1 //===-- Platform.cpp --------------------------------------------*- C++ -*-===//
2 //
3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4 // See https://llvm.org/LICENSE.txt for license information.
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6 //
7 //===----------------------------------------------------------------------===//
8 
9 #include <algorithm>
10 #include <csignal>
11 #include <fstream>
12 #include <vector>
13 
14 #include "llvm/Support/FileSystem.h"
15 #include "llvm/Support/Path.h"
16 
17 #include "lldb/Breakpoint/BreakpointIDList.h"
18 #include "lldb/Breakpoint/BreakpointLocation.h"
19 #include "lldb/Core/Debugger.h"
20 #include "lldb/Core/Module.h"
21 #include "lldb/Core/ModuleSpec.h"
22 #include "lldb/Core/PluginManager.h"
23 #include "lldb/Core/StreamFile.h"
24 #include "lldb/Host/FileSystem.h"
25 #include "lldb/Host/Host.h"
26 #include "lldb/Host/HostInfo.h"
27 #include "lldb/Host/OptionParser.h"
28 #include "lldb/Interpreter/OptionValueProperties.h"
29 #include "lldb/Interpreter/Property.h"
30 #include "lldb/Symbol/ObjectFile.h"
31 #include "lldb/Target/ModuleCache.h"
32 #include "lldb/Target/Platform.h"
33 #include "lldb/Target/Process.h"
34 #include "lldb/Target/Target.h"
35 #include "lldb/Target/UnixSignals.h"
36 #include "lldb/Utility/DataBufferHeap.h"
37 #include "lldb/Utility/FileSpec.h"
38 #include "lldb/Utility/Log.h"
39 #include "lldb/Utility/Status.h"
40 #include "lldb/Utility/StructuredData.h"
41 
42 #include "llvm/Support/FileSystem.h"
43 
44 // Define these constants from POSIX mman.h rather than include the file so
45 // that they will be correct even when compiled on Linux.
46 #define MAP_PRIVATE 2
47 #define MAP_ANON 0x1000
48 
49 using namespace lldb;
50 using namespace lldb_private;
51 
52 static uint32_t g_initialize_count = 0;
53 
54 // Use a singleton function for g_local_platform_sp to avoid init constructors
55 // since LLDB is often part of a shared library
56 static PlatformSP &GetHostPlatformSP() {
57   static PlatformSP g_platform_sp;
58   return g_platform_sp;
59 }
60 
61 const char *Platform::GetHostPlatformName() { return "host"; }
62 
63 namespace {
64 
65 static constexpr PropertyDefinition g_properties[] = {
66     {"use-module-cache", OptionValue::eTypeBoolean, true, true, nullptr,
67      {}, "Use module cache."},
68     {"module-cache-directory", OptionValue::eTypeFileSpec, true, 0, nullptr,
69      {}, "Root directory for cached modules."}};
70 
71 enum { ePropertyUseModuleCache, ePropertyModuleCacheDirectory };
72 
73 } // namespace
74 
75 ConstString PlatformProperties::GetSettingName() {
76   static ConstString g_setting_name("platform");
77   return g_setting_name;
78 }
79 
80 PlatformProperties::PlatformProperties() {
81   m_collection_sp.reset(new OptionValueProperties(GetSettingName()));
82   m_collection_sp->Initialize(g_properties);
83 
84   auto module_cache_dir = GetModuleCacheDirectory();
85   if (module_cache_dir)
86     return;
87 
88   llvm::SmallString<64> user_home_dir;
89   if (!llvm::sys::path::home_directory(user_home_dir))
90     return;
91 
92   module_cache_dir = FileSpec(user_home_dir.c_str());
93   module_cache_dir.AppendPathComponent(".lldb");
94   module_cache_dir.AppendPathComponent("module_cache");
95   SetModuleCacheDirectory(module_cache_dir);
96 }
97 
98 bool PlatformProperties::GetUseModuleCache() const {
99   const auto idx = ePropertyUseModuleCache;
100   return m_collection_sp->GetPropertyAtIndexAsBoolean(
101       nullptr, idx, g_properties[idx].default_uint_value != 0);
102 }
103 
104 bool PlatformProperties::SetUseModuleCache(bool use_module_cache) {
105   return m_collection_sp->SetPropertyAtIndexAsBoolean(
106       nullptr, ePropertyUseModuleCache, use_module_cache);
107 }
108 
109 FileSpec PlatformProperties::GetModuleCacheDirectory() const {
110   return m_collection_sp->GetPropertyAtIndexAsFileSpec(
111       nullptr, ePropertyModuleCacheDirectory);
112 }
113 
114 bool PlatformProperties::SetModuleCacheDirectory(const FileSpec &dir_spec) {
115   return m_collection_sp->SetPropertyAtIndexAsFileSpec(
116       nullptr, ePropertyModuleCacheDirectory, dir_spec);
117 }
118 
119 //------------------------------------------------------------------
120 /// Get the native host platform plug-in.
121 ///
122 /// There should only be one of these for each host that LLDB runs
123 /// upon that should be statically compiled in and registered using
124 /// preprocessor macros or other similar build mechanisms.
125 ///
126 /// This platform will be used as the default platform when launching
127 /// or attaching to processes unless another platform is specified.
128 //------------------------------------------------------------------
129 PlatformSP Platform::GetHostPlatform() { return GetHostPlatformSP(); }
130 
131 static std::vector<PlatformSP> &GetPlatformList() {
132   static std::vector<PlatformSP> g_platform_list;
133   return g_platform_list;
134 }
135 
136 static std::recursive_mutex &GetPlatformListMutex() {
137   static std::recursive_mutex g_mutex;
138   return g_mutex;
139 }
140 
141 void Platform::Initialize() { g_initialize_count++; }
142 
143 void Platform::Terminate() {
144   if (g_initialize_count > 0) {
145     if (--g_initialize_count == 0) {
146       std::lock_guard<std::recursive_mutex> guard(GetPlatformListMutex());
147       GetPlatformList().clear();
148     }
149   }
150 }
151 
152 const PlatformPropertiesSP &Platform::GetGlobalPlatformProperties() {
153   static const auto g_settings_sp(std::make_shared<PlatformProperties>());
154   return g_settings_sp;
155 }
156 
157 void Platform::SetHostPlatform(const lldb::PlatformSP &platform_sp) {
158   // The native platform should use its static void Platform::Initialize()
159   // function to register itself as the native platform.
160   GetHostPlatformSP() = platform_sp;
161 
162   if (platform_sp) {
163     std::lock_guard<std::recursive_mutex> guard(GetPlatformListMutex());
164     GetPlatformList().push_back(platform_sp);
165   }
166 }
167 
168 Status Platform::GetFileWithUUID(const FileSpec &platform_file,
169                                  const UUID *uuid_ptr, FileSpec &local_file) {
170   // Default to the local case
171   local_file = platform_file;
172   return Status();
173 }
174 
175 FileSpecList
176 Platform::LocateExecutableScriptingResources(Target *target, Module &module,
177                                              Stream *feedback_stream) {
178   return FileSpecList();
179 }
180 
181 // PlatformSP
182 // Platform::FindPlugin (Process *process, const ConstString &plugin_name)
183 //{
184 //    PlatformCreateInstance create_callback = nullptr;
185 //    if (plugin_name)
186 //    {
187 //        create_callback  =
188 //        PluginManager::GetPlatformCreateCallbackForPluginName (plugin_name);
189 //        if (create_callback)
190 //        {
191 //            ArchSpec arch;
192 //            if (process)
193 //            {
194 //                arch = process->GetTarget().GetArchitecture();
195 //            }
196 //            PlatformSP platform_sp(create_callback(process, &arch));
197 //            if (platform_sp)
198 //                return platform_sp;
199 //        }
200 //    }
201 //    else
202 //    {
203 //        for (uint32_t idx = 0; (create_callback =
204 //        PluginManager::GetPlatformCreateCallbackAtIndex(idx)) != nullptr;
205 //        ++idx)
206 //        {
207 //            PlatformSP platform_sp(create_callback(process, nullptr));
208 //            if (platform_sp)
209 //                return platform_sp;
210 //        }
211 //    }
212 //    return PlatformSP();
213 //}
214 
215 Status Platform::GetSharedModule(const ModuleSpec &module_spec,
216                                  Process *process, ModuleSP &module_sp,
217                                  const FileSpecList *module_search_paths_ptr,
218                                  ModuleSP *old_module_sp_ptr,
219                                  bool *did_create_ptr) {
220   if (IsHost())
221     return ModuleList::GetSharedModule(
222         module_spec, module_sp, module_search_paths_ptr, old_module_sp_ptr,
223         did_create_ptr, false);
224 
225   // Module resolver lambda.
226   auto resolver = [&](const ModuleSpec &spec) {
227     Status error(eErrorTypeGeneric);
228     ModuleSpec resolved_spec;
229     // Check if we have sysroot set.
230     if (m_sdk_sysroot) {
231       // Prepend sysroot to module spec.
232       resolved_spec = spec;
233       resolved_spec.GetFileSpec().PrependPathComponent(
234           m_sdk_sysroot.GetStringRef());
235       // Try to get shared module with resolved spec.
236       error = ModuleList::GetSharedModule(
237           resolved_spec, module_sp, module_search_paths_ptr, old_module_sp_ptr,
238           did_create_ptr, false);
239     }
240     // If we don't have sysroot or it didn't work then
241     // try original module spec.
