1 //===-- Platform.cpp --------------------------------------------*- C++ -*-===// 2 // 3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. 4 // See https://llvm.org/LICENSE.txt for license information. 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 6 // 7 //===----------------------------------------------------------------------===// 8 9 #include <algorithm> 10 #include <csignal> 11 #include <fstream> 12 #include <vector> 13 14 #include "llvm/Support/FileSystem.h" 15 #include "llvm/Support/Path.h" 16 17 #include "lldb/Breakpoint/BreakpointIDList.h" 18 #include "lldb/Breakpoint/BreakpointLocation.h" 19 #include "lldb/Core/Debugger.h" 20 #include "lldb/Core/Module.h" 21 #include "lldb/Core/ModuleSpec.h" 22 #include "lldb/Core/PluginManager.h" 23 #include "lldb/Core/StreamFile.h" 24 #include "lldb/Host/FileSystem.h" 25 #include "lldb/Host/Host.h" 26 #include "lldb/Host/HostInfo.h" 27 #include "lldb/Host/OptionParser.h" 28 #include "lldb/Interpreter/OptionValueProperties.h" 29 #include "lldb/Interpreter/Property.h" 30 #include "lldb/Symbol/ObjectFile.h" 31 #include "lldb/Target/ModuleCache.h" 32 #include "lldb/Target/Platform.h" 33 #include "lldb/Target/Process.h" 34 #include "lldb/Target/Target.h" 35 #include "lldb/Target/UnixSignals.h" 36 #include "lldb/Utility/DataBufferHeap.h" 37 #include "lldb/Utility/FileSpec.h" 38 #include "lldb/Utility/Log.h" 39 #include "lldb/Utility/Status.h" 40 #include "lldb/Utility/StructuredData.h" 41 42 #include "llvm/Support/FileSystem.h" 43 44 // Define these constants from POSIX mman.h rather than include the file so 45 // that they will be correct even when compiled on Linux. 46 #define MAP_PRIVATE 2 47 #define MAP_ANON 0x1000 48 49 using namespace lldb; 50 using namespace lldb_private; 51 52 static uint32_t g_initialize_count = 0; 53 54 // Use a singleton function for g_local_platform_sp to avoid init constructors 55 // since LLDB is often part of a shared library 56 static PlatformSP &GetHostPlatformSP() { 57 static PlatformSP g_platform_sp; 58 return g_platform_sp; 59 } 60 61 const char *Platform::GetHostPlatformName() { return "host"; } 62 63 namespace { 64 65 static constexpr PropertyDefinition g_properties[] = { 66 {"use-module-cache", OptionValue::eTypeBoolean, true, true, nullptr, 67 {}, "Use module cache."}, 68 {"module-cache-directory", OptionValue::eTypeFileSpec, true, 0, nullptr, 69 {}, "Root directory for cached modules."}}; 70 71 enum { ePropertyUseModuleCache, ePropertyModuleCacheDirectory }; 72 73 } // namespace 74 75 ConstString PlatformProperties::GetSettingName() { 76 static ConstString g_setting_name("platform"); 77 return g_setting_name; 78 } 79 80 PlatformProperties::PlatformProperties() { 81 m_collection_sp.reset(new OptionValueProperties(GetSettingName())); 82 m_collection_sp->Initialize(g_properties); 83 84 auto module_cache_dir = GetModuleCacheDirectory(); 85 if (module_cache_dir) 86 return; 87 88 llvm::SmallString<64> user_home_dir; 89 if (!llvm::sys::path::home_directory(user_home_dir)) 90 return; 91 92 module_cache_dir = FileSpec(user_home_dir.c_str()); 93 module_cache_dir.AppendPathComponent(".lldb"); 94 module_cache_dir.AppendPathComponent("module_cache"); 95 SetModuleCacheDirectory(module_cache_dir); 96 } 97 98 bool PlatformProperties::GetUseModuleCache() const { 99 const auto idx = ePropertyUseModuleCache; 100 return m_collection_sp->GetPropertyAtIndexAsBoolean( 101 nullptr, idx, g_properties[idx].default_uint_value != 0); 102 } 103 104 bool PlatformProperties::SetUseModuleCache(bool use_module_cache) { 105 return m_collection_sp->SetPropertyAtIndexAsBoolean( 106 nullptr, ePropertyUseModuleCache, use_module_cache); 107 } 108 109 FileSpec PlatformProperties::GetModuleCacheDirectory() const { 110 return m_collection_sp->GetPropertyAtIndexAsFileSpec( 111 nullptr, ePropertyModuleCacheDirectory); 112 } 113 114 bool PlatformProperties::SetModuleCacheDirectory(const FileSpec &dir_spec) { 115 return m_collection_sp->SetPropertyAtIndexAsFileSpec( 116 nullptr, ePropertyModuleCacheDirectory, dir_spec); 117 } 118 119 //------------------------------------------------------------------ 120 /// Get the native host platform plug-in. 121 /// 122 /// There should only be one of these for each host that LLDB runs 123 /// upon that should be statically compiled in and registered using 124 /// preprocessor macros or other similar build mechanisms. 125 /// 126 /// This platform will be used as the default platform when launching 127 /// or attaching to processes unless another platform is specified. 128 //------------------------------------------------------------------ 129 PlatformSP Platform::GetHostPlatform() { return GetHostPlatformSP(); } 130 131 static std::vector<PlatformSP> &GetPlatformList() { 132 static std::vector<PlatformSP> g_platform_list; 133 return g_platform_list; 134 } 135 136 static std::recursive_mutex &GetPlatformListMutex() { 137 static std::recursive_mutex g_mutex; 138 return g_mutex; 139 } 140 141 void Platform::Initialize() { g_initialize_count++; } 142 143 void Platform::Terminate() { 144 if (g_initialize_count > 0) { 145 if (--g_initialize_count == 0) { 146 std::lock_guard<std::recursive_mutex> guard(GetPlatformListMutex()); 147 GetPlatformList().clear(); 148 } 149 } 150 } 151 152 const PlatformPropertiesSP &Platform::GetGlobalPlatformProperties() { 153 static const auto g_settings_sp(std::make_shared<PlatformProperties>()); 154 return g_settings_sp; 155 } 156 157 void Platform::SetHostPlatform(const lldb::PlatformSP &platform_sp) { 158 // The native platform should use its static void Platform::Initialize() 159 // function to register itself as the native platform. 160 GetHostPlatformSP() = platform_sp; 161 162 if (platform_sp) { 163 std::lock_guard<std::recursive_mutex> guard(GetPlatformListMutex()); 164 GetPlatformList().push_back(platform_sp); 165 } 166 } 167 168 Status Platform::GetFileWithUUID(const FileSpec &platform_file, 169 const UUID *uuid_ptr, FileSpec &local_file) { 170 // Default to the local case 171 local_file = platform_file; 172 return Status(); 173 } 174 175 FileSpecList 176 Platform::LocateExecutableScriptingResources(Target *target, Module &module, 177 Stream *feedback_stream) { 178 return FileSpecList(); 179 } 180 181 // PlatformSP 182 // Platform::FindPlugin (Process *process, const ConstString &plugin_name) 183 //{ 184 // PlatformCreateInstance create_callback = nullptr; 185 // if (plugin_name) 186 // { 187 // create_callback = 188 // PluginManager::GetPlatformCreateCallbackForPluginName (plugin_name); 189 // if (create_callback) 190 // { 191 // ArchSpec arch; 192 // if (process) 193 // { 194 // arch = process->GetTarget().GetArchitecture(); 195 // } 196 // PlatformSP platform_sp(create_callback(process, &arch)); 197 // if (platform_sp) 198 // return platform_sp; 199 // } 200 // } 201 // else 202 // { 203 // for (uint32_t idx = 0; (create_callback = 204 // PluginManager::GetPlatformCreateCallbackAtIndex(idx)) != nullptr; 205 // ++idx) 206 // { 207 // PlatformSP platform_sp(create_callback(process, nullptr)); 208 // if (platform_sp) 209 // return platform_sp; 210 // } 211 // } 212 // return PlatformSP(); 213 //} 214 215 Status Platform::GetSharedModule(const ModuleSpec &module_spec, 216 Process *process, ModuleSP &module_sp, 217 const FileSpecList *module_search_paths_ptr, 218 ModuleSP *old_module_sp_ptr, 219 bool *did_create_ptr) { 220 if (IsHost()) 221 return ModuleList::GetSharedModule( 222 module_spec, module_sp, module_search_paths_ptr, old_module_sp_ptr, 223 did_create_ptr, false); 224 225 // Module resolver lambda. 