write (&ctrl_c, 1, status, NULL) > 0) 462 { 463 if (seconds_to_wait_for_stop) 464 m_is_running.WaitForValueEqualTo (false, &timeout, timed_out); 465 return true; 466 } 467 } 468 } 469 return false; 470} 471 472size_t 473GDBRemoteCommunication::WaitForPacket (StringExtractorGDBRemote &response, uint32_t timeout_seconds) 474{ 475 TimeValue timeout_time; 476 timeout_time = TimeValue::Now(); 477 timeout_time.OffsetWithSeconds (timeout_seconds); 478 return WaitForPacketNoLock (response, &timeout_time); 479} 480 481size_t 482GDBRemoteCommunication::WaitForPacket (StringExtractorGDBRemote &response, TimeValue* timeout_time_ptr) 483{ 484 Mutex::Locker locker(m_sequence_mutex); 485 return WaitForPacketNoLock (response, timeout_time_ptr); 486} 487 488size_t 489GDBRemoteCommunication::WaitForPacketNoLock (StringExtractorGDBRemote &response, TimeValue* timeout_time_ptr) 490{ 491 bool checksum_error = false; 492 response.Clear (); 493 494 EventSP event_sp; 495 496 if (m_rx_packet_listener.WaitForEvent (timeout_time_ptr, event_sp)) 497 { 498 const uint32_t event_type = event_sp->GetType(); 499 if (event_type | Communication::eBroadcastBitPacketAvailable) 500 { 501 const EventDataBytes *event_bytes = EventDataBytes::GetEventDataFromEvent(event_sp.get()); 502 if (event_bytes) 503 { 504 const char * packet_data = (const char *)event_bytes->GetBytes(); 505 ProcessGDBRemoteLog::LogIf (GDBR_LOG_PACKETS, "read packet: %s", packet_data); 506 const size_t packet_size = event_bytes->GetByteSize(); 507 if (packet_data && packet_size > 0) 508 { 509 std::string &response_str = response.GetStringRef(); 510 if (packet_data[0] == '$') 511 { 512 assert (packet_size >= 4); // Must have at least '$#CC' where CC is checksum 513 assert (packet_data[packet_size-3] == '#'); 514 assert (::isxdigit (packet_data[packet_size-2])); // Must be checksum hex byte 515 assert (::isxdigit (packet_data[packet_size-1])); // Must be checksum hex byte 516 response_str.assign (packet_data + 1, packet_size - 4); 517 if (m_send_acks) 518 { 519 char packet_checksum = strtol (&packet_data[packet_size-2], NULL, 16); 520 char actual_checksum = CalculcateChecksum (&response_str[0], response_str.size()); 521 checksum_error = packet_checksum != actual_checksum; 522 // Send the ack or nack if needed 523 if (checksum_error) 524 SendAck('-'); 525 else 526 SendAck('+'); 527 } 528 } 529 else 530 { 531 response_str.assign (packet_data, packet_size); 532 } 533 return response_str.size(); 534 } 535 } 536 } 537 else if (Communication::eBroadcastBitReadThreadDidExit) 538 { 539 // Our read thread exited on us so just fall through and return zero... 540 } 541 } 542 return 0; 543} 544 545void 546GDBRemoteCommunication::AppendBytesToCache (const uint8_t *src, size_t src_len, bool broadcast) 547{ 548 // Put the packet data into the buffer in a thread safe fashion 549 Mutex::Locker locker(m_bytes_mutex); 550 m_bytes.append ((const char *)src, src_len); 551 552 // Parse up the packets into gdb remote packets 553 while (!m_bytes.empty()) 554 { 555 // end_idx must be one past the last valid packet byte. Start 556 // it off with an invalid value that is the same as the current 557 // index. 558 size_t end_idx = 0; 559 560 switch (m_bytes[0]) 561 { 562 case '+': // Look for ack 563 case '-': // Look for cancel 564 case '\x03': // ^C to halt target 565 end_idx = 1; // The command is one byte long... 566 break; 567 568 case '$': 569 // Look for a standard gdb packet? 