242     if (!error.Success()) {
243       resolved_spec = spec;
244       error = ModuleList::GetSharedModule(
245           resolved_spec, module_sp, module_search_paths_ptr, old_module_sp_ptr,
246           did_create_ptr, false);
247     }
248     if (error.Success() && module_sp)
249       module_sp->SetPlatformFileSpec(resolved_spec.GetFileSpec());
250     return error;
251   };
252 
253   return GetRemoteSharedModule(module_spec, process, module_sp, resolver,
254                                did_create_ptr);
255 }
256 
257 bool Platform::GetModuleSpec(const FileSpec &module_file_spec,
258                              const ArchSpec &arch, ModuleSpec &module_spec) {
259   ModuleSpecList module_specs;
260   if (ObjectFile::GetModuleSpecifications(module_file_spec, 0, 0,
261                                           module_specs) == 0)
262     return false;
263 
264   ModuleSpec matched_module_spec;
265   return module_specs.FindMatchingModuleSpec(ModuleSpec(module_file_spec, arch),
266                                              module_spec);
267 }
268 
269 PlatformSP Platform::Find(const ConstString &name) {
270   if (name) {
271     static ConstString g_host_platform_name("host");
272     if (name == g_host_platform_name)
273       return GetHostPlatform();
274 
275     std::lock_guard<std::recursive_mutex> guard(GetPlatformListMutex());
276     for (const auto &platform_sp : GetPlatformList()) {
277       if (platform_sp->GetName() == name)
278         return platform_sp;
279     }
280   }
281   return PlatformSP();
282 }
283 
284 PlatformSP Platform::Create(const ConstString &name, Status &error) {
285   PlatformCreateInstance create_callback = nullptr;
286   lldb::PlatformSP platform_sp;
287   if (name) {
288     static ConstString g_host_platform_name("host");
289     if (name == g_host_platform_name)
290       return GetHostPlatform();
291 
292     create_callback =
293         PluginManager::GetPlatformCreateCallbackForPluginName(name);
294     if (create_callback)
295       platform_sp = create_callback(true, nullptr);
296     else
297       error.SetErrorStringWithFormat(
298           "unable to find a plug-in for the platform named \"%s\"",
299           name.GetCString());
300   } else
301     error.SetErrorString("invalid platform name");
302 
303   if (platform_sp) {
304     std::lock_guard<std::recursive_mutex> guard(GetPlatformListMutex());
305     GetPlatformList().push_back(platform_sp);
306   }
307 
308   return platform_sp;
309 }
310 
311 PlatformSP Platform::Create(const ArchSpec &arch, ArchSpec *platform_arch_ptr,
312                             Status &error) {
313   lldb::PlatformSP platform_sp;
314   if (arch.IsValid()) {
315     // Scope for locker
316     {
317       // First try exact arch matches across all platforms already created
318       std::lock_guard<std::recursive_mutex> guard(GetPlatformListMutex());
319       for (const auto &platform_sp : GetPlatformList()) {
320         if (platform_sp->IsCompatibleArchitecture(arch, true,
321                                                   platform_arch_ptr))
322           return platform_sp;
323       }
324 
325       // Next try compatible arch matches across all platforms already created
326       for (const auto &platform_sp : GetPlatformList()) {
327         if (platform_sp->IsCompatibleArchitecture(arch, false,
328                                                   platform_arch_ptr))
329           return platform_sp;
330       }
331     }
332 
333     PlatformCreateInstance create_callback;
334     // First try exact arch matches across all platform plug-ins
335     uint32_t idx;
336     for (idx = 0; (create_callback =
337                        PluginManager::GetPlatformCreateCallbackAtIndex(idx));
338          ++idx) {
339       if (create_callback) {
340         platform_sp = create_callback(false, &arch);
341         if (platform_sp &&
342             platform_sp->IsCompatibleArchitecture(arch, true,
343                                                   platform_arch_ptr)) {
344           std::lock_guard<std::recursive_mutex> guard(GetPlatformListMutex());
345           GetPlatformList().push_back(platform_sp);
346           return platform_sp;
347         }
348       }
349     }
350     // Next try compatible arch matches across all platform plug-ins
351     for (idx = 0; (create_callback =
352                        PluginManager::GetPlatformCreateCallbackAtIndex(idx));
353          ++idx) {
354       if (create_callback) {
355         platform_sp = create_callback(false, &arch);
356         if (platform_sp &&
357             platform_sp->IsCompatibleArchitecture(arch, false,
358                                                   platform_arch_ptr)) {
359           std::lock_guard<std::recursive_mutex> guard(GetPlatformListMutex());
360           GetPlatformList().push_back(platform_sp);
361           return platform_sp;
362         }
363       }
364     }
365   } else
366     error.SetErrorString("invalid platform name");
367   if (platform_arch_ptr)
368     platform_arch_ptr->Clear();
369   platform_sp.reset();
370   return platform_sp;
371 }
372 
373 ArchSpec Platform::GetAugmentedArchSpec(Platform *platform, llvm::StringRef triple) {
374   if (platform)
375     return platform->GetAugmentedArchSpec(triple);
376   return HostInfo::GetAugmentedArchSpec(triple);
377 }
378 
379 //------------------------------------------------------------------
380 /// Default Constructor
381 //------------------------------------------------------------------
382 Platform::Platform(bool is_host)
383     : m_is_host(is_host), m_os_version_set_while_connected(false),
384       m_system_arch_set_while_connected(false), m_sdk_sysroot(), m_sdk_build(),
385       m_working_dir(), m_remote_url(), m_name(), m_system_arch(), m_mutex(),
386       m_uid_map(), m_gid_map(), m_max_uid_name_len(0), m_max_gid_name_len(0),
387       m_supports_rsync(false), m_rsync_opts(), m_rsync_prefix(),
388       m_supports_ssh(false), m_ssh_opts(), m_ignores_remote_hostname(false),
389       m_trap_handlers(), m_calculated_trap_handlers(false),
390       m_module_cache(llvm::make_unique<ModuleCache>()) {
391   Log *log(lldb_private::GetLogIfAllCategoriesSet(LIBLLDB_LOG_OBJECT));
392   if (log)
393     log->Printf("%p Platform::Platform()", static_cast<void *>(this));
394 }
395 
396 //------------------------------------------------------------------
397 /// Destructor.
398 ///
399 /// The destructor is virtual since this class is designed to be
400 /// inherited from by the plug-in instance.
401 //------------------------------------------------------------------
402 Platform::~Platform() {
403   Log *log(lldb_private::GetLogIfAllCategoriesSet(LIBLLDB_LOG_OBJECT));
404   if (log)
405     log->Printf("%p Platform::~Platform()", static_cast<void *>(this));
406 }
407 
408 void Platform::GetStatus(Stream &strm) {
409   std::string s;
410   strm.Printf("  Platform: %s\n", GetPluginName().GetCString());
411 
412   ArchSpec arch(GetSystemArchitecture());
413   if (arch.IsValid()) {
414     if (!arch.GetTriple().str().empty()) {
415       strm.Printf("    Triple: ");
416       arch.DumpTriple(strm);
417       strm.EOL();
418     }
419   }
420 
421   llvm::VersionTuple os_version = GetOSVersion();
422   if (!os_version.empty()) {
423     strm.Format("OS Version: {0}", os_version.getAsString());
424 
425     if (GetOSBuildString(s))
426       strm.Printf(" (%s)", s.c_str());
427 
428     strm.EOL();
429   }
430 
431   if (GetOSKernelDescription(s))
432     strm.Printf("    Kernel: %s\n", s.c_str());
433 
434   if (IsHost()) {
435     strm.Printf("  Hostname: %s\n", GetHostname());
436   } else {
437     const bool is_connected = IsConnected();
438     if (is_connected)
439       strm.Printf("  Hostname: %s\n", GetHostname());
440     strm.Printf(" Connected: %s\n", is_connected ? "yes" : "no");
441   }
442 
443   if (GetWorkingDirectory()) {
444     strm.Printf("WorkingDir: %s\n", GetWorkingDirectory().GetCString());
445   }
446   if (!IsConnected())
447     return;
448 
449   std::string specific_info(GetPlatformSpecificConnectionInformation());
450 
451   if (!specific_info.empty())
452     strm.Printf("Platform-specific connection: %s\n", specific_info.c_str());
453 }
454 
455 llvm::VersionTuple Platform::GetOSVersion(Process *process) {
456   std::lock_guard<std::mutex> guard(m_mutex);
457 
458   if (IsHost()) {
459     if (m_os_version.empty()) {
460       // We have a local host platform
461       m_os_version = HostInfo::GetOSVersion();
462       m_os_version_set_while_connected = !m_os_version.empty();
463     }
464   } else {
465     // We have a remote platform. We can only fetch the remote
466     // OS version if we are connected, and we don't want to do it
467     // more than once.
468 
469     const bool is_connected = IsConnected();
470 
471     bool fetch = false;
472     if (!m_os_version.empty()) {
473       // We have valid OS version info, check to make sure it wasn't manually
474       // set prior to connecting. If it was manually set prior to connecting,
475       // then lets fetch the actual OS version info if we are now connected.