226 auto resolver = [&](const ModuleSpec &spec) { 227 Status error(eErrorTypeGeneric); 228 ModuleSpec resolved_spec; 229 // Check if we have sysroot set. 230 if (m_sdk_sysroot) { 231 // Prepend sysroot to module spec. 232 resolved_spec = spec; 233 resolved_spec.GetFileSpec().PrependPathComponent( 234 m_sdk_sysroot.GetStringRef()); 235 // Try to get shared module with resolved spec. 236 error = ModuleList::GetSharedModule( 237 resolved_spec, module_sp, module_search_paths_ptr, old_module_sp_ptr, 238 did_create_ptr, false); 239 } 240 // If we don't have sysroot or it didn't work then 241 // try original module spec. 242 if (!error.Success()) { 243 resolved_spec = spec; 244 error = ModuleList::GetSharedModule( 245 resolved_spec, module_sp, module_search_paths_ptr, old_module_sp_ptr, 246 did_create_ptr, false); 247 } 248 if (error.Success() && module_sp) 249 module_sp->SetPlatformFileSpec(resolved_spec.GetFileSpec()); 250 return error; 251 }; 252 253 return GetRemoteSharedModule(module_spec, process, module_sp, resolver, 254 did_create_ptr); 255 } 256 257 bool Platform::GetModuleSpec(const FileSpec &module_file_spec, 258 const ArchSpec &arch, ModuleSpec &module_spec) { 259 ModuleSpecList module_specs; 260 if (ObjectFile::GetModuleSpecifications(module_file_spec, 0, 0, 261 module_specs) == 0) 262 return false; 263 264 ModuleSpec matched_module_spec; 265 return module_specs.FindMatchingModuleSpec(ModuleSpec(module_file_spec, arch), 266 module_spec); 267 } 268 269 PlatformSP Platform::Find(const ConstString &name) { 270 if (name) { 271 static ConstString g_host_platform_name("host"); 272 if (name == g_host_platform_name) 273 return GetHostPlatform(); 274 275 std::lock_guard<std::recursive_mutex> guard(GetPlatformListMutex()); 276 for (const auto &platform_sp : GetPlatformList()) { 277 if (platform_sp->GetName() == name) 278 return platform_sp; 279 } 280 } 281 return PlatformSP(); 282 } 283 284 PlatformSP Platform::Create(const ConstString &name, Status &error) { 285 PlatformCreateInstance create_callback = nullptr; 286 lldb::PlatformSP platform_sp; 287 if (name) { 288 static ConstString g_host_platform_name("host"); 289 if (name == g_host_platform_name) 290 return GetHostPlatform(); 291 292 create_callback = 293 PluginManager::GetPlatformCreateCallbackForPluginName(name); 294 if (create_callback) 295 platform_sp = create_callback(true, nullptr); 296 else 297 error.SetErrorStringWithFormat( 298 "unable to find a plug-in for the platform named \"%s\"", 299 name.GetCString()); 300 } else 301 error.SetErrorString("invalid platform name"); 302 303 if (platform_sp) { 304 std::lock_guard<std::recursive_mutex> guard(GetPlatformListMutex()); 305 GetPlatformList().push_back(platform_sp); 306 } 307 308 return platform_sp; 309 } 310 311 PlatformSP Platform::Create(const ArchSpec &arch, ArchSpec *platform_arch_ptr, 312 Status &error) { 313 lldb::PlatformSP platform_sp; 314 if (arch.IsValid()) { 315 // Scope for locker 316 { 317 // First try exact arch matches across all platforms already created 318 std::lock_guard<std::recursive_mutex> guard(GetPlatformListMutex()); 319 for (const auto &platform_sp : GetPlatformList()) { 320 if (platform_sp->IsCompatibleArchitecture(arch, true, 321 platform_arch_ptr)) 322 return platform_sp; 323 } 324 325 // Next try compatible arch matches across all platforms already created 326 for (const auto &platform_sp : GetPlatformList()) { 327 if (platform_sp->IsCompatibleArchitecture(arch, false, 328 platform_arch_ptr)) 329 return platform_sp; 330 } 331 } 332 333 PlatformCreateInstance create_callback; 334 // First try exact arch matches across all platform plug-ins 335 uint32_t idx; 336 for (idx = 0; (create_callback = 337 PluginManager::GetPlatformCreateCallbackAtIndex(idx)); 338 ++idx) { 339 if (create_callback) { 340 platform_sp = create_callback(false, &arch); 341 if (platform_sp && 342 platform_sp->IsCompatibleArchitecture(arch, true, 343 platform_arch_ptr)) { 344 std::lock_guard<std::recursive_mutex> guard(GetPlatformListMutex()); 345 GetPlatformList().push_back(platform_sp); 346 return platform_sp; 347 } 348 } 349 } 350 // Next try compatible arch matches across all platform plug-ins 351 for (idx = 0; (create_callback = 352 PluginManager::GetPlatformCreateCallbackAtIndex(idx)); 353 ++idx) { 354 if (create_callback) { 355 platform_sp = create_callback(false, &arch); 356 if (platform_sp && 357 platform_sp->IsCompatibleArchitecture(arch, false, 358 platform_arch_ptr)) { 359 std::lock_guard<std::recursive_mutex> guard(GetPlatformListMutex()); 360 GetPlatformList().push_back(platform_sp); 361 return platform_sp; 362 } 363 } 364 } 365 } else 366 error.SetErrorString("invalid platform name"); 367 if (platform_arch_ptr) 368 platform_arch_ptr->Clear(); 369 platform_sp.reset(); 370 return platform_sp; 371 } 372 373 ArchSpec Platform::GetAugmentedArchSpec(Platform *platform, llvm::StringRef triple) { 374 if (platform) 375 return platform->GetAugmentedArchSpec(triple); 376 return HostInfo::GetAugmentedArchSpec(triple); 377 } 378 379 //------------------------------------------------------------------ 380 /// Default Constructor 381 //------------------------------------------------------------------ 382 Platform::Platform(bool is_host) 383 : m_is_host(is_host), m_os_version_set_while_connected(false), 384 m_system_arch_set_while_connected(false), m_sdk_sysroot(), m_sdk_build(), 385 m_working_dir(), m_remote_url(), m_name(), m_system_arch(), m_mutex(), 386 m_uid_map(), m_gid_map(), m_max_uid_name_len(0), m_max_gid_name_len(0), 387 m_supports_rsync(false), m_rsync_opts(), m_rsync_prefix(), 388 m_supports_ssh(false), m_ssh_opts(), m_ignores_remote_hostname(false), 389 m_trap_handlers(), m_calculated_trap_handlers(false), 390 m_module_cache(llvm::make_unique<ModuleCache>()) { 391 Log *log(lldb_private::GetLogIfAllCategoriesSet(LIBLLDB_LOG_OBJECT)); 392 if (log) 393 log->Printf("%p Platform::Platform()", static_cast<void *>(this)); 394 } 395 396 //------------------------------------------------------------------ 397 /// Destructor. 398 /// 399 /// The destructor is virtual since this class is designed to be 400 /// inherited from by the plug-in instance. 401 //------------------------------------------------------------------ 402 Platform::~Platform() { 403 Log *log(lldb_private::GetLogIfAllCategoriesSet(LIBLLDB_LOG_OBJECT)); 404 if (log) 405 log->Printf("%p Platform::~Platform()", static_cast<void *>(this)); 406 } 407 408 void Platform::GetStatus(Stream &strm) { 409 std::string s; 410 strm.Printf(" Platform: %s\n", GetPluginName().GetCString()); 411 412 ArchSpec arch(GetSystemArchitecture()); 413 if (arch.IsValid()) { 414 if (!arch.GetTriple().str().empty()) { 415 strm.Printf(" Triple: "); 416 arch.DumpTriple(strm); 417 strm.EOL(); 418 } 419 } 420 421 llvm::VersionTuple os_version = GetOSVersion(); 422 if (!os_version.empty()) { 423 strm.Format("OS Version: {0}", os_version.getAsString()); 424 425 if (GetOSBuildString(s)) 426 strm.Printf(" (%s)", s.c_str()); 427 428 strm.EOL(); 429 } 430 431 if (GetOSKernelDescription(s)) 432 strm.Printf(" Kernel: %s\n", s.c_str()); 433 434 if (IsHost()) { 435 strm.Printf(" Hostname: %s\n", GetHostname()); 436 } else { 437 const bool is_connected = IsConnected(); 438 if (is_connected) 439 strm.Printf(" Hostname: %s\n", GetHostname()); 440 strm.Printf(" Connected: %s\n", is_connected ? "yes" : "no"); 441 } 442 443 if (GetWorkingDirectory()) { 444 strm.Printf("WorkingDir: %s\n", GetWorkingDirectory().GetCString()); 445 } 446 if (!IsConnected()) 447 return; 448 449 std::string specific_info(GetPlatformSpecificConnectionInformation()); 450 451 if (!specific_info.empty()) 452 strm.Printf("Platform-specific connection: %s\n", specific_info.c_str()); 453 } 454 455 llvm::VersionTuple Platform::GetOSVersion(Process *process) { 456 std::lock_guard<std::mutex> guard(m_mutex); 457 458 if (IsHost()) { 459 if (m_os_version.empty()) { 460 // We have a local host platform 461 m_os_version = HostInfo::GetOSVersion(); 462 m_os_version_set_while_connected = !m_os_version.empty(); 463 } 464 } else { 465 // We have a remote platform. We can only fetch the remote 466 // OS version if we are connected, and we don't want to do it 467 // more than once. 468 469 const bool is_connected = IsConnected(); 470 471 bool fetch = false; 472 if (!m_os_version.empty()) { 473 // We have valid OS version info, check to make sure it wasn't manually 474 // set prior to connecting. If it was manually set prior to connecting, 475 // then lets fetch the actual OS version info if we are now connected. 