1 //===-- Platform.cpp --------------------------------------------*- C++ -*-===// 2 // 3 // The LLVM Compiler Infrastructure 4 // 5 // This file is distributed under the University of Illinois Open Source 6 // License. See LICENSE.TXT for details. 7 // 8 //===----------------------------------------------------------------------===// 9 10 // C Includes 11 // C++ Includes 12 #include <algorithm> 13 #include <csignal> 14 #include <fstream> 15 #include <vector> 16 17 // Other libraries and framework includes 18 #include "llvm/Support/FileSystem.h" 19 #include "llvm/Support/Path.h" 20 21 // Project includes 22 #include "lldb/Breakpoint/BreakpointIDList.h" 23 #include "lldb/Breakpoint/BreakpointLocation.h" 24 #include "lldb/Core/Debugger.h" 25 #include "lldb/Core/Module.h" 26 #include "lldb/Core/ModuleSpec.h" 27 #include "lldb/Core/PluginManager.h" 28 #include "lldb/Core/StreamFile.h" 29 #include "lldb/Host/FileSystem.h" 30 #include "lldb/Host/Host.h" 31 #include "lldb/Host/HostInfo.h" 32 #include "lldb/Host/OptionParser.h" 33 #include "lldb/Interpreter/OptionValueProperties.h" 34 #include "lldb/Interpreter/Property.h" 35 #include "lldb/Symbol/ObjectFile.h" 36 #include "lldb/Target/ModuleCache.h" 37 #include "lldb/Target/Platform.h" 38 #include "lldb/Target/Process.h" 39 #include "lldb/Target/Target.h" 40 #include "lldb/Target/UnixSignals.h" 41 #include "lldb/Utility/DataBufferHeap.h" 42 #include "lldb/Utility/FileSpec.h" 43 #include "lldb/Utility/Log.h" 44 #include "lldb/Utility/Status.h" 45 #include "lldb/Utility/StructuredData.h" 46 47 #include "llvm/Support/FileSystem.h" 48 49 // Define these constants from POSIX mman.h rather than include the file so 50 // that they will be correct even when compiled on Linux. 51 #define MAP_PRIVATE 2 52 #define MAP_ANON 0x1000 53 54 using namespace lldb; 55 using namespace lldb_private; 56 57 static uint32_t g_initialize_count = 0; 58 59 // Use a singleton function for g_local_platform_sp to avoid init constructors 60 // since LLDB is often part of a shared library 61 static PlatformSP &GetHostPlatformSP() { 62 static PlatformSP g_platform_sp; 63 return g_platform_sp; 64 } 65 66 const char *Platform::GetHostPlatformName() { return "host"; } 67 68 namespace { 69 70 static constexpr PropertyDefinition g_properties[] = { 71 {"use-module-cache", OptionValue::eTypeBoolean, true, true, nullptr, 72 {}, "Use module cache."}, 73 {"module-cache-directory", OptionValue::eTypeFileSpec, true, 0, nullptr, 74 {}, "Root directory for cached modules."}}; 75 76 enum { ePropertyUseModuleCache, ePropertyModuleCacheDirectory }; 77 78 } // namespace 79 80 ConstString PlatformProperties::GetSettingName() { 81 static ConstString g_setting_name("platform"); 82 return g_setting_name; 83 } 84 85 PlatformProperties::PlatformProperties() { 86 m_collection_sp.reset(new OptionValueProperties(GetSettingName())); 87 m_collection_sp->Initialize(g_properties); 88 89 auto module_cache_dir = GetModuleCacheDirectory(); 90 if (module_cache_dir) 91 return; 92 93 llvm::SmallString<64> user_home_dir; 94 if (!llvm::sys::path::home_directory(user_home_dir)) 95 return; 96 97 module_cache_dir = FileSpec(user_home_dir.c_str(), false); 98 module_cache_dir.AppendPathComponent(".lldb"); 99 module_cache_dir.AppendPathComponent("module_cache"); 100 SetModuleCacheDirectory(module_cache_dir); 101 } 102 103 bool PlatformProperties::GetUseModuleCache() const { 104 const auto idx = ePropertyUseModuleCache; 105 return m_collection_sp->GetPropertyAtIndexAsBoolean( 106 nullptr, idx, g_properties[idx].default_uint_value != 0); 107 } 108 109 bool PlatformProperties::SetUseModuleCache(bool use_module_cache) { 110 return m_collection_sp->SetPropertyAtIndexAsBoolean( 111 nullptr, ePropertyUseModuleCache, use_module_cache); 112 } 113 114 FileSpec PlatformProperties::GetModuleCacheDirectory() const { 115 return m_collection_sp->GetPropertyAtIndexAsFileSpec( 116 nullptr, ePropertyModuleCacheDirectory); 117 } 118 119 bool PlatformProperties::SetModuleCacheDirectory(const FileSpec &dir_spec) { 120 return m_collection_sp->SetPropertyAtIndexAsFileSpec( 121 nullptr, ePropertyModuleCacheDirectory, dir_spec); 122 } 123 124 //------------------------------------------------------------------ 125 /// Get the native host platform plug-in. 126 /// 127 /// There should only be one of these for each host that LLDB runs 128 /// upon that should be statically compiled in and registered using 129 /// preprocessor macros or other similar build mechanisms. 130 /// 131 /// This platform will be used as the default platform when launching 132 /// or attaching to processes unless another platform is specified. 133 //------------------------------------------------------------------ 134 PlatformSP Platform::GetHostPlatform() { return GetHostPlatformSP(); } 135 136 static std::vector<PlatformSP> &GetPlatformList() { 137 static std::vector<PlatformSP> g_platform_list; 138 return g_platform_list; 139 } 140 141 static std::recursive_mutex &GetPlatformListMutex() { 142 static std::recursive_mutex g_mutex; 143 return g_mutex; 144 } 145 146 void Platform::Initialize() { g_initialize_count++; } 147 148 void Platform::Terminate() { 149 if (g_initialize_count > 0) { 150 if (--g_initialize_count == 0) { 151 std::lock_guard<std::recursive_mutex> guard(GetPlatformListMutex()); 152 GetPlatformList().clear(); 153 } 154 } 155 } 156 157 const PlatformPropertiesSP &Platform::GetGlobalPlatformProperties() { 158 static const auto g_settings_sp(std::make_shared<PlatformProperties>()); 159 return g_settings_sp; 160 } 161 162 void Platform::SetHostPlatform(const lldb::PlatformSP &platform_sp) { 163 // The native platform should use its static void Platform::Initialize() 164 // function to register itself as the native platform. 165 GetHostPlatformSP() = platform_sp; 166 167 if (platform_sp) { 168 std::lock_guard<std::recursive_mutex> guard(GetPlatformListMutex()); 169 GetPlatformList().push_back(platform_sp); 170 } 171 } 172 173 Status Platform::GetFileWithUUID(const FileSpec &platform_file, 174 const UUID *uuid_ptr, FileSpec &local_file) { 175 // Default to the local case 176 local_file = platform_file; 177 return Status(); 178 } 179 180 FileSpecList 181 Platform::LocateExecutableScriptingResources(Target *target, Module &module, 182 Stream *feedback_stream) { 183 return FileSpecList(); 184 } 185 186 // PlatformSP 187 // Platform::FindPlugin (Process *process, const ConstString &plugin_name) 188 //{ 189 // PlatformCreateInstance create_callback = nullptr; 190 // if (plugin_name) 191 // { 192 // create_callback = 193 // PluginManager::GetPlatformCreateCallbackForPluginName (plugin_name); 194 // if (create_callback) 195 // { 196 // ArchSpec arch; 197 // if (process) 198 // { 199 // arch = process->GetTarget().GetArchitecture(); 200 // } 201 // PlatformSP platform_sp(create_callback(process, &arch)); 202 // if (platform_sp) 203 // return platform_sp; 204 // } 205 // } 206 // else 207 // { 208 // for (uint32_t idx = 0; (create_callback = 209 // PluginManager::GetPlatformCreateCallbackAtIndex(idx)) != nullptr; 210 // ++idx) 211 // { 212 // PlatformSP platform_sp(create_callback(process, nullptr)); 213 // if (platform_sp) 214 // return platform_sp; 215 // } 216 // } 217 // return PlatformSP(); 218 //} 219 220 Status Platform::GetSharedModule(const ModuleSpec &module_spec, 221 Process *process, ModuleSP &module_sp, 222 const FileSpecList *module_search_paths_ptr, 223 ModuleSP *old_module_sp_ptr, 224 bool *did_create_ptr) { 225 if (IsHost()) 226 return ModuleList::GetSharedModule( 227 module_spec, module_sp, module_search_paths_ptr, old_module_sp_ptr, 228 did_create_ptr, false); 229 230 // Module resolver lambda. 