]> CyberLeo.Net >> Repos - FreeBSD/releng/10.0.git/blob - contrib/llvm/tools/lldb/source/Plugins/Process/gdb-remote/GDBRemoteCommunicationServer.cpp
- Copy stable/10 (r259064) to releng/10.0 as part of the
[FreeBSD/releng/10.0.git] / contrib / llvm / tools / lldb / source / Plugins / Process / gdb-remote / GDBRemoteCommunicationServer.cpp
1 //===-- GDBRemoteCommunicationServer.cpp ------------------------*- C++ -*-===//
2 //
3 //                     The LLVM Compiler Infrastructure
4 //
5 // This file is distributed under the University of Illinois Open Source
6 // License. See LICENSE.TXT for details.
7 //
8 //===----------------------------------------------------------------------===//
9
10
11 #include "GDBRemoteCommunicationServer.h"
12
13 // C Includes
14 // C++ Includes
15 // Other libraries and framework includes
16 #include "llvm/ADT/Triple.h"
17 #include "lldb/Interpreter/Args.h"
18 #include "lldb/Core/ConnectionFileDescriptor.h"
19 #include "lldb/Core/Log.h"
20 #include "lldb/Core/State.h"
21 #include "lldb/Core/StreamString.h"
22 #include "lldb/Host/Endian.h"
23 #include "lldb/Host/Host.h"
24 #include "lldb/Host/TimeValue.h"
25 #include "lldb/Target/Process.h"
26
27 // Project includes
28 #include "Utility/StringExtractorGDBRemote.h"
29 #include "ProcessGDBRemote.h"
30 #include "ProcessGDBRemoteLog.h"
31
32 using namespace lldb;
33 using namespace lldb_private;
34
35 //----------------------------------------------------------------------
36 // GDBRemoteCommunicationServer constructor
37 //----------------------------------------------------------------------
38 GDBRemoteCommunicationServer::GDBRemoteCommunicationServer(bool is_platform) :
39     GDBRemoteCommunication ("gdb-remote.server", "gdb-remote.server.rx_packet", is_platform),
40     m_async_thread (LLDB_INVALID_HOST_THREAD),
41     m_process_launch_info (),
42     m_process_launch_error (),
43     m_proc_infos (),
44     m_proc_infos_index (0),
45     m_lo_port_num (0),
46     m_hi_port_num (0)
47 {
48 }
49
50 //----------------------------------------------------------------------
51 // Destructor
52 //----------------------------------------------------------------------
53 GDBRemoteCommunicationServer::~GDBRemoteCommunicationServer()
54 {
55 }
56
57
58 //void *
59 //GDBRemoteCommunicationServer::AsyncThread (void *arg)
60 //{
61 //    GDBRemoteCommunicationServer *server = (GDBRemoteCommunicationServer*) arg;
62 //
63 //    Log *log;// (ProcessGDBRemoteLog::GetLogIfAllCategoriesSet (GDBR_LOG_PROCESS));
64 //    if (log)
65 //        log->Printf ("ProcessGDBRemote::%s (arg = %p, pid = %i) thread starting...", __FUNCTION__, arg, process->GetID());
66 //
67 //    StringExtractorGDBRemote packet;
68 //    
69 //    while ()
70 //    {
71 //        if (packet.