570 end_idx = m_bytes.find('#'); 571 if (end_idx != std::string::npos) 572 { 573 if (end_idx + 2 < m_bytes.size()) 574 { 575 end_idx += 3; 576 } 577 else 578 { 579 // Checksum bytes aren't all here yet 580 end_idx = std::string::npos; 581 } 582 } 583 break; 584 585 default: 586 break; 587 } 588 589 if (end_idx == std::string::npos) 590 { 591 //ProcessGDBRemoteLog::LogIf (GDBR_LOG_PACKETS | GDBR_LOG_VERBOSE, "GDBRemoteCommunication::%s packet not yet complete: '%s'",__FUNCTION__, m_bytes.c_str()); 592 return; 593 } 594 else if (end_idx > 0) 595 { 596 // We have a valid packet... 597 assert (end_idx <= m_bytes.size()); 598 std::auto_ptr<EventDataBytes> event_bytes_ap (new EventDataBytes (&m_bytes[0], end_idx)); 599 ProcessGDBRemoteLog::LogIf (GDBR_LOG_COMM, "got full packet: %s", event_bytes_ap->GetBytes()); 600 BroadcastEvent (eBroadcastBitPacketAvailable, event_bytes_ap.release()); 601 m_bytes.erase(0, end_idx); 602 } 603 else 604 { 605 assert (1 <= m_bytes.size()); 606 ProcessGDBRemoteLog::LogIf (GDBR_LOG_COMM, "GDBRemoteCommunication::%s tossing junk byte at %c",__FUNCTION__, m_bytes[0]); 607 m_bytes.erase(0, 1); 608 } 609 } 610} 611 612lldb::pid_t 613GDBRemoteCommunication::GetCurrentProcessID (uint32_t timeout_seconds) 614{ 615 StringExtractorGDBRemote response; 616 if (SendPacketAndWaitForResponse("qC", strlen("qC"), response, timeout_seconds, false)) 617 { 618 if (response.GetChar() == 'Q') 619 if (response.GetChar() == 'C') 620 return response.GetHexMaxU32 (false, LLDB_INVALID_PROCESS_ID); 621 } 622 return LLDB_INVALID_PROCESS_ID; 623} 624 625bool 626GDBRemoteCommunication::GetLaunchSuccess (uint32_t timeout_seconds, std::string &error_str) 627{ 628 error_str.clear(); 629 StringExtractorGDBRemote response; 630 if (SendPacketAndWaitForResponse("qLaunchSuccess", strlen("qLaunchSuccess"), response, timeout_seconds, false)) 631 { 632 if (response.IsOKPacket()) 633 return true; 634 if (response.GetChar() == 'E') 635 { 636 // A string the describes what failed when launching... 637 error_str = response.GetStringRef().substr(1); 638 } 639 else 640 { 641 error_str.assign ("unknown error occurred launching process"); 642 } 643 } 644 else 645 { 646 error_str.assign ("failed to send the qLaunchSuccess packet"); 647 } 648 return false; 649} 650 651int 652GDBRemoteCommunication::SendArgumentsPacket (char const *argv[], uint32_t timeout_seconds) 653{ 654 if (argv && argv[0]) 655 { 656 StreamString packet; 657 packet.PutChar('A'); 658 const char *arg; 659 for (uint32_t i = 0; (arg = argv[i]) != NULL; ++i) 660 { 661 const int arg_len = strlen(arg); 662 if (i > 0) 663 packet.PutChar(','); 664 packet.Printf("%i,%i,", arg_len * 2, i); 665 packet.PutBytesAsRawHex8(arg, arg_len, eByteOrderHost, eByteOrderHost); 666 } 667 668 StringExtractorGDBRemote response; 669 if (SendPacketAndWaitForResponse (packet.GetData(), packet.GetSize(), response, timeout_seconds, false)) 670 { 671 if (response.IsOKPacket()) 672 return 0; 673 uint8_t error = response.GetError(); 674 if (error) 675 return error; 676 } 677 } 678 return -1; 679} 680 681int 682GDBRemoteCommunication::SendEnvironmentPacket (char const *name_equal_value, uint32_t timeout_seconds) 683{ 684 if (name_equal_value && name_equal_value[0]) 685 { 686 StreamString packet; 687 packet.Printf("QEnvironment:%s", name_equal_value); 688 StringExtractorGDBRemote response; 689 if (SendPacketAndWaitForResponse (packet.GetData(), packet.GetSize(), response, timeout_seconds, false)) 690 { 691 if (response.IsOKPacket()) 692 return 0; 693 uint8_t error = response.GetError(); 694 if (error) 695 return error; 696 } 697 } 698 return -1; 699} 700 701bool 702GDBRemoteCommunication::GetHostInfo (uint32_t timeout_seconds) 703{ 704 m_arch.Clear(); 705 m_os.Clear(); 706 m_vendor.Clear(); 707 m_byte_order = eByteOrderHost; 708 m_pointer_byte_size = 0; 709 710 