231 auto resolver = [&](const ModuleSpec &spec) { 232 Status error(eErrorTypeGeneric); 233 ModuleSpec resolved_spec; 234 // Check if we have sysroot set. 235 if (m_sdk_sysroot) { 236 // Prepend sysroot to module spec. 237 resolved_spec = spec; 238 resolved_spec.GetFileSpec().PrependPathComponent( 239 m_sdk_sysroot.GetStringRef()); 240 // Try to get shared module with resolved spec. 241 error = ModuleList::GetSharedModule( 242 resolved_spec, module_sp, module_search_paths_ptr, old_module_sp_ptr, 243 did_create_ptr, false); 244 } 245 // If we don't have sysroot or it didn't work then 246 // try original module spec. 247 if (!error.Success()) { 248 resolved_spec = spec; 249 error = ModuleList::GetSharedModule( 250 resolved_spec, module_sp, module_search_paths_ptr, old_module_sp_ptr, 251 did_create_ptr, false); 252 } 253 if (error.Success() && module_sp) 254 module_sp->SetPlatformFileSpec(resolved_spec.GetFileSpec()); 255 return error; 256 }; 257 258 return GetRemoteSharedModule(module_spec, process, module_sp, resolver, 259 did_create_ptr); 260 } 261 262 bool Platform::GetModuleSpec(const FileSpec &module_file_spec, 263 const ArchSpec &arch, ModuleSpec &module_spec) { 264 ModuleSpecList module_specs; 265 if (ObjectFile::GetModuleSpecifications(module_file_spec, 0, 0, 266 module_specs) == 0) 267 return false; 268 269 ModuleSpec matched_module_spec; 270 return module_specs.FindMatchingModuleSpec(ModuleSpec(module_file_spec, arch), 271 module_spec); 272 } 273 274 PlatformSP Platform::Find(const ConstString &name) { 275 if (name) { 276 static ConstString g_host_platform_name("host"); 277 if (name == g_host_platform_name) 278 return GetHostPlatform(); 279 280 std::lock_guard<std::recursive_mutex> guard(GetPlatformListMutex()); 281 for (const auto &platform_sp : GetPlatformList()) { 282 if (platform_sp->GetName() == name) 283 return platform_sp; 284 } 285 } 286 return PlatformSP(); 287 } 288 289 PlatformSP Platform::Create(const ConstString &name, Status &error) { 290 PlatformCreateInstance create_callback = nullptr; 291 lldb::PlatformSP platform_sp; 292 if (name) { 293 static ConstString g_host_platform_name("host"); 294 if (name == g_host_platform_name) 295 return GetHostPlatform(); 296 297 create_callback = 298 PluginManager::GetPlatformCreateCallbackForPluginName(name); 299 if (create_callback) 300 platform_sp = create_callback(true, nullptr); 301 else 302 error.SetErrorStringWithFormat( 303 "unable to find a plug-in for the platform named \"%s\"", 304 name.GetCString()); 305 } else 306 error.SetErrorString("invalid platform name"); 307 308 if (platform_sp) { 309 std::lock_guard<std::recursive_mutex> guard(GetPlatformListMutex()); 310 GetPlatformList().push_back(platform_sp); 311 } 312 313 return platform_sp; 314 } 315 316 PlatformSP Platform::Create(const ArchSpec &arch, ArchSpec *platform_arch_ptr, 317 Status &error) { 318 lldb::PlatformSP platform_sp; 319 if (arch.IsValid()) { 320 // Scope for locker 321 { 322 // First try exact arch matches across all platforms already created 323 std::lock_guard<std::recursive_mutex> guard(GetPlatformListMutex()); 324 for (const auto &platform_sp : GetPlatformList()) { 325 if (platform_sp->IsCompatibleArchitecture(arch, true, 326 platform_arch_ptr)) 327 return platform_sp; 328 } 329 330 // Next try compatible arch matches across all platforms already created 331 for (const auto &platform_sp : GetPlatformList()) { 332 if (platform_sp->IsCompatibleArchitecture(arch, false, 333 platform_arch_ptr)) 334 return platform_sp; 335 } 336 } 337 338 PlatformCreateInstance create_callback; 339 // First try exact arch matches across all platform plug-ins 340 uint32_t idx; 341 for (idx = 0; (create_callback = 342 PluginManager::GetPlatformCreateCallbackAtIndex(idx)); 343 ++idx) { 344 if (create_callback) { 345 platform_sp = create_callback(false, &arch); 346 if (platform_sp && 347 platform_sp->IsCompatibleArchitecture(arch, true, 348 platform_arch_ptr)) { 349 std::lock_guard<std::recursive_mutex> guard(GetPlatformListMutex()); 350 GetPlatformList().push_back(platform_sp); 351 return platform_sp; 352 } 353 } 354 } 355 // Next try compatible arch matches across all platform plug-ins 356 for (idx = 0; (create_callback = 357 PluginManager::GetPlatformCreateCallbackAtIndex(idx)); 358 ++idx) { 359 if (create_callback) { 360 platform_sp = create_callback(false, &arch); 361 if (platform_sp && 362 platform_sp->IsCompatibleArchitecture(arch, false, 363 platform_arch_ptr)) { 364 std::lock_guard<std::recursive_mutex> guard(GetPlatformListMutex()); 365 GetPlatformList().push_back(platform_sp); 366 return platform_sp; 367 } 368 } 369 } 370 } else 371 error.SetErrorString("invalid platform name"); 372 if (platform_arch_ptr) 373 platform_arch_ptr->Clear(); 374 platform_sp.reset(); 375 return platform_sp; 376 } 377 378 ArchSpec Platform::GetAugmentedArchSpec(Platform *platform, llvm::StringRef triple) { 379 if (platform) 380 return platform->GetAugmentedArchSpec(triple); 381 return HostInfo::GetAugmentedArchSpec(triple); 382 } 383 384 //------------------------------------------------------------------ 385 /// Default Constructor 386 //------------------------------------------------------------------ 387 Platform::Platform(bool is_host) 388 : m_is_host(is_host), m_os_version_set_while_connected(false), 389 m_system_arch_set_while_connected(false), m_sdk_sysroot(), m_sdk_build(), 390 m_working_dir(), m_remote_url(), m_name(), m_system_arch(), m_mutex(), 391 m_uid_map(), m_gid_map(), m_max_uid_name_len(0), m_max_gid_name_len(0), 392 m_supports_rsync(false), m_rsync_opts(), m_rsync_prefix(), 393 m_supports_ssh(false), m_ssh_opts(), m_ignores_remote_hostname(false), 394 m_trap_handlers(), m_calculated_trap_handlers(false), 395 m_module_cache(llvm::make_unique<ModuleCache>()) { 396 Log *log(lldb_private::GetLogIfAllCategoriesSet(LIBLLDB_LOG_OBJECT)); 397 if (log) 398 log->Printf("%p Platform::Platform()", static_cast<void *>(this)); 399 } 400 401 //------------------------------------------------------------------ 402 /// Destructor. 403 /// 404 /// The destructor is virtual since this class is designed to be 405 /// inherited from by the plug-in instance. 406 //------------------------------------------------------------------ 407 Platform::~Platform() { 408 Log *log(lldb_private::GetLogIfAllCategoriesSet(LIBLLDB_LOG_OBJECT)); 409 if (log) 410 log->Printf("%p Platform::~Platform()", static_cast<void *>(this)); 411 } 412 413 void Platform::GetStatus(Stream &strm) { 414 std::string s; 415 strm.Printf(" Platform: %s\n", GetPluginName().GetCString()); 416 417 ArchSpec arch(GetSystemArchitecture()); 418 if (arch.IsValid()) { 419 if (!arch.GetTriple().str().empty()) { 420 strm.Printf(" Triple: "); 421 arch.DumpTriple(strm); 422 strm.EOL(); 423 } 424 } 425 426 llvm::VersionTuple os_version = GetOSVersion(); 427 if (!os_version.empty()) { 428 strm.Format("OS Version: {0}", os_version.getAsString()); 429 430 if (GetOSBuildString(s)) 431 strm.Printf(" (%s)", s.c_str()); 432 433 strm.EOL(); 434 } 435 436 if (GetOSKernelDescription(s)) 437 strm.Printf(" Kernel: %s\n", s.c_str()); 438 439 if (IsHost()) { 440 strm.Printf(" Hostname: %s\n", GetHostname()); 441 } else { 442 const bool is_connected = IsConnected(); 443 if (is_connected) 444 strm.Printf(" Hostname: %s\n", GetHostname()); 445 strm.Printf(" Connected: %s\n", is_connected ? "yes" : "no"); 446 } 447 448 if (GetWorkingDirectory()) { 449 strm.Printf("WorkingDir: %s\n", GetWorkingDirectory().GetCString()); 450 } 451 if (!IsConnected()) 452 return; 453 454 std::string specific_info(GetPlatformSpecificConnectionInformation()); 455 456 if (!specific_info.empty()) 457 strm.Printf("Platform-specific connection: %s\n", specific_info.c_str()); 458 } 459 460 llvm::VersionTuple Platform::GetOSVersion(Process *process) { 461 std::lock_guard<std::mutex> guard(m_mutex); 462 463 if (IsHost()) { 464 if (m_os_version.empty()) { 465 // We have a local host platform 466 m_os_version = HostInfo::GetOSVersion(); 467 m_os_version_set_while_connected = !m_os_version.empty(); 468 } 469 } else { 470 // We have a remote platform. We can only fetch the remote 471 // OS version if we are connected, and we don't want to do it 472 // more than once. 473 474 const bool is_connected = IsConnected(); 475 476 bool fetch = false; 477 if (!m_os_version.empty()) { 478 // We have valid OS version info, check to make sure it wasn't manually 479 // set prior to connecting. If it was manually set prior to connecting, 480 // then lets fetch the actual OS version info if we are now connected. 