72 //    }
73 //
74 //    if (log)
75 //        log->Printf ("ProcessGDBRemote::%s (arg = %p, pid = %i) thread exiting...", __FUNCTION__, arg, process->GetID());
76 //
77 //    process->m_async_thread = LLDB_INVALID_HOST_THREAD;
78 //    return NULL;
79 //}
80 //
81 bool
82 GDBRemoteCommunicationServer::GetPacketAndSendResponse (uint32_t timeout_usec, 
83                                                         Error &error,
84                                                         bool &interrupt, 
85                                                         bool &quit)
86 {
87     StringExtractorGDBRemote packet;
88     if (WaitForPacketWithTimeoutMicroSecondsNoLock (packet, timeout_usec))
89     {
90         const StringExtractorGDBRemote::ServerPacketType packet_type = packet.GetServerPacketType ();
91         switch (packet_type)
92         {
93             case StringExtractorGDBRemote::eServerPacketType_nack:
94             case StringExtractorGDBRemote::eServerPacketType_ack:
95                 break;
96
97             case StringExtractorGDBRemote::eServerPacketType_invalid:
98                 error.SetErrorString("invalid packet");
99                 quit = true;
100                 break;
101
102             case StringExtractorGDBRemote::eServerPacketType_interrupt:
103                 error.SetErrorString("interrupt received");
104                 interrupt = true;
105                 break;
106             
107             case StringExtractorGDBRemote::eServerPacketType_unimplemented:
108                 return SendUnimplementedResponse (packet.GetStringRef().c_str()) > 0;
109
110             case StringExtractorGDBRemote::eServerPacketType_A:
111                 return Handle_A (packet);
112
113             case StringExtractorGDBRemote::eServerPacketType_qfProcessInfo:
114                 return Handle_qfProcessInfo (packet);
115                 
116             case StringExtractorGDBRemote::eServerPacketType_qsProcessInfo:
117                 return Handle_qsProcessInfo (packet);
118                 
119             case StringExtractorGDBRemote::eServerPacketType_qC:
120                 return Handle_qC (packet);
121                 
122             case StringExtractorGDBRemote::eServerPacketType_qHostInfo:
123                 return Handle_qHostInfo (packet);
124                 
125             case StringExtractorGDBRemote::eServerPacketType_qLaunchGDBServer:
126                 return Handle_qLaunchGDBServer (packet);
127                 
128             case StringExtractorGDBRemote::eServerPacketType_qLaunchSuccess:
129                 return Handle_qLaunchSuccess (packet);
130                 
131             case StringExtractorGDBRemote::eServerPacketType_qGroupName:
132                 return Handle_qGroupName (packet);
133
134             case StringExtractorGDBRemote::eServerPacketType_qProcessInfoPID:
135                 return Handle_qProcessInfoPID (packet);
136
137             case StringExtractorGDBRemote::eServerPacketType_qSpeedTest:
138                 return Handle_qSpeedTest (packet);
139
140             case StringExtractorGDBRemote::eServerPacketType_qUserName:
141                 return Handle_qUserName (packet);
142
143             case StringExtractorGDBRemote::eServerPacketType_QEnvironment:
144                 return Handle_QEnvironment (packet);
145             
146             case StringExtractorGDBRemote::eServerPacketType_QSetDisableASLR:
147                 return Handle_QSetDisableASLR (packet);
148             
149             case StringExtractorGDBRemote::eServerPacketType_QSetSTDIN:
150                 return Handle_QSetSTDIN (packet);
151             
152             case StringExtractorGDBRemote::eServerPacketType_QSetSTDOUT:
153                 return Handle_QSetSTDOUT (packet);
154             
155             case StringExtractorGDBRemote::eServerPacketType_QSetSTDERR:
156                 return Handle_QSetSTDERR (packet);
157             
158             case StringExtractorGDBRemote::eServerPacketType_QSetWorkingDir:
159                 return Handle_QSetWorkingDir (packet);
160
161             case StringExtractorGDBRemote::eServerPacketType_QStartNoAckMode:
162                 return Handle_QStartNoAckMode (packet);
163         }
164         return true;
165     }
166     else
167     {
168         if (!IsConnected())
169             error.SetErrorString("lost connection");
170         else
171             error.SetErrorString("timeout");
172     }
173
174     return false;
175 }
176
177 size_t
178 GDBRemoteCommunicationServer::SendUnimplementedResponse (const char *)
179 {
180     // TODO: Log the packet we aren't handling...