476       if (is_connected && !m_os_version_set_while_connected)
477         fetch = true;
478     } else {
479       // We don't have valid OS version info, fetch it if we are connected
480       fetch = is_connected;
481     }
482 
483     if (fetch)
484       m_os_version_set_while_connected = GetRemoteOSVersion();
485   }
486 
487   if (!m_os_version.empty())
488     return m_os_version;
489   if (process) {
490     // Check with the process in case it can answer the question if a process
491     // was provided
492     return process->GetHostOSVersion();
493   }
494   return llvm::VersionTuple();
495 }
496 
497 bool Platform::GetOSBuildString(std::string &s) {
498   s.clear();
499 
500   if (IsHost())
501 #if !defined(__linux__)
502     return HostInfo::GetOSBuildString(s);
503 #else
504     return false;
505 #endif
506   else
507     return GetRemoteOSBuildString(s);
508 }
509 
510 bool Platform::GetOSKernelDescription(std::string &s) {
511   if (IsHost())
512 #if !defined(__linux__)
513     return HostInfo::GetOSKernelDescription(s);
514 #else
515     return false;
516 #endif
517   else
518     return GetRemoteOSKernelDescription(s);
519 }
520 
521 void Platform::AddClangModuleCompilationOptions(
522     Target *target, std::vector<std::string> &options) {
523   std::vector<std::string> default_compilation_options = {
524       "-x", "c++", "-Xclang", "-nostdsysteminc", "-Xclang", "-nostdsysteminc"};
525 
526   options.insert(options.end(), default_compilation_options.begin(),
527                  default_compilation_options.end());
528 }
529 
530 FileSpec Platform::GetWorkingDirectory() {
531   if (IsHost()) {
532     llvm::SmallString<64> cwd;
533     if (llvm::sys::fs::current_path(cwd))
534       return {};
535     else {
536       FileSpec file_spec(cwd);
537       FileSystem::Instance().Resolve(file_spec);
538       return file_spec;
539     }
540   } else {
541     if (!m_working_dir)
542       m_working_dir = GetRemoteWorkingDirectory();
543     return m_working_dir;
544   }
545 }
546 
547 struct RecurseCopyBaton {
548   const FileSpec &dst;
549   Platform *platform_ptr;
550   Status error;
551 };
552 
553 static FileSystem::EnumerateDirectoryResult
554 RecurseCopy_Callback(void *baton, llvm::sys::fs::file_type ft,
555                      llvm::StringRef path) {
556   RecurseCopyBaton *rc_baton = (RecurseCopyBaton *)baton;
557   FileSpec src(path);
558   namespace fs = llvm::sys::fs;
559   switch (ft) {
560   case fs::file_type::fifo_file:
561   case fs::file_type::socket_file:
562     // we have no way to copy pipes and sockets - ignore them and continue
563     return FileSystem::eEnumerateDirectoryResultNext;
564     break;
565 
566   case fs::file_type::directory_file: {
567     // make the new directory and get in there
568     FileSpec dst_dir = rc_baton->dst;
569     if (!dst_dir.GetFilename())
570       dst_dir.GetFilename() = src.GetLastPathComponent();
571     Status error = rc_baton->platform_ptr->MakeDirectory(
572         dst_dir, lldb::eFilePermissionsDirectoryDefault);
573     if (error.Fail()) {
574       rc_baton->error.SetErrorStringWithFormat(
575           "unable to setup directory %s on remote end", dst_dir.GetCString());
576       return FileSystem::eEnumerateDirectoryResultQuit; // got an error, bail out
577     }
578 
579     // now recurse
580     std::string src_dir_path(src.GetPath());
581 
582     // Make a filespec that only fills in the directory of a FileSpec so when
583     // we enumerate we can quickly fill in the filename for dst copies
584     FileSpec recurse_dst;
585     recurse_dst.GetDirectory().SetCString(dst_dir.GetPath().c_str());
586     RecurseCopyBaton rc_baton2 = {recurse_dst, rc_baton->platform_ptr,
587                                   Status()};
588     FileSystem::Instance().EnumerateDirectory(src_dir_path, true, true, true,
589                                               RecurseCopy_Callback, &rc_baton2);
590     if (rc_baton2.error.Fail()) {
591       rc_baton->error.SetErrorString(rc_baton2.error.AsCString());
592       return FileSystem::eEnumerateDirectoryResultQuit; // got an error, bail out
593     }
594     return FileSystem::eEnumerateDirectoryResultNext;
595   } break;
596 
597   case fs::file_type::symlink_file: {
598     // copy the file and keep going
599     FileSpec dst_file = rc_baton->dst;
600     if (!dst_file.GetFilename())
601       dst_file.GetFilename() = src.GetFilename();
602 
603     FileSpec src_resolved;
604 
605     rc_baton->error = FileSystem::Instance().Readlink(src, src_resolved);
606 
607     if (rc_baton->error.Fail())
608       return FileSystem::eEnumerateDirectoryResultQuit; // got an error, bail out
609 
610     rc_baton->error =
611         rc_baton->platform_ptr->CreateSymlink(dst_file, src_resolved);
612 
613     if (rc_baton->error.Fail())
614       return FileSystem::eEnumerateDirectoryResultQuit; // got an error, bail out
615 
616     return FileSystem::eEnumerateDirectoryResultNext;
617   } break;
618 
619   case fs::file_type::regular_file: {
620     // copy the file and keep going
621     FileSpec dst_file = rc_baton->dst;
622     if (!dst_file.GetFilename())
623       dst_file.GetFilename() = src.GetFilename();
624     Status err = rc_baton->platform_ptr->PutFile(src, dst_file);
625     if (err.Fail()) {
626       rc_baton->error.SetErrorString(err.AsCString());
627       return FileSystem::eEnumerateDirectoryResultQuit; // got an error, bail out
628     }
629     return FileSystem::eEnumerateDirectoryResultNext;
630   } break;
631 
632   default:
633     rc_baton->error.SetErrorStringWithFormat(
634         "invalid file detected during copy: %s", src.GetPath().c_str());
635     return FileSystem::eEnumerateDirectoryResultQuit; // got an error, bail out
636     break;
637   }
638   llvm_unreachable("Unhandled file_type!");
639 }
640 
641 Status Platform::Install(const FileSpec &src, const FileSpec &dst) {
642   Status error;
643 
644   Log *log = GetLogIfAnyCategoriesSet(LIBLLDB_LOG_PLATFORM);
645   if (log)
646     log->Printf("Platform::Install (src='%s', dst='%s')", src.GetPath().c_str(),
647                 dst.GetPath().c_str());
648   FileSpec fixed_dst(dst);
649 
650   if (!fixed_dst.GetFilename())
651     fixed_dst.GetFilename() = src.GetFilename();
652 
653   FileSpec working_dir = GetWorkingDirectory();
654 
655   if (dst) {
656     if (dst.GetDirectory()) {
657       const char first_dst_dir_char = dst.GetDirectory().GetCString()[0];
658       if (first_dst_dir_char == '/' || first_dst_dir_char == '\\') {
659         fixed_dst.GetDirectory() = dst.GetDirectory();
660       }
661       // If the fixed destination file doesn't have a directory yet, then we
662       // must have a relative path. We will resolve this relative path against
663       // the platform's working directory
664       if (!fixed_dst.GetDirectory()) {
665         FileSpec relative_spec;
666         std::string path;
667         if (working_dir) {
668           relative_spec = working_dir;
669           relative_spec.AppendPathComponent(dst.GetPath());
670           fixed_dst.GetDirectory() = relative_spec.GetDirectory();
671         } else {
672           error.SetErrorStringWithFormat(
673               "platform working directory must be valid for relative path '%s'",
674               dst.GetPath().c_str());
675           return error;
676         }
677       }
678     } else {
679       if (working_dir) {
680         fixed_dst.GetDirectory().SetCString(working_dir.GetCString());
681       } else {
682         error.SetErrorStringWithFormat(
683             "platform working directory must be valid for relative path '%s'",
684             dst.GetPath().c_str());
685         return error;
686       }
687     }
688   } else {
689     if (working_dir) {
690       fixed_dst.GetDirectory().SetCString(working_dir.GetCString());
691     } else {
692       error.SetErrorStringWithFormat("platform working directory must be valid "
693                                      "when destination directory is empty");
694       return error;
695     }
696   }
697 
698   if (log)
699     log->Printf("Platform::Install (src='%s', dst='%s') fixed_dst='%s'",
700                 src.GetPath().c_str(), dst.GetPath().c_str(),
701                 fixed_dst.GetPath().c_str());
702 
703   if (GetSupportsRSync()) {
704     error = PutFile(src, dst);
705   } else {
706     namespace fs = llvm::sys::fs;
707     switch (fs::get_file_type(src.GetPath(), false)) {
708     case fs::file_type::directory_file: {
709       llvm::sys::fs::remove(fixed_dst.GetPath());
710       uint32_t permissions = FileSystem::Instance().GetPermissions(src);
711       if (permissions == 0)
712         permissions = eFilePermissionsDirectoryDefault;
713       error = MakeDirectory(fixed_dst, permissions);
714       if (error.Success()) {
715         // Make a filespec that only fills in the directory of a FileSpec so
716         // when we enumerate we can quickly fill in the filename for dst copies
717         FileSpec recurse_dst;
718         recurse_dst.GetDirectory().SetCString(fixed_dst.GetCString());
719         std::string src_dir_path(src.GetPath());
720         RecurseCopyBaton baton = {recurse_dst, this, Status()};
721         FileSystem::Instance().EnumerateDirectory(
722             src_dir_path, true, true, true, RecurseCopy_Callback, &baton);
723         return baton.error;
724       }
725     } break;
726 
727     case fs::file_type::regular_file:
728       llvm::sys::fs::remove(fixed_dst.GetPath());
729       error = PutFile(src, fixed_dst);
730       break;
731 
732     case fs::file_type::symlink_file: {
733       llvm::sys::fs::remove(fixed_dst.GetPath());
734       FileSpec src_resolved;
735       error = FileSystem::Instance().Readlink(src, src_resolved);
736       if (error.Success())
737         error = CreateSymlink(dst, src_resolved);
738     } break;
739     case fs::file_type::fifo_file:
740       error.SetErrorString("platform install doesn't handle pipes");
741       break;
742     case fs::file_type::socket_file:
743       error.SetErrorString("platform install doesn't handle sockets");
744       break;
745     default:
746       error.SetErrorString(
747           "platform install doesn't handle non file or directory items");
748       break;
749     }
750   }
751   return error;
752 }
753 
754 bool Platform::SetWorkingDirectory(const FileSpec &file_spec) {
755   if (IsHost()) {
756     Log *log = GetLogIfAnyCategoriesSet(LIBLLDB_LOG_PLATFORM);