481 if (is_connected && !m_os_version_set_while_connected) 482 fetch = true; 483 } else { 484 // We don't have valid OS version info, fetch it if we are connected 485 fetch = is_connected; 486 } 487 488 if (fetch) 489 m_os_version_set_while_connected = GetRemoteOSVersion(); 490 } 491 492 if (!m_os_version.empty()) 493 return m_os_version; 494 if (process) { 495 // Check with the process in case it can answer the question if a process 496 // was provided 497 return process->GetHostOSVersion(); 498 } 499 return llvm::VersionTuple(); 500 } 501 502 bool Platform::GetOSBuildString(std::string &s) { 503 s.clear(); 504 505 if (IsHost()) 506 #if !defined(__linux__) 507 return HostInfo::GetOSBuildString(s); 508 #else 509 return false; 510 #endif 511 else 512 return GetRemoteOSBuildString(s); 513 } 514 515 bool Platform::GetOSKernelDescription(std::string &s) { 516 if (IsHost()) 517 #if !defined(__linux__) 518 return HostInfo::GetOSKernelDescription(s); 519 #else 520 return false; 521 #endif 522 else 523 return GetRemoteOSKernelDescription(s); 524 } 525 526 void Platform::AddClangModuleCompilationOptions( 527 Target *target, std::vector<std::string> &options) { 528 std::vector<std::string> default_compilation_options = { 529 "-x", "c++", "-Xclang", "-nostdsysteminc", "-Xclang", "-nostdsysteminc"}; 530 531 options.insert(options.end(), default_compilation_options.begin(), 532 default_compilation_options.end()); 533 } 534 535 FileSpec Platform::GetWorkingDirectory() { 536 if (IsHost()) { 537 llvm::SmallString<64> cwd; 538 if (llvm::sys::fs::current_path(cwd)) 539 return FileSpec{}; 540 else 541 return FileSpec(cwd, true); 542 } else { 543 if (!m_working_dir) 544 m_working_dir = GetRemoteWorkingDirectory(); 545 return m_working_dir; 546 } 547 } 548 549 struct RecurseCopyBaton { 550 const FileSpec &dst; 551 Platform *platform_ptr; 552 Status error; 553 }; 554 555 static FileSpec::EnumerateDirectoryResult 556 RecurseCopy_Callback(void *baton, llvm::sys::fs::file_type ft, 557 const FileSpec &src) { 558 RecurseCopyBaton *rc_baton = (RecurseCopyBaton *)baton; 559 namespace fs = llvm::sys::fs; 560 switch (ft) { 561 case fs::file_type::fifo_file: 562 case fs::file_type::socket_file: 563 // we have no way to copy pipes and sockets - ignore them and continue 564 return FileSpec::eEnumerateDirectoryResultNext; 565 break; 566 567 case fs::file_type::directory_file: { 568 // make the new directory and get in there 569 FileSpec dst_dir = rc_baton->dst; 570 if (!dst_dir.GetFilename()) 571 dst_dir.GetFilename() = src.GetLastPathComponent(); 572 Status error = rc_baton->platform_ptr->MakeDirectory( 573 dst_dir, lldb::eFilePermissionsDirectoryDefault); 574 if (error.Fail()) { 575 rc_baton->error.SetErrorStringWithFormat( 576 "unable to setup directory %s on remote end", dst_dir.GetCString()); 577 return FileSpec::eEnumerateDirectoryResultQuit; // got an error, bail out 578 } 579 580 // now recurse 581 std::string src_dir_path(src.GetPath()); 582 583 // Make a filespec that only fills in the directory of a FileSpec so when 584 // we enumerate we can quickly fill in the filename for dst copies 585 FileSpec recurse_dst; 586 recurse_dst.GetDirectory().SetCString(dst_dir.GetPath().c_str()); 587 RecurseCopyBaton rc_baton2 = {recurse_dst, rc_baton->platform_ptr, 588 Status()}; 589 FileSpec::EnumerateDirectory(src_dir_path, true, true, true, 590 RecurseCopy_Callback, &rc_baton2); 591 if (rc_baton2.error.Fail()) { 592 rc_baton->error.SetErrorString(rc_baton2.error.AsCString()); 593 return FileSpec::eEnumerateDirectoryResultQuit; // got an error, bail out 594 } 595 return FileSpec::eEnumerateDirectoryResultNext; 596 } break; 597 598 case fs::file_type::symlink_file: { 599 // copy the file and keep going 600 FileSpec dst_file = rc_baton->dst; 601 if (!dst_file.GetFilename()) 602 dst_file.GetFilename() = src.GetFilename(); 603 604 FileSpec src_resolved; 605 606 rc_baton->error = FileSystem::Readlink(src, src_resolved); 607 608 if (rc_baton->error.Fail()) 609 return FileSpec::eEnumerateDirectoryResultQuit; // got an error, bail out 610 611 rc_baton->error = 612 rc_baton->platform_ptr->CreateSymlink(dst_file, src_resolved); 613 614 if (rc_baton->error.Fail()) 615 return FileSpec::eEnumerateDirectoryResultQuit; // got an error, bail out 616 617 return FileSpec::eEnumerateDirectoryResultNext; 618 } break; 619 620 case fs::file_type::regular_file: { 621 // copy the file and keep going 622 FileSpec dst_file = rc_baton->dst; 623 if (!dst_file.GetFilename()) 624 dst_file.GetFilename() = src.GetFilename(); 625 Status err = rc_baton->platform_ptr->PutFile(src, dst_file); 626 if (err.Fail()) { 627 rc_baton->error.SetErrorString(err.AsCString()); 628 return FileSpec::eEnumerateDirectoryResultQuit; // got an error, bail out 629 } 630 return FileSpec::eEnumerateDirectoryResultNext; 631 } break; 632 633 default: 634 rc_baton->error.SetErrorStringWithFormat( 635 "invalid file detected during copy: %s", src.GetPath().c_str()); 636 return FileSpec::eEnumerateDirectoryResultQuit; // got an error, bail out 637 break; 638 } 639 llvm_unreachable("Unhandled file_type!"); 640 } 641 642 Status Platform::Install(const FileSpec &src, const FileSpec &dst) { 643 Status error; 644 645 Log *log = GetLogIfAnyCategoriesSet(LIBLLDB_LOG_PLATFORM); 646 if (log) 647 log->Printf("Platform::Install (src='%s', dst='%s')", src.GetPath().c_str(), 648 dst.GetPath().c_str()); 649 FileSpec fixed_dst(dst); 650 651 if (!fixed_dst.GetFilename()) 652 fixed_dst.GetFilename() = src.GetFilename(); 653 654 FileSpec working_dir = GetWorkingDirectory(); 655 656 if (dst) { 657 if (dst.GetDirectory()) { 658 const char first_dst_dir_char = dst.GetDirectory().GetCString()[0]; 659 if (first_dst_dir_char == '/' || first_dst_dir_char == '\\') { 660 fixed_dst.GetDirectory() = dst.GetDirectory(); 661 } 662 // If the fixed destination file doesn't have a directory yet, then we 663 // must have a relative path. We will resolve this relative path against 664 // the platform's working directory 665 if (!fixed_dst.GetDirectory()) { 666 FileSpec relative_spec; 667 std::string path; 668 if (working_dir) { 669 relative_spec = working_dir; 670 relative_spec.AppendPathComponent(dst.GetPath()); 671 fixed_dst.GetDirectory() = relative_spec.GetDirectory(); 672 } else { 673 error.SetErrorStringWithFormat( 674 "platform working directory must be valid for relative path '%s'", 675 dst.GetPath().c_str()); 676 return error; 677 } 678 } 679 } else { 680 if (working_dir) { 681 fixed_dst.GetDirectory().SetCString(working_dir.GetCString()); 682 } else { 683 error.SetErrorStringWithFormat( 684 "platform working directory must be valid for relative path '%s'", 685 dst.GetPath().c_str()); 686 return error; 687 } 688 } 689 } else { 690 if (working_dir) { 691 fixed_dst.GetDirectory().SetCString(working_dir.GetCString()); 692 } else { 693 error.SetErrorStringWithFormat("platform working directory must be valid " 694 "when destination directory is empty"); 695 return error; 696 } 697 } 698 699 if (log) 700 log->Printf("Platform::Install (src='%s', dst='%s') fixed_dst='%s'", 701 src.GetPath().c_str(), dst.GetPath().c_str(), 702 fixed_dst.GetPath().c_str()); 703 704 if (GetSupportsRSync()) { 705 error = PutFile(src, dst); 706 } else { 707 namespace fs = llvm::sys::fs; 708 switch (fs::get_file_type(src.GetPath(), false)) { 709 case fs::file_type::directory_file: { 710 llvm::sys::fs::remove(fixed_dst.GetPath()); 711 uint32_t permissions = src.GetPermissions(); 712 if (permissions == 0) 713 permissions = eFilePermissionsDirectoryDefault; 714 error = MakeDirectory(fixed_dst, permissions); 715 if (error.Success()) { 716 // Make a filespec that only fills in the directory of a FileSpec so 717 // when we enumerate we can quickly fill in the filename for dst copies 718 FileSpec recurse_dst; 719 recurse_dst.GetDirectory().SetCString(fixed_dst.GetCString()); 720 std::string src_dir_path(src.GetPath()); 721 RecurseCopyBaton baton = {recurse_dst, this, Status()}; 722 FileSpec::EnumerateDirectory(src_dir_path, true, true, true, 723 RecurseCopy_Callback, &baton); 724 return baton.error; 725 } 726 } break; 727 728 case fs::file_type::regular_file: 729 llvm::sys::fs::remove(fixed_dst.GetPath()); 730 error = PutFile(src, fixed_dst); 731 break; 732 733 case fs::file_type::symlink_file: { 734 llvm::sys::fs::remove(fixed_dst.GetPath()); 735 FileSpec src_resolved; 736 error = FileSystem::Readlink(src, src_resolved); 737 if (error.Success()) 738 error = CreateSymlink(dst, src_resolved); 739 } break; 