476 if (is_connected && !m_os_version_set_while_connected) 477 fetch = true; 478 } else { 479 // We don't have valid OS version info, fetch it if we are connected 480 fetch = is_connected; 481 } 482 483 if (fetch) 484 m_os_version_set_while_connected = GetRemoteOSVersion(); 485 } 486 487 if (!m_os_version.empty()) 488 return m_os_version; 489 if (process) { 490 // Check with the process in case it can answer the question if a process 491 // was provided 492 return process->GetHostOSVersion(); 493 } 494 return llvm::VersionTuple(); 495 } 496 497 bool Platform::GetOSBuildString(std::string &s) { 498 s.clear(); 499 500 if (IsHost()) 501 #if !defined(__linux__) 502 return HostInfo::GetOSBuildString(s); 503 #else 504 return false; 505 #endif 506 else 507 return GetRemoteOSBuildString(s); 508 } 509 510 bool Platform::GetOSKernelDescription(std::string &s) { 511 if (IsHost()) 512 #if !defined(__linux__) 513 return HostInfo::GetOSKernelDescription(s); 514 #else 515 return false; 516 #endif 517 else 518 return GetRemoteOSKernelDescription(s); 519 } 520 521 void Platform::AddClangModuleCompilationOptions( 522 Target *target, std::vector<std::string> &options) { 523 std::vector<std::string> default_compilation_options = { 524 "-x", "c++", "-Xclang", "-nostdsysteminc", "-Xclang", "-nostdsysteminc"}; 525 526 options.insert(options.end(), default_compilation_options.begin(), 527 default_compilation_options.end()); 528 } 529 530 FileSpec Platform::GetWorkingDirectory() { 531 if (IsHost()) { 532 llvm::SmallString<64> cwd; 533 if (llvm::sys::fs::current_path(cwd)) 534 return {}; 535 else { 536 FileSpec file_spec(cwd); 537 FileSystem::Instance().Resolve(file_spec); 538 return file_spec; 539 } 540 } else { 541 if (!m_working_dir) 542 m_working_dir = GetRemoteWorkingDirectory(); 543 return m_working_dir; 544 } 545 } 546 547 struct RecurseCopyBaton { 548 const FileSpec &dst; 549 Platform *platform_ptr; 550 Status error; 551 }; 552 553 static FileSystem::EnumerateDirectoryResult 554 RecurseCopy_Callback(void *baton, llvm::sys::fs::file_type ft, 555 llvm::StringRef path) { 556 RecurseCopyBaton *rc_baton = (RecurseCopyBaton *)baton; 557 FileSpec src(path); 558 namespace fs = llvm::sys::fs; 559 switch (ft) { 560 case fs::file_type::fifo_file: 561 case fs::file_type::socket_file: 562 // we have no way to copy pipes and sockets - ignore them and continue 563 return FileSystem::eEnumerateDirectoryResultNext; 564 break; 565 566 case fs::file_type::directory_file: { 567 // make the new directory and get in there 568 FileSpec dst_dir = rc_baton->dst; 569 if (!dst_dir.GetFilename()) 570 dst_dir.GetFilename() = src.GetLastPathComponent(); 571 Status error = rc_baton->platform_ptr->MakeDirectory( 572 dst_dir, lldb::eFilePermissionsDirectoryDefault); 573 if (error.Fail()) { 574 rc_baton->error.SetErrorStringWithFormat( 575 "unable to setup directory %s on remote end", dst_dir.GetCString()); 576 return FileSystem::eEnumerateDirectoryResultQuit; // got an error, bail out 577 } 578 579 // now recurse 580 std::string src_dir_path(src.GetPath()); 581 582 // Make a filespec that only fills in the directory of a FileSpec so when 583 // we enumerate we can quickly fill in the filename for dst copies 584 FileSpec recurse_dst; 585 recurse_dst.GetDirectory().SetCString(dst_dir.GetPath().c_str()); 586 RecurseCopyBaton rc_baton2 = {recurse_dst, rc_baton->platform_ptr, 587 Status()}; 588 FileSystem::Instance().EnumerateDirectory(src_dir_path, true, true, true, 589 RecurseCopy_Callback, &rc_baton2); 590 if (rc_baton2.error.Fail()) { 591 rc_baton->error.SetErrorString(rc_baton2.error.AsCString()); 592 return FileSystem::eEnumerateDirectoryResultQuit; // got an error, bail out 593 } 594 return FileSystem::eEnumerateDirectoryResultNext; 595 } break; 596 597 case fs::file_type::symlink_file: { 598 // copy the file and keep going 599 FileSpec dst_file = rc_baton->dst; 600 if (!dst_file.GetFilename()) 601 dst_file.GetFilename() = src.GetFilename(); 602 603 FileSpec src_resolved; 604 605 rc_baton->error = FileSystem::Instance().Readlink(src, src_resolved); 606 607 if (rc_baton->error.Fail()) 608 return FileSystem::eEnumerateDirectoryResultQuit; // got an error, bail out 609 610 rc_baton->error = 611 rc_baton->platform_ptr->CreateSymlink(dst_file, src_resolved); 612 613 if (rc_baton->error.Fail()) 614 return FileSystem::eEnumerateDirectoryResultQuit; // got an error, bail out 615 616 return FileSystem::eEnumerateDirectoryResultNext; 617 } break; 618 619 case fs::file_type::regular_file: { 620 // copy the file and keep going 621 FileSpec dst_file = rc_baton->dst; 622 if (!dst_file.GetFilename()) 623 dst_file.GetFilename() = src.GetFilename(); 624 Status err = rc_baton->platform_ptr->PutFile(src, dst_file); 625 if (err.Fail()) { 626 rc_baton->error.SetErrorString(err.AsCString()); 627 return FileSystem::eEnumerateDirectoryResultQuit; // got an error, bail out 628 } 629 return FileSystem::eEnumerateDirectoryResultNext; 630 } break; 631 632 default: 633 rc_baton->error.SetErrorStringWithFormat( 634 "invalid file detected during copy: %s", src.GetPath().c_str()); 635 return FileSystem::eEnumerateDirectoryResultQuit; // got an error, bail out 636 break; 637 } 638 llvm_unreachable("Unhandled file_type!"); 639 } 640 641 Status Platform::Install(const FileSpec &src, const FileSpec &dst) { 642 Status error; 643 644 Log *log = GetLogIfAnyCategoriesSet(LIBLLDB_LOG_PLATFORM); 645 if (log) 646 log->Printf("Platform::Install (src='%s', dst='%s')", src.GetPath().c_str(), 647 dst.GetPath().c_str()); 648 FileSpec fixed_dst(dst); 649 650 if (!fixed_dst.GetFilename()) 651 fixed_dst.GetFilename() = src.GetFilename(); 652 653 FileSpec working_dir = GetWorkingDirectory(); 654 655 if (dst) { 656 if (dst.GetDirectory()) { 657 const char first_dst_dir_char = dst.GetDirectory().GetCString()[0]; 658 if (first_dst_dir_char == '/' || first_dst_dir_char == '\\') { 659 fixed_dst.GetDirectory() = dst.GetDirectory(); 660 } 661 // If the fixed destination file doesn't have a directory yet, then we 662 // must have a relative path. We will resolve this relative path against 663 // the platform's working directory 664 if (!fixed_dst.GetDirectory()) { 665 FileSpec relative_spec; 666 std::string path; 667 if (working_dir) { 668 relative_spec = working_dir; 669 relative_spec.AppendPathComponent(dst.GetPath()); 670 fixed_dst.GetDirectory() = relative_spec.GetDirectory(); 671 } else { 672 error.SetErrorStringWithFormat( 673 "platform working directory must be valid for relative path '%s'", 674 dst.GetPath().c_str()); 675 return error; 676 } 677 } 678 } else { 679 if (working_dir) { 680 fixed_dst.GetDirectory().SetCString(working_dir.GetCString()); 681 } else { 682 error.SetErrorStringWithFormat( 683 "platform working directory must be valid for relative path '%s'", 684 dst.GetPath().c_str()); 685 return error; 686 } 687 } 688 } else { 689 if (working_dir) { 690 fixed_dst.GetDirectory().SetCString(working_dir.GetCString()); 691 } else { 692 error.SetErrorStringWithFormat("platform working directory must be valid " 693 "when destination directory is empty"); 694 return error; 695 } 696 } 697 698 if (log) 699 log->Printf("Platform::Install (src='%s', dst='%s') fixed_dst='%s'", 700 src.GetPath().c_str(), dst.GetPath().c_str(), 701 fixed_dst.GetPath().c_str()); 702 703 if (GetSupportsRSync()) { 704 error = PutFile(src, dst); 705 } else { 706 namespace fs = llvm::sys::fs; 707 switch (fs::get_file_type(src.GetPath(), false)) { 708 case fs::file_type::directory_file: { 709 llvm::sys::fs::remove(fixed_dst.GetPath()); 710 uint32_t permissions = FileSystem::Instance().GetPermissions(src); 711 if (permissions == 0) 712 permissions = eFilePermissionsDirectoryDefault; 713 error = MakeDirectory(fixed_dst, permissions); 714 if (error.Success()) { 715 // Make a filespec that only fills in the directory of a FileSpec so 716 // when we enumerate we can quickly fill in the filename for dst copies 717 FileSpec recurse_dst; 718 recurse_dst.GetDirectory().SetCString(fixed_dst.GetCString()); 719 std::string src_dir_path(src.GetPath()); 720 RecurseCopyBaton baton = {recurse_dst, this, Status()}; 721 FileSystem::Instance().EnumerateDirectory( 722 src_dir_path, true, true, true, RecurseCopy_Callback, &baton); 723 return baton.error; 724 } 725 } break; 726 727 case fs::file_type::regular_file: 728 llvm::sys::fs::remove(fixed_dst.GetPath()); 729 error = PutFile(src, fixed_dst); 730 break; 731 732 case fs::file_type::symlink_file: { 733 llvm::sys::fs::remove(fixed_dst.GetPath()); 734 FileSpec src_resolved; 735 error = FileSystem::Instance().Readlink(src, src_resolved); 736 if (error.Success()) 737 error = CreateSymlink(dst, src_resolved); 738 } break; 739 case fs::file_type::fifo_file: 740 error.SetErrorString("platform install doesn't handle