757     LLDB_LOG(log, "{0}", file_spec);
758     if (std::error_code ec = llvm::sys::fs::set_current_path(file_spec.GetPath())) {
759       LLDB_LOG(log, "error: {0}", ec.message());
760       return false;
761     }
762     return true;
763   } else {
764     m_working_dir.Clear();
765     return SetRemoteWorkingDirectory(file_spec);
766   }
767 }
768 
769 Status Platform::MakeDirectory(const FileSpec &file_spec,
770                                uint32_t permissions) {
771   if (IsHost())
772     return llvm::sys::fs::create_directory(file_spec.GetPath(), permissions);
773   else {
774     Status error;
775     error.SetErrorStringWithFormat("remote platform %s doesn't support %s",
776                                    GetPluginName().GetCString(),
777                                    LLVM_PRETTY_FUNCTION);
778     return error;
779   }
780 }
781 
782 Status Platform::GetFilePermissions(const FileSpec &file_spec,
783                                     uint32_t &file_permissions) {
784   if (IsHost()) {
785     auto Value = llvm::sys::fs::getPermissions(file_spec.GetPath());
786     if (Value)
787       file_permissions = Value.get();
788     return Status(Value.getError());
789   } else {
790     Status error;
791     error.SetErrorStringWithFormat("remote platform %s doesn't support %s",
792                                    GetPluginName().GetCString(),
793                                    LLVM_PRETTY_FUNCTION);
794     return error;
795   }
796 }
797 
798 Status Platform::SetFilePermissions(const FileSpec &file_spec,
799                                     uint32_t file_permissions) {
800   if (IsHost()) {
801     auto Perms = static_cast<llvm::sys::fs::perms>(file_permissions);
802     return llvm::sys::fs::setPermissions(file_spec.GetPath(), Perms);
803   } else {
804     Status error;
805     error.SetErrorStringWithFormat("remote platform %s doesn't support %s",
806                                    GetPluginName().GetCString(),
807                                    LLVM_PRETTY_FUNCTION);
808     return error;
809   }
810 }
811 
812 ConstString Platform::GetName() { return GetPluginName(); }
813 
814 const char *Platform::GetHostname() {
815   if (IsHost())
816     return "127.0.0.1";
817 
818   if (m_name.empty())
819     return nullptr;
820   return m_name.c_str();
821 }
822 
823 ConstString Platform::GetFullNameForDylib(ConstString basename) {
824   return basename;
825 }
826 
827 bool Platform::SetRemoteWorkingDirectory(const FileSpec &working_dir) {
828   Log *log = GetLogIfAnyCategoriesSet(LIBLLDB_LOG_PLATFORM);
829   if (log)
830     log->Printf("Platform::SetRemoteWorkingDirectory('%s')",
831                 working_dir.GetCString());
832   m_working_dir = working_dir;
833   return true;
834 }
835 
836 const char *Platform::GetUserName(uint32_t uid) {
837 #if !defined(LLDB_DISABLE_POSIX)
838   const char *user_name = GetCachedUserName(uid);
839   if (user_name)
840     return user_name;
841   if (IsHost()) {
842     std::string name;
843     if (HostInfo::LookupUserName(uid, name))
844       return SetCachedUserName(uid, name.c_str(), name.size());
845   }
846 #endif
847   return nullptr;
848 }
849 
850 const char *Platform::GetGroupName(uint32_t gid) {
851 #if !defined(LLDB_DISABLE_POSIX)
852   const char *group_name = GetCachedGroupName(gid);
853   if (group_name)
854     return group_name;
855   if (IsHost()) {
856     std::string name;
857     if (HostInfo::LookupGroupName(gid, name))
858       return SetCachedGroupName(gid, name.c_str(), name.size());
859   }
860 #endif
861   return nullptr;
862 }
863 
864 bool Platform::SetOSVersion(llvm::VersionTuple version) {
865   if (IsHost()) {
866     // We don't need anyone setting the OS version for the host platform, we
867     // should be able to figure it out by calling HostInfo::GetOSVersion(...).
868     return false;
869   } else {
870     // We have a remote platform, allow setting the target OS version if we
871     // aren't connected, since if we are connected, we should be able to
872     // request the remote OS version from the connected platform.
873     if (IsConnected())
874       return false;
875     else {
876       // We aren't connected and we might want to set the OS version ahead of
877       // time before we connect so we can peruse files and use a local SDK or
878       // PDK cache of support files to disassemble or do other things.
879       m_os_version = version;
880       return true;
881     }
882   }
883   return false;
884 }
885 
886 Status
887 Platform::ResolveExecutable(const ModuleSpec &module_spec,
888                             lldb::ModuleSP &exe_module_sp,
889                             const FileSpecList *module_search_paths_ptr) {
890   Status error;
891   if (FileSystem::Instance().Exists(module_spec.GetFileSpec())) {
892     if (module_spec.GetArchitecture().IsValid()) {
893       error = ModuleList::GetSharedModule(module_spec, exe_module_sp,
894                                           module_search_paths_ptr, nullptr,
895                                           nullptr);
896     } else {
897       // No valid architecture was specified, ask the platform for the
898       // architectures that we should be using (in the correct order) and see
899       // if we can find a match that way
900       ModuleSpec arch_module_spec(module_spec);
901       for (uint32_t idx = 0; GetSupportedArchitectureAtIndex(
902                idx, arch_module_spec.GetArchitecture());
903            ++idx) {
904         error = ModuleList::GetSharedModule(arch_module_spec, exe_module_sp,
905                                             module_search_paths_ptr, nullptr,
906                                             nullptr);
907         // Did we find an executable using one of the
908         if (error.Success() && exe_module_sp)
909           break;
910       }
911     }
912   } else {
913     error.SetErrorStringWithFormat("'%s' does not exist",
914                                    module_spec.GetFileSpec().GetPath().c_str());
915   }
916   return error;
917 }
918 
919 Status Platform::ResolveSymbolFile(Target &target, const ModuleSpec &sym_spec,
920                                    FileSpec &sym_file) {
921   Status error;
922   if (FileSystem::Instance().Exists(sym_spec.GetSymbolFileSpec()))
923     sym_file = sym_spec.GetSymbolFileSpec();
924   else
925     error.SetErrorString("unable to resolve symbol file");
926   return error;
927 }
928 
929 bool Platform::ResolveRemotePath(const FileSpec &platform_path,
930                                  FileSpec &resolved_platform_path) {
931   resolved_platform_path = platform_path;
932   FileSystem::Instance().Resolve(resolved_platform_path);
933   return true;
934 }
935 
936 const ArchSpec &Platform::GetSystemArchitecture() {
937   if (IsHost()) {
938     if (!m_system_arch.IsValid()) {
939       // We have a local host platform
940       m_system_arch = HostInfo::GetArchitecture();
941       m_system_arch_set_while_connected = m_system_arch.IsValid();
942     }
943   } else {
944     // We have a remote platform. We can only fetch the remote system
945     // architecture if we are connected, and we don't want to do it more than
946     // once.
947 
948     const bool is_connected = IsConnected();
949 
950     bool fetch = false;
951     if (m_system_arch.IsValid()) {
952       // We have valid OS version info, check to make sure it wasn't manually
953       // set prior to connecting. If it was manually set prior to connecting,
954       // then lets fetch the actual OS version info if we are now connected.
955       if (is_connected && !m_system_arch_set_while_connected)
956         fetch = true;
957     } else {
958       // We don't have valid OS version info, fetch it if we are connected
959       fetch = is_connected;
960     }
961 
962     if (fetch) {
963       m_system_arch = GetRemoteSystemArchitecture();
964       m_system_arch_set_while_connected = m_system_arch.IsValid();
965     }
966   }
967   return m_system_arch;
968 }
969 
970 ArchSpec Platform::GetAugmentedArchSpec(llvm::StringRef triple) {
971   if (triple.empty())
972     return ArchSpec();
973   llvm::Triple normalized_triple(llvm::Triple::normalize(triple));
974   if (!ArchSpec::ContainsOnlyArch(normalized_triple))
975     return ArchSpec(triple);
976 
977   if (auto kind = HostInfo::ParseArchitectureKind(triple))
978     return HostInfo::GetArchitecture(*kind);
979 
980   ArchSpec compatible_arch;
981   ArchSpec raw_arch(triple);
982   if (!IsCompatibleArchitecture(raw_arch, false, &compatible_arch))
983     return raw_arch;
984 
985   if (!compatible_arch.IsValid())
986     return ArchSpec(normalized_triple);
987 
988   const llvm::Triple &compatible_triple = compatible_arch.GetTriple();
989   if (normalized_triple.getVendorName().empty())
990     normalized_triple.setVendor(compatible_triple.getVendor());
991   if (normalized_triple.getOSName().empty())
992     normalized_triple.setOS(compatible_triple.getOS());
993   if (normalized_triple.getEnvironmentName().empty())
994     normalized_triple.setEnvironment(compatible_triple.getEnvironment());
995   return ArchSpec(normalized_triple);
996 }
997 
998 Status Platform::ConnectRemote(Args &args) {
999   Status error;
1000   if (IsHost())
1001     error.SetErrorStringWithFormat("The currently selected platform (%s) is "
1002                                    "the host platform and is always connected.",
1003                                    GetPluginName().GetCString());
1004   else
1005     error.SetErrorStringWithFormat(
1006         "Platform::ConnectRemote() is not supported by %s",
1007         GetPluginName().GetCString());
1008   return error;
1009 }
1010 
1011 Status Platform::DisconnectRemote() {
1012   Status error;
1013   if (IsHost())
1014     error.SetErrorStringWithFormat("The currently selected platform (%s) is "
1015                                    "the host platform and is always connected.",
1016                                    GetPluginName().GetCString());
1017   else
1018     error.SetErrorStringWithFormat(
1019         "Platform::DisconnectRemote() is not supported by %s",
1020         GetPluginName().GetCString());
1021   return error;
1022 }
1023 
1024 bool Platform::GetProcessInfo(lldb::pid_t pid,
1025                               ProcessInstanceInfo &process_info) {
1026   // Take care of the host case so that each subclass can just call this
1027   // function to get the host functionality.