740 case fs::file_type::fifo_file: 741 error.SetErrorString("platform install doesn't handle pipes"); 742 break; 743 case fs::file_type::socket_file: 744 error.SetErrorString("platform install doesn't handle sockets"); 745 break; 746 default: 747 error.SetErrorString( 748 "platform install doesn't handle non file or directory items"); 749 break; 750 } 751 } 752 return error; 753 } 754 755 bool Platform::SetWorkingDirectory(const FileSpec &file_spec) { 756 if (IsHost()) { 757 Log *log = GetLogIfAnyCategoriesSet(LIBLLDB_LOG_PLATFORM); 758 LLDB_LOG(log, "{0}", file_spec); 759 if (std::error_code ec = llvm::sys::fs::set_current_path(file_spec.GetPath())) { 760 LLDB_LOG(log, "error: {0}", ec.message()); 761 return false; 762 } 763 return true; 764 } else { 765 m_working_dir.Clear(); 766 return SetRemoteWorkingDirectory(file_spec); 767 } 768 } 769 770 Status Platform::MakeDirectory(const FileSpec &file_spec, 771 uint32_t permissions) { 772 if (IsHost()) 773 return llvm::sys::fs::create_directory(file_spec.GetPath(), permissions); 774 else { 775 Status error; 776 error.SetErrorStringWithFormat("remote platform %s doesn't support %s", 777 GetPluginName().GetCString(), 778 LLVM_PRETTY_FUNCTION); 779 return error; 780 } 781 } 782 783 Status Platform::GetFilePermissions(const FileSpec &file_spec, 784 uint32_t &file_permissions) { 785 if (IsHost()) { 786 auto Value = llvm::sys::fs::getPermissions(file_spec.GetPath()); 787 if (Value) 788 file_permissions = Value.get(); 789 return Status(Value.getError()); 790 } else { 791 Status error; 792 error.SetErrorStringWithFormat("remote platform %s doesn't support %s", 793 GetPluginName().GetCString(), 794 LLVM_PRETTY_FUNCTION); 795 return error; 796 } 797 } 798 799 Status Platform::SetFilePermissions(const FileSpec &file_spec, 800 uint32_t file_permissions) { 801 if (IsHost()) { 802 auto Perms = static_cast<llvm::sys::fs::perms>(file_permissions); 803 return llvm::sys::fs::setPermissions(file_spec.GetPath(), Perms); 804 } else { 805 Status error; 806 error.SetErrorStringWithFormat("remote platform %s doesn't support %s", 807 GetPluginName().GetCString(), 808 LLVM_PRETTY_FUNCTION); 809 return error; 810 } 811 } 812 813 ConstString Platform::GetName() { return GetPluginName(); } 814 815 const char *Platform::GetHostname() { 816 if (IsHost()) 817 return "127.0.0.1"; 818 819 if (m_name.empty()) 820 return nullptr; 821 return m_name.c_str(); 822 } 823 824 ConstString Platform::GetFullNameForDylib(ConstString basename) { 825 return basename; 826 } 827 828 bool Platform::SetRemoteWorkingDirectory(const FileSpec &working_dir) { 829 Log *log = GetLogIfAnyCategoriesSet(LIBLLDB_LOG_PLATFORM); 830 if (log) 831 log->Printf("Platform::SetRemoteWorkingDirectory('%s')", 832 working_dir.GetCString()); 833 m_working_dir = working_dir; 834 return true; 835 } 836 837 const char *Platform::GetUserName(uint32_t uid) { 838 #if !defined(LLDB_DISABLE_POSIX) 839 const char *user_name = GetCachedUserName(uid); 840 if (user_name) 841 return user_name; 842 if (IsHost()) { 843 std::string name; 844 if (HostInfo::LookupUserName(uid, name)) 845 return SetCachedUserName(uid, name.c_str(), name.size()); 846 } 847 #endif 848 return nullptr; 849 } 850 851 const char *Platform::GetGroupName(uint32_t gid) { 852 #if !defined(LLDB_DISABLE_POSIX) 853 const char *group_name = GetCachedGroupName(gid); 854 if (group_name) 855 return group_name; 856 if (IsHost()) { 857 std::string name; 858 if (HostInfo::LookupGroupName(gid, name)) 859 return SetCachedGroupName(gid, name.c_str(), name.size()); 860 } 861 #endif 862 return nullptr; 863 } 864 865 bool Platform::SetOSVersion(llvm::VersionTuple version) { 866 if (IsHost()) { 867 // We don't need anyone setting the OS version for the host platform, we 868 // should be able to figure it out by calling HostInfo::GetOSVersion(...). 869 return false; 870 } else { 871 // We have a remote platform, allow setting the target OS version if we 872 // aren't connected, since if we are connected, we should be able to 873 // request the remote OS version from the connected platform. 874 if (IsConnected()) 875 return false; 876 else { 877 // We aren't connected and we might want to set the OS version ahead of 878 // time before we connect so we can peruse files and use a local SDK or 879 // PDK cache of support files to disassemble or do other things. 880 m_os_version = version; 881 return true; 882 } 883 } 884 return false; 885 } 886 887 Status 888 Platform::ResolveExecutable(const ModuleSpec &module_spec, 889 lldb::ModuleSP &exe_module_sp, 890 const FileSpecList *module_search_paths_ptr) { 891 Status error; 892 if (module_spec.GetFileSpec().Exists()) { 893 if (module_spec.GetArchitecture().IsValid()) { 894 error = ModuleList::GetSharedModule(module_spec, exe_module_sp, 895 module_search_paths_ptr, nullptr, 896 nullptr); 897 } else { 898 // No valid architecture was specified, ask the platform for the 899 // architectures that we should be using (in the correct order) and see 900 // if we can find a match that way 901 ModuleSpec arch_module_spec(module_spec); 902 for (uint32_t idx = 0; GetSupportedArchitectureAtIndex( 903 idx, arch_module_spec.GetArchitecture()); 904 ++idx) { 905 error = ModuleList::GetSharedModule(arch_module_spec, exe_module_sp, 906 module_search_paths_ptr, nullptr, 907 nullptr); 908 // Did we find an executable using one of the 909 if (error.Success() && exe_module_sp) 910 break; 911 } 912 } 913 } else { 914 error.SetErrorStringWithFormat("'%s' does not exist", 915 module_spec.GetFileSpec().GetPath().c_str()); 916 } 917 return error; 918 } 919 920 Status Platform::ResolveSymbolFile(Target &target, const ModuleSpec &sym_spec, 921 FileSpec &sym_file) { 922 Status error; 923 if (sym_spec.GetSymbolFileSpec().Exists()) 924 sym_file = sym_spec.GetSymbolFileSpec(); 925 else 926 error.SetErrorString("unable to resolve symbol file"); 927 return error; 928 } 929 930 bool Platform::ResolveRemotePath(const FileSpec &platform_path, 931 FileSpec &resolved_platform_path) { 932 resolved_platform_path = platform_path; 933 return resolved_platform_path.ResolvePath(); 934 } 935 936 const ArchSpec &Platform::GetSystemArchitecture() { 937 if (IsHost()) { 938 if (!m_system_arch.IsValid()) { 939 // We have a local host platform 940 m_system_arch = HostInfo::GetArchitecture(); 941 m_system_arch_set_while_connected = m_system_arch.IsValid(); 942 } 943 } else { 944 // We have a remote platform. We can only fetch the remote system 945 // architecture if we are connected, and we don't want to do it more than 946 // once. 947 948 const bool is_connected = IsConnected(); 949 950 bool fetch = false; 951 if (m_system_arch.IsValid()) { 952 // We have valid OS version info, check to make sure it wasn't manually 953 // set prior to connecting. If it was manually set prior to connecting, 954 // then lets fetch the actual OS version info if we are now connected. 955 if (is_connected && !m_system_arch_set_while_connected) 956 fetch = true; 957 } else { 958 // We don't have valid OS version info, fetch it if we are connected 959 fetch = is_connected; 960 } 961 962 if (fetch) { 963 m_system_arch = GetRemoteSystemArchitecture(); 964 m_system_arch_set_while_connected = m_system_arch.IsValid(); 965 } 966 } 967 return m_system_arch; 968 } 969 970 ArchSpec Platform::GetAugmentedArchSpec(llvm::StringRef triple) { 971 if (triple.empty()) 972 return ArchSpec(); 973 llvm::Triple normalized_triple(llvm::Triple::normalize(triple)); 974 if (!ArchSpec::ContainsOnlyArch(normalized_triple)) 975 return ArchSpec(triple); 976 977 if (auto kind = HostInfo::ParseArchitectureKind(triple)) 978 return HostInfo::GetArchitecture(*kind); 979 980 ArchSpec compatible_arch; 981 ArchSpec raw_arch(triple); 982 if (!IsCompatibleArchitecture(raw_arch, false, &compatible_arch)) 983 return raw_arch; 984 985 if (!compatible_arch.IsValid()) 986 return ArchSpec(normalized_triple); 987 988 const llvm::Triple &compatible_triple = compatible_arch.GetTriple(); 989 if (normalized_triple.getVendorName().empty()) 990 normalized_triple.setVendor(compatible_triple.getVendor()); 991 if (normalized_triple.getOSName().empty()) 992 normalized_triple.setOS(compatible_triple.getOS()); 993 if (normalized_triple.getEnvironmentName().empty()) 994 normalized_triple.setEnvironment(compatible_triple.getEnvironment()); 995 return ArchSpec(normalized_triple); 996 } 997 998 Status Platform::ConnectRemote(Args &args) { 999 Status error; 1000 if (IsHost()) 1001 error.SetErrorStringWithFormat("The currently selected platform (%s) is " 1002 "the host platform and is always connected.", 1003 GetPluginName().GetCString()); 1004 else 1005 error.SetErrorStringWithFormat( 1006 "Platform::ConnectRemote() is not supported by %s", 1007 GetPluginName().GetCString()); 1008 return error; 1009 } 1010 1011 Status Platform::DisconnectRemote() { 1012 Status error; 1013 if (IsHost()) 1014 error.SetErrorStringWithFormat("The currently selected platform (%s) is " 1015 "the host platform and is always connected.", 1016 GetPluginName().GetCString()); 1017 else 1018 error.SetErrorStringWithFormat( 1019 "Platform::DisconnectRemote() is not supported by %s", 1020 GetPluginName().GetCString()); 1021 return error; 1022 } 1023 1024 bool Platform::GetProcessInfo(lldb::pid_t pid, 1025 ProcessInstanceInfo &process_info) { 1026 // Take care of the host case so that each subclass can just call this 1027 // function to get the host functionality. 