pipes"); 741 break; 742 case fs::file_type::socket_file: 743 error.SetErrorString("platform install doesn't handle sockets"); 744 break; 745 default: 746 error.SetErrorString( 747 "platform install doesn't handle non file or directory items"); 748 break; 749 } 750 } 751 return error; 752 } 753 754 bool Platform::SetWorkingDirectory(const FileSpec &file_spec) { 755 if (IsHost()) { 756 Log *log = GetLogIfAnyCategoriesSet(LIBLLDB_LOG_PLATFORM); 757 LLDB_LOG(log, "{0}", file_spec); 758 if (std::error_code ec = llvm::sys::fs::set_current_path(file_spec.GetPath())) { 759 LLDB_LOG(log, "error: {0}", ec.message()); 760 return false; 761 } 762 return true; 763 } else { 764 m_working_dir.Clear(); 765 return SetRemoteWorkingDirectory(file_spec); 766 } 767 } 768 769 Status Platform::MakeDirectory(const FileSpec &file_spec, 770 uint32_t permissions) { 771 if (IsHost()) 772 return llvm::sys::fs::create_directory(file_spec.GetPath(), permissions); 773 else { 774 Status error; 775 error.SetErrorStringWithFormat("remote platform %s doesn't support %s", 776 GetPluginName().GetCString(), 777 LLVM_PRETTY_FUNCTION); 778 return error; 779 } 780 } 781 782 Status Platform::GetFilePermissions(const FileSpec &file_spec, 783 uint32_t &file_permissions) { 784 if (IsHost()) { 785 auto Value = llvm::sys::fs::getPermissions(file_spec.GetPath()); 786 if (Value) 787 file_permissions = Value.get(); 788 return Status(Value.getError()); 789 } else { 790 Status error; 791 error.SetErrorStringWithFormat("remote platform %s doesn't support %s", 792 GetPluginName().GetCString(), 793 LLVM_PRETTY_FUNCTION); 794 return error; 795 } 796 } 797 798 Status Platform::SetFilePermissions(const FileSpec &file_spec, 799 uint32_t file_permissions) { 800 if (IsHost()) { 801 auto Perms = static_cast<llvm::sys::fs::perms>(file_permissions); 802 return llvm::sys::fs::setPermissions(file_spec.GetPath(), Perms); 803 } else { 804 Status error; 805 error.SetErrorStringWithFormat("remote platform %s doesn't support %s", 806 GetPluginName().GetCString(), 807 LLVM_PRETTY_FUNCTION); 808 return error; 809 } 810 } 811 812 ConstString Platform::GetName() { return GetPluginName(); } 813 814 const char *Platform::GetHostname() { 815 if (IsHost()) 816 return "127.0.0.1"; 817 818 if (m_name.empty()) 819 return nullptr; 820 return m_name.c_str(); 821 } 822 823 ConstString Platform::GetFullNameForDylib(ConstString basename) { 824 return basename; 825 } 826 827 bool Platform::SetRemoteWorkingDirectory(const FileSpec &working_dir) { 828 Log *log = GetLogIfAnyCategoriesSet(LIBLLDB_LOG_PLATFORM); 829 if (log) 830 log->Printf("Platform::SetRemoteWorkingDirectory('%s')", 831 working_dir.GetCString()); 832 m_working_dir = working_dir; 833 return true; 834 } 835 836 const char *Platform::GetUserName(uint32_t uid) { 837 #if !defined(LLDB_DISABLE_POSIX) 838 const char *user_name = GetCachedUserName(uid); 839 if (user_name) 840 return user_name; 841 if (IsHost()) { 842 std::string name; 843 if (HostInfo::LookupUserName(uid, name)) 844 return SetCachedUserName(uid, name.c_str(), name.size()); 845 } 846 #endif 847 return nullptr; 848 } 849 850 const char *Platform::GetGroupName(uint32_t gid) { 851 #if !defined(LLDB_DISABLE_POSIX) 852 const char *group_name = GetCachedGroupName(gid); 853 if (group_name) 854 return group_name; 855 if (IsHost()) { 856 std::string name; 857 if (HostInfo::LookupGroupName(gid, name)) 858 return SetCachedGroupName(gid, name.c_str(), name.size()); 859 } 860 #endif 861 return nullptr; 862 } 863 864 bool Platform::SetOSVersion(llvm::VersionTuple version) { 865 if (IsHost()) { 866 // We don't need anyone setting the OS version for the host platform, we 867 // should be able to figure it out by calling HostInfo::GetOSVersion(...). 868 return false; 869 } else { 870 // We have a remote platform, allow setting the target OS version if we 871 // aren't connected, since if we are connected, we should be able to 872 // request the remote OS version from the connected platform. 873 if (IsConnected()) 874 return false; 875 else { 876 // We aren't connected and we might want to set the OS version ahead of 877 // time before we connect so we can peruse files and use a local SDK or 878 // PDK cache of support files to disassemble or do other things. 879 m_os_version = version; 880 return true; 881 } 882 } 883 return false; 884 } 885 886 Status 887 Platform::ResolveExecutable(const ModuleSpec &module_spec, 888 lldb::ModuleSP &exe_module_sp, 889 const FileSpecList *module_search_paths_ptr) { 890 Status error; 891 if (FileSystem::Instance().Exists(module_spec.GetFileSpec())) { 892 if (module_spec.GetArchitecture().IsValid()) { 893 error = ModuleList::GetSharedModule(module_spec, exe_module_sp, 894 module_search_paths_ptr, nullptr, 895 nullptr); 896 } else { 897 // No valid architecture was specified, ask the platform for the 898 // architectures that we should be using (in the correct order) and see 899 // if we can find a match that way 900 ModuleSpec arch_module_spec(module_spec); 901 for (uint32_t idx = 0; GetSupportedArchitectureAtIndex( 902 idx, arch_module_spec.GetArchitecture()); 903 ++idx) { 904 error = ModuleList::GetSharedModule(arch_module_spec, exe_module_sp, 905 module_search_paths_ptr, nullptr, 906 nullptr); 907 // Did we find an executable using one of the 908 if (error.Success() && exe_module_sp) 909 break; 910 } 911 } 912 } else { 913 error.SetErrorStringWithFormat("'%s' does not exist", 914 module_spec.GetFileSpec().GetPath().c_str()); 915 } 916 return error; 917 } 918 919 Status Platform::ResolveSymbolFile(Target &target, const ModuleSpec &sym_spec, 920 FileSpec &sym_file) { 921 Status error; 922 if (FileSystem::Instance().Exists(sym_spec.GetSymbolFileSpec())) 923 sym_file = sym_spec.GetSymbolFileSpec(); 924 else 925 error.SetErrorString("unable to resolve symbol file"); 926 return error; 927 } 928 929 bool Platform::ResolveRemotePath(const FileSpec &platform_path, 930 FileSpec &resolved_platform_path) { 931 resolved_platform_path = platform_path; 932 FileSystem::Instance().Resolve(resolved_platform_path); 933 return true; 934 } 935 936 const ArchSpec &Platform::GetSystemArchitecture() { 937 if (IsHost()) { 938 if (!m_system_arch.IsValid()) { 939 // We have a local host platform 940 m_system_arch = HostInfo::GetArchitecture(); 941 m_system_arch_set_while_connected = m_system_arch.IsValid(); 942 } 943 } else { 944 // We have a remote platform. We can only fetch the remote system 945 // architecture if we are connected, and we don't want to do it more than 946 // once. 947 948 const bool is_connected = IsConnected(); 949 950 bool fetch = false; 951 if (m_system_arch.IsValid()) { 952 // We have valid OS version info, check to make sure it wasn't manually 953 // set prior to connecting. If it was manually set prior to connecting, 954 // then lets fetch the actual OS version info if we are now connected. 955 if (is_connected && !m_system_arch_set_while_connected) 956 fetch = true; 957 } else { 958 // We don't have valid OS version info, fetch it if we are connected 959 fetch = is_connected; 960 } 961 962 if (fetch) { 963 m_system_arch = GetRemoteSystemArchitecture(); 964 m_system_arch_set_while_connected = m_system_arch.IsValid(); 965 } 966 } 967 return m_system_arch; 968 } 969 970 ArchSpec Platform::GetAugmentedArchSpec(llvm::StringRef triple) { 971 if (triple.empty()) 972 return ArchSpec(); 973 llvm::Triple normalized_triple(llvm::Triple::normalize(triple)); 974 if (!ArchSpec::ContainsOnlyArch(normalized_triple)) 975 return ArchSpec(triple); 976 977 if (auto kind = HostInfo::ParseArchitectureKind(triple)) 978 return HostInfo::GetArchitecture(*kind); 979 980 ArchSpec compatible_arch; 981 ArchSpec raw_arch(triple); 982 if (!IsCompatibleArchitecture(raw_arch, false, &compatible_arch)) 983 return raw_arch; 984 985 if (!compatible_arch.IsValid()) 986 return ArchSpec(normalized_triple); 987 988 const llvm::Triple &compatible_triple = compatible_arch.GetTriple(); 989 if (normalized_triple.getVendorName().empty()) 990 normalized_triple.setVendor(compatible_triple.getVendor()); 991 if (normalized_triple.getOSName().empty()) 992 normalized_triple.setOS(compatible_triple.getOS()); 993 if (normalized_triple.getEnvironmentName().empty()) 994 normalized_triple.setEnvironment(compatible_triple.getEnvironment()); 995 return ArchSpec(normalized_triple); 996 } 997 998 Status Platform::ConnectRemote(Args &args) { 999 Status error; 1000 if (IsHost()) 1001 error.SetErrorStringWithFormat("The currently selected platform (%s) is " 1002 "the host platform and is always connected.", 1003 GetPluginName().GetCString()); 1004 else 1005 error.SetErrorStringWithFormat( 1006 "Platform::ConnectRemote() is not supported by %s", 1007 GetPluginName().GetCString()); 1008 return error; 1009 } 1010 1011 Status Platform::DisconnectRemote() { 1012 Status error; 1013 if (IsHost()) 1014 error.SetErrorStringWithFormat("The currently selected platform (%s) is " 1015 "the host platform and is always connected.", 1016 GetPluginName().GetCString()); 1017 else 1018 error.SetErrorStringWithFormat( 1019 "Platform::DisconnectRemote() is not supported by %s", 1020 GetPluginName().GetCString()); 1021 return error; 1022 } 1023 1024 bool Platform::GetProcessInfo(lldb::pid_t pid, 1025 ProcessInstanceInfo &process_info) { 1026 // Take care of the host case so that each subclass can just call this 1027 // function to get the host functionality. 