181     return SendPacketNoLock ("", 0);
182 }
183
184 size_t
185 GDBRemoteCommunicationServer::SendErrorResponse (uint8_t err)
186 {
187     char packet[16];
188     int packet_len = ::snprintf (packet, sizeof(packet), "E%2.2x", err);
189     assert (packet_len < (int)sizeof(packet));
190     return SendPacketNoLock (packet, packet_len);
191 }
192
193
194 size_t
195 GDBRemoteCommunicationServer::SendOKResponse ()
196 {
197     return SendPacketNoLock ("OK", 2);
198 }
199
200 bool
201 GDBRemoteCommunicationServer::HandshakeWithClient(Error *error_ptr)
202 {
203     return GetAck();
204 }
205
206 bool
207 GDBRemoteCommunicationServer::Handle_qHostInfo (StringExtractorGDBRemote &packet)
208 {
209     StreamString response;
210     
211     // $cputype:16777223;cpusubtype:3;ostype:Darwin;vendor:apple;endian:little;ptrsize:8;#00
212
213     ArchSpec host_arch (Host::GetArchitecture ());
214     const llvm::Triple &host_triple = host_arch.GetTriple();
215     response.PutCString("triple:");
216     response.PutCStringAsRawHex8(host_triple.getTriple().c_str());
217     response.Printf (";ptrsize:%u;",host_arch.GetAddressByteSize());
218
219     uint32_t cpu = host_arch.GetMachOCPUType();
220     uint32_t sub = host_arch.GetMachOCPUSubType();
221     if (cpu != LLDB_INVALID_CPUTYPE)
222         response.Printf ("cputype:%u;", cpu);
223     if (sub != LLDB_INVALID_CPUTYPE)
224         response.Printf ("cpusubtype:%u;", sub);
225     
226     if (cpu == ArchSpec::kCore_arm_any)
227         response.Printf("watchpoint_exceptions_received:before;");   // On armv7 we use "synchronous" watchpoints which means the exception is delivered before the instruction executes.
228     else
229         response.Printf("watchpoint_exceptions_received:after;");
230     
231     switch (lldb::endian::InlHostByteOrder())
232     {
233     case eByteOrderBig:     response.PutCString ("endian:big;"); break;
234     case eByteOrderLittle:  response.PutCString ("endian:little;"); break;
235     case eByteOrderPDP:     response.PutCString ("endian:pdp;"); break;
236     default:                response.PutCString ("endian:unknown;"); break;
237     }
238     
239     uint32_t major = UINT32_MAX;
240     uint32_t minor = UINT32_MAX;
241     uint32_t update = UINT32_MAX;
242     if (Host::GetOSVersion (major, minor, update))
243     {
244         if (major != UINT32_MAX)
245         {
246             response.Printf("os_version:%u", major);
247             if (minor != UINT32_MAX)
248             {
249                 response.Printf(".%u", minor);
250                 if (update != UINT32_MAX)
251                     response.Printf(".%u", update);
252             }
253             response.PutChar(';');
254         }
255     }
256
257     std::string s;
258     if (Host::GetOSBuildString (s))
259     {
260         response.PutCString ("os_build:");
261         response.PutCStringAsRawHex8(s.c_str());
262         response.PutChar(';');
263     }
264     if (Host::GetOSKernelDescription (s))
265     {
266         response.PutCString ("os_kernel:");
267         response.PutCStringAsRawHex8(s.c_str());
268         response.PutChar(';');
269     }
270     if (Host::GetHostname (s))
271     {
272         response.PutCString ("hostname:");
273         response.PutCStringAsRawHex8(s.c_str());
274         response.PutChar(';');
275     }
276     
277     return SendPacketNoLock (response.GetData(), response.GetSize()) > 0;
278 }
279
280 static void
281 CreateProcessInfoResponse (const ProcessInstanceInfo &proc_info, StreamString &response)
282 {
283     response.Printf ("pid:%" PRIu64 ";ppid:%" PRIu64 ";uid:%i;gid:%i;euid:%i;egid:%i;",
284                      proc_info.GetProcessID(),
285                      proc_info.GetParentProcessID(),
286                      proc_info.GetUserID(),
287                      proc_info.GetGroupID(),
288                      proc_info.GetEffectiveUserID(),
289                      proc_info.GetEffectiveGroupID());
290     response.PutCString ("name:");
291     response.PutCStringAsRawHex8(proc_info.GetName());
292     response.PutChar(';');
293     const ArchSpec &proc_arch = proc_info.GetArchitecture();
294     if (proc_arch.IsValid())
295     {
296         const llvm::Triple &proc_triple = proc_arch.GetTriple();
297         response.PutCString("triple:");
298         response.PutCStringAsRawHex8(proc_triple.getTriple().c_str());
299         response.PutChar(';');
300     }
301 }
302
303 bool
304 GDBRemoteCommunicationServer::Handle_qProcessInfoPID (StringExtractorGDBRemote &packet)
305 {
306     // Packet format: "qProcessInfoPID:%i" where %i is the pid