StringExtractorGDBRemote response; 711 if (SendPacketAndWaitForResponse ("qHostInfo", response, timeout_seconds, false)) 712 { 713 if (response.IsUnsupportedPacket()) 714 return false; 715 716 717 std::string name; 718 std::string value; 719 while (response.GetNameColonValue(name, value)) 720 { 721 if (name.compare("cputype") == 0) 722 { 723 // exception type in big endian hex 724 m_arch.SetCPUType(Args::StringToUInt32 (value.c_str(), LLDB_INVALID_CPUTYPE, 0)); 725 } 726 else if (name.compare("cpusubtype") == 0) 727 { 728 // exception count in big endian hex 729 m_arch.SetCPUSubtype(Args::StringToUInt32 (value.c_str(), 0, 0)); 730 } 731 else if (name.compare("ostype") == 0) 732 { 733 // exception data in big endian hex 734 m_os.SetCString(value.c_str()); 735 } 736 else if (name.compare("vendor") == 0) 737 { 738 m_vendor.SetCString(value.c_str()); 739 } 740 else if (name.compare("endian") == 0) 741 { 742 if (value.compare("little") == 0) 743 m_byte_order = eByteOrderLittle; 744 else if (value.compare("big") == 0) 745 m_byte_order = eByteOrderBig; 746 else if (value.compare("pdp") == 0) 747 m_byte_order = eByteOrderPDP; 748 } 749 else if (name.compare("ptrsize") == 0) 750 { 751 m_pointer_byte_size = Args::StringToUInt32 (value.c_str(), 0, 0); 752 } 753 } 754 } 755 return HostInfoIsValid(); 756} 757 758int 759GDBRemoteCommunication::SendAttach 760( 761 lldb::pid_t pid, 762 uint32_t timeout_seconds, 763 StringExtractorGDBRemote& response 764) 765{ 766 if (pid != LLDB_INVALID_PROCESS_ID) 767 { 768 StreamString packet; 769 packet.Printf("vAttach;%x", pid); 770 771 if (SendPacketAndWaitForResponse (packet.GetData(), packet.GetSize(), response, timeout_seconds, false)) 772 { 773 if (response.IsErrorPacket()) 774 return response.GetError(); 775 return 0; 776 } 777 } 778 return -1; 779} 780 781const lldb_private::ArchSpec & 782GDBRemoteCommunication::GetHostArchitecture () 783{ 784 if (!HostInfoIsValid ()) 785 GetHostInfo (1); 786 return m_arch; 787} 788 789const lldb_private::ConstString & 790GDBRemoteCommunication::GetOSString () 791{ 792 if (!HostInfoIsValid ()) 793 GetHostInfo (1); 794 return m_os; 795} 796 797const lldb_private::ConstString & 798GDBRemoteCommunication::GetVendorString() 799{ 800 if (!HostInfoIsValid ()) 801 GetHostInfo (1); 802 return m_vendor; 803} 804 805lldb::ByteOrder 806GDBRemoteCommunication::GetByteOrder () 807{ 808 if (!HostInfoIsValid ()) 809 GetHostInfo (1); 810 return m_byte_order; 811} 812 813uint32_t 814GDBRemoteCommunication::GetAddressByteSize () 815{ 816 if (!HostInfoIsValid ()) 817 GetHostInfo (1); 818 return m_pointer_byte_size; 819} 820 821addr_t 822GDBRemoteCommunication::AllocateMemory (size_t size, uint32_t permissions, uint32_t timeout_seconds) 823{ 824 char packet[64]; 825 ::snprintf (packet, sizeof(packet), "_M%zx,%s%s%s", size, 826 permissions & lldb::ePermissionsReadable ? "r" : "", 827 permissions & lldb::ePermissionsWritable ? "w" : "", 828 permissions & lldb::ePermissionsExecutable ? "x" : ""); 829 StringExtractorGDBRemote response; 830 if (SendPacketAndWaitForResponse (packet, response, timeout_seconds, false)) 831 { 832 if (!response.IsErrorPacket()) 833 return response.GetHexMaxU64(false, LLDB_INVALID_ADDRESS); 834 } 835 return LLDB_INVALID_ADDRESS; 836} 837 838bool 839GDBRemoteCommunication::DeallocateMemory (addr_t addr, uint32_t timeout_seconds) 840{ 841 char packet[64]; 842 snprintf(packet, sizeof(packet), "_m%llx", (uint64_t)addr); 843 StringExtractorGDBRemote response; 844 if (SendPacketAndWaitForResponse (packet, response, timeout_seconds, false)) 845 { 846 if (!response.IsOKPacket()) 847 return true; 848 } 849 return false; 850} 851