1028 if (IsHost()) 1029 return Host::GetProcessInfo(pid, process_info); 1030 return false; 1031 } 1032 1033 uint32_t Platform::FindProcesses(const ProcessInstanceInfoMatch &match_info, 1034 ProcessInstanceInfoList &process_infos) { 1035 // Take care of the host case so that each subclass can just call this 1036 // function to get the host functionality. 1037 uint32_t match_count = 0; 1038 if (IsHost()) 1039 match_count = Host::FindProcesses(match_info, process_infos); 1040 return match_count; 1041 } 1042 1043 Status Platform::LaunchProcess(ProcessLaunchInfo &launch_info) { 1044 Status error; 1045 Log *log(lldb_private::GetLogIfAllCategoriesSet(LIBLLDB_LOG_PLATFORM)); 1046 if (log) 1047 log->Printf("Platform::%s()", __FUNCTION__); 1048 1049 // Take care of the host case so that each subclass can just call this 1050 // function to get the host functionality. 1051 if (IsHost()) { 1052 if (::getenv("LLDB_LAUNCH_FLAG_LAUNCH_IN_TTY")) 1053 launch_info.GetFlags().Set(eLaunchFlagLaunchInTTY); 1054 1055 if (launch_info.GetFlags().Test(eLaunchFlagLaunchInShell)) { 1056 const bool is_localhost = true; 1057 const bool will_debug = launch_info.GetFlags().Test(eLaunchFlagDebug); 1058 const bool first_arg_is_full_shell_command = false; 1059 uint32_t num_resumes = GetResumeCountForLaunchInfo(launch_info); 1060 if (log) { 1061 const FileSpec &shell = launch_info.GetShell(); 1062 const char *shell_str = (shell) ? shell.GetPath().c_str() : "<null>"; 1063 log->Printf( 1064 "Platform::%s GetResumeCountForLaunchInfo() returned %" PRIu32 1065 ", shell is '%s'", 1066 __FUNCTION__, num_resumes, shell_str); 1067 } 1068 1069 if (!launch_info.ConvertArgumentsForLaunchingInShell( 1070 error, is_localhost, will_debug, first_arg_is_full_shell_command, 1071 num_resumes)) 1072 return error; 1073 } else if (launch_info.GetFlags().Test(eLaunchFlagShellExpandArguments)) { 1074 error = ShellExpandArguments(launch_info); 1075 if (error.Fail()) { 1076 error.SetErrorStringWithFormat("shell expansion failed (reason: %s). " 1077 "consider launching with 'process " 1078 "launch'.", 1079 error.AsCString("unknown")); 1080 return error; 1081 } 1082 } 1083 1084 if (log) 1085 log->Printf("Platform::%s final launch_info resume count: %" PRIu32, 1086 __FUNCTION__, launch_info.GetResumeCount()); 1087 1088 error = Host::LaunchProcess(launch_info); 1089 } else 1090 error.SetErrorString( 1091 "base lldb_private::Platform class can't launch remote processes"); 1092 return error; 1093 } 1094 1095 Status Platform::ShellExpandArguments(ProcessLaunchInfo &launch_info) { 1096 if (IsHost()) 1097 return Host::ShellExpandArguments(launch_info); 1098 return Status("base lldb_private::Platform class can't expand arguments"); 1099 } 1100 1101 Status Platform::KillProcess(const lldb::pid_t pid) { 1102 Log *log(lldb_private::GetLogIfAllCategoriesSet(LIBLLDB_LOG_PLATFORM)); 1103 if (log) 1104 log->Printf("Platform::%s, pid %" PRIu64, __FUNCTION__, pid); 1105 1106 // Try to find a process plugin to handle this Kill request. If we can't, 1107 // fall back to the default OS implementation. 1108 size_t num_debuggers = Debugger::GetNumDebuggers(); 1109 for (size_t didx = 0; didx < num_debuggers; ++didx) { 1110 DebuggerSP debugger = Debugger::GetDebuggerAtIndex(didx); 1111 lldb_private::TargetList &targets = debugger->GetTargetList(); 1112 for (int tidx = 0; tidx < targets.GetNumTargets(); ++tidx) { 1113 ProcessSP process = targets.GetTargetAtIndex(tidx)->GetProcessSP(); 1114 if (process->GetID() == pid) 1115 return process->Destroy(true); 1116 } 1117 } 1118 1119 if (!IsHost()) { 1120 return Status( 1121 "base lldb_private::Platform class can't kill remote processes unless " 1122 "they are controlled by a process plugin"); 1123 } 1124 Host::Kill(pid, SIGTERM); 1125 return Status(); 1126 } 1127 1128 lldb::ProcessSP 1129 Platform::DebugProcess(ProcessLaunchInfo &launch_info, Debugger &debugger, 1130 Target *target, // Can be nullptr, if nullptr create a 1131 // new target, else use existing one 1132 Status &error) { 1133 Log *log(lldb_private::GetLogIfAllCategoriesSet(LIBLLDB_LOG_PLATFORM)); 1134 if (log) 1135 log->Printf("Platform::%s entered (target %p)", __FUNCTION__, 1136 static_cast<void *>(target)); 1137 1138 ProcessSP process_sp; 1139 // Make sure we stop at the entry point 1140 launch_info.GetFlags().Set(eLaunchFlagDebug); 1141 // We always launch the process we are going to debug in a separate process 1142 // group, since then we can handle ^C interrupts ourselves w/o having to 1143 // worry about the target getting them as well. 1144 launch_info.SetLaunchInSeparateProcessGroup(true); 1145 1146 // Allow any StructuredData process-bound plugins to adjust the launch info 1147 // if needed 1148 size_t i = 0; 1149 bool iteration_complete = false; 1150 // Note iteration can't simply go until a nullptr callback is returned, as it 1151 // is valid for a plugin to not supply a filter. 1152 auto get_filter_func = PluginManager::GetStructuredDataFilterCallbackAtIndex; 1153 for (auto filter_callback = get_filter_func(i, iteration_complete); 1154 !iteration_complete; 1155 filter_callback = get_filter_func(++i, iteration_complete)) { 1156 if (filter_callback) { 1157 // Give this ProcessLaunchInfo filter a chance to adjust the launch info. 1158 error = (*filter_callback)(launch_info, target); 1159 if (!error.Success()) { 1160 if (log) 1161 log->Printf("Platform::%s() StructuredDataPlugin launch " 1162 "filter failed.", 1163 __FUNCTION__); 1164 return process_sp; 1165 } 1166 } 1167 } 1168 1169 error = LaunchProcess(launch_info); 1170 if (error.Success()) { 1171 if (log) 1172 log->Printf("Platform::%s LaunchProcess() call succeeded (pid=%" PRIu64 1173 ")", 1174 __FUNCTION__, launch_info.GetProcessID()); 1175 if (launch_info.GetProcessID() != LLDB_INVALID_PROCESS_ID) { 1176 ProcessAttachInfo attach_info(launch_info); 1177 process_sp = Attach(attach_info, debugger, target, error); 1178 if (process_sp) { 1179 if (log) 1180 log->Printf("Platform::%s Attach() succeeded, Process plugin: %s", 1181 __FUNCTION__, process_sp->GetPluginName().AsCString()); 1182 launch_info.SetHijackListener(attach_info.GetHijackListener()); 1183 1184 // Since we attached to the process, it will think it needs to detach 1185 // if the process object just goes away without an explicit call to 1186 // Process::Kill() or Process::Detach(), so let it know to kill the 1187 // process if this happens. 