307     packet.SetFilePos(::strlen ("qProcessInfoPID:"));
308     lldb::pid_t pid = packet.GetU32 (LLDB_INVALID_PROCESS_ID);
309     if (pid != LLDB_INVALID_PROCESS_ID)
310     {
311         ProcessInstanceInfo proc_info;
312         if (Host::GetProcessInfo(pid, proc_info))
313         {
314             StreamString response;
315             CreateProcessInfoResponse (proc_info, response);
316             return SendPacketNoLock (response.GetData(), response.GetSize());
317         }
318     }
319     return SendErrorResponse (1);
320 }
321
322 bool 
323 GDBRemoteCommunicationServer::Handle_qfProcessInfo (StringExtractorGDBRemote &packet)
324 {
325     m_proc_infos_index = 0;
326     m_proc_infos.Clear();
327
328     ProcessInstanceInfoMatch match_info;
329     packet.SetFilePos(::strlen ("qfProcessInfo"));
330     if (packet.GetChar() == ':')
331     {
332     
333         std::string key;
334         std::string value;
335         while (packet.GetNameColonValue(key, value))
336         {
337             bool success = true;
338             if (key.compare("name") == 0)
339             {
340                 StringExtractor extractor;
341                 extractor.GetStringRef().swap(value);
342                 extractor.GetHexByteString (value);
343                 match_info.GetProcessInfo().GetExecutableFile().SetFile(value.c_str(), false);
344             }
345             else if (key.compare("name_match") == 0)
346             {
347                 if (value.compare("equals") == 0)
348                 {
349                     match_info.SetNameMatchType (eNameMatchEquals);
350                 }
351                 else if (value.compare("starts_with") == 0)
352                 {
353                     match_info.SetNameMatchType (eNameMatchStartsWith);
354                 }
355                 else if (value.compare("ends_with") == 0)
356                 {
357                     match_info.SetNameMatchType (eNameMatchEndsWith);
358                 }
359                 else if (value.compare("contains") == 0)
360                 {
361                     match_info.SetNameMatchType (eNameMatchContains);
362                 }
363                 else if (value.compare("regex") == 0)       
364                 {
365                     match_info.SetNameMatchType (eNameMatchRegularExpression);
366                 }
367                 else 
368                 {
369                     success = false;
370                 }
371             }
372             else if (key.compare("pid") == 0)
373             {
374                 match_info.GetProcessInfo().SetProcessID (Args::StringToUInt32(value.c_str(), LLDB_INVALID_PROCESS_ID, 0, &success));
375             }
376             else if (key.compare("parent_pid") == 0)
377             {
378                 match_info.GetProcessInfo().SetParentProcessID (Args::StringToUInt32(value.c_str(), LLDB_INVALID_PROCESS_ID, 0, &success));
379             }
380             else if (key.compare("uid") == 0)
381             {
382                 match_info.GetProcessInfo().SetUserID (Args::StringToUInt32(value.c_str(), UINT32_MAX, 0, &success));
383             }
384             else if (key.compare("gid") == 0)
385             {
386                 match_info.GetProcessInfo().SetGroupID (Args::StringToUInt32(value.c_str(), UINT32_MAX, 0, &success));
387             }
388             else if (key.compare("euid") == 0)
389             {
390                 match_info.GetProcessInfo().SetEffectiveUserID (Args::StringToUInt32(value.c_str(), UINT32_MAX, 0, &success));
391             }
392             else if (key.compare("egid") == 0)
393             {
394                 match_info.GetProcessInfo().SetEffectiveGroupID (Args::StringToUInt32(value.c_str(), UINT32_MAX, 0, &success));
395             }
396             else if (key.compare("all_users") == 0)
397             {
398                 match_info.SetMatchAllUsers(Args::StringToBoolean(value.c_str(), false, &success));
399             }
400             else if (key.compare("triple") == 0)
401             {
402                 match_info.GetProcessInfo().GetArchitecture().SetTriple (value.c_str(), NULL);
403             }
404             else
405             {
406                 success = false;
407             }
408             
409             if (!success)
410                 return SendErrorResponse (2);
411         }
412     }
413
414     if (Host::FindProcesses (match_info, m_proc_infos))
415     {
416         // We found something, return the first item by calling the get
417         // subsequent process info packet handler...