1028   if (IsHost())
1029     return Host::GetProcessInfo(pid, process_info);
1030   return false;
1031 }
1032 
1033 uint32_t Platform::FindProcesses(const ProcessInstanceInfoMatch &match_info,
1034                                  ProcessInstanceInfoList &process_infos) {
1035   // Take care of the host case so that each subclass can just call this
1036   // function to get the host functionality.
1037   uint32_t match_count = 0;
1038   if (IsHost())
1039     match_count = Host::FindProcesses(match_info, process_infos);
1040   return match_count;
1041 }
1042 
1043 Status Platform::LaunchProcess(ProcessLaunchInfo &launch_info) {
1044   Status error;
1045   Log *log(lldb_private::GetLogIfAllCategoriesSet(LIBLLDB_LOG_PLATFORM));
1046   if (log)
1047     log->Printf("Platform::%s()", __FUNCTION__);
1048 
1049   // Take care of the host case so that each subclass can just call this
1050   // function to get the host functionality.
1051   if (IsHost()) {
1052     if (::getenv("LLDB_LAUNCH_FLAG_LAUNCH_IN_TTY"))
1053       launch_info.GetFlags().Set(eLaunchFlagLaunchInTTY);
1054 
1055     if (launch_info.GetFlags().Test(eLaunchFlagLaunchInShell)) {
1056       const bool is_localhost = true;
1057       const bool will_debug = launch_info.GetFlags().Test(eLaunchFlagDebug);
1058       const bool first_arg_is_full_shell_command = false;
1059       uint32_t num_resumes = GetResumeCountForLaunchInfo(launch_info);
1060       if (log) {
1061         const FileSpec &shell = launch_info.GetShell();
1062         const char *shell_str = (shell) ? shell.GetPath().c_str() : "<null>";
1063         log->Printf(
1064             "Platform::%s GetResumeCountForLaunchInfo() returned %" PRIu32
1065             ", shell is '%s'",
1066             __FUNCTION__, num_resumes, shell_str);
1067       }
1068 
1069       if (!launch_info.ConvertArgumentsForLaunchingInShell(
1070               error, is_localhost, will_debug, first_arg_is_full_shell_command,
1071               num_resumes))
1072         return error;
1073     } else if (launch_info.GetFlags().Test(eLaunchFlagShellExpandArguments)) {
1074       error = ShellExpandArguments(launch_info);
1075       if (error.Fail()) {
1076         error.SetErrorStringWithFormat("shell expansion failed (reason: %s). "
1077                                        "consider launching with 'process "
1078                                        "launch'.",
1079                                        error.AsCString("unknown"));
1080         return error;
1081       }
1082     }
1083 
1084     if (log)
1085       log->Printf("Platform::%s final launch_info resume count: %" PRIu32,
1086                   __FUNCTION__, launch_info.GetResumeCount());
1087 
1088     error = Host::LaunchProcess(launch_info);
1089   } else
1090     error.SetErrorString(
1091         "base lldb_private::Platform class can't launch remote processes");
1092   return error;
1093 }
1094 
1095 Status Platform::ShellExpandArguments(ProcessLaunchInfo &launch_info) {
1096   if (IsHost())
1097     return Host::ShellExpandArguments(launch_info);
1098   return Status("base lldb_private::Platform class can't expand arguments");
1099 }
1100 
1101 Status Platform::KillProcess(const lldb::pid_t pid) {
1102   Log *log(lldb_private::GetLogIfAllCategoriesSet(LIBLLDB_LOG_PLATFORM));
1103   if (log)
1104     log->Printf("Platform::%s, pid %" PRIu64, __FUNCTION__, pid);
1105 
1106   // Try to find a process plugin to handle this Kill request.  If we can't,
1107   // fall back to the default OS implementation.
1108   size_t num_debuggers = Debugger::GetNumDebuggers();
1109   for (size_t didx = 0; didx < num_debuggers; ++didx) {
1110     DebuggerSP debugger = Debugger::GetDebuggerAtIndex(didx);
1111     lldb_private::TargetList &targets = debugger->GetTargetList();
1112     for (int tidx = 0; tidx < targets.GetNumTargets(); ++tidx) {
1113       ProcessSP process = targets.GetTargetAtIndex(tidx)->GetProcessSP();
1114       if (process->GetID() == pid)
1115         return process->Destroy(true);
1116     }
1117   }
1118 
1119   if (!IsHost()) {
1120     return Status(
1121         "base lldb_private::Platform class can't kill remote processes unless "
1122         "they are controlled by a process plugin");
1123   }
1124   Host::Kill(pid, SIGTERM);
1125   return Status();
1126 }
1127 
1128 lldb::ProcessSP
1129 Platform::DebugProcess(ProcessLaunchInfo &launch_info, Debugger &debugger,
1130                        Target *target, // Can be nullptr, if nullptr create a
1131                                        // new target, else use existing one
1132                        Status &error) {
1133   Log *log(lldb_private::GetLogIfAllCategoriesSet(LIBLLDB_LOG_PLATFORM));
1134   if (log)
1135     log->Printf("Platform::%s entered (target %p)", __FUNCTION__,
1136                 static_cast<void *>(target));
1137 
1138   ProcessSP process_sp;
1139   // Make sure we stop at the entry point
1140   launch_info.GetFlags().Set(eLaunchFlagDebug);
1141   // We always launch the process we are going to debug in a separate process
1142   // group, since then we can handle ^C interrupts ourselves w/o having to
1143   // worry about the target getting them as well.
1144   launch_info.SetLaunchInSeparateProcessGroup(true);
1145 
1146   // Allow any StructuredData process-bound plugins to adjust the launch info
1147   // if needed
1148   size_t i = 0;
1149   bool iteration_complete = false;
1150   // Note iteration can't simply go until a nullptr callback is returned, as it
1151   // is valid for a plugin to not supply a filter.
1152   auto get_filter_func = PluginManager::GetStructuredDataFilterCallbackAtIndex;
1153   for (auto filter_callback = get_filter_func(i, iteration_complete);
1154        !iteration_complete;
1155        filter_callback = get_filter_func(++i, iteration_complete)) {
1156     if (filter_callback) {
1157       // Give this ProcessLaunchInfo filter a chance to adjust the launch info.
1158       error = (*filter_callback)(launch_info, target);
1159       if (!error.Success()) {
1160         if (log)
1161           log->Printf("Platform::%s() StructuredDataPlugin launch "
1162                       "filter failed.",
1163                       __FUNCTION__);
1164         return process_sp;
1165       }
1166     }
1167   }
1168 
1169   error = LaunchProcess(launch_info);
1170   if (error.Success()) {
1171     if (log)
1172       log->Printf("Platform::%s LaunchProcess() call succeeded (pid=%" PRIu64
1173                   ")",
1174                   __FUNCTION__, launch_info.GetProcessID());
1175     if (launch_info.GetProcessID() != LLDB_INVALID_PROCESS_ID) {
1176       ProcessAttachInfo attach_info(launch_info);
1177       process_sp = Attach(attach_info, debugger, target, error);
1178       if (process_sp) {
1179         if (log)
1180           log->Printf("Platform::%s Attach() succeeded, Process plugin: %s",
1181                       __FUNCTION__, process_sp->GetPluginName().AsCString());
1182         launch_info.SetHijackListener(attach_info.GetHijackListener());
1183 
1184         // Since we attached to the process, it will think it needs to detach
1185         // if the process object just goes away without an explicit call to
1186         // Process::Kill() or Process::Detach(), so let it know to kill the
1187         // process if this happens.
1188         process_sp->SetShouldDetach(false);
1189 
1190         // If we didn't have any file actions, the pseudo terminal might have
1191         // been used where the slave side was given as the file to open for
1192         // stdin/out/err after we have already opened the master so we can
1193         // read/write stdin/out/err.
1194         int pty_fd = launch_info.GetPTY().ReleaseMasterFileDescriptor();
1195         if (pty_fd != PseudoTerminal::invalid_fd) {
1196           process_sp->SetSTDIOFileDescriptor(pty_fd);
1197         }
1198       } else {
1199         if (log)
1200           log->Printf("Platform::%s Attach() failed: %s", __FUNCTION__,
1201                       error.AsCString());
1202       }
1203     } else {
1204       if (log)
1205         log->Printf("Platform::%s LaunchProcess() returned launch_info with "
1206                     "invalid process id",
1207                     __FUNCTION__);
1208     }
1209   } else {
1210     if (log)
1211       log->Printf("Platform::%s LaunchProcess() failed: %s", __FUNCTION__,
1212                   error.AsCString());
1213   }
1214 
1215   return process_sp;
1216 }
1217 
1218 lldb::PlatformSP
1219 Platform::GetPlatformForArchitecture(const ArchSpec &arch,
1220                                      ArchSpec *platform_arch_ptr) {
1221   lldb::PlatformSP platform_sp;
1222   Status error;
1223   if (arch.IsValid())
1224     platform_sp = Platform::Create(arch, platform_arch_ptr, error);
1225   return platform_sp;
1226 }
1227 
1228 //------------------------------------------------------------------
1229 /// Lets a platform answer if it is compatible with a given
1230 /// architecture and the target triple contained within.
1231 //------------------------------------------------------------------
1232 bool Platform::IsCompatibleArchitecture(const ArchSpec &arch,
1233                                         bool exact_arch_match,
1234                                         ArchSpec *compatible_arch_ptr) {
1235   // If the architecture is invalid, we must answer true...
1236   if (arch.IsValid()) {
1237     ArchSpec platform_arch;
1238     // Try for an exact architecture match first.