1028 if (IsHost()) 1029 return Host::GetProcessInfo(pid, process_info); 1030 return false; 1031 } 1032 1033 uint32_t Platform::FindProcesses(const ProcessInstanceInfoMatch &match_info, 1034 ProcessInstanceInfoList &process_infos) { 1035 // Take care of the host case so that each subclass can just call this 1036 // function to get the host functionality. 1037 uint32_t match_count = 0; 1038 if (IsHost()) 1039 match_count = Host::FindProcesses(match_info, process_infos); 1040 return match_count; 1041 } 1042 1043 Status Platform::LaunchProcess(ProcessLaunchInfo &launch_info) { 1044 Status error; 1045 Log *log(lldb_private::GetLogIfAllCategoriesSet(LIBLLDB_LOG_PLATFORM)); 1046 if (log) 1047 log->Printf("Platform::%s()", __FUNCTION__); 1048 1049 // Take care of the host case so that each subclass can just call this 1050 // function to get the host functionality. 1051 if (IsHost()) { 1052 if (::getenv("LLDB_LAUNCH_FLAG_LAUNCH_IN_TTY")) 1053 launch_info.GetFlags().Set(eLaunchFlagLaunchInTTY); 1054 1055 if (launch_info.GetFlags().Test(eLaunchFlagLaunchInShell)) { 1056 const bool is_localhost = true; 1057 const bool will_debug = launch_info.GetFlags().Test(eLaunchFlagDebug); 1058 const bool first_arg_is_full_shell_command = false; 1059 uint32_t num_resumes = GetResumeCountForLaunchInfo(launch_info); 1060 if (log) { 1061 const FileSpec &shell = launch_info.GetShell(); 1062 const char *shell_str = (shell) ? shell.GetPath().c_str() : "<null>"; 1063 log->Printf( 1064 "Platform::%s GetResumeCountForLaunchInfo() returned %" PRIu32 1065 ", shell is '%s'", 1066 __FUNCTION__, num_resumes, shell_str); 1067 } 1068 1069 if (!launch_info.ConvertArgumentsForLaunchingInShell( 1070 error, is_localhost, will_debug, first_arg_is_full_shell_command, 1071 num_resumes)) 1072 return error; 1073 } else if (launch_info.GetFlags().Test(eLaunchFlagShellExpandArguments)) { 1074 error = ShellExpandArguments(launch_info); 1075 if (error.Fail()) { 1076 error.SetErrorStringWithFormat("shell expansion failed (reason: %s). " 1077 "consider launching with 'process " 1078 "launch'.", 1079 error.AsCString("unknown")); 1080 return error; 1081 } 1082 } 1083 1084 if (log) 1085 log->Printf("Platform::%s final launch_info resume count: %" PRIu32, 1086 __FUNCTION__, launch_info.GetResumeCount()); 1087 1088 error = Host::LaunchProcess(launch_info); 1089 } else 1090 error.SetErrorString( 1091 "base lldb_private::Platform class can't launch remote processes"); 1092 return error; 1093 } 1094 1095 Status Platform::ShellExpandArguments(ProcessLaunchInfo &launch_info) { 1096 if (IsHost()) 1097 return Host::ShellExpandArguments(launch_info); 1098 return Status("base lldb_private::Platform class can't expand arguments"); 1099 } 1100 1101 Status Platform::KillProcess(const lldb::pid_t pid) { 1102 Log *log(lldb_private::GetLogIfAllCategoriesSet(LIBLLDB_LOG_PLATFORM)); 1103 if (log) 1104 log->Printf("Platform::%s, pid %" PRIu64, __FUNCTION__, pid); 1105 1106 // Try to find a process plugin to handle this Kill request. If we can't, 1107 // fall back to the default OS implementation. 1108 size_t num_debuggers = Debugger::GetNumDebuggers(); 1109 for (size_t didx = 0; didx < num_debuggers; ++didx) { 1110 DebuggerSP debugger = Debugger::GetDebuggerAtIndex(didx); 1111 lldb_private::TargetList &targets = debugger->GetTargetList(); 1112 for (int tidx = 0; tidx < targets.GetNumTargets(); ++tidx) { 1113 ProcessSP process = targets.GetTargetAtIndex(tidx)->GetProcessSP(); 1114 if (process->GetID() == pid) 1115 return process->Destroy(true); 1116 } 1117 } 1118 1119 if (!IsHost()) { 1120 return Status( 1121 "base lldb_private::Platform class can't kill remote processes unless " 1122 "they are controlled by a process plugin"); 1123 } 1124 Host::Kill(pid, SIGTERM); 1125 return Status(); 1126 } 1127 1128 lldb::ProcessSP 1129 Platform::DebugProcess(ProcessLaunchInfo &launch_info, Debugger &debugger, 1130 Target *target, // Can be nullptr, if nullptr create a 1131 // new target, else use existing one 1132 Status &error) { 1133 Log *log(lldb_private::GetLogIfAllCategoriesSet(LIBLLDB_LOG_PLATFORM)); 1134 if (log) 1135 log->Printf("Platform::%s entered (target %p)", __FUNCTION__, 1136 static_cast<void *>(target)); 1137 1138 ProcessSP process_sp; 1139 // Make sure we stop at the entry point 1140 launch_info.GetFlags().Set(eLaunchFlagDebug); 1141 // We always launch the process we are going to debug in a separate process 1142 // group, since then we can handle ^C interrupts ourselves w/o having to 1143 // worry about the target getting them as well. 1144 launch_info.SetLaunchInSeparateProcessGroup(true); 1145 1146 // Allow any StructuredData process-bound plugins to adjust the launch info 1147 // if needed 1148 size_t i = 0; 1149 bool iteration_complete = false; 1150 // Note iteration can't simply go until a nullptr callback is returned, as it 1151 // is valid for a plugin to not supply a filter. 1152 auto get_filter_func = PluginManager::GetStructuredDataFilterCallbackAtIndex; 1153 for (auto filter_callback = get_filter_func(i, iteration_complete); 1154 !iteration_complete; 1155 filter_callback = get_filter_func(++i, iteration_complete)) { 1156 if (filter_callback) { 1157 // Give this ProcessLaunchInfo filter a chance to adjust the launch info. 1158 error = (*filter_callback)(launch_info, target); 1159 if (!error.Success()) { 1160 if (log) 1161 log->Printf("Platform::%s() StructuredDataPlugin launch " 1162 "filter failed.", 1163 __FUNCTION__); 1164 return process_sp; 1165 } 1166 } 1167 } 1168 1169 error = LaunchProcess(launch_info); 1170 if (error.Success()) { 1171 if (log) 1172 log->Printf("Platform::%s LaunchProcess() call succeeded (pid=%" PRIu64 1173 ")", 1174 __FUNCTION__, launch_info.GetProcessID()); 1175 if (launch_info.GetProcessID() != LLDB_INVALID_PROCESS_ID) { 1176 ProcessAttachInfo attach_info(launch_info); 1177 process_sp = Attach(attach_info, debugger, target, error); 1178 if (process_sp) { 1179 if (log) 1180 log->Printf("Platform::%s Attach() succeeded, Process plugin: %s", 1181 __FUNCTION__, process_sp->GetPluginName().AsCString()); 1182 launch_info.SetHijackListener(attach_info.GetHijackListener()); 1183 1184 // Since we attached to the process, it will think it needs to detach 1185 // if the process object just goes away without an explicit call to 1186 // Process::Kill() or Process::Detach(), so let it know to kill the 1187 // process if this happens. 1188 process_sp->SetShouldDetach(false); 1189 1190 // If we didn't have any file actions, the pseudo terminal might have 1191 // been used where the slave side was given as the file to open for 1192 // stdin/out/err after we have already opened the master so we can 1193 // read/write stdin/out/err. 1194 int pty_fd = launch_info.GetPTY().ReleaseMasterFileDescriptor(); 1195 if (pty_fd != PseudoTerminal::invalid_fd) { 1196 process_sp->SetSTDIOFileDescriptor(pty_fd); 1197 } 1198 } else { 1199 if (log) 1200 log->Printf("Platform::%s Attach() failed: %s", __FUNCTION__, 1201 error.AsCString()); 1202 } 1203 } else { 1204 if (log) 1205 log->Printf("Platform::%s LaunchProcess() returned launch_info with " 1206 "invalid process id", 1207 __FUNCTION__); 1208 } 1209 } else { 1210 if (log) 1211 log->Printf("Platform::%s LaunchProcess() failed: %s", __FUNCTION__, 1212 error.AsCString()); 1213 } 1214 1215 return process_sp; 1216 } 1217 1218 lldb::PlatformSP 1219 Platform::GetPlatformForArchitecture(const ArchSpec &arch, 1220 ArchSpec *platform_arch_ptr) { 1221 lldb::PlatformSP platform_sp; 1222 Status error; 1223 if (arch.IsValid()) 1224 platform_sp = Platform::Create(arch, platform_arch_ptr, error); 1225 return platform_sp; 1226 } 1227 1228 //------------------------------------------------------------------ 1229 /// Lets a platform answer if it is compatible with a given 1230 /// architecture and the target triple contained within. 