418         return Handle_qsProcessInfo (packet);
419     }
420     return SendErrorResponse (3);
421 }
422
423 bool 
424 GDBRemoteCommunicationServer::Handle_qsProcessInfo (StringExtractorGDBRemote &packet)
425 {
426     if (m_proc_infos_index < m_proc_infos.GetSize())
427     {
428         StreamString response;
429         CreateProcessInfoResponse (m_proc_infos.GetProcessInfoAtIndex(m_proc_infos_index), response);
430         ++m_proc_infos_index;
431         return SendPacketNoLock (response.GetData(), response.GetSize());
432     }
433     return SendErrorResponse (4);
434 }
435
436 bool 
437 GDBRemoteCommunicationServer::Handle_qUserName (StringExtractorGDBRemote &packet)
438 {
439     // Packet format: "qUserName:%i" where %i is the uid
440     packet.SetFilePos(::strlen ("qUserName:"));
441     uint32_t uid = packet.GetU32 (UINT32_MAX);
442     if (uid != UINT32_MAX)
443     {
444         std::string name;
445         if (Host::GetUserName (uid, name))
446         {
447             StreamString response;
448             response.PutCStringAsRawHex8 (name.c_str());
449             return SendPacketNoLock (response.GetData(), response.GetSize());
450         }
451     }
452     return SendErrorResponse (5);
453     
454 }
455
456 bool 
457 GDBRemoteCommunicationServer::Handle_qGroupName (StringExtractorGDBRemote &packet)
458 {
459     // Packet format: "qGroupName:%i" where %i is the gid
460     packet.SetFilePos(::strlen ("qGroupName:"));
461     uint32_t gid = packet.GetU32 (UINT32_MAX);
462     if (gid != UINT32_MAX)
463     {
464         std::string name;
465         if (Host::GetGroupName (gid, name))
466         {
467             StreamString response;
468             response.PutCStringAsRawHex8 (name.c_str());
469             return SendPacketNoLock (response.GetData(), response.GetSize());
470         }
471     }
472     return SendErrorResponse (6);
473 }
474
475 bool
476 GDBRemoteCommunicationServer::Handle_qSpeedTest (StringExtractorGDBRemote &packet)
477 {
478     packet.SetFilePos(::strlen ("qSpeedTest:"));
479
480     std::string key;
481     std::string value;
482     bool success = packet.GetNameColonValue(key, value);
483     if (success && key.compare("response_size") == 0)
484     {
485         uint32_t response_size = Args::StringToUInt32(value.c_str(), 0, 0, &success);
486         if (success)
487         {
488             if (response_size == 0)
489                 return SendOKResponse();
490             StreamString response;
491             uint32_t bytes_left = response_size;
492             response.PutCString("data:");
493             while (bytes_left > 0)
494             {
495                 if (bytes_left >= 26)
496                 {
497                     response.PutCString("ABCDEFGHIJKLMNOPQRSTUVWXYZ");
498                     bytes_left -= 26;
499                 }
500                 else
501                 {
502                     response.Printf ("%*.*s;", bytes_left, bytes_left, "ABCDEFGHIJKLMNOPQRSTUVWXYZ");
503                     bytes_left = 0;
504                 }
505             }
506             return SendPacketNoLock (response.GetData(), response.GetSize());