1239     if (exact_arch_match) {
1240       for (uint32_t arch_idx = 0;
1241            GetSupportedArchitectureAtIndex(arch_idx, platform_arch);
1242            ++arch_idx) {
1243         if (arch.IsExactMatch(platform_arch)) {
1244           if (compatible_arch_ptr)
1245             *compatible_arch_ptr = platform_arch;
1246           return true;
1247         }
1248       }
1249     } else {
1250       for (uint32_t arch_idx = 0;
1251            GetSupportedArchitectureAtIndex(arch_idx, platform_arch);
1252            ++arch_idx) {
1253         if (arch.IsCompatibleMatch(platform_arch)) {
1254           if (compatible_arch_ptr)
1255             *compatible_arch_ptr = platform_arch;
1256           return true;
1257         }
1258       }
1259     }
1260   }
1261   if (compatible_arch_ptr)
1262     compatible_arch_ptr->Clear();
1263   return false;
1264 }
1265 
1266 Status Platform::PutFile(const FileSpec &source, const FileSpec &destination,
1267                          uint32_t uid, uint32_t gid) {
1268   Log *log(lldb_private::GetLogIfAllCategoriesSet(LIBLLDB_LOG_PLATFORM));
1269   if (log)
1270     log->Printf("[PutFile] Using block by block transfer....\n");
1271 
1272   uint32_t source_open_options =
1273       File::eOpenOptionRead | File::eOpenOptionCloseOnExec;
1274   namespace fs = llvm::sys::fs;
1275   if (fs::is_symlink_file(source.GetPath()))
1276     source_open_options |= File::eOpenOptionDontFollowSymlinks;
1277 
1278   File source_file;
1279   Status error = FileSystem::Instance().Open(
1280       source_file, source, source_open_options, lldb::eFilePermissionsUserRW);
1281   uint32_t permissions = source_file.GetPermissions(error);
1282   if (permissions == 0)
1283     permissions = lldb::eFilePermissionsFileDefault;
1284 
1285   if (!source_file.IsValid())
1286     return Status("PutFile: unable to open source file");
1287   lldb::user_id_t dest_file = OpenFile(
1288       destination, File::eOpenOptionCanCreate | File::eOpenOptionWrite |
1289                        File::eOpenOptionTruncate | File::eOpenOptionCloseOnExec,
1290       permissions, error);
1291   if (log)
1292     log->Printf("dest_file = %" PRIu64 "\n", dest_file);
1293 
1294   if (error.Fail())
1295     return error;
1296   if (dest_file == UINT64_MAX)
1297     return Status("unable to open target file");
1298   lldb::DataBufferSP buffer_sp(new DataBufferHeap(1024 * 16, 0));
1299   uint64_t offset = 0;
1300   for (;;) {
1301     size_t bytes_read = buffer_sp->GetByteSize();
1302     error = source_file.Read(buffer_sp->GetBytes(), bytes_read);
1303     if (error.Fail() || bytes_read == 0)
1304       break;
1305 
1306     const uint64_t bytes_written =
1307         WriteFile(dest_file, offset, buffer_sp->GetBytes(), bytes_read, error);
1308     if (error.Fail())
1309       break;
1310 
1311     offset += bytes_written;
1312     if (bytes_written != bytes_read) {
1313       // We didn't write the correct number of bytes, so adjust the file
1314       // position in the source file we are reading from...
1315       source_file.SeekFromStart(offset);
1316     }
1317   }
1318   CloseFile(dest_file, error);
1319 
1320   if (uid == UINT32_MAX && gid == UINT32_MAX)
1321     return error;
1322 
1323   // TODO: ChownFile?
1324 
1325   return error;
1326 }
1327 
1328 Status Platform::GetFile(const FileSpec &source, const FileSpec &destination) {
1329   Status error("unimplemented");
1330   return error;
1331 }
1332 
1333 Status
1334 Platform::CreateSymlink(const FileSpec &src, // The name of the link is in src
1335                         const FileSpec &dst) // The symlink points to dst
1336 {
1337   Status error("unimplemented");
1338   return error;
1339 }
1340 
1341 bool Platform::GetFileExists(const lldb_private::FileSpec &file_spec) {
1342   return false;
1343 }
1344 
1345 Status Platform::Unlink(const FileSpec &path) {
1346   Status error("unimplemented");
1347   return error;
1348 }
1349 
1350 MmapArgList Platform::GetMmapArgumentList(const ArchSpec &arch, addr_t addr,
1351                                           addr_t length, unsigned prot,
1352                                           unsigned flags, addr_t fd,
1353                                           addr_t offset) {
1354   uint64_t flags_platform = 0;
1355   if (flags & eMmapFlagsPrivate)
1356     flags_platform |= MAP_PRIVATE;
1357   if (flags & eMmapFlagsAnon)
1358     flags_platform |= MAP_ANON;
1359 
1360   MmapArgList args({addr, length, prot, flags_platform, fd, offset});
1361   return args;
1362 }
1363 
1364 lldb_private::Status Platform::RunShellCommand(
1365     const char *command, // Shouldn't be nullptr
1366     const FileSpec &
1367         working_dir, // Pass empty FileSpec to use the current working directory
1368     int *status_ptr, // Pass nullptr if you don't want the process exit status
1369     int *signo_ptr, // Pass nullptr if you don't want the signal that caused the
1370                     // process to exit
1371     std::string
1372         *command_output, // Pass nullptr if you don't want the command output
1373     const Timeout<std::micro> &timeout) {
1374   if (IsHost())
1375     return Host::RunShellCommand(command, working_dir, status_ptr, signo_ptr,
1376                                  command_output, timeout);
1377   else
1378     return Status("unimplemented");
1379 }
1380 
1381 bool Platform::CalculateMD5(const FileSpec &file_spec, uint64_t &low,
1382                             uint64_t &high) {
1383   if (!IsHost())
1384     return false;
1385   auto Result = llvm::sys::fs::md5_contents(file_spec.GetPath());
1386   if (!Result)
1387     return false;
1388   std::tie(high, low) = Result->words();
1389   return true;
1390 }
1391 
1392 void Platform::SetLocalCacheDirectory(const char *local) {
1393   m_local_cache_directory.assign(local);
1394 }
1395 
1396 const char *Platform::GetLocalCacheDirectory() {
1397   return m_local_cache_directory.c_str();
1398 }
1399 
1400 static constexpr OptionDefinition g_rsync_option_table[] = {
1401     {LLDB_OPT_SET_ALL, false, "rsync", 'r', OptionParser::eNoArgument, nullptr,
1402      {}, 0, eArgTypeNone, "Enable rsync."},
1403     {LLDB_OPT_SET_ALL, false, "rsync-opts", 'R',
1404      OptionParser::eRequiredArgument, nullptr, {}, 0, eArgTypeCommandName,
1405      "Platform-specific options required for rsync to work."},
1406     {LLDB_OPT_SET_ALL, false, "rsync-prefix", 'P',
1407      OptionParser::eRequiredArgument, nullptr, {}, 0, eArgTypeCommandName,
1408      "Platform-specific rsync prefix put before the remote path."},
1409     {LLDB_OPT_SET_ALL, false, "ignore-remote-hostname", 'i',
1410      OptionParser::eNoArgument, nullptr, {}, 0, eArgTypeNone,
1411      "Do not automatically fill in the remote hostname when composing the "
1412      "rsync command."},
1413 };
1414 
1415 static constexpr OptionDefinition g_ssh_option_table[] = {
1416     {LLDB_OPT_SET_ALL, false, "ssh", 's', OptionParser::eNoArgument, nullptr,
1417      {}, 0, eArgTypeNone, "Enable SSH."},
1418     {LLDB_OPT_SET_ALL, false, "ssh-opts", 'S', OptionParser::eRequiredArgument,
1419      nullptr, {}, 0, eArgTypeCommandName,
1420      "Platform-specific options required for SSH to work."},
1421 };
1422 
1423 static constexpr OptionDefinition g_caching_option_table[] = {
1424     {LLDB_OPT_SET_ALL, false, "local-cache-dir", 'c',
1425      OptionParser::eRequiredArgument, nullptr, {}, 0, eArgTypePath,
1426      "Path in which to store local copies of files."},
1427 };
1428 
1429 llvm::ArrayRef<OptionDefinition> OptionGroupPlatformRSync::GetDefinitions() {
1430   return llvm::makeArrayRef(g_rsync_option_table);
1431 }
1432 
1433 void OptionGroupPlatformRSync::OptionParsingStarting(
1434     ExecutionContext *execution_context) {
1435   m_rsync = false;
1436   m_rsync_opts.clear();
1437   m_rsync_prefix.clear();
1438   m_ignores_remote_hostname = false;
1439 }
1440 
1441 lldb_private::Status
1442 OptionGroupPlatformRSync::SetOptionValue(uint32_t option_idx,
1443                                          llvm::StringRef option_arg,
1444                                          ExecutionContext *execution_context) {
1445   Status error;
1446   char short_option = (char)GetDefinitions()[option_idx].short_option;
1447   switch (short_option) {
1448   case 'r':
1449     m_rsync = true;
1450     break;
1451 
1452   case 'R':
1453     m_rsync_opts.assign(option_arg);
1454     break;
1455 
1456   case 'P':
1457     m_rsync_prefix.assign(option_arg);
1458     break;
1459 
1460   case 'i':
1461     m_ignores_remote_hostname = true;
1462     break;
1463 
1464   default:
1465     error.SetErrorStringWithFormat("unrecognized option '%c'", short_option);
1466     break;
1467   }
1468 
1469   return error;
1470 }
1471 
1472 lldb::BreakpointSP
1473 Platform::SetThreadCreationBreakpoint(lldb_private::Target &target) {
1474   return lldb::BreakpointSP();
1475 }
1476 
1477 llvm::ArrayRef<OptionDefinition> OptionGroupPlatformSSH::GetDefinitions() {
1478   return llvm::makeArrayRef(g_ssh_option_table);
1479 }
1480 
1481 void OptionGroupPlatformSSH::OptionParsingStarting(
1482     ExecutionContext *execution_context) {
1483   m_ssh = false;
1484   m_ssh_opts.clear();
1485 }
1486 
1487 lldb_private::Status
1488 OptionGroupPlatformSSH::SetOptionValue(uint32_t option_idx,
1489                                        llvm::StringRef option_arg,
1490                                        ExecutionContext *execution_context) {
1491   Status error;
1492   char short_option = (char)GetDefinitions()[option_idx].short_option;
1493   switch (short_option) {
1494   case 's':
1495     m_ssh = true;
1496     break;
1497 
1498   case 'S':
1499     m_ssh_opts.assign(option_arg);
1500     break;
1501 
1502   default:
1503     error.SetErrorStringWithFormat("unrecognized option '%c'", short_option);
1504     break;
1505   }
1506 
1507   return error;