1188 process_sp->SetShouldDetach(false); 1189 1190 // If we didn't have any file actions, the pseudo terminal might have 1191 // been used where the slave side was given as the file to open for 1192 // stdin/out/err after we have already opened the master so we can 1193 // read/write stdin/out/err. 1194 int pty_fd = launch_info.GetPTY().ReleaseMasterFileDescriptor(); 1195 if (pty_fd != PseudoTerminal::invalid_fd) { 1196 process_sp->SetSTDIOFileDescriptor(pty_fd); 1197 } 1198 } else { 1199 if (log) 1200 log->Printf("Platform::%s Attach() failed: %s", __FUNCTION__, 1201 error.AsCString()); 1202 } 1203 } else { 1204 if (log) 1205 log->Printf("Platform::%s LaunchProcess() returned launch_info with " 1206 "invalid process id", 1207 __FUNCTION__); 1208 } 1209 } else { 1210 if (log) 1211 log->Printf("Platform::%s LaunchProcess() failed: %s", __FUNCTION__, 1212 error.AsCString()); 1213 } 1214 1215 return process_sp; 1216 } 1217 1218 lldb::PlatformSP 1219 Platform::GetPlatformForArchitecture(const ArchSpec &arch, 1220 ArchSpec *platform_arch_ptr) { 1221 lldb::PlatformSP platform_sp; 1222 Status error; 1223 if (arch.IsValid()) 1224 platform_sp = Platform::Create(arch, platform_arch_ptr, error); 1225 return platform_sp; 1226 } 1227 1228 //------------------------------------------------------------------ 1229 /// Lets a platform answer if it is compatible with a given 1230 /// architecture and the target triple contained within. 1231 //------------------------------------------------------------------ 1232 bool Platform::IsCompatibleArchitecture(const ArchSpec &arch, 1233 bool exact_arch_match, 1234 ArchSpec *compatible_arch_ptr) { 1235 // If the architecture is invalid, we must answer true... 1236 if (arch.IsValid()) { 1237 ArchSpec platform_arch; 1238 // Try for an exact architecture match first. 1239 if (exact_arch_match) { 1240 for (uint32_t arch_idx = 0; 1241 GetSupportedArchitectureAtIndex(arch_idx, platform_arch); 1242 ++arch_idx) { 1243 if (arch.IsExactMatch(platform_arch)) { 1244 if (compatible_arch_ptr) 1245 *compatible_arch_ptr = platform_arch; 1246 return true; 1247 } 1248 } 1249 } else { 1250 for (uint32_t arch_idx = 0; 1251 GetSupportedArchitectureAtIndex(arch_idx, platform_arch); 1252 ++arch_idx) { 1253 if (arch.IsCompatibleMatch(platform_arch)) { 1254 if (compatible_arch_ptr) 1255 *compatible_arch_ptr = platform_arch; 1256 return true; 1257 } 1258 } 1259 } 1260 } 1261 if (compatible_arch_ptr) 1262 compatible_arch_ptr->Clear(); 1263 return false; 1264 } 1265 1266 Status Platform::PutFile(const FileSpec &source, const FileSpec &destination, 1267 uint32_t uid, uint32_t gid) { 1268 Log *log(lldb_private::GetLogIfAllCategoriesSet(LIBLLDB_LOG_PLATFORM)); 1269 if (log) 1270 log->Printf("[PutFile] Using block by block transfer....\n"); 1271 1272 uint32_t source_open_options = 1273 File::eOpenOptionRead | File::eOpenOptionCloseOnExec; 1274 namespace fs = llvm::sys::fs; 1275 if (fs::is_symlink_file(source.GetPath())) 1276 source_open_options |= File::eOpenOptionDontFollowSymlinks; 1277 1278 File source_file(source, source_open_options, lldb::eFilePermissionsUserRW); 1279 Status error; 1280 uint32_t permissions = source_file.GetPermissions(error); 1281 if (permissions == 0) 1282 permissions = lldb::eFilePermissionsFileDefault; 1283 1284 if (!source_file.IsValid()) 1285 return Status("PutFile: unable to open source file"); 1286 lldb::user_id_t dest_file = OpenFile( 1287 destination, File::eOpenOptionCanCreate | File::eOpenOptionWrite | 1288 File::eOpenOptionTruncate | File::eOpenOptionCloseOnExec, 1289 permissions, error); 1290 if (log) 1291 log->Printf("dest_file = %" PRIu64 "\n", dest_file); 1292 1293 if (error.Fail()) 1294 return error; 1295 if (dest_file == UINT64_MAX) 1296 return Status("unable to open target file"); 1297 lldb::DataBufferSP buffer_sp(new DataBufferHeap(1024, 0)); 1298 uint64_t offset = 0; 1299 for (;;) { 1300 size_t bytes_read = buffer_sp->GetByteSize(); 1301 error = source_file.Read(buffer_sp->GetBytes(), bytes_read); 1302 if (error.Fail() || bytes_read == 0) 1303 break; 1304 1305 const uint64_t bytes_written = 1306 WriteFile(dest_file, offset, buffer_sp->GetBytes(), bytes_read, error); 1307 if (error.Fail()) 1308 break; 1309 1310 offset += bytes_written; 1311 if (bytes_written != bytes_read) { 1312 // We didn't write the correct number of bytes, so adjust the file 1313 // position in the source file we are reading from... 1314 source_file.SeekFromStart(offset); 1315 } 1316 } 1317 CloseFile(dest_file, error); 1318 1319 if (uid == UINT32_MAX && gid == UINT32_MAX) 1320 return error; 1321 1322 // TODO: ChownFile? 1323 1324 return error; 1325 } 1326 1327 Status Platform::GetFile(const FileSpec &source, const FileSpec &destination) { 1328 Status error("unimplemented"); 1329 return error; 1330 } 1331 1332 Status 1333 Platform::CreateSymlink(const FileSpec &src, // The name of the link is in src 1334 const FileSpec &dst) // The symlink points to dst 1335 { 1336 Status error("unimplemented"); 1337 return error; 1338 } 1339 1340 bool Platform::GetFileExists(const lldb_private::FileSpec &file_spec) { 1341 return false; 1342 } 1343 1344 Status Platform::Unlink(const FileSpec &path) { 1345 Status error("unimplemented"); 1346 return error; 1347 } 1348 1349 MmapArgList Platform::GetMmapArgumentList(const ArchSpec &arch, addr_t addr, 1350 addr_t length, unsigned prot, 1351 unsigned flags, addr_t fd, 1352 addr_t offset) { 1353 uint64_t flags_platform = 0; 1354 if (flags & eMmapFlagsPrivate) 1355 flags_platform |= MAP_PRIVATE; 1356 if (flags & eMmapFlagsAnon) 1357 flags_platform |= MAP_ANON; 1358 1359 MmapArgList args({addr, length, prot, flags_platform, fd, offset}); 1360 return args; 1361 } 1362 1363 lldb_private::Status Platform::RunShellCommand( 1364 const char *command, // Shouldn't be nullptr 1365 const FileSpec & 1366 working_dir, // Pass empty FileSpec to use the current working directory 1367 int *status_ptr, // Pass nullptr if you don't want the process exit status 1368 int *signo_ptr, // Pass nullptr if you don't want the signal that caused the 1369 // process to exit 1370 std::string 1371 *command_output, // Pass nullptr if you don't want the command output 1372 const Timeout<std::micro> &timeout) { 1373 if (IsHost()) 1374 return Host::RunShellCommand(command, working_dir, status_ptr, signo_ptr, 1375 command_output, timeout); 1376 else 1377 return Status("unimplemented"); 1378 } 1379 1380 bool Platform::CalculateMD5(const FileSpec &file_spec, uint64_t &low, 1381 uint64_t &high) { 1382 if (!IsHost()) 1383 return false; 1384 auto Result = llvm::sys::fs::md5_contents(file_spec.GetPath()); 1385 if (!Result) 1386 return false; 1387 std::tie(high, low) = Result->words(); 1388 return true; 1389 } 1390 1391 void Platform::SetLocalCacheDirectory(const char *local) { 1392 m_local_cache_directory.assign(local); 1393 } 1394 1395 const char *Platform::GetLocalCacheDirectory() { 1396 return m_local_cache_directory.c_str(); 1397 } 1398 1399 static constexpr OptionDefinition g_rsync_option_table[] = { 1400 {LLDB_OPT_SET_ALL, false, "rsync", 'r', OptionParser::eNoArgument, nullptr, 1401 {}, 0, eArgTypeNone, "Enable rsync."}, 1402 {LLDB_OPT_SET_ALL, false, "rsync-opts", 'R', 1403 OptionParser::eRequiredArgument, nullptr, {}, 0, eArgTypeCommandName, 1404 "Platform-specific options required for rsync to work."}, 1405 {LLDB_OPT_SET_ALL, false, "rsync-prefix", 'P', 1406 OptionParser::eRequiredArgument, nullptr, {}, 0, eArgTypeCommandName, 1407 "Platform-specific rsync prefix put before the remote path."}, 1408 {LLDB_OPT_SET_ALL, false, "ignore-remote-hostname", 'i', 1409 OptionParser::eNoArgument, nullptr, {}, 0, eArgTypeNone, 1410 "Do not automatically fill in the remote hostname when composing the " 1411 "rsync command."}, 1412 }; 1413 1414 static constexpr OptionDefinition g_ssh_option_table[] = { 1415 {LLDB_OPT_SET_ALL, false, "ssh", 's', OptionParser::eNoArgument, nullptr, 1416 {}, 0, eArgTypeNone, "Enable SSH."}, 1417 {LLDB_OPT_SET_ALL, false, "ssh-opts", 'S', OptionParser::eRequiredArgument, 1418 nullptr, {}, 0, eArgTypeCommandName, 1419 "Platform-specific options required for SSH to work."}, 1420 }; 1421 1422 static constexpr OptionDefinition g_caching_option_table[] = { 1423 {LLDB_OPT_SET_ALL, false, "local-cache-dir", 'c', 1424 OptionParser::eRequiredArgument, nullptr, {}, 0, eArgTypePath, 1425 "Path in which to store local copies of files."