507         }
508     }
509     return SendErrorResponse (7);
510 }
511
512
513 static void *
514 AcceptPortFromInferior (void *arg)
515 {
516     const char *connect_url = (const char *)arg;
517     ConnectionFileDescriptor file_conn;
518     Error error;
519     if (file_conn.Connect (connect_url, &error) == eConnectionStatusSuccess)
520     {
521         char pid_str[256];
522         ::memset (pid_str, 0, sizeof(pid_str));
523         ConnectionStatus status;
524         const size_t pid_str_len = file_conn.Read (pid_str, sizeof(pid_str), 0, status, NULL);
525         if (pid_str_len > 0)
526         {
527             int pid = atoi (pid_str);
528             return (void *)(intptr_t)pid;
529         }
530     }
531     return NULL;
532 }
533 //
534 //static bool
535 //WaitForProcessToSIGSTOP (const lldb::pid_t pid, const int timeout_in_seconds)
536 //{
537 //    const int time_delta_usecs = 100000;
538 //    const int num_retries = timeout_in_seconds/time_delta_usecs;
539 //    for (int i=0; i<num_retries; i++)
540 //    {
541 //        struct proc_bsdinfo bsd_info;
542 //        int error = ::proc_pidinfo (pid, PROC_PIDTBSDINFO, 
543 //                                    (uint64_t) 0, 
544 //                                    &bsd_info, 
545 //                                    PROC_PIDTBSDINFO_SIZE);
546 //        
547 //        switch (error)
548 //        {
549 //            case EINVAL:
550 //            case ENOTSUP:
551 //            case ESRCH:
552 //            case EPERM:
553 //                return false;
554 //                
555 //            default:
556 //                break;
557 //                
558 //            case 0:
559 //                if (bsd_info.pbi_status == SSTOP)
560 //                    return true;
561 //        }
562 //        ::usleep (time_delta_usecs);
563 //    }
564 //    return false;
565 //}
566
567 bool
568 GDBRemoteCommunicationServer::Handle_A (StringExtractorGDBRemote &packet)
569 {
570     // The 'A' packet is the most over designed packet ever here with 
571     // redundant argument indexes, redundant argument lengths and needed hex 
572     // encoded argument string values. Really all that is needed is a comma 
573     // separated hex encoded argument value list, but we will stay true to the
574     // documented version of the 'A' packet here...
575
576     packet.SetFilePos(1); // Skip the 'A'
577     bool success = true;
578     while (success && packet.GetBytesLeft() > 0)
579     {
580         // Decode the decimal argument string length. This length is the
581         // number of hex nibbles in the argument string value.
582         const uint32_t arg_len = packet.GetU32(UINT32_MAX);
583         if (arg_len == UINT32_MAX)
584             success = false;
585         else
586         {
587             // Make sure the argument hex string length is followed by a comma
588             if (packet.GetChar() != ',')
589                 success = false;
590             else
591             {
592                 // Decode the argument index. We ignore this really becuase
593                 // who would really send down the arguments in a random order???