1231 //------------------------------------------------------------------ 1232 bool Platform::IsCompatibleArchitecture(const ArchSpec &arch, 1233 bool exact_arch_match, 1234 ArchSpec *compatible_arch_ptr) { 1235 // If the architecture is invalid, we must answer true... 1236 if (arch.IsValid()) { 1237 ArchSpec platform_arch; 1238 // Try for an exact architecture match first. 1239 if (exact_arch_match) { 1240 for (uint32_t arch_idx = 0; 1241 GetSupportedArchitectureAtIndex(arch_idx, platform_arch); 1242 ++arch_idx) { 1243 if (arch.IsExactMatch(platform_arch)) { 1244 if (compatible_arch_ptr) 1245 *compatible_arch_ptr = platform_arch; 1246 return true; 1247 } 1248 } 1249 } else { 1250 for (uint32_t arch_idx = 0; 1251 GetSupportedArchitectureAtIndex(arch_idx, platform_arch); 1252 ++arch_idx) { 1253 if (arch.IsCompatibleMatch(platform_arch)) { 1254 if (compatible_arch_ptr) 1255 *compatible_arch_ptr = platform_arch; 1256 return true; 1257 } 1258 } 1259 } 1260 } 1261 if (compatible_arch_ptr) 1262 compatible_arch_ptr->Clear(); 1263 return false; 1264 } 1265 1266 Status Platform::PutFile(const FileSpec &source, const FileSpec &destination, 1267 uint32_t uid, uint32_t gid) { 1268 Log *log(lldb_private::GetLogIfAllCategoriesSet(LIBLLDB_LOG_PLATFORM)); 1269 if (log) 1270 log->Printf("[PutFile] Using block by block transfer....\n"); 1271 1272 uint32_t source_open_options = 1273 File::eOpenOptionRead | File::eOpenOptionCloseOnExec; 1274 namespace fs = llvm::sys::fs; 1275 if (fs::is_symlink_file(source.GetPath())) 1276 source_open_options |= File::eOpenOptionDontFollowSymlinks; 1277 1278 File source_file; 1279 Status error = FileSystem::Instance().Open( 1280 source_file, source, source_open_options, lldb::eFilePermissionsUserRW); 1281 uint32_t permissions = source_file.GetPermissions(error); 1282 if (permissions == 0) 1283 permissions = lldb::eFilePermissionsFileDefault; 1284 1285 if (!source_file.IsValid()) 1286 return Status("PutFile: unable to open source file"); 1287 lldb::user_id_t dest_file = OpenFile( 1288 destination, File::eOpenOptionCanCreate | File::eOpenOptionWrite | 1289 File::eOpenOptionTruncate | File::eOpenOptionCloseOnExec, 1290 permissions, error); 1291 if (log) 1292 log->Printf("dest_file = %" PRIu64 "\n", dest_file); 1293 1294 if (error.Fail()) 1295 return error; 1296 if (dest_file == UINT64_MAX) 1297 return Status("unable to open target file"); 1298 lldb::DataBufferSP buffer_sp(new DataBufferHeap(1024 * 16, 0)); 1299 uint64_t offset = 0; 1300 for (;;) { 1301 size_t bytes_read = buffer_sp->GetByteSize(); 1302 error = source_file.Read(buffer_sp->GetBytes(), bytes_read); 1303 if (error.Fail() || bytes_read == 0) 1304 break; 1305 1306 const uint64_t bytes_written = 1307 WriteFile(dest_file, offset, buffer_sp->GetBytes(), bytes_read, error); 1308 if (error.Fail()) 1309 break; 1310 1311 offset += bytes_written; 1312 if (bytes_written != bytes_read) { 1313 // We didn't write the correct number of bytes, so adjust the file 1314 // position in the source file we are reading from... 1315 source_file.SeekFromStart(offset); 1316 } 1317 } 1318 CloseFile(dest_file, error); 1319 1320 if (uid == UINT32_MAX && gid == UINT32_MAX) 1321 return error; 1322 1323 // TODO: ChownFile? 1324 1325 return error; 1326 } 1327 1328 Status Platform::GetFile(const FileSpec &source, const FileSpec &destination) { 1329 Status error("unimplemented"); 1330 return error; 1331 } 1332 1333 Status 1334 Platform::CreateSymlink(const FileSpec &src, // The name of the link is in src 1335 const FileSpec &dst) // The symlink points to dst 1336 { 1337 Status error("unimplemented"); 1338 return error; 1339 } 1340 1341 bool Platform::GetFileExists(const lldb_private::FileSpec &file_spec) { 1342 return false; 1343 } 1344 1345 Status Platform::Unlink(const FileSpec &path) { 1346 Status error("unimplemented"); 1347 return error; 1348 } 1349 1350 MmapArgList Platform::GetMmapArgumentList(const ArchSpec &arch, addr_t addr, 1351 addr_t length, unsigned prot, 1352 unsigned flags, addr_t fd, 1353 addr_t offset) { 1354 uint64_t flags_platform = 0; 1355 if (flags & eMmapFlagsPrivate) 1356 flags_platform |= MAP_PRIVATE; 1357 if (flags & eMmapFlagsAnon) 1358 flags_platform |= MAP_ANON; 1359 1360 MmapArgList args({addr, length, prot, flags_platform, fd, offset}); 1361 return args; 1362 } 1363 1364 lldb_private::Status Platform::RunShellCommand( 1365 const char *command, // Shouldn't be nullptr 1366 const FileSpec & 1367 working_dir, // Pass empty FileSpec to use the current working directory 1368 int *status_ptr, // Pass nullptr if you don't want the process exit status 1369 int *signo_ptr, // Pass nullptr if you don't want the signal that caused the 1370 // process to exit 1371 std::string 1372 *command_output, // Pass nullptr if you don't want the command output 1373 const Timeout<std::micro> &timeout) { 1374 if (IsHost()) 1375 return Host::RunShellCommand(command, working_dir, status_ptr, signo_ptr, 1376 command_output, timeout); 1377 else 1378 return Status("unimplemented"); 1379 } 1380 1381 bool Platform::CalculateMD5(const FileSpec &file_spec, uint64_t &low, 1382 uint64_t &high) { 1383 if (!IsHost()) 1384 return false; 1385 auto Result = llvm::sys::fs::md5_contents(file_spec.GetPath()); 1386 if (!Result) 1387 return false; 1388 std::tie(high, low) = Result->words(); 1389 return true; 1390 } 1391 1392 void Platform::SetLocalCacheDirectory(const char *local) { 1393 m_local_cache_directory.assign(local); 1394 } 1395 1396 const char *Platform::GetLocalCacheDirectory() { 1397 return m_local_cache_directory.c_str(); 1398 } 1399 1400 static constexpr OptionDefinition g_rsync_option_table[] = { 1401 {LLDB_OPT_SET_ALL, false, "rsync", 'r', OptionParser::eNoArgument, nullptr, 1402 {}, 0, eArgTypeNone, "Enable rsync."}, 1403 {LLDB_OPT_SET_ALL, false, "rsync-opts", 'R', 1404 OptionParser::eRequiredArgument, nullptr, {}, 0, eArgTypeCommandName, 1405 "Platform-specific options required for rsync to work."}, 1406 {LLDB_OPT_SET_ALL, false, "rsync-prefix", 'P', 1407 OptionParser::eRequiredArgument, nullptr, {}, 0, eArgTypeCommandName, 1408 "Platform-specific rsync prefix put before the remote path."}, 1409 {LLDB_OPT_SET_ALL, false, "ignore-remote-hostname", 'i', 1410 OptionParser::eNoArgument, nullptr, {}, 0, eArgTypeNone, 1411 "Do not automatically fill in the remote hostname when composing the " 1412 "rsync command."}, 1413 }; 1414 1415 static constexpr OptionDefinition g_ssh_option_table[] = { 1416 {LLDB_OPT_SET_ALL, false, "ssh", 's', OptionParser::eNoArgument, nullptr, 1417 {}, 0, eArgTypeNone, "Enable SSH."}, 1418 {LLDB_OPT_SET_ALL, false, "ssh-opts", 'S', OptionParser::eRequiredArgument, 1419 nullptr, {}, 0, eArgTypeCommandName, 1420 "Platform-specific options required for SSH to work."}, 1421 }; 1422 1423 static constexpr OptionDefinition g_caching_option_table[] = { 1424 {LLDB_OPT_SET_ALL, false, "local-cache-dir", 'c', 1425 OptionParser::eRequiredArgument, nullptr, {}, 0, eArgTypePath, 1426 "Path in which to store local copies of files."