}, 1426 }; 1427 1428 llvm::ArrayRef<OptionDefinition> OptionGroupPlatformRSync::GetDefinitions() { 1429 return llvm::makeArrayRef(g_rsync_option_table); 1430 } 1431 1432 void OptionGroupPlatformRSync::OptionParsingStarting( 1433 ExecutionContext *execution_context) { 1434 m_rsync = false; 1435 m_rsync_opts.clear(); 1436 m_rsync_prefix.clear(); 1437 m_ignores_remote_hostname = false; 1438 } 1439 1440 lldb_private::Status 1441 OptionGroupPlatformRSync::SetOptionValue(uint32_t option_idx, 1442 llvm::StringRef option_arg, 1443 ExecutionContext *execution_context) { 1444 Status error; 1445 char short_option = (char)GetDefinitions()[option_idx].short_option; 1446 switch (short_option) { 1447 case 'r': 1448 m_rsync = true; 1449 break; 1450 1451 case 'R': 1452 m_rsync_opts.assign(option_arg); 1453 break; 1454 1455 case 'P': 1456 m_rsync_prefix.assign(option_arg); 1457 break; 1458 1459 case 'i': 1460 m_ignores_remote_hostname = true; 1461 break; 1462 1463 default: 1464 error.SetErrorStringWithFormat("unrecognized option '%c'", short_option); 1465 break; 1466 } 1467 1468 return error; 1469 } 1470 1471 lldb::BreakpointSP 1472 Platform::SetThreadCreationBreakpoint(lldb_private::Target &target) { 1473 return lldb::BreakpointSP(); 1474 } 1475 1476 llvm::ArrayRef<OptionDefinition> OptionGroupPlatformSSH::GetDefinitions() { 1477 return llvm::makeArrayRef(g_ssh_option_table); 1478 } 1479 1480 void OptionGroupPlatformSSH::OptionParsingStarting( 1481 ExecutionContext *execution_context) { 1482 m_ssh = false; 1483 m_ssh_opts.clear(); 1484 } 1485 1486 lldb_private::Status 1487 OptionGroupPlatformSSH::SetOptionValue(uint32_t option_idx, 1488 llvm::StringRef option_arg, 1489 ExecutionContext *execution_context) { 1490 Status error; 1491 char short_option = (char)GetDefinitions()[option_idx].short_option; 1492 switch (short_option) { 1493 case 's': 1494 m_ssh = true; 1495 break; 1496 1497 case 'S': 1498 m_ssh_opts.assign(option_arg); 1499 break; 1500 1501 default: 1502 error.SetErrorStringWithFormat("unrecognized option '%c'", short_option); 1503 break; 1504 } 1505 1506 return error; 1507 } 1508 1509 llvm::ArrayRef<OptionDefinition> OptionGroupPlatformCaching::GetDefinitions() { 1510 return llvm::makeArrayRef(g_caching_option_table); 1511 } 1512 1513 void OptionGroupPlatformCaching::OptionParsingStarting( 1514 ExecutionContext *execution_context) { 1515 m_cache_dir.clear(); 1516 } 1517 1518 lldb_private::Status OptionGroupPlatformCaching::SetOptionValue( 1519 uint32_t option_idx, llvm::StringRef option_arg, 1520 ExecutionContext *execution_context) { 1521 Status error; 1522 char short_option = (char)GetDefinitions()[option_idx].short_option; 1523 switch (short_option) { 1524 case 'c': 1525 m_cache_dir.assign(option_arg); 1526 break; 1527 1528 default: 1529 error.SetErrorStringWithFormat("unrecognized option '%c'", short_option); 1530 break; 1531 } 1532 1533 return error; 1534 } 1535 1536 Environment Platform::GetEnvironment() { return Environment(); } 1537 1538 const std::vector<ConstString> &Platform::GetTrapHandlerSymbolNames() { 1539 if (!m_calculated_trap_handlers) { 1540 std::lock_guard<std::mutex> guard(m_mutex); 1541 if (!m_calculated_trap_handlers) { 1542 CalculateTrapHandlerSymbolNames(); 1543 m_calculated_trap_handlers = true; 1544 } 1545 } 1546 return m_trap_handlers; 1547 } 1548 1549 Status Platform::GetCachedExecutable( 1550 ModuleSpec &module_spec, lldb::ModuleSP &module_sp, 1551 const FileSpecList *module_search_paths_ptr, Platform &remote_platform) { 1552 const auto platform_spec = module_spec.GetFileSpec(); 1553 const auto error = LoadCachedExecutable( 1554 module_spec, module_sp, module_search_paths_ptr, remote_platform); 1555 if (error.Success()) { 1556 module_spec.GetFileSpec() = module_sp->GetFileSpec(); 1557 module_spec.GetPlatformFileSpec() = platform_spec; 1558 } 1559 1560 return error; 1561 } 1562 1563 Status Platform::LoadCachedExecutable( 1564 const ModuleSpec &module_spec, lldb::ModuleSP &module_sp, 1565 const FileSpecList *module_search_paths_ptr, Platform &remote_platform) { 1566 return GetRemoteSharedModule(module_spec, nullptr, module_sp, 1567 [&](const ModuleSpec &spec) { 1568 return remote_platform.ResolveExecutable( 1569 spec, module_sp, module_search_paths_ptr); 1570 }, 1571 nullptr); 1572 } 1573 1574 Status Platform::GetRemoteSharedModule(const ModuleSpec &module_spec, 1575 Process *process, 1576 lldb::ModuleSP &module_sp, 1577 const ModuleResolver &module_resolver, 1578 bool *did_create_ptr) { 1579 // Get module information from a target. 1580 ModuleSpec resolved_module_spec; 1581 bool got_module_spec = false; 1582 if (process) { 1583 // Try to get module information from the process 1584 if (process->GetModuleSpec(module_spec.GetFileSpec(), 1585 module_spec.GetArchitecture(), 1586 resolved_module_spec)) { 1587 if (module_spec.GetUUID().IsValid() == false || 1588 module_spec.GetUUID() == resolved_module_spec.GetUUID()) { 1589 got_module_spec = true; 1590 } 1591 } 1592 } 1593 1594 if (module_spec.GetArchitecture().IsValid() == false) { 1595 Status error; 1596 // No valid architecture was specified, ask the platform for the 1597 // architectures that we should be using (in the correct order) and see if 1598 // we can find a match that way 1599 ModuleSpec arch_module_spec(module_spec); 1600 for (uint32_t idx = 0; GetSupportedArchitectureAtIndex( 1601 idx, arch_module_spec.GetArchitecture()); 1602 ++idx) { 1603 error = ModuleList::GetSharedModule(arch_module_spec, module_sp, nullptr, 1604 nullptr, nullptr); 1605 // Did we find an executable using one of the 1606 if (error.Success() && module_sp) 1607 break; 1608 } 1609 if (module_sp) 1610 got_module_spec = true; 1611 } 1612 1613 if (!got_module_spec) { 1614 // Get module information from a target. 1615 if (!GetModuleSpec(module_spec.GetFileSpec(), module_spec.GetArchitecture(), 1616 resolved_module_spec)) { 1617 if (module_spec.GetUUID().IsValid() == false || 1618 module_spec.GetUUID() == resolved_module_spec.GetUUID()) { 1619 return module_resolver(module_spec); 1620 } 1621 } 1622 } 1623 1624 // If we are looking for a specific UUID, make sure resolved_module_spec has 1625 // the same one before we search. 1626 if (module_spec.GetUUID().IsValid()) { 1627 resolved_module_spec.GetUUID() = module_spec.GetUUID(); 1628 } 1629 1630 // Trying to find a module by UUID on local file system. 1631 const auto error = module_resolver(resolved_module_spec); 1632 if (error.Fail()) { 1633 if (GetCachedSharedModule(resolved_module_spec, module_sp, did_create_ptr)) 1634 return Status(); 1635 } 1636 1637 return error; 1638 } 1639 1640 bool Platform::GetCachedSharedModule(const ModuleSpec &module_spec, 1641 lldb::ModuleSP &module_sp, 1642 bool *did_create_ptr) { 1643 if (IsHost() || !GetGlobalPlatformProperties()->GetUseModuleCache() || 1644 !GetGlobalPlatformProperties()->GetModuleCacheDirectory()) 1645 return false; 1646 1647 Log *log = GetLogIfAnyCategoriesSet(LIBLLDB_LOG_PLATFORM); 1648 1649 // Check local cache for a module. 1650 auto error = m_module_cache->GetAndPut( 1651 GetModuleCacheRoot(), GetCacheHostname(), module_spec, 1652 [this](const ModuleSpec &module_spec, 1653 const FileSpec &tmp_download_file_spec) { 1654 return DownloadModuleSlice( 1655 module_spec.GetFileSpec(), module_spec.GetObjectOffset(), 1656 module_spec.GetObjectSize(), tmp_download_file_spec); 1657 1658 }, 1659 [this](const ModuleSP &module_sp, 1660 const FileSpec &tmp_download_file_spec) { 1661 return DownloadSymbolFile(module_sp, tmp_download_file_spec); 1662 }, 1663 module_sp, did_create_ptr); 1664 if (error.Success()) 1665 return true; 1666 1667 if (log) 1668 log->Printf("Platform::%s - module %s not found in local cache: %s", 1669 __FUNCTION__, module_spec.GetUUID().GetAsString().c_str(), 1670 error.AsCString()); 1671 return false; 1672 } 1673 1674 Status Platform::DownloadModuleSlice(const FileSpec &src_file_spec, 1675 const uint64_t src_offset, 1676 const uint64_t src_size, 1677 const FileSpec &dst_file_spec) { 1678 Status error; 1679 1680 std::error_code EC; 1681 llvm::raw_fd_ostream dst(dst_file_spec.GetPath(), EC, llvm::sys::fs::F_None); 1682 if (EC) { 1683 error.SetErrorStringWithFormat("unable to open destination file: %s", 1684 dst_file_spec.GetPath().c_str()); 1685 return error; 1686 } 1687 1688 auto src_fd = OpenFile(src_file_spec, File::eOpenOptionRead, 1689 lldb::eFilePermissionsFileDefault, error); 1690 1691 if (error.Fail()) { 1692 error.SetErrorStringWithFormat("unable to open source file: %s", 1693 error.AsCString()); 1694 return error; 1695 } 1696 1697 std::vector<char> buffer(1024); 1698 auto offset = src_offset; 1699 uint64_t total_bytes_read = 0; 1700 while (total_bytes_read < src_size) { 1701 const auto to_read = std::min(static_cast<uint64_t>(buffer.size()), 1702 src_size - total_bytes_read); 1703 const uint64_t n_read = 1704 ReadFile(src_fd, offset, &buffer[0], to_read, error); 1705 if (error.Fail()) 1706 break; 1707 if (n_read == 0) { 1708 error.SetErrorString("read 0 bytes"); 1709 break; 1710 } 1711 offset += n_read; 1712 total_bytes_read += n_read; 1713 dst.write(&buffer[0], n_read); 1714 } 1715 1716 Status close_error; 1717 CloseFile(src_fd, close_error); // Ignoring close error. 