594                 const uint32_t arg_idx = packet.GetU32(UINT32_MAX);
595                 if (arg_idx == UINT32_MAX)
596                     success = false;
597                 else
598                 {
599                     // Make sure the argument index is followed by a comma
600                     if (packet.GetChar() != ',')
601                         success = false;
602                     else
603                     {
604                         // Decode the argument string value from hex bytes
605                         // back into a UTF8 string and make sure the length
606                         // matches the one supplied in the packet
607                         std::string arg;
608                         if (packet.GetHexByteString(arg) != (arg_len / 2))
609                             success = false;
610                         else
611                         {
612                             // If there are any bytes lft
613                             if (packet.GetBytesLeft())
614                             {
615                                 if (packet.GetChar() != ',')
616                                     success = false;
617                             }
618                             
619                             if (success)
620                             {
621                                 if (arg_idx == 0)
622                                     m_process_launch_info.GetExecutableFile().SetFile(arg.c_str(), false);
623                                 m_process_launch_info.GetArguments().AppendArgument(arg.c_str());
624                             }
625                         }
626                     }
627                 }
628             }
629         }
630     }
631
632     if (success)
633     {
634         m_process_launch_info.GetFlags().Set (eLaunchFlagDebug);
635         m_process_launch_error = Host::LaunchProcess (m_process_launch_info);
636         if (m_process_launch_info.GetProcessID() != LLDB_INVALID_PROCESS_ID)
637         {
638             return SendOKResponse ();
639         }
640     }
641     return SendErrorResponse (8);
642 }
643
644 bool
645 GDBRemoteCommunicationServer::Handle_qC (StringExtractorGDBRemote &packet)
646 {
647     lldb::pid_t pid = m_process_launch_info.GetProcessID();
648     StreamString response;
649     response.Printf("QC%" PRIx64, pid);
650     if (m_is_platform)
651     {
652         // If we launch a process and this GDB server is acting as a platform, 
653         // then we need to clear the process launch state so we can start 
654         // launching another process. In order to launch a process a bunch or
655         // packets need to be sent: environment packets, working directory,
656         // disable ASLR, and many more settings. When we launch a process we 
657         // then need to know when to clear this information. Currently we are
658         // selecting the 'qC' packet as that packet which seems to make the most
659         // sense.
660         if (pid != LLDB_INVALID_PROCESS_ID)
661         {
662             m_process_launch_info.Clear();
663         }
664     }
665     return SendPacketNoLock (response.GetData(), response.GetSize());
666 }
667
668 bool
669 GDBRemoteCommunicationServer::Handle_qLaunchGDBServer (StringExtractorGDBRemote &packet)
670 {
671     // Spawn a local debugserver as a platform so we can then attach or launch
672     // a process...
673
674     if (m_is_platform)
675     {
676         // Sleep and wait a bit for debugserver to start to listen...
677         ConnectionFileDescriptor file_conn;
678         char connect_url[PATH_MAX];
679         Error error;
680         char unix_socket_name[PATH_MAX] = "/tmp/XXXXXX";    
681         if (::mktemp (unix_socket_name) == NULL)
682         {
683             error.SetErrorString ("failed to make temporary path for a unix socket");
684         }
685         else
686         {
687             ::snprintf (connect_url, sizeof(connect_url), "unix-accept://%s", unix_socket_name);
688             // Spawn a new thread to accept the port that gets bound after
689             // binding to port 0 (zero).
690             lldb::thread_t accept_thread = Host::ThreadCreate (unix_socket_name,
691                                                                AcceptPortFromInferior,
692                                                                connect_url,
693                                                                &error);
694             
695             if (IS_VALID_LLDB_HOST_THREAD(accept_thread))
696             {
697                 // Spawn a debugserver and try to get
698                 ProcessLaunchInfo debugserver_launch_info;
699                 error = StartDebugserverProcess ("localhost:0", 
700                                                  unix_socket_name, 
701                                                  debugserver_launch_info);
702                 
703                 lldb::pid_t debugserver_pid = debugserver_launch_info.GetProcessID();
704                 if (error.Success())