}, 1427 }; 1428 1429 llvm::ArrayRef<OptionDefinition> OptionGroupPlatformRSync::GetDefinitions() { 1430 return llvm::makeArrayRef(g_rsync_option_table); 1431 } 1432 1433 void OptionGroupPlatformRSync::OptionParsingStarting( 1434 ExecutionContext *execution_context) { 1435 m_rsync = false; 1436 m_rsync_opts.clear(); 1437 m_rsync_prefix.clear(); 1438 m_ignores_remote_hostname = false; 1439 } 1440 1441 lldb_private::Status 1442 OptionGroupPlatformRSync::SetOptionValue(uint32_t option_idx, 1443 llvm::StringRef option_arg, 1444 ExecutionContext *execution_context) { 1445 Status error; 1446 char short_option = (char)GetDefinitions()[option_idx].short_option; 1447 switch (short_option) { 1448 case 'r': 1449 m_rsync = true; 1450 break; 1451 1452 case 'R': 1453 m_rsync_opts.assign(option_arg); 1454 break; 1455 1456 case 'P': 1457 m_rsync_prefix.assign(option_arg); 1458 break; 1459 1460 case 'i': 1461 m_ignores_remote_hostname = true; 1462 break; 1463 1464 default: 1465 error.SetErrorStringWithFormat("unrecognized option '%c'", short_option); 1466 break; 1467 } 1468 1469 return error; 1470 } 1471 1472 lldb::BreakpointSP 1473 Platform::SetThreadCreationBreakpoint(lldb_private::Target &target) { 1474 return lldb::BreakpointSP(); 1475 } 1476 1477 llvm::ArrayRef<OptionDefinition> OptionGroupPlatformSSH::GetDefinitions() { 1478 return llvm::makeArrayRef(g_ssh_option_table); 1479 } 1480 1481 void OptionGroupPlatformSSH::OptionParsingStarting( 1482 ExecutionContext *execution_context) { 1483 m_ssh = false; 1484 m_ssh_opts.clear(); 1485 } 1486 1487 lldb_private::Status 1488 OptionGroupPlatformSSH::SetOptionValue(uint32_t option_idx, 1489 llvm::StringRef option_arg, 1490 ExecutionContext *execution_context) { 1491 Status error; 1492 char short_option = (char)GetDefinitions()[option_idx].short_option; 1493 switch (short_option) { 1494 case 's': 1495 m_ssh = true; 1496 break; 1497 1498 case 'S': 1499 m_ssh_opts.assign(option_arg); 1500 break; 1501 1502 default: 1503 error.SetErrorStringWithFormat("unrecognized option '%c'", short_option); 1504 break; 1505 } 1506 1507 return error; 1508 } 1509 1510 llvm::ArrayRef<OptionDefinition> OptionGroupPlatformCaching::GetDefinitions() { 1511 return llvm::makeArrayRef(g_caching_option_table); 1512 } 1513 1514 void OptionGroupPlatformCaching::OptionParsingStarting( 1515 ExecutionContext *execution_context) { 1516 m_cache_dir.clear(); 1517 } 1518 1519 lldb_private::Status OptionGroupPlatformCaching::SetOptionValue( 1520 uint32_t option_idx, llvm::StringRef option_arg, 1521 ExecutionContext *execution_context) { 1522 Status error; 1523 char short_option = (char)GetDefinitions()[option_idx].short_option; 1524 switch (short_option) { 1525 case 'c': 1526 m_cache_dir.assign(option_arg); 1527 break; 1528 1529 default: 1530 error.SetErrorStringWithFormat("unrecognized option '%c'", short_option); 1531 break; 1532 } 1533 1534 return error; 1535 } 1536 1537 Environment Platform::GetEnvironment() { return Environment(); } 1538 1539 const std::vector<ConstString> &Platform::GetTrapHandlerSymbolNames() { 1540 if (!m_calculated_trap_handlers) { 1541 std::lock_guard<std::mutex> guard(m_mutex); 1542 if (!m_calculated_trap_handlers) { 1543 CalculateTrapHandlerSymbolNames(); 1544 m_calculated_trap_handlers = true; 1545 } 1546 } 1547 return m_trap_handlers; 1548 } 1549 1550 Status Platform::GetCachedExecutable( 1551 ModuleSpec &module_spec, lldb::ModuleSP &module_sp, 1552 const FileSpecList *module_search_paths_ptr, Platform &remote_platform) { 1553 const auto platform_spec = module_spec.GetFileSpec(); 1554 const auto error = LoadCachedExecutable( 1555 module_spec, module_sp, module_search_paths_ptr, remote_platform); 1556 if (error.Success()) { 1557 module_spec.GetFileSpec() = module_sp->GetFileSpec(); 1558 module_spec.GetPlatformFileSpec() = platform_spec; 1559 } 1560 1561 return error; 1562 } 1563 1564 Status Platform::LoadCachedExecutable( 1565 const ModuleSpec &module_spec, lldb::ModuleSP &module_sp, 1566 const FileSpecList *module_search_paths_ptr, Platform &remote_platform) { 1567 return GetRemoteSharedModule(module_spec, nullptr, module_sp, 1568 [&](const ModuleSpec &spec) { 1569 return remote_platform.ResolveExecutable( 1570 spec, module_sp, module_search_paths_ptr); 1571 }, 1572 nullptr); 1573 } 1574 1575 Status Platform::GetRemoteSharedModule(const ModuleSpec &module_spec, 1576 Process *process, 1577 lldb::ModuleSP &module_sp, 1578 const ModuleResolver &module_resolver, 1579 bool *did_create_ptr) { 1580 // Get module information from a target. 1581 ModuleSpec resolved_module_spec; 1582 bool got_module_spec = false; 1583 if (process) { 1584 // Try to get module information from the process 1585 if (process->GetModuleSpec(module_spec.GetFileSpec(), 1586 module_spec.GetArchitecture(), 1587 resolved_module_spec)) { 1588 if (!module_spec.GetUUID().IsValid() || 1589 module_spec.GetUUID() == resolved_module_spec.GetUUID()) { 1590 got_module_spec = true; 1591 } 1592 } 1593 } 1594 1595 if (!module_spec.GetArchitecture().IsValid()) { 1596 Status error; 1597 // No valid architecture was specified, ask the platform for the 1598 // architectures that we should be using (in the correct order) and see if 1599 // we can find a match that way 1600 ModuleSpec arch_module_spec(module_spec); 1601 for (uint32_t idx = 0; GetSupportedArchitectureAtIndex( 1602 idx, arch_module_spec.GetArchitecture()); 1603 ++idx) { 1604 error = ModuleList::GetSharedModule(arch_module_spec, module_sp, nullptr, 1605 nullptr, nullptr); 1606 // Did we find an executable using one of the 1607 if (error.Success() && module_sp) 1608 break; 1609 } 1610 if (module_sp) 1611 got_module_spec = true; 1612 } 1613 1614 if (!got_module_spec) { 1615 // Get module information from a target. 1616 if (!GetModuleSpec(module_spec.GetFileSpec(), module_spec.GetArchitecture(), 1617 resolved_module_spec)) { 1618 if (!module_spec.GetUUID().IsValid() || 1619 module_spec.GetUUID() == resolved_module_spec.GetUUID()) { 1620 return module_resolver(module_spec); 1621 } 1622 } 1623 } 1624 1625 // If we are looking for a specific UUID, make sure resolved_module_spec has 1626 // the same one before we search. 1627 if (module_spec.GetUUID().IsValid()) { 1628 resolved_module_spec.GetUUID() = module_spec.GetUUID(); 1629 } 1630 1631 // Trying to find a module by UUID on local file system. 1632 const auto error = module_resolver(resolved_module_spec); 1633 if (error.Fail()) { 1634 if (GetCachedSharedModule(resolved_module_spec, module_sp, did_create_ptr)) 1635 return Status(); 1636 } 1637 1638 return error; 1639 } 1640 1641 bool Platform::GetCachedSharedModule(const ModuleSpec &module_spec, 1642 lldb::ModuleSP &module_sp, 1643 bool *did_create_ptr) { 1644 if (IsHost() || !GetGlobalPlatformProperties()->GetUseModuleCache() || 1645 !GetGlobalPlatformProperties()->GetModuleCacheDirectory()) 1646 return false; 1647 1648 Log *log = GetLogIfAnyCategoriesSet(LIBLLDB_LOG_PLATFORM); 1649 1650 // Check local cache for a module. 1651 auto error = m_module_cache->GetAndPut( 1652 GetModuleCacheRoot(), GetCacheHostname(), module_spec, 1653 [this](const ModuleSpec &module_spec, 1654 const FileSpec &tmp_download_file_spec) { 1655 return DownloadModuleSlice( 1656 module_spec.GetFileSpec(), module_spec.GetObjectOffset(), 1657 module_spec.GetObjectSize(), tmp_download_file_spec); 1658 1659 }, 1660 [this](const ModuleSP &module_sp, 1661 const FileSpec &tmp_download_file_spec) { 1662 return DownloadSymbolFile(module_sp, tmp_download_file_spec); 1663 }, 1664 module_sp, did_create_ptr); 1665 if (error.Success()) 1666 return true; 1667 1668 if (log) 1669 log->Printf("Platform::%s - module %s not found in local cache: %s", 1670 __FUNCTION__, module_spec.GetUUID().GetAsString().c_str(), 1671 error.AsCString()); 1672 return false; 1673 } 1674 1675 Status Platform::DownloadModuleSlice(const FileSpec &src_file_spec, 1676 const uint64_t src_offset, 1677 const uint64_t src_size, 1678 const FileSpec &dst_file_spec) { 1679 Status error; 1680 1681 std::error_code EC; 1682 llvm::raw_fd_ostream dst(dst_file_spec.GetPath(), EC, llvm::sys::fs::F_None); 1683 if (EC) { 1684 error.SetErrorStringWithFormat("unable to open destination file: %s", 1685 dst_file_spec.GetPath().c_str()); 1686 return error; 1687 } 1688 1689 auto src_fd = OpenFile(src_file_spec, File::eOpenOptionRead, 1690 lldb::eFilePermissionsFileDefault, error); 1691 1692 if (error.Fail()) { 1693 error.SetErrorStringWithFormat("unable to open source file: %s", 1694 error.AsCString()); 1695 return error; 1696 } 1697 1698 std::vector<char> buffer(1024); 1699 auto offset = src_offset; 1700 uint64_t total_bytes_read = 0; 1701 while (total_bytes_read < src_size) { 1702 const auto to_read = std::min(static_cast<uint64_t>(buffer.size()), 1703 src_size - total_bytes_read); 1704 const uint64_t n_read = 1705 ReadFile(src_fd, offset, &buffer[0], to_read, error); 1706 if (error.Fail()) 1707 break; 1708 if (n_read == 0) { 1709 error.SetErrorString("read 0 bytes"); 1710 break; 1711 } 1712 offset += n_read; 1713 total_bytes_read += n_read; 1714 dst.write(&buffer[0], n_read); 1715 } 1716 1717 Status close_error; 1718 CloseFile(src_fd, close_error); // Ignoring close error. 