1718 1719 return error; 1720 } 1721 1722 Status Platform::DownloadSymbolFile(const lldb::ModuleSP &module_sp, 1723 const FileSpec &dst_file_spec) { 1724 return Status( 1725 "Symbol file downloading not supported by the default platform."); 1726 } 1727 1728 FileSpec Platform::GetModuleCacheRoot() { 1729 auto dir_spec = GetGlobalPlatformProperties()->GetModuleCacheDirectory(); 1730 dir_spec.AppendPathComponent(GetName().AsCString()); 1731 return dir_spec; 1732 } 1733 1734 const char *Platform::GetCacheHostname() { return GetHostname(); } 1735 1736 const UnixSignalsSP &Platform::GetRemoteUnixSignals() { 1737 static const auto s_default_unix_signals_sp = std::make_shared<UnixSignals>(); 1738 return s_default_unix_signals_sp; 1739 } 1740 1741 const UnixSignalsSP &Platform::GetUnixSignals() { 1742 if (IsHost()) 1743 return Host::GetUnixSignals(); 1744 return GetRemoteUnixSignals(); 1745 } 1746 1747 uint32_t Platform::LoadImage(lldb_private::Process *process, 1748 const lldb_private::FileSpec &local_file, 1749 const lldb_private::FileSpec &remote_file, 1750 lldb_private::Status &error) { 1751 if (local_file && remote_file) { 1752 // Both local and remote file was specified. Install the local file to the 1753 // given location. 1754 if (IsRemote() || local_file != remote_file) { 1755 error = Install(local_file, remote_file); 1756 if (error.Fail()) 1757 return LLDB_INVALID_IMAGE_TOKEN; 1758 } 1759 return DoLoadImage(process, remote_file, nullptr, error); 1760 } 1761 1762 if (local_file) { 1763 // Only local file was specified. Install it to the current working 1764 // directory. 1765 FileSpec target_file = GetWorkingDirectory(); 1766 target_file.AppendPathComponent(local_file.GetFilename().AsCString()); 1767 if (IsRemote() || local_file != target_file) { 1768 error = Install(local_file, target_file); 1769 if (error.Fail()) 1770 return LLDB_INVALID_IMAGE_TOKEN; 1771 } 1772 return DoLoadImage(process, target_file, nullptr, error); 1773 } 1774 1775 if (remote_file) { 1776 // Only remote file was specified so we don't have to do any copying 1777 return DoLoadImage(process, remote_file, nullptr, error); 1778 } 1779 1780 error.SetErrorString("Neither local nor remote file was specified"); 1781 return LLDB_INVALID_IMAGE_TOKEN; 1782 } 1783 1784 uint32_t Platform::DoLoadImage(lldb_private::Process *process, 1785 const lldb_private::FileSpec &remote_file, 1786 const std::vector<std::string> *paths, 1787 lldb_private::Status &error, 1788 lldb_private::FileSpec *loaded_image) { 1789 error.SetErrorString("LoadImage is not supported on the current platform"); 1790 return LLDB_INVALID_IMAGE_TOKEN; 1791 } 1792 1793 uint32_t Platform::LoadImageUsingPaths(lldb_private::Process *process, 1794 const lldb_private::FileSpec &remote_filename, 1795 const std::vector<std::string> &paths, 1796 lldb_private::Status &error, 1797 lldb_private::FileSpec *loaded_path) 1798 { 1799 FileSpec file_to_use; 1800 if (remote_filename.IsAbsolute()) 1801 file_to_use = FileSpec(remote_filename.GetFilename().GetStringRef(), 1802 false, 1803 remote_filename.GetPathStyle()); 1804 else 1805 file_to_use = remote_filename; 1806 1807 return DoLoadImage(process, file_to_use, &paths, error, loaded_path); 1808 } 1809 1810 Status Platform::UnloadImage(lldb_private::Process *process, 1811 uint32_t image_token) { 1812 return Status("UnloadImage is not supported on the current platform"); 1813 } 1814 1815 lldb::ProcessSP Platform::ConnectProcess(llvm::StringRef connect_url, 1816 llvm::StringRef plugin_name, 1817 lldb_private::Debugger &debugger, 1818 lldb_private::Target *target, 1819 lldb_private::Status &error) { 1820 error.Clear(); 1821 1822 if (!target) { 1823 TargetSP new_target_sp; 1824 error = debugger.GetTargetList().CreateTarget( 1825 debugger, "", "", eLoadDependentsNo, nullptr, new_target_sp); 1826 target = new_target_sp.get(); 1827 } 1828 1829 if (!target || error.Fail()) 1830 return nullptr; 1831 1832 debugger.GetTargetList().SetSelectedTarget(target); 1833 1834 lldb::ProcessSP process_sp = 1835 target->CreateProcess(debugger.GetListener(), plugin_name, nullptr); 1836 if (!process_sp) 1837 return nullptr; 1838 1839 error = 1840 process_sp->ConnectRemote(debugger.GetOutputFile().get(), connect_url); 1841 if (error.Fail()) 1842 return nullptr; 1843 1844 return process_sp; 1845 } 1846 1847 size_t Platform::ConnectToWaitingProcesses(lldb_private::Debugger &debugger, 1848 lldb_private::Status &error) { 1849 error.Clear(); 1850 return 0; 1851 } 1852 1853 size_t Platform::GetSoftwareBreakpointTrapOpcode(Target &target, 1854 BreakpointSite *bp_site) { 1855 ArchSpec arch = target.GetArchitecture(); 1856 const uint8_t *trap_opcode = nullptr; 1857 size_t trap_opcode_size = 0; 1858 1859 switch (arch.GetMachine()) { 1860 case llvm::Triple::aarch64: { 1861 static const uint8_t g_aarch64_opcode[] = {0x00, 0x00, 0x20, 0xd4}; 1862 trap_opcode = g_aarch64_opcode; 1863 trap_opcode_size = sizeof(g_aarch64_opcode); 1864 } break; 1865 1866 // TODO: support big-endian arm and thumb trap codes. 1867 case llvm::Triple::arm: { 1868 // The ARM reference recommends the use of 0xe7fddefe and 0xdefe but the 1869 // linux kernel does otherwise. 1870 static const uint8_t g_arm_breakpoint_opcode[] = {0xf0, 0x01, 0xf0, 0xe7}; 1871 static const uint8_t g_thumb_breakpoint_opcode[] = {0x01, 0xde}; 1872 1873 lldb::BreakpointLocationSP bp_loc_sp(bp_site->GetOwnerAtIndex(0)); 1874 AddressClass addr_class = AddressClass::eUnknown; 1875 1876 if (bp_loc_sp) { 1877 addr_class = bp_loc_sp->GetAddress().GetAddressClass(); 1878 if (addr_class == AddressClass::eUnknown && 1879 (bp_loc_sp->GetAddress().GetFileAddress() & 1)) 1880 addr_class = AddressClass::eCodeAlternateISA; 1881 } 1882 1883 if (addr_class == AddressClass::eCodeAlternateISA) { 1884 trap_opcode = g_thumb_breakpoint_opcode; 1885 trap_opcode_size = sizeof(g_thumb_breakpoint_opcode); 1886 } else { 1887 trap_opcode = g_arm_breakpoint_opcode; 1888 trap_opcode_size = sizeof(g_arm_breakpoint_opcode); 1889 } 1890 } break; 1891 1892 case llvm::Triple::mips: 1893 case llvm::Triple::mips64: { 1894 static const uint8_t g_hex_opcode[] = {0x00, 0x00, 0x00, 0x0d}; 1895 trap_opcode = g_hex_opcode; 1896 trap_opcode_size = sizeof(g_hex_opcode); 1897 } break; 1898 1899 case llvm::Triple::mipsel: 1900 case llvm::Triple::mips64el: { 1901 static const uint8_t g_hex_opcode[] = {0x0d, 0x00, 0x00, 0x00}; 1902 trap_opcode = g_hex_opcode; 1903 trap_opcode_size = sizeof(g_hex_opcode); 1904 } break; 1905 1906 case llvm::Triple::systemz: { 1907 static const uint8_t g_hex_opcode[] = {0x00, 0x01}; 1908 trap_opcode = g_hex_opcode; 1909 trap_opcode_size = sizeof(g_hex_opcode); 1910 } break; 1911 1912 case llvm::Triple::hexagon: { 1913 static const uint8_t g_hex_opcode[] = {0x0c, 0xdb, 0x00, 0x54}; 1914 trap_opcode = g_hex_opcode; 1915 trap_opcode_size = sizeof(g_hex_opcode); 1916 } break; 1917 1918 case llvm::Triple::ppc: 1919 case llvm::Triple::ppc64: { 1920 static const uint8_t g_ppc_opcode[] = {0x7f, 0xe0, 0x00, 0x08}; 1921 trap_opcode = g_ppc_opcode; 1922 trap_opcode_size = sizeof(g_ppc_opcode); 1923 } break; 1924 1925 case llvm::Triple::ppc64le: { 1926 static const uint8_t g_ppc64le_opcode[] = {0x08, 0x00, 0xe0, 0x7f}; // trap 1927 trap_opcode = g_ppc64le_opcode; 1928 trap_opcode_size = sizeof(g_ppc64le_opcode); 1929 } break; 1930 1931 case llvm::Triple::x86: 1932 case llvm::Triple::x86_64: { 1933 static const uint8_t g_i386_opcode[] = {0xCC}; 1934 trap_opcode = g_i386_opcode; 1935 trap_opcode_size = sizeof(g_i386_opcode); 1936 } break; 1937 1938 default: 1939 llvm_unreachable( 1940 "Unhandled architecture in Platform::GetSoftwareBreakpointTrapOpcode"); 1941 } 1942 1943 assert(bp_site); 1944 if (bp_site->SetTrapOpcode(trap_opcode, trap_opcode_size)) 1945 return trap_opcode_size; 1946 1947 return 0; 1948 } 1949