1508 }
1509 
1510 llvm::ArrayRef<OptionDefinition> OptionGroupPlatformCaching::GetDefinitions() {
1511   return llvm::makeArrayRef(g_caching_option_table);
1512 }
1513 
1514 void OptionGroupPlatformCaching::OptionParsingStarting(
1515     ExecutionContext *execution_context) {
1516   m_cache_dir.clear();
1517 }
1518 
1519 lldb_private::Status OptionGroupPlatformCaching::SetOptionValue(
1520     uint32_t option_idx, llvm::StringRef option_arg,
1521     ExecutionContext *execution_context) {
1522   Status error;
1523   char short_option = (char)GetDefinitions()[option_idx].short_option;
1524   switch (short_option) {
1525   case 'c':
1526     m_cache_dir.assign(option_arg);
1527     break;
1528 
1529   default:
1530     error.SetErrorStringWithFormat("unrecognized option '%c'", short_option);
1531     break;
1532   }
1533 
1534   return error;
1535 }
1536 
1537 Environment Platform::GetEnvironment() { return Environment(); }
1538 
1539 const std::vector<ConstString> &Platform::GetTrapHandlerSymbolNames() {
1540   if (!m_calculated_trap_handlers) {
1541     std::lock_guard<std::mutex> guard(m_mutex);
1542     if (!m_calculated_trap_handlers) {
1543       CalculateTrapHandlerSymbolNames();
1544       m_calculated_trap_handlers = true;
1545     }
1546   }
1547   return m_trap_handlers;
1548 }
1549 
1550 Status Platform::GetCachedExecutable(
1551     ModuleSpec &module_spec, lldb::ModuleSP &module_sp,
1552     const FileSpecList *module_search_paths_ptr, Platform &remote_platform) {
1553   const auto platform_spec = module_spec.GetFileSpec();
1554   const auto error = LoadCachedExecutable(
1555       module_spec, module_sp, module_search_paths_ptr, remote_platform);
1556   if (error.Success()) {
1557     module_spec.GetFileSpec() = module_sp->GetFileSpec();
1558     module_spec.GetPlatformFileSpec() = platform_spec;
1559   }
1560 
1561   return error;
1562 }
1563 
1564 Status Platform::LoadCachedExecutable(
1565     const ModuleSpec &module_spec, lldb::ModuleSP &module_sp,
1566     const FileSpecList *module_search_paths_ptr, Platform &remote_platform) {
1567   return GetRemoteSharedModule(module_spec, nullptr, module_sp,
1568                                [&](const ModuleSpec &spec) {
1569                                  return remote_platform.ResolveExecutable(
1570                                      spec, module_sp, module_search_paths_ptr);
1571                                },
1572                                nullptr);
1573 }
1574 
1575 Status Platform::GetRemoteSharedModule(const ModuleSpec &module_spec,
1576                                        Process *process,
1577                                        lldb::ModuleSP &module_sp,
1578                                        const ModuleResolver &module_resolver,
1579                                        bool *did_create_ptr) {
1580   // Get module information from a target.
1581   ModuleSpec resolved_module_spec;
1582   bool got_module_spec = false;
1583   if (process) {
1584     // Try to get module information from the process
1585     if (process->GetModuleSpec(module_spec.GetFileSpec(),
1586                                module_spec.GetArchitecture(),
1587                                resolved_module_spec)) {
1588       if (!module_spec.GetUUID().IsValid() ||
1589           module_spec.GetUUID() == resolved_module_spec.GetUUID()) {
1590         got_module_spec = true;
1591       }
1592     }
1593   }
1594 
1595   if (!module_spec.GetArchitecture().IsValid()) {
1596     Status error;
1597     // No valid architecture was specified, ask the platform for the
1598     // architectures that we should be using (in the correct order) and see if
1599     // we can find a match that way
1600     ModuleSpec arch_module_spec(module_spec);
1601     for (uint32_t idx = 0; GetSupportedArchitectureAtIndex(
1602              idx, arch_module_spec.GetArchitecture());
1603          ++idx) {
1604       error = ModuleList::GetSharedModule(arch_module_spec, module_sp, nullptr,
1605                                           nullptr, nullptr);
1606       // Did we find an executable using one of the
1607       if (error.Success() && module_sp)
1608         break;
1609     }
1610     if (module_sp)
1611       got_module_spec = true;
1612   }
1613 
1614   if (!got_module_spec) {
1615     // Get module information from a target.
1616     if (!GetModuleSpec(module_spec.GetFileSpec(), module_spec.GetArchitecture(),
1617                        resolved_module_spec)) {
1618       if (!module_spec.GetUUID().IsValid() ||
1619           module_spec.GetUUID() == resolved_module_spec.GetUUID()) {
1620         return module_resolver(module_spec);
1621       }
1622     }
1623   }
1624 
1625   // If we are looking for a specific UUID, make sure resolved_module_spec has
1626   // the same one before we search.
1627   if (module_spec.GetUUID().IsValid()) {
1628     resolved_module_spec.GetUUID() = module_spec.GetUUID();
1629   }
1630 
1631   // Trying to find a module by UUID on local file system.
1632   const auto error = module_resolver(resolved_module_spec);
1633   if (error.Fail()) {
1634     if (GetCachedSharedModule(resolved_module_spec, module_sp, did_create_ptr))
1635       return Status();
1636   }
1637 
1638   return error;
1639 }
1640 
1641 bool Platform::GetCachedSharedModule(const ModuleSpec &module_spec,
1642                                      lldb::ModuleSP &module_sp,
1643                                      bool *did_create_ptr) {
1644   if (IsHost() || !GetGlobalPlatformProperties()->GetUseModuleCache() ||
1645       !GetGlobalPlatformProperties()->GetModuleCacheDirectory())
1646     return false;
1647 
1648   Log *log = GetLogIfAnyCategoriesSet(LIBLLDB_LOG_PLATFORM);
1649 
1650   // Check local cache for a module.
1651   auto error = m_module_cache->GetAndPut(
1652       GetModuleCacheRoot(), GetCacheHostname(), module_spec,
1653       [this](const ModuleSpec &module_spec,
1654              const FileSpec &tmp_download_file_spec) {
1655         return DownloadModuleSlice(
1656             module_spec.GetFileSpec(), module_spec.GetObjectOffset(),
1657             module_spec.GetObjectSize(), tmp_download_file_spec);
1658 
1659       },
1660       [this](const ModuleSP &module_sp,
1661              const FileSpec &tmp_download_file_spec) {
1662         return DownloadSymbolFile(module_sp, tmp_download_file_spec);
1663       },
1664       module_sp, did_create_ptr);
1665   if (error.Success())
1666     return true;
1667 
1668   if (log)
1669     log->Printf("Platform::%s - module %s not found in local cache: %s",
1670                 __FUNCTION__, module_spec.GetUUID().GetAsString().c_str(),
1671                 error.AsCString());
1672   return false;
1673 }
1674 
1675 Status Platform::DownloadModuleSlice(const FileSpec &src_file_spec,
1676                                      const uint64_t src_offset,
1677                                      const uint64_t src_size,
1678                                      const FileSpec &dst_file_spec) {
1679   Status error;
1680 
1681   std::error_code EC;
1682   llvm::raw_fd_ostream dst(dst_file_spec.GetPath(), EC, llvm::sys::fs::F_None);
1683   if (EC) {
1684     error.SetErrorStringWithFormat("unable to open destination file: %s",
1685                                    dst_file_spec.GetPath().c_str());
1686     return error;
1687   }
1688 
1689   auto src_fd = OpenFile(src_file_spec, File::eOpenOptionRead,
1690                          lldb::eFilePermissionsFileDefault, error);
1691 
1692   if (error.Fail()) {
1693     error.SetErrorStringWithFormat("unable to open source file: %s",
1694                                    error.AsCString());
1695     return error;
1696   }
1697 
1698   std::vector<char> buffer(1024);
1699   auto offset = src_offset;
1700   uint64_t total_bytes_read = 0;
1701   while (total_bytes_read < src_size) {
1702     const auto to_read = std::min(static_cast<uint64_t>(buffer.size()),
1703                                   src_size - total_bytes_read);
1704     const uint64_t n_read =
1705         ReadFile(src_fd, offset, &buffer[0], to_read, error);
1706     if (error.Fail())
1707       break;
1708     if (n_read == 0) {
1709       error.SetErrorString("read 0 bytes");
1710       break;
1711     }
1712     offset += n_read;
1713     total_bytes_read += n_read;
1714     dst.write(&buffer[0], n_read);
1715   }
1716 
1717   Status close_error;
1718   CloseFile(src_fd, close_error); // Ignoring close error.
1719 
1720   return error;
1721 }
1722 
1723 Status Platform::DownloadSymbolFile(const lldb::ModuleSP &module_sp,
1724                                     const FileSpec &dst_file_spec) {
1725   return Status(
1726       "Symbol file downloading not supported by the default platform.");
1727 }
1728 
1729 FileSpec Platform::GetModuleCacheRoot() {
1730   auto dir_spec = GetGlobalPlatformProperties()->GetModuleCacheDirectory();
1731   dir_spec.AppendPathComponent(GetName().AsCString());
1732   return dir_spec;
1733 }
1734 
1735 const char *Platform::GetCacheHostname() { return GetHostname(); }
1736 
1737 const UnixSignalsSP &Platform::GetRemoteUnixSignals() {
1738   static const auto s_default_unix_signals_sp = std::make_shared<UnixSignals>();
1739   return s_default_unix_signals_sp;
1740 }
1741 
1742 const UnixSignalsSP &Platform::GetUnixSignals() {
1743   if (IsHost())
1744     return Host::GetUnixSignals();
1745   return GetRemoteUnixSignals();
1746 }
1747 
1748 uint32_t Platform::LoadImage(lldb_private::Process *process,
1749                              const lldb_private::FileSpec &local_file,
1750                              const lldb_private::FileSpec &remote_file,
1751                              lldb_private::Status &error) {
1752   if (local_file && remote_file) {
1753     // Both local and remote file was specified. Install the local file to the
1754     // given location.