1719 1720 return error; 1721 } 1722 1723 Status Platform::DownloadSymbolFile(const lldb::ModuleSP &module_sp, 1724 const FileSpec &dst_file_spec) { 1725 return Status( 1726 "Symbol file downloading not supported by the default platform."); 1727 } 1728 1729 FileSpec Platform::GetModuleCacheRoot() { 1730 auto dir_spec = GetGlobalPlatformProperties()->GetModuleCacheDirectory(); 1731 dir_spec.AppendPathComponent(GetName().AsCString()); 1732 return dir_spec; 1733 } 1734 1735 const char *Platform::GetCacheHostname() { return GetHostname(); } 1736 1737 const UnixSignalsSP &Platform::GetRemoteUnixSignals() { 1738 static const auto s_default_unix_signals_sp = std::make_shared<UnixSignals>(); 1739 return s_default_unix_signals_sp; 1740 } 1741 1742 const UnixSignalsSP &Platform::GetUnixSignals() { 1743 if (IsHost()) 1744 return Host::GetUnixSignals(); 1745 return GetRemoteUnixSignals(); 1746 } 1747 1748 uint32_t Platform::LoadImage(lldb_private::Process *process, 1749 const lldb_private::FileSpec &local_file, 1750 const lldb_private::FileSpec &remote_file, 1751 lldb_private::Status &error) { 1752 if (local_file && remote_file) { 1753 // Both local and remote file was specified. Install the local file to the 1754 // given location. 1755 if (IsRemote() || local_file != remote_file) { 1756 error = Install(local_file, remote_file); 1757 if (error.Fail()) 1758 return LLDB_INVALID_IMAGE_TOKEN; 1759 } 1760 return DoLoadImage(process, remote_file, nullptr, error); 1761 } 1762 1763 if (local_file) { 1764 // Only local file was specified. Install it to the current working 1765 // directory. 1766 FileSpec target_file = GetWorkingDirectory(); 1767 target_file.AppendPathComponent(local_file.GetFilename().AsCString()); 1768 if (IsRemote() || local_file != target_file) { 1769 error = Install(local_file, target_file); 1770 if (error.Fail()) 1771 return LLDB_INVALID_IMAGE_TOKEN; 1772 } 1773 return DoLoadImage(process, target_file, nullptr, error); 1774 } 1775 1776 if (remote_file) { 1777 // Only remote file was specified so we don't have to do any copying 1778 return DoLoadImage(process, remote_file, nullptr, error); 1779 } 1780 1781 error.SetErrorString("Neither local nor remote file was specified"); 1782 return LLDB_INVALID_IMAGE_TOKEN; 1783 } 1784 1785 uint32_t Platform::DoLoadImage(lldb_private::Process *process, 1786 const lldb_private::FileSpec &remote_file, 1787 const std::vector<std::string> *paths, 1788 lldb_private::Status &error, 1789 lldb_private::FileSpec *loaded_image) { 1790 error.SetErrorString("LoadImage is not supported on the current platform"); 1791 return LLDB_INVALID_IMAGE_TOKEN; 1792 } 1793 1794 uint32_t Platform::LoadImageUsingPaths(lldb_private::Process *process, 1795 const lldb_private::FileSpec &remote_filename, 1796 const std::vector<std::string> &paths, 1797 lldb_private::Status &error, 1798 lldb_private::FileSpec *loaded_path) 1799 { 1800 FileSpec file_to_use; 1801 if (remote_filename.IsAbsolute()) 1802 file_to_use = FileSpec(remote_filename.GetFilename().GetStringRef(), 1803 1804 remote_filename.GetPathStyle()); 1805 else 1806 file_to_use = remote_filename; 1807 1808 return DoLoadImage(process, file_to_use, &paths, error, loaded_path); 1809 } 1810 1811 Status Platform::UnloadImage(lldb_private::Process *process, 1812 uint32_t image_token) { 1813 return Status("UnloadImage is not supported on the current platform"); 1814 } 1815 1816 lldb::ProcessSP Platform::ConnectProcess(llvm::StringRef connect_url, 1817 llvm::StringRef plugin_name, 1818 lldb_private::Debugger &debugger, 1819 lldb_private::Target *target, 1820 lldb_private::Status &error) { 1821 error.Clear(); 1822 1823 if (!target) { 1824 ArchSpec arch; 1825 if (target && target->GetArchitecture().IsValid()) 1826 arch = target->GetArchitecture(); 1827 else 1828 arch = Target::GetDefaultArchitecture(); 1829 1830 const char *triple = ""; 1831 if (arch.IsValid()) 1832 triple = arch.GetTriple().getTriple().c_str(); 1833 1834 TargetSP new_target_sp; 1835 error = debugger.GetTargetList().CreateTarget( 1836 debugger, "", triple, eLoadDependentsNo, nullptr, new_target_sp); 1837 target = new_target_sp.get(); 1838 } 1839 1840 if (!target || error.Fail()) 1841 return nullptr; 1842 1843 debugger.GetTargetList().SetSelectedTarget(target); 1844 1845 lldb::ProcessSP process_sp = 1846 target->CreateProcess(debugger.GetListener(), plugin_name, nullptr); 1847 if (!process_sp) 1848 return nullptr; 1849 1850 error = 1851 process_sp->ConnectRemote(debugger.GetOutputFile().get(), connect_url); 1852 if (error.Fail()) 1853 return nullptr; 1854 1855 return process_sp; 1856 } 1857 1858 size_t Platform::ConnectToWaitingProcesses(lldb_private::Debugger &debugger, 1859 lldb_private::Status &error) { 1860 error.Clear(); 1861 return 0; 1862 } 1863 1864 size_t Platform::GetSoftwareBreakpointTrapOpcode(Target &target, 1865 BreakpointSite *bp_site) { 1866 ArchSpec arch = target.GetArchitecture(); 1867 const uint8_t *trap_opcode = nullptr; 1868 size_t trap_opcode_size = 0; 1869 1870 switch (arch.GetMachine()) { 1871 case llvm::Triple::aarch64: { 1872 static const uint8_t g_aarch64_opcode[] = {0x00, 0x00, 0x20, 0xd4}; 1873 trap_opcode = g_aarch64_opcode; 1874 trap_opcode_size = sizeof(g_aarch64_opcode); 1875 } break; 1876 1877 // TODO: support big-endian arm and thumb trap codes. 1878 case llvm::Triple::arm: { 1879 // The ARM reference recommends the use of 0xe7fddefe and 0xdefe but the 1880 // linux kernel does otherwise. 1881 static const uint8_t g_arm_breakpoint_opcode[] = {0xf0, 0x01, 0xf0, 0xe7}; 1882 static const uint8_t g_thumb_breakpoint_opcode[] = {0x01, 0xde}; 1883 1884 lldb::BreakpointLocationSP bp_loc_sp(bp_site->GetOwnerAtIndex(0)); 1885 AddressClass addr_class = AddressClass::eUnknown; 1886 1887 if (bp_loc_sp) { 1888 addr_class = bp_loc_sp->GetAddress().GetAddressClass(); 1889 if (addr_class == AddressClass::eUnknown && 1890 (bp_loc_sp->GetAddress().GetFileAddress() & 1)) 1891 addr_class = AddressClass::eCodeAlternateISA; 1892 } 1893 1894 if (addr_class == AddressClass::eCodeAlternateISA) { 1895 trap_opcode = g_thumb_breakpoint_opcode; 1896 trap_opcode_size = sizeof(g_thumb_breakpoint_opcode); 1897 } else { 1898 trap_opcode = g_arm_breakpoint_opcode; 1899 trap_opcode_size = sizeof(g_arm_breakpoint_opcode); 1900 } 1901 } break; 1902 1903 case llvm::Triple::mips: 1904 case llvm::Triple::mips64: { 1905 static const uint8_t g_hex_opcode[] = {0x00, 0x00, 0x00, 0x0d}; 1906 trap_opcode = g_hex_opcode; 1907 trap_opcode_size = sizeof(g_hex_opcode); 1908 } break; 1909 1910 case llvm::Triple::mipsel: 1911 case llvm::Triple::mips64el: { 1912 static const uint8_t g_hex_opcode[] = {0x0d, 0x00, 0x00, 0x00}; 1913 trap_opcode = g_hex_opcode; 1914 trap_opcode_size = sizeof(g_hex_opcode); 1915 } break; 1916 1917 case llvm::Triple::systemz: { 1918 static const uint8_t g_hex_opcode[] = {0x00, 0x01}; 1919 trap_opcode = g_hex_opcode; 1920 trap_opcode_size = sizeof(g_hex_opcode); 1921 } break; 1922 1923 case llvm::Triple::hexagon: { 1924 static const uint8_t g_hex_opcode[] = {0x0c, 0xdb, 0x00, 0x54}; 1925 trap_opcode = g_hex_opcode; 1926 trap_opcode_size = sizeof(g_hex_opcode); 1927 } break; 1928 1929 case llvm::Triple::ppc: 1930 case llvm::Triple::ppc64: { 1931 static const uint8_t g_ppc_opcode[] = {0x7f, 0xe0, 0x00, 0x08}; 1932 trap_opcode = g_ppc_opcode; 1933 trap_opcode_size = sizeof(g_ppc_opcode); 1934 } break; 1935 1936 case llvm::Triple::ppc64le: { 1937 static const uint8_t g_ppc64le_opcode[] = {0x08, 0x00, 0xe0, 0x7f}; // trap 1938 trap_opcode = g_ppc64le_opcode; 1939 trap_opcode_size = sizeof(g_ppc64le_opcode); 1940 } break; 1941 1942 case llvm::Triple::x86: 1943 case llvm::Triple::x86_64: { 1944 static const uint8_t g_i386_opcode[] = {0xCC}; 1945 trap_opcode = g_i386_opcode; 1946 trap_opcode_size = sizeof(g_i386_opcode); 1947 } break; 1948 1949 default: 1950 llvm_unreachable( 1951 "Unhandled architecture in Platform::GetSoftwareBreakpointTrapOpcode"); 1952 } 1953 1954 assert(bp_site); 1955 if (bp_site->SetTrapOpcode(trap_opcode, trap_opcode_size)) 1956 return trap_opcode_size; 1957 1958 return 0; 1959 } 1960