705                 {
706                     bool success = false;
707                     
708                     thread_result_t accept_thread_result = NULL;
709                     if (Host::ThreadJoin (accept_thread, &accept_thread_result, &error))
710                     {
711                         if (accept_thread_result)
712                         {
713                             uint16_t port = (intptr_t)accept_thread_result;
714                             char response[256];
715                             const int response_len = ::snprintf (response, sizeof(response), "pid:%" PRIu64 ";port:%u;", debugserver_pid, port);
716                             assert (response_len < (int)sizeof(response));
717                             //m_port_to_pid_map[port] = debugserver_launch_info.GetProcessID();
718                             success = SendPacketNoLock (response, response_len) > 0;
719                         }
720                     }
721                     ::unlink (unix_socket_name);
722                     
723                     if (!success)
724                     {
725                         if (debugserver_pid != LLDB_INVALID_PROCESS_ID)
726                             ::kill (debugserver_pid, SIGINT);
727                     }
728                     return success;
729                 }
730             }
731         }
732     }
733     return SendErrorResponse (13);
734 }
735
736 bool
737 GDBRemoteCommunicationServer::Handle_qLaunchSuccess (StringExtractorGDBRemote &packet)
738 {
739     if (m_process_launch_error.Success())
740         return SendOKResponse();
741     StreamString response;    
742     response.PutChar('E');
743     response.PutCString(m_process_launch_error.AsCString("<unknown error>"));
744     return SendPacketNoLock (response.GetData(), response.GetSize());
745 }
746
747 bool
748 GDBRemoteCommunicationServer::Handle_QEnvironment  (StringExtractorGDBRemote &packet)
749 {
750     packet.SetFilePos(::strlen ("QEnvironment:"));
751     const uint32_t bytes_left = packet.GetBytesLeft();
752     if (bytes_left > 0)
753     {
754         m_process_launch_info.GetEnvironmentEntries ().AppendArgument (packet.Peek());
755         return SendOKResponse ();
756     }
757     return SendErrorResponse (9);
758 }
759
760 bool
761 GDBRemoteCommunicationServer::Handle_QSetDisableASLR (StringExtractorGDBRemote &packet)
762 {
763     packet.SetFilePos(::strlen ("QSetDisableASLR:"));
764     if (packet.GetU32(0))
765         m_process_launch_info.GetFlags().Set (eLaunchFlagDisableASLR);
766     else
767         m_process_launch_info.GetFlags().Clear (eLaunchFlagDisableASLR);
768     return SendOKResponse ();
769 }
770
771 bool
772 GDBRemoteCommunicationServer::Handle_QSetWorkingDir (StringExtractorGDBRemote &packet)
773 {
774     packet.SetFilePos(::strlen ("QSetWorkingDir:"));
775     std::string path;
776     packet.GetHexByteString(path);
777     m_process_launch_info.SwapWorkingDirectory (path);
778     return SendOKResponse ();
779 }
780
781 bool
782 GDBRemoteCommunicationServer::Handle_QSetSTDIN (StringExtractorGDBRemote &packet)
783 {
784     packet.SetFilePos(::strlen ("QSetSTDIN:"));
785     ProcessLaunchInfo::FileAction file_action;
786     std::string path;
787     packet.GetHexByteString(path);
788     const bool read = false;
789     const bool write = true;
790     if (file_action.Open(STDIN_FILENO, path.c_str(), read, write))
791     {
792         m_process_launch_info.AppendFileAction(file_action);
793         return SendOKResponse ();
794     }
795     return SendErrorResponse (10);
796 }
797
798 bool
799 GDBRemoteCommunicationServer::Handle_QSetSTDOUT (StringExtractorGDBRemote &packet)
800 {
801     packet.SetFilePos(::strlen ("QSetSTDOUT:"));
802     ProcessLaunchInfo::FileAction file_action;
803     std::string path;
804     packet.GetHexByteString(path);
805     const bool read = true;
806     const bool write = false;
807     if (file_action.Open(STDOUT_FILENO, path.c_str(), read, write))
808     {
809         m_process_launch_info.AppendFileAction(file_action);
810         return SendOKResponse ();
811     }
812     return SendErrorResponse (11);
813 }
814
815 bool
816 GDBRemoteCommunicationServer::Handle_QSetSTDERR (StringExtractorGDBRemote &packet)
817 {
818     packet.SetFilePos(::strlen ("QSetSTDERR:"));
819     ProcessLaunchInfo::FileAction file_action;
820     std::string path;
821     packet.GetHexByteString(path);
822     const bool read = true;
823     const bool write = false;
824     if (file_action.Open(STDERR_FILENO, path.c_str(), read, write))
825     {
826         m_process_launch_info.AppendFileAction(file_action);
827         return SendOKResponse ();
828     }
829     return SendErrorResponse (12);
830 }
831
832 bool
833 GDBRemoteCommunicationServer::Handle_QStartNoAckMode (StringExtractorGDBRemote &packet)
834 {
835     // Send response first before changing m_send_acks to we ack this packet
836     SendOKResponse ();
837     m_send_acks = false;
838     return true;
839 }