1755     if (IsRemote() || local_file != remote_file) {
1756       error = Install(local_file, remote_file);
1757       if (error.Fail())
1758         return LLDB_INVALID_IMAGE_TOKEN;
1759     }
1760     return DoLoadImage(process, remote_file, nullptr, error);
1761   }
1762 
1763   if (local_file) {
1764     // Only local file was specified. Install it to the current working
1765     // directory.
1766     FileSpec target_file = GetWorkingDirectory();
1767     target_file.AppendPathComponent(local_file.GetFilename().AsCString());
1768     if (IsRemote() || local_file != target_file) {
1769       error = Install(local_file, target_file);
1770       if (error.Fail())
1771         return LLDB_INVALID_IMAGE_TOKEN;
1772     }
1773     return DoLoadImage(process, target_file, nullptr, error);
1774   }
1775 
1776   if (remote_file) {
1777     // Only remote file was specified so we don't have to do any copying
1778     return DoLoadImage(process, remote_file, nullptr, error);
1779   }
1780 
1781   error.SetErrorString("Neither local nor remote file was specified");
1782   return LLDB_INVALID_IMAGE_TOKEN;
1783 }
1784 
1785 uint32_t Platform::DoLoadImage(lldb_private::Process *process,
1786                                const lldb_private::FileSpec &remote_file,
1787                                const std::vector<std::string> *paths,
1788                                lldb_private::Status &error,
1789                                lldb_private::FileSpec *loaded_image) {
1790   error.SetErrorString("LoadImage is not supported on the current platform");
1791   return LLDB_INVALID_IMAGE_TOKEN;
1792 }
1793 
1794 uint32_t Platform::LoadImageUsingPaths(lldb_private::Process *process,
1795                                const lldb_private::FileSpec &remote_filename,
1796                                const std::vector<std::string> &paths,
1797                                lldb_private::Status &error,
1798                                lldb_private::FileSpec *loaded_path)
1799 {
1800   FileSpec file_to_use;
1801   if (remote_filename.IsAbsolute())
1802     file_to_use = FileSpec(remote_filename.GetFilename().GetStringRef(),
1803 
1804                            remote_filename.GetPathStyle());
1805   else
1806     file_to_use = remote_filename;
1807 
1808   return DoLoadImage(process, file_to_use, &paths, error, loaded_path);
1809 }
1810 
1811 Status Platform::UnloadImage(lldb_private::Process *process,
1812                              uint32_t image_token) {
1813   return Status("UnloadImage is not supported on the current platform");
1814 }
1815 
1816 lldb::ProcessSP Platform::ConnectProcess(llvm::StringRef connect_url,
1817                                          llvm::StringRef plugin_name,
1818                                          lldb_private::Debugger &debugger,
1819                                          lldb_private::Target *target,
1820                                          lldb_private::Status &error) {
1821   error.Clear();
1822 
1823   if (!target) {
1824     ArchSpec arch;
1825     if (target && target->GetArchitecture().IsValid())
1826       arch = target->GetArchitecture();
1827     else
1828       arch = Target::GetDefaultArchitecture();
1829 
1830     const char *triple = "";
1831     if (arch.IsValid())
1832       triple = arch.GetTriple().getTriple().c_str();
1833 
1834     TargetSP new_target_sp;
1835     error = debugger.GetTargetList().CreateTarget(
1836         debugger, "", triple, eLoadDependentsNo, nullptr, new_target_sp);
1837     target = new_target_sp.get();
1838   }
1839 
1840   if (!target || error.Fail())
1841     return nullptr;
1842 
1843   debugger.GetTargetList().SetSelectedTarget(target);
1844 
1845   lldb::ProcessSP process_sp =
1846       target->CreateProcess(debugger.GetListener(), plugin_name, nullptr);
1847   if (!process_sp)
1848     return nullptr;
1849 
1850   error =
1851       process_sp->ConnectRemote(debugger.GetOutputFile().get(), connect_url);
1852   if (error.Fail())
1853     return nullptr;
1854 
1855   return process_sp;
1856 }
1857 
1858 size_t Platform::ConnectToWaitingProcesses(lldb_private::Debugger &debugger,
1859                                            lldb_private::Status &error) {
1860   error.Clear();
1861   return 0;
1862 }
1863 
1864 size_t Platform::GetSoftwareBreakpointTrapOpcode(Target &target,
1865                                                  BreakpointSite *bp_site) {
1866   ArchSpec arch = target.GetArchitecture();
1867   const uint8_t *trap_opcode = nullptr;
1868   size_t trap_opcode_size = 0;
1869 
1870   switch (arch.GetMachine()) {
1871   case llvm::Triple::aarch64: {
1872     static const uint8_t g_aarch64_opcode[] = {0x00, 0x00, 0x20, 0xd4};
1873     trap_opcode = g_aarch64_opcode;
1874     trap_opcode_size = sizeof(g_aarch64_opcode);
1875   } break;
1876 
1877   // TODO: support big-endian arm and thumb trap codes.
1878   case llvm::Triple::arm: {
1879     // The ARM reference recommends the use of 0xe7fddefe and 0xdefe but the
1880     // linux kernel does otherwise.
1881     static const uint8_t g_arm_breakpoint_opcode[] = {0xf0, 0x01, 0xf0, 0xe7};
1882     static const uint8_t g_thumb_breakpoint_opcode[] = {0x01, 0xde};
1883 
1884     lldb::BreakpointLocationSP bp_loc_sp(bp_site->GetOwnerAtIndex(0));
1885     AddressClass addr_class = AddressClass::eUnknown;
1886 
1887     if (bp_loc_sp) {
1888       addr_class = bp_loc_sp->GetAddress().GetAddressClass();
1889       if (addr_class == AddressClass::eUnknown &&
1890           (bp_loc_sp->GetAddress().GetFileAddress() & 1))
1891         addr_class = AddressClass::eCodeAlternateISA;
1892     }
1893 
1894     if (addr_class == AddressClass::eCodeAlternateISA) {
1895       trap_opcode = g_thumb_breakpoint_opcode;
1896       trap_opcode_size = sizeof(g_thumb_breakpoint_opcode);
1897     } else {
1898       trap_opcode = g_arm_breakpoint_opcode;
1899       trap_opcode_size = sizeof(g_arm_breakpoint_opcode);
1900     }
1901   } break;
1902 
1903   case llvm::Triple::mips:
1904   case llvm::Triple::mips64: {
1905     static const uint8_t g_hex_opcode[] = {0x00, 0x00, 0x00, 0x0d};
1906     trap_opcode = g_hex_opcode;
1907     trap_opcode_size = sizeof(g_hex_opcode);
1908   } break;
1909 
1910   case llvm::Triple::mipsel:
1911   case llvm::Triple::mips64el: {
1912     static const uint8_t g_hex_opcode[] = {0x0d, 0x00, 0x00, 0x00};
1913     trap_opcode = g_hex_opcode;
1914     trap_opcode_size = sizeof(g_hex_opcode);
1915   } break;
1916 
1917   case llvm::Triple::systemz: {
1918     static const uint8_t g_hex_opcode[] = {0x00, 0x01};
1919     trap_opcode = g_hex_opcode;
1920     trap_opcode_size = sizeof(g_hex_opcode);
1921   } break;
1922 
1923   case llvm::Triple::hexagon: {
1924     static const uint8_t g_hex_opcode[] = {0x0c, 0xdb, 0x00, 0x54};
1925     trap_opcode = g_hex_opcode;
1926     trap_opcode_size = sizeof(g_hex_opcode);
1927   } break;
1928 
1929   case llvm::Triple::ppc:
1930   case llvm::Triple::ppc64: {
1931     static const uint8_t g_ppc_opcode[] = {0x7f, 0xe0, 0x00, 0x08};
1932     trap_opcode = g_ppc_opcode;
1933     trap_opcode_size = sizeof(g_ppc_opcode);
1934   } break;
1935 
1936   case llvm::Triple::ppc64le: {
1937     static const uint8_t g_ppc64le_opcode[] = {0x08, 0x00, 0xe0, 0x7f}; // trap
1938     trap_opcode = g_ppc64le_opcode;
1939     trap_opcode_size = sizeof(g_ppc64le_opcode);
1940   } break;
1941 
1942   case llvm::Triple::x86:
1943   case llvm::Triple::x86_64: {
1944     static const uint8_t g_i386_opcode[] = {0xCC};
1945     trap_opcode = g_i386_opcode;
1946     trap_opcode_size = sizeof(g_i386_opcode);
1947   } break;
1948 
1949   default:
1950     llvm_unreachable(
1951         "Unhandled architecture in Platform::GetSoftwareBreakpointTrapOpcode");
1952   }
1953 
1954   assert(bp_site);
1955   if (bp_site->SetTrapOpcode(trap_opcode, trap_opcode_size))
1956     return trap_opcode_size;
1957 
1958   return 0;
1959 }
1960